Authors,

While reviewing this document during AUTH48, please resolve (as necessary) the 
following questions, which are also in the XML file.


1) <!-- [rfced] Document title

a) Please note that the title of the document has been updated as follows. We
expanded MAC and updated "Address" to "Addresses". Let us know any concerns.

Original:
  Randomized and Changing MAC Address: Context, Network Impacts, and Use Cases

Current:
  Randomized and Changing Media Access Control (MAC) Addresses: Context, 
Network Impacts, and Use Cases

b) Please review the abbreviated title and let us know if the current is okay or
if any updates would be helpful. Note that the abbreviated title only appears in
the pdf output (center of running header at the top of each page).

Original:
  RCM Use Cases

Perhaps 1:
  RCM

Perhaps 2:
  RCM: Context, Network Impacts, and Use Cases
-->


2) <!-- [rfced] Please insert any keywords (beyond those that appear in 
the title) for use on https://www.rfc-editor.org/search.
-->


3) <!-- [rfced] We have a couple of questions about the following text in the
abstract.

a) Please review "client and client Operating System vendors". Is this
correct? Or should this be updated to either "clients and OS vendors" or
"client OS vendors"?

b) FYI - We removed the citation tags in the abstract per Section 4.3
of RFC 7322 ("RFC Style Guide").

Original:
   To limit the privacy issues created by the association between a
   device, its traffic, its location, and its user in [IEEE_802]
   networks, client and client Operating System vendors have started
   implementing MAC address randomization.  This technology is
   particularly important in Wi-Fi [IEEE_802.11] networks due to the
   over-the-air medium and device mobility.

Perhaps 1:
   To limit the privacy issues created by the association between a
   device, its traffic, its location, and its user in IEEE 802 networks,
   clients and OS vendors have started implementing
   Media Access Control (MAC) address randomization.  This technology is
   particularly important in Wi-Fi networks (defined in IEEE 802.11) due to the
   over-the-air medium and device mobility.

Perhaps 2:
   To limit the privacy issues created by the association between a
   device, its traffic, its location, and its user in IEEE 802 networks,
   client OS vendors have started implementing
   Media Access Control (MAC) address randomization.  This technology is
   particularly important in Wi-Fi networks (defined in IEEE 802.11) due to the
   over-the-air medium and device mobility.
-->


4) <!-- [rfced] We updated "two existing frameworks" to "some existing
frameworks" because Appendix A includes three frameworks. Please review
and let us know any concerns.

Original:
   Last, this document
   examines two existing frameworks to maintain user privacy while
   preserving user quality of experience and network operation
   efficiency.

Updated:
   Last, this document
   examines some existing frameworks that maintain user privacy while
   preserving user quality of experience and network operation
   efficiency.
-->


5) <!-- [rfced] We're having trouble following the text within the parentheses,
specifically "also called in this document device, or machine". Would the
following retain the original meaning?

Original:
   At the same time, some network services rely on the end station (as
   defined by the [IEEE_802] Standard, also called in this document
   device, or machine) providing an identifier, which can be the MAC
   address or another value.

Perhaps:
   At the same time, some network services rely on the end station (as defined
   by [IEEE_802]) to provide an identifier, which can be the MAC address or
   another value. This document also refers to the end station
   as a "device" or "machine".
-->


6) <!-- [rfced] Throughout the document, we made updates to avoid using IEEE 
citation
tags as adjectives. Please review the diff file for these. We have
questions about specific instances below.

a) We have updated "[IEEE_802.3] networks" as shown below. However, does this
refer to "Ethernet networks"? If so, would further updating be helpful?

Original:
   Although this document mainly discusses MAC-Address randomization in
   Wi-Fi [IEEE_802.11] networks, same principles can be easily extended
   to any [IEEE_802.3] networks.
   ...
   Multiple
   services are defined for [IEEE_802.3] networks, and multiple
   services defined by the IEEE 802.1 working group are also
   applicable to [IEEE_802.3] networks.

Current:
   Although this document mainly discusses MAC address randomization in
   Wi-Fi networks [IEEE_802.11], the same principles can be easily
   extended to any IEEE 802.3 networks [IEEE_802.3].
   ...
   Multiple
   services are defined for IEEE 802.3 networks [IEEE_802.3], and multiple
   services defined by the IEEE 802.1 working group are also
   applicable to IEEE 802.3 networks [IEEE_802.3].

