<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-housley-lamps-macaddress-on-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.1 -->
  <front>
    <title>Media Access Control (MAC) Addresses in X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-housley-lamps-macaddress-on-00"/>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <author initials="C." surname="Bonnell" fullname="Corey Bonnell">
      <organization abbrev="DigiCert">DigiCert, Inc.</organization>
      <address>
        <email>corey.bonnell@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Mandel" fullname="Joe Mandel">
      <organization abbrev="AKAYLA">AKAYLA, Inc.</organization>
      <address>
        <email>joe@akayla.com</email>
      </address>
    </author>
    <author initials="T." surname="Okubo" fullname="Tomofumi Okubo">
      <organization abbrev="Penguin Securities">Penguin Securities Pte. Ltd.</organization>
      <address>
        <email>tomofumi.okubo+ietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="September" day="15"/>
    <area>Security</area>
    <workgroup>Limited Additional Mechanisms for PKIX and SMIME</workgroup>
    <keyword>MACsec</keyword>
    <keyword>802.1AE</keyword>
    <keyword>X.509</keyword>
    <keyword>SubjectAltName</keyword>
    <abstract>
      <?line 92?>

<t>This document defines a new otherName for inclusion in the X.509 Subject Alternative Name (SAN) extension to carry an IEEE Media Access Control (MAC) address. The new name form makes it possible to
bind a layer‑2 interface identifier to a public key certificate. This is needed for secure onboarding and key establishment protocols that operate below the network layer, such as IEEE 802.1AE (MACsec).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://CBonnell.github.io/draft-housley-lamps-macaddress-on/draft-housley-lamps-macaddress-on.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-housley-lamps-macaddress-on/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Limited Additional Mechanisms for PKIX and SMIME Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/CBonnell/draft-housley-lamps-macaddress-on"/>.</t>
    </note>
  </front>
  <middle>
    <?line 97?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>IEEE 802.1AE <xref target="IEEE802.1AE"/> provides point‑to‑point link‑layer data confidentiality and integrity ("MACsec"). Deployments that use X.509 certificates for MACsec key establishment frequently need to bind a Media Access Control (MAC) address to a public key when devices lack a stable IP address or operate in media where IP addressing is not yet available. The Subject Alternative Name (SAN) and Issuer Alternative Name (IAN) extensions defined in <xref target="RFC5280"/> allows an X.509 certificate to contain multiple name forms, but no standard name form exists for MAC addresses.</t>
      <t>This document defines a new otherName form "MACAddress". The name form carries either a 48‑bit IEEE 802 MAC address (EUI‑48) or a 64‑bit extended identifier (EUI‑64) in an OCTET STRING. Additionally, the name form also can convey constraints on EUI-48 or EUI-64 values when included in the Name Constraints extension defined in <xref target="RFC5280"/>. The new name form enables certificate‑based authentication at layer 2 and facilitates secure provisioning in Internet‑of‑Things and automotive networks.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="macaddress-othername">
      <name>MACAddress otherName</name>
      <t>The new name form is identified by the object identifier (OID) id‑on‑MACAddress (TBD1). The name form has variants to convey a EUI-48 as an OCTET STRING comprising of 6 octets, or a EUI-64 as an OCTET STRING comprising of 8 octets. Constraints on EUI-48 and EUI-64 values are conveyed as N-bit bit patterns, where the bit pattern establishes a constraint on the upper N bits of a EUI-48 or EUI-64 value.</t>
      <t>The following sub-sections describe how to encode EUI-48 and EUI-64 values and their corresponding constraints.</t>
      <section anchor="encoding-a-macaddress-as-an-alternative-name">
        <name>Encoding a MACAddress as an alternative name</name>
        <t>When the name form is included in a Subject Alternative Name or Issuer Alternate Name extension, the syntax consists of exactly six or eight octets. Values are encoded with the most significant octet encoded first ("big-endian" or "left-to-right" encoding). No text representation is permitted in the certificate, as human‑readable forms such as "00‑24‑98‑7B‑19‑02" or "0024.987B.1902" are used only in management interfaces. When a device natively possesses a 48‑bit MAC identifier, the CA <bcp14>MUST</bcp14> encode it using a 6‑octet OCTET STRING as the MACAddress value. When the device’s factory identifier is a 64‑bit EUI‑64 or when no canonical 48‑bit form exists, the CA <bcp14>MUST</bcp14> encode it using an 8‑octet OCTET STRING as the MACAddress value. The <tt>macAddress48Constraint</tt> and <tt>macAddress64Constraint</tt> tagged BIT STRING arms of <tt>MACAddress</tt> <bcp14>MUST NOT</bcp14> be used.</t>
      </section>
      <section anchor="encoding-a-macaddress-constraint">
        <name>Encoding a MACAddress constraint</name>
        <t>When the name form is included in the Name Constraints extension, the syntax consists of a context-specific, implicitly tagged BIT STRING that specifies a N-bit bit pattern. Bit patterns representing the constraint are encoded with the most significant bit encoded first ("big-endian" or "left-to-right" encoding). Constraints on EUI-48 values <bcp14>MUST</bcp14> be encoded using the <tt>macAddress48Constraint</tt> arm of MACAddress. Likewise, constraints on EUI-64 values <bcp14>MUST</bcp14> be encoded using the <tt>macAddress64Constraint</tt> arm of MACAddress. The <tt>macAddress</tt> OCTET STRING arm of <tt>MACAddress</tt> <bcp14>MUST NOT</bcp14> be used.</t>
        <t>When a constraint is included in the <tt>permittedSubtrees</tt> field of a Name Constraints extension, certificates containing a MACAddress name form of the specific identifier type (EUI-48 or EUI-64) that are issued by the Certification Authority are trusted only when the upper N bits of the value are binary equal to the pattern. When a constraint is included in the <tt>excludedSubtrees</tt> field of a Name Constraints extension, certificates containing a MACAddress name form of the specific identifier type (EUI-48 or EUI-64) that are issued by the Certification Authority are trusted only when the upper N bits of the value are not binary equal to the pattern.</t>
