<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-qin-savnet-bicone-sav-00" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Bicone SAV">Bicone Source Address Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-qin-savnet-bicone-sav-00"/>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="December" day="29"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 68?>

<t>Source address validation (SAV) aims to avoid improper blocking of legitimate traffic while maintaining directionality. Existing SAV mechanisms commonly rely on ingress allowlist filters on interfaces facing customer or lateral peer Autonomous Systems (ASes), which can result in improper blocking when the allowlist is incomplete. This document analyzes this issue and describes an alternative ingress SAV approach based on a blocklist of prefixes exclusively associated with the provider cone. Network operators may select either approach based on their operational context.</t>
    </abstract>
  </front>
  <middle>
    <?line 73?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source address spoofing remains one of the most serious security threats to today’s Internet. It is a primary attack vector for large-scale Distributed Denial-of-Service (DDoS) attacks and is widely used in reflective DDoS scenarios. To mitigate source address spoofing, a number of Source Address Validation (SAV) solutions have been proposed, including BCP38 <xref target="RFC2827"/> and BCP84 <xref target="RFC3704"/> <xref target="RFC8704"/>. A fundamental design objective of SAV mechanisms is to minimize improper blocking, that is, blocking legitimate traffic, while preserving directionality, as discussed in <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/> and <xref target="RFC8704"/>.</t>
      <t>Existing advanced SAV mechanisms, such as EFP-uRPF <xref target="RFC8704"/> and BAR-SAV <xref target="I-D.ietf-sidrops-bar-sav"/>, typically construct ingress SAV allowlist filters on interfaces facing customer or lateral peer Autonomous Systems (ASes). These allowlists are generated using information related to the customer cone of the validating AS. Under an allowlist-based approach, an interface permits incoming data packets only if their source addresses are covered by the allowlist. Consequently, the allowlist is required to include all prefixes belonging to the corresponding customer cone. If the allowlist is incomplete, legitimate traffic from the customer cone may be improperly blocked.</t>
      <t>To address this limitation, this document explores an alternative SAV approach based on constructing ingress SAV blocklist filters. The proposed blocklist contains prefixes that exclusively belong to the provider cone, referred to as provider-cone-use-only prefixes. Unlike an allowlist, the blocklist is not required to be complete. Instead, it aims to include as many prefixes that can be confidently identified as belonging exclusively to the provider cone as possible. When a blocklist-based SAV mechanism is applied, incoming data packets with source addresses covered by the blocklist are blocked.</t>
      <t>In practice, network operators may choose between blocklist-based and allowlist-based SAV mechanisms based on their operational requirements, deployment constraints, and risk considerations.</t>
      <t>Readers are encouraged to be familiar with <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>, <xref target="RFC8704"/>, <xref target="I-D.ietf-sidrops-aspa-profile"/>, <xref target="RFC6482"/>, <xref target="I-D.ietf-sidrops-aspa-verification"/>, and <xref target="I-D.qin-savnet-toa"/>.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV filters.</t>
      <t>Improper Permit: The validation results that the packets with illegitimate source addresses are permitted improperly due to inaccurate SAV filters.</t>
      <t>Provider Cone: The set of ASes an AS can reach by using only Customer-to-Provider (C2P) links.</t>
      <t>Customer Cone: The set of ASes an AS can reach by using only Provider-to-Customer (P2C) links.</t>
    </section>
    <section anchor="sec-review">
      <name>Improper Block When the Allowlist is Incomplete</name>
      <t>The fundamental idea of existing allowlist-based SAV solutions is to generate an ingress allowlist using information related to the customer cone of a customer or lateral peer AS. Specifically, these mechanisms identify prefixes belonging to the corresponding customer cone and permit only data packets with source addresses drawn from these prefixes on the interface facing that customer or lateral peer AS. This is based on the assumption that data packets received from a customer or lateral peer AS are expected to use source addresses belonging to the customer cone of that AS, unless a route leak occurs <xref target="RFC7908"/>.</t>
      <t>Limited propagation of prefixes or the presence of hidden prefixes can result in an incomplete allowlist, which may in turn lead to improper blocking (see <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>).</t>
      <figure anchor="fig-example">
        <name>An example of limited propagation of prefixes in the customer cone</name>
        <artwork><![CDATA[
                        P1[AS5 AS3 AS1]
