| rfc9797v1.txt | rfc9797.txt | |||
|---|---|---|---|---|
| skipping to change at line 15 ¶ | skipping to change at line 15 ¶ | |||
| ISSN: 2070-1721 Comcast | ISSN: 2070-1721 Comcast | |||
| June 2025 | June 2025 | |||
| Randomized and Changing Media Access Control (MAC) Addresses: Context, | Randomized and Changing Media Access Control (MAC) Addresses: Context, | |||
| Network Impacts, and Use Cases | Network Impacts, and Use Cases | |||
| Abstract | Abstract | |||
| To limit the privacy issues created by the association between a | To limit the privacy issues created by the association between a | |||
| device, its traffic, its location, and its user in IEEE 802 networks, | device, its traffic, its location, and its user in IEEE 802 networks, | |||
| client and client Operating System vendors have started implementing | client vendors and client OS vendors have started implementing Media | |||
| Media Access Control (MAC) address randomization. This technology is | Access Control (MAC) address randomization. This technology is | |||
| particularly important in Wi-Fi networks (defined in IEEE 802.11) due | particularly important in Wi-Fi networks (defined in IEEE 802.11) due | |||
| to the over-the-air medium and device mobility. When such | to the over-the-air medium and device mobility. When such | |||
| randomization happens, some in-network states may break, which may | randomization happens, some in-network states may break, which may | |||
| affect network connectivity and user experience. At the same time, | affect network connectivity and user experience. At the same time, | |||
| devices may continue using other stable identifiers, defeating the | devices may continue using other stable identifiers, defeating the | |||
| purpose of MAC address randomization. | purpose of MAC address randomization. | |||
| This document lists various network environments and a range of | This document lists various network environments and a range of | |||
| network services that may be affected by such randomization. This | network services that may be affected by such randomization. This | |||
| document then examines settings where the user experience may be | document then examines settings where the user experience may be | |||
| skipping to change at line 133 ¶ | skipping to change at line 133 ¶ | |||
| communication may be disrupted. For example, sessions established | communication may be disrupted. For example, sessions established | |||
| between the end device and the network services may break, and | between the end device and the network services may break, and | |||
| packets in transit may suddenly be lost. If multiple clients | packets in transit may suddenly be lost. If multiple clients | |||
| implement aggressive (e.g., once an hour or shorter) MAC address | implement aggressive (e.g., once an hour or shorter) MAC address | |||
| randomization without coordination with network services, some | randomization without coordination with network services, some | |||
| network services, such as MAC address caching in the AP and the | network services, such as MAC address caching in the AP and the | |||
| upstream Layer 2 switch, may not be able to handle the load, which | upstream Layer 2 switch, may not be able to handle the load, which | |||
| may result in an unexpected network interruption. | may result in an unexpected network interruption. | |||
| At the same time, some network services rely on the end station (as | At the same time, some network services rely on the end station (as | |||
| defined by [IEEE_802], also called in this document device, or | defined by [IEEE_802]) to provide an identifier, which can be the MAC | |||
| machine) providing an identifier, which can be the MAC address or | address or another value. This document also refers to the end | |||
| another value. If the client implements MAC address randomization | station as a "device" or "machine". If the client implements MAC | |||
| but continues sending the same static identifier, then the | address randomization but continues sending the same static | |||
| association between a stable identifier and the station continues | identifier, then the association between a stable identifier and the | |||
| despite the RCM scheme. There may be environments where such | station continues despite the RCM scheme. There may be environments | |||
| continued association is desirable, but there may be others where | where such continued association is desirable, but there may be | |||
| user privacy has more value than any continuity of network service | others where user privacy has more value than any continuity of | |||
| state. | network service state. | |||
| It is useful for implementations of client and network devices to | It is useful for implementations of client and network devices to | |||
| enumerate services that may be affected by RCM and to evaluate | enumerate services that may be affected by RCM and to evaluate | |||
| possible frameworks to maintain both the quality of user experience | possible frameworks to maintain both the quality of user experience | |||
| and network efficiency while RCM happens and user privacy is | and network efficiency while RCM happens and user privacy is | |||
| strengthened. This document presents these assessments and | strengthened. This document presents these assessments and | |||
| recommendations. | recommendations. | |||
| Although this document mainly discusses MAC address randomization in | Although this document mainly discusses MAC address randomization in | |||
| Wi-Fi networks [IEEE_802.11], the same principles can be easily | Wi-Fi networks [IEEE_802.11], the same principles can be easily | |||
| extended to any IEEE 802.3 networks [IEEE_802.3]. | extended to any IEEE 802 networks [IEEE_802]. | |||
| This document is organized as follows: | This document is organized as follows: | |||
| * Section 2 discusses the current status of using MAC address as | * Section 2 discusses the current status of using MAC address as | |||
| identity. | identity. | |||
| * Section 3 discusses various actors in the network that will be | * Section 3 discusses various actors in the network that will be | |||
| impacted by MAC address randomization. | impacted by MAC address randomization. | |||
| * Section 4 examines the degrees of trust between personal devices | * Section 4 examines the degrees of trust between personal devices | |||
| skipping to change at line 175 ¶ | skipping to change at line 175 ¶ | |||
| * Section 5 discusses various network environments that will be | * Section 5 discusses various network environments that will be | |||
| impacted. | impacted. | |||
| * Section 6 analyzes some existing network services that will be | * Section 6 analyzes some existing network services that will be | |||
| impacted. | impacted. | |||
| * Appendix A includes some existing frameworks. | * Appendix A includes some existing frameworks. | |||
| 2. MAC Address as Identity: User vs. Device | 2. MAC Address as Identity: User vs. Device | |||
| In IEEE 802.3 technologies [IEEE_802.3], the Media Access Control | In IEEE 802 [IEEE_802] technologies, the Media Access Control (MAC) | |||
| (MAC) layer defines rules to control how a device accesses the shared | layer defines rules to control how a device accesses the shared | |||
