<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wang-bmwg-measure-meth-ip-spoofing-00" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="Remote Measurement of IP Spoofing">Methods for Remotely Measuring IP Spoofing Capability</title>
    <seriesInfo name="Internet-Draft" value="draft-wang-bmwg-measure-meth-ip-spoofing-00"/>
    <author initials="S." surname="Wang" fullname="Shuai Wang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangshuai@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="R." surname="Li" fullname="Ruifeng Li">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lirf@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="Q." surname="Cao" fullname="Qian Cao">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>caoqian@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="April" day="11"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 68?>

<t>This document summarizes and standardizes methods for remotely measuring a network's IP spoofing capability. For outbound spoofing capability measurement, i.e., whether the network allows IP spoofing traffic to be sent from inside the network to the outside of the network, DNS traceroute can be used to check whether spoofed packets are generated in the network and sent to outside of the network. For inbound spoofing capability measurment, i.e., whether the network allows IP spoofing traffic from the outside the network to arrive inside, DNS resolver and ICMPv6 rate limiting mechanism can be utilized to check whether spoofed packets are received by devices in the network.</t>
    </abstract>
  </front>
  <middle>
    <?line 72?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Traditionally, routers only forward packets based on the destination IP address without checking the packet's source IP address. Source IP address spoofing, or IP spoofing, referring to a packet with a forged source IP address, can be used to hide the identity of the sender, or to pretend to be another host. IP spoofing can be exploited by malicious users to launch attacks, such as reflective DDoS attacks and DNS cache poisoning.</t>
      <t>There are two kinds of IP spoofing, i.e., outbound spoofing and inbound spoofing. If a network allows outbound spoofing, a packet with source address different than those assigned to that network can be sent outside the network. In contrast, if a network suffers from inbound spoofing, a packet with source address assigned to that network can enter the network from the outside. In order to prevent from IP spoofing, source address validation (SAV) should be deployed to filtering spoofed packets. Corresponding to the two kinds of IP spoofing, there are also two kinds of SAV deployments. Outbound SAV (OSAV) is deployed to discard outbound spoofing traffic, and inbound SAV (ISAV) is deployed to discard inbound spoofing traffic.</t>
      <t>While deploying SAVs can help discard spoofing traffic, network operators have little incentive to deploy SAVs because they worry about validation accuracy and operational overhead, and even accidental dropping of valid traffic <xref target="inter-domain-ps"/>. Furthermore, deploying OSAV only helps other networks but brings no benefits to the deployer. Even so, network operators are encouraged to deploy OSAV so that when OSAV is widely deployed, every network can benefit.</t>
      <t>Identifying networks that allow IP spoofing, i.e., measuring IP spoofing capabilities, is important to characterize the threats faced by the Internet and help improve the security of the Internet. To measure whether a network can filter spoofing traffic, one can send spoofed packets and observe if the spoofed packets will be received. <xref target="osav-measure"/> and <xref target="isav-measure"/> illustrate the basic ideas of outbound spoofing capability and inbound spoofing capability measurements, respectively. For outbound spoofing capability measurement, spoofed packets with source addresses in prefix P1 are sent from the audited network AS 3, and if a host in AS 2 can receive the spoofed packets, then AS 3 allows outbound spoofing. For inbound spoofing capability measurement, spoofed packets with source addresses in prefix P1 are sent to the audited network AS 1, and if a host in AS 1 can receive the spoofed packets, then AS 1 allows inbound spoofing.</t>
      <figure anchor="osav-measure">
        <name>An example for illustrating the basic idea of outbound spoofing capability measurement.</name>
        <artwork><![CDATA[
                              Spoofed Packets
+-----------+     +--------+  with Source Addresses in P1   +--------+
| AS 1 (P1) #-----#  AS 2  #<-------------------------------#  AS 3  |
+-----------+     +--------+                                +--------+

Prefix P1 belongs to AS1, and AS 3 sends spoofed packets with 
source addresses in P1 to AS 2.
If AS 3 allows outbound spoofing, the spoofed packets will be 
received by AS 2. Otherwise, they will be dropped by AS 3.
]]></artwork>
      </figure>
      <figure anchor="isav-measure">
        <name>An example for illustrating the basic idea of inbound spoofing capability measurement.</name>
        <artwork><![CDATA[
                 Spoofed Packets
+-------------+  with Source Addresses in P1   +--------+
#  AS 1 (P1)  #<-------------------------------#  AS 2  |
+-------------+                                +--------+

Prefix P1 belongs to AS1, and AS 2 sends spoofed packets with 
source addresses in P1 to AS 1.
