Skip to main content

Intra-domain Source Address Validation (SAVNET) Architecture
draft-li-savnet-intra-domain-architecture-02

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Replaced".
Authors Dan Li , Jianping Wu , Mingqing(Michael) Huang , Li Chen , Nan Geng , Lancheng Qin , Fang Gao
Last updated 2023-05-04 (Latest revision 2023-03-12)
RFC stream (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-li-savnet-intra-domain-architecture-02
SAVNET                                                             D. Li
Internet-Draft                                                     J. Wu
Intended status: Informational                       Tsinghua University
Expires: 6 November 2023                                        M. Huang
                                                                  Huawei
                                                                 L. Chen
                                                 Zhongguancun Laboratory
                                                                 N. Geng
                                                                  Huawei
                                                                  L. Qin
                                                     Tsinghua University
                                                                  F. Gao
                                                 Zhongguancun Laboratory
                                                              5 May 2023

      Intra-domain Source Address Validation (SAVNET) Architecture
              draft-li-savnet-intra-domain-architecture-02

Abstract

   This document proposes an intra-domain source address validation
   (intra-domain SAVNET) architecture.  Devices can communicate with
   each other and share more SAV-related information other than routing
   information, which allows SAV rules to be automatically and
   accurately generated.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 6 November 2023.

Copyright Notice

   Copyright (c) 2023 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

Li, et al.               Expires 6 November 2023                [Page 1]
Internet-Draft      Intra-domain SAVNET Architecture            May 2023

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
     1.1.  Terminology . . . . . . . . . . . . . . . . . . . . . . .   3
     1.2.  Requirements Language . . . . . . . . . . . . . . . . . .   4
   2.  SAV-related Information . . . . . . . . . . . . . . . . . . .   4
   3.  Intra-domain SAVNET Architecture  . . . . . . . . . . . . . .   4
     3.1.  Source Speaker and Validation Speaker . . . . . . . . . .   5
     3.2.  Communication Channel . . . . . . . . . . . . . . . . . .   6
     3.3.  SAV Agent . . . . . . . . . . . . . . . . . . . . . . . .   6
   4.  Connectivity Models . . . . . . . . . . . . . . . . . . . . .   8
     4.1.  Example 1: Multiple Source Entities to One Validation
           Entity  . . . . . . . . . . . . . . . . . . . . . . . . .   8
     4.2.  Example 2: One Source Entity to Multiple Validation
           Entities  . . . . . . . . . . . . . . . . . . . . . . . .   8
     4.3.  Example 3: One Acting as both Source and Validation
           Entity  . . . . . . . . . . . . . . . . . . . . . . . . .   9
   5.  Convergence Considerations  . . . . . . . . . . . . . . . . .  10
   6.  Partial Deployment Considerations . . . . . . . . . . . . . .  10
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .  11
   8.  Manageability Considerations  . . . . . . . . . . . . . . . .  12
   9.  Privacy Considerations  . . . . . . . . . . . . . . . . . . .  13
   10. IANA Considerations . . . . . . . . . . . . . . . . . . . . .  13
   11. Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .  13
   12. References  . . . . . . . . . . . . . . . . . . . . . . . . .  13
     12.1.  Normative References . . . . . . . . . . . . . . . . . .  13
     12.2.  Informative References . . . . . . . . . . . . . . . . .  14
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  14

1.  Introduction

   Source address validation (SAV) is important for mitigating source
   address spoofing and contributing to the Internet security.  Source
   Address Validation Architecture (SAVA) [RFC5210] divides SAV into
   three checking levels, i.e., access-network SAV, intra-domain SAV,
   and inter-domain SAV.  When an access network does not deploy SAV
   (such as SAVI [RFC7039][RFC7513], Cable Source Verify [cable-verify],
   and IP Source Guard [IPSG]), intra-domain SAV helps block spoofed
   packets as close to the source as possible.  The concept of intra-

Li, et al.               Expires 6 November 2023                [Page 2]
Internet-Draft      Intra-domain SAVNET Architecture            May 2023

   domain SAV in this document keeps consistent with that in
   [I-D.li-savnet-intra-domain-problem-statement].

