<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-oauth-status-list-03" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title>Token Status List</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-status-list-03"/>
    <author fullname="Tobias Looker">
      <organization>MATTR</organization>
      <address>
        <email>tobias.looker@mattr.global</email>
      </address>
    </author>
    <author fullname="Paul Bastian">
      <organization/>
      <address>
        <email>paul.bastian@posteo.de</email>
      </address>
    </author>
    <author fullname="Christian Bormann">
      <organization>Robert Bosch GmbH</organization>
      <address>
        <email>christiancarl.bormann@bosch.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <abstract>
      <?line 74?>

<t>This specification defines status list data structures and processing rules for representing the status of tokens secured by JSON Object Signing and Encryption (JOSE) or CBOR Object Signing and Encryption(COSE), such as JSON Web Tokens (JWTs), CBOR Web Tokens (CWTs) and ISO mdoc.
The status list token data structures themselves are also represented as JWTs or CWTs.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://oauth-wg.github.io/draft-ietf-oauth-status-list/draft-ietf-oauth-status-list.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/oauth-wg/draft-ietf-oauth-status-list"/>.</t>
    </note>
  </front>
  <middle>
    <?line 79?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Token formats secured by JOSE <xref target="IANA.JOSE"/> or COSE <xref target="RFC9052"/>, such as JSON Web Tokens (JWTs) <xref target="RFC7519"/>, CBOR Web Tokens (CWTs) <xref target="RFC8392"/> and ISO mdoc <xref target="ISO.mdoc"/>, have vast possible applications. Some of these applications can involve issuing a token whereby certain semantics about the token can change over time, which are important to be able to communicate to relying parties in an interoperable manner, such as whether the token is considered invalidated or suspended by its issuer.</t>
      <t>This document defines a Status List and its representations in JSON and CBOR formats that describe the individual statuses of multiple Referenced Tokens, which themselves are JWTs or CWTs. The statuses of all Referenced Tokens are conveyed via a bit array in the Status List. Each Referenced Token is allocated an index during issuance that represents its position within this bit array. The value of the bit(s) at this index correspond to the Referenced Token's status. A Status List may either be provided via HTTPS or be signed and embedded into a Status List Token, whereas this document defines its representations in JWT and CWT. Status Lists may be composed for expressing a range of Status Types. This document defines basic Status Types for the most common use cases as well as an extensibility mechanism for custom Status Types. The document also defines how an issuer of a Referenced Token references a Status List (Token).</t>
      <t>An example for the usage of a Status List is to manage the status of issued access tokens as defined in section 1.4 of <xref target="RFC6749"/>. Token Introspection <xref target="RFC7662"/> defines another way to determine the status of an issued access token, but it requires the party trying to validate an access tokens status to directly contact the token issuer, whereas the mechanism defined in this specification does not have this limitation.</t>
      <t>Another possible use case for the Status List is to express the status of verifiable credentials (Referenced Tokens) issued by an Issuer in the Issuer-Holder-Verifier model <xref target="SD-JWT.VC"/>.
The following diagram depicts the basic conceptual relationship.</t>
      <artwork type="ascii-art"><![CDATA[
+-------------------+                  +------------------------+
|                   | describes status |                        |
|    Status List    +----------------->|    Referenced Token    |
|   (JSON or CBOR)  <------------------+      (JOSE, COSE)      |
|                   |   references     |                        |
+-------+-----------+                  +--------+---------------+
        |
        |embedded in
        v
+-------------------+
|                   |
| Status List Token |
|  (JWT or CWT)     |
|                   |
+-------------------+

]]></artwork>
      <section anchor="rationale">
        <name>Rationale</name>
        <t>Revocation mechanisms are an essential part for most identity ecosystems. In the past, revocation of X.509 TLS certificates has been proven difficult. Traditional certificate revocation lists (CRLs) have limited scalability; Online Certificate Status Protocol (OCSP) has additional privacy risks, since the client is leaking the requested website to a third party. OCSP stapling is addressing some of these problems at the cost of less up-to-date data. Modern approaches use accumulator-based revocation registries and Zero-Knowledge-Proofs to accommodate for this privacy gap, but face scalability issues again.</t>
        <t>This specification seeks to find a balance between scalability, security, and privacy by minimizing the status information to mere bits (often a single bit) and compressing the resulting binary data. Thereby, a Status List may contain statuses of many thousands or millions Referenced Tokens while remaining as small as possible. Placing large amounts of Referenced Tokens into the same list also enables herd privacy relative to the Issuer.</t>
        <t>This specification establishes the IANA "Status Mechanism Methods" registry for status mechanism and registers the members defined by this specification. Other specifications can register other members used for status retrieval.</t>
      </section>
      <section anchor="design-considerations">
        <name>Design Considerations</name>
        <t>The decisions taken in this specification aim to achieve the following design goals:</t>
        <ul spacing="normal">
          <li>
            <t>the specification shall favor a simple and easy to understand concept</t>
          </li>
          <li>
            <t>the specification shall be easy, fast and secure to implement in all major programming languages</t>
          </li>
          <li>
            <t>the specification shall be optimized to support the most common use cases and avoid unnecessary complexity of corner cases</t>
          </li>
          <li>
            <t>the Status List shall scale up to millions of tokens to support large scale government or enterprise use cases</t>
          </li>
          <li>
            <t>the Status List shall enable caching policies and offline support</t>
          </li>
          <li>
            <t>the specification shall support JSON and CBOR based tokens</t>
          </li>
          <li>
            <t>the specification shall not specify key resolution or trust frameworks</t>
          </li>
          <li>
            <t>the specification shall design an extension point to convey information about the status of a token that can be re-used by other mechanisms</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>Issuer:</dt>
        <dd>
          <t>An entity that issues the Referenced Token and provides the status information of the Referenced Token by serving a Status List Token on a public endpoint.</t>
        </dd>
        <dt>Relying Party:</dt>
        <dd>
          <t>An entity that relies on the Status List to validate the status of the Referenced Token. Also known as Verifier.</t>
        </dd>
        <dt>Status List:</dt>
        <dd>
          <t>An object in JSON or CBOR representation containing a bit array that lists the statuses of many Referenced Tokens.</t>
        </dd>
        <dt>Status List Token:</dt>
        <dd>
          <t>A token in JWT or CWT representation that contains a cryptographically secured Status List.</t>
        </dd>
        <dt>Referenced Token:</dt>
        <dd>
          <t>A cryptographically secured data structure which contains a reference to a Status List or Status List Token. It is <bcp14>RECOMMENDED</bcp14> to use JSON <xref target="RFC8259"/> or CBOR <xref target="RFC8949"/> for representation of the token and secure it using JSON Object Signing as defined in <xref target="RFC7515"/> or CBOR Object Signing and Encryption as defined in <xref target="RFC9052"/>. The information from the contained Status List may give a Relying Party additional information about up-to-date status of the Referenced Token.</t>
        </dd>
      </dl>
    </section>
    <section anchor="status-list">
      <name>Status List</name>
      <t>A Status List is a byte array that contains the statuses of many Referenced Tokens represented by one or multiple bits. A common representation of a Status List is composed by the following algorithm:</t>
      <ol spacing="normal" type="1"><li>
          <t>Each status of a Referenced Token <bcp14>MUST</bcp14> be represented with a bit-size of 1,2,4, or 8. Therefore up to 2,4,16, or 256 statuses for a Referenced Token are possible, depending on the bit-size. This limitation is intended to limit bit manipulation necessary to a single byte for every operation and thus keeping implementations simpler and less error prone.</t>
        </li>
        <li>
          <t>The overall Status List is encoded as a byte array. Depending on the bit-size, each byte corresponds to 8/(#bit-size) statuses (8,4,2, or 1). The status of each Referenced Token is identified using the index that maps to one or more specific bits within the byte array. The index starts counting at 0 and ends with "size" - 1 (being the last valid entry). The bits within an array are counted from least significant bit "0" to the most significant bit ("7"). All bits of the byte array at a particular index are set to a status value.</t>
        </li>
        <li>
          <t>The byte array is compressed using DEFLATE <xref target="RFC1951"/> with the ZLIB <xref target="RFC1950"/> data format. Implementations are <bcp14>RECOMMENDED</bcp14> to use the highest compression level available.</t>
        </li>
      </ol>
      <t>The following example illustrates a Status List that represents the statuses of 16 Referenced Tokens, requiring 16 bits (2 bytes) for the uncompressed byte array:</t>
      <artwork type="ascii-art"><![CDATA[
status[0] = 1
status[1] = 0
status[2] = 0
status[3] = 1
status[4] = 1
status[5] = 1
status[6] = 0
status[7] = 1
status[8] = 1
status[9] = 1
status[10] = 0
status[11] = 0
status[12] = 0
status[13] = 1
status[14] = 0
status[15] = 1
]]></artwork>
      <t>These bits are concatenated:</t>
      <artwork type="ascii-art"><![CDATA[
byte             0                  1               2
bit       7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0    7
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+...
