<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-inter-domain-problem-statement-10" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="Inter-domain SAVNET Problem Statement">Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-10"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="K." surname="Sriram" fullname="Kotikalapudi Sriram">
      <organization abbrev="USA NIST">USA National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <city>Gaithersburg</city>
          <region>MD</region>
          <country>United States of America</country>
        </postal>
        <email>ksriram@nist.gov</email>
      </address>
    </author>
    <date year="2025" month="July" day="29"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 93?>

<t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 97?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Source address validation (SAV) is crucial for protecting networks from source address (SA) spoofing attacks <xref target="RFC2827"/> <xref target="RFC3704"/> <xref target="RFC8704"/>. The MANRS initiative advocates deploying SAV as close to the source as possible <xref target="manrs"/>, and access networks are the first line of defense against source address spoofing. However, access networks face various challenges in deploying SAV mechanisms due to different network environments, router vendors, and operational preferences. Hence, SAV may not be deployed ubiquitously in access networks. In addition, SA spoofing may also originate in ISP networks at higher levels of heirarchy in the Internet. So, deployment of SAV mechanisms in the edge routers of enterprises as well as the ISP networks (at different heirarchal levels or tiers) is needed to prevent source address spoofing along the data forwarding paths. <xref target="RFC5210"/> highlighted the importance of  SAV at various network locations: access, intra-domain, and inter-domain. This document focuses on providing gap analysis and describing the problem space of existing inter-domain SAV solutions, and defining the requirements for a new solution of these problems. Access Control List (ACL) and unicast Reverse Path Forwarding (uRPF) techniques are currently utilized for inter-domain SAV <xref target="RFC3704"/> <xref target="RFC8704"/>. Here only existing IETF RFCs are considered as the state of the art (BCP 38 <xref target="RFC2827"/> and BCP 84 <xref target="RFC3704"/> <xref target="RFC8704"/>); IETF works-in-progress are not included in that.</t>
      <t>There are several existing mechanisms for inter-domain SAV. This document analyzes them and attempts to answer: i) what are the technical gaps (<xref target="gap"/>), ii) what are the fundamental problems (<xref target="problem"/>), and iii) what are the practical requirements for the solution of these problems (<xref target="req"/>).</t>
      <t>The following summarizes the fundamental problems with existing SAV mechanisms, as analyzed in <xref target="gap"/> and <xref target="problem"/>:</t>
      <ul spacing="normal">
        <li>
          <t>Improper block: Existing uRPF-based mechanisms suffer from improper block in two inter-domain scenarios: limited propagation of prefixes and hidden prefixes.</t>
        </li>
        <li>
          <t>Improper permit: Existing uRPF-based mechanisms exhibit improper permit in scenarios involving source address spoofing within a customer cone or from a provider/peer AS.</t>
        </li>
        <li>
          <t>High operational overhead: ACL-based ingress SAV filtering introduces significant operational overhead, as it needs to update ACL rules manually to adapt to prefix or routing changes in a timely manner.</t>
        </li>
      </ul>
      <t>To address these problems, in <xref target="req"/>, this document outlines the following technical requirements for a new solution:</t>
      <ul spacing="normal">
        <li>
          <t>Improving validation accuracy over existing mechanisms: A new solution <bcp14>MUST</bcp14> avoid improper block and minimize improper permit.</t>
        </li>
        <li>
          <t>Reducing operational overhead: A new solution <bcp14>MUST</bcp14> have less operational overhead than ACL-based ingress SAV filtering.</t>
        </li>
      </ul>
      <t>In addition, this document defines three more requirements to ensure practicality:</t>
      <ul spacing="normal">
        <li>
          <t>Working in incremental/partial deployment: A new solution <bcp14>MUST NOT</bcp14> assume pervasive adoption including the adoption of both SAV and SAV-related information and <bcp14>SHOULD</bcp14> provide effective protection for source addresses when it is partially deployed in the Internet.</t>
        </li>
        <li>
          <t>Providing necessary security guarantee: A new solution <bcp14>SHOULD</bcp14> secure the communicated information between ASes if it requires exchanging specific information between ASes.</t>
        </li>
        <li>
          <t>Guaranteeing convergence: A new solution <bcp14>SHOULD</bcp14> achieve accurate SAV rule convergence in response to prefix or routing changes.</t>
        </li>
      </ul>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>SAV Rule:</dt>
        <dd>
          <t>The rule that indicates the validity of a specific source IP address or source IP prefix.</t>
        </dd>
        <dt>Improper Block:</dt>
        <dd>
          <t>The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>Improper Permit:</dt>
        <dd>
          <t>The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>Active forwarding paths:</dt>
        <dd>
          <t>The paths that the legitimate traffic goes through in the data plane at a given time period.</t>
        </dd>
      </dl>
    </section>
    <section anchor="existing-inter-domain-sav-mechanisms">
      <name>Existing Inter-domain SAV Mechanisms</name>
      <t>Inter-domain SAV is typically performed at the AS level (on a per neighbor-AS-interface basis) and can be deployed at AS border routers (ASBRs) to prevent source address spoofing. There are various mechanisms available to implement inter-domain SAV for anti-spoofing ingress filtering <xref target="nist"/> <xref target="manrs"/> <xref target="isoc"/>, which are reviewed in this section.</t>
      <ul spacing="normal">
        <li>
          <t>ACL-based ingress filtering <xref target="RFC3704"/>: ACL-based ingress SAV filtering is a technique that relies on ACL rules to filter packets based on their source addresses. It can be applied at provider interfaces, peer interfaces, or customer interfaces of an AS, and is recommended for deployment at provider interfaces <xref target="manrs"/>. At the provider interfaces, ACL-based ingress SAV filtering can block source prefixes that are clearly invalid in the inter-domain routing context, such as IANA special purpose or unallocated IPv4/IPv6 prefixes and the AS's internal-only prefixes. However, ACL-based ingress SAV filtering introduces significant operational overhead, as ACL rules need to be updated in a timely manner to reflect prefix or routing changes in the inter-domain routing system. It is also impractical to store a very large and dynamically varying unallocated IPv6 prefixes.  At the customer interfaces, ACL-based ingress filtering is less desirable. Other techniques (as described below) are more effective for ingress SAV filtering on customer interfaces. ACL-based ingress SAV filtering has applicability for broadband cable or digital subscriber access loop (DSL) access networks where the service provider has clear knwoledge of IP address prefixes it has allocated to manage those services.</t>
        </li>
        <li>
          <t>uRPF-based mechanisms: A class of SAV mechanisms are based on Unicast Reverse Path Forwarding (uRPF) <xref target="RFC3704"/>. The core idea of uRPF for SAV is to exploit the symmetry of inter-domain routing: in many cases, the best next hop for a destination is also the best previous hop for the source. In other words, if a packet arrives from a certain interface, the source address of that packet should be reachable via the same interface, according to the FIB. However, symmetry in routing does not always holds in practice, and to address cases where it does not hold, many enhancements and modes of uRPF are proposed. Different modes of uRPF have different levels of strictness and flexibility, and network operators can choose from them to suit particular network scenarios. We describe these modes as follows:
          </t>
          <ul spacing="normal">
            <li>
              <t>Strict uRPF <xref target="RFC3704"/>: Strict uRPF is the most stringent mode, and it only permits packets that have a source address that is covered by a prefix in the FIB, and that the next hop for that prefix is the same as the incoming interface. This mode is recommended for deployment at customer interfaces that directly connect to an AS with suballocated address space, as it can prevent spoofing attacks from that AS or its downstream ASes <xref target="nist"/>.</t>
            </li>
            <li>
              <t>Loose uRPF <xref target="RFC3704"/>: Loose uRPF verifies that the source address of the packet is routable in the Internet by matching it with one or more prefixes in the FIB, regardless of which interface the packet arrives at. If the source address is not routable, Loose uRPF discards the packet. Loose uRPF is typically deployed at the provider interfaces of an AS to block packets with source addresses that are obviously disallowed, such as non-global prefixes (e.g., private addresses, multicast addresses, etc.) or the prefixes that belong to the customer AS itself <xref target="nist"/>.</t>
            </li>
            <li>
              <t>Feasible Path uRPF (FP-uRPF) <xref target="RFC3704"/>: maintains a reverse path forwarding (RPF) list, which contains the prefixes and all their permissible routes including the optimal and alternative ones. It permits an incoming packet only if the packet's source address is encompassed in the prefixes of the RPF list and its incoming interface is included in the permissible routes of the corresponding prefix. FP-uRPF is recommended to be deployed at customer interfaces or peer interfaces, especially those that are connected to multi-homed customer ASes <xref target="nist"/>.</t>
            </li>
            <li>
              <t>Virtual routing and forwarding (VRF) uRPF <xref target="RFC4364"/> <xref target="urpf"/> <xref target="manrs"/>: VRF uRPF uses a separate VRF table for each external BGP peer and is only a way of implementation for a SAV table.</t>
            </li>
            <li>
              <t>Enhanced Feasible Path uRPF (EFP-uRPF) <xref target="RFC8704"/>: EFP-uRPF is based on the principle that if BGP updates for multiple prefixes with the same origin AS were received on different interfaces (at border routers), then incoming data packets with source addresses in any of those prefixes should be accepted on any of those interfaces. The EFP-uRPF specification provides two alternate algorithms: Algorithm A which is stricter with a greater sense of directionality and Algorithm B which is more permissive with a lesser sense of directionality. EFP-uRPF can more effectively accomodate asymmetric routing scenarios than FP-uRPF. EFP-uRPF is a part of BCP84. EFP-uRPF can be used at customer as well as lateral peer interfaces of an AS. It is not deployed yet in the Internet.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Carrier Grade NAT (CGN): CGN is a network technology used by service providers to translate between private and public IPv4 addresses within their network. CGN enables service providers to assign private IPv4 addresses to their customer ASes instead of public, globally unique IPv4 addresses. The private side of the CGN faces the customer ASes, and when an incoming packet is received from a customer AS, CGN checks its source address. If the source address is included in the address list of the CGN's private side, CGN performs address translation. Otherwise, it forwards the packet without translation. However, since CGN cannot determine whether the source address of an incoming packet is spoofed or not, additional SAV mechanisms need to be implemented to prevent source address spoofing <xref target="manrs"/>.</t>
        </li>
        <li>
          <t>BGP origin validation (BGP-OV) <xref target="RFC6811"/>: Attackers can bypass uRPF-based SAV mechanisms by using prefix hijacking in combination with source address spoofing. By announcing a less-specific prefix that does not have a legitimate announcement, the attacker can deceive existing uRPF-based SAV mechanisms and successfully perform address spoofing. To protect against this type of attack, a combination of BGP-OV and uRPF-based mechanisms like FP-uRPF or EFP-uRPF is recommended <xref target="nist"/>. BGP routers can use ROA information, which is a validated list of {prefix, maximum length, origin AS}, to mitigate the risk of prefix hijacks in advertised routes.</t>
        </li>
      </ul>
    </section>
    <section anchor="gap">
      <name>Gap Analysis</name>
      <t>Inter-domain SAV is essential in preventing source address spoofing traffic across all AS interfaces, including those of customers, providers, and peers. An ideal inter-domain SAV mechanism <bcp14>MUST</bcp14> block all spoofing traffic while permitting legitimate traffic in all scenarios. However, in some cases, existing SAV mechanisms may unintentionally block legitimate traffic or permit spoofing traffic. This section aims to conduct a gap analysis of existing SAV mechanisms used in the corresponding interfaces of these scenarios to identify their technical limitations.</t>
      <section anchor="sav-at-customer-interfaces">
        <name>SAV at Customer Interfaces</name>
        <t>SAV is used at customer interfaces to validate traffic from the customer cone, including both legitimate traffic and spoofing traffic. To prevent the source address spoofing, operators can enable ACL-based ingress filtering and/or uRPF-based mechanisms at customer interfaces, namely Strict uRPF, FP-uRPF, or EFP-uRPF. However, uRPF-based mechanisms may cause improper block problems in two inter-domain scenarios: limited propagation of prefixes and hidden prefixes, or may cause improper permit problems in the scenarios of source address spoofing within a customer cone, while ACL-based SAV ingress filtering needs to update SAV rules in a timely manner and lead to high operational overhead.</t>
        <figure anchor="customer_gap">
          <name>The gaps of ACL-based ingress filtering, Strict uRPF, FP-uRPF, and EFP-uRPF in the corresponding scenarios.</name>
          <artwork><![CDATA[
+--------------------+------------+-----------+-------+--------+
|Traffic & Scenarios |     ACL    |Strict uRPF|FP-uRPF|EFP-uRPF|
+----------+---------+------------+-----------+-------+--------+
|Legitimate|   LPP   |            |                            |
|Traffic   +---------+            |       Improper Block       |
|          |   HP    |    High    |                            |
+----------+---------+Operational +-------------------+--------+
|Spoofing  |Spoofing |  Overhead  |                   |Improper|
|Traffic   | within  |            |   Functioning as  |Permit  |
|          |  a CC   |            |     Expected      |        |
+----------+---------+------------+-------------------+--------+
"LPP" represents a class of scenario called limited propagation of 
prefixes. 
