<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-idr-bgp-savnet-06" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="BGP Extensions for SAVNET">BGP Extensions for Source Address Validation Networks (BGP SAVNET)</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-idr-bgp-savnet-06"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="Z." surname="Li" fullname="Zhenbin Li">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lizhenbin@huawei.com</email>
      </address>
    </author>
    <author initials="Z." surname="Tan" fullname="Zhen Tan">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tanzhen6@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Liu" fullname="Mingxing Liu">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liumingxing7@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="March" day="24"/>
    <area>Routing</area>
    <workgroup>IDR</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 77?>

<t>Many source address validation (SAV) mechanisms have been proposed for preventing source address spoofing. However, existing SAV mechanisms are faced with the problems of inaccurate validation or high operational overhead in some scenarios. This document proposes BGP SAVNET by extending BGP protocol for SAV. This protocol can propagate SAV-related information through BGP messages. The propagated information will help edge/border routers automatically generate accurate SAV rules. These rules construct a validation boundary for the network and help check the validity of source addresses of arrival data packets.</t>
    </abstract>
  </front>
  <middle>
    <?line 81?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source address validation (SAV) is essential for preventing source address spoofing attacks (<xref target="RFC6959"/>) and helps trace back network attackers. For a network, SAV mechanisms can be deployed on edge routers or border routers for validating the packets from the connected subnets or neighboring ASes <xref target="manrs-antispoofing"/>.</t>
      <t>ACL-based ingress filtering (<xref target="RFC2827"/>, <xref target="RFC3704"/>) and Source-based RTBH ([RFC5635]) can be used for source address filtering. However, the two mechanisms are not specific for SAV. High operational overhead may be induced if they are managed mostly by manual configurations <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/><xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. Many SAV mechanisms, such as strict uRPF, loose uRPF, FP-uRPF, VRF-uRPF, and EFP-uRPF (<xref target="RFC3704"/>, <xref target="RFC8704"/>), leverage local routing information (FIB/RIB) to automatically generate SAV rules. The rules indicate the wanted incoming interfaces of source addresses and deny source addresses coming from unwanted interfaces <xref target="I-D.huang-savnet-sav-table"/>. The uRPF mechanisms can achieve good automation but may have inaccurate validation problems under asymmetric routing <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/><xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. This is because these uRPF mechanisms are "single-point" designs. They leverage the local FIB or local RIB table to determine the valid incoming interfaces for source addresses, which may not match the real incoming interfaces. That is, purely relying on local routing information for SAV is not enough for achieving both good automation and high accuracy</t>
      <t>This document proposes extensions of BGP protocol for SAV networks, named as BGP SAVNET. Unlike existing "single-point" mechanisms, BGP SAVNET allows coordination between the routers within a network or in different ASes by propagating SAV-specific information through extended BGP messages <xref target="I-D.li-savnet-intra-domain-architecture"/><xref target="I-D.wu-savnet-inter-domain-architecture"/>. SAV-specific information supplements the missing part of the local route information and assists routers to generate accurate SAV rules. The following figure shows a comparison of existing uRPF mechanisms and BGP SAVNET.</t>
      <artwork><![CDATA[
+-------------+  Normal BGP  +------------+ (Good automation
| Routing     |--------------> uRPF       | but inaccurate
| Information |\             | Mechanisms | under asymmetric
+-------------+ \            +------------+ routing)
                 \ Normal BGP
                  +-------------+
                                |
+-------------+              +--\/--------+ (Accurate SAV
| SAV-specific| Extended BGP | BGP        | rules and adaptive to
| Information |--------------> SAVNET     | various scenarios)
+-------------+              +------------+
]]></artwork>
      <t>The BGP SAVNET protocol is suitable to generating SAV rules for both IPv4 and IPv6 addresses. The SAV rules can be used for validating any native IP packets or IP-encapsulated packets.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV: Source address validation, an approach to preventing source address spoofing.</t>
        <t>SAV Rule: The rule that indicates the valid incoming interfaces for a specific source prefix.</t>
        <t>SAV Table: The table or data structure that implements the SAV rules and is used for source address validation in the data plane.</t>
        <t>Internal (or Local) Source Address: The source addresses owned by the subnets of local AS. The source addresses of the connection link between subnets and local AS can also be considered as internal source addresses.</t>
        <t>External (or Remote) Source Address: The source addresses owned by other ASes. Some source addresses like anycast addresses can be both internal and external source addresses.</t>
        <t>Local Routing Information: The information in a router's local RIB or FIB that can be used to infer SAV rules.</t>
        <t>SAV-specific Information: The information specialized for SAV rule generation, which is exchanged among routers.</t>
        <t>Edge Router: An intra-domain router for an AS that is directly connected to a subnet of the AS.</t>
        <t>Border Router: An intra-domain router for an AS that is connected to other ASes. A router in an AS can be both an edge router and a border router, if it is connected to both the AS's subnets and other ASes.</t>
        <t>Source AS: The AS whose source prefixes need to be validated at Validation AS.</t>
        <t>Validation AS: The AS that conducts SAV for the source prefixes of Source AS.</t>
        <t>SPA: Source prefix advertisement, i.e., the process for advertising the origin source addresses/prefixes of a router or an AS.</t>
        <t>SPD: Source path discovery, i.e., the process for discovering the real incoming directions of particular source addresses/prefixes.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-relat">
      <name>BGP Protocol Relationship</name>
