<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.15 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-lsr-igp-based-intra-domain-savnet-00" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="IGP-SAVNET">IGP-based Source Address Validation in Intra-domain Networks (Intra-domain SAVNET)</title>
    <seriesInfo name="Internet-Draft" value="draft-li-lsr-igp-based-intra-domain-savnet-00"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qlc19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="X." surname="Song" fullname="Xueyan Song">
      <organization>ZTE Corporation</organization>
      <address>
        <postal>
          <city>Nanjing</city>
          <country>China</country>
        </postal>
        <email>song.xueyan2@zte.com.cn</email>
      </address>
    </author>
    <author initials="C." surname="Lin" fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>
    <date year="2024" month="June" day="14"/>
    <area>Routing</area>
    <workgroup>lsr</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 60?>

<t>This document proposes a new IGP-based intra-domain source address validation (SAV) solution, called IGP-SAVNET, which improves the accuracy upon current intra-domain SAV solutions. It allows intra-domain routers to communicate SAV-specific information using the intra-domain routing protocol or an extension to the intra-domain routing protocol. By using SAV-specific information, intra-domain routers can generate and update accurate SAV rules in an automatic way.</t>
    </abstract>
  </front>
  <middle>
    <?line 64?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>The purpose of intra-domain SAV is to prevent outgoing data packets from an intra-domain subnet (e.g., a host network or a customer network) from forging source addresses of other intra-domain subnets or other ASes, and to prevent incoming data packets from external ASes from forging source addresses of the local AS. To this end, intra-domain SAV should focus on SAV on host-facing routers, customer-facing routers, and AS border routers (see <xref target="I-D.ietf-savnet-intra-domain-architecture"/>). Specifically, host-facing routers or customer-facing routers should block data packets from the connected host network or customer network with a spoofed source IP address not belonging to that network. AS border routers should block data packets from other ASes with a spoofed source IP address belonging to the local AS.</t>
      <t>However, existing intra-domain SAV solutions (e.g., BCP38 <xref target="RFC2827"/> and BCP84 <xref target="RFC3704"/>) have problems of high operational overhead or inaccurate validation (see <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>). ACL-based ingress filtering requires manual operations to configure and update the SAV rules, while uRPF-based solutions may improperly block legitimate data packets in the scenario of routing asymmetry. To address these problems and guide the design of new intra-domain SAV solutions, <xref target="I-D.ietf-savnet-intra-domain-architecture"/> proposes the architecture of intra-domain SAVNET and introduces the use of SAV-specific information in intra-domain networks.</t>
      <t>Following the intra-domain SAVNET architecture, this document proposes a new IGP-based intra-domain SAV solution, called IGP-SAVNET, which improves the accuracy upon current intra-domain SAV solutions. It allows host-facing routers, customer-facing routers, and AS border routers to communicate SAV-specific information using the intra-domain routing protocol or an extension to the intra-domain routing protocol. By using SAV-specific information, these routers can generate and update accurate SAV rules in an automatic way.</t>
      <t>The reader is encouraged to be familiar with <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/> and <xref target="I-D.ietf-savnet-intra-domain-architecture"/>.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions and is inferred from the SAV Information Base.</t>
      <t>Host-facing Router: An intra-domain router of an AS which is connected to an intra-domain host network (i.e., a layer-2 network).</t>
      <t>Customer-facing Router: An intra-domain router of an AS which is connected to an intra-domain customer network running the routing protocol (i.e., a layer-3 network).</t>
      <t>AS Border Router: An intra-domain router of an AS which is connected to other ASes.</t>
    </section>
    <section anchor="sec-goal">
      <name>Goals of Intra-domain SAV</name>
      <t>Goal 1: The host-facing router or customer-facing router should identify source prefixes belonging to its host network or customer network and block data packets from its host network or customer network using source addresses not belonging to the network. For example, in <xref target="fig-goal"/>, Routers A and B should generate SAV rules at the interface '#' and block data packets from Network 1 using source addresses not belonging to Network 1. Router C should generate SAV rules at interfaces '#' and block data packets from Network 2 using source addresses not belonging to Network 2.</t>
