<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.22 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-henry-radext-stable-mac-identifier-01" category="std" consensus="true">
  <front>
    <title abbrev="RADIUS SMI TLV">RADIUS attributes for Randomized and Changing MAC addresses</title>

    <author initials="J." surname="Henry" fullname="Jerome Henry">
      <organization>Cisco Systems, Inc.</organization>
      <address>
        <email>jerhenry@cisco.com</email>
      </address>
    </author>
    <author initials="N." surname="Cam-Winget" fullname="Nancy Cam-Winget">
      <organization>Cisco Systems, Inc.</organization>
      <address>
        <email>ncamwing@cisco.com</email>
      </address>
    </author>

    <date year="2022" month="April" day="11"/>

    <area>General</area>
    <workgroup>RADEXT Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes the means by which a Stable MAC address identifier
can be signaled to a Authentication Authorization and Accounting (AAA) server.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>In many cases where a client establishes communication over a wireless network, an observer (as defined in <xref target="RFC6973"/>)
might monitor the client MAC address and the associated traffic. Although the traffic payload itself may be
protected (e.g. encrypted in some way), the outer header is commonly not obfuscated. When the client is a personal
device (as defined in IEEE 802E), observing the client traffic may allow an attacker to characterize, from the traffic,
the associated user activity. For this reason, many vendors of personal devices have started operating under a
Randomized and Changing MAC address (RCM) scheme, where the visible and external MAC address changes
over time, so as to make device tracking and fingerprinting more difficult. An account of these efforts can be found in <xref target="ZUNIGA"/>}
draft-ietf-madinas-mac-address-randomization.</t>

<t>Such RCM scheme does not necessarily mean that the client intends to obfuscate the machine identifier from
all infrastructure devices. In many cases, the intent is to hide the MAC address from external observers.<vspace />
For example, a wireless infrastructure may use a stable identifier for the client to provide service continuity within a RADIUS accounting session, between the Access Point (AP) or the Wireless LAN controller (WLC),  acting as a Network Access Server [NAS]) and the RADIUS server; with the stable identifier being independent from the RCM. 
 In this scenario, the
NAS is the means for the client to access network services, and the client may expect or need service continuity.
Continuity might include for example obtaining the same IP address from the DHCP server, the continued access to
cached resources or the persistence of established exchange pathways. In many of these cases, the provider of the
service needs to be informed that a new RCM matches a previously connected object that should continue to obtain the same service, independently of the changed MAC address. When this happens, it is useful for the
continuity of network services that the wireless infrastructure, acting as the NAS, exchanges with the RADIUS server
about the client capability to provide an identity independent from the RCM. For this purpose, this document
specifies a Stable Machine Identifier attribute.</t>

</section>
<section anchor="use-cases" title="Use cases">
<t>The attributes in this document are intended to be applicable across a wide variety of network access 
scenarios in which RADIUS is involved:</t>

<t><list style="symbols">
  <t>In some cases, the client may provide a machine identity to the NAS, after the authentication has completed and
the client has established a trusted and secure connection to the AP, that the NAS interprets as stable. The client
may then have not provided a stable machine identifier (SMI) to the RADIUS server, for example because the 802.1X/EAP
process authenticated the user, but not the machine (that is then identified with a MAC address that may change).</t>
  <t>There are cases where the client may provide a machine identity to the RADIUS server during the authentication phase,
and that the RADIUS server interprets as stable, but may not provide a stable machine identifier directly to the NAS. In some cases, the NAS cannot see the stable machine identity provided to the RADIUS server (for example because it is provided within a tunnel).</t>
  <t>In other cases, the client may provide a machine identifier to the RADIUS server during the authentication phase
that the RADIUS server interprets as stable, and may also provide a machine identifier to the NAS after the
establishment of a trusted and secure connection to the AP, that the NAS interprets as stable. The machine identifier
provided to the NAS and the RADIUS server may not be the same.</t>
</list></t>

