<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-oauth-status-list-08" category="std" consensus="true" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title>Token Status List</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-status-list-08"/>
    <author fullname="Tobias Looker">
      <organization>MATTR</organization>
      <address>
        <email>tobias.looker@mattr.global</email>
      </address>
    </author>
    <author fullname="Paul Bastian">
      <organization/>
      <address>
        <email>paul.bastian@posteo.de</email>
      </address>
    </author>
    <author fullname="Christian Bormann">
      <organization>SPRIND</organization>
      <address>
        <email>chris.bormann@gmx.de</email>
      </address>
    </author>
    <date year="2025" month="February" day="20"/>
    <area>Security</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <abstract>
      <?line 119?>

<t>This specification defines a mechanism, data structures and processing rules for representing the status of tokens secured by JSON Object Signing and Encryption (JOSE) or CBOR Object Signing and Encryption (COSE), such as JWT, SD-JWT VC, CBOR Web Token and ISO mdoc. It also defines an extension point and a registry for future status mechanisms.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://oauth-wg.github.io/draft-ietf-oauth-status-list/draft-ietf-oauth-status-list.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Web Authorization Protocol Working Group mailing list (<eref target="mailto:oauth@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/oauth/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/oauth/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/oauth-wg/draft-ietf-oauth-status-list"/>.</t>
    </note>
  </front>
  <middle>
    <?line 123?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Token formats secured by JOSE <xref target="IANA.JOSE"/> or COSE <xref target="RFC9052"/>, such as JWTs <xref target="RFC7519"/>, SD-JWT VCs <xref target="SD-JWT.VC"/>, CWTs <xref target="RFC8392"/> and ISO mdoc <xref target="ISO.mdoc"/>, have vast possible applications. Some of these applications can involve issuing a token whereby certain semantics about the token or its validity may change over time. Communicating these changes to relying parties in an interoperable manner, such as whether the token is considered invalidated or suspended by its issuer is important for many of these applications.</t>
      <t>This document defines a Status List data structure that describes the individual statuses of multiple Referenced Tokens. A Referenced Token may be of any format, but is most commonly a data structures secured by JOSE or COSE. The Referenced Token is referenced by the Status List, which describes the status of the Referenced Token. The statuses of all Referenced Tokens are conveyed via a bit array in the Status List. Each Referenced Token is allocated an index during issuance that represents its position within this bit array. The value of the bit(s) at this index corresponds to the Referenced Token's status. A Status List is provided within a Status List Token protected by cryptographic signature or MAC and this document defines its representations in JWT and CWT format.</t>
      <t>The following diagram depicts the relationship between the artifacts:</t>
      <artwork type="ascii-art"><![CDATA[
┌────────────────┐  describes status ┌──────────────────┐
│  Status List   ├──────────────────►│ Referenced Token │
│ (JSON or CBOR) │◄──────────────────┤ (JOSE, COSE, ..) │
└─────┬──────────┘    references     └──────────────────┘
      │
      │ embedded in
      ▼
┌───────────────────┐
│ Status List Token │
│  (JWT or CWT)     │
└───────────────────┘

]]></artwork>
      <t>An Issuer issues Referenced Tokens to a Holder, the Holder uses and presents those Referenced Tokens to a Relying Party. The Issuer gives updated status information to the Status Issuer, who issues a Status List Token. The Status Issuer can be either the Issuer or an entity that has been authorized by the Issuer to issue Status List Tokens. The Status Issuer provides the Status List Token to the Status Provider, who serves the Status List Token on a public, resolvable endpoint. The Relying Party or the Holder may fetch the Status List Token to retrieve the status of the Referenced Token.</t>
      <t>The roles of the Issuer (of the Referenced Token), the Status Issuer and the Status Provider may be fulfilled by the same entity. If not further specified, the term Issuer may refer to an entity acting for all three roles. This document describes how an Issuer references a Status List Token and how a Relying Party fetches and validates Status Lists.</t>
      <t>The following diagram depicts the relationship between the involved roles (Relying Party is equivalent to Verifier of <xref target="SD-JWT.VC"/>):</t>
      <artwork type="ascii-art"><![CDATA[
           issue                 present
           Referenced            Referenced
┌────────┐ Token      ┌────────┐ Token      ┌───────────────┐
│ Issuer ├───────────►│ Holder ├───────────►│ Relying Party │
└─┬──────┘            └───┬────┘            └──┬────────────┘
  ▼ update status         │                    │
┌───────────────┐         │                    │
│ Status Issuer │         │                    │
└─┬─────────────┘         │                    │
  ▼ provide Status List   │                    │
┌─────────────────┐       │                    │
│ Status Provider │◄──────┴────────────────────┘
└─────────────────┘     fetch Status List Token

]]></artwork>
      <t>Status Lists may be composed to express a range of Status Types. This document defines basic Status Types for the most common use cases as well as an extensibility mechanism for custom Status Types.</t>
      <t>Furthermore, the document defines an extension point that enables other specifications to describe additional status mechanisms and creates an IANA registry.</t>
      <section anchor="example-use-cases">
        <name>Example Use Cases</name>
        <t>An example of the usage of a Status List is to manage the status of issued access tokens as defined in section 1.4 of <xref target="RFC6749"/>. Token Introspection <xref target="RFC7662"/> defines another way to determine the status of an issued access token, but it requires the party trying to validate the state of access tokens to directly contact the token issuer, whereas the mechanism defined in this specification does not have this limitation.</t>
        <t>Another possible use case for the Status List is to express the status of verifiable credentials (Referenced Tokens) issued by an Issuer in the Issuer-Holder-Verifier model <xref target="SD-JWT.VC"/>.</t>
      </section>
      <section anchor="rationale">
        <name>Rationale</name>
        <t>Revocation mechanisms are an essential part of most identity ecosystems. In the past, revocation of X.509 TLS certificates has been proven difficult. Traditional certificate revocation lists (CRLs) have limited scalability; Online Certificate Status Protocol (OCSP) has additional privacy risks, since the client is leaking the requested website to a third party. OCSP stapling is addressing some of these problems at the cost of less up-to-date data. Modern approaches use accumulator-based revocation registries and Zero-Knowledge-Proofs to accommodate for this privacy gap, but face scalability issues again. Another alternative is short-lived Referenced Tokens with regular re-issuance, but this puts additional burden on the Issuer's infrastructure.</t>
        <t>This specification seeks to find a balance between scalability, security and privacy by minimizing the status information to mere bits (often a single bit) and compressing the resulting binary data. Thereby, a Status List may contain statuses of many thousands or millions Referenced Tokens while remaining as small as possible. Placing large amounts of Referenced Tokens into the same list also enables herd privacy relative to the Status Provider.</t>
      </section>
      <section anchor="design-considerations">
        <name>Design Considerations</name>
        <t>The decisions taken in this specification aim to achieve the following design goals:</t>
        <ul spacing="normal">
          <li>
            <t>the specification shall favor a simple and easy-to-understand concept</t>
          </li>
          <li>
            <t>the specification shall be easy, fast and secure to implement in all major programming languages</t>
          </li>
          <li>
            <t>the specification shall be optimized to support the most common use cases and avoid unnecessary complexity of corner cases</t>
          </li>
          <li>
            <t>the Status List shall scale up to millions of tokens to support large-scale government or enterprise use cases</t>
          </li>
          <li>
            <t>the Status List shall enable caching policies and offline support</t>
          </li>
          <li>
            <t>the specification shall support JSON and CBOR based tokens</t>
          </li>
          <li>
            <t>the specification shall not specify key resolution or trust frameworks</t>
          </li>
          <li>
            <t>the specification shall define an extension point that enables other mechanisms to convey information about the status of a Referenced Token</t>
          </li>
        </ul>
      </section>
      <section anchor="prior-work">
        <name>Prior Work</name>
        <t>Representing a status with bits in array is a rather old and well-known concept in computer science and there has been prior work to use this for revocation and status management such as a paper by Smith et al. <xref target="smith2020let"/> that proposed a mechanism called Certificate Revocation Vectors based on xz compressed bit vectors for each expiration day and the W3C bit Status List <xref target="W3C.SL"/> that similarly uses a compressed bit representation.</t>
      </section>
      <section anchor="status-mechanisms-registry">
        <name>Status Mechanisms Registry</name>
        <t>This specification establishes the IANA "Status Mechanisms" registry for status mechanisms and registers the members defined by this specification. Other specifications can register other members used for status retrieval.</t>
        <t>Other status mechanisms may have different tradeoffs regarding security, privacy, scalability and complexity. The privacy and security considerations in this document only represent the properties of the Status List mechanism.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>Issuer:</dt>
        <dd>
          <t>An entity that issues the Referenced Token.</t>
        </dd>
        <dt>Status Issuer:</dt>
        <dd>
          <t>An entity that issues the Status List Token about the status information of the Referenced Token. This role may be fulfilled by the Issuer.</t>
        </dd>
        <dt>Status Provider:</dt>
        <dd>
          <t>An entity that provides the Status List Token on a public endpoint. This role may be fulfilled by the Status Issuer.</t>
        </dd>
        <dt>Holder:</dt>
        <dd>
          <t>An entity that receives Referenced Tokens from the Issuer and presents them to Relying Parties.</t>
        </dd>
        <dt>Relying Party:</dt>
        <dd>
          <t>An entity that relies on the Referenced Token and fetches the corresponding Status List Token to validate the status of that Referenced Token. Also known as Verifier.</t>
        </dd>
        <dt>Status List:</dt>
        <dd>
          <t>An object in JSON or CBOR representation containing a bit array that lists the statuses of many Referenced Tokens.</t>
        </dd>
        <dt>Status List Token:</dt>
        <dd>
          <t>A token in JWT (as defined in <xref target="RFC7519"/>) or CWT (as defined in <xref target="RFC8392"/>) representation that contains a cryptographically secured Status List.</t>
        </dd>
        <dt>Referenced Token:</dt>
        <dd>
          <t>A cryptographically secured data structure that contains a "status" claim that is referencing a mechanism to retrieve status information about this Referenced Token. This document defines the Status List mechanism in which case the Referenced Token contains a reference to an entry in a Status List Token. It is <bcp14>RECOMMENDED</bcp14> to use JSON <xref target="RFC8259"/> with JOSE as defined in <xref target="RFC7515"/> or CBOR <xref target="RFC8949"/> with COSE as defined in <xref target="RFC9052"/>. Examples for Referenced Tokens are SD-JWT VC and ISO mdoc.</t>
        </dd>
        <dt>base64url:</dt>
        <dd>
          <t>Denotes the URL-safe base64 encoding without padding as defined in Section 2 of <xref target="RFC7515"/> as "Base64url Encoding".</t>
        </dd>
      </dl>
    </section>
    <section anchor="status-list">
      <name>Status List</name>
      <t>A Status List is a byte array that contains the statuses of many Referenced Tokens represented by one or multiple bits. A common representation of a Status List is composed by the following algorithm:</t>
      <ol spacing="normal" type="1"><li>
          <t>Each status of a Referenced Token <bcp14>MUST</bcp14> be represented with a bit-size of 1,2,4 or 8. Therefore up to 2,4,16 or 256 statuses for a Referenced Token are possible, depending on the bit-size. This limitation is intended to limit bit manipulation necessary to a single byte for every operation and thus keeping implementations simpler and less error-prone.</t>
        </li>
        <li>
          <t>The overall Status List is encoded as a byte array. Depending on the bit-size, each byte corresponds to 8/(#bit-size) statuses (8,4,2 or 1). The status of each Referenced Token is identified using the index that maps to one or more specific bits within the byte array. The index starts counting at 0 and ends with "size" - 1 (being the last valid entry). The bits within an array are counted from the least significant bit "0" to the most significant bit ("7"). All bits of the byte array at a particular index are set to a status value.</t>
        </li>
        <li>
          <t>The byte array is compressed using DEFLATE <xref target="RFC1951"/> with the ZLIB <xref target="RFC1950"/> data format. Implementations are <bcp14>RECOMMENDED</bcp14> to use the highest compression level available.</t>
        </li>
      </ol>
      <t>The following example illustrates a Status List that represents the statuses of 16 Referenced Tokens, requiring 16 bits (2 bytes) for the uncompressed byte array (1 bit status):</t>
      <artwork type="ascii-art"><![CDATA[
status[0] = 1
status[1] = 0
status[2] = 0
status[3] = 1
status[4] = 1
status[5] = 1
status[6] = 0
status[7] = 1
status[8] = 1
status[9] = 1
status[10] = 0
status[11] = 0
status[12] = 0
status[13] = 1
status[14] = 0
status[15] = 1
]]></artwork>
      <t>These bits are concatenated:</t>
      <artwork type="ascii-art"><![CDATA[
byte             0                  1               2
bit       7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0    7
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+...
values   |1|0|1|1|1|0|0|1|  |1|0|1|0|0|0|1|1|  |0|...