values   |1|0|1|1|1|0|0|1|  |1|0|1|0|0|0|1|1|  |0|...
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+...
index     7 6 5 4 3 2 1 0   15   ...  10 9 8   23
         \_______________/  \_______________/
                0xB9               0xA3

]]></artwork>
      <section anchor="status-list-json">
        <name>Status List in JSON Format</name>
        <t>This section defines the structure for a JSON-encoded Status List:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14>. JSON Object that contains a Status List. It <bcp14>MUST</bcp14> contain at least the following claims:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>bits</tt>: <bcp14>REQUIRED</bcp14>. JSON Integer specifying the number of bits per Referenced Token in the Status List (<tt>lst</tt>). The allowed values for <tt>bits</tt> are 1,2,4 and 8.</t>
              </li>
              <li>
                <t><tt>lst</tt>: <bcp14>REQUIRED</bcp14>. JSON String that contains the status values for all the Referenced Tokens it conveys statuses for. The value <bcp14>MUST</bcp14> be the base64url-encoded (as defined in Section 2 of <xref target="RFC7515"/>) Status List as specified in <xref target="status-list"/>.</t>
              </li>
              <li>
                <t><tt>aggregation_uri</tt>: <bcp14>OPTIONAL</bcp14>. JSON String that contains a URI to retrieve the Status List Aggregation for this type of Referenced Token. See section <xref target="batch-fetching"/> for further detail.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following example illustrates the JSON representation of the Status List:</t>
        <artwork><![CDATA[
byte_array = [0xb9, 0xa3] 
encoded:
{
  "bits": 1,
  "lst": "eNrbuRgAAhcBXQ"
}
]]></artwork>
      </section>
      <section anchor="status-list-cbor">
        <name>Status List in CBOR Format</name>
        <t>This section defines the structure for a CBOR-encoded Status List:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>StatusList</tt> structure is a map (Major Type 5) and defines the following entries:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>bits</tt>: <bcp14>REQUIRED</bcp14>. Unsigned int (Major Type 0) that contains the number of bits per Referenced Token in the Status List. The allowed values for <tt>bits</tt> are 1, 2, 4 and 8.</t>
              </li>
              <li>
                <t><tt>lst</tt>: <bcp14>REQUIRED</bcp14>. Byte string (Major Type 2) that contains the Status List as specified in <xref target="status-list-json"/>.</t>
              </li>
              <li>
                <t><tt>aggregation_uri</tt>: <bcp14>OPTIONAL</bcp14>. Text string (Major Type 3) that contains a URI to retrieve the Status List Aggregation for this type of Referenced Token. See section <xref target="batch-fetching"/> for further detail.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following example illustrates the CBOR representation of the Status List in Hex:</t>
        <artwork><![CDATA[
byte_array = [0xb9, 0xa3] 
encoded:
a2646269747301636c73744a78dadbb918000217015d
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
a2                              # map(2)
  64                            #   string(4)
    62697473                    #     "bits"
  01                            #   uint(1)
  63                            #   string(3)
    6c7374                      #     "lst"
  4a                            #   bytes(10)
    78dadbb918000217015d        #     "xÚÛ¹\x18\x00\x02\x17\x01]"
]]></artwork>
      </section>
    </section>
    <section anchor="status-list-token">
      <name>Status List Token</name>
      <t>A Status List Token embeds the Status List into a token that is cryptographically signed and protects the integrity of the Status List. This allows for the Status List Token to be hosted by third parties or be transferred for offline use cases.</t>
      <t>This section specifies Status List Tokens in JSON Web Token (JWT) and CBOR Web Token (CWT) format.</t>
      <section anchor="status-list-token-jwt">
        <name>Status List Token in JWT Format</name>
        <t>The Status List Token <bcp14>MUST</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/>.</t>
        <t>The following content applies to the JWT Header:</t>
        <ul spacing="normal">
          <li>
            <t><tt>typ</tt>: <bcp14>REQUIRED</bcp14>. The JWT type <bcp14>MUST</bcp14> be <tt>statuslist+jwt</tt>.</t>
          </li>
        </ul>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>iss</tt>: <bcp14>REQUIRED</bcp14> when also present in the Referenced Token. The <tt>iss</tt> (issuer) claim <bcp14>MUST</bcp14> specify a unique string identifier for the entity that issued the Status List Token. In the absence of an application profile specifying otherwise, compliant applications <bcp14>MUST</bcp14> compare issuer values using the Simple String Comparison method defined in Section 6.2.1 of <xref target="RFC3986"/>. The value <bcp14>MUST</bcp14> be equal to that of the <tt>iss</tt> claim contained within the Referenced Token.</t>
          </li>
          <li>
            <t><tt>sub</tt>: <bcp14>REQUIRED</bcp14>. The <tt>sub</tt> (subject) claim <bcp14>MUST</bcp14> specify the URI of the Status List Token. The value <bcp14>MUST</bcp14> be equal to that of the <tt>uri</tt> claim contained in the <tt>status_list</tt> claim of the Referenced Token.</t>
          </li>
          <li>
            <t><tt>iat</tt>: <bcp14>REQUIRED</bcp14>. The <tt>iat</tt> (issued at) claim <bcp14>MUST</bcp14> specify the time at which the Status List Token was issued.</t>
          </li>
          <li>
            <t><tt>exp</tt>: <bcp14>OPTIONAL</bcp14>. The <tt>exp</tt> (expiration time) claim, if present, <bcp14>MUST</bcp14> specify the time at which the Status List Token is considered expired by its issuer.</t>
          </li>
          <li>
            <t><tt>ttl</tt>: <bcp14>OPTIONAL</bcp14>. The <tt>ttl</tt> (time to live) claim, if present, <bcp14>MUST</bcp14> specify the maximum amount of time, in seconds, that the Status List Token can be cached by a consumer before a fresh copy <bcp14>SHOULD</bcp14> be retrieved. The value of the claim <bcp14>MUST</bcp14> be a positive number.</t>
          </li>
          <li>
            <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status_list</tt> (status list) claim <bcp14>MUST</bcp14> specify the Status List conforming to the rules outlined in <xref target="status-list-json"/>.</t>
          </li>
        </ul>
        <t>The following additional rules apply:</t>
        <ol spacing="normal" type="1"><li>
            <t>The JWT <bcp14>MAY</bcp14> contain other claims.</t>
          </li>
          <li>
            <t>The JWT <bcp14>MUST</bcp14> be digitally signed using an asymmetric cryptographic algorithm. Relying parties <bcp14>MUST</bcp14> reject the JWT if it is using a Message Authentication Code (MAC) algorithm. Relying parties <bcp14>MUST</bcp14> reject JWTs with an invalid signature.</t>
          </li>
          <li>
            <t>Relying parties <bcp14>MUST</bcp14> reject JWTs that are not valid in all other respects per "JSON Web Token (JWT)" <xref target="RFC7519"/>.</t>
          </li>
          <li>
            <t>Application of additional restrictions and policy are at the discretion of the verifying party.</t>
          </li>
        </ol>
        <t>The following is a non-normative example for a Status List Token in JWT format:</t>
        <artwork><![CDATA[
{
  "alg": "ES256",
  "kid": "12",
  "typ": "statuslist+jwt"
}
.