If AS 1 allows inbound spoofing, the spoofed packets will be 
received by AS 1. Otherwise, they will be dropped by AS 1.
]]></artwork>
      </figure>
      <t>Obviously, if a client can be deployed in the audited network to actively send spoofed packets to a controlled server and passively receive spoofed packets from a controlled server, the IP spoofing capability of the audited network can be easily measured. Based on the idea of client-based measurement, CAIDA spoofer project has collected data from 11,403 autonomous systems in 219 countries since 2015. However, CAIDA spoofer project heavily relies on volunteers in different networks to improve measurement coverage. This results in two limitations. First, it is quite challenging to involve lots of volunteers, especially new volunteers. For example, hundreds of ASes are measured by CAIDA spoofer project every month, where only tens of them are never measured before every month. Second, volunteers attracted by CAIDA spoofer project are generally more concerned about IP spoofing than others. This may cause biaes when characterising the IP spoofing in the Internet, i.e., underestimating the number of ASes that allow IP spoofing.</t>
      <t>Therefore, remote measurement of IP spoofing without active cooperations from volunteers in the audited network is critical to improve measurement coverage and randomness. This document describes some methods for remotely measuring IP spoofing capabilities in the Internet. These methods have been proposed publicly before, and the goal of this document is to standlize these remote measurement methods, and exclude false measurement results by imporving these methods.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>Spoofed Packet:</dt>
        <dd>
          <t>A packet with forged source IP address. That is, the source IP address of the packet is not the legitimate IP address assigned to the sender.</t>
        </dd>
        <dt>IP Spoofing:</dt>
        <dd>
          <t>The behavior where a network does not discard spoofed packets that pass through it.</t>
        </dd>
        <dt>IP Spoofing Capability:</dt>
        <dd>
          <t>The capability of a network to transmit spoofed packets.</t>
        </dd>
        <dt>Outbound Spoofing:</dt>
        <dd>
          <t>The behavior where a network does not discard spoofed packets sent from the network to the outside.</t>
        </dd>
        <dt>Inbound Spoofing:</dt>
        <dd>
          <t>The behavior where a network does not discard spoofed packets sent from the outside to the network.</t>
        </dd>
        <dt>Outbound Spoofing Capability:</dt>
        <dd>
          <t>The capability of a network to send spoofed packets to the outside of it.</t>
        </dd>
        <dt>Inbound Spoofing Capability:</dt>
        <dd>
          <t>The capability of a network to receive spoofed packets from the outside of it.</t>
        </dd>
        <dt>Outbound Source Address Validation:</dt>
        <dd>
          <t>The mechanism that discards spoofed packets sent from a network to the outside of it.</t>
        </dd>
        <dt>Inbound Source Address Validation:</dt>
        <dd>
          <t>The mechanism that discards spoofed packets sent from the outside of a network to it.</t>
        </dd>
      </dl>
    </section>
    <section anchor="outbound-spoofing-capability-measurement-method">
      <name>Outbound Spoofing Capability Measurement Method</name>
      <t>We can measure outbound spoofing capability remotely by exploiting address rewriters inside the audited network. An address rewriter modifies the destination IP address of packets sent to it to another address but leaves the source IP address unchanged. In this way, the modified packet becomes a spoofed packet because the source IP address of the packet sent by the address rewriter does not belong to it. Marc Kuhrer et al. exploits DNS proxies as address rewriters <xref target="dns-proxy"/>. Specifically, they send DNS queries to DNS proxies in the audit network. If a DNS response is received from a host other than the intended DNS proxy, they assume the DNS proxy is on a network that allows outbound spoofing.</t>
      <figure anchor="exp-address-rewriter">
        <name>The example of how an address rewriter generates spoofed packets.</name>
        <artwork><![CDATA[
+---------------------+                  +--------------------+
|   +-------------+   |                  |   +------------+   |
|   | Scanner IP1 #---|------------------|--># Target IP2 |   |
|   +------#------+   |   From: IP1      |   +------#-----+   |
|         /\          |   To:   IP2      |          |         |
| AS1      |          |                  | AS2      |         |
+---------------------+                  +--------------------+
           |                                        |
 From: IP3 |        +----------------------+        | From: IP1
 To:   IP1 |        |   +--------------+   |        | To:   IP3
           +--------|---# Receiver IP3 #<--|--------+
                    |   +--------------+   |
                    | AS3                  |
                    +----------------------+

Target IP2 forwards the packet by changing the destination IP address to 
IP3 and leaving the source IP address unchanged. This behavior looks like
the target sends spoofed packets directly with the source IP address IP1.