                        P2[AS5 AS3 AS1]
               +---------+ (P2P/P2C) +---------+
               |   AS4   +<----------+   AS5   |
               +---------+           +---------+
                    /\                 /\
      P1 and P2 not /                  / P1[AS3 AS1]
       propagated  /                  /  P2[AS3 AS1]
            (C2P) /                  /   (C2P)
           +---------+       +---------+
           |   AS2   |       |   AS3   |
           +---------+       +---------+
                 /\           /\
P1[AS1] NO_EXPORT \           / P1[AS1]
P2[AS1] NO_EXPORT  \         /  P2[AS1]
            (C2P)   \       /   (C2P)
                   +---------+
                   |   AS1   |
                   +---------+
                      P1, P2 (prefixes originated)
]]></artwork>
      </figure>
      <t><xref target="fig-example"/> illustrates a case of limited prefix propagation within the customer cone of AS4. In the figure, arrows indicate both the propagation direction of BGP announcements and the AS relationships, namely Provider-to-Customer (P2C), Customer-to-Provider (C2P), and Peer-to-Peer (P2P), from the sending AS to the receiving AS. AS1 announces routes for prefixes P1 and P2 to its two provider ASes, AS2 and AS3. However, AS1 attaches NO_EXPORT to the BGP UPDATE message sent to AS2, preventing AS2 from propagating the routes further to AS4. As a result, AS4 receives routes to prefixes P1 and P2 only from its lateral peer or provider AS5. If AS4 applies EFP-uRPF, including Algorithm A or Algorithm B, to generate an allowlist on the AS4–AS2 interface, the allowlist will not include prefixes P1 and P2. Consequently, data packets with source addresses in prefixes P1 or P2 will be improperly blocked.</t>
      <figure anchor="fig-example3">
        <name>An example of hidden prefixes in the customer cone</name>
        <artwork><![CDATA[
    P3 (anycast prefix)                        
        +---------+                            
        |   AS6   |-Anycast Server             
        +---------+                            
             |                                 
     P3[AS6] |                                 
     (P2C)   |                                 
            \/                                 
        +---------+ (P2P/P2C) +---------+      
        |   AS4   +<----------+   AS5   |      
        +---------+           +---------+      
             /\                 /\             
             /                  /              
      (C2P) /                  / (C2P)         
           /                  /                
    +---------+       +---------+              
    |   AS2   |       |   AS3   |              
    +---------+       +---------+              
          /\           /\                      
           \           /                       
      (C2P) \         / (C2P)                  
             \       /                         
            +---------+                        
            |   AS1   |-Edge Server            
            +---------+                        
(AS1 never announces the route to P3)
]]></artwork>
      </figure>
      <t><xref target="fig-example3"/> shows an example of hidden prefixes in Content Delivery Network (CDN) and Direct Server Return (DSR) scenarios. AS6, where the anycast server is located, announces a route to the anycast prefix P3. Although AS1, where the edge server is located, is not authorized to originate routes for prefix P3, it legitimately sends data packets using source addresses in prefix P3 as a result of DSR. If AS4 applies an allowlist on the AS4–AS2 interface, the allowlist will not include prefix P3. Therefore, the allowlist filter on the AS4–AS2 interface will improperly block data packets with source addresses in prefix P3.</t>
      <t>More recent SAV mechanisms, such as BAR-SAV <xref target="I-D.ietf-sidrops-bar-sav"/>, additionally leverage Autonomous System Provider Authorization (ASPA) <xref target="I-D.ietf-sidrops-aspa-profile"/> and Route Origin Authorization (ROA) <xref target="RFC6482"/> related to the customer cone to construct a more robust allowlist. Traffic Origin Authorization (TOA) <xref target="I-D.qin-savnet-toa"/> can further improve allowlist completeness in hidden-prefix scenarios. However, such authoritative information may be missing due to partial deployment, operational constraints, or incremental adoption. When some ASes or prefixes lack ASPAs, ROAs, or TOAs, the resulting allowlist may still be incomplete.</t>
      <t>In summary, due to the inherent complexity of inter-domain routing, SAV mechanisms that rely on allowlist filters on interfaces facing customer or lateral peer ASes may fail to identify all prefixes belonging to the corresponding customer cone. In such cases, an incomplete allowlist can lead to improper blocking of legitimate traffic.</t>
    </section>
    <section anchor="sec-approach">
      <name>Allowlist-based and Blocklist-based SAV Approaches</name>
      <t>As discussed in <xref target="sec-review"/>, allowlist-based SAV mechanisms may improperly block legitimate traffic when authoritative information is missing or incomplete. More generally, ingress SAV mechanisms can be categorized as allowlist-based or blocklist-based, depending on how authoritative information is used in filtering decisions.</t>