"HP" represents a class of scenario called hidden prefixes.
"Spoofing within a CC" represents a class of scenario where 
spoofing traffic occurs within a customer cone (CC) and the spoofed 
source addresses belong to this customer cone.
"Functioning as Expected" represents the inter-domain SAV mechanism 
does not cause improper block for legitimate traffic or improper 
permit for spoofing traffic in the corresponding scenarios, and has 
low operational overhead.
]]></artwork>
        </figure>
        <t><xref target="customer_gap"/> provides an overview of the gaps associated with ACL-based ingress filtering, Strict uRPF, FP-uRPF, and EFP-uRPF for SAV at customer interfaces in the corresponding scenarios. ACL-based ingress filtering has high operational overhead as performing SAV at customer interfaces. Strict uRPF, FP-uRPF, and EFP-uRPF, on the other hand, may incorrectly block legitimate traffic in the scenarios of limited propagation of prefixes or hidden prefixes. Furthermore, in the scenarios of source address spoofing within a customer cone, EFP-uRPF with algorithm B may inadvertently permit the spoofing traffic.</t>
        <t>In the following, we analyze the gaps of Strict uRPF, FP-uRPF, and EFP-uRPF for SAV at customer interfaces in scenarios of limited propagation of prefixes, hidden prefixes, and source address spoofing within a customer cone, respectively.</t>
        <section anchor="limited-propagation-of-prefixes">
          <name>Limited Propagation of Prefixes</name>
          <t>In inter-domain networks, some prefixes may not be propagated to all domains due to various factors, such as NO_EXPORT or NO_ADVERTISE communities or other route filtering policies. This may cause asymmetric routing in the inter-domain context, which may lead to improper block when performing SAV with existing mechanisms. These mechanisms include EFP-uRPF, which we focus on in the following analysis, as well as Strict uRPF and FP-uRPF. All these mechanisms suffer from the same problem of improper block in this scenario.</t>
          <figure anchor="no-export">
            <name>Limited propagation of prefixes caused by NO_EXPORT.</name>
            <artwork><![CDATA[
                          +----------------+
                          |    AS 3(P3)    |
                          +-+/\------+/\+--+
                             /         \
                            /           \ 
                           /             \
                          / (C2P)         \
                 +------------------+      \
                 |     AS 4(P4)     |       \
                 ++/\+--+/\+----+/\++        \
                   /     |        \           \
         P2[AS 2] /      |         \           \
                 /       |          \           \
                / (C2P)  |           \ P5[AS 5]  \ P5[AS 5]
+----------------+       |            \           \    
|    AS 2(P2)    |       | P1[AS 1]    \           \
+----------+/\+--+       | P6[AS 1]     \           \
             \           |               \           \
     P1[AS 1] \          |                \           \
     NO_EXPORT \         |                 \           \
                \ (C2P)  | (C2P/P2P)  (C2P) \     (C2P) \
              +----------------+          +----------------+
              |  AS 1(P1, P6)  |          |    AS 5(P5)    |
              +----------------+          +----------------+
]]></artwork>
          </figure>
          <t><xref target="no-export"/> presents a scenario where the limited propagation of prefixes occurs due to the NO_EXPORT community attribute. In this scenario, AS 1 is a customer of AS 2, AS 2 is a customer of AS 4, AS 4 is a customer of AS 3, and AS 5 is a customer of both AS 3 and AS 4. The relationship between AS 1 and AS 4 can be either customer-to-provider (C2P) or peer-to-peer (P2P). AS 1 advertises prefixes P1 to AS 2 and adds the NO_EXPORT community attribute to the BGP advertisement sent to AS 2, preventing AS 2 from further propagating the route for prefix P1 to AS 4. Consequently, AS 4 only learns the route for prefix P1 from AS 1 in this scenario. Suppose AS 1 and AS 4 have deployed inter-domain SAV while other ASes have not, and AS 4 has deployed EFP-uRPF at its customer interfaces.</t>
          <t>Assuming that AS 1 is the customer of AS 4, if AS 4 deploys EFP-uRPF with algorithm A at customer interfaces, it will require packets with source addresses in P1 or P6 to only arrive from AS 1. When AS 1 sends legitimate packets with source addresses in P1 or P6 to AS 4 through AS 2, AS 4 improperly blocks these packets. The same problem applies to Strict uRPF and FP-uRPF. Although EFP-uRPF with algorithm B can avoid improper block in this case, network operators need to first determine whether limited prefix propagation exists before choosing the suitable EFP-uRPF algorithms, which adds more complexity and overhead to network operators. Furthermore, EFP-uRPF with algorithm B is not without its problems. For example, if AS 1 is the peer of AS 4, AS 4 will not learn the route of P1 and P6 from its customer interfaces. In such case, both EFP-uRPF with algorithm A and algorithm B have improper block problems.</t>
        </section>
        <section anchor="hidden-prefixes">
          <name>Hidden Prefixes</name>
          <t>Some servers' source addresses are not advertised through BGP to other ASes. These addresses are unknown to the inter-domain routing system and are called hidden prefixes. Legitimate traffic with these hidden prefixes may be dropped by existing inter-domain SAV mechanisms, such as Strict uRPF, FP-uRPF, or EFP-uRPF, because they do not match any known prefix.</t>
          <t>For example, Content Delivery Networks (CDN) use anycast <xref target="RFC4786"/> <xref target="RFC7094"/> to improve the quality of service by bringing content closer to users. An anycast IP address is assigned to devices in different locations, and incoming requests are routed to the closest location. Usually, only locations with multiple connectivity announce the anycast IP address through BGP. The CDN server receives requests from users and creates tunnels to the edge locations, where content is sent directly to users using direct server return (DSR). DSR requires servers in the edge locations to use the anycast IP address as the source address in response packets. However, these edge locations do not announce the anycast prefixes through BGP, so an intermediate AS with existing inter-domain SAV mechanisms may improperly block these response packets.</t>
          <figure anchor="dsr">
            <name>A Direct Server Return (DSR) scenario.</name>
            <artwork><![CDATA[
                                +----------------+
                Anycast Server+-+    AS 3(P3)    |
                                +-+/\----+/\+----+
                                   /       \
                         P3[AS 3] /         \ P3[AS 3]
                                 /           \
                                / (C2P)       \
                       +----------------+      \
                       |    AS 4(P4)    |       \
                       ++/\+--+/\+--+/\++        \
          P6[AS 2, AS 1] /     |      \           \
         P1[AS 2, AS 1] /      |       \           \
              P2[AS 2] /       |        \           \
                      / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
      +----------------+       |          \           \    
User+-+    AS 2(P2)    |       | P1[AS 1]  \           \
      +----------+/\+--+       | P6[AS 1]   \           \
                   \           |             \           \
           P6[AS 1] \          |              \           \
            P1[AS 1] \         |               \           \
                      \ (C2P)  | (C2P)    (C2P) \     (C2P) \
                    +----------------+        +----------------+
       Edge Server+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
                    +----------------+        +----------------+
P3 is the anycast prefix and is only advertised by AS 3 through BGP.