      <t>Goal 2: The AS border router should identify source prefixes belonging to the local AS and block data packets from other ASes using source addresses belonging to the local AS. For example, in <xref target="fig-goal"/>, Routers D and E should generate SAV rules at interface '#' and block data packets from other ASes using source addresses belonging to the local AS.</t>
      <figure anchor="fig-goal">
        <name>Goals of Intra-domain SAV</name>
        <artwork><![CDATA[
             +----------------------------------+
             |            Other ASes            |
             +----------------------------------+
                |                            |
+---------------|----------------------------|--------------+
| Intra-domain  |                            |              |
|               |                            |              |
|         +-----#----+                 +-----#----+         |
|         | Router D |                 | Router E |         |
|         +----------+                 +----------+         |
|               |                            |              |
|               |                            |              |
|        +----------------------------------------+         |
|        |      Other intra-domain routers        |         |
|        +----------------------------------------+         |
|          /         \                       |              |
|         /           \                      |              |
|  +----------+  +----------+          +----------+         |
|  | Router A |  | Router B |          | Router C |         |
|  +----#-----+  +-------#--+          +-----#----+         |
|        \              /                    |              |
+--------+\------------/---------------------|--------------+
           \          /                      |
       +------------------+        +------------------+
       | Customer or Host |        | Customer or Host |
       |     Network 1    |        |     Network 2    |
       +------------------+        +------------------+
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-spi">
      <name>Description of the Method</name>
      <t>To achieve the above two goals, IGP-SAVNET allows host-facing routers, customer-facing routers, and AS border routers to communicate SAV-specific information between each other through IGP. These routers will not communicate SAV-specific information with routers/devices in host networks, customer networks, and other ASes. In the following, this document describes how IGP-SAVNET works to meet the goals.</t>
      <section anchor="sav-procedure-on-customer-facing-or-host-facing-routers">
        <name>SAV procedure on customer-facing or host-facing routers</name>
        <t>SAV on a customer-facing (or host-facing) router aims to identify source prefixes belonging to the customer (or host) network. After that, the customer-facing (or host-facing) router can perform accurate SAV filtering by only accepting data packets from its customer (or host) network with source addresses belonging to that network.</t>
        <t>If the customer (or host) network is single-homed, the customer-facing (or host-facing) router can directly identify source prefixes through its local routes to that network.</t>
        <t>If the customer (or host) network is multi-homed, the customer-facing (or host-facing) router may fail to identify all source prefixes of that network through its local routes to that network in the scenario of routing asymmetry (see <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>). For example, in <xref target="fig-example"/>, due to traffic engineering, Router A only learns the route to sub prefix 10.1.0.0/16 from Network N, while Router B only learns the route to the other sub prefix 10.0.0.0/16 from Network N. In this case, as described in <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>, strict uRPF on Router A will block data packets from the customer (or host) network with legitimate source addresses in prefix 10.0.0.0/16, and strict uRPF on Router B will block data packets from the customer (or host) network with legitimate source addresses in prefix 10.1.0.0/16. To achieve accurate SAV on routers facing the multi-homed customer (or host) network, IGP-SAVNET allows routers facing the same customer (or host) network to identify source prefixes of the network through SAV-specific information communication.</t>
        <figure anchor="fig-example">
          <name>SAV-specific information communication between Routers A and B</name>
          <artwork><![CDATA[
+-----------------------------------------------------+
|  AS                                                 |
|                 [10.1.0.0/16]+[tag n]               |
|  +----------+ +---------------------> +----------+  |
|  | Router A |    SAV-specific info    | Router B |  |
|  +-------#--+ <---------------------+ +--#-------+  |
|          |      [10.0.0.0/16]+[tag n]    |          |
|          |                               |          |
|          |                               |          |
|          |    +--------------------+     |          |
|          |    |  Customer or Host  |     |          |
|          +----|     Network N      |-----+          |
|               +--------------------+                |
|                   (10.0.0.0/15 )                    |
+-----------------------------------------------------+
