<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.7 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-oauth-status-list-02" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title>Token Status List</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-status-list-02"/>
    <author fullname="Tobias Looker">
      <organization>MATTR</organization>
      <address>
        <email>tobias.looker@mattr.global</email>
      </address>
    </author>
    <author fullname="Paul Bastian">
      <organization/>
      <address>
        <email>paul.bastian@posteo.de</email>
      </address>
    </author>
    <author fullname="Christian Bormann">
      <organization/>
      <address>
        <email>chris.bormann@gmx.de</email>
      </address>
    </author>
    <date year="2024" month="March" day="04"/>
    <abstract>
      <?line 74?>

<t>This specification defines status list data structures and processing rules for representing the status of tokens secured by JSON Object Signing and Encryption (JOSE) or CBOR Object Signing and Encryption(COSE), such as JSON Web Tokens (JWTs), CBOR Web Tokens (CWTs) and ISO mdoc.
The status list token data structures themselves are also represented as JWTs or CWTs.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://vcstuff.github.io/draft-ietf-oauth-status-list/draft-ietf-oauth-status-list.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/vcstuff/draft-ietf-oauth-status-list"/>.</t>
    </note>
  </front>
  <middle>
    <?line 79?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Token formats secured by JOSE <xref target="IANA.JOSE"/> or COSE <xref target="RFC9052"/>, such as JSON Web Tokens (JWTs) <xref target="RFC7519"/>, CBOR Web Tokens (CWTs) <xref target="RFC8392"/> and ISO mdoc <xref target="ISO.mdoc"/>, have vast possible applications. Some of these applications can involve issuing a token whereby certain semantics about the token can change over time, which are important to be able to communicate to relying parties in an interoperable manner, such as whether the token is considered invalidated or suspended by its issuer.</t>
      <t>This document defines a Status List and its representations in JSON and CBOR formats that describe the individual statuses of multiple Referenced Tokens, which themselves are JWTs or CWTs. The statuses of all Referenced Tokens are conveyed via a bit array in the Status List. Each Referenced Token is allocated an index during issuance that represents its position within this bit array. The value of the bit(s) at this index correspond to the Referenced Token's status. A Status List may either be provided by an endpoint or be signed and embedded into a Status List Token, whereas this document defines its representations in JWT and CWT. Status Lists may be composed for expressing a range of Status Types. This document defines basic Status Types for the most common use cases as well as an extensibility mechanism for custom Status Types. The document also defines how an issuer of a Referenced Token references a Status List (Token).</t>
      <t>An example for the usage of a Status List is to manage the status of issued access tokens as defined in section 1.4 of <xref target="RFC6749"/>. Token Introspection <xref target="RFC7662"/> defines another way to determine the status of an issued access token, but it requires the party trying to validate an access tokens status to directly contact the token issuer, whereas the mechanism defined in this specification does not have this limitation.</t>
      <t>Another possible use case for the Status List is to express the status of verifiable credentials (Referenced Tokens) issued by an Issuer in the Issuer-Holder-Verifier model <xref target="SD-JWT.VC"/>.
The following diagram depicts the basic conceptual relationship.</t>
      <artwork type="ascii-art"><![CDATA[
+-------------------+                  +------------------------+
|                   | describes status |                        |
|    Status List    +----------------->|    Referenced Token    |
|   (JSON or CBOR)  <------------------+      (JOSE, COSE)      |
|                   |   references     |                        |
+-------+-----------+                  +--------+---------------+
        |
        |embedded in
        v
+-------------------+
|                   |
| Status List Token |
|  (JWT or CWT)     |
|                   |
+-------------------+

]]></artwork>
      <section anchor="rationale">
        <name>Rationale</name>
        <t>Revocation mechanisms are an essential part for most identity ecosystems. In the past, revocation of X.509 TLS certificates has been proven difficult. Traditional certificate revocation lists (CRLs) have limited scalability; Online Certificate Status Protocol (OCSP) has additional privacy risks, since the client is leaking the requested website to a third party. OCSP stapling is addressing some of these problems at the cost of less up-to-date data. Modern approaches use accumulator-based revocation registries and Zero-Knowledge-Proofs to accommodate for this privacy gap, but face scalability issues again.</t>
        <t>This specification seeks to find a balance between scalability, security, and privacy by minimizing the status information to mere bits (often a single bit) and compressing the resulting binary data. Thereby, a Status List may contain statuses of many thousands or millions Referenced Tokens while remaining as small as possible. Placing large amounts of Referenced Tokens into the same list also enables herd privacy relative to the Issuer.</t>
        <t>This specification establishes the IANA "Status Mechanism Methods" registry for status mechanism and registers the members defined by this specification. Other specifications can register other members used for status retrieval.</t>
      </section>
      <section anchor="design-considerations">
        <name>Design Considerations</name>
        <t>The decisions taken in this specification aim to achieve the following design goals:</t>
        <ul spacing="normal">
          <li>
            <t>the specification shall favor a simple and easy to understand concept</t>
          </li>
          <li>
            <t>the specification shall be easy, fast and secure to implement in all major programming languages</t>
          </li>
          <li>
            <t>the specification shall be optimized to support the most common use cases and avoid unnecessary complexity of corner cases</t>
          </li>
          <li>
            <t>the Status List shall scale up to millions of tokens to support large scale government or enterprise use cases</t>
          </li>
          <li>
            <t>the Status List shall enable caching policies and offline support</t>
          </li>
          <li>
            <t>the specification shall support JSON and CBOR based tokens</t>
          </li>
          <li>
            <t>the specification shall not specify key resolution or trust frameworks</t>
          </li>
          <li>
            <t>the specification shall design an extension point to convey information about the status of a token that can be re-used by other mechanisms</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>Issuer:</dt>
        <dd>
          <t>An entity that issues the Referenced Token and provides the status information of the Referenced Token by serving a Status List Token on a public endpoint.</t>
        </dd>
        <dt>Relying Party:</dt>
        <dd>
          <t>An entity that relies on the Status List to validate the status of the Referenced Token. Also known as Verifier.</t>
        </dd>
        <dt>Status List:</dt>
        <dd>
          <t>An object in JSON or CBOR representation containing a bit array that lists the statuses of many Referenced Tokens.</t>
        </dd>
        <dt>Status List Token:</dt>
        <dd>
          <t>A token in JWT or CWT representation that contains a cryptographically secured Status List.</t>
        </dd>
        <dt>Referenced Token:</dt>
        <dd>
          <t>A cryptographically secured data structure which contains a reference to a Status List or Status List Token. It is <bcp14>RECOMMENDED</bcp14> to use JSON <xref target="RFC8259"/> or CBOR <xref target="RFC8949"/> for representation of the token and secure it using JSON Object Signing as defined in <xref target="RFC7515"/> or CBOR Object Signing and Encryption as defined in <xref target="RFC9052"/>. The information from the contained Status List may give a Relying Party additional information about up-to-date status of the Referenced Token.</t>
        </dd>
      </dl>
    </section>
    <section anchor="status-list">
      <name>Status List</name>
      <t>A Status List is a byte array that contains the statuses of many Referenced Tokens represented by one or multiple bits. A common representation of a Status List is composed by the following algorithm:</t>
      <ol spacing="normal" type="1"><li>
          <t>Each status of a Referenced Token <bcp14>MUST</bcp14> be represented with a bit-size of 1,2,4, or 8. Therefore up to 2,4,16, or 256 statuses for a Referenced Token are possible, depending on the bit-size. This limitation is intended to limit bit manipulation necessary to a single byte for every operation and thus keeping implementations simpler and less error prone.</t>
        </li>
        <li>
          <t>The overall Status List is encoded as a byte array. Depending on the bit-size, each byte corresponds to 8/(#bit-size) statuses (8,4,2, or 1). The status of each Referenced Token is identified using the index that maps to one or more specific bits within the byte array. The index starts counting at 0 and ends with "size" - 1 (being the last valid entry). The bits within an array are counted from least significant bit "0" to the most significant bit ("7"). All bits of the byte array at a particular index are set to a status value.</t>
        </li>
        <li>
          <t>The byte array is compressed using DEFLATE <xref target="RFC1951"/> with the ZLIB <xref target="RFC1950"/> data format. Implementations are <bcp14>RECOMMENDED</bcp14> to use the highest compression level available.</t>
        </li>
      </ol>
      <t>The following example illustrates a Status List that represents the statuses of 16 Referenced Tokens, requiring 16 bits (2 bytes) for the uncompressed byte array:</t>
      <artwork type="ascii-art"><![CDATA[
status[0] = 1
status[1] = 0
status[2] = 0
status[3] = 1
status[4] = 1
status[5] = 1
status[6] = 0
status[7] = 1
status[8] = 1
status[9] = 1
status[10] = 0
status[11] = 0
status[12] = 0
status[13] = 1
status[14] = 0
status[15] = 1
]]></artwork>
      <t>These bits are concatenated:</t>
      <artwork type="ascii-art"><![CDATA[
byte             0                  1               2
bit       7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0    7
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+...
values   |1|0|1|1|1|0|0|1|  |1|0|1|0|0|0|1|1|  |0|...
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+...
