<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tong-savnet-sav-enhanced-by-controller-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="SAV Enhanced by Controller">Source Address Validation Enhanced by Network Controller</title>
    <seriesInfo name="Internet-Draft" value="draft-tong-savnet-sav-enhanced-by-controller-01"/>
    <author initials="T." surname="Tong" fullname="Tian Tong">
      <organization>China Unicom</organization>
      <address>
        <email>tongt5@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="C." surname="Lin" fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>
    <author initials="N." surname="Wang" fullname="Nan Wang">
      <organization>China Unicom</organization>
      <address>
        <email>wangn161@chinaunicom.cn</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <area>Routing</area>
    <workgroup>Source Address Validation in Intra-domain and Inter-domain Networks</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 53?>

<t>Many newly proposed Source Address Validation (SAV) mechanisms such as IGP-based and BGP-based SAVNET solutions take a distributed manner to generate SAV rules, but they are faced with accuracy and managability challenges in incremental/partial deployment scenarios.
This document proposes a network controller-based solution for enhancing SAVNET capability in intra-domain and inter-domain networks, which supports accurate verification, automated configuration, threat analysis, traceability and visualization.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-tong-savnet-sav-enhanced-by-controller/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Source Address Validation in Intra-domain and Inter-domain Networks Working Group mailing list (<eref target="mailto:savnet@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/savnet/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/savnet/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Distributed SAVNET solutions utilize protocol message exchanges among SAVNET routers to acquire source prefix information related to other subnets within intra-domain networks or inter-domain networks, such as Source Prefix Announcement (SPA) technology for intra-domain SAVNET, which can be transmitted by a new protocol or an extension to an existing protocol <xref target="I-D.li-savnet-source-prefix-advertisement"/>. Nonetheless, under circumstances characterized by device heterogeneity, partial upgrades, asymmetric routing, and peculiar address, these solutions face diminished accuracy in Source Address Validation (SAV). Furthermore，there are necessities for enhancement in areas such as automated configuration, threat analysis, traceability, and visualization.</t>
      <t>In this document, on the basis of distributed intra-domain and inter-domain SAVNET architecture, we propose a controller-based and centralized SAVNET enhancement solution. The distributed SAVNET solutions rely on local routing information and SAV-specific information. In this solution, the controller can generate and deliver SAV rules based on the global information, and can also obtain ROA and other external information to generate inter-domain SAV rules, so as to achieve accurate source address verification (SAV) in both intra-domain and inter-domain in a combination of centralized and distributed ways.</t>
      <t>In this solution, SAVNET routers and non-SAVNET routers can cooperate via the network controller. More accurate source address verification rules can be generated based on more comprehensive information in the scenario of partial/incremental deployment of SAVNET. Concurrently, the SAVNET can support accurate verification, automated configuration, threat analysis, traceability and visualization.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <ul spacing="normal">
          <li>
            <t>SAV: Source Address Validation</t>
          </li>
          <li>
            <t>AS: Autonomous System</t>
          </li>
          <li>
            <t>SAV-Specific Information: Information specialized for SAV rule generation, exchanged between routers or from the network controller.</t>
          </li>
          <li>
            <t>SAV-related Information: The information used by a router to make SAV decisions. For intra-domain SAV, SAV-related information includes both local routing information and SAV-specific information.</t>
          </li>
          <li>
            <t>SAV-specific Information Communication Mechanism: The mechanism for exchanging SAV-specific information between routers. It can be either a new protocol or an extension to an existing protocol.</t>
          </li>
          <li>
            <t/>
          </li>
          <li>
            <t>SAV Information Base: A table or data structure in a router that stores specific SAV information and local routing information.</t>
          </li>
          <li>
            <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions and is inferred from the SAV Information Base or from network controller.</t>
          </li>
          <li>
            <t>SAVNET Router:  An intra-domain router which runs intra-domain SAVNET.</t>
          </li>
          <li>
            <t>SAVNET Agent: The agent in a SAVNET router that is responsible for communicating SAV-specific information, processing SAV-related information, and generating SAV rules.</t>
          </li>
          <li>
