<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-oauth-status-list-05" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title>Token Status List</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-status-list-05"/>
    <author fullname="Tobias Looker">
      <organization>MATTR</organization>
      <address>
        <email>tobias.looker@mattr.global</email>
      </address>
    </author>
    <author fullname="Paul Bastian">
      <organization/>
      <address>
        <email>paul.bastian@posteo.de</email>
      </address>
    </author>
    <author fullname="Christian Bormann">
      <organization>Robert Bosch GmbH</organization>
      <address>
        <email>christiancarl.bormann@bosch.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <abstract>
      <?line 81?>

<t>This specification defines status list data structures and processing rules for representing the status of tokens secured by JSON Object Signing and Encryption (JOSE) or CBOR Object Signing and Encryption(COSE), such as JSON Web Tokens (JWTs), CBOR Web Tokens (CWTs) and ISO mdoc.
The status list token data structures themselves are also represented as JWTs or CWTs.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://oauth-wg.github.io/draft-ietf-oauth-status-list/draft-ietf-oauth-status-list.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/oauth-wg/draft-ietf-oauth-status-list"/>.</t>
    </note>
  </front>
  <middle>
    <?line 86?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Token formats secured by JOSE <xref target="IANA.JOSE"/> or COSE <xref target="RFC9052"/>, such as JSON Web Tokens (JWTs) <xref target="RFC7519"/>, CBOR Web Tokens (CWTs) <xref target="RFC8392"/> and ISO mdoc <xref target="ISO.mdoc"/>, have vast possible applications. Some of these applications can involve issuing a token whereby certain semantics about the token can change over time, which are important to be able to communicate to relying parties in an interoperable manner, such as whether the token is considered invalidated or suspended by its issuer.</t>
      <t>This document defines a Status List and its representations in JSON and CBOR formats that describe the individual statuses of multiple Referenced Tokens, which themselves are JWTs or CWTs. The statuses of all Referenced Tokens are conveyed via a bit array in the Status List. Each Referenced Token is allocated an index during issuance that represents its position within this bit array. The value of the bit(s) at this index correspond to the Referenced Token's status. A Status List may either be provided via HTTPS or be protected within a Status List Token by cryptographic signature or MAC, whereas this document defines its representations in JWT and CWT. Status Lists may be composed for expressing a range of Status Types. This document defines basic Status Types for the most common use cases as well as an extensibility mechanism for custom Status Types. The document also defines how an issuer of a Referenced Token references a Status List (Token).</t>
      <t>An example for the usage of a Status List is to manage the status of issued access tokens as defined in section 1.4 of <xref target="RFC6749"/>. Token Introspection <xref target="RFC7662"/> defines another way to determine the status of an issued access token, but it requires the party trying to validate an access tokens status to directly contact the token issuer, whereas the mechanism defined in this specification does not have this limitation.</t>
      <t>Another possible use case for the Status List is to express the status of verifiable credentials (Referenced Tokens) issued by an Issuer in the Issuer-Holder-Verifier model <xref target="SD-JWT.VC"/>.
The following diagram depicts the relationship between the involved roles (Relying Party is equivalent to Verifier of <xref target="SD-JWT.VC"/>):</t>
      <artwork type="ascii-art"><![CDATA[
           issue                 present
           Referenced            Referenced
┌────────┐ Token      ┌────────┐ Token      ┌───────────────┐
│ Issuer ├───────────►│ Holder ├───────────►│ Relying Party │
└─┬──────┘            └────────┘            └──┬────────────┘
  ▼ update status                              │
┌───────────────┐                              │
│ Status Issuer │                              │
└─┬─────────────┘                              │
  ▼ provide Status List                        │
┌─────────────────┐         fetch Status List  │
│ Status Provider │◄───────────────────────────┘
└─────────────────┘

]]></artwork>
      <t>An Issuer issues Referenced Tokens to a Holder, the Holder uses and presents those Referenced Tokens to a Relying Party. The Issuer gives updated status information to the Status Issuer, who creates a Status List (Token). The Status Issuer gives the Status List (Token) to the Status Provider, who serves the Status List (Token) on a public, resolvable endpoint. The roles of the Issuer (of the Referenced Token), the Status Issuer and the Status Provider may be fulfilled by the same entity. If not further specified, the term Issuer may refer to an entity acting for all three roles.</t>
      <t>The following diagram depicts the relationship between the artifacts:</t>
      <artwork type="ascii-art"><![CDATA[
┌────────────────┐  describes status ┌──────────────────┐
│  Status List   ├──────────────────►│ Referenced Token │
│ (JSON or CBOR) │◄──────────────────┤  (JOSE or COSE)  │
└─────┬──────────┘    references     └──────────────────┘
      │
      │ embedded in
      ▼
┌───────────────────┐
│ Status List Token │
│  (JWT or CWT)     │
└───────────────────┘

]]></artwork>
      <t>The Referenced Token is referenced by the Status List, which described the status of the Referenced Token. The Status List may be embedded and secured within a Status List Token.</t>
      <section anchor="rationale">
        <name>Rationale</name>
        <t>Revocation mechanisms are an essential part for most identity ecosystems. In the past, revocation of X.509 TLS certificates has been proven difficult. Traditional certificate revocation lists (CRLs) have limited scalability; Online Certificate Status Protocol (OCSP) has additional privacy risks, since the client is leaking the requested website to a third party. OCSP stapling is addressing some of these problems at the cost of less up-to-date data. Modern approaches use accumulator-based revocation registries and Zero-Knowledge-Proofs to accommodate for this privacy gap, but face scalability issues again.</t>
        <t>This specification seeks to find a balance between scalability, security, and privacy by minimizing the status information to mere bits (often a single bit) and compressing the resulting binary data. Thereby, a Status List may contain statuses of many thousands or millions Referenced Tokens while remaining as small as possible. Placing large amounts of Referenced Tokens into the same list also enables herd privacy relative to the Status Provider.</t>
        <t>This specification establishes the IANA "Status Mechanism Methods" registry for status mechanism and registers the members defined by this specification. Other specifications can register other members used for status retrieval.</t>
      </section>
      <section anchor="design-considerations">
        <name>Design Considerations</name>
        <t>The decisions taken in this specification aim to achieve the following design goals:</t>
        <ul spacing="normal">
          <li>
            <t>the specification shall favor a simple and easy to understand concept</t>
          </li>
          <li>
            <t>the specification shall be easy, fast and secure to implement in all major programming languages</t>
          </li>
          <li>
            <t>the specification shall be optimized to support the most common use cases and avoid unnecessary complexity of corner cases</t>
          </li>
          <li>
            <t>the Status List shall scale up to millions of tokens to support large scale government or enterprise use cases</t>
          </li>
          <li>
            <t>the Status List shall enable caching policies and offline support</t>
          </li>
          <li>
            <t>the specification shall support JSON and CBOR based tokens</t>
          </li>
          <li>
            <t>the specification shall not specify key resolution or trust frameworks</t>
          </li>
          <li>
            <t>the specification shall design an extension point to convey information about the status of a token that can be re-used by other mechanisms</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>Issuer:</dt>
        <dd>
          <t>An entity that issues the Referenced Token.</t>
        </dd>
        <dt>Status Issuer:</dt>
        <dd>
          <t>An entity that issues the Status List or Status List Token about the status information of the Referenced Token. This role may be fulfilled by the Issuer.</t>
        </dd>
        <dt>Status Provider:</dt>
        <dd>
          <t>An entity that provides the Status List or Status List Token on a public endpoint. This role may be fulfilled by the Status Issuer.</t>
        </dd>
        <dt>Holder:</dt>
        <dd>
          <t>An entity that receives Referenced Tokens form the Issuer and presents them to Relying Parties.</t>
        </dd>
        <dt>Relying Party:</dt>
        <dd>
          <t>An entity that relies on the Status List to validate the status of the Referenced Token. Also known as Verifier.</t>
        </dd>
        <dt>Status List:</dt>
        <dd>
          <t>An object in JSON or CBOR representation containing a bit array that lists the statuses of many Referenced Tokens.</t>
        </dd>
        <dt>Status List Token:</dt>
        <dd>
          <t>A token in JWT or CWT representation that contains a cryptographically secured Status List.</t>
        </dd>
        <dt>Referenced Token:</dt>
        <dd>
          <t>A cryptographically secured data structure which contains a reference to a Status List or Status List Token. It is <bcp14>RECOMMENDED</bcp14> to use JSON <xref target="RFC8259"/> with JOSE as defined in <xref target="RFC7515"/> or CBOR <xref target="RFC8949"/> with COSE as defined in <xref target="RFC9052"/>. The information from the contained Status List gives the Relying Party additional information about the current status of the Referenced Token. Examples for Referenced Tokens are SD-JWT VC and ISO mdoc.</t>
        </dd>
        <dt>base64url:</dt>
        <dd>
          <t>Denotes the URL-safe base64 encoding without padding as defined in Section 2 of <xref target="RFC7515"/> as "Base64url Encoding".</t>
        </dd>
      </dl>
    </section>
    <section anchor="status-list">
      <name>Status List</name>
      <t>A Status List is a byte array that contains the statuses of many Referenced Tokens represented by one or multiple bits. A common representation of a Status List is composed by the following algorithm:</t>
      <ol spacing="normal" type="1"><li>
          <t>Each status of a Referenced Token <bcp14>MUST</bcp14> be represented with a bit-size of 1,2,4, or 8. Therefore up to 2,4,16, or 256 statuses for a Referenced Token are possible, depending on the bit-size. This limitation is intended to limit bit manipulation necessary to a single byte for every operation and thus keeping implementations simpler and less error prone.</t>
        </li>
        <li>
          <t>The overall Status List is encoded as a byte array. Depending on the bit-size, each byte corresponds to 8/(#bit-size) statuses (8,4,2, or 1). The status of each Referenced Token is identified using the index that maps to one or more specific bits within the byte array. The index starts counting at 0 and ends with "size" - 1 (being the last valid entry). The bits within an array are counted from least significant bit "0" to the most significant bit ("7"). All bits of the byte array at a particular index are set to a status value.</t>
        </li>
        <li>
          <t>The byte array is compressed using DEFLATE <xref target="RFC1951"/> with the ZLIB <xref target="RFC1950"/> data format. Implementations are <bcp14>RECOMMENDED</bcp14> to use the highest compression level available.</t>
        </li>
      </ol>
      <t>The following example illustrates a Status List that represents the statuses of 16 Referenced Tokens, requiring 16 bits (2 bytes) for the uncompressed byte array:</t>
      <artwork type="ascii-art"><![CDATA[
status[0] = 1
status[1] = 0
status[2] = 0
status[3] = 1
status[4] = 1
status[5] = 1
status[6] = 0
status[7] = 1
status[8] = 1
status[9] = 1
status[10] = 0
status[11] = 0
status[12] = 0
status[13] = 1
status[14] = 0
status[15] = 1
]]></artwork>
      <t>These bits are concatenated:</t>
      <artwork type="ascii-art"><![CDATA[
byte             0                  1               2
bit       7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0    7
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+...
values   |1|0|1|1|1|0|0|1|  |1|0|1|0|0|0|1|1|  |0|...
