<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-25" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Problem Statement, Gap Analysis, and Requirements for Intra-domain Source Address Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-25"/>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="21"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 81?>

<t>Source address validation (SAV) is an important means to mitigate IP source address spoofing <xref target="RFC2827"/>. This document analyzes the gaps in current operational mechanisms for intra-domain SAV. It also identifies the properties that new intra-domain SAV mechanisms are expected to provide.</t>
    </abstract>
  </front>
  <middle>
    <?line 85?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) defends against IP source address spoofing <xref target="RFC2827"/>. Network operators can enforce SAV at the following levels (see <xref target="RFC5210"/>):</t>
      <ul spacing="normal">
        <li>
          <t>IP source address validation in the access network</t>
        </li>
        <li>
          <t>IP source address validation at intra-AS/ingress point</t>
        </li>
        <li>
          <t>IP source address validation in the inter-AS case (neighboring AS)</t>
        </li>
      </ul>
      <t>Some access networks have already deployed SAV mechanisms. These mechanisms are typically deployed on switches in the access network and prevent hosts connected to those switches from using the source address of another host on the Internet <xref target="RFC5210"/>. Mechanisms include:</t>
      <ul spacing="normal">
        <li>
          <t>Source Address Validation Improvement (SAVI) Solution for DHCP <xref target="RFC7513"/></t>
        </li>
        <li>
          <t>IP Source Guard (IPSG) based on DHCP snooping <xref target="IPSG"/></t>
        </li>
        <li>
          <t>Cable Source-Verify <xref target="cable-verify"/></t>
        </li>
      </ul>
      <t>However, access-network SAV mechanisms are not universally deployed <xref target="CAIDA-spoofer"/>. Therefore, intra-domain (i.e., intra-AS) SAV and inter-domain (i.e., inter-AS) SAV are required <xref target="RFC5210"/>. For the purpose of this document, intra-domain SAV is defined as follows:</t>
      <ul spacing="normal">
        <li>
          <t>The AS validates the source addresses of data traffic that it originates directly or indirectly. Intra-domain SAV is applied at external interfaces (on routers) facing entities that are not deployed as neighboring ASes and are therefore not covered by inter-domain SAV. For example, as illustrated in <xref target="intra-domain"/>, an entity can be a single host, a set of hosts, or a customer network with no AS that manages one or more IP prefixes. The entity may source traffic using prefixes assigned by the AS or its own BYOIP prefixes. From the perspective of other ASes, such traffic is originated by the AS.</t>
        </li>
      </ul>
      <t>SAV on traffic received on external interfaces facing a neighboring AS is considered inter-domain SAV, regardless of whether the neighboring AS uses a public ASN or a private ASN. SAV on internal interfaces (e.g., interfaces between Router 1 and Router 3 in <xref target="intra-domain"/>) is also outside the scope of this document. This is because routers inside the same AS are generally assumed to be trusted, so SAV on internal interfaces provides limited additional benefit when SAV is already applied at external interfaces. In addition, techniques such as fast reroute can make SAV at internal interfaces technically challenging.</t>
      <figure anchor="intra-domain">
        <name>Deployment locations of intra-domain SAV</name>
        <artwork><![CDATA[
    +--------------------+        
    |  A neighboring AS  |         
    +--------------------+          
              |                                      
              |                                     
              |                           
+-------------|-------------------------------------+ 
|Domain       |                                     | 
|         +----------+               +----------+   | 
|         | Router 3 +---------------+ Router 4 |   | 
|         +----------+               +----------+   | 
|          /        \                     |         | 
|         /          \                    |         | 
|        /            \                   |         | 
| +----------+     +----------+      +----------+   | 
| | Router 1 |     | Router 2 +------+ Router 5 |   | 
| +------*---+     +--*-------+      +----X-----+   | 
|        /\           /\                  /\        | 
|         \           /                   |         | 
+----------\---------/--------------------|---------+ 
       +----------------+         +---------------+  
       | A customer     |         | A single host |  
       | network with   |         | or a set of   |  
       | no AS          |         | hosts         |  
       +----------------+         +---------------+ 
                                                    
Intra-domain SAV is applied at interfaces '*' and 'X'.
