<?xml version="1.0" encoding="utf-8"?>
<!-- 
     draft-henry-bcp-for-madinas-00
  
-->
<?xml-model href="rfc7991bis.rnc"?>  <!-- Required for schema validation and schema-aware editing -->
<!-- <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?> -->
<!-- This third-party XSLT can be enabled for direct transformations in XML processors, including most browsers -->


<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<!-- If further character entities are required then they should be added to the DOCTYPE above.
     Use of an external entity file is not recommended. -->

<rfc
  xmlns:xi="http://www.w3.org/2001/XInclude"
  category="bcp"
  docName="draft-henry-bcp-for-madinas-00"
  ipr="trust200902"
  obsoletes=""
  updates=""
  submissionType="IETF"
  xml:lang="en"
  version="3">
<!-- [REPLACE] 
       * docName with name of your draft
     [CHECK] 
       * category should be one of std, bcp, info, exp, historic
       * ipr should be one of trust200902, noModificationTrust200902, noDerivativesTrust200902, pre5378Trust200902
       * updates can be an RFC number as NNNN
       * obsoletes can be an RFC number as NNNN 
-->

  <front>
    <title abbrev="Abbreviated Title">Title Draft Henry BCP for MADINAS</title>
    <!--  [REPLACE/DELETE] abbrev. The abbreviated title is required if the full title is longer than 39 characters -->

    <seriesInfo name="Internet-Draft" value="draft-henry-bcp-for-madinas-00]"/>
   
    <author fullname="Jerome Henry" initials="J" role="editor" surname="Surname Henry">
      <!-- [CHECK]
             * initials should not include an initial for the surname
             * role="editor" is optional -->
    <!-- Can have more than one author -->
      
    <!-- all of the following elements are optional -->
      <organization>Cisco Systems</organization>
       <address>
         <postal>
           <country>USA</country>
         </postal>
         <email>jerhenry@cisco.com</email>
         <!-- uri and facsimile elements may also be added -->
      </address>
     </author>

      <author fullname="Amelia Andersdotter" initials="A." surname="Andersdotter">
      <organization>Sky UK</organization>
      <address>
        <postal>
          <street>Chatham Way</street>
          <city>Brentwood</city>
          <code>CM14 4DZ</code>
          <country>UK</country>
        </postal>
        <email>amelia.ietf@andersdotter.cc</email>

        <!-- uri and facsimile elements may also be added -->
     </address>
    </author>

   
    <date year="2023"/>
    <!-- On draft subbmission:
         * If only the current year is specified, the current day and month will be used.
         * If the month and year are both specified and are the current ones, the current day will
           be used
         * If the year is not the current one, it is necessary to specify at least a month and day="1" will be used.
    -->

    <area>General</area>
    <workgroup>madinas working group</workgroup>
    <!-- "Internet Engineering Task Force" is fine for individual submissions.  If this element is 
          not present, the default is "Network Working Group", which is used by the RFC Editor as 
          a nod to the history of the RFC Series. -->

    <keyword>keyword</keyword>
    <!-- [REPLACE/DELETE]. Multiple allowed.  Keywords are incorporated into HTML output files for 
         use by search engines. -->

    <abstract>
      <t>End devices are implementing Randomized and Changing Mac addresses (RCM), with the advertised goal of improving the user privacy, by making the continued association between a MAC address and a personal device more difficult. RCM may be disruptive to some network services. This document is a collection of best practices for the general implementation of network services within an RCM context. </t>
    </abstract>
 
