<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-architecture-03" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Intra-domain SAVNET Architecture">Intra-domain Source Address Validation (SAVNET) Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-architecture-03"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="October" day="13"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 65?>

<t>This document specifies the architecture of intra-domain SAVNET, which aims to achieve accurate source address validation (SAV) at external interfaces of an intra-domain network in an automated manner. It describes the conceptual design of intra-domain SAVNET, along with its use cases and design requirements, to help ensure that the intended objectives are met.</t>
    </abstract>
  </front>
  <middle>
    <?line 69?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>The main task of an intra-domain SAV mechanism is to generate the correct mapping between a source address (prefix) and its valid incoming router interface(s), referred to as SAV rules. The core challenge lies in efficiently and accurately learning this mapping. Existing intra-domain SAV mechanisms (such as strict uRPF <xref target="RFC3704"/> and ACL-based ingress filtering <xref target="RFC2827"/>) suffer from either inaccurate mappings in asymmetric routing or hidden prefix scenarios, or from high operational overhead in dynamic networks (see <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>). The fundamental cause is that these mechanisms generate SAV rules solely based on a router’s local routing information or on manual configuration.</t>
      <t>To address this challenge, the intra-domain SAVNET architecture requires routers to generate SAV rules based on SAV-specific information exchanged among routers, rather than relying solely on local routing information or manual configuration. Compared to uRPF <xref target="RFC3704"/>, which depends only on a router’s local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing and hidden prefix scenarios. Compared to ACL-based ingress filtering <xref target="RFC2827"/>, which relies entirely on manual configuration to adapt to network dynamics, SAVNET routers learn SAV rules automatically in a distributed manner.</t>
      <t>This document describes the conceptual design of intra-domain SAVNET, along with its use cases and design requirements, to help ensure that the intended objectives are met. The reader is encouraged to be familiar with <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/> and <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>Local Routing Information: Information in a router’s local RIB or FIB that can be used to infer SAV rules.</t>
      <t>SAV-specific Information: Information exchanged among routers that is specifically used for SAV rule generation.</t>
      <t>SAV-specific Information Communication Mechanism: A mechanism for exchanging SAV-specific information between routers. It can be a new protocol or an extension to an existing one.</t>
      <t>SAV Information Base: A data structure within a router that stores both SAV-specific information and local routing information.</t>
      <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions.</t>
      <t>SAVNET Router: An intra-domain router that runs the intra-domain SAVNET function.</t>
      <t>SAVNET Agent: A component within a SAVNET router that is responsible for exchanging SAV-specific information, processing such information, and generating SAV rules.</t>
      <t>Non-BGP Customer Network: A stub network connected to one or more routers of the AS for Internet connectivity. It only originates traffic and does not participate in BGP routing exchanges with the AS.</t>
      <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
      <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
    </section>
    <section anchor="threat-model">
      <name>Threat Model</name>
      <t>Intra-domain SAVNET assumes the following threat model:</t>
      <ol spacing="normal" type="1"><li>
          <t>Attackers  </t>
          <ul spacing="normal">
            <li>
              <t>Directly connected hosts: Hosts that are directly attached to an intra-domain router (e.g., in a local LAN).</t>
            </li>
            <li>
              <t>Non-BGP customer networks: Stub networks connected to one or more routers of the AS for Internet connectivity. They only originate traffic and do not participate in BGP routing exchanges with the AS.</t>
            </li>
            <li>
              <t>External ASes: Autonomous systems outside the domain that send traffic to the domain.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Attacker Capabilities  </t>
          <ul spacing="normal">
            <li>
              <t>Attackers may inject packets with spoofed source addresses into the domain.</t>
            </li>
            <li>
              <t>Specifically:      </t>
              <ul spacing="normal">
                <li>
                  <t>At external interfaces facing hosts or non-BGP customer networks, attackers may attempt to send packets with source addresses they are not authorized to use.</t>
                </li>
                <li>
                  <t>At external interfaces facing external ASes, attackers may attempt to send packets using internal-use-only source addresses.</t>