<t>It should be noted that cases where both the NAS and the RADIUS server are unable to determine a stable machine
identifier for the client are not considered in this document. Additionally, the machine identifier provided to the NAS or the RADIUS
server may not be the SMI attribute in this document. However, the machine identifier is interpreted as stable by the
receiving side.</t>

<t>This section further describes these use cases.</t>

<section anchor="stable-machine-identifier-provided-to-the-wireless-infrastructure" title="Stable Machine Identifier provided to the Wireless Infrastructure">
<t>In this scenario, the client initially attaches to the network in a constrained state and proceeds through the 802.1X/EAP
authentication phase. The client MAC address is likely locally administered (second bit of first octet set), although
this condition is not necessary for support of the SMI attribute. This information is visible to the NAS (in the client
source address) and possibly to the RADIUS server (in the Calling-Station-ID). The RADIUS validates the user
identity, but cannot validate the machine identity, as no stable machine identifier is available at this point. After the RADIUS server returns an Access-Accept, keying material is
built on the client and on the NAS.</t>

<t>Once authentication is completed and a protected link has been established between the client machine and the
access network infrastructure (acting as NAS), the client machine exchanges with the infrastructure a stable
identifier. In one scenario, the client provides a stable identifier to the AP/WLC. In another scenario, the client
requests a stable identifier from the AP/WLC.</t>

<t>In cases where the client generates the stable identifier, the NAS records the identifier and uses it as SMI. Some
implementations may choose to let the NAS generate a SMI in all cases, and simply map the NAS SMI to the stable
identifier returned by the client.</t>

<section anchor="general-use-cases" title="General Use Cases">
<t>In all cases, the RADIUS server received during the 802.1X/EAP phase the client RCM as the Calling-Station-Id
value. When the client rotates its MAC address, the RADIUS server receives the new MAC Address as the
Calling-Station-Id, and has no mechanism to know that the same client machine is initiating a new session
with a new MAC address. This can cause database inflation on the RADIUS server, keeping cached a set of policies
for a client that may never come back (as the client is already back with a different MAC address), or causing
possible confusion when RCM collision happens. If the wireless infrastructure (NAS) receives a stable machine
identifier information from the client, after authentication with the client first MAC address, then the NAS SHOULD
share this identifier with the RADIUS server via the following process.</t>

<t>After the NAS has received a stable identifier representation from the client machine, the NAS SHOULD send
a new access-request message to the RADIUS server. The access-request includes the NAS-IP-address or the NAS-Identifier, the Calling-Station-ID, the State attribute and the SMI. The SMI attribute SHOULD be added with the value
determined by the NAS from the identifier sent by the client machine. The Calling-Station-ID is the current RCM
MAC address. The 48-bit value of all zeros is special, and indicates that the client is requesting a SMI.</t>

<t>The RADIUS server supporting the SMI attribute considers the authentication as already validated and SHOULD
returns an Access-Accept message containing the SMI attribute. At this point, the RADIUS records the SMI value for that client if it was in the
Access-Request message and associates it with the client entry mathing the Calling-Station-ID specified in the Access-Request.</t>

<t>If the NAS request had the SMI AVP set to the special all-zero value and the RADIUS server did not uniquely identify the client machine,
then the RADIUS server SHOULD return an Access-Accept message with the SMI AVP set to the special all-zero value. The
NAS then generates a local SMI for the client, and sends it to the client machine over a protected frame on one
hand, and to the RADIUS server on the other hand. The communication to the RADIUS server takes the form of the Access-Request, Access-Accept exchange described above.</t>

