RFC 9797
Randomized and Changing Media Access Control (MAC) Addresses: Context, Network Impacts, and Use Cases, June 2025
- File formats:
- Also available: XML file for editing
- Status:
- INFORMATIONAL
- Authors:
- J. Henry
Y. Lee - Stream:
- IETF
- Source:
- madinas (int)
Cite this RFC: TXT | XML | BibTeX
DOI: https://doi.org/10.17487/RFC9797
Discuss this RFC: Send questions or comments to the mailing list madinas@ietf.org
Other actions: Submit Errata | Find IPR Disclosures from the IETF | View History of RFC 9797
Abstract
To limit the privacy issues created by the association between a device, its traffic, its location, and its user in IEEE 802 networks, client vendors and client OS vendors have started implementing Media Access Control (MAC) address randomization. This technology is particularly important in Wi-Fi networks (defined in IEEE 802.11) due to the over-the-air medium and device mobility. When such randomization happens, some in-network states may break, which may affect network connectivity and user experience. At the same time, devices may continue using other stable identifiers, defeating the purpose of MAC address randomization.
This document lists various network environments and a range of network services that may be affected by such randomization. This document then examines settings where the user experience may be affected by in-network state disruption. Last, this document examines some existing frameworks that maintain user privacy while preserving user quality of experience and network operation efficiency.
For the definition of Status, see RFC 2026.
For the definition of Stream, see RFC 8729.