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+...
index     7 6 5 4 3 2 1 0   15   ...  10 9 8   23
         \_______________/  \_______________/
                0xB9               0xA3

]]></artwork>
      <section anchor="status-list-json">
        <name>Status List in JSON Format</name>
        <t>This section defines the structure for a JSON-encoded Status List:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14>. JSON Object that contains a Status List. It <bcp14>MUST</bcp14> contain at least the following claims:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>bits</tt>: <bcp14>REQUIRED</bcp14>. JSON Integer specifying the number of bits per Referenced Token in the Status List (<tt>lst</tt>). The allowed values for <tt>bits</tt> are 1,2,4 and 8.</t>
              </li>
              <li>
                <t><tt>lst</tt>: <bcp14>REQUIRED</bcp14>. JSON String that contains the status values for all the Referenced Tokens it conveys statuses for. The value <bcp14>MUST</bcp14> be the base64url-encoded Status List as specified in <xref target="status-list"/>.</t>
              </li>
              <li>
                <t><tt>aggregation_uri</tt>: <bcp14>OPTIONAL</bcp14>. JSON String that contains a URI to retrieve the Status List Aggregation for this type of Referenced Token. See section <xref target="batch-fetching"/> for further detail.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following example illustrates the JSON representation of the Status List:</t>
        <artwork><![CDATA[
byte_array = [0xb9, 0xa3] 
encoded:
{
  "bits": 1,
  "lst": "eNrbuRgAAhcBXQ"
}
]]></artwork>
      </section>
      <section anchor="status-list-cbor">
        <name>Status List in CBOR Format</name>
        <t>This section defines the structure for a CBOR-encoded Status List:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>StatusList</tt> structure is a map (Major Type 5) and defines the following entries:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>bits</tt>: <bcp14>REQUIRED</bcp14>. Unsigned integer (Major Type 0) that contains the number of bits per Referenced Token in the Status List. The allowed values for <tt>bits</tt> are 1, 2, 4 and 8.</t>
              </li>
              <li>
                <t><tt>lst</tt>: <bcp14>REQUIRED</bcp14>. Byte string (Major Type 2) that contains the Status List as specified in <xref target="status-list"/>.</t>
              </li>
              <li>
                <t><tt>aggregation_uri</tt>: <bcp14>OPTIONAL</bcp14>. Text string (Major Type 3) that contains a URI to retrieve the Status List Aggregation for this type of Referenced Token. See section <xref target="batch-fetching"/> for further detail.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following example illustrates the CBOR representation of the Status List in Hex:</t>
        <artwork><![CDATA[
byte_array = [0xb9, 0xa3] 
encoded:
a2646269747301636c73744a78dadbb918000217015d
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
a2                              # map(2)
  64                            #   string(4)
    62697473                    #     "bits"
  01                            #   uint(1)
  63                            #   string(3)
    6c7374                      #     "lst"
  4a                            #   bytes(10)
    78dadbb918000217015d        #     "xÚÛ¹\x18\x00\x02\x17\x01]"
]]></artwork>
      </section>
    </section>
    <section anchor="status-list-token">
      <name>Status List Token</name>
      <t>A Status List Token embeds the Status List into a token that is cryptographically signed and protects the integrity of the Status List. This allows for the Status List Token to be hosted by third parties or be transferred for offline use cases.</t>
      <t>This section specifies Status List Tokens in JSON Web Token (JWT) and CBOR Web Token (CWT) format.</t>
      <section anchor="status-list-token-jwt">
        <name>Status List Token in JWT Format</name>
        <t>The Status List Token <bcp14>MUST</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/>.</t>
        <t>The following content applies to the JWT Header:</t>
        <ul spacing="normal">
          <li>
            <t><tt>typ</tt>: <bcp14>REQUIRED</bcp14>. The JWT type <bcp14>MUST</bcp14> be <tt>statuslist+jwt</tt>.</t>
          </li>
        </ul>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>sub</tt>: <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC7519"/>. The <tt>sub</tt> (subject) claim <bcp14>MUST</bcp14> specify the URI of the Status List Token. The value <bcp14>MUST</bcp14> be equal to that of the <tt>uri</tt> claim contained in the <tt>status_list</tt> claim of the Referenced Token.</t>
          </li>
          <li>
            <t><tt>iat</tt>: <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC7519"/>. The <tt>iat</tt> (issued at) claim <bcp14>MUST</bcp14> specify the time at which the Status List Token was issued.</t>
          </li>
          <li>
            <t><tt>exp</tt>: <bcp14>OPTIONAL</bcp14>. As generally defined in <xref target="RFC7519"/>. The <tt>exp</tt> (expiration time) claim, if present, <bcp14>MUST</bcp14> specify the time at which the Status List Token is considered expired by the Status Issuer.</t>
          </li>
          <li>
            <t><tt>ttl</tt>: <bcp14>OPTIONAL</bcp14>. The <tt>ttl</tt> (time to live) claim, if present, <bcp14>MUST</bcp14> specify the maximum amount of time, in seconds, that the Status List Token can be cached by a consumer before a fresh copy <bcp14>SHOULD</bcp14> be retrieved. The value of the claim <bcp14>MUST</bcp14> be a positive number encoded in JSON as a number.</t>
          </li>
          <li>
            <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status_list</tt> (status list) claim <bcp14>MUST</bcp14> specify the Status List conforming to the rules outlined in <xref target="status-list-json"/>.</t>
          </li>
        </ul>
        <t>The following additional rules apply:</t>
        <ol spacing="normal" type="1"><li>
            <t>The JWT <bcp14>MAY</bcp14> contain other claims.</t>
          </li>
          <li>
            <t>The JWT <bcp14>MUST</bcp14> be secured using a cryptographic signature or MAC algorithm. Relying Parties <bcp14>MUST</bcp14> reject JWTs with an invalid signature.</t>
          </li>
          <li>
            <t>Relying Parties <bcp14>MUST</bcp14> reject JWTs that are not valid in all other respects per "JSON Web Token (JWT)" <xref target="RFC7519"/>.</t>
          </li>
          <li>
            <t>Application of additional restrictions and policy are at the discretion of the Relying Party.</t>
          </li>
        </ol>
        <t>The following is a non-normative example for a Status List Token in JWT format:</t>
        <artwork><![CDATA[
{
  "alg": "ES256",
  "kid": "12",
  "typ": "statuslist+jwt"
}
.
{
  "exp": 2291720170,
  "iat": 1686920170,
  "status_list": {
    "bits": 1,
    "lst": "eNrbuRgAAhcBXQ"
  },
  "sub": "https://example.com/statuslists/1",
  "ttl": 43200
}
]]></artwork>
      </section>
      <section anchor="status-list-token-cwt">
        <name>Status List Token in CWT Format</name>
        <t>The Status List Token <bcp14>MUST</bcp14> be encoded as a "CBOR Web Token (CWT)" according to <xref target="RFC8392"/>.</t>
        <t>The following content applies to the CWT protected header:</t>
        <ul spacing="normal">
          <li>
            <t><tt>16</tt> (type): <bcp14>REQUIRED</bcp14>. The type of the CWT <bcp14>MUST</bcp14> be <tt>statuslist+cwt</tt> as defined in <xref target="RFC9596"/>.</t>
          </li>
        </ul>
        <t>The following content applies to the CWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>2</tt> (subject): <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC8392"/>. The subject claim <bcp14>MUST</bcp14> specify the URI of the Status List Token. The value <bcp14>MUST</bcp14> be equal to that of the <tt>uri</tt> claim contained in the <tt>status_list</tt> claim of the Referenced Token.</t>
          </li>
          <li>
            <t><tt>6</tt> (issued at): <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC8392"/>. The issued at claim <bcp14>MUST</bcp14> specify the time at which the Status List Token was issued.</t>
          </li>
          <li>
            <t><tt>4</tt> (expiration time): <bcp14>OPTIONAL</bcp14>. As generally defined in <xref target="RFC8392"/>. The expiration time claim, if present, <bcp14>MUST</bcp14> specify the time at which the Status List Token is considered expired by its issuer.</t>
          </li>
          <li>
            <t><tt>65534</tt> (time to live): <bcp14>OPTIONAL</bcp14>. Unsigned integer (Major Type 0). The time to live claim, if present, <bcp14>MUST</bcp14> specify the maximum amount of time, in seconds, that the Status List Token can be cached by a consumer before a fresh copy <bcp14>SHOULD</bcp14> be retrieved. The value of the claim <bcp14>MUST</bcp14> be a positive number.</t>
          </li>
          <li>
            <t><tt>65533</tt> (status list): <bcp14>REQUIRED</bcp14>. The status list claim <bcp14>MUST</bcp14> specify the Status List conforming to the rules outlined in <xref target="status-list-cbor"/>.</t>
          </li>
        </ul>
        <t>The following additional rules apply:</t>
        <ol spacing="normal" type="1"><li>
            <t>The CWT <bcp14>MAY</bcp14> contain other claims.</t>
          </li>
          <li>
            <t>The CWT <bcp14>MUST</bcp14> be secured using a cryptographic signature or MAC algorithm. Relying Parties <bcp14>MUST</bcp14> reject CWTs with an invalid signature.</t>
          </li>
          <li>
            <t>Relying Parties <bcp14>MUST</bcp14> reject CWTs that are not valid in all other respects per "CBOR Web Token (CWT)" <xref target="RFC8392"/>.</t>
          </li>
          <li>
            <t>Application of additional restrictions and policy are at the discretion of the Relying Party.</t>
          </li>
        </ol>
        <t>The following is a non-normative example for a Status List Token in CWT format in Hex:</t>
        <artwork><![CDATA[
d28453a20126106e7374617475736c6973742b637774a1044231325850a502782168
747470733a2f2f6578616d706c652e636f6d2f7374617475736c697374732f31061a
648c5bea041a8898dfea19fffe19a8c019fffda2646269747301636c73744a78dadb
b918000217015d5840b1a82166ee24aeb1a4411cd1a3fafb64dc989ebbb59be36964
063f3ca137bf1757ef4e4c7637f2a070167e26fa561e22b94347d5e798944016c8e4
f018bcac4a
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
d2                              # tag(18)
  84                            #   array(4)
    53                          #     bytes(19)
      a20126106e7374617475736c  #       "¢\x01&\x10nstatusl"
      6973742b637774            #       "ist+cwt"
    a1                          #     map(1)
      04                        #       uint(4)
      42                        #       bytes(2)
        3132                    #         "12"
    58 50                       #     bytes(80)
      a502782168747470733a2f2f  #       "¥\x02x!https://"
      6578616d706c652e636f6d2f  #       "example.com/"
      7374617475736c697374732f  #       "statuslists/"
      31061a648c5bea041a8898df  #       "1\x06\x1ad\x8c[ê\x04\x1a\x88\x98ß"
      ea19fffe19a8c019fffda264  #       "ê\x19ÿþ\x19¨À\x19ÿý¢d"
      6269747301636c73744a78da  #       "bits\x01clstJxÚ"
      dbb918000217015d          #       "Û¹\x18\x00\x02\x17\x01]"
    58 40                       #     bytes(64)
      b1a82166ee24aeb1a4411cd1  #       "±¨!fî$®±¤A\x1cÑ"
      a3fafb64dc989ebbb59be369  #       "£úûdÜ\x98\x9e»µ\x9bãi"
      64063f3ca137bf1757ef4e4c  #       "d\x06?<¡7¿\x17WïNL"
      7637f2a070167e26fa561e22  #       "v7ò\xa0p\x16~&úV\x1e""
      b94347d5e798944016c8e4f0  #       "¹CGÕç\x98\x94@\x16Èäð"
      18bcac4a                  #       "\x18¼¬J"
]]></artwork>
      </section>
    </section>
    <section anchor="referenced-token">
      <name>Referenced Token</name>
      <section anchor="status-claim">
        <name>Status Claim</name>
        <t>By including a "status" claim in a Referenced Token, the Issuer is referencing a mechanism to retrieve status information about this Referenced Token. The claim contains members used to reference to a status list as defined in this specification. Other members of the "status" object may be defined by other specifications. This is analogous to "cnf" claim in Section 3.1 of <xref target="RFC7800"/> in which different authenticity confirmation methods can be included.</t>
      </section>
      <section anchor="referenced-token-jose">
        <name>Referenced Token in JOSE</name>
        <t>The Referenced Token <bcp14>MAY</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/> or other formats based on JOSE.</t>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status</tt> (status) claim <bcp14>MUST</bcp14> specify a JSON Object that contains at least one reference to a status mechanism.