]]></artwork>
      </figure>
      <t>As illustrated in <xref target="exp-address-rewriter"/>, an address rewriter (IP2) forwards the packet by changing the destination IP address and keeping the source IP address unchanged. The address rewriters may be due to the misconfigured destination NAT, which translates the destination IP address of incoming packets to a preset address (IP3). Since the source IP address of the modified packet is the scanner (IP1), the scanner will receive the response from the receiver IP3, even though the scanner has never sent a packet to the receiver. This process can be used to determine whether the target network (AS2) blocks spoofed packets since this behavior looks like the target IP2 is sending spoofed packets directly with the forged source IP address IP1.</t>
      <figure anchor="exp-alias">
        <name>The example of how an alias target responds.</name>
        <artwork><![CDATA[
+---------------------+                  +--------------------+
|   +-------------+   |                  |   +------------+   |
|   |             |   |                  |   |     Target |   |
|   | Scanner IP1 #---|------------------|-->#IP2         |   |
|   |             |   |   From: IP1      |   |     IP3    |   |
|   +------#-----+    |   To:   IP2      |   +------#-----+   |
|         /\          |                  |          |         |
| AS1      |          |                  | AS2      |         |
+---------------------+   From: IP3      +--------------------+
           |              To:   IP1                 |
           +----------------------------------------+

Target has two interfaces with source IP addresses of IP2 and IP3. In 
this case, the target will receive packets with IP2 but respond to them 
with IP3.
]]></artwork>
      </figure>
      <t>From the scanner's perspective, it sends a packet to IP2 but receives the response from IP3. However, this phenomenon does not always indicate an address rewriter. As illustrated in <xref target="exp-alias"/>, a target with two interfaces can receive packets from one interface but respond with another. The behavior of alias targets does not generate spoofed packets and cannot be used to measure outbound spoofing capability.</t>
      <t>We can use traceroute to distinguish between address rewriters and alias targets. Traceroute sends packets with increasing Time-To-Live (TTL) values, exploiting ICMP Time Exceeded messages from intermediate routers sequentially revealing the network path between the source and destination. Moreover, we can figure out the network path between an address rewriter and its receiver since address rewriters usually send modified packets without resetting TTL values. With the help of quoted packets in ICMP error messages, we can detect the change of the destination IP address of the packets from the scanner, which indicates an address rewriter.</t>
      <figure anchor="exp-sav-not-deployed">
        <name>The example of how to identify a network that does not block spoofed packets.</name>
        <artwork><![CDATA[
+---------------------+                  +--------------------+
|   +-------------+   |                  |   +------------+   |
|   | Scanner IP1 #---|------------------|--># Target IP2 |   |
|   +------#------+   |   From: IP1      |   +------#-----+   |
| AS1     /\          |   To:   IP2      | AS2      |         |
+----------|----------+                  +----------|---------+
           | From: IP3                              | From: IP1
           | To:   IP1                              | To:   IP3
+----------|----------+                  +----------V---------+
|   +------#-------+  |                  |   +------#-----+   |
|   | Receiver IP3 #<------------------------# Router IP4 |   |
|   +--------------+  |   From: IP1      |   +------------+   |
| AS3                 |   To:   IP3      | AS4                |
+---------------------+                  +--------------------+


The spoofed packets generated by the target are not blocked, and the 
scanner performing a traceroute to the target can receive both the ICMP 
Time Exceeded message from IP4 and the response packet from IP3.
]]></artwork>
      </figure>
      <t>When an address rewriter in the target network is identified, we can measure whether the target network blocks spoofed packets. As illustrated in <xref target="exp-sav-not-deployed"/>, if the target network does not block spoofed packets, the spoofed packets will be transmitted outside the target network. Then, the scanner may receive the response from the receiver (IP3) and/or receive ICMP Time Exceeded messages from routers (e.g., IP4) outside the target network. As long as the scanner receives packets from outside the target network, we know that the spoofed packets do arrive outside the target network. Therefore, the target network does not block spoofed packets.</t>
      <figure anchor="exp-sav-deployed">
        <name>The example of how to check whether a network blocks spoofed packets.</name>
        <artwork><![CDATA[
+---------------------+                  +---------------------+
|   +-------------+   |                  |   +------------+    |
|   | Scanner IP1 #---|------------------|--># Target IP2 |    |
|   +-------------+   |   From: IP1      |   +------#-----+    |
|                     |   To:   IP2      |          |From: IP1 |
|                     |                  |          |To:   IP3 |
| AS1                 |                  | AS2      V          |
+---------------------+                  +----------x----------+
                                                 blocked
                    +----------------------+
                    |   +--------------+   |
                    |   | Receiver IP3 |   |
                    |   +--------------+   |
                    | AS3                  |
                    +----------------------+
The spoofed packet generated by the target is blocked, and the
scanner will never receive responses from IP3.