| medium. In a network where a machine can communicate with one or | medium. In a network where a machine can communicate with one or | |||
| more other machines, one such rule is that each machine needs to be | more other machines, one such rule is that each machine needs to be | |||
| identified as either the target destination of a message or the | identified as either the target destination of a message or the | |||
| source of a message (and the target destination of the answer). | source of a message (and the target destination of the answer). | |||
| Initially intended as a 48-bit (6-octet) value in the first versions | Initially intended as a 48-bit (6-octet) value in the first versions | |||
| of [IEEE_802.3], other standards under the IEEE 802.3 umbrella allow | of IEEE 802, other standards under the IEEE 802 [IEEE_802] umbrella | |||
| this address to take an extended format of 64 bits (8 octets), which | allow this address to take an extended format of 64 bits (8 octets), | |||
| enabled a larger number of MAC addresses to coexist as IEEE 802.3 | which enabled a larger number of MAC addresses to coexist as IEEE 802 | |||
| technologies became widely adopted. | technologies became widely adopted. | |||
| Regardless of the address length, different networks have different | Regardless of the address length, different networks have different | |||
| needs, and several bits of the first octet are reserved for specific | needs, and several bits of the first octet are reserved for specific | |||
| purposes. In particular, the first bit is used to identify the | purposes. In particular, the first bit is used to identify the | |||
| destination address as an individual (bit set to 0) or a group | destination address as an individual (bit set to 0) or a group | |||
| address (bit set to 1). The second bit, called the Universal/Local | address (bit set to 1). The second bit, called the Universal/Local | |||
| (U/L) address bit, indicates whether the address has been assigned by | (U/L) address bit, indicates whether the address has been assigned by | |||
| a universal or local administrator. Universally administered | a universal or local administrator. Universally administered | |||
| addresses have this bit set to 0. If this bit is set to 1, the | addresses have this bit set to 0. If this bit is set to 1, the | |||
| entire address is considered to be locally administered (see Clause | entire address is considered to be locally administered (see Clause | |||
| 8.4 of [IEEE_802]). Note that universally administered MAC addresses | 8.4 of [IEEE_802]). Note that universally administered MAC addresses | |||
| are required to register to IEEE, while locally administered MAC | are required to be registered with the IEEE, while locally | |||
| addresses are not. | administered MAC addresses are not. | |||
| The intent of this provision is important for the present document. | The intent of this provision is important for the present document. | |||
| [IEEE_802] recognizes that some devices (e.g., smart thermostats) may | [IEEE_802] recognizes that some devices (e.g., smart thermostats) may | |||
| never change their attachment network and will not need a globally | never change their attachment network and will not need a globally | |||
| unique MAC address to prevent address collision against any other | unique MAC address to prevent address collision against any other | |||
| device in any other network. The U/L bit can be set to signal to the | device in any other network. The U/L bit can be set to signal to the | |||
| network that the MAC address is intended to be locally unique (not | network that the MAC address is intended to be locally unique (not | |||
| globally unique). [IEEE_802] did not initially define the MAC | globally unique). [IEEE_802] did not initially define the MAC | |||
| address allocation schema when the U/L bit is set to 1. It states | address allocation schema when the U/L bit is set to 1. It states | |||
| the address must be unique in a given broadcast domain (i.e., the | the address must be unique in a given broadcast domain (i.e., the | |||
| space where the MAC addresses of devices are visible to one another). | space where the MAC addresses of devices are visible to one another). | |||
| It is also important to note that the purpose of the universal | It is also important to note that the purpose of the universal | |||
| version of the address was to avoid collisions and confusion, as any | version of the address was to avoid collisions and confusion, as any | |||
| machine could connect to any network, and each machine needs to | machine could connect to any network, and each machine needs to | |||
| determine if it is the intended destination of a message or its | determine if it is the intended destination of a message or its | |||
| response. Clause 8.4 of [IEEE_802] reminds network designers and | response. Clause 8.4 of [IEEE_802] reminds network designers and | |||
| operators that all potential members of a network need to have a | operators that all potential members of a network need to have a | |||
| unique identifier in that network (if they are going to coexist in | unique identifier in that network (if they are going to coexist in | |||
| the network without confusion on which machine is the source or | the network without confusion on which machine is the source or | |||
| destination or any message). The advantage of an administrated | destination of any message). The advantage of an administrated | |||
| address is that a node with such an address can be attached to any | address is that a node with such an address can be attached to any | |||
| Local Area Network (LAN) in the world with an assurance that its | Local Area Network (LAN) in the world with an assurance that its | |||
| address is unique in that network. | address is unique in that network. | |||
| With the rapid development of wireless technologies and mobile | With the rapid development of wireless technologies and mobile | |||
| devices, this scenario became very common. With a vast majority of | devices, this scenario became very common. With a vast majority of | |||
| networks implementing IEEE 802 radio technologies [IEEE_802] at the | networks implementing IEEE 802 radio technologies [IEEE_802] at the | |||
| access, the MAC address of a wireless device can appear anywhere on | access, the MAC address of a wireless device can appear anywhere on | |||
| the planet and collisions should still be avoided. However, the same | the planet and collisions should still be avoided. However, the same | |||
| evolution brought the distinction between two types of devices that | evolution brought the distinction between two types of devices that | |||
| skipping to change at line 258 ¶ | skipping to change at line 258 ¶ | |||
| Personally Identifiable Information (PII)) is enough to link the MAC | Personally Identifiable Information (PII)) is enough to link the MAC | |||
| address to that user. Then, any detection of traffic that can be | address to that user. Then, any detection of traffic that can be | |||
| associated with the device will also be linked to the known user of | associated with the device will also be linked to the known user of | |||
| that device (i.e., Personally Correlated Information (PCI)). | that device (i.e., Personally Correlated Information (PCI)). | |||