index     7 6 5 4 3 2 1 0   15   ...  10 9 8   23
         \_______________/  \_______________/
                0xB9               0xA3

]]></artwork>
      <section anchor="status-list-json">
        <name>Status List in JSON Format</name>
        <t>This section defines the structure for a JSON-encoded Status List:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14>. JSON Object that contains a Status List. The object contains exactly two claims:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>bits</tt>: <bcp14>REQUIRED</bcp14>. JSON Integer specifying the number of bits per Referenced Token in the Status List (<tt>lst</tt>). The allowed values for <tt>bits</tt> are 1,2,4 and 8.</t>
              </li>
              <li>
                <t><tt>lst</tt>: <bcp14>REQUIRED</bcp14>. JSON String that contains the status values for all the Referenced Tokens it conveys statuses for. The value <bcp14>MUST</bcp14> be the base64url-encoded (as defined in Section 2 of <xref target="RFC7515"/>) Status List as specified in <xref target="status-list"/>.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following example illustrates the JSON representation of the Status List:</t>
        <artwork><![CDATA[
byte_array = [0xb9, 0xa3] 
encoded:
{
  "bits": 1,
  "lst": "eNrbuRgAAhcBXQ"
}
]]></artwork>
      </section>
      <section anchor="status-list-cbor">
        <name>Status List in CBOR Format</name>
        <t>This section defines the structure for a CBOR-encoded Status List:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>StatusList</tt> structure is a map (Major Type 5) and defines the following entries:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>bits</tt>: <bcp14>REQUIRED</bcp14>. Unsigned int (Major Type 0) that contains the number of bits per Referenced Token in the Status List. The allowed values for <tt>bits</tt> are 1, 2, 4 and 8.</t>
              </li>
              <li>
                <t><tt>lst</tt>: <bcp14>REQUIRED</bcp14>. Byte string (Major Type 2) that contains the Status List as specified in <xref target="status-list-json"/>.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following example illustrates the CBOR representation of the Status List:</t>
        <artwork><![CDATA[
byte_array = [0xb9, 0xa3] 
encoded:
a2646269747301636c73744a78dadbb918000217015d
]]></artwork>
        <t>The following is the CBOR diagnostic output of the example above:</t>
        <artwork><![CDATA[
a2                              # map(2)
  64                            #   string(4)
    62697473                    #     "bits"
  01                            #   uint(1)
  63                            #   string(3)
    6c7374                      #     "lst"
  4a                            #   bytes(10)
    78dadbb918000217015d        #     "xÚÛ¹\x18\x00\x02\x17\x01]"
]]></artwork>
      </section>
    </section>
    <section anchor="status-list-token">
      <name>Status List Token</name>
      <t>A Status List Token embeds the Status List into a token that is cryptographically signed and protects the integrity of the Status List. This allows for the Status List Token to be hosted by third parties or be transferred for offline use cases.</t>
      <t>This section specifies Status List Tokens in JSON Web Token (JWT) and CBOR Web Token (CWT) format.</t>
      <section anchor="status-list-token-jwt">
        <name>Status List Token in JWT Format</name>
        <t>The Status List Token <bcp14>MUST</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/>.</t>
        <t>The following content applies to the JWT Header:</t>
        <ul spacing="normal">
          <li>
            <t><tt>typ</tt>: <bcp14>REQUIRED</bcp14>. The JWT type <bcp14>MUST</bcp14> be <tt>statuslist+jwt</tt>.</t>
          </li>
        </ul>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>iss</tt>: <bcp14>REQUIRED</bcp14> when also present in the Referenced Token. The <tt>iss</tt> (issuer) claim <bcp14>MUST</bcp14> specify a unique string identifier for the entity that issued the Status List Token. In the absence of an application profile specifying otherwise, compliant applications <bcp14>MUST</bcp14> compare issuer values using the Simple String Comparison method defined in Section 6.2.1 of <xref target="RFC3986"/>. The value <bcp14>MUST</bcp14> be equal to that of the <tt>iss</tt> claim contained within the Referenced Token.</t>
          </li>
          <li>
            <t><tt>sub</tt>: <bcp14>REQUIRED</bcp14>. The <tt>sub</tt> (subject) claim <bcp14>MUST</bcp14> specify a unique string identifier for the Status List Token. The value <bcp14>MUST</bcp14> be equal to that of the <tt>uri</tt> claim contained in the <tt>status_list</tt> claim of the Referenced Token.</t>
          </li>
          <li>
            <t><tt>iat</tt>: <bcp14>REQUIRED</bcp14>. The <tt>iat</tt> (issued at) claim <bcp14>MUST</bcp14> specify the time at which the Status List Token was issued.</t>
          </li>
          <li>
            <t><tt>exp</tt>: <bcp14>OPTIONAL</bcp14>. The <tt>exp</tt> (expiration time) claim, if present, <bcp14>MUST</bcp14> specify the time at which the Status List Token is considered expired by its issuer.</t>
          </li>
          <li>
            <t><tt>ttl</tt>: <bcp14>OPTIONAL</bcp14>. The <tt>ttl</tt> (time to live) claim, if present, <bcp14>MUST</bcp14> specify the maximum amount of time, in seconds, that the Status List Token can be cached by a consumer before a fresh copy <bcp14>SHOULD</bcp14> be retrieved. The value of the claim <bcp14>MUST</bcp14> be a positive number.</t>
          </li>
          <li>
            <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status_list</tt> (status list) claim <bcp14>MUST</bcp14> specify the Status List conforming to the rules outlined in <xref target="status-list-json"/>.</t>
          </li>
        </ul>
        <t>The following additional rules apply:</t>
        <ol spacing="normal" type="1"><li>
            <t>The JWT <bcp14>MAY</bcp14> contain other claims.</t>
          </li>
          <li>
            <t>The JWT <bcp14>MUST</bcp14> be digitally signed using an asymmetric cryptographic algorithm. Relying parties <bcp14>MUST</bcp14> reject the JWT if it is using a Message Authentication Code (MAC) algorithm. Relying parties <bcp14>MUST</bcp14> reject JWTs with an invalid signature.</t>
          </li>
          <li>
            <t>Relying parties <bcp14>MUST</bcp14> reject JWTs that are not valid in all other respects per "JSON Web Token (JWT)" <xref target="RFC7519"/>.</t>
          </li>
          <li>
            <t>Application of additional restrictions and policy are at the discretion of the verifying party.</t>
          </li>
        </ol>
        <t>The following is a non-normative example for a Status List Token in JWT format:</t>
        <artwork><![CDATA[
{
  "alg": "ES256",
  "kid": "12",
  "typ": "statuslist+jwt"
}
.
{
  "exp": 2291720170,
  "iat": 1686920170,
  "iss": "https://example.com",
  "status_list": {
    "bits": 1,
    "lst": "eNrbuRgAAhcBXQ"
  },
  "sub": "https://example.com/statuslists/1"
}
]]></artwork>
      </section>
      <section anchor="status-list-token-cwt">
        <name>Status List Token in CWT Format</name>
        <t>The Status List Token <bcp14>MUST</bcp14> be encoded as a "CBOR Web Token (CWT)" according to <xref target="RFC8392"/>.</t>
        <t>The following content applies to the CWT protected header:</t>
        <ul spacing="normal">
          <li>
            <t><tt>16</tt> TBD (type): <bcp14>REQUIRED</bcp14>. The type of the CWT <bcp14>MUST</bcp14> be <tt>statuslist+cwt</tt> as defined in <xref target="CWT.typ"/>.</t>
          </li>
        </ul>
        <t>The following content applies to the CWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>1</tt> (issuer): <bcp14>REQUIRED</bcp14>. Same definition as <tt>iss</tt> claim in <xref target="status-list-token-jwt"/>.</t>
          </li>
          <li>
            <t><tt>2</tt> (subject): <bcp14>REQUIRED</bcp14>. Same definition as <tt>sub</tt> claim in <xref target="status-list-token-jwt"/>.</t>
          </li>
          <li>
            <t><tt>6</tt> (issued at): <bcp14>REQUIRED</bcp14>. Same definition as <tt>iat</tt> claim in <xref target="status-list-token-jwt"/>.</t>
          </li>
          <li>
            <t><tt>4</tt> (expiration time): <bcp14>OPTIONAL</bcp14>. Same definition as <tt>exp</tt> claim in <xref target="status-list-token-jwt"/>.</t>
          </li>
          <li>
            <t><tt>65534</tt> (status list): <bcp14>REQUIRED</bcp14>. The status list claim <bcp14>MUST</bcp14> specify the Status List conforming to the rules outlined in <xref target="status-list-cbor"/>.</t>
          </li>
        </ul>
        <t>The following additional rules apply:</t>
        <ol spacing="normal" type="1"><li>
            <t>The CWT <bcp14>MAY</bcp14> contain other claims.</t>
          </li>
          <li>
            <t>The CWT <bcp14>MUST</bcp14> be digitally signed using an asymmetric cryptographic algorithm. Relying parties <bcp14>MUST</bcp14> reject the CWT if it is using a Message Authentication Code (MAC) algorithm. Relying parties <bcp14>MUST</bcp14> reject CWTs with an invalid signature.</t>
          </li>
          <li>
            <t>Relying parties <bcp14>MUST</bcp14> reject CWTs that are not valid in all other respects per "CBOR Web Token (CWT)" <xref target="RFC8392"/>.</t>
          </li>
          <li>
            <t>Application of additional restrictions and policy are at the discretion of the verifying party.</t>
          </li>
        </ol>
        <t>The following is a non-normative example for a Status List Token in CWT format (not including the type header yet):</t>
        <artwork><![CDATA[
d28453a20126106e7374617475736c6973742b637774a1044231325860a502782168
747470733a2f2f6578616d706c652e636f6d2f7374617475736c697374732f310173
68747470733a2f2f6578616d706c652e636f6d061a648c5bea041a8898dfea19fffe
56a2646269747301636c73744a78dadbb918000217015d58400f2ca3772e10b09d5d
6ed56461f7cba1a816c6234072d1bb693db277048e5db5a4e64444492a9b781d6c7a
c9714db99cc7aadb3812ec90cab7794170bab5b473
]]></artwork>
        <t>The following is the CBOR diagnostic output of the example above:</t>
        <artwork><![CDATA[
d2                              # tag(18)
  84                            #   array(4)
    53                          #     bytes(19)
      a20126106e7374617475736c  #       "¢\x01&\x10nstatusl"
      6973742b637774            #       "ist+cwt"
    a1                          #     map(1)
      04                        #       uint(4)
      42                        #       bytes(2)
        3132                    #         "12"
    58 60                       #     bytes(96)
      a502782168747470733a2f2f  #       "¥\x02x!https://"
      6578616d706c652e636f6d2f  #       "example.com/"
      7374617475736c697374732f  #       "statuslists/"
      31017368747470733a2f2f65  #       "1\x01shttps://e"
      78616d706c652e636f6d061a  #       "xample.com\x06\x1a"
      648c3fca041a8898c3ca19ff  #       "d\x8c?Ê\x04\x1a\x88\x98ÃÊ\x19ÿ"
      fe56a2646269747301636c73  #       "þV¢dbits\x01cls"
      744a78dadbb918000217015d  #       "tJxÚÛ¹\x18\x00\x02\x17\x01]"
    58 40                       #     bytes(64)
      3fd60a6d10eb4b4131f1f6c1  #       "?Ö\x0am\x10ëKA1ñöÁ"
      2fb365ae27b969e8e8df0b4f  #       "/³e®'¹ièèß\x0bO"
      4029815b679cb1051c1c9eb3  #       "@)\x81[g\x9c±\x05\x1c\x1c\x9e³"
      6aa72f6f17bcfdb5ed443bdf  #       "j§/o\x17¼ýµíD;ß"
      c2339568ab42949169b413e7  #       "Â3\x95h«B\x94\x91i´\x13ç"
      02ae1e6a                  #       "\x02®\x1ej"
]]></artwork>
      </section>
    </section>
    <section anchor="referenced-token">
      <name>Referenced Token</name>
      <section anchor="status-claim">
        <name>Status Claim</name>
        <t>By including a "status" claim in a Referenced Token, the Issuer is referencing a mechanism to retrieve status information about this Referenced Token. The claim contains members used to reference to a status list as defined in this specification. Other members of the "status" object may be defined by other specifications. This is analogous to "cnf" claim in Section 3.1 of <xref target="RFC7800"/> in which different authenticity confirmation methods can be included.</t>
      </section>
      <section anchor="referenced-token-jwt">
        <name>Referenced Token in JWT Format</name>
        <t>The Referenced Token <bcp14>MUST</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/>.</t>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>iss</tt>: <bcp14>REQUIRED</bcp14> when also present in the Status List Token. The <tt>iss</tt> (issuer) claim <bcp14>MUST</bcp14> specify a unique string identifier for the entity that issued the Referenced Token. In the absence of an application profile specifying otherwise, compliant applications <bcp14>MUST</bcp14> compare issuer values using the Simple String Comparison method defined in Section 6.2.1 of <xref target="RFC3986"/>. The value <bcp14>MUST</bcp14> be equal to that of the <tt>iss</tt> claim contained within the referenced Status List Token.</t>
          </li>
          <li>
            <t><tt>status</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status</tt> (status) claim <bcp14>MUST</bcp14> specify a JSON Object that contains at least one reference to a status mechanism.