]]></artwork>
      </figure>
      <t>This document analyzes the gaps in current operational mechanisms for intra-domain SAV. It also identifies the properties that new intra-domain SAV mechanisms are expected to provide.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <dl newline="true">
          <dt>SAV Rule:</dt>
          <dd>
            <t>The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions.</t>
          </dd>
          <dt>Improper Block:</dt>
          <dd>
            <t>The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
          </dd>
          <dt>Improper Permit:</dt>
          <dd>
            <t>The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
          </dd>
          <dt>Proper Block:</dt>
          <dd>
            <t>The validation results that packets with spoofed source addresses are blocked by SAV rules.</t>
          </dd>
          <dt>Proper Permit:</dt>
          <dd>
            <t>The validation results that packets with legitimate source addresses are permitted by SAV rules.</t>
          </dd>
          <dt>SAV-specific Information:</dt>
          <dd>
            <t>The information specialized for SAV rule generation.</t>
          </dd>
          <dt>Direct Server Return (DSR):</dt>
          <dd>
            <t>A traffic delivery model commonly used by Content Delivery Networks (CDNs) that use anycast service addresses while delivering data from edge locations that do not announce those addresses. In such deployments, a request is received by the anycast server or location, but the response is sent directly by another server (i.e., the edge location) with the anycast service address as the source address, rather than the address used to reach the edge server. This can create a legitimate hidden-prefix scenario.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>The problems of existing intra-domain SAV mechanisms can be characterized along three dimensions: improper block, improper permit, and operational overhead:</t>
      <ul spacing="normal">
        <li>
          <t>Improper block. Existing intra-domain SAV mechanisms may block data packets using legitimate source addresses when the applied SAV rules are inaccurate.</t>
        </li>
        <li>
          <t>Improper permit. Existing intra-domain SAV mechanisms may permit data packets using spoofed source addresses when the applied SAV rules are inaccurate.</t>
        </li>
        <li>
          <t>Operational overhead. Existing intra-domain SAV mechanisms may require operator involvement to determine and update SAV rules. This overhead depends on how much manual effort is needed to keep the SAV rules up to date.</t>
        </li>
      </ul>
      <t>In this document, these three dimensions are used to analyze the gaps in existing intra-domain SAV mechanisms.</t>
    </section>
    <section anchor="sec-mechanisms">
      <name>Current Operational Intra-domain SAV Mechanisms</name>
      <t>Although BCP 38 <xref target="RFC2827"/> and BCP 84 <xref target="RFC3704"/> specify several ingress filtering methods primarily intended for inter-domain SAV, some of these methods have also been applied to intra-domain SAV in operational practice. This section introduces the mechanisms currently used to implement intra-domain SAV.</t>
      <ul spacing="normal">
        <li>
          <t>Access Control Lists (ACLs) can be used as SAV filters <xref target="RFC2827"/> to check the source address of each packet against a set of permitted or prohibited prefixes. When applied on a router interface, each Access Control Entry (ACE) used for SAV filtering specifies both matching conditions (i.e., prefixes) and the corresponding action (e.g., permit or deny), and packets are processed accordingly.</t>
        </li>
        <li>
          <t>Strict uRPF <xref target="RFC3704"/> provides an automated SAV filter by validating the source address of each packet against the router’s local Forwarding Information Base (FIB). A packet is accepted only if (i) the FIB contains a prefix covering the source address, and (ii) the FIB entry’s outgoing interface matches the packet’s incoming interface. Otherwise, the packet is discarded.</t>
        </li>
        <li>
          <t>Loose uRPF <xref target="RFC3704"/> also relies on the local FIB for validation, but only checks for the presence of a covering prefix. A packet is accepted if the FIB contains a prefix that covers the source address, regardless of the incoming interface.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>This section analyzes the gaps of the current operational intra-domain SAV mechanisms.</t>
      <t>ACLs can be used on interfaces facing a customer network with no AS or a set of hosts to permit only packets whose source addresses belong to specific prefixes. To ensure correct filtering behavior, the ACLs used for SAV filtering need to be updated when the permitted prefixes change; otherwise, packets may be improperly permitted or blocked. In ACL-based SAV deployments, keeping these ACLs up to date can introduce operational challenges when operators need to detect prefix changes and determine and apply the corresponding ACL updates.</t>
      <t>As described in <xref target="sec-mechanisms"/> and also noted in <xref target="RFC3704"/>, loose uRPF sacrifices directionality when validating source addresses of data packets. Since its rules are overly permissive, any spoofed packet with a source address present in the FIB may be permitted by loose uRPF (i.e., an improper permit problem).</t>