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+...
index     7 6 5 4 3 2 1 0   15   ...  10 9 8   23
         \_______________/  \_______________/
                0xB9               0xA3

]]></artwork>
      <t>In this example, the Status List additionally includes the Status Type "SUSPENDED". As the Status Type value for "SUSPENDED" is 0x02 and does not fit into 1 bit, the "bits" is required to be 2.</t>
      <t>This example Status List represents the status of 12 Referenced Tokens, requiring 24 bits (3 bytes) of status (2 bit status):</t>
      <artwork type="ascii-art"><![CDATA[
status[0] = 1
status[1] = 2
status[2] = 0
status[3] = 3
status[4] = 0
status[5] = 1
status[6] = 0
status[7] = 1
status[8] = 1
status[9] = 2
status[10] = 3
status[11] = 3
]]></artwork>
      <t>These bits are concatenated:</t>
      <artwork type="ascii-art"><![CDATA[
byte             0                  1                  2
bit       7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
values   |1|1|0|0|1|0|0|1|  |0|1|0|0|0|1|0|0|  |1|1|1|1|1|0|0|1|
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
          \ / \ / \ / \ /    \ / \ / \ / \ /    \ / \ / \ / \ /
status     3   0   2   1      1   0   1   0      3   3   2   1
index      3   2   1   0      7   6   5   4      11  10  9   8
           \___________/      \___________/      \___________/
                0xC9               0x44               0xF9

]]></artwork>
      <section anchor="status-list-json">
        <name>Status List in JSON Format</name>
        <t>This section defines the data structure for a JSON-encoded Status List:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14>. JSON Object that contains a Status List. It <bcp14>MUST</bcp14> contain at least the following claims:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>bits</tt>: <bcp14>REQUIRED</bcp14>. JSON Integer specifying the number of bits per Referenced Token in the Status List (<tt>lst</tt>). The allowed values for <tt>bits</tt> are 1,2,4 and 8.</t>
              </li>
              <li>
                <t><tt>lst</tt>: <bcp14>REQUIRED</bcp14>. JSON String that contains the status values for all the Referenced Tokens it conveys statuses for. The value <bcp14>MUST</bcp14> be the base64url-encoded Status List as specified in <xref target="status-list"/>.</t>
              </li>
              <li>
                <t><tt>aggregation_uri</tt>: <bcp14>OPTIONAL</bcp14>. JSON String that contains a URI to retrieve the Status List Aggregation for this type of Referenced Token or Issuer. See section <xref target="aggregation"/> for further details.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following example illustrates the JSON representation of the Status List with bit-size 1 from the example above:</t>
        <artwork><![CDATA[
byte_array = [0xb9, 0xa3] 
encoded:
{
  "bits": 1,
  "lst": "eNrbuRgAAhcBXQ"
}
]]></artwork>
        <t>The following example illustrates the JSON representation of the Status List with bit-size 2 from the example above:</t>
        <artwork><![CDATA[
byte_array = [0xc9, 0x44, 0xf9] 
encoded:
{
  "bits": 2,
  "lst": "eNo76fITAAPfAgc"
}
]]></artwork>
        <t>See section <xref target="test-vectors"/> for more test vectors.</t>
      </section>
      <section anchor="status-list-cbor">
        <name>Status List in CBOR Format</name>
        <t>This section defines the data structure for a CBOR-encoded Status List:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>StatusList</tt> structure is a map (Major Type 5) and defines the following entries:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>bits</tt>: <bcp14>REQUIRED</bcp14>. Unsigned integer (Major Type 0) that contains the number of bits per Referenced Token in the Status List. The allowed values for <tt>bits</tt> are 1, 2, 4 and 8.</t>
              </li>
              <li>
                <t><tt>lst</tt>: <bcp14>REQUIRED</bcp14>. Byte string (Major Type 2) that contains the Status List as specified in <xref target="status-list"/>.</t>
              </li>
              <li>
                <t><tt>aggregation_uri</tt>: <bcp14>OPTIONAL</bcp14>. Text string (Major Type 3) that contains a URI to retrieve the Status List Aggregation for this type of Referenced Token. See section <xref target="aggregation"/> for further detail.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following example illustrates the CBOR representation of the Status List in Hex:</t>
        <artwork><![CDATA[
byte_array = [0xb9, 0xa3] 
encoded:
a2646269747301636c73744a78dadbb918000217015d
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
a2                              # map(2)
  64                            #   string(4)
    62697473                    #     "bits"
  01                            #   uint(1)
  63                            #   string(3)
    6c7374                      #     "lst"
  4a                            #   bytes(10)
    78dadbb918000217015d        #     "xÚÛ¹\x18\x00\x02\x17\x01]"
]]></artwork>
        <t>See section <xref target="test-vectors"/> for more test vectors.</t>
      </section>
    </section>
    <section anchor="status-list-token">
      <name>Status List Token</name>
      <t>A Status List Token embeds the Status List into a token that is cryptographically signed and protects the integrity of the Status List. This allows for the Status List Token to be hosted by third parties or be transferred for offline use cases.</t>
      <t>This section specifies Status List Tokens in JSON Web Token (JWT) and CBOR Web Token (CWT) format.</t>
      <section anchor="status-list-token-jwt">
        <name>Status List Token in JWT Format</name>
        <t>The Status List Token <bcp14>MUST</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/>.</t>
        <t>The following content applies to the JWT Header:</t>
        <ul spacing="normal">
          <li>
            <t><tt>typ</tt>: <bcp14>REQUIRED</bcp14>. The JWT type <bcp14>MUST</bcp14> be <tt>statuslist+jwt</tt>.</t>
          </li>
        </ul>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>sub</tt>: <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC7519"/>. The <tt>sub</tt> (subject) claim <bcp14>MUST</bcp14> specify the URI of the Status List Token. The value <bcp14>MUST</bcp14> be equal to that of the <tt>uri</tt> claim contained in the <tt>status_list</tt> claim of the Referenced Token.</t>
          </li>
          <li>
            <t><tt>iat</tt>: <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC7519"/>. The <tt>iat</tt> (issued at) claim <bcp14>MUST</bcp14> specify the time at which the Status List Token was issued.</t>
          </li>
          <li>
            <t><tt>exp</tt>: <bcp14>OPTIONAL</bcp14>. As generally defined in <xref target="RFC7519"/>. The <tt>exp</tt> (expiration time) claim, if present, <bcp14>MUST</bcp14> specify the time at which the Status List Token is considered expired by the Status Issuer.</t>
          </li>
          <li>
            <t><tt>ttl</tt>: <bcp14>OPTIONAL</bcp14>. The <tt>ttl</tt> (time to live) claim, if present, <bcp14>MUST</bcp14> specify the maximum amount of time, in seconds, that the Status List Token can be cached by a consumer before a fresh copy <bcp14>SHOULD</bcp14> be retrieved. The value of the claim <bcp14>MUST</bcp14> be a positive number encoded in JSON as a number.</t>
          </li>
          <li>
            <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status_list</tt> (status list) claim <bcp14>MUST</bcp14> specify the Status List conforming to the rules outlined in <xref target="status-list-json"/>.</t>
          </li>
        </ul>
        <t>The following additional rules apply:</t>
        <ol spacing="normal" type="1"><li>
            <t>The JWT <bcp14>MAY</bcp14> contain other claims.</t>
          </li>
          <li>
            <t>The JWT <bcp14>MUST</bcp14> be secured using a cryptographic signature or MAC algorithm. Relying Parties <bcp14>MUST</bcp14> reject JWTs with an invalid signature.</t>
          </li>
          <li>
            <t>Relying Parties <bcp14>MUST</bcp14> reject JWTs that are not valid in all other respects per "JSON Web Token (JWT)" <xref target="RFC7519"/>.</t>
          </li>
          <li>
            <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
          </li>
        </ol>
        <t>The following is a non-normative example of a Status List Token in JWT format:</t>
        <artwork><![CDATA[
{
  "alg": "ES256",
  "kid": "12",
  "typ": "statuslist+jwt"
}
.
{
  "exp": 2291720170,
  "iat": 1686920170,
  "status_list": {
    "bits": 1,
    "lst": "eNrbuRgAAhcBXQ"
  },
  "sub": "https://example.com/statuslists/1",
  "ttl": 43200
}
]]></artwork>
      </section>
      <section anchor="status-list-token-cwt">
        <name>Status List Token in CWT Format</name>
        <t>The Status List Token <bcp14>MUST</bcp14> be encoded as a "CBOR Web Token (CWT)" according to <xref target="RFC8392"/>.</t>
        <t>The following content applies to the protected header of the CWT:</t>
        <ul spacing="normal">
          <li>
            <t><tt>16</tt> (type): <bcp14>REQUIRED</bcp14>. The type of the CWT <bcp14>MUST</bcp14> be <tt>application/statuslist+cwt</tt> as defined in <xref target="RFC9596"/>.</t>
          </li>
        </ul>
        <t>The following content applies to the CWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>2</tt> (subject): <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC8392"/>. The subject claim <bcp14>MUST</bcp14> specify the URI of the Status List Token. The value <bcp14>MUST</bcp14> be equal to that of the <tt>uri</tt> claim contained in the <tt>status_list</tt> claim of the Referenced Token.</t>
          </li>
          <li>
            <t><tt>6</tt> (issued at): <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC8392"/>. The issued at claim <bcp14>MUST</bcp14> specify the time at which the Status List Token was issued.</t>
          </li>
          <li>
            <t><tt>4</tt> (expiration time): <bcp14>OPTIONAL</bcp14>. As generally defined in <xref target="RFC8392"/>. The expiration time claim, if present, <bcp14>MUST</bcp14> specify the time at which the Status List Token is considered expired by its issuer.</t>
          </li>
          <li>
            <t><tt>65534</tt> (time to live): <bcp14>OPTIONAL</bcp14>. Unsigned integer (Major Type 0). The time to live claim, if present, <bcp14>MUST</bcp14> specify the maximum amount of time, in seconds, that the Status List Token can be cached by a consumer before a fresh copy <bcp14>SHOULD</bcp14> be retrieved. The value of the claim <bcp14>MUST</bcp14> be a positive number.</t>
          </li>
          <li>
            <t><tt>65533</tt> (status list): <bcp14>REQUIRED</bcp14>. The status list claim <bcp14>MUST</bcp14> specify the Status List conforming to the rules outlined in <xref target="status-list-cbor"/>.</t>
          </li>
        </ul>
        <t>The following additional rules apply:</t>
        <ol spacing="normal" type="1"><li>
            <t>The CWT <bcp14>MAY</bcp14> contain other claims.</t>
          </li>
          <li>
            <t>The CWT <bcp14>MUST</bcp14> be secured using a cryptographic signature or MAC algorithm. Relying Parties <bcp14>MUST</bcp14> reject CWTs with an invalid signature.</t>
          </li>
          <li>
            <t>Relying Parties <bcp14>MUST</bcp14> reject CWTs that are not valid in all other respects per "CBOR Web Token (CWT)" <xref target="RFC8392"/>.</t>
          </li>
          <li>
            <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
          </li>
        </ol>
        <t>The following is a non-normative example of a Status List Token in CWT format in Hex:</t>
        <artwork><![CDATA[
d2845820a2012610781a6170706c69636174696f6e2f7374617475736c6973742b63
7774a1044231325850a502782168747470733a2f2f6578616d706c652e636f6d2f73
74617475736c697374732f31061a648c5bea041a8898dfea19fffe19a8c019fffda2
646269747301636c73744a78dadbb918000217015d5840251d844ecc6541b8b2fd24
e681836c1a072cad61716fb174d57b162b4b392c1ea08b875a493ca8d1cf4328eee1
b14f33aa899e532844778ba2fff80b5c1e56e5
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
d2                              # tag(18)
  84                            #   array(4)
    58 20                       #     bytes(32)
      a2012610781a6170706c6963  #       "¢\x01&\x10x\x1aapplic"
      6174696f6e2f737461747573  #       "ation/status"
      6c6973742b637774          #       "list+cwt"
    a1                          #     map(1)
      04                        #       uint(4)
      42                        #       bytes(2)
        3132                    #         "12"
    58 50                       #     bytes(80)
      a502782168747470733a2f2f  #       "¥\x02x!https://"
      6578616d706c652e636f6d2f  #       "example.com/"
      7374617475736c697374732f  #       "statuslists/"
      31061a648c5bea041a8898df  #       "1\x06\x1ad\x8c[ê\x04\x1a\x88\x98ß"
      ea19fffe19a8c019fffda264  #       "ê\x19ÿþ\x19¨À\x19ÿý¢d"
      6269747301636c73744a78da  #       "bits\x01clstJxÚ"
      dbb918000217015d          #       "Û¹\x18\x00\x02\x17\x01]"
    58 40                       #     bytes(64)
      251d844ecc6541b8b2fd24e6  #       "%\x1d\x84NÌeA¸²ý$æ"
      81836c1a072cad61716fb174  #       "\x81\x83l\x1a\x07,\xadaqo±t"
      d57b162b4b392c1ea08b875a  #       "Õ{\x16+K9,\x1e\xa0\x8b\x87Z"
      493ca8d1cf4328eee1b14f33  #       "I<¨ÑÏC(îá±O3"
      aa899e532844778ba2fff80b  #       "ª\x89\x9eS(Dw\x8b¢ÿø\x0b"
      5c1e56e5                  #       "\\x1eVå"
]]></artwork>
      </section>
    </section>
    <section anchor="referenced-token">
      <name>Referenced Token</name>
      <section anchor="status-claim">
        <name>Status Claim</name>
        <t>By including a "status" claim in a Referenced Token, the Issuer is referencing a mechanism to retrieve status information about this Referenced Token. The claim contains members used to reference to a Status List Token as defined in this specification. Other members of the "status" object may be defined by other specifications. This is analogous to "cnf" claim in Section 3.1 of <xref target="RFC7800"/> in which different authenticity confirmation methods can be included.</t>
      </section>
      <section anchor="referenced-token-jose">
        <name>Referenced Token in JOSE</name>
        <t>The Referenced Token <bcp14>MAY</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/> or other formats based on JOSE.</t>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status</tt> (status) claim <bcp14>MUST</bcp14> specify a JSON Object that contains at least one reference to a status mechanism.
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14> when the status mechanism defined in this specification is used. It contains a reference to a Status List Token. It <bcp14>MUST</bcp14> at least contain the following claims:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>idx</tt>: <bcp14>REQUIRED</bcp14>. The <tt>idx</tt> (index) claim <bcp14>MUST</bcp14> specify an Integer that represents the index to check for status information in the Status List for the current Referenced Token. The value of <tt>idx</tt> <bcp14>MUST</bcp14> be a non-negative number, containing a value of zero or greater.</t>
                  </li>
                  <li>
                    <t><tt>uri</tt>: <bcp14>REQUIRED</bcp14>. The <tt>uri</tt> (URI) claim <bcp14>MUST</bcp14> specify a String value that identifies the Status List Token containing the status information for the Referenced Token. The value of <tt>uri</tt> <bcp14>MUST</bcp14> be a URI conforming to <xref target="RFC3986"/>.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
        <t>The following is a non-normative example of a decoded header and payload of a Referenced Token:</t>
        <artwork type="ascii-art"><![CDATA[
{
  "alg": "ES256",
  "kid": "11"
}
.
