<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wang-sav-deployment-status-00" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="SAV Deloyment Status">Source Address Validation Deployment Status</title>
    <seriesInfo name="Internet-Draft" value="draft-wang-sav-deployment-status-00"/>
    <author initials="S." surname="Wang" fullname="Shuai Wang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangshuai@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="R." surname="Li" fullname="Ruifeng Li">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lirf@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="H." surname="Lin" fullname="He Lin">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>he-lin@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 91?>

<t>This document provides a summary of methods for measuring the deployment status of source address validation, with an overview of its deployment status. It reviews various methods for measuring outbound and/or inbound source address validation, including established tools like CAIDA Spoofer, as well as recently proposed remote measurement methods. By combining results from these different methods, the document offers a comprehensive overview of the status of source address validation deployment across the Internet.</t>
    </abstract>
  </front>
  <middle>
    <?line 95?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>IP spoofing, sending packets with source addresses that do not belong to the sending host, is one of the long-standing security threats in the Internet. Source address validation (SAV) is important for protecting networks from IP spoofing attacks. Several techniques have been proposed to validate the source address of traffic, including Access Control List (ACL), unicast Reverse Path Forwarding (uRPF), and Virtual routing and forwarding (VRF) table. SAV can be categorized into two types: outbound SAV (OSAV) and inbound SAV (ISAV). OSAV discards spoofed packets originating from within a network and destined for external destinations, while ISAV focuses on filtering spoofed packets arriving from external sources to the network.</t>
      <t>The MANRS initiative considers IP spoofing as one of the most common routing threats, and defines a recommended action to mitigate spoofing traffic <xref target="manrs"/>, encouraging network operators to implement SAV for their own infrastructure and end users, and for any Single-Homed Stub Customer Networks. However, as a recommended action, not all MANRS members follow this action to implement SAV for their networks, and only 1.6% of all routed ASes participate in MANRS. As a result, there is a lack of comprehensive knowledge regarding the current status of SAV deployment across the Internet community.</t>
      <t>This document aims to provide a comprehensive view about SAV deployment in the Internet. The topics discussed in this document are organized into three main sections.</t>
      <ul spacing="normal">
        <li>
          <t>Section 3 summarizes methods for measuring the deployment of OSAV.</t>
        </li>
        <li>
          <t>Section 4 summarizes methods for measuring the deployment of ISAV.</t>
        </li>
        <li>
          <t>Section 5 describes and analyzes the SAV deployment based on the measurement results derived from these methods.</t>
        </li>
      </ul>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>Spoofed Packet:</dt>
        <dd>
          <t>A packet with forged source IP address. That is, the source IP address of the packet is not the legitimate IP address assigned to the sender.</t>
        </dd>
        <dt>Outbound Spoofing:</dt>
        <dd>
          <t>The behavior where a network does not discard spoofed packets sent from the network to the outside.</t>
        </dd>
        <dt>Inbound Spoofing:</dt>
        <dd>
          <t>The behavior where a network does not discard spoofed packets sent from the outside to the network.</t>
        </dd>
        <dt>Outbound Source Address Validation (OSAV):</dt>
        <dd>
          <t>The mechanism that discards spoofed packets sent from a network to the outside of it.</t>
        </dd>
        <dt>Inbound Source Address Validation (ISAV):</dt>
        <dd>
          <t>The mechanism that discards spoofed packets sent from the outside of a network to it.</t>
        </dd>
        <dt>Filtering Granularity:</dt>
        <dd>
          <t>The granularity of source address validation. If filtering granularity is /8, the network allows packets to be sent with any address that belong to the same /8 prefix as its own address. However, if filtering granularity is /8, the network allows to receive packets with any address as the source address that belongs to a different /8 prefix than its own address.</t>
        </dd>
        <dt>Filtering Depth:</dt>
        <dd>
          <t>The deployment depth of souce address validation. If filtering depth is 3, the source address validation is deployed 3 hops away from the sender for OSAV.</t>
        </dd>
        <dt>Authoritative DNS Nameserver (ADNS):</dt>
        <dd>
          <t>A DNS server that holds the definitive records for a domain and responds to DNS queries for that domain.</t>
        </dd>
      </dl>
    </section>
    <section anchor="outbound-source-address-validation-measurement-methods">
      <name>Outbound Source Address Validation Measurement Methods</name>
      <t>To measure whether a network deploys OSAV, a common idea of different methods is to send spoofed packets from the network inside, and observe whether the spoofed packets reach the outside of the network. The SAV research community has proposed 3 methods for measuring OSAV deployment, i.e., client-based method, proxy-based method and DNAT-based method.</t>
      <section anchor="client-based-method">
        <name>Client-based Method</name>
        <t>As shown in <xref target="osav-client-figure"/>, by deploying a measurement client on a host in the audited network, the client can actively generate and send spoofed packets to the outside of the audited network. Hence, it is easy to learn whether spoofed packets have reached the outside of the network. Also, the client can set the time-to-live (TTL) of spoofed packets incrementally, and thus the forwarding path of the spoofed packets can be learned in a way like traceroute.</t>
        <figure anchor="osav-client-figure">
          <name>An example of client-based OSAV measurement.</name>
          <artwork><![CDATA[
    audited network
+---------------------+                          +--------------------+
|   +-------------+   |           (1)            |   +------------+   |
|   | client IP1  #---|--------------------------|--># controlled |   |
|   +-------------+   |   From: forged address   |   | server IP2 |   |
|                     |   To:   IP2              |   +------------+   |
| AS1                 |                          | AS2                |
+---------------------+                          +--------------------+

The client actively sends a set of spoofed packets to the controlled
servers outside of the audited network.