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14> when the status list mechanism defined in this specification is used. It contains a reference to a Status List or Status List Token. The object contains exactly two claims:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>idx</tt>: <bcp14>REQUIRED</bcp14>. The <tt>idx</tt> (index) claim <bcp14>MUST</bcp14> specify an Integer that represents the index to check for status information in the Status List for the current Referenced Token. The value of <tt>idx</tt> <bcp14>MUST</bcp14> be a non-negative number, containing a value of zero or greater.</t>
                  </li>
                  <li>
                    <t><tt>uri</tt>: <bcp14>REQUIRED</bcp14>. The <tt>uri</tt> (URI) claim <bcp14>MUST</bcp14> specify a String value that identifies the Status List or Status List Token containing the status information for the Referenced Token. The value of <tt>uri</tt> <bcp14>MUST</bcp14> be a URI conforming to <xref target="RFC3986"/>.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <t>Application of additional restrictions and policy are at the discretion of the verifying party.</t>
        <t>The following is a non-normative example for a decoded header and payload of a Referenced Token:</t>
        <artwork type="ascii-art"><![CDATA[
{
  "alg": "ES256",
  "kid": "11"
}
.
{
  "iss": "https://example.com",
  "status": {
    "status_list": {
      "idx": 0,
      "uri": "https://example.com/statuslists/1"
    }
  }
}
]]></artwork>
      </section>
      <section anchor="referenced-token-cwt">
        <name>Referenced Token in CWT Format</name>
        <t>The Referenced Token <bcp14>MUST</bcp14> be encoded as a "COSE Web Token (CWT)" object according to <xref target="RFC8392"/>.</t>
        <t>The following content applies to the CWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>1</tt> (issuer): <bcp14>REQUIRED</bcp14>. Same definition as <tt>iss</tt> claim in <xref target="referenced-token-jwt"/>.</t>
          </li>
          <li>
            <t><tt>65535</tt> (status): <bcp14>REQUIRED</bcp14>. The status claim is encoded as a <tt>Status</tt> CBOR structure and <bcp14>MUST</bcp14> include at least one data item that refers to a status mechanism. Each data item in the <tt>Status</tt> CBOR structure comprises a key-value pair, where the key must be a CBOR text string (Major Type 3) specifying the identifier of the status mechanism, and the corresponding value defines its contents. This specification defines the following data items:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>status_list</tt> (status list): <bcp14>REQUIRED</bcp14> when the status list mechanism defined in this specification is used. It has the same definition as the <tt>status_list</tt> claim in <xref target="referenced-token-jwt"/> but <bcp14>MUST</bcp14> be encoded as a <tt>StatusListInfo</tt> CBOR structure with the following fields:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>idx</tt>: <bcp14>REQUIRED</bcp14>. Same definition as <tt>idx</tt> claim in <xref target="referenced-token-jwt"/>.</t>
                  </li>
                  <li>
                    <t><tt>uri</tt>: <bcp14>REQUIRED</bcp14>. Same definition as <tt>uri</tt> claim in <xref target="referenced-token-jwt"/>.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <t>Application of additional restrictions and policy are at the discretion of the verifying party.</t>
        <t>The following is a non-normative example for a decoded payload of a Referenced Token:</t>
        <artwork type="ascii-art"><![CDATA[
18(
    [
      / protected / << {
        / alg / 1: -7 / ES256 /
      } >>,
      / unprotected / {
        / kid / 4: h'3132' / '13' /
      },
      / payload / << {
        / iss    / 1: "https://example.com",
        / status / 65535: {
          "status_list": {
            "idx": "0",
            "uri": "https://example.com/statuslists/1"
          }
        }
      } >>,
      / signature / h'...'
    ]
  )
]]></artwork>
      </section>
      <section anchor="referenced-token-cose">
        <name>Referenced Token in other COSE/CBOR Format</name>
        <t>The Referenced Token <bcp14>MUST</bcp14> be encoded as a <tt>COSE_Sign1</tt> or <tt>COSE_Sign</tt> CBOR structure as defined in "CBOR Object Signing and Encryption (COSE)" <xref target="RFC9052"/>.</t>
        <t>It is required to encode the status mechanisms referred to in the Referenced Token using the <tt>Status</tt> CBOR structure defined in <xref target="referenced-token-cwt"/>.</t>
        <t>It is <bcp14>RECOMMENDED</bcp14> to use <tt>status</tt> for the label of the field that contains the <tt>Status</tt> CBOR structure.</t>
        <t>Application of additional restrictions and policy are at the discretion of the verifying party.</t>
        <t>The following is a non-normative example for a decoded payload of a Referenced Token:</t>
        <t>TBD: example</t>
      </section>
    </section>
    <section anchor="status-types">
      <name>Status Types</name>
      <t>This document defines potential statuses of Referenced Tokens as Status Type values. If the Status List contains more than one bit per token (as defined by "bits" in the Status List), then the whole value of bits <bcp14>MUST</bcp14> describe one value. A Status List can not represent multiple statuses per Referenced Token.</t>
      <t>The registry in this document describes the basic Status Type values required for the most common use cases.
Additional values may defined for particular use cases.</t>
      <section anchor="status-types-values">
        <name>Status Types Values</name>
        <t>A status describes the state, mode, condition or stage of an entity that is described by the Status List. Status Types <bcp14>MUST</bcp14> be numeric values between 0 and 255.
Status types described by this specification comprise:</t>
        <ul spacing="normal">
          <li>
            <t>0x00 - "VALID" - The status of the Token is valid, correct or legal.</t>
          </li>
          <li>
            <t>0x01 - "INVALID" - The status of the Token is revoked, annulled, taken back, recalled or cancelled. This state is irreversible.</t>
          </li>
          <li>
            <t>0x02 - "SUSPENDED" - The status of the Token is temporarily invalid, hanging, debarred from privilege. This state is reversible.</t>
          </li>
        </ul>
        <t>The issuer of the Status List <bcp14>MUST</bcp14> choose an adequate <tt>bits</tt> (bit size) to be able to describe the required Status Types for the application.</t>
        <t>The processing rules for JWT or CWT precede any evaluation of a Referenced Token's status. For example, if a token is evaluated as being expired through the "exp" (Expiration Time) but also has a status of 0x00 ("VALID"), the token is considered expired.</t>
      </section>
    </section>
    <section anchor="verification-and-processing">
      <name>Verification and Processing</name>
      <section anchor="status-list-request">
        <name>Status List Request</name>
        <t>To obtain the Status List or Status List Token, the Relying Party <bcp14>MUST</bcp14> send a HTTP GET request to the Status List Endpoint. Communication with the Status List Endpoint <bcp14>MUST</bcp14> utilize TLS. Which version(s) should be implemented will vary over time. A TLS server certificate check <bcp14>MUST</bcp14> be performed as defined in Section 5 and 6 of <xref target="RFC6125"/>.</t>
        <t>The Relying Party <bcp14>SHOULD</bcp14> send the following Accept-Header to indicate the requested response type:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+json" for Status List in JSON format</t>
          </li>
          <li>
            <t>"application/statuslist+jwt" for Status List in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cbor" for Status List in CBOR format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List in CWT format</t>
          </li>
        </ul>
        <t>If the Relying Party does not send an Accept Header, the response type is assumed to be known implicit or out-of-band.</t>
      </section>
      <section anchor="status-list-response">
        <name>Status List Response</name>
        <t>In the successful response, the Status List Provider <bcp14>MUST</bcp14> use the following content-type:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+json" for Status List in JSON format</t>
          </li>
          <li>
            <t>"application/statuslist+jwt" for Status List in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cbor" for Status List in CBOR format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List in CWT format</t>
          </li>
        </ul>
        <t>In the case of "application/statuslist+json", the response <bcp14>MUST</bcp14> be of type JSON and follow the rules of <xref target="status-list-json"/>.
In the case of "application/statuslist+jwt", the response <bcp14>MUST</bcp14> be of type JWT and follow the rules of <xref target="status-list-token-jwt"/>.
In the case of "application/statuslist+cbor", the response <bcp14>MUST</bcp14> be of type CBOR and follow the rules of <xref target="status-list-cbor"/>.
