[Madinas] towards a taxonomy of RCM

Michael Richardson <mcr+ietf@sandelman.ca> Tue, 29 March 2022 16:47 UTC

Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: madinas@ietfa.amsl.com
Delivered-To: madinas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F0EF3A1B00 for <madinas@ietfa.amsl.com>; Tue, 29 Mar 2022 09:47:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.109
X-Spam-Level:
X-Spam-Status: No, score=-2.109 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sandelman.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E792o2A_VFVZ for <madinas@ietfa.amsl.com>; Tue, 29 Mar 2022 09:47:25 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [209.87.249.19]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A1C663A1AFE for <madinas@ietf.org>; Tue, 29 Mar 2022 09:47:25 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by tuna.sandelman.ca (Postfix) with ESMTP id A986138AB5; Tue, 29 Mar 2022 12:58:05 -0400 (EDT)
Received: from tuna.sandelman.ca ([127.0.0.1]) by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024) with LMTP id nJ_WrFahighc; Tue, 29 Mar 2022 12:58:05 -0400 (EDT)
Received: from sandelman.ca (obiwan.sandelman.ca [209.87.249.21]) by tuna.sandelman.ca (Postfix) with ESMTP id E0B9538A9B; Tue, 29 Mar 2022 12:58:04 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=sandelman.ca; s=mail; t=1648573084; bh=YG9UIVC1U6NKp9y0w9PsIwO3xmfgC2Dn6W2+1znj53w=; h=From:To:CC:Subject:In-Reply-To:References:Date:From; b=4xB3olZfnZeWwC2fZYj0zShONY56X0drY92Ue4G3xOrQu4UZdK/xarYTyDUXha0f7 Gd+0ngsCwyewBLAXMflVR0qYWnLMoFxCnkRr6rD0SgtCPJxnoTHDCRANr4xbeP5UNb BJ2UP/EYVgUOf4HJQz7EsAdBsi4hCyOs8u+Awld4OkFKVMRnbKFvKYRgEReF8kIAgg +YzuevXwfm9cSPaY6H4CTr2z3uWEzbpRFPxWPOraUgfsyE2v4F1mh8EoLIfvrfafTi iujABB7DdUTGD8hMEQAjU1MYNEci2qiYFPa4/5bSUe2hZ5x82ydY4+/e0PbCZnXSgg I32NKpw7uOjEg==
Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id C8880468; Tue, 29 Mar 2022 12:47:22 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: "Lee, Yiu" <Yiu_Lee@comcast.com>, "madinas@ietf.org" <madinas@ietf.org>
CC: Dave Thaler <dthaler@microsoft.com>
In-Reply-To: <04DEF915-AAA6-4CF8-999B-9A9732633840@comcast.com>
References: <31814.1646866766@localhost> <04DEF915-AAA6-4CF8-999B-9A9732633840@comcast.com>
X-Mailer: MH-E 8.6+git; nmh 1.7+dev; GNU Emacs 26.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha512"; protocol="application/pgp-signature"
Date: Tue, 29 Mar 2022 12:47:22 -0400
Message-ID: <23892.1648572442@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/madinas/bdKTgiwfKB6c_P-yaTNBkaAnzLY>
Subject: [Madinas] towards a taxonomy of RCM
X-BeenThere: madinas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: MAC Address Device Identification for Network and Application Services <madinas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/madinas>, <mailto:madinas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/madinas/>
List-Post: <mailto:madinas@ietf.org>
List-Help: <mailto:madinas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/madinas>, <mailto:madinas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2022 16:47:31 -0000

I wanted access to the github/XML for the documents so that I could
intelligently propose text.  I'm happy to help put the documents into git in
a useful fashion (dumping foo-01.xml, foo-02.xml is not useful). 
Please just unicast me.  I've gone head with framework, at:
    https://github.com/mcr/madinas-framework

At the IETF112 meeting (or maybe it was earlier), many felt that instead of
trying to keep track of what OS/version/product was doing what in the
document (or even in a wiki), that it was more productive to just create a
taxonomy of behaviours. 

I thought that this should go into the framework document, but now I'm not so
clear at all.  I'm just gonna post my text here.   TLAs are subject to usual
bike shedding.

If you prefer you can send pull requests against:
  https://github.com/mcr/madinas-framework/blob/main/mac-address-policies.md

but it might be that we need to decide if this goes into "framework" or the
other document.

----

# MAC address selection policies

This section documents five different policies for MAC address selection.

XXX-The names are subject to change.
The "M" in MAC is included in the acronym, but not the "A" from address.
This allows one to talk about a PVOM Address, or PNGM Address.

The names are all in the form for per-period-of-time-selection.

## Per-Vendor OUI MAC address (PVOM)

This form of MAC address selection is the historical default.
The vendor obtains an Organizationally Unique Identifier (OUI) from the IEEE.
This has been a 24-bit prefix (including two upper bits which are set specifically) that is assigned to the vendor.
The vendor generates a unique 24-bit value for the lower 24-bits, forming the 48-bit MAC address.
It has not been unusual for the 24-bit value to be taken as an incrementing counter, assigned at the factory, and burnt into non-volatile storage.

Note that 802.15.4 use 64-bit MAC addresses, and the IEEE assigns 32-bit prefixes.
The IEEE has indicated that there may be a future Ethernet specification using 64-bit MAC addresses.

## Per-Device Generated MAC address (PDGM)

This form of MAC address is randomly generated by the device, usually upon first boot.
The resulting MAC address is stored in non-volatile storage and is used for the rest of the device lifetime.

## Per-Boot Generated MAC address (PBGM)

This form of MAC address is randomly generated by the device, each time the device is booted.
The resulting MAC address is *not* stored in non-volatile storage.
It does not persist across power cycles.
This case may sometimes be a PDGM where the non-volatile storage is no longer functional
(or has failed).

## Per-Network Generated MAC adress (PNGM)

This form of MAC address is generated each time a new network connection is created.
This is typically used with WiFi (802.11) networks where the network is identified by an SSID Name.
The generated address is stored on non-volatile storage, indexed by the SSID.
Each time the device returns to a network with the same SSID, the device uses the saved MAC address.

It is possible to use PNGM for wired ethernet connections through some passive observation of network traffic, such as STP, LLDP, DHCP or Router Advertisements to determine which network has been attached.

## Per-Session Generated MAC address (PSGM)

This form of MAC address is generated each time a new network connection is created.
Like PNGM, it is used primarily with WiFi (802.11).
The generated address is not stored on non-volatile storage, nor in any in-device database.
Should the device disconnect from that SSID and then reconnect, a new MAC address will be generated.

As there are often small interruptions in hand-over between access points, this MAC address usually needs to be kept for short times.

## Per-Period Generated MAC address (PPGM)

This form of MAC address is generated periodically.
Typical numbers are around every twelve hours.
Like PNGM, it is used primarily with WiFi (802.11).

When the MAC address changes, the station disconnects from the current session and reconnects using the new MAC address.
This will involve a new WPA/802.1x session: new EAP, TLS, etc. negotiations.
A new DHCP, Router-Advertisement will be done.
If DHCP is used, then a new DUID is generated so as to not link to the previous connection, and the result is usually new IP addresses allocated.




-- 
Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide