<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-savnet-source-prefix-advertisement-06" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Intra-domain SPA">Source Prefix Advertisement for Intra-domain SAVNET</title>
    <seriesInfo name="Internet-Draft" value="draft-li-savnet-source-prefix-advertisement-06"/>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="January" day="29"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 51?>

<t>This document describes a mechanism for intra-domain source address validation (SAV), called Source Prefix Advertisement (SPA) for Intra-domain SAVNET (Intra-domain SPA). The mechanism enables intra-domain routers to generate accurate SAV rules by leveraging routing information together with SAV-specific information, including Source Entity Identifiers (SEIs) and Hidden Prefix (HP). Intra-domain SPA improves the precision and reliability of source address validation, addressing challenges such as asymmetric routing and the use of hidden prefixes by legitimate source entities.</t>
    </abstract>
  </front>
  <middle>
    <?line 55?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Existing unicast Reverse Path Forwarding (uRPF) mechanisms (e.g., strict uRPF) <xref target="RFC3704"/> may incorrectly drop legitimate data packets in scenarios involving asymmetric routing or hidden prefixes (see <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>). Similarly, ACL-based ingress filtering <xref target="RFC2827"/> relies entirely on manual updates, which can be difficult to maintain.</t>
      <t>To improve accuracy and enable automatic updates, this document proposes a new intra-domain source address validation (SAV) mechanism, called Source Prefix Advertisement (SPA) for Intra-domain SAVNET (referred to as Intra-domain SPA). Intra-domain SPA allows routers in an intra-domain network to obtain and exchange SAV-specific information, including Source Entity Identifiers (SEIs) and Hidden Prefixes (HPs), in order to generate more precise SAV rules automatically.</t>
      <t>The reader is encouraged to be familiar with <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/> and <xref target="I-D.ietf-savnet-intra-domain-architecture"/>.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV Rule: The rule that describes the mapping relationship between a source address (prefix) and its valid incoming router interface(s).</t>
        <t>SAVNET Router: An intra-domain router that deploys Intra-domain SPA.</t>
        <t>Non-BGP Customer Network: A stub network connected to one or more routers of the AS for Internet connectivity. It only originates traffic and does not participate in BGP routing exchanges with the AS.</t>
        <t>Source Entity Identifier (SEI): A unique identifier assigned by an operator to represent a specific source entity, such as a non-BGP customer network or a set of hosts within a LAN. Each SEI is associated with one or more interfaces on the SAVNET routers that connect to the corresponding source entity.</t>
        <t>Hidden Prefix: A hidden prefix is a prefix legitimately used by a source entity but not visible in the intra-domain routing system.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="deployment-scope">
      <name>Deployment Scope</name>
      <t>Intra-domain SPA focuses solely on source address validation (SAV) performed on the external interfaces of an intra-domain network.
Each SAVNET router can automatically generate either an allowlist SAV rule (i.e., “Interface-based prefix allowlist” mode in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>) or a blocklist SAV rule (i.e., “Interface-based prefix blocklist” mode in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>) for a specific interface, depending on the role of the connected entity.</t>
      <ul spacing="normal">
        <li>
          <t>Interfaces facing a set of hosts: The SAVNET router generates an allowlist SAV rule that precisely covers the source address space legitimately used by the connected hosts.</t>
        </li>
        <li>
          <t>Interfaces facing a non-BGP customer network: The SAVNET router generates an allowlist SAV rule that precisely covers the source address space legitimately used by the non-BGP customer network.</t>
        </li>
        <li>
          <t>Interfaces facing an external AS: The SAVNET router generates a blocklist SAV rule that precisely covers the source address space that is valid only within the local AS and must not be used by external networks.</t>
        </li>
      </ul>
      <section anchor="incremental-deployment-considerations">
        <name>Incremental Deployment Considerations</name>
        <t>Intra-domain SPA can be deployed incrementally and still provide immediate security benefits within its deployment scope.
Each SAVNET router that supports Intra-domain SPA applies SAV rules on its external interfaces — whether facing hosts, non-BGP customer networks, or external ASes.</t>
        <t>When an interface is protected by Intra-domain SPA, spoofed traffic with unallowed source addresses cannot enter the domain through that interface.
As a result, even partial deployment (e.g., enabling Intra-domain SPA on a subset of external interfaces) effectively reduces the potential attack surface.</t>
        <t>By using allowlist SAV rules, SAVNET routers prevent connected hosts or non-BGP customer networks from sending packets with unauthorized source addresses.