{
  "status": {
    "status_list": {
      "idx": 0,
      "uri": "https://example.com/statuslists/1"
    }
  }
}
]]></artwork>
        <t>SD-JWT-based Verifiable Credentials <xref target="SD-JWT.VC"/> introduce the usage of a status mechanism in Section 3.2.2.2. The "status" object uses the same encoding as a JWT as defined in <xref target="referenced-token-jose"/>.</t>
        <t>The following is a non-normative example of a Referenced Token in SD-JWT-VC serialized form as received from an Issuer:</t>
        <artwork type="ascii-art"><![CDATA[
eyJhbGciOiAiRVMyNTYiLCAidHlwIjogImV4YW1wbGUrc2Qtand0In0.eyJfc2QiOiBb
Ikh2cktYNmZQVjB2OUtfeUNWRkJpTEZIc01heGNEXzExNEVtNlZUOHgxbGciXSwgImlz
cyI6ICJodHRwczovL2V4YW1wbGUuY29tL2lzc3VlciIsICJpYXQiOiAxNjgzMDAwMDAw
LCAiZXhwIjogMTg4MzAwMDAwMCwgInN1YiI6ICI2YzVjMGE0OS1iNTg5LTQzMWQtYmFl
Ny0yMTkxMjJhOWVjMmMiLCAic3RhdHVzIjogeyJzdGF0dXNfbGlzdCI6IHsiaWR4Ijog
MCwgInVyaSI6ICJodHRwczovL2V4YW1wbGUuY29tL3N0YXR1c2xpc3RzLzEifX0sICJf
c2RfYWxnIjogInNoYS0yNTYifQ.-kgS-R-Z4DEDlqb8kb6381_gHHNatsoF1fcVKZk3M
06CrnV8F8k9d2w2V_YAOvgcb0f11FqDFezXBXH30d4vcw~WyIyR0xDNDJzS1F2ZUNmR2
ZyeU5STjl3IiwgInN0cmVldF9hZGRyZXNzIiwgIlNjaHVsc3RyLiAxMiJd~WyJlbHVWN
U9nM2dTTklJOEVZbnN4QV9BIiwgImxvY2FsaXR5IiwgIlNjaHVscGZvcnRhIl0~WyI2S
Wo3dE0tYTVpVlBHYm9TNXRtdlZBIiwgInJlZ2lvbiIsICJTYWNoc2VuLUFuaGFsdCJd~
WyJlSThaV205UW5LUHBOUGVOZW5IZGhRIiwgImNvdW50cnkiLCAiREUiXQ~WyJRZ19PN
jR6cUF4ZTQxMmExMDhpcm9BIiwgImFkZHJlc3MiLCB7Il9zZCI6IFsiNnZoOWJxLXpTN
EdLTV83R3BnZ1ZiWXp6dTZvT0dYcm1OVkdQSFA3NVVkMCIsICI5Z2pWdVh0ZEZST0NnU
nJ0TmNHVVhtRjY1cmRlemlfNkVyX2o3NmttWXlNIiwgIktVUkRQaDRaQzE5LTN0aXotR
GYzOVY4ZWlkeTFvVjNhM0gxRGEyTjBnODgiLCAiV045cjlkQ0JKOEhUQ3NTMmpLQVN4V
GpFeVc1bTV4NjVfWl8ycm8yamZYTSJdfV0~
]]></artwork>
        <t>The resulting payload of the example above:</t>
        <artwork type="ascii-art"><![CDATA[
{
  "_sd": [
    "HvrKX6fPV0v9K_yCVFBiLFHsMaxcD_114Em6VT8x1lg"
  ],
  "iss": "https://example.com/issuer",
  "iat": 1683000000,
  "exp": 1883000000,
  "sub": "6c5c0a49-b589-431d-bae7-219122a9ec2c",
  "status": {
    "status_list": {
      "idx": 0,
      "uri": "https://example.com/statuslists/1"
    }
  },
  "_sd_alg": "sha-256"
}
]]></artwork>
      </section>
      <section anchor="referenced-token-cose">
        <name>Referenced Token in COSE</name>
        <t>The Referenced Token <bcp14>MAY</bcp14> be encoded as a "COSE Web Token (CWT)" object according to <xref target="RFC8392"/> or other formats based on COSE.</t>
        <t>The following content applies to the CWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>65535</tt> (status): <bcp14>REQUIRED</bcp14>. The status claim is encoded as a <tt>Status</tt> CBOR structure and <bcp14>MUST</bcp14> include at least one data item that refers to a status mechanism. Each data item in the <tt>Status</tt> CBOR structure comprises a key-value pair, where the key must be a CBOR text string (Major Type 3) specifying the identifier of the status mechanism and the corresponding value defines its contents. This specification defines the following data items:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>status_list</tt> (status list): <bcp14>REQUIRED</bcp14> when the status mechanism defined in this specification is used. It has the same definition as the <tt>status_list</tt> claim in <xref target="referenced-token-jose"/> but <bcp14>MUST</bcp14> be encoded as a <tt>StatusListInfo</tt> CBOR structure with the following fields:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>idx</tt>: <bcp14>REQUIRED</bcp14>. Unsigned integer (Major Type 0) The <tt>idx</tt> (index) claim <bcp14>MUST</bcp14> specify an Integer that represents the index to check for status information in the Status List for the current Referenced Token. The value of <tt>idx</tt> <bcp14>MUST</bcp14> be a non-negative number, containing a value of zero or greater.</t>
                  </li>
                  <li>
                    <t><tt>uri</tt>: <bcp14>REQUIRED</bcp14>. Text string (Major Type 3). The <tt>uri</tt> (URI) claim <bcp14>MUST</bcp14> specify a String value that identifies the Status List Token containing the status information for the Referenced Token. The value of <tt>uri</tt> <bcp14>MUST</bcp14> be a URI conforming to <xref target="RFC3986"/>.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
        <t>The following is a non-normative example of a Referenced Token in CWT format in Hex:</t>
        <artwork><![CDATA[
d28443a10126a1044231325866a502653132333435017368747470733a2f2f657861
6d706c652e636f6d061a648c5bea041a8898dfea19ffffa16b7374617475735f6c69
7374a2636964780063757269782168747470733a2f2f6578616d706c652e636f6d2f
7374617475736c697374732f315840008bb658123ef808c6aa79451c9c8f61531a4d
9988bd30c54aca014133eb351afc4514a06c270044caf55fd2d2f5d342a18db00c18
54d07b57f8a830d8902a8d
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
d2                              # tag(18)
  84                            #   array(4)
    43                          #     bytes(3)
      a10126                    #       "¡\x01&"
    a1                          #     map(1)
      04                        #       uint(4)
      42                        #       bytes(2)
        3132                    #         "12"
    58 66                       #     bytes(102)
      a50265313233343501736874  #       "¥\x02e12345\x01sht"
      7470733a2f2f6578616d706c  #       "tps://exampl"
      652e636f6d061a648c5bea04  #       "e.com\x06\x1ad\x8c[ê\x04"
      1a8898dfea19ffffa16b7374  #       "\x1a\x88\x98ßê\x19ÿÿ¡kst"
      617475735f6c697374a26369  #       "atus_list¢ci"
      647800637572697821687474  #       "dx\x00curix!htt"
      70733a2f2f6578616d706c65  #       "ps://example"
      2e636f6d2f7374617475736c  #       ".com/statusl"
      697374732f31              #       "ists/1"
    58 40                       #     bytes(64)
      008bb658123ef808c6aa7945  #       "\x00\x8b¶X\x12>ø\x08ÆªyE"
      1c9c8f61531a4d9988bd30c5  #       "\x1c\x9c\x8faS\x1aM\x99\x88½0Å"
      4aca014133eb351afc4514a0  #       "JÊ\x01A3ë5\x1aüE\x14\xa0"
      6c270044caf55fd2d2f5d342  #       "l'\x00DÊõ_ÒÒõÓB"
      a18db00c1854d07b57f8a830  #       "¡\x8d°\x0c\x18TÐ{Wø¨0"
      d8902a8d                  #       "Ø\x90*\x8d"
]]></artwork>
        <t>ISO mdoc <xref target="ISO.mdoc"/> may utilize the Status List mechanism by introducing the <tt>status</tt> parameter in the Mobile Security Object (MSO) as specified in Section 9.1.2. The <tt>status</tt> parameter uses the same encoding as a CWT as defined in <xref target="referenced-token-cose"/>.</t>
        <t>It is <bcp14>RECOMMENDED</bcp14> to use <tt>status</tt> for the label of the field that contains the <tt>Status</tt> CBOR structure.</t>
        <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
        <t>The following is a non-normative example of an IssuerAuth as specified in ISO mDL (also referred to as signed MSO) in Hex:</t>
        <artwork type="ascii-art"><![CDATA[
8443a10126a118215901f3308201ef30820195a00302010202140bfec7da97e048e
15ac3dacb9eafe82e64fd07f5300a06082a8648ce3d040302302331143012060355
04030c0b75746f7069612069616361310b3009060355040613025553301e170d323
4313030313030303030305a170d3235313030313030303030305a30213112301006
035504030c0975746f706961206473310b300906035504061302555330593013060
72a8648ce3d020106082a8648ce3d03010703420004ace7ab7340e5d9648c5a72a9
a6f56745c7aad436a03a43efea77b5fa7b88f0197d57d8983e1b37d3a539f4d5883
65e38cbbf5b94d68c547b5bc8731dcd2f146ba381a83081a5301c0603551d1f0415
30133011a00fa00d820b6578616d706c652e636f6d301e0603551d1204173015811
36578616d706c65406578616d706c652e636f6d301d0603551d0e0416041414e290
17a6c35621ffc7a686b7b72db06cd12351301f0603551d2304183016801454fa238
3a04c28e0d930792261c80c4881d2c00b300e0603551d0f0101ff04040302078030
150603551d250101ff040b3009060728818c5d050102300a06082a8648ce3d04030
20348003045022100b7103fd4b90529f50bd6f70c5ae5ce7f4f3d4d15a4e082812f
9fa1f5c2e5aa0a0220070b2822ec7ce6c56804923a85b2cfbffd054cf9a915f070c
fef7179a4bc6569590320d81859031ba766737461747573a16b7374617475735f6c
697374a26369647819019c63757269782168747470733a2f2f6578616d706c652e6
36f6d2f7374617475736c697374732f3167646f6354797065756f72672e69736f2e
31383031332e352e312e6d444c6776657273696f6e63312e306c76616c696469747
9496e666fa3667369676e6564c074323032342d31302d30315431333a33303a3032
5a6976616c696446726f6dc074323032342d31302d30315431333a33303a30325a6
a76616c6964556e74696cc074323032352d31302d30315431333a33303a30325a6c
76616c756544696765737473a1716f72672e69736f2e31383031332e352e31ac005
820a81d65ed5075fbd7ee19fa66e2bb3047ed826e2769873e7ef07c923da7a6f243
01582048701a9546492284d266ed81d439230a582d0e1f17a08ab1859a3efe98069
0a4025820d11fe48c8835b30bfb3895c3905436ddfb63f59ab9eee181b110985329
2a8f62035820a741bf05e20a8bc359e32426106ed0899b2c60262cc3acc637ddc99
41095fb7a045820ab67cb9a8f20a8572f77f02727367d08dc8e57fb89deb46b9c62
6e94457b7d8b055820bacddb4142b3842bd555206eb5acb27ded063294995c7e7fe
fbf93ece522604d065820bfd02b3aebdc05b53b5539226c38088d6d784b0ea0fab6
9eb9311650a48d325307582027dab70fe71da63e5e5d199e8ae5b79cbe8904bc30c
5b7544fb809e02ccb3e6a0858200dbd7ccc9c7727d3d17295f1b6f1914071670ee2
3d4d33530c31f1f406b8e3b7095820a5beb5efadf37f21637209abc519830681cc5
1f334818a823fec13b29552f5ba0a5820d8047c95f9272d7d07b2c13a9f5ac2ee02
380ab272a165e569391d89a2152c3c0b582004939930ffb4911ef03487a153605a3
0368b69f2437d6d21b4c90f92bc144c3e6d6465766963654b6579496e666fa16964
65766963654b6579a40102200121582096313d6c63e24e3372742bfdb1a33ba2c89
7dcd68ab8c753e4fbd48dca6b7f9a2258201fb3269edd418857de1b39a4e4a44b92
fa484caa722c228288f01d0c03a2c3d66f646967657374416c676f726974686d675
348412d3235365840b7c2d4abe85aa5ba814ef95de0385c71c802be8ac33a4a971a
85ed800ba7acb59cb21035f4a68fc0caa450cbefd3b255aec72f83595f0ae7b7d50
fe8a1c4cafe
]]></artwork>
        <t>The following is the CBOR Diagnostic Notation of the example above:</t>
        <artwork><![CDATA[
[
  << {
    1: -7
  } >>,
  {
    33: h'308201ef30820195a00302010202140bfec7da97e048e15ac3dacb9ea
    fe82e64fd07f5300a06082a8648ce3d04030230233114301206035504030c0b
    75746f7069612069616361310b3009060355040613025553301e170d3234313
    030313030303030305a170d3235313030313030303030305a30213112301006
    035504030c0975746f706961206473310b30090603550406130255533059301
    306072a8648ce3d020106082a8648ce3d03010703420004ace7ab7340e5d964
    8c5a72a9a6f56745c7aad436a03a43efea77b5fa7b88f0197d57d8983e1b37d
    3a539f4d588365e38cbbf5b94d68c547b5bc8731dcd2f146ba381a83081a530
    1c0603551d1f041530133011a00fa00d820b6578616d706c652e636f6d301e0
    603551d120417301581136578616d706c65406578616d706c652e636f6d301d
    0603551d0e0416041414e29017a6c35621ffc7a686b7b72db06cd12351301f0
    603551d2304183016801454fa2383a04c28e0d930792261c80c4881d2c00b30
    0e0603551d0f0101ff04040302078030150603551d250101ff040b300906072
    8818c5d050102300a06082a8648ce3d0403020348003045022100b7103fd4b9
    0529f50bd6f70c5ae5ce7f4f3d4d15a4e082812f9fa1f5c2e5aa0a0220070b2
    822ec7ce6c56804923a85b2cfbffd054cf9a915f070cfef7179a4bc6569'
  },
  << 24( << {
    "status": {
      "status_list": {
        "idx": 412,
        "uri": "https://example.com/statuslists/1"
      }
    },
    "docType": "org.iso.18013.5.1.mDL",
    "version": "1.0",
    "validityInfo": {
      "signed": 2024-10-01 13:30:02+00:00,
      "validFrom": 2024-10-01 13:30:02+00:00,
      "validUntil": 2025-10-01 13:30:02+00:00
    },
    "valueDigests": {
      "org.iso.18013.5.1": {
        0: h'a81d65ed5075fbd7ee19fa66e2bb3047ed826e2769873e7ef07c92
        3da7a6f243',
        1: h'48701a9546492284d266ed81d439230a582d0e1f17a08ab1859a3e
        fe980690a4',
        2: h'd11fe48c8835b30bfb3895c3905436ddfb63f59ab9eee181b11098
        53292a8f62',
        3: h'a741bf05e20a8bc359e32426106ed0899b2c60262cc3acc637ddc9
        941095fb7a',
        4: h'ab67cb9a8f20a8572f77f02727367d08dc8e57fb89deb46b9c626e
        94457b7d8b',
        5: h'bacddb4142b3842bd555206eb5acb27ded063294995c7e7fefbf93
        ece522604d',
        6: h'bfd02b3aebdc05b53b5539226c38088d6d784b0ea0fab69eb93116
        50a48d3253',
        7: h'27dab70fe71da63e5e5d199e8ae5b79cbe8904bc30c5b7544fb809
        e02ccb3e6a',
        8: h'0dbd7ccc9c7727d3d17295f1b6f1914071670ee23d4d33530c31f1
        f406b8e3b7',
        9: h'a5beb5efadf37f21637209abc519830681cc51f334818a823fec13
        b29552f5ba',
        10: h'd8047c95f9272d7d07b2c13a9f5ac2ee02380ab272a165e569391
        d89a2152c3c',
        11: h'04939930ffb4911ef03487a153605a30368b69f2437d6d21b4c90
        f92bc144c3e'
      }
    },
    "deviceKeyInfo": {
      "deviceKey": {
        1: 2,
        -1: 1,
        -2: h'96313d6c63e24e3372742bfdb1a33ba2c897dcd68ab8c753e4fbd
        48dca6b7f9a',
        -3: h'1fb3269edd418857de1b39a4e4a44b92fa484caa722c228288f01
        d0c03a2c3d6'
      }
    },
    "digestAlgorithm": "SHA-256"
  } >> ) >>,
  h'b7c2d4abe85aa5ba814ef95de0385c71c802be8ac33a4a971a85ed800ba7acb
  59cb21035f4a68fc0caa450cbefd3b255aec72f83595f0ae7b7d50fe8a1c4cafe'
]
]]></artwork>
      </section>
    </section>
    <section anchor="status-types">
      <name>Status Types</name>
      <t>This document defines the statuses of Referenced Tokens as Status Type values. A status describes the state, mode, condition or stage of an entity that is represented by the Referenced Token.</t>
