<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-housley-lamps-macaddress-on-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Media Access Control (MAC) Addresses in X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-housley-lamps-macaddress-on-02"/>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <author initials="C." surname="Bonnell" fullname="Corey Bonnell">
      <organization abbrev="DigiCert">DigiCert, Inc.</organization>
      <address>
        <email>corey.bonnell@digicert.com</email>
      </address>
    </author>
    <author initials="J." surname="Mandel" fullname="Joe Mandel">
      <organization abbrev="AKAYLA">AKAYLA, Inc.</organization>
      <address>
        <email>joe@akayla.com</email>
      </address>
    </author>
    <author initials="T." surname="Okubo" fullname="Tomofumi Okubo">
      <organization abbrev="Penguin Securities">Penguin Securities Pte. Ltd.</organization>
      <address>
        <email>tomofumi.okubo+ietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="November" day="03"/>
    <area>Security</area>
    <workgroup>Limited Additional Mechanisms for PKIX and SMIME</workgroup>
    <keyword>MACsec</keyword>
    <keyword>802.1AE</keyword>
    <keyword>X.509</keyword>
    <keyword>SubjectAltName</keyword>
    <abstract>
      <?line 57?>

<t>This document defines a new otherName for inclusion in the X.509 Subject Alternative Name (SAN) and Issuer Alternative Name (IAN) extensions to carry an IEEE Media Access Control (MAC) address. The new name form makes it possible to bind a layer‑2 interface identifier to a public key certificate. Additionally, this document defines how constraints on this name form can be encoded and processed in the X.509 Name Constraints extension.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://CBonnell.github.io/draft-housley-lamps-macaddress-on/draft-housley-lamps-macaddress-on.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-housley-lamps-macaddress-on/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Limited Additional Mechanisms for PKIX and SMIME Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/CBonnell/draft-housley-lamps-macaddress-on"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Deployments that use X.509 certificates to identify a device by a Media Access Control (MAC) address need a standard way to encode it in the Subject Alternative Name (SAN) extension defined in <xref target="RFC5280"/>. This document defines a new otherName form "MACAddress". The name form carries either a 48‑bit IEEE 802 MAC address (EUI‑48) or a 64‑bit extended identifier (EUI‑64) in an OCTET STRING. Additionally, the name form also can convey constraints on EUI-48 or EUI-64 values when included in the Name Constraints extension defined in <xref target="RFC5280"/>. The new name form enables certificate‑based authentication at layer 2 and facilitates secure provisioning in Internet‑of‑Things and automotive networks.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="macaddress-othername">
      <name>MACAddress otherName</name>
      <t>The new name form is identified by the object identifier (OID) id‑on‑MACAddress (TBD1). The name form has variants to convey a EUI-48 as an OCTET STRING comprising of 6 octets, or a EUI-64 as an OCTET STRING comprising of 8 octets. Constraints on EUI-48 and EUI-64 values are conveyed as OCTET STRINGs whose lengths are twice the octet length of the identifiers. The first set of N octets (where N is the length of the address octets) define the bit pattern of the constraint that the address must match, and the second set of N octets defines the bit mask that defines the set of significant bits in the bit pattern.</t>
      <t>The following sub-sections describe how to encode EUI-48 and EUI-64 values and their corresponding constraints.</t>
      <section anchor="encoding-a-macaddress-as-an-alternative-name">
        <name>Encoding a MACAddress as an alternative name</name>
        <t>When the name form is included in a Subject Alternative Name or Issuer Alternate Name extension, the syntax consists of exactly six or eight octets. Values are encoded with the most significant octet encoded first ("big-endian" or "left-to-right" encoding). No text representation is permitted in the certificate, as human‑readable forms such as "00‑24‑98‑7B‑19‑02" or "0024.987B.1902" are used only in management interfaces. When a device natively possesses a 48‑bit MAC identifier, the CA <bcp14>MUST</bcp14> encode it using a 6‑octet OCTET STRING as the MACAddress value. When the device’s factory identifier is a 64‑bit EUI‑64 or when no canonical 48‑bit form exists, the CA <bcp14>MUST</bcp14> encode it using an 8‑octet OCTET STRING as the MACAddress value.</t>
      </section>
      <section anchor="encoding-a-macaddress-constraint">
        <name>Encoding a MACAddress constraint</name>
        <t>When the name form is included in the Name Constraints extension, the syntax consists of an OCTET STRING that is twice as long as the OCTET STRING representation of the address type being constrained. Within the OCTET STRING, two elements are encoded:</t>
        <ol spacing="normal" type="1"><li>
            <t>The first set of N octets (where N is 6 for an EUI-48 constraint or 8 for an EUI-64 constraint) contains the "value bit pattern". This bit pattern encodes the bits that the masked address must contain to be considered a match.</t>
          </li>
          <li>
            <t>The second set of N octets encodes the "mask bit pattern" of the constraint. Each bit that is asserted in the mask bit pattern indicates that the bit in the same position in the address is constrained by the first set of N octets.</t>
          </li>
        </ol>
        <t>The bit patterns encoded in both the value bit pattern and mask bit pattern are encoded with the most significant bit encoded first ("big-endian" or "left-to-right" encoding).</t>
        <t>If a bit is not asserted in the mask bit pattern, then the CA <bcp14>MUST NOT</bcp14> assert the corresponding bit in the value bit pattern. This rule ensures that a canonical encoding is used for a given mask bit pattern and value bit pattern.</t>