| 2.1. Privacy of MAC Addresses | 2.1. Privacy of MAC Addresses | |||
| The possible identification or association presents a privacy issue, | The possible identification or association presents a privacy issue, | |||
| especially with wireless technologies. For most of them | especially with wireless technologies. For most of them | |||
| ([IEEE_802.11] in particular), the source and destination MAC | ([IEEE_802.11] in particular), the source and destination MAC | |||
| addresses are not encrypted, even in networks that implement | addresses are not encrypted even in networks that implement | |||
| encryption. Thus, each machine can easily detect if it is the | encryption. This lack of encryption allows each machine to easily | |||
| intended target of the message before attempting to decrypt its | detect if it is the intended target of the message before attempting | |||
| content, and also identify the transmitter, to use the right | to decrypt its content and also helps identify the transmitter in | |||
| decryption key when multiple unicast keys are in effect. | order to use the right decryption key when multiple unicast keys are | |||
| in effect. | ||||
| This identification of the user associated with a node was clearly | This identification of the user associated with a node was clearly | |||
| not the intent of the IEEE 802 MAC address. A logical solution to | not the intent of the IEEE 802 MAC address. A logical solution to | |||
| remove this association is to use a locally administered address | remove this association is to use a locally administered address | |||
| instead and change the address in a fashion that prevents a | instead and change the address in a fashion that prevents a | |||
| continuous association between one MAC address and some PII. | continuous association between one MAC address and some PII. | |||
| However, other network devices on the same LAN implementing a MAC | However, other network devices on the same LAN implementing a MAC | |||
| layer also expect each device to be associated with a MAC address | layer also expect each device to be associated with a MAC address | |||
| that would persist over time. When a device changes its MAC address, | that would persist over time. When a device changes its MAC address, | |||
| other devices on the same LAN may fail to recognize that the same | other devices on the same LAN may fail to recognize that the same | |||
| skipping to change at line 308 ¶ | skipping to change at line 309 ¶ | |||
| utilized by several types of network functional entities such as | utilized by several types of network functional entities such as | |||
| applications or devices that provide a service related to network | applications or devices that provide a service related to network | |||
| operations. | operations. | |||
| 1. Wireless access network infrastructure devices (e.g., WLAN access | 1. Wireless access network infrastructure devices (e.g., WLAN access | |||
| points or controllers): These devices participate in IEEE 802 LAN | points or controllers): These devices participate in IEEE 802 LAN | |||
| operations. As such, they need to identify each machine as a | operations. As such, they need to identify each machine as a | |||
| source or destination to successfully continue exchanging frames. | source or destination to successfully continue exchanging frames. | |||
| As a device changes its network attachment (roams) from one | As a device changes its network attachment (roams) from one | |||
| access point to another, the access points can exchange | access point to another, the access points can exchange | |||
| contextual information (e.g., device MAC and keying material), | contextual information (e.g., device MAC address and keying | |||
| allowing the device session to continue seamlessly. These access | material), allowing the device session to continue seamlessly. | |||
| points can also inform devices further in the wired network about | These access points can also inform devices further in the wired | |||
| the roam to ensure that Layer 2 frames are redirected to the new | network about the roam to ensure that Layer 2 frames are | |||
| device access point. | redirected to the new device access point. | |||
| 2. Other network devices operating at the MAC layer: Many wireless | 2. Other network devices operating at the MAC layer: Many wireless | |||
| network access devices (e.g., access points [IEEE_802.11]) are | network access devices (e.g., access points [IEEE_802.11]) are | |||
| conceived as Layer 2 devices, and as such, they bridge a frame | conceived as Layer 2 devices, and as such, they bridge a frame | |||
| from one medium (e.g., Wi-Fi [IEEE_802.11]) to another (e.g., | from one medium (e.g., Wi-Fi [IEEE_802.11]) to another (e.g., | |||
| Ethernet [IEEE_802.3]). This means that the MAC address of a | Ethernet [IEEE_802.3]). This means that the MAC address of a | |||
| wireless device often exists on the wire beyond the wireless | wireless device often exists on the wire beyond the wireless | |||
| access device. Devices connected to this wire also implement | access device. Devices connected to this wire also implement | |||
| IEEE 802.3 technologies [IEEE_802.3], and as such, they operate | IEEE 802.3 technologies [IEEE_802.3], and as such, they operate | |||
| on the expectation that each device is associated with a MAC | on the expectation that each device is associated with a MAC | |||
| address that persists for the duration of continuous exchanges. | address that persists for the duration of continuous exchanges. | |||
| For example, switches and bridges associate MAC addresses to | For example, switches and bridges associate MAC addresses to | |||
| individual ports (so as to know to which port to send a frame | individual ports (so as to know to which port to send a frame | |||
| intended for a particular MAC address). Similarly, AAA services | intended for a particular MAC address). Similarly, AAA services | |||
| can validate the identity of a device and use the device's MAC | can validate the identity of a device and use the device MAC | |||
| address as the first pointer to the device identity (before | address as the first pointer to the device identity (before | |||
| operating further verification). Similarly, some networking | operating further verification). Similarly, some networking | |||
| devices offer Layer 2 filtering policies that may rely on the | devices offer Layer 2 filtering policies that may rely on the | |||
| connected MAC addresses. IEEE 802.1X-enabled devices | connected MAC addresses. IEEE 802.1X-enabled devices | |||
| [IEEE_802.1X] may also selectively put the interface in a | [IEEE_802.1X] may also selectively put the interface in a | |||
| blocking state until a connecting device is authenticated. These | blocking state until a connecting device is authenticated. These | |||
| services then use the MAC address as the first pointer to the | services then use the MAC address as the first pointer to the | |||
| device identity to allow or block data traffic. This list is not | device identity to allow or block data traffic. This list is not | |||
| exhaustive. Multiple services are defined for IEEE 802.3 | exhaustive. Multiple services are defined for Ethernet networks | |||
