<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tong-savnet-sav-enhanced-by-controller-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="sav enhanced by controller">Source Address Validation enhanced by Network Controller</title>
    <seriesInfo name="Internet-Draft" value="draft-tong-savnet-sav-enhanced-by-controller-00"/>
    <author initials="T." surname="Tong" fullname="Tian Tong">
      <organization>China Unicom</organization>
      <address>
        <email>tongt5@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="C." surname="Lin" fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>
    <author initials="N." surname="Wang" fullname="Nan Wang">
      <organization>China Unicom</organization>
      <address>
        <email>wangn161@chinaunicom.cn</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <area>Routing</area>
    <workgroup>Source Address Validation in Intra-domain and Inter-domain Networks</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 54?>

<t>Many newly proposed Source Address Validation (SAV) mechanisms such as IGP-based and BGP-based SAVNET solutions take a distributed manner to generate SAV rules, but they are faced with accuracy and managability challenges in incremental/partial deployment scenarios.
This document proposes a network controller-based solution for enhancing SAVNET capability in intra-domain and inter-domain networks, which supports accurate verification, automated configuration, threat analysis, traceability and visualization.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-tong-savnet-sav-enhanced-by-controller/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Source Address Validation in Intra-domain and Inter-domain Networks Working Group mailing list (<eref target="mailto:savnet@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/savnet/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/savnet/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 59?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Many newly proposed Source Address Validation (SAV) mechanisms such as IGP-based and BGP-based SAVNET solutions take a distributed manner to generate SAV rules. Distributed SAVNET solutions leverage protocol message exchanges among SAVNET routers to acquire source prefix information pertaining to other subnets within intra-domain networks or inter-domain networks, utilizing Source Prefix Announcement (SPA) and Source Prefix Path Detection (SPD) technologies with BGP/IGP protocols extensions. Nonetheless, under circumstances characterized by device heterogeneity, partial upgrades, asymmetric routing, and peculiar address, these solutions grapple with diminished accuracy in Source Address Validation (SAV). Furthermore，there are necessities for enhancement in areas such as automated configuration, threat analysis, traceability, and visualization.</t>
      <t>In this document, on the basis of distributed intra-domain and inter-domain SAVNET architecture, we propose a controller-based and centralized SAVNET enhancement solution. The distributed SAVNET soulations rely on local routing information and SAV-specific information. In this solution, the controller can generate and deliver SAV rules based on the global information, and can also obtain ROA and other external information to generate inter-domain SAV rules, so as to achieve accurate source address verification (SAV) in both intra-domain and inter-domain in a combination of centralized and distributed ways.</t>
      <t>In this solution, SAVNET-enabled routers and SAVNET-unenabled routers can cooperate via the network controller. More accurate source address verification rules can be generated based on more comprehensive information in the scenario of partial/incremental deployment of SAVNET. Concurrently, the SAVNET can support accurate verification, automated configuration, threat analysis, traceability and visualization..</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <ul spacing="normal">
          <li>
            <t>SAV: Source Address Validation</t>
          </li>
          <li>
            <t>AS: Autonomous System</t>
          </li>
          <li>
            <t>SAV-Specific Information: Information specialized for SAV rule generation, exchanged between routers or from the network controller.</t>
          </li>
          <li>
            <t>SAV-related Information: The information used by a router to make SAV decisions. For intra-domain SAV, SAV-related information includes both local routing information and SAV-specific information.</t>
          </li>
          <li>
            <t>SAV-specific Information Communication Mechanism: The mechanism for exchanging SAV-specific information between routers. It can be either a new protocol or an extension to an existing protocol.</t>
          </li>
          <li>
            <t/>
          </li>
          <li>
            <t>SAV Information Base: A table or data structure in a router that stores specific SAV information and local routing information.</t>
          </li>
          <li>
            <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions and is inferred from the SAV Information Base or from network controller.</t>
          </li>
          <li>
            <t>SAVNET Router:  An intra-domain router which runs intra-domain SAVNET.</t>
          </li>
          <li>
            <t>SAVNET Agent: The agent in a SAVNET router that is responsible for communicating SAV-specific information, processing SAV-related information, and generating SAV rules.</t>