      </section>
      <section anchor="generation-and-validation-rules">
        <name>Generation and Validation Rules</name>
        <t>A certificate <bcp14>MAY</bcp14> include one or more MACAddress otherName values if and only if the subject device owns (or is expected to own) the corresponding MAC address for the certificate lifetime. MAC addresses <bcp14>SHOULD NOT</bcp14> appear in more than one valid certificate issued by the same Certification Authority (CA) at the same time, unless different layer‑2 interfaces share a public key.</t>
        <t>A Relying party that matches a presented MAC address to a certificate <bcp14>SHALL</bcp14> perform a byte‑for‑byte comparison of the OCTET STRING contents. Canonicalization, case folding, or removal of delimiter characters <bcp14>MUST NOT</bcp14> be performed.</t>
        <t>Wildcards are not supported.</t>
        <t>Self‑signed certificates that carry a MACAddress otherName <bcp14>SHOULD</bcp14> include the address of one of the device’s physical ports.</t>
      </section>
      <section anchor="name-constraints-processing">
        <name>Name Constraints Processing</name>
        <t>The MACAddress otherName follows the general rules for otherName constraints in RFC 5280, Section 4.2.1.10. A name constraints extension <bcp14>MAY</bcp14> impose permittedSubtrees and excludedSubtrees on id‑on‑MACAddress.</t>
        <t>A constraint that is represented as a <tt>macAddress48Constraint</tt> is relevant only to <tt>macAddress</tt> values that are encoded using 6 octets; such a constraint is ignored for <tt>macAddress</tt> values that are encoded using 8 octets. Likewise, a constraint that is represented as a <tt>macAddress64Constraint</tt> is relevant only to <tt>macAddress</tt> values that are encoded using 8 octets; such a constraint is ignored for <tt>macAddress</tt> values that are encoded using 6 octets.</t>
        <t>To determine if a constraint matches a given name value, the certificate-consuming application performs an exclusive OR (XOR) operation of the N-bit bit pattern of the constraint and the upper N bits of the <tt>macAddress</tt> OCTET STRING value. If the result of the XOR operation is a bit string consisting of entirely zeros, then the name matches the constraint. Conversely, if the result of the operation is a bit string with at least one bit asserted, then the name does not match the constraint.</t>
        <t>The first octet of a MAC address contains two flag bits.</t>
        <ul spacing="normal">
          <li>
            <t>I/G bit (bit 0) – 0 = unicast, 1 = multicast.  Multicast prefixes are never OUIs.</t>
          </li>
          <li>
            <t>U/L bit (bit 1) – 0 = universal (IEEE‑assigned), 1 = local.</t>
          </li>
        </ul>
        <t>These flags let the implementations exclude multicast and local prefixes but still cannot prove that a 24‑bit value is an IEEE‑registered OUI. 36‑bit CIDs share the same first 24 bits and enterprises <bcp14>MAY</bcp14> deploy pseudo‑OUIs. CAs <bcp14>MUST</bcp14> include only prefixes the subscriber legitimately controls (registered OUI or CID).  Before issuing a certificate that contains a MACAddress or a name constraint based on such a prefix, the CA <bcp14>MUST</bcp14> verify that control—for example, by consulting the IEEE registry or reviewing manufacturer documentation.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The binding of a MAC address to a certificate is only as strong as the CA’s validation process. CAs <bcp14>MUST</bcp14> verify that the subscriber legitimately controls or owns the asserted MAC address.</t>
      <t>Some systems dynamically assign or share MAC addresses. Such practices can undermine the uniqueness and accountability that this name form aims to provide.</t>
      <t>Unlike IP addresses, MAC addresses are not typically routed across layer 3 boundaries. Relying parties in different broadcast domains <bcp14>SHOULD NOT</bcp14> assume uniqueness beyond their local network.</t>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t>A MAC address can uniquely identify a physical device and by extension, its user. Certificates that embed unchanging MAC addresses facilitate long‑term device tracking. Deployments that use the MACAddress name <bcp14>SHOULD</bcp14> consider rotating addresses, using temporary certificates, or employing MAC Address Randomization where feasible.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to make the following assignments in the “SMI Security for PKIX Module Identifier” (1.3.6.1.5.5.7.0) registry</t>
      <artwork><![CDATA[
    +=========+====================================+============+
    | Decimal | Description                        | References |
    +=========+====================================+============+
    | TBD0    | id-mod-mac-address-other-name-2025 | This doc   |
    +---------+------------------------------------+------------+
]]></artwork>
      <t>IANA is requested to make the following assignment in the “SMI Security for PKIX Other Name Forms” (1.3.6.1.5.5.7.8) registry</t>
      <artwork><![CDATA[
    +=========+=================================+============+
    | Decimal | Description                     | References |
    +=========+=================================+============+
    | TBD1    | id-on-MACAddress                | THis doc   |
    +---------+---------------------------------+------------+
]]></artwork>
    </section>
    <section anchor="asn1-module">
      <name>ASN.1 Module</name>
      <t>This Appendix contains the ASN.1 Module for the MAC Address; it follows the conventions established by <xref target="RFC5912"/>.</t>
      <artwork><![CDATA[
MACAddressOtherName-2025
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-mac-address-other-name-2025(TBD0) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
  OTHER-NAME FROM PKIX1Implicit-2009
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkix1-implicit-02(59) }