| networks [IEEE_802.3], and multiple services defined by the IEEE | [IEEE_802.3], and multiple services defined by the IEEE 802.1 | |||
| 802.1 Working Group are also applicable to IEEE 802.3 networks | working group are also applicable to Ethernet networks | |||
| [IEEE_802.3]. Wireless access points may also connect to mediums | [IEEE_802.3]. Wireless access points may also connect using | |||
| other than [IEEE_802.3] (e.g., the Data-Over-Cable Service | other mediums (e.g., the Data-Over-Cable Service Interface | |||
| Interface Specification (DOCSIS) [DOCSIS]), which also implements | Specification (DOCSIS) [DOCSIS]) that implement mechanisms under | |||
| mechanisms under the umbrella of the general IEEE 802 standard | the umbrella of the general 802 Standard and therefore expect the | |||
| and therefore expect the unique and persistent association of a | unique and persistent association of a MAC address to a device. | |||
| MAC address to a device. | ||||
| 3. Network devices operating at upper layers: Some network devices | 3. Network devices operating at upper layers: Some network devices | |||
| provide functions and services above the MAC layer. Some of them | provide functions and services above the MAC layer. Some of them | |||
| also operate a MAC layer function. For example, routers provide | also operate a MAC layer function. For example, routers provide | |||
| IP forwarding services but rely on the device MAC address to | IP forwarding services but rely on the device MAC address to | |||
| create the appropriate frame structure. Other devices and | create the appropriate frame structure. Other devices and | |||
| services operate at upper layers but also rely upon the IEEE 802 | services operate at upper layers but also rely upon the IEEE 802 | |||
| principles of unique MAC-to-device mapping. For example, the | principles of unique MAC-to-device mapping. For example, the | |||
| Address Resolution Protocol (ARP) [RFC826] and Neighbor Discovery | Address Resolution Protocol (ARP) [RFC826] and Neighbor Discovery | |||
| Protocol (NDP) [RFC4861] use a MAC address to create the mapping | Protocol (NDP) [RFC4861] use a MAC address to create the mapping | |||
| skipping to change at line 369 ¶ | skipping to change at line 369 ¶ | |||
| service and traffic forwarding may be disrupted. | service and traffic forwarding may be disrupted. | |||
| 3.2. Human-Related Entities | 3.2. Human-Related Entities | |||
| Humans may actively participate in the network structure and | Humans may actively participate in the network structure and | |||
| operations or be observers at any point of the network lifecycle. | operations or be observers at any point of the network lifecycle. | |||
| Humans could be users of wireless devices or people operating | Humans could be users of wireless devices or people operating | |||
| wireless networks. | wireless networks. | |||
| 1. Over-the-Air (OTA) observers: The transmitting or receiving MAC | 1. Over-the-Air (OTA) observers: The transmitting or receiving MAC | |||
| address is usually not encrypted in wireless exchanges in IEEE | address is usually not encrypted in wireless exchanges using IEEE | |||
| 802 technologies, and any protocol-compatible device in range of | 802 technologies, and any protocol-compatible device in range of | |||
| the signal can read the frame header. As such, OTA observers are | the signal can read the frame header. As such, OTA observers are | |||
| able to read the MAC addresses of individual transmissions. Some | able to read the MAC addresses of individual transmissions. Some | |||
| wireless technologies also support techniques to establish | wireless technologies also support techniques to establish | |||
| distances or positions, allowing the observer, in some cases, to | distances or positions, allowing the observer, in some cases, to | |||
| uniquely associate the MAC address with a physical device and its | uniquely associate the MAC address with a physical device and its | |||
| associated location. An OTA observer may have a legitimate | associated location. An OTA observer may have a legitimate | |||
| reason to monitor a particular device, for example, for IT | reason to monitor a particular device, for example, for IT | |||
| support operations. However, another actor might also monitor | support operations. However, another actor might also monitor | |||
| the same device to obtain PII or PCI. | the same device to obtain PII or PCI. | |||
| skipping to change at line 424 ¶ | skipping to change at line 424 ¶ | |||
| 5. Over-the-Wired external (OTWe) observers: Beyond the broadcast | 5. Over-the-Wired external (OTWe) observers: Beyond the broadcast | |||
| domain, frame headers are removed by a routing device, and a new | domain, frame headers are removed by a routing device, and a new | |||
| Layer 2 header is added before the frame is transmitted to the | Layer 2 header is added before the frame is transmitted to the | |||
| next segment. The device MAC address is not visible anymore | next segment. The device MAC address is not visible anymore | |||
| unless a mechanism copies the MAC address into a field that can | unless a mechanism copies the MAC address into a field that can | |||
| be read while the packet travels to the next segment (e.g., IPv6 | be read while the packet travels to the next segment (e.g., IPv6 | |||
| addresses built from the MAC address prior to the use of the | addresses built from the MAC address prior to the use of the | |||
| methods defined in [RFC4941] and [RFC7217]). Therefore, unless | methods defined in [RFC4941] and [RFC7217]). Therefore, unless | |||
| this last condition exists, OTWe observers are not able to see | this last condition exists, OTWe observers are not able to see | |||
| the device's MAC address. | the device MAC address. | |||
| 4. Degrees of Trust | 4. Degrees of Trust | |||
| The surface of PII exposures that can drive MAC address randomization | The surface of PII exposures that can drive MAC address randomization | |||
| depends on (1) the environment where the device operates, (2) the | depends on (1) the environment where the device operates, (2) the | |||
| presence and nature of other devices in the environment, and (3) the | presence and nature of other devices in the environment, and (3) the | |||
| type of network the device is communicating through. Consequently, a | type of network the device is communicating through. Consequently, a | |||
| device can use an identifier (such as a MAC address) that can persist | device can use an identifier (such as a MAC address) that can persist | |||
| over time if trust with the environment is established, or it can use | over time if trust with the environment is established, or it can use | |||
| an identifier that is temporary if an identifier is required for a | an identifier that is temporary if an identifier is required for a | |||
| service in an environment where trust has not been established. Note | service in an environment where trust has not been established. Note | |||
| that trust is not binary. It is useful to distinguish what trust a | that trust is not binary. It is useful to distinguish what trust a | |||
| personal device may establish with the different entities at play in | personal device may establish with the different entities at play in | |||