In the case of "application/statuslist+cwt", the response <bcp14>MUST</bcp14> be of type CWT and follow the rules of <xref target="status-list-token-cwt"/>.</t>
        <t>The HTTP response <bcp14>SHOULD</bcp14> use gzip Content-Encoding as defined in <xref target="RFC9110"/>.</t>
      </section>
      <section anchor="caching">
        <name>Caching</name>
        <t>If caching is required (e.g., to enable the use of alternative mechanisms for hosting, like Content Delivery Networks), the control of the caching mechanism <bcp14>SHOULD</bcp14> be implemented using the standard HTTP Cache-Control as defined in <xref target="RFC9111"/>.</t>
      </section>
      <section anchor="validation-rules">
        <name>Validation Rules</name>
        <t>TBD</t>
      </section>
    </section>
    <section anchor="further-examples">
      <name>Further Examples</name>
      <section anchor="status-list-token-with-2-bit-status-values-in-jwt-format">
        <name>Status List Token with 2-Bit Status Values in JWT format</name>
        <t>In this example, the Status List additionally includes the Status Type "SUSPENDED". As the Status Type value for "SUSPENDED" is 0x02 and does not fit into 1 bit, the "bits" is required to be 2.</t>
        <t>This example Status List represents the status of 12 Referenced Tokens, requiring 24 bits (3 bytes) of status.</t>
        <artwork type="ascii-art"><![CDATA[
status[0] = 1
status[1] = 2
status[2] = 0
status[3] = 3
status[4] = 0
status[5] = 1
status[6] = 0
status[7] = 1
status[8] = 1
status[9] = 2
status[10] = 3
status[11] = 3
]]></artwork>
        <t>These bits are concatenated:</t>
        <artwork type="ascii-art"><![CDATA[
byte             0                  1                  2
bit       7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
values   |1|1|0|0|1|0|0|1|  |0|1|0|0|0|1|0|0|  |1|1|1|1|1|0|0|1|
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
          \ / \ / \ / \ /    \ / \ / \ / \ /    \ / \ / \ / \ /
status     3   0   2   1      1   0   1   0      3   3   2   1
index      3   2   1   0      7   6   5   4      11  10  9   8
           \___________/      \___________/      \___________/
                0xC9               0x44               0xF9

]]></artwork>
        <t>Resulting in the byte array and compressed/base64url encoded status list:</t>
        <artwork><![CDATA[
byte_array = [0xc9, 0x44, 0xf9] 
encoded:
{
  "bits": 2,
  "lst": "eNo76fITAAPfAgc"
}
]]></artwork>
      </section>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <section anchor="correct-decoding-and-parsing-of-the-encoded-status-list">
        <name>Correct decoding and parsing of the encoded status list</name>
        <t>TODO elaborate on risks of incorrect parsing/decoding leading to erroneous status data</t>
      </section>
      <section anchor="cached-and-stale-status-lists">
        <name>Cached and Stale status lists</name>
        <t>When consumers or verifiers of the Status List fetch the data, they need to be aware of its up-to-date status. The 'ttl' (time-to-live) claim
in the Status List Token provides one mechanism for setting a maximum cache time for the fetched data. This property permits distribution of
a status list to a CDN or other distribution mechanism while giving guidance to consumers of the status list on how often they need to fetch
a fresh copy of the status list even if that status list is not expired.</t>
      </section>
      <section anchor="security-authorization">
        <name>Authorized access to the Status List</name>
        <t>TODO elaborate on authorization mechanisms preventing misuse and profiling as described in privacy section</t>
      </section>
      <section anchor="history">
        <name>History</name>
        <t>TODO elaborate on status list only providing the up-to date/latest status, no historical data, may be provided by the underlying hosting architecture</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <section anchor="privacy-issuer">
        <name>Limiting issuers observability of token verification</name>
        <t>The main privacy consideration for a Status List, especially in the context of the Issuer-Holder-Verifier model <xref target="SD-JWT.VC"/>, is to prevent the Issuer from tracking the usage of the Referenced Token when the status is being checked. If an Issuer offers status information by referencing a specific token, this would enable him to create a profile for the issued token by correlating the date and identity of Relying Parties, that are requesting the status.</t>
        <t>The Status List approaches these privacy implications by integrating the status information of many Referenced Tokens into the same list. Therefore, the Issuer does not learn for which Referenced Token the Relying Party is requesting the Status List. The privacy of the Holder is protected by the anonymity within the set of Referenced Tokens in the Status List, also called herd privacy. This limits the possibilities of tracking by the Issuer.</t>
        <t>The herd privacy is depending on the number of entities within the Status List called its size. A larger size results in better privacy but also impacts the performance as more data has to be transferred to read the Status List.</t>
      </section>
      <section anchor="malicious-issuers">
        <name>Malicious Issuers</name>
        <t>A malicious Issuer could bypass the privacy benefits of the herd privacy by generating a unique Status List for every Referenced Token. By these means, he could maintain a mapping between Referenced Tokens and Status Lists and thus track the usage of Referenced Tokens by utilizing this mapping for the incoming requests. This malicious behaviour could be detected by Relying Parties that request large amounts of Referenced Tokens by comparing the number of different Status Lists and their sizes.</t>
      </section>
      <section anchor="privacy-relying-party">
        <name>Unobservability of Relying Parties</name>
        <t>Once the Relying Party receives the Referenced Token, this enables him to request the Status List to validate its status through the provided <tt>uri</tt> parameter and look up the corresponding <tt>index</tt>. However, the Relying Party may persistently store the <tt>uri</tt> and <tt>index</tt> of the Referenced Token to request the Status List again at a later time. By doing so regularly, the Relying Party may create a profile of the Referenced Token's validity status. This behaviour may be intended as a feature, e.g. for a KYC process that requires regular validity checks, but might also be abused in cases where this is not intended and unknown to the Holder, e.g. profiling the suspension of a driving license or checking the employment status of an employee credential.</t>
        <t>This behaviour could be mitigated by:
- adding authorization rules to the Status List, see <xref target="security-authorization"/>.
- regular re-issuance of the Referenced Token, see <xref target="implementation-lifecycle"/>.</t>
      </section>
      <section anchor="unlinkability">
        <name>Unlinkability</name>
        <t>Colluding Issuers and a Relying Parties have the possibility to link two transactions, as the tuple of <tt>uri</tt> and <tt>index</tt> inside the Referenced Token are unique and therefore traceable data. By comparing the status claims of received Referenced Tokens, two colluding Relying Parties could determine that they have interacted with the same user or an Issuer could trace the usage of its issued Referenced Token by colluding with various Relying Parties. It is therefore recommended to use Status Lists for Referenced Token formats that have similar unlinkability properties.</t>
        <t>To avoid privacy risks for colluding Relying Parties, it is <bcp14>RECOMMENDED</bcp14> that Issuers use batch issuance to issue multiple tokens, see <xref target="implementation-lifecycle"/>.</t>
        <t>To avoid further correlatable information by the values of <tt>uri</tt> and <tt>index</tt>, Issuers are <bcp14>RECOMMENDED</bcp14> to:</t>
        <ul spacing="normal">
          <li>
            <t>choose non-sequential, pseudo-random or random indices</t>