      <t>The BGP extensions for BGP SAVNET follow a backward compatible manner without impacting existing BGP functions. New BGP SAVNET subsequent address families will be introduced under the IPv4 address family and the IPv6 address family, respectively. The BGP UPDATE message (specifically the MP_REACH_NLRI and the MP_UNREACH_NLRI attributes) and the BGP Refresh message will be extended. AFI and SAFI will be used for distinguishing the BGP SAVNET messages from other messages.</t>
      <t>A few existing path attributes such as Originator_ID and Clister_list or newly defined path attributes <bcp14>MAY</bcp14> be used for BGP SAVNET. Actually, most existing path attributes are not necessarily required for BGP SAVNET. However, if the unnecessary path attributes are carried in BGP updates, they will be accepted, validated, and propagated consistent with the BGP protocol.</t>
    </section>
    <section anchor="sec-solution">
      <name>BGP SAVNET Solution</name>
      <section anchor="goals">
        <name>Goals</name>
        <t>For an AS, the goal of BGP SAVNET is to construct a validation boundary for the AS. SAV-specific information propagated by extended BGP messages can assist edge and border routers on the network boundary to generate SAV rules. Edge routers connected to subnets generate rules for validating packets from users, while border routers connected to other ASes generate rules for validating packets from other ASes. <xref target="fig-goal"/> shows the example of validation boundary for an AS</t>
        <figure anchor="fig-goal">
          <name>An example of validation boundary for an AS</name>
          <artwork><![CDATA[
        +-----+           +-----+
        | AS3 |           | AS4 |
        +-----+           +-----+
             \             /
+-------------\-----------/-------------+
| AS2        +-#--+   +--#-+            |
|            | R7 |---| R8 |            |
|            +----+   +----+            |
|              |         |              |
|            +----+   +----+            |
|      ------| R5 |---| R6 |------      |
|      |     +----+   +----+     |      |
|      |       |         |       |      |
|   +----+   +----+   +----+   +----+   |
|   | R1 |   | R2 |---| R3 |   | R4 |   |
|   +--*-+   +-*--+   +--#-+   +-#--+   |
+-------\-----/-----------\-----/-------+
       +-------+          +-----+
       |Subnet1|          | AS1 |
       +-------+          +-----+
]]></artwork>
        </figure>
        <t>From a perspective of an AS, source addresses can be largely classified into two categories: internal (or local) source address and external (or remote) source address. The BGP SAVNET solution consists two parts: intra-domain BGP SAVNET and inter-domain BGP SAVNET. The parts of solution focus on the validation of internal and external source address, respectively.</t>
        <ul spacing="normal">
          <li>
            <t>Intra-domain BGP SAVNET: SAV for protecting internal source addresses. In <xref target="fig-goal"/>, it can be deployed at '*' or '#' to restrict a subnet to use only its own internal source addresses and to block external packets from other ASes with any internal source addresses. SAV rules are generated without any cooperation or interactions (such as prefix advertisements) between the local AS and subnets/other ASes.</t>
          </li>
          <li>
            <t>Inter-domain BGP SAVNET: SAV for protecting external source addresses. In <xref target="fig-goal"/>, it can be deployed at '#' for blocking the source addresses of packets coming from unwanted directions (i.e., coming from unwanted neighbor ASes). Cooperation or interactions between the local AS and other ASes are required.</t>
          </li>
        </ul>
      </section>
      <section anchor="intra-domain-bgp-savnet">
        <name>Intra-domain BGP SAVNET</name>
        <t><xref target="fig-intra-savnet"/> shows an example of intra-domain BGP SAVNET. Router 1 and Router 2 are edge routers that enable SAV at the interfaces connected to subnets. Router 3 is a border router that conducts SAV at the interfaces connected to other ASes.</t>
        <t>In general, there are four types of interfaces:</t>
        <ul spacing="normal">
          <li>
            <t>Single-homing interface. When a subnet has only one uplink connected to the upper-layer network, the connected interface at the edge router of upper-layer network can be defined as a "Sigle-homing interface", e.g., Intf.1 in <xref target="fig-intra-savnet"/>.</t>
          </li>
          <li>
            <t>Complete multi-homing interface. When a subnet has dual or multiple uplinks that connect to a single upper-layer network with BGP SAVNET deployed, the connected interfaces at the edge routers of upper-layer network are called "Complete multi-homing interfaces", which corresponds to Intf.2 and Intf.3 in <xref target="fig-intra-savnet"/>.</t>
          </li>
          <li>
            <t>Incomplete multi-homing interface. When a subnet has dual or multiple uplinks that are connected to multiple upper-layer networks, the interfaces at the edge routers of upper-layer network are called the "Incomplete multi-homing interfaces", which corresponds to Intf.4 in <xref target="fig-intra-savnet"/>.</t>
          </li>
          <li>
            <t>Internet interface. It's the external interfaces that are connected to the Internet on border routers. Typically, a network usually has multiple Internet interfaces for load balancing or backup, which corresponds to Intf.5 and Intf.6 in <xref target="fig-intra-savnet"/>.</t>
          </li>
        </ul>
        <figure anchor="fig-intra-savnet">
          <name>An example of intra-domain BGP SAVNET</name>
          <artwork><![CDATA[
+-----------------------------------------+
|               Other ASes                |
+-----------------------------------------+
              |      |                |
              |      |                |
+-------------|------|----------------|---+
| AS          |      |                |   |
|       Intf.5|      |Intf.6          |   |
|           +-*------*-+              |   |
|           | Router 3 |              |   |
|           +----------+              |   |
|              /     \                |   |
|             /       \               |   |
|            /         \              |   |
|   +----------+     +----------+     |   |
|   | Router 1 |     | Router 2 |     |   |
|   +--#-----#-+     +-#-----*--+     |   |
|Intf.1|Intf.2\ Intf.3/       \Intf.4 |   |
|      |       \     /         \      |   |
|      |        \   /           \     |   |
|   Subnet1    Subnet2           Subnet3  |
|                                         |
+-----------------------------------------+

Intf '#' enables prefix allowlist
Intf '*' enables prefix blocklist

]]></artwork>
        </figure>
