[savnet] Re: Ketan Talaulikar's Discuss on draft-ietf-savnet-intra-domain-problem-statement-23: (with DISCUSS and COMMENT)

"Sriram, Kotikalapudi (Fed)" <kotikalapudi.sriram@nist.gov> Sun, 19 April 2026 17:55 UTC

Return-Path: <kotikalapudi.sriram@nist.gov>
X-Original-To: savnet@mail2.ietf.org
Delivered-To: savnet@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 83A0CDF3DB8D; Sun, 19 Apr 2026 10:55:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1776621304; bh=PhaiZmUHa1R/lNyVOCsyyUbrQyzCDcBzYp+Bb5p5fhM=; h=From:To:CC:Subject:Date:References:In-Reply-To; b=cTFA/ZoMoVldu5ZG+EuHfdtP9CXl7CtEIM5f7nAWcL/ZtwJD0f2WmRJaazv/IAIr9 FqklY16Ztdf6872fd032k3MA6pqB/S+jFy64KPeI3mqgp+mdCgfLZWcKi0N7/DDE6Y u8EsqB2f1PJWbUVvk9jpuM8xlLIiA2Lwii0a9GcQ=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FROM_GOV_DKIM_AU=-0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=nist.gov
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bvIHg2xfSjTL; Sun, 19 Apr 2026 10:55:03 -0700 (PDT)
Received: from CH1PR09CU001.outbound.protection.outlook.com (mail-northcentralusazon11011068.outbound.protection.outlook.com [40.107.199.68]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 9C59EDF3DB86; Sun, 19 Apr 2026 10:55:03 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=y25XWNCAy7z7Xas8KrGoHhfS2R6pPbeSEq6nHL99URniF9Vwh3rb1HNeb8G1MEY494xxUYitOxDb2hrqxoLSQY3hWJcTd4NGvZ/Qt6w4kbP96B3FwL4jEl/YqiK0W6Mmb+nzbxCTu4WY08F9vfq8xpFuUfuIw5IcR9fpd+ypB0sLAegnxJ2Nl1pbhJqi4Pn38xmz/ro2oThlfE4khUkXHIoUXSnCNpVSAe0MtBEjPllvScTTKeBMxGcFIFYoIyuGls+xwWVmyvQge/QLJtRrux36R8Hqah2KIN9qHWTzDSl/cWVGUDGdrk1RQWX4Vb/LtHYwKtYu7boGicD2i59wbQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=PhaiZmUHa1R/lNyVOCsyyUbrQyzCDcBzYp+Bb5p5fhM=; b=UExK39L3+tLuxcvYlXB97AdjyaEKMdLkPiEkjWf/KS7msyRM3lxI46QvFJGgXFtWghOIG7NIfTaVAuAj6MUxC7tf5fawn+/LcL1VzsrUFKWuwdcwcqGt5e1UAv4xvlHfloQqpsXu8f7vK5AsL7azbNOvcYFzLaXUFoTcUXQZjQZpm+O14SuqJjrzWozlTkt2l+gQfJbYELaCz0CjlbkNI6+xrikgpDxi5DTR0I1riSyjLvkrA/w/Rvo/DfHkiFgBssEpQvEeMWy2nFKhLqxHjLXj2vvzlTgqmxmIdqrnmEh1BX3f2ZrqT34AS87HIHrxLttelC+Mb+/HoC2Ey3sUZw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nist.gov; dmarc=pass action=none header.from=nist.gov; dkim=pass header.d=nist.gov; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nist.gov; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=PhaiZmUHa1R/lNyVOCsyyUbrQyzCDcBzYp+Bb5p5fhM=; b=SERufCa4y5jAbG+PHw5iFT3r5MbN4UIlWB30lxXPV8cNwyvfjCDdF3Kj6wH4vlsTmsVLQiik0Ogwcn7O6Dd2MaLKBMD19ggluOE/n4Os6hECHmI2gdJj3Cguqm6nkxtnghF6Z514hUHtlb+oz+uu33L3ZJ3BMHPKJb0K0am983n4Q7oLfJa2DNTOKhdxRdoXoLKqMiLYWrG0BebjJTppp41Z6+6SSVPH0GAe1ocrq7Htlbp27gtPXodbzmz0xVp45flKHB9PWU+uMDk4Bn6AdOwQCH73+8AkKzn1bUQviZ4/LutYTubMSfD0M5ph2gwtntSe5YyWTRAHgqV9+0e24g==
Received: from DS0PR09MB10598.namprd09.prod.outlook.com (2603:10b6:8:169::7) by BY5PR09MB5682.namprd09.prod.outlook.com (2603:10b6:a03:249::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9769.48; Sun, 19 Apr 2026 17:54:46 +0000
Received: from DS0PR09MB10598.namprd09.prod.outlook.com ([fe80::f5:7a71:6197:c40a]) by DS0PR09MB10598.namprd09.prod.outlook.com ([fe80::f5:7a71:6197:c40a%6]) with mapi id 15.20.9818.032; Sun, 19 Apr 2026 17:54:45 +0000