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14> when the status list mechanism defined in this specification is used. It contains a reference to a Status List or Status List Token. It <bcp14>MUST</bcp14> at least contain the following claims:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>idx</tt>: <bcp14>REQUIRED</bcp14>. The <tt>idx</tt> (index) claim <bcp14>MUST</bcp14> specify an Integer that represents the index to check for status information in the Status List for the current Referenced Token. The value of <tt>idx</tt> <bcp14>MUST</bcp14> be a non-negative number, containing a value of zero or greater.</t>
                  </li>
                  <li>
                    <t><tt>uri</tt>: <bcp14>REQUIRED</bcp14>. The <tt>uri</tt> (URI) claim <bcp14>MUST</bcp14> specify a String value that identifies the Status List or Status List Token containing the status information for the Referenced Token. The value of <tt>uri</tt> <bcp14>MUST</bcp14> be a URI conforming to <xref target="RFC3986"/>.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <t>Application of additional restrictions and policy are at the discretion of the Relying Party.</t>
        <t>The following is a non-normative example for a decoded header and payload of a Referenced Token:</t>
        <artwork type="ascii-art"><![CDATA[
{
  "alg": "ES256",
  "kid": "11"
}
.
{
  "status": {
    "status_list": {
      "idx": 0,
      "uri": "https://example.com/statuslists/1"
    }
  }
}
]]></artwork>
        <t>SD-JWT-based Verifiable Credentials <xref target="SD-JWT.VC"/> introduce the usage of Status List in Section 3.2.2.2. The "status" object uses the same encoding as a JWT as defined in <xref target="referenced-token-jose"/>.</t>
        <t>The following is a non-normative example for a Referenced Token in SD-JWT-VC serialized form as received from an Issuer:</t>
        <artwork type="ascii-art"><![CDATA[
eyJhbGciOiAiRVMyNTYiLCAidHlwIjogImV4YW1wbGUrc2Qtand0In0.eyJfc2QiOiBb
Ikh2cktYNmZQVjB2OUtfeUNWRkJpTEZIc01heGNEXzExNEVtNlZUOHgxbGciXSwgImlz
cyI6ICJodHRwczovL2V4YW1wbGUuY29tL2lzc3VlciIsICJpYXQiOiAxNjgzMDAwMDAw
LCAiZXhwIjogMTg4MzAwMDAwMCwgInN1YiI6ICI2YzVjMGE0OS1iNTg5LTQzMWQtYmFl
Ny0yMTkxMjJhOWVjMmMiLCAic3RhdHVzIjogeyJzdGF0dXNfbGlzdCI6IHsiaWR4Ijog
MCwgInVyaSI6ICJodHRwczovL2V4YW1wbGUuY29tL3N0YXR1c2xpc3RzLzEifX0sICJf
c2RfYWxnIjogInNoYS0yNTYifQ.-kgS-R-Z4DEDlqb8kb6381_gHHNatsoF1fcVKZk3M
06CrnV8F8k9d2w2V_YAOvgcb0f11FqDFezXBXH30d4vcw~WyIyR0xDNDJzS1F2ZUNmR2
ZyeU5STjl3IiwgInN0cmVldF9hZGRyZXNzIiwgIlNjaHVsc3RyLiAxMiJd~WyJlbHVWN
U9nM2dTTklJOEVZbnN4QV9BIiwgImxvY2FsaXR5IiwgIlNjaHVscGZvcnRhIl0~WyI2S
Wo3dE0tYTVpVlBHYm9TNXRtdlZBIiwgInJlZ2lvbiIsICJTYWNoc2VuLUFuaGFsdCJd~
WyJlSThaV205UW5LUHBOUGVOZW5IZGhRIiwgImNvdW50cnkiLCAiREUiXQ~WyJRZ19PN
jR6cUF4ZTQxMmExMDhpcm9BIiwgImFkZHJlc3MiLCB7Il9zZCI6IFsiNnZoOWJxLXpTN
EdLTV83R3BnZ1ZiWXp6dTZvT0dYcm1OVkdQSFA3NVVkMCIsICI5Z2pWdVh0ZEZST0NnU
nJ0TmNHVVhtRjY1cmRlemlfNkVyX2o3NmttWXlNIiwgIktVUkRQaDRaQzE5LTN0aXotR
GYzOVY4ZWlkeTFvVjNhM0gxRGEyTjBnODgiLCAiV045cjlkQ0JKOEhUQ3NTMmpLQVN4V
GpFeVc1bTV4NjVfWl8ycm8yamZYTSJdfV0~
]]></artwork>
        <t>Resulting payload of the example above:</t>
        <artwork type="ascii-art"><![CDATA[
{
  "_sd": [
    "HvrKX6fPV0v9K_yCVFBiLFHsMaxcD_114Em6VT8x1lg"
  ],
  "iss": "https://example.com/issuer",
  "iat": 1683000000,
  "exp": 1883000000,
  "sub": "6c5c0a49-b589-431d-bae7-219122a9ec2c",
  "status": {
    "status_list": {
      "idx": 0,
      "uri": "https://example.com/statuslists/1"
    }
  },
  "_sd_alg": "sha-256"
}
]]></artwork>
      </section>
      <section anchor="referenced-token-cose">
        <name>Referenced Token in COSE</name>
        <t>The Referenced Token <bcp14>MAY</bcp14> be encoded as a "COSE Web Token (CWT)" object according to <xref target="RFC8392"/> or other formats based on COSE.</t>
        <t>The following content applies to the CWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>65535</tt> (status): <bcp14>REQUIRED</bcp14>. The status claim is encoded as a <tt>Status</tt> CBOR structure and <bcp14>MUST</bcp14> include at least one data item that refers to a status mechanism. Each data item in the <tt>Status</tt> CBOR structure comprises a key-value pair, where the key must be a CBOR text string (Major Type 3) specifying the identifier of the status mechanism, and the corresponding value defines its contents. This specification defines the following data items:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>status_list</tt> (status list): <bcp14>REQUIRED</bcp14> when the status list mechanism defined in this specification is used. It has the same definition as the <tt>status_list</tt> claim in <xref target="referenced-token-jose"/> but <bcp14>MUST</bcp14> be encoded as a <tt>StatusListInfo</tt> CBOR structure with the following fields:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>idx</tt>: <bcp14>REQUIRED</bcp14>. Unsigned integer (Major Type 0) The <tt>idx</tt> (index) claim <bcp14>MUST</bcp14> specify an Integer that represents the index to check for status information in the Status List for the current Referenced Token. The value of <tt>idx</tt> <bcp14>MUST</bcp14> be a non-negative number, containing a value of zero or greater.</t>
                  </li>
                  <li>
                    <t><tt>uri</tt>: <bcp14>REQUIRED</bcp14>. Text string (Major Type 3). The <tt>uri</tt> (URI) claim <bcp14>MUST</bcp14> specify a String value that identifies the Status List or Status List Token containing the status information for the Referenced Token. The value of <tt>uri</tt> <bcp14>MUST</bcp14> be a URI conforming to <xref target="RFC3986"/>.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <t>Application of additional restrictions and policy are at the discretion of the Relying Party.</t>
        <t>The following is a non-normative example of a Referenced Token in CWT format in Hex:</t>
        <artwork><![CDATA[
d28443a10126a1044231325866a502653132333435017368747470733a2f2f657861
6d706c652e636f6d061a648c5bea041a8898dfea19ffffa16b7374617475735f6c69
7374a2636964780063757269782168747470733a2f2f6578616d706c652e636f6d2f
7374617475736c697374732f315840a2f829f213056d3dd33e2732aa2baeafa1e834
903d06a7153a85cb199403712abde2271b267f8ae0dbcb3df73e95b793937e733f2e
99292b13e029d2a92f99cd
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
d2                              # tag(18)
  84                            #   array(4)
    43                          #     bytes(3)
      a10126                    #       "¡\x01&"
    a1                          #     map(1)
      04                        #       uint(4)
      42                        #       bytes(2)
        3132                    #         "12"
    58 66                       #     bytes(102)
      a50265313233343501736874  #       "¥\x02e12345\x01sht"
      7470733a2f2f6578616d706c  #       "tps://exampl"
      652e636f6d061a648c5bea04  #       "e.com\x06\x1ad\x8c[ê\x04"
      1a8898dfea19ffffa16b7374  #       "\x1a\x88\x98ßê\x19ÿÿ¡kst"
      617475735f6c697374a26369  #       "atus_list¢ci"
      647800637572697821687474  #       "dx\x00curix!htt"
      70733a2f2f6578616d706c65  #       "ps://example"
      2e636f6d2f7374617475736c  #       ".com/statusl"
      697374732f31              #       "ists/1"
    58 40                       #     bytes(64)
      a2f829f213056d3dd33e2732  #       "¢ø)ò\x13\x05m=Ó>'2"
      aa2baeafa1e834903d06a715  #       "ª+®¯¡è4\x90=\x06§\x15"
      3a85cb199403712abde2271b  #       ":\x85Ë\x19\x94\x03q*½â'\x1b"
      267f8ae0dbcb3df73e95b793  #       "&\x7f\x8aàÛË=÷>\x95·\x93"
      937e733f2e99292b13e029d2  #       "\x93~s?.\x99)+\x13à)Ò"
      a92f99cd                  #       "©/\x99Í"
]]></artwork>
        <t>ISO mdoc <xref target="ISO.mdoc"/> may utilize the Status List mechanism by introducing the <tt>status</tt> parameter in the Mobile Security Object (MSO) as specified in Section 9.1.2. The <tt>status</tt> parameter uses the same encoding as a CWT as defined in <xref target="referenced-token-cose"/>.</t>
        <t>It is <bcp14>RECOMMENDED</bcp14> to use <tt>status</tt> for the label of the field that contains the <tt>Status</tt> CBOR structure.</t>
        <t>Application of additional restrictions and policy are at the discretion of the Relying Party.</t>
        <t>The following is a non-normative example for an IssuerAuth as specified in ISO mDL (also referred to as signed MSO) in Hex:</t>
        <artwork type="ascii-art"><![CDATA[
8443a10126a118215901f3308201ef30820195a00302010202140bfec7da97e048e
15ac3dacb9eafe82e64fd07f5300a06082a8648ce3d040302302331143012060355
04030c0b75746f7069612069616361310b3009060355040613025553301e170d323
4313030313030303030305a170d3235313030313030303030305a30213112301006
035504030c0975746f706961206473310b300906035504061302555330593013060
72a8648ce3d020106082a8648ce3d03010703420004ace7ab7340e5d9648c5a72a9
a6f56745c7aad436a03a43efea77b5fa7b88f0197d57d8983e1b37d3a539f4d5883
65e38cbbf5b94d68c547b5bc8731dcd2f146ba381a83081a5301c0603551d1f0415
30133011a00fa00d820b6578616d706c652e636f6d301e0603551d1204173015811
36578616d706c65406578616d706c652e636f6d301d0603551d0e0416041414e290
17a6c35621ffc7a686b7b72db06cd12351301f0603551d2304183016801454fa238
3a04c28e0d930792261c80c4881d2c00b300e0603551d0f0101ff04040302078030
150603551d250101ff040b3009060728818c5d050102300a06082a8648ce3d04030
20348003045022100b7103fd4b90529f50bd6f70c5ae5ce7f4f3d4d15a4e082812f
9fa1f5c2e5aa0a0220070b2822ec7ce6c56804923a85b2cfbffd054cf9a915f070c
fef7179a4bc6569590320d81859031ba766737461747573a16b7374617475735f6c
697374a26369647819019c63757269782168747470733a2f2f6578616d706c652e6
36f6d2f7374617475736c697374732f3167646f6354797065756f72672e69736f2e
31383031332e352e312e6d444c6776657273696f6e63312e306c76616c696469747
9496e666fa3667369676e6564c074323032342d31302d30315431333a33303a3032
5a6976616c696446726f6dc074323032342d31302d30315431333a33303a30325a6
a76616c6964556e74696cc074323032352d31302d30315431333a33303a30325a6c
76616c756544696765737473a1716f72672e69736f2e31383031332e352e31ac005
820a81d65ed5075fbd7ee19fa66e2bb3047ed826e2769873e7ef07c923da7a6f243
01582048701a9546492284d266ed81d439230a582d0e1f17a08ab1859a3efe98069
0a4025820d11fe48c8835b30bfb3895c3905436ddfb63f59ab9eee181b110985329
2a8f62035820a741bf05e20a8bc359e32426106ed0899b2c60262cc3acc637ddc99
41095fb7a045820ab67cb9a8f20a8572f77f02727367d08dc8e57fb89deb46b9c62
6e94457b7d8b055820bacddb4142b3842bd555206eb5acb27ded063294995c7e7fe
fbf93ece522604d065820bfd02b3aebdc05b53b5539226c38088d6d784b0ea0fab6
9eb9311650a48d325307582027dab70fe71da63e5e5d199e8ae5b79cbe8904bc30c
5b7544fb809e02ccb3e6a0858200dbd7ccc9c7727d3d17295f1b6f1914071670ee2
3d4d33530c31f1f406b8e3b7095820a5beb5efadf37f21637209abc519830681cc5
1f334818a823fec13b29552f5ba0a5820d8047c95f9272d7d07b2c13a9f5ac2ee02
380ab272a165e569391d89a2152c3c0b582004939930ffb4911ef03487a153605a3
