<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version  -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-henry-radext-stable-mac-identifier-00" category="std">

  <front>
    <title abbrev="RADIUS SMI TLV">RADIUS attributes for Randomized and Changing MAC addresses</title>

    <author initials="J." surname="Henry" fullname="Jerome Henry">
      <organization>Cisco Systems, Inc.</organization>
      <address>
        <email>jerhenry@cisco.com</email>
      </address>
    </author>
    <author initials="N." surname="Cam-Winget" fullname="Nancy Cam-Winget">
      <organization>Cisco Systems, Inc.</organization>
      <address>
        <email>ncamwing@cisco.com</email>
      </address>
    </author>

    <date year="2021" month="October" day="11"/>

    <area>General</area>
    <workgroup>RADEXT Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes the means by which a Stable MAC address identifier
can be signaled to a Authentication Authorization and Accounting (AAA) server.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>In many cases where a client establishes communication over a wireless network, an observer (as defined in <xref target="RFC6973"/>)
might monitor the client MAC address and the associated traffic. Although the traffic payload itself may be
protected (e.g. encrypted in some way), the outer header is commonly not obfuscated. When the client is a personal
device (as defined in IEEE 802E), observing the client traffic may allow an attacker to characterize, from the traffic,
the associated user activity. For this reason, many vendors of personal devices have started operating under a
Randomized and Changing MAC address (RCM) scheme, where the visible and external MAC address changes
over time, so as to make fingerprinting more difficult. An account of these efforts can be found in <xref target="ZUNIGA"/>
draft-zuniga-mac-address-randomization.</t>

<t>Such RCM scheme does not necessarily mean that the client intends to obfuscate the machine identifier from
all infrastructure devices. In many cases, the intent is to hide the MAC address from external observers.<vspace />
For example, a wireless infrastructure may use a stable identifier for the client to provide service continuity within a RADIUS accounting session, between the Access Point (AP) or the Wireless LAN controller (WLC),  acting as a Network Access Server [NAS]) and the RADIUS server; with the stable identifier being independent from the RCM. 
 In this scenario, the
NAS is the means for the client to access network services, and the client may expect or need service continuity.
Continuity might include for example obtaining the same IP address from the DHCP server, the continued access to
cached resources or the persistence of established exchange pathways. In many of these cases, the provider of the
service needs to be informed that a new RCM matches a previously connected object that should continue to obtain the same service, independently of the changed MAC address. When this happens, it is useful for the
continuity of network services that the wireless infrastructure, acting as the NAS, exchanges with the RADIUS server
about the client capability to express an identity independent from the RCM. For this purpose, this document
specifies a Stable Machine Identifier attribute.</t>

</section>
<section anchor="operations" title="Operations">
<t>The attributes in this document are intended to be applicable across a wide variety of network access 
scenarios in which RADIUS is involved:
*   In some cases, the client may express a machine identity to the NAS, after the authentication has completed and
the client has established a trusted and secure connection to the AP, that the NAS interprets as stable. The client
may then have not provided a stable machine identifier (SMI) to the RADIUS server, for example because the 802.1X/EAP
process authenticated the user.</t>

<t><list style="symbols">
  <t>There are cases where the client may express a machine identity to the RADIUS server during the authentication phase,
and that the RADIUS server interprets as stable, but may not express a stable machine identifier to the NAS.</t>
  <t>In other cases, the client may express a machine identifier to the RADIUS server during the authentication phase
that the RADIUS server interprets as stable, and may also express a machine identifier to the NAS after the
establishment of a trusted and secure connection to the AP, that the NAS interprets as stable. The machine identifier
expressed to the NAS and the RADIUS server may not be the same.</t>
</list></t>

<t>It should be noted that cases where both the NAS and the RADIUS server are unable to determine a stable machine
identifier for the client are not considered in this document. Additionally, the machine identifier expressed to the NAS or the RADIUS
server may not be the SMI attribute in this document. However, the machine identifier is interpreted as stable by the
receiving side.</t>