{
  "exp": 2291720170,
  "iat": 1686920170,
  "iss": "https://example.com",
  "status_list": {
    "bits": 1,
    "lst": "eNrbuRgAAhcBXQ"
  },
  "sub": "https://example.com/statuslists/1",
  "ttl": 43200
}
]]></artwork>
      </section>
      <section anchor="status-list-token-cwt">
        <name>Status List Token in CWT Format</name>
        <t>The Status List Token <bcp14>MUST</bcp14> be encoded as a "CBOR Web Token (CWT)" according to <xref target="RFC8392"/>.</t>
        <t>The following content applies to the CWT protected header:</t>
        <ul spacing="normal">
          <li>
            <t><tt>16</tt> (type): <bcp14>REQUIRED</bcp14>. The type of the CWT <bcp14>MUST</bcp14> be <tt>statuslist+cwt</tt> as defined in <xref target="RFC9596"/>.</t>
          </li>
        </ul>
        <t>The following content applies to the CWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>1</tt> (issuer): <bcp14>REQUIRED</bcp14>. Same definition as <tt>iss</tt> claim in <xref target="status-list-token-jwt"/>.</t>
          </li>
          <li>
            <t><tt>2</tt> (subject): <bcp14>REQUIRED</bcp14>. Same definition as <tt>sub</tt> claim in <xref target="status-list-token-jwt"/>.</t>
          </li>
          <li>
            <t><tt>6</tt> (issued at): <bcp14>REQUIRED</bcp14>. Same definition as <tt>iat</tt> claim in <xref target="status-list-token-jwt"/>.</t>
          </li>
          <li>
            <t><tt>4</tt> (expiration time): <bcp14>OPTIONAL</bcp14>. Same definition as <tt>exp</tt> claim in <xref target="status-list-token-jwt"/>.</t>
          </li>
          <li>
            <t><tt>65534</tt> (time to live): <bcp14>OPTIONAL</bcp14>. Same definition as <tt>ttl</tt> claim in <xref target="status-list-token-jwt"/>.</t>
          </li>
          <li>
            <t><tt>65535</tt> (status list): <bcp14>REQUIRED</bcp14>. The status list claim <bcp14>MUST</bcp14> specify the Status List conforming to the rules outlined in <xref target="status-list-cbor"/>.</t>
          </li>
        </ul>
        <t>The following additional rules apply:</t>
        <ol spacing="normal" type="1"><li>
            <t>The CWT <bcp14>MAY</bcp14> contain other claims.</t>
          </li>
          <li>
            <t>The CWT <bcp14>MUST</bcp14> be digitally signed using an asymmetric cryptographic algorithm. Relying parties <bcp14>MUST</bcp14> reject the CWT if it is using a Message Authentication Code (MAC) algorithm. Relying parties <bcp14>MUST</bcp14> reject CWTs with an invalid signature.</t>
          </li>
          <li>
            <t>Relying parties <bcp14>MUST</bcp14> reject CWTs that are not valid in all other respects per "CBOR Web Token (CWT)" <xref target="RFC8392"/>.</t>
          </li>
          <li>
            <t>Application of additional restrictions and policy are at the discretion of the verifying party.</t>
          </li>
        </ol>
        <t>The following is a non-normative example for a Status List Token in CWT format in Hex:</t>
        <artwork><![CDATA[
d28453a20126106e7374617475736c6973742b637774a1044231325866a602782168
747470733a2f2f6578616d706c652e636f6d2f7374617475736c697374732f310173
68747470733a2f2f6578616d706c652e636f6d061a648c5bea041a8898dfea19fffe
19a8c019ffff56a2646269747301636c73744a78dadbb918000217015d5840631658
af937b8e8ce7e0081027ed8200ebde64e60cab690da369f0d6a85dd899ec1561bfcd
e0a0e38a7c775e46e8e76af7bf7da6448aa8b6c25dd04ddc1128d4
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
d2                              # tag(18)
  84                            #   array(4)
    53                          #     bytes(19)
      a20126106e7374617475736c  #       "¢\x01&\x10nstatusl"
      6973742b637774            #       "ist+cwt"
    a1                          #     map(1)
      04                        #       uint(4)
      42                        #       bytes(2)
        3132                    #         "12"
    58 66                       #     bytes(102)
      a602782168747470733a2f2f  #       "¦\x02x!https://"
      6578616d706c652e636f6d2f  #       "example.com/"
      7374617475736c697374732f  #       "statuslists/"
      31017368747470733a2f2f65  #       "1\x01shttps://e"
      78616d706c652e636f6d061a  #       "xample.com\x06\x1a"
      648c5bea041a8898dfea19ff  #       "d\x8c[ê\x04\x1a\x88\x98ßê\x19ÿ"
      fe19a8c019ffff56a2646269  #       "þ\x19¨À\x19ÿÿV¢dbi"
      747301636c73744a78dadbb9  #       "ts\x01clstJxÚÛ¹"
      18000217015d              #       "\x18\x00\x02\x17\x01]"
    58 40                       #     bytes(64)
      631658af937b8e8ce7e00810  #       "c\x16X¯\x93{\x8e\x8cçà\x08\x10"
      27ed8200ebde64e60cab690d  #       "'í\x82\x00ëÞdæ\x0c«i\x0d"
      a369f0d6a85dd899ec1561bf  #       "£iðÖ¨]Ø\x99ì\x15a¿"
      cde0a0e38a7c775e46e8e76a  #       "Íà\xa0ã\x8a|w^Fèçj"
      f7bf7da6448aa8b6c25dd04d  #       "÷¿}¦D\x8a¨¶Â]ÐM"
      dc1128d4                  #       "Ü\x11(Ô"
]]></artwork>
      </section>
    </section>
    <section anchor="referenced-token">
      <name>Referenced Token</name>
      <section anchor="status-claim">
        <name>Status Claim</name>
        <t>By including a "status" claim in a Referenced Token, the Issuer is referencing a mechanism to retrieve status information about this Referenced Token. The claim contains members used to reference to a status list as defined in this specification. Other members of the "status" object may be defined by other specifications. This is analogous to "cnf" claim in Section 3.1 of <xref target="RFC7800"/> in which different authenticity confirmation methods can be included.</t>
      </section>
      <section anchor="referenced-token-jwt">
        <name>Referenced Token in JWT Format</name>
        <t>The Referenced Token <bcp14>MUST</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/>.</t>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>iss</tt>: <bcp14>REQUIRED</bcp14> when also present in the Status List Token. The <tt>iss</tt> (issuer) claim <bcp14>MUST</bcp14> specify a unique string identifier for the entity that issued the Referenced Token. In the absence of an application profile specifying otherwise, compliant applications <bcp14>MUST</bcp14> compare issuer values using the Simple String Comparison method defined in Section 6.2.1 of <xref target="RFC3986"/>. The value <bcp14>MUST</bcp14> be equal to that of the <tt>iss</tt> claim contained within the referenced Status List Token.</t>
          </li>
          <li>
            <t><tt>status</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status</tt> (status) claim <bcp14>MUST</bcp14> specify a JSON Object that contains at least one reference to a status mechanism.