0368b69f2437d6d21b4c90f92bc144c3e6d6465766963654b6579496e666fa16964
65766963654b6579a40102200121582096313d6c63e24e3372742bfdb1a33ba2c89
7dcd68ab8c753e4fbd48dca6b7f9a2258201fb3269edd418857de1b39a4e4a44b92
fa484caa722c228288f01d0c03a2c3d66f646967657374416c676f726974686d675
348412d3235365840b7c2d4abe85aa5ba814ef95de0385c71c802be8ac33a4a971a
85ed800ba7acb59cb21035f4a68fc0caa450cbefd3b255aec72f83595f0ae7b7d50
fe8a1c4cafe
]]></artwork>
        <t>The following is the CBOR Diagnostic Notation of the example above:</t>
        <artwork><![CDATA[
[
  << {
    1: -7
  } >>,
  {
    33: h'308201ef30820195a00302010202140bfec7da97e048e15ac3dacb9ea
    fe82e64fd07f5300a06082a8648ce3d04030230233114301206035504030c0b
    75746f7069612069616361310b3009060355040613025553301e170d3234313
    030313030303030305a170d3235313030313030303030305a30213112301006
    035504030c0975746f706961206473310b30090603550406130255533059301
    306072a8648ce3d020106082a8648ce3d03010703420004ace7ab7340e5d964
    8c5a72a9a6f56745c7aad436a03a43efea77b5fa7b88f0197d57d8983e1b37d
    3a539f4d588365e38cbbf5b94d68c547b5bc8731dcd2f146ba381a83081a530
    1c0603551d1f041530133011a00fa00d820b6578616d706c652e636f6d301e0
    603551d120417301581136578616d706c65406578616d706c652e636f6d301d
    0603551d0e0416041414e29017a6c35621ffc7a686b7b72db06cd12351301f0
    603551d2304183016801454fa2383a04c28e0d930792261c80c4881d2c00b30
    0e0603551d0f0101ff04040302078030150603551d250101ff040b300906072
    8818c5d050102300a06082a8648ce3d0403020348003045022100b7103fd4b9
    0529f50bd6f70c5ae5ce7f4f3d4d15a4e082812f9fa1f5c2e5aa0a0220070b2
    822ec7ce6c56804923a85b2cfbffd054cf9a915f070cfef7179a4bc6569'
  },
  << 24( << {
    "status": {
      "status_list": {
        "idx": 412,
        "uri": "https://example.com/statuslists/1"
      }
    },
    "docType": "org.iso.18013.5.1.mDL",
    "version": "1.0",
    "validityInfo": {
      "signed": 2024-10-01 13:30:02+00:00,
      "validFrom": 2024-10-01 13:30:02+00:00,
      "validUntil": 2025-10-01 13:30:02+00:00
    },
    "valueDigests": {
      "org.iso.18013.5.1": {
        0: h'a81d65ed5075fbd7ee19fa66e2bb3047ed826e2769873e7ef07c92
        3da7a6f243',
        1: h'48701a9546492284d266ed81d439230a582d0e1f17a08ab1859a3e
        fe980690a4',
        2: h'd11fe48c8835b30bfb3895c3905436ddfb63f59ab9eee181b11098
        53292a8f62',
        3: h'a741bf05e20a8bc359e32426106ed0899b2c60262cc3acc637ddc9
        941095fb7a',
        4: h'ab67cb9a8f20a8572f77f02727367d08dc8e57fb89deb46b9c626e
        94457b7d8b',
        5: h'bacddb4142b3842bd555206eb5acb27ded063294995c7e7fefbf93
        ece522604d',
        6: h'bfd02b3aebdc05b53b5539226c38088d6d784b0ea0fab69eb93116
        50a48d3253',
        7: h'27dab70fe71da63e5e5d199e8ae5b79cbe8904bc30c5b7544fb809
        e02ccb3e6a',
        8: h'0dbd7ccc9c7727d3d17295f1b6f1914071670ee23d4d33530c31f1
        f406b8e3b7',
        9: h'a5beb5efadf37f21637209abc519830681cc51f334818a823fec13
        b29552f5ba',
        10: h'd8047c95f9272d7d07b2c13a9f5ac2ee02380ab272a165e569391
        d89a2152c3c',
        11: h'04939930ffb4911ef03487a153605a30368b69f2437d6d21b4c90
        f92bc144c3e'
      }
    },
    "deviceKeyInfo": {
      "deviceKey": {
        1: 2,
        -1: 1,
        -2: h'96313d6c63e24e3372742bfdb1a33ba2c897dcd68ab8c753e4fbd
        48dca6b7f9a',
        -3: h'1fb3269edd418857de1b39a4e4a44b92fa484caa722c228288f01
        d0c03a2c3d6'
      }
    },
    "digestAlgorithm": "SHA-256"
  } >> ) >>,
  h'b7c2d4abe85aa5ba814ef95de0385c71c802be8ac33a4a971a85ed800ba7acb
  59cb21035f4a68fc0caa450cbefd3b255aec72f83595f0ae7b7d50fe8a1c4cafe'
]
]]></artwork>
      </section>
    </section>
    <section anchor="status-types">
      <name>Status Types</name>
      <t>This document defines statuses of Referenced Tokens as Status Type values. A status describes the state, mode, condition or stage of an entity that is represented by the Referenced Token.</t>
      <t>A Status List can not represent multiple statuses per Referenced Token. If the Status List contains more than one bit per token (as defined by <tt>bits</tt> in the Status List), then the whole value of bits <bcp14>MUST</bcp14> describe one value. Status Types <bcp14>MUST</bcp14> have a numeric value between 0 and 255 for their representation in the Status List. The issuer of the Status List <bcp14>MUST</bcp14> choose an adequate <tt>bits</tt> (bit size) to be able to describe the required Status Types for its application.</t>
      <section anchor="status-types-values">
        <name>Status Types Values</name>
        <t>This document creates a registry in <xref target="iana-status-types"/> that includes the most common Status Type values. Additional values may defined for particular use cases. Status Types described by this document comprise:</t>
        <ul spacing="normal">
          <li>
            <t>0x00 - "VALID" - The status of the Referenced Token is valid, correct or legal.</t>
          </li>
          <li>
            <t>0x01 - "INVALID" - The status of the Referenced Token is revoked, annulled, taken back, recalled or cancelled.</t>
          </li>
          <li>
            <t>0x02 - "SUSPENDED" - The status of the Referenced Token is temporarily invalid, hanging, debarred from privilege. This state is reversible.</t>
          </li>
          <li>
            <t>0x03 - "APPLICATION_SPECIFIC_3" - The status of the Referenced Token is implicitly given by the particular use case and the meaning of this value is known out-of-band.</t>
          </li>
          <li>
            <t>0x0E - "APPLICATION_SPECIFIC_14" - The status of the Referenced Token is implicitly given by the particular use case and the meaning of this value is known out-of-band.</t>
          </li>
          <li>
            <t>0x0F - "APPLICATION_SPECIFIC_15" - The status of the Referenced Token is implicitly given by the particular use case and the meaning of this value is known out-of-band.</t>
          </li>
        </ul>
        <t>The Status Issuer <bcp14>MUST</bcp14> choose an adequate <tt>bits</tt> (bit size) to be able to describe the required Status Types for the application.</t>
        <t>The processing rules for JWT or CWT precede any evaluation of a Referenced Token's status. For example, if a token is evaluated as being expired through the "exp" (Expiration Time) but also has a status of 0x00 ("VALID"), the token is considered expired.</t>
      </section>
    </section>
    <section anchor="verification-and-processing">
      <name>Verification and Processing</name>
      <section anchor="status-list-request">
        <name>Status List Request</name>
        <t>To obtain the Status List or Status List Token, the Relying Party <bcp14>MUST</bcp14> send an HTTP GET request to the URI provided in the Referenced Token.</t>
        <t>If the Status List is provided by an HTTP endpoint (and not as a Status List Token), the provider of the Status List <bcp14>MUST</bcp14> utilize TLS. Which version(s) should be implemented will vary over time. A TLS server certificate check <bcp14>MUST</bcp14> be performed as defined in Section 5 and 6 of <xref target="RFC6125"/>.</t>
        <t>The HTTP endpoint <bcp14>SHOULD</bcp14> support the use of Cross-Origin Resource Sharing (CORS) <xref target="CORS"/> and/or other methods as appropriate to enable Browser-Based clients to access it.</t>
        <t>The Relying Party <bcp14>SHOULD</bcp14> send the following Accept-Header to indicate the requested response type:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+json" for Status List in JSON format</t>
          </li>
          <li>
            <t>"application/statuslist+jwt" for Status List in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cbor" for Status List in CBOR format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List in CWT format</t>
          </li>
        </ul>
        <t>If the Relying Party does not send an Accept Header, the response type is assumed to be known implicit or out-of-band.</t>
        <t>The following are non-normative examples for a request and response for a status list with type <tt>application/statuslist+jwt</tt>:</t>
        <artwork type="ascii-art"><![CDATA[
GET /statuslists/1 HTTP/1.1
Host: example.com
Accept: application/statuslist+jwt
]]></artwork>
        <artwork type="ascii-art"><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/statuslist+jwt

eyJhbGciOiJFUzI1NiIsImtpZCI6IjEyIiwidHlwIjoic3RhdHVzbGlzdCtqd3QifQ.e
yJleHAiOjIyOTE3MjAxNzAsImlhdCI6MTY4NjkyMDE3MCwiaXNzIjoiaHR0cHM6Ly9le
GFtcGxlLmNvbSIsInN0YXR1c19saXN0Ijp7ImJpdHMiOjEsImxzdCI6ImVOcmJ1UmdBQ
WhjQlhRIn0sInN1YiI6Imh0dHBzOi8vZXhhbXBsZS5jb20vc3RhdHVzbGlzdHMvMSIsI
nR0bCI6NDMyMDB9.CKZyqx5tfMwce6fk8PJYMAF3BTTbpfkQMtVGsAwmUzKGIU-1Rcv5
_lPhbOT9WuaRu76SjurRNYzHSp4-Ub7ukA
]]></artwork>
      </section>
      <section anchor="status-list-response">
        <name>Status List Response</name>
        <t>In the successful response, the Status List Provider <bcp14>MUST</bcp14> use the following content-type:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+json" for Status List in JSON format</t>
          </li>
          <li>
            <t>"application/statuslist+jwt" for Status List in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cbor" for Status List in CBOR format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List in CWT format</t>
          </li>
        </ul>
        <t>In the case of "application/statuslist+json", the response <bcp14>MUST</bcp14> be of type JSON and follow the rules of <xref target="status-list-json"/>.
In the case of "application/statuslist+jwt", the response <bcp14>MUST</bcp14> be of type JWT and follow the rules of <xref target="status-list-token-jwt"/>.
In the case of "application/statuslist+cbor", the response <bcp14>MUST</bcp14> be of type CBOR and follow the rules of <xref target="status-list-cbor"/>.
In the case of "application/statuslist+cwt", the response <bcp14>MUST</bcp14> be of type CWT and follow the rules of <xref target="status-list-token-cwt"/>.</t>
        <t>The HTTP response <bcp14>SHOULD</bcp14> use gzip Content-Encoding as defined in <xref target="RFC9110"/>.</t>
      </section>
      <section anchor="validation-rules">
        <name>Validation Rules</name>
        <t>Upon receiving a Referenced Token, a Relying Party <bcp14>MUST</bcp14> first perform the validation of the Referenced Token - e.g., checking for expected attributes, valid signature, expiration time. The processing rules for JWT or CWT precede any evaluation of a Referenced Token's status. For example, if a token is evaluated as being expired through the "exp" (Expiration Time) but also has a status of 0x00 ("VALID"), the token is considered expired. As this is out of scope of this document, this validation is not be described here, but is expected to be done according to the format of the Referenced Token.</t>
