<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-huang-savnet-pi-sav-for-cc-00" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PI-SAV for CC Sources">Provider Interface SAV for Customer Cone Sources</title>
    <seriesInfo name="Internet-Draft" value="draft-huang-savnet-pi-sav-for-cc-00"/>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="October" day="16"/>
    <area>Routing</area>
    <workgroup>savnet</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 50?>
<t>Current source address validation (SAV) on AS's provider interfaces primarily relies on loose uRPF, which can protect against IP spoofing based on unannounced internet prefixes but lacks the ability to defend against spoofing based on valid internet prefixes. Furthermore, if a default route exists, this protection mechanism becomes ineffective.</t>
      <t>Based on the traffic flow characteristics between the ASes in a customer cone, this document describes a general solution architecture -- provider interface SAV for customer cone source spoofing (PI-SAV for CC). This mechanism can be applied on the provider interfaces of an AS to prevent spoofing traffic with the customer cone source addresses from flowing into the local AS and its customer cone. Specially, this mechanism offers protection against reflective amplification DDoS attacks that leverage local servers to target victims within the customer cone.</t>
    </abstract>
  </front>
  <middle>
    <?line 55?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>As described in <xref target="RFC3704"/><xref target="RFC8704"/><xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>, current source address validation on AS provider interfaces is mainly based on the loose uRPF mechanism. This mechanism can only check whether the source address is a valid internet prefix but cannot provide protection for routable prefixes spoofing. Furthermore, if the AS has a default route (many stub ASes configure default routes to reduce BGP processing and FIB table pressure), the protective effect of loose uRPF on routable prefixes will also be nullified.</t>
      <t>Meanwhile, normally the vast majority of DDoS attack traffic flows into the local network through the provider interface side. Studies further indicate that reflective amplification attacks based on source address spoofing constitute the majority of top DDoS attack types.</t>
      <t>The solutions described in this document, based on the customer cone (CC) source address information and its routing characteristics, generates the provider interface based source prefix blocklist for the customer cone prefixes (IBB-mode in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, or IBA-mode combined with loose uRPF if applicable). The design goal is to prevent spoofing packets with the customer cone prefixes from flowing into the local networks, which can reduce the threat of reflective amplification DDoS attacks that leverage local servers to target local users.</t>
      <t>Section 4 introduces the basic solution: PI-SAV for standalone CC. This solution focuses on how to construct a standalone CC -- a subset of CC, in which all member ASes share transit providers on the top AS of the CC, no any other alternative transit provider. Under the valley-free principle of BGP routing, the traffic between the hosts in the Standalone CC must not traverse the provider interfaces of the CC, so a PI-SAV source prefix blocklist can be generated based on this standalone CC.</t>
      <t>Section 5 introduces the improved solution: PI-SAV for standalone+ CC. This solution does not simply assume alternative transit provider will cause CC traffic detour through the provider interfaces as the PI-SAV for standalone CC solution does, but to check whether there is route policy configuration or link failure causing so. If no detour exists, a standalone CC+ can be formed by adding the corresponding ASes (the sub-CC under the alternative transit provider) to the standalone CC. By doing so, a more complete PI-SAV prefix blocklist can be formed based on the standalone CC+. The mechanism for Standalone+ CC solution can also be used to enhance Standalone CC solution, working as an in-band channel to get provider information of CC-Member-AS in stead of relying on out-band RPKI ASPA or SLRUM records.</t>
      <t>Note that this document mainly elaborates the basic principles and general procedures of the solutions, the details for additional information provisioning (e.g. Partial-Transit object management) or communication protocol between ASes for Standalone+ CC is not included.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Customer Cone (CC): a set of ASes that are direct/indirect customer ASes of a given AS, including the customer AS's customer ASes and so on, till the stub ASes.</t>
        <t>CC-Top-AS: the top AS for the customer cone (i.e. the given AS mentioned above), which means all other ASes in the CC are its direct/indirect customer ASes.</t>