]]></artwork>
          </figure>
          <t><xref target="dsr"/> illustrates a DSR scenario where the anycast IP prefix P3 is only advertised by AS 3 through BGP. In this example, AS 3 is the provider of AS 4 and AS 5, AS 4 is the provider of AS 1, AS 2, and AS 5, and AS 2 is the provider of AS 1. AS 1 and AS 4 have deployed inter-domain SAV, while other ASes have not. When users in AS 2 send requests to the anycast destination IP, the forwarding path is AS 2-&gt;AS 4-&gt;AS 3. The anycast servers in AS 3 receive the requests and tunnel them to the edge servers in AS 1. Finally, the edge servers send the content to the users with source addresses in prefix P3. The reverse forwarding path is AS 1-&gt;AS 4-&gt;AS 2. Since AS 4 does not receive routing information for prefix P3 from AS 1, EFP-uRPF with algorithm A/B, and all other existing uRPF-based mechanisms at the customer interface of AS 4 facing AS 1 will improperly block the legitimate response packets from AS 1.</t>
          <t>Moreover, EFP-uRPF with algorithm B may also permit spoofing traffic improperly in scenarios where source address spoofing within a customer cone occur. We provide illustrations of these scenarios using an example in the following. The source address spoofing within a customer cone represents a class of scenario where spoofing traffic comes from a customer AS within a customer cone and the spoofed source addresses belong to this customer cone.</t>
        </section>
        <section anchor="spoofing_within_cc">
          <name>Source Address Spoofing within a Customer Cone</name>
          <t><xref target="customer-spoofing"/> portrays a scenario of source address spoofing within a customer cone and is used to analyze the gaps of uRPF-based mechanisms below.</t>
          <figure anchor="customer-spoofing">
            <name>A scenario of source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                       +----------------+
                                       |    AS 3(P3)    |
                                       +-+/\----+/\+----+
                                          /       \
                                         /         \ 
                                        /           \
                                       / (C2P)       \
                              +----------------+      \
                              |    AS 4(P4)    |       \
                              ++/\+--+/\+--+/\++        \
                 P6[AS 2, AS 1] /     |      \           \
                P1[AS 2, AS 1] /      |       \           \
                     P2[AS 2] /       |        \           \
                             / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
             +----------------+       |          \           \    
Spoofer(P5')-+    AS 2(P2)    |       | P1[AS 1]  \           \
             +----------+/\+--+       | P6[AS 1]   \           \
                          \           |             \           \
                  P6[AS 1] \          |              \           \
                   P1[AS 1] \         |               \           \
                             \ (C2P)  | (C2P)    (C2P) \     (C2P) \
                           +----------------+        +----------------+
                           |  AS 1(P1, P6)  |        |    AS 5(P5)    |
                           +----------------+        +----------------+
P5' is the spoofed source prefix P5 by the spoofer which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t>In <xref target="customer-spoofing"/>, the source address spoofing takes place within AS 4's customer cone, where the spoofer, which is inside of AS 2 or connected to AS 2 through other ASes, sends spoofing traffic with spoofed source addresses in P5 to AS 3 along the path AS 2-&gt;AS 4-&gt; AS 3. The arrows in <xref target="customer-spoofing"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>If AS 4 deploys EFP-uRPF with algorithm B at its customer interfaces, it will allow packets with source addresses in P5 to originate from AS 1, AS 2, and AS 5. Consequently, when the spoofer which is inside of AS 2 or connected to AS 2 through other ASes sends spoofing packets with spoofed source addresses in P5 to AS 3, AS 4 will improperly permit these packets, thus enabling the spoofing traffic to propagate.</t>
          <t>In scenarios like these, Strict uRPF, FP-uRPF, VRF uRPF, and EFP-uRPF with algorithm A do not suffer from improper permit problems. This is because these mechanisms enforce strict filtering rules that ensure packets with source addresses in P5 are only permitted to arrive at AS 4's customer interfaces facing AS 5.</t>
        </section>
      </section>
      <section anchor="sav_at_p">
        <name>SAV at Provider/Peer Interfaces</name>
        <t>SAV is used at provider/peer interfaces to validate traffic entering the customer cone, including both legitimate and spoofing traffic. To prevent packets with spoofed source addresses from the provider/peer AS, ACL-based ingress filtering and/or Loose uRPF can be deployed <xref target="nist"/>.</t>
        <figure anchor="provider_peer_gap">
          <name>The gaps of ACL-based ingress filtering, and Loose uRPF in the corresponding scenarios.</name>
          <artwork><![CDATA[
+------------------------+------------+---------------+
|   Traffic & Scenarios  |     ACL    |   Loose uRPF  |
+----------+-------------+------------+---------------+
|Legitimate|      Any    |            |  Functioning  |
|Traffic   |  Scenarios  |    High    |  as Expected  |
+----------+-------------+Operational +---------------+
|Spoofing  |   Spoofing  |  Overhead  |               |
|Traffic   |     from    |            |Improper Permit|
|          |Provider/Peer|            |               |
|          |      AS     |            |               |
+----------+-------------+------------+---------------+
"Spoofing from provider/peer AS" represents a class of scenario where 
source address spoofing traffic from provider/peer AS occurs and the 
spoofed source addresses belong to the customer cone which the 
spoofing traffic enters.
"Functioning as Expected" represents the inter-domain SAV mechanism 
does not cause improper block for legitimate traffic or improper 
permit for spoofing traffic in the corresponding scenarios, and has 
low operational overhead.
]]></artwork>
        </figure>
        <t><xref target="provider_peer_gap"/> summarizes the gaps of ACL-based ingress filtering and Loose uRPF for SAV at provider/peer interfaces in the corresponding scenarios. ACL-based ingress filtering effectively blocks spoofing traffic from provider/peer AS, while appropriately allowing legitimate traffic. However, these methods may come with high operational overhead. On the other hand, Loose uRPF correctly permits legitimate traffic, but it can also mistakenly allow spoofing traffic to pass through.</t>
        <t>In the following, we expose the limitations of ACL-based ingress filtering and Loose uRPF for SAV at provider/peer interfaces in scenarios of source address spoofing from provider/peer AS. The source address spoofing from provider/peer AS represents a class of scenario where spoofing traffic comes from a provider/peer AS and the spoofed source addresses belong to the customer cone which the spoofing traffic enters.</t>
        <section anchor="source-address-spoofing-from-providerpeer-as">
          <name>Source Address Spoofing from Provider/Peer AS</name>
          <t><xref target="provider-spoofing"/> depicts the scenario of source address spoofing from provider/peer AS and is used to analyze the gaps of ACL-based ingress filtering and Loose uRPF below.</t>
          <figure anchor="provider-spoofing">
            <name>A scenario of source address spoofing from provider/peer AS.</name>
            <artwork><![CDATA[
                          +----------------+
            Spoofer(P1')+-+    AS 3(P3)    |
                          +-+/\----+/\+----+
                             /       \
                            /         \ 
                           /           \
                          / (C2P/P2P)   \
                 +----------------+      \
                 |    AS 4(P4)    |       \
                 ++/\+--+/\+--+/\++        \
    P6[AS 2, AS 1] /     |      \           \
   P1[AS 2, AS 1] /      |       \           \
        P2[AS 2] /       |        \           \
                / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
+----------------+       |          \           \    
|    AS 2(P2)    |       | P1[AS 1]  \           \
+----------+/\+--+       | P6[AS 1]   \           \
             \           |             \           \
     P6[AS 1] \          |              \           \
      P1[AS 1] \         |               \           \
                \ (C2P)  | (C2P)    (C2P) \     (C2P) \
               +----------------+        +----------------+
               |  AS 1(P1, P6)  |        |    AS 5(P5)    |
               +----------------+        +----------------+
P1' is the spoofed source prefix P1 by the spoofer which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
          </figure>
          <t>In the case of <xref target="provider-spoofing"/>, the spoofer which is inside of AS 3 or connected to AS 3 through other ASes forges the source addresses in P1 and sends the spoofing traffic to the destination addresses in P2. The arrows in <xref target="provider-spoofing"/> represent the commercial relationships between ASes. AS 3 acts as the provider or lateral peer of AS 4 and the provider for AS 5, while AS 4 serves as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>By applying ACL-based ingress filtering at the provider/peer interface of AS 4, the ACL rules can block any packets with spoofed source addresses from AS 3 in P1. However, this approach incurs heavy operational overhead, as it requires network operators to update the ACL rules promptly based on changes in prefixes or topology of AS 4's customer cone. Otherwise, it may cause improper block of legitimate traffic or improper permit of spoofing traffic.</t>
          <t>Loose uRPF can greatly reduce the operational overhead because it uses the local FIB as information source, and can adapt to changes in the network. However, it would improperly permit spoofed packets. In <xref target="provider-spoofing"/>, Loose uRPF is enabled at AS 4's provider/peer interface, while EFP-uRPF is enabled at AS 4's customer interfaces. A spoofer inside AS 3 or connected to it through other ASes may send packets with source addresses spoofing P1 to AS 2. As AS 3 lacks deployment of inter-domain SAV, the spoofing packets will reach AS 4's provider/peer interface. With Loose uRPF, AS 4 cannot block them at its provider/peer interface facing AS 3, and thus resulting in improper permit.</t>
        </section>
      </section>
    </section>
    <section anchor="problem">
      <name>Problem Statement</name>
      <figure anchor="problem_sum">
        <name>The scenarios where existing inter-domain SAV mechanisms may have improper block problem for legitimate traffic, improper permit problem for spoofing traffic, or high operational overhead.</name>
        <artwork><![CDATA[
+--------+----------+---------+----------+-------+----------+
|Problems|    ACL   |  Strict |  Loose   |FP-uRPF|EFP-uRPF  |
|        |          |  uRPF   |  uRPF    |       |          |
+--------+----------+---------+----------+-------+----------+
|Improper|Not Exist |  Exist  |Not Exist |      Exist       |
|Block   |          |(LPP, HP)|          |    (LPP, HP)     |
+--------+----------+---------+----------+-------+----------+
|Improper|      Not Exist     |  Exist   |Not    |  Exist   |
|Permit  |                    |  (SPP)   |Exist  |  (SCC)   |
+--------+----------+---------+----------+-------+----------+
|        |   Exist  |                                       |
|  HOO   |   (Any   |              Not Exist                |
|        |Scenarios)|                                       |
+--------+----------+---------------------------------------+
HOO: High Operational Overhead.
"LPP" represents a class of scenario called limited propagation of 
prefixes. 
"HP" represents a class of scenario called hidden prefixes.
"SPP" represents a class of scenario called source address spoofing 
from provider/peer AS. 
"SCC" represents a class of scenario called source address spoofing 
within a customer cone.