]]></artwork>
        </figure>
        <t>A detailed description of SAV procedure is as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>Tag Assignment: Each single-homed or multi-homed customer (or host) network is assigned a unique tag value. For example, in <xref target="fig-example"/>, Network N is assigned tag n. The tag value for can be configured and updated manually.</t>
          </li>
          <li>
            <t>SAV-specific Information Communication: Each customer-facing (or host-facing) router provides its SAV-specific information of its customer (or host) networks to other intra-domain routers. The SAV-specific information of a customer (or host) network contains the prefixes learned through the router's local routes to the network and the tag value of the network. For example, Router A can provide its SAV-specific information, which contains prefix 10.1.0.0/16 and tag n, to other intra-domain routers. This procedure can be implemented by using IGP or extensions to IGP, which will be elaborated in <xref target="sec-igp"/>.</t>
          </li>
          <li>
            <t>SAV-specific Information Processing: When a router receives SAV-specific information containing the same tag value as its customer (or host) network, it considers that the prefixes contained in the SAV-specific information also belong to its customer (or host) network. For example, Router B will identify prefix 10.1.0.0/16 as a source prefix of Network N after receiving the SAV-specific information provided by Router A.</t>
          </li>
          <li>
            <t>Source Prefix Identification: By integrating prefixes learned through SAV-specific information provided by other routers with prefixes learned through its local routes, the customer-facing (or host-facing) router can identify complete source prefixes of its customer (or host) network. For example, Router B will identify that both prefix 10.1.0.0/16 and prefix 10.0.0.0/16 belong to Network N after processing SAV-specific information provided by Router A. Similarly, Router A will also identify complete source prefixes of Network N after processing SAV-specific information provided by Router B.</t>
          </li>
          <li>
            <t>SAV Rule Generation: Each customer-facing (or host-facing) router generates an allowlist containing source prefixes of its customer (or host) network at the interface facing that network. Only data packets using source addresses covered in the allowlist will be accepted at this interface.</t>
          </li>
        </ol>
      </section>
      <section anchor="sav-procedure-on-as-border-routers">
        <name>SAV procedure on AS border routers</name>
        <t>SAV on an AS border router aims to identify source prefixes belonging to the local AS. After receiving SAV-specific information or routing information originating from host-facing and customer-facing routers through IGP, AS border routers can identify source prefixes of the local AS accordingly and generate a blocklist containing these source prefixes. After that, data packets arriving from other ASes with source addresses belonging to the local AS will be blocked on the AS border router.</t>
      </section>
    </section>
    <section anchor="sec-igp">
      <name>SAV-specific Information Communication Using IGP</name>
      <t>The key idea is to add the tag value into the prefix information when the customer-facing (or host-facing) router distributes the prefix information of its customer (or host) network. As shown in <xref target="fig-overview"/>, the SAVNET Agent of a Sender Router provides its SAV-specific information to other SAVNET routers via IGP. After receiving SAV-specific information from other SAVNET routers, the SAVNET Agent of the Receiver Router generates SAV rules by using SAV-specific information from other SAVNET routers and/or its own SAV-specific information. The Sender Router can be a customer-facing router or a host-facing router. The Receiver Router can be a customer-facing router, a host-facing router, or an AS border router.</t>
      <figure anchor="fig-overview">
        <name>Overview of SAV-specific information communication</name>
        <artwork><![CDATA[
+---------------------+                +---------------------+
|   Sender Router     |  SAV-specific  |   Receiver Router   |
|   +------------+    |  Information   |    +------------+   |
|   |  IGP LSDB  +------------------------->+  IGP LSDB  |   |
|   +-----^------+    |                |    +-----+------+   |
|         |           |                |          |          |
| +-------+---------+ |                | +--------v--------+ |
| |   SAVNET Agent  | |                | |   SAVNET Agent  | |
| | +-------------+ | |                | | +-------------+ | |
| | | Information | | |                | | | Information | | |
| | | Provider    | | |                | | | Receiver    | | |
| | +-------------+ | |                | | +-------------+ | |
| +-----------------+ |                | +-----------------+ |
|                     |                |                     |
+---------------------+                +---------------------+
]]></artwork>
      </figure>
      <t>The overall procedure of SAV-specific information communication is as follows:</t>