        <t>The goal of intra-domain BGP SAVNET is to generate source prefix allowlist or blocklist for the interfaces on edge or border routers. For the "Single-homing interface" and "Complete multi-homing interface", prefix allowlist is applied (i.e., "Interface-based prefix allowlist" mode in <xref target="I-D.huang-savnet-sav-table"/>). The prefix allowlist of an interface should only include all the source prefixes of the connected subnet and denys any source addresses not covered by the prefixes in the list. In <xref target="fig-intra-savnet"/>, the prefix allowlist of Intf. 1 should only include all the source prefixes of Subnet1, and the prefix allowlists of Intf. 2 and Intf. 3 should only include all the source prefixes of Subnet2.</t>
        <t>For "Incomplete multi-homing interface" and "Internet interface", prefix blocklist is enabled (i.e., "Interface-based prefix blocklist" mode in <xref target="I-D.huang-savnet-sav-table"/>). For a specific interface, its prefix blocklist should include the internal prefixes that are owned by the subnets connected to "Single-homing interfaces" and "Complete multi-homing interfaces". In <xref target="fig-intra-savnet"/>, the prefix blocklist of Intf. 4, Intf. 5, and Intf. 6 should include all the source prefixes of Subnet1 and Subnet2. The reason why "Incomplete multi-homing interface" like Intf. 4 not using prefix allowlist is that the local AS itself can hardly learn the complete set of source prefixes of Subnet3 if the subnet advertises asymmetric prefixes to the multi-homed up-layer networks (i.e., the local AS is one of the up-layer networks).</t>
        <t>The above goal should be achieved while meeting two requirements of high accuracy (even under asymmetric routing) and good automation. To this end, Source Prefix Advertisement (SPA) process is designed in intra-domain BGP SAVNET solution. During the SPA process, edge routers will proactively announce all the source prefixes learned by local "Single-homing interfaces" and local "Complete multi-homing interfaces" from the connected subnets via SPA messages. Some related information of each announced source prefix will also be propagated together with the source prefix. The related information of each announced source prefix can be:</t>
        <ul spacing="normal">
          <li>
            <t>Multi-homing Interface Group Type (MIIG-Type): It indicates the type of the interface that learns the prefix. MIIG-Type <bcp14>MUST</bcp14> be one of the four types mentioned above.</t>
          </li>
          <li>
            <t>Multi-homing Interface Group Tag (MIIG-Tag): It is to identify the subnet of the prefix. The prefixes belonging to the same subnet <bcp14>MUST</bcp14> have the identical MIIG-Tag value. Different subnets <bcp14>MUST</bcp14> have different MIIG-tag values.</t>
          </li>
          <li>
            <t>(Only) Source Flag: It indicates whether the prefix is owned by one subnet. By default, the flag is set because most of the prefixes are owned by one network. For anycast addresses/prefixes or direct server return (DSR) addresses/prefixes <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>, the flag should be unset (possibly manually).</t>
          </li>
        </ul>
        <t>It can be seen that the SPA message of a source prefix includes four parts: source prefix, MIIG-Type, MIIG-Tag, and Source Flag. Next, how to use the SPA messages to generate SAV rules will be introduced.</t>
        <ul spacing="normal">
          <li>
            <t>In the case of "Single-homing interface", the prefix allowlist can be generated only through local routing information (i.e., local RIB), without the engagement of SPA messages. The method building the allowlist is, each Dest Prefix in RIB that records this interface as an outgoing interface will be added to the prefix allowlist.</t>
          </li>
          <li>
            <t>In the case of "Complete multi-homing interface", in addition to collecting prefixes of the target interface itself in local RIB, routers also need merge prefixes from the received SPA messages and other local interfaces into the allowlist to construct a complete list. First, the prefixes in received SPA, which take the same "MIIG-Type" and "MIIG-Tag" values as the target interface, are added to the allowlist. Second, if there are local interfaces having the same "MIIG-Type" and "MIIG-Tag" values, they will share prefixes collected from local RIB into each other's allowlist.</t>
          </li>
          <li>
            <t>Routers with "Incomplete multi-homing interface" or "Internet interface" will generate prefix blocklist for the target interface. First, the prefixes of local "Single-homing interfaces" or "Complete Multi-homing interfaces" on the local router will be put into the blocklist. Second, the prefixes in the received SPA messages which have the MIIG-Types of either "Single-homing interface" or "Complete Multi-homing interface" but with Source Flag being set, will also be added into the blocklist. The prefix with Source Flag being unset will not be included into the blocklist because the prefix is multi-source and the "Incomplete multi-homing interface" or "Internet interface" may be the legitimate incoming interface of the multi-source prefix.</t>
          </li>
        </ul>
        <t>Note that, intra-domain BGP SAVNET solution can also work if the subnet is a stub AS (e.g., the subnets are replaced with stub ASes in <xref target="fig-intra-savnet"/>). The source prefixes of the stub AS can be considered as the internal prefixes of the local AS when conducting the solution.</t>
      </section>
      <section anchor="inter-domain-bgp-savnet">
        <name>Inter-domain BGP SAVNET</name>
        <t>As described previously, inter-domain BGP SAVNET is for protecting external source addresses that are owned by other ASes (usually remote ASes). Cooperation or interactions between the local AS and other ASes are required.</t>
        <t>The local AS that deploys inter-domain BGP SAVNET and conducts validation on the external source addresses is defined as Validation AS. Source AS is defined as the AS whose source prefixes need to be validated at Validation AS. For any AS, it can be configured as Source AS or Validation AS, or it can also act as both Source AS and Validation AS.</t>
        <t>The goal of inter-domain BGP SAVNET is to help Validation AS generate prefix blocklist for the source prefixes of Source AS at the proper external interfaces of Validation AS. Which source prefixes that need to be validated and which external interfaces should block these prefixes depend on the indication of Source AS. Inter-domain BGP SAVNET provides the communication channel for Source AS and Validation AS.</t>
        <t><xref target="fig-inter-savnet"/> shows an example of inter-domain BGP SAVNET. AS 1 and AS 4 have deployed SAVNET on the border routers (i.e., ASBRs) connected to other ASes. 