Perhaps:
   Although this document mainly discusses MAC address randomization in
   Wi-Fi networks [IEEE_802.11], the same principles can be easily
   extended to Ethernet networks [IEEE_802.3].
   ...
   Multiple
   services are defined for Ethernet networks [IEEE_802.3], and multiple
   services defined by the IEEE 802.1 working group are also
   applicable to Ethernet networks [IEEE_802.3].


b) We updated "[IEEE_802.11] or Wi-Fi" and "[IEEE_802.3] or Ethernet" as
follows. Let us know any concerns.

Original:
   2.  Other network devices operating at the MAC layer: many wireless
       network access devices (e.g., [IEEE_802.11] access points) are
       conceived as layer-2 devices, and as such, they bridge a frame
       from one medium (e.g., [IEEE_802.11] or Wi-Fi) to another (e.g.,
       [IEEE_802.3] or Ethernet).

Updated:
   2.  Other network devices operating at the MAC layer: many wireless
       network access devices (e.g., access points [IEEE_802.11]) are
       conceived as Layer 2 devices, and as such, they bridge a frame
       from one medium (e.g., Wi-Fi [IEEE_802.11]) to another (e.g.,
       Ethernet [IEEE_802.3]).
-->


7) <!-- [rfced] Will it be clear to readers what was initially intended as a
48-bit value? The MAC layer, the MAC address, or something else?

Original:
   Initially intended as a 48-bit (6 octets) value in the first versions
   of the [IEEE_802.3] Standard, other Standards under the [IEEE_802.3]
   umbrella allow this address to take an extended format of 64 bits (8
   octets) which enable a larger number of MAC addresses to coexist as
   the 802.3 technologies became widely adopted.

Perhaps:
   In the first versions of [IEEE_802.3], the MAC layer was intended to be a
   48-bit (6-octet) value, but other standards under the IEEE 802.3
   umbrella [IEEE_802.3] allow this address to take an extended format of 64 
bits (8
   octets), which enabled a larger number of MAC addresses to coexist as
   the 802.3 technologies became widely adopted.

Or:
   In the first versions of [IEEE_802.3], the MAC address was intended to be a
   48-bit (6-octet) value, but other standards under the IEEE 802.3
   umbrella [IEEE_802.3] allow this address to take an extended format of 64 
bits (8
   octets), which enabled a larger number of MAC addresses to coexist as
   the 802.3 technologies became widely adopted.
-->


8) <!-- [rfced] How may we clarify "to register to IEEE" here? Does the IEEE
require the registration, or is the IEEE where these addresses are
registered?

Original:
   Note that universally administered MAC addresses are
   required to register to IEEE while locally administered MAC addresses
   are not.

Perhaps 1:
   Note that universally administered MAC addresses are
   required to be registered with the IEEE, while locally administered MAC 
addresses
   are not.

Perhaps 2:
   Note that the IEEE requires that universally administered MAC addresses
   be registered, but registration of locally administered MAC addresses
   is not required.
-->


9) <!-- [rfced] It seems that the definitions for "shared service device" and
"personal device" appear in Section 6.2 of [IEEE_802E] (not Section 6.2
of [IEEE_802]). We updated the introductory sentence below
accordingly. Please review.

Original:
   However, the same
   evolution brought the distinction between two types of devices that
   the [IEEE_802] Standard generally referred to as 'nodes in a
   network'. Their definition is found in the [IEEE_802E] Recommended
   Practice stated in Section 6.2 of [IEEE_802].

Current:
   However, the same
   evolution brought the distinction between two types of devices that
   [IEEE_802] generally refers to as "nodes in a
   network" (see Section 6.2 of [IEEE_802E] for definitions of these devices):
-->


10) <!-- [rfced] We are having trouble understanding the text in parentheses in 
the
sentence below. Please clarify.

Original:
   For most of them, and in
   particular for [IEEE_802.11], the source and destination MAC
   addresses are not encrypted even in networks that implement
   encryption (so that each machine can easily detect if it is the
   intended target of the message before attempting to decrypt its
   content, and also identify the transmitter, to use the right
   decryption key when multiple unicast keys are in effect).