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14> when the status list mechanism defined in this specification is used. It contains a reference to a Status List or Status List Token. It <bcp14>MUST</bcp14> at least contain the following claims:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>idx</tt>: <bcp14>REQUIRED</bcp14>. The <tt>idx</tt> (index) claim <bcp14>MUST</bcp14> specify an Integer that represents the index to check for status information in the Status List for the current Referenced Token. The value of <tt>idx</tt> <bcp14>MUST</bcp14> be a non-negative number, containing a value of zero or greater.</t>
                  </li>
                  <li>
                    <t><tt>uri</tt>: <bcp14>REQUIRED</bcp14>. The <tt>uri</tt> (URI) claim <bcp14>MUST</bcp14> specify a String value that identifies the Status List or Status List Token containing the status information for the Referenced Token. The value of <tt>uri</tt> <bcp14>MUST</bcp14> be a URI conforming to <xref target="RFC3986"/>.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <t>Application of additional restrictions and policy are at the discretion of the verifying party.</t>
        <t>The following is a non-normative example for a decoded header and payload of a Referenced Token:</t>
        <artwork type="ascii-art"><![CDATA[
{
  "alg": "ES256",
  "kid": "11"
}
.
{
  "iss": "https://example.com",
  "status": {
    "status_list": {
      "idx": 0,
      "uri": "https://example.com/statuslists/1"
    }
  }
}
]]></artwork>
      </section>
      <section anchor="referenced-token-cwt">
        <name>Referenced Token in CWT Format</name>
        <t>The Referenced Token <bcp14>MUST</bcp14> be encoded as a "COSE Web Token (CWT)" object according to <xref target="RFC8392"/>.</t>
        <t>The following content applies to the CWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>1</tt> (issuer): <bcp14>REQUIRED</bcp14> when also present in the Referenced Token. Same definition as <tt>iss</tt> claim in <xref target="referenced-token-jwt"/>.</t>
          </li>
          <li>
            <t><tt>65535</tt> (status): <bcp14>REQUIRED</bcp14>. The status claim is encoded as a <tt>Status</tt> CBOR structure and <bcp14>MUST</bcp14> include at least one data item that refers to a status mechanism. Each data item in the <tt>Status</tt> CBOR structure comprises a key-value pair, where the key must be a CBOR text string (Major Type 3) specifying the identifier of the status mechanism, and the corresponding value defines its contents. This specification defines the following data items:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>status_list</tt> (status list): <bcp14>REQUIRED</bcp14> when the status list mechanism defined in this specification is used. It has the same definition as the <tt>status_list</tt> claim in <xref target="referenced-token-jwt"/> but <bcp14>MUST</bcp14> be encoded as a <tt>StatusListInfo</tt> CBOR structure with the following fields:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>idx</tt>: <bcp14>REQUIRED</bcp14>. Same definition as <tt>idx</tt> claim in <xref target="referenced-token-jwt"/>.</t>
                  </li>
                  <li>
                    <t><tt>uri</tt>: <bcp14>REQUIRED</bcp14>. Same definition as <tt>uri</tt> claim in <xref target="referenced-token-jwt"/>.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <t>Application of additional restrictions and policy are at the discretion of the verifying party.</t>
        <t>The following is a non-normative example of a Referenced Token in CWT format in Hex:</t>
        <artwork><![CDATA[
d28443a10126a1044231325866a502653132333435017368747470733a2f2f657861
6d706c652e636f6d061a648c5bea041a8898dfea19ffffa16b7374617475735f6c69
7374a2636964780063757269782168747470733a2f2f6578616d706c652e636f6d2f
7374617475736c697374732f315840af320cd20f3cb5e2e8823d3982d77e56b6f3f3
57c5ba7e128d22eea523f2bd03c1a9fde1005db07883fdb7aaf25c95e67e4a229f97
efd50fb6544dcb218a66d0
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
d2                              # tag(18)
  84                            #   array(4)
    43                          #     bytes(3)
      a10126                    #       "¡\x01&"
    a1                          #     map(1)
      04                        #       uint(4)
      42                        #       bytes(2)
        3132                    #         "12"
    58 66                       #     bytes(102)
      a50265313233343501736874  #       "¥\x02e12345\x01sht"
      7470733a2f2f6578616d706c  #       "tps://exampl"
      652e636f6d061a648c5bea04  #       "e.com\x06\x1ad\x8c[ê\x04"
      1a8898dfea19ffffa16b7374  #       "\x1a\x88\x98ßê\x19ÿÿ¡kst"
      617475735f6c697374a26369  #       "atus_list¢ci"
      647800637572697821687474  #       "dx\x00curix!htt"
      70733a2f2f6578616d706c65  #       "ps://example"
      2e636f6d2f7374617475736c  #       ".com/statusl"
      697374732f31              #       "ists/1"
    58 40                       #     bytes(64)
      af320cd20f3cb5e2e8823d39  #       "¯2\x0cÒ\x0f<µâè\x82=9"
      82d77e56b6f3f357c5ba7e12  #       "\x82×~V¶óóWÅº~\x12"
      8d22eea523f2bd03c1a9fde1  #       "\x8d"î¥#ò½\x03Á©ýá"
      005db07883fdb7aaf25c95e6  #       "\x00]°x\x83ý·ªò\\x95æ"
      7e4a229f97efd50fb6544dcb  #       "~J"\x9f\x97ïÕ\x0f¶TMË"
      218a66d0                  #       "!\x8afÐ"
]]></artwork>
      </section>
      <section anchor="referenced-token-cose">
        <name>Referenced Token in other COSE/CBOR Format</name>
        <t>The Referenced Token <bcp14>MUST</bcp14> be encoded as a <tt>COSE_Sign1</tt> or <tt>COSE_Sign</tt> CBOR structure as defined in "CBOR Object Signing and Encryption (COSE)" <xref target="RFC9052"/>.</t>
        <t>It is required to encode the status mechanisms referred to in the Referenced Token using the <tt>Status</tt> CBOR structure defined in <xref target="referenced-token-cwt"/>.</t>
        <t>It is <bcp14>RECOMMENDED</bcp14> to use <tt>status</tt> for the label of the field that contains the <tt>Status</tt> CBOR structure.</t>
        <t>Application of additional restrictions and policy are at the discretion of the verifying party.</t>
        <t>The following is a non-normative example for a decoded payload of a Referenced Token:</t>
        <t>TBD: example</t>
      </section>
    </section>
    <section anchor="status-types">
      <name>Status Types</name>
      <t>This document defines potential statuses of Referenced Tokens as Status Type values. If the Status List contains more than one bit per token (as defined by "bits" in the Status List), then the whole value of bits <bcp14>MUST</bcp14> describe one value. A Status List can not represent multiple statuses per Referenced Token.</t>
      <t>The registry in this document describes the basic Status Type values required for the most common use cases.