Suppose AS 1 is configured as Source AS and AS 4 acts as Validation AS. In the example, AS 4 can help block P1 of AS 1 at the interfaces connected to specific neighbor ASes.</t>
        <figure anchor="fig-inter-savnet">
          <name>An example of inter-domain BGP SAVNET</name>
          <artwork><![CDATA[
       +----------------+    +----------------+
       |   AS 5 (P5)    |    |   AS 6 (P6)    |
       +-----------+/\+-+    +-+/\+-------+/\++
                     \          /          |
                      \        /           |
                       \      /            |
                        \    /             |
                   +----------------+      |
                   |   AS 4 (P4)    |      |
                   | SAVNET deployed|      |
                   ++/\+---+----+/\++      |
                     /     ^      \        |
                    /      ^       \       |
                   /       ^        \      |
                  /        ^         \     |
  +----------------+       ^       +----------------+
  |   AS 2 (P2)    |       ^       |   AS 3 (P3)    |
  +----------+/\+--+       ^       +--+/\+----------+
               \           ^           /
                \          ^          /
                 \         ^         /
                  \        ^        /
                  +--------+-------+
                  |    AS 1 (P1)   |
                  | SAVNET deployed|
                  +----------------+
RIB in AS 1:
To P2, preferred AS_PATH = [AS 2]
To P3, preferred AS_PATH = [AS 3]
To P4, preferred AS_PATH = [AS 2, AS 4]
To P5, preferred AS_PATH = [AS 3, AS 4, AS 5]
To P6, preferred AS_PATH = [AS 3, AS 4, AS 6]
]]></artwork>
        </figure>
        <t>When Source AS and Validation AS enable BGP SAVNET, a BGP SAVNET session between the two ASes will be established. <xref target="fig-inter-savnet"/> shows the session between AS 1 and AS 4 by "&gt;&gt;&gt;&gt;&gt;". 
The solution of inter-domain BGP SAVNET consists of two processes: SPA and Source Path Discovery (SPD).</t>
        <ul spacing="normal">
          <li>
            <t>SPA process: Source AS advertises its own AS number and its own source prefixes to Validation AS through SPA messages. SPA messages contain the complete set of source prefixes of Source AS or only the source prefixes that want to be protected. Some hidden source prefixes that do not appear can also be advertised to Validation AS through SPA messages. The advertised source prefixes <bcp14>MUST</bcp14> be authorized to Source AS by RPKI ROAs. When Validation AS receives the messages, it <bcp14>MUST</bcp14> conduct ROV on the messages and only stores the target source prefixes with the "valid" ROV state. The "Unknown" and "Invalid" target source prefixes will be ignored. In <xref target="fig-inter-savnet"/>, P1 <bcp14>MUST</bcp14> be authorized to AS 1, and then AS 1 advertises its own AS number and P1 to AS 4 through an SPA message.
            </t>
            <ul spacing="normal">
              <li>
                <t>Validation AS can also obtain the target source prefixes directly from RPKI ROAs or other RPKI data.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>SPD process: After SPA process, Source AS can send SPD messages to Validation AS for notifying the wanted incoming directions of target source prefixes. 
That is, Source AS can specify from which neighbor ASes of Validation AS the target source prefixes will arrive. Validation AS will learn the specified incoming directions of target source prefixes and will use prefix blocklist for denying the target source prefixes coming from unwanted directions (neighbor ASes). The wanted incoming directions of target source prefixes can be obtained via the following methods for different purposes:  </t>
            <ul spacing="normal">
              <li>
                <t>Automatically obtained from the RIB of Source AS. In <xref target="fig-inter-savnet"/>, AS 1 can specify that AS 2 and AS 3 are the wanted incoming directions of P1. AS 4 will block the packets with source addresses of P1 coming from neighbor ASes of AS 5 and AS 6. The use cases can be 1) proactive SAV for customer's prefixes or 2) key source address's forwarding path protection (i.e., keeping control plane path and data plane path consistent).</t>
              </li>
              <li>
                <t>Obtained from security center of Source AS or Validation AS. Security center can detect source address-spoofed DDoS attacks and disseminates rules through BGP SAVNET to reactively filter source address at specific interfaces for mitigating DDoS suffered by customers.</t>
              </li>
              <li>
                <t>Obtained from RPKI ASPA records or other RPKI data.</t>
              </li>
            </ul>
          </li>
        </ul>
        <!-- Note that, the backup paths should be considered by Source AS when it advertises SPD messages. Otherwise, the backup paths may break due to the SAV rules on Validation AS.  -->

</section>
    </section>
    <section anchor="sec-peering">
      <name>BGP SAVNET Peering Models</name>
      <section anchor="full-mesh-ibgp-peering">
        <name>Full-mesh IBGP Peering</name>
        <t>This peering model is for both intra- and inter-domain BGP SAVNET. In this model, Edge or border routers enabling BGP SAVNET <bcp14>MUST</bcp14> establish full-mesh iBGP sessions either through direct iBGP sessions or route-reflectors. SAVNET messages within an AS can be advertised through the full-mesh BGP SAVNET sessions. The extensions of BGP messages for carrying SAVNET messages will be introduced in <xref target="sec-extension"/>.</t>
      </section>
      <section anchor="ebgp-peering-between-ases">
        <name>EBGP Peering between ASes</name>
        <t>Inter-domain BGP SAVNET requires eBGP sessions which can be single-hop or multi-hop. In this peering model, for the AS enabling BGP SAVNET, at least one border router in Source AS <bcp14>MUST</bcp14> establish the BGP SAVNET sessions with the border routers in Validation AS. SAVNET messages between ASes will be advertised through these sessions. The extensions of BGP messages for carrying SAVNET messages will be introduced in <xref target="sec-extension"/>.</t>
      </section>
    </section>
    <section anchor="sec-extension">
      <name>BGP SAVNET Protocol Extension</name>
      <section anchor="bgp-savnet-safi">
        <name>BGP SAVNET SAFI</name>