]]></artwork>
        </figure>
        <t>Benefiting from the controlbitly, a client can generate spoofed packets with arbitrary IP addresses as its source addresses. Hence, filtering granularity can be measured by observing which spoofed packets can reach outside of the audited network. Similarly, filtering depth can be measured by observing how far the spoofed packets reach.</t>
        <t>The most famous client tool is the CAIDA Spoofer project <xref target="spoofer"/>, which re-launched in 2015. A CAIDA Spoofer client sends various spoofed packets to a set of servers maintained by the project, and based on the spoofed packets received by the servers, the project is able to infer the filtering granularity of SAV on paths traversed by these packets. The CAIDA Spoofer project employs tracefilter to measure where a SAV mechanism is deployed. Speicifically, a client sends spoofed packets with specially crafted TTLs, and when the packet's TTL expires, an ICMP TTL exceeded message will be sent to a controlled server. Based on the largest TTL among received ICMP messages, the project can infer the number of hops away from the client before spoofed packets are discarded.</t>
        <t>The CAIDA Spoofer project relies on volunteers to spoof from many points in the network. If a volunteer installs the client within a Network Address Translation (NAT) network, CAIDA Spoofer will report the presence of a NAT device, and thus spoofed packets may be blocked by the NAT devices, rather than a SAV mechanism. Due to the wide deployment of NAT, though more than two thousands ASes were tested by the CAIDA Spoofer project in 2024, only about half of them were tested based on public IP addresses.</t>
      </section>
      <section anchor="proxy-based-method">
        <name>Proxy-based Method</name>
        <t><xref target="dns-proxy"/> relies on misbehaving DNS proxies to perform remote measurement of IP spoofing. As illustrated in <xref target="proxy-figure"/>, the measurement conducter controls a scanner, a DNS authoritative nameserver, and a domain name, but does not have control over the audited network. The scanner first sends a DNS query for the domain name to a DNS proxy in the audited network, i.e., the destination IP address of the DNS query is the DNS proxy. However, due to the misbehaviors of the DNS proxy, it will forward the query to a DNS resolver without changing the source IP address of the query. In this way, the DNS proxy creates a spoofed packet whose source IP address does not belong to the audited network. If the spoofed packet is not discared along the path, the DNS resolver will communicate with the controlled authoritative nameserver to resolve the domain name. Finally, the DNS resolver will directly respond to the scanner, since the source IP address of the DNS query received by the DNS resolver is the scanner. Hence, if the scanner receives a DNS response whose source address is different from the destination address of the DNS query, the network is considered to have no OSAV deployment.</t>
        <figure anchor="proxy-figure">
          <name>An example of proxy-based OSAV measurement.</name>
          <artwork><![CDATA[
                                            audited network
+---------------------+                  +--------------------+
|   +-------------+   |       (1)        |   +------------+   |
|   | scanner IP1 #---|------------------|--># proxy  IP2 |   |
|   +-------------+   |   From: IP1      |   +------#-----+   |
|         ^           |   To:   IP2      |          |         |
| AS1     |           |                  | AS2      | (2)     |
+---------------------+                  +--------------------+
          | From: IP3                               | From: IP1
          | To:   IP1    +----------------------+   | To:   IP3
      (4) |              |   +--------------+   |   | 
          +--------------|---| resolver IP3 #<--|---+ 
                         |   +--------------+   |
                         |          ^           |
                         | AS3      |           | 
                         +----------------------+ 
                                    |
        +----------+            (3) |
        |   ADNS   #<---------------+
        +----------+

The scanner sends a DNS query with IP1 as the source to the DNS proxy
(IP2). The proxy forwards the query to the DNS resolver, with the source 
IP address remaining as IP1. The resolver resolves the domain name using 
the authoritative name servers and responds directly to the scanner.
]]></artwork>
        </figure>
        <t>Note that the IP address of the DNS proxy is also encoded into the domain name before sending to the DNS proxy, so that a DNS response can be matched with the corresponding DNS query. In addition, there is no need to find misbehaving DNS proxies before sending DNS queries to them. Instead, we can send DNS queries directly to all the routable address space one by one. If the destination address of a DNS query is used by a misbehaving DNS proxy, the scanner will receive a DNS response with an unexpected source address.</t>
        <t>Proxy-based method can efficiently identify networks that do not deploy OSAV in a remote manner, but fails to identify networks that deploy OSAV. This is because, if OSAV is deployed in the audited network, the scanner will receive no DNS response, which is indistinguishable from the absence of a DNS proxy in the audited network.</t>
      </section>
      <section anchor="dnat-based-method">
        <name>DNAT-based Method</name>
        <t><xref target="DNAT"/> improves the proxy-based method by extending more than DNS protocol, identifying the deployment location of OSAV, and identifying the filtering granularity. Specifically, <xref target="DNAT"/> first figures out that the root cause of misbehaving DNS proxies is misconfigured destination NAT (DNAT) devices. As shown in <xref target="DNAT-method-figure"/>, when a packet matches DNAT rules, the DNAT device changes the packet's destination to a preset address, while leaving the source address unchanged. Hence, to improve measurement coverage, DNAT-based method can also utilize other protocols, such as Network Time Protocol (NTP) and TCP protocol, to trigger the audited network into sending spoofed packets.</t>
        <t>DNAT-based method identifies the filtering depth in a similar way to tracefilter. As DNAT devices do not reset the TTL field when forwarding packets, the fowarding path taken by spoofed packets can be learned by gradually incrementing the initial TTL values in original packets. The last responsive hop is considered as the position where filtering happens.</t>
        <t>To identify the filtering granularity, the scanner sends multiple original packets with various source IP addresses. By using addresses adjacent to IP2 as the source addresses, the DNAT device will send spoofed packets with these addresses. Hence, packets that use forged addresses within the filtering granularity as source address will reach the receiver IP3.</t>
        <figure anchor="DNAT-method-figure">
          <name>An example of DNAT-based OSAV measurement.</name>
          <artwork><![CDATA[
                                            audited network
+---------------------+                  +--------------------+
|   +-------------+   |       (1)        |   +------------+   |
|   | scanner IP1 #---|------------------|--># DNAT   IP2 |   |
|   +-------------+   |   From: IP1      |   +------#-----+   |
|                     |   To:   IP2      |          |         |
| AS1                 |                  | AS2      | (2)     |
+---------------------+                  +--------------------+
                                                    | From: IP1
                    +----------------------+        | To:   IP3
                    |   +--------------+   |        |     /\
                    |   | receiver IP3 #<--|--------+     ||
                    |   +--------------+   |              || (3)
                    |                      |              ||
                    | AS3                  |        Detect elicited
                    +----------------------+        spoofed packets

The scanner sends a packet sourced with IP1 to the DNAT device (IP2).