Additional values may defined for particular use cases.</t>
      <section anchor="status-types-values">
        <name>Status Types Values</name>
        <t>A status describes the state, mode, condition or stage of an entity that is described by the Status List. Status Types <bcp14>MUST</bcp14> be numeric values between 0 and 255.
Status types described by this specification comprise:</t>
        <ul spacing="normal">
          <li>
            <t>0x00 - "VALID" - The status of the Token is valid, correct or legal.</t>
          </li>
          <li>
            <t>0x01 - "INVALID" - The status of the Token is revoked, annulled, taken back, recalled or cancelled. This state is irreversible.</t>
          </li>
          <li>
            <t>0x02 - "SUSPENDED" - The status of the Token is temporarily invalid, hanging, debarred from privilege. This state is reversible.</t>
          </li>
        </ul>
        <t>The issuer of the Status List <bcp14>MUST</bcp14> choose an adequate <tt>bits</tt> (bit size) to be able to describe the required Status Types for the application.</t>
        <t>The processing rules for JWT or CWT precede any evaluation of a Referenced Token's status. For example, if a token is evaluated as being expired through the "exp" (Expiration Time) but also has a status of 0x00 ("VALID"), the token is considered expired.</t>
      </section>
    </section>
    <section anchor="verification-and-processing">
      <name>Verification and Processing</name>
      <section anchor="status-list-request">
        <name>Status List Request</name>
        <t>To obtain the Status List or Status List Token, the Relying Party <bcp14>MUST</bcp14> send an HTTP GET request to the URI provided in the Referenced Token.</t>
        <t>If the Status List is provided by an HTTP endpoint (and not as a Status List Token), the provider of the Status List <bcp14>MUST</bcp14> utilize TLS. Which version(s) should be implemented will vary over time. A TLS server certificate check <bcp14>MUST</bcp14> be performed as defined in Section 5 and 6 of <xref target="RFC6125"/>.</t>
        <t>The Relying Party <bcp14>SHOULD</bcp14> send the following Accept-Header to indicate the requested response type:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+json" for Status List in JSON format</t>
          </li>
          <li>
            <t>"application/statuslist+jwt" for Status List in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cbor" for Status List in CBOR format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List in CWT format</t>
          </li>
        </ul>
        <t>If the Relying Party does not send an Accept Header, the response type is assumed to be known implicit or out-of-band.</t>
      </section>
      <section anchor="status-list-response">
        <name>Status List Response</name>
        <t>In the successful response, the Status List Provider <bcp14>MUST</bcp14> use the following content-type:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+json" for Status List in JSON format</t>
          </li>
          <li>
            <t>"application/statuslist+jwt" for Status List in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cbor" for Status List in CBOR format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List in CWT format</t>
          </li>
        </ul>
        <t>In the case of "application/statuslist+json", the response <bcp14>MUST</bcp14> be of type JSON and follow the rules of <xref target="status-list-json"/>.
In the case of "application/statuslist+jwt", the response <bcp14>MUST</bcp14> be of type JWT and follow the rules of <xref target="status-list-token-jwt"/>.
In the case of "application/statuslist+cbor", the response <bcp14>MUST</bcp14> be of type CBOR and follow the rules of <xref target="status-list-cbor"/>.
In the case of "application/statuslist+cwt", the response <bcp14>MUST</bcp14> be of type CWT and follow the rules of <xref target="status-list-token-cwt"/>.</t>
        <t>The HTTP response <bcp14>SHOULD</bcp14> use gzip Content-Encoding as defined in <xref target="RFC9110"/>.</t>
      </section>
      <section anchor="validation-rules">
        <name>Validation Rules</name>
        <t>Upon receiving a Referenced Token, a Relying Party <bcp14>MUST</bcp14> first perform the validation of the Referenced Token - e.g., checking for expected attributes, valid signature, expiration time.
As this is out of scope of this document, this validation is not be described here, but is expected to be done according to the format of the Referenced Token.</t>
        <t>If this validation was not successful, the Referenced Token <bcp14>MUST</bcp14> be rejected. If the validation was successful, the Relying Party <bcp14>MUST</bcp14> perform the following validation steps to evaluate the status of the reference token:</t>
        <ol spacing="normal" type="1"><li>
            <t>Check for the existence of a <tt>status</tt> claim, check for the existence of a <tt>status_list</tt> claim within the <tt>status</tt> claim and validate that the content of <tt>status_list</tt> adheres to the rules defined in <xref target="referenced-token-jwt"/> for JWTs and <xref target="referenced-token-cwt"/> for CWTs. This step can be overruled if defined within the Referenced Token Format natively</t>
          </li>
          <li>
            <t>Resolve the Status List from the provided URI</t>
          </li>
          <li>
            <t>Validate the Status List Token:
            </t>
            <ol spacing="normal" type="1"><li>
                <t>Validate the Status List Token by following the rules defined in section 7.2 of <xref target="RFC7519"/> for JWTs and section 7.2 of <xref target="RFC8392"/> for CWTs.</t>
              </li>
              <li>
                <t>Check for the existence of the required claims as defined in <xref target="status-list-token-jwt"/> and <xref target="status-list-token-cwt"/></t>
              </li>
            </ol>
          </li>
          <li>
            <t>All existing claims in the Status List Token <bcp14>MUST</bcp14> be checked according to the rules in <xref target="status-list-token-jwt"/> and <xref target="status-list-token-cwt"/>
            </t>
            <ol spacing="normal" type="1"><li>
                <t>The subject claim (<tt>sub</tt> or <tt>2</tt>) of the Status List Token <bcp14>MUST</bcp14> be equal to the <tt>uri</tt> claim in the <tt>status_list</tt> object of the Referenced Token</t>
              </li>
              <li>
                <t>If the Relying Party has custom policies regarding the freshness of the Status List Token, it <bcp14>SHOULD</bcp14> check the issued at claim (<tt>iat</tt> or <tt>6</tt>)</t>
              </li>
              <li>
                <t>If expiration time is defined (<tt>exp</tt> or <tt>4</tt>), it <bcp14>MUST</bcp14> be checked if the Status List Token is expired</t>
              </li>
              <li>
                <t>If the Referenced Token contains an issuer claim, the Status List Token <bcp14>MUST</bcp14> contain the same issuer claim (<tt>iss</tt> or <tt>1</tt>)</t>
              </li>
              <li>
                <t>If the Relying Party is using a system for caching the Status List Token, it <bcp14>SHOULD</bcp14> check the <tt>ttl</tt> claim of the Status List Token and retrieve a fresh copy if (time status was resolved + ttl &lt; current time)</t>
              </li>
            </ol>
          </li>
          <li>
            <t>Decompress the Status List with a decompressor that is compatible with DEFLATE <xref target="RFC1951"/> and ZLIB <xref target="RFC1950"/></t>
          </li>
          <li>
            <t>Retrieve the status value of the index specified in the Referenced Token as described in <xref target="status-list"/>. Fail if the provided index is out of bound of the status list</t>
          </li>
          <li>
            <t>Check the status value as described in <xref target="status-types"/></t>
          </li>
        </ol>
        <t>If any of these checks fails, no statement about the status of the Referenced Token can be made and the Referenced Token <bcp14>SHOULD</bcp14> be rejected.</t>
      </section>
    </section>
    <section anchor="batch-fetching">
      <name>Status List Aggregation</name>
      <t>Status List Aggregation is an optional mechanism to retrieve a list of URIs to all Status List Tokens, allowing a Relying Party to fetch all relevant Status Lists for a specific type of Referenced Token or issuer. This mechanism is intended to support fetching and caching mechanisms and allow offline validation of the status of a reference token for a period of time.</t>
      <t>There are two options for a Relying Party to retrieve the Status List Aggregation.