      <ul spacing="normal">
        <li>
          <t>At the Sender Router: Carry its SAV-specific information (e.g., the tag information of the customer or host network) through the Link State Database (LSDB) of IGP. The IGP will synchronize the LSDB, including node information, link information, prefix information, and tag information.</t>
        </li>
        <li>
          <t>At the Receiver Router: After receiving SAV-specific information carried in the LSDB, its SAVNET Agent extracts SAV-specific information from the LSDB of IGP and then generates SAV rules as described in <xref target="sec-spi"/>.</t>
        </li>
      </ul>
      <t>In the following, this document presents two approaches to implement SAV-specific information communication among intra-domain routers.</t>
      <section anchor="approach-1-using-the-existing-administrative-tag-sub-tlv">
        <name>Approach #1: Using the existing Administrative Tag Sub-TLV</name>
        <t>When a router distributes IP prefix information of the customer or host network, it can carry the tag of that network in the Administrative Tag Sub-TLV.</t>
        <t>When a router receives IP prefix information, it checks if there is a locally configured interface with the same tag as the Administrative Tag information carried in the prefix. If such an interface exists, SAVNET rules will be added, with the prefix being the received prefix and the interface being the locally configured interface with this tag.</t>
        <t>As shown in <xref target="fig-example"/>, assume Network N is assigned tag n. In the prefix information of 10.1.0.0/16 published by Router A, tag n is carried via the Administrative Tag Sub-TLV. Similarly, in the prefix information of 10.0.0.0/16 published by Router B, tag n is carried via the Administrative Tag Sub-TLV. When Router A receives the prefix information of 10.0.0.0/16, it checks that the carried tag n matches the tag of Network N, and thus determines that prefix 10.0.0.0/16 also belongs to Network N. Similarly, Router B determines that prefix 10.1.0.0/16 also belongs to Network N using the same process.</t>
        <section anchor="administrative-tag-sub-tlv-of-is-is">
          <name>Administrative Tag Sub-TLV of IS-IS</name>
          <t>For routers running IS-IS, they can carry the tag in the Administrative Tag Sub-TLV (defined in <xref target="RFC5130"/>), which can be included in: Extended IP Reachability TLV (135), Multi-Topology Reachable IPv4 Prefixes TLV (235), IPv6 Reachability TLV (236), Multi-Topology Reachable IPv6 Prefixes TLV (237).</t>
        </section>
        <section anchor="administrative-tag-sub-tlv-of-ospf">
          <name>Administrative Tag Sub-TLV of OSPF</name>
          <t>For routers running OSPF, they can carry the tag in the Administrative Tag Sub-TLV <xref target="I-D.ietf-lsr-ospf-admin-tags"/> within the OSPF Extended Prefix TLV Sub-TLV <xref target="RFC7684"/>.</t>
        </section>
        <section anchor="administrative-tag-sub-tlv-of-ospfv3">
          <name>Administrative Tag Sub-TLV of OSPFv3</name>
          <t>For routers running OSPFv3, they can include the tag in the Administrative Tag Sub-TLV <xref target="I-D.ietf-lsr-ospf-admin-tags"/>  within the OSPFv3 Intra-Area-Prefix TLV, Inter-Area-Prefix TLV, and External-Prefix TLV <xref target="RFC8362"/>.</t>
        </section>
        <section anchor="considerations-of-using-administrative-tag-sub-tlv">
          <name>Considerations of using Administrative Tag Sub-TLV</name>
          <t>In practice, intra-domain routers may also use the Administrative Tag Sub-TLV for other purposes (e.g., route filtering), and multiple Administrative Tag Sub-TLVs may be carried in the IP prefix information simultaneously. Therefore, using the existing Administrative Tag Sub-TLV for SAV-specific information communication may conflict with other routing policies that also use Administrative Tags as filtering criteria. To address this issue, this document proposes Approach #2 in the following.</t>
        </section>
      </section>
      <section anchor="approach-2-defining-a-new-savnet-tag-sub-tlv">
        <name>Approach #2: Defining a new SAVNET Tag Sub-TLV</name>
        <t>To avoid possible conflicts and facilitate operation and management, it is more recommended to define and use a dedicated SAVNET Tag Sub-TLV to tranmit SAV-specific information.</t>
        <section anchor="savnet-tag-sub-tlv-of-is-is">
          <name>SAVNET Tag Sub-TLV of IS-IS</name>
          <t><xref target="fig-isis-prefix"/> shows the structure of SAVNET Tag Sub-TLV of IS-IS. It can be included in the following TLVs: Extended IP Reachability TLV (135), Multi-Topology Reachable IPv4 Prefixes TLV (235), IPv6 Reachability TLV (236), Multi-Topology Reachable IPv6 Prefixes TLV (237).</t>
          <figure anchor="fig-isis-prefix">
            <name>SAVNET Tag Sub-TLV of IS-IS</name>
            <artwork><![CDATA[
     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     | Type-SPI(TBD) |      Length     |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                      SAVNET Tag                                   |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

     Type:       A 8-bit field set to TBD.