      </section>
      <section anchor="generation-and-validation-rules">
        <name>Generation and Validation Rules</name>
        <t>A certificate <bcp14>MAY</bcp14> include one or more MACAddress otherName values if and only if the subject device owns (or is expected to own) the corresponding MAC address for the certificate lifetime. MAC addresses <bcp14>SHOULD NOT</bcp14> appear in more than one valid certificate issued by the same Certification Authority (CA) at the same time, unless different layer‑2 interfaces share a public key.</t>
        <t>A Relying party that matches a presented MAC address to a certificate <bcp14>SHALL</bcp14> perform a byte‑for‑byte comparison of the OCTET STRING contents. Canonicalization, case folding, or removal of delimiter characters <bcp14>MUST NOT</bcp14> be performed.</t>
        <t>Wildcards are not supported.</t>
        <t>Self‑signed certificates that carry a MACAddress otherName <bcp14>SHOULD</bcp14> include the address of one of the device’s physical ports.</t>
      </section>
      <section anchor="name-constraints-processing">
        <name>Name Constraints Processing</name>
        <t>The MACAddress otherName follows the general rules for otherName constraints in RFC 5280, Section 4.2.1.10. A name constraints extension <bcp14>MAY</bcp14> impose permittedSubtrees and excludedSubtrees on id‑on‑MACAddress.</t>
        <t>To determine if a constraint matches a given name, the certificate-consuming application performs the following algorithm:</t>
        <ol spacing="normal" type="1"><li>
            <t>If the name is 6 octets (representing an EUI-48 value) and the constraint is 16 octets (representing an EUI-64 constraint), then the name does not match the constraint.</t>
          </li>
          <li>
            <t>If the name is 8 octets (representing an EUI-64 value) and the constraint is 12 octets (representing an EUI-48 constraint), then the name does not match the constraint.</t>
          </li>
          <li>
            <t>Extract the value bit pattern from the upper (big-endian) N octets of the constraint, where N is "6" for EUI-48 identifiers and "8" for EUI-64 identifiers.</t>
          </li>
          <li>
            <t>Extract the mask bit pattern from the lower (big-endian) N octets of the constraint, where N is "6" for EUI-48 identifiers and "8" for EUI-64 identifiers.</t>
          </li>
          <li>
            <t>Perform an exclusive OR (XOR) operation with the value bit string extracted in step 3 and the octets of the name value.</t>
          </li>
          <li>
            <t>Perform a bitwise AND operation with the bit string calculated in step 5 and the mask bit pattern.</t>
          </li>
          <li>
            <t>If the result of step 6 is a bit string consisting of entirely zeros, then the name matches the constraint. Conversely, if the result of the operation is a bit string with at least one bit asserted, then the name does not match the constraint.</t>
          </li>
        </ol>
        <t>The algorithm can be alternatively expressed as:</t>
        <t><tt>
2 * length (name) == length (constraint) &amp;&amp;
((constraint.value_bit_pattern ^ name) &amp; constraint.mask_bit_pattern) == 0
</tt></t>
        <t>Implementations are not required to implement this algorithm, but <bcp14>MUST</bcp14> calculate an identical result to this algorithm for a given set of inputs.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The binding of a MAC address to a certificate is only as strong as the CA’s validation process. CAs <bcp14>MUST</bcp14> verify that the subscriber legitimately controls or owns the asserted MAC address.</t>
      <t>Some systems dynamically assign or share MAC addresses. Such practices can undermine the uniqueness and accountability that this name form aims to provide.</t>
      <t>Unlike IP addresses, MAC addresses are not typically routed across layer 3 boundaries. Relying parties in different broadcast domains <bcp14>SHOULD NOT</bcp14> assume uniqueness beyond their local network.</t>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t>A MAC address can uniquely identify a physical device and by extension, its user. Certificates that embed unchanging MAC addresses facilitate long‑term device tracking. Deployments that use the MACAddress name <bcp14>SHOULD</bcp14> consider rotating addresses, using temporary certificates, or employing MAC Address Randomization where feasible.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to make the following assignments in the “SMI Security for PKIX Module Identifier” (1.3.6.1.5.5.7.0) registry:</t>
      <artwork><![CDATA[
    +=========+====================================+===============+
    | Decimal | Description                        | References    |
    +=========+====================================+===============+
    | TBD0    | id-mod-mac-address-other-name-2025 | This document |
    +---------+------------------------------------+---------------+
]]></artwork>
      <t>IANA is requested to make the following assignment in the “SMI Security for PKIX Other Name Forms” (1.3.6.1.5.5.7.8) registry:</t>
      <artwork><![CDATA[
    +=========+=================================+===============+
    | Decimal | Description                     | References    |
    +=========+=================================+===============+
    | TBD1    | id-on-MACAddress                | This document |
    +---------+---------------------------------+---------------+
]]></artwork>
    </section>
    <section anchor="asn1-module">
      <name>ASN.1 Module</name>
      <t>This Appendix contains the ASN.1 Module for the MAC Address; it follows the conventions established by <xref target="RFC5912"/>.</t>
      <artwork><![CDATA[
MACAddressOtherName-2025
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-mac-address-other-name-2025(TBD0) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
  OTHER-NAME FROM PKIX1Implicit-2009
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkix1-implicit-02(59) }

