<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-housley-lamps-macaddress-on-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title>Media Access Control (MAC) Addresses in X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-housley-lamps-macaddress-on-01"/>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <author initials="C." surname="Bonnell" fullname="Corey Bonnell">
      <organization abbrev="DigiCert">DigiCert, Inc.</organization>
      <address>
        <email>corey.bonnell@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Mandel" fullname="Joe Mandel">
      <organization abbrev="AKAYLA">AKAYLA, Inc.</organization>
      <address>
        <email>joe@akayla.com</email>
      </address>
    </author>
    <author initials="T." surname="Okubo" fullname="Tomofumi Okubo">
      <organization abbrev="Penguin Securities">Penguin Securities Pte. Ltd.</organization>
      <address>
        <email>tomofumi.okubo+ietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="September" day="30"/>
    <area>Security</area>
    <workgroup>Limited Additional Mechanisms for PKIX and SMIME</workgroup>
    <keyword>MACsec</keyword>
    <keyword>802.1AE</keyword>
    <keyword>X.509</keyword>
    <keyword>SubjectAltName</keyword>
    <abstract>
      <?line 92?>

<t>This document defines a new otherName for inclusion in the X.509 Subject Alternative Name (SAN) and Issuer Alternative Name (IAN) extensions to carry an IEEE Media Access Control (MAC) address. The new name form makes it possible to bind a layer‑2 interface identifier to a public key certificate. Additionally, this document defines how constraints on this name form can be encoded and processed in the X.509 Name Constraints extension.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://CBonnell.github.io/draft-housley-lamps-macaddress-on/draft-housley-lamps-macaddress-on.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-housley-lamps-macaddress-on/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Limited Additional Mechanisms for PKIX and SMIME Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/CBonnell/draft-housley-lamps-macaddress-on"/>.</t>
    </note>
  </front>
  <middle>
    <?line 96?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Deployments that use X.509 certificates to identify a device by a Media Access Control (MAC) address need a standard way to encode it in the Subject Alternative Name (SAN) extension defined in <xref target="RFC5280"/>. This document defines a new otherName form "MACAddress". The name form carries either a 48‑bit IEEE 802 MAC address (EUI‑48) or a 64‑bit extended identifier (EUI‑64) in an OCTET STRING. Additionally, the name form also can convey constraints on EUI-48 or EUI-64 values when included in the Name Constraints extension defined in <xref target="RFC5280"/>. The new name form enables certificate‑based authentication at layer 2 and facilitates secure provisioning in Internet‑of‑Things and automotive networks.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="macaddress-othername">
      <name>MACAddress otherName</name>
      <t>The new name form is identified by the object identifier (OID) id‑on‑MACAddress (TBD1). The name form has variants to convey a EUI-48 as an OCTET STRING comprising of 6 octets, or a EUI-64 as an OCTET STRING comprising of 8 octets. Constraints on EUI-48 and EUI-64 values are conveyed as OCTET STRINGs whose lengths are twice the octet length of the identifiers. The first set of N octets (where N is the length of the address octets) define the bit mask of the constraint, and the second set of N octets defines the bit pattern that the address must match for the asserted bits in the mask.</t>
      <t>The following sub-sections describe how to encode EUI-48 and EUI-64 values and their corresponding constraints.</t>
      <section anchor="encoding-a-macaddress-as-an-alternative-name">
        <name>Encoding a MACAddress as an alternative name</name>
        <t>When the name form is included in a Subject Alternative Name or Issuer Alternate Name extension, the syntax consists of exactly six or eight octets. Values are encoded with the most significant octet encoded first ("big-endian" or "left-to-right" encoding). No text representation is permitted in the certificate, as human‑readable forms such as "00‑24‑98‑7B‑19‑02" or "0024.987B.1902" are used only in management interfaces. When a device natively possesses a 48‑bit MAC identifier, the CA <bcp14>MUST</bcp14> encode it using a 6‑octet OCTET STRING as the MACAddress value. When the device’s factory identifier is a 64‑bit EUI‑64 or when no canonical 48‑bit form exists, the CA <bcp14>MUST</bcp14> encode it using an 8‑octet OCTET STRING as the MACAddress value.</t>