          </li>
          <li>
            <t>AS Edge Router: An intra-domain router of an AS which is connected to client subnets.</t>
          </li>
          <li>
            <t>AS Border Router: An intra-domain router of an AS which is connected to other ASes.</t>
          </li>
          <li>
            <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
          </li>
          <li>
            <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="scenarios-and-requirements-for-centralized-savnet">
      <name>Scenarios and Requirements for Centralized SAVNET</name>
      <t>This section introduces the scenarios and requirements of centralized SAVNET, including incremental/partial deployment scenario, obtain information from external systems, automated configuration, analysis and traceability requirements,etc..</t>
      <section anchor="challenges-and-limitations-of-distributed-savnet-in-incrementalpartial-deployment">
        <name>Challenges and Limitations of Distributed SAVNET in Incremental/partial deployment</name>
        <t>The current distributed solutions exchange SAV-specific information between SAVNET routers depends on devices upgrade. Devices utilize the source prefix advertisement (SPA) information to notify other routers about their subnet and prefix information. Unique subnet ID for each subnet should be planned by network manager, and additional identification information such as subnet ID and access mode on the corresponding port of the device should be configured manually, so as to generate more accurate SAV rules.</t>
        <t>However, devices are upgraded gradually due to various limitations such as device performance、version and vendor. As a result, there are some routers support SAVNET and others do not in an AS.</t>
        <t>Routers with distributed solution could not generate accurate SAV rules in incremental/partial deployment scenario. Refer to <xref target="I-D.li-savnet-intra-domain-architecture"/> and <xref target="I-D.li-savnet-inter-domain-architecture"/>.Though the SAVNET router can obtain routing information from the local RIB/FIB and generate SAV rules for certain prefixes, in the absence of SAV-specific information, the SAV generated based on the local RIB/FIB has the risk of the improper block and improper permit in special scenarios such as asymmetric routing scenario. Similarly, as not all devices support SAVNET, so it is difficult for SPD source prefix detection packets to be propagated hop-by-hop.</t>
        <t>Figure 1 illustrates the asymmetric routing in a multi-homing subnet scenario which has been raised in [I-D.ietf-savnet-intra-domain-problem-statement]. Subnet 1 has a prefix of 10.0.0.0/15 and is connected to two edge routers, Router 1 and Router 2. Due to the load balancing policy in the inbound direction of subnet 1, R1 can only learn subnet prefix 10.1.0.0/16 from subnet 1, while R2 can only learn subfix 10.0.0.0/16 from subnet 1. After that, R1 learns another subnet prefix through the intra-domain routing protocol, and so does R2. The FIB of R1 and R2 are shown in Figure 1. R1 is a SAVNET router and R2 is a non-SAVNET router, and R1 and R2 communicate with each other through R3, regardless of whether R3 is a SAVNET router or not, the SPA message cannot be delivered and R2 cannot generate its own SAV-specific information or recognize the SAV-specific information transmitted from R1. Therefore, R1 can only collect part of the prefix information of the subnet to generate SAV rules, and R2 uses the FIB for SAV, then improper block will occure in both R1 and R2 due to incomplete information.</t>
        <figure>
          <name>Asymmetric multi-homing scenario in incremental deployment of intra-domain</name>
          <artwork><![CDATA[
 +--------------------------------------------------------------------+
 |     AS                                                             |
 |                            +----------+                            |
 |                            | Router 3 |                            |
 | FIB on Router 1            +----------+     FIB on Router 2        |
 | Dest         Next_hop       / \     \       Dest         Next_hop  |
 | 10.1.0.0/16  Subnet 1       /        \      10.0.0.0/16  Subnet 1  |
 | 10.0.0.0/16  Router 3      /  SPA     \     10.1.0.0/16  Router 3  |
 |                        +----------+   +----------+                 |
 |                SAVNET  | Router 1 |   | Router 2 | No SAVNET       |
 |                        +---+#+----+   +---+#+----+                 |
 |                             \            /                         |
 |                              \          /                          |
 |                             +------------+                         |
 |                             |  Customer  |                         |
 |                             |  Network   |                         |
 |                             +------------+                         |
 |                             (10.0.0.0/15)                          |
 |                                                                    |
 +--------------------------------------------------------------------+
]]></artwork>
        </figure>
        <t>Incremental/partial deployment for inter-domain include: (1) devices partially support SAVNET in an AS; (2) some ASs support SAVNET, while others do not. Figure 2 shows that ASBR1/2/3 are SAVNET routers while ASBR4 is a non-SAVNET router, ASBR4 cannot generate accurate source address verification rules without obtaining SAV-specific information from other AS and other routers in its AS.</t>