Perhaps:
   For most of them ([IEEE_802.11] in
   particular), the source and destination MAC
   addresses are not encrypted even in networks that implement
   encryption. Thus, each machine can easily detect if it is the
   intended target of the message before attempting to decrypt its
   content and can also identify the transmitter in order to use the right
   decryption key when multiple unicast keys are in effect.
-->


11) <!-- [rfced] Is "device MAC" correct here, or should it be updated to 
"device
MAC address"?

Original:
       As a device changes its network attachment (roams) from one
       access point to another, the access points can exchange
       contextual information, (e.g., device MAC, keying material),
       allowing the device session to continue seamlessly.

Perhaps:
       As a device changes its network attachment (roams) from one
       access point to another, the access points can exchange
       contextual information (e.g., device MAC address and keying material),
       allowing the device session to continue seamlessly.
-->


12) <!-- [rfced] We are having trouble parsing this sentence, especially "to 
other
mediums than [IEEE_802.3] (e.g., DOCSIS [DOCSIS]), which also
implements". How may we update to improve clarity?

Original:
   Wireless access points may
   also connect to other mediums than [IEEE_802.3] (e.g., DOCSIS
   [DOCSIS]), which also implements mechanisms under the umbrella of
   the general 802 Standard, and therefore expect the unique and
   persistent association of a MAC address to a device.

Perhaps:
   Wireless access points may
   also connect using other mediums (e.g., the Data-Over-Cable Service 
Interface Specification (DOCSIS)
   [DOCSIS]) that implement mechanisms under the umbrella of
   the general 802 Standard and therefore expect the unique and
   persistent association of a MAC address to a device.
-->


13) <!-- [rfced] We updated "wireless 802-technologies exchanges" as follows. 
Let
us know if this is incorrect.

Original:
   as the transmitting or receiving
   MAC address is usually not encrypted in wireless 802-technologies
   exchanges, and as any protocol-compatible device in range of the
   signal can read the frame header.

Updated:
   The transmitting or receiving MAC
   address is usually not encrypted in wireless exchanges in IEEE 802 
technologies,
   and any protocol-compatible device in range of the
   signal can read the frame header.
-->


14) <!-- [rfced] We updated the text in parentheses as follows for clarity. 
Please
review to ensure that the updated text accurately conveys the intended
meaning.

Original:
  The device MAC address is not visible anymore
  unless a mechanism copies the MAC address into a field that can
  be read while the packet travels onto the next segment (e.g.,
  pre- [RFC4941] and pre-[RFC7217] IPv6 addresses built from the
  MAC address).

Updated:
  The device MAC address is not visible anymore
  unless a mechanism copies the MAC address into a field that can
  be read while the packet travels to the next segment (e.g.,
  IPv6 addresses built from the MAC address prior to the use of the methods 
defined in
  [RFC4941] and [RFC7217]).
-->


15) <!-- [rfced] We have two questions about the text below.

a) In the sentence introducing the list, how may we clarify "what trust"?  Is
the intent "the degree of trust"?

b) Is text about "environment" needed in these descriptions of Full trust,
Selective trust, and Zero trust?

Original:
   It is useful to distinguish what trust a
   personal device may establish with the different entities at play in
   a network domain where a MAC address may be visible:

   1.  Full trust: there is environment where a device establishes a
       trust relationship, and the device can share its persistent MAC
       address with the access network devices (e.g., access point and
       WLAN Controller).  In this environment, the network provides
       necessary security measures to prevent observers or network
       actors from accessing PII.  The device (or its user) also has
       confidence that its MAC address is not shared beyond the layer-2
       broadcast domain boundary.

   2.  Selective trust: in another environment, depending on the pre-
       defined privacy policies, a device may decide to use one pseudo-
       persistent MAC address for a set of network elements and another
       pseudo-persistent MAC address for another set of network
       elements.  Examples of privacy policies can be SSID and BSSID
       combination, a particular time-of-day, or a pre-set time
       duration.

   3.  Zero trust: in another environment, a device may randomize its
       MAC address with any local entity reachable through the AP.  It
       may generate a temporary MAC address to each of them.  That
       temporary MAC address may or may not be the same for different
       services.