        <t>If this validation was not successful, the Referenced Token <bcp14>MUST</bcp14> be rejected. If the validation was successful, the Relying Party <bcp14>MUST</bcp14> perform the following validation steps to evaluate the status of the reference token:</t>
        <ol spacing="normal" type="1"><li>
            <t>Check for the existence of a <tt>status</tt> claim, check for the existence of a <tt>status_list</tt> claim within the <tt>status</tt> claim and validate that the content of <tt>status_list</tt> adheres to the rules defined in <xref target="referenced-token-jose"/> for JWTs and <xref target="referenced-token-cose"/> for CWTs. This step can be overruled if defined within the Referenced Token Format natively</t>
          </li>
          <li>
            <t>Resolve the Status List from the provided URI</t>
          </li>
          <li>
            <t>Validate the Status List Token:
            </t>
            <ol spacing="normal" type="1"><li>
                <t>Validate the Status List Token by following the rules defined in section 7.2 of <xref target="RFC7519"/> for JWTs and section 7.2 of <xref target="RFC8392"/> for CWTs.</t>
              </li>
              <li>
                <t>Check for the existence of the required claims as defined in <xref target="status-list-token-jwt"/> and <xref target="status-list-token-cwt"/></t>
              </li>
            </ol>
          </li>
          <li>
            <t>All existing claims in the Status List Token <bcp14>MUST</bcp14> be checked according to the rules in <xref target="status-list-token-jwt"/> and <xref target="status-list-token-cwt"/>
            </t>
            <ol spacing="normal" type="1"><li>
                <t>The subject claim (<tt>sub</tt> or <tt>2</tt>) of the Status List Token <bcp14>MUST</bcp14> be equal to the <tt>uri</tt> claim in the <tt>status_list</tt> object of the Referenced Token</t>
              </li>
              <li>
                <t>If the Relying Party has custom policies regarding the freshness of the Status List Token, it <bcp14>SHOULD</bcp14> check the issued at claim (<tt>iat</tt> or <tt>6</tt>)</t>
              </li>
              <li>
                <t>If expiration time is defined (<tt>exp</tt> or <tt>4</tt>), it <bcp14>MUST</bcp14> be checked if the Status List Token is expired</t>
              </li>
              <li>
                <t>If the Relying Party is using a system for caching the Status List Token, it <bcp14>SHOULD</bcp14> check the <tt>ttl</tt> claim of the Status List Token and retrieve a fresh copy if (time status was resolved + ttl &lt; current time)</t>
              </li>
            </ol>
          </li>
          <li>
            <t>Decompress the Status List with a decompressor that is compatible with DEFLATE <xref target="RFC1951"/> and ZLIB <xref target="RFC1950"/></t>
          </li>
          <li>
            <t>Retrieve the status value of the index specified in the Referenced Token as described in <xref target="status-list"/>. Fail if the provided index is out of bound of the status list</t>
          </li>
          <li>
            <t>Check the status value as described in <xref target="status-types"/></t>
          </li>
        </ol>
        <t>If any of these checks fails, no statement about the status of the Referenced Token can be made and the Referenced Token <bcp14>SHOULD</bcp14> be rejected.</t>
      </section>
      <section anchor="historical-resolution">
        <name>Historical resolution</name>
        <t>By default, the Status List mechanism defined in this specification only conveys information about the state of Reference Tokens at the time the Status List Token was issued. The validity period for this information, as defined by the issuer, is explicitly stated by the <tt>iat</tt> (issued at) and <tt>exp</tt> (expiration time) claims for JWT, and their corresponding ones for the CWT representation. If support for historical status information is required, this can be achieved by extending the request for the Status List as defined in <xref target="status-list-request"/> with a timestamp. This feature has additional privacy implications as described in <xref target="privacy-historical"/>.</t>
        <t>To obtain the Status List or Status List Token, the Relying Party <bcp14>MUST</bcp14> send an HTTP GET request to the URI provided in the Referenced Token with the additional query parameter <tt>time</tt> and its value being a unix timestamp. The response for a valid request <bcp14>SHOULD</bcp14> contain a Status List that was valid for that specified time or an error for the JWT and CWT variants and <bcp14>MUST</bcp14> contain a valid status list or an error for the unsigned option.</t>
        <t>If the Server does not support the additional query parameter, it <bcp14>SHOULD</bcp14> return a status code of 501 (Not Implemented), or if the requested time is not supported it <bcp14>SHOULD</bcp14> return a status code of 406 (Not Acceptable). These status codes <bcp14>MUST</bcp14> be supported for the unsigned option, where the client has not other way of checking when the response was valid and <bcp14>SHOULD</bcp14> be supported for the signed options. A status list token might be served via static file hosting (e.g., leveraging a Content Delivery Network), which would result in the client not being able to retrieve those status codes. Thus, the client <bcp14>MUST</bcp14> verify support for this feature for the JWT and CWT variants by checking that the requested timestamp is within the valid time of the returned token signaled via <tt>iat</tt> (<tt>6</tt> for CWT) and <tt>exp</tt> (<tt>4</tt> for CWT).</t>
        <t>The following is a non-normative example for a GET request using the <tt>time</tt> query parameter:</t>
        <artwork type="ascii-art"><![CDATA[
GET /statuslists/1?time=1686925000 HTTP/1.1
Host: example.com
Accept: application/statuslist+jwt
]]></artwork>
        <t>The following is a non-normative example for a response for the above Request:</t>
        <artwork type="ascii-art"><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/statuslist+jwt

eyJhbGciOiJFUzI1NiIsImtpZCI6IjEyIiwidHlwIjoic3RhdHVzbGlzdCtqd3QifQ.e
yJleHAiOjIyOTE3MjAxNzAsImlhdCI6MTY4NjkyMDE3MCwiaXNzIjoiaHR0cHM6Ly9le
GFtcGxlLmNvbSIsInN0YXR1c19saXN0Ijp7ImJpdHMiOjEsImxzdCI6ImVOcmJ1UmdBQ
WhjQlhRIn0sInN1YiI6Imh0dHBzOi8vZXhhbXBsZS5jb20vc3RhdHVzbGlzdHMvMSIsI
nR0bCI6NDMyMDB9.CKZyqx5tfMwce6fk8PJYMAF3BTTbpfkQMtVGsAwmUzKGIU-1Rcv5
_lPhbOT9WuaRu76SjurRNYzHSp4-Ub7ukA
]]></artwork>
      </section>
    </section>
    <section anchor="batch-fetching">
      <name>Status List Aggregation</name>
      <t>Status List Aggregation is an optional mechanism to retrieve a list of URIs to all Status List Tokens, allowing a Relying Party to fetch all relevant Status Lists for a specific type of Referenced Token or Issuer. This mechanism is intended to support fetching and caching mechanisms and allow offline validation of the status of a reference token for a period of time.</t>
      <t>There are two options for a Relying Party to retrieve the Status List Aggregation.
An Issuer <bcp14>MAY</bcp14> support any of these mechanisms:</t>
      <ul spacing="normal">
        <li>
          <t>Issuer metadata: The Issuer of the Referenced Token publishes an URI which links to Status List Aggregation, e.g. in publicly available metadata of an issuance protocol</t>
        </li>
        <li>
          <t>Status List Parameter: The Status Issuer includes an additional claim in the Status List (Token) that contains the Status List Aggregation URI.</t>
        </li>
      </ul>
      <section anchor="issuer-metadata">
        <name>Issuer Metadata</name>
        <t>The Issuer <bcp14>MAY</bcp14> link to the Status List Aggregation URI in metadata that can be provided by different means like .well-known metadata as is used commonly in OAuth and OpenID, or via a VICAL extension for ISO mDoc / mDL.</t>
        <t>The concrete specification on how this is implemented depends on the specific ecosystem and is out of scope of this specification.</t>
      </section>
      <section anchor="status-list-parameter">
        <name>Status List Parameter</name>
        <t>The URI to the Status List Aggregation <bcp14>MAY</bcp14> be provided as the optional parameter <tt>aggregation_uri</tt> in the Status List itself as explained in<xref target="status-list-cbor"/> and <xref target="status-list-json"/> respectively. A Relying Party may use this URI to retrieve an up-to-date list of relevant Status Lists.</t>
      </section>
      <section anchor="status-list-aggregation-in-json-format">
        <name>Status List Aggregation in JSON Format</name>
        <t>This section defines the structure for a JSON-encoded Status List Aggregation:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status_lists</tt>: <bcp14>REQUIRED</bcp14>. JSON array of strings that contains URIs linking to Status List (Tokens).</t>
          </li>
        </ul>
        <t>The Status List Aggregation URI provides a list of Status List URIs. This aggregation in JSON and the media type return <bcp14>SHOULD</bcp14> be <tt>application/json</tt>. A Relying Party can iterate through this list and fetch all Status List Tokens before encountering the specific URI in a Referenced Token.</t>
        <t>The following is a non-normative example for media type <tt>application/json</tt>:</t>
        <sourcecode type="json"><![CDATA[
{
   "status_lists" : [
      "https://example.com/statuslists/1",
      "https://example.com/statuslists/2",
      "https://example.com/statuslists/3"
   ]
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="further-examples">
      <name>Further Examples</name>
      <section anchor="status-list-token-with-2-bit-status-values-in-jwt-format">
        <name>Status List Token with 2-Bit Status Values in JWT format</name>
        <t>In this example, the Status List additionally includes the Status Type "SUSPENDED". As the Status Type value for "SUSPENDED" is 0x02 and does not fit into 1 bit, the "bits" is required to be 2.</t>
        <t>This example Status List represents the status of 12 Referenced Tokens, requiring 24 bits (3 bytes) of status.</t>
        <artwork type="ascii-art"><![CDATA[
status[0] = 1
status[1] = 2
status[2] = 0
status[3] = 3
status[4] = 0
status[5] = 1
status[6] = 0
status[7] = 1
status[8] = 1
status[9] = 2
status[10] = 3
status[11] = 3
]]></artwork>
        <t>These bits are concatenated:</t>
        <artwork type="ascii-art"><![CDATA[
byte             0                  1                  2
bit       7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
values   |1|1|0|0|1|0|0|1|  |0|1|0|0|0|1|0|0|  |1|1|1|1|1|0|0|1|
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
          \ / \ / \ / \ /    \ / \ / \ / \ /    \ / \ / \ / \ /