   The main task of SAV mechanisms is to generate SAV rules for checking
   the validity of incoming packets.  The information of source
   addresses/prefixes and their incoming directions makes up the SAV
   rules.  How to efficiently and accurately learn the information is
   the core challenge for SAV mechanisms.

   There are some intra-domain SAV mechanisms available
   [I-D.li-savnet-intra-domain-problem-statement].  Many of them such as
   strict uRPF [RFC3704] and loose uRPF [RFC3704] conduct SAV based on
   routing information (i.e., FIB).  However, they may have false
   positive problems under asymmetric routing.  Some SAV-tailored
   information, a complementary of routing information, is required for
   accurate validation.  Manually configuring SAV-tailored information
   or directly configuring/modifying SAV rules (e.g., ACL-based
   filtering [RFC2827]) on routers is not practical for complex and
   dynamic networks, since operational overhead can be unacceptable.

   This document proposes an intra-domain source address validation
   (intra-domain SAVNET) architecture.  Under the architecture, devices
   can communicate with others for sharing SAV-related information
   (including routing information, SAV-tailored information, etc.).  SAV
   rules can be generated accurately and automatically based on the
   shared SAV-related information.  The proposed architecture aims to
   satisfy the requirements of automatic update and accurate validation
   described in [I-D.li-savnet-intra-domain-problem-statement].
   Besides, the document presents some considerations of partial
   deployment, security, manageability, and privacy.

   This architecture shows the high-level designs for future intra-
   domain SAV mechanisms.  The protocols or protocol extensions for
   implementing the architecture are not in the scope of the document.

1.1.  Terminology

   SAV Rule: The rule that indicates the validity of a specific source
   IP address or source IP prefix.

   SAV Table: The table or data structure that implements the SAV rules
   and is used for source address validation in the data plane.

   False Positive: The validation results that the packets with
   legitimate source addresses are considered invalid improperly due to
   inaccurate SAV rules.

Li, et al.               Expires 6 November 2023                [Page 3]
Internet-Draft      Intra-domain SAVNET Architecture            May 2023

   False Negative: The validation results that the packets with spoofed
   source addresses are considered valid improperly due to inaccurate
   SAV rules.

1.2.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

2.  SAV-related Information

   SAV-related Information represents any information that is useful for
   getting or generating SAV rules.  There are largely two kinds of SAV-
   related information.

   *  Routing information: The information for forwarding rule
      computation, which mostly stored in RIB/FIB.  Routing information
      is not specialized for SAV but can be used for SAV.

   *  SAV-tailored information: The information that provides more
      accurate SAV-related information than routing information, e.g.,
      the source prefixes or incoming directions that are not known by
      routing information.  SAV-tailored information is specialized for
      SAV.  It can be a complementary of routing information for
      avoiding false positive and reducing false negative.  Note that,
      SAV-tailored information can also provide SAV rules directly
      instead of the materials for rule generation.

3.  Intra-domain SAVNET Architecture

   The proposed architecture is shown in Figure 1.  In the architecture,
   there is a communication channel connecting two entities, i.e.,
   Source Entity and Validation Entity.  Source Entity is the
   information source.  It has some SAV-related information that can be
   useful for Validation Entity to generate SAV rules.  The SAV-related
   information is transmitted through the channel between the two
   entities.

   An entity can be a router, a server or some other SAV-equipped
   devices.  A device can act as a Source Entity, a Validation Entity,
   or both of them.

