Authors,

This is a friendly reminder that we await answers to the questions below and 
your review of the document before continuing with the publication process. 

Thank you,
RFC Editor/st

> On Jun 9, 2025, at 6:18 PM, rfc-edi...@rfc-editor.org wrote:
> 
> Authors,
> 
> While reviewing this document during AUTH48, please resolve (as necessary) 
> the following questions, which are also in the XML file.
> 
> 
> 1) <!-- [rfced] Document title
> 
> a) Please note that the title of the document has been updated as follows. We
> expanded MAC and updated "Address" to "Addresses". Let us know any concerns.
> 
> Original:
>  Randomized and Changing MAC Address: Context, Network Impacts, and Use Cases
> 
> Current:
>  Randomized and Changing Media Access Control (MAC) Addresses: Context, 
> Network Impacts, and Use Cases
> 
> b) Please review the abbreviated title and let us know if the current is okay 
> or
> if any updates would be helpful. Note that the abbreviated title only appears 
> in
> the pdf output (center of running header at the top of each page).
> 
> Original:
>  RCM Use Cases
> 
> Perhaps 1:
>  RCM
> 
> Perhaps 2:
>  RCM: Context, Network Impacts, and Use Cases
> -->
> 
> 
> 2) <!-- [rfced] Please insert any keywords (beyond those that appear in 
> the title) for use on https://www.rfc-editor.org/search.
> -->
> 
> 
> 3) <!-- [rfced] We have a couple of questions about the following text in the
> abstract.
> 
> a) Please review "client and client Operating System vendors". Is this
> correct? Or should this be updated to either "clients and OS vendors" or
> "client OS vendors"?
> 
> b) FYI - We removed the citation tags in the abstract per Section 4.3
> of RFC 7322 ("RFC Style Guide").
> 
> Original:
>   To limit the privacy issues created by the association between a
>   device, its traffic, its location, and its user in [IEEE_802]
>   networks, client and client Operating System vendors have started
>   implementing MAC address randomization.  This technology is
>   particularly important in Wi-Fi [IEEE_802.11] networks due to the
>   over-the-air medium and device mobility.
> 
> Perhaps 1:
>   To limit the privacy issues created by the association between a
>   device, its traffic, its location, and its user in IEEE 802 networks,
>   clients and OS vendors have started implementing
>   Media Access Control (MAC) address randomization.  This technology is
>   particularly important in Wi-Fi networks (defined in IEEE 802.11) due to the
>   over-the-air medium and device mobility.
> 
> Perhaps 2:
>   To limit the privacy issues created by the association between a
>   device, its traffic, its location, and its user in IEEE 802 networks,
>   client OS vendors have started implementing
>   Media Access Control (MAC) address randomization.  This technology is
>   particularly important in Wi-Fi networks (defined in IEEE 802.11) due to the
>   over-the-air medium and device mobility.
> -->
> 
> 
> 4) <!-- [rfced] We updated "two existing frameworks" to "some existing
> frameworks" because Appendix A includes three frameworks. Please review
> and let us know any concerns.
> 
> Original:
>   Last, this document
>   examines two existing frameworks to maintain user privacy while
>   preserving user quality of experience and network operation
>   efficiency.
> 
> Updated:
>   Last, this document
>   examines some existing frameworks that maintain user privacy while
>   preserving user quality of experience and network operation
>   efficiency.
> -->
> 
> 
> 5) <!-- [rfced] We're having trouble following the text within the 
> parentheses,
> specifically "also called in this document device, or machine". Would the
> following retain the original meaning?
> 
> Original:
>   At the same time, some network services rely on the end station (as
>   defined by the [IEEE_802] Standard, also called in this document
>   device, or machine) providing an identifier, which can be the MAC
>   address or another value.
> 
> Perhaps:
>   At the same time, some network services rely on the end station (as defined
>   by [IEEE_802]) to provide an identifier, which can be the MAC address or
>   another value. This document also refers to the end station
>   as a "device" or "machine".
> -->
> 
> 
> 6) <!-- [rfced] Throughout the document, we made updates to avoid using IEEE 
> citation
> tags as adjectives. Please review the diff file for these. We have
> questions about specific instances below.
