<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-oauth-status-list-01" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.2 -->
  <front>
    <title>Token Status List</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-status-list-01"/>
    <author fullname="Tobias Looker">
      <organization>MATTR</organization>
      <address>
        <email>tobias.looker@mattr.global</email>
      </address>
    </author>
    <author fullname="Paul Bastian">
      <organization/>
      <address>
        <email>paul.bastian@posteo.de</email>
      </address>
    </author>
    <author fullname="Christian Bormann">
      <organization/>
      <address>
        <email>chris.bormann@gmx.de</email>
      </address>
    </author>
    <date year="2024" month="February" day="06"/>
    <abstract>
      <?line 42?>

<t>This specification defines status list data structures for representing the status of JSON Web Tokens (JWTs) <xref target="RFC7519"/> and CBOR Web Tokens (CWTs) <xref target="RFC8392"/>.
The status list data structures themselves are also represented as JWTs or CWTs.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://vcstuff.github.io/draft-ietf-oauth-status-list/draft-ietf-oauth-status-list.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/vcstuff/draft-ietf-oauth-status-list"/>.</t>
    </note>
  </front>
  <middle>
    <?line 47?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>JSON Web Tokens (JWTs) <xref target="RFC7519"/> and CBOR Web Tokens (CWTs) <xref target="RFC8392"/> as secure token formats, have vast possible applications. Some of these applications can involve issuing a token whereby certain semantics about the token can change over time, which are important to be able to communicate to relying parties in an interoperable manner, such as whether the token is considered invalidated or suspended by its issuer.</t>
      <t>This document defines a Status List and its representations in JSON and CBOR formats that describe the individual statuses of multiple Referenced Tokens, which themselves are JWTs or CWTs. The statuses of all Referenced Tokens are conveyed via a bit array in the Status List. Each Referenced Token is allocated an index during issuance that represents its position within this bit array. The value of the bit(s) at this index correspond to the Referenced Token's status. A Status List may either be provided by an endpoint or be signed and embedded into a Status List Token, whereas this document defines its representations in JWT and CWT. Status Lists may be composed for expressing a range of Status Types. This document defines basic Status Types for the most common use cases as well as an extensibility mechanism for custom Status Types. The document also defines how an issuer of a Referenced Token references a Status List (Token).</t>
      <t>An example for the usage of a Status List is to manage the status of issued access tokens as defined in section 1.4 of <xref target="RFC6749"/>. Token Introspection <xref target="RFC7662"/> defines another way to determine the status of an issued access token, but it requires the party trying to validate an access tokens status to directly contact the token issuer, whereas the mechanism defined in this specification does not have this limitation.</t>
      <t>Another possible use case for the Status List is to express the status of verifiable credentials (Referenced Tokens) issued by an issuer in the Issuer-Holder-Verifier model.
The following diagram depicts the basic conceptual relationship.</t>
      <artwork type="ascii-art"><![CDATA[
+-------------------+                  +------------------------+
|                   | describes status |                        |
|    Status List    +----------------->|    Referenced Token    |
|   (JSON or CBOR)  <------------------+     (JWT or CWT)       |
|                   |   references     |                        |
+-------+-----------+                  +--------+---------------+
        |
        |embedded in
        v
+-------------------+
|                   |
| Status List Token |
|  (JWT or CWT)     |
|                   |
+-------------------+

]]></artwork>
      <section anchor="rationale">
        <name>Rationale</name>
        <t>Revocation mechanisms are an essential part for most identity ecosystems. In the past, revocation of X.509 TLS certificates has been proven difficult. Traditional certificate revocation lists (CRLs) have limited scalability; Online Certificate Status Protocol (OCSP) has additional privacy risks, since the client is leaking the requested website to a third party. OCSP stapling is addressing some of these problems at the cost of less up-to-date data. Modern approaches use accumulator-based revocation registries and Zero-Knowledge-Proofs to accommodate for this privacy gap, but face scalability issues again.</t>
        <t>This specification seeks to find a balance between scalability, security, and privacy by minimizing the status information to mere bits (often a single bit) and compressing the resulting binary data. Thereby, a Status List may contain statuses of many thousands or millions Referenced Tokens while remaining as small as possible. Placing large amounts of Referenced Tokens into the same list also enables herd privacy relative to the Issuer.</t>