      <t>A Status List can not represent multiple statuses per Referenced Token. If the Status List contains more than one bit per token (as defined by <tt>bits</tt> in the Status List), then the whole value of bits <bcp14>MUST</bcp14> describe one value. Status Types <bcp14>MUST</bcp14> have a numeric value between 0 and 255 for their representation in the Status List. The issuer of the Status List <bcp14>MUST</bcp14> choose an adequate <tt>bits</tt> value (bit size) to be able to describe the required Status Types for its application.</t>
      <section anchor="status-types-values">
        <name>Status Types Values</name>
        <t>This document creates a registry in <xref target="iana-status-types"/> that includes the most common Status Type values. Additional values may defined for particular use cases. Status Types described by this document comprise:</t>
        <ul spacing="normal">
          <li>
            <t>0x00 - "VALID" - The status of the Referenced Token is valid, correct or legal.</t>
          </li>
          <li>
            <t>0x01 - "INVALID" - The status of the Referenced Token is revoked, annulled, taken back, recalled or cancelled.</t>
          </li>
          <li>
            <t>0x02 - "SUSPENDED" - The status of the Referenced Token is temporarily invalid, hanging, debarred from privilege. This state is reversible.</t>
          </li>
        </ul>
        <t>The Status Type value 0x03 and Status Type values in the range 0x0B until 0x0F are permanently reserved as application specific. Meaning the processing of Status Types using these values is application specific. All other Status Type values are reserved for future registration.</t>
        <t>The processing rules for Referenced Tokens (such as JWT or CWT) precede any evaluation of a Referenced Token's status. For example, if a token is evaluated as being expired through the "exp" (Expiration Time) but also has a status of 0x00 ("VALID"), the token is considered expired.</t>
        <t>See <xref target="privacy-status-types"/> for privacy considerations on status types.</t>
      </section>
    </section>
    <section anchor="verification-and-processing">
      <name>Verification and Processing</name>
      <t>The fetching, processing and verifying of a Status List Token may be done by either the Holder or the Relying Party. In the following section is described from the role of the Relying Party, however the same rules would also apply for the Holder.</t>
      <section anchor="status-list-request">
        <name>Status List Request</name>
        <t>To obtain the Status List Token, the Relying Party <bcp14>MUST</bcp14> send an HTTP GET request to the URI provided in the Referenced Token.</t>
        <t>The HTTP endpoint <bcp14>SHOULD</bcp14> support the use of Cross-Origin Resource Sharing (CORS) <xref target="CORS"/> and/or other methods as appropriate to enable Browser-based clients to access it.</t>
        <t>The Relying Party <bcp14>SHOULD</bcp14> send the following Accept-Header to indicate the requested response type:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+jwt" for Status List Token in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List Token in CWT format</t>
          </li>
        </ul>
        <t>If the Relying Party does not send an Accept Header, the response type is assumed to be known implicitly or out-of-band.</t>
        <t>A successful response that contains a Status List Token <bcp14>MUST</bcp14> use an HTTP status code in the 2xx range.</t>
        <t>A response <bcp14>MAY</bcp14> also choose to redirect the client to another URI using an HTTP status code in the 3xx range, which clients <bcp14>SHOULD</bcp14> follow. A client <bcp14>SHOULD</bcp14> detect and intervene in cyclical redirections (i.e., "infinite" redirection loops).</t>
        <t>The following are non-normative examples of a request and response for a Status List Token with type <tt>application/statuslist+jwt</tt>:</t>
        <artwork type="ascii-art"><![CDATA[
GET /statuslists/1 HTTP/1.1
Host: example.com
Accept: application/statuslist+jwt
]]></artwork>
        <artwork type="ascii-art"><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/statuslist+jwt

eyJhbGciOiJFUzI1NiIsImtpZCI6IjEyIiwidHlwIjoic3RhdHVzbGlzdCtqd3QifQ.e
yJleHAiOjIyOTE3MjAxNzAsImlhdCI6MTY4NjkyMDE3MCwiaXNzIjoiaHR0cHM6Ly9le
GFtcGxlLmNvbSIsInN0YXR1c19saXN0Ijp7ImJpdHMiOjEsImxzdCI6ImVOcmJ1UmdBQ
WhjQlhRIn0sInN1YiI6Imh0dHBzOi8vZXhhbXBsZS5jb20vc3RhdHVzbGlzdHMvMSIsI
nR0bCI6NDMyMDB9.dkwx_isL2Hvr6qJBBuMGWz1Y-71T21o3VuKa0HIFEHsfHQ1C-a88
AQ-MOLH0dtHJqAh2pB5vtxnf5LnBvfrKeQ
]]></artwork>
      </section>
      <section anchor="status-list-response">
        <name>Status List Response</name>
        <t>In the successful response, the Status Provider <bcp14>MUST</bcp14> use the following content-type:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+jwt" for Status List Token in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List Token in CWT format</t>
          </li>
        </ul>
        <t>In the case of "application/statuslist+jwt", the response <bcp14>MUST</bcp14> be of type JWT and follow the rules of <xref target="status-list-token-jwt"/>.
In the case of "application/statuslist+cwt", the response <bcp14>MUST</bcp14> be of type CWT and follow the rules of <xref target="status-list-token-cwt"/>.</t>
        <t>The HTTP response <bcp14>SHOULD</bcp14> use gzip Content-Encoding as defined in <xref target="RFC9110"/>.</t>
        <t>If caching-related HTTP headers are present in the HTTP response, Relying Parties <bcp14>SHOULD</bcp14> prioritize the exp and ttl claims within the Status List Token over the HTTP headers for determining caching behavior.</t>
      </section>
      <section anchor="validation-rules">
        <name>Validation Rules</name>
        <t>Upon receiving a Referenced Token, a Relying Party <bcp14>MUST</bcp14> first perform the validation of the Referenced Token - e.g., checking for expected attributes, valid signature and expiration time. The processing rules for Referenced Tokens (such as JWT or CWT) precede any evaluation of a Referenced Token's status. For example, if a token is evaluated as being expired through the "exp" (Expiration Time) but also has a status of 0x00 ("VALID"), the token is considered expired. As this is out of scope for this document, this validation is not described here, but is expected to be done according to the format of the Referenced Token.</t>
        <t>If this validation is not successful, the Referenced Token <bcp14>MUST</bcp14> be rejected. If the validation was successful, the Relying Party <bcp14>MUST</bcp14> perform the following validation steps to evaluate the status of the reference token:</t>
        <ol spacing="normal" type="1"><li>
            <t>Check for the existence of a <tt>status</tt> claim, check for the existence of a <tt>status_list</tt> claim within the <tt>status</tt> claim and validate that the content of <tt>status_list</tt> adheres to the rules defined in <xref target="referenced-token-jose"/> for JOSE-based Referenced Tokens and <xref target="referenced-token-cose"/> for COSE-based Referenced Tokens. Other formats of Referenced Tokens may define other encoding of the URI and index.</t>
          </li>
          <li>
            <t>Resolve the Status List Token from the provided URI</t>
          </li>
          <li>
            <t>Validate the Status List Token:
            </t>
            <ol spacing="normal" type="1"><li>
                <t>Validate the Status List Token by following the rules defined in section 7.2 of <xref target="RFC7519"/> for JWTs and section 7.2 of <xref target="RFC8392"/> for CWTs. This step might require the resolution of a public key as described in <xref target="key-management"/>.</t>
              </li>
              <li>
                <t>Check for the existence of the required claims as defined in <xref target="status-list-token-jwt"/> and <xref target="status-list-token-cwt"/> depending on the token type</t>
              </li>
            </ol>
          </li>
          <li>
            <t>All existing claims in the Status List Token <bcp14>MUST</bcp14> be checked according to the rules in <xref target="status-list-token-jwt"/> and <xref target="status-list-token-cwt"/>
            </t>
            <ol spacing="normal" type="1"><li>
                <t>The subject claim (<tt>sub</tt> or <tt>2</tt>) of the Status List Token <bcp14>MUST</bcp14> be equal to the <tt>uri</tt> claim in the <tt>status_list</tt> object of the Referenced Token</t>
              </li>
              <li>
                <t>If the Relying Party has custom policies regarding the freshness of the Status List Token, it <bcp14>SHOULD</bcp14> check the issued at claim (<tt>iat</tt> or <tt>6</tt>)</t>
              </li>
              <li>
                <t>If the expiration time is defined (<tt>exp</tt> or <tt>4</tt>), it <bcp14>MUST</bcp14> be checked if the Status List Token is expired</t>
              </li>
              <li>
                <t>If the Relying Party is using a system for caching the Status List Token, it <bcp14>SHOULD</bcp14> check the <tt>ttl</tt> claim of the Status List Token and retrieve a fresh copy if (time status was resolved + ttl &lt; current time)</t>
              </li>
            </ol>
          </li>
          <li>
            <t>Decompress the Status List with a decompressor that is compatible with DEFLATE <xref target="RFC1951"/> and ZLIB <xref target="RFC1950"/></t>
          </li>
          <li>
            <t>Retrieve the status value of the index specified in the Referenced Token as described in <xref target="status-list"/>. Fail if the provided index is out of bounds of the Status List</t>
          </li>
          <li>
            <t>Check the status value as described in <xref target="status-types"/></t>
          </li>
        </ol>
        <t>If any of these checks fails, no statement about the status of the Referenced Token can be made and the Referenced Token <bcp14>SHOULD</bcp14> be rejected.</t>
      </section>
      <section anchor="historical-resolution">
        <name>Historical resolution</name>
        <t>By default, the status mechanism defined in this specification only conveys information about the state of Reference Tokens at the time the Status List Token was issued. The validity period for this information, as defined by the issuer, is explicitly stated by the <tt>iat</tt> (issued at) and <tt>exp</tt> (expiration time) claims for JWT and their corresponding ones for the CWT representation. If support for historical status information is required, this can be achieved by extending the request for the Status List Token as defined in <xref target="status-list-request"/> with a timestamp. This feature has additional privacy implications as described in <xref target="privacy-historical"/>.</t>
        <t>To obtain the Status List Token, the Relying Party <bcp14>MUST</bcp14> send an HTTP GET request to the URI provided in the Referenced Token with the additional query parameter <tt>time</tt> and its value being a unix timestamp. The response for a valid request <bcp14>SHOULD</bcp14> contain a Status List Token that was valid for that specified time or an error.</t>
        <t>If the Server does not support the additional query parameter, it <bcp14>SHOULD</bcp14> return a status code of 501 (Not Implemented) or if the requested time is not supported it <bcp14>SHOULD</bcp14> return a status code of 406 (Not Acceptable). A Status List Token might be served via static file hosting (e.g., leveraging a Content Delivery Network), which would result in the client not being able to retrieve those status codes. Thus, the client <bcp14>MUST</bcp14> verify support for this feature by verifying that the requested timestamp is within the valid time of the returned token signaled via <tt>iat</tt> (<tt>6</tt> for CWT) and <tt>exp</tt> (<tt>4</tt> for CWT).</t>
        <t>The following is a non-normative example of a GET request using the <tt>time</tt> query parameter:</t>
        <artwork type="ascii-art"><![CDATA[
GET /statuslists/1?time=1686925000 HTTP/1.1
Host: example.com
Accept: application/statuslist+jwt
]]></artwork>
        <t>The following is a non-normative example of a response for the above Request:</t>
        <artwork type="ascii-art"><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/statuslist+jwt

eyJhbGciOiJFUzI1NiIsImtpZCI6IjEyIiwidHlwIjoic3RhdHVzbGlzdCtqd3QifQ.e
yJleHAiOjIyOTE3MjAxNzAsImlhdCI6MTY4NjkyMDE3MCwiaXNzIjoiaHR0cHM6Ly9le
GFtcGxlLmNvbSIsInN0YXR1c19saXN0Ijp7ImJpdHMiOjEsImxzdCI6ImVOcmJ1UmdBQ
WhjQlhRIn0sInN1YiI6Imh0dHBzOi8vZXhhbXBsZS5jb20vc3RhdHVzbGlzdHMvMSIsI
nR0bCI6NDMyMDB9.dkwx_isL2Hvr6qJBBuMGWz1Y-71T21o3VuKa0HIFEHsfHQ1C-a88
AQ-MOLH0dtHJqAh2pB5vtxnf5LnBvfrKeQ
]]></artwork>
      </section>
    </section>
    <section anchor="aggregation">
      <name>Status List Aggregation</name>
      <t>Status List Aggregation is an optional mechanism to retrieve a list of URIs to all Status List Tokens, allowing a Relying Party to fetch all relevant Status Lists for a specific type of Referenced Token or Issuer. This mechanism is intended to support fetching and caching mechanisms and allow offline validation of the status of a reference token for a period of time.</t>
      <t>If a Relying Party encounters an invalid Status List referenced in the response from the Status List Aggregation endpoint, it <bcp14>SHOULD</bcp14> continue processing the other valid Status Lists referenced in the response.</t>
      <t>There are two options for a Relying Party to retrieve the Status List Aggregation.