> 
> a) We have updated "[IEEE_802.3] networks" as shown below. However, does this
> refer to "Ethernet networks"? If so, would further updating be helpful?
> 
> Original:
>   Although this document mainly discusses MAC-Address randomization in
>   Wi-Fi [IEEE_802.11] networks, same principles can be easily extended
>   to any [IEEE_802.3] networks.
>   ...
>   Multiple
>   services are defined for [IEEE_802.3] networks, and multiple
>   services defined by the IEEE 802.1 working group are also
>   applicable to [IEEE_802.3] networks.
> 
> Current:
>   Although this document mainly discusses MAC address randomization in
>   Wi-Fi networks [IEEE_802.11], the same principles can be easily
>   extended to any IEEE 802.3 networks [IEEE_802.3].
>   ...
>   Multiple
>   services are defined for IEEE 802.3 networks [IEEE_802.3], and multiple
>   services defined by the IEEE 802.1 working group are also
>   applicable to IEEE 802.3 networks [IEEE_802.3].
> 
> Perhaps:
>   Although this document mainly discusses MAC address randomization in
>   Wi-Fi networks [IEEE_802.11], the same principles can be easily
>   extended to Ethernet networks [IEEE_802.3].
>   ...
>   Multiple
>   services are defined for Ethernet networks [IEEE_802.3], and multiple
>   services defined by the IEEE 802.1 working group are also
>   applicable to Ethernet networks [IEEE_802.3].
> 
> 
> b) We updated "[IEEE_802.11] or Wi-Fi" and "[IEEE_802.3] or Ethernet" as
> follows. Let us know any concerns.
> 
> Original:
>   2.  Other network devices operating at the MAC layer: many wireless
>       network access devices (e.g., [IEEE_802.11] access points) are
>       conceived as layer-2 devices, and as such, they bridge a frame
>       from one medium (e.g., [IEEE_802.11] or Wi-Fi) to another (e.g.,
>       [IEEE_802.3] or Ethernet).
> 
> Updated:
>   2.  Other network devices operating at the MAC layer: many wireless
>       network access devices (e.g., access points [IEEE_802.11]) are
>       conceived as Layer 2 devices, and as such, they bridge a frame
>       from one medium (e.g., Wi-Fi [IEEE_802.11]) to another (e.g.,
>       Ethernet [IEEE_802.3]).
> -->
> 
> 
> 7) <!-- [rfced] Will it be clear to readers what was initially intended as a
> 48-bit value? The MAC layer, the MAC address, or something else?
> 
> Original:
>   Initially intended as a 48-bit (6 octets) value in the first versions
>   of the [IEEE_802.3] Standard, other Standards under the [IEEE_802.3]
>   umbrella allow this address to take an extended format of 64 bits (8
>   octets) which enable a larger number of MAC addresses to coexist as
>   the 802.3 technologies became widely adopted.
> 
> Perhaps:
>   In the first versions of [IEEE_802.3], the MAC layer was intended to be a
>   48-bit (6-octet) value, but other standards under the IEEE 802.3
>   umbrella [IEEE_802.3] allow this address to take an extended format of 64 
> bits (8
>   octets), which enabled a larger number of MAC addresses to coexist as
>   the 802.3 technologies became widely adopted.
> 
> Or:
>   In the first versions of [IEEE_802.3], the MAC address was intended to be a
>   48-bit (6-octet) value, but other standards under the IEEE 802.3
>   umbrella [IEEE_802.3] allow this address to take an extended format of 64 
> bits (8
>   octets), which enabled a larger number of MAC addresses to coexist as
>   the 802.3 technologies became widely adopted.
> -->
> 
> 
> 8) <!-- [rfced] How may we clarify "to register to IEEE" here? Does the IEEE
> require the registration, or is the IEEE where these addresses are
> registered?
> 
> Original:
>   Note that universally administered MAC addresses are
>   required to register to IEEE while locally administered MAC addresses
>   are not.
> 
> Perhaps 1:
>   Note that universally administered MAC addresses are
>   required to be registered with the IEEE, while locally administered MAC 
> addresses
>   are not.