| a network domain where a MAC address may be visible: | a network domain where a MAC address may be visible: | |||
| 1. Full trust: There is an environment where a device establishes a | 1. Full trust: The device establishes a trust relationship and | |||
| trust relationship, and the device can share its persistent MAC | shares its persistent MAC address with the access network devices | |||
| address with the access network devices (e.g., access point and | (e.g., access point and WLAN controller). The network provides | |||
| WLAN controller). The network provides necessary security | necessary security measures to prevent observers or network | |||
| measures to prevent observers or network actors from accessing | actors from accessing PII. The device (or its user) also has | |||
| PII. The device (or its user) also has confidence that its MAC | confidence that its MAC address is not shared beyond the Layer 2 | |||
| address is not shared beyond the Layer 2 broadcast domain | broadcast domain boundary. | |||
| boundary. | ||||
| 2. Selective trust: In another environment, depending on the | 2. Selective trust: Depending on the predefined privacy policies, a | |||
| predefined privacy policies, a device may decide to use one | device may decide to use one pseudo-persistent MAC address for a | |||
| pseudo-persistent MAC address for a set of network elements and | set of network elements and another pseudo-persistent MAC address | |||
| another pseudo-persistent MAC address for another set of network | for another set of network elements. Examples of privacy | |||
| elements. Examples of privacy policies can be a combination of | policies can be a combination of Service Set Identifier (SSID) | |||
| Service Set Identifier (SSID) and Basic Service Set Identifier | and Basic Service Set Identifier (BSSID), a particular time of | |||
| (BSSID), a particular time of day, or a preset time duration. | day, or a preset time duration. | |||
| 3. Zero trust: In another environment, a device may randomize its | 3. Zero trust: A device may randomize its MAC address with any local | |||
| MAC address with any local entity reachable through the AP. It | entity reachable through the AP. It may generate a temporary MAC | |||
| may generate a temporary MAC address to each of them. That | address to each of them. That temporary MAC address may or may | |||
| temporary MAC address may or may not be the same for different | not be the same for different services. | |||
| services. | ||||
| 5. Environments | 5. Environments | |||
| The trust relationship depends on the relationship between the user | The trust relationship depends on the relationship between the user | |||
| of a personal device and the operator of a network service that the | of a personal device and the operator of a network service that the | |||
| personal device may use. It is useful to observe the typical trust | personal device may use. It is useful to observe the typical trust | |||
| structure of common environments: | structure of common environments: | |||
| (A) Residential settings under the control of the user: This is a | (A) Residential settings under the control of the user: This is a | |||
| typical home network with Wi-Fi in the LAN and Internet in the | typical home network with Wi-Fi in the LAN and Internet in the | |||
| skipping to change at line 488 ¶ | skipping to change at line 486 ¶ | |||
| and with the network elements. Note that "Full trust" in this | and with the network elements. Note that "Full trust" in this | |||
| context is referring to the MAC address persistency. It does | context is referring to the MAC address persistency. It does | |||
| not extend to full trust between applications or devices. The | not extend to full trust between applications or devices. The | |||
| device trusts the access point and all Layer 2 domain entities | device trusts the access point and all Layer 2 domain entities | |||
| beyond the access point, where the Wi-Fi transmissions can be | beyond the access point, where the Wi-Fi transmissions can be | |||
| detected, but there is no guarantee that an eavesdropper will | detected, but there is no guarantee that an eavesdropper will | |||
| not observe the communications. As such, even in this | not observe the communications. As such, even in this | |||
| environment, it is common to assume that attackers may still be | environment, it is common to assume that attackers may still be | |||
| able to monitor unencrypted information such as MAC addresses. | able to monitor unencrypted information such as MAC addresses. | |||
| If a device decides to not fully trust the network, it might | If a device decides to not fully trust the network, it might | |||
| apply any necessary policy to protect its identity. Most | apply any necessary policy to protect its identity. Most users | |||
| devices in the network only require simple connectivity so that | connecting to a residential network only expect simple Internet | |||
| the network services are simple. For network support, it is | connectivity services, so the network services are simple. If | |||
| also simple. It is usually related to Internet connectivity. | users have issues connecting to the network or accessing the | |||
| Internet, they expect limited to no technical support. | ||||
| (B) Managed residential settings: Examples of this type of | (B) Managed residential settings: Examples of this type of | |||
| environment include shared living facilities and other | environment include shared living facilities and other | |||
| collective environments where an operator manages the network | collective environments where an operator manages the network | |||
| for the residents. The OTA exposure is similar to (A). The | for the residents. The OTA exposure is similar to (A). The | |||
| operator may be requested to provide IT support to the residents | operator may be requested to provide IT support to the residents | |||
| and may need to identify device activity in real time or analyze | and may need to identify device activity in real time or analyze | |||
| logs. The infrastructure is shared and covers a larger area | logs. The infrastructure is shared and covers a larger area | |||
| than in (A); residents may connect to the network from different | than in (A); residents may connect to the network from different | |||
| locations. For example, they may regularly connect to the | locations. For example, they may regularly connect to the | |||
| skipping to change at line 545 ¶ | skipping to change at line 544 ¶ | |||
| subjected to pre-approval and pre-certification. The devices | subjected to pre-approval and pre-certification. The devices | |||
| are usually personal devices and are not under the control of | are usually personal devices and are not under the control of | |||
| the corporate IT team. Compared to residential networks, | the corporate IT team. Compared to residential networks, | |||
| enterprise networks usually provide more sophisticated network | enterprise networks usually provide more sophisticated network | |||
| services including, but not limited to, application-based and | services including, but not limited to, application-based and | |||
| identity-based network policies. Changing the MAC address may | identity-based network policies. Changing the MAC address may | |||