        <t>This specification establishes the IANA "Status Mechanism Methods" registry for status mechanism and registers the members defined by this specification. Other specifications can register other members used for status retrieval.</t>
      </section>
      <section anchor="design-considerations">
        <name>Design Considerations</name>
        <t>The decisions taken in this specification aim to achieve the following design goals:</t>
        <ul spacing="normal">
          <li>
            <t>the specification shall favor a simple and easy to understand concept</t>
          </li>
          <li>
            <t>the specification shall be easy, fast and secure to implement in all major programming languages</t>
          </li>
          <li>
            <t>the specification shall be optimized to support the most common use cases and avoid unnecessary complexity of corner cases</t>
          </li>
          <li>
            <t>the Status List shall scale up to millions of tokens to support large scale government or enterprise use cases</t>
          </li>
          <li>
            <t>the Status List shall enable caching policies and offline support</t>
          </li>
          <li>
            <t>the specification shall support JSON and CBOR based tokens</t>
          </li>
          <li>
            <t>the specification shall not specify key resolution or trust frameworks</t>
          </li>
          <li>
            <t>the specification shall design an extension point to convey information about the status of a token that can be re-used by other mechanisms</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>Issuer:</dt>
        <dd>
          <t>An entity that issues the Referenced Token and provides the status information of the Referenced Token by serving a Status List Token on a public endpoint.</t>
        </dd>
        <dt>Relying Party:</dt>
        <dd>
          <t>An entity that relies on the Status List to validate the status of the Referenced Token. Also known as Verifier.</t>
        </dd>
        <dt>Status List:</dt>
        <dd>
          <t>An object in JSON or CBOR representation containing a bit array that lists the statuses of many Referenced Tokens.</t>
        </dd>
        <dt>Status List Token:</dt>
        <dd>
          <t>A token in JWT or CWT representation that contains a cryptographically secured Status List.</t>
        </dd>
        <dt>Referenced Token:</dt>
        <dd>
          <t>A token in JWT or CWT representation which contains a reference to a Status List or Status List Token. The information from the contained Status List may give a Relying Party additional information about up-to-date status of the Referenced Token.</t>
        </dd>
      </dl>
    </section>
    <section anchor="status-list">
      <name>Status List</name>
      <t>A Status List is a byte array that contains the statuses of many Referenced Tokens represented by one or multiple bits. A common representation of a Status List is composed by the following algorithm:</t>
      <ol spacing="normal" type="1"><li>
          <t>Each status of a Referenced Token <bcp14>MUST</bcp14> be represented with a bit-size of 1,2,4, or 8. Therefore up to 2,4,16, or 256 statuses for a Referenced Token are possible, depending on the bit-size. This limitation is intended to limit bit manipulation necessary to a single byte for every operation and thus keeping implementations simpler and less error prone.</t>
        </li>
        <li>
          <t>The overall Status List is encoded as a byte array. Depending on the bit-size, each byte corresponds to 8/(#bit-size) statuses (8,4,2, or 1). The status of each Referenced Token is identified using the index that maps to one or more specific bits within the byte array. The index starts counting at 0 and ends with "size" - 1 (being the last valid entry). The bits within an array are counted from least significant bit "0" to the most significant bit ("7"). All bits of the byte array at a particular index are set to a status value.</t>
        </li>
        <li>
          <t>The complete byte array is compressed using the "DEFLATE" <xref target="RFC1951"/> compression method and stored using the "ZLIB" <xref target="RFC1950"/> data format. Implementations are <bcp14>RECOMMENDED</bcp14> to use the highest compression level available.</t>
        </li>
      </ol>
      <t>The following example illustrates a Status List that represents the statuses of 16 Referenced Tokens, requiring 16 bits (2 bytes) for the uncompressed byte array:</t>
      <artwork type="ascii-art"><![CDATA[
status[0] = 1
status[1] = 0
status[2] = 0
status[3] = 1
status[4] = 1
status[5] = 1
status[6] = 0
status[7] = 1
status[8] = 1
status[9] = 1
status[10] = 0
status[11] = 0
status[12] = 0
status[13] = 1
status[14] = 0
status[15] = 1
]]></artwork>
      <t>These bits are concatenated:</t>
      <artwork type="ascii-art"><![CDATA[
byte             0                  1               2
bit       7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0    7
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+...
values   |1|0|1|1|1|0|0|1|  |1|0|1|0|0|0|1|1|  |0|...