Li, et al.               Expires 6 November 2023                [Page 4]
Internet-Draft      Intra-domain SAVNET Architecture            May 2023

       +-------------------+             +-------------------+
       |   Source Entity   |Communication| Validation Entity |
       | +---------------+ |   Channel   | +---------------+ |
       | |  Source       +-----------------+  Validation   | |
       | |  Speaker      | |             | |  Speaker      | |
       | +-------+-------+ |             | +-------+-------+ |
       |         |         |             |         |         |
       |         |         |             |         |         |
       | +-------+-------+ |             | +-------+-------+ |
       | |  SAV-related  | |             | |  SAV          | |
       | |  Information  | |             | |  Agent        | |
       | +---------------+ |             | +---------------+ |
       +-------------------+             +-------------------+

               Figure 1: The intra-domain SAVNET architecture

3.1.  Source Speaker and Validation Speaker

   As shown in Figure 1, Source Speaker resides in Source Entity, and
   Validation Speaker is in Validation Entity.  Either Source Speaker or
   Validation Speaker is an abstracted speaker which represents a union
   of multiple protocol speakers as illustrated in Figure 2.  These
   protocol speakers can advertise and receive the messages carrying
   SAV-related information.  The followings are some kinds of the
   protocol speakers:

   *  Configuration Speaker.  The configuration Speaker can be the
      protocol speaker of YANG, FlowSpec, or management protocols for
      SAV.  Any SAV-related information can be obtained from
      configuration speaker.

   *  Routing Protocol Speaker.  This kind of speakers are same as the
      ones in routing protocols (e.g., OSPF).  Routing information is
      mainly obtained from routing protocol speaker.

   *  SAV Protocol Speaker.  This is a newly defined speaker in the
      document.  Generally, the speaker can reside in completely new
      protocols or protocol extensions (e.g., routing protocol
      extensions) for advertising and receiving SAV-related information
      especially SAV-tailored information.

   These kinds of protocol speakers are NOT REQUIRED to be supported in
   one SAV mechanism following the architecture.  For example, a SAV
   mechanism can only support YANG speaker and one SAV protocol speaker
   for getting SAV-related information.

Li, et al.               Expires 6 November 2023                [Page 5]
Internet-Draft      Intra-domain SAVNET Architecture            May 2023

       +--------------------+
       | Source/Validation  |
       | Speaker            |
       | +----------------+ |
       | | Configuration  <------------
       | | Speaker        | |         |
       | +----------------+ |         |
       | +----------------+ |         ---> Interact
       | |Routing Protocol<--------------> with other
       | |Speaker         | |         ---> speakers
       | +----------------+ |         |
       | +----------------+ |         |
       | | SAV Protocol   <------------
       | | Speaker        | |
       | +----------------+ |
       +--------------------+

                    Figure 2: Source/validation speaker

3.2.  Communication Channel

   The communication channel is constructed between the Source Speaker
   and Validation Speaker.  The primary purpose of the channel is for
   Source Entity to advertise SAV-related information to Validation
   Entity.  In the channel, there can be multiple sessions maintained by
   the speakers belonging to configuration speakers, routing protocol
   speakers, and/or SAV protocol speakers.  The concrete manner of
   constructing a session depends on the actual protocol speakers, but
   the following requirements SHOULD be satisfied:

   *  The session can be a long-time session or a temporary one, but it
      SHOULD provide sufficient assurance of transmission reliability
      and timeliness, so that Validation Entity can update local rules
      in time.

   *  Authentication can be conducted before session establishment.
      Authentication is OPTIONAL but the ability of authentication
      SHOULD be available.

3.3.  SAV Agent

   Figure 3 shows SAV Agent.  SAV Information Manager in SAV Agent
   parses the messages received by Validation Speaker.  The SAV-related
   information carried in the messages will be stored in SAV Information
   Base.  The information of Source Speaker, protocol speaker,
   timestamp, and other useful things will also be recorded together.
   The recorded information will be disseminated to SAV Rule Generator.
   SAV rules (e.g., tuples like <prefix, interface set, validity state>)

Li, et al.               Expires 6 November 2023                [Page 6]
Internet-Draft      Intra-domain SAVNET Architecture            May 2023

   will be generated and stored in SAV
   Table [I-D.huang-savnet-sav-table].  Besides rule generation, SAV
   Information Base also provides the support of diagnosis.  Operators
   can look up the information in the base for protocol monitoring or
   troubleshooting.

