<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-23" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-23"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="15"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 83?>

<t>This document provides a gap analysis of the current operational intra-domain SAV mechanisms and identifies requirements for new intra-domain SAV solutions.</t>
    </abstract>
  </front>
  <middle>
    <?line 87?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) defends against source address spoofing. Network operators can enforce SAV at the following levels (see <xref target="RFC5210"/>):</t>
      <ul spacing="normal">
        <li>
          <t>IP source address validation in the access network</t>
        </li>
        <li>
          <t>IP source address validation at intra-AS/ingress point</t>
        </li>
        <li>
          <t>IP source address validation in the inter-AS Case (neighboring AS)</t>
        </li>
      </ul>
      <t>Some access networks have already deployed SAV mechanisms. These mechanisms typically are deployed on switches in the access network and prevent hosts from using the source address of another host on the Internet <xref target="RFC5210"/>. Mechanisms include:</t>
      <ul spacing="normal">
        <li>
          <t>Source Address Validation Improvement (SAVI) Solution for DHCP <xref target="RFC7513"/></t>
        </li>
        <li>
          <t>IP Source Guard (IPSG) based on DHCP snooping <xref target="IPSG"/></t>
        </li>
        <li>
          <t>Cable Source-Verify <xref target="cable-verify"/></t>
        </li>
      </ul>
      <t>However, access-network SAV mechanisms are not universally deployed <xref target="CAIDA-spoofer"/>. Therefore, intra-domain (i.e., intra-AS) SAV and inter-domain (i.e., inter-AS) SAV are required <xref target="RFC5210"/>.</t>
      <t>This document provides a gap analysis of the current operational intra-domain SAV mechanisms and identifies requirements for new intra-domain SAV solutions.</t>
      <t>In this document, a domain refers to a routing domain under a single administrative control (e.g., an AS). Intra-domain SAV refers to SAV at a domain's external interfaces that do not carry external BGP (eBGP) sessions (i.e., non-BGP external interfaces). SAV at internal interfaces or BGP-facing external interfaces is considered out of scope. For a domain, as illustrated in <xref target="intra-domain"/>, a non-BGP external interface may connect to a set of hosts, a non-BGP customer network, or a non-BGP Internet Service Provider (ISP) network. The goal of intra-domain SAV at such interfaces is to prevent traffic using unauthorized source addresses from entering the domain.</t>
      <figure anchor="intra-domain">
        <name>Deployment locations of intra-domain SAV</name>
        <artwork><![CDATA[
      +-----------------+         +---------------+ 
      |   Non-BGP ISP   |         | eBGP Neighbor |
      +-----------------+         +---------------+ 
              |                           |           
              |                           |           
              |                           |
+-------------|---------------------------|---------+ 
|Domain       \/                          |         | 
|         +---#------+               +----------+   | 
|         | Router 3 +---------------+ Router 4 |   | 
|         +----------+               +----------+   | 
|          /        \                     |         | 
|         /          \                    |         | 
|        /            \                   |         | 
| +----------+     +----------+      +----------+   | 
| | Router 1 |     | Router 2 +------+ Router 5 |   | 
| +------*---+     +--*-------+      +----X-----+   | 
|        /\           /\                  /\        | 
|         \           /                   |         | 
+----------\---------/--------------------|---------+ 
       +----------------+         +---------------+  
       |Non-BGP Customer|         |   A Set of    |  
       |   Network      |         |     Hosts     |  
       |     (P1)       |         |     (P2)      |  
       +----------------+         +---------------+ 
                                                    
  This document focuses on SAV at a domain's non-BGP 
  external interfaces including Interfaces  'X', '*', and '#'.