                </li>
              </ul>
            </li>
          </ul>
        </li>
        <li>
          <t>Assumptions  </t>
          <ul spacing="normal">
            <li>
              <t>Intra-domain routers are trusted and operate correctly.</t>
            </li>
            <li>
              <t>Spoofing traffic originating from a compromised intra-domain router is out of scope.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Scope and Goals  </t>
          <ul spacing="normal">
            <li>
              <t>Prevent unauthorized source addresses from entering the intra-domain network at external interfaces.</t>
            </li>
            <li>
              <t>Focus is on validating traffic at external interfaces, not on internal interfaces between trusted routers.</t>
            </li>
            <li>
              <t>SAVNET aims to automatically generate and enforce SAV rules to achieve accurate source address validation, even in the presence of asymmetric routing or hidden prefix scenarios.</t>
            </li>
          </ul>
        </li>
      </ol>
    </section>
    <section anchor="deployment-scope-and-use-cases">
      <name>Deployment Scope and Use Cases</name>
      <t>To reduce deployment overhead and avoid redundant validation, it is not necessary to include all intra-domain router interfaces within the deployment scope. In general, external interfaces serve as vantage points for deploying intra-domain SAVNET. Intra-domain SAVNET at external interfaces is more effective in identifying and discarding packets with spoofed source addresses because these interfaces are located at the boundary of the intra-domain network and are closer to the source. In addition, Intra-domain SAVNET at external interfaces can more clearly determine the valid incoming direction of specific source prefixes based on the network topology. Intra-domain SAVNET at internal interfaces is currently considered out of scope.</t>
      <section anchor="use-case-1-intra-domain-savnet-at-external-interfaces-facing-hosts-or-non-bgp-customer-networks">
        <name>Use Case 1: Intra-domain SAVNET at External Interfaces Facing Hosts or Non-BGP Customer Networks</name>
        <t>At external interfaces facing directly connected hosts or non-BGP customer networks, intra-domain SAVNET prevents these entities from injecting packets into the domain with source addresses they are not authorized to use.</t>
      </section>
      <section anchor="use-case-2-intra-domain-savnet-at-external-interfaces-facing-external-ases">
        <name>Use Case 2: Intra-domain SAVNET at External Interfaces Facing External ASes</name>
        <t>At external interfaces facing external ASes, intra-domain SAVNET prevents those ASes from injecting packets into the domain that use internal-use-only source addresses.</t>
      </section>
    </section>
    <section anchor="architecture">
      <name>Architecture</name>
      <section anchor="sec-arch-overview">
        <name>Overview</name>
        <t><xref target="fig-arch"/> illustrates the intra-domain SAVNET architecture within an intra-domain network. To generate accurate SAV rules, intra-domain SAVNET enables SAVNET routers to automatically exchange SAV-specific information. Each SAVNET router can independently decide which other SAVNET routers to provide its SAV-specific information to. The arrows in <xref target="fig-arch"/> indicate the directions of SAV-specific information flows originating from Router A and Router C. Flows originating from other routers are omitted for clarity.</t>
        <figure anchor="fig-arch">
          <name>Overview of intra-domain SAVNET architecture</name>
          <artwork><![CDATA[
                +----------------------------------+
                |            Other ASes            |
                +----------------------------------+
                   |                            |
+------------------|----------------------------|--------------+
|    Intra-domain  |        SAV-specific        |              |
|                  |        message from        |              |
|                  |        Router A            |              |
|            +-----#----+ --------------> +-----#----+         |
|            | Router D |                 | Router E |         |
|            +-----/\---+ <-------------- +-----/\---+         |
|     SAV-specific |        SAV-specific        | SAV-specific |
|     message from |        message from        | message from |
|     Router A     |        Router C            | Router C     |
|            +----------------------------------------+        |
|            |      Inner intra-domain routers        |        |
|            +-/\-------------------------------/\----+        |
| SAV-specific /       \  SAV-specific          | SAV-specific |
| message from/         \ message from          | message from |
| Router A   /           \Router A              | Router C     |
|     +----------+  +----\/----+          +----------+         |
|     | Router A |  | Router B +----------+ Router C |         |
|     +----#-----+  +-------#--+          +-----#----+         |
|           \              /                    |              |
|            \            /                     |              |
|             \          /                      |              |