> 
> Perhaps 2:
>   Note that the IEEE requires that universally administered MAC addresses
>   be registered, but registration of locally administered MAC addresses
>   is not required.
> -->
> 
> 
> 9) <!-- [rfced] It seems that the definitions for "shared service device" and
> "personal device" appear in Section 6.2 of [IEEE_802E] (not Section 6.2
> of [IEEE_802]). We updated the introductory sentence below
> accordingly. Please review.
> 
> Original:
>   However, the same
>   evolution brought the distinction between two types of devices that
>   the [IEEE_802] Standard generally referred to as 'nodes in a
>   network'. Their definition is found in the [IEEE_802E] Recommended
>   Practice stated in Section 6.2 of [IEEE_802].
> 
> Current:
>   However, the same
>   evolution brought the distinction between two types of devices that
>   [IEEE_802] generally refers to as "nodes in a
>   network" (see Section 6.2 of [IEEE_802E] for definitions of these devices):
> -->
> 
> 
> 10) <!-- [rfced] We are having trouble understanding the text in parentheses 
> in the
> sentence below. Please clarify.
> 
> Original:
>   For most of them, and in
>   particular for [IEEE_802.11], the source and destination MAC
>   addresses are not encrypted even in networks that implement
>   encryption (so that each machine can easily detect if it is the
>   intended target of the message before attempting to decrypt its
>   content, and also identify the transmitter, to use the right
>   decryption key when multiple unicast keys are in effect).
> 
> Perhaps:
>   For most of them ([IEEE_802.11] in
>   particular), the source and destination MAC
>   addresses are not encrypted even in networks that implement
>   encryption. Thus, each machine can easily detect if it is the
>   intended target of the message before attempting to decrypt its
>   content and can also identify the transmitter in order to use the right
>   decryption key when multiple unicast keys are in effect.
> -->
> 
> 
> 11) <!-- [rfced] Is "device MAC" correct here, or should it be updated to 
> "device
> MAC address"?
> 
> Original:
>       As a device changes its network attachment (roams) from one
>       access point to another, the access points can exchange
>       contextual information, (e.g., device MAC, keying material),
>       allowing the device session to continue seamlessly.
> 
> Perhaps:
>       As a device changes its network attachment (roams) from one
>       access point to another, the access points can exchange
>       contextual information (e.g., device MAC address and keying material),
>       allowing the device session to continue seamlessly.
> -->
> 
> 
> 12) <!-- [rfced] We are having trouble parsing this sentence, especially "to 
> other
> mediums than [IEEE_802.3] (e.g., DOCSIS [DOCSIS]), which also
> implements". How may we update to improve clarity?
> 
> Original:
>   Wireless access points may
>   also connect to other mediums than [IEEE_802.3] (e.g., DOCSIS
>   [DOCSIS]), which also implements mechanisms under the umbrella of
>   the general 802 Standard, and therefore expect the unique and
>   persistent association of a MAC address to a device.
> 
> Perhaps:
>   Wireless access points may
>   also connect using other mediums (e.g., the Data-Over-Cable Service 
> Interface Specification (DOCSIS)
>   [DOCSIS]) that implement mechanisms under the umbrella of
>   the general 802 Standard and therefore expect the unique and
>   persistent association of a MAC address to a device.
> -->
> 
> 
> 13) <!-- [rfced] We updated "wireless 802-technologies exchanges" as follows. 
> Let
> us know if this is incorrect.
> 
> Original:
>   as the transmitting or receiving
>   MAC address is usually not encrypted in wireless 802-technologies
>   exchanges, and as any protocol-compatible device in range of the
>   signal can read the frame header.
> 
> Updated:
>   The transmitting or receiving MAC
>   address is usually not encrypted in wireless exchanges in IEEE 802 
> technologies,
>   and any protocol-compatible device in range of the
>   signal can read the frame header.
> -->
> 
> 
> 14) <!-- [rfced] We updated the text in parentheses as follows for clarity. 
> Please
> review to ensure that the updated text accurately conveys the intended
> meaning.