The packet will elicit a spoofed packet sourced with IP1 and destined 
to IP3.
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="inbound-source-address-validation-measurement-methods">
      <name>Inbound Source Address Validation Measurement Methods</name>
      <t>The core idea of measuring whether a network deploys ISAV is to first send some spoofed packets to the target network and then observe whether the spoofed packets arrive inside of the target network. Since ISAV measurement does not require hosts in the audited network to generate spoofed packets, it is easier to measure ISAV deployment than OSAV. The SAV research community has proposed 5 methods for measuring OSAV deployment, i.e., client-based method, resolver-based method, ICMPv6-based method, IPID-based method and PMTUD-based method.</t>
      <section anchor="client-based-method-1">
        <name>Client-based Method</name>
        <t>As shown in <xref target="isav-client-figure"/>, by deploying a measurement client on a host in the audited network, client-based method can use a controlled server to send a spoofed packet to the client. The spoofed packets use an IP addresses adjacent to IP2 as its source IP addresses. If the client receives the spoofed packet, then the audited network has not deployed ISAV. Otherwise, the audited network has deployed ISAV.</t>
        <figure anchor="isav-client-figure">
          <name>An example of client-based ISAV measurement.</name>
          <artwork><![CDATA[
                                                     audited network
+---------------------+                          +--------------------+
|   +-------------+   |           (1)            |   +-------------+  |
|   | controlled  #---|--------------------------|--># client IP2  |  |
|   | server IP1  |   |   From: IP2's neighbor   |   +-------------+  |
|   +-------------+   |   To:   IP2              |                    |
| AS1                 |                          | AS2                |
+---------------------+                          +--------------------+

The controlled server sends a spoofed packet to the client, and then 
client reports whether it has received the spoofed packets.
]]></artwork>
        </figure>
        <t>The CAIDA Spoofer project <xref target="spoofer"/> also supports ISAV measurements, which, like OSAV measurements, rely on volunteers. When volunteers install the CAIDA Spoofer client, both ISAV and OSAV measurements are performed on the audit network. However, if the client is installed within a NAT network, it becomes inaccessible from outside the network, even without spoofed addresses. As a result, client-based methods cannot measure ISAV deployments in this case.</t>
      </section>
      <section anchor="resolver-based-method">
        <name>Resolver-based Method</name>
        <figure anchor="exp-spoofing-scan">
          <name>An example of resolver-based ISAV measurement.</name>
          <artwork><![CDATA[
                                         audited network
+-----------------+               +--------------------------+
|  AS1            |               |  AS2                     |
| +-------------+ |               |      +-----------+       |
| |   scanner   | |      (1)      |      |  resolver |       |
| |     IP1     #-|---------------|----->#    IP2    #       |
| +-------------+ |   From:IP3    |      +--+--------+       |
|                 |   To:IP2      |         |                |
+-----------------+               +------------------------- +
                                            | (2)
                                            V
                                       +----#-----+
                                       |   ADNS   |
                                       +----------+
]]></artwork>
        </figure>
        <t><xref target="exp-spoofing-scan"/> shows an example of resolver-based ISAV measurement <xref target="dns-resolver"/>. The scanner in AS1 sends a DNS query with a forged IP address IP3, which belongs to the audited network (AS2), to a DNS resolver in AS2. If the audited network does not deploy ISAV, the DNS resolver will receive the spoofed DNS query. Next, the DNS resolver will send another DNS query to our controlled ADNS for resolution. Therefore, if the controlled ADNS receives the DNS query from the DNS resolver in the audited network, the audited network AS2 does not filter the spoofed packets.</t>
        <t>However, if the controlled ADNS does not receive the DNS query, we can not assume that the audited network filters the spoofed packets, since there may be no DNS resolver in the audited network. To futher identify networks that filter inbound spoofing traffic, we send a non-spoofed DNS query from the scanner to the same target IP address. If the controlled ADNS receives a DNS query triggered by the non-spoofed DNS query, a DNS resolver exists in the audited network. As a result, if the DNS resolver does not resolve the spoofed query, we can conclude that the audited network deploy ISAV.</t>
        <figure anchor="resolver-network-type">
          <name>Classification of results based on DNS resolvers.</name>
          <artwork><![CDATA[
                                        SPOOFED DNS QUERY 

N                        ADNS receives no query    ADNS receives a query
O  D                  +---------------------------------------------------+
N  N   ADNS receives  |                          |                        |
|  S     a query      |        with ISAV         |      without ISAV      |
S                     |                          |                        |
P  Q                  -----------------------------------------------------
O  U   ADNS receives  |                          |                        |
O  E     no query     |         unknown          |      without ISAV      |
F  R                  |                          |                        |
E  Y                  +---------------------------------------------------+
D     
]]></artwork>
        </figure>
        <t>As illustrated in <xref target="resolver-network-type"/>, there are four cases when combining spoofed DNS query and non-spoofed DNS query.</t>
        <ul spacing="normal">
          <li>
            <t>First, the ADNS receives DNS queries in both spoofing scan and non-spoofing scan, suggesting that the audited network does not deploy ISAV, and the DNS resolver is open.</t>
          </li>
          <li>
            <t>Second, the ADNS receives the DNS query only in spoofing scan, suggesting that the audited network does not deploy ISAV, and the DNS resolver is closed.</t>
          </li>
          <li>
            <t>Third, the ADNS receives the DNS query only in non-spoofing scan, suggesting that the audited network deploys ISAV.</t>
          </li>
          <li>