|         +------------------+            +--------------+     |
|         | Non-BGP Customer |            |    Hosts     |     |
|         |   Network        |            |              |     |
|         +------------------+            +--------------+     |      
+--------------------------------------------------------------+
]]></artwork>
        </figure>
        <t>Each SAVNET router includes a SAVNET Agent responsible for SAV-related functions. As shown in <xref target="fig-role"/>, a SAVNET router can serve one or both of the following roles in the intra-domain SAVNET architecture:</t>
        <ul spacing="normal">
          <li>
            <t>Source Entity – provides its SAV-specific information to other SAVNET routers.</t>
          </li>
          <li>
            <t>Validation Entity – receives SAV-specific information from other SAVNET routers.</t>
          </li>
        </ul>
        <section anchor="source-entity">
          <name>Source Entity</name>
          <t>When a SAVNET router acts as a source entity, the information provider component of its SAVNET Agent supplies SAV-specific information to other SAVNET routers acting as validation entities. A SAVNET router serving as a source entity can obtain SAV-specific information about the hosts and/or non-BGP customer networks attached to it and selectively distribute this information to other SAVNET routers.</t>
        </section>
        <section anchor="validation-entity">
          <name>Validation Entity</name>
          <t>When a SAVNET router acts as a validation entity, the information receiver component of its SAVNET Agent obtains SAV-specific information from other SAVNET routers acting as source entities. The SAVNET Agent then processes the received SAV-specific information, together with its own SAV-specific information and/or local routing information, to generate SAV rules for the corresponding interfaces.</t>
          <figure anchor="fig-role">
            <name>SAV-specific information flow</name>
            <artwork><![CDATA[
+---------------------+              +---------------------+
|    Source Entity    |              |  Validation Entity  |
|     (Router A)      |              |     (Router B)      |
|                     |              |                     |
| +-----------------+ |              | +-----------------+ |
| |   SAVNET Agent  | | SAV-specific | |   SAVNET Agent  | |
| | +-------------+ | | Information  | | +-------------+ | |
| | | Information +----------------------> Information | | |
| | | Provider    | | |              | | | Receiver    | | |
| | +-------------+ | |              | | +-------------+ | |
| +-----------------+ |              | +-----------------+ |
|                     |              |                     |
+---------------------+              +---------------------+

]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sav-specific-information-communication">
        <name>SAV-specific Information Communication</name>
        <t>New intra-domain SAV solutions are expected to include a SAV-specific information communication mechanism that propagates SAV-specific information from source entities to validation entities.
This mechanism may be realized either as a new protocol or as an extension to an existing one.
This document does not specify the detailed protocol design or extensions; instead, it identifies the essential features that such a mechanism <bcp14>SHOULD</bcp14> support.</t>
        <t>The SAV-specific information communication mechanism <bcp14>SHOULD</bcp14> define the data structure or format of SAV-specific information, as well as the operations related to communication (e.g., session establishment and termination).
In addition, the mechanism <bcp14>SHOULD</bcp14> enable source entities to notify validation entities of SAV-specific information updates in a timely manner, so that validation entities can maintain SAV rules based on the latest information.</t>
        <section anchor="future-sav-specific-information-communication-protocol-requirements">
          <name>Future SAV-specific Information Communication Protocol Requirements</name>
          <t>To ensure the convergence and security of the communication, the session of the SAV-specific communication mechanism <bcp14>SHOULD</bcp14> satisfy the following requirements:</t>
          <ul spacing="normal">
            <li>
              <t>The session <bcp14>MAY</bcp14> be long-lived or temporary, but it <bcp14>MUST</bcp14> provide sufficient assurance of reliability and timeliness to allow validation entities to update SAV rules promptly.</t>
            </li>
            <li>
              <t>Authentication <bcp14>SHOULD</bcp14> be supported prior to session establishment. While authentication is optional, the mechanism <bcp14>MUST</bcp14> provide the capability to perform it.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="sec-arch-information">
        <name>SAV-related Information</name>
        <t>For intra-domain SAV, both SAV-specific information and local routing information can be used to support SAV decision-making.</t>
        <section anchor="sav-specific-information">
          <name>SAV-specific Information</name>
          <t>SAV-specific information is information dedicated to SAV and enables the generation of more accurate SAV rules.
