Skip to main content

General Source Address Validation Capabilities
draft-ietf-savnet-general-sav-capabilities-02

Document Type Active Internet-Draft (savnet WG)
Authors Mingqing(Michael) Huang , Weiqiang Cheng , Dan Li , Nan Geng , Li Chen
Last updated 2025-10-10
Replaces draft-huang-savnet-sav-table
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Formats
Additional resources Mailing list discussion
Stream WG state WG Document
Document shepherd (None)
IESG IESG state I-D Exists
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-ietf-savnet-general-sav-capabilities-02
savnet                                                          M. Huang
Internet-Draft                                   Zhongguancun Laboratory
Intended status: Informational                                  W. Cheng
Expires: 13 April 2026                                      China Mobile
                                                                   D. Li
                                                     Tsinghua University
                                                                 N. Geng
                                                     Huawei Technologies
                                                                 L. Chen
                                                 Zhongguancun Laboratory
                                                         10 October 2025

             General Source Address Validation Capabilities
             draft-ietf-savnet-general-sav-capabilities-02

Abstract

   The SAV rules of existing source address validation (SAV) mechanisms,
   are derived from other core data structures, e.g., FIB-based uRPF,
   which are not dedicatedly designed for source filtering.  Therefore
   there are some limitations related to deployable scenarios and
   traffic handling policies.

   To overcome these limitations, this document introduces the general
   SAV capabilities from data plane perspective.  How to implement the
   capabilities and how to generate SAV rules are not in the scope of
   this document.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 13 April 2026.

Huang, et al.             Expires 13 April 2026                 [Page 1]
Internet-Draft          General SAV Capabilities            October 2025

Copyright Notice

   Copyright (c) 2025 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
     1.1.  Terminology . . . . . . . . . . . . . . . . . . . . . . .   4
     1.2.  Requirements Language . . . . . . . . . . . . . . . . . .   4
   2.  Validation Modes  . . . . . . . . . . . . . . . . . . . . . .   4
     2.1.  IBA-SAV: Interface-based prefix allowlist SAV . . . . . .   4
     2.2.  IBB-SAV: Interface-based prefix blocklist SAV . . . . . .   5
     2.3.  PBA-SAV: Prefix-based interface allowlist SAV . . . . . .   6
     2.4.  PBB-SAV: Prefix-based interface blocklist SAV . . . . . .   6
   3.  Validation Procedure  . . . . . . . . . . . . . . . . . . . .   7
   4.  Traffic Handling Policies . . . . . . . . . . . . . . . . . .   8
   5.  Relationship with Traditional SAV Mechanisms  . . . . . . . .   9
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .  10
   7.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  10
   8.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .  10
   9.  Contributors  . . . . . . . . . . . . . . . . . . . . . . . .  10
   10. References  . . . . . . . . . . . . . . . . . . . . . . . . .  10
     10.1.  Normative References . . . . . . . . . . . . . . . . . .  10
     10.2.  Informative References . . . . . . . . . . . . . . . . .  11
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  12

1.  Introduction

   Source address validation (SAV) can detect and prevent source address
   spoofing on the SAV-enabled routers.  When a packet arrives at an
   interface of the router, the source address of the packet will be
   validated.  Invalid packets - those with unauthorized source
   addresses or arriving on incorrect interfaces, are typically dropped.
   Only validated packets will be processed or forwarded.

   From the perspective of data plane validation, the SAV capabilities
   of existing mechanisms have two main limitations.

