<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-oauth-status-list-13" category="std" consensus="true" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Token Status List (TSL)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-status-list-13"/>
    <author fullname="Tobias Looker">
      <organization>MATTR</organization>
      <address>
        <email>tobias.looker@mattr.global</email>
      </address>
    </author>
    <author fullname="Paul Bastian">
      <organization>Bundesdruckerei</organization>
      <address>
        <email>paul.bastian@posteo.de</email>
      </address>
    </author>
    <author fullname="Christian Bormann">
      <organization>SPRIND</organization>
      <address>
        <email>chris.bormann@gmx.de</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Security</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <abstract>
      <?line 125?>

<t>This specification defines a mechanism called Token Status List (abbreviated TSL), data structures and processing rules for representing the status of tokens secured by JSON Object Signing and Encryption (JOSE) or CBOR Object Signing and Encryption (COSE), such as JWT, SD-JWT VC, CBOR Web Token and ISO mdoc. It also defines an extension point and a registry for future status mechanisms.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://oauth-wg.github.io/draft-ietf-oauth-status-list/draft-ietf-oauth-status-list.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Web Authorization Protocol Working Group mailing list (<eref target="mailto:oauth@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/oauth/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/oauth/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/oauth-wg/draft-ietf-oauth-status-list"/>.</t>
    </note>
  </front>
  <middle>
    <?line 129?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Token formats secured by JOSE <xref target="RFC7515"/> or COSE <xref target="RFC9052"/>, such as JWTs <xref target="RFC7519"/>, SD-JWT VCs <xref target="SD-JWT.VC"/>, CWTs <xref target="RFC8392"/> and ISO mdoc <xref target="ISO.mdoc"/>, have vast possible applications. Some of these applications can involve issuing a token whereby certain semantics about the token or its validity may change over time. Communicating these changes to relying parties in an interoperable manner, such as whether the token is considered invalidated or suspended by its issuer is important for many of these applications.</t>
      <t>This document defines a Status List data structure that describes the individual statuses of multiple Referenced Tokens. A Referenced Token may be of any format, but is most commonly a data structure secured by JOSE or COSE. The Referenced Token is referenced by the Status List, which describes the status of the Referenced Token. The statuses of all Referenced Tokens are conveyed via a bit array in the Status List. Each Referenced Token is allocated an index during issuance that represents its position within this bit array. The value of the bit(s) at this index corresponds to the Referenced Token's status. A Status List is provided within a Status List Token protected by cryptographic signature or MAC and this document defines its representations in JWT and CWT format.</t>
      <t>The following diagram depicts the relationship between the artifacts:</t>
      <artwork type="ascii-art"><![CDATA[
┌────────────────┐  describes status ┌──────────────────┐
│  Status List   ├──────────────────►│ Referenced Token │
│ (JSON or CBOR) │◄──────────────────┤ (JOSE, COSE, ..) │
└─────┬──────────┘    references     └──────────────────┘
      │
      │ embedded in
      ▼
┌───────────────────┐
│ Status List Token │
│  (JWT or CWT)     │
└───────────────────┘

]]></artwork>
      <t>An Issuer issues Referenced Tokens to a Holder, the Holder uses and presents those Referenced Tokens to a Relying Party. The Issuer gives updated status information to the Status Issuer, who issues a Status List Token. The Status Issuer can be either the Issuer or an entity that has been authorized by the Issuer to issue Status List Tokens. The Status Issuer provides the Status List Token to the Status Provider, who serves the Status List Token on a public, resolvable endpoint. The Relying Party or the Holder may fetch the Status List Token to retrieve the status of the Referenced Token.</t>
      <t>The roles of the Issuer (of the Referenced Token), the Status Issuer and the Status Provider may be fulfilled by the same entity. If not further specified, the term Issuer may refer to an entity acting for all three roles. This document describes how an Issuer references a Status List Token and how a Relying Party fetches and validates Status Lists.</t>
      <t>The following diagram depicts the relationship between the involved roles (Relying Party is equivalent to Verifier of <xref target="SD-JWT.VC"/>):</t>