A SAVNET router can derive its own SAV-specific information from local routing information, local interface configurations, and/or other local configuration data.
In addition, SAVNET routers acting as validation entities can obtain SAV-specific information from other SAVNET routers acting as source entities.
By incorporating SAV-specific information provided by other routers, a validation entity can generate more accurate SAV rules than by relying solely on its local routing information.</t>
          <t>SAV-specific information <bcp14>MAY</bcp14> also be provided by network operators.
In this case, a SAVNET router can obtain the information from an operator-managed database or configuration system and incorporate it into the SAV rule generation process.
This allows operators to provide additional guidance or correct information that might not be fully derivable from local routing or interface data.</t>
          <t>For example, SAVNET routers connected to the same multi-homed non-BGP customer network can exchange locally known source prefixes of that network through SAV-specific information communication.
By processing both their own SAV-specific information, information received from peer SAVNET routers, and optionally operator-provided information, each router can identify all valid prefixes within the non-BGP customer network and thus avoid improper blocking in cases of asymmetric routing.</t>
        </section>
        <section anchor="routing-information">
          <name>Routing Information</name>
          <t>Routing information is used to compute packet forwarding rules and is stored in a router’s RIB or FIB.
Although not specialized for SAV, it has been widely used to infer SAV rules in existing uRPF-based mechanisms, such as strict uRPF and loose uRPF <xref target="RFC3704"/>.
A SAVNET router acting as a validation entity can obtain routing information from its local RIB/FIB to generate SAV rules for certain prefixes when the corresponding SAV-specific information is unavailable.</t>
        </section>
      </section>
      <section anchor="sec-arch-agent">
        <name>SAV Rule Generation</name>
        <t><xref target="fig-sav-agent"/> illustrates the SAV rule generation process of a SAVNET router acting as a validation entity.
The SAV Information Manager of the SAVNET Agent consolidates SAV-specific information received from other routers, the router’s own SAV-specific information, and local routing information into the SAV Information Base.
It then provides the consolidated information to the SAV Rule Generator.
The SAV Rule Generator <bcp14>SHOULD</bcp14> preferentially use SAV-specific information to generate SAV rules for specific source prefixes.
Local routing information is <bcp14>RECOMMENDED</bcp14> only when the corresponding SAV-specific information is unavailable.</t>
        <t>The SAV Information Manager also supports diagnostic operations.
Operators can inspect the contents of the SAV Information Base for monitoring or troubleshooting purposes.</t>
        <t>For example, on a SAVNET router facing hosts or non-BGP customer networks, the SAVNET Agent processes SAV-related information to identify the prefixes belonging to the directly connected host or non-BGP customer network, and then generates SAV rules on the interface facing that host or network.
Data packets received on that interface are considered invalid and <bcp14>SHOULD</bcp14> be dropped if their source addresses do not belong to the corresponding host or non-BGP customer network.</t>
        <figure anchor="fig-sav-agent">
          <name>Workflow of SAV rule generation</name>
          <artwork><![CDATA[
+--------------------------------------------------------+
|                      SAVNET Agent                      |
|                                                        |
|     SAV-specific     SAV-specific     Routing          |
|     information      information      information      |
|     provided by      provided by      in local         |
|     other routers    the operator     FIB/RIB          |
|         +                  +               +           |
|         |                  |               |           |
|       +-v------------------v---------------v-+         |
|       |      SAV Information Manager         |         |
|       |      +------------------------+      |         |
|       |      | SAV Information Base   |      |         |
|       |      +------------------------+      |         |
|       +--------------------------------------+         |
|                          |                             |
|                          | SAV-related information     |
|                          |                             |
|       +------------------v--------------------+        |
|       |      SAV Rule Generator               |        |
|       |      +------------------------+       |        |
|       |      |        SAV Rules       |       |        |
|       |      +------------------------+       |        |
|       +---------------------------------------+        |
+--------------------------------------------------------+
]]></artwork>
        </figure>
        <t>For a SAVNET router facing an external AS, the SAVNET Agent processes SAV-related information to identify prefixes within the local AS and generates SAV rules on the interface facing another AS.