> 
> Original:
>  The device MAC address is not visible anymore
>  unless a mechanism copies the MAC address into a field that can
>  be read while the packet travels onto the next segment (e.g.,
>  pre- [RFC4941] and pre-[RFC7217] IPv6 addresses built from the
>  MAC address).
> 
> Updated:
>  The device MAC address is not visible anymore
>  unless a mechanism copies the MAC address into a field that can
>  be read while the packet travels to the next segment (e.g.,
>  IPv6 addresses built from the MAC address prior to the use of the methods 
> defined in
>  [RFC4941] and [RFC7217]).
> -->
> 
> 
> 15) <!-- [rfced] We have two questions about the text below.
> 
> a) In the sentence introducing the list, how may we clarify "what trust"?  Is
> the intent "the degree of trust"?
> 
> b) Is text about "environment" needed in these descriptions of Full trust,
> Selective trust, and Zero trust?
> 
> Original:
>   It is useful to distinguish what trust a
>   personal device may establish with the different entities at play in
>   a network domain where a MAC address may be visible:
> 
>   1.  Full trust: there is environment where a device establishes a
>       trust relationship, and the device can share its persistent MAC
>       address with the access network devices (e.g., access point and
>       WLAN Controller).  In this environment, the network provides
>       necessary security measures to prevent observers or network
>       actors from accessing PII.  The device (or its user) also has
>       confidence that its MAC address is not shared beyond the layer-2
>       broadcast domain boundary.
> 
>   2.  Selective trust: in another environment, depending on the pre-
>       defined privacy policies, a device may decide to use one pseudo-
>       persistent MAC address for a set of network elements and another
>       pseudo-persistent MAC address for another set of network
>       elements.  Examples of privacy policies can be SSID and BSSID
>       combination, a particular time-of-day, or a pre-set time
>       duration.
> 
>   3.  Zero trust: in another environment, a device may randomize its
>       MAC address with any local entity reachable through the AP.  It
>       may generate a temporary MAC address to each of them.  That
>       temporary MAC address may or may not be the same for different
>       services.
> 
> Perhaps:
>   It is useful to distinguish the degree of trust that a personal
>   device may establish with the different entities at play in a network
>   domain where a MAC address may be visible:
> 
>   1.  Full trust: The device establishes a
>       trust relationship and shares its persistent MAC
>       address with the access network devices (e.g., access point and
>       WLAN controller).  The network provides
>       necessary security measures to prevent observers or network
>       actors from accessing PII.  The device (or its user) also has
>       confidence that its MAC address is not shared beyond the Layer 2
>       broadcast domain boundary.
> 
>   2.  Selective trust: Depending on the
>       predefined privacy policies, a device may decide to use one
>       pseudo-persistent MAC address for a set of network elements and
>       another pseudo-persistent MAC address for another set of network
>       elements.  Examples of privacy policies can be a combination of
>       Service Set Identifier (SSID) and Basic Service Set Identifier
>       (BSSID), a particular time of day, or a preset time duration.
> 
>   3.  Zero trust: A device may randomize its
>       MAC address with any local entity reachable through the AP.  It
>       may generate a temporary MAC address to each of them.  That
>       temporary MAC address may or may not be the same for different
>       services.
> -->
> 
> 
> 16) <!-- [rfced] The title of Section 5 is "Environment" (we updated to the 
> plural
> "Environments"). However, the title of Table 1 within this section is
> "Use Cases". Please review the use of "environment" and "use case"
> throughout the document, and let us know if any updates would be helpful.
> -->
> 
> 
> 17) <!-- [rfced] Will readers know what "it" refers to in the second and third
> sentences below?
> 
> Original:
>   Most devices in the
>   network only require simple connectivity so that the network
>   services are simple.  For network support, it is also simple.  It
>   is usually related to Internet connectivity.
> -->
> 
> 
> 18) <!-- [rfced] "Reverse Address Resolution Protocol (RARP)" does not appear 
> to
> be mentioned in [RFC826]. It was defined in RFC 903
> (https://www.rfc-editor.org/info/rfc903). Are any updates are needed
> here? Perhaps [RFC826] should be used for ARP and [RFC903] for RARP?