Huang, et al.             Expires 13 April 2026                 [Page 2]
Internet-Draft          General SAV Capabilities            October 2025

   One of them is the deployable scenario limitation.  ACL rules can be
   configured for filtering unauthorized source addresses at specific
   interfaces [RFC3704].  However, ACL is not dedicatedly designed for
   source prefix filtering.  There exist performance and scalability
   issues due to long-key based searching, and typically requires expert
   maintenance.  Strict uRPF and loose uRPF are two typical FIB-based
   SAV mechanisms [RFC3704] and are supported by most commercial
   routers/switches.  FIB-based validation brings many benefits compared
   to ACL-based filtering but also induces some limitations.  Strict
   uRPF is not applicable for asymmetric routing [RFC8704], which exists
   in various scenarios such as intra-domain multi-homing access, inter-
   domain interconnection, etc.  Under asymmetric routing, a source
   prefix may have a different incoming interface from the next-hop
   interface of the matched entry, or the source prefix does not exist
   in the FIB at all.  Loose mode can only block unannounced prefix,
   which results in massive false negatives.  Overall, existing ACL-
   based or FIB-based SAVs can only be applied to specific scenarios and
   cannot be adaptive to various scenarios (e.g., symmetric vs
   asymmetric).

   The other limitation is inflexible traffic handling policy.  The
   current common practice of uRPF-based mechanism is just to silently
   drop the spoofed packets.  We don't know who is victim and who is the
   source.  Further more, the clues of attacks are ignored, which could
   be very helpful for dealing with DDoS attacks etc.

   The root cause of the above two limitations is that there is no tool
   specifically designed for source address filtering.  That is, the
   capabilities of current tools are derived from other functions, e.g.,
   FIB or ACL.

   This document describes the general SAV capabilities that the data
   plane of SAV-enabled devices should have.  Two kinds of capabilities
   will be introduced: validation mode and traffic handling policy.
   Validation modes describe how to apply validation in different
   scenarios.  Traffic handling policies are the policies applied on the
   non-validated packets.  By implementing the general SAV capabilities,
   the above two limitations of existing mechanisms can be overcome.

   To achieve accurate and scalable source address validation, dedicated
   SAV rules are needed instead of just using those derived from other
   functions, e.g., FIB or ACL.

   Note that the general SAV capabilities described in this document are
   decoupled with vendor implementation.  Conforming implementations of
   this specification may differ, but the SAV outcomes SHOULD be
   equivalent to the described SAV capabilities.  And also how to
   generate SAV rules is not the focus of this document.

Huang, et al.             Expires 13 April 2026                 [Page 3]
Internet-Draft          General SAV Capabilities            October 2025

1.1.  Terminology

   Validation mode: The mode that describes the typical SAV application
   for a specific scenario.  Each validation mode has its own rule
   syntax and validation logic.

   SAV rule: The entry mapping the incoming interfaces with specific
   source addresses/prefixes.  The SAV rule expressions and semantics
   might be different between validation modes.

   Traffic handling policy: The policy applied to the SAV-validated
   'invalid' packets.

1.2.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

2.  Validation Modes

   This section describes four validation modes (IBA-SAV in Section 2.1,
   IBB-SAV in Section 2.2, PBA-SAV in Section 2.3, PBB-SAV in
   Section 2.4).  These modes take effect in different scales and need
   corresponding SAV rules to validate spoofing packets.  By choosing
   modes in different scenarios appropriately, the network can be
   protected as much as possible while not impacting the forwarding of
   legitimate packets.

2.1.  IBA-SAV: Interface-based prefix allowlist SAV

   IBA-SAV is an interface-scale mode, which means it takes effect on a
   specific interface.  The interface enabling IBA-SAV is maintaining an
   interface-based prefix allowlist.  Only the source prefixes recorded
   in the list will be considered valid, otherwise invalid.

   Applying IBA-SAV on an interface requires the complete knowledge of
   legitimate source prefixes connected to the interface.  IBA-SAV is
   more suitable to the closed-connected interfaces such as those
   connecting to a subnet, a stub AS, or a customer cone.  This mode can
   efficiently prevent the connected network from spoofing source
   prefixes of other networks.