<t>This section further describes these use cases.</t>

<section anchor="stable-machine-identifier-expressed-to-the-wireless-infrastructure" title="Stable Machine Identifier expressed to the Wireless Infrastructure">
<t>In this scenario, the client initially joins the network in a constrained state and proceeds through the 802.1X/EAP
authentication phase. The client MAC address is likely locally administered (second bit of first octet set), although
this condition is not necessary for support of the SMI attribute. This characteristic is visible to the NAS (in the client
source address) and possibly to the RADIUS server (in the Calling-Station-ID). The RADIUS validates the user
identity (but not a stable machine identity). After the RADIUS server returns an Access-Accept, keying material is
built on the client and on the NAS.</t>

<t>Once authentication is completed and a protected link has been established between the client machine and the
access network infrastructure (acting as NAS), the client machine exchanges with the infrastructure a stable
identifier. In one scenario, the client provides a stable identifier to the AP/WLC. In another scenario, the client
requests a stable identifier from the AP/WLC.</t>

<t>In cases where the client generates the stable identifier, the NAS records the identifier and uses it as SMI. Some
implementations may choose to let the NAS generate a SMI in all cases, and simply map the NAS SMI to the stable
identifier returned by the client.</t>

<section anchor="general-use-cases" title="General Use Cases">
<t>In all cases, the RADIUS server received during the 802.1X/EAP phase the client RCM as the Calling-Station-Id
value. When the client rotates its MAC address, the RADIUS server receives the new MAC Address as the
Calling-Station-Id, and has no mechanism to know that the same client machine is initiating a new session
with a new MAC address. This can cause database inflation on the RADIUS server, keeping cached a set of policies
for a client that may never come back (as the client is already back with a different MAC address), or causing
possible confusion when RCM collision happens. If the wireless infrastructure (NAS) receives a stable machine
identifier information from the client, after authentication with the client first MAC address, then the NAS SHOULD
share this identifier with the RADIUS server.</t>

<t>Thus, after the NAS has received a stable identifier representation from the client machine, the NAS SHOULD send
a new access-request message to the RADIUS server. The SMI attribute SHOULD be added with the value
determined by the NAS from the identifier sent by the client machine. The Calling-Station-ID is the current RCM
MAC address. If the STA is requesting the SMI, the SMI payload SHOULD set to Null.</t>

<t>The RADIUS server supporting the SMI attribute considers the authentication as already validated and SHOULD
returns an Access-Accept message. At this point, the RADIUS records the SMI value for that client if it was in the
Access-Request message.</t>

<t>If the NAS request had the SMI AVP set to Null and the RADIUS server did not uniquely identify the client machine,
then the RADIUS server SHOULD return an Access-Accept message with the SMI AVP set to the Null value. The
NAS then generates a local SMI for the client, and sends it to the client machine over a protected frame on one
hand, and to the RADIUS server as above on the other hand.</t>

<t>Later, the client rotates its MAC address. If neither the wireless infrastructure or the RADIUS server is forewarned
about the change, then a new session is started and the process above repeats. Alternatively, several
implementations allow the client machine to forewarn the wireless infrastructure about the upcoming RCM change,
and for the AP to know in advance the value of the next MAC address for that client. In that case, the infrastructure
recognizes the same machine in the new MAC address. However, the MAC address has changed from the RADIUS
viewpoint (new Calling-Station-ID) and most implementations will require a new authentication. As the client initiates
a new authentication request to the RADIUS server, the Calling-Station-ID is the new MAC address, and the
RADIUS server sees the client as a new machine.</t>

<t>Thus as above, at the end of the re-authentication phase, the NAS SHOULD send to the RADIUS server a new
Access-Request message mentioning both the new Calling-Station-ID and the SMI. The RADIUS server records the
unicity of the machine across both MAC addresses. This information can be used to flush the older entry, provide
continuation of policies (posture) or other purposes.</t>

<t>If the SMI was included in an Access-Request packet, the NAS MUST ensure that the SMI appears in subsequent
Accounting-Request (Start, Interim and Stop) for the same client.</t>

<t>Later and at any time, the source of the SMI (the client or the NAS) may update the SMI value. At that time, the NAS
SHOULD send to the RADIUS server the updated SMI as per above. In all these cases, the SMI is a new attribute to
the session identity that the RADIUS server is tracking.</t>