      </section>
      <section anchor="encoding-a-macaddress-constraint">
        <name>Encoding a MACAddress constraint</name>
        <t>When the name form is included in the Name Constraints extension, the syntax consists of an OCTET STRING that is twice as long as the OCTET STRING representation of the address type being constrained. Within the OCTET STRING, two elements are encoded:</t>
        <ol spacing="normal" type="1"><li>
            <t>The first N octets (where N is 6 for an EUI-48 constraint or 8 for an EUI-64 constraint) encodes the "mask bit pattern" of the constraint. Each bit that is asserted in the mask bit pattern indicates that the bit in the same position in the address is constrained by the second set of N octets.</t>
          </li>
          <li>
            <t>The second set of N octets contains the "value bit pattern". This bit pattern encodes the bits that the masked address must contain to be considered a match.</t>
          </li>
        </ol>
        <t>The bit patterns encoded in both the mask bit pattern and value bit pattern are encoded with the most significant bit encoded first ("big-endian" or "left-to-right" encoding).</t>
        <t>If a bit is not asserted in the mask bit pattern, then the CA <bcp14>MUST NOT</bcp14> assert the corresponding bit in the value bit pattern. This rule ensures that a distinguished encoding is used for a given mask bit pattern and value bit pattern.</t>
        <t>When a constraint is included in the <tt>permittedSubtrees</tt> field of a Name Constraints extension, certificates containing a MACAddress name form of the specific identifier type (EUI-48 or EUI-64) that are issued by the Certification Authority are trusted only when the masked bits (masked according to the "mask bit pattern") of the value are binary equal to the "value bit pattern".</t>
        <t>When a constraint is included in the <tt>excludedSubtrees</tt> field of a Name Constraints extension, certificates containing a MACAddress name form of the specific identifier type (EUI-48 or EUI-64) that are issued by the Certification Authority are trusted only when the masked bits (masked according ot the "mask bit pattern") of the value are not binary equal to the pattern.</t>
      </section>
      <section anchor="generation-and-validation-rules">
        <name>Generation and Validation Rules</name>
        <t>A certificate <bcp14>MAY</bcp14> include one or more MACAddress otherName values if and only if the subject device owns (or is expected to own) the corresponding MAC address for the certificate lifetime. MAC addresses <bcp14>SHOULD NOT</bcp14> appear in more than one valid certificate issued by the same Certification Authority (CA) at the same time, unless different layer‑2 interfaces share a public key.</t>
        <t>A Relying party that matches a presented MAC address to a certificate <bcp14>SHALL</bcp14> perform a byte‑for‑byte comparison of the OCTET STRING contents. Canonicalization, case folding, or removal of delimiter characters <bcp14>MUST NOT</bcp14> be performed.</t>
        <t>Wildcards are not supported.</t>
        <t>Self‑signed certificates that carry a MACAddress otherName <bcp14>SHOULD</bcp14> include the address of one of the device’s physical ports.</t>
      </section>
      <section anchor="name-constraints-processing">
        <name>Name Constraints Processing</name>
        <t>The MACAddress otherName follows the general rules for otherName constraints in RFC 5280, Section 4.2.1.10. A name constraints extension <bcp14>MAY</bcp14> impose permittedSubtrees and excludedSubtrees on id‑on‑MACAddress.</t>
        <t>A constraint that is represented as an OCTET STRING of exactly 12 octets is relevant only to <tt>macAddress</tt> values that are encoded using 6 octets; such a constraint is ignored for <tt>macAddress</tt> values that are encoded using 8 octets. Likewise, a constraint that is represented as an OCTET STRING of exactly 16 octets is relevant only to <tt>macAddress</tt> values that are encoded using 8 octets; such a constraint is ignored for <tt>macAddress</tt> values that are encoded using 6 octets.</t>
        <t>To determine if a constraint matches a given name value, the certificate-consuming application performs the following steps:</t>
        <ol spacing="normal" type="1"><li>