            <t>Fourth, the ADNS does not receive any DNS query. This suggests that no DNS resolver in the audited network can be utilized to measure ISAV deployment.</t>
          </li>
        </ul>
      </section>
      <section anchor="icmpv6-based-method">
        <name>ICMPv6-based Method</name>
        <t>As suggested by <xref target="RFC4443"/>, in order to limit the bandwidth and forwarding costs incurred by originating ICMPv6 error messages, an IPv6 node <bcp14>MUST</bcp14> limit the rate of ICMPv6 error messages it originates. This provides an opportunity to infer whether the spoofed packets arrive inside of the audited network based on the state of ICMPv6 rate limiting. Since most of IPv6 addresses are inactive, an ICMP error message will be fed back from Customer Premises Equipment (CPE) devices when we send an ICMP echo request to a random IP address in the audited network. If the CPE device limits the rate of ICMPv6 error messages it originates, it can be utilized as a vantage point (VP).</t>
        <t><xref target="ICMP-based-msr"/> illustrates the ICMPv6-based measurement method <xref target="ICMPv6"/>. We have a local scanner P1 in AS1, and AS2 is the audited network. Three rounds of testing with N and N+M ICMP echo requests packets are conducted in the measurement, and thus three values rcv1, rcv2, and rcv3 can be obtained respectively. Based on this, we can infer whether the audited network filters the spoofed packets by comparing rcv1, rcv2, and rcv3.</t>
        <figure anchor="ICMP-based-msr">
          <name>An example of ICMPv6-based ISAV measurement.</name>
          <artwork><![CDATA[
                                                     audited network
+------------------+                          +-----------------------------+
| AS1              |                          |  AS2        +------------+  |
|  +-----------+   |                          |  +------+   |unreachable |  |
|  |scanner IP1|   |                          |  |  VP  |   |IP address T|  |
|  +---+-------+   |                          |  +---#--+   +--#---------+  |
|      |           |                          |      |         |            |
+------------------+                          +-----------------------------+
       |                                             |         |
       +--------+ N ICMP echo requests  +--------------------->+
       |             src:IP1 dst:T                   |         |
round 1|                                             |         |
       +<-------+ rcv1 ICMP Error Messages +---------+         |
       |                                             |         |
       |                                             |         |
       +--------+ N ICMP echo requests +---------------------->+
       |             src:IP1 dst:T                   |         |
round 2|                                             |         |
       +--------+ M ICMP echo requests +---------------------->+
       |        src:arbitrary IP in AS1,dst:T        |         |
       |                                             |         |
       +<-------+ rcv2 ICMP Error Messages +---------+         |
       |                                             |         |
       |                                             |         |
       |XXXXXXXXXXXXXXXXX SCENARIO 1 XXXXXXXXXXXXXXXXXXXXXXXXXX|
       |                                             |         |
       +--------+ N ICMP echo requests +---------------------->+
       |             src:IP1, dst:T                  |         |
       |                                             |         |
       +--------+ M ICMP echo requests +---------------------->+
       |         src:arbitrary IP in AS2,dst:T       |         |
       |                                             |         |
       |XXXXXXXXXXXXXXXXX SCENARIO 2 XXXXXXXXXXXXXXXXXXXXXXXXXX|
round 3|                                             |         |
       +--------+ N ICMP echo requests  +--------------------->+
       |             src:IP1 dst:T                   |         |
       |                                         XX  |         |
       +--------+ M ICMP echo requests +-------->XX  |         |
       |         src:arbitrary IP in AS2,dst:T   XX  |         |
       |                                         XX  |         |
       |XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX|
       |                                             |         |
       +<-------+ rcv3 ICMP Error Messages +---------+         |
]]></artwork>
        </figure>
        <t>As illustrated in <xref target="ICMP-based-msr"/>, in the first round test, N ICMP echo requests are sent to a target with inactive IPv6 address in the audited network, and then VP will resposnd with rcv1 ICMP error messages to the scanner. In the second round test, besides the same N probe packets, extra M ICMP echo requests with forged source address that belongs to AS1 (noise packets) are sent to the target simultaneously. The number of ICMP error messages in the second round test are defined as rcv2. Similar to the second round test, in the third round test, M ICMP echo requests with forged source address that belongs to AS2 (spoofed packets) are sent to the target. The number of ICMP error messages in the third round test are defined as rcv3.</t>
        <t>Comparing rcv1 and rcv3, if rcv1 &gt; rcv3, it can be considered that the spoofed packets are not filtered in the third round test, suggesting that the audited network allows inbound spoofing. Comparing rcv2 and rcv3, if rcv2 &lt; rcv3, it can be inferred that the target network has filtered the spoofed packet in the third round test, and thus is able to filter inbound spoofing traffic. The ability of filtering inbound spoofing traffic can be inferred according to the following rules.</t>
        <ul spacing="normal">
          <li>
            <t>If rcv3 &lt; a*rcv1, then the network allow inbound spoofing;</t>
          </li>
          <li>
            <t>Else if rcv2 &lt; a*rcv3, then the network does not allow inbound spoofing;</t>
          </li>
          <li>
            <t>Else, the ability of filtering inbound spoofing traffic cannot be determined.</t>
          </li>
        </ul>
        <t>where a is a factor to avoid potential interference from fast-changing network environments, satisfying 0 &lt; a &lt; 1.</t>
      </section>
      <section anchor="ipid-based-method">
        <name>IPID-based Method</name>