Perhaps:
   It is useful to distinguish the degree of trust that a personal
   device may establish with the different entities at play in a network
   domain where a MAC address may be visible:

   1.  Full trust: The device establishes a
       trust relationship and shares its persistent MAC
       address with the access network devices (e.g., access point and
       WLAN controller).  The network provides
       necessary security measures to prevent observers or network
       actors from accessing PII.  The device (or its user) also has
       confidence that its MAC address is not shared beyond the Layer 2
       broadcast domain boundary.

   2.  Selective trust: Depending on the
       predefined privacy policies, a device may decide to use one
       pseudo-persistent MAC address for a set of network elements and
       another pseudo-persistent MAC address for another set of network
       elements.  Examples of privacy policies can be a combination of
       Service Set Identifier (SSID) and Basic Service Set Identifier
       (BSSID), a particular time of day, or a preset time duration.

   3.  Zero trust: A device may randomize its
       MAC address with any local entity reachable through the AP.  It
       may generate a temporary MAC address to each of them.  That
       temporary MAC address may or may not be the same for different
       services.
-->


16) <!-- [rfced] The title of Section 5 is "Environment" (we updated to the 
plural
"Environments"). However, the title of Table 1 within this section is
"Use Cases". Please review the use of "environment" and "use case"
throughout the document, and let us know if any updates would be helpful.
-->


17) <!-- [rfced] Will readers know what "it" refers to in the second and third
sentences below?

Original:
   Most devices in the
   network only require simple connectivity so that the network
   services are simple.  For network support, it is also simple.  It
   is usually related to Internet connectivity.
-->


18) <!-- [rfced] "Reverse Address Resolution Protocol (RARP)" does not appear to
be mentioned in [RFC826]. It was defined in RFC 903
(https://www.rfc-editor.org/info/rfc903). Are any updates are needed
here? Perhaps [RFC826] should be used for ARP and [RFC903] for RARP?

Original:
   MAC address randomization
   can cause MAC address cache exhaustion, but also the need for
   frequent Address Resolution Protocol (ARP), Reverse Address
   Resolution Protocol (RARP) [RFC826], Neighbor Solicitation and,
   Neighbor Advertisement [RFC4861] exchanges.

Perhaps:
   MAC address randomization
   can cause MAC address cache exhaustion but also the need for frequent
   Address Resolution Protocol (ARP) [RFC826], Reverse Address Resolution
   Protocol (RARP) [RFC903], and Neighbor Solicitation and Neighbor
   Advertisement [RFC4861] exchanges.
-->


19) <!-- [rfced] We do not see "industrial environment" in Section 5. Is the
intent here "managed enterprises (environment type E in Section 5)"?
Please review and let us know if any updates would be helpful.

Original:
   In industrial environments, policies are associated with each group
   of objects, including IoT devices.
-->


20) <!-- [rfced] We made updates to many of the IEEE references (e.g., title and
DOI). Please review for correctness.
-->


21) <!-- [rfced] FYI - The following reference has been superseded; we updated 
to
the most current version. Please review and confirm that this is
correct.

Original:
   [IEEE_802.3]
              "IEEE 802.3-2018 - IEEE Standard for Ethernet", IEEE
              802.3 , 31 August 2018,
              <https://standards.ieee.org/ieee/802.3/7071/>.

Updated:
   [IEEE_802.3]
              IEEE, "IEEE Standard for Ethernet", IEEE Std 802.3-2022,
              DOI 10.1109/IEEESTD.2022.9844436, 29 July 2022,
              <https://ieeexplore.ieee.org/document/9844436>.
-->


22) <!-- [rfced] FYI - For the following reference entry, we updated the title 
to
match the document itself. Please let us know if there is objection.

Original:
   [DOCSIS]   "DOCSIS 4.0 Physical Layer Specification Version I06, DOI
              CM-SP-CM-OSSIv4.0", CableLabs DOCSIS , March 2022,
              <https://www.cablelabs.com/specifications/CM-SP-CM-
              OSSIv4.0?v=I06>.

Updated:
   [DOCSIS]   CableLabs, "Cable Modem Operations Support System
              Interface Specification", Data-Over-Cable Service
              Interface Specifications, DOCSIS 4.0, Version I06, March
              2022, <https://www.cablelabs.com/specifications/CM-SP-CM-
              OSSIv4.0?v=I06>.
-->


23) <!-- [rfced] For [IEEE_802.11bh], the link provided goes to an "Inactive -
Draft" standard. We were unable to find an active version of this
reference. Is there an active draft you would prefer to reference?