      <artwork type="ascii-art"><![CDATA[
           issue                 present
           Referenced            Referenced
┌────────┐ Token      ┌────────┐ Token      ┌───────────────┐
│ Issuer ├───────────►│ Holder ├───────────►│ Relying Party │
└─┬──────┘            └───┬────┘            └──┬────────────┘
  ▼ update status         │                    │
┌───────────────┐         │                    │
│ Status Issuer │         │                    │
└─┬─────────────┘         │                    │
  ▼ provide Status List   │                    │
┌─────────────────┐       │                    │
│ Status Provider │◄──────┴────────────────────┘
└─────────────────┘     fetch Status List Token

]]></artwork>
      <t>Status Lists can be used to express a variety of Status Types. This document defines basic Status Types for the most common use cases as well as an extensibility mechanism for custom Status Types.</t>
      <t>Furthermore, the document defines an extension point that enables other specifications to describe additional status mechanisms and creates an IANA registry.</t>
      <section anchor="example-use-cases">
        <name>Example Use Cases</name>
        <t>An example of the usage of a Status List is to manage the statuses of issued access tokens as defined in section 1.4 of <xref target="RFC6749"/>. Token Introspection <xref target="RFC7662"/> provides a method to determine the status of an issued access token, but it necessitates the party attempting to validate the state of access tokens to directly contact the Issuer of each token for validation. In contrast, the mechanism defined in this specification allows a party to retrieve the statuses for many tokens, reducing interactions with the Issuer substantially. This not only improves scalability but also enhances privacy by preventing the Issuer from gaining knowledge of access tokens being verified (herd anonymity).</t>
        <t>Another possible use case for the Status List is to express the status of verifiable credentials (Referenced Tokens) issued by an Issuer in the Issuer-Holder-Verifier model <xref target="SD-JWT.VC"/>.</t>
      </section>
      <section anchor="rationale">
        <name>Rationale</name>
        <t>Revocation mechanisms are an essential part of most identity ecosystems. In the past, revocation of X.509 TLS certificates has been proven difficult. Traditional certificate revocation lists (CRLs) have limited scalability; Online Certificate Status Protocol (OCSP) has additional privacy risks, since the client is leaking the requested website to a third party. OCSP stapling is addressing some of these problems at the cost of less up-to-date data. Modern approaches use accumulator-based revocation registries and Zero-Knowledge-Proofs to accommodate for this privacy gap, but face scalability issues again. Another alternative is short-lived Referenced Tokens with regular re-issuance, but this puts additional burden on the Issuer's infrastructure.</t>
        <t>This specification seeks to find a balance between scalability, security and privacy by minimizing the status information to mere bits (often a single bit) and compressing the resulting binary data. Thereby, a Status List may contain statuses of many thousands or millions Referenced Tokens while remaining as small as possible. Placing a large number of Referenced Tokens into the same list also offers Holders and Relying Parties herd privacy from the Status Provider.</t>
      </section>
      <section anchor="design-considerations">
        <name>Design Considerations</name>
        <t>The decisions taken in this specification aim to achieve the following design goals:</t>
        <ul spacing="normal">
          <li>
            <t>the specification shall favor a simple and easy-to-understand concept</t>
          </li>
          <li>
            <t>the specification shall be easy, fast and secure to implement in all major programming languages</t>
          </li>
          <li>
            <t>the specification shall be optimized to support the most common use cases and avoid unnecessary complexity of corner cases</t>
          </li>
          <li>
            <t>the Status List shall scale up to millions of tokens to support large-scale government or enterprise use cases</t>
          </li>
          <li>
            <t>the Status List shall enable caching policies and offline support</t>
          </li>
          <li>
            <t>the specification shall support JSON and CBOR based tokens</t>
          </li>
          <li>
            <t>the specification shall not specify key resolution or trust frameworks</t>
          </li>
          <li>
            <t>the specification shall define an extension point that enables other mechanisms to convey information about the status of a Referenced Token</t>