        <t>The core observation of using IPID to measure ISAV is that the globally incremental IPID value leaks information about traffic reaching the server<xref target="SMap"/>. Given a server in the audited network with a globally incremental IPID, the scanner samples the IPID value using its own IP address by sending packets to the server and receiving responses. Then, the scanner sends a set of packets to the server using a spoofed IP address that belongs to the audited network, i.e., an IP address adjacent to IP2. Afterward, the scanner sends another packet using its IP address to probe the IPID value again. If the spoofed packets reached the server, they would have incremented the server's IPID counter. As a result, this increment can be inferred during the second IPID probe from the scanner's IP address.</t>
        <figure anchor="IPID-based-msr">
          <name>An example of IPID-based ISAV measurement.</name>
          <artwork><![CDATA[
                                                    audited network
         +------------------+                    +-------------------+
         | AS1              |                    |  AS2              |
         |  +-----------+   |                    |   +------------+  |
         |  |scanner IP1|   |                    |   |   VP  IP2  |  |
         |  +---+-------+   |                    |   +----+-------+  |
         |      |           |                    |        |          |
         +------------------+                    +-------------------+
                |                                         |       
                |      Is global IPID counter or not?     |       
                |<--------------------------------------->|       
                |                                         |       
                |             Request,srcIP=IP1           |       
                |---------------------------------------->|       
                |                                         |       
                |            Response, IPID=X             |probe 1
                |<----------------------------------------|       
                |                   ...                   |       
                |                N-2 probes               |       
                |                   ...                   |       
                |             Request,srcIP=IP1           |       
                |---------------------------------------->|       
                |                                         |       
                |            Response, IPID=Y             |probe N
 estimate IPID  |<----------------------------------------|       
 rate IPID=f(t) |                                         |       
                +- -- -- -- -- -- -- -- -- -- -- -- -- -- +       
                |                                         |       
                |      M spoofs,srcIP=IP2's neighbor      |       
                |---------------------------------------->|       
                |                                         |       
                +- -- -- -- -- -- -- -- -- -- -- -- -- -- +       
                |                                         |       
                |            Request,srcIP=IP1            |       
                |---------------------------------------->|       
                |                                         |       
                |            Response, IPID=Z             |       
                |<----------------------------------------|             
                |                                         |   
]]></artwork>
        </figure>
        <t><xref target="IPID-based-msr"/> illustrates the measurement process of ISAV based on global IPID. First, the scanner measures the current IPID value and the rate of IPID increments. Ordinary Least Squares (OLS) linear regression can be used to estimate the relationship between the IPID and the timestamp t: IPID = a*t + b + ε, ε ∼ N (0, σ^2). Next, N probes are sent to the VP. With these N probes, the parameters a, b, and σ can be estimated using the OLS method. Then, a group of M = 6 * σ packets with a spoofed source IP address are sent to the audited network. Finally, the IPID value Z from the VP is sampled by using IP1 as source address, while the IPID value W at that moment can be estimated using the linear regression model. If the M spoofed packets are filtered, according to the 3-sigma rule, there is a 99.73% probability that the following condition holds: W - 3 * σ ≤ Z ≤ W + 3 * σ. If the spoofed packets are not filtered, meaning the audited network has not deployed ISAV, the IPID counter will increase by M. In this case, Z &gt; W + 3 * σ, or equivalently, Z &gt; W + M/2.</t>
      </section>
      <section anchor="pmtud-based-method">
        <name>PMTUD-based Method</name>
        <t>The core idea of the Path MTU Discovery (PMTUD) method is to send ICMP Packet Too Big (PTB) messages with a spoofed source IP address that belongs to the audited network <xref target="SMap"/>. The real IP address of the scanner is embedded in the first 8 bytes of the ICMP payload. If the network does not deploy ISAV, the server will receive the PMTUD message and reduce the MTU for the IP address specified in the first 8 bytes of the ICMP payload. First, probe the MTU of the service in the audited network. Then, send an ICMP PTB message from a spoofed IP address. If the packet reaches the service, it will reduce the MTU for the scanner's IP address. This reduction will be identified in the next packet received from the service, indicating that the audited network does not deploy ISAV.</t>
        <figure anchor="PMTUD-based-msr">
          <name>An example of PMTUD-based ISAV measurement.</name>
          <artwork><![CDATA[
                                                    audited network
         +------------------+                    +-------------------+
         | AS1              |                    |  AS2              |
         |  +-----------+   |                    |   +------------+  |
         |  |scanner IP1|   |                    |   |   VP  IP2  |  |
         |  +-----+-----+   |                    |   +------+-----+  |
         |        |         |                    |          |        |
         +------------------+                    +-------------------+
                  |                                         |       
          Round 1 |              Setup Connection           |       
                  |<--------------------------------------->|       
                  |                                         |       
                  |                  Request                |       
                  |---------------------------------------->|       
                  |                                         |       
                  |           Response, DF1, size1          |       
                  |<----------------------------------------|       
         DF==1?-> |                                         |       
       Maybe PMTUD|                                         |       
                  |            ICMP PTB, srcIP=IP1          |       
                  |---------------------------------------->|       