| interrupt network services if the services are based on that MAC | interrupt network services if the services are based on that MAC | |||
| address. Thus, network operations will be more complex, so the | address. Thus, network operations will be more complex, so the | |||
| network support level is high. | network support level is high. | |||
| (E) Managed enterprises: This type of network is similar to (C). | (E) Managed enterprises: This type of network is similar to (D). | |||
| The main difference is that the devices are owned and managed by | The main difference is that the devices are owned and managed by | |||
| the enterprise. Because both the network and the devices are | the enterprise. Because both the network and the devices are | |||
| owned and managed by the enterprise, the degree of trust is | owned and managed by the enterprise, the degree of trust is | |||
| "Full trust". Network services and the network support level | "Full trust". Network services and the network support level | |||
| are the same as in (D). | are the same as in (D). | |||
| Table 1 summarizes the environments described above. | Table 1 summarizes the environments described above. | |||
| +=======================+===========+=======+========+=============+ | +=======================+===========+=======+========+=============+ | |||
| | Use Cases | Degree of |Network|Network | Network | | | Use Cases | Degree of |Network|Network | Network | | |||
| skipping to change at line 593 ¶ | skipping to change at line 592 ¶ | |||
| Different network environments provide different levels of network | Different network environments provide different levels of network | |||
| services, from simple to complex. At its simplest level, a network | services, from simple to complex. At its simplest level, a network | |||
| can provide a wireless connecting device with basic IP communication | can provide a wireless connecting device with basic IP communication | |||
| service (e.g., DHCPv4 [RFC2131] or Stateless Address | service (e.g., DHCPv4 [RFC2131] or Stateless Address | |||
| Autoconfiguration (SLAAC) [RFC4862]) and an ability to connect to the | Autoconfiguration (SLAAC) [RFC4862]) and an ability to connect to the | |||
| Internet (e.g., DNS service or relay and routing in and out through a | Internet (e.g., DNS service or relay and routing in and out through a | |||
| local gateway). The network can also offer more advanced services, | local gateway). The network can also offer more advanced services, | |||
| such as managed instant messaging service, file storage, printing, | such as managed instant messaging service, file storage, printing, | |||
| and/or local web service. Larger and more complex networks can also | and/or local web service. Larger and more complex networks can also | |||
| incorporate more advanced services, from AAA to AR/VR applications. | incorporate more advanced services, from AAA to Augmented Reality | |||
| To the network, its top priority is to provide the best quality of | (AR) or Virtual Reality (VR) applications. To the network, its top | |||
| experience to its users. Often the network contains policies that | priority is to provide the best quality of experience to its users. | |||
| help to make a forwarding decision based on the network conditions, | Often the network contains policies that help to make a forwarding | |||
| the device, and the user identity associated to the device. For | decision based on the network conditions, the device, and the user | |||
| example, in a hospital private network, the network may contain a | identity associated to the device. For example, in a hospital | |||
| policy to give highest priority to doctors' Voice-Over-IP packets. | private network, the network may contain a policy to give highest | |||
| In another example, an enterprise network may contain a policy to | priority to doctors' Voice-Over-IP packets. In another example, an | |||
| allow applications from a group of authenticated devices to use | enterprise network may contain a policy to allow applications from a | |||
| Explicit Congestion Notification (ECN) [RFC3168] for congestion and/ | group of authenticated devices to use Explicit Congestion | |||
| or Differentiated Services Code Point (DSCP) [RFC8837] for | Notification (ECN) [RFC3168] for congestion and/or Differentiated | |||
| classification to signal the network for a specific network policy. | Services Code Point (DSCP) [RFC8837] for classification to signal the | |||
| In this configuration, the network is required to associate the data | network for a specific network policy. In this configuration, the | |||
| packets to an identity to validate the legitimacy of the marking. | network is required to associate the data packets to an identity to | |||
| Before RCM, many network systems used a MAC address as a persistent | validate the legitimacy of the marking. Before RCM, many network | |||
| identity to create an association between user and device. After | systems used a MAC address as a persistent identity to create an | |||
| implementing RCM, the association is broken. | association between user and device. After implementing RCM, the | |||
| association is broken. | ||||
| 6.1. Device Identification and Associated Problems | 6.1. Device Identification and Associated Problems | |||
| Wireless access points and controllers use the MAC address to | Wireless access points and controllers use the MAC address to | |||
| validate the device connection context, including protocol | validate the device connection context, including protocol | |||
| capabilities, confirmation that authentication was completed, quality | capabilities, confirmation that authentication was completed, quality | |||
| of service or security profiles, and encryption keying material. | of service or security profiles, and encryption keying material. | |||
| Some advanced access points and controllers also include upper layer | Some advanced access points and controllers also include upper layer | |||
| functions whose purpose is covered below. A device changing its MAC | functions whose purpose is covered below. A device changing its MAC | |||
| address, without another recorded device identity, would cause the | address, without another recorded device identity, would cause the | |||
| skipping to change at line 698 ¶ | skipping to change at line 698 ¶ | |||
| disrupt the stability of these mappings for these peers if the change | disrupt the stability of these mappings for these peers if the change | |||
| occurs within the caching period. Note that this behavior is against | occurs within the caching period. Note that this behavior is against | |||
| standard operation and existing privacy recommendations. | standard operation and existing privacy recommendations. | |||
| Implementations must avoid changing the MAC address while maintaining | Implementations must avoid changing the MAC address while maintaining | |||
| the previously assigned IP address without consulting the network. | the previously assigned IP address without consulting the network. | |||
| Routers keep track of which MAC address is on which interface so that | Routers keep track of which MAC address is on which interface so that | |||