By using blocklist SAV rules, SAVNET routers prevent connected external ASes from sending packets that use internal-use-only source addresses.</t>
        <t>As more SAVNET routers in the AS adopt Intra-domain SPA, the overall protection against source address spoofing attacks increases correspondingly, achieving progressive and cumulative deployment benefits without requiring full coverage from the outset.</t>
      </section>
    </section>
    <section anchor="sav-specific-information-in-intra-domain-spa">
      <name>SAV-specific Information in Intra-domain SPA</name>
      <t>Intra-domain SPA uses SAV-specific information to supplement routing data, enabling accurate and automated generation of SAV rules. Two key types of SAV-specific information are used: Source Entity Identifier (SEI) and Hidden Prefix (HP). These serve complementary roles: SEI identifies the source entity originating traffic, while HP provides authoritative information about prefixes legitimately used by the source entity but not visible in the intra-domain routing system.</t>
      <section anchor="source-entity-identifier-sei">
        <name>Source Entity Identifier (SEI)</name>
        <t>A Source Entity Identifier (SEI) is a unique identifier assigned by the network operator to represent a source entity, which may be a non-BGP customer network or a set of hosts within a LAN connected to the SAVNET router.</t>
        <t>Each SEI is associated with one or more interfaces of SAVNET routers that connect directly to the corresponding source entity. This binding allows routers to explicitly indicate which entity a specific interface belongs to.</t>
        <t>SEIs are propagated within the domain via route advertisements. Upon receiving routes with SEIs, routers can correlate multiple routes belonging to the same entity. This capability is especially useful in asymmetric routing scenarios. For example, when a non-BGP customer network connects to multiple routers and advertises different subsets of its prefixes, uRPF-based filtering may incorrectly drop return traffic. By using SEI, routers can aggregate prefixes for the same entity and generate a unified allowlist, avoiding improper blocks.</t>
      </section>
      <section anchor="hidden-prefix-hp">
        <name>Hidden Prefix (HP)</name>
        <t>A hidden prefix is a prefix legitimately used by a source entity but not visible in the intra-domain routing system. Examples include:</t>
        <ul spacing="normal">
          <li>
            <t>A host that uses a source address not allocated by the operator for Direct Server Return (DSR) or similar applications.</t>
          </li>
          <li>
            <t>A non-BGP customer network that uses certain prefixes not announced to the operator.</t>
          </li>
        </ul>
        <t>To avoid improper permits, non-BGP customers or hosts provide their hidden prefixes to the operator, which are then used as SAV-specific information when generating rules on the corresponding interfaces.</t>
        <t>Authorization for hidden prefixes may be conveyed through a Traffic Origin Authorization (TOA) object <xref target="I-D.qin-savnet-toa"/> signed by the prefix holder, indicating that traffic from the hidden prefix is legitimate.</t>
        <t>SAVNET routers can use this information to allow legitimate traffic from hidden prefixes, even when the prefixes are not visible in intra-domain routing.</t>
      </section>
    </section>
    <section anchor="sav-rule-generation-procedure">
      <name>SAV Rule Generation Procedure</name>
      <t>This section describes two approaches for generating SAV rules in Intra-domain SPA.
The first approach relies solely on routing information and provides a simple baseline mechanism.
The second approach enhances accuracy by combining routing information with SAV-specific information, addressing asymmetric routing and hidden prefix scenarios.</t>
      <section anchor="sav-using-routing-information">
        <name>SAV Using Routing Information</name>
        <t>This subsection first describes how routing information can be used to generate more accurate SAV rules than existing intra-domain SAV mechanisms (e.g., strict uRPF and loose uRPF).</t>
        <t>Each SAVNET router connected to a set of hosts or a non-BGP customer network generates an allowlist SAV rule.
The procedure for allowlist generation is as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>Extract prefixes from the Forwarding Information Base (FIB) or/and Routing Information Base (RIB):
Select all unique prefixes in the router’s FIB or/and RIB whose next-hop interface points toward the connected set of hosts or non-BGP customer network.</t>
          </li>
          <li>
            <t>Construct the allowlist:
Include these prefixes in the allowlist SAV rule for the corresponding interface.
The allowlist defines the legitimate source address space that may appear on this interface.</t>
          </li>
        </ol>
        <t>Each SAVNET router connected to an external AS generates a blocklist SAV rule.
The procedure for blocklist generation is as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>Extract internal-use prefixes:
Select all unique prefixes from the routing information learned via the intra-domain routing protocol that are originated within the local AS.</t>
          </li>
          <li>
            <t>Construct the blocklist:
Include these internal-use prefixes in the blocklist SAV rule for interfaces facing external ASes, preventing incoming traffic that uses internal source addresses.</t>
          </li>
        </ol>
        <t>This routing-based approach works effectively when routing visibility is complete and symmetric.
However, in scenarios involving asymmetric routing or hidden prefixes, the allowlist derived solely from routing information may not fully cover the legitimate source address space of a set of hosts or a non-BGP customer network.