status     3   0   2   1      1   0   1   0      3   3   2   1
index      3   2   1   0      7   6   5   4      11  10  9   8
           \___________/      \___________/      \___________/
                0xC9               0x44               0xF9

]]></artwork>
        <t>Resulting in the byte array and compressed/base64url-encoded status list:</t>
        <artwork><![CDATA[
byte_array = [0xc9, 0x44, 0xf9] 
encoded:
{
  "bits": 2,
  "lst": "eNo76fITAAPfAgc"
}
]]></artwork>
      </section>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <section anchor="correct-decoding-and-parsing-of-the-encoded-status-list">
        <name>Correct decoding and parsing of the encoded status list</name>
        <t>Implementers should be particularly careful for the correct parsing and decoding of the status list. Incorrect implementations might check the index on the wrong data or miscalculate the bit and byte index leading to an erroneous status of the Referenced Token. Beware, that bits are indexed (bit order) from least significant bit to most significant bit (also called "right to left") while bytes are indexed (byte order) in their natural incrementing byte order (usually written for display purpose from left to write). Endianness does not apply here because each status value fits within a single byte.</t>
        <t>Implementations are <bcp14>RECOMMENDED</bcp14> to verify correctness using the test vectors given by this specification.</t>
      </section>
      <section anchor="security-guidance-for-jwt-and-cwt">
        <name>Security Guidance for JWT and CWT</name>
        <t>A Status List Token in the JWT format should follow the security considerations of <xref target="RFC7519"/> and the best current practices of <xref target="RFC8725"/>.</t>
        <t>A Status List Token in the CWT format should follow the security considerations of <xref target="RFC8392"/>.</t>
      </section>
      <section anchor="cached-and-stale-status-lists">
        <name>Cached and Stale status lists</name>
        <t>When Relying Parties fetch the Status List, they need to be aware of its up-to-date status. The 'ttl' (time-to-live) claim
in the Status List Token provides one mechanism for setting a maximum cache time for the fetched data. This property permits distribution of
a status list to a CDN or other distribution mechanism while giving guidance to consumers of the status list on how often they need to fetch
a fresh copy of the status list even if that status list is not expired.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <section anchor="privacy-issuer">
        <name>Observability of Issuers</name>
        <t>The main privacy consideration for a Status List, especially in the context of the Issuer-Holder-Verifier model <xref target="SD-JWT.VC"/>, is to prevent the Issuer from tracking the usage of the Referenced Token when the status is being checked. If an Issuer offers status information by referencing a specific token, this would enable him to create a profile for the issued token by correlating the date and identity of Relying Parties, that are requesting the status.</t>
        <t>The Status List approaches these privacy implications by integrating the status information of many Referenced Tokens into the same list. Therefore, the Issuer does not learn for which Referenced Token the Relying Party is requesting the Status List. The privacy of the Holder is protected by the anonymity within the set of Referenced Tokens in the Status List, also called herd privacy. This limits the possibilities of tracking by the Issuer.</t>
        <t>The herd privacy is depending on the number of entities within the Status List called its size. A larger size results in better privacy but also impacts the performance as more data has to be transferred to read the Status List.</t>
        <t>Additionally, the Issuer may analyse data from the HTTP request to identify the Relying Party, e.g. through the sender's IP address.</t>
        <t>This behaviour may be mitigated by:</t>
        <ul spacing="normal">
          <li>
            <t>private relay protocols or other mechanism hiding the original sender like <xref target="RFC9458"/>.</t>
          </li>
          <li>
            <t>using trusted Third Party Hosting, see <xref target="third-party-hosting"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="malicious-issuers">
        <name>Malicious Issuers</name>
        <t>A malicious Issuer could bypass the privacy benefits of the herd privacy by generating a unique Status List for every Referenced Token. By these means, he could maintain a mapping between Referenced Tokens and Status Lists and thus track the usage of Referenced Tokens by utilizing this mapping for the incoming requests. This malicious behaviour could be detected by Relying Parties that request large amounts of Referenced Tokens by comparing the number of different Status Lists and their sizes.</t>
      </section>
      <section anchor="privacy-relying-party">
        <name>Observability of Relying Parties</name>
        <t>Once the Relying Party receives the Referenced Token, this enables him to request the Status List to validate its status through the provided <tt>uri</tt> parameter and look up the corresponding <tt>index</tt>. However, the Relying Party may persistently store the <tt>uri</tt> and <tt>index</tt> of the Referenced Token to request the Status List again at a later time. By doing so regularly, the Relying Party may create a profile of the Referenced Token's validity status. This behaviour may be intended as a feature, e.g. for a KYC process that requires regular validity checks, but might also be abused in cases where this is not intended and unknown to the Holder, e.g. profiling the suspension of a driving license or checking the employment status of an employee credential.</t>
        <t>This behaviour could be mitigated by:</t>
        <ul spacing="normal">
          <li>
            <t>regular re-issuance of the Referenced Token, see <xref target="implementation-lifecycle"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="privacy-outsider">
        <name>Observability of Outsiders</name>
        <t>Outside actors may analyse the publicly available Status Lists to get information on the internal processes of the Issuer and his related business. This data may allow inferences on the total number of issued Reference Tokens and the revocation rate. Additionally, actors may regularly fetch this data or use the historic data functionality to learn how these numbers change over time.</t>
        <t>This behaviour could be mitigated by:</t>
        <ul spacing="normal">
          <li>
            <t>disable the historical data feature <xref target="historical-resolution"/></t>
          </li>
          <li>
            <t>disable the Status List Aggregation <xref target="batch-fetching"/></t>
          </li>
          <li>
            <t>choose non-sequential, pseudo-random or random indices</t>
          </li>
          <li>
            <t>use decoy entries to obfuscate the real number of Referenced Tokens within a Status List</t>
          </li>
          <li>
            <t>choose to deploy and utilize multiple Status Lists simultaneously</t>
          </li>
        </ul>
      </section>
      <section anchor="unlinkability">
        <name>Unlinkability</name>
        <t>Colluding Issuers and Relying Parties have the possibility to link two transactions, as the tuple of <tt>uri</tt> and <tt>index</tt> inside the Referenced Token are unique and therefore traceable data. By comparing the status claims of received Referenced Tokens, two colluding Relying Parties could determine that they have interacted with the same user or an Issuer could trace the usage of its issued Referenced Token by colluding with various Relying Parties. It is therefore recommended to use Status Lists for Referenced Token formats that have similar unlinkability properties.</t>
        <t>To avoid privacy risks for colluding Relying Parties, it is <bcp14>RECOMMENDED</bcp14> that Issuers use batch issuance to issue multiple tokens, see <xref target="implementation-lifecycle"/>.</t>
        <t>To avoid further correlatable information by the values of <tt>uri</tt> and <tt>index</tt>, Issuers are <bcp14>RECOMMENDED</bcp14> to:</t>
        <ul spacing="normal">
          <li>
            <t>choose non-sequential, pseudo-random or random indices</t>
          </li>
          <li>
            <t>use decoy entries to obfuscate the real number of Referenced Tokens within a Status List</t>
          </li>
          <li>
            <t>choose to deploy and utilize multiple Status Lists simultaneously</t>
          </li>
        </ul>
      </section>
      <section anchor="third-party-hosting">
        <name>Third Party Hosting</name>
        <t>If the roles of the Issuer and the Status Provider are performed by two different entities, this may give additional privacy assurances as the Issuer has no means to identify the Relying Party or its request.</t>
        <t>Third Party hosting may also allow for greater scalability, as the Status List Tokens may be served by operators with greater resources, like CDNs.</t>
      </section>
      <section anchor="privacy-historical">
        <name>Historical Resolution</name>
        <t>By default, this specification only supports providing status list information for the most recent status information and does not allow the lookup of historical information like a validity state at a specific point in time. There exists optional support for a query parameter that allows these kind of historic lookups as described in <xref target="historical-resolution"/>. There are scenarios where such a functionality is necessary, but this feature should only be implemented when the scenario and the consequences of enabling historical resolution are fully understood.</t>
        <t>There are strong privacy concerns that have to be carefully taken into considerations when providing a mechanism that allows historic requests for status information - see <xref target="privacy-relying-party"/> for more details. Support for this functionality is optional and Implementers are <bcp14>RECOMMENDED</bcp14> to not support historic requests unless there are strong reasons to do so and after carefully considering the privacy implications.</t>
      </section>
    </section>
    <section anchor="implementation">
      <name>Implementation Considerations</name>
      <section anchor="implementation-lifecycle">
        <name>Token Lifecycle</name>
        <t>The lifetime of a Status List (and the Status List Token) depends on the lifetime of its Referenced Tokens. Once all Referenced Tokens are expired, the Issuer may stop serving the Status List (and the Status List Token).</t>