          </li>
          <li>
            <t>use decoy or dead entries to obfuscate the real number of Referenced Tokens within a Status List</t>
          </li>
          <li>
            <t>choose to deploy and utilize multiple Status Lists simultaneously</t>
          </li>
        </ul>
      </section>
      <section anchor="third-party-hosting">
        <name>Third Party Hosting</name>
        <t>TODO elaborate on increased privacy if the status list is hosted by a third party instead of the issuer reducing tracking possibilities
TODO evaluate definition of Status List Provider?
 An entity that hosts the Status List as a resource for potential Relying Parties. The Status List Provider may be the issuer of the Status List but may also be outsourced to a trusted third party.</t>
      </section>
    </section>
    <section anchor="implementation">
      <name>Implementation Considerations</name>
      <section anchor="implementation-lifecycle">
        <name>Token Lifecycle</name>
        <t>The lifetime of a Status List (and the Status List Token) depends on the lifetime of its Referenced Tokens. Once all Referenced Tokens are expired, the Issuer may stop serving the Status List (and the Status List Token).</t>
        <t>Referenced Tokens may be regularly re-issued to increase security or to mitigate linkability and prevent tracking by Relying Parties. In this case, every Referenced Token <bcp14>MUST</bcp14> have a fresh Status List entry.</t>
        <t>Referenced Tokens may also be issued in batches, such that Holders can use individual tokens for every transaction. In this case, every Referenced Token <bcp14>MUST</bcp14> have a dedicated Status List entry. Revoking batch issued Referenced Tokens might reveal this correlation later on.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="json-web-token-claims-registration">
        <name>JSON Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "JSON Web Token Claims" registry <xref target="IANA.JWT"/> established by <xref target="RFC7519"/>.</t>
        <section anchor="registry-contents">
          <name>Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Description: Reference to a status or validity mechanism containing up-to-date status information on the JWT.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s):  <xref target="status-claim"/> of this specification</t>
            </li>
            <li>
              <t>Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Description: A status list containing up-to-date status information on multiple other JWTs encoded as a bitarray.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s):  <xref target="status-list-token-jwt"/> of this specification</t>
            </li>
            <li>
              <t>Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Description: Time to Live</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-jwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="iana-registry">
        <name>JWT Status Mechanism Methods Registry</name>
        <t>This specification establishes the IANA "Status Mechanism Methods" registry for JWT "status" member values. The registry records the status mechanism method member and a reference to the specification that defines it.</t>
        <section anchor="registration-template">
          <name>Registration Template</name>
          <t>Status Method Value:</t>
          <ul empty="true">
            <li>
              <t>The name requested (e.g., "status_list"). The name is case sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts state that there is a compelling reason to allow an exception.</t>
            </li>
          </ul>
          <t>Status Method Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the status mechanism method.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For Standards Track RFCs, list the "IESG".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents.  An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Method Value: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Status Method Description: A status list containing up-to-date status information on multiple other JWTs encoded as a bitarray.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s):  <xref target="referenced-token-jwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cbor-web-token-claims-registration">
        <name>CBOR Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "CBOR Web Token (CWT) Claims" registry <xref target="IANA.CWT"/> established by <xref target="RFC8392"/>.</t>
        <section anchor="registry-contents-1">
          <name>Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Description: Reference to a status or validity mechanism containing up-to-date status information on the CWT.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s):  <xref target="status-claim"/> of this specification</t>
            </li>
            <li>
              <t>Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Description: A status list containing up-to-date status information on multiple other CWTs encoded as a bitarray.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s):  <xref target="status-list-token-cwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cwt-iana-registry">
        <name>CWT Status Mechanism Methods Registry</name>
        <t>This specification establishes the IANA "Status Mechanism Methods" registry for CWT "status" member values. The registry records the status mechanism method member and a reference to the specification that defines it.</t>
        <section anchor="registration-template-1">
          <name>Registration Template</name>
          <t>Status Method Value:</t>
          <ul empty="true">
            <li>
              <t>The name requested (e.g., "status_list"). The name is case sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts state that there is a compelling reason to allow an exception.</t>
            </li>
          </ul>
          <t>Status Method Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the status mechanism method.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For Standards Track RFCs, list the "IESG".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents.  An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents-1">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Method Value: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Status Method Description: A status list containing up-to-date status information on multiple other CWTs encoded as a bitarray.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s):  <xref target="referenced-token-cwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="media-type-registration">
        <name>Media Type Registration</name>
        <t>This section requests registration of the following media types <xref target="RFC2046"/> in
the "Media Types" registry <xref target="IANA.MediaTypes"/> in the manner described
in <xref target="RFC6838"/>.</t>
        <t>To indicate that the content is an JSON-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+json</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary; A JSON-based Status List is a JSON Object.</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [ this specification ]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [ this specification ]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [ this specification ] for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an JWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary; A JWT-based Status List is a JWT; JWT values are encoded as a series of base64url-encoded values (some of which may be the empty string) separated by period ('.') characters.</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [ this specification ]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [ this specification ]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [ this specification ] for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an CBOR-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+cbor</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary; A CBOR-based Status List is a CBOR Object.</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [ this specification ]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [ this specification ]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [ this specification ] for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an CWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary;</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [ this specification ]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [ this specification ]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [ this specification ] for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1950">