        <t>CC-Top-ASBR: ASBR (AS Boarder Router) with the provider interface(s) of the CC-Top-AS, which is the deployment position for the solutions in this document.</t>
        <t>CC-Member-AS: an AS in the customer cone under the CC-Top-AS.</t>
        <t>CC-sub-Transit-AS: a CC-member-AS that has alternative transit provider(s) outside the CC.</t>
        <t>Sub-Transit-CC: the customer cone of a CC-sub-Transit-AS (including the CC-sub-transit-AS and its direct/indirect customer ASes). According valley-free policy of BGP routing, the traffic from the Sub-Transit-CC to other CC-Member-AS may go through the alternative transit link and provider interfaces of CC-Top-ASBR.</t>
        <t>Standalone CC: a subset of CC, all ASes within a Standalone CC share same transit provider(s) on the CC-Top-AS, i.e. the member AS of a Standalone CC has no alternative transit provider outside the CC, all Sub-Transit-CCes in the CC must be excluded. Based on the valley-free principle of BGP routing, the traffic flow between the Standalone CC hosts will not go through the CC-Top-AS's provider interfaces.</t>
        <t>Partial Transit: a special transit provider service between two eBGP neighbors, which is rarely deployed in the wild. When an AS (AS-a) receives the BGP update messages from its customer AS (AS-b), it disseminates the messages only to its peer AS(es) and other customer AS(es), not to its upper transit providers as usual. In this case, AS-a is partial transit provider for AS-b. Partial transit can make the customer AS (and its sub-CC) invisible for the upper transit AS.</t>
        <t>Standalone+ CC: a superset of a Standalone CC that includes the sub-transit-CC(s) which has no detour happened for the CC traffic, i.e., traffic between standalone+ CC hosts will not go through the provider interfaces of the CC-Top-AS. Note that the range of standalone+ CC may change dynamically due to route policy configuration or transit link failure.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="basic-solution-pi-sav-for-standalone-cc">
      <name>Basic Solution: PI-SAV for Standalone CC</name>
      <t>The PI-SAV for Standalone CC solution mainly focuses on solving two key problems: 1) how to construct the standalone CC by deducting the sub-transit-CC(es) from the whole CC without any omission, and 2) how to generate source prefix blocklist for the standalone CC by subtracting the prefix(es) with multi-origin AS.</t>
      <t>Standalone CC construction requires the complete knowledge of the CC-Member-AS and whether each of them has alternative transit provider outside the CC. Basically, CC-Top-ASBR can get the complete list of CC member AS based on BGP local-RIBs if there is no Partial Transit implemented in the CC, that is, ASBR needs to know whether there is any Partial Transit applied in the CC to guarantee the completeness of CC member AS list. Note that, although RPKI ASPA <xref target="I-D.ietf-sidrops-aspa-profile"/> can cover the knowledge of partial transit, and itself can also be used to find the list of CC member AS, it is not recommended to primarily rely on RPKI ASPA for generating CC member list. 1) It will be a long run for RPKI ASPA registration getting ubiquitous, and more importantly, ASPA record themselves cannot indicate whether all ASes have registered. 2) Timeliness due to RPKI record update latency. It is normal situation that the RPKI record updates lay behind the real network changes. 3) It needs to search for all the ASPA records per customer layer, and carefully deal with the race condition between RPKI ASPA records.</t>
      <t>While Standalone CC gets constructed, the initial prefix blocklist for PI-SAV can be generated based on local-RIBs. However, prefix in this list may get involved with multiple origin, that is, the same prefix may also be announced by CC outside network. Furthermore, different ASes in the CC may choose different origin AS path for a specific MOAS prefix, in this case, legitimate traffic with this source prefix may flow in the CC through provider interfaces of the CC, so the CC source prefixes with outside origin AS should be deducted from the initial blocklist. The knowledge of MOAS prefix may be covered by RPKI ROA <xref target="RFC9582"/> and/or RPKI ROA SLURM.</t>
      <t>Based on the above discussion, the solution proposed in this document constructs the PI-SAV blocklist primarily based on local-RIBs information and additional supports from local SLURM and RPKI records. The general procedure for CC-Top-ASBR generating PI-SAV blocklist for Standalone CC listed as below:</t>
      <ol spacing="normal" type="1"><li>
          <t>Initial CC member ASN collection. Includes 2 parts: a) ASNs for all direct customer ASes of the CC-Top-AS. The CC-Top-ASBR should have this information in its system. b) Get partial transit deployment information (ASN of CC-Member-AS which only partial transit with upper ASes in the CC) for the target CC. SLURM based local management for partial transit information is suggested.</t>