                  |                                         |       
                  |                  Request                |       
                  |---------------------------------------->|       
                  |                                         |       
                  |           Response, DF2, size2          |       
                  |<----------------------------------------|       
  DF==0 or size2< |                                         |       
  size1 -> PMTUD  |                                         |       
                  +- -- -- -- -- -- -- -- -- -- -- -- -- -- +       
                  |                                         |       
          Round 2 |              Setup Connection           |       
                  |<--------------------------------------->|       
                  |                                         |       
                  |                  Request                |       
                  |---------------------------------------->|       
                  |                                         |       
                  |           Response, DF3, size3          |       
                  |<----------------------------------------|       
                  |                                         |       
                  |                                         |       
                  |            ICMP PTB, srcIP=IP1          |       
                  |---------------------------------------->|       
                  |                                         |       
                  |                 Request                 |       
                  |---------------------------------------->|       
                  |                                         |       
                  |           Response, DF4, size4          |       
                  |<----------------------------------------|       
                  |                                         |   
]]></artwork>
        </figure>
        <t><xref target="PMTUD-based-msr"/> illustrates the measurement process of ISAV based on PMTUD. First, establish a TCP connection with the server in the audited network. Then, send Request1 and receive Response1. If the DF (Don't Fragment) bit is not set, the server does not support PMTUD. Otherwise, send an ICMP PTB message with a smaller MTU. Next, issue another request and receive Response2. If DF1 == 1 and (DF2 == 0 or size2 ≤ size1), the server supports PMTUD. Now, proceed to test whether ISAV is deployed. Use the neighbor's IP address of the server as the source IP address to spoof an ICMP PTB with the smallest MTU. After that, issue another request. If the following condition is observed, the server is not protected by ISAV: size4 ≤ size3 or (DF3 == 1 and DF4 == 0).</t>
      </section>
    </section>
    <section anchor="deployment-status">
      <name>Deployment Status</name>
      <section anchor="global-picture">
        <name>Global Picture</name>
        <t>In February 2025, we used the above methods to measure SAV deployment in the Internet. As shown in <xref target="isav-pfx-deployment"/> and <xref target="isav-as-deployment"/>, 67.4% of IPv4 and 72.8% of IPv6 ASes lacked any ISAV deployment. Partial deployment was observed in 30.2% of IPv4 and 23.1% of IPv6 ASes, suggesting that these ASes deploy ISAV at their access networks.</t>
        <figure anchor="isav-as-deployment">
          <name>ISAV deployment status across IPv4 ASes and IPv6 ASes.</name>
          <artwork><![CDATA[
+--------------------+----------------+----------------+
|      Category      |   IPv4 ASes    |   IPv6 ASes    |
+--------------------+----------------+----------------+
|      Deployed      |  1,157 ( 2.5%) |    372 ( 4.0%) |
|    Not Deployed    | 31,817 (67.4%) |  6,747 (72.8%) |
| Partially Deployed | 14,235 (30.2%) |  2,143 (23.1%) |
+--------------------+----------------+----------------+
]]></artwork>
        </figure>
        <figure anchor="isav-pfx-deployment">
          <name>ISAV deployment status across IPv4 /24 and IPv6 /48 prefixes.</name>
          <artwork><![CDATA[
+--------------------+-------------------+-------------------+
|      Category      | IPv4 /24 Prefixes | IPv6 /48 Prefixes |
+--------------------+-------------------+-------------------+
|      Deployed      |   222,362 (13.1%) |    47,704 ( 8.1%) |
|    Not Deployed    | 1,390,206 (82.0%) |   404,629 (68.5%) |
| Partially Deployed |    83,460 ( 4.9%) |   138,693 (23.5%) |
+--------------------+-------------------+-------------------+
]]></artwork>
        </figure>
        <t><xref target="osav-pfx-deployment"/> and <xref target="osav-as-deployment"/> show OSAV deployment disparities between IPv4 and IPv6 networks. Only 14.8% of IPv4 ASes and 17.8% of IPv4 /24 prefixes demonstrate complete OSAV deployment. In contrast, IPv6 compliance is significantly higher than IPv4.</t>
        <figure anchor="osav-as-deployment">
          <name>OSAV deployment status across IPv4 and IPv6 ASes.</name>
          <artwork><![CDATA[
+--------------------+---------------+---------------+
|      Category      |   IPv4 ASes   |   IPv6 ASes   |
+--------------------+---------------+---------------+
|      Deployed      |   409 (14.8%) |   318 (71.6%) |
|     Undeployed     | 2,200 (79.6%) |    81 (18.2%) |
| Partially Deployed |   155 ( 5.6%) |    45 (10.1%) |
+--------------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="osav-pfx-deployment">
          <name>OSAV deployment status across IPv4 /24 and IPv6 /48 prefixes.</name>
          <artwork><![CDATA[
+--------------------+-------------------+-------------------+
|      Category      | IPv4 /24 Prefixes | IPv6 /48 Prefixes |
+--------------------+-------------------+-------------------+
|      Deployed      |     1,402 (17.8%) |       679 (80.9%) |
|     Undeployed     |     6,335 (80.4%) |       130 (15.5%) |
| Partially Deployed |       140 ( 1.8%) |        30 ( 3.6%) |
+--------------------+-------------------+-------------------+
]]></artwork>
        </figure>
        <t><xref target="osav-granularity"/> shows OSAV deployment granularity patterns. The prefix length of /20-/24 dominates deployment (55.52%), as these prefix lengths correspond to standard IPv4 allocation units for ASes. This pattern suggests OSAV is predominantly deployed at AS border interfaces.</t>
        <figure anchor="osav-granularity">
          <name>OSAV filtering granularity in IPv4 networks.</name>
          <artwork><![CDATA[
+-------+------------+
| Range | Percentage |
+-------+------------+
|  / 8  |    0.13 %  |
|  / 9  |    0.26 %  |
|  /10  |    0.53 %  |
|  /11  |    0.13 %  |
|  /12  |    0.26 %  |
|  /13  |    0.66 %  |
|  /14  |    0.79 %  |
|  /15  |    0.53 %  |
|  /16  |    3.95 %  |