> 
> Original:
>   MAC address randomization
>   can cause MAC address cache exhaustion, but also the need for
>   frequent Address Resolution Protocol (ARP), Reverse Address
>   Resolution Protocol (RARP) [RFC826], Neighbor Solicitation and,
>   Neighbor Advertisement [RFC4861] exchanges.
> 
> Perhaps:
>   MAC address randomization
>   can cause MAC address cache exhaustion but also the need for frequent
>   Address Resolution Protocol (ARP) [RFC826], Reverse Address Resolution
>   Protocol (RARP) [RFC903], and Neighbor Solicitation and Neighbor
>   Advertisement [RFC4861] exchanges.
> -->
> 
> 
> 19) <!-- [rfced] We do not see "industrial environment" in Section 5. Is the
> intent here "managed enterprises (environment type E in Section 5)"?
> Please review and let us know if any updates would be helpful.
> 
> Original:
>   In industrial environments, policies are associated with each group
>   of objects, including IoT devices.
> -->
> 
> 
> 20) <!-- [rfced] We made updates to many of the IEEE references (e.g., title 
> and
> DOI). Please review for correctness.
> -->
> 
> 
> 21) <!-- [rfced] FYI - The following reference has been superseded; we 
> updated to
> the most current version. Please review and confirm that this is
> correct.
> 
> Original:
>   [IEEE_802.3]
>              "IEEE 802.3-2018 - IEEE Standard for Ethernet", IEEE
>              802.3 , 31 August 2018,
>              <https://standards.ieee.org/ieee/802.3/7071/>.
> 
> Updated:
>   [IEEE_802.3]
>              IEEE, "IEEE Standard for Ethernet", IEEE Std 802.3-2022,
>              DOI 10.1109/IEEESTD.2022.9844436, 29 July 2022,
>              <https://ieeexplore.ieee.org/document/9844436>.
> -->
> 
> 
> 22) <!-- [rfced] FYI - For the following reference entry, we updated the 
> title to
> match the document itself. Please let us know if there is objection.
> 
> Original:
>   [DOCSIS]   "DOCSIS 4.0 Physical Layer Specification Version I06, DOI
>              CM-SP-CM-OSSIv4.0", CableLabs DOCSIS , March 2022,
>              <https://www.cablelabs.com/specifications/CM-SP-CM-
>              OSSIv4.0?v=I06>.
> 
> Updated:
>   [DOCSIS]   CableLabs, "Cable Modem Operations Support System
>              Interface Specification", Data-Over-Cable Service
>              Interface Specifications, DOCSIS 4.0, Version I06, March
>              2022, <https://www.cablelabs.com/specifications/CM-SP-CM-
>              OSSIv4.0?v=I06>.
> -->
> 
> 
> 23) <!-- [rfced] For [IEEE_802.11bh], the link provided goes to an "Inactive -
> Draft" standard. We were unable to find an active version of this
> reference. Is there an active draft you would prefer to reference?
> 
> For now, we have updated this reference with the information available at the
> URL.
> 
> Original:
>   [IEEE_802.11bh]
>              "IEEE 802.11bh-2023 - Wireless LAN Medium Access Control
>              (MAC) and Physical Layer (PHY) Specifications Amendment 8
>              : Operation with Randomized and Changing MAC Addresses",
>              IEEE 802.11bh , 19 July 2023,
>              <https://ieeexplore.ieee.org/document/10214483>.
> 
> Current:
>   [IEEE_802.11bh]
>              IEEE, "IEEE Draft Standard for Information Technology-
>              Telecommunications and Information Exchange Between
>              Systems Local and Metropolitan Area Networks - Specific
>              Requirements - Part 11: Wireless LAN Medium Access Control
>              (MAC) and Physical Layer (PHY) Specifications Amendment 8:
>              Operation with Randomized and Changing MAC Addresses",
>              IEEE P802.11bh/D1.0, 19 July 2023,
>              <https://ieeexplore.ieee.org/document/10214483>.
> -->
> 
> 
> 24) <!-- [rfced] Is "client device operating system vendor" correct here? We 
> see
> "client OS vendor" elsewhere in the document.
> 
> Original:
>   Most client device operating system vendors offer RCM schemes,
>   enabled by default (or easy to enable) on client devices.