          </li>
        </ul>
      </section>
      <section anchor="prior-work">
        <name>Prior Work</name>
        <t>Representing a status with bits in array is a rather old and well-known concept in computer science and there has been prior work to use this for revocation and status management such as a paper by Smith et al. <xref target="smith2020let"/> that proposed a mechanism called Certificate Revocation Vectors based on xz compressed bit vectors for each expiration day and the W3C bit Status List <xref target="W3C.SL"/> that similarly uses a compressed bit representation.</t>
      </section>
      <section anchor="status-mechanisms-registry">
        <name>Status Mechanisms Registry</name>
        <t>This specification establishes the IANA "Status Mechanisms" registry for status mechanisms and registers the members defined by this specification. Other specifications can register other members used for status retrieval.</t>
        <t>Other status mechanisms may have different tradeoffs regarding security, privacy, scalability and complexity. The privacy and security considerations in this document only represent the properties of the Status List mechanism.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>Issuer:</dt>
        <dd>
          <t>An entity that issues the Referenced Token. Also known as a Provider.</t>
        </dd>
        <dt>Status Issuer:</dt>
        <dd>
          <t>An entity that issues the Status List Token about the status information of the Referenced Token. This role may be fulfilled by the Issuer.</t>
        </dd>
        <dt>Status Provider:</dt>
        <dd>
          <t>An entity that provides the Status List Token on a public endpoint. This role may be fulfilled by the Status Issuer.</t>
        </dd>
        <dt>Holder:</dt>
        <dd>
          <t>An entity that receives Referenced Tokens from the Issuer and presents them to Relying Parties.</t>
        </dd>
        <dt>Relying Party:</dt>
        <dd>
          <t>An entity that relies on the Referenced Token and fetches the corresponding Status List Token to validate the status of that Referenced Token. Also known as a Verifier.</t>
        </dd>
        <dt>Status List:</dt>
        <dd>
          <t>An object in JSON or CBOR representation containing a compressed byte array that represents the statuses of many Referenced Tokens.</t>
        </dd>
        <dt>Status List Token:</dt>
        <dd>
          <t>A token in JWT (as defined in <xref target="RFC7519"/>) or CWT (as defined in <xref target="RFC8392"/>) representation that contains a cryptographically secured Status List.</t>
        </dd>
        <dt>Referenced Token:</dt>
        <dd>
          <t>A cryptographically secured data structure that contains a "status" claim that is referencing a mechanism to retrieve status information about this Referenced Token. This document defines the Status List mechanism in which case the Referenced Token contains a reference to an entry in a Status List Token. It is <bcp14>RECOMMENDED</bcp14> to use JSON <xref target="RFC8259"/> with JOSE as defined in <xref target="RFC7515"/> or CBOR <xref target="RFC8949"/> with COSE as defined in <xref target="RFC9052"/>. Examples for Referenced Tokens are SD-JWT VC and ISO mdoc.</t>
        </dd>
        <dt>Client:</dt>
        <dd>
          <t>An application that fetches information, such as a Status List Token, from the Status List Provider on behalf of the Holder or Relying Party.</t>
        </dd>
        <dt>base64url:</dt>
        <dd>
          <t>Denotes the URL-safe base64 encoding without padding as defined in Section 2 of <xref target="RFC7515"/> as "Base64url Encoding".</t>
        </dd>
      </dl>
    </section>
    <section anchor="status-list">
      <name>Status List</name>
      <t>A Status List is a data structure that contains the statuses of many Referenced Tokens represented by one or multiple bits. The <xref target="status-list-byte-array">first section</xref> describes how to construct a compressed byte array that is the base component for the Status List data structure. The second and third sections describe how to encode such a Status List in JSON and CBOR representations.</t>
      <section anchor="status-list-byte-array">
        <name>Compressed Byte Array</name>
        <t>A compressed byte array containing the status information of the Referenced Token is composed by the following algorithm:</t>
        <ol spacing="normal" type="1"><li>
            <t>The Status Issuer <bcp14>MUST</bcp14> define a number of bits (<tt>bits</tt>) of either 1,2,4 or 8, that represents the amount of bits used to describe the status of each Referenced Token within this Status List. Therefore up to 2,4,16 or 256 statuses for a Referenced Token are possible, depending on the bit size. This limitation is intended to limit bit manipulation necessary to a single byte for every operation and thus keeping implementations simpler and less error-prone.</t>