An Issuer <bcp14>MAY</bcp14> support any of these mechanisms:</t>
      <ul spacing="normal">
        <li>
          <t>Issuer metadata: The Issuer of the Referenced Token publishes an URI which links to Status List Aggregation, e.g. in publicly available metadata of an issuance protocol</t>
        </li>
        <li>
          <t>Status List Parameter: The Status Issuer includes an additional claim in the Status List Token that contains the Status List Aggregation URI.</t>
        </li>
      </ul>
      <section anchor="issuer-metadata">
        <name>Issuer Metadata</name>
        <t>The Issuer <bcp14>MAY</bcp14> link to the Status List Aggregation URI in metadata that can be provided by different means like .well-known metadata as is used commonly in OAuth and OpenID or via a VICAL extension for ISO mDoc / mDL. If the Issuer is an OAuth Authorization Server according to <xref target="RFC6749"/>, it is <bcp14>RECOMMENDED</bcp14> to use <tt>status_list_aggregation_endpoint</tt> for its metadata defined by <xref target="RFC8414"/>.</t>
        <t>The concrete specification on how this is implemented depends on the specific ecosystem and is out of scope of this specification.</t>
      </section>
      <section anchor="status-list-parameter">
        <name>Status List Parameter</name>
        <t>The URI to the Status List Aggregation <bcp14>MAY</bcp14> be provided as the optional parameter <tt>aggregation_uri</tt> in the Status List itself as explained in <xref target="status-list-cbor"/> and <xref target="status-list-json"/> respectively. A Relying Party may use this URI to retrieve an up-to-date list of relevant Status Lists.</t>
      </section>
      <section anchor="status-list-aggregation-in-json-format">
        <name>Status List Aggregation in JSON Format</name>
        <t>This section defines the structure for a JSON-encoded Status List Aggregation:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status_lists</tt>: <bcp14>REQUIRED</bcp14>. JSON array of strings that contains URIs linking to Status List Tokens.</t>
          </li>
        </ul>
        <t>The Status List Aggregation URI provides a list of Status List URIs. This aggregation in JSON and the media type return <bcp14>SHOULD</bcp14> be <tt>application/json</tt>. A Relying Party can iterate through this list and fetch all Status List Tokens before encountering the specific URI in a Referenced Token.</t>
        <t>The following is a non-normative example for media type <tt>application/json</tt>:</t>
        <sourcecode type="json"><![CDATA[
{
   "status_lists" : [
      "https://example.com/statuslists/1",
      "https://example.com/statuslists/2",
      "https://example.com/statuslists/3"
   ]
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="x509-certificate-extensions">
      <name>X.509 Certificate Extensions</name>
      <section anchor="eku">
        <name>Extended Key Usage Extension</name>
        <t><xref target="RFC5280"/> specifies the Extended Key Usage (EKU) X.509 certificate extension for use on end entity certificates. The extension indicates one or more purposes for which the certified public key is valid. The EKU extension can be used in conjunction with the Key Usage (KU) extension, which indicates the set of basic cryptographic operations for which the certified key may be used. A certificate's issuer explicitly delegates Status List Token signing authority by issuing a X.509 certificate containing the KeyPurposeId defined below in the extended key usage extension.</t>
        <t>The following OID is defined for usage in the EKU extension</t>
        <t>```
   id-kp  OBJECT IDENTIFIER  ::=
       { iso(1) identified-organization(3) dod(6) internet(1)
         security(5) mechanisms(5) pkix(7) 3 }</t>
        <t>id-kp-oauthStatusListSigning             OBJECT IDENTIFIER ::= { id-kp TBD }
```</t>
      </section>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>The Status List as defined in <xref target="status-list"/> only exists in cryptographically secured containers which allows checking the integrity and origin without relying on other aspects like transport security (e.g., the web PKI).</t>
      <section anchor="correct-decoding-and-parsing-of-the-encoded-status-list">
        <name>Correct decoding and parsing of the encoded Status List</name>
        <t>Implementers should be particularly careful for the correct parsing and decoding of the Status List. Incorrect implementations might check the index on the wrong data or miscalculate the bit and byte index leading to an erroneous status of the Referenced Token. Beware, that bits are indexed (bit order) from least significant bit to most significant bit (also called "right to left") while bytes are indexed (byte order) in their natural incrementing byte order (usually written for display purpose from left to right). Endianness does not apply here because each status value fits within a single byte.</t>
        <t>Implementations are <bcp14>RECOMMENDED</bcp14> to verify correctness using the test vectors given by this specification.</t>
      </section>
      <section anchor="security-guidance-for-jwt-and-cwt">
        <name>Security Guidance for JWT and CWT</name>
        <t>A Status List Token in the JWT format should follow the security considerations of <xref target="RFC7519"/> and the best current practices of <xref target="RFC8725"/>.</t>
        <t>A Status List Token in the CWT format should follow the security considerations of <xref target="RFC8392"/>.</t>
      </section>
      <section anchor="key-management">
        <name>Key Resolution and Trust Management</name>
        <t>This specification does not mandate specific methods for key resolution and trust management, however the following recommendations are made for specifications, profiles, or ecosystems that are planning ot make use of the Status List mechanism:</t>
        <t>If the Issuer of the Referenced Token is the same entity as the Status Issuer, then the same key that is embedded into the Referenced Token may be used for the Status List Token. In this case the Status List Token may use:
- the same <tt>x5c</tt> value or an <tt>x5t</tt>, <tt>x5t#S256</tt> or <tt>kid</tt> parameter referencing to the same key as used in the Referenced Token for JOSE.
- the same <tt>x5chain</tt> value or an <tt>x5t</tt> or <tt>kid</tt> parameter referencing to the same key as used in the Referenced Token for COSE.</t>
        <t>Alternatively, the Status Issuer may use the same web-based key resolution that is used for the Referenced Token. In this case the Status List Token may use:
- an <tt>x5u</tt>, <tt>jwks</tt>, <tt>jwks_uri</tt> or <tt>kid</tt> parameter referencing to a key using the same web-based resolution as used in the Referenced Token for JOSE.
- an <tt>x5u</tt> or <tt>kid</tt> parameter referencing to a key using the same web-based resolution as used in the Referenced Token for COSE.</t>
        <artwork type="ascii-art"><![CDATA[
┌────────┐  host keys  ┌──────────────────────┐
│ Issuer ├────────┬───►│ .well-known metadata │
└─┬──────┘        │    └──────────────────────┘
  ▼ update status │
┌───────────────┐ │
│ Status Issuer ├─┘
└─┬─────────────┘
  ▼ provide Status List
┌─────────────────┐
│ Status Provider │
└─────────────────┘
]]></artwork>
        <t>If the Issuer of the Referenced Token is a different entity than the Status Issuer, then the keys used for the Status List Token may be cryptographically linked, e.g. by an Certificate Authority through an x.509 PKI. The certificate of the Issuer for the Referenced Token and the Status Issuer should be issued by the same Certificate Authority and the Status Issuer's certificate should utilize <xref target="eku">extended key usage</xref>.</t>
        <artwork type="ascii-art"><![CDATA[
┌───────────────────────┐
│ Certificate Authority │
└─┬─────────────────────┘
  │ authorize
  │  ┌────────┐
  ├─►│ Issuer │
  │  └─┬──────┘
  │    ▼ update status
  │  ┌───────────────┐
  └─►│ Status Issuer │
     └─┬─────────────┘
       ▼ provide Status List
     ┌─────────────────┐
     │ Status Provider │
     └─────────────────┘
]]></artwork>
      </section>
      <section anchor="status-list-caching">
        <name>Status List Caching</name>
        <t>When fetching a Status List Token, Relying Parties must carefully evaluate how long a Status List is cached for. Collectively the <tt>iat</tt>, <tt>exp</tt> and <tt>ttl</tt> claims when present in a Status List Token communicate how long a Status List should be cached and should be considered valid for. The following diagram illustrates the relationship between these claims and how they are designed to influence caching.</t>
        <artwork type="ascii-art"><![CDATA[
Time of fetching

         │
         │            Check for        Check for        Check for
         │             updates          updates          updates
         │
 iat     │                │                │                │    exp
         │                │                │                │
  │      │                │                │                │     │
  │      │                │                │                │     │
  │      │                │                │                │     │
  │      │                │                │                │     │
  │      │      ttl       │      ttl       │      ttl       │     │
  │      │ ─────────────► │ ─────────────► │ ─────────────► │ ──► │
  │      │                │                │                │     │
  │      │                │                │                │     │
  │                                                               │
──┼───────────────────────────────────────────────────────────────┼─►
  │                                                               │
]]></artwork>
        <t>It is essential to understand the distinct purposes of the <tt>ttl</tt> and <tt>exp</tt> claims. The <tt>ttl</tt> claim represents a duration to be interpreted relative to the time the Status List is fetched, indicating when a new version of the Status List may be available. In contrast, the <tt>exp</tt> claim specifies an absolute timestamp, marking the point in time when the Status List expires and <bcp14>MUST NOT</bcp14> be relied upon any longer. Together, these claims provide guidance on when to check for updates (<tt>ttl</tt> claim) and when the Status List must be refreshed or replaced (<tt>exp</tt> claim).</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <section anchor="privacy-issuer">
        <name>Observability of Issuers</name>
        <t>The main privacy consideration for a Status List, especially in the context of the Issuer-Holder-Verifier model <xref target="SD-JWT.VC"/>, is to prevent the Issuer from tracking the usage of the Referenced Token when the status is being checked. If an Issuer offers status information by referencing a specific token, this would enable him to create a profile for the issued token by correlating the date and identity of Relying Parties, that are requesting the status.</t>
        <t>The Status List approaches these privacy implications by integrating the status information of many Referenced Tokens into the same list. Therefore, the Issuer does not learn for which Referenced Token the Relying Party is requesting the Status List. The privacy of the Holder is protected by the anonymity within the set of Referenced Tokens in the Status List, also called herd privacy. This limits the possibilities of tracking by the Issuer.</t>
        <t>The herd privacy is depending on the number of entities within the Status List called its size. A larger size results in better privacy but also impacts the performance as more data has to be transferred to read the Status List.</t>
        <t>Additionally, the Issuer may analyse data from the HTTP request to identify the Relying Party, e.g. through the sender's IP address.</t>
        <t>This behaviour may be mitigated by:</t>
        <ul spacing="normal">
          <li>
            <t>private relay protocols or other mechanisms hiding the original sender like <xref target="RFC9458"/>.</t>
          </li>
          <li>
            <t>using trusted Third Party Hosting, see <xref target="third-party-hosting"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="malicious-issuers">
        <name>Malicious Issuers</name>
        <t>A malicious Issuer could bypass the privacy benefits of the herd privacy by generating a unique Status List for every Referenced Token. By these means, he could maintain a mapping between Referenced Tokens and Status Lists and thus track the usage of Referenced Tokens by utilizing this mapping for the incoming requests. This malicious behaviour could be detected by Relying Parties that request large amounts of Referenced Tokens by comparing the number of different Status Lists and their sizes.</t>
      </section>
      <section anchor="privacy-relying-party">
        <name>Observability of Relying Parties</name>
        <t>Once the Relying Party receives the Referenced Token, this enables them to request the Status List to validate its status through the provided <tt>uri</tt> parameter and look up the corresponding <tt>index</tt>. However, the Relying Party may persistently store the <tt>uri</tt> and <tt>index</tt> of the Referenced Token to request the Status List again at a later time. By doing so regularly, the Relying Party may create a profile of the Referenced Token's validity status. This behaviour may be intended as a feature, e.g. for a KYC process that requires regular validity checks, but might also be abused in cases where this is not intended and unknown to the Holder, e.g. profiling the suspension of a driving license or checking the employment status of an employee credential.</t>
        <t>This behaviour could be mitigated by:</t>
        <ul spacing="normal">
          <li>
            <t>regular re-issuance of the Referenced Token, see <xref target="implementation-lifecycle"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="privacy-outsider">
        <name>Observability of Outsiders</name>
        <t>Outside actors may analyse the publicly available Status Lists to get information on the internal processes of the Issuer and his related business. This data may allow inferences on the total number of issued Reference Tokens and the revocation rate. Additionally, actors may regularly fetch this data or use the historic data functionality to learn how these numbers change over time.</t>
        <t>This behaviour could be mitigated by:</t>
        <ul spacing="normal">
          <li>
            <t>disable the historical data feature <xref target="historical-resolution"/></t>
          </li>
          <li>
            <t>disable the Status List Aggregation <xref target="aggregation"/></t>
          </li>
          <li>
            <t>choose non-sequential, pseudo-random or random indices</t>
          </li>
          <li>
            <t>use decoy entries to obfuscate the real number of Referenced Tokens within a Status List</t>
          </li>
          <li>
            <t>choose to deploy and utilize multiple Status Lists simultaneously</t>
          </li>
        </ul>
      </section>
      <section anchor="unlinkability">
        <name>Unlinkability</name>
        <t>The tuple of uri and index inside the Referenced Token are unique and therefore is traceable data.</t>
        <section anchor="colluding-relying-parties">
          <name>Colluding Relying Parties</name>
          <t>Two or more colluding Relying Parties may link two transactions involving the same Referenced Token by comparing the status claims of received Referenced Tokens and therefore determine that they have interacted with the same Holder.</t>
          <t>To avoid privacy risks for colluding Relying Parties, it is <bcp14>RECOMMENDED</bcp14> that Issuers provide the ability to issue batches of one-time-use Referenced Tokens, enabling Holders to use in a single interaction with a Relying Party before discarding. See <xref target="implementation-lifecycle"/> to avoid further correlatable information by the values of <tt>uri</tt> and <tt>index</tt>, Status Issuers are <bcp14>RECOMMENDED</bcp14> to:</t>
          <ul spacing="normal">
            <li>
              <t>choose non-sequential, pseudo-random or random indices</t>
            </li>
            <li>
              <t>use decoy entries to obfuscate the real number of Referenced Tokens within a Status List</t>
            </li>
            <li>
              <t>choose to deploy and utilize multiple Status Lists simultaneously</t>
            </li>
          </ul>
        </section>
        <section anchor="colluding-status-issuer-and-relying-party">
          <name>Colluding Status Issuer and Relying Party</name>
          <t>A Status Issuer and a Relying Party Issuer may link two transaction involving the same Referenced Tokens by comparing the status claims of the Referenced Token and therefore determine that they have interacted with the same Holder. It is therefore recommended to use Status Lists for Referenced Token formats that have similar unlinkability properties.</t>
        </section>
      </section>
      <section anchor="third-party-hosting">
        <name>External Status Provider for Privacy</name>
        <t>If the roles of the Status Issuer and the Status Provider are performed by different entities, this may give additional privacy assurances as the Issuer has no means to identify the Relying Party or its request.</t>