For now, we have updated this reference with the information available at the
URL.

Original:
   [IEEE_802.11bh]
              "IEEE 802.11bh-2023 - Wireless LAN Medium Access Control
              (MAC) and Physical Layer (PHY) Specifications Amendment 8
              : Operation with Randomized and Changing MAC Addresses",
              IEEE 802.11bh , 19 July 2023,
              <https://ieeexplore.ieee.org/document/10214483>.

Current:
   [IEEE_802.11bh]
              IEEE, "IEEE Draft Standard for Information Technology-
              Telecommunications and Information Exchange Between
              Systems Local and Metropolitan Area Networks - Specific
              Requirements - Part 11: Wireless LAN Medium Access Control
              (MAC) and Physical Layer (PHY) Specifications Amendment 8:
              Operation with Randomized and Changing MAC Addresses",
              IEEE P802.11bh/D1.0, 19 July 2023,
              <https://ieeexplore.ieee.org/document/10214483>.
-->


24) <!-- [rfced] Is "client device operating system vendor" correct here? We see
"client OS vendor" elsewhere in the document.

Original:
   Most client device operating system vendors offer RCM schemes,
   enabled by default (or easy to enable) on client devices.

Perhaps:
   Most client OS vendors offer RCM schemes that are
   enabled by default (or easy to enable) on client devices.
-->


25) <!-- [rfced] Terminology

a) We see the following forms in the document. We updated to "MAC
address" for consistency.

MAC Address
MAC-Address
MAC address


b) We see the forms below used in the document. Should these be
uniform? If so, please let us know which form is preferred. Another option
(not used in the document) is "MAC address of the device" and "MAC address of
the wireless device".

device MAC address
device's MAC address

device wireless MAC address
device's wireless MAC address
-->


26) <!-- [rfced] Abbreviations

a) FYI - We added expansions for the following abbreviations
per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review each
expansion in the document carefully to ensure correctness.

   BSSID - Basic Service Set Identifier
   DOCSIS - Data-Over-Cable Service Interface Specification
   DSCP - Differentiated Services Code Point
   ECN - Explicit Congestion Notification
   MAC - Media Access Control 
   SLAAC - Stateless Address Autoconfiguration
   SSID - Service Set Identifier

b) How may we expand AR and VR in the following sentence?

Original:
   Larger and more complex
   networks can also incorporate more advanced services, from AAA to
   AR/VR applications.

Perhaps:
   Larger and more complex
   networks can also incorporate more advanced services, from AAA to
   Augmented Reality (AR) or Virtual Reality (VR) applications.
-->


27) <!-- [rfced] Please review the "Inclusive Language" portion of the online 
Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
and let us know if any changes are needed. Updates of this nature typically
result in more precise language, which is helpful for readers.

Note that our script did not flag any words in particular, but this should 
still be reviewed as a best practice.

In addition, please consider whether "tradition" should be updated for
clarity. While the NIST website indicates that this term is potentially
biased, it is also ambiguous. "Tradition" is a subjective term, as it is not
the same for everyone. See 
<https://web.archive.org/web/20250214092458/https://www.nist.gov/nist-research-library/nist-technical-series-publications-author-instructions#table1>.

Original:
   The federation structure extends the type
   of authorities that can be used as identity sources (compared to
   traditional enterprise-based 802.1X [IEEE_802.1X] scheme for Wi-Fi),
   and facilitates the establishment of trust between local networks and
   an identity provider.
-->


Thank you.

RFC Editor/st/rv




On Jun 9, 2025, at 4:12 PM, rfc-edi...@rfc-editor.org wrote:

*****IMPORTANT*****

Updated 2025/06/09

RFC Author(s):
--------------

Instructions for Completing AUTH48

Your document has now entered AUTH48.  Once it has been reviewed and 
approved by you and all coauthors, it will be published as an RFC.  
If an author is no longer available, there are several remedies 
available as listed in the FAQ (https://www.rfc-editor.org/faq/).

You and you coauthors are responsible for engaging other parties 
(e.g., Contributors or Working Group) as necessary before providing 
your approval.