            <t>AS Edge Router: An intra-domain router of an AS which is connected to client subnets.</t>
          </li>
          <li>
            <t>AS Border Router: An intra-domain router of an AS which is connected to other ASes.</t>
          </li>
          <li>
            <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
          </li>
          <li>
            <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
          </li>
          <li>
            <t>ISP: Internet Service Provider.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="scenarios-and-requirements-for-centralized-savnet">
      <name>Scenarios and Requirements for Centralized SAVNET</name>
      <t>This section introduces the scenarios and requirements of centralized SAVNET, including incremental/partial deployment scenario, obtain information from external systems, automated configuration, analysis and traceability requirements,etc.</t>
      <section anchor="challenges-and-limitations-of-distributed-savnet-in-incrementalpartial-deployment">
        <name>Challenges and Limitations of Distributed SAVNET in Incremental/partial deployment</name>
        <t>The current distributed solution which exchanges SAV-specific information between SAVNET routers depends on devices upgrade. Devices utilize the source prefix advertisement (SPA) information to notify other routers about their subnet and prefix information. Unique subnet ID for each subnet should be planned by network manager, and additional identification information such as subnet ID and access mode on the corresponding port of the device should be configured manually, so as to generate more accurate SAV rules.</t>
        <t>However, devices are upgraded gradually due to various limitations such as device performance、version and vendor. As a result, in an AS, there are some routers support SAVNET and others do not.</t>
        <t>Routers with distributed solution could not generate accurate SAV rules in incremental/partial deployment scenario. Refer to <xref target="I-D.li-savnet-intra-domain-architecture"/> and <xref target="I-D.li-savnet-inter-domain-architecture"/>.Though the SAVNET router can obtain routing information from the local RIB/FIB and generate SAV rules for certain prefixes, in the absence of SAV-specific information, the SAV generated based on the local RIB/FIB has the risk of the improper block and improper permit in special scenarios such as asymmetric routing scenario.</t>
        <t>Figure 1 illustrates the asymmetric routing in a multi-homing subnet scenario which has been raised in [I-D.ietf-savnet-intra-domain-problem-statement]. Subnet 1 has a prefix of 10.0.0.0/15 and is connected to two edge routers, Router 1 and Router 2. Due to the load balancing policy in the inbound direction of subnet 1, R1 can only learn subnet prefix 10.1.0.0/16 from subnet 1, while R2 can only learn subfix 10.0.0.0/16 from subnet 1. After that, R1 learns another subnet prefix through the intra-domain routing protocol, and so does R2. The FIB of R1 and R2 are shown in Figure 1. R1 is a SAVNET router and R2 is a non-SAVNET router, and R1 and R2 communicate with each other through R3, regardless of whether R3 is a SAVNET router or not, the SPA message cannot be delivered and R2 cannot generate its own SAV-specific information or recognize the SAV-specific information transmitted from R1. Therefore, R1 can only collect part of the prefix information of the subnet to generate SAV rules, and R2 uses the FIB for SAV, then improper block will occur in both R1 and R2 due to incomplete information.</t>
        <figure>
          <name>Asymmetric multi-homing scenario in incremental deployment of intra-domain</name>
          <artwork><![CDATA[
 +--------------------------------------------------------------------+
 |     AS                                                             |
 |                            +----------+                            |
 |                            | Router 3 |                            |
 | FIB on Router 1            +----------+     FIB on Router 2        |
 | Dest         Next_hop       / \     \       Dest         Next_hop  |
 | 10.1.0.0/16  Subnet 1       /        \      10.0.0.0/16  Subnet 1  |
 | 10.0.0.0/16  Router 3      /  SPA     \     10.1.0.0/16  Router 3  |
 |                        +----------+   +----------+                 |
 |                SAVNET  | Router 1 |   | Router 2 | Non-SAVNET      |
 |                        +---+#+----+   +---+#+----+                 |
 |                             \            /                         |
 |                              \          /                          |
 |                             +------------+                         |
 |                             |  Customer  |                         |
 |                             |  Network   |                         |
 |                             +------------+                         |
 |                             (10.0.0.0/15)                          |
 |                                                                    |
 +--------------------------------------------------------------------+
]]></artwork>
        </figure>
        <t>Incremental/partial deployment for inter-domain include: (1) devices partially support SAVNET in an AS; (2) some ASs support SAVNET, while others do not. Figure 2 shows that ASBR1/2/3 are SAVNET routers while ASBR4 is a non-SAVNET router, ASBR4 cannot generate accurate source address verification rules without obtaining SAV-specific information from other AS and other routers in its AS.</t>