        <t>To make good isolation with existing BGP services, this section defines BGP SAVNET SAFIs under the IPv4 address family and the IPv6 address family, respectively.  The values require IANA registration as specified in <xref target="sec-iana"/>. Two BGP SAVNET speakers <bcp14>MUST</bcp14> establish a BGP SAVNET peer and <bcp14>MUST</bcp14> exchange the Multiprotocol Extensions Capability <xref target="RFC5492"/> to ensure that they are both capable of processing BGP SAVNET messages properly.</t>
      </section>
      <section anchor="bgp-savnet-nlri">
        <name>BGP SAVNET NLRI</name>
        <t>The BGP SAVNET NLRI is used to transmit SPA messages (either IPv4 or IPv6). The BGP SAVNET NLRI TLVs are carried in BGP UPDATE messages as (1) route advertisement carried within Multiprotocol Reachable NLRI (MP_REACH_NLRI) <xref target="RFC4760"/>, and (2) route withdraw carried within Multiprotocol Unreachable NLRI (MP_UNREACH_NLRI).</t>
        <t>While encoding an MP_REACH_NLRI attribute containing BGP SAVNET NLRI TLVs, the "Length of Next Hop Network Address" field <bcp14>SHOULD</bcp14> be set to 0 upon the sender. The "Network Address of Next Hop" field <bcp14>SHOULD</bcp14> not be encoded upon the sender, because it has a 0 length and <bcp14>MUST</bcp14> be ignored upon the receiver.</t>
        <section anchor="spa-tlvs-for-intra-domain-bgp-savnet">
          <name>SPA TLVs for Intra-domain BGP SAVNET</name>
          <t>The BGP SAVNET NLRI TLV each carries a SPA message including a source prefix and related information. Therefore, the NLRI TLV is called SPA TLV. This type of TLVs are used in SPA process within an AS. The format is shown below:</t>
          <figure>
            <name>SPA TLV format</name>
            <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RouteType (1) |   Length (1)  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Origin router-id (4)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  MaskLen (1)  |        IP Prefix (variable)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MIIG-Type (1) | Flags (1)   |S|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                         MIIG-Tag (4)                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          </figure>
          <t>The meaning of these fields are as follows:</t>
          <ul spacing="normal">
            <li>
              <t>RouteType (key): Type of the BGP SAVNET NLRI TLV, the value is 1 for SPA TLV within an AS.</t>
            </li>
            <li>
              <t>Length: The length of the BGP SAVNET NLRI value, the RouteType and Length fields are excluded.</t>
            </li>
            <li>
              <t>Origin router-id (key): The router ID of the originating node of the source prefix in the deployment domain.</t>
            </li>
            <li>
              <t>MaskLen (key): The mask length in bits, which also indicates the valid bits of the IP Prefix field.</t>
            </li>
            <li>
              <t>IP Prefix (key): IP address. The length ranges from 1 to 4 bytes for IPv4 and ranges from 1 to 16 bytes for IPv6. Format is consistent with BGP IPv4/IPv6 unicast address.</t>
            </li>
            <li>
              <t>MIIG-Type (non-key): Multi-homing Ingress Interface Group Type.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Type value 0: Unknown. Indicates that this prefix does not come from any subnets. It can be a local prefix or a local domain prefix.</t>
                </li>
                <li>
                  <t>Type value 1: Single-homing interface. Indicates that this prefix comes from a subnet that is single-homed to the local domain.</t>
                </li>
                <li>
                  <t>Type value 2: Complete multi-homing interface. Indicates that this prefix comes from a subnet that is multi-homed to the local domain, and is connected only to the local domain.</t>
                </li>
                <li>
                  <t>Type value 3: Incomplete multi-homing interface. Indicates that this prefix comes from a subnet that is multi-homed to the local domain and other domains.</t>
                </li>
                <li>
                  <t>Type value 4: Internet interface. Indicates that this prefix comes from a interface that is connected to the Internet.</t>
                </li>
                <li>
                  <t>Type value 5~255: Reserved for future use.</t>
                </li>
                <li>
                  <t>Notes: The type values of 3 and 4 are pre-defined for future use, and they should not appear in SPA TLVs (i.e., no need to advertise the prefixes from the interfaces of Type 3 and Type 4).</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Flags (non-key): Bitmap, indicating the attribute flag of the SPA prefix, currently taken:
              </t>
              <ul spacing="normal">
                <li>
                  <t>bit 0 (S bit) : Source Flag. The value of 1 indicates that the SPA prefix is owned by one subnet. The value of 0 indicates that the SPA prefix is not owned by only one subnet.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>MIIG-Tag (non-key): Multi-homing Ingress Interface Group Tag. The value ranges from 1 to 0xFFFFFFFE. The value 0 is invalid and the value 0xFFFFFFFF is reserved.</t>
            </li>
          </ul>
        </section>
        <section anchor="spa-tlvs-for-inter-domain-bgp-savnet">
          <name>SPA TLVs for Inter-domain BGP SAVNET</name>
          <t>This type of TLVs are used in SPA process between ASes.</t>
          <figure>
            <name>SPA TLV format</name>
            <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RouteType (1) |   Length (1)  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Source AS Number (4)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  MaskLen (1)  |        IP Prefix (variable)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Flags (1)    |
+-+-+-+-+-+-+-+-+
]]></artwork>
          </figure>
          <t>The meaning of these fields are as follows:</t>
          <ul spacing="normal">
            <li>
              <t>RouteType (key): Type of the BGP SAVNET NLRI TLV, the value is 2 for SPA TLV between ASes.</t>
            </li>
            <li>
              <t>Length: The length of the BGP SAVNET NLRI value, the RouteType and Length fields are excluded.</t>
            </li>
            <li>
              <t>Source AS Number (key): The AS number of the originating AS of this advertised source prefix.</t>
            </li>
            <li>
              <t>MaskLen (key): The mask length in bits, which also indicates the valid bits of the IP Prefix field.</t>
            </li>
            <li>