<t>Later, the client rotates its MAC address. If neither the wireless infrastructure or the RADIUS server is forewarned
about the change, then a new session is started and the process above repeats. Alternatively, several
implementations allow the client machine to forewarn the wireless infrastructure about the upcoming RCM change,
and for the AP to know in advance the value of the next MAC address for that client. In that case, the infrastructure
recognizes the same machine in the new MAC address. However, the MAC address has changed from the RADIUS
viewpoint (new Calling-Station-ID) and most implementations will require a new authentication. As the client initiates
a new authentication request to the RADIUS server, the Calling-Station-ID is the new MAC address, and the
RADIUS server sees the client as a new machine.</t>

<t>Thus as above, at the end of the re-authentication phase, the NAS SHOULD send to the RADIUS server a new
Access-Request message mentioning both the new Calling-Station-ID and the SMI. The RADIUS server records the
unicity of the machine across both MAC addresses. This information can be used to flush the older entry, provide
continuation of policies (posture) or other purposes.</t>

<t>If the SMI was included in an Access-Request packet, the NAS MUST ensure that the SMI appears in subsequent
Accounting-Request (Start, Interim and Stop) for the same client.</t>

<t>The RCM MAC address MUST NOT change when the client use session resumption for EAP. A change at that time would indidate resumption data exchanged with a different client, and thus would be interpreted as a security breach. A client changing its MAC address MUST NOT use any cached session resumption information, and MUST start a new authentication, unless it has first been identified as a single client.</t>

<t>Later and at any time, the source of the SMI (the client or the NAS) may update the SMI value. At that time, the NAS
SHOULD send to the RADIUS server the updated SMI as per above. In all these cases, the SMI is a new attribute to
the session identity that the RADIUS server is tracking.</t>

</section>
<section anchor="special-scenarios" title="Special scenarios">
<t>The infrastructure can opt to represent to other infrastructure systems (including RADIUS) the client directly as the
RCM (case 1), the stable identifier provided by the client (case 2), or another stable identifier generated by the
infrastructure (case 3).
In case 1, the RADIUS server receives the RCM as the Calling-Station-Id and the provisions from 2.1.1 apply directly.
In cases 2 and 3, when the client changes its MAC address and the infrastructure immediately recognizes the new MAC address as representing the same machine as before, no client MAC address change occurs from the
perspective of the other infrastructure systems. In this context, RCM management is only occurring within the
infrastructure system acting as the NAS, and no new SMI exchange is needed with the RADIUS server. The SMI is expected to be stable, and thus to remain the same as the client changes its MAC address. However, it may happen that the client may decide to provide a new SMI during an active session. It may also happen that the infrastructure decides to change the SMI for a given client.  It is only
when a new stable machine identifier is shared between the NAS the other infrastructure elements that a new
SMI exchange is needed between the NAS and the RADIUS server.</t>

<t>In some cases, the AP and the client establish a secure link, but the client does not immediately exchange with the
infrastructure on a unique identifier. In that case, the NAS is initially unable to establish a unique identifier for the
client machine, but does not know if the RADIUS server may have such value. Thus, after a secure link has been
established with the client, the NAS SHOULD send an Access-Request message to the RADIUS server following the format described in the previous section, with the SMI
AVP and its value set to the special all-zero value. The RADIUS server supporting the SMI attribute but that has not established a unique
identifier for the client machine SHOULD respond with an Access-Accept message following the format describd in the previous section and the SMI attribute with value
set to the special all-zero value. Just as above, the NAS then records that the RADIUS server does not have a stable identifier for the
client.
Later, the client machine and the NAS exchange on a stable identifier. After this exchange completes, the NAS
SHOULD send a new Access-Request to the RADIUS server as described in the previous section, with the SMI value set. The process then continues as
in 2.1.1.</t>

</section>
<section anchor="failure-handling" title="Failure Handling">
<t>Clients not supporting stable identifiers exchanges with the wireless infrastructure will neither provide a stable
identifier to the AP/WLC nor request one. 
As the NAS is unable to determine if the client has exchanged a stable identifier with the RADIUS server, the NAS
SHOULD initiate an Access-Request with the SMI value set to the special all-zero value even in that case.</t>