          </li>
          <li>
            <t>The Status Issuer creates a byte array of size = amount of Referenced Tokens * <tt>bits</tt> / 8 or greater. Depending on the <tt>bits</tt>, each byte in the array corresponds to 8/(<tt>bits</tt>) statuses (8,4,2 or 1).</t>
          </li>
          <li>
            <t>The Status Issuer sets the status values for all Referenced Tokens within the byte array. The status of each Referenced Token is identified using an index that maps to one or more specific bits within the byte array. The index starts counting at 0 and ends with amount of Referenced Tokens - 1 (being the last valid entry). The bits within an array are counted from the least significant bit ("0") to the most significant bit ("7"). All bits of the byte array at a particular index are set to a status value (see <xref target="status-types"/> for more details on the values).</t>
          </li>
          <li>
            <t>The Status Issuer compresses the byte array using DEFLATE <xref target="RFC1951"/> with the ZLIB <xref target="RFC1950"/> data format. Implementations are <bcp14>RECOMMENDED</bcp14> to use the highest compression level available.</t>
          </li>
        </ol>
        <t>The following example illustrates the byte array of a Status List that represents the statuses of 16 Referenced Tokens with a <tt>bits</tt> of 1, requiring 2 bytes (16 bits) for the uncompressed byte array:</t>
        <artwork type="ascii-art"><![CDATA[
status[0] = 1
status[1] = 0
status[2] = 0
status[3] = 1
status[4] = 1
status[5] = 1
status[6] = 0
status[7] = 1
status[8] = 1
status[9] = 1
status[10] = 0
status[11] = 0
status[12] = 0
status[13] = 1
status[14] = 0
status[15] = 1
]]></artwork>
        <t>These bits are concatenated:</t>
        <artwork type="ascii-art"><![CDATA[
byte no            0                  1               2
bit no      7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0    7
           +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+...
values     |1|0|1|1|1|0|0|1|  |1|0|1|0|0|0|1|1|  |0|...
           +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+...
index       7 6 5 4 3 2 1 0   15   ...  10 9 8   23
           \_______________/  \_______________/
byte value       0xB9               0xA3

]]></artwork>
        <t>In the following example, the Status List additionally includes the Status Type "SUSPENDED". As the Status Type value for "SUSPENDED" is 0x02 and does not fit into 1 bit, the <tt>bits</tt> is required to be 2. This example illustrates the byte array of a Status List that represents the statuses of 12 Referenced Tokens with a <tt>bits</tt> of 2, requiring 3 bytes (24 bits) for the uncompressed byte array:</t>
        <artwork type="ascii-art"><![CDATA[
status[0] = 1
status[1] = 2
status[2] = 0
status[3] = 3
status[4] = 0
status[5] = 1
status[6] = 0
status[7] = 1
status[8] = 1
status[9] = 2
status[10] = 3
status[11] = 3
]]></artwork>
        <t>These bits are concatenated:</t>
        <artwork type="ascii-art"><![CDATA[
byte no            0                  1                  2
bit no      7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0
           +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
values     |1|1|0|0|1|0|0|1|  |0|1|0|0|0|1|0|0|  |1|1|1|1|1|0|0|1|
           +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
            \ / \ / \ / \ /    \ / \ / \ / \ /    \ / \ / \ / \ /
status       3   0   2   1      1   0   1   0      3   3   2   1
index        3   2   1   0      7   6   5   4      11  10  9   8
             \___________/      \___________/      \___________/
byte value       0xC9               0x44               0xF9

]]></artwork>
      </section>
      <section anchor="status-list-json">
        <name>Status List in JSON Format</name>
        <t>This section defines the data structure for a JSON-encoded Status List:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>StatusList</tt> structure is a JSON Object and <bcp14>MUST</bcp14> contain at least the following members:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>bits</tt>: <bcp14>REQUIRED</bcp14>. JSON Integer specifying the number of bits per Referenced Token in the compressed byte array (<tt>lst</tt>). The allowed values for <tt>bits</tt> are 1,2,4 and 8.</t>
              </li>
              <li>
                <t><tt>lst</tt>: <bcp14>REQUIRED</bcp14>. JSON String that contains the status values for all the Referenced Tokens it conveys statuses for. The value <bcp14>MUST</bcp14> be the base64url-encoded compressed byte array as specified in <xref target="status-list-byte-array"/>.</t>
              </li>
              <li>