 id-pkix FROM PKIX1Explicit-2009
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-mod(0)
     id-mod-pkix1-explicit-02(51) } ;

-- id-pkix 8 is the otherName arc
id-on  OBJECT IDENTIFIER ::= { id-pkix 8 }

-- OID for this name form
id-on-MACAddress OBJECT IDENTIFIER ::= { id-on TBD1 }

-- Contents of the otherName field
MACAddressOtherNames OTHER-NAME ::= { on-MACAddress, ... }

on-MACAddress OTHER-NAME ::= {
MACAddress IDENTIFIED BY id-on-MACAddress }

MACAddress ::= CHOICE {
  -- 48-bit EUI-48 or 64-bit EUI-64
  macAddress OCTET STRING (SIZE (6 | 8)),
  -- constraint on the upper bits of a 48-bit EUI-48
  macAddress48Constraint [0] BIT STRING (SIZE (1..48)),
  -- constraint on the upper bits of a 64-bit EUI-64
  macAddress64Constraint [1] BIT STRING (SIZE (1..64))
}

END
]]></artwork>
    </section>
    <section anchor="mac-address-othername-examples">
      <name>MAC Address otherName Examples</name>
      <t>The following is a human‑readable summary of the Subject Alternative
Name extension from a certificate containing a single MACAddress
otherName with value 00‑24‑98‑7B‑19‑02:</t>
      <artwork><![CDATA[
  SEQUENCE {
    otherName [0] {
      OBJECT IDENTIFIER id-on-MACAddress (TBD)
      [0] OCTET STRING '0024987B1902'H
    }
  }
]]></artwork>
      <t>An EUI‑64 example (AC‑DE‑48‑00‑11‑22‑33‑44):</t>
      <artwork><![CDATA[
  [0] OCTET STRING 'ACDE480011223344'H
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC5280">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper"/>
          <author fullname="S. Santesson" initials="S." surname="Santesson"/>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <author fullname="W. Polk" initials="W." surname="Polk"/>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="RFC5912">
        <front>
          <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <date month="June" year="2010"/>
          <abstract>
            <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5912"/>
        <seriesInfo name="DOI" value="10.17487/RFC5912"/>
      </reference>
      <reference anchor="IEEE802.1AE">
        <front>
          <title>IEEE Standard for Local and metropolitan area networks - Media Access Control (MAC) Security</title>
          <author>
            <organization abbrev="IEEE">Institute of Electrical and Electronics Engineers</organization>
          </author>
          <date year="2018" month="December" day="21"/>
        </front>
        <seriesInfo name="IEEE" value="802-1ae-2018"/>
        <seriesInfo name="DOI" value="10.1109/IEEESTD.2018.8585421"/>
      </reference>
      <reference anchor="X680" target="https://www.itu.int/rec/T-REC-X.680">
        <front>
          <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
          <author>
            <organization>ITU-T</organization>
          </author>
          <date year="2021" month="February"/>
        </front>
        <seriesInfo name="ITU-T Recommendation" value="X.680"/>
        <seriesInfo name="ISO/IEC" value="8824-1:2021"/>
      </reference>
      <reference anchor="X690" target="https://www.itu.int/rec/T-REC-X.690">
        <front>
          <title>Information technology -- ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
          <author>
            <organization>ITU-T</organization>
          </author>
          <date year="2021" month="February"/>
        </front>
        <seriesInfo name="ITU-T Recommendation" value="X.690"/>
        <seriesInfo name="ISO/IEC" value="8825-1-2021"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 267?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