        <t>Third-Party hosting may also allow for greater scalability, as the Status List Tokens may be served by operators with greater resources, like CDNs, while still ensuring authenticity and integrity of Token Status List, as it is signed by the Status Issuer.</t>
      </section>
      <section anchor="privacy-historical">
        <name>Historical Resolution</name>
        <t>By default, this specification only supports providing Status List information for the most recent status information and does not allow the lookup of historical information like a validity state at a specific point in time. There exists optional support for a query parameter that allows these kind of historic lookups as described in <xref target="historical-resolution"/>. There are scenarios where such a functionality is necessary, but this feature should only be implemented when the scenario and the consequences of enabling historical resolution are fully understood.</t>
        <t>There are strong privacy concerns that have to be carefully taken into consideration when providing a mechanism that allows historic requests for status information - see <xref target="privacy-relying-party"/> for more details. Support for this functionality is optional and Implementers are <bcp14>RECOMMENDED</bcp14> to not support historic requests unless there are strong reasons to do so and after carefully considering the privacy implications.</t>
      </section>
      <section anchor="privacy-status-types">
        <name>Status Types</name>
        <t>As previously explained, there is the potential risk of observability by Relying Parties (see <xref target="privacy-relying-party"/>) and Outsiders (see <xref target="privacy-outsider"/>). That means that any Status Type that transports special information about a Token can leak information to other parties. This documents defines one additional Status Type with "SUSPENDED" that conveys such additional information. Depending on the use-case, suspended could for example provide information that an authorization in the Token is suspended, but the token itself is still valid.</t>
        <t>A concrete example would be a driver's license, where the digital driver's license might still be useful to prove other information about its holder, but suspended could signal that it should not be considered valid in the scope of being allowed to drive a car. This case could be solved by either introducing a special status type, or by revoking the Token and re-issuing with changed attributes. For such a case, the status type suspended might be dangerous as it would leak the information of a suspended driver's license even if the driver's license is used as a mean of identification and not in the context of driving a car. This could also allow for the unwanted collection of statistical data on the status of driver's licenses.</t>
        <t>Ecosystems that want to use other Status Types than "VALID" and "INVALID" should consider the possible leakage of data and profiling possibilities before doing so and evaluate if revocation and re-issuance might a better fit for their use-case.</t>
      </section>
    </section>
    <section anchor="implementation">
      <name>Implementation Considerations</name>
      <section anchor="implementation-lifecycle">
        <name>Token Lifecycle</name>
        <t>The lifetime of a Status List Token depends on the lifetime of its Referenced Tokens. Once all Referenced Tokens are expired, the Issuer may stop serving the Status List Token.</t>
        <t>Referenced Tokens may be regularly re-issued to mitigate the linkability of presentations to Relying Parties. In this case, every re-issued Referenced Token <bcp14>MUST</bcp14> have a fresh Status List entry in order to prevent this from becoming a possible source of correlation.</t>
        <t>Referenced Tokens may also be issued in batches and be presented by Holders in a one-time-use policy to avoid linkability. In this case, every Referenced Token <bcp14>MUST</bcp14> have a dedicated Status List entry and <bcp14>MAY</bcp14> be spread across multiple Status Lists. Revoking batch-issued Referenced Tokens might reveal this correlation later on.</t>
      </section>
      <section anchor="default-values-and-double-allocation">
        <name>Default Values and Double Allocation</name>
        <t>Implementations producing Status Lists are <bcp14>RECOMMENDED</bcp14> to initialize the Status List byte array with a default value and provide this as an initialization parameter to the Issuer. The Issuer is <bcp14>RECOMMENDED</bcp14> to use a default value that represents the most common value for its Referenced Tokens to avoid an update during issuance.</t>
        <t>Implementations producing Status Lists are <bcp14>RECOMMENDED</bcp14> to prevent double allocation, i.e. re-using the same <tt>uri</tt> and <tt>index</tt> for multiple Referenced Tokens. The Issuer <bcp14>MUST</bcp14> prevent any unintended double allocation by using the Status List.</t>
      </section>
      <section anchor="status-list-size">
        <name>Status List Size</name>
        <t>The storage and transmission size of the Status Issuer's Status List Tokens depends on:
- the size of the Status List, i.e. the number of Referenced Tokens
- the revocation rate and distribution of the Status List data (due to compression, revocation rates close to 0% or 100% create lowest sizes while revocation rates closer to 50% and random distribution create highest sizes)
- the lifetime of Referenced Tokens (shorter lifetimes allows for earlier retirement of Status List Tokens)</t>
        <t>The Status List Issuer may increase the size of a Status List if it requires indices for additional Referenced Tokens. It is <bcp14>RECOMMENDED</bcp14> that the size of a Status List in bits is divisible in bytes (8 bits) without a remainder, i.e. <tt>size-in-bits</tt> % 8 = 0.</t>
        <t>The Status List Issuer may chunk its Referenced Tokens into multiple Status Lists to reduce the transmission size of an individual Status List Token. This may be useful for setups where some entities operate in constrained environments, e.g. for mobile internet or embedded devices. The Status List Issuer may chunk the Status List Tokens depending on the Referenced Token's expiry date to align their lifecycles and allow for easier retiring of Status List Tokens, however the Status Issuer must be aware of possible privacy risks due to correlations.</t>
      </section>
      <section anchor="external-status-issuer">
        <name>External Status Issuer</name>
        <t>If the roles of the Issuer of the Referenced Token and the Status Issuer are performed by different entities, this may allow for use case that require revocations of Referenced Tokens to be managed by a different entities, e.g. for regulatory or privacy reasons. In this scenario both parties must align on:</t>
        <ul spacing="normal">
          <li>
            <t>the key and trust management as described in <xref target="key-management"/></t>
          </li>
          <li>
            <t>parameters for the Status List
            </t>
            <ul spacing="normal">
              <li>
                <t>number of <tt>bits</tt> for the Status Type as described in <xref target="status-list"/></t>
              </li>
              <li>
                <t>update cycle of the Issuer used for <tt>ttl</tt> in the Status List Token as described in <xref target="status-list-token"/></t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="external-status-provider-for-scalability">
        <name>External Status Provider for Scalability</name>
        <t>If the roles of the Status Issuer and the Status Provider are performed by different entities, this may allow for greater scalability, as the Status List Tokens may be served by operators with greater resources, like CDNs. At the same time the authenticity and integrity of Token Status List is still guaranteed, as it is signed by the Status Issuer.</t>
      </section>
      <section anchor="relying-parties-avoiding-correlatable-information">
        <name>Relying Parties avoiding correlatable Information</name>
        <t>If the Relying Party does not require the Referenced Token and the Status List Token after the presentation, e.g. for subsequent status checks or audit trail, it is <bcp14>RECOMMENDED</bcp14> to delete correlatable information, in particular:</t>
        <ul spacing="normal">
          <li>
            <t>the <tt>status</tt> claim in the Referenced Token</t>
          </li>
          <li>
            <t>the Status List Token itself</t>
          </li>
        </ul>
        <t>The Relying Party should instead only keep the relevant payload from the Referenced Token.</t>
      </section>
      <section anchor="status-list-formats">
        <name>Status List Formats</name>
        <t>This specification defines 2 different token formats of the Status List:</t>
        <ul spacing="normal">
          <li>
            <t>JWT</t>
          </li>
          <li>
            <t>CWT</t>
          </li>
        </ul>
        <t>This specification states no requirements to not mix different formats like a CBOR based Referenced Token using a JWT for the Status List, but the expectation is that within an ecosystem, a choice for specific formats is made.
Within such an ecosystem, only support for those selected variants is required and implementations should know what to expect via a profile.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="json-web-token-claims-registration">
        <name>JSON Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "JSON Web Token Claims" registry <xref target="IANA.JWT"/> established by <xref target="RFC7519"/>.</t>
        <section anchor="registry-contents">
          <name>Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Description: Reference to a status or validity mechanism containing up-to-date status information on the JWT.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-claim"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Description: A status list containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-jwt"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Description: Time to Live</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-jwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="iana-registry">
        <name>JWT Status Mechanisms Registry</name>
        <t>This specification establishes the IANA "JWT Status Mechanisms" registry for JWT "status" member values and adds it to the "JSON Web Token (JWT)" registry group at https://www.iana.org/assignments/jwt. The registry records the status mechanism member and a reference to the specification that defines it.</t>
        <t>JWT Status Mechanisms are registered by Specification Required <xref target="RFC5226"/> after a three-week
review period on the jwt-reg-review@ietf.org mailing list, on the advice of one or more Designated Experts.
However, to allow for the allocation of names prior to publication, the Designated Expert(s) may approve
registration once they are satisfied that such a specification will be published.</t>
        <t>Registration requests sent to the mailing list for review should use an appropriate subject (e.g., "Request to register JWT Status Mechanism: example").</t>
        <t>Within the review period, the Designated Expert(s) will either approve or deny the registration request, communicating this decision
to the review list and IANA. Denials should include an explanation and, if applicable, suggestions as to how to make the request
successful.</t>
        <t>IANA must only accept registry updates from the Designated Expert(s) and should direct all requests for registration to the review mailing list.</t>
        <section anchor="registration-template">
          <name>Registration Template</name>
          <t>Status Mechanism Value:</t>
          <ul empty="true">
            <li>
              <t>The name requested (e.g., "status_list"). The name is case sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts state that there is a compelling reason to allow an exception.</t>
            </li>
          </ul>
          <t>Status Mechanism Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the status mechanism.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For IETF Stream RFCs, list the IETF. For others, give the name of the responsible party. Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents. An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Mechanism Value: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Status Mechanism Description: A status list containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="referenced-token-jose"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cbor-web-token-claims-registration">
        <name>CBOR Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "CBOR Web Token (CWT) Claims" registry <xref target="IANA.CWT"/> established by <xref target="RFC8392"/>.</t>
        <section anchor="registry-contents-1">
          <name>Registry Contents</name>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Description: Reference to a status or validity mechanism containing up-to-date status information on the CWT.</t>
            </li>
            <li>
              <t>JWT Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65535)</t>
            </li>
            <li>
              <t>Claim Value Type: map</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Reference: <xref target="status-claim"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Description: A status list containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>JWT Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65533)</t>
            </li>
            <li>
              <t>Claim Value Type: map</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-cwt"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Description: Time to Live</t>
            </li>
            <li>
              <t>JWT Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65534)</t>
            </li>
            <li>
              <t>Claim Value Type: unsigned integer</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-cwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cwt-iana-registry">
        <name>CWT Status Mechanisms Registry</name>
        <t>This specification establishes the IANA "CWT Status Mechanisms" registry for CWT "status" member values and adds it to the "CBOR Web Token (CWT) Claims" registry group at https://www.iana.org/assignments/cwt. The registry records the status mechanism member and a reference to the specification that defines it.</t>
        <t>CWT Status Mechanisms are registered by Specification Required <xref target="RFC5226"/> after a three-week
review period on the cwt-reg-review@ietf.org mailing list, on the advice of one or more Designated Experts. However, to allow for the allocation of names prior to publication, the Designated Expert(s) may approve registration once they are satisfied that such a
specification will be published.</t>
        <t>Registration requests sent to the mailing list for review should use an appropriate subject (e.g., "Request to register CWT Status Mechanism: example").</t>
        <t>Within the review period, the Designated Expert(s) will either approve or deny the registration request, communicating this decision
to the review list and IANA. Denials should include an explanation and, if applicable, suggestions as to how to make the request
successful.</t>
        <t>IANA must only accept registry updates from the Designated Expert(s) and should direct all requests for registration to the review mailing list.</t>
        <section anchor="registration-template-1">
          <name>Registration Template</name>
          <t>Status Mechanism Value:</t>
          <ul empty="true">
            <li>
              <t>The name requested (e.g., "status_list"). The name is case sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts state that there is a compelling reason to allow an exception.</t>
            </li>
          </ul>
          <t>Status Mechanism Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the status mechanism.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For IETF Stream RFCs, list the IETF. For others, give the name of the responsible party. Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents. An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents-1">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Mechanism Value: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Status Mechanism Description: A status list containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="referenced-token-cose"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="iana-status-types">
        <name>OAuth Status Types Registry</name>
        <t>This specification establishes the IANA "OAuth Status Types" registry for Status List values and adds it to the "OAuth Parameters" registry group at https://www.iana.org/assignments/oauth-parameters. The registry records a human readable label, the bit representation and a common description for it.</t>
        <t>Status Types are registered by Specification Required <xref target="RFC5226"/> after a two-week
review period on the oauth-ext-review@ietf.org mailing list, on the advice of one or more Designated Experts. However, to allow for the allocation of names prior to publication, the Designated Expert(s) may approve registration once they are satisfied that such a
