Re: [Captive-portals] [Int-area] [homenet] Evaluate impact of MAC address randomization to IP applications

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Wed, 23 September 2020 07:56 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: captive-portals@ietfa.amsl.com
Delivered-To: captive-portals@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BCD2F3A0E3C; Wed, 23 Sep 2020 00:56:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.601
X-Spam-Level:
X-Spam-Status: No, score=-9.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=dZ4I5ULZ; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=WZRiLZQw
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 82mLhu_bA7C6; Wed, 23 Sep 2020 00:56:56 -0700 (PDT)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 020983A0E39; Wed, 23 Sep 2020 00:56:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=13330; q=dns/txt; s=iport; t=1600847816; x=1602057416; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=Y+9zQTn4ZFa5MwV+kdeBpuZBIUrT9Qg9Bs8atWYkGco=; b=dZ4I5ULZKSzzseGzbeMRQklNKLeCn9Oqjhcm9z3YxlVzlgZ5h/qZSsqV sMnJL15PqB6MRSTYd6/zA3RXrWeAnW97x89Nmb2pbig70Hf/MXTY3kvu9 zVafGCYbl24ZJ7QskuF3Q51JV2sTOQQySqcfaRegcL8j2B0R4NY/e0T+T k=;
IronPort-PHdr: 9a23:C0mNUxFPnh4obkB6gACTQp1GYnJ96bzpIg4Y7IYmgLtSc6Oluo7vJ1Hb+e401Q+bWp/S7f5DjqzQvryzEWAD4JPUtncEfdQMUhIekswZkkQmB9LNEkz0KvPmLklYVMRPXVNo5Te3ZE5SHsutYEfbpHG16HgUFwmsfQZwL/7+T4jVicn/3uuu+prVNgNPgjf1Yb57IBis6wvLscxDiop5IaF3wRzM8XY=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AbBACt/mpf/4QNJK1WCRsBAQEBAQEBAQUBAQESAQEBAwMBAQFAgU+BUlEHcFkvLIQ6g0YDjXqBApd0glMDVQsBAQENAQEYCwoCBAEBgVaCMUQCF4ITAiQ4EwIDAQELAQEFAQEBAgEGBG2FXAyFcgEBAQECAQEBEBERDAEBLAYFAQsEAgEIEQMBAQEBAgImAgICJQsVCAgCBAENBQgMBweDBYJLAw4gAQ6rNQKBOYhhdoEygTuBRgEBBYUyGIIQAwaBDiqCcYJcS0KGNR0bgUE/gRFDgU9JBy4+glwBAQOBMBQaFYMAM4Itj3AgCykCgnCkAQqCZ4h5hlOLJ4MMiXqUApJ7BIh3gWuQcIQsAgQCBAUCDgEBBYFrI4FXcBU7gmlQFwINWINMiXsMFxSDOoUUhUJ0AjUCBgEJAQEDCXyNYwEB
X-IronPort-AV: E=Sophos;i="5.77,293,1596499200"; d="scan'208";a="581403458"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 23 Sep 2020 07:56:54 +0000
Received: from XCH-ALN-005.cisco.com (xch-aln-005.cisco.com [173.36.7.15]) by alln-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id 08N7usc2006755 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 23 Sep 2020 07:56:54 GMT
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by XCH-ALN-005.cisco.com (173.36.7.15) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 23 Sep 2020 02:56:54 -0500
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 23 Sep 2020 02:56:53 -0500
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Wed, 23 Sep 2020 03:56:53 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AZUUmFQRoJduniBFzs9R4IXaUPysVxrzdn86B/puVTefAZd1oSneoOf2DrKRqPZJZkAG5cs30WiY8SOK6LgfCfSRlwgVqX0DpdJYrmq08RpH10aIOhoqT8JwJrrlQAsGrdnOYdZQnsk9XP+48cI7BoaTA9jLSGGNzuy3uim/Ww7mn5YggWp1is744ZYb4/MRQEq/KY91DGrMV4P2mr4cMRRC6enoa6nki8ovrbuTxrYNz98FarIEvQjxcTq8mJw6o4E7bBy8be/gMM+IVOnmZwjqZKBwQkcFvNFKiebGbcdZ4pvXNzuC0hCLa69FUZYeTt4/JzI3gLyl/OjcCBRK9w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Y+9zQTn4ZFa5MwV+kdeBpuZBIUrT9Qg9Bs8atWYkGco=; b=KWsCKw3VGRpiMRI2HZ7XG2FX4YHxmOdKHZxtLY1MCyr8UcK0qEzCqFhN6OqZxJWi+7ZcgoLXpQxZODzT1WENO/mTRrjkPpA3rI/WsnDq5i9Pr0tkoSLGB82VaooEcDSVu5/Naah2EOATpE/K7slWfHbEEwnOYtGyoQVgcubW5IK56IA/SmQ8apqPDL65O3nWGpWrNWmYU7ItkJ8WGu79n6Y9nrZz6RUkx8/PkJrkowANd/87JSsBpGzWq40des2XTJb3E4WKrJsnue7AyKuTxORIAQp3aAbNgFyot4L2lWfp2pLug9da9SShonXetzkkOrAdUYZaYqt+RsFi/ndzig==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Y+9zQTn4ZFa5MwV+kdeBpuZBIUrT9Qg9Bs8atWYkGco=; b=WZRiLZQwqjXdMKTumh0fisNb0dC0ciPzEYxg9/0OVHvohR6GXW0wZtRbwTjK86y3i+Hp69FFYdjnBugzSPLeO2zyJ2pz19F6F5iO51uM+zyVsmW4+7zlERPVyLLAJ0XGsIyAw9+AKjFwPC2QePGVpo+shoFEG3Twc8mFt1E9eBM=
Received: from MN2PR11MB3565.namprd11.prod.outlook.com (2603:10b6:208:ea::31) by MN2PR11MB4029.namprd11.prod.outlook.com (2603:10b6:208:155::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3391.11; Wed, 23 Sep 2020 07:56:52 +0000