From: "Sriram, Kotikalapudi (Fed)" <kotikalapudi.sriram@nist.gov>
To: Ketan Talaulikar <ketant.ietf@gmail.com>, Joel Halpern <jmh@joelhalpern.com>
Thread-Topic: Ketan Talaulikar's Discuss on draft-ietf-savnet-intra-domain-problem-statement-23: (with DISCUSS and COMMENT)
Thread-Index: AQHcz7+zv17W3Mn6/0CMK3LaSHQGIrXmq7AQ
Date: Sun, 19 Apr 2026 17:54:45 +0000
Message-ID: <DS0PR09MB10598985968DB7F503D38FE42842E2@DS0PR09MB10598.namprd09.prod.outlook.com>
References: <177624232468.966643.15222807959085603328@dt-datatracker-647897bf7-7f2k5> <6f76eb35.459a5.19d90f45970.Coremail.qinlc@mail.zgclab.edu.cn> <CAH6gdPz5J=P8dXVrZgAdCSXs+7Qia4Ywne1ffohohbjOQGqPbg@mail.gmail.com> <2cadf780.46f5f.19d96f0632f.Coremail.qinlc@mail.zgclab.edu.cn> <CAH6gdPyPAPWp7T2Ksga9dQVFzq6XsFPy2CJHoztKOK0eHSdSDQ@mail.gmail.com> <DS0PR09MB10598035206C0C8AE96C17E51842E2@DS0PR09MB10598.namprd09.prod.outlook.com>
In-Reply-To: <DS0PR09MB10598035206C0C8AE96C17E51842E2@DS0PR09MB10598.namprd09.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nist.gov;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DS0PR09MB10598:EE_|BY5PR09MB5682:EE_
x-ms-office365-filtering-correlation-id: 4dddecee-33d4-4249-930a-08de9e3cbe0f
x-ms-exchange-atpmessageproperties: SA
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|366016|1800799024|55112099003|38070700021|8096899003|18096099003|56012099003|18002099003|22082099003;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS0PR09MB10598.namprd09.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(1800799024)(55112099003)(38070700021)(8096899003)(18096099003)(56012099003)(18002099003)(22082099003);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_DS0PR09MB10598985968DB7F503D38FE42842E2DS0PR09MB10598na_"
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DS0PR09MB10598.namprd09.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4dddecee-33d4-4249-930a-08de9e3cbe0f
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Apr 2026 17:54:45.6542 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR09MB5682
Message-ID-Hash: OXO3XP2VCWBVDXQEL7ZCCRCZVIGD6VGC
X-Message-ID-Hash: OXO3XP2VCWBVDXQEL7ZCCRCZVIGD6VGC
X-MailFrom: kotikalapudi.sriram@nist.gov
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: The IESG <iesg@ietf.org>, "draft-ietf-savnet-intra-domain-problem-statement@ietf.org" <draft-ietf-savnet-intra-domain-problem-statement@ietf.org>, "savnet-chairs@ietf.org" <savnet-chairs@ietf.org>, "savnet@ietf.org" <savnet@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [savnet] Re: Ketan Talaulikar's Discuss on draft-ietf-savnet-intra-domain-problem-statement-23: (with DISCUSS and COMMENT)
List-Id: Source Address Validation in Intra-domain and Inter-domain Networks <savnet.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/savnet/LqvpXpFPEaiKbRk3h0Ax2SjFtUA>
List-Archive: <https://mailarchive.ietf.org/arch/browse/savnet>
List-Help: <mailto:savnet-request@ietf.org?subject=help>
List-Owner: <mailto:savnet-owner@ietf.org>
List-Post: <mailto:savnet@ietf.org>
List-Subscribe: <mailto:savnet-join@ietf.org>
List-Unsubscribe: <mailto:savnet-leave@ietf.org>