        <figure>
          <name>Partial deployment of Savnet for inter-domain</name>
          <artwork><![CDATA[
     +-----------------------+          +------------------------+
     | AS1     +----------+  |          |  +--------- +      AS2 |
     | SAVNET  |  ASBR 1  |  | -------- |  |  ASBR 3  |  SAVNET  |
     |         +----------+  |          |  +----------+          |
     |         +----------+  |          |  +----------+          |
     | SAVNET  |  ASBR 2  |  | -------- |  |  ASBR 4  |  Non-    |
     |         +----------+  |          |  +----------+  SAVNET  |
     +-----------------------+          +------------------------+
]]></artwork>
        </figure>
        <t>As a result, there is a problem of low accuracy in partial/incremental deployment scenarios. In addition, how to improve the protection effect and enhance the incentive is also one of the enhanced capabilities.</t>
      </section>
      <section anchor="obtain-information-from-external-systems">
        <name>Obtain information from external systems</name>
        <t>ASBR in each AS collects the SAV-specific information in its AS domain and synchronizes the SAV-specific information with the ASBR of the adjacent AS domain, and also obtains the RPKI ROA and ASPA information, as well as general information such as RIB, FIB, IRR, etc.Based on the above information sources, each AS generates a relatively complete source address verification table. So each AS needs to establish an information exchange channel and mechanism with the RPKI ROA to ensure network security, but routers shouldn’t directly interact with the RPKI ROA and other external systems, and a controller is appropriate to obtain information such as RPKI ROA and ASPA.</t>
      </section>
      <section anchor="automated-configuration">
        <name>Automated configuration</name>
        <t>Due to the existence of special addresses in the network, such as anycast addresses, the existing distributed SAVNET solutions need to manually identify special addresses and adopt corresponding policies, which brings high management overhead.</t>
        <t>For example, in Figure 3, P1~P4 are common prefixes, P5 is an anycast prefix with multiple legitimate origins including customer network 1, customer network 3 and external Internet. SAVNET with whitelist to be generated on interfaces a, b, and c, and SAVNET blacklist can be generated on interfaces d and e. If subnet 1 could not recognize P5 as an anycast prefix, the blacklist of interfaces d and e includes prefix P5, causing legitimate packets with P5 as the source to be filtered by mistake when they enter from interfaces d and e. Therefore, in order not to include an anycast prefix in a blacklist, it needs to use a special flag to indicate the anycast prefix when subnet 1 advertises the prefix P5 through the SPA.  Prefix type can be obtained and configured on the edge router through the controller if centralized management is possible,.</t>
        <figure>
          <name>Impact of anycast prefix</name>
          <artwork><![CDATA[
 +----------------------------------+     +--------------+
 |  AS  1                           |     |   Other AS   |
 |            +-----------+         |     |              |
 |            |  Router 3 |         |---- |   Internet   |
 |            +-----------+         |     |              |
 |               /     \            |     |              |
 |              /       \           |     |              |
 |    +----------+   +----------+   |     | +----------+ |
 |    | Router 1 |   | Router 2 |   |     | | Router 4 | |
 |    +---+#+----+   +- -+#+---+    |     | +---+#+----+ |
 +---------|-----\--------|------\--+     +------|-------+
           |       \      |        \             |
           |         \    |          \           |
           |           \  |            \         |
      +------------+   +------------+  +------------+
      |  Customer  |   |  Customer  |  |  Customer  |
      |  Network 1 |   |  Network 2 |  |  Network 3 |
      +------------+   +------------+  +------------+
  （ prefix-1 and 5）（ prefix-2 and 3）（ prefix-4 and 5）
]]></artwork>
        </figure>
        <t>In addition, network providers assign access devices, access ports, and public IP addresses to users who connect to their networks, so that the address allocation system in the carrier's network contains information about the customer's network. Source address verification technology can be combined with address allocation systems to automate configuration and achieve traceability based on source prefix. Centralized network controller can switch the authentication mode of all SAVNET routers flexibly through the delivery configuration.</t>
      </section>
      <section anchor="analysis-and-traceability-requirements">
        <name>Analysis and traceability requirements</name>
        <t>Current scheme provides flexible verification modes such as dropping, rate limiting, or allow for the forged packets in the latest draft sav_table <xref target="I-D.huang-savnet-sav-table"/>. It will play a great role if the controller can collect more source address forgery information from the router, analyze and trace the source in a centralized manner, visualize the source and target of the attack and threat tracing.