                   Messages from
                   Validation Speaker
                       |
       +---------------|---------------+
       | SAV Agent     |               |
       | +-------------\/------------+ |
       | | SAV Information Manager   | |
       | | +-----------------------+ | |
       | | | SAV Information Base  | | |
       | | +-----------------------+ | |
       | +-------------+-------------+ |
       |               |               |
       |   SAV-related | information   |
       |               |               |
       | +-------------\/------------+ |
       | | SAV Rule Generator        | |
       | | +-----------------------+ | |
       | | | SAV Table             | | |
       | | +-----------------------+ | |
       | +---------------------------+ |
       +-------------------------------+

                            Figure 3: SAV agent

   It can be noticed that SAV Information Base stores SAV-related
   information from different Source Entities and different protocol
   speakers.  When SAV Rule Generator generates rules based on the
   stored information, rule conflicts may appear.  For example, for a
   given prefix, the information from different entities or speakers may
   indicate a different list of valid incoming interfaces.

   To solve the problem of rule conflicts, each Source Entity or
   protocol speaker can be set with a priority.  So, the SAV-related
   information from the entity or protocol speaker is also tagged with a
   priority.  When rule conflicts exist, the rule based on the
   information with a higher priority will override that based on the
   information with a lower priority.  If two conflicted rules are based
   on the information with the same priority, they can be merged to one
   rule (i.e., taking a union set).  When the settings of priority
   change, the affected information MUST be reprocessed for updating
   rules.

Li, et al.               Expires 6 November 2023                [Page 7]
Internet-Draft      Intra-domain SAVNET Architecture            May 2023

   Consider that one Validation Entity receives the information about
   prefix P1 from one Source Entity through two protocol speakers.
   Based on the information from speaker 1, the rule is <P1, {intf1},
   valid>.  While based on the information from speaker 2, the rule is
   <P1, {intf2}, valid>.  Next, consider two cases of priority settings.
   In case 1, speaker 1 has a higher priority than speaker 2.  Then, the
   rule of <P1, {intf1}, valid> will be finally stored in SAV Table.  In
   case 2, two speakers have the same priority.  Then, <P1, {intf1,
   intf2}, valid> is the output rule.

   It should be noted that priority is OPTIONAL and not a mandatory
   requirement.  It is one possible method to deal with rule conflicts.

4.  Connectivity Models

   This section presents some examples of connectivity models of the
   architecture.

4.1.  Example 1: Multiple Source Entities to One Validation Entity

   One Validation Entity can collect SAV-related information from
   multiple Source Entities as shown in Figure 4.  For each Source
   Entity, Validation Entity maintains a communication channel for
   receiving messages.

       +-----------------+
       | Source Entity 1 |---------
       +-----------------+         \
                                    \
       +-----------------+           \ +-------------------+
       | Source Entity 2 |-------------| Validation Entity |
       +-----------------+           / +-------------------+
               ...                  /
       +-----------------+         /
       | Source Entity n |---------
       +-----------------+

      Figure 4: Example 1: Multiple source entities to one validation
                                   entity

4.2.  Example 2: One Source Entity to Multiple Validation Entities

   One Source Entity can provide information for multiple Validation
   Entities as shown in Figure 5.  Source Entity will maintain a
   communication channel with each Validation Entity.

Li, et al.               Expires 6 November 2023                [Page 8]
Internet-Draft      Intra-domain SAVNET Architecture            May 2023

   By combining Example 1 and Example 2, it can be seen that the
   connectivity model can also be "multiple Source Entities to multiple
   Validation Entities".