<t>The RADIUS server not supporting the SMI is unable to process the request and SHOULD respond with an
Access-Reject message. The NAS SHOULD then consider that the RADIUS server is
unable to exchange SMI values for that client, and SHOULD stop sending Access-Requests with SMI values
pertaining to that client to that RADIUS server. In this configuration, it is likely that a solid implementation will record
this non-support, and stop sending SMIs for later clients as well.</t>

</section>
</section>
<section anchor="stable-radius-machine-identifier" title="Stable RADIUS machine identifier">
<t>Some methods use RADIUS to authenticate the client machine itself, irrespective of the user authentication. In that
case, the RADIUS server receives a stable identifier for the machine, even when the MAC address and the
associated Calling Station-Id are changing.</t>

<t>In this case, the client initially attaches to the network in a constrained state and proceeds through the 802.1X/EAP
authentication phase. The client MAC address is likely locally administered. During the authentication phase, the
RADIUS server validates the machine identity, or validates the user identity with an identifier also unique for the
particular machine.</t>

<section anchor="general-use-cases-1" title="General Use cases">
<t>After the NAS and the client machine have established a secure connection, no stable identifier exchange occurs
between the client and the NAS. Thus the NAS SHOULD send to the RADIUS server an Access-Request for the
Calling-Station-ID with the SMI AVP as specified in 2.1.1, but with a payload set to the special all-zero value.</t>

<t>As the RADIUS server uniquely identifies the machine, the RADIUS SHOULD interpret the special all-zero value as 
1. the NAS supports the SMI AVP, 
2. the NAS does not have an SMI yet for this client and 
3. the NAS requests the SMI for the client, if available.</t>

<t>The RADIUS server having established a unique identifier for the client machine SHOULD respond with an
Access-Accept response formatetd as described in 2.1.1, that includes the SMI AVP and value. It should be clear that in cases where the client uses
its real MAC address (locally-significant bit set to 0), the SMI may contain the client Calling-ID value (machine MAC
address), or another identifier determined by the RADIUS server and which value is implementation-specific.</t>

<t>In cases where the RADIUS Access-Accept message included a valid (non-zero) SMI value, the NAS records this identifier as a stable value for the client
machine.</t>

<t>Later, client MAC rotation occurs and the client does not provide a stable identifier to the NAS during that phase.
The NAS thus considers the new MAC address as a new client and initiates 802.1X authentication.</t>

<t>At the end of the authentication, the RADIUS server and the NAS operate as above: the NAS SHOULD send an
Access-Request message as described in section 2.1.1 with the SMI AVP, set to the special all-zero value. The RADIUS server has identified the client machine and
SHOULD respond with an Access-Accept message, as described in section 2.1.1, containing the SMI AVP and value.</t>

<t>The NAS uses this value to recognize that the new MAC is the same client as the previous MAC. the NAS can then
use this awareness to facilitate network operations (e.g. flush previous MAC address cached keys, ensure IP
address continuity [DHCP proxy], inform upstream devices [gratuitous ARPs] or others).</t>

<t>If the SMI was included in an Access-Request packet, the NAS MUST ensure that the SMI appears in subsequent
Accounting-Request (Start, Interim and Stop) for the same client.</t>

<t>Later and at any time, the source of the SMI (the client or the NAS) may update the SMI value. At that time, the NAS
SHOULD send to the RADIUS server the updated SMI as per above. In all these cases, the SMI is a new attribute to
the session identity that the RADIUS server is tracking.</t>

</section>
<section anchor="special-scenarios-1" title="Special scenarios">
<t>In some cases, the RADIUS server supports the SMI AVP, receives the Access-Request message with the SMI value
set to the special all-zero from the NAS, but the RADIUS server did not uniquely authenticate the machine (e.g. user
authentication). The RADIUS server SHOULD then return an Access-Accept message, with the SMI AVP, which
payload value is set to the special all-zero value. The NAS records in that case that no SMI is available on the RADIUS server for this
client.</t>