Besides, with the continuous expansion of the network scale and the increasing allocation of IP addresses, IP address conflicts include IP address conflicts and IP prefix conflicts will appear, which affects the normal network operation. The controller can find whether the prefixes are reused by checking the prefixes and their binding subnet ID.</t>
      </section>
    </section>
    <section anchor="centralized-savnet-capability-enhancement-solution">
      <name>Centralized SAVNET capability enhancement solution</name>
      <t>A high-level view of the Centralized SAVNET framework, without expanding the functional entities in network controller and Savnet devices, is illustrated in Figure 4.</t>
      <figure>
        <name>SAVNET capability enhancement architecture based on network controller</name>
        <artwork><![CDATA[
     +---------------------------------------------------------+
     | Controller                                              |
     |     +----------------------------------------+          |
     |     |      SAVNET Management Plane           |          |
     |     +----------------------------------------+          |
     |     +----------------------------------------+          |
     |     |      SAVNET Control Plane              |          |
     |     +----------------------------------------+          |
     |                                                         |
     +---------------------------------------------------------+
                                /|\
                                 |
                                 |
                                \|/
     +---------------------------------------------------------+
     | Savnet Devices                                          |         
     |                  SAVNET Device Plane                    |
     +---------------------------------------------------------+
]]></artwork>
      </figure>
      <t>The following planes are defined:
SAVNET Management Plane：Responsible for monitoring, configuring and maintaining SAVNET devices and Non-SAVNET devices,including delivering configuration to the devices, displaying and managing source address prefixes and SAV rules on devices.</t>
      <t>SAVNET Control Plane: Responsible for generating SAV rules. The incoming interfaces of source address prefixes are calculated based on topology informations，the source address prefixes，roles of devices. Finally, SAVNET entries/rules are generated and sent to the corresponding network devices.</t>
      <t>SAVNET device data plane: Responsible for maintaining and updating SAVNET entries from different sources, source address verification on the data forwarding plane and forwarding packets. The SAVNET entries can have multiple sources. SAV rules may be derived from intra-domain or inter-domain control plane protocols, see [I-D. draft-ietf-savnet-intra-domain-architecture-01] and [I-D.Raft -wu-savnet-inter-domain-architecture-11] for detail. SAV rules may be from the controller as well.</t>
      <t>The following interfaces are defined:
Report the network topology:  The basic BGP-LS as specified in <xref target="RFC9552"/> applies to this document to advertise the network information to the controller.