Received: from MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::119:f851:5860:da95]) by MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::119:f851:5860:da95%4]) with mapi id 15.20.3391.026; Wed, 23 Sep 2020 07:56:52 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: "David R. Oran" <daveoran@orandom.net>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
CC: Michael Richardson <mcr+ietf@sandelman.ca>, "homenet@ietf.org" <homenet@ietf.org>, "captive-portals@ietf.org" <captive-portals@ietf.org>, "int-area@ietf.org" <int-area@ietf.org>
Thread-Topic: [Int-area] [homenet] Evaluate impact of MAC address randomization to IP applications
Thread-Index: AQHWkSJGtxlAuF10WkGu4VksV9QRLql1KeXXgAACLYCAAKS48A==
Date: Wed, 23 Sep 2020 07:56:43 +0000
Deferred-Delivery: Wed, 23 Sep 2020 07:56:34 +0000
Message-ID: <MN2PR11MB3565925D6B2B8F9B91765355D8380@MN2PR11MB3565.namprd11.prod.outlook.com>
References: <20200922201317.097C3389D4@tuna.sandelman.ca> <15660.1600807202@localhost> <902400f2-9172-9581-25ab-59ad08e67bee@cs.tcd.ie> <D81695FF-973F-472D-BC0A-9B0F57278B21@comcast.com> <ca575a6b-987e-d998-2713-91e45190f5ea@cs.tcd.ie> <D7720A77-03DF-4F4E-8E08-463DE26C914C@orandom.net>
In-Reply-To: <D7720A77-03DF-4F4E-8E08-463DE26C914C@orandom.net>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: orandom.net; dkim=none (message not signed) header.d=none;orandom.net; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [2a01:cb1d:4ec:2200:75bd:4b26:4cbe:1023]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6c18fa00-b1b3-4ad2-96ea-08d85f963ba7
x-ms-traffictypediagnostic: MN2PR11MB4029:
x-microsoft-antispam-prvs: <MN2PR11MB40292D78ADBC9EB42DD0D944D8380@MN2PR11MB4029.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: rA8T38ypADwJVrvqmRZqcR7mAjv8QRIPoZOkDjPjmEg7leZdWdU85MNJtOQi1T/iG6Yf0di7KD0cE4RCYOgOFvrJYvFKNcXIIoIv50KSYOxyd5aid5dHc2hfBYS3eAkcJKhP00k8tO5l9C30s27OlGaFoGoDt2kTvVAFPMnLPW3nCuJY6Xv535MOv0efro/CW/9ffvn6zMm6beOCoARMxRN2bkbpNgfmBxUJ7nwb/vFJjp42r4A8z6rIDxMKhWQO9vDlRahiyEJgTDYfggDQ4yt6WUcD6hkKdQ7wIAgDDjbNZOwc5lUtqwDbDgiDNXuHlTkqr4IBjdNBT2TUl9BT1hxpnTiUkBqb+Z371/nRs2UrAoj1xAVvVzDocB5mTQHfxMQjbf2n7PiYXr12fdT07g==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR11MB3565.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(396003)(366004)(39860400002)(136003)(376002)(346002)(7696005)(5660300002)(4326008)(9686003)(186003)(2906002)(83380400001)(86362001)(316002)(76116006)(55016002)(64756008)(478600001)(66476007)(66946007)(66556008)(66446008)(66574015)(966005)(8936002)(52536014)(110136005)(53546011)(54906003)(6666004)(33656002)(19627235002)(8676002)(71200400001)(6506007); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR11MB3565.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6c18fa00-b1b3-4ad2-96ea-08d85f963ba7
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Sep 2020 07:56:52.2517 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 2vkJA3XSvsO3jlEAobkcWUiYvyguNf1LpQ/qf5oYH2Y18ko4/CjUewBkP5A5BjET5r2RPKyMhPsF4xvPp0bbYA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4029
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.15, xch-aln-005.cisco.com
X-Outbound-Node: alln-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/captive-portals/2TEwc6EnN9mZ9K8Pwk8VJysMo5s>
Subject: Re: [Captive-portals] [Int-area] [homenet] Evaluate impact of MAC address randomization to IP applications
X-BeenThere: captive-portals@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of issues related to captive portals <captive-portals.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/captive-portals>, <mailto:captive-portals-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/captive-portals/>
List-Post: <mailto:captive-portals@ietf.org>
List-Help: <mailto:captive-portals-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/captive-portals>, <mailto:captive-portals-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Sep 2020 07:56:59 -0000