   FIB-based strict uRPF belongs to this mode.  However, to overcome the
   limitation of asymmetric routing, additional native source prefix-
   based SAV rule expression is suggested.  This is essential for new

Huang, et al.             Expires 13 April 2026                 [Page 4]
Internet-Draft          General SAV Capabilities            October 2025

   SAV mechanisms or architectures such as EFP-uRPF [RFC8704], BAR-SAV
   [I-D.ietf-sidrops-bar-sav], Intra-domain/Inter-domain SAVNET
   architecture [I-D.ietf-savnet-intra-domain-architecture]
   [I-D.ietf-savnet-inter-domain-architecture], etc.

   The scope of legitimate source prefixes for IBA-SAV should ideally be
   as narrow and precise as possible.  However, in practice due to
   scenario limitations, a broader scope may still be acceptable for
   IBA-SAV, as long as no legitimate source prefix is omitted in the
   list.  FIB-based loose uRPF is an extreme example of this.

   IBA-SAV is the most efficient one if applicable.  However, in some
   cases, it may be difficult for an interface getting all the
   legitimate source prefixes.  If any legitimate prefix is not included
   in the allowlist, packets with this source addresses arriving at the
   interface will be improperly blocked.  For example, the interface
   with a default route or the interface connecting to the Internet
   through a provider AS can hardly promise to know all the legitimate
   source prefixes.  We need more modes to cover those scenarios.

2.2.  IBB-SAV: Interface-based prefix blocklist SAV

   IBB-SAV is also an interface-scale mode, which means it takes effect
   on a specific interface.  The interface enabling IBB-SAV is
   maintaining an interface-based prefix blocklist--SAV rule 2.  The
   source prefixes recorded in the list will be considered invalid,
   otherwise valid.

   This mode does not require the complete knowledge of the illegitimate
   source prefixes on the interface.  IBB-SAV is suitable for proactive
   and reactive filtering -- Invalid source prefixes are typically
   preemptively added to a blocklist, enabling proactive filtering;
   Reactive filtering is commonly deployed by the security systems to
   dynamically block spoofing traffic with specific source addresses.

   The prefix blocklist can be generated automatically, e.g., one of
   Intra-domain SAVNET architecture cases, blocking the incoming traffic
   with internal source prefixes on WAN interface.  Or operators can
   configure the specific source prefixes to block from the interface,
   which is similar to ACL-based filtering, but more native SAV rule
   expression with better performance and scalability.

Huang, et al.             Expires 13 April 2026                 [Page 5]
Internet-Draft          General SAV Capabilities            October 2025

2.3.  PBA-SAV: Prefix-based interface allowlist SAV

   PBA-SAV is a router-scale mode, which means it can validate traffic
   arriving at the router from all directions.  The router enabling PBA-
   SAV will record the protected source prefixes and maintain an
   interface allowlist for each source prefix.  If a source prefix has
   an interface allowlist, the packet with this source prefix is
   considered valid only when its incoming interface is in the interface
   allowlist.  Otherwise, the packet is considered invalid.

   Applying PBA-SAV in a router requires the complete knowledge of
   legitimate incoming interfaces for a specific source prefix.  PBA-SAV
   focuses on validating/protecting the interested source prefixes, it
   is applicable to the scenario where multiple interfaces are availalbe
   to provide potential connection to a(or a group) specific source
   prefix(es) , e.g. remote AS source prefixes are connected in via the
   provider interfaces.  PBA-SAV provides a convenient and effective way
   to control which interfaces are allowed to accept the specific source
   prefix, rather than to achieve similar effect by configuring IBB-SAV
   on all other interfaces to block this source prefix.

   Operators can configure the interface allowlist for a specific source
   prefix, to prevent DDoS attack related to this source prefix.  Or the
   interface list for specific prefixes can be generated automatically,
   e.g., one capability defined by Inter-domain SAVNET architectures.

2.4.  PBB-SAV: Prefix-based interface blocklist SAV

   PBB-SAV is also a router-scale mode, which means it can validate
   traffic arriving at the router from all directions.  The router
   enabling PBB-SAV will maintain an interface blocklist for a specific
   source prefix.  If a source prefix has an interface blocklist, the
   packet with this source prefix is considered invalid when its
   incoming interface is in the interface blocklist.  Otherwise, the
   packet is considered valid.