                                     +---------------------+
                           ----------| Validation Entity 1 |
                          /          +---------------------+
                         /
       +---------------+/            +---------------------+
       | Source Entity |-------------| Validation Entity 2 |
       +---------------+\            +---------------------+
                         \                      ...
                          \          +---------------------+
                           ----------| Validation Entity n |
                                     +---------------------+

       Figure 5: Example 2: One source entity to multiple validation
                                  entities

4.3.  Example 3: One Acting as both Source and Validation Entity

   As mentioned previously, a device can be both Source and Validation
   Entity.  In Figure 6, the middle entity is such a device.  It can
   receive information messages from the top Source Entity and can
   advertise information messages to the bottom Validation Entity.  The
   middle entity can also relay the messages from the top Source Entity
   to the bottom Validation Entity, which is just like routing
   information spreading.

       +-------------------+
       | Source Entity     |
       +-------------------+
                 |
       +-------------------+
       | Source&Validation |
       | Entity            |
       +-------------------+
                 |
       +-------------------+
       | Validation Entity |
       +-------------------+

    Figure 6: Example 3: One acting as both source and validation entity

Li, et al.               Expires 6 November 2023                [Page 9]
Internet-Draft      Intra-domain SAVNET Architecture            May 2023

5.  Convergence Considerations

   Network topologies may change sometimes and result in the change of
   SAV-related information.  Convergence of the architecture is needed.
   Source Entity MUST advertise the updates of SAV-related information
   to Validation Entity in time.  Then, Validation Entity MUST update
   local SAV rules immediately.  Even so, there will still be delay of
   message delivery (sometimes re-transmission delay due to packet loss)
   and information processing.  Therefore, during the convergence
   process, the SAV rules for checking packets are possibly inaccurate,
   which may result in severes false positive or too much false
   negative.

   Existing routing information-based SAV mechanisms like strict uRPF is
   also faced with convergence problem.  Inaccurate validation may
   appear during the convergence of routing, which is inevitable in
   practice.  However, the proposed architecture involves SAV protocols
   that are especially for SAV.  The convergence process can be slowed
   down due to the existence of SAV protocols.

   The protocol for implementing the architecture MUST carefully
   consider the convergence problems, so that normal packet forwarding
   won't be impacted too much.  There are some potential work directions
   for dealing with convergence problems:

   *  Taking full use of routing information.  Routing information
      usually provides most of the SAV-related information for rule
      generation, and SAV-tailored information is relatively a small set
      of information for supplementing missed information.  Therefore,
      most of SAV rules can be updated during routing convergence if
      routing information is fully taken for rule generation.

   *  Advertising and processing the information first that will
      probably result in false positive.  This is because false positive
      is more harmful to the network than false negative.  It is
      reasonable to allocate more resources for eliminating false
      positive first.

6.  Partial Deployment Considerations

   Although an intra-domain network mostly has one administration,
   partial deployment may still exist due to phased deployment or the
   limitations coming from multi-vendor supplement.  Under partial
   deployment, routing information usually can be easily obtained by
   Validation Entity.  The main challenge is that Validation Entity may
   not be able to get enough SAV-tailored information for generating
   accurate SAV rules.  False positive problems may appear under
   inaccurate rules.

Li, et al.               Expires 6 November 2023               [Page 10]
Internet-Draft      Intra-domain SAVNET Architecture            May 2023

   The implementation of Validation Entity is RECOMMENDED to support
   flexible validation modes such as interface-based prefix allowlist,
   interface-based prefix blocklist, and prefix-based interface
   allowlist [I-D.huang-savnet-sav-table].  The first two modes are
   interface-scale, and the last one is device-scale.  Under partial
   deployment, the device of Validation Entity SHOULD take on the proper
   validation mode according to the deploying of Source Entities.  For
   example, if Validation Entity is able to get the complete set of
   legitimate source prefixes arriving at a given interface, interface-
   based prefix allowlist can be enabled at the given interface, and
   false positive will not exist.

   Another approach to deal with partial deployment is to take
   conservative actions on the validated data packets.  That is to say,
   the packet with an invalid result will not be dropped directly.
   Instead, they can be conducted rate-limiting action, redirecting
   action, or sampling action for supporting further analysis.  These
   conservative actions will not result in serious consequences under
   false positive validation results, while still providing protection
   for the network.

