<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.6.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-richardson-madinas-bcp-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="MADINAS BCP">Best Current Practices for consistent network identity in a privacy preserving way</title>
    <seriesInfo name="Internet-Draft" value="draft-richardson-madinas-bcp-00"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2023" month="March" day="26"/>
    <area>Internet</area>
    <workgroup>madinas Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the best current practices to identify devices in a post Randomized and Changing MAC address environment.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="I-D.ietf-madinas-use-cases"/> explains the history of L2 addresses.
The unchanging nature of the L2 MAC addresses has created an unwanted public association between devices and users.
A response to this has been deployment of Randomized and Changing MAC addresses (RCM).
The various ways in which can be done has been summarized in <xref target="I-D.ietf-madinas-mac-address-randomization"/>.</t>
      <t>This document concerns itself with a variety of use cases in the form of specific protocols which are affected by RCM.
In each use case, the affects of different device policies is discussed.
In some cases the affects are not significant and no change is recommended.
In other cases, the affects are significant to end users experience, or to even damaging to device operation, and deployment of alternate protocols are recommended.</t>
      <t>The recommendations for alternate protocols are critical and there is often a very difficult market situation: before the alternate protocol can be deployed both a client and server need to be present.
Neither party benefits until both parties have deployed.
A particularly negative market situation can develop when client and server implementers come to non-interoperable choices in what protocol they will implement.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>Although this document is not an IETF Standards Track publication, it
adopts the conventions for normative language to provide clarity of
instructions to the implementer.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t><xref section="8" sectionFormat="comma" target="I-D.ietf-madinas-mac-address-randomization"/> defines the following terms:</t>
      <ul spacing="normal">
        <li>Per-Vendor OUI MAC address (PVOM)</li>
        <li>Per-Device Generated MAC address (PDGM)</li>
        <li>Per-Boot Generated MAC address (PBGM)</li>
        <li>Per-Network Generated MAC adress (PNGM)</li>
        <li>Per-Period Generated MAC address (PPGM)</li>
      </ul>
    </section>
    <section anchor="protocol-specific-situations">
      <name>Protocol Specific Situations</name>
      <section anchor="parental-controls-on-dependant-devices">
        <name>Parental Controls on dependant devices</name>
        <t>A common concern among parents of children is that the children do not access the Internet at inappropriate times.
For instance, network access may be restricted from 30 minutes before bedtime until 6am in the morning.</t>
        <t>(There are also concerns that the devices used by the children should go through specific filtering, but that is a subset of the time-of-day access.  The time-of-day access is a binary on/off function, while the filtering is some continuous function with varying access between zero and one)</t>
        <t>In order to restrict access to the child's device, the child's device needs to be identified.
In order to not restrict access to other devices, those devices also need to be identified.
Any device on the network which is not identifiable as being in either of these two categories has an ambiguous policy.</t>
        <t>A child's device which uses a PVOM, PDGM or PNGM address will be seen to have a consistent layer-2 address by the network infrastructure.
The device can therefore be recognized and Internet access can be restricted at appropriate times.</t>
        <t>The use of a Per-Boot (PBGM) or a Per-Period (PPGM) address policy will result in the child's device changing it's layer-two address periodically, and this requires that the network infrastructure have it's policy updated.</t>
        <t>A child (particulary a teenager) may be motivated to overcome these restrictions.
They may be able to control their device, either through intentional "jail-breaking", or perhaps even due to some available malware that has the same effect.
Any protocol that allows the child to pick a new identity (for instance, impersonating a parent device) would allow the child to overcome the limitation.</t>
        <t>On a network where all devices except the child's device have no limitation is easiest: all the child needs to is to pick a new randomly chosen layer-two address.
A network with a constant Pre-Shared Key (WPA-PSK) allows for any device knowing that PSK to join the network with essentially any layer-two address.</t>
        <t>It is therefore necessary for all devices which are present in this child-restricted network to identify themselves in order for the network infrastructure to know that the relevant device is not a child's device.</t>
        <t>This identification must be specific to each device, must not be forgeable, and must contain a credential that the network infrastructure can identify.</t>
        <section anchor="home-networks-need-to-use-wpa-enterprise">
          <name>Home Networks need to use WPA-Enterprise</name>
          <t>An LDevID deployed to all devices meets all of the criteria.</t>
          <ul spacing="normal">
            <li>observation of the public certificate does not convey any special permissions</li>
            <li>the private key of the LDevID an be stored in a secure element, fTPM or other trusted executation environment</li>
            <li>it scales easily to many devices</li>
            <li>it allows for a specific device to be identified for special processing, or to be ejected from the network</li>
            <li>it does not require any external arrangement with external services, if the CA's key is managed by the home router itself.</li>
          </ul>
          <t>There are some privacy concerns with EAP-TLS used in WPA-Enterprise.