      <t>An allowlist-based approach permits incoming packets only when their source addresses are explicitly authorized by available authoritative information. When the authoritative information is complete, an allowlist-based approach introduces neither improper blocking nor improper admits. However, when authoritative information is missing, legitimate traffic may be improperly blocked.</t>
      <t>A blocklist-based approach, in contrast, permits incoming packets by default and blocks only those packets whose source addresses are explicitly identified as unauthorized by authoritative information. As a result, a blocklist-based approach does not improperly block legitimate traffic when authoritative information is missing, but may result in improper admits if unauthorized source addresses are not covered by the blocklist.</t>
      <t>Therefore, when authoritative information is incomplete, allowlist-based and blocklist-based approaches represent different trade-offs. Allowlist-based approaches prioritize minimizing improper permits at the risk of improper blocking, whereas blocklist-based approaches prioritize avoiding improper blocking at the risk of improper permits.</t>
    </section>
    <section anchor="sec-goal">
      <name>Goals of Bicone SAV</name>
      <t>Bicone SAV aims to provide robust ingress source address validation on interfaces facing customer or lateral peer ASes by appropriately selecting between allowlist-based and blocklist-based filtering. Its design goals are as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>Avoiding improper blocks. Bicone SAV prioritizes avoiding the blocking of legitimate data packets received from customer or lateral peer ASes. When authoritative information is insufficient to construct a complete allowlist, Bicone SAV prefers mechanisms that avoid improper blocking.</t>
        </li>
        <li>
          <t>Maintaining directionality. Bicone SAV seeks to preserve directionality in ingress filtering in order to effectively identify source-spoofed data packets. When sufficient authoritative information is available, stricter filtering can be applied to improve spoofing detection.</t>
        </li>
      </ol>
    </section>
    <section anchor="sec-generate">
      <name>Blocklist Generation</name>
      <t>This section describes how to generate a blocklist using BGP UPDATE messages, ASPAs, ROAs, and TOAs associated with the provider cone.</t>
      <section anchor="key-idea">
        <name>Key Idea</name>
        <t>The provider cone of an AS is defined as the set of ASes that the AS can reach by traversing only Customer-to-Provider (C2P) links. In the absence of route leaks <xref target="RFC7908"/>, prefixes associated with ASes in the provider cone are not expected to be used as source addresses in data packets received from customer or lateral peer ASes. Accordingly, the blocklist consists of prefixes that belong to the provider cone.</t>
        <t>When the blocklist is applied on an interface facing a customer or lateral peer AS, data packets received on that interface are discarded if their source addresses match any prefix in the blocklist.</t>
        <t>To construct such a blocklist, an AS first identifies the ASes in its provider cone using ASPAs and AS-PATH information carried in BGP UPDATE messages. It then identifies prefixes associated with these ASes using ROAs and TOAs <xref target="I-D.qin-savnet-toa"/>. Prefixes that also belong to the AS’s customer cone are subsequently removed from consideration.</t>
        <t>Given the inherent uncertainty in determining whether a prefix belongs to the customer cone, as discussed in <xref target="sec-review"/>, a conservative strategy is to retain only prefixes that are exclusively associated with the provider cone. By blocking traffic that uses these prefixes as source addresses, the resulting blocklist-based SAV filter can mitigate the improper blocking issues observed in allowlist-based SAV filters, while still preserving directionality.</t>
      </section>
      <section anchor="subsec-procedure">
        <name>Generation Procedure</name>
        <t>A detailed description of blocklist generation procedure is as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>Create the set of all directly connected Provider ASNs. Call it AS-set Z(1).</t>
          </li>
          <li>
            <t>Create the set of all unique AS_PATHs in Adj-RIBs-In of all interfaces facing Providers.</t>
          </li>
          <li>
            <t>For each unique AS_PATH with N (N&gt;1) ASNs, i.e., [ASN_{1}, ASN_{2}, ..., ASN_{i}, ASN_{i+1}, ..., ASN_{N}] where ASN_{i} is the ith ASN in AS_PATH and the first ASN (i.e., ASN_{1}) is a directly connected Provider ASN. If all unique AS_PATHs have been processed, go to Step 8.</t>
          </li>
          <li>
            <t>Let i = N</t>
          </li>
          <li>
            <t>Decrement i to i-1.</t>
          </li>
          <li>
            <t>If ASN_{i} authorizes ASN_{i+1} as a Provider in ASN_{i}'s ASPA or ASN_{i+1} is a Tier-1 AS, ASNs from ASN_{1} to ASN_{i+1} (i.e., ASN_{1}, ASN_{2}, ..., ASN_{i}, and ASN_{i+1}) are included in AS-set Z(1) and go to Step 3.</t>
