<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tong-idr-bgp-ls-sav-rule-02" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="BGP-LS for Advertising SAV Rules">Advertisement of Multi-Sourced SAV Rules using BGP Link-State</title>
    <seriesInfo name="Internet-Draft" value="draft-tong-idr-bgp-ls-sav-rule-02"/>
    <author initials="T." surname="Tong" fullname="Tian Tong">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tongt5@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="N." surname="Wang" fullname="Nan Wang">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangn161@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="S." surname="Zhuang" fullname="Shunwan Zhuang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuangshunwan@huawei.com</email>
      </address>
    </author>
    <author initials="J." surname="Zhao" fullname="Jing Zhao">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhaoj501@chinaunicom.cn</email>
      </address>
    </author>
    <date year="2025" month="July" day="05"/>
    <area>rtg</area>
    <workgroup>idr</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 76?>
<t>This document describes the protocol extensions of BGP Link-State to collect source address validation (SAV) rules generated by different protocols/mechanisms, to facilitate multi-sourced SAV rules monitoring and management.</t>
    </abstract>
  </front>
  <middle>
    <?line 79?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) can efficiently prevent source address spoofing-based attacks. SAV rules, which indicate the valid/invalid incoming interfaces of a specific source IP address or source IP prefix, are installed on routers for checking the source addresses of received packets.</t>
      <t>SAV rules can be generated by static configuration, management tools, or based on different routing protocols such as OSPFv2, OSPFv3, IS-IS, BGP, or their extensions <xref target="I-D.ietf-savnet-intra-domain-architecture"/><xref target="I-D.ietf-savnet-inter-domain-architecture"/>. Due to the requirements of application scenarios, a router may use more than one tool at the same time to obtain SAV rules. Therefore, the rules on the router will be multi-sourced, which complicates management. What is more challenging is that there may exist conflicts among these multi-sourced rules and the rules can be dynamic.</t>
      <t>To facilitate SAV rules monitoring and management, this document proposes to extend BGP-LS (<xref target="RFC9552"/>) for advertising SAV rules on routers to a centralized server. The centralized server can effectively collect multi-sourced SAV rules from routers. For the purpose of advertising SAV rules within BGP-LS advertisements, two new NLRIs called SAV Rule NLRIs are proposed for IPv4 and IPv6, respectively.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-nlri">
      <name>BGP-LS NLRI Advertisement for SAV Rules</name>
      <t>The "Link-State NLRI" defined in <xref target="RFC9552"/> is extended to carry the SAV rule information. The format of "Link-State NLRI" is defined in <xref target="RFC9552"/> as follows:</t>
      <figure anchor="fig-nlri">
        <name>Link-State NLRI</name>
        <artwork><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |            NLRI Type          |     Total NLRI Length         |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    //                  Link-State NLRI (variable)                 //
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <t>This document defines two new NLRI Types known as SAV Rule NLRIs (values are TBD) for the advertisement of SAV rule Information.</t>
      <section anchor="sav-rule-nlris">
        <name>SAV Rule NLRIs</name>
        <t>This document defines SAV Rule NLRI Types with their common format as shown in the following figure:</t>
        <figure anchor="fig-rule-nlri">
          <name>BGP-LS SAV Rule NLRI</name>
          <artwork><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+
    |  Protocol-ID  |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                           Identifier                          |
    +                           (8 octets)                          +
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    //            Local Node Descriptors TLVs (variable)            //
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    //            SAV Rule Descriptors TLVs (variable)             //
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The fields are defined as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Protocol-ID: Specifies the source of SAV rules in this NLRI. Protocol-ID values defined in <xref target="RFC9086">RFC9552</xref> can be reused.</t>
          </li>
          <li>
            <t>Identifier: An 8 octet value as defined in <xref target="RFC9552"/>.</t>
          </li>
          <li>