Report source address prefixes and SAVNET capabilities of network devices: Extend BGP-LS or YANG model to report source address prefixes and SAVNET capabilities of devices. For BGP-LS extensions, see [I-D.draft-cheng-lsr-adv-savnet-capbility-00].</t>
      <t>Report SAV rules: Monitor and manage SAV rules through a centralized controller. The protocol extensions of BGP Link-State to collect source address validation (SAV) rules generated by different protocols/mechanisms in {I-D. tong-idr-bgp-ls-sav-rule} can facilitate multi-sourced SAV rule monitoring and management.</t>
      <t>Deliver SAV rules: SAV rules can be delivered through YANG [I-D.Li-savnet-sav-yang], BGP-LS[I-D.haas-savnet-bgp-sav-distribution], and BGP-FS [I-D.geng-idr-flowspec-sav]. Detailed definition of SAV rules can see [I-D.draft -huang-savnet-sav-table-07]. When some network devices do not support SAVNET, the controller can deliver other protection policies, such as ACL rules, to the corresponding network devices.</t>
      <section anchor="key-technologies-in-intra-domain-savnet-enhancement">
        <name>Key technologies in Intra-domain SAVNET enhancement</name>
        <t>This section describes the intra-Domain SAV Enhancement based on Controller. Figure 5 illustrates Centralized SAVNET capability enhancement architecture in an intra-domain network. Centralized Controller can support accurate verification, automated configuration, threat analysis, traceability and visualization.</t>
        <figure>
          <name>intra-domain SAVNET capability enhancement architecture based on network controller</name>
          <artwork><![CDATA[
     +---------------------------------------------------------+
     |                                                         |
     |                    SAVNET Controller                    |
     +---------------------------------------------------------+          
                                /|\
                                 |
                                \|/
     +---------------------------------------------------------+
     |           +--------+            +--------+              |         
     |           | ASBR1  |            | ASBR2  |              |
     |           +--------+            +--------+              |
     |               |                      |                  |
     |           +------------------------------+              |
     |           |         other Routers        |              |
     |           +------------------------------+              | 
     |             |             |            |                |
     |        +--------+    +--------+    +--------+           |
     |        |  R1    |    |  R2    |    |  R3    |           |
     |        +--------+    +--------+    +--------+           |
     +---------------------------------------------------------+    
]]></artwork>
        </figure>
        <t>As shown in the figure above, when SAVNET is deployed in the intra-domain, controller can implement different control policies based on roles of devices. For the boundary devices in the domain, the blacklist policy is adopted. For the multi-homing access devices in the domain, the controller delivers multi-homing SAV rules in a centralized manner.</t>
        <t>Deliver SAV rules in intra-domain:
(1) AS Boundary Router (ASBR): The controller collects source address prefixes of all subnets in the AS domain, removes special IP addresses or prefixes, such as anycast IP addresses, generates the SAV rules/policies（in blacklist mode） containing all source address prefixes of the AS, and sends the SAV rules/policies to the ASBR. The SAV rules are generated and delivered to the routers that support SAVNET, and other defense policies, such as ACL (filtering specific source addresses on specific incoming interfaces), are generated and delivered to the routers that do not support SAVNET.</t>
        <figure>
          <name>Deliver SAV rules to AS Border Routers</name>
          <artwork><![CDATA[
     +-------------------------------------------------+
     |                                                 |
     |                SAVNET Controller                |
     +-------------------------------------------------+          
                 /|\                   /|\
                  |                     |
                 \|/                   \|/
              +--------+            +--------+                      
              | ASBR1  |            | ASBR2  |              
              +--------+            +--------+              
            SAVNET Router         Non-SAVNET Router
]]></artwork>
        </figure>
        <t>(2) Access Router: If a subnet is connected to two access routers and only one router supports SAVNET and the other does not, the controller can generate the SAV entry of P2 and send it to access router R1. The prefix-interface whitelist of access router R1 includes P1 and P2 to avoid false blocking. The controller can also generate ACL entries with prefixes P1 and P2 and send them to the access interface of access router R2 which does not support SAVNET.</t>
        <figure>
          <name>Deliver SAV rules to access routers</name>
          <artwork><![CDATA[
     +-------------------------------------------------+
     |                                                 |
     |                SAVNET Controller                |
     +-------------------------------------------------+          