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+...
index     7 6 5 4 3 2 1 0   15   ...  10 9 8   23
         \_______________/  \_______________/
                0xB9               0xA3

]]></artwork>
      <section anchor="status-list-json">
        <name>Status List in JSON Format</name>
        <t>This section defines the structure for a JSON-encoded Status List:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14>. JSON Object that contains a Status List. The object contains exactly two claims:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>bits</tt>: <bcp14>REQUIRED</bcp14>. JSON Integer specifying the number of bits per Referenced Token in the Status List (<tt>lst</tt>). The allowed values for <tt>bits</tt> are 1,2,4 and 8.</t>
              </li>
              <li>
                <t><tt>lst</tt>: <bcp14>REQUIRED</bcp14>. JSON String that contains the status values for all the Referenced Tokens it conveys statuses for. The value <bcp14>MUST</bcp14> be the base64url-encoded (as defined in Section 2 of <xref target="RFC7515"/>) Status List as specified in <xref target="status-list"/>.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following example illustrates the JSON representation of the Status List:</t>
        <artwork><![CDATA[
byte_array = [0xb9, 0xa3] 
encoded:
{
  "bits": 1,
  "lst": "eNrbuRgAAhcBXQ"
}
]]></artwork>
      </section>
      <section anchor="status-list-cbor">
        <name>Status List in CBOR Format</name>
        <t>TBD</t>
      </section>
    </section>
    <section anchor="status-list-token">
      <name>Status List Token</name>
      <t>A Status List Token embeds the Status List into a token that is cryptographically signed and protects the integrity of the Status List. This allows for the Status List Token to be hosted by third parties or be transferred for offline use cases.</t>
      <t>This section specifies Status List Tokens in Json Web Token (JWT) and Cbor Web Token (CWT) format.</t>
      <section anchor="status-list-token-jwt">
        <name>Status List Token in JWT Format</name>
        <t>The Status List Token <bcp14>MUST</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/>.</t>
        <t>The following content applies to the JWT Header:</t>
        <ul spacing="normal">
          <li>
            <t><tt>typ</tt>: <bcp14>REQUIRED</bcp14>. The JWT type <bcp14>MUST</bcp14> be <tt>statuslist+jwt</tt>.</t>
          </li>
        </ul>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>iss</tt>: <bcp14>REQUIRED</bcp14>. The <tt>iss</tt> (issuer) claim <bcp14>MUST</bcp14> specify a unique string identifier for the entity that issued the Status List Token. In the absence of an application profile specifying otherwise, compliant applications <bcp14>MUST</bcp14> compare issuer values using the Simple String Comparison method defined in Section 6.2.1 of <xref target="RFC3986"/>. The value <bcp14>MUST</bcp14> be equal to that of the <tt>iss</tt> claim contained within the Referenced Token.</t>
          </li>
          <li>
            <t><tt>sub</tt>: <bcp14>REQUIRED</bcp14>. The <tt>sub</tt> (subject) claim <bcp14>MUST</bcp14> specify a unique string identifier for that Status List Token. The value <bcp14>MUST</bcp14> be equal to that of the <tt>uri</tt> claim contained in the <tt>status_list</tt> claim of the Referenced Token.</t>
          </li>
          <li>
            <t><tt>iat</tt>: <bcp14>REQUIRED</bcp14>. The <tt>iat</tt> (issued at) claim <bcp14>MUST</bcp14> specify the time at which the Status List Token was issued.</t>
          </li>
          <li>
            <t><tt>exp</tt>: <bcp14>OPTIONAL</bcp14>. The <tt>exp</tt> (expiration time) claim <bcp14>MAY</bcp14> convey the time at which it is considered expired by its issuer.</t>
          </li>
          <li>
            <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status_list</tt> (status list) claim <bcp14>MUST</bcp14> specify the Status List conforming to the rules outlined in <xref target="status-list-json"/>.</t>
          </li>
        </ul>
        <t>The following additional rules apply:</t>
        <ol spacing="normal" type="1"><li>
            <t>The JWT <bcp14>MAY</bcp14> contain other claims.</t>
          </li>
          <li>
