Thread Links | Date Links | ||||
---|---|---|---|---|---|
Thread Prev | Thread Next | Thread Index | Date Prev | Date Next | Date Index |
Thank you, Carol for your comments and analysis. I’ve been thinking about the device ID that is being passed could be a MAC Address. If the network (AP) assigns a MAC address as the device ID post association, or unique ID or
whatever we wanted to call it, Then on the NEXT association, the STA will utilize THAT MAC address for the duration of the association. I agree with your point that the randomization of the address would need
to be sufficient, however, This would solve the pre-association use cases as well. Flow would be per my proposed text. The STA if never seen before will pass a zero length ID. AP will then pass (in protected frames) the MAC Address that the STA should utilize
when it next connects to any AP in the ESS. This would solve the pre-association use cases, and be relatively simple to implement. The MAC address (ID) would be changed and updated per association, and thus be unable to be tracked to a single user/device
and yet the network (AP) could track the user/device across associations. Thoughts?
Kurt Lumbatis Distinguished Software Engineer DOCSIS CPE R&D SW Architecture (Wi-Fi) ARRIS AND RUCKUS
HAVE JOINED COMMSCOPE
3871 Lakefield Dr, Suwanee, GA 30024 USA
Office: +01-678-473-2921 From: Carol Ansley <carol@xxxxxxxxxx>
Hello everyone, I’m sorry that I had to leave yesterday’s call before this discussion came up. I hope that these comments aren’t irrelevant.
My viewpoint goes back to the initial problem statement, which I’ll paraphrase here: Many APs and associated back-office systems had used a device’s MAC address as a proxy for a unique identifier of the device, and by extension, a user. When devices began using RCM to improve privacy, the AP no longer recognized those devices or, by extension, those users which had ripple effects into the back office systems and the services they offered.
I see three cases of solutions from our extensive discussions. In the brief descriptions below, I tried to use the term ‘MAC address’ for the item exchanged during association that was historically a device’s
MAC address, and ‘ID’ or ‘identifier’ for a piece of information that is used to identify the device (which could be a MAC address but doesn’t have to be one). I avoided the term ‘opaque’ which seems too confusingly vague (to me at least).
Storage: Device side: list of ID(s) linked to SSID/AP(s); AP side: list of devices linked to IDs
Storage: Device side: list of MAC Address(es) linked to SSID/AP(s); AP side: list of devices linked to MAC addresses
Storage: Device side: list of identifiers linked to SSID/AP(s); AP side: list of devices linked to identifiers (encoding/decoding could be separate step)
Option 2 seems to provide the best balance of privacy protection while still accomplishing the goal of restoring functionality eroded by the spread of RCM in client devices. I am not sure if option 2 would be considered an opaque ID or not, but I don’t think that’s the right question. The question should be: what is the simplest solution we can add to restore as much of the previous functionality as possible while damaging the RCM privacy improvements the least? Regards, Carol From:
ANTONIO DE LA OLIVA DELGADO <aoliva@xxxxxxxxxx> Dear all, I would like to come back to this issue since there are multiple comments to the bh draft relaying on its re-solution. Summarizing the discussion (forgive me if I may get something wrong): - The ID may have some meaning and may be used in the authentication and for more purposes - The ID itself may be something not opaque but always when transmitted it needs to become opaque in order to protect it when used outside an authentication exchange. I can think of two ways forward: First option: May we think of two differentiated terms? maybe Persistent Identifier (PI) when not opaque and Persistent Opaque Identifier (POI) when opaque? Then in the spec we need to carefully state when we use one and when the other. (I think this is my preferred choice since it will make everything clearer) Second option: Inside 11bh we always talk about the opaque version, but we acknowledge somewhere that the ID itself, when not opaque, may have some meaning. Thoughts? I think it is relevant to close this discussion during next week's meetings. Thanks Antonio El vie, 19 ago 2022 a las 18:17, Harkins, Dan (<daniel.harkins@xxxxxxx>) escribió:
-- -- Antonio de la Oliva Please consider submitting to: - Elsevier Computer Communications. Special issue on Digital Twins for the Computer-Networks Evolution (https://tinyurl.com/mr3v9s9d) - IEEE IoT Magazine Special issue on 6G Mission-Critical Internet of Thing: Services and Enabling Technologies To unsubscribe from the STDS-802-11-TGBH list, click the following link:
https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGBH&A=1 To unsubscribe from the STDS-802-11-TGBH list, click the following link:
https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGBH&A=1 To unsubscribe from the STDS-802-11-TGBH list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGBH&A=1 |