                 /|\                   /|\
                  |                     |
                 \|/                   \|/
         +---------------+      +---------------+                      
         | Access Router |      | Access Router |             
         +---------------+      +---------------+           
  SAVNET Router      \             /       Non-SAVNET Router
                  P1  \           / P2
                    +---------------+
                    |   Customer    |
                    |   Network     |
                    +---------------+

]]></artwork>
        </figure>
      </section>
      <section anchor="key-technologies-in-inter-domain-savnet-enhancement">
        <name>Key technologies in Inter-domain SAVNET enhancement</name>
        <t>In inter-domain source address verification, the controller can also play an important role.</t>
        <ul spacing="normal">
          <li>
            <t>Scenario 1: Centralized controller in single management domain including multiple ASes:</t>
          </li>
        </ul>
        <t>An ISP has multiple ASes in actual network deployment. If a unified controller manages multiple ASes, the controller can deliver SAV rules to the devices of each AS as required.</t>
        <figure>
          <name>Centralized controller in single management domain with multiple ASes</name>
          <artwork><![CDATA[
       +-------------------------------------------------+
       |               Centralized Controller            |
       +-------------------------------------------------+
           /|\               /|\                   /|\ 
            |                 |                     |
           \|/               \|/                   \|/
       +------------+    +------------+     +------------+
       |     AS1    |    |    AS2     |     |    AS3     |
       +------------+    +------------+     +------------+
]]></artwork>
        </figure>
        <t>Based on the source addresses prefixes of the entire network, relationships between ASes, and third-party authentication information such as ROA objects and ASPA objects, the controller can calculate the SAV rules of the entire management domain and deliver SAV rules to the corresponding devices. For a description of the delivery of SAV rules, see 5.1.</t>
        <ul spacing="normal">
          <li>
            <t>Scenario 2: Different ASes has different controllers</t>
          </li>
        </ul>
        <t>When different ASes have their own controllers, each controller collects the complete source address prefixes of the local AS and sends them to the ASBR. The ASBR generates the inter-domain SAV-Specific information and advertises it to the ASBR of the neighboring AS. As shown in Figure 9, not all routers in AS1 and AS2 support SAVNET，AS1 and AS2 controllers collect the complete source address prefixes and send to their own ASBRs respetively. The controller can also deliver the synchronization key to the ASBR to ensure the reliability and flexibility of inter-domain SAV-Specific information transmission.</t>
        <figure>
          <name>Centralized controller with one controller within multiple ASes</name>
          <artwork><![CDATA[
       +-------------------+       +-------------------+
       |  AS1 controller   |       |  AS2 controller   |
       +-------------------+       +-------------------+
               /|\                         /|\  
                |                           |                     
               \|/                         \|/                    
       +-------------------+       +-------------------+     
       |       AS1         | <---> |       AS2         |    
       +-------------------+       +-------------------+  
                   SAV-Specific information
]]></artwork>
        </figure>
        <t>Besides，if ASBR of an AS do not support SAVNET and can not generate the inter-domain SAV-Specific information, SAV-Specific information can be advertised through network cooperator for rapid deployment as shown in Figure 9. Each controller can generate SAV rules based on SAV-Specific information and advertise to ASBRs to achieve source address verification.</t>
        <figure>
          <name>Centralized controller with one controller within multiple ASes</name>
          <artwork><![CDATA[
       +-----------------------------------------------+
       |               network cooperator            |
       +-----------------------------------------------+    
               /|\                          /|\  
                |  SAV-Specific information  |                     
               \|/                          \|/    
       +-------------------+       +-------------------+
       |  AS1 controller   |       |  AS2 controller   |
       +-------------------+       +-------------------+
               /|\                         /|\  
                |  SAV rules                |  SAV rules                  
               \|/                         \|/                    
       +-------------------+       +-------------------+     
       |       AS1         |       |       AS2         |    
       +-------------------+       +-------------------+  
                  
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="use-case">
      <name>Use Case</name>
      <t>Several use cases will illustrate that centralized intra-domain SAVNET can achieve more accurate and comprehensive SAV.</t>