]]></artwork>
      </figure>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Non-BGP Customer Network: A stub network (i.e., a network that only originates traffic) connected to its provider network for Internet connectivity and does not participate in eBGP peering with its provider network.</t>
        <t>Non-BGP Internet Service Provider (ISP) Network: A network that forwards traffic from its customer network to the Internet and does not participate in eBGP peering with its customer network.</t>
        <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        <t>Proper Block: The validation results that packets with spoofed source addresses are blocked by SAV rules.</t>
        <t>Proper Permit: The validation results that packets with legitimate source addresses are permitted by SAV rules.</t>
        <t>SAV-specific Information: The information specialized for SAV rule generation.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>The requirements language is used in <xref target="sec-requirement"/> and applies to implementations of SAV conformant to the listed requirements.</t>
      </section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Problem Statement of Current Operational Intra-domain SAV Mechanisms</name>
      <t>Although BCP 38 <xref target="RFC2827"/> and BCP 84 <xref target="RFC3704"/> specify several ingress filtering methods primarily intended for inter-domain SAV, some of these methods have also been applied to intra-domain SAV in operational practice. This section summarizes the problems of mechanisms currently used to implement intra-domain SAV. These mechanisms have significant limitations in terms of automated updates or accurate validation.</t>
      <ul spacing="normal">
        <li>
          <t>Access Control Lists (ACLs) can be used as SAV filters <xref target="RFC2827"/> to check the source address of each packet against a set of permitted or prohibited prefixes. When applied on a router interface, each ACL entry (ACE) specifies both matching conditions (e.g., prefixes) and the corresponding action (e.g., permit or deny), and packets are processed accordingly. To ensure correct filtering behavior, changes in SAV state need to be reflected in corresponding ACL rules, which in turn need to be updated in accordance with changes in prefixes or topology; otherwise, packets may be improperly permitted or blocked. In ACL-based ingress filtering <xref target="RFC2827"/> deployments, maintaining consistency between SAV state and ACL rules can introduce operational challenges, as this update process is often performed manually or requires significant operational intervention.</t>
        </li>
        <li>
          <t>Strict uRPF <xref target="RFC3704"/> provides an automated SAV filter by validating the source address of each packet against the router’s local Forwarding Information Base (FIB). A packet is accepted only if (i) the FIB contains a prefix covering the source address, and (ii) the FIB entry’s outgoing interface matches the packet’s incoming interface. Otherwise, the packet is discarded. It may block legitimate traffic in the asymmetric routing or hidden prefix scenarios (see <xref target="subsec-ar"/> and <xref target="subsec-hp"/>). Strict uRPF may mistakenly consider a valid incoming interface as invalid, resulting in legitimate packets being blocked (i.e., an improper block problem).</t>
        </li>
        <li>
          <t>Loose uRPF <xref target="RFC3704"/> also relies on the local FIB for validation, but only checks for the presence of a covering prefix. A packet is accepted if the FIB contains a prefix that covers the source address, regardless of the incoming interface. Since its rules are overly permissive, any spoofed packet with a source address present in the FIB may be permitted by loose uRPF (i.e., an improper permit problem).</t>
        </li>
        <li>
          <t>Enhanced Feasible Path uRPF (EFP-uRPF) <xref target="RFC8704"/> is an advanced SAV mechanism specifically designed for inter-domain SAV. It enforces SAV on eBGP interfaces facing a customer AS by leveraging BGP data received from external ASes. EFP-uRPF is not analyzed in this document, as it is outside the scope of intra-domain SAV.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>This section analyzes the gaps and key challenges of the current operational intra-domain SAV mechanisms.</t>
      <t>ACL-based SAV can be deployed on interfaces facing a non-BGP customer network or a set of hosts, permitting only packets with authorized source addresses. Such mechanism can also be applied on interfaces facing a non-BGP ISP network to block packets with prohibited source addresses, including internal-use-only addresses, unallocated addresses, and addresses single-homed to the local domain (e.g., P1 and P2 in <xref target="intra-domain"/>). A key limitation of ACL-based SAV is the need to maintain consistency between SAV state and ACL rules. Operators need to update ACL rules to reflect changes in prefixes or topology, and delays or inconsistencies in this process may result in outdated rules that inadvertently block legitimate traffic or permit spoofed traffic.</t>
      <t>As noted in Section 2.4 of <xref target="RFC3704"/>, loose uRPF sacrifices directionality, so its effectiveness in mitigating source address spoofing is very limited, and improper permit problems may occur.</t>
      <t>With strict uRPF, it may drop legitimate packets in scenarios such as asymmetric routing or hidden prefixes. The following subsections describe two specific gap scenarios that arise when using strict uRPF for intra-domain SAV.</t>
      <section anchor="subsec-ar">
        <name>Asymmetric Routing Scenario</name>
        <t>Asymmetric routing means a packet traverses from a source to a destination in one path and takes a different path when it returns to the source. Asymmetric routing can occur within an AS due to routing policy, traffic engineering, etc.</t>