Hello Dave and all:

So far I have not seen how the MAC randomization deals with:

- DAD - the chances of duplication seem much higher than for IPv6; maybe we can help by doing DAD with something like RFC 8505 on the first hop switch / AP.

- differentiated environments - the preferred behavior on a highway or at a coffee shop may differ from that at in a corporate or a DC network. In the corporate network, we can expect something like .1x to undo the privacy, for good reasons. And we can expect state to be maintained for each IP and each MAC. When a MAC changes, there can be unwanted state created and remaining in the DHCP server, LISP MSMR, SAVI switch,  etc... Privacy MAC is only an additional hassle that we want to minimize.

The current implementations seem to use the SSID to do something similar to RFC 7721. When you come back to the same SSID, you get the same MAC. This helps the corporate network, and is detrimental to the privacy at the coffee shop and the highway, if the same SSID is used across the country in all coffee halts and highway stops.

There appears to be work to do so that:
- the node forms a privacy MAC
- with that privacy MAC the node can do local things like 1x and DAD, if they are available
- if the visited network is recognized, the node applies a behavior (policy) that depends on the visited network
- else use a default higher privacy mode that may renew the MAC more aggressively
- only then, form IP addresses and stuff. If the MAC address was built using privacy, then we could restore the old behavior of embedding it in the IPv6 IID.

Bottom line is that the separate efforts at IETF and IEEE seem to have produced a complex overall solution, with duplicated and somewhat misaligned efforts and yet, gaps. The privacy properties of L2 and L3 addresses are not aligned to a same policy, and is not adapted to the joined network. The impact on upper layers of changing the MAC address is not fully understood. Duplicate addresses are not properly avoided at either layer and yet we pay a high broadcast price on wireless for the inefficient operation of IPv6 DAD. Hopefully we will not replicate that at L2.