            <t>Local Node Descriptors TLV: Contains Node Descriptors for the nodes storing SAV rules. This is a mandatory TLV in SAV Rule NLRIs. The Type is 256. The length of this TLV is variable. The value contains one or more Node Descriptor sub-TLVs defined in <xref target="RFC9552"/>.</t>
          </li>
          <li>
            <t>SAV Rule Descriptors TLVs: There can be one or more SAV Rule Descriptors TLVs for carrying SAV rules.</t>
          </li>
        </ul>
      </section>
      <section anchor="sav-rule-descriptors-tlvs">
        <name>SAV Rule Descriptors TLVs</name>
        <t>The SAV Rule Descriptor field is a set of TLV triplets. SAV Rule Descriptors TLVs identify a set of SAV rules having the same set of valid interfaces as defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>. The following TLVs are valid as SAV Rule Descriptors in the SAV Rule NLRI:</t>
        <figure anchor="fig-rule-descriptor">
          <name>SAV Rule Descriptor TLVs</name>
          <artwork><![CDATA[
    +-------------+---------------------+----------+
    |   TLV Code  | Description         |  Length  |
    |    Point    |                     |          |
    +-------------+---------------------+----------+
    |     TBD     | Interface Name      | variable |
    |     TBD     | Interface Group     |    4     |
    |     TBD     | SAV Prefix          | variable |
    +-------------+---------------------+----------+
]]></artwork>
        </figure>
        <section anchor="sec-intf-name-tlv">
          <name>Interface Name TLV</name>
          <t>An Interface Name TLV is used to identify one valid interface of the source prefixes carried in SAV Prefix TLVs. The format of Interface Name TLV is as follows:</t>
          <figure anchor="fig-intf-name-tlv">
            <name>Interface Name TLV</name>
            <artwork><![CDATA[
      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |              Type             |             Length            |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     //                     Interface Name    (variable)            //
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          </figure>
          <t>There can be zero, one or more Interface Name TLVs in the SAV Rule Descriptor field.</t>
        </section>
        <section anchor="sec-intf-group-tlv">
          <name>Interface Group TLV</name>
          <t>An Interface Group TLV is to identify a group of valid interfaces of the source prefixes carried in SAV Prefix TLVs. The format of Interface Group TLV is as follows:</t>
          <figure anchor="fig-intf-group-tlv">
            <name>Interface Group TLV</name>
            <artwork><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |              Type             |             Length            |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    //                       Interface Group (4 octets)            //
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          </figure>
          <t>The Interface Group value can have either a local meaning or a global meaning. On the one hand, it can be a local interface property on the target routers, and the meaning of it depends on the configurations of network administrator <xref target="I-D.ietf-idr-flowspec-interfaceset"/>. On the other hand, a global meaning Group Identifier field carries an AS number, which represents all the interfaces connected to the neighboring AS with the AS number. <xref target="I-D.geng-idr-flowspec-sav"/></t>
          <t>Interface Group value can also be an Interface ID for identifying a specific interface.</t>
          <t>There can be zero, one or more Interface Group TLVs in the SAV Rule Descriptor field. Interface Group TLVs can be used together with Interface Name TLVs.</t>
          <t>When there is neither an Interface Name TLV nor an Interface Group TLV, the source prefixes carried in SAV Prefix TLVs are considered valid for all the interfaces on the router.</t>
        </section>
        <section anchor="sec-prefix-tlv">
          <name>SAV Prefix TLV</name>
          <t>A SAV Prefix TLV carries one IP address prefix (IPv4 or IPv6). The format of SAV Prefix TLV is as follows:</t>
          <figure anchor="fig-sav-prefix-tlv">
            <name>SAV Prefix TLV</name>
            <artwork><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |              Type             |             Length            |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    | Prefix Length | IP Prefix (variable)                         //
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          </figure>
          <t>There can be one or more SAV Prefix TLVs in the SAV Rule Descriptor field. The IPv4 SAV Prefix TLVs will only appear in the IPv4 SAV Rule NLRI, and The IPv6 SAV Prefix TLVs are only for the IPv6 SAV Rule NLRI</t>