]]></artwork>
      </figure>
      <t>Based on the analysis above, we conclude that existing inter-domain SAV mechanisms exhibit limitations in asymmetric routing scenarios, leading to potential issues of improper block or improper permit. Additionally, these mechanisms can result in high operational overhead, especially when network routing undergoes dynamic changes. <xref target="problem_sum"/> provides a comprehensive summary of scenarios where existing inter-domain SAV mechanisms may encounter issues, including instances of improper blocking of legitimate traffic, improper permitting of spoofing traffic, or high operational overhead.</t>
      <t>For ACL-based ingress filtering, network operators need to manually update ACL rules to adapt to network changes. Otherwise, they may cause improper block or improper permit issues. Manual updates induce high operational overhead, especially in networks with frequent policy and route changes.</t>
      <t>Strict uRPF and Loose uRPF are automatic SAV mechanisms, thus they do not need any manual effort to adapt to network changes. However, they have issues in scenarios with asymmetric routing. Strict uRPF may cause improper block problems when an AS is multi-homed and routes are not symmetrically announced to all its providers. This is because the local FIB may not include the asymmetric routes of the legitimate packets, and Strict uRPF only uses the local FIB to check the source addresses and incoming interfaces of packets. Loose uRPF may cause improper permit problems and fail to prevent source address spoofing. This is because it is oblivious to the incoming interfaces of packets.</t>
      <t>FP-uRPF improve Strict uRPF in multi-homing scenarios. However, they still have improper block issues in asymmetric routing scenarios. For example, they may not handle the cases of limited propagation of prefixes. These mechanisms use the local RIB to learn the source prefixes and their valid incoming interfaces. But the RIB may not have all the prefixes with limited propagation and their permissible incoming interfaces.</t>
      <t>EFP-uRPF allows the prefixes from the same customer cone at all customer interfaces. This solves the improper block problems of FP-uRPF in multi-homing scenarios. However, this approach also compromises partial protection against spoofing from the customer cone. EFP-uRPF may still have improper block problems when it does not learn legitimate source prefixes. For example, hidden prefixes are not learned by EFP-uRPF.</t>
      <t>Finally, existing inter-domain SAV mechanisms cannot work in all directions (i.e. interfaces) of ASes to achieve effective SAV. Network operators need to carefully analyze the network environment and choose appropriate SAV mechanism for each interface. This leads to additional operational and cognitive overhead, which hinders the rate of adoption of inter-domain SAV.</t>
    </section>
    <section anchor="req">
      <name>Requirements for New Inter-domain SAV Mechanisms</name>
      <t>This section lists the requirements which can help bridge the technical gaps of existing inter-domain SAV mechanisms. These requirements serve as the practical guidelines that can be met, in part or in full, by proposing new techniques.</t>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new inter-domain SAV mechanism <bcp14>MUST</bcp14> improve the validation accuracy in all directions of ASes over existing inter-domain SAV mechanisms, while working in incremental/partial deployment and providing necessary security guarantee.</t>
        <section anchor="improving-validation-accuracy-over-existing-mechanisms">
          <name>Improving Validation Accuracy over Existing Mechanisms</name>
          <t>The new inter-domain SAV mechanism <bcp14>MUST</bcp14> avoid improper blocking and reject more spoofed traffic than existing inter-domain SAV mechanisms.
To achieve this, for an AS performing inter-domain SAV on an interface connected to a neighboring AS, it <bcp14>MUST</bcp14> permit all prefixes whose legitimate traffic (using them as source addresses) can reach that interface, while blocking all other prefixes that cannot.
This general principle applies to customer, lateral peer, and provider interfaces.
Multiple sources of SAV-related information, such as ROA and ASPA objects, BGP Update data, SAV-specific information, and management information can be leveraged to meet this requirement.</t>
          <figure anchor="wider-deployment">
            <name>An example where both spoofing and legitimate traffic arrive from the same direction.</name>
            <artwork><![CDATA[
                      +-----------------+
                      |       AS 4      |
                      +------+/\+-------+
              Spoofing traffic | Legitimate traffic
              with SA in P1'   | with SA in P1
                               | (C2P)
                      +-----------------+
                      |       AS 3      |
                      +--+/\+-----+/\+--+
        Spoofing traffic  /         \ Legitimate traffic
        with SA in P1'   /           \ with SA in P1
                        / (C2P) (C2P) \
             +----------------+   +----------------+
Spoofer(P1')-+    AS 2(P2)    |   |    AS 1(P1)    |    
             +----------------+   +----------------+
P1' is the spoofed source prefix P1 by the spoofer which is inside of 
AS 2 or connected to AS 2 through other ASes.
AS 4 performs SAV at its interface facing AS 3.
The legitimate traffic with SA in P1 arrives at AS 4 along the path
AS 1->AS 3->AS 4.
The spoofing traffic with SA in P1' arrives at AS 4 along the path
AS 2->AS 3->AS 4.
]]></artwork>
          </figure>
          <t>The path taken by the traffic with spoofed source address (i.e., spoofed traffic) may overlap with a path for the legitimate traffic. Such scenarios could result in improper permit of the spoofed traffic at the AS doing SAV unless an AS located at or prior to the merging point of the overlap is also performing inter-domain SAV.
As illustrated in <xref target="wider-deployment"/>, both spoofed and legitimate traffic traverse the same link between AS 3 and AS 4. In this case, SAV filtering at AS 4's interface facing AS 3 cannot differentiate between the two.
The spoofed traffic in such scenarios is incrementally mitigated (i.e., blocked) with the wider deployment of SAV. For example, AS 3 can deploy SAV on its interfaces facing AS 1 and AS 2 to facilitate blocking of the spoofed traffic while admitting and propagating the legitimate traffic.</t>