Hi Ketan, Joel, and all,

This is an updated version my previous post. It benefits from a side discussion with Joel.

Upon further reflection, the concept of 'interface' has remained a cornerstone of SAV work within this Working Group, consistent with its historical role in SAV development. I think that Joel and Lancheng were also pointing this out.

Hence, I would like to suggest the following further refinement of Ketan’s definitions:

-----------
Intra-domain SAV: The AS validates source addresses in data traffic it originates directly or indirectly (e.g., from a subnet of a customer with no AS). Intra-domain SAV is applied on traffic originating on interfaces (on AS border routers) on which (a) a single host or a set of hosts are connected, or (b) a customer with no AS or without a public AS – managing one or more subnets – is connected.
-----------
Inter-domain SAV: The AS validates the source addresses of data traffic received from a neighboring AS, whether that traffic originated within the neighbor's network or is being transited through it. Inter-domain SAV is applied to incoming traffic on external interfaces (on AS border routers) that interface directly with a neighboring AS.
-----------

In the above, a subnet means a set of endpoints (users, servers) served with addresses in an IP prefix.

I think these refined definitions are consistent with Ketan’s advice for making the definitions protocol agnostic and at the same time do not impact (or minimally impact) the current structure of the two PS drafts. Do these definitions seem reasonable?

Sriram
----------------------------

From: Ketan Talaulikar <ketant.ietf@gmail.com<mailto:ketant.ietf@gmail.com>>
Sent: Friday, April 17, 2026 2:18 AM
To: Lancheng <qinlc@mail.zgclab.edu.cn<mailto:qinlc@mail.zgclab.edu.cn>>
Cc: The IESG <iesg@ietf.org<mailto:iesg@ietf.org>>; draft-ietf-savnet-intra-domain-problem-statement@ietf.org<mailto:draft-ietf-savnet-intra-domain-problem-statement@ietf.org>; savnet-chairs@ietf.org<mailto:savnet-chairs@ietf.org>; savnet@ietf.org<mailto:savnet@ietf.org>; song.xueyan2@zte.com.cn<mailto:song.xueyan2@zte.com.cn>
Subject: [EXTERNAL] [savnet] Re: Ketan Talaulikar's Discuss on draft-ietf-savnet-intra-domain-problem-statement-23: (with DISCUSS and COMMENT)

Hi Lancheng/SAVNET WG,

This document covers Gap Analysis, Problem Statement and Requirements. The WG is working on a separate document for the Architecture.

Therefore, framing the problem space around interfaces to which SAV rules should be applied for intra-domain seems problematic and suggests a preconceived solution or approach.

Let me offer an alternative view for your and the WG consideration:

Networks on the Internet are organized as Autonomous Systems (ASes); each AS has its own allocated IP address space. Routing handles advertising reachability between IP endpoints within and across these ASes.

Intra-domain SAV: These are techniques and mechanisms where an operator validates the source address for traffic originating from their AS. Here, the source address validation applies to the IP address space of that operator's AS.

Inter-domain SAV: These are techniques and mechanisms where an operator validates the source address for traffic originating from other ASes and either transiting their AS or terminating within their AS. Here, the source address validation applies to the IP address space of other ASes on the Internet.

This definition is protocol agnostic. Do you agree with this?

Next is the description of Intra-domain SAV scenarios. This can also be defined in a protocol agnostic manner as follows:
a) Internal Use: A portion of the IP address space can be allocated to a set of servers (e.g., in a data center), to a department within an Enterprise network, or to a region within a Service Provider network
b) Customer Use: A portion of the IP address space allocated or delegated for use by a customer receiving Internet connectivity service; this could be via various designs
    * Connected via broadband, Ethernet, or such service
    * The routing on the Customer-Provider interface could be static, an IGP, or eBGP with a private AS

For intra-domain, the SAV rules are expected to be applied at a suitable edge in the network. Where this edge lies depends on the demarcation boundary that is picked based on various factors and is perhaps something for the architecture.

For (b), it may be the UNI interface between the customer and the provider. For (a), the approach could vary based on the design. For servers in DC, this could be done at the server-to-TOR interface or at the DCI nodes, depending on the security and scaling requirements. For between departments/regions, it could again be at every host-to-router interface or could be done at IGP domain boundaries when the regions and departments are organized as separate IGP domains (or OSPF areas or ISIS L1s). The "edge" varies; it could be a host-to-router link or border routers. But hopefully not within the IGP domain as that can become very problematic and challenging.

Much of the design approach belongs in the architecture document.

Similarly, the source of the SAV rules for complex cases (e.g., hidden prefixes) may involve various mechanisms, such as a management interface, BGP Internet Routing info, or others. However, the presence of a hidden prefix from a different address space does not change the scenario from intra-domain to inter-domain.

In summary, I find the association of everything BGP to be inter-domain and everything non-BGP to be intra-domain to be very problematic and, in my opinion, flawed.

Please check inline below for more specific responses, and I hope the above provides a clearer overview.

…. snip ….