</section>
<section anchor="special-scenarios" title="Special scenarios">
<t>The infrastructure can opt to represent to other infrastructure systems (including RADIUS) the client directly as the
RCM (case 1), the stable identifier expressed by the client (case 2), or another stable identifier generated by the
infrastructure (case 3).
In case 1, the RADIUS server receives the RCM as the Calling-Id and the provisions from 2.1.1 apply directly.
In cases 2 and 3, when the client changes its MAC address and the infrastructure immediately recognizes the new MAC address as representing the same machine as before, no client MAC address change occurs from the
perspective of the other infrastructure systems. In this context, RCM management is only occurring within the
infrastructure system acting as the NAS, and no new SMI exchange is needed with the RADIUS server. It is only
when a new stable machine identifier is expressed between the NAS the other infrastructure elements that a new
SMI exchange is needed between the NAS and the RADIUS server.</t>

<t>In some cases, the AP and the client establish a secure link, but the client does not immediately exchange with the
infrastructure on a unique identifier. In that case, the NAS is initially unable to establish a unique identifier for the
client machine, but does not know if the RADIUS server may have such value. Thus, after a secure link has been
established with the client, the NAS SHOULD send an Access-Request message to the RADIUS server with the SMI
AVP and its value set to Null. The RADIUS server supporting the SMI attribute but that has not established a unique
identifier for the client machine SHOULD respond with an Access-Accept message and the SMI attribute with value
set to Null. Just as above, the NAS then records that the RADIUS server does not have a stable identifier for the
client.
Later, the client machine and the NAS exchange on a stable identifier. After this exchange completes, the NAS
SHOULD send a new Access-Request to the RADIUS server with the SMI value set. The process then continues as
in 2.1.1.</t>

</section>
<section anchor="failure-handling" title="Failure Handling">
<t>Clients not supporting stable identifiers exchanges with the wireless infrastructure will neither provide a stable
identifier to the AP/WLC nor request one. 
As the NAS is unable to determine if the client has exchanged a stable identifier with the RADIUS server, the NAS
SHOULD initiate an Access-Request with the SMI value set to Null even in that case.</t>

<t>The RADIUS server not supporting the SMI is unable to process the request and SHOULD respond with an
Access-Reject, a NACK, or SHOULD NOT respond. The NAS SHOULD then consider that the RADIUS server is
unable to exchange SMI values for that client, and should stop sending Access-Requests with SMI values
pertaining to that client to that RADIUS server. In this configuration, it is likely that a solid implementation will record
this non-support, and stop sending SMIs for later clients as well.</t>

<t>Additionally, the RADIUS server may detect an anomaly in the SMI (format error, duplication, suspicion of
impersonation or other malicious detection). The RADIUS server may then return to the NAS a warning in the form
of a VSA, thus causing the NAS to reject or contain the offender.</t>

</section>
</section>
<section anchor="stable-radius-machine-identifier" title="Stable RADIUS machine identifier">
<t>Some methods use RADIUS to authenticate the client machine itself, irrespective of the user authentication. In that
case, the RADIUS server receives a stable identifier for the machine, even when the MAC address and the
associated Calling Station-Id are changing.</t>

<t>In this case, the client initially joins the network in a constrained state and proceeds through the 802.1X/EAP
authentication phase. The client MAC address is likely locally administered. During the authentication phase, the
RADIUS server validates the machine identity, or validates the user identity with an identifier also unique for the
particular machine.</t>

<section anchor="general-use-cases-1" title="General Use cases">
<t>After the NAS and the client machine have established a secure connection, no stable identifier exchange occurs
between the client and the NAS. Thus the NAS SHOULD send to the RADIUS server an Access-Request for the
Calling-ID with the SMI AVP, but with a payload set to the Null value.</t>

<t>As the RADIUS server uniquely identifies the machine, the RADIUS SHOULD interpret the Null value as 
1. the NAS supports the SMI AVP, 
2. the NAS does not have an SMI yet for this client and 
3. the NAS requests the SMI for the client, if available.</t>

<t>The RADIUS server having established a unique identifier for the client machine SHOULD respond with an
Access-Accept response that includes the SMI AVP and value. It should be clear that in cases where the STA uses
its real MAC address (locally-significant bit set to 0), the SMI may contain the STA Calling-ID value (STA MAC
address), or another identifier determined by the RADIUS server and which value is implementation-specific.</t>