            <t>The JWT <bcp14>MUST</bcp14> be digitally signed using an asymmetric cryptographic algorithm. Relying parties <bcp14>MUST</bcp14> reject the JWT if it is using a Message Authentication Code (MAC) algorithm. Relying parties <bcp14>MUST</bcp14> reject JWTs with an invalid signature.</t>
          </li>
          <li>
            <t>Relying parties <bcp14>MUST</bcp14> reject JWTs that are not valid in all other respects per "JSON Web Token (JWT)" <xref target="RFC7519"/>.</t>
          </li>
          <li>
            <t>Application of additional restrictions and policy are at the discretion of the verifying party.</t>
          </li>
        </ol>
        <t>The following is a non-normative example for a Status List Token in JWT format:</t>
        <artwork><![CDATA[
{
  "alg": "ES256",
  "kid": "12",
  "typ": "statuslist+jwt"
}
.
{
  "exp": 2291720170,
  "iat": 1686920170,
  "iss": "https://example.com",
  "status_list": {
    "bits": 1,
    "lst": "eNrbuRgAAhcBXQ"
  },
  "sub": "https://example.com/statuslists/1"
}
]]></artwork>
      </section>
      <section anchor="status-list-token-cwt">
        <name>Status List Token in CWT Format</name>
        <t>TBD</t>
      </section>
    </section>
    <section anchor="referenced-token">
      <name>Referenced Token</name>
      <section anchor="status-claim">
        <name>Status Claim</name>
        <t>By including a "status" claim in a Referenced Token, the issuer is referencing a mechanism to retrieve status information about this Referenced Token. The claim contains members used to reference to a status list as defined in this specification. Other members of the "status" object may be defined by other specifications. This is analogous to "cnf" claim in Section 3.1 of <xref target="RFC7800"/> in which different authenticity confirmation methods can be included.</t>
      </section>
      <section anchor="referenced-token-jwt">
        <name>Referenced Token in JWT Format</name>
        <t>The Referenced Token <bcp14>MUST</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/>.</t>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>iss</tt>: <bcp14>REQUIRED</bcp14>. The <tt>iss</tt> (issuer) claim <bcp14>MUST</bcp14> specify a unique string identifier for the entity that issued the Referenced Token. In the absence of an application profile specifying otherwise, compliant applications <bcp14>MUST</bcp14> compare issuer values using the Simple String Comparison method defined in Section 6.2.1 of <xref target="RFC3986"/>. The value <bcp14>MUST</bcp14> be equal to that of the <tt>iss</tt> claim contained within the referenced Status List Token.</t>
          </li>
          <li>
            <t><tt>status</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status</tt> (status) claim <bcp14>MUST</bcp14> specify a JSON Object that contains at least one reference to a status mechanism.
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14> when the status list mechanism defined in this specification is used. It contains a reference to a Status List or Status List Token. The object contains exactly two claims:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>idx</tt>: <bcp14>REQUIRED</bcp14>. The <tt>idx</tt> (index) claim <bcp14>MUST</bcp14> specify an Integer that represents the index to check for status information in the Status List for the current Referenced Token. The value of <tt>idx</tt> <bcp14>MUST</bcp14> be a non-negative number, containing a value of zero or greater.</t>
                  </li>
                  <li>
                    <t><tt>uri</tt>: <bcp14>REQUIRED</bcp14>. The <tt>uri</tt> (URI) claim <bcp14>MUST</bcp14> specify a String value that identifies the Status List or Status List Token containing the status information for the Referenced Token. The value of <tt>uri</tt> <bcp14>MUST</bcp14> be a URI conforming to <xref target="RFC3986"/>.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <t>Application of additional restrictions and policy are at the discretion of the verifying party.</t>
        <t>The following is a non-normative example for a decoded header and payload of a Referenced Token:</t>
        <artwork type="ascii-art"><![CDATA[
{
  "alg": "ES256",
  "kid": "11"
}
.