          </li>
          <li>
            <t>If i == 1, go to Step 3. Else, go to Step 5.</t>
          </li>
          <li>
            <t>Let k = 1.</t>
          </li>
          <li>
            <t>Increment k to k+1.</t>
          </li>
          <li>
            <t>Create AS-set Z(k) of ASNs that are not in AS-set Z(k-1) but are authorized as Providers in ASPAs of any ASN in AS-set Z(k-1).</t>
          </li>
          <li>
            <t>If AS-set Z(k) is null, then set k_max = k-1 and go to Step 12. Else, form the union of AS-set Z(k) and AS-set Z(k-1) as AS-set Z(k) and go to Step 9.</t>
          </li>
          <li>
            <t>Select all ROAs and TOAs in which the authorized origin ASN is in AS-set Z(k_max). Form the union of the sets of prefixes in the selected ROAs and TOAs. Call it Prefix-set S.</t>
          </li>
          <li>
            <t>For each unique Prefix P in Prefix-set S, check origin ASNs of Prefix P by using all ROAs and TOAs. If all unique Prefixes in Prefix-set S have been processed, go to Step 15.</t>
          </li>
          <li>
            <t>For each prefix of Prefix P and its sub prefixes, if the prefix has at least one origin ASN not in AS-set Z(k_max), remove the prefix from Prefix-set S. Go to Step 13.</t>
          </li>
          <li>
            <t>Apply Prefix-set S as a blocklist on interfaces facing a customer or lateral peer AS.</t>
          </li>
        </ol>
      </section>
      <section anchor="incremental-and-partial-deployment-of-aspas">
        <name>Incremental and Partial Deployment of ASPAs</name>
        <t>Under incremental and partial deployment of ASPAs, an AS may be unable to fully identify all ASes in its provider cone. As a result, the resulting blocklist may not include all prefixes associated with the provider cone. Nevertheless, an incomplete blocklist does not lead to improper blocking of legitimate traffic. Instead, it can still filter source-spoofed packets whose source addresses fall within the identified subset of provider-cone prefixes. Therefore, even with partial ASPA deployment, the blocklist can provide immediate incremental benefits without introducing additional operational risk.</t>
      </section>
      <section anchor="incremental-and-partial-deployment-of-roas-and-toas">
        <name>Incremental and Partial Deployment of ROAs and TOAs</name>
        <t>This document does not use BGP UPDATE messages as a data source for determining the source address space associated with an AS. As discussed in <xref target="sec-review"/>, BGP information may be incomplete due to limited propagation or hidden prefixes, which can lead to improper blocking when used for SAV filtering. Instead, this document relies on Route Origin Authorizations (ROAs) <xref target="RFC6482"/> and Traffic Origin Authorizations (TOAs) <xref target="I-D.qin-savnet-toa"/> as authoritative information for identifying source address space. Because ROAs and TOAs are explicitly registered by prefix holders and are independent of BGP propagation behavior, they are not affected by the invisible scenarios described in <xref target="sec-review"/>.</t>
        <t>Under incremental and partial deployment, ROAs and TOAs may be missing for some prefixes. If a prefix does not have any corresponding ROA or TOA, it will not be included in the generated blocklist. Consequently, missing ROAs or TOAs do not result in improper blocking of legitimate traffic, although they may reduce the effectiveness of blocking spoofed packets.</t>
        <t>This document assumes correct operational practice by prefix holders: once ROAs or TOAs are registered for a prefix, the registration is complete and accurately reflects all legitimate route origins or traffic origins for that prefix.</t>
      </section>
    </section>
    <section anchor="sec-ops">
      <name>Implementation and Operations Considerations</name>
      <t>Network operators may choose to deploy either allowlist or blocklist filters on interfaces facing different customer or lateral peer ASes, depending on their operational requirements and deployment conditions.</t>
      <section anchor="meeting-the-goals">
        <name>Meeting the Goals</name>
        <t>Avoiding improper blocking is a primary operational objective, as discarding legitimate traffic can cause severe service disruption. Subject to this constraint, SAV mechanisms should also minimize improper admits to improve protection against source address spoofing.</t>
        <t>When an allowlist deployed on an interface is known to be complete, it introduces neither improper blocks nor improper admits. However, if allowlist completeness cannot be reliably ensured, for example due to hidden prefixes in the customer cone or missing authoritative information, deploying an allowlist may lead to improper blocking of legitimate traffic and thus fail to meet the primary objective. In contrast, a blocklist does not result in improper blocking caused by missing authoritative information, although it may allow some spoofed traffic when incomplete.</t>