<t>In cases where the RADIUS returned a valid SMI value, the NAS records this identifier as a stable value for the client
machine.</t>

<t>Later, client MAC rotation occurs and the client does not express a stable identifier to the NAS during that phase.
The NAS thus considers the new MAC address as a new client and initiates 802.1X authentication.</t>

<t>At the end of the authentication, the RADIUS server and the NAS operate as above: the NAS SHOULD send an
Access-Request message with the SMI AVP, set to Null. The RADIUS server has identified the client machine and
SHOULD respond with an Access-Accept containing the SMI AVP and value.</t>

<t>The NAS uses this value to recognize that the new MAC is the same client as the previous MAC. the NAS can then
use this awareness to facilitate network operations (e.g. flush previous MAC address cached keys, ensure IP
address continuity [DHCP proxy], inform upstream devices [gratuitous ARPs] or others).</t>

<t>If the SMI was included in an Access-Request packet, the NAS MUST ensure that the SMI appears in subsequent
Accounting-Request (Start, Interim and Stop) for the same client.</t>

<t>Later and at any time, the source of the SMI (the client or the NAS) may update the SMI value. At that time, the NAS
SHOULD send to the RADIUS server the updated SMI as per above. In all these cases, the SMI is a new attribute to
the session identity that the RADIUS server is tracking.</t>

</section>
<section anchor="special-scenarios-1" title="Special scenarios">
<t>In some cases, the RADIUS server supports the SMI AVP, receives the Access-Request message with the SMI value
set to Null from the NAS, but the RADIUS server did not uniquely authenticate the machine (e.g. user
authentication). The RADIUS server SHOULD then return an Access-Accept message, with the SMI AVP, which
payload value is set to Null. The NAS records in that case that no SMI is available on the RADIUS server for this
client.</t>

</section>
<section anchor="failure-handling-1" title="Failure Handling">
<t>As in 2.1, RADIUS servers that do not support SMI SHOULD return an Access-Reject, a NACK, or SHOULD NOT
respond.  RADIUS servers that do not receive an Access-Request message with the SMI value from the NAS
SHOULD NOT send an unsolicited SMI attribute and value to the NAS.</t>

</section>
</section>
<section anchor="stable-nas-and-stable-radius-machine-identifiers" title="Stable NAS and stable RADIUS machine identifiers">
<t>In this scenario, both the NAS and the RADIUS server are able to establish a stable identity for the client, from their
respective exchanges with the client.
The client first joins the network in a constrained state and proceeds through the 802.1X/EAP authentication phase.
The client MAC address is likely locally administered. As in 2.2, the server RADIUS uniquely identifies the machine. 
Additionally, once a protected link has been established between the client and the AP/WLC, as in 2.1, the client
requests from the NAS a stable identifier or provides to the NAS a stable identifier. This identifier may be different
from that established by the RADIUS server.</t>

<section anchor="general-cases" title="General cases">
<t>After keying material is exchanged between the NAS and the client machine, scenario 2.1 occurs. The NAS SHOULD send an
Access-Request message to the RADIUS server with the SMI AVP. The AVP value is the client identifier determined by the NAS. 
The RADIUS server compares the value to its own SMI value for that client. Several possibilities arise:
*  Some RADIUS implementations may decide to replace the RADIUS SMI with the SMI forwarded by the NAS. In that case, the
RADIUS server SHOULD return to the NAS an Access-Accept, optionally with the SMI AVP, which value is the one sent by the NAS.
The NAS records the Access-Accept to signify that the SMI was successfully recorded by the supporting RADIUS server.
*  Some implementations may decide to replace the NAS SMI with the SMI determined by the RADIUS server. In that case, the
RADIUS server SHOULD return to the NAS an Access-Accept, with the SMI AVP, which value is the one determined by the RADIUS
server. The NAS records the Access-Accept and the SMI returned by the RADIUS server. Some NAS implementations may decide to
conserve both values, some others may decide to replace the NAS SMI with the SMI returned by the RADIUS server.</t>

<t>If the SMI was included in an Access-Request packet, the NAS MUST ensure that the SMI appears in subsequent
Accounting-Request (Start, Interim and Stop) for the same client.</t>