        </li>
        <li>
          <t>CC construction. Based on the initial ASNs collected above, find all CC-Member-ASes by searching the local-RIBs for which is under the initial ASN in the AS-paths. The transit relationship between member ASes must be saved for further Sub-Transit-CC construction.</t>
        </li>
        <li>
          <t>Sub-Transit-CC construction. Firstly, check whether there is any alternative transit provider outside the CC for each CC-Member-AS, mark the CC-Member-AS as a CC-Sub-Transit-AS if there is. This can be done by RPKI ASPA records, and SLURM based local support for additional information is encouraged. Note, if the transit provider information is not available for any CC-Member-AS, the AS must be marked as CC-Sub-Transit-AS. Then construct Sub-Transit-CC for each CC-Sub-Transit-AS.</t>
        </li>
        <li>
          <t>Standalone CC construction. Deduct all the Sub-Transit-CCes from the CC to form standalone CC.</t>
        </li>
        <li>
          <t>Generating the initial prefix list for the standalone CC. Based on BGP local-RIBs, collect all prefixes initiated from the member ASes of the Standalone CC.</t>
        </li>
        <li>
          <t>Final prefix blocklist generation. Check whether any prefix in the initial list get involved with multiple origin AS (MOAS), that is, the prefix is originated not only by the AS(es) inside the CC but also by the AS(es) outside the CC, deduct the prefix with MOAS from the initial list. MOAS prefix indentification can be based on RPKI ROA and/or local ROA SLURM records. Local-RIBs-in can also be used to indentify whether there is any external origin AS for a CC source prefix. Note, router implementation in current practice may not save all local-RIBs-in records, so it needs further consideration if we want find all CC prefixes with external origin AS.</t>
        </li>
      </ol>
      <t>Note: the prefix blocklist must avoid improper block while generating the prefix list, which means while a prefix is not sure and hard to determine whether it should be included in the blocklist, just do not include it. The hidden prefix described in <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/> (No-Export and DSR etc.) might be the cases.</t>
    </section>
    <section anchor="improved-solution-pi-sav-for-standalone-cc">
      <name>Improved Solution: PI-SAV for Standalone+ CC</name>
      <t>Although alternative transit link may cause the traffic between CC member ASes detouring through provider interfaces of the CC, however, the detour path, which normally is longer path compared to inner CC path, only happens while specific routing policy configuration or internal transit path failure making so. That is, traffic detour through provider interface for CC communication is not the normal case.</t>
      <t>On the basis of the previous PI-SAV for standalone CC solution, the initial goal of the PI-SAV for standalone+ CC solution is to identify as many prefixes as possible for the PI-SAV blocklist where the Sub-Transit-CC they belongs actually has no detour happen. This solution will be more meaningful if standalone CC can only count a small portion of whole CC.</t>
      <t>Another benefit of the improved solution is that it can enhance PI-SAV for Standalone CC solution by providing additional information support via in-band channel (communication between CC member ASes), rather than heavily relying on out-band source (RPKI and/or local SLURM), where the former can provide more accurate, complete, and timely information support.</t>
      <t>There are two modes described in this document:</t>
      <t>1) Conservative Mode: This mode starts from the standalone CC, forming the standalone+ CC by adding a sub-transit-CC back when it is confirmed that no detour happened for this sub-transit-CC.</t>
      <t>2) Aggressive Mode: This mode starts from the whole CC, forming the standalone+ CC by pruning a sub-transit-CC out when it is confirmed that detour happened for this Sub-Transit-CC. The aggressive mode requires all CC-Sub-Transit-ASes support cooperation with the CC-Top-AS based on the PI-SAV for standalone+ CC solution.</t>
      <section anchor="conservative-mode">
        <name>Conservative Mode</name>
        <t>The general procedures for PI-SAV for Standalone+ CC conservative mode:</t>
        <t>1) CC-Top-ASBR enables PI-SAV for standalone+ CC conservative mode. The system sets the standalone CC as the initial standalone+ CC. And then it sends a notification message to all CC-Member-ASes. The information in the message includes:</t>
        <artwork><![CDATA[
    -- The mode of PI-SAV for standalone+ CC.

    -- CC-Top-ASBR information, including the router identification and information about how it can be connected for member AS to response.

    -- The CC-Member-AS and CC-sub-transit-AS information.