        </section>
        <section anchor="working-in-incrementalpartial-deployment">
          <name>Working in Incremental/Partial Deployment</name>
          <t>The new inter-domain SAV mechanism <bcp14>MUST NOT</bcp14> assume pervasive adoption (including the adoption of both SAV and SAV-related information) and <bcp14>SHOULD</bcp14> benefit early adopters by providing effective protection from spoofing of source addresses even when it is partially deployed in the Internet. Not all AS border routers can support the new SAV mechanism at once, due to various constraints such as capabilities, versions, or vendors. The new SAV mechanism <bcp14>SHOULD NOT</bcp14> be less effective than existing mechanisms in its capability of protection from source address spoofing for any type of peering interface (customer, lateral peer, and provider) even under partial deployment.</t>
        </section>
        <section anchor="providing-necessary-security-guarantee">
          <name>Providing Necessary Security Guarantee</name>
          <t>The new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> secure the communicated SAV-specific information between ASes and prevent malicious ASes from generating forged information.</t>
        </section>
      </section>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> update SAV rules and detect the changes of SAV-specific information automatically while guaranteeing convergence.</t>
        <section anchor="reducing-operational-overhead">
          <name>Reducing Operational Overhead</name>
          <t>The new inter-domain SAV mechanism <bcp14>MUST</bcp14> be able to adapt to dynamic networks and asymmetric routing scenarios automatically, instead of relying on manual update. At least, it <bcp14>MUST</bcp14> have less operational overhead than ACL-based ingress filtering.</t>
        </section>
        <section anchor="guaranteeing-convergence">
          <name>Guaranteeing Convergence</name>
          <t>The new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> promptly detect the network changes and launch the convergence process quickly. It is essential that the new inter-domain SAV mechanism converges towards accurate SAV rules in a proper manner, effectively reducing improper block and improper permit throughout the whole convergence process.</t>
        </section>
      </section>
    </section>
    <section anchor="inter-domain-sav-scope">
      <name>Inter-domain SAV Scope</name>
      <t>The new inter-domain SAV mechanisms should work in the same scenarios as existing ones. Generally, it includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>
          <t>Native IP forwarding: This includes both global routing table forwarding and CE site forwarding of VPN.</t>
        </li>
        <li>
          <t>IP-encapsulated Tunnel (IPsec, GRE, SRv6, etc.): In this scenario, we focus on the validation of the outer layer IP address.</t>
        </li>
        <li>
          <t>Both IPv4 and IPv6 addresses.</t>
        </li>
      </ul>
      <t>Scope does not include:</t>
      <ul spacing="normal">
        <li>
          <t>Non-IP packets: This includes MPLS label-based forwarding and other non-IP-based forwarding.</t>
        </li>
      </ul>
      <t>In addition, the new inter-domain SAV mechanisms should not modify data plane packets. Existing architectures or protocols or mechanisms can be inherited by the new SAV mechanism to achieve better SAV effectiveness.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>SAV rules can be generated based on route information (FIB/RIB) or non-route information. If the information is poisoned by attackers, the SAV rules will be false. Legitimate packets may be dropped improperly or malicious traffic with spoofed source addresses may be permitted improperly. Route security should be considered by routing protocols. Non-route information, such as RPKI ASPA objects, should also be protected by corresponding mechanisms or infrastructure. If SAV mechanisms or protocols require exchanging specific information between ASes, some considerations on the avoidance of message alteration or message injection are needed to propose.</t>
      <t>The SAV procedure referred in this document modifies no field of packets. So, security considerations on the data plane are not in the scope of this document.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Nan Geng<br/>
  Huawei<br/>
  Beijing,
  China <br/>
  Email: gengnan@huawei.com</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC6811">
          <front>
            <title>BGP Prefix Origin Validation</title>
            <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="D. Ward" initials="D." surname="Ward"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>To help reduce well-known threats against BGP including prefix mis- announcing and monkey-in-the-middle attacks, one of the security requirements is the ability to validate the origination Autonomous System (AS) of BGP routes. More specifically, one needs to validate that the AS number claiming to originate an address prefix (as derived from the AS_PATH attribute of the BGP route) is in fact authorized by the prefix holder to do so. This document describes a simple validation mechanism to partially satisfy this requirement. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6811"/>
          <seriesInfo name="DOI" value="10.17487/RFC6811"/>
        </reference>
        <reference anchor="RFC4786">
          <front>
            <title>Operation of Anycast Services</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="K. Lindqvist" initials="K." surname="Lindqvist"/>
            <date month="December" year="2006"/>
            <abstract>
              <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged. These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
              <t>Various techniques have been employed to increase the availability of services deployed on the Internet. This document presents commentary and recommendations for distribution of services using anycast. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="126"/>
          <seriesInfo name="RFC" value="4786"/>
          <seriesInfo name="DOI" value="10.17487/RFC4786"/>
        </reference>