Data packets received on that interface are considered invalid and <bcp14>SHOULD</bcp14> be dropped if their source addresses belong to the local AS.</t>
        <t>In addition, if a SAVNET router also implements inter-domain SAVNET, its intra-domain SAVNET Agent <bcp14>SHOULD</bcp14> provide the intra-domain SAV-specific information to the inter-domain SAVNET Agent.
This enables the inter-domain SAVNET Agent to generate inter-domain SAV rules or inter-domain SAV-specific information.</t>
      </section>
      <section anchor="data-plane-sav-filtering">
        <name>Data Plane SAV Filtering</name>
        <t>This document primarily focuses on the SAV rule generation process in the control plane, including the exchange of SAV-specific information, the consolidation of SAV-related information, and the generation of SAV rules.
For data-plane SAV filtering, SAVNET routers validate the source addresses of incoming data packets against the locally generated SAV rules and drop packets identified as using spoofed source addresses.
Consequently, the accuracy of data-plane SAV filtering depends entirely on the accuracy of the generated SAV rules.
Further considerations for data-plane SAV can be found in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
      </section>
    </section>
    <section anchor="meeting-the-design-requirements-of-intra-domain-savnet">
      <name>Meeting the Design Requirements of Intra-domain SAVNET</name>
      <t>The intra-domain SAVNET architecture is designed to satisfy the five design requirements defined in <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>.</t>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>Existing intra-domain SAV mechanisms (e.g., strict uRPF) that rely solely on local routing information to generate SAV rules may incorrectly block legitimate traffic under asymmetric routing or hidden prefix conditions. Intra-domain SAVNET addresses this limitation by enabling routers to exchange SAV-specific information with one another. Each SAVNET router can use both the SAV-specific information received from other routers and its own SAV-specific information to generate more accurate SAV rules.</t>
      </section>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>In real intra-domain networks, the topology or prefixes of networks may change dynamically.
The SAV mechanism <bcp14>MUST</bcp14> automatically update SAV rules in response to such network changes.
In contrast, ACL-based SAV mechanisms require manual updates to accommodate network dynamics, resulting in high operational overhead.</t>
        <t>Intra-domain SAVNET enables SAVNET routers to automatically exchange updates of SAV-specific information with one another.
Upon receiving updated SAV-specific information from a source entity, SAVNET routers acting as validation entities can generate and update their SAV rules accordingly.</t>
      </section>
      <section anchor="sec-incre">
        <name>Incremental Deployment</name>
        <t>Although an intra-domain network is typically under a single administration, incremental or partial deployment may still occur due to phased deployment or multi-vendor environments.
In phased deployment scenarios, SAV-specific information from non-deploying routers is unavailable.</t>
        <t>As described in <xref target="sec-arch-agent"/>, intra-domain SAVNET can adapt to incremental or partial deployment.
To mitigate the impact of phased deployment, it is <bcp14>RECOMMENDED</bcp14> that routers facing the same set of hosts or non-BGP customer network adopt intra-domain SAVNET simultaneously so that all routing information of the set of hosts or non-BGP customer network can be identified.</t>
        <t>In addition, SAVNET routers acting as validation entities are <bcp14>RECOMMENDED</bcp14> to support flexible validation modes and perform SAV filtering gradually to smooth the transition from partial to full deployment:</t>
        <ul spacing="normal">
          <li>
            <t>Flexible Validation Modes: SAVNET routers acting as validation entities <bcp14>RECOMMENDED</bcp14> to support modes such as interface-based prefix allowlist, interface-based prefix blocklist, and prefix-based interface allowlist (see <xref target="I-D.ietf-savnet-general-sav-capabilities"/>). The first two modes operate at the interface scale, while the last operates at the device scale.