> 
> Perhaps:
>   Most client OS vendors offer RCM schemes that are
>   enabled by default (or easy to enable) on client devices.
> -->
> 
> 
> 25) <!-- [rfced] Terminology
> 
> a) We see the following forms in the document. We updated to "MAC
> address" for consistency.
> 
> MAC Address
> MAC-Address
> MAC address
> 
> 
> b) We see the forms below used in the document. Should these be
> uniform? If so, please let us know which form is preferred. Another option
> (not used in the document) is "MAC address of the device" and "MAC address of
> the wireless device".
> 
> device MAC address
> device's MAC address
> 
> device wireless MAC address
> device's wireless MAC address
> -->
> 
> 
> 26) <!-- [rfced] Abbreviations
> 
> a) FYI - We added expansions for the following abbreviations
> per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review each
> expansion in the document carefully to ensure correctness.
> 
>   BSSID - Basic Service Set Identifier
>   DOCSIS - Data-Over-Cable Service Interface Specification
>   DSCP - Differentiated Services Code Point
>   ECN - Explicit Congestion Notification
>   MAC - Media Access Control 
>   SLAAC - Stateless Address Autoconfiguration
>   SSID - Service Set Identifier
> 
> b) How may we expand AR and VR in the following sentence?
> 
> Original:
>   Larger and more complex
>   networks can also incorporate more advanced services, from AAA to
>   AR/VR applications.
> 
> Perhaps:
>   Larger and more complex
>   networks can also incorporate more advanced services, from AAA to
>   Augmented Reality (AR) or Virtual Reality (VR) applications.
> -->
> 
> 
> 27) <!-- [rfced] Please review the "Inclusive Language" portion of the online 
> Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
> and let us know if any changes are needed. Updates of this nature typically
> result in more precise language, which is helpful for readers.
> 
> Note that our script did not flag any words in particular, but this should 
> still be reviewed as a best practice.
> 
> In addition, please consider whether "tradition" should be updated for
> clarity. While the NIST website indicates that this term is potentially
> biased, it is also ambiguous. "Tradition" is a subjective term, as it is not
> the same for everyone. See 
> <https://web.archive.org/web/20250214092458/https://www.nist.gov/nist-research-library/nist-technical-series-publications-author-instructions#table1>.
> 
> Original:
>   The federation structure extends the type
>   of authorities that can be used as identity sources (compared to
>   traditional enterprise-based 802.1X [IEEE_802.1X] scheme for Wi-Fi),
>   and facilitates the establishment of trust between local networks and
>   an identity provider.
> -->
> 
> 
> Thank you.
> 
> RFC Editor/st/rv
> 
> 
> 
> 
> On Jun 9, 2025, at 4:12 PM, rfc-edi...@rfc-editor.org wrote:
> 
> *****IMPORTANT*****
> 
> Updated 2025/06/09
> 
> RFC Author(s):
> --------------
> 
> Instructions for Completing AUTH48
> 
> Your document has now entered AUTH48.  Once it has been reviewed and 
> approved by you and all coauthors, it will be published as an RFC.  
> If an author is no longer available, there are several remedies 
> available as listed in the FAQ (https://www.rfc-editor.org/faq/).
> 
> You and you coauthors are responsible for engaging other parties 
> (e.g., Contributors or Working Group) as necessary before providing 
> your approval.
> 
> Planning your review 
> ---------------------
> 
> Please review the following aspects of your document:
> 
> *  RFC Editor questions
> 
>   Please review and resolve any questions raised by the RFC Editor 
>   that have been included in the XML file as comments marked as 
>   follows:
> 
>   <!-- [rfced] ... -->
> 
>   These questions will also be sent in a subsequent email.
> 
> *  Changes submitted by coauthors 
> 
>   Please ensure that you review any changes submitted by your 
>   coauthors.  We assume that if you do not speak up that you 
>   agree to changes submitted by your coauthors.
> 
> *  Content 
> 
>   Please review the full content of the document, as this cannot 
>   change once the RFC is published.  Please pay particular attention to:
>   - IANA considerations updates (if applicable)
>   - contact information
>   - references
> 
> *  Copyright notices and legends
> 
>   Please review the copyright notice and legends as defined in
>   RFC 5378 and the Trust Legal Provisions 
>   (TLP – https://trustee.ietf.org/license-info).