        <reference anchor="RFC7094">
          <front>
            <title>Architectural Considerations of IP Anycast</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="D. Oran" initials="D." surname="Oran"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo discusses architectural implications of IP anycast and provides some historical analysis of anycast use by various IETF protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7094"/>
          <seriesInfo name="DOI" value="10.17487/RFC7094"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5210">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="manrs" target="https://www.manrs.org/netops/guide/antispoofing/">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization>MANRS</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="isoc" target="https://www.internetsociety.org/resources/doc/2015/addressing-the-challenge-of-ip-spoofing/">
          <front>
            <title>Addressing the challenge of IP spoofing</title>
            <author>
              <organization>Internet Society</organization>
            </author>
            <date year="2015"/>
          </front>
        </reference>
        <reference anchor="nist" target="https://doi.org/10.6028/NIST.SP.800-189r1.ipd">
          <front>
            <title>Border Gateway Protocol Security and Resilience</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="urpf" target="https://www.cisco.com/c/dam/en_us/about/security/intelligence/urpf.pdf">
          <front>
            <title>Unicast Reverse Path Forwarding Enhancements for the Internet Service Provider-Internet Service Provider Network Edge</title>
            <author>
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date year="2005"/>
          </front>
        </reference>
        <reference anchor="bar-sav" target="https://datatracker.ietf.org/doc/draft-ietf-sidrops-bar-sav/">
          <front>
            <title>Source Address Validation Using BGP UPDATEs, ASPA, and ROA (BAR-SAV)</title>
            <author>
              <organization>NIST, Akamai</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 542?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Jared Mauch, Barry Greene, Fang Gao, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, John O'Brien, Roland Dobbins, etc. for their valuable comments on this document.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+V923IbR5LoO76iVoo4JkcAKJKSrOHZnTVIURJ3KApLUPbO
jh2KRqMJlNXohvtCiiN5v2W/5XzZyUtdu6sBkNbDRiwibIGNrqqsrKy8V9Zg
MOiVVZTNPkZpniVHoirqpCdXBX0rq4OnT//89KAXR9WRkNl1Lh6Lk0USf+qV
9XQpy1LmWXW3gnZnp1eve1GRREfiTZIlRZSKv1+ejs9HJ6e/9G7n8EJWJUWW
VOI0m8ssSQqZzcVVVH4Sr/MiTnq9WR5n0RK6mhXRdTWQSXU9KKMbaDKQ2HYw
y5eRzAarIp+myXIAYFfJMsmqwf7TXq+SVQptJ3kNnYnRbFYkZSl+jFI5iyqA
EqBnEFQ34iKpbvPiUyneRCsxyqL0rpRlX4y5dzHRvfcFYEdcJr/VsqAHZS+a
Tovk5sjvbzL68eL0qt2+l0YZTD/Jer2orhZ5cdQbADDlkXg1FOeyJwTP+lWU
8Z95Aa9flYCeRR2JD5m8SYpSVnfwUwz/HInjRP4Kv+LfeZ1VBTw6WcgsggcJ
gJLC0uU47eyHSvUyTGb1MM70wOdD8e8yMyOfR1m8SGA1+CGN/5+LPJvPa/il
BrCiaV5EVV7cB4bfZJbGP/xjHqfRtD3+uazt+HIqM/XkGw2eyjqdhgd/NxRv
oeu5Gf4ddPUbEqN+TDDAH7eJvMeQC2y9VH39sKDmwzhf6nH/OhSTQhbR0gz8
17ySn6I0WtUzaX+j0T9MRuKC6Bb20VlWAnXXVSLya6SrbBYVs5LI8iqJF1me
5nNEjiZLanw2uTLAv4lktQAimtYFzqBI5tAxTPyVOx0gtCqZMd2WONJoCXs0
dmb4qSQYf8hkWQ3n+U2vl+XFEqC8SY7grcvXJy/3v3+mvh7s7/9ZfT38/ql+
+tJ+PXh58L36+uzwhX764uX+vn76/csX6uv3T/8MLyD/8cd7frD/FL8uo6wo
8YsQVVTME2BWi6palUd7e7e3t0P6eQiI3QNmkq/KvXktZ8lelFWyXOX5NSzY
HjdmJvJudHE5EWfLVUo7mPnHG2xDb+ltjN/FgBeMmtATYDfQxcHTg0P4U5Z5
3A2XVCwRXgJud0cQAtsiFlbuAT/cO3i6/3wvYmYGUA5gGQfxIkpT2K7JIL8e
yNUgOIWRaSOgjTBtcGHPxkK36ZyP4dYThs2b2v5zpGGggvDUZrmkqew/Hb54
evByD2lxOBkPXz59Oth/+edifyhXMyFccB8d58UsKYBSq+Q2ukMuWuVxnopJ
EtcFELFiwqVMZZLFyaM24A7wividtUCA62J13b0WsSzjHPfrXrw3i5Z7Sfax
LveA99TVXqmA2MMFS1M5RxD2sL/hanbtzQN2URyVFYCKXDsR46haoIC7hS2L
i3GaLYCtsRwRQM60OhbZSXEjQXzB9G+A2opB5y9afInT2TyEDYWJE5yVmNyV
IItAuJ1l8dBDzFNEzDQqUNB2LGYE9F9E8aekGKJIppVF0nSltJwVsK0GqiOP
EB91S+QPRJ7Hb8biw/jV6OoUABxNxiMlcN+PxM7x6HIAcnW3e4K41NDsUwQs
yl/yZ71ebzAYAFcsEf6q17tayFIA6DViX6wYk8BHxRw0gEhpALhBks9A2wib
q3cI3pdC7UZxYyeyBC4cwX5AFEOPcSGn0C+urNJVYL9FccITmyWw8dTPhaNV
MDUgPwcKSoVcIoD805BnspSzWQqK0mMkmCKf1TGO3utNOgHbQeQBExJxUccS
esUxoF8YhuaXaR3ousiXzQlC413DKERUVUAEpfjyRfHu33/n78jd9feX9H0o
rmBuzEQlSBVJLBv6vcljEi6zZJXmd9grwCciAC/NYa9UOSFFg1GKVQ4cDPAH
nRML//13RmEUxwiggR7UTmp5LQvYeimgF1cREJ1k0G00h9WD543p6ZmBOpDf
4m7tt/q9hkUDdBYyr0vLQktUJf0pWAIQs5omMpPX10mBdKZ6AwXwRhZ5Rgva
FwXwFdjFN0k2y4uSp5WvQG1WMn9VJNQeAAIA8d8+jwTMMcsrMU0UCCCy66kE
MqoAyPQOYWtMYwjkgrOW2DX2YhcVe4vSMoe9JEEph8UhNXkydnBbiYWcg/Yg
UkBSSvtjkYAeUMQLGs1lYKDi5H0FGG0yVFh8/KgWCbAthQTectjDqpAlbshS
3AKbxX+pcxecHYDH4lYDAgjT0MEektAnUT1YGTPADywHoPMGG3TQgEDjhyUl
8jvcJpphr4CBAwqJvFHdAFJHfIAQWKC6hE1gq+ZFhWwdZ8I0XRm60eufIvHD
CoAqyAvUR/ZSRIq9MAm4DAe3kcuwruELogf2NfMuBM9jXcxeiP9owe8xoG7e
hjCXeVoTgA6f0t20GFUE87o1TbBjeK004wHGRkyFJznyqhTUe9iCO6OT813q
vd4gJ3fqy/HrXcUPf6sT3uQghnHdgcxh2FT+AxYAgWlNpZMxvQW6AQRCBwYP
aLiiLqlGgPmjfIWeFfmRmakmCK/AJI5PxuLwpccJcUr4+OWzrrF3/y+PRGQ8
YDN2TkSIw+KWllmc1kivtEWiaogSC+HFF0rEE5C5AdvZUiEUNImHaOQfLHaW
zEQr0AlWsJywPaKsvE3A5Je74hZGNgzViiOgM9h8X77AvzAXIN3mq9c1mCWk
LaeGCLCB+k6NiMJbLVconWmQtjgkcdBFY9g9NIGuh4JwBW3SNL9F9JT1cgkb
UM04DN0tWEUWoT6f6uPyK6TRiqip0xycWR31en9CS6FA5i2msMk/HYlT3ScS
MWhFJXThrFdZI/9imSu9prT0t3lD74iTDHlJiWbtkow0bANiTaMFhYX8nDAD
WICWkGTm2dADEP6DHjZCmHxeAAupLHTcTrjQwB83eXpDyO7gqohglEewb8sq
B3MSt1eCPJrmHmkdrNhbJfDjaELAvgXW6slCUIOKRRLNwKo5OVfAQvc0Fq7a
tUwrdidJpRcBKko5z+Q1kBVKoUBntMCyIhlBe6BeoeqIQ4iiTqEHUDlqEPl3
tEFm0apSggTQilNA4YVjItKUUhCB7Fkm0AKaZqAvA1HmBis+7faZpoh8+/Cb
u1eh49SoiJak7WbcwI0tTdLqOPogCJ4adtsdYSHESwDFPmN/92FyJaKbXM6a
pIq0tgQJsYRN1iQUWsfLBFYCu+9Yy8BAiwj0xBSxFWqDXDHbRAMwtKfu+Ki1
yneRJGKZFw3RBisMOmNdOFwJPSg4nZ+AcTONIafmBlG6twKRgJq1VXrCU7t4
D3gsgS0liKObqGSVOF8p5yTyfi1tzWPY29McmBSpFIBv+HdQJGlU0eyVNwTX
FX97+/7D+Su9pUQCPCYmvVvr+/Ae0oq/WQEXtwtgF7i5QeHmyQAFG+WyqeEh
KsZG/cgSFPJRcSe0jSzmdVTApkuSFh4UhPQms34wt5ekCTQnNAWlKQGwRhPc
WdcInlonZE605YjxrJIYN3lnWwL3jYaItmueATmRBd8FYBQvZIKrQ7sFeAKi
H3mC2xgRA9Cs8owtl07GACA8fuz5j9HhCliaJyy0PiV3qBUAF3qElPKoz/8i
xeD3y9N//3B2efoKv0/ejs7PzZeeeoPBtt9sy5P3796dXrzixkiB3qPeo3ej
vz1isfzo/fjq7P3F6PwRr7inOxQ0w2nCcglmWpF61NO2LlEJqD//77/3Uf/5
J+X+IwXon5RbEP5AQlOWDmpg/CeQwV0vWq2SqCAWCnp/HK0kbC2WweUiv80E
6kG4ln9HzPxyJP55Gq/2n/1FPcAJew81zryHhLP2k1ZjRmLgUWAYg03veQPT
Pryjv3l/a7w7D//5X8mEHey//Ne/9NDcv0Kmqty8vS9HN6TM/95DsrwEsjzq
HZHFTSSKmiMgcibZ1MZdRgIAtyawk8juGcUIzsZGRFnuAA+ZoJGdat5+zNqN
Gs0RK9C4TpF74tik0qG/qFIaVprMgRcvcSO1eA+SFomTxMoX5D5sRINF2tyC