        <t>For example, a non-BGP customer network connected to multiple routers of the AS may need to perform load balancing on incoming traffic, thereby resulting in asymmetric routing. <xref target="multi-home"/> illustrates an example of asymmetric routing. The non-BGP customer network owns prefix 2001:db8::/55 <xref target="RFC6890"/> and connects to two routers of the AS, Router 1 and Router 2. Router 1, Router 2, and Router 3 exchange routing information via the intra-domain routing protocol. To achieve load balancing for inbound traffic, the non-BGP customer network expects traffic destined for 2001:db8:0::/56 to enter through Router 1, and traffic destined for 2001:db8:0:100::/56 to enter through Router 2. To this end, Router 1 advertises 2001:db8:0::/56 and Router 2 advertises 2001:db8:0:100::/56 through the intra-domain routing protocol. <xref target="multi-home"/> also shows the corresponding FIB entries of Router 1 and Router 2 for the two prefixes.</t>
        <figure anchor="multi-home">
          <name>An example of asymmetric routing</name>
          <artwork><![CDATA[
 +----------------------------------------------------------+
 |Domain                                                    |
 |                      +----------+                        |
 |                      | Router 3 |                        |
 |                      +----------+                        |
 |                       /       \                          |
 |                      /         \                         |
 |                     /           \                        |
 |            +----------+       +----------+               |
 |            | Router 1 |       | Router 2 |               |
 |            +-----*----+       +----------+               |
 |                  /\               /                      |
 |                   \              /                       |
 +--------------------\------------/------------------------+
  Traffic with         \          / Traffic with            
  source IP addresses   \        /  destination IP addresses
  of 2001:db8:0:100::/56 \      \/  of 2001:db8:0:100::/56  
                    +----------------+                     
                    |Non-BGP Customer|                     
                    |    Network     |                     
                    |(2001:db8::/55) |                     
                    +----------------+                     

 FIB of Router 1                FIB of Router 2
 Dest                Next_hop   Dest                Next_hop
 2001:db8:0::/56     Non-BGP    2001:db8:0:100::/56 Non-BGP
                     Customer                       Customer
                     Nestwork                       Network
 2001:db8:0:100::/56 Router 3   2001:db8:0::/56     Router 3

 The legitimate traffic originated from non-BGP customer network 
 with source addresses in 2001:db8:0:100::/56 will be improperly 
 blocked by strict uRPF on Router 1.
]]></artwork>
        </figure>
        <t>Although the non-BGP customer network does not expect to receive inbound traffic for 2001:db8:0:100::/56 via Router 1, it can send outbound traffic with source addresses in that prefix through Router 1. As a result, data packets between the non-BGP customer network and Router 1 may follow asymmetric paths. Arrows in the figure indicate the direction of traffic flow.</t>
        <t>If Router 1 enforces strict uRPF by checking the FIB entry for the prefix 2001:db8:0:100::/56, the corresponding SAV rule would only allow packets with a source address from 2001:db8:0:100::/56 that arrive via Router 3. Consequently, when the non-BGP customer network sends packets with a source address in 2001:db8:0:100::/56 to Router 1, strict uRPF would incorrectly drop these legitimate packets. Similarly, if Router 2 enforces strict uRPF, it would incorrectly block legitimate packets from the non-BGP customer network that use source addresses within the prefix 2001:db8:0::/56.</t>
      </section>
      <section anchor="subsec-hp">
        <name>Hidden Prefix Scenario</name>
        <t>The intra-domain hidden prefix scenario refers to situations in which a host or non-BGP customer legitimately originates traffic using source addresses that are not visible to the intra-domain routing protocol within the domain.</t>
        <ul spacing="normal">
          <li>
            <t>A host (for example, a cloud server instance operated by a tenant) may originate traffic using a source address not allocated by the AS operator. This can occur in deployments such as Direct Server Return (DSR), where return traffic is sent directly from the server using a service IP address that is not part of the operator’s internal routing view.</t>
          </li>
          <li>
            <t>A non-BGP customer network may originate traffic using source addresses that are not advertised to the domain operator. This can occur in scenarios such as Direct Server Return (DSR) deployments or when the customer network uses address space assigned by another provider (e.g., in multi-homing or hybrid connectivity scenarios), and such prefixes are not propagated within the operator’s intra-domain routing system.</t>
          </li>
        </ul>
        <t>For ACL-based SAV, enforcing correct filtering in these scenarios requires authoritative information that explicitly specifies which source addresses the host or non-BGP customer is authorized to use. In practice, such authoritative information is often missing.</t>
        <t>Existing uRPF-based mechanisms (strict uRPF or loose uRPF) also fail in hidden prefix scenarios. They will drop packets from hidden prefixes because the source addresses are absent from the router's FIB or are received from unexpected interfaces.</t>
      </section>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>The limitations described above primarily stem from the lack of SAV-specific authoritative information that can be consistently and automatically consumed by SAV mechanisms. Existing automated uRPF-based approaches derive SAV decisions from routing or forwarding state, which is intended to express reachability rather than authorization of source address usage. As a result, these mechanisms may not provide reliable validation in scenarios such as asymmetric routing or hidden prefixes. In contrast, ACL-based approaches can express source address authorization more precisely, but rely on ongoing operational intervention, which limits their applicability in dynamic operational environments.</t>