   Applying PBB-SAV in a router does not requires the complete knowledge
   of illegitimate incoming interfaces for a specific source prefix.
   PBB-SAV focuses on preventing specific source prefix spoofing from
   specific directions, it is applicable to the scenario where multiple
   interfaces are facing specific source prefix spoofing attack, e.g.
   traffic coming in a network from open connected interfaces with its
   internal prefix as source address.  PBB-SAV provides a convenient and
   effective way to control a group of interfaces not to accept the
   specific source prefix, rather than to achieve similar effect by
   configuring IBB-SAV on each interface to block this source prefix, or
   PBA-SAV for the specific source prefix but with a very long interface
   allowlist.

Huang, et al.             Expires 13 April 2026                 [Page 6]
Internet-Draft          General SAV Capabilities            October 2025

   Operators can configure the interface blocklist for a specific source
   prefix, to prevent DDoS attack related to this source prefix.  Or the
   interface list for specific prefixes can be generated automatically,
   e.g., one capability defined by Intra-domain SAVNET architectures.

3.  Validation Procedure

   IBA-SAV and IBB-SAV are working on interface-level, they must not be
   enabled on same interface at same time.  If they are enabled on same
   interface, IBB-SAV should be ignored, or be merged into IBA-SAV by
   removing the prefix listed in IBB-SAV from the allowlist of IBA-SAV.
   PBA-SAV and PBB-SAV are working on router-level, they are also mutual
   exclusive with each othter, that is, they must not be enabled for a
   specific source prefix at same time.  If so, PBB-SAV should be
   ignored, or be merged into PBA-SAV by removing the interface listed
   in PBB-SAV from the allowlist of PBA-SAV.  Further more, IBA-SAV are
   most preferred mode, which means while an interface has enabled IBA-
   SAV, the traffic for this interface don't need go through all other
   modes (IBB-SAV, PBA-SAV or PBB-SAV) , no matter whether they are
   configured.  While the validation result on interface-level for IBB-
   SAV is valid, the traffic still need go through PBA-SAV or PBB-SAV if
   applicable.  Figure 1 shows a comparison of different validation
   modes for dealing with source address validation.

     +-----------------------------------------------------------------+
     + Mode | Scale     | SAV rule                | validation result  +
     +-----------------------------------------------------------------+
     + IBA  | interface | interface-based         | invalid if         +
     +      |           | source prefix allowlist | not matched        +
     + IBB  | interface | interface-based         | invalid if         +
     +      |           | source prefix blocklist | matched            +
     + PBA  | router    | prefix-based            | invalid if         +
     +      |           | interface allowlist     | not matched        +
     + PBB  | router    | prefix-based            | invalid if         +
     +      |           | interface blocklist     | matched            +
     +-----------------------------------------------------------------+

            Figure 1: A comparison of different validation modes

   The general validation procedure is listed as below.  The final
   validity state, either "valid" or "invalid", will be returned after
   the procedure.

   1) A packet arrives at the router, the source address and the
   incoming interface of the packet will be copied as the input for
   following validation process, and the initial validity state is set
   as 'valid'.

Huang, et al.             Expires 13 April 2026                 [Page 7]
Internet-Draft          General SAV Capabilities            October 2025

   2) If IBA-SAV is enabled on the incoming interface, the packet will
   be only validated based on interface-base prefix allowlist SAV rule,
   procedure returns with corresponding validity state.  Otherwise--IBA-
   SAV is not enabled on the incoming interface, perform following
   validation process.

   3) If IBB-SAV is enabled on the incoming interface, the packet will
   be validated based on interface-base prefix blocklist SAV rule.  If
   validation result is invalid, precedure returns.  If the validation
   result is valid or IBB-SAV is not enabled, go through router-level
   validation procedures as below.

   4) Similarly, if applicable, PBA-SAV and PBB-SAV validation procedure
   will be gone through based on prefix-based interface allowlist SAV
   rule and prefix-based interface blocklist SAV rule respectively, in
   which the precedure will return in case the validation result is
   invalid.  Note, for a specific source prefix, there should be only
   one router-level mode enabled.