          <t>There can be more than one SAV mechanisms based on the same source (identified by Protocol-ID). In order to distinguish the different sources of rules in a more fine-grained manner, the Type field needs to be allocated for multiple values, and each value identifies a specific SAV mechanism based on the same source identified by Protocol-ID.</t>
          <!-- The type field can be extended in the future. A mode field can be added in the future -->

</section>
      </section>
    </section>
    <section anchor="sec-attr">
      <name>BGP-LS Attribute for SAV Mode</name>
      <t>The BGP-LS Attribute, an optional and non-transitive BGP Attribute, is used to carry the validation mode information of SAV rules {I-D.ietf-savnet-general-sav-capabilities}. The following SAV Mode Attribute TLV is defined for the BGP-LS Attribute associated with a SAV Rule NLRI:</t>
      <figure anchor="fig-sav-mode-tlv">
        <name>SAV Mode TLV</name>
        <artwork><![CDATA[
   0                   1                   2                   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |              Type             |             Length            |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |M  |  Reserved |
  +-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <t>The SAV Mode TLV carries a Mode Flag (M flag is shown in the figure and occupies two bits) describing the validation mode attribute.</t>
      <ul spacing="normal">
        <li>
          <t>When M flag is set to 00, the mode is Mode 1: interface-based source prefix allowlist. The NLRI carries the source prefixes and interfaces. Only the carried prefixes are valid on the carried interfaces, and any other prefixes are invalid on these interfaces.</t>
        </li>
        <li>
          <t>When M flag is set to 01, the mode is Mode 2: interface-based source prefix blocklist. The NLRI carries the source prefixes and interfaces. Only the carried prefixes are invalid on the carried interfaces, and any other prefixes are valid on these interfaces.</t>
        </li>
        <li>
          <t>When M flag is set to 10, the mode is Mode 3: prefix-based interface allowlist. The NLRI carries the source prefixes and interfaces. Only the carried interfaces are valid for the carried prefixes, and any other interfaces are invalid for those prefixes. Any other prefixes will not be validated.</t>
        </li>
        <li>
          <t>When M flag is set to 11, the mode is Mode 4: prefix-based interface blocklist. The NLRI carries the source prefixes and interfaces. Only the carried interfaces are invalid for the carried prefixes, and any other interfaces are valid for those prefixes. Any other prefixes will not be validated.</t>
        </li>
      </ul>
    </section>
    <section anchor="bgp-ls-attribute-for-sav-actions">
      <name>BGP-LS Attribute for SAV Actions</name>
      <t>SAV actions in this document adopt the traffic filtering actions defined in <xref target="RFC8955"/> and <xref target="RFC8956"/>.</t>
      <t>Traffic filtering actions defined in [RFC 8955] include traffic-rate-bytes, traffic-rate-packets, traffic-action, rt-redirect, and traffic-marking, which are applicable to IPv4 and IPv6. Rt-redirect-ipv6 is a new traffic filtering action defined in [RFC 8956], which is applicable to IPv6. The encapsulation formats of SAV actions are consistent with the encapsulation formats defined in [RFC 8955] and [RFC 8956].</t>
      <t>A SAV rule may match multiple SAV actions, and there may be conflicts among these SAV actions. Section 7.7 of [RFC 8955] describes the conflicts among Traffic filtering actions.</t>
    </section>
    <section anchor="example-of-validation-modes-and-sav-rule-nlri-configuration">
      <name>Example of Validation Modes and SAV rule NLRI Configuration</name>
      <t>In this section, we provide examples of how to configure SAV rule NLRI for the four validation modes. 
The SAV rule NLRI can carry zero, one, or multiple interfaces/interface groups and one or more prefixes.</t>
      <section anchor="mode-1-interface-based-prefix-allowlist">
        <name>Mode 1: Interface-based prefix allowlist</name>
        <t>In this mode, only the prefixes carried in the SAV rule NLRI are considered valid on the specified interface. 
All other prefixes arriving at this interface are considered invalid.</t>
        <t>Example:</t>
        <ul spacing="normal">
          <li>
            <t>SAV rule NLRI: prefix = 192.168.1.0/24, interfaces = [Interface A]</t>
          </li>
          <li>
            <t>Validation: Any packet with a source prefix of 192.168.1.0/24 arriving at Interface A is valid. All other prefixes on Interface A are invalid.</t>
          </li>
        </ul>
      </section>
      <section anchor="mode-2-interface-based-prefix-blocklist">
        <name>Mode 2: Interface-based prefix blocklist</name>
        <t>In this mode, the prefixes carried in the SAV rule NLRI are considered invalid on the specified interface. 