          <front>
            <title>ZLIB Compressed Data Format Specification version 3.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <author fullname="J-L. Gailly" surname="J-L. Gailly"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1950"/>
          <seriesInfo name="DOI" value="10.17487/RFC1950"/>
        </reference>
        <reference anchor="RFC1951">
          <front>
            <title>DEFLATE Compressed Data Format Specification version 1.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1951"/>
          <seriesInfo name="DOI" value="10.17487/RFC1951"/>
        </reference>
        <reference anchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC6125">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="J. Hodges" initials="J." surname="Hodges"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9111">
          <front>
            <title>HTTP Caching</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
              <t>This document obsoletes RFC 7234.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="98"/>
          <seriesInfo name="RFC" value="9111"/>
          <seriesInfo name="DOI" value="10.17487/RFC9111"/>
        </reference>
        <reference anchor="IANA.MediaTypes" target="https://www.iana.org/assignments/media-types/media-types.xhtml">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JOSE" target="https://www.iana.org/assignments/jose/jose.xhtml">
          <front>
            <title>JSON Object Signing and Encryption (JOSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JWT" target="https://www.iana.org/assignments/jwt/jwt.xhtml">
          <front>
            <title>JSON Web Token Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.CWT" target="https://www.iana.org/assignments/cwt/cwt.xhtml">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CWT.typ">
          <front>
            <title>COSE "typ" (type) Header Parameter</title>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <date day="26" month="February" year="2024"/>
            <abstract>
              <t>   This specification adds the equivalent of the JSON Object Signing and
   Encryption (JOSE) typ (type) header parameter to CBOR Object Signing
   and Encryption (COSE) so that the benefits of explicit typing, as
   defined in the JSON Web Token Best Current Practices BCP, can be
   brought to COSE objects.  The syntax of the COSE type header
   parameter value is the same as the existing COSE content type header
   parameter.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-typ-header-parameter-03"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7662">
          <front>
            <title>OAuth 2.0 Token Introspection</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This specification defines a method for a protected resource to query an OAuth 2.0 authorization server to determine the active state of an OAuth 2.0 token and to determine meta-information about this token. OAuth 2.0 deployments can use this method to convey information about the authorization context of the token from the authorization server to the protected resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7662"/>
          <seriesInfo name="DOI" value="10.17487/RFC7662"/>
        </reference>
        <reference anchor="RFC7800">
          <front>
            <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7800"/>
          <seriesInfo name="DOI" value="10.17487/RFC7800"/>
        </reference>
        <reference anchor="SD-JWT.VC">
          <front>
            <title>SD-JWT-based Verifiable Credentials (SD-JWT VC)</title>
            <author fullname="Oliver Terbu" initials="O." surname="Terbu">
              <organization>MATTR</organization>
            </author>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete Inc.</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="27" month="February" year="2024"/>
            <abstract>
              <t>   This specification describes data formats as well as validation and
   processing rules to express Verifiable Credentials with JSON payloads
   with and without selective disclosure based on the SD-JWT
   [I-D.ietf-oauth-selective-disclosure-jwt] format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-sd-jwt-vc-02"/>
        </reference>
        <reference anchor="ISO.mdoc">
          <front>
            <title>ISO/IEC 18013-5:2021 ISO-compliant driving licence</title>
            <author>
              <organization>ISO/IEC JTC 1/SC 17</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 855?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank
Brian Campbell,
Filip Skokan,
Francesco Marino,
Guiseppe De Marco,
Kristina Yasuda,
Michael B. Jones,
Mike Prorock,
Oliver Terbu,
Orie Steele,
Timo Glastra
and
Torsten Lodderstedt</t>
      <t>for their valuable contributions, discussions and feedback to this specification.</t>
    </section>
    <section numbered="false" anchor="document-history">
      <name>Document History</name>
      <t>-02</t>
      <ul spacing="normal">
        <li>
          <t>add ttl claim to Status List Token to convey caching</t>
        </li>
        <li>
          <t>relax requirements on referenced token</t>
        </li>
        <li>
          <t>clarify Deflate / zlib compression</t>
        </li>
        <li>
          <t>make a reference to the Issuer-Holder-Verifier model of SD-JWT VC</t>
        </li>
        <li>
          <t>add COSE/CWT/CBOR encoding</t>
        </li>
      </ul>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Rename title of the draft</t>
        </li>
        <li>
          <t>add design consideration to the introduction</t>
        </li>
        <li>
          <t>Change status claim to in referenced token to allow re-use for other mechanisms</t>
        </li>
        <li>
          <t>Add IANA Registry for status mechanisms</t>
        </li>
        <li>
          <t>restructure the sections of this document</t>
        </li>
        <li>
          <t>add option to return an unsigned Status List</t>
        </li>
        <li>
          <t>Changing compression from gzip to zlib</t>
        </li>
        <li>
          <t>Change typo in Status List Token sub claim description</t>
        </li>
        <li>
          <t>Add access token as an example use-case</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft after working group adoption</t>
        </li>
        <li>
          <t>update acknowledgments</t>
        </li>
        <li>
          <t>renamed Verifier to Relying Party</t>
        </li>
        <li>
          <t>added IANA consideration</t>
        </li>
      </ul>
      <t>[ draft-ietf-oauth-status-list ]</t>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Applied editorial improvements suggested by Michael Jones.</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+19244bR5bgO78ipgSMqtoki8k7q7ttl0pSW27dRlW2psc2
WsnMIJmuZCYnM1lVbLUa2Jm3/YB92H2YxQCLWWCwAwxmd4EB9gJIP7bnEhEZ
wUyWqty2p3tbMiyRyYyIEyfOPU6caLVajSIqYnkk9s7Sc5mI08Iv1rl4HOXF
XiPwCzlPs82RiJJZ2miEaZD4S3g5zPxZ0YpkMWul/rpYtHJq1oqhWavTbeTr
6TLK8yhNis0K3n/04OyhEHeEH+cpDIVf95rw7/E9+CfN4NMLeNJI1supzI4a
IYx71Lg4Er3GhUzW8FmIeVQs1lNofBHkxXo2O7wOhj1oEEMneQENFkWxyo8O
D1XDNvfUjtJru7j2x/aiWMZ7jQY+TwFg0YIBhZit45gRdJZOIx/QmAJSM/ot
zeZ+Ev3GLwApR+LJ8dnZC3oul34UH4mCGrRjavDp0i+KrD2P06kfVzt/7q9j
cc/Pi8hP7D5W8Lw95eefrtK8kGk7lNX2J4ssopfEvTRb+onTSYA/tqf8w6fz
5RV20UjwexFd0FK8eHjiTQadI/3BPPL0I48fdTv94ZH+wI96kzE/wg/8aOh1
B0f6g3o07o2P9Ad+NBp4/BZ+MI8m+tGEH427A36EH9Sj3qR7pD+oR5O+egs+