| they can form the proper Data Link header when forwarding a packet to | they can form the proper Data Link header when forwarding a packet to | |||
| a segment where MAC addresses are used. MAC address randomization | a segment where MAC addresses are used. MAC address randomization | |||
| can cause MAC address cache exhaustion but also the need for frequent | can cause MAC address cache exhaustion but also the need for frequent | |||
| Address Resolution Protocol (ARP), Reverse Address Resolution | Address Resolution Protocol (ARP) [RFC826], Reverse Address | |||
| Protocol (RARP) [RFC826], and Neighbor Solicitation and Neighbor | Resolution Protocol (RARP) [RFC903], and Neighbor Solicitation and | |||
| Advertisement [RFC4861] exchanges. | Neighbor Advertisement [RFC4861] exchanges. | |||
| In residential settings (environment type A in Section 5), policies | In residential settings (environment type A in Section 5), policies | |||
| can be in place to control the traffic of some devices (e.g., | can be in place to control the traffic of some devices (e.g., | |||
| parental control or blocklist filters). These policies are often | parental control or blocklist filters). These policies are often | |||
| based on the device's MAC address. MAC address randomization removes | based on the device MAC address. MAC address randomization removes | |||
| the possibility for such control. | the possibility for such control. | |||
| In residential settings (environment type A) and in enterprises | In residential settings (environment type A) and in enterprises | |||
| (environment types D and E), device recognition and ranging may be | (environment types D and E), device recognition and ranging may be | |||
| used for IoT-related functionalities (e.g., door unlock, preferred | used for IoT-related functionalities (e.g., door unlock, preferred | |||
| light and temperature configuration, etc.) These functions often | light and temperature configuration, etc.) These functions often | |||
| rely on the detection of the device's wireless MAC address. MAC | rely on the detection of the device wireless MAC address. MAC | |||
| address randomization breaks the services based on such models. | address randomization breaks the services based on such models. | |||
| In managed residential settings (environment type B) and in | In managed residential settings (environment type B) and in | |||
| enterprises (environment types D and E), the network operator is | enterprises (environment types D and E), the network operator is | |||
| often requested to provide IT support. With MAC address | often requested to provide IT support. With MAC address | |||
| randomization, real-time support is only possible if the user can | randomization, real-time support is only possible if the user can | |||
| provide the current MAC address. Service improvement support is not | provide the current MAC address. Service improvement support is not | |||
| possible if the MAC address that the device had at the time of the | possible if the MAC address that the device had at the time of the | |||
| reported issue (in the past) is not known at the time the issue is | reported issue (in the past) is not known at the time the issue is | |||
| reported. | reported. | |||
| In industrial environments, policies are associated with each group | In managed enterprise environments, policies are associated with each | |||
| of objects, including IoT devices. MAC address randomization may | group of objects, including IoT devices. MAC address randomization | |||
| prevent an IoT device from being identified properly and thus lead to | may prevent an IoT device from being identified properly and thus | |||
| network quarantine and disruption of operations. | lead to network quarantine and disruption of operations. | |||
| 7. IANA Considerations | 7. IANA Considerations | |||
| This document has no IANA actions. | This document has no IANA actions. | |||
| 8. Security Considerations | 8. Security Considerations | |||
| Privacy considerations are discussed throughout this document. | Privacy considerations are discussed throughout this document. | |||
| 9. Informative References | 9. Informative References | |||
| skipping to change at line 761 ¶ | skipping to change at line 761 ¶ | |||
| IEEE, "IEEE Standard for Information Technology-- | IEEE, "IEEE Standard for Information Technology-- | |||
| Telecommunications and Information Exchange between | Telecommunications and Information Exchange between | |||
| Systems - Local and Metropolitan Area Networks--Specific | Systems - Local and Metropolitan Area Networks--Specific | |||
| Requirements - Part 11: Wireless LAN Medium Access Control | Requirements - Part 11: Wireless LAN Medium Access Control | |||
| (MAC) and Physical Layer (PHY) Specifications", IEEE | (MAC) and Physical Layer (PHY) Specifications", IEEE | |||
| Std 802.11-2020, DOI 10.1109/IEEESTD.2021.9363693, 26 | Std 802.11-2020, DOI 10.1109/IEEESTD.2021.9363693, 26 | |||
| February 2021, | February 2021, | |||
| <https://ieeexplore.ieee.org/document/9363693>. | <https://ieeexplore.ieee.org/document/9363693>. | |||
| [IEEE_802.11bh] | [IEEE_802.11bh] | |||
| IEEE, "IEEE Draft Standard for Information Technology-- | IEEE, "IEEE Standard for Information Technology-- | |||
| Telecommunications and Information Exchange Between | Telecommunications and Information Exchange Between | |||
| Systems Local and Metropolitan Area Networks--Specific | Systems Local and Metropolitan Area Networks--Specific | |||
| Requirements - Part 11: Wireless LAN Medium Access Control | Requirements - Part 11: Wireless LAN Medium Access Control | |||
| (MAC) and Physical Layer (PHY) Specifications Amendment 8 | (MAC) and Physical Layer (PHY) Specifications Amendment 1: | |||
| : Operation with Randomized and Changing MAC Addresses", | Operation with Randomized and Changing MAC Addresses", | |||
| IEEE P802.11bh/D1.0, 19 July 2023, | IEEE Std 802.11bh-2024, DOI 10.1109/IEEESTD.2025.11023005, | |||
| <https://ieeexplore.ieee.org/document/10214483>. | 3 June 2025, | |||
| <https://ieeexplore.ieee.org/document/11023005>. | ||||
| [IEEE_802.11i] | [IEEE_802.11i] | |||
| IEEE, "IEEE 802.11i-2004 - Wireless LAN Medium Access | IEEE, "IEEE 802.11i-2004 - Wireless LAN Medium Access | |||
| Control (MAC) and Physical Layer (PHY) specifications: | Control (MAC) and Physical Layer (PHY) specifications: | |||
| Amendment 6: Medium Access Control (MAC) Security | Amendment 6: Medium Access Control (MAC) Security | |||
| Enhancements", IEEE Std 802.11i-2004, | Enhancements", IEEE Std 802.11i-2004, | |||
| DOI 10.1109/10.1109/IEEESTD.2004.94585, 24 July 2004, | DOI 10.1109/10.1109/IEEESTD.2004.94585, 24 July 2004, | |||
| <https://ieeexplore.ieee.org/document/1318903>. | <https://ieeexplore.ieee.org/document/1318903>. | |||
| [IEEE_802.1X] | [IEEE_802.1X] | |||
| skipping to change at line 856 ¶ | skipping to change at line 857 ¶ | |||
| Converting Network Protocol Addresses to 48.bit Ethernet | Converting Network Protocol Addresses to 48.bit Ethernet | |||
| Address for Transmission on Ethernet Hardware", STD 37, | Address for Transmission on Ethernet Hardware", STD 37, | |||
| RFC 826, DOI 10.17487/RFC0826, November 1982, | RFC 826, DOI 10.17487/RFC0826, November 1982, | |||
| <https://www.rfc-editor.org/info/rfc826>. | <https://www.rfc-editor.org/info/rfc826>. | |||