     Length:     4 octets.
     SAVNET Tag: The tag of the customer or host network.

]]></artwork>
          </figure>
        </section>
        <section anchor="savnet-tag-sub-tlv-of-ospf-and-ospfv3">
          <name>SAVNET Tag Sub-TLV of OSPF and OSPFv3</name>
          <t><xref target="fig-ospf-prefix"/> shows the structure of SAVNET Tag Sub-TLV of OSPF and OSPFv3.</t>
          <t>The SAVNET Tag Sub-TLV of OSPF specified herein will be valid as a sub-TLV of the following TLVs specified in <xref target="RFC7684"/>:</t>
          <ol spacing="normal" type="1"><li>
              <t>Extended Prefix TLV advertised in the OSPFv2 Extended Prefix LSA</t>
            </li>
          </ol>
          <t>The SAVNET Tag Sub-TLV of OSPFv3 specified herein will be valid as a sub-TLV of the following TLVs specified in <xref target="RFC8362"/>:</t>
          <ol spacing="normal" type="1"><li>
              <t>Inter-Area-Prefix TLV advertised in the E-Inter-Area-Prefix-LSA.</t>
            </li>
            <li>
              <t>Intra-Area-Prefix TLV advertised in the E-Intra-Area-Prefix-LSA.</t>
            </li>
            <li>
              <t>External-Prefix TLV advertised in the E-AS-External-LSA and the E-NSSA-LSA.</t>
            </li>
          </ol>
          <figure anchor="fig-ospf-prefix">
            <name>SAVNET Tag Sub-TLV of OSPF and OSPFv3</name>
            <artwork><![CDATA[
     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |       Type - Link Tag             |        Sub-TLV Length         |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |                        SAVNET Tag                                 |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

     Type:       A 16-bit field set to TBD.
     Length:     4 octets.
     SAVNET Tag: The tag of the customer or host network.

]]></artwork>
          </figure>
        </section>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The security considerations described in <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/> and <xref target="I-D.ietf-savnet-intra-domain-architecture"/> also applies to this document.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-problem-statement-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="13" month="February" year="2024"/>
            <abstract>
              <t>This document provides the gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-03"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-architecture-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="12" month="April" year="2024"/>
            <abstract>
              <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL rules that require manual efforts to accommodate to network dynamics, SAVNET routers learn the SAV rules automatically in a distributed way.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-architecture-00"/>
        </reference>
        <reference anchor="I-D.ietf-lsr-ospf-admin-tags" target="https://datatracker.ietf.org/doc/html/draft-ietf-lsr-ospf-admin-tags-19" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lsr-ospf-admin-tags.xml">
          <front>
            <title>Extensions to OSPF for Advertising Prefix Administrative Tags</title>
            <author fullname="Acee Lindem" initials="A." surname="Lindem">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <author fullname="Peter Psenak" initials="P." surname="Psenak">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Yingzhen Qu" initials="Y." surname="Qu">
              <organization>Futurewei Technologies</organization>
            </author>
            <date day="3" month="June" year="2024"/>
            <abstract>
              <t>It is useful for routers in OSPFv2 and OSPFv3 routing domains to be able to associate tags with prefixes. Previously, OSPFv2 and OSPFv3 were relegated to a single tag and only for AS External and Not-So- Stubby-Area (NSSA) prefixes. With the flexible encodings provided by OSPFv2 Prefix/Link Attribute Advertisement and OSPFv3 Extended LSAs, multiple administrative tags may be advertised for all types of prefixes. These administrative tags can be used for many applications including route redistribution policy, selective prefix prioritization, selective IP Fast-ReRoute (IPFRR) prefix protection, and many others. The ISIS protocol supports a similar mechanism that is described in RFC 5130.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lsr-ospf-admin-tags-19"/>