8KNJZ8Bv4Qf1yPN4jvjBPPL0I5zjo+Onx+0nMoz8M6Dz/IgQaYhCqHVHiocX
9+iJZjdqJaiZ+sHP5tKm18vLyzYskt+GLg594KZ5spRJkR8usWkLOcv53L5i
qlRgff7s9MFtAPr89NlT8Wz6rQwKcQpjRclc+EkoHiRBtlkh2Yp97PPgtuB+
m+aS/toG8OXZreF7KaeCBdVJ7EfLW6Pu28sC/9+C5OR2kJzce/bCgmQfmh98
R3gCgCew4YG+2rCaIDJb99skfALAHC5wayH9UGatlZ8BFxcgVhoolV2+HI4U
ZeMHxSXDIVM2flCPxh2mbPwAj07vt2Ax2l+eWMMqmRe2AF2tiwBRdfqsvQQV
cA2qTp8dPnpwIj4/OxHe4Sn8NXIxp1/wxh2v1xocdTtdD/uFSS5XMWCoANUS
XSDpxVEgk0CCkG20Wi3hT/Mi84Oi0ThbRLnIVzKIZlFA4lSEchYlEp6y8kIJ
LUCH+PAgWwfFOoPfkJRXWRpIwD50n61jeAjoE5lcwe+wGvi4WEjdSzoDoQzr
C93KALoIxXQjbswkqNWITq59ef8E322KfB0sBOgLl8Zz6OvlWQ6/uxSXE8nl
B9QZYE/gqrQBMdLBAEFfwQPMcJnL+AJRkknSyCUKYJIIBXRO8MO/bUb/MgrD
GPTAHfEoKbI0hN4AfFgMGoOp0EUUTEy8fm0k0Zs31CM/VWL2zZv3zZzfRfGO
7+7AAr2Dwh3GsDGCwyuSxdYL/0KKC9COAlRjHk1jmPwKiI5pKG+L03QpadUX
gAvnNxGAroySixTQJsCuWdNKKgRfLmQmYcaBzAo/SgAJoDmLKAD8TtN1QSTF
b2IvwcJP5jDMhcyAK5ayCe0jRAGsRbRcpdBHgksnpgACwggfgTmW6wSBoa+Z
jDcIAAiCIoJlhDEJPBAJ6Upm1AqVt8xK9AKQAEdmAQNMFMDUIhApsGIwOT+O
0O4KcZ3yNTBYEvJSRrCyOGmZtRX3AUbXKL8M4/m23UiLgI0MWSksAqC0zPg7
raWmm2LhY195kEUwbYQxSkIQA+HajxVJS2LI5TouohXM74WcAdwgH0JFDBqP
W+TtkLIoOYS78+O42hO1A9RcyA08uwAl7YtpBLPKMn+Dc0D4rOm2xQMfBt7u
BxEM/acB4ZQWKJRXIlxnuHaITx9e5qkbROWEN6DPiETJJViqNCD0ZUDgacBy
rTW14m/7KA4KfpVHCtIMOl2lgGwgGnxtG8S7WmK2xbGzgEuYqIyIYGA9QGrC
UjAtwDyALlYpUBuiFX5FXUYTDMGCnMowJGqCEV2aoAGbzCx+znBWyGgX0bw8
Y5oBHWV3mhOgU1wt4JwcBkZ5Lq+wg5xZNGNum+lmZG8hBuuGB9M5Cpw3qUNE
3RKsaeJDWBWgHmBlJCFkLAk05OeEmKsCyCeaRnFUbMRSIqtH+ZL6CNZ5kS4r
UMgSCBLEGpJFekkkQ1xHlFqlr0w/2Ga/ffr9AJj1GIHyl8gweiLr3GeEuG0A
HbBkIDXwV1cJEhCwwAGqTq0SYcYMKy42yn2iV6/dxxYkkNEAefOmrYAlrYFK
m95jqQ7mCEhsI0KSlAjuEpa0QEyAOFvCL1vQaKy4ADXFFCRthJz01+tIqTkS
kNBZRtIS+tQiDjtxp6P6x3GhdVDEG5QABdgbjsTE1bBpWFqrbKGjqLFQUoAJ
ZshaiF6Io2XERE4rxbM3qkkTmVm46mopQt9CECgWGJaUQACSHe0aIC2xX5Fz
BxqRzNaPmNaUfONvrc/SGE3OL6lP+HWZhjKG5TMGI6ww2R2zFETdJeIZ3JE5
GKiAj1UUFAwdMxZgNJCrAmU6qDBm70W0gtn/7ne/A4oKoqgFK9ZofNSq/vlI
VP7UvcbvNn5bfVv81mgYs951r/G73ION89oBP6bXKqxpetgnfadMwQMhfrZz
YmQ1NslAOnBgqMxC2JyvH+2YhYb4o+qAtZjcnuFHjbIv88kS8+bhRf2i1U8B
nlZUA08XrT6lrg+uQ8KO0ZCQwEa9I14Qdflosb6QF6liQsOsyvQF6ZjnzCAk
K4jXSNJHxDcgPCR4X5u8AJuiDTJMSZW8aMIamG6B6f6yPehMxNnjU7ICme1R
jIOUmEqYHKpQtMWjGfwENgyIxcwPIwbSbmP3G5OK2z958Rh4leQGiQxAfB74
sc965qfiWRKjmDyxOlHYfZ6lRRqksdh/dnL6/IDA8UMz7Ao8LT/YiCzKz8F+
Ao0ZsLQN4gg1Esoo6Z9rtwhFq8xx+Es5BQOFbFEfZVkWsqhtCxwHmQtMZzJy
cDitjHPHvAaMgIjClWARGyDa4dcYJdp61SrSFolqdF/a4gnInSxBmzxLwdgC
1KJ8BBm+BovQL9KsBSIGILOwl8k54C+LlOv3V2Act36ZpJexDOeyBahJZyRF
oRNU6zQYy1oAW6Nm7q9Ytcx8wI2Fdpad0PUcTP52rVOaS3lOI4BeCNGGhMaI
4aksLpEmrN6a7DnRJ/ZTeXiQzKACYdF/s+WbGscfxkG9DeIAjUCglnQGRgiM
hiiP6SG7iWgi6ZXg1czRloZv0yjxs41C9Bk7M80t8wDtLFKIqOxte9xPQMEu
UrAqkpAM7WUUx2S3Ve1qMNBjHHgJvZB1Bhhb+mw+ab3XFs9jPyD/H2Mowl+m
azSLYaxqh2RmElb8pWSfl6womaD6A/aTWYlLVjkXUhvDjxyPxl06IHPoIcoX
ypBAL1bsKYQ8MSr/CfhUaZjvaVrbEAGpJSotA0Q/vyEzbTVgnLs0oaabGpsB
uIlMAuchu6K6N8FGg+5urU1gBUImkf7B6mmTULwv0VYXJ8rr4/4apL5DGCKn
7gufTJ1aI8aPlswxC+iVRYWl97n3eQpLcNRo/IQXxuWIBa72zL8AEJFCyTAl
x8HPyehbg+OSAfBEr2QsXNMP2P3YrgkdKp+Tww/YEXVNZjU6x/Dy0v8WBgXp
gbbJkukrma/B2s2vHyJdFch/kpyofL1CD/06jwBZ/SKNQphLItHERN6i6Ja8
QrkBhAyOGfjm3EANbvMaD43SAazAFbG35qkyJGUBw4zC788xrkChReRFDOhk
QP95aU7uHpCZBl6C1cXgQhpHgRae6WxGOkYNeQ3GNFCun8/CmUG/pjHax/x8
I84lsmyexmvWsSCYM/ChxAyDn5dpdn5dR4oWS58MfmGflaIp6No7IrQM1FiO
hrL6yUFHppui7GoRjwG/as7TFgWGxk6w54TZFOd+H9k7stgMJwWwg6Tce/LF
6RlugeG/4ukz+vziwV988ejFg/v4+fSz48ePzYeGeuP0s2dfPL5ffipbnjx7
8uTB0/vcGJ4K51Fj78nxr/ZYuew9e3726NnT48d7hs1LJ5TZZyo5nAQag0OC
DW06k39z7+T52//s9cEP+DPc2/EwOqe+jL1RH76Ai5TwaGkCvhR/BYxtGqDC
pZ9ptgz8FfhAMVgfqAzA601QaEuQVz/5CjHzzZH42TRYef2P1QOcsPNQ48x5
SDirPqk0ZiTWPKoZxmDTeb6FaRfe41853zXerYc/+4T4quWNP/m4gSR0Rk5v
GqfzTaPBKuqocSTQkWeDlMhRGR91MR0d58aITb7LZFBho0pboOtcZhccOqma
6MgpYrUGzRiYKFAbLWyORz5HG7AGWtC8KEjSSuTM8cm3Iu814LXFMWr38wTJ
BOhFe6UAgtWpAiDlsLsOOepovBtd0jYNT7gM8hHYbH6XYFkWT8UUcUHghwSI
Dh1wEIs9m20gWMIwJBjLoc0BVFSrBYi1ON6YuLoddUS8u1DwgLtbuzsBKl5q
jWvcSlGJ3gHglfmBQ0Q+gkX+pMNB0xDKOSzfHUxU6B/Rz88mGBly914cuiwM
ISuNDguzJsu1dvvFCUXpDYOBNer1+zU17XlzggN0Nt/MsnSpvBXCmrskZCXP
0cTEaJ3FE7bTVVU7lrPzHvpHAWGP9/qOlZLwptE43g4SAU1vMNxVErVZ7pvR
tbMzhFoPhBUa+ToMjz4HBo+VHVRdzkqU0YRqyea1DUg/nqfgAi2WYD16Kqhu
q+OKtCJ9QFq5hBEj5szKrRysNmzpNbvNPmWZjJV/AyugTSv8yRvSr93BsMTI
jEzUqnCFhtpVaWKIC8Qgwq5kmx5WBZjLCJ+gqHzBWyowLP1CAgfwHq3WHA0T
pcVIHKh9uI1yTcHohp9oj4fpB0P7C8DPuZQrcri12at8BTaxM3qRHGuZZWwG
J6hju0zhaDOiMt5aKZh3GvKGoE1HbTBrdky7CQY5LBq9W+4+kLE6Pty/o187
KNG8Pwb8dwn93oG9P4MLJ3dtq3B0BkR/qMSC2jGSV0zkS39Fg2pqxeXWZiK7
yWZjRTozOzP9ABRZgdS65n1h6LXDrgpOiKhsD+eyJ1rCE/tTqcGI0RkhpYY6
MNuoWdmjYvSZOJI3mtZEuCRaYomt0XYlizZhEtnr7GmnlZyO7d/390Z7B6gc
Yx5GbwqVrA/Q+7xdGACpZWqOOHwuC0VrjHbaVgLS6Cmwyz4U72IMweD9/oOH
j4/P1I4upv2g6Ye4wfH/6vGje+aXDkb6Uf+w9APdsUWqCEyNJsGOFtEcHPGi
DGFgbAx4IQZPy49idFvaja0otN72AM9pjYkDRWWXZHvjbVsgesO6TUbeX8AR
4HeOuHQJS/lBucWSWIgqMXhUiXPzcF91vhE/F57+5uG3jv7Wdb71nDf7zreB
823otBs5v42dbxN39I7T0HOh8VxwPBcer+/+qiCimOwZBf0IYWp7FQOVCe6N
VvFCOLP/dKohYG/re7eBrMB/RmIoBqIveqIL73V2PTLBa/FRa+u/XY/a7XaD
WAQj77/1ftuB/z36Fz+ZRx31gB51foutvttYzKj1E/AG8Be8BJ86YiLGiIRe
Oc7Xv3b/HNY8Kt/WiL66N6k8Ou6VgXVHRyjb+iGxtGuNtL7N0+SNDq6pbT+9
1cespu1QVrXYU0urHMecBz//Fff8a+z51ZHQPl/bsQe3zWhni570HL9nXgEZ
QTt9xWUqAsreomwmGA7ptDrOIxDUcxOQ22iJz0mrKDKIvEE71yitqu+z/yqG
ySj1gIkCl5htwLSFKGEgiFvIgiHtM24rCOM6RJwWGQNVb+jZvaO+r7MxcQ9e
RUhyxxqysw604aW29uSwv85is3j7rkF9qha/a3aG2To/cFNGTKyRW331zb5N
Tgc3EvAIDyGi3q1wqep35g/Jm1+zlvu5+KpzNZ00gex9kG4NNamjxmtA/B4u
yd4RrAd+gSWAz3vyaTZdv5gfHy+Ce3/5F3uNN3bPNSxDHkktywTTNLsNy2BP
O1kGsfWKH+KzV1ZrcgzARhL7TygqitkIYsDbBPZ4FrIT2khB9qjjji8SlQSC
ETa7085BDTF+N365GZ+APS8sTqlhlHsb8rOIUWxQu3Wg3oJCSeDdnEzrghHf
B5n63WF/2B1ORv1Rr+MNe8Ng1Bv1+/5oHPrhdDrxxp1Op+uNOt4gdAjVBTuy
oMQN/QTsTrCdwV1drQsNqJ4buLGYf2p353drdm2tP3eQ/va7B7BGw/71Lwq1
Wvv9A1JXena73tZsCi93to2EystroNh9j8Co7bAGjJ4CgxC7+20lIODdvv++
nsl+3Pc63HPdUm31fPXuP777T2//9esrb/z1VacD/3fh8wj+9b7Zc+VPTRjP
lToUbKkED/hN2umvsoJK77Li4+gcVONOZWYYeJyF1Nkg6AjPM7UZUsPmKnHu
Mq/NfWHIOEi9SPPCbJ+pXWgKNVJmGrBbkoNgydSumN7FMHsh7S1hq/k7rw5Y
Ji9aed+fY5aC2eTYTghXnk5FB5zZEcFaRUCIxbzrN8yX1dZaAzs++naGPMG3
RxvcWahSoKx82oqsQtFHmwCY+Spz7XMimJ9R6jnbYsVm5UjUM/UOnkEwgCmL
DafzEUzk1W0G40x6MByU8RfltrqhzQTe51XSU2uLaryYlCA2F/ucvHXAhh6D
qbeafPDYor9eG7VgwguZIcBK8D2sp0uTJOJPc4qkcsaalUuMrDDDfXDLiqS9
pMsol01R5sE7+ccEL/5GacKcqaV0YBkBOeUNVWUFntDbUU55L7hPXWeUDdvd
tmcMMzySo8OerqUHXq8f8xr5Rv4zZhmhZUDUCq1UA5hoyq+nFfKhh2If/kYL
/bsuUs1q3HQm6yyqzkTNwnE+1Es7I7RIrn5RnSA+VEQI3Fo/RQp9R0uJ4RqT
zFzD/Je+yscOaTx5hfyoN5fUePhQ7MPfkYoVYsdq1KaIZpp3mt8NBDd5nIap
5oqjrCjiKmz4UOzTMBQKvbghYEv/KlqulyonhNaAEug5ARUjjU1e1XqY1R4u
bnCrpEeaw3pJWc4UE/bFDEbHTZHVRqidQAowUx4F4Luaem2tI2bsq9ztC23m
tq/zXs8q1LVvnd/YSSP21GAGqGeUdKfEHjrYApZarIn4ZpaqtUfBXaAA2nAs
Xov4J8e/MmlAvAHOfnMZS6a3FDLCaI6bu6UlwKIK5WG+WS4RqYFrNpR7AG2z
g6J1OvWaSeXq80hALhEZH6pn8QTD53MpjtfwCh7CYOI/ASUJ1v7xycFNR6Bz
A7yZkOjDETQNH10oDpC+tz0RI0psTGzgLtS+NyMPA+RkFaEPtEN7uwq73xbH
li5B7WItm0TZGJT5B5TDwWFmxRVhlAdAzZa3QenCZhqbClmQs5ikScucAHVS
yuu2iZVpw/aP6xeQFw1LgI7zg9PuYLhHrvR5FOITr8tfwZLAr64JgZ51mzsA
eQO/d7sTb9TtgIFMjUDComs+HA8n1sMc/XVzDE9B3gZNyiNZzAfvvW6U7oPy
8nf7+UK84S7W0x1DHJYTyA+990QGDOpOrrcKg1tbhXXGaZ1VyCeobmqoIZjK
qoeRFpZ96A1fibN790HCg0F4sC3vyEpUtHdiCQvbYIQ5vqpsy6qDkbeDcNuU
9EpL0AbsFPMHQ5Otg2Pbxk2NDDUm+gFJ+K5lvbyvY7J1btrx0LEa3guzX9y8
636NgWDr6roByKy4MeyDQa+/pdO2ycH67YdSdxhWu726O7mRujv50dTdyQ+q
7k5+T3V3cnt1Vy+WXEn0x6LuToy6E/s4+SgJ4nWo/TISeSwhxUYCDzgqMeyO
+4OeDzqrO/Q6Q4lhpaE36o8Go94wGE7we3c67I1Go77vdfr9bs/rdQfjYccf
dLqjcRdUXgNe7486ox70M+vOhoPReOgNw1EHOhh05bA3nA3D7qyu61GvO+t5
oDB7jeH4Jt10hp4/7I+DwVT6nb7nj8eTcTiTvjeZzWayMRjeJgQ5GPc7nVk3
8GF6Xel1pp1JOAgbQxkOoBNvNgqmPgzhAQDdXr8z6obedDqc9MJpdzTq9Mdy
EE4Hfl8O+/hn0vUn09HYC2FIvxFMRl4/nE4mAXyDkXtjryuDSSfwp6PRpA8A
TP3pYApQ/oCB0PC9gdDCn+97Ywz9jd8bCaXgrw6EDq6JWHKcUMUVJwdqn28X
ken3wZp5+/cYRPzzr6+8TqI08p5q7ZJidTQyt0h5cwv/mugrt8AYsKeB6+yc
ve6egrV9/X5/J2b1+zz97oHZ5UTGua6BIBOUkTsWw5pdZ+t17n0yNMg13Ohy
kY3c/4KR2qs/07aiwewOfrWa2malbraLna1mtgWqmzG3V5ndauYhEeTGpDUD
7hAHVssSTOhiCGTkm0mCzOjNAiMzgl5AMsNqHH59NQ4+effvoWkfm8LX8ddX
k/G7v8Vn3uTd/9WdzWS9nLE6e/d/vnz79yHa8jiZIM7NLHbIIqtt8fn1EXZF
If2bUMjQUGxvFoLQHoZeR077077X82bebBh41sCfvPsPMIS/RP5794+/PPbe
/fO7//nu32nQu7NpbzjwZXc0nQwncixB8namfRuHh2//Rb79p7tv/zV691/h
v7+D7qbPdPt+pzsZe4PpcDQJpl5n4AVeMJFTG22fHgDWva/mgPfg7T9D6wHA
EvD/E/n2X8xy+v4IqGbmjabBDISwDPv93jS0Qfn27T8cpoi1t//r3f9++z/e
/bf7P333d7p90O31JoPh2J/2u5P+xBtOECNyZK/g3/RgzMHi7T/eg3+BIiZe