Planning your review 
---------------------

Please review the following aspects of your document:

*  RFC Editor questions

   Please review and resolve any questions raised by the RFC Editor 
   that have been included in the XML file as comments marked as 
   follows:

   <!-- [rfced] ... -->

   These questions will also be sent in a subsequent email.

*  Changes submitted by coauthors 

   Please ensure that you review any changes submitted by your 
   coauthors.  We assume that if you do not speak up that you 
   agree to changes submitted by your coauthors.

*  Content 

   Please review the full content of the document, as this cannot 
   change once the RFC is published.  Please pay particular attention to:
   - IANA considerations updates (if applicable)
   - contact information
   - references

*  Copyright notices and legends

   Please review the copyright notice and legends as defined in
   RFC 5378 and the Trust Legal Provisions 
   (TLP – https://trustee.ietf.org/license-info).

*  Semantic markup

   Please review the markup in the XML file to ensure that elements of  
   content are correctly tagged.  For example, ensure that <sourcecode> 
   and <artwork> are set correctly.  See details at 
   <https://authors.ietf.org/rfcxml-vocabulary>.

*  Formatted output

   Please review the PDF, HTML, and TXT files to ensure that the 
   formatted output, as generated from the markup in the XML file, is 
   reasonable.  Please note that the TXT will have formatting 
   limitations compared to the PDF and HTML.


Submitting changes
------------------

To submit changes, please reply to this email using ‘REPLY ALL’ as all 
the parties CCed on this message need to see your changes. The parties 
include:

   *  your coauthors
   
   *  rfc-edi...@rfc-editor.org (the RPC team)

   *  other document participants, depending on the stream (e.g., 
      IETF Stream participants are your working group chairs, the 
      responsible ADs, and the document shepherd).
     
   *  auth48archive@rfc-editor.org, which is a new archival mailing list 
      to preserve AUTH48 conversations; it is not an active discussion 
      list:
     
     *  More info:
        
https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
     
     *  The archive itself:
        https://mailarchive.ietf.org/arch/browse/auth48archive/

     *  Note: If only absolutely necessary, you may temporarily opt out 
        of the archiving of messages (e.g., to discuss a sensitive matter).
        If needed, please add a note at the top of the message that you 
        have dropped the address. When the discussion is concluded, 
        auth48archive@rfc-editor.org will be re-added to the CC list and 
        its addition will be noted at the top of the message. 

You may submit your changes in one of two ways:

An update to the provided XML file
 — OR —
An explicit list of changes in this format

Section # (or indicate Global)

OLD:
old text

NEW:
new text

You do not need to reply with both an updated XML file and an explicit 
list of changes, as either form is sufficient.

We will ask a stream manager to review and approve any changes that seem
beyond editorial in nature, e.g., addition of new text, deletion of text, 
and technical changes.  Information about stream managers can be found in 
the FAQ.  Editorial changes do not require approval from a stream manager.


Approving for publication
--------------------------

To approve your RFC for publication, please reply to this email stating
that you approve this RFC for publication.  Please use ‘REPLY ALL’,
as all the parties CCed on this message need to see your approval.


Files 
-----

The files are available here:
   https://www.rfc-editor.org/authors/rfc9797.xml
   https://www.rfc-editor.org/authors/rfc9797.html
   https://www.rfc-editor.org/authors/rfc9797.pdf
   https://www.rfc-editor.org/authors/rfc9797.txt

Diff file of the text:
   https://www.rfc-editor.org/authors/rfc9797-diff.html
   https://www.rfc-editor.org/authors/rfc9797-rfcdiff.html (side by side)

Diff of the XML: 
   https://www.rfc-editor.org/authors/rfc9797-xmldiff1.html


Tracking progress
-----------------

The details of the AUTH48 status of your document are here:
   https://www.rfc-editor.org/auth48/rfc9797

Please let us know if you have any questions.  

Thank you for your cooperation,

RFC Editor

--------------------------------------
RFC9797 (draft-ietf-madinas-use-cases-19)

Title            : Randomized and Changing MAC Address: Context, Network 
Impacts, and Use Cases
Author(s)        : J. Henry, Y. Lee
WG Chair(s)      : Carlos J. Bernardos, Juan-Carlos Zúñiga

Area Director(s) : Erik Kline, Éric Vyncke


-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to