This BoF may be an opportunity for IEEE and IETF to work together and converge to a better overall service to the upper layers.

Keep safe

Pascal


> -----Original Message-----
> From: Int-area <int-area-bounces@ietf.org> On Behalf Of David R. Oran
> Sent: mardi 22 septembre 2020 23:27
> To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
> Cc: Michael Richardson <mcr+ietf@sandelman.ca>; homenet@ietf.org;
> captive-portals@ietf.org; int-area@ietf.org
> Subject: Re: [Int-area] [homenet] Evaluate impact of MAC address
> randomization to IP applications
> 
> On 22 Sep 2020, at 17:18, Stephen Farrell wrote:
> 
> > Hiya,
> >
> > On 22/09/2020 22:08, Lee, Yiu wrote:
> >> Hi Stephen,
> >>
> >> Thanks for the notes. Actually, we believe that there are good
> >> privacy reasons to randomize mac-address. This BoF isn't trying to
> >> "fix" randomized mac-address. On the contrary, we want the community
> >> to embrace it. In order to ease the anxiety for transitioning, we
> >> want to document what may break and propose best practice to
> >> transition to dynamic mac-address.
> >
> > Sure, I get that. However, we've seen a number of these efforts start
> > thusly but end up being perceived to be partly trying to unwind the
> > privacy benefits, so I think a good way to avoid that mis-perception
> > is to also present the reasons for (in this case, MAC address
> > randomisation) as fully as the description of the challenges caused.
> >
> Right. it would not advance the case to introduce (or start using) something
> else bout the device that can be tracked and/or provide likability and thereby
> damage privacy in order to preserve the randomized MAC address machinery.
> 
> > Cheers,
> > S.
> >
> >
> >>
> >> Thanks, Yiu
> >>
> >>
> >> On 9/22/20, 4:51 PM, "Int-area on behalf of Stephen Farrell"
> >> <int-area-bounces@ietf.org on behalf of stephen.farrell@cs.tcd.ie>
> >> wrote:
> >>
> >>
> >> That agenda and draft seem to make the seemingly common enough
> >> mistake of only focusing on what a new privacy or security mechanism
> >> breaks and glossing over the good reasons why people introduce these
> >> mechanisms. I hope the BoF proponents fix that because otherwise they
> >> may end up giving the impression that they would prefer to not see
> >> the privacy benefits (which I'd guess is not their goal at all). One
> >> reason those good reasons need to be included is that they constrain
> >> the kinds of additions that might make sense to better handle the new
> >> mechanism.
> >>
> >> We've seen a number of these kinds of reactions and I figure it'd
> >> really be better if the reaction were not to appear purely
> >> reactionary;-)
> >>
> >> If that were fixed, then there may be a better discussion of what, if
> >> any, additional things need doing. If that is not fixed, I'd not be
> >> surprised if the putative BoF were to devolve into a "it's bad" vs.
> >> "no, it's good" bun fight that won't really take us further.
> >>
> >> Cheers, S.
> >>
> >> On 22/09/2020 21:40, Michael Richardson wrote:
> >>>
> >>> Damn. Spelt captive-portal without the s again.  Reposting, sorry
> >>> for duplicates. I hate when WG names and list names do not match,
> >>> and that we can't have aliases. And I think that reply-to gets
> >>> filtered.
> >>>
> >>> Archived-At:
> >>> <https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/i
> >>> nt-
> area/14Skgm84GslPZ9UcGoWY3uzmK6I__;!!CQl3mcHX2A!Q0pEjWrLTcmcryUR
> 2
> >>> EMbSc6uWBNU-xJadaznxWvwmDk2-ARoR0DYYq_eprXSEjo$
> >>>> To: int-area@ietf.org, captive-portal@ietf.org, homenet@ietf.org
> >>> From: Michael Richardson <mcr+ietf@sandelman.ca> Date: Tue, 22 Sep
> >>> 2020 16:34:33 -0400