]]></artwork>
      </figure>
      <t>On the other hand, as illustrated in <xref target="exp-sav-deployed"/>, if the target network blocks spoofed packets, the spoofed packets will never be transmitted to the receiver. As a result, the scanner will never receive any response from the receiver. However, there are two cases where the scanner can not receive any response from the receiver: one is that the spoofed packet is blocked, and the other is that the receiver does not respond to packets from the scanner. To distinguish between the two cases, we send a regular packet from the scanner to the receiver to check whether the receiver responds to packets from the scanner. If the receiver can respond to packets coming directly from the scanner, but the spoofed packets fail to trigger a response from the receiver, we assume that the target network blocks the spoofed packets.</t>
    </section>
    <section anchor="inbound-spoofing-capability-measurement-method">
      <name>Inbound Spoofing Capability Measurement Method</name>
      <t>The key idea of inbound spoofing capability measurement is to first send some spoofed packets to the target network and then observe whether the spoofed packets arrive inside of the target network. To this end, DNS resolvers <xref target="dns-resolver"/> and Customer Premises Equipment (CPE) devices <xref target="ICMPv6"/> can be leveraged for the observation.</t>
      <section anchor="measurement-method-leveraging-dns-resolvers">
        <name>Measurement Method Leveraging DNS Resolvers</name>
        <figure anchor="exp-spoofing-scan">
          <name>The example of sending DNS query with forged source address.</name>
          <artwork><![CDATA[
+-----------------+               +------------------------------------+
|  AS1            |               |  AS2                               |
|                 |               |  +--------------+   +-----------+  |
| +-------------+ |   DNS query   |  | DNS resolver |   |    Host   |  |
| | Scanner IP1 #-|---------------|->#     IP2      #-->#    IP3    |  |
| +-------------+ |   From:IP3    |  +------+-------+   +-----------+  |
|                 |   To:IP2      |         |                          |
+-----------------+               +------------------------------------+
                                            |
                                            V
                                     +------#------------+
                                     | Authoritative DNS |
                                     | nameserver (ADNS) |
                                     +-------------------+
]]></artwork>
        </figure>
        <t><xref target="exp-spoofing-scan"/> shows the scanning setup for AS2. The scanner in AS1 sends a DNS query with forged IP addresses IP3, which belongs to the audited network (AS2), to a DNS resolver in AS2. If the audited network allows inbound spoofing, the DNS resolver will receive the spoofed DNS query. Next, the DNS resolver will send another DNS query to our controlled authoritative DNS nameserver to resolve. Therefore, if the controlled authoritative DNS namesever receives the DNS query from the DNS resolver in the audited network, the audited network AS2 does not filter the spoofed packets from outside.</t>
        <t>However, if the controlled authoritative DNS nameserver does not receive the DNS query, we can not assume that the audited network filters the spoofed packets, since there may be no DNS resolver in the audited network. To futher identify networks that filter inbound spoofing traffic, we send a non-spoofed DNS query from the scanner to the same target IP address. If the controlled authoritative DNS nameserver receives a DNS query triggered by the non-spoofed DNS query, a DNS resolver exists in the audited network. As a result, if the DNS resolver does not resolve the spoofed query, we can conclude that the audited network does not allow inbound spoofing.</t>
        <figure anchor="resolver-network-type">
          <name>Classification of results based on DNS resolvers.</name>
          <artwork><![CDATA[
                                        SPOOFED DNS QUERY 

N                        ADNS receives no query    ADNS receives a query
O  D                  +---------------------------------------------------+
N  N   ADNS receives  |                          |                        |
|  S     a query      | block inbound spoofing   | allow inbound spoofing |
S                     |                          |                        |
P  Q                  -----------------------------------------------------
O  U   ADNS receives  |                          |                        |
O  E     no query     |         unknown          | allow inbound spoofing |
F  R                  |                          |                        |
E  Y                  +---------------------------------------------------+
D     
]]></artwork>
        </figure>
        <t>As illustrated in  <xref target="resolver-network-type"/>, there are four cases when combining spoofed DNS query and non-spoofed DNS query.</t>