> 
> *  Semantic markup
> 
>   Please review the markup in the XML file to ensure that elements of  
>   content are correctly tagged.  For example, ensure that <sourcecode> 
>   and <artwork> are set correctly.  See details at 
>   <https://authors.ietf.org/rfcxml-vocabulary>.
> 
> *  Formatted output
> 
>   Please review the PDF, HTML, and TXT files to ensure that the 
>   formatted output, as generated from the markup in the XML file, is 
>   reasonable.  Please note that the TXT will have formatting 
>   limitations compared to the PDF and HTML.
> 
> 
> Submitting changes
> ------------------
> 
> To submit changes, please reply to this email using ‘REPLY ALL’ as all 
> the parties CCed on this message need to see your changes. The parties 
> include:
> 
>   *  your coauthors
> 
>   *  rfc-edi...@rfc-editor.org (the RPC team)
> 
>   *  other document participants, depending on the stream (e.g., 
>      IETF Stream participants are your working group chairs, the 
>      responsible ADs, and the document shepherd).
> 
>   *  auth48archive@rfc-editor.org, which is a new archival mailing list 
>      to preserve AUTH48 conversations; it is not an active discussion 
>      list:
> 
>     *  More info:
>        
> https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
> 
>     *  The archive itself:
>        https://mailarchive.ietf.org/arch/browse/auth48archive/
> 
>     *  Note: If only absolutely necessary, you may temporarily opt out 
>        of the archiving of messages (e.g., to discuss a sensitive matter).
>        If needed, please add a note at the top of the message that you 
>        have dropped the address. When the discussion is concluded, 
>        auth48archive@rfc-editor.org will be re-added to the CC list and 
>        its addition will be noted at the top of the message. 
> 
> You may submit your changes in one of two ways:
> 
> An update to the provided XML file
> — OR —
> An explicit list of changes in this format
> 
> Section # (or indicate Global)
> 
> OLD:
> old text
> 
> NEW:
> new text
> 
> You do not need to reply with both an updated XML file and an explicit 
> list of changes, as either form is sufficient.
> 
> We will ask a stream manager to review and approve any changes that seem
> beyond editorial in nature, e.g., addition of new text, deletion of text, 
> and technical changes.  Information about stream managers can be found in 
> the FAQ.  Editorial changes do not require approval from a stream manager.
> 
> 
> Approving for publication
> --------------------------
> 
> To approve your RFC for publication, please reply to this email stating
> that you approve this RFC for publication.  Please use ‘REPLY ALL’,
> as all the parties CCed on this message need to see your approval.
> 
> 
> Files 
> -----
> 
> The files are available here:
>   https://www.rfc-editor.org/authors/rfc9797.xml
>   https://www.rfc-editor.org/authors/rfc9797.html
>   https://www.rfc-editor.org/authors/rfc9797.pdf
>   https://www.rfc-editor.org/authors/rfc9797.txt
> 
> Diff file of the text:
>   https://www.rfc-editor.org/authors/rfc9797-diff.html
>   https://www.rfc-editor.org/authors/rfc9797-rfcdiff.html (side by side)
> 
> Diff of the XML: 
>   https://www.rfc-editor.org/authors/rfc9797-xmldiff1.html
> 
> 
> Tracking progress
> -----------------
> 
> The details of the AUTH48 status of your document are here:
>   https://www.rfc-editor.org/auth48/rfc9797
> 
> Please let us know if you have any questions.  
> 
> Thank you for your cooperation,
> 
> RFC Editor
> 
> --------------------------------------
> RFC9797 (draft-ietf-madinas-use-cases-19)
> 
> Title            : Randomized and Changing MAC Address: Context, Network 
> Impacts, and Use Cases
> Author(s)        : J. Henry, Y. Lee
> WG Chair(s)      : Carlos J. Bernardos, Juan-Carlos Zúñiga
> 
> Area Director(s) : Erik Kline, Éric Vyncke
> 
> 

-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to