{
  "iss": "https://example.com",
  "status": {
    "status_list": {
      "idx": 0,
      "uri": "https://example.com/statuslists/1"
    }
  }
}
]]></artwork>
      </section>
      <section anchor="referenced-token-cwt">
        <name>Referenced Token in CWT/CBOR Format</name>
        <t>TBD</t>
      </section>
    </section>
    <section anchor="status-types">
      <name>Status Types</name>
      <t>This document defines potential statuses of Referenced Tokens as Status Type values. If the Status List contains more than one bit per token (as defined by "bits" in the Status List), then the whole value of bits <bcp14>MUST</bcp14> describe one value. A Status List can not represent multiple statuses per Referenced Token.</t>
      <t>The registry in this document describes the basic Status Type values required for the most common use cases.
Additional values may defined for particular use cases.</t>
      <section anchor="status-types-values">
        <name>Status Types Values</name>
        <t>A status describes the state, mode, condition or stage of an entity that is described by the Status List. Status Types <bcp14>MUST</bcp14> be numeric values between 0 and 255.
Status types described by this specification comprise:</t>
        <ul spacing="normal">
          <li>
            <t>0x00 - "VALID" - The status of the Token is valid, correct or legal.</t>
          </li>
          <li>
            <t>0x01 - "INVALID" - The status of the Token is revoked, annulled, taken back, recalled or cancelled. This state is irreversible.</t>
          </li>
          <li>
            <t>0x02 - "SUSPENDED" - The status of the Token is temporarily invalid, hanging, debarred from privilege. This state is reversible.</t>
          </li>
        </ul>
        <t>The issuer of the Status List <bcp14>MUST</bcp14> choose an adequate <tt>bits</tt> (bit size) to be able to describe the required Status Types for the application.</t>
        <t>The processing rules for JWT or CWT precede any evaluation of a Referenced Token's status. For example, if a token is evaluated as being expired through the "exp" (Expiration Time) but also has a status of 0x00 ("VALID"), the token is considered expired.</t>
      </section>
    </section>
    <section anchor="verification-and-processing">
      <name>Verification and Processing</name>
      <section anchor="status-list-request">
        <name>Status List Request</name>
        <t>To obtain the Status List or Status List Token, the Relying Party <bcp14>MUST</bcp14> send a HTTP GET request to the Status List Endpoint. Communication with the Status List Endpoint <bcp14>MUST</bcp14> utilize TLS. Which version(s) should be implemented will vary over time. A TLS server certificate check <bcp14>MUST</bcp14> be performed as defined in Section 5 and 6 of <xref target="RFC6125"/>.</t>
        <t>The Relying Party <bcp14>SHOULD</bcp14> send the following Accept-Header to indicate the requested response type:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+json" for Status List in JSON format</t>
          </li>
          <li>
            <t>"application/statuslist+jwt" for Status List in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cbor" for Status List in CBOR format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List in CWT format</t>
          </li>
        </ul>
        <t>If the Relying Party does not send an Accept Header, the response type is assumed to be known implicit or out-of-band.</t>
      </section>
      <section anchor="status-list-response">
        <name>Status List Response</name>
        <t>In the successful response, the Status List Provider <bcp14>MUST</bcp14> use the following content-type:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+json" for Status List in JSON format</t>
          </li>
          <li>
            <t>"application/statuslist+jwt" for Status List in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cbor" for Status List in CBOR format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List in CWT format</t>
          </li>
        </ul>
        <t>In the case of "application/statuslist+json", the response <bcp14>MUST</bcp14> be of type JSON and follow the rules of <xref target="status-list-json"/>.
In the case of "application/statuslist+jwt", the response <bcp14>MUST</bcp14> be of type JWT and follow the rules of <xref target="status-list-token-jwt"/>.
In the case of "application/statuslist+cbor", the response <bcp14>MUST</bcp14> be of type CBOR and follow the rules of <xref target="status-list-cbor"/>.