> >>>
> >>> This thread was started today on the INTAREA WG ML.
> >>>
> >>> While I don't object to a BOF, I don't know where it goes. What I
> >>> see is that much of this problem needs to be resolved through
> >>> increased use of 802.1X: making WPA-Enterprise easier to use and
> >>> setup, this changing core identity from MAC Address to IDevID.
> >>>
> >>> My understanding is that Apple intends to randomize MAC every 12
> >>> hours, even on the same "LAN" (ESSID), and that they will just
> >>> repeat the WPA authentication afterwards to get back on the
> >>> network.   If the per-device unique policy (including CAPPORT
> >>> authorization) can be tied to the device better, than the MAC
> >>> address based "physical" exception can be updated.
> >>>
> >>> But, WPA-PSK doesn't work, because it does not, in general,
> >>> distinguish between different devices.
> >>>
> >>> It can be made to work if every device is given a unique PSK, and
> >>> there are some successful experiments doing exactly that.  Mostly it
> >>> just works, but the challenge is communicating the unique PSK
> >>> through an unreliable human. BRSKI can certainly do this, and it can
> >>> leverage that unencrypted ESSID present at most hospitality
> >>> locations to get onto the encrypted WPA-Enterprise.  Or BRSKI-TEEP,
> >>> or some other BRSKI-EAP method.  The unencrypted SSID is not going
> >>> away at those locations.
> >>>
> >>> Thus QR-code based methods are best, yet those do not work for many
> >>> IoT devices.   EMU's EAP-NOOB can help in certain cases, but we, as
> >>> a community need be clear on what direction we want to go.  One
> >>> answer is that IoT devices have little reason to randomize their MAC
> >>> if they are not generally ported.
> >>>
> >>>
> >>> On 2020-09-22 3:49 p.m., Lee, Yiu wrote:
> >>>> Hi team,
> >>>>
> >>>> We proposed a BoF. The agenda is in
> >>>> https://urldefense.com/v3/__https://github.com/jlivingood/IETF109Bo
> >>>> F/blob/master/109-
> Agenda.md__;!!CQl3mcHX2A!Q0pEjWrLTcmcryUR2EMbSc6u
> >>>> WBNU-xJadaznxWvwmDk2-ARoR0DYYq_e7alyc8U$
> >>>> and the proposal is in
> >>>> https://urldefense.com/v3/__https://github.com/jlivingood/IETF109Bo
> >>>> F/blob/master/BoF-Proposal-
> 20200918.md__;!!CQl3mcHX2A!Q0pEjWrLTcmcr
> >>>> yUR2EMbSc6uWBNU-xJadaznxWvwmDk2-ARoR0DYYq_eNfKGqkE$
> >>>> . You can also find the draft here
> >>>> https://urldefense.com/v3/__https://tools.ietf.org/html/draft-lee-r
> >>>> andomized-macaddr-ps-
> 01__;!!CQl3mcHX2A!Q0pEjWrLTcmcryUR2EMbSc6uWBNU
> >>>> -xJadaznxWvwmDk2-ARoR0DYYq_erhCF3-A$
> >>>> .
> >>>>
> >>>> At this stage, we are looking for inputs for more use cases and
> >>>> interests of working together in this domain. Please post your
> >>>> comments in the mailing list.
> >>>>
> >>>> Thanks
> >>>>
> >>>
> >>>
> >>> -- Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT
> >>> consulting ) Sandelman Software Works Inc, Ottawa and Worldwide
> >>>
> >>>
> >>> _______________________________________________ homenet mailing
> list
> >>> homenet@ietf.org
> >>> https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/ho
> >>> menet__;!!CQl3mcHX2A!Q0pEjWrLTcmcryUR2EMbSc6uWBNU-
> xJadaznxWvwmDk2-AR
> >>> oR0DYYq_epVo5mQQ$
> >>
> >>>
> >>
> >>
> >> _______________________________________________ homenet mailing
> list
> >> homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet
> >>
> > _______________________________________________
> > homenet mailing list
> > homenet@ietf.org
> > https://www.ietf.org/mailman/listinfo/homenet
> 
> DaveO
> 
> _______________________________________________
> Int-area mailing list
> Int-area@ietf.org
> https://www.ietf.org/mailman/listinfo/int-area