Pascal Thubert \(pthubert\) <[email protected]> wrote:
    > Hello Dave and all:

    > So far I have not seen how the MAC randomization deals with:

    > - differentiated environments - the preferred behavior on a highway or
    > at a coffee shop may differ from that at in a corporate or a DC
    > network. In the corporate network, we can expect something like .1x to
    > undo the privacy, for good reasons. And we can expect state to be
    > maintained for each IP and each MAC. When a MAC changes, there can be
    > unwanted state created and remaining in the DHCP server, LISP MSMR,
    > SAVI switch,  etc... Privacy MAC is only an additional hassle that we
    > want to minimize.

If we can assume 802.1X using an Enterprise scheme, and using a TLS1.3
substrate, then if the identity resides in a (Client) TLS Certificate, it
will not been by a passive attacker.

The MAC address is outside of the WEP encryption, so it is always seen, even
if the traffic is otherwise encrypted.

An EAP-*TLS based upon TLS1.2 would reveal the identity, at least the first
time.  Perhaps this is a reason to support resumption tokens in EAP-TLS!

--
Michael Richardson <[email protected]>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide




Attachment: signature.asc
Description: PGP signature

_______________________________________________
Int-area mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to