4.  Traffic Handling Policies

   After doing validation, the router gets the validity state for the
   incoming packet.  For the packet with invalid state, traffic handling
   policies should be executed for the packet.  Simply silently dropping
   may not well satisfy the requirements of operators in different
   scenarios.  This section suggests to provide flexible traffic
   handling policies for validated packets just like FlowSpec [RFC8955]
   [RFC8956].

   The followings are the traffic control policies that can be taken.
   One and only one of the policies will be chosen for an "invalid"
   validation result.

   *  "Permit": Forward packets normally though the packets are
      considered invalid.  This policy is useful when operators only
      want to monitor the status of source address spoofing in the
      network.  Normally the "Permit" policy is configured together with
      the traffic monitor policies, e.g. sample.

   *  "Discard": Drop packets directly, which is the common choose of
      existing SAV mechanisms.

   *  "Rate limit": Enforce an upper bound of traffic rate (e.g., bps or
      pps) for mitigation of source address spoofing attacks.  This
      policy is helpful while operators want do tentative filtering.

   *  "Traffic redirect": Redirect the packets to the specified server
      (e.g., scrubbing center) for attack elimination.

Huang, et al.             Expires 13 April 2026                 [Page 8]
Internet-Draft          General SAV Capabilities            October 2025

   There are also traffic monitor policies, which are optional and can
   be taken together with any other policies (traffic control policies
   and traffix monitor policies).  Some examples of the traffic monitor
   policies are:

   *  "Count": Count the number of 'invalid' packets for each validation
      rule.

   *  "Sample": Capture the packets with a configurable sampling rate
      and report them to remote servers (e.g., security analysis center)
      for further threat awareness and analysis.

   The recommended default traffic handling policy combination is:
   "discard" for traffic control policy plus "count" for traffic monitor
   policy.  The default combination could be modified per system level,
   per interface level, or configured based on rule level under
   different validation modes.

5.  Relationship with Traditional SAV Mechanisms

   The FIB-based SAV mechanisms (strict uPRF and loose uRPF, both
   belongs SAV IBA-SAV -- interface based prefix allowlist) should be
   upgraded to the new capabilities defined in this document.  By doing
   this, the asysmetic routing scenario limitation to strict uRPF can be
   overcome and new traffic handling policies can be supported, and
   meanwhile, the router system might not be suffering significant
   performance impact by doing validation based on the new SAV mechanism
   only, rather than on both of them.

   Specially, in the network operation scenario for SAV on an open-
   connected interface, operator may want combine the loose uRPF and SAV
   IBB-SAV -- loose uRPF allows only announced prefixes as source
   coming, and additionally SAV IBB-SAV blocks specific source prefixes
   (e.g. inner prefixes).  From data plane point view, there are 2
   options to address it:

   1) Unified IBA-SAV.  Maintain a prefix allowlist for the interface by
   deducting the source prefixes in the IBB-SAV from the prefix
   allowlist (prefixes in FIB) in the loose uRPF.

   2) Separate validation.  Go through traditional loose uRPF validation
   first, and then go throught the IBB-SAV validation.

   These two options differ in aspects such as memory space organization
   and table lookup procedures.  Option 1 is preferred if memory space
   in data plane is allowed.

Huang, et al.             Expires 13 April 2026                 [Page 9]
Internet-Draft          General SAV Capabilities            October 2025

6.  Security Considerations

   This document focuses on the general SAV capabilities, the generation
   of SAV rules is not included.  There may be some security
   considerations for SAV generation, it is not in the scope of this
   document.

   The "Sample" policy requires a mechanism for sampling control,
   sampling data encapsulation and transportation etc.  The security
   considerations about this should be described together with the
   dedicated mechanism document.

7.  IANA Considerations

   This document includes no request to IANA.