<t>Later and at any time, the source of the SMI (the client or the NAS) may update the SMI value. At that time, the NAS SHOULD send
to the RADIUS server the updated SMI as per above. In all these cases, the SMI is a new attribute to the session identity that the
RADIUS server is tracking.</t>

</section>
<section anchor="special-scenarios-2" title="Special scenarios">
<t>As in 2.1, RADIUS servers that do not support SMI SHOULD return an Access-Reject, a NACK, or SHOULD NOT respond. 
In some cases, the AP and the client establish a secure link, but the client does not immediately exchange with the infrastructure on
a unique identifier. In that case, the NAS is initially unable to establish a unique identifier for the client machine, but does not know if
the RADIUS server may have such value. Thus, after a secure link has been established with the client, the NAS SHOULD send an
Access-Request message to the RADIUS server with the SMI AVP and its value set to Null. The RADIUS server supporting the SMI
attribute that has established a unique identifier for the client machine SHOULD respond with an Access-Accept message and the
SMI attribute and its value. Just as in 2.2, the NAS then records the RADIUS server SMI value for the client.</t>

<t>Later, the client machine and the NAS exchange on a stable identifier. After this exchange completes, the NAS SHOULD send a new
Access-Request to the RADIUS server with the SMI value set. The process then continues as in 2.3.1.</t>

</section>
<section anchor="failure-handling-2" title="Failure Handling">
<t>As in 2.1, RADIUS servers that do not support SMI SHOULD return an Access-Reject, a NACK, or SHOULD NOT respond. 
RADIUS servers that do not receive an Access-Request message with the SMI value from the NAS SHOULD NOT send an
unsolicited SMI attribute and value to the NAS.</t>

</section>
</section>
</section>
<section anchor="stable-machine-identifier" title="Stable-Machine-Identifier">
<t>The Stable-Machine-Identifier attribute conveys the SMI. 
A summary of the RADIUS SMI attribute is shown below. The fields are transmitted from left to right. The assignment rules follow RFC 6929 section 10.3</t>

<figure><artwork><![CDATA[
0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |    Length     | Extended-Type | Value …
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t>Type:</t>

<t>This field is identical to the Type field of the Attribute format defined in <xref target="RFC2865"></xref> Section 5. The code is 241.</t>

<t>Length</t>

<t>The Length field is one octet and indicates the length of this Attribute, including the Type, Length, and “Value” fields.  This field is
identical to the Type field of the Attribute format defined in <xref target="RFC2865"></xref> Section 5.</t>

<t>Extended-Type
The Extended type field is one octet, and follows the definition of <xref target="RFC6929"></xref> section 2.1. The code is 12.</t>

<t>Value
The Value represents the Stable Machine Identifier. The format and content of the value is implementation-specific. Most
implementations might choose to store the SMI as a 48 bit-value.</t>

</section>
<section anchor="attribute-table" title="Attribute table">
<t>The following table provides a guide to which attribute(s) may be found in which kinds of packets, and in what quantity.</t>

<figure><artwork><![CDATA[
   Request Accept Reject Challenge Accounting #     Attribute

                                    Request

     0-1    0-1     0        0        0-1    241.12 Stable Machine Identifier
]]></artwork></figure>

</section>
<section anchor="security-privacy-considerations" title="Security &amp; Privacy Considerations">

<t>It is strongly recommended that the SMI format used is such that neither the machine globally unique MAC address nor the machine
user identity are revealed. Furthermore, where a reference is used to the machine globally unique MAC address or to the machine
user identity, it is recommended that the binding lifetime of that reference be kept as short as possible.</t>

<t>The RADIUS entities (RADIUS proxies and clients) outside the home network MUST NOT modify the SMI or insert a SMI in an
Access-Accept. However, there is no way to detect or prevent this.</t>

<t>Attempting theft of service, a man-in-the-middle may try to insert, modify, or remove the SMI in the Access-Accept packets and
Accounting packets. However, RADIUS Access-Accept and Accounting packets already provide integrity protection.</t>

<t>If the NAS includes SMI in an Access-Request packet, a man-in-the-middle may remove it.  This will cause the issues that the SMI
was designed to solve. To prevent such an attack, the NAS SHOULD include a Message-Authenticator(80) attribute within
Access-Request packets containing a SMI attribute.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document requests a new RADIUS Extension Attribute  to be defined as:</t>