Under incremental or partial deployment, SAVNET routers <bcp14>SHOULD</bcp14> select the appropriate validation mode according to the acquired SAV-specific information.
For example, if a SAVNET router can identify all prefixes in its non-BGP customer network using acquired SAV-specific information, an interface-based prefix allowlist containing these prefixes can be applied to that interface. Otherwise, an interface-based prefix blocklist or prefix-based interface allowlist <bcp14>SHOULD</bcp14> be used to avoid improper blocking.</t>
          </li>
          <li>
            <t>Gradual SAV-invalid Filtering: Validation entities are <bcp14>RECOMMENDED</bcp14> to apply filtering for invalid packets gradually.
Initially, routers may take conservative actions on packets identified as invalid. For instance, packets may not be discarded at the start of deployment; instead, sampling can be conducted for measurement and analysis.
Subsequently, rate-limiting or redirecting actions can be applied to packets with invalid results.
These conservative actions reduce the risk of incorrectly blocking legitimate traffic while still providing protection for the network.
Full filtering actions <bcp14>SHOULD</bcp14> be enabled only after confirming that no improper blocking occurs.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-converge">
        <name>Convergence</name>
        <t>When SAV-related information changes, the SAVNET Agent <bcp14>MUST</bcp14> be able to detect the changes promptly and update SAV rules based on the latest information.
Otherwise, outdated SAV rules may cause legitimate packets to be blocked or allow spoofed packets to be accepted.</t>
        <t>Intra-domain SAVNET requires routers to update SAV-specific information and refresh SAV rules in a timely manner.
Because SAV-specific information originates from source entities, those entities <bcp14>MUST</bcp14> promptly send updated SAV-specific information to validation entities.
Therefore, the propagation speed of SAV-specific information is a key factor affecting convergence.
Considering that routing information and SAV-specific information can be originated and advertised in similar ways, SAV-specific information <bcp14>SHOULD</bcp14> propagate at least as quickly as routing information.</t>
      </section>
      <section anchor="sec-security">
        <name>Security</name>
        <t>Intra-domain SAVNET is designed so that it does not introduce additional security threats to the existing routing architecture or protocols.</t>
      </section>
    </section>
    <section anchor="manageability-considerations">
      <name>Manageability Considerations</name>
      <t>The architecture provides a general framework for exchanging SAV-specific information between routers and generating SAV rules based on both SAV-specific information and local routing information.
Protocol-independent mechanisms <bcp14>SHOULD</bcp14> be provided for operating and managing SAV-related configurations.
For example, a YANG data model for SAV configuration and operation is <bcp14>RECOMMENDED</bcp14> to simplify management.</t>
      <t>Mechanisms for diagnosis and the collection of necessary logging information <bcp14>SHOULD</bcp14> be provided.
The SAV Information Base <bcp14>SHOULD</bcp14> store information that may not be directly used for SAV rule generation but is useful for management purposes.</t>
      <t>Furthermore, the SAV-specific information communication mechanism <bcp14>SHOULD</bcp14> include monitoring and troubleshooting capabilities to support the efficient operation of the architecture.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Mingqing Huang</t>
      <t>Email: huangmq@vip.sina.com</t>
      <t>Fang Gao</t>
      <t>Email: fredagao520@sina.com</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Igor Lubashev, Alvaro Retana, Aijun Wang, Joel Halpern, Jared Mauch, Kotikalapudi Sriram, Rüdiger Volk, Jeffrey Haas, Xiangqing Chang, Changwang Lin, Xueyan Song, etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-problem-statement-19" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="3" month="October" year="2025"/>
            <abstract>
              <t>This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the basic requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-19"/>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-general-sav-capabilities" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-general-sav-capabilities-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-general-sav-capabilities.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-general-sav-capabilities-02"/>
        </reference>
      </references>
    </references>
    <?line 418?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