All other prefixes arriving at this interface are considered valid.</t>
        <t>Example:</t>
        <ul spacing="normal">
          <li>
            <t>SAV rule NLRI: prefix = 10.0.0.0/8, interfaces = [Interface B]</t>
          </li>
          <li>
            <t>Validation: Any packet with a source prefix of 10.0.0.0/8 arriving at Interface B is invalid. All other prefixes on Interface B are valid.</t>
          </li>
        </ul>
      </section>
      <section anchor="mode-3-prefix-based-interface-allowlist">
        <name>Mode 3: Prefix-based interface allowlist</name>
        <t>In this mode, for a specific source prefix, only the interfaces carried in the SAV rule NLRI are considered valid. 
Packets with this source prefix arriving at other interfaces are invalid. Other prefixes are not checked.</t>
        <t>Example:</t>
        <ul spacing="normal">
          <li>
            <t>SAV rule NLRI: prefix = 172.16.0.0/16, interfaces = [Interface C, Interface D]</t>
          </li>
          <li>
            <t>Validation: Packets with a source prefix of 172.16.0.0/16 are valid only if they arrive at Interface C or Interface D. 
This prefix arriving at other interfaces is invalid. Other prefixes are not checked.</t>
          </li>
        </ul>
      </section>
      <section anchor="mode-4-prefix-based-interface-blocklist">
        <name>Mode 4: Prefix-based interface blocklist</name>
        <t>In this mode, for a specific source prefix, the interfaces carried in the SAV rule NLRI are considered invalid. 
Packets with this source prefix arriving at other interfaces are valid. Other prefixes are not checked.</t>
        <t>Example:</t>
        <ul spacing="normal">
          <li>
            <t>SAV rule NLRI: prefix = 192.168.2.0/24, interfaces = [Interface E]</t>
          </li>
          <li>
            <t>Validation: Packets with a source prefix of 192.168.2.0/24 arriving at Interface E are invalid. This prefix arriving at other interfaces is valid. Other prefixes are not checked.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="procedures">
      <name>Procedures</name>
      <t>SAV rules only exist on the routers running SAV mechanisms/protocols and the controller, these routers are usually access routers or boundary routers. This document describes extensions to the BGP-LS NLRI. The Routers running SAV mechanisms/protocols establish BGP-LS sessions with the controller respectively to report multi-sourced SAV rules.</t>
      <figure anchor="fig-advertisement-of-sav-rules">
        <name>Advertisement of SAV Rules using BGP-LS</name>
        <artwork><![CDATA[
                        +--------------------------+
                        |        Controller        |
                        +--------------------------+
                        |                          |   BGP-LS advertisements for SAV Rule NLRIs
+-----------------------|--------------------------|-----------------+
|   AS100              /                            \                |  
|                  +---------+                +---------+            | 
|                  | Router1 | -------------- | Router2 |            | 
|                  +---------+                +---------+            |  
|                     |                              |               |
|                     |                              |               |
|                     |                              |               |
|                     |                              |               |
|                  +---------+                +---------+            | 
|                  | Router3 | -------------- | Router4 |            |  
|                  +---------+                +---------+            | 
|                                                                    |  
+--------------------------------------------------------------------+
]]></artwork>
      </figure>
      <t>Based on Figure 8, the process of reporting SAV rules via BGP-LS is described as follows:
Step 1: R1 and R2 run SAV mechanism/protocol, and generate multi-sourced SAV rules.
Step 2: R1 and R2 respectively establish BGP-LS sessions with the controller.
Step 3: R1 and R2 generate BGP-LS advertisements for the SAV Rule NLRIs.