As a result, legitimate packets may be improperly blocked.</t>
        <t>To improve SAV accuracy and avoid such improper blocking, the next subsection introduces an enhanced rule-generation procedure that combines routing information with SAV-specific information (i.e., Source Entity Identifier and Hidden Prefix).</t>
      </section>
      <section anchor="sav-using-sav-specific-information-and-routing-information">
        <name>SAV Using SAV-specific Information and Routing Information</name>
        <t>This subsection describes an enhanced rule generation approach that leverages both routing information and SAV-specific information to improve SAV accuracy under conditions such as asymmetric routing and hidden prefixes.</t>
        <t>Each SAVNET router connected to a set of hosts or a non-BGP customer network generates an allowlist SAV rule as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>Identify source entities:
For all source entities connected to the router, create a set of their corresponding Source Entity Identifier (SEI) values.
Denote this set as Set A.</t>
          </li>
          <li>
            <t>Associate prefixes with SEIs:
Using all available SAV-specific information, for each SEI value in Set A, obtain the set of source prefixes associated with the same SEI value.</t>
          </li>
          <li>
            <t>Construct the allowlist:
  For each interface connected to a source entity, construct an allowlist that includes:  </t>
            <ul spacing="normal">
              <li>
                <t>all prefixes associated with the SEI configured on that interface; and</t>
              </li>
              <li>
                <t>any hidden prefixes that the source entity has explicitly provided to the operator.</t>
              </li>
            </ul>
          </li>
        </ol>
        <t>Each SAVNET router connected to an external AS generates a blocklist SAV rule as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>Extract internal-use prefixes:
Select all unique prefixes from the routing information learned via the intra-domain routing protocol.</t>
          </li>
          <li>
            <t>Filter out externally valid prefixes:
Exclude any prefix that is considered externally valid, including:
            </t>
            <ul spacing="normal">
              <li>
                <t>prefixes that are observed in routing information learned from external ASes via inter-domain routing; and</t>
              </li>
              <li>
                <t>prefixes that have an external AS number (ASN) listed as the origin in a valid Route Origin Authorization (ROA) or Traffic Origin Authorization (TOA).</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Construct the blocklist:
Include the remaining prefixes in the blocklist SAV rule for interfaces facing external ASes.
This prevents traffic from external ASes from using source addresses that are valid only within the local AS.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <section anchor="handling-seis">
        <name>Handling SEIs</name>
        <section anchor="sei-assignment-and-configuration">
          <name>SEI Assignment and Configuration</name>
          <t>Operators are recommended to use network management or automation tools to assign and maintain SEIs consistently to reduce the risk of misconfiguration.</t>
          <t>When a source entity connects to multiple routers, all interfaces <bcp14>MUST</bcp14> use the same SEI to enable correct aggregation of prefixes and accurate identification of the entity across the domain.</t>
        </section>
      </section>
      <section anchor="handling-hidden-prefixes">
        <name>Handling Hidden Prefixes</name>
        <t>Hidden prefix information can be incorporated into SAV rule generation on interfaces facing the entities, without requiring a separate synchronization mechanism. Authorization for using hidden prefixes may be conveyed, for example, via a Traffic Origin Authorization (TOA) object <xref target="I-D.qin-savnet-toa"/> or other mechanisms approved by the prefix holder.</t>
        <t>Operators can leverage existing operational management and automation tools to record and apply hidden prefix information consistently when generating SAV rules.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The security considerations described in <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/> and <xref target="I-D.ietf-savnet-intra-domain-architecture"/> also applies to this document.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-general-sav-capabilities" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-general-sav-capabilities-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-general-sav-capabilities.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-general-sav-capabilities-02"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-problem-statement-21" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="18" month="January" year="2026"/>
            <abstract>
              <t>This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the basic requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-21"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-architecture-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="13" month="October" year="2025"/>
            <abstract>
              <t>This document specifies the architecture of intra-domain SAVNET, which aims to achieve accurate source address validation (SAV) at external interfaces of an intra-domain network in an automated manner. It describes the conceptual design of intra-domain SAVNET, along with its use cases and design requirements, to help ensure that the intended objectives are met.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-architecture-03"/>
        </reference>
        <reference anchor="I-D.qin-savnet-toa" target="https://datatracker.ietf.org/doc/html/draft-qin-savnet-toa-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.qin-savnet-toa.xml">
          <front>
            <title>A Profile for Traffic Origin Authorizations (TOAs)</title>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Igor Lubashev" initials="I." surname="Lubashev">
              <organization>Akamai</organization>
            </author>
            <date day="3" month="November" year="2025"/>
            <abstract>
              <t>This document defines a standard profile for Traffic Origin Authorizations (TOAs), a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI). A TOA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate traffic using source IP addresses within the address block.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-qin-savnet-toa-00"/>
        </reference>
      </references>
    </references>
    <?line 245?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