  </front>

  <middle>
    
    <section>
      <name>Introduction</name>
      <t>With the fast development of unlicensed radio technologies for communication (e.g., Wi-Fi) and the explosion of smartphones and other personal devices, the association between the MAC address of a device (as detailed in https://www.ietf.org/archive/id/draft-ietf-madinas-use-cases-05.html#name-mac-address-as-an-identity-) has been a common way to identify a device in a network, both in cases where this supports delivery of data packets and where it supports ancillary services such a diagnostics or geolocational tracking. To limit that association, personal device vendors have started implementing RCM schemes, changing the MAC address of the device at intervals. Such changes may have effects on network services and may possibly exhaust network resources. https://www.ietf.org/archive/id/draft-ietf-madinas-use-cases-05.html#name-use-cases identifies 6 use cases where RCM may be encountered. This document proposes best practices for each use case, with the double objective of suggesting stable operations in an RCM context, while not exposing further the user or device identity.</t>
      
      <section>
        <name>Requirements Language</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
          "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
          RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
          interpreted as described in BCP 14 <xref target="RFC2119"/>
          <xref target="RFC8174"/> when, and only when, they appear in
          all capitals, as shown here.</t>
      </section>
      <!-- [CHECK] The 'Requirements Language' section is optional -->

    </section>
    
    <section numbered="true" toc="default">
      <name>Home</name>

      <t>In a home environment, it is common that users would not be worried about other users in the home’s ability to associate a MAC address with a given device. However, radio waves may travel beyond the home boundary, allowing external observers to potentially make that same association. Therefore, in such environment, limiting the over-the-air association between a device and its MAC may be desired, while obfuscating this same association vis-à-vis network services present in the home may not be a strong requirement.</t>

      <t> Most client device operating system vendors offer RCM schemes, enabled by default (or easy to enable) on client devices. With these schemes, the device changes its MAC address, when not associated, after having used a given MAC address for a semi-random duration window. These schemes typically also allow for the device to manifest a different MAC address in different SSIDs.</t>
      <t> Such randomization schemes enable the device to limit the duration of exposure of a single MAC address to observers, hereby reducing the ability of observers to spatially track the device using the MAC address. In 802.11-2020, MAC address rotation is not allowed during a given association session, and thus rotation of MAC address can only occur through disconnection and reconnection. Authentication may then need to reoccur, with an associated cost of service disruption and additional load on the venue and identity provider infrastructure, directly proportional to the frequency of the rotation. The scheme is also not intended to protect from the exposure of other identifiers to the venue network (e.g., DHCP option 012 [host name] visible to the network between the AP and the DHCP server).</t>
    </section>



    <section numbered="true" toc="default">
      <name>Managed Residential</name>

      <t>In the context of this document, managed residential environments differ from homes in that an external entity is providing and maintaining the various services in the former case (while the home user is managing most or all of them in the latter case). In order to provide support to non-technical users, the service provider may request knowledge of the association between a physical device and its network identity (i.e., in many cases, its MAC address).</t>
    </section>


    <section numbered="true" toc="default">
      <name>Enterprise Campus (BYOD)</name>

      <t>In an enterprise environment, an IT team is commonly in charge of the management and protection of the network. Devices allowed to connect to the network commonly must abide by rules of activity and identity traceability. At the same time, users bringing their own devices may also occasionally perform personal tasks (e.g., check personal emails) on these devices. Thus the environment presents a mix of requirements, some where each device must be identified (from the IT team viewpoint), and some where the device owner may wish to be in control of when and to whom such device identity can be exposed. </t>

      <t> At the time of association to a Wi-Fi access point, 802.1X authentication coupled with WPA2 or WPA3 encryption schemes allows for the mutual identification of the client device or of the user of the device and an authentication authority. The authentication exchange is protected from eavesdropping. In this scenario, the user or the device identity can be obfuscated from external observers. However, the authentication authority is in most cases under the control of the same entity as the network access provider, thus making the user or device identity visible to the network owner.</t>
      <t>This scheme is therefore well-adapted to enterprise environments, where a level of trust is established between the user and the enterprise network operator. In this scheme, rotation of MAC address can occur through brief disconnections and reconnections (under the rules of 802.11-2020). Authentication may then need to reoccur, with an associated cost of service disruption and additional load on the enterprise infrastructure, and an associated benefit of limiting the exposure of a continuous MAC address to external observers. The adoption of this scheme is however limited outside of the enterprise environment by the requirement to install an authentication profile on the end device, that would be recognized and accepted by a local authentication authority and its authentication server. Such server is uncommon in a home environment, and the procedure to install a profile cumbersome for most untrained users. Remembering that 2022 estimations count approximatively 500 million Wi-Fi hotspots on the planet, the likelihood that a user or device profile would match a profile recognized by a public Wi-Fi authentication authority is also fairly limited, thus restricting the adoption of this scheme for public Wi-Fi as well. Similar limitations are found in hospitality environments.</t>
    </section>