   In an extreme case, no SAV-tailored information can be obtained by
   Validation Entity.  Then, the existing mechanisms that purely rely on
   routing information for SAV can be used.  The operators SHOULD fully
   understand the limitations of existing mechanisms.

7.  Security Considerations

   In many cases, an intra-domain network can be considered as a trusted
   domain.  There will be no threats within the domain.

   However, in some other cases, devices within the domain do not trust
   each other.  Operators SHOULD be aware of potential threats involved
   in deploying the architecture.  Typically, the potential threats and
   solutions are as follows:

   *  Entity impersonation.

      -  Potential solution: Mutual authentication SHOULD be conducted
         before session establishment between two entities.

      -  Gaps: Impersonation may still exist due to credential theft,
         implementation flaws, or entity being compromised.  Some other
         security mechanisms can be taken to make such kind of
         impersonation difficult.  Besides, the entities SHOULD be
         monitored so that misbehaved entities can be detected.

   *  Message blocking.

Li, et al.               Expires 6 November 2023               [Page 11]
Internet-Draft      Intra-domain SAVNET Architecture            May 2023

      -  Potential solution: Acknowledgement mechanisms MUST be provided
         in the session between two speakers, so that message losses can
         be detected.

      -  Gaps: Message blocking may be a result of DoS/DDoS attack, man-
         in-the-middle (MITM) attack, or congestion induced by traffic
         burst.  Acknowledgement mechanisms can detect message losses
         but cannot avoid message losses.  MITM attacks cannot be
         effectively detected by acknowledgement mechanisms.

   *  Message alteration.

      -  Potential solution: An authentication field can be carried by
         each message so as to ensure message integrity.

      -  Gaps: More overhead of control plane and data plane will be
         induced.

   *  Message replay.

      -  Potential solution: Authentication value can be computed by
         adding a sequence number or timestamp as input.

      -  Gaps: More overhead of control plane and data plane will be
         induced.

   When implementing the architecture in an extended protocol, the
   existing security mechanisms of the protocol can be taken.

8.  Manageability Considerations

   The architecture provides a general design for collecting SAV-related
   information and generating accurate SAV rules.  Protocol-independent
   mechanisms SHOULD be provided for operating and managing SAV-related
   configurations.  For example, a YANG data model for SAV configuration
   and operation is necessary for the ease of management.

   SAV may affect the normal forwarding of data packets.  The diagnosis
   approach and necessary logging information SHOULD be provided.  SAV
   Information Base SHOULD store some information that may not be useful
   for rule generation but is helpful for management.

   Messages carrying SAV-related information come from different
   protocol speakers.  Each corresponding protocol SHOULD have
   monitoring and troubleshooting mechanisms, which is necessary for
   efficiently operating the architecture.

Li, et al.               Expires 6 November 2023               [Page 12]
Internet-Draft      Intra-domain SAVNET Architecture            May 2023

9.  Privacy Considerations

   The advertised SAV-related information mainly indicates the incoming
   directions of source prefixes.  Devices under the architecture will
   learn more forwarding information of data packets.

   An intra-domain network is mostly operated by a single organization
   or company, and the advertised information is only used within the
   network.  Therefore, the architecture does not import critical
   privacy issues in usual cases.

   The architecture makes the forwarding information in the network
   clearer, which can be helpful for network management such as fault
   diagnosis and traffic visualization.

10.  IANA Considerations

   This document has no IANA requirements.

11.  Acknowledgements

   Many thanks to the valuable comments from: Igor Lubashev, Alvaro
   Retana, Aijun Wang, Joel Halpern, Jared Mauch, Kotikalapudi Sriram,
   RĂ¼diger Volk, Jeffrey Haas, etc.