An issuer <bcp14>MAY</bcp14> support any of these mechanisms:</t>
      <ul spacing="normal">
        <li>
          <t>Issuer metadata: The issuer of the Referenced Token publishes an URI which links to Status List Aggregation, e.g. in publicly available metadata of an issuance protocol</t>
        </li>
        <li>
          <t>Status List Parameter: The issuer of the Referenced Token includes an additional claim in the Status List (Token) that contains the Status List Aggregation URI.</t>
        </li>
      </ul>
      <section anchor="issuer-metadata">
        <name>Issuer Metadata</name>
        <t>The issuer <bcp14>MAY</bcp14> link to the Status List Aggregation URI in metadata that can be provided by different means like .well-known metadata as is used commonly in OAuth and OpenID, or via a VICAL extension for ISO mDoc / mDL.</t>
        <t>The concrete specification on how this is implemented depends on the specific ecosystem and is out of scope of this specification.</t>
      </section>
      <section anchor="status-list-parameter">
        <name>Status List Parameter</name>
        <t>The URI to the Status List Aggregation <bcp14>MAY</bcp14> be provided as the optional parameter <tt>aggregation_uri</tt> in the Status List itself as explained in<xref target="status-list-cbor"/> and <xref target="status-list-json"/> respectively. A Relying Party may use this URI to retrieve an up-to-date list of relevant Status Lists.</t>
      </section>
      <section anchor="status-list-aggregation-in-json-format">
        <name>Status List Aggregation in JSON Format</name>
        <t>This section defines the structure for a JSON-encoded Status List Aggregation:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status_lists</tt>: <bcp14>REQUIRED</bcp14>. JSON array of strings that contains URIs linking to Status List (Tokens).</t>
          </li>
        </ul>
        <t>The Status List Aggregation URI provides a list of Status List URIs. This aggregation in JSON and the media type return <bcp14>SHOULD</bcp14> be <tt>application/json</tt>. A Relying Party can iterate through this list and fetch all Status List Tokens before encountering the specific URI in a Referenced Token.</t>
        <t>The following is a non-normative example for media type <tt>application/json</tt>:</t>
        <sourcecode type="json"><![CDATA[
{
   "status_lists" : [
      "https://example.com/statuslists/1",
      "https://example.com/statuslists/2",
      "https://example.com/statuslists/3"
   ]
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="further-examples">
      <name>Further Examples</name>
      <section anchor="status-list-token-with-2-bit-status-values-in-jwt-format">
        <name>Status List Token with 2-Bit Status Values in JWT format</name>
        <t>In this example, the Status List additionally includes the Status Type "SUSPENDED". As the Status Type value for "SUSPENDED" is 0x02 and does not fit into 1 bit, the "bits" is required to be 2.</t>
        <t>This example Status List represents the status of 12 Referenced Tokens, requiring 24 bits (3 bytes) of status.</t>
        <artwork type="ascii-art"><![CDATA[
status[0] = 1
status[1] = 2
status[2] = 0
status[3] = 3
status[4] = 0
status[5] = 1
status[6] = 0
status[7] = 1
status[8] = 1
status[9] = 2
status[10] = 3
status[11] = 3
]]></artwork>
        <t>These bits are concatenated:</t>
        <artwork type="ascii-art"><![CDATA[
byte             0                  1                  2
bit       7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
values   |1|1|0|0|1|0|0|1|  |0|1|0|0|0|1|0|0|  |1|1|1|1|1|0|0|1|
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
          \ / \ / \ / \ /    \ / \ / \ / \ /    \ / \ / \ / \ /
status     3   0   2   1      1   0   1   0      3   3   2   1
index      3   2   1   0      7   6   5   4      11  10  9   8
           \___________/      \___________/      \___________/
                0xC9               0x44               0xF9

]]></artwork>
        <t>Resulting in the byte array and compressed/base64url encoded status list:</t>
        <artwork><![CDATA[
byte_array = [0xc9, 0x44, 0xf9] 
encoded:
{
  "bits": 2,
  "lst": "eNo76fITAAPfAgc"
}
]]></artwork>
      </section>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <section anchor="correct-decoding-and-parsing-of-the-encoded-status-list">
        <name>Correct decoding and parsing of the encoded status list</name>
        <t>TODO elaborate on risks of incorrect parsing/decoding leading to erroneous status data</t>
      </section>
      <section anchor="cached-and-stale-status-lists">
        <name>Cached and Stale status lists</name>
        <t>When consumers or verifiers of the Status List fetch the data, they need to be aware of its up-to-date status. The 'ttl' (time-to-live) claim
in the Status List Token provides one mechanism for setting a maximum cache time for the fetched data. This property permits distribution of
a status list to a CDN or other distribution mechanism while giving guidance to consumers of the status list on how often they need to fetch
a fresh copy of the status list even if that status list is not expired.</t>
      </section>
      <section anchor="security-authorization">
        <name>Authorized access to the Status List</name>
        <t>TODO elaborate on authorization mechanisms preventing misuse and profiling as described in privacy section</t>
      </section>
      <section anchor="history">
        <name>History</name>
        <t>TODO elaborate on status list only providing the up-to date/latest status, no historical data, may be provided by the underlying hosting architecture</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <section anchor="privacy-issuer">
        <name>Limiting issuers observability of token verification</name>
        <t>The main privacy consideration for a Status List, especially in the context of the Issuer-Holder-Verifier model <xref target="SD-JWT.VC"/>, is to prevent the Issuer from tracking the usage of the Referenced Token when the status is being checked. If an Issuer offers status information by referencing a specific token, this would enable him to create a profile for the issued token by correlating the date and identity of Relying Parties, that are requesting the status.</t>
        <t>The Status List approaches these privacy implications by integrating the status information of many Referenced Tokens into the same list. Therefore, the Issuer does not learn for which Referenced Token the Relying Party is requesting the Status List. The privacy of the Holder is protected by the anonymity within the set of Referenced Tokens in the Status List, also called herd privacy. This limits the possibilities of tracking by the Issuer.</t>
        <t>The herd privacy is depending on the number of entities within the Status List called its size. A larger size results in better privacy but also impacts the performance as more data has to be transferred to read the Status List.</t>
      </section>
      <section anchor="malicious-issuers">
        <name>Malicious Issuers</name>
        <t>A malicious Issuer could bypass the privacy benefits of the herd privacy by generating a unique Status List for every Referenced Token. By these means, he could maintain a mapping between Referenced Tokens and Status Lists and thus track the usage of Referenced Tokens by utilizing this mapping for the incoming requests. This malicious behaviour could be detected by Relying Parties that request large amounts of Referenced Tokens by comparing the number of different Status Lists and their sizes.</t>
      </section>
      <section anchor="privacy-relying-party">
        <name>Unobservability of Relying Parties</name>
        <t>Once the Relying Party receives the Referenced Token, this enables him to request the Status List to validate its status through the provided <tt>uri</tt> parameter and look up the corresponding <tt>index</tt>. However, the Relying Party may persistently store the <tt>uri</tt> and <tt>index</tt> of the Referenced Token to request the Status List again at a later time. By doing so regularly, the Relying Party may create a profile of the Referenced Token's validity status. This behaviour may be intended as a feature, e.g. for a KYC process that requires regular validity checks, but might also be abused in cases where this is not intended and unknown to the Holder, e.g. profiling the suspension of a driving license or checking the employment status of an employee credential.</t>
        <t>This behaviour could be mitigated by:
- adding authorization rules to the Status List, see <xref target="security-authorization"/>.