              <t>IP Prefix (key): IP address. The length ranges from 1 to 4 bytes for IPv4 and ranges from 1 to 16 bytes for IPv6. Format is consistent with BGP IPv4/IPv6 unicast address.</t>
            </li>
            <li>
              <t>Flags (non-key): Reserved for future use.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="bgp-savnet-refresh">
        <name>BGP SAVNET Refresh</name>
        <t>Two BGP SAVNET speakers <bcp14>MUST</bcp14> exchange Route Refresh Capability <xref target="RFC2918"/> to ensure that they are both capable of processing the SPD message carried in the BGP Refresh message.</t>
        <t>The SPD TLV is carried in a BGP Refresh message after the BGP Refresh message body, as follows:</t>
        <figure>
          <name>BGP-REFRESH with SPD TLV format</name>
          <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              AFI (2)          |  Subtype (1)  |     SAFI (1)  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                       SPD TLV (variable)                      |
~                                                               ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The AFI field is either 1 (IPv4) or 2 (IPv6). The SAFI field is the newly defined SAVNET SAFI. The Subtype field should be a new value assigned to SAVNET <xref target="RFC7313"/>. 
By carrying an SPD TLV, a BGP SAVNET Refresh message <bcp14>MUST NOT</bcp14> be processed as a Route-Refresh (as a re-advertisement request) and <bcp14>SHOULD</bcp14> only be used in the SPD process. A BGP SAVNET Refresh message without an SPD TLV <bcp14>SHOULD</bcp14> be processed as a Route-Refresh as defined in Route Refresh Capability <xref target="RFC2918"/>.</t>
        <section anchor="the-spd-tlvs-for-inter-domain-bgp-savnet">
          <name>The SPD TLVs for Inter-domain BGP SAVNET</name>
          <t>This type of TLVs are used in SPD process between ASes.</t>
          <figure>
            <name>SPD TLV format</name>
            <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Type (1)   |   SubType (1)  |            Length (2)         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Sequence Number (4)                    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Origin router-id (4)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Source AS Number (4)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      Validation AS Number (4)                 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Optional Data Length (2)  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Optional Data (variable)               |
~                                                               ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                     Neighbor AS Number List (variable)        |
~                                                               ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          </figure>
          <t>The meaning of these fields are as follows:</t>
          <ul spacing="normal">
            <li>
              <t>Type: TLV Type, the value is 2 for SPD TLV.</t>
            </li>
            <li>
              <t>SubType: TLV Sub-Type, value is 2 for SPD TLV between an AS.</t>
            </li>
            <li>
              <t>Length: The length of the SPD TLV value, the Type, SubType and Length fields are excluded.</t>
            </li>
            <li>
              <t>Sequence Number: Indicates the sequence of Source Path Discovery process. The initial value is 0 and the value increases monotonically.</t>
            </li>
            <li>
              <t>Origin router-id: The router ID of the originating node of the Source Path Discovery process.</t>
            </li>
            <li>
              <t>Source AS Number (key): The AS number of the source AS whose source prefixes need to be validated in the validation AS.</t>
            </li>
            <li>
              <t>Validation AS Number (key): The AS number of the validation AS who conducts validation for the source prefixes of source AS.</t>
            </li>
            <li>
              <t>Optional Data Length: The length of the optional data field in bytes. The value can be 0 when there is no optional data.</t>
            </li>
            <li>
              <t>Optional Data: Reserved for future use.</t>
            </li>
            <li>
              <t>Neighbor AS Number List: List of neighbor AS, from which the validation AS will receive the data packets with the source prefixes of the source AS.</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="sec-dp">
      <name>Decision Process with BGP SAVNET</name>
      <t>The Decision Process described in <xref target="RFC4271"/> works to determines a degree of preference among routes with the same prefix. The Decision Process involves many BGP Path attributes, which are not necessary for BGP SAVNET SPA and SPD process, such as next-hop attributes and IGP-metric attributes. Therefore, this document introduces a simplified Decision Process for SAVNET SAFI.</t>
      <t>The purpose of SPA is to maintain a uniform Source Prefix list, which is the mapping from original router-id to IP addresses, across all routers in the deploy domain. To ensure this, it is <bcp14>RECOMMENDED</bcp14> that all routers deploy no ingress or egress route-policies for BGP SAVNET.</t>
      <section anchor="bgp-savnet-nlri-selection">
        <name>BGP SAVNET NLRI Selection</name>
        <t>The Decision Process described in <xref target="RFC4271"/> no longer apply, and the Decision Process for BGP SAVNET NLRI are as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>The locally imported route is preferred over the route received from a peer.</t>
          </li>
          <li>
            <t>The route received from a peer with the numerically larger originator is preferred.</t>
          </li>
          <li>
            <t>The route received from a peer with the numerically larger Peer IP Address is preferred.</t>
          </li>
        </ol>
        <section anchor="self-originated-nlri">
          <name>Self-Originated NLRI</name>
          <t>BGP SAVNET NLRI with origin router-id matching the local router-id is considered self-originated. All locally imported routes should be considered self-originated by default.</t>
          <t>Since the origin router-id is part of the NLRI key, it is very unlikely that a self-originated NLRI would be received from a peer. Unless a router-id conflict occurs due to incorrect configuration. In this case, the self-originated NLRI <bcp14>MUST</bcp14> be discarded upon the receiver, and appropriate error logging is <bcp14>RECOMMENDED</bcp14>.</t>