</section>
<section anchor="failure-handling-1" title="Failure Handling">
<t>As in 2.1, RADIUS servers that do not support SMI SHOULD return an Access-Reject message.  RADIUS servers that do not receive an Access-Request message with the SMI value from the NAS
SHOULD NOT send an unsolicited SMI attribute and value to the NAS.</t>

</section>
</section>
<section anchor="stable-nas-and-stable-radius-machine-identifiers" title="Stable NAS and stable RADIUS machine identifiers">
<t>In this scenario, both the NAS and the RADIUS server are able to establish a stable identity for the client, from their
respective exchanges with the client.
The client first attaches to the network in a constrained state and proceeds through the 802.1X/EAP authentication phase.
The client MAC address is likely locally administered. As in 2.2, the server RADIUS uniquely identifies the machine. 
Additionally, once a protected link has been established between the client and the AP/WLC, as in 2.1, the client
requests from the NAS a stable identifier or provides to the NAS a stable identifier. This identifier may be different
from that established by the RADIUS server.</t>

<section anchor="general-cases" title="General cases">
<t>After keying material is exchanged between the NAS and the client machine, scenario 2.1 occurs. The NAS SHOULD send an
Access-Request message to the RADIUS server formatted as described in section 2.2.1, with the SMI AVP. The AVP value is the client identifier determined by the NAS. 
The RADIUS server compares the value to its own SMI value for that Calling-Station-ID value. Several possibilities arise:
*  Some RADIUS implementations may decide to replace the RADIUS SMI with the SMI forwarded by the NAS. In that case, the
RADIUS server SHOULD return to the NAS an Access-Accept formated as described in 2.1.1, optionally with the SMI AVP, which value is the one sent by the NAS.
The NAS records the Access-Accept to signify that the SMI was successfully recorded by the supporting RADIUS server.
*  Some implementations may decide to replace the NAS SMI with the SMI determined by the RADIUS server. In that case, the
RADIUS server SHOULD return to the NAS an Access-Accept message formated as described in 2.1.1, with the SMI AVP, which value is the one determined by the RADIUS
server. The NAS records the Access-Accept and the SMI returned by the RADIUS server. Some NAS implementations may decide to
conserve both values, some others may decide to replace the NAS SMI with the SMI returned by the RADIUS server.</t>

<t>If the SMI was included in an Access-Request packet, the NAS MUST ensure that the SMI appears in subsequent
Accounting-Request (Start, Interim and Stop) for the same client.</t>

<t>Later and at any time, the source of the SMI (the client or the NAS) may update the SMI value. At that time, the NAS SHOULD send
to the RADIUS server the updated SMI as per above. In all these cases, the SMI is a new attribute to the session identity that the
RADIUS server is tracking.</t>

</section>
<section anchor="special-scenarios-2" title="Special scenarios">
<t>As in 2.1, RADIUS servers that do not support SMI SHOULD return an Access-Reject message. 
In some cases, the AP and the client establish a secure link, but the client does not immediately exchange with the infrastructure on
a unique identifier. In that case, the NAS is initially unable to establish a unique identifier for the client machine, but does not know if
the RADIUS server may have such value. Thus, after a secure link has been established with the client, the NAS SHOULD send an
Access-Request message to the RADIUS server with the SMI AVP and its value set to the special all-zero value. The RADIUS server supporting the SMI
attribute that has established a unique identifier for the client machine SHOULD respond with an Access-Accept message and the
SMI attribute and its value as described in section 2.1.1. Just as in 2.2, the NAS then records the RADIUS server SMI value for the client.</t>

<t>Later, the client machine and the NAS exchange on a stable identifier. After this exchange completes, the NAS SHOULD send a new
Access-Request to the RADIUS server, formatted as described in 2.1.1, with the SMI value set. The process then continues as in 2.3.1.</t>