        <figure>
          <name>Partial deployment of Savnet for inter-domain</name>
          <artwork><![CDATA[
     +-----------------------+          +------------------------+
     | AS1     +----------+  |          |  +--------- +      AS2 |
     |      Y  |  ASBR 1  |  | -------- |  |  ASBR 3  |  Y       |
     |         +----------+  |          |  +----------+          |
     |         +----------+  |          |  +----------+          |
     |      Y  |  ASBR 2  |  | -------- |  |  ASBR 4  |  N       |
     |         +----------+  |          |  +----------+          |
     +-----------------------+          +------------------------+
]]></artwork>
        </figure>
        <t>As a result, there is a problem of low accuracy in partial/incremental deployment scenarios. In addition, how to improve the protection effect and enhance the incentive is also one of the enhanced capabilities.</t>
      </section>
      <section anchor="obtain-information-from-external-systems">
        <name>Obtain information from external systems</name>
        <t>ASBR in each AS collects the SAV-specific information in its AS domain and synchronizes the SAV-specific information with the ASBR of the adjacent AS domain, and also obtains the RPKI ROA and ASPA information, as well as general information such as RIB, FIB, IRR, etc..Based on the above information sources, each AS generates a relatively complete source address verification table. So each AS needs to establish an information exchange channel and mechanism with the RPKI ROA to ensure network security, but routers shouldn’t directly interact with the RPKI ROA and other external systems, and a controller is appropriate to obtain information such as RPKI ROA and ASPA.</t>
      </section>
      <section anchor="automated-configuration">
        <name>Automated configuration</name>
        <t>Due to the existence of special addresses in the network, such as anycast addresses, the existing distributed SAVNET solutions need to manually identify special addresses and adopt corresponding policies, which brings high management overhead.</t>
        <t>For example, in Figure 3, P1~P4 are common prefixes, P5 is an anycast prefix with multiple legitimate origins including customer network 1, customer network 3 and external Internet. SAVNET with whitelist to be generated on interfaces a, b, and c, and SAVNET blacklist to can be generated on interfaces d and e. If subnet 1 could not recognize P5 as the an anycast prefix, the blacklist of interfaces d and e includes the prefix P5, causing legitimate packets with P5 as the source to be filtered by mistake when they enter from interfaces d and e. Therefore, in order not to include an anycast prefix into a blacklist, it needs to use a special flag to indicate the anycast prefix when subnet 1 advertises the prefix P5 through the SPA.  Prefix type can be obtained and configured on the edge router through the controller if centralized management is possible,.</t>
        <figure>
          <name>Impact of anycast prefix</name>
          <artwork><![CDATA[
 +----------------------------------+     +--------------+
 |  AS  1                           |     |   Other AS   |
 |            +-----------+         |     |              |
 |            |  Router 3 |         |---- |   Internet   |
 |            +-----------+         |     |              |
 |               /     \            |     |              |
 |              /       \           |     |              |
 |    +----------+   +----------+   |     | +----------+ |
 |    | Router 1 |   | Router 2 |   |     | | Router 4 | |
 |    +---+#+----+   +- -+#+---+    |     | +---+#+----+ |
 +---------|-----\--------|------\--+     +------|-------+
           |       \      |        \             |
           |         \    |          \           |
           |           \  |            \         |
      +------------+   +------------+  +------------+
      |  Customer  |   |  Customer  |  |  Customer  |
      |  Network 1 |   |  Network 2 |  |  Network 3 |
      +------------+   +------------+  +------------+
  （ prefix-1 and 5）（ prefix-2 and 3）（ prefix-4 and 5）
]]></artwork>
        </figure>
        <t>In addition, network providers assign access devices, access ports, and public IP addresses to users who connected to their networks, so that the address allocation system in the carrier's network contains information about the customer's network. Source address verification technology can be combined with address allocation systems to automate configuration and achieve traceability based on source prefix. Centralized network controller can switch the authentication mode of all SAVNET routers flexibly through the delivery configuration.</t>
      </section>
      <section anchor="analysis-and-traceability-requirements">
        <name>Analysis and traceability requirements</name>
        <t>Current scheme provides flexible verification modes such as dropping, rate limiting, or allowness for the forged packets in the latest draft sav_table <xref target="I-D.huang-savnet-sav-table"/>. It will play a great role if the controller can collect more source address forgery information from the router, analyze and trace the source in a centralized manner, visualize the source and target of the attack and threat tracing.