      <t>uRPF-based mechanisms rely on routing information to make SAV decisions, assuming that the routing information in the local FIB is correct. If the routing information is incorrect, SAV decisions may also be incorrect, potentially resulting in improper blocking or permitting. Ensuring the correctness of routing information is the responsibility of mechanisms or operational processes outside the scope of SAV. However, when SAV relies on routing information or other contextual information, such information is expected to be derived from trusted sources before being used.</t>
      <t>This section identifies five requirements to guide the design, development, and evaluation of new intra-domain SAV mechanisms, and to provide a common basis for improving upon existing approaches. These requirements are informational in nature. To avoid misinterpretation or misuse as a normative reference, it is noted that these informational requirements cannot be used to initiate standards-track protocol changes.</t>
      <section anchor="sub-require1">
        <name>Accurate Validation</name>
        <t>Any new intra-domain SAV mechanism <bcp14>MUST</bcp14> improve the accuracy of source address validation compared to existing uRPF-based mechanisms. In particular, it <bcp14>MUST</bcp14> reduce the occurrence of improper blocks (i.e., blocking legitimate traffic), improper permits (i.e., allowing spoofed traffic), or both. Specifically, it <bcp14>MUST</bcp14> satisfy the following conditions:</t>
        <ul spacing="normal">
          <li>
            <t>result in fewer improper blocks than strict uRPF, particularly in scenarios involving asymmetric routes or hidden prefixes;</t>
          </li>
          <li>
            <t>result in fewer improper permits than loose uRPF.</t>
          </li>
        </ul>
        <t>To achieve higher SAV accuracy, additional information beyond the local FIB (e.g., SAV-specific information) may be needed to make validation decisions. By integrating such information, routers may have the ability to account for asymmetric routes and hidden prefixes, resulting in more accurate SAV rules.</t>
      </section>
      <section anchor="automatic-updates">
        <name>Automatic Updates</name>
        <t>Any new intra-domain SAV mechanism <bcp14>MUST</bcp14> be capable of automatically collecting and processing relevant information, and using it to derive and update SAV state and corresponding filtering rules on routers. Automation helps reduce operational complexity and maintenance overhead, while allowing some initial configuration to improve SAV accuracy. This ensures the mechanism is deployable in practical networks without introducing excessive management burden.</t>
      </section>
      <section anchor="incremental-deployment-support">
        <name>Incremental Deployment Support</name>
        <t>Any new intra-domain SAV mechanism <bcp14>MUST</bcp14> support incremental deployment and provide measurable benefits even when only a subset of external non-BGP interfaces deploy the mechanism.</t>
      </section>
      <section anchor="fast-convergence">
        <name>Fast Convergence</name>
        <t>If any new intra-domain SAV mechanism requires disseminating SAV-specific information among intra-domain routers via a protocol, two considerations are essential. First, such mechanism <bcp14>MUST</bcp14> allow routers to learn updated SAV-specific information in a timely manner. Second, such mechanism <bcp14>MUST NOT</bcp14> transmit excessive SAV-specific information via a protocol, as this could significantly increase the burden on the routers’ control planes and potentially degrade the performance of existing protocols.</t>
      </section>
      <section anchor="authentication-of-information-used-for-sav">
        <name>Authentication of Information Used for SAV</name>
        <t>Any new intra-domain SAV mechanism <bcp14>MUST</bcp14> use information that is authenticated or trusted, either through verification of its integrity and authenticity, or via an established trust relationship with the information source. If a SAV mechanism introduces new SAV-specific information, such information <bcp14>MUST</bcp14> be authenticated to ensure its integrity and authenticity before being used for SAV decision making.</t>
      </section>
      <section anchor="vulnerability-prevention">
        <name>Vulnerability Prevention</name>
        <t>Any new intra-domain SAV mechanism <bcp14>MUST NOT</bcp14> introduce additional security vulnerabilities to existing intra-domain architectures or protocols. Protection against compromised or malicious intra-domain routers is out of scope, as such routers can compromise not only SAV mechanisms but also the entire intra-domain routing domain.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>This document discusses the limitations of existing intra-domain SAV practices and identifies problems and informational requirements for improved intra-domain SAV mechanisms. It does not specify new protocols or mechanisms and, as such, does not introduce any new security considerations.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Joel Halpern, Aijun Wang, Michael Richardson, Gert Doering, Libin Liu, Li Chen, Tony Przygienda, Yingzhen Qu, James Guichard, Linda Dunbar, Robert Sparks, Stephen Farrel, Ron Bonica, Xueyan Song, etc. We also thank the IETF Directorates and the IESG for their reviews and comments, which helped improve the clarity of this document.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7513.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="CAIDA-spoofer" target="https://spoofer.caida.org/summary.php?">
          <front>
            <title>State of IP Spoofing</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC6890" target="https://www.rfc-editor.org/info/rfc6890" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6890.xml">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
      </references>
    </references>
    <?line 317?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