specification will be published.</t>
        <t>Registration requests sent to the mailing list for review should use an appropriate subject (e.g., "Request to register Status Type name: example").</t>
        <t>Within the review period, the Designated Expert(s) will either approve or deny the registration request, communicating this decision
to the review list and IANA. Denials should include an explanation and, if applicable, suggestions as to how to make the request
successful.</t>
        <t>IANA must only accept registry updates from the Designated Expert(s) and should direct all requests for registration to the review mailing list.</t>
        <section anchor="registration-template-2">
          <name>Registration Template</name>
          <t>Status Type Name:</t>
          <ul empty="true">
            <li>
              <t>The name is a human-readable case insensitive label for the Status Type that helps to talk about the status of Referenced Token in common language.</t>
            </li>
          </ul>
          <t>Status Type Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the Status Type and optional examples.</t>
            </li>
          </ul>
          <t>Status Type value:</t>
          <ul empty="true">
            <li>
              <t>The bit representation of the Status Type in a byte hex representation. Valid Status Type values range from 0x00-0xFF. Values are filled up with zeros if they have less than 8 bits.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For IETF Stream RFCs, list the IETF. For others, give the name of the responsible party. Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents. An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents-2">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: VALID</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is valid, correct or legal.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x00</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: INVALID</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is revoked, annulled, taken back, recalled or cancelled.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x01</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: SUSPENDED</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is temporarily invalid, hanging or debarred from privilege. This state is reversible.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x02</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: APPLICATION_SPECIFIC</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is application specific.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x03</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: APPLICATION_SPECIFIC</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is application specific.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x0B-0xOF</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
        </section>
      </section>
      <section anchor="oauth-parameters-registration">
        <name>OAuth Parameters Registration</name>
        <t>This specification requests registration of the following values in the IANA "OAuth Authorization Server Metadata" registry <xref target="IANA.OAuth.Params"/> established by <xref target="RFC8414"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Metadata Name: status_list_aggregation_endpoint</t>
          </li>
          <li>
            <t>Metadata Description: URL of the Authorization Server aggregating OAuth Token Status List URLs for token status management.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: <xref target="aggregation"/> of this specification</t>
          </li>
        </ul>
      </section>
      <section anchor="media-type-registration">
        <name>Media Type Registration</name>
        <t>This section requests registration of the following media types <xref target="RFC2046"/> in
the "Media Types" registry <xref target="IANA.MediaTypes"/> in the manner described
in <xref target="RFC6838"/>.</t>
        <t>To indicate that the content is an JWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: See <xref target="status-list-token-jwt"/> of this specification</t>
          </li>
          <li>
            <t>Security considerations: See <xref target="Security"/> of this specification</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information: n/a</t>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an CWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: See <xref target="status-list-token-cwt"/> of this specification</t>
          </li>
          <li>
            <t>Security considerations: See <xref target="Security"/> of this specification</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information: n/a</t>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
      </section>
      <section anchor="x509-certificate-extended-key-purpose-oid-registration">
        <name>X.509 Certificate Extended Key Purpose OID Registration</name>
        <t>IANA is also requested to register the following OID "1.3.6.1.5.5.7.3.TBD" in the "SMI Security for PKIX Extended Key Purpose" registry (1.3.6.1.5.5.7.3), this OID is defined in section <xref target="eku"/>.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1950">
          <front>
            <title>ZLIB Compressed Data Format Specification version 3.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <author fullname="J-L. Gailly" surname="J-L. Gailly"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1950"/>
          <seriesInfo name="DOI" value="10.17487/RFC1950"/>
        </reference>
        <reference anchor="RFC1951">
          <front>
            <title>DEFLATE Compressed Data Format Specification version 1.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1951"/>
          <seriesInfo name="DOI" value="10.17487/RFC1951"/>
        </reference>
        <reference anchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC5226">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="H. Alvestrand" initials="H." surname="Alvestrand"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication transform for IPsec). To ensure that such quantities have consistent values and interpretations across all implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA).</t>
              <t>In order for IANA to manage a given namespace prudently, it needs guidelines describing the conditions under which new values can be assigned or when modifications to existing values can be made. If IANA is expected to play a role in the management of a namespace, IANA must be given clear and concise instructions describing that role. This document discusses issues that should be considered in formulating a policy for assigning values to a namespace and provides guidelines for authors on the specific text that must be included in documents that place demands on IANA.</t>
              <t>This document obsoletes RFC 2434. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5226"/>
          <seriesInfo name="DOI" value="10.17487/RFC5226"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC9596">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) "typ" (type) Header Parameter</title>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <author fullname="O. Steele" initials="O." surname="Steele"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This specification adds the equivalent of the JSON Object Signing and Encryption (JOSE) "typ" (type) header parameter to CBOR Object Signing and Encryption (COSE). This enables the benefits of explicit typing (as defined in RFC 8725, "JSON Web Token Best Current Practices") to be brought to COSE objects. The syntax of the COSE type header parameter value is the same as the existing COSE content type header parameter.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9596"/>
          <seriesInfo name="DOI" value="10.17487/RFC9596"/>
        </reference>
        <reference anchor="IANA.MediaTypes" target="https://www.iana.org/assignments/media-types/media-types.xhtml">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JOSE" target="https://www.iana.org/assignments/jose/jose.xhtml">
          <front>
            <title>JSON Object Signing and Encryption (JOSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JWT" target="https://www.iana.org/assignments/jwt/jwt.xhtml">
          <front>
            <title>JSON Web Token Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.CWT" target="https://www.iana.org/assignments/cwt/cwt.xhtml">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.OAuth.Params" target="https://www.iana.org/assignments/oauth-parameters/oauth-parameters.xhtml#authorization-server-metadata">
          <front>
            <title>OAuth Authorization Server Metadata</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CORS" target="https://fetch.spec.whatwg.org/#http-cors-protocol">
          <front>
            <title>Fetch Living Standard</title>
            <author>
              <organization>WHATWG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7662">
          <front>
            <title>OAuth 2.0 Token Introspection</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This specification defines a method for a protected resource to query an OAuth 2.0 authorization server to determine the active state of an OAuth 2.0 token and to determine meta-information about this token. OAuth 2.0 deployments can use this method to convey information about the authorization context of the token from the authorization server to the protected resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7662"/>
          <seriesInfo name="DOI" value="10.17487/RFC7662"/>
        </reference>
        <reference anchor="RFC7800">
          <front>
            <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7800"/>
          <seriesInfo name="DOI" value="10.17487/RFC7800"/>
        </reference>
        <reference anchor="RFC8414">
          <front>
            <title>OAuth 2.0 Authorization Server Metadata</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <date month="June" year="2018"/>
            <abstract>
              <t>This specification defines a metadata format that an OAuth 2.0 client can use to obtain the information needed to interact with an OAuth 2.0 authorization server, including its endpoint locations and authorization server capabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8414"/>
          <seriesInfo name="DOI" value="10.17487/RFC8414"/>
        </reference>
        <reference anchor="RFC9458">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9458"/>
          <seriesInfo name="DOI" value="10.17487/RFC9458"/>
        </reference>
        <reference anchor="SD-JWT.VC">
          <front>
            <title>SD-JWT-based Verifiable Credentials (SD-JWT VC)</title>
            <author fullname="Oliver Terbu" initials="O." surname="Terbu">
              <organization>MATTR</organization>
            </author>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete Inc.</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="3" month="December" year="2024"/>
            <abstract>
              <t>   This specification describes data formats as well as validation and
   processing rules to express Verifiable Credentials with JSON payloads
   with and without selective disclosure based on the SD-JWT
   [I-D.ietf-oauth-selective-disclosure-jwt] format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-sd-jwt-vc-08"/>
        </reference>
        <reference anchor="ISO.mdoc">
          <front>
            <title>ISO/IEC 18013-5:2021 ISO-compliant driving licence</title>
            <author>
              <organization>ISO/IEC JTC 1/SC 17</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="smith2020let" target="https://www.ndss-symposium.org/ndss-paper/lets-revoke-scalable-global-certificate-revocation/">
          <front>
            <title>Let's revoke: Scalable global certificate revocation</title>
            <author initials="T." surname="Smith" fullname="Trevor Smith">
              <organization>Brigham Young University</organization>
            </author>
            <author initials="L." surname="Dickinson" fullname="Luke Dickinson">
              <organization>Brigham Young University</organization>
            </author>
            <author initials="K." surname="Seamons" fullname="Kent Seamons">
              <organization>Brigham Young University</organization>
            </author>
            <date>n.d.</date>
          </front>
          <seriesInfo name="Network and Distributed Systems Security (NDSS) Symposium 2020" value=""/>
        </reference>
        <reference anchor="W3C.SL" target="https://www.w3.org/TR/vc-bitstring-status-list/">
          <front>
            <title>W3C Bitstring Status List v1.0</title>
            <author initials="D." surname="Longley" fullname="Dave Longley">
              <organization>Digital Bazaar</organization>
            </author>
            <author initials="M." surname="Sporny" fullname="Manu Sporny">
              <organization>Digital Bazaar</organization>
            </author>
            <author initials="O." surname="Steele" fullname="Orie Steele">
              <organization>Transmute</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 1514?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank
Brian Campbell,
Filip Skokan,
Francesco Marino,
Guiseppe De Marco,
Kristina Yasuda,
Markus Kreusch,
Martijn Haring,
Michael B. Jones,
Michael Schwartz,
Mike Prorock,
Oliver Terbu,
Orie Steele,
Timo Glastra
and
Torsten Lodderstedt</t>
      <t>for their valuable contributions, discussions and feedback to this specification.</t>
    </section>
    <section numbered="false" anchor="test-vectors">
      <name>Test vectors for Status List encoding</name>
      <t>All examples here are given in the form of JSON or CBOR payloads. The examples are encoded according to <xref target="status-list-json"/> for JSON and <xref target="status-list-cbor"/> for CBOR. The CBOR examples are displayed as hex values.</t>
      <t>All values that are not mentioned for the examples below can be assumed to be 0 (VALID). All examples are initialized with a size of 2^20 entries.</t>
      <section numbered="false" anchor="bit-status-list">
        <name>1 bit Status List</name>
        <t>The following example uses a 1 bit Status List (2 possible values):</t>
        <artwork><![CDATA[
status[0]=1
status[1993]=1
status[25460]=1
status[159495]=1
status[495669]=1
status[554353]=1
status[645645]=1
status[723232]=1
status[854545]=1
status[934534]=1
status[1000345]=1
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 1,
  "lst": "eNrt3AENwCAMAEGogklACtKQPg9LugC9k_ACvreiogE
  AAKkeCQAAAAAAAAAAAAAAAAAAAIBylgQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAXG9IAAAAAAAAAPwsJAAAAAAAAAAAAAAAvhsSAAAAAAAAAAA
  A7KpLAAAAAAAAAAAAAAAAAAAAAJsLCQAAAAAAAAAAADjelAAAAAAAAAAAKjDMAQAAA
  ACAZC8L2AEb"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[
a2646269747301636c737458bd78daeddc010dc0200c0041a88249400ad2903e0f4b
ba00bd93f002beb7a2a2010000a91e09000000000000000000000000000000807296
04000000000000000000000000000000000000000000000000000000000000000000
000000000000005c6f4800000000000000fc2c240000000000000000000000be1b12
000000000000000000ecaa4b000000000000000000000000000000009b0b09000000
00000000000038de9400000000000000002a30cc010000000080642f0bd8011b
]]></artwork>
      </section>
      <section numbered="false" anchor="bit-status-list-1">
        <name>2 bit Status List</name>
        <t>The following example uses a 2 bit Status List (4 possible values):</t>
        <artwork><![CDATA[
status[0]=1
status[1993]=2
status[25460]=1
status[159495]=3
status[495669]=1
status[554353]=1
status[645645]=2
status[723232]=1
status[854545]=1
status[934534]=2
status[1000345]=3
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 2,
  "lst": "eNrt2zENACEQAEEuoaBABP5VIO01fCjIHTMStt9ovGV
  IAAAAAABAbiEBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEB5WwIAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAID0ugQAAAAAAAAAAAAAAAAAQG12SgAAA
  AAAAAAAAAAAAAAAAAAAAAAAAOCSIQEAAAAAAAAAAAAAAAAAAAAAAAD8ExIAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwJEuAQAAAAAAAAAAAAAAAAAAAAAAAMB9S
  wIAAAAAAAAAAAAAAAAAAACoYUoAAAAAAAAAAAAAAEBqH81gAQw"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[
a2646269747302636c737459013d78daeddb310d00211000412ea1a04004fe5520ed
357c28c81d3312b6df68bc65480000000000406e2101000000000000000000000000
0000000000000000000000000000000000000040795b020000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000
0080f4ba0400000000000000000000000000406d764a000000000000000000000000
000000000000000000e0922101000000000000000000000000000000000000fc1312
00000000000000000000000000000000000000000000000000000000000000c0912e
01000000000000000000000000000000000000c07d4b020000000000000000000000
00000000a8614a0000000000000000000000406a1fcd60010c
]]></artwork>
      </section>
      <section numbered="false" anchor="bit-status-list-2">
        <name>4 bit Status List</name>
        <t>The following example uses a 4 bit Status List (16 possible values):</t>
        <artwork><![CDATA[
status[0]=1
status[1993]=2
status[35460]=3
status[459495]=4
status[595669]=5
status[754353]=6
status[845645]=7
status[923232]=8
status[924445]=9
status[934534]=10
status[1004534]=11
status[1000345]=12
status[1030203]=13
status[1030204]=14
status[1030205]=15
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 4,
  "lst": "eNrt0EENgDAQADAIHwImkIIEJEwCUpCEBBQRHOy35Li