- regular re-issuance of the Referenced Token, see <xref target="implementation-lifecycle"/>.</t>
      </section>
      <section anchor="unlinkability">
        <name>Unlinkability</name>
        <t>Colluding Issuers and a Relying Parties have the possibility to link two transactions, as the tuple of <tt>uri</tt> and <tt>index</tt> inside the Referenced Token are unique and therefore traceable data. By comparing the status claims of received Referenced Tokens, two colluding Relying Parties could determine that they have interacted with the same user or an Issuer could trace the usage of its issued Referenced Token by colluding with various Relying Parties. It is therefore recommended to use Status Lists for Referenced Token formats that have similar unlinkability properties.</t>
        <t>To avoid privacy risks for colluding Relying Parties, it is <bcp14>RECOMMENDED</bcp14> that Issuers use batch issuance to issue multiple tokens, see <xref target="implementation-lifecycle"/>.</t>
        <t>To avoid further correlatable information by the values of <tt>uri</tt> and <tt>index</tt>, Issuers are <bcp14>RECOMMENDED</bcp14> to:</t>
        <ul spacing="normal">
          <li>
            <t>choose non-sequential, pseudo-random or random indices</t>
          </li>
          <li>
            <t>use decoy or dead entries to obfuscate the real number of Referenced Tokens within a Status List</t>
          </li>
          <li>
            <t>choose to deploy and utilize multiple Status Lists simultaneously</t>
          </li>
        </ul>
      </section>
      <section anchor="third-party-hosting">
        <name>Third Party Hosting</name>
        <t>TODO elaborate on increased privacy if the status list is hosted by a third party instead of the issuer reducing tracking possibilities
TODO evaluate definition of Status List Provider?
 An entity that hosts the Status List as a resource for potential Relying Parties. The Status List Provider may be the issuer of the Status List but may also be outsourced to a trusted third party.</t>
      </section>
    </section>
    <section anchor="implementation">
      <name>Implementation Considerations</name>
      <section anchor="implementation-lifecycle">
        <name>Token Lifecycle</name>
        <t>The lifetime of a Status List (and the Status List Token) depends on the lifetime of its Referenced Tokens. Once all Referenced Tokens are expired, the Issuer may stop serving the Status List (and the Status List Token).</t>
        <t>Referenced Tokens may be regularly re-issued to increase security or to mitigate linkability and prevent tracking by Relying Parties. In this case, every Referenced Token <bcp14>MUST</bcp14> have a fresh Status List entry.</t>
        <t>Referenced Tokens may also be issued in batches, such that Holders can use individual tokens for every transaction. In this case, every Referenced Token <bcp14>MUST</bcp14> have a dedicated Status List entry. Revoking batch issued Referenced Tokens might reveal this correlation later on.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="json-web-token-claims-registration">
        <name>JSON Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "JSON Web Token Claims" registry <xref target="IANA.JWT"/> established by <xref target="RFC7519"/>.</t>
        <section anchor="registry-contents">
          <name>Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Description: Reference to a status or validity mechanism containing up-to-date status information on the JWT.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s):  <xref target="status-claim"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Description: A status list containing up-to-date status information on multiple other JWTs encoded as a bitarray.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s):  <xref target="status-list-token-jwt"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Description: Time to Live</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-jwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="iana-registry">
        <name>JWT Status Mechanism Methods Registry</name>
        <t>This specification establishes the IANA "Status Mechanism Methods" registry for JWT "status" member values. The registry records the status mechanism method member and a reference to the specification that defines it.</t>
        <section anchor="registration-template">
          <name>Registration Template</name>
          <t>Status Method Value:</t>
          <ul empty="true">
            <li>
              <t>The name requested (e.g., "status_list"). The name is case sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts state that there is a compelling reason to allow an exception.</t>
            </li>
          </ul>
          <t>Status Method Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the status mechanism method.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For Standards Track RFCs, list the "IESG".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents.  An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Method Value: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Status Method Description: A status list containing up-to-date status information on multiple other JWTs encoded as a bitarray.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s):  <xref target="referenced-token-jwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cbor-web-token-claims-registration">
        <name>CBOR Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "CBOR Web Token (CWT) Claims" registry <xref target="IANA.CWT"/> established by <xref target="RFC8392"/>.</t>
        <section anchor="registry-contents-1">
          <name>Registry Contents</name>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65535)</t>
            </li>
            <li>
              <t>Claim Description: Reference to a status or validity mechanism containing up-to-date status information on the CWT.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s):  <xref target="status-claim"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Description: A status list containing up-to-date status information on multiple other CWTs encoded as a bitarray.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s):  <xref target="status-list-token-cwt"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65534)</t>
            </li>
            <li>
              <t>Claim Description: Time to Live</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-cwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cwt-iana-registry">
        <name>CWT Status Mechanism Methods Registry</name>
        <t>This specification establishes the IANA "Status Mechanism Methods" registry for CWT "status" member values. The registry records the status mechanism method member and a reference to the specification that defines it.</t>
        <section anchor="registration-template-1">
          <name>Registration Template</name>
          <t>Status Method Value:</t>
          <ul empty="true">
            <li>
              <t>The name requested (e.g., "status_list"). The name is case sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts state that there is a compelling reason to allow an exception.</t>
            </li>
          </ul>
          <t>Status Method Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the status mechanism method.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For Standards Track RFCs, list the "IESG".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents.  An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents-1">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Method Value: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Status Method Description: A status list containing up-to-date status information on multiple other CWTs encoded as a bitarray.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s):  <xref target="referenced-token-cwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="media-type-registration">
        <name>Media Type Registration</name>
        <t>This section requests registration of the following media types <xref target="RFC2046"/> in
the "Media Types" registry <xref target="IANA.MediaTypes"/> in the manner described
in <xref target="RFC6838"/>.</t>