In the case of "application/statuslist+cwt", the response <bcp14>MUST</bcp14> be of type CWT and follow the rules of <xref target="status-list-token-cwt"/>.</t>
        <t>The HTTP response <bcp14>SHOULD</bcp14> use gzip Content-Encoding as defined in <xref target="RFC9110"/>.</t>
      </section>
      <section anchor="caching">
        <name>Caching</name>
        <t>If caching is required (e.g., to enable the use of alternative mechanisms for hosting, like Content Delivery Networks), the control of the caching mechanism <bcp14>SHOULD</bcp14> be implemented using the standard HTTP Cache-Control as defined in <xref target="RFC9111"/>.</t>
      </section>
      <section anchor="validation-rules">
        <name>Validation Rules</name>
        <t>TBD</t>
      </section>
    </section>
    <section anchor="further-examples">
      <name>Further Examples</name>
      <section anchor="status-list-token-with-2-bit-status-values-in-jwt-format">
        <name>Status List Token with 2-Bit Status Values in JWT format</name>
        <t>In this example, the Status List additionally includes the Status Type "SUSPENDED". As the Status Type value for "SUSPENDED" is 0x02 and does not fit into 1 bit, the "bits" is required to be 2.</t>
        <t>This example Status List represents the status of 12 Referenced Tokens, requiring 24 bits (3 bytes) of status.</t>
        <artwork type="ascii-art"><![CDATA[
status[0] = 1
status[1] = 2
status[2] = 0
status[3] = 3
status[4] = 0
status[5] = 1
status[6] = 0
status[7] = 1
status[8] = 1
status[9] = 2
status[10] = 3
status[11] = 3
]]></artwork>
        <t>These bits are concatenated:</t>
        <artwork type="ascii-art"><![CDATA[
byte             0                  1                  2
bit       7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
values   |1|1|0|0|1|0|0|1|  |0|1|0|0|0|1|0|0|  |1|1|1|1|1|0|0|1|
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
          \ / \ / \ / \ /    \ / \ / \ / \ /    \ / \ / \ / \ /
status     3   0   2   1      1   0   1   0      3   3   2   1
index      3   2   1   0      7   6   5   4      11  10  9   8
           \___________/      \___________/      \___________/
                0xC9               0x44               0xF9

]]></artwork>
        <t>Resulting in the byte array and compressed/base64url encoded status list:</t>
        <artwork><![CDATA[
byte_array = [0xc9, 0x44, 0xf9] 
encoded:
{
  "bits": 2,
  "lst": "eNo76fITAAPfAgc"
}
]]></artwork>
      </section>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <section anchor="correct-decoding-and-parsing-of-the-encoded-status-list">
        <name>Correct decoding and parsing of the encoded status list</name>
        <t>TODO elaborate on risks of incorrect parsing/decoding leading to erroneous status data</t>
      </section>
      <section anchor="cached-and-stale-status-lists">
        <name>Cached and Stale status lists</name>
        <t>TODO consumers/Relying Party of the status list should be aware if they fetch the up-to-date data</t>
      </section>
      <section anchor="security-authorization">
        <name>Authorized access to the Status List</name>
        <t>TODO elaborate on authorization mechanisms preventing misuse and profiling as described in privacy section</t>
      </section>
      <section anchor="history">
        <name>History</name>
        <t>TODO elaborate on status list only providing the up-to date/latest status, no historical data, may be provided by the underlying hosting architecture</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <section anchor="privacy-issuer">
        <name>Issuer tracking and Herd Privacy</name>
        <t>The main privacy consideration for a Status List, especially in the context of the Issuer-Holder-Verifier model, is to prevent the Issuer from tracking the usage of the Referenced Token when the status is being checked. If an Issuer offers status information by referencing a specific token, this would enable him to create a profile for the issued token by correlating the date and identity of Relying Parties, that are requesting the status.</t>
        <t>The Status List approaches these privacy implications by integrating the status information of many Referenced Tokens into the same list. Therefore, the Issuer does not learn for which Referenced Token the Relying Party is requesting the Status List. The privacy of the Holder is protected by the anonymity within the set of Referenced Tokens in the Status List, also called herd privacy. This limits the possibilities of tracking by the Issuer.</t>
        <t>The herd privacy is depending on the number of entities within the Status List called its size. A larger size results in better privacy but also impacts the performance as more data has to be transferred to read the Status List.</t>
      </section>
      <section anchor="malicious-issuers">
        <name>Malicious Issuers</name>
        <t>A malicious Issuer could bypass the privacy benefits of the herd privacy by generating a unique Status List for every Referenced Token. By these means, he could maintain a mapping between Referenced Tokens and Status Lists and thus track the usage of Referenced Tokens by utilizing this mapping for the incoming requests. This malicious behaviour could be detected by Relying Parties that request large amounts of Referenced Tokens by comparing the number of different Status Lists and their sizes.</t>
      </section>
      <section anchor="privacy-relying-party">