</section>
<section anchor="failure-handling-2" title="Failure Handling">
<t>As in 2.1, RADIUS servers that do not support SMI SHOULD return an Access-Reject message. 
RADIUS servers that do not receive an Access-Request message with the SMI value from the NAS SHOULD NOT send an
unsolicited SMI attribute and value to the NAS.</t>

</section>
</section>
</section>
<section anchor="stable-machine-identifier" title="Stable-Machine-Identifier">
<t>The Stable-Machine-Identifier attribute conveys the SMI. 
A summary of the RADIUS SMI attribute is shown below. The fields are transmitted from left to right. The assignment rules follow RFC 6929 section 10.3</t>

<figure><artwork><![CDATA[
0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |    Length     | Extended-Type | Value …
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>Type:</t>

<t>This field is identical to the Type field of the Attribute format defined in <xref target="RFC2865"></xref> Section 5. The code is 241.</t>

<t>Length</t>

<t>The Length field is one octet and indicates the length of this Attribute, including the Type, Length, and “Value” fields.  This field is
identical to the Type field of the Attribute format defined in <xref target="RFC2865"></xref> Section 5.</t>

<t>Extended-Type
The Extended type field is one octet, and follows the definition of <xref target="RFC6929"></xref> section 2.1. The code is 12.</t>

<t>Value
The Value represents the Stable Machine Identifier. The format and content of the value is implementation-specific. Implementations might choose to store the SMI as a 48 bit-value, to match the length of a MAC-address. However, it is RECOMMENDED to use a longer value for better atomicity, for example 256 bits.</t>

</section>
<section anchor="attribute-table" title="Attribute table">
<t>The following table provides a guide to which attribute(s) may be found in which kinds of packets, and in what quantity.</t>

<figure><artwork><![CDATA[
   Request Accept Reject Challenge Accounting #     Attribute
                                    Request
     0-1    0-1     0        0        0-1    241.12 Stable Machine Identifier
]]></artwork></figure>

</section>
<section anchor="diameter-consideration" title="Diameter Consideration">
<t>Diameter needs to define an identical attribute with the same Type value.  The SMI should be available as part of the NASREQ application <xref target="RFC4005"/>.</t>

</section>
<section anchor="security-privacy-considerations" title="Security &amp; Privacy Considerations">

<t>It is strongly recommended that the SMI format used is such that neither the machine globally unique MAC address nor the machine
user identity are revealed. As such, the SMI should not be either of these values, or derived from these values using a simple and reversible algorithm.</t>

<t>The RADIUS entities (RADIUS proxies and clients) outside the home network MUST NOT modify the SMI or insert a SMI in an
Access-Accept. However, there is no way to detect or prevent this.</t>

<t>Attempting theft of service, a man-in-the-middle may try to insert, modify, or remove the SMI in the Access-Accept packets and
Accounting packets. This risk is common to RADIUS packets and thus also applies to SMI exchanges. However, RADIUS Access-Accept and Accounting packets already provide integrity protection.</t>

<t>If the NAS includes SMI in an Access-Request packet, a man-in-the-middle may remove it.  This will cause the issues that the SMI
was designed to solve. To prevent such an attack, and as specified in RFC 5080, the NAS SHOULD include a Message-Authenticator(80) attribute within
Access-Request packets containing a SMI attribute.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document requests a new RADIUS Extension Attribute  to be defined as:
~~~~
     Value: TBD
     Description: Stable Machine Identifier
     Data Type: string
     Reference: this document
~~~~~</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC6973' target='https://www.rfc-editor.org/info/rfc6973'>
<front>
<title>Privacy Considerations for Internet Protocols</title>
<author fullname='A. Cooper' initials='A.' surname='Cooper'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<author fullname='B. Aboba' initials='B.' surname='Aboba'><organization/></author>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<author fullname='J. Morris' initials='J.' surname='Morris'><organization/></author>
<author fullname='M. Hansen' initials='M.' surname='Hansen'><organization/></author>
<author fullname='R. Smith' initials='R.' surname='Smith'><organization/></author>
<date month='July' year='2013'/>
<abstract><t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications.  It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices.  It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t></abstract>
</front>
<seriesInfo name='RFC' value='6973'/>
<seriesInfo name='DOI' value='10.17487/RFC6973'/>
</reference>