<figure><artwork><![CDATA[
     Value: TBD
     Description: Stable Machine Identifier
     Data Type: string
     Reference: this document
]]></artwork></figure>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC6973' target='https://www.rfc-editor.org/info/rfc6973'>
<front>
<title>Privacy Considerations for Internet Protocols</title>
<author fullname='A. Cooper' initials='A.' surname='Cooper'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<author fullname='B. Aboba' initials='B.' surname='Aboba'><organization/></author>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<author fullname='J. Morris' initials='J.' surname='Morris'><organization/></author>
<author fullname='M. Hansen' initials='M.' surname='Hansen'><organization/></author>
<author fullname='R. Smith' initials='R.' surname='Smith'><organization/></author>
<date month='July' year='2013'/>
<abstract><t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications.  It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices.  It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t></abstract>
</front>
<seriesInfo name='RFC' value='6973'/>
<seriesInfo name='DOI' value='10.17487/RFC6973'/>
</reference>



<reference anchor='RFC2865' target='https://www.rfc-editor.org/info/rfc2865'>
<front>
<title>Remote Authentication Dial In User Service (RADIUS)</title>
<author fullname='C. Rigney' initials='C.' surname='Rigney'><organization/></author>
<author fullname='S. Willens' initials='S.' surname='Willens'><organization/></author>
<author fullname='A. Rubens' initials='A.' surname='Rubens'><organization/></author>
<author fullname='W. Simpson' initials='W.' surname='Simpson'><organization/></author>
<date month='June' year='2000'/>
<abstract><t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2865'/>
<seriesInfo name='DOI' value='10.17487/RFC2865'/>
</reference>



<reference anchor='RFC4005' target='https://www.rfc-editor.org/info/rfc4005'>
<front>
<title>Diameter Network Access Server Application</title>
<author fullname='P. Calhoun' initials='P.' surname='Calhoun'><organization/></author>
<author fullname='G. Zorn' initials='G.' surname='Zorn'><organization/></author>
<author fullname='D. Spence' initials='D.' surname='Spence'><organization/></author>
<author fullname='D. Mitton' initials='D.' surname='Mitton'><organization/></author>
<date month='August' year='2005'/>
<abstract><t>This document describes the Diameter protocol application used for Authentication, Authorization, and Accounting (AAA) services in the Network Access Server (NAS) environment.  When combined with the Diameter Base protocol, Transport Profile, and Extensible Authentication Protocol specifications, this application specification satisfies typical network access services requirements.</t><t>Initial deployments of the Diameter protocol are expected to include legacy systems.  Therefore, this application has been carefully designed to ease the burden of protocol conversion between RADIUS and Diameter.  This is achieved by including the RADIUS attribute space to eliminate the need to perform many attribute translations.</t><t>The interactions between Diameter applications and RADIUS specified in this document are to be applied to all Diameter applications.  In this sense, this document extends the Base Diameter protocol.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4005'/>
<seriesInfo name='DOI' value='10.17487/RFC4005'/>
</reference>



<reference anchor='RFC6929' target='https://www.rfc-editor.org/info/rfc6929'>
<front>
<title>Remote Authentication Dial In User Service (RADIUS) Protocol Extensions</title>
<author fullname='A. DeKok' initials='A.' surname='DeKok'><organization/></author>
<author fullname='A. Lior' initials='A.' surname='Lior'><organization/></author>
<date month='April' year='2013'/>
<abstract><t>The Remote Authentication Dial-In User Service (RADIUS) protocol is nearing exhaustion of its current 8-bit Attribute Type space.  In addition, experience shows a growing need for complex grouping, along with attributes that can carry more than 253 octets of data.  This document defines changes to RADIUS that address all of the above problems.</t></abstract>
</front>
<seriesInfo name='RFC' value='6929'/>
<seriesInfo name='DOI' value='10.17487/RFC6929'/>
</reference>