        <name>Relying Party tracking</name>
        <t>Once the Relying Party gets the Referenced Token, this enables him to request the Status List to validate the status of the Token through the provided "uri" property and look up the corresponding "index". However, the Relying Party may persistently store the "uri" and "index" of the Referenced Token to request the Status List again at a later time. By doing so regularly, the Relying Party may create a profile of the Referenced Token's validity status. This behaviour may be intended as a feature, e.g. for a KYC process that requires regular validity checks, but might also be abused in cases where this is not intended and unknown to the Holder, e.g. profiling the suspension of a driving license or checking the employment status of an employee credential. This behaviour could be constrained by adding authorization rules to the Status List, see <xref target="security-authorization"/>.</t>
      </section>
      <section anchor="correlation-risks-and-tracking">
        <name>Correlation Risks and Tracking</name>
        <t>Colluding Issuers and Relying Parties have the possibility to identify the usage of credentials of a particular Holder, as the Referenced Token contains unique, trackable data.</t>
        <t>To avoid privacy risks for colluding Relying Parties, it is recommended that Issuers use batch issuance to issue multiple tokens, such that Holders can use individual tokens for specific Relying Parties. In this case, every Referenced Token <bcp14>MUST</bcp14> have a dedicated Status List entry. Revoking batch issued Referenced Tokens might reveal this correlation later on.</t>
        <t>To avoid information leakage by the values of "uri" and "index", Issuers are <bcp14>RECOMMENDED</bcp14> to:</t>
        <ul spacing="normal">
          <li>
            <t>choose non-sequential, pseudo-random or random indices</t>
          </li>
          <li>
            <t>use decoy or dead entries to obfuscate the real number of Referenced Tokens within a Status List</t>
          </li>
          <li>
            <t>choose to deploy and utilize multiple Status Lists simultaneously</t>
          </li>
        </ul>
      </section>
      <section anchor="third-party-hosting">
        <name>Third Party Hosting</name>
        <t>TODO elaborate on increased privacy if the status list is hosted by a third party instead of the issuer reducing tracking possibilities
TODO evaluate definition of Status List Provider?
 An entity that hosts the Status List as a resource for potential Relying Parties. The Status List Provider may be the issuer of the Status List but may also be outsourced to a trusted third party.</t>
      </section>
    </section>
    <section anchor="implementation">
      <name>Implementation Considerations</name>
      <t>TBD Declare whether JWT and CWT representations can be used interchangeably by the same issuer.  For instance, declare whether a status list can reference both JWT and CWT tokens.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="json-web-token-claims-registration">
        <name>JSON Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "JSON Web Token Claims" registry <xref target="IANA.JWT"/> established by <xref target="RFC7519"/>.</t>
        <section anchor="registry-contents">
          <name>Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Description: Reference to a status or validity mechanism containing up-to-date status information on the JWT.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s):  <xref target="status-claim"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="iana-registry">
        <name>JWT Status Mechanism Methods Registry</name>
        <t>This specification establishes the IANA "Status Mechanism Methods" registry for JWT "status" member values. The registry records the status mechanism method member and a reference to the specification that defines it.</t>
        <section anchor="registration-template">
          <name>Registration Template</name>
          <t>Status Method Value:</t>
          <ul empty="true">
            <li>
              <t>The name requested (e.g., "status_list"). The name is case sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts state that there is a compelling reason to allow an exception.</t>
            </li>
          </ul>
          <t>Status Method Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the status mechanism method.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For Standards Track RFCs, list the "IESG".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents.  An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Method Value: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Status Method Description: A status list containing up-to-date status information on multiple other JWTs encoded as a bitarray.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s):  <xref target="referenced-token-jwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="media-type-registration">
        <name>Media Type Registration</name>
        <t>This section requests registration of the following media types [@RFC2046] in
the "Media Types" registry [@IANA.MediaTypes] in the manner described
in [@RFC6838].</t>