            <t>Extract the mask bit pattern from the upper N octets of the constraint value, where N is "6" for EUI-48 identifiers and "8" for EUI-64 identifiers.</t>
          </li>
          <li>
            <t>Extract the value bit pattern from the lower N octets of the constraint value, where N is "6" for EUI-48 identifiers and "8" for EUI-64 identifiers.</t>
          </li>
          <li>
            <t>Perform an exclusive OR (XOR) operation with the value bit string extracted in step 2 and the octets of the name value.</t>
          </li>
          <li>
            <t>Perform a bitwise AND operation with the bit string calculated in step 3 and the mask bit pattern.</t>
          </li>
          <li>
            <t>If the result of step 4 is a bit string consisting of entirely zeros, then the name matches the constraint. Conversely, if the result of the operation is a bit string with at least one bit asserted, then the name does not match the constraint.</t>
          </li>
        </ol>
        <t>The first octet of a MAC address contains two flag bits.</t>
        <ul spacing="normal">
          <li>
            <t>I/G bit (bit 0) – 0 = unicast, 1 = multicast.  Multicast prefixes are never OUIs.</t>
          </li>
          <li>
            <t>U/L bit (bit 1) – 0 = universal (IEEE‑assigned), 1 = local.</t>
          </li>
        </ul>
        <t>These flags let the implementations exclude multicast and local prefixes but still cannot prove that a 24‑bit value is an IEEE‑registered OUI. 36‑bit CIDs share the same first 24 bits and enterprises <bcp14>MAY</bcp14> deploy pseudo‑OUIs. CAs <bcp14>MUST</bcp14> include only prefixes the subscriber legitimately controls (registered OUI or CID).  Before issuing a certificate that contains a MACAddress or a name constraint based on such a prefix, the CA <bcp14>MUST</bcp14> verify that control—for example, by consulting the IEEE registry or reviewing manufacturer documentation.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The binding of a MAC address to a certificate is only as strong as the CA’s validation process. CAs <bcp14>MUST</bcp14> verify that the subscriber legitimately controls or owns the asserted MAC address.</t>
      <t>Some systems dynamically assign or share MAC addresses. Such practices can undermine the uniqueness and accountability that this name form aims to provide.</t>
      <t>Unlike IP addresses, MAC addresses are not typically routed across layer 3 boundaries. Relying parties in different broadcast domains <bcp14>SHOULD NOT</bcp14> assume uniqueness beyond their local network.</t>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t>A MAC address can uniquely identify a physical device and by extension, its user. Certificates that embed unchanging MAC addresses facilitate long‑term device tracking. Deployments that use the MACAddress name <bcp14>SHOULD</bcp14> consider rotating addresses, using temporary certificates, or employing MAC Address Randomization where feasible.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to make the following assignments in the “SMI Security for PKIX Module Identifier” (1.3.6.1.5.5.7.0) registry:</t>
      <artwork><![CDATA[
    +=========+====================================+===============+
    | Decimal | Description                        | References    |
    +=========+====================================+===============+
    | TBD0    | id-mod-mac-address-other-name-2025 | This document |
    +---------+------------------------------------+---------------+
]]></artwork>
      <t>IANA is requested to make the following assignment in the “SMI Security for PKIX Other Name Forms” (1.3.6.1.5.5.7.8) registry:</t>
      <artwork><![CDATA[
    +=========+=================================+===============+
    | Decimal | Description                     | References    |
    +=========+=================================+===============+
    | TBD1    | id-on-MACAddress                | This document |
    +---------+---------------------------------+---------------+
]]></artwork>
    </section>
    <section anchor="asn1-module">
      <name>ASN.1 Module</name>
      <t>This Appendix contains the ASN.1 Module for the MAC Address; it follows the conventions established by <xref target="RFC5912"/>.</t>
      <artwork><![CDATA[
MACAddressOtherName-2025
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-mac-address-other-name-2025(TBD0) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
  OTHER-NAME FROM PKIX1Implicit-2009
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkix1-implicit-02(59) }