        <t>Referenced Tokens may be regularly re-issued to mitigate linkability of presentations to Relying Parties. In this case, every re-issued Referenced Token <bcp14>MUST</bcp14> have a fresh Status List entry in order to prevent this becoming possible source of correlation.</t>
        <t>Referenced Tokens may also be issued in batches, such that Holders can use individual tokens for every transaction. In this case, every Referenced Token <bcp14>MUST</bcp14> have a dedicated Status List entry. Revoking batch issued Referenced Tokens might reveal this correlation later on.</t>
      </section>
      <section anchor="default-values-and-double-allocation">
        <name>Default Values and Double Allocation</name>
        <t>Implementations producing Status Lists are <bcp14>RECOMMENDED</bcp14> to initialize the Status List byte array with a default value and provide this as an initialization parameter to the Issuer. The Issuer is <bcp14>RECOMMENDED</bcp14> to use a default value that represents the most common value for its Referenced Tokens to avoid an update during issuance.</t>
        <t>Implementations producing Status Lists are <bcp14>RECOMMENDED</bcp14> to prevent double allocation, i.e. re-using the same <tt>uri</tt> and <tt>index</tt> for multiple Referenced Tokens. The Issuer <bcp14>MUST</bcp14> prevent any unintended double allocation by using the Status List.</t>
      </section>
      <section anchor="status-list-size">
        <name>Status List Size</name>
        <t>The Status List Issuer may increase the size of a Status List if it requires indices for additional Referenced Tokens. It is <bcp14>RECOMMENDED</bcp14> that the size of a Status List in bits is divisible in bytes (8 bits) without a remainder, i.e. <tt>size-in-bits</tt> % 8 = 0.</t>
        <t>The Status List Issuer may chunk its Referenced Tokens into multiple Status Lists to reduce the transmission size of an individual Status List Token. This may be useful for setups where some entities operate in constrained environments, e.g. for mobile internet or embedded devices.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="json-web-token-claims-registration">
        <name>JSON Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "JSON Web Token Claims" registry <xref target="IANA.JWT"/> established by <xref target="RFC7519"/>.</t>
        <section anchor="registry-contents">
          <name>Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Description: Reference to a status or validity mechanism containing up-to-date status information on the JWT.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-claim"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Description: A status list containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-jwt"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Description: Time to Live</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-jwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="iana-registry">
        <name>JWT Status Mechanism Methods Registry</name>
        <t>This specification establishes the IANA "Status Mechanism Methods" registry for JWT "status" member values. The registry records the status mechanism method member and a reference to the specification that defines it.</t>
        <section anchor="registration-template">
          <name>Registration Template</name>
          <t>Status Method Value:</t>
          <ul empty="true">
            <li>
              <t>The name requested (e.g., "status_list"). The name is case sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts state that there is a compelling reason to allow an exception.</t>
            </li>
          </ul>
          <t>Status Method Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the status mechanism method.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For Standards Track RFCs, list the "IESG".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents.  An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Method Value: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Status Method Description: A status list containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="referenced-token-jose"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cbor-web-token-claims-registration">
        <name>CBOR Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "CBOR Web Token (CWT) Claims" registry <xref target="IANA.CWT"/> established by <xref target="RFC8392"/>.</t>
        <section anchor="registry-contents-1">
          <name>Registry Contents</name>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65535)</t>
            </li>
            <li>
              <t>Claim Description: Reference to a status or validity mechanism containing up-to-date status information on the CWT.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-claim"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65533)</t>
            </li>
            <li>
              <t>Claim Description: A status list containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-cwt"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65534)</t>
            </li>
            <li>
              <t>Claim Description: Time to Live</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-cwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cwt-iana-registry">
        <name>CWT Status Mechanism Methods Registry</name>
        <t>This specification establishes the IANA "Status Mechanism Methods" registry for CWT "status" member values. The registry records the status mechanism method member and a reference to the specification that defines it.</t>
        <section anchor="registration-template-1">
          <name>Registration Template</name>
          <t>Status Method Value:</t>
          <ul empty="true">
            <li>
              <t>The name requested (e.g., "status_list"). The name is case sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts state that there is a compelling reason to allow an exception.</t>
            </li>
          </ul>
          <t>Status Method Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the status mechanism method.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For Standards Track RFCs, list the "IESG".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents.  An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents-1">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Method Value: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Status Method Description: A status list containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="referenced-token-cose"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="iana-status-types">
        <name>Status Types Registry</name>
        <t>This specification establishes the IANA "Status Types" registry for Status List values. The registry records the a human readable label, the bit representation and a common description for it.</t>
        <section anchor="registration-template-2">
          <name>Registration Template</name>
          <t>Status Type Name:</t>
          <ul empty="true">
            <li>
              <t>The name is a human-readable case insensitive label for the Status Type that helps to talk about a Status of Referenced Token in common language.</t>
            </li>
          </ul>
          <t>Status Type Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the Status Type and optional examples.</t>
            </li>
          </ul>
          <t>Status Type value:</t>
          <ul empty="true">
            <li>
              <t>The bit representation of the Status Type in a byte hex representation. Values are filled up with zeros if they have less than 8 bits.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For Standards Track RFCs, list the "IESG".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents.  An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents-2">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: VALID</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is valid, correct or legal.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x00</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: INVALID</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is revoked, annulled, taken back, recalled or cancelled.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x01</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: SUSPENDED</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is temporarily invalid, hanging, debarred from privilege. This state is reversible.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x02</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: APPLICATION_SPECIFIC_3</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is implicitly given by the particular use case and the meaning of this value is known out-of-band.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x03</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: APPLICATION_SPECIFIC_14</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is implicitly given by the particular use case and the meaning of this value is known out-of-band.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x0E</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: APPLICATION_SPECIFIC_15</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is implicitly given by the particular use case and the meaning of this value is known out-of-band.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x0F</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="referenced-token-jose"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
        </section>
      </section>
      <section anchor="media-type-registration">
        <name>Media Type Registration</name>
        <t>This section requests registration of the following media types <xref target="RFC2046"/> in
the "Media Types" registry <xref target="IANA.MediaTypes"/> in the manner described
in <xref target="RFC6838"/>.</t>
        <t>To indicate that the content is an JSON-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+json</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: See <xref target="status-list-json"/> of this specification</t>
          </li>
          <li>
            <t>Security considerations: See <xref target="Security"/> of this specification</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information: n/a</t>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an JWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: See <xref target="status-list-token-jwt"/> of this specification</t>
          </li>
          <li>
            <t>Security considerations: See <xref target="Security"/> of this specification</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information: n/a</t>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an CBOR-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+cbor</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: See <xref target="status-list-cbor"/> of this specification</t>