<reference anchor='RFC2865' target='https://www.rfc-editor.org/info/rfc2865'>
<front>
<title>Remote Authentication Dial In User Service (RADIUS)</title>
<author fullname='C. Rigney' initials='C.' surname='Rigney'><organization/></author>
<author fullname='S. Willens' initials='S.' surname='Willens'><organization/></author>
<author fullname='A. Rubens' initials='A.' surname='Rubens'><organization/></author>
<author fullname='W. Simpson' initials='W.' surname='Simpson'><organization/></author>
<date month='June' year='2000'/>
<abstract><t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2865'/>
<seriesInfo name='DOI' value='10.17487/RFC2865'/>
</reference>



<reference anchor='RFC4005' target='https://www.rfc-editor.org/info/rfc4005'>
<front>
<title>Diameter Network Access Server Application</title>
<author fullname='P. Calhoun' initials='P.' surname='Calhoun'><organization/></author>
<author fullname='G. Zorn' initials='G.' surname='Zorn'><organization/></author>
<author fullname='D. Spence' initials='D.' surname='Spence'><organization/></author>
<author fullname='D. Mitton' initials='D.' surname='Mitton'><organization/></author>
<date month='August' year='2005'/>
<abstract><t>This document describes the Diameter protocol application used for Authentication, Authorization, and Accounting (AAA) services in the Network Access Server (NAS) environment.  When combined with the Diameter Base protocol, Transport Profile, and Extensible Authentication Protocol specifications, this application specification satisfies typical network access services requirements.</t><t>Initial deployments of the Diameter protocol are expected to include legacy systems.  Therefore, this application has been carefully designed to ease the burden of protocol conversion between RADIUS and Diameter.  This is achieved by including the RADIUS attribute space to eliminate the need to perform many attribute translations.</t><t>The interactions between Diameter applications and RADIUS specified in this document are to be applied to all Diameter applications.  In this sense, this document extends the Base Diameter protocol.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4005'/>
<seriesInfo name='DOI' value='10.17487/RFC4005'/>
</reference>



<reference anchor='RFC6929' target='https://www.rfc-editor.org/info/rfc6929'>
<front>
<title>Remote Authentication Dial In User Service (RADIUS) Protocol Extensions</title>
<author fullname='A. DeKok' initials='A.' surname='DeKok'><organization/></author>
<author fullname='A. Lior' initials='A.' surname='Lior'><organization/></author>
<date month='April' year='2013'/>
<abstract><t>The Remote Authentication Dial-In User Service (RADIUS) protocol is nearing exhaustion of its current 8-bit Attribute Type space.  In addition, experience shows a growing need for complex grouping, along with attributes that can carry more than 253 octets of data.  This document defines changes to RADIUS that address all of the above problems.</t></abstract>
</front>
<seriesInfo name='RFC' value='6929'/>
<seriesInfo name='DOI' value='10.17487/RFC6929'/>
</reference>




    </references>

    <references title='Informative References'>




<reference anchor='ZUNIGA'>
   <front>
      <title>MAC address randomization</title>
      <author fullname='Juan Carlos Zuniga'>
	 <organization>CISCO</organization>
      </author>
      <author fullname='Carlos J. Bernardos'>
	 <organization>Universidad Carlos III de Madrid</organization>
      </author>
      <author fullname='Amelia Andersdotter'>
	 <organization>Sky UK Group, Sky Labs</organization>
      </author>
      <date day='7' month='March' year='2022'/>
      <abstract>
	 <t>   Internet privacy has become a major concern over the past few years.
   Users are becoming more aware that their online activity leaves a
   vast digital footprint, that communications are not always properly
   secured, and that their location and actions can be easily tracked.
   One of the main factors for the location tracking issue is the wide
   use of long-lasting identifiers, such as MAC addresses.