Step 4: R1 and R2 report multi-sourced SAV rules to the controller through the sav rule NLRIs (as defined in Section 2). This enables the controller to monitor and manage multi-sourced SAV rules.</t>
    </section>
    <section anchor="manageability-considerations">
      <name>Manageability Considerations</name>
      <t>The Existing BGP operational and management procedures apply to this document. No new procedures are defined in this document. The considerations as specified in <xref target="RFC9552"/> apply to this document.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This section describes the code point allocation by IANA for this document.</t>
      <section anchor="bgp-ls-nlri-types-registry">
        <name>"BGP-LS NLRI-Types" registry</name>
        <t>This document requests assigning code-points from the registry for SAV Rule NLRIs:</t>
        <artwork><![CDATA[
+------+---------------------------+
| Type | NLRI Type                 |
+------+---------------------------+
| TBD  | IPv4 SAV Rule NLRI        |
| TBD  | IPv6 SAV Rule NLRI        |
+------+---------------------------+
]]></artwork>
      </section>
      <section anchor="bgp-ls-sav-rule-descriptors-tlvs-registry">
        <name>"BGP-LS SAV Rule Descriptors TLVs" registry</name>
        <t>This document requests assigning code-points from the registry for BGP-LS SAV Rule Descriptors TLVs based on <xref target="fig-rule-descriptor"/>.</t>
      </section>
      <section anchor="bgp-ls-sav-mode-attribute-tlv-registry">
        <name>"BGP-LS SAV Mode Attribute TLV" registry</name>
        <t>This document requests assigning a code-point from the registry for the BGP-LS SAV Mode attribute TLV.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>Procedures and protocol extensions defined in this document do not affect the base BGP security model. See <xref target="RFC6952"/> for details. The security considerations of the base BGP-LS specification as described in <xref target="RFC9552"/> also apply.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9552" target="https://www.rfc-editor.org/info/rfc9552" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9552.xml">
          <front>
            <title>Distribution of Link-State and Traffic Engineering Information Using BGP</title>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <date month="December" year="2023"/>
            <abstract>
              <t>In many environments, a component external to a network is called upon to perform computations based on the network topology and the current state of the connections within the network, including Traffic Engineering (TE) information. This is information typically distributed by IGP routing protocols within the network.</t>
              <t>This document describes a mechanism by which link-state and TE information can be collected from networks and shared with external components using the BGP routing protocol. This is achieved using a BGP Network Layer Reachability Information (NLRI) encoding format. The mechanism applies to physical and virtual (e.g., tunnel) IGP links. The mechanism described is subject to policy control.</t>
              <t>Applications of this technique include Application-Layer Traffic Optimization (ALTO) servers and Path Computation Elements (PCEs).</t>
              <t>This document obsoletes RFC 7752 by completely replacing that document. It makes some small changes and clarifications to the previous specification. This document also obsoletes RFC 9029 by incorporating the updates that it made to RFC 7752.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9552"/>
          <seriesInfo name="DOI" value="10.17487/RFC9552"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-general-sav-capabilities" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-general-sav-capabilities-01" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-general-sav-capabilities.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="24" month="June" year="2025"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-general-sav-capabilities-01"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6952" target="https://www.rfc-editor.org/info/rfc6952" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6952.xml">
          <front>
            <title>Analysis of BGP, LDP, PCEP, and MSDP Issues According to the Keying and Authentication for Routing Protocols (KARP) Design Guide</title>
            <author fullname="M. Jethanandani" initials="M." surname="Jethanandani"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="L. Zheng" initials="L." surname="Zheng"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>This document analyzes TCP-based routing protocols, the Border Gateway Protocol (BGP), the Label Distribution Protocol (LDP), the Path Computation Element Communication Protocol (PCEP), and the Multicast Source Distribution Protocol (MSDP), according to guidelines set forth in Section 4.2 of "Keying and Authentication for Routing Protocols Design Guidelines", RFC 6518.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6952"/>
          <seriesInfo name="DOI" value="10.17487/RFC6952"/>
        </reference>
        <reference anchor="RFC8955" target="https://www.rfc-editor.org/info/rfc8955" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8955.xml">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8956" target="https://www.rfc-editor.org/info/rfc8956" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8956.xml">
          <front>
            <title>Dissemination of Flow Specification Rules for IPv6</title>
            <author fullname="C. Loibl" initials="C." role="editor" surname="Loibl"/>