      <t>Strict uRPF may block legitimate traffic in the asymmetric routing or hidden prefix scenarios (see <xref target="subsec-ar"/> and <xref target="subsec-hp"/>). It may mistakenly consider a valid incoming interface as invalid, resulting in legitimate packets being blocked (i.e., an improper block problem).</t>
      <t>The following subsections describe two specific gap scenarios for intra-domain SAV.</t>
      <section anchor="subsec-ar">
        <name>Asymmetric Routing Scenario</name>
        <t>Asymmetric routing means a packet traverses from a source to a destination in one path and takes a different path when it returns to the source. Asymmetric routing can occur within an AS due to routing policy, traffic engineering, etc.</t>
        <t>For example, a customer network with no AS connected to multiple routers of the AS may need to perform load balancing on incoming traffic, thereby resulting in asymmetric routing. <xref target="multi-home"/> illustrates an example of asymmetric routing. The customer network owns prefix 2001:db8::/55 and connects to two routers of the AS, Router 1 and Router 2. Router 1, Router 2, and Router 3 exchange routing information via the intra-domain routing protocol. To achieve load balancing for inbound traffic, the customer network expects traffic destined for 2001:db8:0::/56 to enter through Router 1, and traffic destined for 2001:db8:0:100::/56 to enter through Router 2. To this end, Router 1 advertises 2001:db8:0::/56 and Router 2 advertises 2001:db8:0:100::/56 through the intra-domain routing protocol. <xref target="multi-home"/> also shows the corresponding FIB entries of Router 1 and Router 2 for the two prefixes.</t>
        <figure anchor="multi-home">
          <name>An example of asymmetric routing</name>
          <artwork><![CDATA[
 +----------------------------------------------------------+
 |Domain                                                    |
 |                      +----------+                        |
 |                      | Router 3 |                        |
 |                      +----------+                        |
 |                       /       \                          |
 |                      /         \                         |
 |                     /           \                        |
 |            +----------+       +----------+               |
 |            | Router 1 |       | Router 2 |               |
 |            +-----*----+       +----------+               |
 |                  /\               /                      |
 |                   \              /                       |
 +--------------------\------------/------------------------+
  Traffic with         \          / Traffic with            
  source IP addresses   \        /  destination IP addresses
  of 2001:db8:0:100::/56 \      \/  of 2001:db8:0:100::/56  
                    +----------------+                     
                    |Customer network|                     
                    |with no AS      |                     
                    |(2001:db8::/55) |                     
                    +----------------+                     

 FIB of Router 1                FIB of Router 2
 Dest                Next_hop   Dest                Next_hop
 2001:db8:0::/56     Customer   2001:db8:0:100::/56 Customer
                     Network                        Network
 2001:db8:0:100::/56 Router 3   2001:db8:0::/56     Router 3

 The legitimate traffic originated from the customer network 
 with source addresses in 2001:db8:0:100::/56 will be improperly 
 blocked by strict uRPF on Router 1.
]]></artwork>
        </figure>
        <t>Although the customer network does not expect to receive inbound traffic for 2001:db8:0:100::/56 via Router 1, it can send outbound traffic with source addresses in that prefix through Router 1. As a result, data packets between the customer network and Router 1 may follow asymmetric paths. Arrows in the figure indicate the direction of traffic flow.</t>
        <t>If Router 1 enforces strict uRPF by checking the FIB entry for the prefix 2001:db8:0:100::/56, the corresponding SAV rule would only allow packets with a source address from 2001:db8:0:100::/56 that arrive via Router 3. Consequently, when the customer network sends packets with a source address in 2001:db8:0:100::/56 to Router 1, strict uRPF would incorrectly drop these legitimate packets. Similarly, if Router 2 enforces strict uRPF, it would incorrectly block legitimate packets from the customer network that use source addresses within the prefix 2001:db8:0::/56.</t>
      </section>
      <section anchor="subsec-hp">
        <name>Hidden Prefix Scenario</name>
        <t>The intra-domain hidden prefix scenario refers to situations in which a host or a customer network with no AS legitimately originates traffic using source addresses that are not visible to the intra-domain routing protocol within the domain.</t>
        <ul spacing="normal">
          <li>
            <t>A host (for example, a cloud server instance operated by a tenant) may originate traffic using a source address not allocated by the AS operator. This can occur in deployments such as Direct Server Return (DSR), where return traffic is sent directly from the server using a service IP address that is not part of the operator’s internal routing view.</t>
          </li>
          <li>
            <t>A customer network with no AS may originate traffic using source addresses that are not advertised to the AS operator. This can occur in scenarios such as Direct Server Return (DSR) deployments or when the customer network uses address space assigned by another provider (e.g., in multi-homing or hybrid connectivity scenarios), and such prefixes are not propagated within the operator’s intra-domain routing system.</t>