        <t>Accordingly, when an allowlist on an interface is known to be complete, network operators are advised to use the allowlist. Otherwise, deploying a blocklist is recommended to avoid potential improper blocking. For small ISPs with relatively small customer cones, determining allowlist completeness is generally easier, as fewer ASes are involved and routing relationships tend to be simpler. For example, operators may directly confirm with a customer or lateral peer AS whether all ASes in its customer cone have deployed the required authoritative information. In contrast, for large ISPs with extensive customer cones, determining allowlist completeness is significantly more challenging. In such cases, if the completeness of the allowlist cannot be reliably determined, deploying a blocklist is recommended.</t>
      </section>
      <section anchor="storage-overhead">
        <name>Storage Overhead</name>
        <t>Deploying allowlist or blocklist filters requires additional memory resources, such as ternary content-addressable memory (TCAM), on line cards. Network operators should therefore consider storage overhead when selecting between allowlists and blocklists. In general, a small ISP tends to generate a smaller allowlist and a larger blocklist, while a large ISP tends to generate a larger allowlist and a smaller blocklist.</t>
        <t>One approach to reducing memory consumption is to maintain the original list in the control plane and install only an aggregated list in the data plane. For example, if the original list contains prefixes P1 and P2, and P1 is a less-specific prefix of P2, only P1 needs to be installed in the data plane.</t>
      </section>
      <section anchor="implementation-and-operations-recommendations">
        <name>Implementation and Operations Recommendations</name>
        <t>For an interface facing a customer or lateral peer AS, the following operational guidance applies:</t>
        <ol spacing="normal" type="1"><li>
            <t>If the network operator can determine that the allowlist covers all prefixes of the corresponding customer cone, deploying an allowlist on the interface is recommended, as a complete allowlist introduces neither improper blocks nor improper permits.</t>
          </li>
          <li>
            <t>If the network operator cannot reliably determine the completeness of the allowlist, deploying a blocklist is recommended in order to avoid improper blocking. In such cases, operators are encouraged to consider using the blocklist in conjunction with Loose uRPF <xref target="RFC3704"/> to improve spoofed traffic mitigation. Loose uRPF can be used to filter packets with unallocated or unroutable source addresses, while the blocklist focuses on filtering packets whose source addresses are associated with the provider cone.</t>
          </li>
        </ol>
        <t>Network operators may further refine the blocklist based on local knowledge. For example, operators may add special-purpose prefixes that are not expected to be used as source addresses in data packets, such as those listed in the IANA IPv4 Special-Purpose Address Registry <xref target="IANA"/>.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The security considerations described in <xref target="RFC8704"/>, <xref target="I-D.ietf-sidrops-bar-sav"/>, <xref target="I-D.ietf-sidrops-aspa-profile"/>, <xref target="RFC6482"/>, and <xref target="I-D.ietf-sidrops-aspa-verification"/> also applies to this document.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank Ben Maddison, Kotikalapudi Sriram, Nan Geng, Aijun Wang, Shengnan Yue, Siyuan Teng, Igor Lubashev, Job Snijders, and many other members of the SIDROPS and SAVNET working groups for comments and discussion.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-problem-statement-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-problem-statement.xml">
          <front>
            <title>Gap Analysis, Problem Statement, and Requirements for Inter-Domain SAV</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-12"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-bar-sav" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-bar-sav-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-bar-sav.xml">
          <front>
            <title>Source Address Validation Using BGP UPDATEs, ASPA, and ROA (BAR-SAV)</title>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <author fullname="Igor Lubashev" initials="I." surname="Lubashev">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Doug Montgomery" initials="D." surname="Montgomery">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>Designing an efficient source address validation (SAV) filter requires minimizing false positives (i.e., avoiding blocking legitimate traffic) while maintaining directionality (see RFC8704). This document advances the technology for SAV filter design through a method that makes use of BGP UPDATE messages, Autonomous System Provider Authorization (ASPA), and Route Origin Authorization (ROA). The proposed method's name is abbreviated as BAR-SAV. BAR-SAV can be used by network operators to derive more robust SAV filters and thus improve network resilience. This document updates RFC8704.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-bar-sav-08"/>