          </li>
          <li>
            <t>Security considerations: See <xref target="Security"/> of this specification</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information: n/a</t>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an CWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: See <xref target="status-list-token-cwt"/> of this specification</t>
          </li>
          <li>
            <t>Security considerations: See <xref target="Security"/> of this specification</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information: n/a</t>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1950">
          <front>
            <title>ZLIB Compressed Data Format Specification version 3.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <author fullname="J-L. Gailly" surname="J-L. Gailly"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1950"/>
          <seriesInfo name="DOI" value="10.17487/RFC1950"/>
        </reference>
        <reference anchor="RFC1951">
          <front>
            <title>DEFLATE Compressed Data Format Specification version 1.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1951"/>
          <seriesInfo name="DOI" value="10.17487/RFC1951"/>
        </reference>
        <reference anchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC6125">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="J. Hodges" initials="J." surname="Hodges"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9596">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) "typ" (type) Header Parameter</title>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <author fullname="O. Steele" initials="O." surname="Steele"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This specification adds the equivalent of the JSON Object Signing and Encryption (JOSE) "typ" (type) header parameter to CBOR Object Signing and Encryption (COSE). This enables the benefits of explicit typing (as defined in RFC 8725, "JSON Web Token Best Current Practices") to be brought to COSE objects. The syntax of the COSE type header parameter value is the same as the existing COSE content type header parameter.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9596"/>
          <seriesInfo name="DOI" value="10.17487/RFC9596"/>
        </reference>
        <reference anchor="IANA.MediaTypes" target="https://www.iana.org/assignments/media-types/media-types.xhtml">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JOSE" target="https://www.iana.org/assignments/jose/jose.xhtml">
          <front>
            <title>JSON Object Signing and Encryption (JOSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JWT" target="https://www.iana.org/assignments/jwt/jwt.xhtml">
          <front>
            <title>JSON Web Token Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.CWT" target="https://www.iana.org/assignments/cwt/cwt.xhtml">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CORS" target="https://fetch.spec.whatwg.org/#http-cors-protocol">
          <front>
            <title>Fetch Living Standard</title>
            <author>
              <organization>WHATWG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7662">
          <front>
            <title>OAuth 2.0 Token Introspection</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This specification defines a method for a protected resource to query an OAuth 2.0 authorization server to determine the active state of an OAuth 2.0 token and to determine meta-information about this token. OAuth 2.0 deployments can use this method to convey information about the authorization context of the token from the authorization server to the protected resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7662"/>
          <seriesInfo name="DOI" value="10.17487/RFC7662"/>
        </reference>
        <reference anchor="RFC7800">
          <front>
            <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7800"/>
          <seriesInfo name="DOI" value="10.17487/RFC7800"/>
        </reference>
        <reference anchor="RFC9458">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9458"/>
          <seriesInfo name="DOI" value="10.17487/RFC9458"/>
        </reference>
        <reference anchor="SD-JWT.VC">
          <front>
            <title>SD-JWT-based Verifiable Credentials (SD-JWT VC)</title>
            <author fullname="Oliver Terbu" initials="O." surname="Terbu">
              <organization>MATTR</organization>
            </author>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete Inc.</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="18" month="September" year="2024"/>
            <abstract>
              <t>   This specification describes data formats as well as validation and
   processing rules to express Verifiable Credentials with JSON payloads
   with and without selective disclosure based on the SD-JWT
   [I-D.ietf-oauth-selective-disclosure-jwt] format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-sd-jwt-vc-05"/>
        </reference>
        <reference anchor="ISO.mdoc">
          <front>
            <title>ISO/IEC 18013-5:2021 ISO-compliant driving licence</title>
            <author>
              <organization>ISO/IEC JTC 1/SC 17</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 1318?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank
Brian Campbell,
Filip Skokan,
Francesco Marino,
Guiseppe De Marco,
Kristina Yasuda,
Markus Kreusch,
Martijn Haring,
Michael B. Jones,
Mike Prorock,
Oliver Terbu,
Orie Steele,
Timo Glastra
and
Torsten Lodderstedt</t>
      <t>for their valuable contributions, discussions and feedback to this specification.</t>
    </section>
    <section numbered="false" anchor="document-history">
      <name>Document History</name>
      <t>-05</t>
      <ul spacing="normal">
        <li>
          <t>add optional support for historical requests</t>
        </li>
        <li>
          <t>update CBOR claim definitions</t>
        </li>
        <li>
          <t>improve section on Status Types and introduce IANA registry for it</t>
        </li>
        <li>
          <t>add Status Issuer and Status Provider role description to the introduction/terminology</t>
        </li>
        <li>
          <t>add information on third party hosting to security consideration</t>
        </li>
        <li>
          <t>remove constraint that Status List Token must not use a MAC</t>
        </li>
      </ul>
      <t>-04</t>
      <ul spacing="normal">
        <li>
          <t>add mDL example as Referenced Token and consolidate CWT and CBOR sections</t>
        </li>
        <li>
          <t>add implementation consideration for Default Values, Double Allocation and Status List Size</t>
        </li>
        <li>
          <t>add privacy consideration on using private relay protocols</t>
        </li>
        <li>
          <t>add privacy consideration on observability of outsiders</t>
        </li>
        <li>
          <t>add security considerations on correct parsing and decoding</t>
        </li>
        <li>
          <t>remove requirement for matching iss claim in Referenced Token and Status List Token</t>
        </li>
        <li>
          <t>add sd-jwt-vc example</t>
        </li>
        <li>
          <t>fix CWT status_list map encoding</t>
        </li>
        <li>
          <t>editorial fixes</t>
        </li>
        <li>
          <t>add CORS considerations to the http endpoint</t>
        </li>
        <li>
          <t>fix reference of Status List in CBOR format</t>
        </li>
        <li>
          <t>added status_list CWT claim key assigned</t>
        </li>
        <li>
          <t>move base64url definition to terminology</t>
        </li>
      </ul>
      <t>-03</t>
      <ul spacing="normal">
        <li>
          <t>remove unused reference to RFC9111</t>
        </li>
        <li>
          <t>add validation rules for status list token</t>
        </li>
        <li>
          <t>introduce the status list aggregation mechanism</t>
        </li>
        <li>
          <t>relax requirements for status_list claims to contain other parameters</t>
        </li>
        <li>
          <t>change cwt referenced token example to hex and annotated hex</t>
        </li>
        <li>
          <t>require TLS only for fetching Status List, not for Status List Token</t>
        </li>
        <li>
          <t>remove the undefined phrase Status List endpoint</t>
        </li>
        <li>
          <t>remove http caching in favor of the new ttl claim</t>
        </li>
        <li>
          <t>clarify the sub claim of Status List Token</t>
        </li>
        <li>
          <t>relax status_list iss requirements for CWT</t>
        </li>
        <li>
          <t>Fixes missing parts &amp; iana ttl registration in CWT examples</t>
        </li>
      </ul>
      <t>-02</t>
      <ul spacing="normal">
        <li>
          <t>add ttl claim to Status List Token to convey caching</t>
        </li>
        <li>
          <t>relax requirements on referenced token</t>
        </li>
        <li>
          <t>clarify Deflate / zlib compression</t>
        </li>
        <li>
          <t>make a reference to the Issuer-Holder-Verifier model of SD-JWT VC</t>
        </li>
        <li>
          <t>add COSE/CWT/CBOR encoding</t>
        </li>
      </ul>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Rename title of the draft</t>
        </li>
        <li>
          <t>add design consideration to the introduction</t>
        </li>
        <li>
          <t>Change status claim to in referenced token to allow re-use for other mechanisms</t>
        </li>
        <li>
          <t>Add IANA Registry for status mechanisms</t>
        </li>
        <li>
          <t>restructure the sections of this document</t>
        </li>
        <li>
          <t>add option to return an unsigned Status List</t>
        </li>
        <li>
          <t>Changing compression from gzip to zlib</t>
        </li>
        <li>
          <t>Change typo in Status List Token sub claim description</t>
        </li>
        <li>
          <t>Add access token as an example use-case</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft after working group adoption</t>
        </li>
        <li>
          <t>update acknowledgments</t>
        </li>
        <li>
          <t>renamed Verifier to Relying Party</t>
        </li>
        <li>
          <t>added IANA consideration</t>
        </li>
      </ul>
      <t>[ draft-ietf-oauth-status-list ]</t>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Applied editorial improvements suggested by Michael Jones.</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