    <section numbered="true" toc="default">
      <name>Enterprise (MDM)</name>

      <t>In specific enterprise environments, all networking devices are provided and controlled by the enterprise. It is common in such environment that device identity would be expected to be known by the IT team at all times, as none of these devices are expected to be of personal type.</t>
    </section>


    <section numbered="true" toc="default">
      <name>Hospitality</name>

      <t>In hospitality environments, it is common that an entity would provide the essential network services required to allow connectivity to the Internet. In this environment, a user often does not assume that any observer, participant or actor in the local network should be trusted with personal information. However, it may be common for the network operator to require some form of device or user authentication, for charging purposes.</t>
    </section>


    <section numbered="true" toc="default">
      <name>Public Wi-Fi</name>

      <t>Public Wi-Fi presents many of the same characteristic as Hospitality Wi-Fi, with the core difference that charging may be common in hospitality Wi-Fi, but is uncommon in public Wi-Fi.</t>

      	<section numbered="true" toc="default">
      <name>OpenRoaming</name>


      <t>The Wireless Broadband Alliance (WBA) OpenRoaming Standard introduces an intermediate trusted relay between local venues and sources of identity. The federation structure also extends the type of authorities that can be used as identity sources (compared to traditional enterprise-based 802.1X scheme for Wi-Fi), and also facilitates the establishment of trust between a local venue and an identity provider. Such procedure dramatically increases the likelihood that one or more identity profiles for the user or the device will be recognized by a local venue. At the same time, authentication does not occur to the local venue, thus offering the possibility for the user or the device to keep their identity obfuscated from the local network operator, unless that operator specifically expresses the requirement to disclose such identity (in which case the user has the option to accept or decline the connection and associated identity exposure).</t>
		      <t>The OpenRoaming scheme therefore seems well-adapted to public Wi-Fi and hospitality environments, allowing for the obfuscation of the identity from unauthorized entities, while also permitting mutual authentication between the device or the user and a trusted identity provider. Just like with standard 802.1X scheme for Wi-Fi, authentication allows the establishment of WPA2 or WPA3 keys that can then be used to encrypt the communication between the device and the access point, thus obfuscating the traffic from observers. </t>
		      <t>Just like in the enterprise case, rotation of MAC address can occur through brief disconnections and reconnections (under the rules of 802.11-2020). Authentication may then need to reoccur, with an associated cost of service disruption and additional load on the venue and identity provider infrastructure, and an associated benefit of limiting the exposure of a continuous MAC address to external observers. Limitations of this scheme include the requirement to first install one or more profiles on the client device. This scheme also requires the local venue network to support RADSEC and the relay function, which may not be common in small hotspot networks and in home environments.</t>
	      </section>