pQvQWGkz94WIFBQYMQgOS7DqPgCNmNE2rUYDGP1lYXEQAvbfNa7FPGehlNeg
+yiWS5boKo2AFFBbFnMYIyMNA2GU+Qy1XqAOo8s1w1HinZHrKBQbP8IOr+5W
KOFgftAhMlDc1gzjaMIWtdhB8YK/A6sExWyaF4PRhANy5B4BUSxLtulA1/L8
EtAVdDNlz6629XdGk+NLaLDZKCc3kjJ/tDHt6KjRTSTTCL1DuDDaV9+2BUk/
yipp/ORGb7B645cv6M0mfqUcTfANffeonN0uZLwgKABemdxqoQgILFmukpRp
6yVu/8Ym3EKJRZekMXyZbEDoSzb9rX4K0+ZGhri515zIR7Yl/VCcVXqRgONC
j7RGWgkXZlGB85JC7j4ALBot3j4nloKiVhl3JUCKQj3JZso2d5xB4bEszodi
VGmnRRuiTWijiZFmquZtrKJKW5txClKGfGTEKvRG80jGSO8cnn6u+mCt4eqX
4mx0MWLmiTZkXazQZQkTrEFFJd8OQHY2vnm2B/974ZtkvKG+K3kkeH9AAtCY
aNYD+a0NHEstaOcoKc6WzixgseALAFQKZL3e0ulEW0mhBqI0pGP0LSIb1RY+
9A80hJtaAJh3IsVoA7ub7rJoqbgR7HZyrTZQ+8LBmCaVAE2GsOjtLjIwQHeR
BbKPoXiPwVHX1bQTlcLqNtMEDLBdIiAyGKxmzY6X0DrBHgxANty4vgv0OuDW
jKOpRNODxpgWeTSbMotFhofbSs5RRwLqnDKchXb7pnm+EjuvJuhoa/izb4mf
klNFhZPMTluQFx6VsE/ZbZ6Se5ZDhZotG4oGXZzANEsDiwrkA/osdI2bQnXO
ynfQwYCad5xGZRlwEJNKoBnZpnCachM6/JWDDzEuFEwswgHwHcKjFntg5H0G
riSZhMo74FdVQepRiKYx8QUneAfYL5G8sNE0KdF38BlwAehmGxxIpkInOhl0
ivjNuyjsSITp922ogxz0OREh2QF9tHgixdUBHwXQWqldJnFSVBHZoIqq+l7Q
RGty18z1VB+gRNcpUjLsbrBuiIhuZMQto2Xi9gZEkzNyVTzm9dmxw6EMtpxN
P0PtBV2YUXob3eEU0xmxCbXxVeSrss4QwqSiR1gG0wG27DOyEzdSSs6GfMYC
h9aTVDVQz4DgQBF6ZUIC/lvkULDxAhvCKKtCxlVG/lfoG1jeZ8k7jmHVXnvm
rHlRknyJFzkSOC0FOVKRn9WyYsM5roGdmZbGUTYUPyWGnSg3EEMZlcq9Q7kL
fxITAooh91QG9wfJSv0yx5BWhVxDT1vJ4IrNK9ZjS6McED0QPqImtbDNAFNE
2YEc7458c8T/FbMHIlCLqLVYj/iZ2FSL0tKV8qHLDJQCE3RAOlP+aQR7s9YQ
UjxoxBmY1DGGA0BaZyi0yJeNWifr+fXUcimrXjKZEyPDRTVqaDPUqZaZ1Vhk
9RUaxbcZYD2Jluyb0JrjkBbwnMijvX7Oc8AwSO3EMQdCW1cbLIQb2GW0Yxuu
GFwmMCLiBSG24ikr/yoJKsuxnTUskjnwzlSNxLqt1eadkTXfiSrgT9chSCXv
WQ1f353mTJYxZSnZHofu75714VoMHfqfUTRJhyE1zzfpmqacUfryKfFdHEaW
SA6gwFutLsuzwTzNpyrkSujaSYbzIajAMH+00UyfwJjAqGSB5DxMqni4KxRH
95VOVB0sIzVkDLMAWkrS6wb5vE4ijneTmCM87bweD1oy7kigfEIxgKZCoWQj
WpmuDbpDzVLoX9swqNNSIw9SCgalqTIaiG2osDvZbGXDOYmuySWgi5uRPkvK
EFAeWxia8USZ3feKpogxSZfAQSluU1WCzVagHlj/o4FWbQ/EDU5NsbwywGKw
Jz+mloRmpzoEocfuPLbf2fkhFPabLIr1aJdsg7ZR0TajEmVBYFiBlCVrnDAL
U/oUEtpgkaNF7pBNi+H8KIuqxoiAksQkyxwS+PESSMDyI0y0I9sWc5dcc/dI
wJv8IsWYQUQkINOQ/PEH5j/ImFF9AO2JzRjK3aEpKuOP1jcSmMGFypSfQMdK
Eupg1B1PQOVDzYK0f+oT/0tF/KfOqrgmL+7YLJYr4wW7JgDZ3OFACeEVXzD0
RNzDyCvOgyABkpDBHydA2zSA1SKcJcZ0BN/BsUv6mEP67MZZy6vQEMvumBLz
0gHO6m2oyq8qhsR717UuUPM1yNF+Pka+yXbC8KLettBtOocpVwtSyfV3UM6V
XCiVnoSaKUIeCTBaIvyzpNQazLIhEUymp07Tsx0d245YIqntB+xC9YeCqLu7
oZ0OSmrf/EJSA10VVAiaiVJMZWxtUROqpMCR6mno0U9EqhuOfHwyfvmsMSAa
y2VjgzvZKRiIwaB8Y5cbWaXNYJSShlncJVU7bQYMpRMUuJgCWUSgE12MrsTO
yZuL3SMB/2dItWZZmaRfhm5617LnyMipiigrEUYTEjEiDVZpVU/BzCSXhRsM
4pAtywI14JBAAFxO0ZEQHAp4tZzb/hudsvyTRYOVYVYWhvUwgk3A9AWLYszv
YOeX3xFTuB4E8zQ090YAtV6Y+MOw2kpBroBEYsbOm1xbWLZ1nzqO8cBDSVLG
37prFKOm4NE/kcyyQH9XetPh8ZQztrT6uVpIdDWyt+JWlvCyrDSzd/UsWkPY
An4za8BJjF7RvKKMKbOi+EKCSGJXSFArDWNP+9KBuUJnfRN5hW3RMOwdD5SR
DNtlZ1kPIewTZOmKTbuZjvB48P5HJSkwi5xcraTJJ8p6m96hTuF6JBoQTnFD
WfEvFvJXaK6CvjDzqbbuA2zccVsfIxvM8jqj6DfzuIEJu6i+2X4xdi/bZU5k
QPWgjqAQCanJ0FxmTLQ2ht89KyR/UHfRFXRdO87+kMM919FikzVJfm484kMk
QCD0cZM42MhJzgL2ObMrmFGSyk+J0aaAVk47NCuj3tA666ABzhhYHSUFO6He
vhUvkSYG6EPvsS+MavQnfJbLeikwfbNa9K2Ux9QLULYA53OKxmAQTZafbE6N
IgEW0TPYP5XEibHqiJFd7/SQ+PIYk4TCwRbkYBmlCkhjc65LntGhoSgu8pLc
bWQ3OLqkq5fnLD4170IPvubPzABRRqEDMiO3WNqOk5jF4nwFleQBo7YgAqSn
Jk6GPwQCWiqU6zhBDAOiVGrQtZQ3rSMBi3JTQQoAmBnzE6BcBiowXG5SlJrQ
KkeDitSISC5JHoG2jfnT65K/G/DUjjXiGwu+5GcHj6N75IhxmMP1nZKCNpGH
8rk4K5TTBFTu6IkWQWem615P0VFLIXGdIrnZBgY12lnlJ2G51EMpJgGkEuNo
o9Py64Cc0O/3G54z1h7WeuZhuD2MpwT5R3jCfTpJBYThOMj6ms30XT7j0F94
ACS3OEIm08hzMumC3z43jyAMDKxI2Rt54dIUOjDvlXPXV5vW4p+oqbUGzWw4
E+UOBYtwRinlZeWUEx0MQwFd/5f59J4MAp8nXX88aT570vt6pYjz/4iJQcdX
OhGCsS74fHVo4ata/a+aDL66EDwJfNsCgnOzU3Dc8/EYBxXOx/uj+flqpyCE
A0GoAz/zwnbgv/l2bNpQ6uRmCMI4eO+sXmidXBxMNLkJ+xUGfa8z9YIQfNXz
8XDwVZNsG4mvQQFCgIg7lPCMEz7aOIjEyUlz2vzH6ecVO1U8xHbioIsOAjh4
BCv/CHQX2MwlxyhsSEvvVIH+TdJIgryhZ+OZvUdvt+6tleH7aNLa/ScnG3vj
6EuvJd5zTHEpu5J3d05Odk1QWyv/vZZLw/V8YmTB7QMAbqysXiUP5laM2ddS
ekZ5DrJt9PaEFQXzYk/xWcqKbGIhKOkNB2adCsOgvTS/7WB8Dt/7ciQeaxx8
RI2DTsf9yyO0Zym1Hs/bdsvGfoeAQyCsJr0W4uEj0Eu/fHGB+P135xBcRoBj
fos2TwkuIJo8lqRWk9HzR4HUYdgOBWbDHNbqD7ganWKIjpOx3WPOnQVBGG4x
i752OHLQFgiSgpZ3ZB8XKiTVqauGpPkm5QGw1tz1wB0LHB6dYv1voiKYRWLf
nOPF47mxAcTnb9TWMUzAVREpA9vLXQf1I9GnKSxt0Wn2b0Ax98Fkv62DkZp7
T1QV5MdnLyRp7o/FuRp47A88VuMQUjx2ptMy+mwOmbV2jvjpSbCbBA0qbmuO
Geq8OMBFRecIdVzr4v3H0/8Yv7+8QtKBP0avfjy9vDqbnOqc60oyWTEJk0Hr
7KVVnspYssdNuspxwM0aSgcy2VNsoGN7rSk2+DQ55ho70z+YY5V08v9h9Nw9
Tkh+Nmdr8oi3CZ+XE1z5wz9JEZlqH44z142xI0kYw2HEsTF/XPcMj4ke6MN2
HPtonushM1SRqq8Vd+tqLR3kyZqXSbsZTcThzvhwl7WcdT0/2ftZ9bn385P1
PcNnz3z7ee2Le873n8W6V/e8v9b1ugdax8F4d927AWXtSefLyl6YiGc742e7
zqNw1wo/9H/+12jrQaj3vB4BC/bjvD8++DtAcPCLxoNVXjsa+N172u76FgZ9
rn78sxg/RwCe/+J+bxtoeqqebv1z83tP097Bzvhg133/qxjvY9/7v7QBdXVw
xrFt9MI2Wjc996emzRFoZmBxfmuZKoF2lp3aH9smzvpl+NkuA37ZG9Mf/Ixb
qu+Nlp1LEvyt0fgrrcr+zni/Dzj1aUCv2fOd8fMgv7jnyA19N8sHyWc8Ga2V
3fMNSg5JGApnGXSD1ipQbTV9kc5qjJqGLUPJ9Zs0KbZulPzEFnZttWi8Q0d3
IacgEyk3z2PdfUIo+5yNVoDqOxA//XYQ/O0Z/fYs+NshKyG4FO3fyTuHL+l3
nnEYjM6BoedwIVfOmScATb+nQ5gJVf8xnQ6qfGAybJjkVKYC/YKxzB2kzaHq
Tbu9nRTQ8T4ij+ZKaSAzFYBai0qNb3Tsm04pxaskZ2KuUOj4xmkEkrHXrOza
ZdUH01lxobIW5LA3oAGaTvBw1m81aawK/ZShgHmuKgsm1J4G5EVuim0xqVeU
+O0jmtMM7ZG5htHKvjfWtCjySe9zuMx2UdoejPKLWQxVGbZTer0RnidkTHCS
2r5OvmsTn+QvaoyyU9kfdbpaKcUsNadPN+c0ACoBr+MXuCCcGUIpZRa/Q/HT
QhMt0MCsdM2le3VPU9PnZ8xOfOYe4SFFzBzD5c55J3m6Gx+MIB/oGo0QA6ww
UrfFhFsveGxWkxRGP/qBNFMdJeVaJu3YrOVvRK4umyONGV0v15gnQbmqeptg
kio54C1lmcwPc8IFdzGlWGD2FSbEqnwOe/42bwPcsEO7MaLyIHRwmlJTTbGI
15ha9DnCYTWpGlomjuQzUaJD7I12srOR0eDifQl0wQfsu7YP8HUylnghiMuu
2ROU7GYnQxu4I1Cg7MG3bGda+2+CVh5mTyRF+V347BnlUNswoyZo5Ji4hwwD
0YaQ37rOPmV4WFLx2TXnM3g+uNJhj6I4b7stdKIUDNt4ncw7zIcDbKxYgHdX
GXFLLGhjdWP0BtYnYfsTj4uCEUyYouRXyobieZsTix41YQESlC+vklTSmRNT
+HHn5NXFLsWVoQ/K6uQkue9fvtC1O7DwHHzXZusN6xi/1ZzshD4WlQ0Dc56i
5WyODsGIVNWIztTAGCr4qkdyDlbIUqXP8MafJXR4AhmFk7iui8foMjEqDwN5
cYKbno6n4RaYmWxTHL20TYfiQ0n1DPpKCOoueWVNZpzKQ5Q3vP05C4ETENqw
OxTKvBRQqmhc59WUFkjakIQLPi9IuWTQSQ0jpjpNiEsDORNm3U4jlWK5mZP6
rdGrUjf4uYWhqoFB7LyaXII+A/+3x8jVTtTeAX9U1WvXtHVpmEbaj3Mi3AgY
E3bkrdMYRlFyEM1OKrFBMvqKOBEH5UIyk1SyYtLwmKzZdOzKa0hFBVsL+C2d
FFuaImBrqJlNCPVP2JzY1mGhR1FuC2OOb2wirMm8xskwPkTL8PAX19FhHm4e
w3N7bHzdd2h0vt9lf3U20Bad8WuscWuoIVznRqdrg61xVqr2f/EdHF3ujf1A
EwtPuBG3bDhGNnpSvE/A2dHh6lAI2MLh0XZ3fChd+l3r9AgBvZ3jY+N0u50f
nU1N990OkO5hA96TLXwuAbA9RwhhbrMbhD/dLolu/oMlMl2e0+EQ2egOeQAE
40Otxfpc3U+YtxofqBFk6rtytelXmZWF9qiMxCsWdzw7cemIO2u0cuQPmoEm
A4pzjfUwK0ryR4EY8KE4Ek9bxYfbQmv8JUYBo1e0Lq/9DkqfN34P6x0JvLbf
VzadfVt9O+hqoZ0X21no/W4TXdmorGLw0YADMlatWqP0Fo019xjo2bivYg9e
aQiEGjsa/AWBo/8fsv6kO3G0E8KfUqbY1DFKH4bhSXkypxGNKuN3APh4LTPW