Specifically, the client-certificate is visible in EAP-TLS 1.2 handshakes, and this could be used by an observer to coordinate which connection belongs to which personal device.</t>
          <t>The most difficult part of this change is that it requires that home routers:</t>
          <ol spacing="normal" type="1"><li>maintain a PKI with which to sign new certificates</li>
            <li>have a mechanism to easily onboard new devices, along with a mechanism to deal with IoT devices which might be in the home.</li>
            <li>have a way for the first user of the router to become the administrator</li>
            <li>provide a way to backup the entire mechanism to guard against home router failure, flash replacement (such as when ISPs change), or other incompatible upgrades.</li>
          </ol>
        </section>
      </section>
      <section anchor="paidcaptive-internet-services">
        <name>Paid/Captive Internet Services</name>
        <t>A common case for hotels, airports and coffee shops is that they have an unencrypted network id.
Guests connect to this network, but the network contains a captive portal <xref target="CAPTIVE"/> which "hijacks" all connections, and then demands a credential.
Often these credentials are somewhat trivial: a room number with a matching guest last name.
Some hotels demand far more complex logins, including use of loyalty system logins to enable access.</t>
        <t>For the coffee shop and airport situations, it is uncommon for devices to spend a significant amount of time at that location.
The use of an unencrypted network makes it trivial for an attacker to do ARP or ND spoofing of the default router
They can then capture logins to the captive portal (having put up their own look-alike).</t>
        <t>It is often also trivial in these networks to allow multicast traffic, and identifiable information can be found by using mDNS queries, or other port-scanning methods.
The access point can not defend against such attacks, since the official access point has been spoofed.</t>
      </section>
      <section anchor="well-known-psk-internet-access">
        <name>Well known PSK Internet access</name>
        <t>In some coffee shops, the network is encrypted, but there is a WPA-PSK which is written on the chalkboard.
They seldom change, allowing patrons who have previously sipped coffee in that location to easily return and instantly be connected again.</t>
        <t>For the coffee shop, it is uncommon for devices to spend a significant amount of time at that location.
It is unlikely that a typical 12-hour Per-Period (PPGM) policy will run into this problem in a coffee shop.</t>
        <t>But, the PSK methods are rather weak, as they PSK is well known, so not only can any attacker setup their own access point (grabbing all the traffic, and any PII they want), but</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>YYY</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>ZZZ</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Hello.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="BCP14">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin">
              <organization/>
            </author>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee">
              <organization/>
            </author>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins">
              <organization/>
            </author>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport.  This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates.  It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="CAPTIVE">
          <front>
            <title>Captive Portal Architecture</title>
            <author fullname="K. Larose" initials="K." surname="Larose">
              <organization/>
            </author>
            <author fullname="D. Dolson" initials="D." surname="Dolson">
              <organization/>
            </author>
            <author fullname="H. Liu" initials="H." surname="Liu">
              <organization/>
            </author>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8952"/>
          <seriesInfo name="DOI" value="10.17487/RFC8952"/>
        </reference>
        <reference anchor="I-D.ietf-madinas-use-cases">
          <front>
            <title>Randomized and Changing MAC Address Use Cases and Requirements</title>
            <author fullname="Jerome Henry" initials="J." surname="Henry">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Yiu Lee" initials="Y." surname="Lee">
              <organization>Comcast</organization>
            </author>
            <date day="13" month="March" year="2023"/>
            <abstract>
              <t>   To limit the privacy and security issues created by the association
   between a device, its traffic, its location and its user, client
   vendors have started implementing MAC address rotation.  When such
   rotation happens, some in-network states may break, which may affect
   network efficiency and the user experience.  At the same time,
   devices may continue sending other stable identifiers, defeating the
   MAC rotation purposes.  This document lists various network
   environments and a set of functional network services that may be
   affected by such rotation.  This document then examines settings
   where the user experience may be affected by in-network state
   disruption, and settings where other machine identifiers may help re-
   identify the user or recover the identity of the user, and locate the
   device and its associated user.  Last, this document examines
   solutions to maintain user privacy while preserving user quality of
   experience and network operation efficiency.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-madinas-use-cases-05"/>
        </reference>
        <reference anchor="I-D.ietf-madinas-mac-address-randomization">
          <front>
            <title>Randomized and Changing MAC Address</title>
            <author fullname="Juan-Carlos Zúñiga" initials="J. C." surname="Zúñiga">
              <organization>CISCO</organization>
            </author>
            <author fullname="Carlos J. Bernardos" initials="C. J." surname="Bernardos">
              <organization>Universidad Carlos III de Madrid</organization>
            </author>
            <author fullname="Amelia Andersdotter" initials="A." surname="Andersdotter">
              <organization>Sky UK Group, Sky Labs</organization>
            </author>
            <date day="11" month="March" year="2023"/>
            <abstract>
              <t>   Internet privacy has become a major concern over the past few years.
   Users are becoming more aware that their online activity leaves a
   vast digital footprint, that communications are not always properly
   secured, and that their location and actions can be easily tracked.
   One of the main factors for the location tracking issue is the wide
   use of long-lasting identifiers, such as MAC addresses.

   There have been several initiatives at the IETF and the IEEE 802
   standards committees to overcome some of these privacy issues.  This
   document provides an overview of these activities, with the intention
   to inform the technical community about them, and help coordinate
   between present and future standardization activities.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-madinas-mac-address-randomization-06"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