Besides, with the continuous expansion of the network scale and the increasing allocation of IP addresses, IP address conflicts include IP address conflicts and IP prefix conflicts will appear, which affects the normal network operation. The controller can find whether the prefixes are reused by checking the prefixes and their binding subnet ID.</t>
      </section>
    </section>
    <section anchor="centralized-savnet-capability-enhancement-solution">
      <name>Centralized SAVNET capability enhancement solution</name>
      <t>Figure 4 shows the intra-domain and inter-domain network of the operator network. Customer networks generally access the Internet through the metro network in every province which is an AS and connected to the border router of the operator's backbone network. Border router of operator's backbone network is also interconnected with other operator networks.
Since not all customer networks deploy source address verification, it is need for operator network to deploy SAV technology on the border gateway devices of metro networks to perform prefix-level source address verification. It can also deploy the inter-domain SAV to protect the prefixes of Adjacent ASes.There a network controller in an AS domain that manages the access, aggregation, and core devices in the network and knows the network topology of the AS.</t>
      <figure>
        <name>Typical carrier network architecture</name>
        <artwork><![CDATA[
               +------------+      +------------+
               |  Other AS  |      |  Other AS  |
               +------------+      +------------+
                     |                   |
                     |                   |
         +----------------------------------------------+
         |                                          AS  |
         |       Network Provider Backbone Network      |
         |                                              |
         +----------------------------------------------+
              |                |                  |
              |                |                  |
         +----------+     +----------+      +----------+
         |   AS 1   |     |   AS2    |      |   AS3    |
         +----------+     +----------+      +----------+
]]></artwork>
      </figure>
      <t>Every AS has a network controller that manages the access, aggregation and core devices in the network and knows the network topology of the whole AS.</t>
      <section anchor="centralized-savnet-solution">
        <name>Centralized SAVNET solution</name>
        <section anchor="intra-domain-savnet-enhancement">
          <name>Intra-domain SAVNET enhancement</name>
          <t>This section describes the intra-Domain SAV Enhancement based on Controller. TBD.
Figure 5 shows the architecture of the SAV capability enhancement system, which consists of the infrastructure layer, management and control layer, application layer. The infrastructure layer is divided into a data plane and a control plane. Management and control layer refers to a centralized network controller. Application layer at the upper layer can obtain external SAV control policies and display SAV threat information.</t>
          <figure>
            <name>In-domain SAVNET capability enhancement architecture based on network controller</name>
            <artwork><![CDATA[
     +---------------------------------------------------------+
     |                   Application layer                     |
     |     (handle and display, SAV control strategy)          |
     + --------------------------------------------------------+
                                 |
                                 |
     +---------------------------------------------------------+
     |                Manage and control layer                 |
     |  (SAV rule generation and threat information analysis)  |
     + --------------------------------------------------------+
                                 |
                                 |
     +---------------------------------------------------------+
     |                 Infrastructure layer                    |
     |        (SAV rules management, threat escalation)        |
     + --------------------------------------------------------+
]]></artwork>
          </figure>
          <t>The scheme not only has the ability to generate source address verification rules through the source prefix information advertised among devices, but also has the ability to receive the SAV rules/policies generated by the network controller.</t>
          <t>The scheme achives: 
Collaboration of control plane : Coordination between the control plane of infrastructure layer and the centralized network controller.