/lqv0Gw47Mo6luqH59xpfxvS0P4oPoYUnuq+M9WDoZhQEjI7JHQYX0/RxpVs
TR/XQXNoHQjd9uZoT51XxKAZL2soVdbPMPM8J/YckaZV+EM5pfbZAg3pUa4L
o6lQOZ6PXu8d2Ms5aYbr4650jLgjudGFwAuE8l6+b102dI3SaVVdRMpwC1JW
A8mNrHNjfh/v9lasTXlY7gfIVokrLVyASeQck3bO2nWM0kxiuWcOCxn5jeLG
gTwc3egEh/zyWEP9kd/4GMdeWoYpUoJ+7ryAqd15fu57R/W1oCHPOp2ObQfh
w/uByh6gl/EeNsBGUbzpc68QZmPMhxgG6rOFfdDVZFOUs6PRPcba0lhQn3vb
DOpzf9NBD7iVBaE+DzAkdMsH2xO6gz9kVqjPfa0L9XmYkUHcJClAHf1u9+G2
RhuEP2JyBIDd0vJQnz9kgOg+vo0dYl59uDmiPg+xSkKf7mjtlsbJQ+AB8jI1
G3xRqDWu56jp298Le+xGZvoUXo8U47zwzzHTQ20eOP7rrtxIW6TLWDgPl31k
+JxhmdWAeA2WTbGjR58w3pmi+qc6R974XdlOqzcldRg3/RBy7oObvgqFtY/d
rC1dhwGx56rbQ6eeOengrq0hHGOjKPJbahrWQKyxqMyDJbxA9a/c4HPpV9xk
AMi2MI5SY52hHt+w+9TBBHoYV51NWjbgELUuqY8G2ch7sPHDArcaOJvq6ZuG
QF1bRlWP10RybWSVqlNsEfikdbYl+x1zqIkiPwJOuXYb9vF9SLVJqdsVWfQo
1Q3oOcaMTS+11hPu2Lrkk0QmrtncJHSaVCVNciKqNVboDCJ12ZWqrIsgNFJQ
W+FA5bYPFvJuHN5RGZRYqsCGsPxcwgQN3ThRZ+2dLExV5w+D+7oq8Ra0EekS
97aSJSr+HHvnPAGPkTnJtNbCfe6dR9O3zuyNE+9QGho00c3HqPqIpx4bB9T8
4t4bTqnR/Q96Vbc+qbbxhNp2FGmyOJv1yNeXklMH1pyqNs0KmPY06+ZTUCSM
O/8gSY1KQOj8U+MAFPznwNR11mWb8fyjToIiOEYbcVQT9ziHaJzuacHpHFJy
jn6sh3Pd2ST/OBJ07P3VfSSpCSd8iBBa82vUm/UPH3lbY+0xsNbBLUEaXQif
jXYPXT97Logm1qTurU8IbTihHOxcJ9ppL0tvKzdLY+8rAWXbu8MSyyj/lx4m
0uj+iOh+0IkiHNMtyLXN6aHWqKAkNm7a2GLs5tDOCY9OmfFHDga5FWNUFth2
NKz1v2iFi1xgsB0DIPoYQZsiWuH+ZVIt8pk6QIH5PySIug/Livftg0WufDGn
i3SRrTYMfTGl9CpOQUPn8RJkENgzmYY9rDVFNp2j6wQPpuCWTpqt9Qt/+9Xe
6iRTcNXWu5zDzOobeJxbfd7Lv9zN+Dr53loHNAHlq22jibuFXTsP9BUZKya5
jbkdxuEWnuZ7kAm7n7/NMRnjSNv/bveeWSf3dStv50ne1nm8rb94zz1RsNXx
mA2HY7Z0BG/y/d7L3fsQD+9Dnbrb+3Ef5rrd6jjMQw7DPOgoTOggzMPcsH/Y
8/pAZ+sfcbD+Eafq/Ryp+5scqftbOlIPQx6Yw4AHplMvfKAjNSxQlR+VpFTE
hYaCgqS/hXNp66mhojBPQomWJv2fzH9yQXX5gvC5m4/h93DQdoOGxKNRDu7t
BQ06NNGWcAsHuqkwIeel7yNd71j9n+klxYJoq1VKNf3XqgB++d+GWmjPAOBL
9mYDe/EDpoLfw+PDiUlISZ7eLktW+COqjExGLOjmN3drr5EzacXtEx22mo4P
NwyxXFGlAF3D1LlgwT35X+UrrvaoENCMQjRrAnaWMsLj8eutWGXEIodon+pv
OLqoFCiAX+A9b2r5Q5UXtN8T+q1LtaExAzrFgtSEPifRh1eqb+6TMRfvNS6f
MKUpbVmxStxStdS2G1mTgUnKPuvY6v1GiWquWjVzvKYdtKn3gFvWrt04fCWE
YZiKTwaZJDnDWywSV5qyt9b7hc1a2nN7MG7JI6VU386/s7e9xT0Ga0ej42C4
UdajZyh+QsAscpXbX1WgNMlTSx0m6WIB1kF9qMvR16W67UnVImheRSiwSt9Y
ne6a4GWuNMsvj/UdnmHX7Kb6QK3KUOSIVOOUrFmQPxY9oOzY/6r9svCwWZjK
cw/6fkL+2fnmKJP2vT8KuanNdAELQldKYff8RfgP8aN+UGN/1QWqXIh2zsfj
vng73m26Pc0P3xhyHsKCqgbUf9AkGo96tqSUCHzg4c5kTIB+1ajAR1gD6RtA
7mLFdr/Vh6jl7fv3qvUOO+YbrX1UNFurr8Y9v7v92Ovnvf7zpAdgH3EUwHXr
vzeuzv9RlbW2B6VLp+51eKmg8y2qdG3qvCP1IWAXIGP6WNZL11PczBjd+gjR
mgOQHd7yfleINOgy73PJoy4/KVokx27pd3sH+hReIm8l4IFrw3AAdZuZ6XuP
Xe8mIndNbfE+FbaR7Mdb5ZWu8VqWNdcDbepgLW2rqaK34sOoB7GIQ2A6keJd
LkChfq2LaqDrDAiQrhpUt22ZO0rtldZIIV5hMDoNXCTQH9VtZ3f/nUuj9yYe
vN+hxncUmtwQLxYdxhsBArjDn4MqbIu0KvXqPamKT46ujZp0H9g210W3LpJ2
74/W7Q3iHdWdzrZ2K+9tNZ2xNxTvaGhz0YHMSCHfjlCcQlSsPV4XnDDCNaD4
BDgfrrYX2jZPxjtaM2YfRDVwIhg1bp34JXXNPcNL2EO7jdGHsRqqGLIOZW6M
RXMi3m5+DjxlbbS2rlfgbYuyr7pyPOicWAnLuZjDYMYe3jajEW71sU5TvctV
bcOZIY5lpOuAScPGWuW37PUl7cIJrB+7c6WkkIAJRtZVoo4vtM+lu+eN/VLH
xp5y1n+LcrZ0SUkk0y3vAPVxxBdVQ0+Sr1Mzh93XQgg7Wxtm6hy3d6VWZte1
EVf0aQ3YG6xiSPZZAlwnLBqFDsyG5xLw2Ux5Ufh2tM3F7AL10HwyuuTVtVUS
mldjKp+TLIS+EbOFxqE4rtkvc+kQJRes58pojctUQkDbcdwbeEKj9XpOiQq8
Gs0fwS+41jjqUPH10SErm4uA5+mNov6u3Q7YdeppbkEVrreIoq0kLqEFFcxR
l8Ov7BXsuq6+73JtBQCdi0jIyO8kPJ9PuXfp8aq3b192Kki6xNgs6qBZGnXD
h/1sMW3YT/o42VZSXxn6xMdVaXhz00spduQQJmyXa5c9XUp0qtvY7bWb0PdQ
V3EICOIYIOeLDtwQpJYiSXYjizzjq+XQycRX+jkh/kZqiLn1qHl3Hep9Srib
Ky9ccUu953MstYjXYxnhy35xUNr58hQ8Ohdx6ZJohpdr8R5vYpMuG/BukUfA
LpLbddc+iy+PQZr/jvfMOzXwUyoTo08Smv7UHWER3raerrCcxWzOuLMF63Ug
d5tF19zJG4Tc19Z7re+FndcgEvHWc5XuqBLpgI9SaVO+o4cuiMeV7SMx8uWP
koqW3zq3t3Li4kjf0/2juSMEsZDQy5vuPnBrfTh3jPDd3/FdgII1veIqb1n8
hB2GSJPacZXFjKUo3dOMw70HMZsp3YHnjPd5oCIOq1oXWKtjXkdFBCMm5PIC
HJBj5AbftkhQiIFJEKjm7nD3qvBt0RSqb6Qj+UXyK55LpnJC2v1q4jKLKNuO
gnpXdv8jq+2r27xRGXNqhra6yDNTJIPchp4rNTI3mbMrkVzHNCGlqODaWpFG
V2sE3OY7ta6utER6bupNu8psiyiNI3JuDdNLb/Fljqj6twcy0xzy5p0nGYeM
zB1nTqUqLTr6XmSp79CMLw5773S1FwZb38M7oIgWWT7OJSu6TA/evsIxofEI
NDBcYFgRLE70gU0evOqsT/2Y2268jugWV7opWF3Vbv3+asPjBa0F/M4WVZKo
+2ccFrJNSkjbFdWVtaFdXuSNVs6ttX3qNJBAn5Nm/PFroIxSow0pTJMRR6G+
I4C8R5vOCKoo+rfEw+FGPBgcNAvHtjDgJbqsQUYLDX4V2e1QonM6gikEwUB+
IIbvpgqFz9zppAFMKLCpHQ8b7dtlDNzj6BXRurljTKXi8RWagTDLkMRBgP95
i+LcFquC2d4BpJ6pAHDIx5C41/ARJ0sHmzs98DttOD1vKbznyFCdC2HPq7Pn
is4V2Pt/6V6T9nU4TvVCY4EYHYBcklf6wBXlW+ql2+IAF6vA/aao3CXlHyV1
Gq30lYn6ntem3W9yUCfIr60fJKaoqHUgBoK9LgGa6bLRB4id5VIV5q6zlG/M
xsfmYmVSzUAuUaiaGoEookpoK2hpBtDT0FejrxHgQKSlc/psxrkZzeXEeK1d
OeWQCSwc/MulKcyqgab5ya2Z6tZWPfMKNOKsvQQFFegM7hVzo56u2ybdyxeJ
FG5zh/QdbEtVjdAuG18iqDVCvHVHXVM208RCCkQy27V3mBKGGrFcspY8S0+D
ql7UGpPHAkqv2oWptoKFKeF5it7xxPPKhkhIZU/PtEdWqSNeAdcAAfdYff3J
qsZnjmo8VqrxKzPL7TXWi/dXWGuvXtL1ZTcRebSN1bXjX3TsWmNEZsQqs1mX
osTXokzevv9w/goWPQMGXoHlWFDNHOgKrT22W5QOby1axz9A7MWwolaqFiwM
OsyMtS+Nk8G9R1s27xfFSKC6Qc6/rpbooMSsn0Jf637bwBzu7wzV1sadAyBt
cHtKMuuUihhHq2iK5CHRq4+7jmv4AfkB1LO8UCVX26MovOEKkR4IbMbix7cY
vPL/fKpSD3vH7rEGNruS3ciWuDO3G6LO7HmjxM42ivUurwgFV0TbcNPW2Nis
+4Wx3SbadnujbbetaFnhiiw/ezS3RhO94qu9ggq4l6GmpsDe12WE1z3gonLm
HWKNDY5KIWru0zrvUTEyjn62AO4DfeuGMQQI693GKs9OJfwoyyQ4IRNoUDEv
ZDfGDJZcihOIEKYS64otl5ithD+FYs/bcxK8khldmG6gQgfVTDyF6g+tu5fY
g78vnAtxgb9QuhxMculGd4ZiRC45vNRdm63kFqQdE8y/os2zJqilEPPGxduJ
xds9ltRktDnL2IjesIyO6kydbnAWCJvjxhBg68Wf0jt9e7K9OJOs4mozOLpT
tI35dtxIu4MaF9opTYgvtOt7J4UKTSgNhyvFQxoqlFKzc+Uov13kaXBqtG3a
DrtJDJ1tQ3vmRnDtSDUajUNTpeWUeYZu3jfsOiAKM+EkvlH0bDwA+KIV6IbE
Oux9hr3en8RFRNz3bOwU9TpSERndC0lGvrbZELi5Ll4XAkOcnZyKUlbeY6Dz
H8cXeKlvE44rrmq2czYGJtcXby5PQRW7vHkBS1TFw92jQFV+98aXhuNOK6Ao
8YD47vAMsynmSncK4yT4rmmAFL68cC6d7vVofaxjXc2dUZRnAyyTx3GmJnLe
jc9BT46mSao2XwMnbJZl1EfrDT6FpZ3L/S0I35AHVUfOZ3jlKF8/n0aZU5PW
eP2iIl5I3Kp1wammKDrzOE/pj0YKAt7bnAG8FNxRpk1bjjseexA3iHD83Wys
jHfBYyv6sEQBilGVbvHlsf5FnSh3knwTLZQQAJ39wbFpVyrsvD473rs8O97l
S6mzQesVc3G32wxVqVyWuQp26OuWS8a8BYWyHqeo+Kdl4pXK1nmRjXrYTkIq
3fepZe12hT1UZ/Ywv+1uKC5pZsYFrJZ/SsyHsMpz0RvTLO+QCLeFF8fXN/7r
WcPRpzon221qdFYewD+X6RAOOe2vC5BXRU1kRqhvUK1HePp6geQziQwSmJuU
GXWFVuyTkk4NQjc1ppQgH1ii5jXH0GWl3mNK56cy+1WH6TD6lSQzfUE5xhpQ
hbhSpEAMfYbqV5GArVdopVtiTee4JuOLdqAkpgHSNklnXsx8kvftwoUhd/au
jsaZe95y1lm9EWljnY0uRu1NhU91HMgA6JRepIqSpA1Tewy9xvZiYiqiTrd4
gAbf613AZgShMie319s6uk0kfT1O5K+YJQNfTxYyi9gvdgqMKj3CrTvPouyH
Bb0/BI211xsMBrCR4084xCjGKu4pVqbkUNGXx81Hv6NXJ6uXU6Trf3lEGxDd
Lu9Iiwdq+UTe8H+LcDneRUDKfXEcFaBovymAVMCEeQ0UJd5EeIlLVi1yaDah
67IxzvS3GrqB/8R/It31xdkcizvUwGgWyQ00SMHwybHEapRFffFvOcint1EK
GxG2zUj+WmfiJ2r3TgLhwo+X+C8oH7itziVgJIEvbxKws17lKpvoHfz/M1L4
uayxy0Um3n93XEh88zJPUUS8yqdTiSYUCj7t9uF4fU1ilu9OrxTReNTw/wGd
XF/D3bEAAA==

-->

</rfc>