      <t>Case 1: More accurate intra-domain edge protection
TBD.</t>
      <t>Case 2: More accurate intra-domain border protection
TBD.</t>
      <t>Case 3: More accurate Inter-domain protection
TBD.</t>
      <t>Case 4: Accurate protection with anycast IP address
TBD.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBD.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9552">
          <front>
            <title>Distribution of Link-State and Traffic Engineering Information Using BGP</title>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <date month="December" year="2023"/>
            <abstract>
              <t>In many environments, a component external to a network is called upon to perform computations based on the network topology and the current state of the connections within the network, including Traffic Engineering (TE) information. This is information typically distributed by IGP routing protocols within the network.</t>
              <t>This document describes a mechanism by which link-state and TE information can be collected from networks and shared with external components using the BGP routing protocol. This is achieved using a BGP Network Layer Reachability Information (NLRI) encoding format. The mechanism applies to physical and virtual (e.g., tunnel) IGP links. The mechanism described is subject to policy control.</t>
              <t>Applications of this technique include Application-Layer Traffic Optimization (ALTO) servers and Path Computation Elements (PCEs).</t>
              <t>This document obsoletes RFC 7752 by completely replacing that document. It makes some small changes and clarifications to the previous specification. This document also obsoletes RFC 9029 by incorporating the updates that it made to RFC 7752.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9552"/>
          <seriesInfo name="DOI" value="10.17487/RFC9552"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.li-savnet-intra-domain-problem-statement">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="11" month="March" year="2023"/>
            <abstract>
              <t>   This document provides the gap analysis of existing intra-domain
   source address validation mechanisms, describes the fundamental
   problems, and defines the requirements for technical improvements.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-problem-statement-07"/>
        </reference>
        <reference anchor="I-D.li-savnet-intra-domain-architecture">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Fang Gao" initials="F." surname="Gao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>   This document proposes the intra-domain SAVNET architecture, which
   achieves accurate source address validation (SAV) in an intra-domain
   network by an automatic way.  Compared with uRPF-like SAV mechanisms
   that only depend on routers' local routing information, SAVNET
   routers generate SAV rules by using both local routing information
   and SAV-specific information exchanged among routers, resulting in
   more accurate SAV validation in asymmetric routing scenarios.
   Compared with ACL rules that require manual efforts to accommodate to
   network dynamics, SAVNET routers learn the SAV rules automatically in
   a distributed way.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-architecture-07"/>
        </reference>
        <reference anchor="I-D.li-savnet-inter-domain-architecture">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.li-savnet-source-prefix-advertisement">
          <front>
            <title>Source Prefix Advertisement for Intra-domain SAVNET</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="20" month="October" year="2024"/>
            <abstract>
              <t>   This document proposes the Source Prefix Advertisement (SPA)
   technology for intra-domain SAVNET, called SPA-based SAVNET.  SPA-
   based SAVNET allows routers in an intra-domain network to exchange
   SAV-specific information through SPA messages.  Compared with
   existing intra-domain SAV mechanisms RFC2827 [RFC3704], SPA-based
   SAVNET can generate more accurate and robust SAV rules on intra-
   domain routers in an automatic way.  This document introduces the
   content of SPA messages and the process of generating SAV rules.  SPA
   messages can be transmitted by a new protocol or an extension to an
   existing protocol.  Protocol designs and extensions are not in the
   scope of this document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-source-prefix-advertisement-01"/>
        </reference>
        <reference anchor="I-D.huang-savnet-sav-table">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Mingxing Liu" initials="" surname="Liu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <date day="25" month="August" year="2024"/>
            <abstract>
              <t>   The SAV rules of existing source address validation (SAV) mechanisms,
   are derived from other core data structures, e.g., FIB-based uRPF,
   which are not dedicatedly designed for source filtering.  Therefore
   there are some limitations related to deployable scenarios and
   traffic handling policies.

   To overcome these limitations, this document introduces the general
   SAV capabilities from data plane perspective.  How to implement the
   capabilities and how to generate SAV rules are not in the scope of
   this document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-07"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