Collaboration of devices: Collaboration between devices that support SAV and devices that do not support SAV.</t>
        </section>
        <section anchor="inter-domain-savnet-capability-enhancement-program-architecture">
          <name>Inter-domain SAVNET Capability Enhancement Program Architecture</name>
          <t>This section describes the intra-Domain SAV Enhancement based on Controller as showed in figure 6. The controller can collect all SAV-Specific information in the AS, and deliver it to the ASBR device for sending to other adjacent ASs. In addition, controller can obtain more comprehensive information to generate more accurate SAV rules by interacting with external systems. To ensure accurate verification, we recommend that generate SAV rule based on a variety of network information,in, RIB, FIB, IRR, RPKI ROA objects, ASPA objects, network topology, SAV-specific messages, BGP messages and so on..</t>
          <figure>
            <name>Inter-domain SAVNET capability enhancement architecture based on network controllers</name>
            <artwork><![CDATA[
             +----------------------------------------------+
             |         Application layer                    |
             +----------------------------------------------+
                                  |
             +----------------------------------------------+
             |         Network orchestration layer          |
             + ---------------------------------------------+
                       |                            |
                       |                            |
     +----------------------------+    +--------------------------+
     |  Manage and control layer  |    | Manage and control layer |
     |               AS1          |    |            AS2           |
     +----------------------------+    +--------------------------+

]]></artwork>
          </figure>
        </section>
      </section>
    </section>
    <section anchor="scheme-design">
      <name>Scheme design</name>
      <t>This section describes the key technologies, centralized SAV rule generation and use case.</t>
      <section anchor="key-technologies">
        <name>Key technologies</name>
        <t>This section will describe the key technologies of centralized SAV, including the key module of devices and controller, and the interfaces between devices and controller. TBD.</t>
      </section>
      <section anchor="centralized-sav-rule-generation">
        <name>Centralized SAV rule generation</name>
        <t>This section will describe the centralized SAV rules generation method and three steps. TBD.</t>
      </section>
      <section anchor="use-case">
        <name>Use Case</name>
        <t>Several use cases will illustrate that centralized intra-domain SAVNET can achieve more accurate and comprehensive SAV.</t>
        <t>Case 1: More accurate intra-domain edge protection
TBD.</t>
        <t>Case 2: More accurate intra-domain border protection
TBD.</t>
        <t>Case 3: More accurate Inter-domain protection
TBD.</t>
        <t>Case 4: Accurate protection with anycast address
TBD.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBD.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9552">
          <front>
            <title>Distribution of Link-State and Traffic Engineering Information Using BGP</title>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <date month="December" year="2023"/>
            <abstract>
              <t>In many environments, a component external to a network is called upon to perform computations based on the network topology and the current state of the connections within the network, including Traffic Engineering (TE) information. This is information typically distributed by IGP routing protocols within the network.</t>
              <t>This document describes a mechanism by which link-state and TE information can be collected from networks and shared with external components using the BGP routing protocol. This is achieved using a BGP Network Layer Reachability Information (NLRI) encoding format. The mechanism applies to physical and virtual (e.g., tunnel) IGP links. The mechanism described is subject to policy control.</t>
              <t>Applications of this technique include Application-Layer Traffic Optimization (ALTO) servers and Path Computation Elements (PCEs).</t>
              <t>This document obsoletes RFC 7752 by completely replacing that document. It makes some small changes and clarifications to the previous specification. This document also obsoletes RFC 9029 by incorporating the updates that it made to RFC 7752.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9552"/>
          <seriesInfo name="DOI" value="10.17487/RFC9552"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.li-savnet-intra-domain-problem-statement">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="11" month="March" year="2023"/>
            <abstract>
              <t>   This document provides the gap analysis of existing intra-domain
   source address validation mechanisms, describes the fundamental
   problems, and defines the requirements for technical improvements.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-problem-statement-07"/>
        </reference>
        <reference anchor="I-D.li-savnet-intra-domain-architecture">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Fang Gao" initials="F." surname="Gao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>   This document proposes the intra-domain SAVNET architecture, which
   achieves accurate source address validation (SAV) in an intra-domain
   network by an automatic way.  Compared with uRPF-like SAV mechanisms
   that only depend on routers' local routing information, SAVNET
   routers generate SAV rules by using both local routing information
   and SAV-specific information exchanged among routers, resulting in
   more accurate SAV validation in asymmetric routing scenarios.
   Compared with ACL rules that require manual efforts to accommodate to
   network dynamics, SAVNET routers learn the SAV rules automatically in
   a distributed way.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-architecture-07"/>
        </reference>
        <reference anchor="I-D.li-savnet-inter-domain-architecture">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.huang-savnet-sav-table">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
         </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Mingxing Liu" initials="" surname="Liu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   The SAV rules of existing source address validation (SAV) mechanisms,
   are derived from other core data structures, e.g., FIB-based uRPF,
   which are not dedicatedly designed for source filtering.  Therefore
   there are some limitations related to deployable scenarios and
   traffic handling policies.

   To overcome these limitations, this document introduces the general
   SAV capabilities from data plane perspective.  How to implement the
   capabilities and how to generate SAV rules are not in the scope of
   this document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-06"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
