<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-savnet-source-prefix-advertisement-03" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="SPA-based SAVNET">Source Prefix Advertisement for Intra-domain SAVNET</title>
    <seriesInfo name="Internet-Draft" value="draft-li-savnet-source-prefix-advertisement-03"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="March" day="15"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 50?>

<t>The new intra-domain source address validation (SAV) mechanism requires improving the accuracy (especially avoiding blocking legitimate traffic) and supporting automatic update (see <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>). To this end, this document proposes an intra-domain SAV mechanism, called source prefix advertisement (SPA) for intra-domain SAVNET (SPA-based SAVNET for short), to advance the technology for intra-domain SAV. SPA-based SAVNET allows routers in an intra-domain network to exchange SPA information. By using SPA information and routing information, intra-domain routers can determine more accurate SAV rules in an automatic manner.</t>
    </abstract>
  </front>
  <middle>
    <?line 54?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>The main purpose of intra-domain SAV for an AS is blocking spoofing data packets from host networks and customer networks that use a source address of other networks and blocking spoofing data packets from external ASes that use a source address of the local AS (see <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>). However, existing uRPF mechanisms <xref target="RFC3704"/> will improperly block legitimate data packets in the case of asymmetric forwarding or asymmetric routing, while ACL-based ingress filtering relies entirely on manual update (see <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>).</t>
      <t>To improve the accuracy and enable automatic update, this document proposes an intra-domain SAV mechanism, called source prefix advertisement (SPA) for intra-domain SAVNET (SPA-based SAVNET for short), to advance the technology for intra-domain SAV. SPA-based SAVNET allows routers in an intra-domain network to exchange SPA information. By using SPA information and routing information, intra-domain routers can determine more accurate SAV rules in an automatic manner. It is a general intra-domain SAV mechanism that apply to different network topologies (e.g., mesh topology or tree topology) or routing scenarios (e.g., asymmetric routing or symmetric routing).</t>
      <t>The reader is encouraged to be familiar with <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/> and <xref target="I-D.ietf-savnet-intra-domain-architecture"/>.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV Rule: The rule that describes the mapping relationship between a source address (prefix) and its valid incoming router interface(s).</t>
        <t>SAVNET Router: An intra-domain router that deploys SPA-based SAVNET.</t>
        <t>Host Network: An intra-domain stub network consists of hosts.</t>
        <t>Customer Network: An intra-domain stub network consists of hosts and routers.</t>
        <t>Host-facing Router: An intra-domain router facing an intra-domain host network.</t>
        <t>Customer-facing Router: An intra-domain router facing an intra-domain customer network.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="deployment-scope">
      <name>Deployment Scope</name>
      <t>The deployment scope of SPA-based SAVNET for an AS includes host-facing routers, customer-facing routers, and AS border routers. SPA-based SAVNET allows these routers to exchange SPA information through the existing internal gateway protocol (IGP). By learning SPA information from other SAVNET routers, each SAVNET router can generate an allowlist SAV rule (i.e., "Interface-based prefix allowlist" mode in <xref target="I-D.huang-savnet-sav-table"/>) or a blocklist SAV rule (i.e., "Interface-based prefix blocklist" mode in <xref target="I-D.huang-savnet-sav-table"/>) on the specific router interface:</t>
      <ul spacing="normal">
        <li>
          <t>For host-facing routers, they generate an allowlist SAV rule on interfaces facing a host network. The allowlist SAV rule exactly covers the space of source IP addresses that are used by data packets of the host network.</t>
        </li>
        <li>
          <t>For customer-facing routers, they generate an allowlist SAV rule on interfaces facing a customer network. The allowlist SAV rule exactly covers the space of source IP addresses that are used by data packets of the customer network.</t>
        </li>
        <li>
          <t>For AS border routers, they generate a blocklist SAV rule on interfaces facing an external AS. The allowlist SAV rule exactly covers the space of source IP addresses that are used by data packets of the local AS.</t>
        </li>
      </ul>
      <t>By using the generated allowlist SAV rules or blocklist SAV rules, SPA-based SAVNET effectively blocks spoofing data packets from host networks and customer networks that use a source address of other networks and blocks spoofing data packets from external ASes that use a source address of the local AS, while avoiding blocking legitimate data packets.</t>
      <section anchor="incremental-deployment">
        <name>Incremental Deployment</name>
        <t>SPA-based SAVNET provides incremental benefits when incrementally deployed within the deployment scope. Every SAVNET router that adopts SPA-based SAVNET can identify spoofing data packets coming from a host network, customer network, or an AS. By using allowlist SAV rules, host-facing routers and customer-facing routers that adopt SPA-based SAVNET will block spoofing data packets from host networks and customer networks that use a source address of other networks. By using blocklist SAV rules, AS border routers that adopt SPA-based SAVNET will block spoofing data packets from external ASes that use a source address of the local AS. The network operator can incrementally deploy SPA-based SAVNET in his/her AS to gradually improve the defense against source address spoofing attacks.</t>