   There have been several initiatives at the IETF and the IEEE 802
   standards committees to overcome some of these privacy issues.  This
   document provides an overview of these activities, with the intention
   to inform the technical community about them, and help coordinate
   between present and future standardization activities.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-madinas-mac-address-randomization-01'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-madinas-mac-address-randomization-01.txt' type='TXT'/>
</reference>


<reference anchor='ESNI'>
   <front>
      <title>Encrypted Server Name Indication for TLS 1.3</title>
      <author fullname='Eric Rescorla' initials='E.' surname='Rescorla'>
         <organization>RTFM, Inc.</organization>
      </author>
      <author fullname='Kazuho Oku' initials='K.' surname='Oku'>
         <organization>Fastly</organization>
      </author>
      <author fullname='Nick Sullivan' initials='N.' surname='Sullivan'>
         <organization>Cloudflare</organization>
      </author>
      <author fullname='Christopher A. Wood' initials='C. A.' surname='Wood'>
         <organization>Apple, Inc.</organization>
      </author>
      <date day='4' month='November' year='2019'/>
      <abstract>
	 <t>   This document defines a simple mechanism for encrypting the Server
   Name Indication for TLS 1.3.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-tls-esni-05'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-tls-esni-05.txt' type='TXT'/>
</reference>


<reference anchor='TLS_PROXY'>
   <front>
      <title>TLS Proxy Best Practice</title>
      <author fullname='Eric Wang' initials='E.' surname='Wang'>
         <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Andrew Ossipov' initials='A.' surname='Ossipov'>
         <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Roelof DuToit' initials='R.' surname='DuToit'>
         <organization>Broadcom</organization>
      </author>
      <date day='4' month='March' year='2020'/>
      <abstract>
	 <t>   TLS proxies are widely deployed by organizations to enable security
   features and apply enterprise policies.  This document defines a TLS
   proxy and discusses a wide range of security requirements to guide
   TLS proxy implementations.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-wang-tls-proxy-best-practice-01'/>
   <format target='https://www.ietf.org/archive/id/draft-wang-tls-proxy-best-practice-01.txt' type='TXT'/>
</reference>


<reference anchor="SEC_IMPACT" target="https://jhalderm.com/pub/papers/interception-ndss17.pdf">
  <front>
    <title>The Security Impact of HTTPS Interception</title>
    <author initials="Z." surname="Durumeric" fullname="Zakir Durumeric">
      <organization></organization>
    </author>
    <author initials="Z." surname="Ma" fullname="Zane Ma">
      <organization></organization>
    </author>
    <author initials="D." surname="Springall" fullname="Drew Springall">
      <organization></organization>
    </author>
    <author initials="R." surname="Barnes" fullname="Richard Barnes">
      <organization></organization>
    </author>
    <author initials="N." surname="Sullivan" fullname="Nick Sullivan">
      <organization></organization>
    </author>
    <author initials="E." surname="Bursztein" fullname="Elie Bursztein">
      <organization></organization>
    </author>
    <author initials="M." surname="Bailey" fullname="Michael Bailey">
      <organization></organization>
    </author>
    <author initials="J.A." surname="Halderman" fullname="J. Alex Halderman">
      <organization></organization>
    </author>
    <author initials="V." surname="Paxson" fullname="Vern Paxson">
      <organization></organization>
    </author>
    <date year="2017" month="February" day="26"/>
  </front>
</reference>


    </references>


<section numbered="false" anchor="acknowledgments" title="Acknowledgments">

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

