@techreport{li-sava-intra-domain-use-cases-00, number = {draft-li-sava-intra-domain-use-cases-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-li-sava-intra-domain-use-cases/00/}, author = {Dan Li and Jianping Wu and Yunan Gu and Lancheng Qin and Tao Lin}, title = {{Soure Address Validation Architecture (SAVA): Intra-domain Use Cases}}, pagetotal = 15, year = 2020, month = jul, day = 13, abstract = {This document identifies scenarios where existing approaches for detection and mitigation of source address spoofing don't perform perfectly. Either Ingress ACL filtering {[}RFC3704{]}, unicast Reverse Path Forwarding (uRPF) {[}RFC3704{]}, feasible path uRPF {[}RFC 3704{]}, or Enhanced Feasible-Path uRPF {[}RFC8704{]} has limitations regarding eihter automated implemetation objective or detection accuracy objective (0\% false positive and 0\% false negative). This document identifies two such scenarios and provides solution discussions.}, }