          <t>On the other hand, besides the route learn from peers, a BGP SAVNET speaker <bcp14>MUST NOT</bcp14> advertise NLRI which is not self-originated.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-error">
      <name>Error Handling</name>
      <section anchor="process-of-bgp-savnet-nlris">
        <name>Process of BGP SAVNET NLRIs</name>
        <t>When a BGP SAVNET speaker receives a BGP Update containing a malformed MP_REACH_NLRI or MP_UNREACH_NLRI, it <bcp14>MUST</bcp14> ignore the received TLV and <bcp14>MUST NOT</bcp14> pass it to other BGP peers. When discarding a malformed TLV, a BGP SAVNET speaker <bcp14>MAY</bcp14> log a specific error.</t>
        <t>If duplicate NLRIs exist in a MP_REACH_NLRI or MP_UNREACH_NLRI attribute, only the last one <bcp14>SHOULD</bcp14> be used.</t>
      </section>
      <section anchor="process-of-bgp-savnet-spa-tlvs">
        <name>Process of BGP SAVNET SPA TLVs</name>
        <t>When a BGP SAVNET speaker receives an SPA TLV with an undefined type, it <bcp14>SHOULD</bcp14> be ignored or stored without parsing.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with a 0 origin router-id, or the origin router-id is the same as the local router-id, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with an invalid MaskLen field, which is out of the range 1~32 for IPv4 and 1~128 for IPv6, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with an address field, whose length in bytes do not match with the remaining data, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with an unsupported MIIG-Type, it <bcp14>SHOULD</bcp14> be ignored or stored without parsing.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with a MIIG-Type 0 (Unkonwn), its MIIG-Tag <bcp14>MUST</bcp14> also be 0, vice versa. Otherwise this SPA TLV <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives a malformed SPA TLV, it <bcp14>MUST</bcp14> ignore the received TLV and <bcp14>MUST NOT</bcp14> pass it to other BGP peers. When discarding a malformed TLV, a BGP SAVNET speaker <bcp14>MAY</bcp14> log a specific error.</t>
        <t>When a BGP SAVNET speaker processes Flags in an SPA TLV, the defined bits <bcp14>MUST</bcp14> be processed and the undefined bits <bcp14>MUST</bcp14> be ignored.</t>
      </section>
      <section anchor="process-of-bgp-savnet-refresh">
        <name>Process of BGP SAVNET Refresh</name>
        <t>Each BGP Refresh message <bcp14>MUST</bcp14> contain at most one SPD TLV. When a BGP SAVNET speaker receives a BGP Refresh packet with multiple SPD TLVs, only the first one <bcp14>SHOULD</bcp14> be processed.</t>
      </section>
      <section anchor="process-of-bgp-savnet-spd-tlvs">
        <name>Process of BGP SAVNET SPD TLVs</name>
        <t>When a BGP SAVNET speaker receives an SPD TLV with an undefined type or subtype, it <bcp14>SHOULD</bcp14> be ignored.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with a 0 origin router-id, or the origin router-id is the same as the local router-id, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with a validation AS number, 0 source AS number, AS_TRANS number (23456), or the source AS number equals the validation AS number, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with an optional data sub-TLV that is an undefined type, it <bcp14>SHOULD</bcp14> be ignored.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with a DestList field that is not a multiple of 4 in length, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives a Refresh message with a malformed SPD TLV, it <bcp14>MUST</bcp14> ignore the received message. When discarding a malformed message, a BGP SAVNET speaker <bcp14>MAY</bcp14> log a specific error.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with a sequence number that does not match the local recorded sequence number:</t>
        <ul spacing="normal">
          <li>
            <t>If the newly received sequence number is numerically larger, the local recorded sequence number <bcp14>SHOULD</bcp14> be updated to the newly received sequence number.</t>
          </li>
          <li>
            <t>If the newly received sequence number is numerically smaller, the local recorded sequence number <bcp14>SHOULD NOT</bcp14> be updated, and the BGP SAVNET speaker <bcp14>SHOULD</bcp14> log a specific error.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-converge">
      <name>Convergence Considerations</name>
      <t>The convergence process of BGP SAVNET is relatively simple. First, the convergence process is mainly the message propagation process. BGP SAVNET messages should have similar propagation speed to normal routes. Second, BGP SAVNET supports independent and incremental update. Routers enable SAVNET can update local SAV rules immediately and there is no need to wait for complete information updates.</t>
    </section>
    <section anchor="sec-deploy">
      <name>Deployment Considerations</name>
      <t>Both intra- and inter-domain BGP SAVNET have good deployability. For intra-domain BGP SAVNET, upgrading part of routers can also work well. For example, only upgrade the routers (two or more) multi-homed by the same subnet, or upgrade one edge router and one border router. With more routers getting deployed, the network can get more protection. For inter-domain BGP SAVNET, any pair of ASes can upgrade and work well. There is no dependence on other ASes.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>Security problems are mainly in inter-domain scenarios.</t>
      <ul spacing="normal">
        <li>
          <t>For communication security, inter-domain BGP SAVNET takes a point-to-point communication model and thus has a simple trust model. The communication between source AS and validation AS can be protected by TLS.</t>
        </li>
        <li>
          <t>For content security, the advertised source prefixes of Source AS <bcp14>MUST</bcp14> be authorized to Source AS by RPKI ROAs. When Validation AS receives the messages, it <bcp14>MUST</bcp14> conduct ROV on the messages.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>The BGP SAVNET SAFIs under the IPv4 address family and the IPv6 address family need to be allocated by IANA.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the contributions from Fang Gao. Also thanks for the comments from Jeff Haas, Antoin Verschuren, Zhibin Dai, Keyur Patel, Shunwan Zhuang, David Lamparter, etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2918" target="https://www.rfc-editor.org/info/rfc2918" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2918.xml">