        </reference>
        <reference anchor="RFC5130" target="https://www.rfc-editor.org/info/rfc5130" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5130.xml">
          <front>
            <title>A Policy Control Mechanism in IS-IS Using Administrative Tags</title>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="M. Shand" initials="M." role="editor" surname="Shand"/>
            <author fullname="C. Martin" initials="C." surname="Martin"/>
            <date month="February" year="2008"/>
            <abstract>
              <t>This document describes an extension to the IS-IS protocol to add operational capabilities that allow for ease of management and control over IP prefix distribution within an IS-IS domain. This document enhances the IS-IS protocol by extending the information that an Intermediate System (IS) router can place in Link State Protocol (LSP) Data Units for policy use. This extension will provide operators with a mechanism to control IP prefix distribution throughout multi-level IS-IS domains. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5130"/>
          <seriesInfo name="DOI" value="10.17487/RFC5130"/>
        </reference>
        <reference anchor="RFC7684" target="https://www.rfc-editor.org/info/rfc7684" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7684.xml">
          <front>
            <title>OSPFv2 Prefix/Link Attribute Advertisement</title>
            <author fullname="P. Psenak" initials="P." surname="Psenak"/>
            <author fullname="H. Gredler" initials="H." surname="Gredler"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <author fullname="W. Henderickx" initials="W." surname="Henderickx"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <author fullname="A. Lindem" initials="A." surname="Lindem"/>
            <date month="November" year="2015"/>
            <abstract>
              <t>OSPFv2 requires functional extension beyond what can readily be done with the fixed-format Link State Advertisements (LSAs) as described in RFC 2328. This document defines OSPFv2 Opaque LSAs based on Type-Length-Value (TLV) tuples that can be used to associate additional attributes with prefixes or links. Depending on the application, these prefixes and links may or may not be advertised in the fixed-format LSAs. The OSPFv2 Opaque LSAs are optional and fully backward compatible.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7684"/>
          <seriesInfo name="DOI" value="10.17487/RFC7684"/>
        </reference>
        <reference anchor="RFC8362" target="https://www.rfc-editor.org/info/rfc8362" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8362.xml">
          <front>
            <title>OSPFv3 Link State Advertisement (LSA) Extensibility</title>
            <author fullname="A. Lindem" initials="A." surname="Lindem"/>
            <author fullname="A. Roy" initials="A." surname="Roy"/>
            <author fullname="D. Goethals" initials="D." surname="Goethals"/>
            <author fullname="V. Reddy Vallem" initials="V." surname="Reddy Vallem"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="April" year="2018"/>
            <abstract>
              <t>OSPFv3 requires functional extension beyond what can readily be done with the fixed-format Link State Advertisement (LSA) as described in RFC 5340. Without LSA extension, attributes associated with OSPFv3 links and advertised IPv6 prefixes must be advertised in separate LSAs and correlated to the fixed-format LSAs. This document extends the LSA format by encoding the existing OSPFv3 LSA information in Type-Length-Value (TLV) tuples and allowing advertisement of additional information with additional TLVs. Backward-compatibility mechanisms are also described.</t>
              <t>This document updates RFC 5340, "OSPF for IPv6", and RFC 5838, "Support of Address Families in OSPFv3", by providing TLV-based encodings for the base OSPFv3 unicast support and OSPFv3 address family support.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8362"/>
          <seriesInfo name="DOI" value="10.17487/RFC8362"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
      </references>
    </references>
    <?line 316?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