8.  Acknowledgements

   The authors appreciate the valuable comments from all members of the
   IETF SAVNET Working Group.  We extend a special thanks to Aijun Wang
   for his guidance and suggestion.  We extend a special thanks to
   Mingxing Liu and Changwang Lin for their feedback and contributions
   from vendor implemention point of view.

9.  Contributors

   - Mingxing Liu

   Huawei Technologies

   China

   Email: liumingxing7@huawei.com

   - Changwang Lin

   New H3C Technologies

   China

   email: linchangwang.04414@h3c.com

10.  References

10.1.  Normative References

Huang, et al.             Expires 13 April 2026                [Page 10]
Internet-Draft          General SAV Capabilities            October 2025

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

10.2.  Informative References

   [RFC3704]  Baker, F. and P. Savola, "Ingress Filtering for Multihomed
              Networks", BCP 84, RFC 3704, DOI 10.17487/RFC3704, March
              2004, <https://www.rfc-editor.org/info/rfc3704>.

   [RFC8704]  Sriram, K., Montgomery, D., and J. Haas, "Enhanced
              Feasible-Path Unicast Reverse Path Forwarding", BCP 84,
              RFC 8704, DOI 10.17487/RFC8704, February 2020,
              <https://www.rfc-editor.org/info/rfc8704>.

   [RFC8955]  Loibl, C., Hares, S., Raszuk, R., McPherson, D., and M.
              Bacher, "Dissemination of Flow Specification Rules",
              RFC 8955, DOI 10.17487/RFC8955, December 2020,
              <https://www.rfc-editor.org/info/rfc8955>.

   [RFC8956]  Loibl, C., Ed., Raszuk, R., Ed., and S. Hares, Ed.,
              "Dissemination of Flow Specification Rules for IPv6",
              RFC 8956, DOI 10.17487/RFC8956, December 2020,
              <https://www.rfc-editor.org/info/rfc8956>.

   [I-D.ietf-sidrops-bar-sav]
              Sriram, K., Lubashev, I., and D. Montgomery, "Source
              Address Validation Using BGP UPDATEs, ASPA, and ROA (BAR-
              SAV)", Work in Progress, Internet-Draft, draft-ietf-
              sidrops-bar-sav-07, 20 July 2025,
              <https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-
              bar-sav-07>.

   [I-D.ietf-savnet-intra-domain-architecture]
              Li, D., Wu, J., Qin, L., Geng, N., and L. Chen, "Intra-
              domain Source Address Validation (SAVNET) Architecture",
              Work in Progress, Internet-Draft, draft-ietf-savnet-intra-
              domain-architecture-02, 13 April 2025,
              <https://datatracker.ietf.org/doc/html/draft-ietf-savnet-
              intra-domain-architecture-02>.

Huang, et al.             Expires 13 April 2026                [Page 11]
Internet-Draft          General SAV Capabilities            October 2025

   [I-D.ietf-savnet-inter-domain-architecture]
              Li, D., Chen, L., Geng, N., Liu, L., and L. Qin, "Inter-
              domain Source Address Validation (SAVNET) Architecture",
              Work in Progress, Internet-Draft, draft-ietf-savnet-inter-
              domain-architecture-02, 31 August 2025,
              <https://datatracker.ietf.org/doc/html/draft-ietf-savnet-
              inter-domain-architecture-02>.

Authors' Addresses

   Mingqing Huang
   Zhongguancun Laboratory
   Beijing
   China
   Email: huangmq@zgclab.edu.cn

   Weiqiang Cheng
   China Mobile
   Beijing
   China
   Email: chengweiqiang@chinamobile.com

   Dan Li
   Tsinghua University
   Beijing
   China
   Email: tolidan@tsinghua.edu.cn

   Nan Geng
   Huawei Technologies
   Beijing
   China
   Email: gengnan@huawei.com

   Li Chen
   Zhongguancun Laboratory
   Beijing
   China
   Email: lichen@zgclab.edu.cn

Huang, et al.             Expires 13 April 2026                [Page 12]