        <t>In the following, this document describes the protocol-independent designs for SPA-based SAVNET, include procedures for SPA information generation (in <xref target="subsec-generation"/>), SPA information communication (in <xref target="subsec-communication"/>), and SAV rule generation (in <xref target="subsec-rule"/>).</t>
      </section>
    </section>
    <section anchor="subsec-generation">
      <name>SPA Information Generation</name>
      <t>Each SAVNET router connected to an intra-domain stub network (e.g., a host network or a customer network) generates SPA information. The content of SPA information mainly includes two parts:</t>
      <ul spacing="normal">
        <li>
          <t>Source Prefix List (SPL): This list includes prefixes learned from the router's local routes towards the stub network. Specifically, each Dest Prefix in the router's RIB that has an outgoing interface towards the stub network will be included. If there is no asymmetric route between the SAVNET router and the stub network, the generated SPL should cover the source IP address space used by data packets of the stub network. However, if the asymmetric route exists, the generated SPL may include only a portion of the source IP address space of the stub network.</t>
        </li>
        <li>
          <t>Stub Network Identifier (SNI): This identifier indicates the identity of a stub network. Every intra-domain stub network must have a unique SNI value. Each prefix in the SPL is labeled with the SNI value of the corresponding stub network.</t>
        </li>
      </ul>
    </section>
    <section anchor="subsec-communication">
      <name>SPA Information Communication</name>
      <t>After generating SPA information, each SAVNET router will provide its SPA information to other SAVNET routers. SPA information communication can be implemented by using IGP or iBGP. During the propagation of IGP messages, SAVNET routers can learn both routing information and SPA information. Specific protocol designs or extensions for SPA information communication are not in the scope of this document.</t>
    </section>
    <section anchor="subsec-rule">
      <name>SAV Rule Generation</name>
      <t>After receiving SPA information from other SAVNET routers, SAVNET routers generate allowlist SAV rules or blocklist SAV rules on specific router interfaces.</t>
      <t>The detailed procedure for allowlist generation is as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>Considering all stub networks connected to the router, create a set of SNI values of these stub network. Call it Set A.</t>
        </li>
        <li>
          <t>Considering all SPA information, for each SNI value in Set A, create a set of unique source prefixes that have the same SNI value. Include these prefixes into the allowlist SAV rule at router interfaces facing the stub network which has the same SNI value.</t>
        </li>
      </ol>
      <t>The detailed procedure for blocklist generation is as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>Extract unique prefixes from SPA information and routing information learned from the IGP.</t>
        </li>
        <li>
          <t>Include these prefixes into the blocklist SAV rule at router interfaces facing an external AS.</t>
        </li>
      </ol>
    </section>
    <section anchor="sec-usecases">
      <name>Use Case</name>
      <section anchor="sav-on-host-facing-routers-customer-facing-routers-and-as-border-routers">
        <name>SAV on Host-facing Routers, Customer-facing Routers, and AS Border Routers</name>
        <t>SPA-based SAVNET is used on host-facing Routers, customer-facing Routers, and AS border routers in an intra-domain network. <xref target="fig-use-case1"/> shows an example. Customer Network is multi-homed to Routers A and B. Host Network is single-homed to Router C. Routers D and E are connected to external ASes. Data packets from Customer Network can use source addresses in prefixes P1 and P2. Data packets from Host Network can use source addresses in prefix P3. P' is the source IP address space for intra-domain router IPs and link IPs. Assume there is an asymmetric forwarding behavior or an asymmetric route among Router A, Router B, and Customer Network due to traffic engineering and load balance. For example, Router A forwards only data packets with destination addresses in prefix P1 to Customer Network while Router B forwards only data packets with destination addresses in prefix P2 to Customer Network. However, Customer Network will sends data packets with source addresses in prefixes P1 and P2 to both routers. In this case, as described in <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>, strict uRPF on Router A's Interface # will improperly block data packets with source addresses in prefix P2 and strict uRPF on Router B's Interface # will improperly block data packets with source addresses in prefix P1.</t>
        <figure anchor="fig-use-case1">
          <name>An example of the most recommended use case of SPA-based SAVNET</name>
          <artwork><![CDATA[
            +----------------------------------+                    
            |            Other ASes            |                    
            +----------------------------------+                    
               |                             |                      
+--------------|-----------------------------|--------+             
|   AS         |                             |        |             
|        +-----#----+                  +-----#----+   |             
|        | Router D | -----------------| Router E |   |             
|        +----------+                  +----------+   |             
|              |                             |        |             