        </reference>
        <reference anchor="I-D.qin-savnet-toa" target="https://datatracker.ietf.org/doc/html/draft-qin-savnet-toa-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.qin-savnet-toa.xml">
          <front>
            <title>A Profile for Traffic Origin Authorizations (TOAs)</title>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Igor Lubashev" initials="I." surname="Lubashev">
              <organization>Akamai</organization>
            </author>
            <date day="3" month="November" year="2025"/>
            <abstract>
              <t>This document defines a standard profile for Traffic Origin Authorizations (TOAs), a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI). A TOA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate traffic using source IP addresses within the address block.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-qin-savnet-toa-00"/>
        </reference>
        <reference anchor="RFC7908" target="https://www.rfc-editor.org/info/rfc7908" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7908.xml">
          <front>
            <title>Problem Definition and Classification of BGP Route Leaks</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="B. Dickson" initials="B." surname="Dickson"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>A systemic vulnerability of the Border Gateway Protocol routing system, known as "route leaks", has received significant attention in recent years. Frequent incidents that result in significant disruptions to Internet routing are labeled route leaks, but to date a common definition of the term has been lacking. This document provides a working definition of route leaks while keeping in mind the real occurrences that have received significant attention. Further, this document attempts to enumerate (though not exhaustively) different types of route leaks based on observed events on the Internet. The aim is to provide a taxonomy that covers several forms of route leaks that have been observed and are of concern to the Internet user community as well as the network operator community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7908"/>
          <seriesInfo name="DOI" value="10.17487/RFC7908"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-profile-20" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-profile.xml">
          <front>
            <title>A Profile for Autonomous System Provider Authorization</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Uskov" initials="E." surname="Uskov">
              <organization>JetLend</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders"/>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <date day="18" month="August" year="2025"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for Autonomous System Provider Authorization (ASPA) objects for use with the Resource Public Key Infrastructure (RPKI). An ASPA is a digitally signed object through which the issuer (the holder of an Autonomous System identifier), can authorize one or more other Autonomous Systems (ASes) as its upstream providers. When validated, an ASPA's eContent can be used for detection and mitigation of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-profile-20"/>
        </reference>
        <reference anchor="RFC6482" target="https://www.rfc-editor.org/info/rfc6482" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6482.xml">
          <front>
            <title>A Profile for Route Origin Authorizations (ROAs)</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="D. Kong" initials="D." surname="Kong"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6482"/>
          <seriesInfo name="DOI" value="10.17487/RFC6482"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-verification" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-verification-24" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-verification.xml">
          <front>
            <title>BGP AS_PATH Verification Based on Autonomous System Provider Authorization (ASPA) Objects</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Bogomazov" initials="E." surname="Bogomazov">
              <organization>Qrator Labs</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan &amp; Arrcus, Inc.</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders"/>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="19" month="October" year="2025"/>
            <abstract>
              <t>This document describes procedures that make use of Autonomous System Provider Authorization (ASPA) objects in the Resource Public Key Infrastructure (RPKI) to verify the Border Gateway Protocol (BGP) AS_PATH attribute of advertised routes. This AS_PATH verification enhances routing security by adding means to detect and mitigate route leaks and AS_PATH manipulations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-verification-24"/>
        </reference>
        <reference anchor="IANA" target="https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml">
          <front>
            <title>IANA IPv4 Special-Purpose Address Registry</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 308?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