          </li>
        </ul>
        <t>For ACL-based SAV, enforcing correct filtering in these scenarios requires authoritative information that explicitly specifies which source addresses the host or the customer network is authorized to use. In practice, such authoritative information is often missing. Strict uRPF and loose uRPF also fail in hidden prefix scenarios. They will drop packets from hidden prefixes because the source addresses are absent from the router's FIB or are received from unexpected interfaces.</t>
      </section>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>This section identifies five requirements that can inform the design of new intra-domain SAV mechanisms. These requirements describe the properties that new mechanisms are expected to provide in order to improve upon existing mechanisms, but do not make assumptions about how those properties are achieved. They do not mandate or justify any specific extension to routing or other protocols and therefore cannot be used to directly initiate standards-track protocol changes.</t>
      <t>Existing intra-domain SAV mechanisms have problems in terms of validation accuracy and operational overhead. Current uRPF-based mechanisms derive SAV decisions from routing or forwarding state, which is intended to express reachability rather than authorization of source address usage. More generally, current mechanisms lack authoritative information specifically intended for source address validation that can be consistently and automatically consumed by SAV mechanisms. As a result, uRPF-based mechanisms may not provide accurate validation in scenarios such as asymmetric routing or hidden prefixes (<xref target="sec-gap"/>). Existing ACL-based SAV deployments may have limited applicability in dynamic environments when they rely on operator-driven ACL maintenance. These problems motivate the first two requirements below (in <xref target="sub-require1"/> and <xref target="sub-require2"/>). The remaining three requirements (in <xref target="sub-require3"/>, <xref target="sub-require4"/>, and <xref target="sub-require5"/>) are motivated by deployment and operational considerations.</t>
      <section anchor="sub-require1">
        <name>Accurate Validation</name>
        <t>Any new intra-domain SAV mechanism must improve SAV accuracy over existing intra-domain SAV mechanisms. This improvement can be reflected in reduced improper blocks (false positives), reduced improper permits (false negatives), or both. Furthermore, it must seek to mitigate improper blocks and improve the ability to reject spoofed traffic in the gap scenarios described in <xref target="sec-gap"/>. To support this, additional information beyond the local FIB, such as SAV-specific information, may be needed to make validation decisions and generate accurate SAV rules.</t>
      </section>
      <section anchor="sub-require2">
        <name>Automatic Updates</name>
        <t>Any new intra-domain SAV mechanism must be capable of automatically collecting and processing relevant information, and updating the corresponding SAV rules in response to relevant information changes. Automation helps reduce operational complexity and maintenance overhead, while allowing some initial configuration to improve SAV accuracy. This ensures the mechanism is deployable in practical networks without introducing excessive management burden.</t>
      </section>
      <section anchor="sub-require3">
        <name>Incremental Deployment Support</name>
        <t>Any new intra-domain SAV mechanism must support incremental deployment and provide measurable benefits even when deployed on only a subset of external interfaces facing hosts or customer networks with no AS.</t>
      </section>
      <section anchor="sub-require4">
        <name>No Adverse Impact on Routing Convergence and Fast Reroute</name>
        <t>If any new intra-domain SAV mechanism requires disseminating SAV-specific information among intra-domain routers via a protocol, it must not adversely affect the convergence of existing routing protocols or the operation of fast-reroute mechanisms.</t>
      </section>
      <section anchor="sub-require5">
        <name>Authentication of Information Used for SAV</name>
        <t>Any new intra-domain SAV mechanism must use information that is authenticated or trusted, either through verification of its integrity and authenticity, or via an established trust relationship with the information source.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>This document discusses the problems with existing intra-domain SAV practices and identifies informational requirements for new intra-domain SAV mechanisms. As it does not specify any new protocol/mechanism or protocol extension, it does not introduce new security considerations.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors thank Jared Mauch, Joel Halpern, Aijun Wang, Michael Richardson, Gert Doering, Tony Przygienda, Yingzhen Qu, James Guichard, Ron Bonica, Xueyan Song, and others for their valuable comments. The authors also thank Kotikalapudi Sriram for his suggestions on the definition of intra-domain SAV. The authors thank the IETF Directorates and the IESG for their reviews and comments, which helped improve the clarity of this document.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7513.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="CAIDA-spoofer" target="https://spoofer.caida.org/summary.php?">
          <front>
            <title>State of IP Spoofing</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 297?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