 id-pkix FROM PKIX1Explicit-2009
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-mod(0)
     id-mod-pkix1-explicit-02(51) } ;

-- id-pkix 8 is the otherName arc
id-on  OBJECT IDENTIFIER ::= { id-pkix 8 }

-- OID for this name form
id-on-MACAddress OBJECT IDENTIFIER ::= { id-on TBD1 }

-- Contents of the otherName field
MACAddressOtherNames OTHER-NAME ::= { on-MACAddress, ... }

on-MACAddress OTHER-NAME ::= {
MACAddress IDENTIFIED BY id-on-MACAddress }

MACAddress ::= OCTET STRING (SIZE (6 | 8 | 12 | 16))

END
]]></artwork>
    </section>
    <section anchor="mac-address-othername-examples">
      <name>MAC Address otherName Examples</name>
      <section anchor="eui-48-identifier">
        <name>EUI-48 identifier</name>
        <t>The following is a human‑readable summary of the Subject Alternative
Name extension from a certificate containing a single MACAddress
otherName with value 00‑24‑98‑7B‑19‑02:</t>
        <artwork><![CDATA[
  SEQUENCE {
    otherName [0] {
      OBJECT IDENTIFIER id-on-MACAddress (TBD)
      [0] OCTET STRING '0024987B1902'H
    }
  }
]]></artwork>
      </section>
      <section anchor="eui-64-identifier">
        <name>EUI-64 identifier</name>
        <t>An EUI‑64 example (AC‑DE‑48‑00‑11‑22‑33‑44):</t>
        <artwork><![CDATA[
  [0] OCTET STRING 'ACDE480011223344'H
]]></artwork>
      </section>
      <section anchor="eui-48-constraint-for-universal-unicast-addresses">
        <name>EUI-48 constraint for universal, unicast addresses</name>
        <t>The first octet of a MAC address contains two flag bits. IEEE bit numbering has bit '0' as the least significant bit of the octet.</t>
        <ul spacing="normal">
          <li>
            <t>I/G bit (bit 0) – 0 = unicast, 1 = multicast.  Multicast prefixes are never OUIs.</t>
          </li>
          <li>
            <t>U/L bit (bit 1) – 0 = universal (IEEE‑assigned), 1 = local.</t>
          </li>
        </ul>
        <t>These flags let the implementations exclude multicast and local addresses but still cannot prove that a 24‑bit value is an IEEE‑registered OUI. 36‑bit CIDs share the same first 24 bits and enterprises <bcp14>MAY</bcp14> deploy pseudo‑OUIs. CAs <bcp14>MUST</bcp14> include only addresses the subscriber legitimately controls (registered OUI or CID).  Before issuing a certificate that contains a MACAddress or a name constraint based on such a permitted set of addresses, the CA <bcp14>MUST</bcp14> verify that control: for example, by consulting the IEEE registry or reviewing manufacturer documentation.</t>
        <t>The following constraint definition constrains EUI-48 values to only
those are universal and unicast; locally assigned or multicast values will not match the
constraint.</t>
        <artwork><![CDATA[
  [0] OCTET STRING '020000000000030000000000'H

]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC5280">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper"/>
          <author fullname="S. Santesson" initials="S." surname="Santesson"/>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <author fullname="W. Polk" initials="W." surname="Polk"/>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="RFC5912">
        <front>
          <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <date month="June" year="2010"/>
          <abstract>
            <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5912"/>
        <seriesInfo name="DOI" value="10.17487/RFC5912"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 259?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We thank the participants on the LAMPS Working Group mailing list for their insightful feedback and comments. In particular, the authors extend sincere appreciation to David von Oheimb, John Mattsson, and Michael StJohns for their reviews and suggestions, which greatly improved the quality of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