	     	<section numbered="true" toc="default">
      <name>802.1X Authentication</name>

      <t>At the time of association to a Wi-Fi access point, 802.1X authentication coupled with WPA2 or WPA3 encryption schemes allows for the mutual identification of the client device or of the user of the device and an authentication authority. The authentication exchange is protected from eavesdropping and the user or the device identity can be obfuscated from observers external to the network. </t><t>This scheme requires a RADIUS servers to perform verification of authentication credentials of a user seeking access to the network. In practice, such servers are usually only present in enterprise environments, campus networks or perhaps a managed residential network. The authentication authority is in most cases under the control of the same entity as the network access provider, thus leaving the user or device identity visible to the network owner. </t>
      <t>In this scheme, rotation of the MAC address can occur through brief disconnections and reconnections (under the rules of 802.11-2020). If a MAC address is rotated, authentication may then need to reoccur, with an associated cost of service disruption and additional load on the enterprise infrastructure, and an associated benefit of limiting the exposure of a continuous MAC address to external observers. </t>
      <t>The adoption of this scheme is limited outside of the enterprise environment by the requirement to install an authentication profile on the end device. An authentication profile which is accepted by a local authentication authority and its authentication server is needed for the scheme to work. Such a server is uncommon in a home environment, and the procedure to install a profile cumbersome for most untrained users. Remembering that 2022 estimations count approximatively 500 million Wi-Fi hotspots on the planet, the likelihood that a user or device profile would match a profile recognized by a public Wi-Fi authentication authority is also fairly limited, thus restricting the adoption of this scheme for public Wi-Fi as well. Similar limitations are found in hospitality environments.</t>
      <t>One emerging use-case is provisioning of WiFi-assisted mobile network connectivity, where an end-user or subscriber to a connectivity service expects to be able to roam between a mobile network and semi-public hotspots (local networks provisioned by access points belonging to the mobile network operator, for instance) and where a SIM-card can be used to contain the authentication profile (effectively making it the end-device for network access and authentication purposes). For this use-case, the challenge still remains for some higher-level implementations to maintain consistency in IP-addressing after a network transition has occurred. </t>

      	</section>


	</section>
    
    <section anchor="IANA">
    <!-- All drafts are required to have an IANA considerations section. See RFC 8126 for a guide.-->
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA. [CHECK]</t>
    </section>
    
    <section anchor="Security">
      <!-- All drafts are required to have a security considerations section. See RFC 3552 for a guide. -->
      <name>Security Considerations</name>
      <t>This document should not affect the security of the Internet. [CHECK]</t>
    </section>
    
    <!-- NOTE: The Acknowledgements and Contributors sections are at the end of this template -->
  </middle>

  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
        <!-- The recommended and simplest way to include a well known reference -->
        
      </references>
 
      <references>
        <name>Informative References</name>
       
        <reference anchor="exampleRefMin">
        <!-- [REPLACE/DELETE] Example minimum reference -->
          <front>
            <title>Title [REPLACE]</title>
            <author initials="Initials [REPLACE]" surname="Surname [REPLACE]">
              <organization/>
            </author>
            <date year="2006"/>
            <!-- [CHECK] -->
          </front>
        </reference>

        <reference anchor="exampleRefOrg" target="http://www.example.com/">
        <!-- [REPLACE/DELETE] Example reference written by an organization not a person -->
          <front>
            <title>Title [REPLACE]</title>
            <author>
              <organization>Organization [REPLACE]</organization>
            </author>
            <date year="1984"/>
            <!-- [CHECK] -->
          </front>
        </reference>       
       
      </references>
    </references>
    
    <section>
      <name>Appendix 1 [REPLACE/DELETE]</name>
      <t>This becomes an Appendix [REPLACE]</t>
    </section>

    <section anchor="Acknowledgements" numbered="false">
      <!-- [REPLACE/DELETE] an Acknowledgements section is optional -->
      <name>Acknowledgements</name>
      <t>This template uses extracts from templates written by Pekka Savola, Elwyn Davies and 
        Henrik Levkowetz. [REPLACE]</t>
    </section>
    
    <section anchor="Contributors" numbered="false">
      <!-- [REPLACE/DELETE] a Contributors section is optional -->
      <name>Contributors</name>
      <t>Thanks to all of the contributors. [REPLACE]</t>
      <!-- [CHECK] it is optional to add a <contact> record for some or all contributors -->
    </section>
    
 </back>
</rfc>