  1EjoOQGabAgAAAAAAAAAAAAAAAAAAACC1SQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABADrsCAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAADoxaEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIIoCgAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACArpwKAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAGhqVkAzlwIAAAAAiGVRAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAABx3AoAgLpVAQAAAAAAAAAAAAAAwM89rwMAAAAAAAAAA
  AjsA9xMBMA"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[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]]></artwork>
      </section>
      <section numbered="false" anchor="bit-status-list-3">
        <name>8 bit Status List</name>
        <t>The following example uses a 8 bit Status List (256 possible values):</t>
        <artwork><![CDATA[
status[233478] = 0
status[52451] = 1
status[576778] = 2
status[513575] = 3
status[468106] = 4
status[292632] = 5
status[214947] = 6
status[182323] = 7
status[884834] = 8
status[66653] = 9
status[62489] = 10
status[196493] = 11
status[458517] = 12
status[487925] = 13
status[55649] = 14
status[416992] = 15
status[879796] = 16
status[462297] = 17
status[942059] = 18
status[583408] = 19
status[13628] = 20
status[334829] = 21
status[886286] = 22
status[713557] = 23
status[582738] = 24
status[326064] = 25
status[451545] = 26
status[705889] = 27
status[214350] = 28
status[194502] = 29
status[796765] = 30
status[202828] = 31
status[752834] = 32
status[721327] = 33
status[554740] = 34
status[91122] = 35
status[963483] = 36
status[261779] = 37
status[793844] = 38
status[165255] = 39
status[614839] = 40
status[758403] = 41
status[403258] = 42
status[145867] = 43
status[96100] = 44
status[477937] = 45
status[606890] = 46
status[167335] = 47
status[488197] = 48
status[211815] = 49
status[797182] = 50
status[582952] = 51
status[950870] = 52
status[765108] = 53
status[341110] = 54
status[776325] = 55
status[745056] = 56
status[439368] = 57
status[559893] = 58
status[149741] = 59
status[358903] = 60
status[513405] = 61
status[342679] = 62
status[969429] = 63
status[795775] = 64
status[566121] = 65
status[460566] = 66
status[680070] = 67
status[117310] = 68
status[480348] = 69
status[67319] = 70
status[661552] = 71
status[841303] = 72
status[561493] = 73
status[138807] = 74
status[442463] = 75
status[659927] = 76
status[445910] = 77
status[1046963] = 78
status[829700] = 79
status[962282] = 80
status[299623] = 81
status[555493] = 82
status[292826] = 83
status[517215] = 84
status[551009] = 85
status[898490] = 86
status[837603] = 87
status[759161] = 88
status[459948] = 89
status[290102] = 90
status[1034977] = 91
status[190650] = 92
status[98810] = 93
status[229950] = 94
status[320531] = 95
status[335506] = 96
status[885333] = 97
status[133227] = 98
status[806915] = 99
status[800313] = 100
status[981571] = 101
status[527253] = 102
status[24077] = 103
status[240232] = 104
status[559572] = 105
status[713399] = 106
status[233941] = 107
status[615514] = 108
status[911768] = 109
status[331680] = 110
status[951527] = 111
status[6805] = 112
status[552366] = 113
status[374660] = 114
status[223159] = 115
status[625884] = 116
status[417146] = 117
status[320527] = 118
status[784154] = 119
status[338792] = 120
status[1199] = 121
status[679804] = 122
status[1024680] = 123
status[40845] = 124
status[234603] = 125
status[761225] = 126
status[644903] = 127
status[502167] = 128
status[121477] = 129
status[505144] = 130
status[165165] = 131
status[179628] = 132
status[1019195] = 133
status[145149] = 134
status[263738] = 135
status[269256] = 136
status[996739] = 137
status[346296] = 138
status[555864] = 139
status[887384] = 140
status[444173] = 141
status[421844] = 142
status[653716] = 143
status[836747] = 144
status[783119] = 145
status[918762] = 146
status[946835] = 147
status[253764] = 148
status[519895] = 149
status[471224] = 150
status[134272] = 151
status[709016] = 152
status[44112] = 153
status[482585] = 154
status[461829] = 155
status[15080] = 156
status[148883] = 157
status[123467] = 158
status[480125] = 159
status[141348] = 160
status[65877] = 161
status[692958] = 162
status[148598] = 163
status[499131] = 164
status[584009] = 165
status[1017987] = 166
status[449287] = 167
status[277478] = 168
status[991262] = 169
status[509602] = 170
status[991896] = 171
status[853666] = 172
status[399318] = 173
status[197815] = 174
status[203278] = 175
status[903979] = 176
status[743015] = 177
status[888308] = 178
status[862143] = 179
status[979421] = 180
status[113605] = 181
status[206397] = 182
status[127113] = 183
status[844358] = 184
status[711569] = 185
status[229153] = 186
status[521470] = 187
status[401793] = 188
status[398896] = 189
status[940810] = 190
status[293983] = 191
status[884749] = 192
status[384802] = 193
status[584151] = 194
status[970201] = 195
status[523882] = 196
status[158093] = 197
status[929312] = 198
status[205329] = 199
status[106091] = 200
status[30949] = 201
status[195586] = 202
status[495723] = 203
status[348779] = 204
status[852312] = 205
status[1018463] = 206
status[1009481] = 207
status[448260] = 208
status[841042] = 209
status[122967] = 210
status[345269] = 211
status[794764] = 212
status[4520] = 213
status[818773] = 214
status[556171] = 215
status[954221] = 216
status[598210] = 217
status[887110] = 218
status[1020623] = 219
status[324632] = 220
status[398244] = 221
status[622241] = 222
status[456551] = 223
status[122648] = 224
status[127837] = 225
status[657676] = 226
status[119884] = 227
status[105156] = 228
status[999897] = 229
status[330160] = 230
status[119285] = 231
status[168005] = 232
status[389703] = 233
status[143699] = 234
status[142524] = 235
status[493258] = 236
status[846778] = 237
status[251420] = 238
status[516351] = 239
status[83344] = 240
status[171931] = 241
status[879178] = 242
status[663475] = 243
status[546865] = 244
status[428362] = 245
status[658891] = 246
status[500560] = 247
status[557034] = 248
status[830023] = 249
status[274471] = 250
status[629139] = 251
status[958869] = 252
status[663071] = 253
status[152133] = 254
status[19535] = 255
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 8,
  "lst": "eNrt0WOQM2kYhtGsbdu2bdu2bdu2bdu2bdu2jVnU1my
  -SWYm6U5enFPVf7ue97orFYAo7CQBAACQuuckAABStqUEAAAAAAAAtN6wEgAE71QJA
  AAAAIrwhwQAAAAAAdtAAgAAAAAAACLwkAQAAAAAAAAAAACUaFcJAACAeJwkAQAAAAA
  AAABQvL4kAAAAWmJwCQAAAAAAAAjAwBIAAAB06ywJoDKQBARpfgkAAAAAAAAAAAAAA
  AAAAACo50sJAAAAAAAAAOiRcSQAAAAAgAJNKgEAAG23mgQAAAAAAECw3pUAQvegBAA
  AAAAAAADduE4CAAAAyjSvBAAQiw8koHjvSABAb-wlARCONyVoxtMSZOd0CQAAAOjWD
  RKQmLckAAAAAACysLYEQGcnSAAAAAAQooUlAABI15kSAIH5RAIgLB9LABC4_SUgGZN
  IAABAmM6RoLbTJIASzCIBAEAhfpcAAAAAAABquk8CAAAAAAAAaJl9SvvzBOICAFWmk
  IBgfSgBAAAANOgrCQAAAAAAAADStK8EAAC03gASAAAAAAAAAADFWFUCAAAAMjOaBEA
  DHpYAQjCIBADduFwCAAAAAGitMSSI3BUSAECOHpAA6IHrJQAAAAAAsjeVBAAAKRpVA
  orWvwQAAAAAAAAAkKRtJAAAAAAAgCbcLAF0bXUJAAAAoF02kYDg7CYBAAAAAEB6NpQ
  AAAAAAAAAAAAAAEr1uQQAAF06VgIAAAAAAAAAqDaeBAAQqgMkAAAAAABogQMlAAAAA
  AAa87MEAAAQiwslAAAAAAAAAAAAAAAAMrOyBAAAiekv-hcsY0Sgne6QAAAAAAAgaUt
  JAAAAAAAAAAAAAAAAAAAAAAAAAADwt-07vjVkAAAAgDy8KgFAUEaSAAAAAJL3vgQAW
  dhcAgAAoBHDSUDo1pQAAACI2o4SAABZm14CALoyuwQAAPznGQkgZwdLAAAQukclAAA
  AAAAAAAAAgKbMKgEAAAAAAAAAAAAAAAAAAECftpYAAAAAAAAAAAAACnaXBAAAAADk7
  iMJAAAAAAAAAABqe00CAnGbBBG4TAIAgFDdKgFAXCaWAAAAAAAAAAAAAAAAAKAJQwR
  72XbGAQAAAKAhh0sAAAAAAABQgO8kAAAAAAAAAAAAACAaM0kAAAC5W0QCAIJ3mAQAx
  GwxCQAA6nhSAsjZBRIAANEbWQIAAAAAaJE3JACAwA0qAUBIVpKAlphbAiAPp0iQnKE
  kAAAAAAAgBP1KAAAAdOl4CQAAAAAAAPjLZBIAAG10RtrPm8_CAEBMTpYAAAAAAIjQY
  BL8z5QSAAAAAEDYPpUAACAsj0gAAADQkHMlAAjHDxIA0Lg9JQAAgHDsLQEAAABAQS6
  WAAAAgLjNFs2l_RgLAIAEfCEBlGZZCQAAaIHjJACgtlskAAAozb0SAAAAVFtfAgAAA
  AAAAAAAAAAAAAAAAAAAAKDDtxIAAAAAVZaTAKB5W0kAANCAsSUgJ0tL0GqHSNBbL0g
  AZflRAgCARG0kQXNmlgCABiwkAQAAAEB25pIAAAAAAAAAAAAAoFh9SwAAAAAAADWNm
  OSrpjFsEoaRgDKcF9Q1dxsEAAAAAAAAAAAAAAAAgPZ6SQIAAAAAAAAAgChMLgEAAAA
  AAAAAqZlQAsK2qQQAAAAAAAD06XUJAAAAqG9bCQAAgLD9IgEAAAAAAAAAAAAAAAAAA
  EBNe0gAAAAAAAAAAEBPHSEBAAAAlOZtCYA4fS8B0GFRCQAo0gISAOTgNwmC840EAAA
  AAAAAAAAAAAAAAAAAUJydJfjXPBIAAAAAAAAAAAAAAABk6WwJAAAAAAAAAAAAAAAAq
  G8UCQAAgPpOlAAAIA83SQAANWwc9HUjGAgAAAAAAACAusaSAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAqHKVBACQjxklAAAAAAAAAKBHxpQAAAAAACBME0lAdlaUAACyt7sEAAAA0
  Nl0EgAAAAAAAAAAAABA-8wgAQAAAAAAAKU4SgKgUtlBAgAAAAAAAAAAgMCMLwEE51k
  JICdzSgCJGl2CsE0tAQAA0L11JQAAAAAAAAjUOhIAAAAAAAAAAAAAAGTqeQkAAAAAA
  AAAAAAAKM8SEjTrJwkAAAAAAACocqQEULgVJAAAACjDUxJUKgtKAAAAqbpRAgCA0n0
  mAQAAAABAGzwmAUCTLpUAAAAAAAAAAEjZNRIAAAAAAAAAAAAAAAAAAAAA8I-vJaAlh
  pQAAAAAAHrvzjJ-OqCuuVlLAojP8BJAr70sQZVDJYAgXS0BAAAAAAAAAAAAtMnyEgA
  AAAAAFONKCQAAAAAAAADorc0kAAAAAAAAgDqOlgAAAAAAAAAAAADIwv0SAAAAAAAAA
  AAAAADBuV0CIFVDSwAAAABAAI6RAAAAAGIwrQSEZAsJAABouRclAAAAAKDDrxIAAAA
  0bkkJgFiMKwEAAAAAAHQyhwRk7h4JAAAAAAAAAAAgatdKAACUYj0JAAAAAAAAAAAAQ
  nORBLTFJRIAAAAAkIaDJAAAAJryngQAAAAAAAAAAAA98oQEAAAAAAAAAEC2zpcgWY9
  LQKL2kwAgGK9IAAAAAPHaRQIAAAAAAAAAAADIxyoSAAAAAAAAAAAAAADQFotLAECz_
  gQ1PX-B"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[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]]></artwork>
      </section>
    </section>
    <section numbered="false" anchor="document-history">
      <name>Document History</name>
      <t>-08</t>
      <ul spacing="normal">
        <li>
          <t>Fix cwt typ value to full media type</t>
        </li>
        <li>
          <t>Holders may also fetch and verify Status List Tokens</t>
        </li>
        <li>
          <t>Update terminology for referenced token and Status List Token</t>
        </li>
      </ul>
      <t>-07</t>
      <ul spacing="normal">
        <li>
          <t>add considerations about External Status Issuer or Status Provider</t>
        </li>
        <li>
          <t>add recommendations for Key Resolution and Trust Management</t>
        </li>
        <li>
          <t>add extended key usage extensions for x509</t>
        </li>
        <li>
          <t>Relying Parties avoiding correlatable Information</t>
        </li>
        <li>
          <t>editorial changes on terminology and Referenced Tokens</t>
        </li>
        <li>
          <t>clarify privacy consideration around one time use reference tokens</t>
        </li>
        <li>
          <t>explain the Status List Token size dependencies</t>
        </li>
        <li>
          <t>explain possibility to chunk Status List Tokens depending on Referenced Token's expiry date</t>
        </li>
        <li>
          <t>add short-lived tokens in the Rationale</t>
        </li>
        <li>
          <t>rename Status Mechanism Methods registry to Status Mechanisms registry</t>
        </li>
        <li>
          <t>changes as requested by IANA review</t>
        </li>
        <li>
          <t>emphasize that security and privacy considerations only apply to Status List and no other status mechanisms</t>
        </li>
        <li>
          <t>differentiate unlinkability between Issuer-RP and RP-RP</t>
        </li>
        <li>
          <t>add more test vectors for the status list encoding</t>
        </li>
        <li>
          <t>add prior art</t>
        </li>
        <li>
          <t>updated language around application specific status type values and assigned ranges for application specific usage</t>
        </li>
        <li>
          <t>add short security considerations section for mac based deployments</t>
        </li>
        <li>
          <t>privacy considerations for other status types like suspended</t>
        </li>
        <li>
          <t>fix aggregation_uri text in referenced token</t>
        </li>
        <li>
          <t>mention key resolution in validation rules</t>
        </li>
      </ul>
      <t>-06</t>
      <ul spacing="normal">
        <li>
          <t>iana registration text updated with update procedures</t>
        </li>
        <li>
          <t>explicitly mention that status list is expected to be contained in cryptographically secured containers</t>
        </li>
        <li>
          <t>reworked and simplified introduction and abstract</t>
        </li>
        <li>
          <t>specify http status codes and allow redirects</t>
        </li>
        <li>
          <t>add status_list_aggregation_endpoint OAuth metadata</t>
        </li>
        <li>
          <t>remove unsigned options (json/cbor) of status list</t>
        </li>
        <li>
          <t>add section about mixing status list formats and media type</t>
        </li>
        <li>
          <t>fixes from IETF review</t>
        </li>
        <li>
          <t>update guidance around ttl</t>
        </li>
        <li>
          <t>add guidance around aggregation endpoint</t>
        </li>
      </ul>
      <t>-05</t>
      <ul spacing="normal">
        <li>
          <t>add optional support for historical requests</t>
        </li>
        <li>
          <t>update CBOR claim definitions</t>
        </li>
        <li>
          <t>improve section on Status Types and introduce IANA registry for it</t>
        </li>
        <li>
          <t>add Status Issuer and Status Provider role description to the introduction/terminology</t>
        </li>
        <li>
          <t>add information on third party hosting to security consideration</t>
        </li>
        <li>
          <t>remove constraint that Status List Token must not use a MAC</t>
        </li>
      </ul>
      <t>-04</t>
      <ul spacing="normal">
        <li>
          <t>add mDL example as Referenced Token and consolidate CWT and CBOR sections</t>
        </li>
        <li>
          <t>add implementation consideration for Default Values, Double Allocation and Status List Size</t>
        </li>
        <li>
          <t>add privacy consideration on using private relay protocols</t>
        </li>
        <li>
          <t>add privacy consideration on observability of outsiders</t>
        </li>
        <li>
          <t>add security considerations on correct parsing and decoding</t>
        </li>
        <li>
          <t>remove requirement for matching iss claim in Referenced Token and Status List Token</t>
        </li>
        <li>
          <t>add sd-jwt-vc example</t>
        </li>
        <li>
          <t>fix CWT status_list map encoding</t>
        </li>
        <li>
          <t>editorial fixes</t>
        </li>
        <li>
          <t>add CORS considerations to the http endpoint</t>
        </li>
        <li>
          <t>fix reference of Status List in CBOR format</t>
        </li>
        <li>
          <t>added status_list CWT claim key assigned</t>
        </li>
        <li>
          <t>move base64url definition to terminology</t>
        </li>
      </ul>
      <t>-03</t>
      <ul spacing="normal">
        <li>
          <t>remove unused reference to RFC9111</t>
        </li>
        <li>
          <t>add validation rules for status list token</t>
        </li>
        <li>
          <t>introduce the status list aggregation mechanism</t>
        </li>
        <li>
          <t>relax requirements for status_list claims to contain other parameters</t>
        </li>
        <li>
          <t>change cwt referenced token example to hex and annotated hex</t>
        </li>
        <li>
          <t>require TLS only for fetching Status List, not for Status List Token</t>
        </li>
        <li>
          <t>remove the undefined phrase Status List endpoint</t>
        </li>
        <li>
          <t>remove http caching in favor of the new ttl claim</t>
        </li>
        <li>
          <t>clarify the sub claim of Status List Token</t>
        </li>
        <li>
          <t>relax status_list iss requirements for CWT</t>
        </li>
        <li>
          <t>Fixes missing parts &amp; iana ttl registration in CWT examples</t>
        </li>
      </ul>
      <t>-02</t>
      <ul spacing="normal">
        <li>
          <t>add ttl claim to Status List Token to convey caching</t>
        </li>
        <li>
          <t>relax requirements on referenced token</t>
        </li>
        <li>
          <t>clarify Deflate / zlib compression</t>
        </li>
        <li>
          <t>make a reference to the Issuer-Holder-Verifier model of SD-JWT VC</t>
        </li>
        <li>
          <t>add COSE/CWT/CBOR encoding</t>
        </li>
      </ul>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Rename title of the draft</t>
        </li>
        <li>
          <t>add design consideration to the introduction</t>
        </li>
        <li>
          <t>Change status claim to in referenced token to allow re-use for other mechanisms</t>
        </li>
        <li>
          <t>Add IANA Registry for status mechanisms</t>
        </li>
        <li>
          <t>restructure the sections of this document</t>
        </li>
        <li>
          <t>add option to return an unsigned Status List</t>
        </li>
        <li>
          <t>Changing compression from gzip to zlib</t>
        </li>
        <li>
          <t>Change typo in Status List Token sub claim description</t>
        </li>
        <li>
          <t>Add access token as an example use-case</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft after working group adoption</t>
        </li>
        <li>
          <t>update acknowledgments</t>
        </li>
        <li>
          <t>renamed Verifier to Relying Party</t>
        </li>
        <li>
          <t>added IANA consideration</t>
        </li>
      </ul>
      <t>[ draft-ietf-oauth-status-list ]</t>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Applied editorial improvements suggested by Michael Jones.</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