]]></artwork>
        <t>After the notification message, update message must be sent if relevant information changes.</t>
        <t>2) CC-member-AS receives the notification/update message. Based on the BGP local-RIBs, CC-Member-AS verifies whether it has preferred an external transit provider for the BGP updates originated from CC member ASes. Then send response message back to CC-Top-ASBR.</t>
        <t>Since then, response update message must be sent while related route preferences change (due to routing policy or transit link status change etc.).</t>
        <t>3) CC-Top-ASBR receives the response message. It will add the corresponding CC-sub-transit-AS and its sub-transit-CCs into the standalone+ CC while the message shows no detour through alternative provider.</t>
        <t>4) CC-Top-ASBR generates blocklist for Standalone+ CC like standalone CC does, including deduction of MOAS prefixes.</t>
        <t>Note that, in conservative mode, in case no response message is received from a sub-transit-AS, it will be assuming that there is external detour paths exist for it.</t>
        <t>Based on the communication mechanism between CC-Top-AS and CC-Member-AS, the procedure can also be used for enhancing PI-SAV for Standalone CC solution. It can provide more accurate, complete and real-time feedback for additional information required, for example, whether a member AS has partial transit implemented, has external provider existence, or a CC prefix with external origin AS, rather than just relying on out-band pre-registration (RPKI or local SLURM).</t>
      </section>
      <section anchor="aggressive-mode">
        <name>Aggressive Mode</name>
        <t>The general procedures for PI-SAV for Standalone+ CC aggressive mode:</t>
        <t>1) When the CC-Top-ASBR enables PI-SAV for standalone+ CC aggressive mode, the system sets the whole CC as the initial standalone+ CC. Then it sends a notification message to all CC-Member-ASes, the information in the message is similar with conservative mode but with aggressive mode identifier.</t>
        <t>After that, update message need to be sent if relevant information changes.</t>
        <t>2) The CC-Member-AS receives the notification/update message, based on the BGP Local-RIBs, verifying whether it has preferred an external transit provider for the BGP updates originated from CC member ASes. Then send response message back to CC-Top-ASBR.</t>
        <t>Since then, response update message must be sent while related route preference change (due to routing policy or transit link status change etc.).</t>
        <t>3) After CC-Top-ASBR receives the response message, it will prune the corresponding CC-sub-transit-AS and its sub-standalone-CCs from the initial standalone+ CC while the message shows detour through alternative provider.</t>
        <t>4) Only after CC-Top-AS gets response from all CC-sub-transit-ASes, generates blocklist for Standalone+ CC like standalone CC does, including deduction of MOAS prefixes.</t>
        <t>Same as the previous conservative mode, this mechanism can also be used for PI-SAV for Standalone CC solution enhancement.</t>
      </section>
    </section>
    <section anchor="considerations">
      <name>Considerations</name>
      <t>This document focuses on the general solution architecture for PI-SAV for CC, including the communication mechanism between CC-Top-AS and CC-sub-Transit-AS for PI-SAV for Standalone+ CC solution, the details of protocol design is not included. Some considerations:</t>
      <t>1) Deployment Considerations.</t>
      <t>The deployment position for the solutions is suggested for a region center AS, rather than a top/high tier AS with complex connection across regions. This means the ASes in the CC are normally/mainly connected to outside internet through the region top AS, and it would be easier and more efficient for them to implement comprehensive PI-SAV for CC solution.</t>
      <t>Meanwhile, the solution should allow the incremental deployment in this region/the CC, which means some member ASes may not support the solution or some information (e.g. ASPA records for some ASes) may not be available. However, 1) The partial transit information must be fully covered to avoid the hidden AS in the CC. 2) MOAS prefixes must be fully identified to avoid related prefix improper block.</t>
      <t>2) Security Considerations.</t>
      <t>This is mainly related to the communication mechanism between ASes in the Standalone+ scheme. Generally (not base on the detailed protocol design), the communication mechanism must be equipped with the reliability and security features inherent in conventional transport protocols. Additionally, to avoid MITM (Man-in-the-middle) attacks, the protocol message can be encrypted and authenticated based on router-keys.</t>
      <t>Note: the source prefix of response message should not be in the blocklist in case the message needs to detour back through provider interfaces, this can be done at early normal situation.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC9582" target="https://www.rfc-editor.org/info/rfc9582" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9582.xml">
          <front>
            <title>A Profile for Route Origin Authorizations (ROAs)</title>
            <author fullname="J. Snijders" initials="J." surname="Snijders"/>
            <author fullname="B. Maddison" initials="B." surname="Maddison"/>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="D. Kong" initials="D." surname="Kong"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. This document obsoletes RFC 6482.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9582"/>
          <seriesInfo name="DOI" value="10.17487/RFC9582"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-problem-statement-11" xml:base="https://bib.ietf.org/public/rfc/bibxml-ids/reference.I-D.ietf-savnet-inter-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="27" month="August" year="2025"/>
            <abstract>
              <t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-11"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-general-sav-capabilities" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-general-sav-capabilities-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-general-sav-capabilities.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-general-sav-capabilities-02"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-profile-20" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-profile.xml">
          <front>
            <title>A Profile for Autonomous System Provider Authorization</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Uskov" initials="E." surname="Uskov">
              <organization>JetLend</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders"/>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <date day="18" month="August" year="2025"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for Autonomous System Provider Authorization (ASPA) objects for use with the Resource Public Key Infrastructure (RPKI). An ASPA is a digitally signed object through which the issuer (the holder of an Autonomous System identifier), can authorize one or more other Autonomous Systems (ASes) as its upstream providers. When validated, an ASPA's eContent can be used for detection and mitigation of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-profile-20"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