 id-pkix FROM PKIX1Explicit-2009
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-mod(0)
     id-mod-pkix1-explicit-02(51) } ;

-- id-pkix 8 is the otherName arc
id-on  OBJECT IDENTIFIER ::= { id-pkix 8 }

-- OID for this name form
id-on-MACAddress OBJECT IDENTIFIER ::= { id-on TBD1 }

-- Contents of the otherName field
MACAddressOtherNames OTHER-NAME ::= { on-MACAddress, ... }

on-MACAddress OTHER-NAME ::= {
MACAddress IDENTIFIED BY id-on-MACAddress }

MACAddress ::= OCTET STRING (SIZE (6 | 8 | 12 | 16))

END
]]></artwork>
    </section>
    <section anchor="mac-address-othername-examples">
      <name>MAC Address otherName Examples</name>
      <section anchor="eui-48-identifier">
        <name>EUI-48 identifier</name>
        <t>The following is a human‑readable summary of the Subject Alternative
Name extension from a certificate containing a single MACAddress
otherName with value 00‑24‑98‑7B‑19‑02:</t>
        <artwork><![CDATA[
  SEQUENCE {
    otherName [0] {
      OBJECT IDENTIFIER id-on-MACAddress (TBD)
      [0] OCTET STRING '0024987B1902'H
    }
  }
]]></artwork>
      </section>
      <section anchor="eui-64-identifier">
        <name>EUI-64 identifier</name>
        <t>An EUI‑64 example (AC‑DE‑48‑00‑11‑22‑33‑44):</t>
        <artwork><![CDATA[
  [0] OCTET STRING 'ACDE480011223344'H
]]></artwork>
      </section>
      <section anchor="eui-48-constraint-for-universal-addresses">
        <name>EUI-48 constraint for universal addresses</name>
        <t>The following constraint definition constrains EUI-48 values to only
those are universal; locally assigned values will not match the
constraint.</t>
        <artwork><![CDATA[
  [0] OCTET STRING '020000000000020000000000'H

]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC5280">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper"/>
          <author fullname="S. Santesson" initials="S." surname="Santesson"/>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <author fullname="W. Polk" initials="W." surname="Polk"/>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="RFC5912">
        <front>
          <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <date month="June" year="2010"/>
          <abstract>
            <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5912"/>
        <seriesInfo name="DOI" value="10.17487/RFC5912"/>
      </reference>
      <reference anchor="IEEE802.1AE">
        <front>
          <title>IEEE Standard for Local and metropolitan area networks - Media Access Control (MAC) Security</title>
          <author>
            <organization abbrev="IEEE">Institute of Electrical and Electronics Engineers</organization>
          </author>
          <date year="2018" month="December" day="21"/>
        </front>
        <seriesInfo name="IEEE" value="802-1ae-2018"/>
        <seriesInfo name="DOI" value="10.1109/IEEESTD.2018.8585421"/>
      </reference>
      <reference anchor="X680" target="https://www.itu.int/rec/T-REC-X.680">
        <front>
          <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
          <author>
            <organization>ITU-T</organization>
          </author>
          <date year="2021" month="February"/>
        </front>
        <seriesInfo name="ITU-T Recommendation" value="X.680"/>
        <seriesInfo name="ISO/IEC" value="8824-1:2021"/>
      </reference>
      <reference anchor="X690" target="https://www.itu.int/rec/T-REC-X.690">
        <front>
          <title>Information technology -- ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
          <author>
            <organization>ITU-T</organization>
          </author>
          <date year="2021" month="February"/>
        </front>
        <seriesInfo name="ITU-T Recommendation" value="X.690"/>
        <seriesInfo name="ISO/IEC" value="8825-1-2021"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 289?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We thank the participants on the LAMPS Working Group mailing list for their insightful feedback and comments. In particular, the authors extend sincere appreciation to John Mattsson and Michael St. Johns for their reviews and suggestions, which greatly improved the quality of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