        <t>To indicate that the content is an JSON-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+json</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary; A JSON-based Status List is a JSON Object.</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [ this specification ]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [ this specification ]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [ this specification ] for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an JWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary; A JWT-based Status List is a JWT; JWT values are encoded as a series of base64url-encoded values (some of which may be the empty string) separated by period ('.') characters.</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [ this specification ]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [ this specification ]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [ this specification ] for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an CBOR-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+cbor</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary; A CBOR-based Status List is a CBOR Object.</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [ this specification ]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [ this specification ]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [ this specification ] for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an CWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary;</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [ this specification ]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [ this specification ]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [ this specification ] for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1950">
          <front>
            <title>ZLIB Compressed Data Format Specification version 3.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <author fullname="J-L. Gailly" surname="J-L. Gailly"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1950"/>
          <seriesInfo name="DOI" value="10.17487/RFC1950"/>
        </reference>
        <reference anchor="RFC1951">
          <front>
            <title>DEFLATE Compressed Data Format Specification version 1.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1951"/>
          <seriesInfo name="DOI" value="10.17487/RFC1951"/>
        </reference>
        <reference anchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC6125">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="J. Hodges" initials="J." surname="Hodges"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9596">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) "typ" (type) Header Parameter</title>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <author fullname="O. Steele" initials="O." surname="Steele"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This specification adds the equivalent of the JSON Object Signing and Encryption (JOSE) "typ" (type) header parameter to CBOR Object Signing and Encryption (COSE). This enables the benefits of explicit typing (as defined in RFC 8725, "JSON Web Token Best Current Practices") to be brought to COSE objects. The syntax of the COSE type header parameter value is the same as the existing COSE content type header parameter.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9596"/>
          <seriesInfo name="DOI" value="10.17487/RFC9596"/>
        </reference>
        <reference anchor="IANA.MediaTypes" target="https://www.iana.org/assignments/media-types/media-types.xhtml">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JOSE" target="https://www.iana.org/assignments/jose/jose.xhtml">
          <front>
            <title>JSON Object Signing and Encryption (JOSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JWT" target="https://www.iana.org/assignments/jwt/jwt.xhtml">
          <front>
            <title>JSON Web Token Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.CWT" target="https://www.iana.org/assignments/cwt/cwt.xhtml">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7662">
          <front>
            <title>OAuth 2.0 Token Introspection</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This specification defines a method for a protected resource to query an OAuth 2.0 authorization server to determine the active state of an OAuth 2.0 token and to determine meta-information about this token. OAuth 2.0 deployments can use this method to convey information about the authorization context of the token from the authorization server to the protected resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7662"/>
          <seriesInfo name="DOI" value="10.17487/RFC7662"/>
        </reference>
        <reference anchor="RFC7800">
          <front>
            <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7800"/>
          <seriesInfo name="DOI" value="10.17487/RFC7800"/>
        </reference>
        <reference anchor="SD-JWT.VC">
          <front>
            <title>SD-JWT-based Verifiable Credentials (SD-JWT VC)</title>
            <author fullname="Oliver Terbu" initials="O." surname="Terbu">
              <organization>MATTR</organization>
            </author>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete Inc.</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This specification describes data formats as well as validation and
   processing rules to express Verifiable Credentials with JSON payloads
   with and without selective disclosure based on the SD-JWT
   [I-D.ietf-oauth-selective-disclosure-jwt] format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-sd-jwt-vc-04"/>
        </reference>
        <reference anchor="ISO.mdoc">
          <front>
            <title>ISO/IEC 18013-5:2021 ISO-compliant driving licence</title>
            <author>
              <organization>ISO/IEC JTC 1/SC 17</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 952?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank
Brian Campbell,
Filip Skokan,
Francesco Marino,
Guiseppe De Marco,
Kristina Yasuda,
Michael B. Jones,
Mike Prorock,
Oliver Terbu,
Orie Steele,
Timo Glastra
and
Torsten Lodderstedt</t>
      <t>for their valuable contributions, discussions and feedback to this specification.</t>
    </section>
    <section numbered="false" anchor="document-history">
      <name>Document History</name>
      <t>-03</t>
      <ul spacing="normal">
        <li>
          <t>remove unused reference to RFC9111</t>
        </li>
        <li>
          <t>add validation rules for status list token</t>
        </li>
        <li>
          <t>introduce the status list aggregation mechanism</t>
        </li>
        <li>
          <t>relax requirements for status_list claims to contain other parameters</t>
        </li>
        <li>
          <t>change cwt referenced token example to hex and annotated hex</t>
        </li>
        <li>
          <t>require TLS only for fetching Status List, not for Status List Token</t>
        </li>
        <li>
          <t>remove the undefined phrase Status List endpoint</t>
        </li>
        <li>
          <t>remove http caching in favor of the new ttl claim</t>
        </li>
        <li>
          <t>clarify the sub claim of Status List Token</t>
        </li>
        <li>
          <t>relax status_list iss requirements for CWT</t>
        </li>
        <li>
          <t>Fixes missing parts &amp; iana ttl registration in CWT examples</t>
        </li>
      </ul>
      <t>-02</t>
      <ul spacing="normal">
        <li>
          <t>add ttl claim to Status List Token to convey caching</t>
        </li>
        <li>
          <t>relax requirements on referenced token</t>
        </li>
        <li>
          <t>clarify Deflate / zlib compression</t>
        </li>
        <li>
          <t>make a reference to the Issuer-Holder-Verifier model of SD-JWT VC</t>
        </li>
        <li>
          <t>add COSE/CWT/CBOR encoding</t>
        </li>
      </ul>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Rename title of the draft</t>
        </li>
        <li>
          <t>add design consideration to the introduction</t>
        </li>
        <li>
          <t>Change status claim to in referenced token to allow re-use for other mechanisms</t>
        </li>
        <li>
          <t>Add IANA Registry for status mechanisms</t>
        </li>
        <li>
          <t>restructure the sections of this document</t>
        </li>
        <li>
          <t>add option to return an unsigned Status List</t>
        </li>
        <li>
          <t>Changing compression from gzip to zlib</t>
        </li>
        <li>
          <t>Change typo in Status List Token sub claim description</t>
        </li>
        <li>
          <t>Add access token as an example use-case</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft after working group adoption</t>
        </li>
        <li>
          <t>update acknowledgments</t>
        </li>
        <li>
          <t>renamed Verifier to Relying Party</t>
        </li>
        <li>
          <t>added IANA consideration</t>
        </li>
      </ul>
      <t>[ draft-ietf-oauth-status-list ]</t>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Applied editorial improvements suggested by Michael Jones.</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