        <ul spacing="normal">
          <li>
            <t>First, the authoritative nameserver receives DNS requests in both spoofing scan and non-spoofing scan, suggesting that the audited network allows inbound spoofing, and the DNS resolver is open.</t>
          </li>
          <li>
            <t>Second, the authoritative server receives the DNS request only in spoofing scan, suggesting that the audited network allows inbound spoofing, and the DNS resolver is closed.</t>
          </li>
          <li>
            <t>Third, the authoritative server receives the DNS request only in non-spoofing scan, suggesting that the audited network does not allow inbound spoofing.</t>
          </li>
          <li>
            <t>Fourth, the authoritative namesever does not receive any DNS request. This suggests that no DNS resolver in the audited network can be leveraged to measure inbound spoofing capability. Therefore, the ability of the network to filter inbound spoofing traffic is unknown.</t>
          </li>
        </ul>
      </section>
      <section anchor="measurement-method-based-on-icmpv6-rate-limiting">
        <name>Measurement Method Based on ICMPv6 Rate Limiting</name>
        <t>As suggested by RFC 4443 <xref target="RFC4443"/>, in order to limit the bandwidth and forwarding costs incurred by originating ICMPv6 error messages, an IPv6 node <bcp14>MUST</bcp14> limit the rate of ICMPv6 error messages it originates. This provides an opportunity to infer whether the spoofed packets arrive inside of the audited network based on the state of ICMPv6 rate limiting.Since most of IPv6 addresses are inactive, an ICMP error message will be fed back from CPE devices when we send an ICMP echo request to a random IP address in the audited network. If the CPE device limits the rate of ICMPv6 error messages it originates, it can be utilized as a remote vantage point (RVP).</t>
        <t><xref target="ICMP-based-msr"/> illustrates the ICMPv6-based measurement method. We have a local scanner P1 in AS1, and AS2 is the audited network. Three rounds of testing with N and N+M ICMP echo requests packets are conducted in the measurement, and thus three values rcv1, rcv2, and rcv3 can be obtained respectively. Based on this, we can infer whether the audited network filters the spoofed packets by comparing rcv1, rcv2, and rcv3.</t>
        <figure anchor="ICMP-based-msr">
          <name>Three round tests of ICMPv6-based measurement method.</name>
          <artwork><![CDATA[
+------------------+                          +-----------------------------+
| AS1              |                          |  AS2        +------------+  |
|  +-----------+   |                          |  +-----+    |Unreachable |  |
|  |Scanner(P1)|   |                          |  | RVP |    |IP address T|  |
|  +---+-------+   |                          |  +---#-+    +--#---------+  |
|      |           |                          |      |         |            |
+------------------+                          +-----------------------------+
       |                                             |         |
       +--------+ N ICMP echo requests  +--------------------->+
       |             src:P1 dst:T                    |         |
round 1|                                             |         |
       +<-------+ rcv1 ICMP Error Messages +---------+         |
       |                                             |         |
       |                                             |         |
       +--------+ N ICMP echo requests +---------------------->+
       |             src:P1 dst:T                    |         |
round 2|                                             |         |
       +--------+ M ICMP echo requests +---------------------->+
       |        src:arbitrary IP in AS1,dst:T        |         |
       |                                             |         |
       +<-------+ rcv2 ICMP Error Messages +---------+         |
       |                                             |         |
       |                                             |         |
       |XXXXXXXXXXXXXXXXX SCENARIO 1 XXXXXXXXXXXXXXXXXXXXXXXXXX|
       |                                             |         |
       +--------+ N ICMP echo requests +---------------------->+
       |             src:P1, dst:T                   |         |
       |                                             |         |
       +--------+ M ICMP echo requests +---------------------->+
       |         src:arbitrary IP in AS2,dst:T       |         |
       |                                             |         |
       |XXXXXXXXXXXXXXXXX SCENARIO 2 XXXXXXXXXXXXXXXXXXXXXXXXXX|
round 3|                                             |         |
       +--------+ N ICMP echo requests  +--------------------->+
       |             src:P1 dst:T                    |         |
       |                                         XX  |         |
       +--------+ M ICMP echo requests +-------->XX  |         |
       |         src:arbitrary IP in AS2,dst:T   XX  |         |
       |                                         XX  |         |