          <front>
            <title>Route Refresh Capability for BGP-4</title>
            <author fullname="E. Chen" initials="E." surname="Chen"/>
            <date month="September" year="2000"/>
            <abstract>
              <t>This document defines a new Border Gateway Protocol (BGP) capability termed 'Route Refresh Capability', which would allow the dynamic exchange of route refresh request between BGP speakers and subsequent re-advertisement of the respective Adj-RIB-Out. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2918"/>
          <seriesInfo name="DOI" value="10.17487/RFC2918"/>
        </reference>
        <reference anchor="RFC4760" target="https://www.rfc-editor.org/info/rfc4760" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4760.xml">
          <front>
            <title>Multiprotocol Extensions for BGP-4</title>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="D. Katz" initials="D." surname="Katz"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document defines extensions to BGP-4 to enable it to carry routing information for multiple Network Layer protocols (e.g., IPv6, IPX, L3VPN, etc.). The extensions are backward compatible - a router that supports the extensions can interoperate with a router that doesn't support the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4760"/>
          <seriesInfo name="DOI" value="10.17487/RFC4760"/>
        </reference>
        <reference anchor="RFC5492" target="https://www.rfc-editor.org/info/rfc5492" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5492.xml">
          <front>
            <title>Capabilities Advertisement with BGP-4</title>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <date month="February" year="2009"/>
            <abstract>
              <t>This document defines an Optional Parameter, called Capabilities, that is expected to facilitate the introduction of new capabilities in the Border Gateway Protocol (BGP) by providing graceful capability advertisement without requiring that BGP peering be terminated.</t>
              <t>This document obsoletes RFC 3392. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5492"/>
          <seriesInfo name="DOI" value="10.17487/RFC5492"/>
        </reference>
        <reference anchor="I-D.li-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-li-savnet-intra-domain-architecture-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Fang Gao" initials="F." surname="Gao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL rules that require manual efforts to accommodate to network dynamics, SAVNET routers learn the SAV rules automatically in a distributed way.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-architecture-07"/>
        </reference>
        <reference anchor="I-D.wu-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-wu-savnet-inter-domain-architecture-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.wu-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="3" month="November" year="2024"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV- specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-architecture-12"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4271" target="https://www.rfc-editor.org/info/rfc4271" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4271.xml">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC6959" target="https://www.rfc-editor.org/info/rfc6959" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6959.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Threat Scope</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="J. Halpern" initials="J." surname="Halpern"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>The Source Address Validation Improvement (SAVI) effort aims to complement ingress filtering with finer-grained, standardized IP source address validation. This document describes threats enabled by IP source address spoofing both in the global and finer-grained context, describes currently available solutions and challenges, and provides a starting point analysis for finer-grained (host granularity) anti-spoofing work.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6959"/>
          <seriesInfo name="DOI" value="10.17487/RFC6959"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC7313" target="https://www.rfc-editor.org/info/rfc7313" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7313.xml">
          <front>
            <title>Enhanced Route Refresh Capability for BGP-4</title>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="E. Chen" initials="E." surname="Chen"/>
            <author fullname="B. Venkatachalapathy" initials="B." surname="Venkatachalapathy"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>In this document, we enhance the existing BGP route refresh mechanisms to provide for the demarcation of the beginning and the ending of a route refresh. The enhancement can be used to facilitate correction of BGP Routing Information Base (RIB) inconsistencies in a non-disruptive manner. This document updates RFC 2918.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7313"/>
          <seriesInfo name="DOI" value="10.17487/RFC7313"/>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-problem-statement-22" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="19" month="March" year="2026"/>
            <abstract>
              <t>This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the basic requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-22"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-problem-statement-15" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-problem-statement.xml">
          <front>
            <title>Gap Analysis, Problem Statement, and Requirements for Inter-Domain SAV</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="18" month="March" year="2026"/>
            <abstract>
              <t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-15"/>
        </reference>
        <reference anchor="I-D.huang-savnet-sav-table" target="https://datatracker.ietf.org/doc/html/draft-huang-savnet-sav-table-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.huang-savnet-sav-table.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Mingxing Liu" initials="" surname="Liu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <date day="10" month="December" year="2024"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-08"/>
        </reference>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 570?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