    </references>

    <references title='Informative References'>




<reference anchor='ZUNIGA'>
   <front>
      <title>MAC address randomization</title>
      <author fullname='Juan Carlos Zuniga'>
	 <organization>SIGFOX</organization>
      </author>
      <author fullname='Carlos J. Bernardos'>
	 <organization>UC3M</organization>
      </author>
      <author fullname='Amelia Andersdotter'>
	 <organization>CENTR</organization>
      </author>
      <date day='12' month='July' year='2021'/>
      <abstract>
	 <t>   Internet privacy has become a major concern over the past few years.
   Users are becoming more aware that their online activity leaves a
   vast digital footprint, that communications are not always properly
   secured, and that their location and actions can be easily tracked.
   One of the main factors for the location tracking issue is the wide
   use of long-lasting identifiers, such as MAC addresses.

   There have been several initiatives at the IETF and the IEEE 802
   standards committees to overcome some of these privacy issues.  This
   document provides an overview of these activities, with the intention
   to inform the technical community about them, and help coordinate
   between present and futures standardization activities.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-zuniga-mac-address-randomization-01'/>
   <format target='https://www.ietf.org/archive/id/draft-zuniga-mac-address-randomization-01.txt' type='TXT'/>
</reference>


<reference anchor='ESNI'>
   <front>
      <title>Encrypted Server Name Indication for TLS 1.3</title>
      <author fullname='Eric Rescorla' initials='E.' surname='Rescorla'>
         <organization>RTFM, Inc.</organization>
      </author>
      <author fullname='Kazuho Oku' initials='K.' surname='Oku'>
         <organization>Fastly</organization>
      </author>
      <author fullname='Nick Sullivan' initials='N.' surname='Sullivan'>
         <organization>Cloudflare</organization>
      </author>
      <author fullname='Christopher A. Wood' initials='C. A.' surname='Wood'>
         <organization>Apple, Inc.</organization>
      </author>
      <date day='4' month='November' year='2019'/>
      <abstract>
	 <t>   This document defines a simple mechanism for encrypting the Server
   Name Indication for TLS 1.3.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-tls-esni-05'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-tls-esni-05.txt' type='TXT'/>
</reference>


<reference anchor='TLS_PROXY'>
   <front>
      <title>TLS Proxy Best Practice</title>
      <author fullname='Eric Wang' initials='E.' surname='Wang'>
         <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Andrew Ossipov' initials='A.' surname='Ossipov'>
         <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Roelof DuToit' initials='R.' surname='DuToit'>
         <organization>Broadcom</organization>
      </author>
      <date day='4' month='March' year='2020'/>
      <abstract>
	 <t>   TLS proxies are widely deployed by organizations to enable security
   features and apply enterprise policies.  This document defines a TLS
   proxy and discusses a wide range of security requirements to guide
   TLS proxy implementations.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-wang-tls-proxy-best-practice-01'/>
   <format target='https://www.ietf.org/archive/id/draft-wang-tls-proxy-best-practice-01.txt' type='TXT'/>
</reference>


<reference anchor="SEC_IMPACT" target="https://jhalderm.com/pub/papers/interception-ndss17.pdf">
  <front>
    <title>The Security Impact of HTTPS Interception</title>
    <author initials="Z." surname="Durumeric" fullname="Zakir Durumeric">
      <organization></organization>
    </author>
    <author initials="Z." surname="Ma" fullname="Zane Ma">
      <organization></organization>
    </author>
    <author initials="D." surname="Springall" fullname="Drew Springall">
      <organization></organization>
    </author>
    <author initials="R." surname="Barnes" fullname="Richard Barnes">
      <organization></organization>
    </author>
    <author initials="N." surname="Sullivan" fullname="Nick Sullivan">
      <organization></organization>
    </author>
    <author initials="E." surname="Bursztein" fullname="Elie Bursztein">
      <organization></organization>
    </author>
    <author initials="M." surname="Bailey" fullname="Michael Bailey">
      <organization></organization>
    </author>
    <author initials="J.A." surname="Halderman" fullname="J. Alex Halderman">
      <organization></organization>
    </author>
    <author initials="V." surname="Paxson" fullname="Vern Paxson">
      <organization></organization>
    </author>
    <date year="2017" month="February" day="26"/>
  </front>
</reference>


    </references>


<section numbered="false" anchor="acknowledgments" title="Acknowledgments">

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