|  /17  |    4.74 %  |
|  /18  |    3.29 %  |
|  /19  |    5.53 %  |
|  /20  |    6.97 %  |
|  /21  |    8.55 %  |
|  /22  |   23.95 %  |
|  /23  |    7.76 %  |
|  /24  |    8.29 %  |
|  /25  |    2.24 %  |
|  /26  |    2.63 %  |
|  /27  |    3.95 %  |
|  /28  |    3.29 %  |
|  /29  |    5.79 %  |
|  /30  |    3.42 %  |
|  /31  |    2.37 %  |
+-------+------------+
]]></artwork>
        </figure>
        <t><xref target="isav-granularity"/> shows the filtering granularity of ISAV, with 41.66% of networks implementing spoofing filters at /29-/30 granularity (per IETF BCP38 recommendations). This suggests ISAV is predominantly deployed in access networks.</t>
        <figure anchor="isav-granularity">
          <name>ISAV filtering granularity in IPv4 networks.</name>
          <artwork><![CDATA[
+-------+------------+
| Range | Percentage |
+-------+------------+
|  / 8  |    0.17 %  |
|  / 9  |    1.99 %  |
|  /10  |    6.07 %  |
|  /11  |    4.48 %  |
|  /12  |    4.94 %  |
|  /13  |    3.50 %  |
|  /14  |    3.99 %  |
|  /15  |    5.78 %  |
|  /16  |    2.17 %  |
|  /17  |    3.27 %  |
|  /18  |    2.76 %  |
|  /19  |    2.43 %  |
|  /20  |    1.84 %  |
|  /21  |    3.25 %  |
|  /22  |    1.73 %  |
|  /23  |    3.24 %  |
|  /24  |    1.55 %  |
|  /25  |    0.97 %  |
|  /26  |    1.02 %  |
|  /27  |    1.35 %  |
|  /28  |    1.85 %  |
|  /29  |   22.94 %  |
|  /30  |   18.72 %  |
+-------+------------+
]]></artwork>
        </figure>
        <t><xref target="osav-depth"/> characterizes OSAV filtering depth measured by the DNAT-based method, where 91.52% of deployment are within 2 IP hops from the endpoints - with complete absence beyond 10 hops.</t>
        <figure anchor="osav-depth">
          <name>OSAV filtering depth in IPv4 networks.</name>
          <artwork><![CDATA[
+-------+------------+
|  Hop  | Percentage |
+-------+------------+
|   1   |   66.01 %  |
|   2   |   25.51 %  |
|   3   |    4.58 %  |
|   4   |    2.46 %  |
|   5   |    1.03 %  |
|   6   |    0.14 %  |
|   7   |    0.00 %  |
|   8   |    0.21 %  |
|   9   |    0.07 %  |
|  10   |    0.00 %  |
+-------+------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="deployment-in-countries">
        <name>Deployment in Countries</name>
        <t>The SAV deployment in the global Internet is shown in <xref target="isav-country"/> and <xref target="osav-country"/>. Analysis of regions with sufficient data reveals distinct deployment patterns: China, South Korea, Germany, and France demonstrate higher OSAV deployment ratios, while Russia, Brazil, and India show lower OSAV deployment ratios. Notably, ISAV deployment remains limited in most regions, with South Korea, Poland, and Egypt emerging as exceptional cases exhibiting more advanced ISAV deployment.</t>
        <figure anchor="osav-country">
          <name>OSAV deployment among countries/regions.</name>
          <artwork><![CDATA[
+---------+----------------------+-----------------------+
| Country | OSAV Tested Prefixes | OSAV Deployment Ratio |
+---------+----------------------+-----------------------+
|   CN    |                  376 |                 76.3% |
|   KR    |                   58 |                 75.9% |
|   FR    |                   12 |                 75.0% |
|   DE    |                   16 |                 68.8% |
|   US    |                  300 |                 42.7% |
|   NL    |                   18 |                 33.3% |
|   PL    |                   70 |                 32.9% |
|   CA    |                  117 |                 32.5% |
|   GB    |                   28 |                 32.1% |
|   AU    |                   11 |                 27.3% |
|   IT    |                  116 |                 23.3% |
|   TW    |                   19 |                 21.1% |
|   EG    |                   56 |                 19.6% |
|   ID    |                  490 |                 17.8% |
|   JP    |                   17 |                 17.6% |
|   MX    |                   36 |                 13.9% |
|   ES    |                   38 |                 10.5% |
|   RU    |                   75 |                  9.3% |
|   BR    |                2,575 |                  7.3% |
|   IN    |                1,430 |                  5.5% |
+---------+----------------------+-----------------------+
]]></artwork>
        </figure>
        <figure anchor="isav-country">
          <name>ISAV deployment among countries/regions.</name>
          <artwork><![CDATA[
+---------+----------------------+-----------------------+
| Country | ISAV Tested Prefixes | ISAV Deployment Ratio |
+---------+----------------------+-----------------------+
|   KR    |               71,934 |                 44.8% |
|   TW    |               22,523 |                 42.0% |
|   PL    |               17,880 |                 40.5% |
|   EG    |               16,806 |                 37.3% |
|   FR    |               35,220 |                 19.4% |
|   DE    |               49,956 |                 14.4% |
|   ES    |               15,018 |                 16.2% |
|   BR    |               47,874 |                 11.8% |
|   US    |              562,655 |                 10.2% |
|   RU    |               56,084 |                 10.2% |
|   AU    |               21,023 |                  8.3% |
|   NL    |               19,803 |                  8.3% |
|   CA    |               23,801 |                  7.2% |
|   GB    |               31,271 |                  6.9% |
|   JP    |               67,173 |                  6.2% |
|   IT    |               30,357 |                  5.7% |
|   CN    |              211,539 |                  4.8% |
|   ID    |               18,845 |                  4.6% |
|   IN    |               30,569 |                  4.1% |
|   MX    |               17,665 |                  3.4% |
+---------+----------------------+-----------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="comparison-between-isav-and-osav">
        <name>Comparison between ISAV and OSAV</name>
        <t><xref target="isav-asn-deployment"/> and <xref target="osav-asn-deployment"/> show the deployment status of ISAV and OSAV across ASes. Our measurements focus on ISP ASes, revealing significant disparities:</t>
        <t>​ISAV: China Telecom (AS4134), China Unicom (AS4837), AT&amp;T (AS7018), and Verizon (AS701) exhibit low deployment rates. In contrast, Korea Telecom (AS4766), Comcast (AS7922), Charter (AS20115), and Chungwa Telecom (AS3462) demonstrate significantly higher ISAV deployment.</t>
        <t>​OSAV: China Telecom (AS4134), China Unicom (AS4837), and Korea Telecom (AS4766) achieve over 90% OSAV deployment across their /24 networks.</t>
        <figure anchor="isav-asn-deployment">
          <name>ISAV deployment ratio of ASes.</name>
          <artwork><![CDATA[
+----------+----------------------+-----------------------+