12.  References

12.1.  Normative References

   [I-D.li-savnet-intra-domain-problem-statement]
              Li, D., Wu, J., Qin, L., Huang, M., and N. Geng, "Source
              Address Validation in Intra-domain Networks Gap Analysis,
              Problem Statement, and Requirements", Work in Progress,
              Internet-Draft, draft-li-savnet-intra-domain-problem-
              statement-07, 11 March 2023,
              <https://datatracker.ietf.org/doc/html/draft-li-savnet-
              intra-domain-problem-statement-07>.

   [RFC2827]  Ferguson, P. and D. Senie, "Network Ingress Filtering:
              Defeating Denial of Service Attacks which employ IP Source
              Address Spoofing", BCP 38, RFC 2827, DOI 10.17487/RFC2827,
              May 2000, <https://www.rfc-editor.org/info/rfc2827>.

   [RFC3704]  Baker, F. and P. Savola, "Ingress Filtering for Multihomed
              Networks", BCP 84, RFC 3704, DOI 10.17487/RFC3704, March
              2004, <https://www.rfc-editor.org/info/rfc3704>.

Li, et al.               Expires 6 November 2023               [Page 13]
Internet-Draft      Intra-domain SAVNET Architecture            May 2023

   [I-D.huang-savnet-sav-table]
              Huang, M., Cheng, W., Li, D., Geng, N., Liu, and L. Chen,
              "Source Address Validation Table Abstraction and
              Application", Work in Progress, Internet-Draft, draft-
              huang-savnet-sav-table-01, 6 March 2023,
              <https://datatracker.ietf.org/doc/html/draft-huang-savnet-
              sav-table-01>.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

12.2.  Informative References

   [RFC5210]  Wu, J., Bi, J., Li, X., Ren, G., Xu, K., and M. Williams,
              "A Source Address Validation Architecture (SAVA) Testbed
              and Deployment Experience", RFC 5210,
              DOI 10.17487/RFC5210, June 2008,
              <https://www.rfc-editor.org/info/rfc5210>.

   [RFC7039]  Wu, J., Bi, J., Bagnulo, M., Baker, F., and C. Vogt, Ed.,
              "Source Address Validation Improvement (SAVI) Framework",
              RFC 7039, DOI 10.17487/RFC7039, October 2013,
              <https://www.rfc-editor.org/info/rfc7039>.

   [RFC7513]  Bi, J., Wu, J., Yao, G., and F. Baker, "Source Address
              Validation Improvement (SAVI) Solution for DHCP",
              RFC 7513, DOI 10.17487/RFC7513, May 2015,
              <https://www.rfc-editor.org/info/rfc7513>.

   [IPSG]     "Configuring DHCP Features and IP Source Guard", January
              2016, <https://www.cisco.com/c/en/us/td/docs/switches/lan/
              catalyst2960/software/release/12-
              2_53_se/configuration/guide/2960scg/swdhcp82.html>.

   [cable-verify]
              "Cable Source-Verify and IP Address Security", January
              2021, <https://www.cisco.com/c/en/us/support/docs/
              broadband-cable/cable-security/20691-source-verify.html>.

Authors' Addresses

Li, et al.               Expires 6 November 2023               [Page 14]
Internet-Draft      Intra-domain SAVNET Architecture            May 2023

   Dan Li
   Tsinghua University
   Beijing
   China
   Email: tolidan@tsinghua.edu.cn

   Jianping Wu
   Tsinghua University
   Beijing
   China
   Email: jianping@cernet.edu.cn

   Mingqing Huang
   Huawei
   Beijing
   China
   Email: huangmingqing@huawei.com

   Li Chen
   Zhongguancun Laboratory
   Beijing
   China
   Email: lichen@zgclab.edu.cn

   Nan Geng
   Huawei
   Beijing
   China
   Email: gengnan@huawei.com

   Lancheng Qin
   Tsinghua University
   Beijing
   China
   Email: qlc19@mails.tsinghua.edu.cn

   Fang Gao
   Zhongguancun Laboratory
   Beijing
   China
   Email: gaofang@zgclab.edu.cn

Li, et al.               Expires 6 November 2023               [Page 15]