|              |                             |        |             
|              |                             |        |             
|        +----------+                  +----------+   |             
|        | Router F |                  | Router G |   |             
|        +----------+                  +----------+   |             
|         /         \                        |        |             
|        /           \                       |        |             
|       /             \                      |        |             
| +----------+   +----------+          +----------+   |             
| | Router A |---| Router B +----------+ Router C |   |             
| +----#-----+   +-------#--+          +-----#----+   |             
|       \               /                    |        |             
|        \             /                     |        |             
|         \           /                      |        |             
|        +--------------+            +--------------+ |             
|        |   Customer   |            |    Host      | |             
|        |   Network    |            |   Network    | |             
|        |  (P1 and P2) |            |    (P3)      | |             
|        +--------------+            +--------------+ |             
+-----------------------------------------------------+                                   
 FIB of Router A:              FIB of Router B:
 Dest   Next_hop               Dest   Next_hop
 P1     Customer Network       P2     Customer Network
 P2     Router B               P1     Router A

SAV Rules generated by SPA-based SAVNET:
- Allowlist at Router A's Interface #: [P1, P2]
- Allowlist at Router B's Interface #: [P1, P2]
- Allowlist at Router C's Interface #: [P3]
- Blocklist at Router D's Interface #: [P1, P2, P3, P']
- Blocklist at Router E's Interface #: [P1, P2, P3, P']
]]></artwork>
        </figure>
        <t>When deploying SPA-based SAVNET in this AS, SAVNET Routers A, B, and C will provide SPA information to other SAVNET routers. By using the received SPA information, Routers A and B will include both prefixes P1 and P2 in the allowlist at the Interface #, because both prefixes have the SNI value of Customer Network, even if the prefix that routers A and B learn from the local route to Customer Network may be different. Router C will include prefix P3 in the allowlist at its Interface #. Routers D and E will include all internal prefixes in the blocklist at their Interfaces #.</t>
      </section>
      <section anchor="a-special-scenario-direct-server-return-dsr">
        <name>A Special Scenario: Direct Server Return (DSR)</name>
        <t>In the case of DSR, the content server in a stub network will send data packets using source addresses of the anycast server in another AS (see <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>). To avoid blocking these special data packets, these specially used source addresses must be added into the allowlist SAV rule at interfaces facing a stub network where the content server locates. Since routers as well as current routing architecture do not have this information, this may requires manual configuration.</t>
      </section>
    </section>
    <section anchor="considerations-of-sav-on-inner-routers">
      <name>Considerations of SAV on Inner Routers</name>
      <t>Host-facing routers, customer-facing routers, and AS border routers serve as key vantage points for performing intra-domain SAV. These routers can effectively prevent spoofing traffic from entering the intra-domain router network, ensuring a more secure and reliable routing environment. In addition to these routers, inner routers (such as Routers F and G in <xref target="fig-use-case1"/>) may also be able to use SPA information to perform SAV. They can use SPA information together with topology information learned from the IGP to infer the possible incoming directions for a source prefix. However, performing SAV on inner routers may be inefficient in certain network topologies, such as mesh networks. This is because every inner router may receive legitimate data packets with the same source IP address from multiple or even all directions. As a result, the use case of SAV on inner routers is limited.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The security considerations described in <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/> and <xref target="I-D.ietf-savnet-intra-domain-architecture"/> also applies to this document.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="I-D.huang-savnet-sav-table" target="https://datatracker.ietf.org/doc/html/draft-huang-savnet-sav-table-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.huang-savnet-sav-table.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Mingxing Liu" initials="" surname="Liu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <date day="10" month="December" year="2024"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-08"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-problem-statement-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="21" month="February" year="2025"/>
            <abstract>
              <t>This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-12"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-architecture-01" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="14" month="October" year="2024"/>
            <abstract>
              <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms [RFC3704] that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL-based ingress filtering [RFC2827] that entirely requires manual efforts to accommodate to network dynamics, SAVNET routers learn SAV rules automatically in a distributed way.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-architecture-01"/>
        </reference>
      </references>
    </references>
    <?line 217?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