9Pa/Q4e9d/+gu+l0fenJYc0Wi+kG1+7tP0Ez+e323khl3/H1HZMEG5qdkdJT
I3eidMvIGoQX7m0sje9rrtsrDeVqJmHTOoOESkYPyz2UZ4eo3ANHn+oSufXB
hah63ooNVCemmbsnhahvJ+XXtsZd/2v38STdpdKFZvIq20Kd0LdOOrEx6J5q
Uts+aH2BaZfOUz6MvRckMwuNOmrds2LWWMHmzRv8leOVeMQSp1RQgRoyijFy
j45DpLHG8fBcRwR57TCaSkdHa/ainZ2abQqxNmp2pqj+WPs033XrZEfo/Ifc
O6nS64etk3LrpCSymrUpY8q7wsnG696xaNfkTRUqCxWTZ+vFg5FOKsWiPrzN
xFZs+fg3rZcQsYyiMwa/zxGFW+R94VSi8Kpm7wYeAhNgKl49OhOTGlaXVKoS
k2GshQzO7fOZtiSvYUTNQME6I4FWL+HNbgTDWe5EkBcr5761G9F0D7yYpr+R
WYoInGfSL3DTQqEDt8Uq6KC9sv0vXjzaQVuKibhz5notFKqpBHWrZgNp0Y9z
EEOh5n0oIVhLlADQWyEkm3kbjT+0YEMoWW2o4AGN62/i1A/rj0RUU2nfE3D3
rKj6zWLlZZi8LnaO3YRX8LXT1N9hCW4YH8fX32BcnSPlO7XxybXaOLitNqaa
ZJVAlBIa30eY/HsNQtdZH2W4dVAK/h2RVtXZ1vEOlSn4igMdZaogUhxhTdlI
rnqghP6okEst92Z0wL1WVfB5nrKF3lzfMTBl0Ed0ohpPzbaYpVd+pOvvUGs8
T7vEU8HE3dRFIa+Kuvy+3sF23q5lqih+3Qa6qU7Y2KdZStFmF61Sq6/t2Prq
hIVDMAYVOq1y90bwD6FUF6qAUV6lul1JD9dRIBXJqOUvKwn1EUjeykqb8yIl
amBN4nC3Uq5lFNR9N2GUHZqtrk8rKeT6Pv9g9cYtlYU33if8fKVk96G1w3co
fvYzI+TxJ1Aq8Ld3JFoj+Jd0i9AHCt6Ijz9umk7Wid2N3QeoIfi7fyQWdzE2
dxe+3PV6d8t+yk70VCpwgIjkD941yku/rLjmUJCwPLI62qnQHLW217G6+w7q
TU2rsf3JRZjZeIHPi7vtdvsu/fQN/H1wrWZk1xoV2qGbZl7Vkmkub6UmX2Gv
v8YjtKC+MO3afK8qDSdysHeDI7hcBnXPOXzbaPDxYlXRjcIVDFGtrFYhFPXi
jgQ0y+PbpXgsyGs5PmCO33n02Thg2kSN/amMNWeTZKtJNN8BzR+xaDm7d/9I
N7XSkLmqoomgUd1qfeahUo9xlRaqOpd9MK+mYGdud6+8e9BylexiKxCWkgnh
J2TI4NEx3JTkjGb7AMt0o/JBahy0Awri8ePLRRpbjgedbCA+MlVNcRw+XblV
bBOjULhpaNzG8ni1mXbdIQm1dqb2UKWYR1nuDiGsFLfUURDDYNfWumw3jkvS
Uy0xtqcRhY2tE6Z2jvWdrdX/klpjxrliYhdQfCibVGqQ/FUeVbDbPNdxITeq
JMr6JNNK1kDbHV6LtwQz/wAlajK6LBcf8+0OBm1d0oGIdHuEinGlLVagfdES
natOB/7Z+/L48aP7eEjYMsEVK5pMStoqb7KNGZBLHIPbHrdVPx728+jpTXrC
8mfnMkS7NVnHMX7iek5TPzjHw6uYmC+pwm+AtcjwizZZEet0uBqgACnB1bgU
CF0E4fSL0+dcTuZ6IMCkXaWZn0XxRqcSYPHlZA7yBc/MT33OyMcDz1icK4LZ
ym0obBiIzMtSqNs8zQG+RZrmXNgzxIgb9KIOBu0jc/Oxc7eqslNv2DCBQyqa
I6yAogKntpK4VeIDWBkYFQHaCKzAtbYqIlxThvch1a8loUnJsPqQBfpr3Avr
Yz5vrvNui0WWrudsRVNynNh/UCb2nFHmL9rnFPmlIoDW2hGl7itCZZFWWyFa
DUZFKLjyiq4KBuzy3KCjktj2gssGYqlwcKopl+YmQaCmUuB2GQ0ONEmqpvfZ
2dlz8YsHZ7osoXa47Y4e6Bo1GNFVFbR1WeWdL/Mo6yKKsX7E2ePTtnhJOwtE
kGmChZbzRboGPT6VZcUFCt/GKBqxRIOu7o2yHqtCYlUdTB+yajRyNFALIxDw
GJXi1a2JNg8IzcOyuq7XHZgohIsllbdMeHL9quMAS6q1+DAHm0mhqiq+sOs7
squbc+YKyDNgfosDLLv2I0wl3iPa3zrlSAFmjtdd1/yyqG9t8mmuaYx5XbWt
rdLi1zXfMXaZywNW3qyGCk0pX6bERKFVnZFpKlxaGCSjKsdE81CJIC5hhLSD
u1NI/+m6aKWz1hRWuXpi6IXqDQBSzv+aqhfP1rEZqVkh6OdcBCpTBJ1vF+xT
MYvWn/wiM06p2DKw17VY2Fpdzb2olXChTdU7xrKdoDjblYZ/0+FhJu8bXZVJ
v8ngdvjihhDQUrwHBFqVm8KgEjNvOvz7EXByawQobw6FKCkU07USosg1899E
KyztR8zyAD3QHVWn8JogksnAvidcRpFEiC6paDuz+7I9bzfZp2WDZMEHE+lW
gkJmCTtfln+LZIwHHsmMiqNzqYES9yUeogG98xRsWCyNqNQ4cniWGudTw1GG
C8sjLrYeK53kHEtx+lnIyME5ydaJ6rQeAZ5GwJdc1w111wtcA/II0XZ4uM4o
SvGAzZx8RyY86ehu6x6IR/Ujuw1bkoOpJ8pLq2lbDJYec6zTNNx9KPKFLOsW
dHb1d/bscAlsOxjGJeuYTs5rtTCL1AlZD91ABkj7kG44A/De1WdQtZdtg15b
nYZq03Svr03T7avaND1dmwYaKRvzFlVoutdUoek5VWg630sVmq5bhabnVqHp
/UiVZMR3KibjPvoO5V7c/5wqM7q+jKkyY9eYwb/VW3Ytmt8fghIdX4tD5/8b
PVKLRx30FOa7Jbo99Uj/q97q6bes0jflw/LdEfw/hP+xBo5KHPU8qoQjsIDN
2A7Sfu1WwbnJo5rCOCfVwjj97ZTVztXDiaqV88LU167UGXPqccvw0JRQMRFX
a3Pn+hIQAZWA6Pfx79lkV72SrluvJB0NZ4/Ojo+fz47nQeVYErocVIp8q1C0
eH1H/8I5cScqXkERQR3UXfkZaQ+dGV2dUOPs2f1nQsY+aH90PbBsIBagp6tG
Eh0EUf0cms5jsK7VNiwWsUskpojp+JFf+EbrqooDIEdjZ5cMFM3LBScX0JlP
qhJwoUqI5nWBhZks1AFYHIDr14pEGtntX6IAQrCLvFrFkXdd7xZFfJcPu+Lv
1mHXxq7Uq7J6K4YM3WtkclkUKkVQHYal46x8ZldHKwhuVe9TxVVWdDMUrOkK
68sCuCHGDKOpKq48a7i5f7SFe3KfyqbynoLzfgkTl3Sf841t8zVofJWbY2HZ
2Vul7qELvOCGS9U7WCXQG84x3Jr2Eu9SiGYc/LN/iFgDW6GKO3Q2Js2ogre5
86WC+Nd3dAH+lq/eJ6p/U0Otzgu2gbbCoBWXC1xGOV1QwKUvZlFsTEarjLKu
TK/KTxC0nwE0abapGdZFINgyTCbaVCP6wyWXh3zxqWrQBIyIBfWKZTkUKaus
TPtmJ+oE66+zr6ssTZBYYDTi5t06ozj+cwX0dhV5gP0xFrWM1OVWtPRTjHvo
GxN08XLFdCoW8/qOQkOLW6lNKbwjwCAosMeqnsNpCjpYFCkLz5i+mAmgqOfm
19k01eU6ajHtNF2u/pr5gbkSw1ymVLvZtL1XH+m4HYV+aB9+Zt28k84ofaIm
22m62coPNsUsCx0qg74vKSal3IkFl+oPKKELj6Wr1EktI3Qipi77THIXq5Cq
malrksLyJhTaeSnjIJHUp+1RCKrYkZux1a6eU7Uu8CjUNSC8xBwLUZoG6whQ
jRh/+07GrSLWO4rWVu+FsAq/OpnXxmgH9ZIxaXEacWUxq3EgZcxb03b2HDhK
zLNTFMLkJ1geqw1xxXl+kiabJeLZSgLF4pw7Lr7YHq/JwV0V37cvvrBr0apr
saiALTJlxL6xoWkFjHU1hnQv0aCdlq3qr2U9L6IU7NOag7vTRdAhHFwl95gv
L8joq7qShGY3BT2Ht2Hpe1B08BrIxNdlhFTIlDSOr3b0KKmGUlvS7QpAlO3u
V+q2sJJ44mMkDk0KnjvtTi23HmKtVoz6bla+unXLwCcTcIXL0qsOzgCpc/hd
EbNJmN7O9OTivtWExnsbxSpL6aOXR8IN4UARSeF0KuZG9X/1HlbNFmniJBLn
Ze1gWnxXmlWbwxw4Is6kHuVmSCNQsOgpbYcwT+hUqBKJU7nwL+CTwaOkS940
F2wJF51SxsH9G1wGM92oLO9qXcbyTEANCmTE5Kd2Kr9IKlprG7JSZambOFu0
lw6a65m+QcmVFLgXFF3sKNivpLe5syZShz7UrsYWC9kV84mP1BaltQNklDon
MJnrgrkKdJqeU+nrSlLbK3K4XrVBSl0iLdZtwKDZsMJtkBzjTnjSuUhVKh4P
hkOojnaqxWtmR7cpcbViNGL0Hso9DLojFHRV7Rw3mOPNLvgqKm8HHHfVxisu
cmmxRzadKivJFO6mnbOZpNQcMDra87YyRn75qxO9I1jSLV1DqMAthyLdn/Ol
UstovlCCjfYl6VROlKirZHSaI5+L4WPFGpAE75fhXQSl6li3KKhKm5N3C/Ay
19zsPzo3LOdUIpug0u9L0MXphlIIypATbrnTc2nfK6ijVzW8jbbg3GfmPmq0
KA6H8s+xnjk8WzXI8UIsyTHbWrv8oA09atxmsmWuU92x2GV/bol0cMhmMtgE
sTzQ7A9oO1fM32icpLE61qX0Al/wUxEJ6lZHW7duuLhRck7nDEgT+Zys09RJ
lsV6FVt56jbzRGTx1jMQGlxKiSgRpkraoyiXZP6x63dvWyTmVg4wraqSTGFd
OJGOR5j5b8+Y19m+pZNzjjaMC7o+xg9MSX5jjQGNZ0hxpd3LPRHsrhoytaSq
4LG017DRCBcwTVQzW4DqWypKLMGc0+XSlOJHP81RC8jSlfGcm4pphjkYVJTp
YlOMdrQjLi6YqrugnJv2+D7YXYhtqhIPTmoZDqoJEOGd+hiZKO8QThlPZeJQ
odbwJlRvoJypyLz2BYiStvwQXCAVmqyj22bJJ5V67rTHqPI0MMMsRyVAUqQp
Vrlch2kLmCQEHwsvBuFPtEEtc2iI08Zg0AZ/DdGQU0VpqdD/dLbOrY1s8HNL
7V9zEZ2qw2+vewkbpYagpGMxqxIBDGodWgEigOc+RaPiDUmQM6pEyfroM3ai
GzXuPNhLeImstGzraqAjyq0Sl85ViyggCsn5d8afQ1EYrslHNCa9Y+wrOFQm
iZ3vXN6Q7Owdf9LYvswH4aktjuvTdV3rLGAns8zdqzDktlNoNqqVvrXmUxOV
I8WJQVSlNtN1wcOG6j5KvCaMkmLKeynp3nqHBarBTZdFOMTJvP9Yc0vlrZKR
VNgCv1MsrnL1yb4+SlCJ9x0ol8rckGR3gjKwetuQIENz9+3lKgDmuLqIMzDX
VuaGp21groGw5rIhc/e2Mci0HtYZuEzf5mZLusItNWaBsKUmx8lUwMVyRquy
XO32oYXU3OEy8bYwyWgdSLRnRLdy7JyQpio1EXRFUdaiXM7XFA0GHmBbi88P
o1yyLqtnwWs5dJbi/w7gg46K+AL56hQE3mzLmDLqoE6TKzMT0YsA0vg62oM3
aZChnfLtQnTRZU1ob+vEsjrR9IJTT32OXtacfNG+oE5Sdepcl5koqjuOGDT4
ss3aEa2bNl+/xvfan788e/PGuq+TJKV7ePoOJcurZmrLPMeDWOo4/1MwS45M
3nb5/D7FailB/ajEqnO8KbUM+zIobh1frN7t5ESwmN8x9EjDLuiyerXBHsvs
SDx6cPYQfzp10HpfZfju4ykvO7OBDLsDRvD2YuyaMR/x2THtY0cd3WZiRl/y
/gHVQ3RvFIoKvnXn+5n6VlbLbhw4KMBSpOaZM/MzVZ70MZjH+MZOAK+B7/bg
Iau9PNPMXrlptqRj0ER+4rc0O4D6+d7vsUVATDUHrvJgUuvPFlbiORrUWejk
KJTMoA7Qq/bsPTmnuKmVAzXJ2PJ0ncvCKqcVfVEgPnPtHk+Bc0QwA1t8TDAm
6HKUiY0q68Y56aNu4KA3lWjGzD6u4tomQmHVgB74kiStLmfGl/BCvwm9RCYl
tm+BcaZ7wBg13vYKboJUUUO+h5ek+oMr9BZ03rP2ofQdDei8yTjmqJqf813P
VBqdrzbFtENOSXaxYBMy4+IeWMoztfu0soXwjvWCLqsUz1095Gw6ygvK8Rrz
4FyAuM2bausQs10ePTj9xV5b0LuELPiVLsYrNKbV8CrfCvO89RXiqqwIeJZ+
FOd6ycCMLUB7qevEQXcu4dfy6wLvFl+h30jn0h1NXlb32M2qPLUX23RpjlKg
z6E+Kx/QrlBoQmxNtGKgD2A6uyQMwKRaqYojZfkVVdolSFc6Fm8NC4yG5rfK
0rVWDZQ3GPEYn5Hq/E/djMlUVqEjnXakmOkRmv1km9fpxTqeqqqL3TT3x6A2
6k+x7hbLW+UKfwQLqPZSgV120MlOO8icV/+Dt4NO/gTsoJMf0Q4K3kPRNzQ0
oJvWtrHxfdsaJx9sjQ+2xgdb44Ot8W9oa/xworn2EPk1kvmJDCOf887rDAx1
JOyGpsWSOuMzrGQQdDv9IVXMaxD/lIPVmBX0I/3GNfaKhREyJpWtodP/h+Pe
mM+kOSfL1Fl0XSCHavzxdY9Tin9bkS3ijZ/wzBNSztZhEPrpdD0tyl+t4yF4
mobeeKET7A2n5EciOfTpx2crdYK57kdztsPJN4MXplHiZ5ufAqnVg80S1Kqp
xoXRTCLtdn+nUop9k01LlPD1VzXEIL7+hjrC6mK0r6Tjpdsd6hk8X2vrz+nn
6Pruj+1yebRefFgMszcM8Ry5r/EZkV3dkk5fr0LSO/WpWxwopfEfZv6cJJ9V
kWfXDI9rb1LXpWIe4n6/vCp4t5sYkBvij0/8ABPD8oWgtAAiI2R26zXAIFAE
APjn/nL1U1fwq6zWwg84X0fvltlgiOf+Ohb3/BwEXgICGr61p/ztU9QqMm2H
0iwp7UDSbueRwI2yZ08VAVt1HegIPr2RpAk35YTWW4ylJFewLblovrj3kuuC
EqUc+UQ8TW/GyC/Pvl8+vix+BDauA1px8cuzn1LoS+1y0naKrRRymSn1Wb36
VLXZz1M2OziX0NrWAlOS0k1wR/4AukL41fYesHcEum3/bvvugQALiXbPs/yD
KPkgSv5ERAndZ/t9yhI8YPrDC5N6sFmaWLWPPjDyB0b+U2Hk79kmCH5wm+AD
b37gzf8PeLPValGpJ0zlOA4wPziWIa1V3nh9xClxMvz53syPc7n3ptF4KdWx
IaonwEXKk/PGvSxCNgakTmUcNxuwTtFKnJ6n5wB6A9Y/CcD7T2GJwJBNm41f
rCOwZVcYbsRnATz6ZRZh7psvfuXn69BvNp6AKexLwEBbfA6oyfEJjAkTytLg
vNl4RjUMxJnMpmv4BkY2SA8pY9lsnEXLVPwi9nGyDT8JQQZlmIEuHqchJuIA
1RaNhjqJEHHkmJIXCYXq1GLepHJ46zyPdMG8mZThlE4/pDV8QQkxOphjDubV
orHV6WIwCyhPFEWsaoZCp9WznUyUF3KjqzFAM0zFudJRMw77UXjH5PEQ78GL
0C9W7wMszzAgLQ7Fb+Joao4Soxz9CXgb57Iu7n3tEThM/6MzcOLLEzURriL5
8owrSUolQHGuHs71haTYahEVZYp9mPmzQjUPKfC8dXRPgRIhYYdrPvVo6N1O
TlY1HLdxUMakM9lCoTczB1TLc5gNkjq8//DC3mTYjj/nhPuy9CMfudKMrKJz
Oj6qppWu9EQyCY2w+pVYJ+rCNzudVE2LdY5ZHz5DSBVFoAtcvXL+IOBo0lWi
yddThRYrqq6mac60UmZ4zsF6LiUBCGrhFgGuWQfXTEdiaZ0E/A94w3ohdHg3
S9crmGKqO2d1AP27YgRRhisfCkNCMBPnGAajSqolcCig0QAVRMO3IlnMWilm
9besrSvUcZrESIFh5TFQIWmGgEdLPNyieCRfz+dSJ8dq6UKipV0/48b/A+uP
enPusAAA

-->

</rfc>