            <author fullname="R. Raszuk" initials="R." role="editor" surname="Raszuk"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>"Dissemination of Flow Specification Rules" (RFC 8955) provides a Border Gateway Protocol (BGP) extension for the propagation of traffic flow information for the purpose of rate limiting or filtering IPv4 protocol data packets.</t>
              <t>This document extends RFC 8955 with IPv6 functionality. It also updates RFC 8955 by changing the IANA Flow Spec Component Types registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8956"/>
          <seriesInfo name="DOI" value="10.17487/RFC8956"/>
        </reference>
        <reference anchor="RFC9086" target="https://www.rfc-editor.org/info/rfc9086" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9086.xml">
          <front>
            <title>Border Gateway Protocol - Link State (BGP-LS) Extensions for Segment Routing BGP Egress Peer Engineering</title>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="S. Ray" initials="S." surname="Ray"/>
            <author fullname="J. Dong" initials="J." surname="Dong"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>A node steers a packet through a controlled set of instructions, called segments, by prepending the packet with a list of segment identifiers (SIDs). A segment can represent any instruction, topological or service based. SR segments allow steering a flow through any topological path and service chain while maintaining per-flow state only at the ingress node of the SR domain.</t>
              <t>This document describes an extension to Border Gateway Protocol - Link State (BGP-LS) for advertisement of BGP Peering Segments along with their BGP peering node information so that efficient BGP Egress Peer Engineering (EPE) policies and strategies can be computed based on Segment Routing.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9086"/>
          <seriesInfo name="DOI" value="10.17487/RFC9086"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-architecture-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="13" month="April" year="2025"/>
            <abstract>
              <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms [RFC3704] that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL-based ingress filtering [RFC2827] that entirely requires manual efforts to accommodate to network dynamics, SAVNET routers learn SAV rules automatically in a distributed way.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-architecture-02"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-architecture-01" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV- specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-architecture-01"/>
        </reference>
        <reference anchor="I-D.ietf-idr-flowspec-interfaceset" target="https://datatracker.ietf.org/doc/html/draft-ietf-idr-flowspec-interfaceset-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-idr-flowspec-interfaceset.xml">
          <front>
            <title>Applying BGP flowspec rules on a specific interface set</title>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Individual</organization>
            </author>
            <author fullname="Adam Simpson" initials="A." surname="Simpson">
              <organization>Nokia</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus, Inc</organization>
            </author>
            <author fullname="Jeffrey Haas" initials="J." surname="Haas">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Lucy Yong" initials="L." surname="Yong">
              <organization>Huawei</organization>
            </author>
            <date day="18" month="November" year="2019"/>
            <abstract>
              <t>The BGP Flow Specification (flowspec) Network Layer Reachability Information (BGP NLRI) extension (draft-ietf-idr-rfc5575bis) is used to distribute traffic flow specifications into BGP. The primary application of this extension is the distribution of traffic filtering policies for the mitigation of distributed denial of service (DDoS) attacks. By default, flow specification filters are applied on all forwarding interfaces that are enabled for use by the BGP flowspec extension. A network operator may wish to apply a given filter selectively to a subset of interfaces based on an internal classification scheme. Examples of this include "all customer interfaces", "all peer interfaces", "all transit interfaces", etc. This document defines BGP Extended Communities (RFC4360) that allow such filters to be selectively applied to sets of forwarding interfaces sharing a common group identifier. The BGP Extended Communities carrying this group identifier are referred to as the BGP Flowspec "interface-set" Extended Communities.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-flowspec-interfaceset-05"/>
        </reference>
        <reference anchor="I-D.geng-idr-flowspec-sav" target="https://datatracker.ietf.org/doc/html/draft-geng-idr-flowspec-sav-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.geng-idr-flowspec-sav.xml">
          <front>
            <title>BGP Flow Specification for Source Address Validation</title>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="tongtian124" initials="" surname="tongtian124">
              <organization>China Unicom</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="14" month="April" year="2025"/>
            <abstract>
              <t>BGP FlowSpec reuses BGP route to distribute infrastructure and propagates traffic flow information with filtering actions. This document proposes some extensions to BGP FlowSpec for disseminating SAV rules.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-geng-idr-flowspec-sav-05"/>
        </reference>
      </references>
    </references>
    <?line 376?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