| [RFC8837] Jones, P., Dhesikan, S., Jennings, C., and D. Druta, | [RFC8837] Jones, P., Dhesikan, S., Jennings, C., and D. Druta, | |||
| "Differentiated Services Code Point (DSCP) Packet Markings | "Differentiated Services Code Point (DSCP) Packet Markings | |||
| for WebRTC QoS", RFC 8837, DOI 10.17487/RFC8837, January | for WebRTC QoS", RFC 8837, DOI 10.17487/RFC8837, January | |||
| 2021, <https://www.rfc-editor.org/info/rfc8837>. | 2021, <https://www.rfc-editor.org/info/rfc8837>. | |||
| [RFC903] Finlayson, R., Mann, T., Mogul, J., and M. Theimer, "A | ||||
| Reverse Address Resolution Protocol", STD 38, RFC 903, | ||||
| DOI 10.17487/RFC0903, June 1984, | ||||
| <https://www.rfc-editor.org/info/rfc903>. | ||||
| [WBA-OPENROAMING] | [WBA-OPENROAMING] | |||
| Tomas, B., Grayson, M., Canpolat, N., Cockrell, B. A., and | Tomas, B., Grayson, M., Canpolat, N., Cockrell, B. A., and | |||
| S. Gundavelli, "WBA OpenRoaming Wireless Federation", Work | S. Gundavelli, "WBA OpenRoaming Wireless Federation", Work | |||
| in Progress, Internet-Draft, draft-tomas-openroaming-05, | in Progress, Internet-Draft, draft-tomas-openroaming-05, | |||
| 15 April 2025, <https://datatracker.ietf.org/doc/html/ | 15 April 2025, <https://datatracker.ietf.org/doc/html/ | |||
| draft-tomas-openroaming-05>. | draft-tomas-openroaming-05>. | |||
| Appendix A. Existing Frameworks | Appendix A. Existing Frameworks | |||
| A.1. IEEE 802.1X with WPA2 / WPA3 | A.1. IEEE 802.1X with WPA2 / WPA3 | |||
| skipping to change at line 907 ¶ | skipping to change at line 913 ¶ | |||
| the hospitality industry, which includes but is not limited to | the hospitality industry, which includes but is not limited to | |||
| hotels, stadiums, restaurants, concert halls, and hospitals. | hotels, stadiums, restaurants, concert halls, and hospitals. | |||
| A.2. OpenRoaming | A.2. OpenRoaming | |||
| In order to alleviate some of the limitations listed above, the | In order to alleviate some of the limitations listed above, the | |||
| Wireless Broadband Alliance (WBA) OpenRoaming standard introduces an | Wireless Broadband Alliance (WBA) OpenRoaming standard introduces an | |||
| intermediate trusted relay between local venues (places where some | intermediate trusted relay between local venues (places where some | |||
| public Wi-Fi is available) and sources of identity [WBA-OPENROAMING]. | public Wi-Fi is available) and sources of identity [WBA-OPENROAMING]. | |||
| The federation structure extends the type of authorities that can be | The federation structure extends the type of authorities that can be | |||
| used as identity sources (compared to the traditional enterprise- | used as identity sources (compared to the typical enterprise-based | |||
| based IEEE 802.1X scheme for Wi-Fi [IEEE_802.1X]) and facilitates the | IEEE 802.1X scheme for Wi-Fi [IEEE_802.1X]) and facilitates the | |||
| establishment of trust between local networks and an identity | establishment of trust between local networks and an identity | |||
| provider. Such a procedure increases the likelihood that one or more | provider. Such a procedure increases the likelihood that one or more | |||
| identity profiles for the user or the device will be recognized by a | identity profiles for the user or the device will be recognized by a | |||
| local network. At the same time, authentication does not occur to | local network. At the same time, authentication does not occur to | |||
| the local network. This may offer the possibility for the user or | the local network. This may offer the possibility for the user or | |||
| the device to keep their identity obfuscated from the local network | the device to keep their identity obfuscated from the local network | |||
| operator, unless that operator specifically expresses the requirement | operator, unless that operator specifically expresses the requirement | |||
| to disclose such identity (in which case the user has the option to | to disclose such identity (in which case the user has the option to | |||
| accept or decline the connection and associated identity exposure). | accept or decline the connection and associated identity exposure). | |||
| skipping to change at line 950 ¶ | skipping to change at line 956 ¶ | |||
| It is worth noting that, as part of collaborations between the IETF | It is worth noting that, as part of collaborations between the IETF | |||
| MADINAS Working Group and WBA around OpenRoaming, some RADIUS privacy | MADINAS Working Group and WBA around OpenRoaming, some RADIUS privacy | |||
| enhancements have been proposed in the IETF RADEXT Working Group. | enhancements have been proposed in the IETF RADEXT Working Group. | |||
| For instance, [RADIUS] describes good practices in the use of | For instance, [RADIUS] describes good practices in the use of | |||
| Chargeable-User-Identity (CUI) between different visited networks, | Chargeable-User-Identity (CUI) between different visited networks, | |||
| making it better suited for public Wi-Fi and hospitality use cases. | making it better suited for public Wi-Fi and hospitality use cases. | |||
| A.3. Proprietary RCM Schemes | A.3. Proprietary RCM Schemes | |||
| Most client device operating system vendors offer RCM schemes that | Most client OS vendors offer RCM schemes that are enabled by default | |||
| are enabled by default (or easy to enable) on client devices. With | (or easy to enable) on client devices. With these schemes, the | |||
| these schemes, the device changes its MAC address, when not | device changes its MAC address, when not associated, after having | |||
| associated, after having used a given MAC address for a semi-random | used a given MAC address for a semi-random duration window. These | |||
| duration window. These schemes also allow for the device to manifest | schemes also allow for the device to manifest a different MAC address | |||
| a different MAC address in different SSIDs. | in different SSIDs. | |||
| Such a randomization scheme enables the device to limit the duration | Such a randomization scheme enables the device to limit the duration | |||
| of exposure of a single MAC address to observers. In | of exposure of a single MAC address to observers. In | |||
| [IEEE_802.11bh], MAC address randomization is not allowed during a | [IEEE_802.11bh], MAC address randomization is not allowed during a | |||
| given association session, and MAC address randomization can only | given association session, and MAC address randomization can only | |||
| occur through disconnection and reconnection. Authentication may | occur through disconnection and reconnection. Authentication may | |||
| then need to reoccur, with an associated cost of service disruption | then need to reoccur, with an associated cost of service disruption | |||
| and additional load on the venue and identity provider | and additional load on the venue and identity provider | |||
| infrastructure, directly proportional to the frequency of the | infrastructure, directly proportional to the frequency of the | |||
| randomization. The scheme is also not intended to protect from the | randomization. The scheme is also not intended to protect from the | |||
| End of changes. 28 change blocks. | ||||
| 106 lines changed or deleted | 112 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||