       |XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX|
       |                                             |         |
       +<-------+ rcv3 ICMP Error Messages +---------+         |
]]></artwork>
        </figure>
        <t>As illustrated in <xref target="ICMP-based-msr"/>, in the first round test, N ICMP echo requests are sent to a target with inactive IPv6 address in the audited network, and then RVP will resposnd with rcv1 ICMP error messages to the scanner. In the second round test, besides the same N probe packets, extra M ICMP echo requests with forged source address that belongs to AS1 (noise packets) are sent to the target simultaneously. The number of ICMP error messages in the second round test are defined as rcv2. Similar to the second round test, in the third round test, M ICMP echo requests with forged source address that belongs to AS2 (spoofed packets) are sent to the target. The number of ICMP error messages in the third round test are defined as rcv3.</t>
        <t>Comparing rcv1 and rcv3, if rcv1 &gt; rcv3, it can be considered that the spoofed packets are not filtered in the third round test, suggesting that the audited network allows inbound spoofing. Comparing rcv2 and rcv3, if rcv2 &lt; rcv3, it can be inferred that the target network has filtered the spoofed packet in the third round test, and thus is able to filter inbound spoofing traffic. The ability of filtering inbound spoofing traffic can be inferred according to the following rules.</t>
        <ul spacing="normal">
          <li>
            <t>If rcv3 &lt; a*rcv1, then the network allow inbound spoofing;</t>
          </li>
          <li>
            <t>Else if rcv2 &lt; a*rcv3, then the network does not allow inbound spoofing;</t>
          </li>
          <li>
            <t>Else, the ability of filtering inbound spoofing traffic cannot be determined.</t>
          </li>
        </ul>
        <t>where a is a factor to avoid potential interference from fast-changing network environments, satisfying 0 &lt; a &lt; 1.</t>
      </section>
    </section>
    <section anchor="measurement-results">
      <name>Measurement Results</name>
      <figure anchor="meas-res">
        <name>Measurement results for a single month.</name>
        <artwork><![CDATA[
+----------------------------------+-----------------+
|            Type                  | # ASes          |
+----------------------------------+-----------------+
| IPv4 Outbound Spoofing Blocked   | 373             |
+----------------------------------+-----------------+
| IPv4 Outbound Spoofing Unblocked | 5,309           |
+----------------------------------+-----------------+
| IPv4 Inbound Spoofing Unblocked  | 35,163          |
+----------------------------------+-----------------+
| IPv6 Inbound Spoofing Blocked    | 3,677           |
+----------------------------------+-----------------+
| IPv6 Inbound Spoofing Unblocked  | 8,174           |
+----------------------------------+-----------------+
]]></artwork>
      </figure>
      <t>As shown in <xref target="meas-res"/>, with the address rewriter-based method, we found spoofed packets sent from 373 IPv4 ASes are blocked, and 5,309 IPv4 ASes are not. With the DNS resolver-based method, we found 35,163 IPv4 ASes did not block spoofed packets from outside. Combining DNS resolver-based method and ICMPv6-based method, we found that 8,174 IPv6 ASes did not block spoofed packets from outside, and 3,677 IPv6 ASes blocked spoofed packets from outside.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta"/>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol). ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="inter-domain-ps" target="https://datatracker.ietf.org/doc/draft-ietf-savnet-inter-domain-problem-statement/">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="dns-proxy" target="https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-kuhrer.pdf">
          <front>
            <title>Exit from hell? Reducing the impact of amplification DDoS attacks</title>
            <author>
              <organization>Marc Kuhrer, Thomas Hupperich, Christian Rossow, and Thorsten Holz, Ruhr-University Bochum</organization>
            </author>
            <date year="2014"/>
          </front>
        </reference>
        <reference anchor="dns-resolver" target="https://ieeexplore.ieee.org/document/10082958">
          <front>
            <title>The Closed Resolver Project: Measuring the Deployment of Inbound Source Address Validation</title>
            <author>
              <organization>Yevheniya Nosyk, Maciej Korczynski, Qasim Lone, Marcin Skwarek, Baptiste Jonglez, Andrzej Duda</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="ICMPv6" target="https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_s49_paper.pdf">
          <front>
            <title>Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels</title>
            <author>
              <organization>Long Pan, Jiahai Yang, Lin He, Zhiliang Wang, Leyao Nie, Guanglei Song, Yaozhong Liu</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