        <t>To indicate that the content is an JSON-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+json</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary; A JSON-based Status List is a JSON Object.</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [[ this specification ]]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [[ this specification ]]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [[ this specification ]] for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an JWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary; A JWT-based Status List is a JWT; JWT values are encoded as a series of base64url-encoded values (some of which may be the empty string) separated by period ('.') characters.</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [[ this specification ]]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [[ this specification ]]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [[ this specification ]] for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an CBOR-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+cbor</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary; A CBOR-based Status List is a CBOR Object.</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [[ this specification ]]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [[ this specification ]]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [[ this specification ]] for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an CWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary;</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [[ this specification ]]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [[ this specification ]]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [[ this specification ]] for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC1950">
          <front>
            <title>ZLIB Compressed Data Format Specification version 3.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <author fullname="J-L. Gailly" surname="J-L. Gailly"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1950"/>
          <seriesInfo name="DOI" value="10.17487/RFC1950"/>
        </reference>
        <reference anchor="RFC1951">
          <front>
            <title>DEFLATE Compressed Data Format Specification version 1.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1951"/>
          <seriesInfo name="DOI" value="10.17487/RFC1951"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC6125">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="J. Hodges" initials="J." surname="Hodges"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9111">
          <front>
            <title>HTTP Caching</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
              <t>This document obsoletes RFC 7234.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="98"/>
          <seriesInfo name="RFC" value="9111"/>
          <seriesInfo name="DOI" value="10.17487/RFC9111"/>
        </reference>
        <reference anchor="IANA.JWT">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7662">
          <front>
            <title>OAuth 2.0 Token Introspection</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This specification defines a method for a protected resource to query an OAuth 2.0 authorization server to determine the active state of an OAuth 2.0 token and to determine meta-information about this token. OAuth 2.0 deployments can use this method to convey information about the authorization context of the token from the authorization server to the protected resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7662"/>
          <seriesInfo name="DOI" value="10.17487/RFC7662"/>
        </reference>
        <reference anchor="RFC7800">
          <front>
            <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7800"/>
          <seriesInfo name="DOI" value="10.17487/RFC7800"/>
        </reference>
      </references>
    </references>
    <?line 613?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank
Brian Campbell,
Filip Skokan,
Francesco Marino,
Guiseppe De Marco,
Kristina Yasuda,
Michael B. Jones,
Mike Prorock,
Orie Steele,
Timo Glastra
and
Torsten Lodderstedt</t>
      <t>for their valuable contributions, discussions and feedback to this specification.</t>
    </section>
    <section numbered="false" anchor="document-history">
      <name>Document History</name>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Rename title of the draft</t>
        </li>
        <li>
          <t>add design consideration to the introduction</t>
        </li>
        <li>
          <t>Change status claim to in referenced token to allow re-use for other mechanisms</t>
        </li>
        <li>
          <t>Add IANA Registry for status mechanisms</t>
        </li>
        <li>
          <t>restructure the sections of this document</t>
        </li>
        <li>
          <t>add option to return an unsigned Status List</t>
        </li>
        <li>
          <t>Changing compression from gzip to zlib</t>
        </li>
        <li>
          <t>Change typo in Status List Token sub claim description</t>
        </li>
        <li>
          <t>Add access token as an example use-case</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft after working group adoption</t>
        </li>
        <li>
          <t>update acknowledgments</t>
        </li>
        <li>
          <t>renamed Verifier to Relying Party</t>
        </li>
        <li>
          <t>added IANA consideration</t>
        </li>
      </ul>
      <t>[ draft-ietf-oauth-status-list ]</t>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Applied editorial improvements suggested by Michael Jones.</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