|   ASN    | ISAV Tested Prefixes | ISAV Deployment Ratio |
+----------+----------------------+-----------------------+
|     3462 |               12,752 |                 70.1% |
|     4766 |               37,667 |                 60.8% |
|    20115 |               13,505 |                 40.1% |
|     7922 |               29,403 |                 22.9% |
|     8075 |               22,415 |                 10.0% |
|      209 |               11,435 |                  7.9% |
|    12389 |               12,288 |                  5.0% |
|     3320 |               14,684 |                  4.7% |
|     4134 |               69,625 |                  4.4% |
|     4837 |               48,749 |                  4.0% |
|     7018 |               31,888 |                  3.3% |
|     4713 |               14,727 |                  3.2% |
|    16509 |               48,563 |                  3.2% |
|    45090 |               11,168 |                  3.0% |
|     3269 |               14,181 |                  3.1% |
|      701 |               15,694 |                  2.2% |
|    17676 |               11,702 |                  1.8% |
|     8151 |               11,996 |                  1.6% |
|      749 |               70,399 |                  1.2% |
|    36947 |               11,339 |                  0.4% |
+----------+----------------------+-----------------------+
]]></artwork>
        </figure>
        <figure anchor="osav-asn-deployment">
          <name>OSAV deployment ratio of ASes.</name>
          <artwork><![CDATA[
+----------+----------------------+------------------------+
|   ASN    | OSAV Tested Prefixes | OSAV Deployment Ratio  |
+----------+----------------------+------------------------+
|   272122 |                  160 |                 100.0% |
|    14061 |                   37 |                 100.0% |
|     4766 |                   36 |                  97.2% |
|     4134 |                  232 |                  92.7% |
|     4837 |                   48 |                  81.2% |
|    17995 |                   71 |                  74.6% |
|    15924 |                   56 |                  26.8% |
|     8452 |                   49 |                  12.2% |
|    38758 |                   47 |                   4.3% |
|   150008 |                  102 |                   0.0% |
|    34984 |                   78 |                   0.0% |
|    52468 |                   66 |                   0.0% |
|   395582 |                   64 |                   0.0% |
|    58659 |                   55 |                   0.0% |
|    23688 |                   43 |                   0.0% |
|    18229 |                   40 |                   0.0% |
|    52444 |                   36 |                   0.0% |
|   133676 |                   34 |                   0.0% |
|    23923 |                   33 |                   0.0% |
|    18002 |                   33 |                   0.0% |
+----------+----------------------+------------------------+
]]></artwork>
        </figure>
        <t>We find a positive correlation between the deployment of OSAV and ISAV. That is, 10.9% of ASes that deploy ISAV also deploy OSAV, while only 5.9% of ASes without ISAV deploy OSAV. Similarly, 36.0% of ASes that deploy OSAV also deploy ISAV, while only 22.6% of ASes without OSAV deploy ISAV.</t>
      </section>
      <section anchor="impact-of-manrs">
        <name>Impact of MANRS</name>
        <t>To understand the impact of MANRS on SAV deployment, we compare SAV deployment ratios between MANRS and non-MANRS networks, including both full and partial deployments.</t>
        <t>The analysis reveals MANRS networks demonstrate superior SAV deployment: 29.1% in MANRS networks versus 19.6% in non-MANRS networks for OSAV, and 73.3% vs. 56.7% for ISAV. These results indicate that although anti-spoofing is a recommended action, MANRS participation improves SAV deployment across network configurations.</t>
        <figure anchor="sav-manrs">
          <name>The impact of MANRS on SAV deployment.</name>
          <artwork><![CDATA[
+-----------+-----------------------+-----------------------+
|           | OSAV Deployment Ratio | ISAV Deployment Ratio |
+-----------|-----------------------+-----------------------+
|   MANRS   |                 29.1% |                 73.3% |
| Non-MANRS |                 19.6% |                 56.7% |
+-----------+-----------------------+-----------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta"/>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol). ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="spoofer" target="https://spoofer.caida.org/">
          <front>
            <title>Spoofer project</title>
            <author>
              <organization>CAIDA</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="manrs" target="https://www.manrs.org/netops/guide/antispoofing/">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization>MANRS</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="DNAT" target="https://datatracker.ietf.org/doc/draft-wang-savnet-remote-measurement-osav/">
          <front>
            <title>Remote Measurement of Outbound Source Address Validation Deployment</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="dns-proxy" target="https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-kuhrer.pdf">
          <front>
            <title>Exit from hell? Reducing the impact of amplification DDoS attacks</title>
            <author>
              <organization>Marc Kuhrer, Thomas Hupperich, Christian Rossow, and Thorsten Holz, Ruhr-University Bochum</organization>
            </author>
            <date year="2014"/>
          </front>
        </reference>
        <reference anchor="dns-resolver" target="https://ieeexplore.ieee.org/document/10082958">
          <front>
            <title>The Closed Resolver Project: Measuring the Deployment of Inbound Source Address Validation</title>
            <author>
              <organization>Yevheniya Nosyk, Maciej Korczynski, Qasim Lone, Marcin Skwarek, Baptiste Jonglez, Andrzej Duda</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="ICMPv6" target="https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_s49_paper.pdf">
          <front>
            <title>Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels</title>
            <author>
              <organization>Long Pan, Jiahai Yang, Lin He, Zhiliang Wang, Leyao Nie, Guanglei Song, Yaozhong Liu</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="SMap" target="https://dl.acm.org/doi/10.1145/3485832.3485917">
          <front>
            <title>Smap: Internet-wide Scanning for Spoofing</title>
            <author>
              <organization>Tianxiang Dai, Haya Shulman</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