                <t><tt>aggregation_uri</tt>: <bcp14>OPTIONAL</bcp14>. JSON String that contains a URI to retrieve the Status List Aggregation for this type of Referenced Token or Issuer. See section <xref target="aggregation"/> for further details.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following example illustrates the JSON representation of the Status List with <tt>bits</tt> 1 from the example above:</t>
        <artwork><![CDATA[
byte_array = [0xb9, 0xa3] 
encoded:
{
  "bits": 1,
  "lst": "eNrbuRgAAhcBXQ"
}
]]></artwork>
        <t>The following example illustrates the JSON representation of the Status List with <tt>bits</tt> 2 from the example above:</t>
        <artwork><![CDATA[
byte_array = [0xc9, 0x44, 0xf9] 
encoded:
{
  "bits": 2,
  "lst": "eNo76fITAAPfAgc"
}
]]></artwork>
        <t>See section <xref target="test-vectors"/> for more test vectors.</t>
      </section>
      <section anchor="status-list-cbor">
        <name>Status List in CBOR Format</name>
        <t>This section defines the data structure for a CBOR-encoded Status List:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>StatusList</tt> structure is a CBOR map (Major Type 5) and defines the following entries:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>bits</tt>: <bcp14>REQUIRED</bcp14>. CBOR Unsigned integer (Major Type 0) that contains the number of bits per Referenced Token in the compressed byte array (<tt>lst</tt>). The allowed values for <tt>bits</tt> are 1, 2, 4 and 8.</t>
              </li>
              <li>
                <t><tt>lst</tt>: <bcp14>REQUIRED</bcp14>. CBOR Byte string (Major Type 2) that contains the status values for all the Referenced Tokens it conveys statuses for. The value <bcp14>MUST</bcp14> be the compressed byte array as specified in <xref target="status-list-byte-array"/>.</t>
              </li>
              <li>
                <t><tt>aggregation_uri</tt>: <bcp14>OPTIONAL</bcp14>. CBOR Text string (Major Type 3) that contains a URI to retrieve the Status List Aggregation for this type of Referenced Token. See section <xref target="aggregation"/> for further detail.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following is the CDDL definition of the StatusList structure:</t>
        <sourcecode type="cddl"><![CDATA[
StatusList = {
    bits: 1 / 2 / 4 / 8, ; The number of bits used per Referenced Token
    lst: bstr, ; Byte string that contains the Status List
    ? aggregation_uri: tstr, ; link to the Status List Aggregation
}
]]></sourcecode>
        <t>The following example illustrates the CBOR representation of the Status List in Hex:</t>
        <artwork><![CDATA[
byte_array = [0xb9, 0xa3] 
encoded:
a2646269747301636c73744a78dadbb918000217015d
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
a2                              # map(2)
  64                            #   string(4)
    62697473                    #     "bits"
  01                            #   uint(1)
  63                            #   string(3)
    6c7374                      #     "lst"
  4a                            #   bytes(10)
    78dadbb918000217015d        #     "xÚÛ¹\x18\x00\x02\x17\x01]"
]]></artwork>
        <t>See section <xref target="test-vectors"/> for more test vectors.</t>
      </section>
    </section>
    <section anchor="status-list-token">
      <name>Status List Token</name>
      <t>A Status List Token embeds a Status List into a token that is cryptographically signed and protects the integrity of the Status List. This allows for the Status List Token to be hosted by third parties or be transferred for offline use cases.</t>
      <t>This section specifies Status List Tokens in JSON Web Token (JWT) and CBOR Web Token (CWT) format.</t>
      <section anchor="status-list-token-jwt">
        <name>Status List Token in JWT Format</name>
        <t>The Status List Token <bcp14>MUST</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/>.</t>
        <t>The following content applies to the JWT Header:</t>
        <ul spacing="normal">
          <li>
            <t><tt>typ</tt>: <bcp14>REQUIRED</bcp14>. The JWT type <bcp14>MUST</bcp14> be <tt>statuslist+jwt</tt>.</t>
          </li>
        </ul>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>sub</tt>: <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC7519"/>. The <tt>sub</tt> (subject) claim <bcp14>MUST</bcp14> specify the URI of the Status List Token. The value <bcp14>MUST</bcp14> be equal to that of the <tt>uri</tt> claim contained in the <tt>status_list</tt> claim of the Referenced Token.</t>
          </li>
          <li>
            <t><tt>iat</tt>: <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC7519"/>. The <tt>iat</tt> (issued at) claim <bcp14>MUST</bcp14> specify the time at which the Status List Token was issued.</t>
          </li>
          <li>
            <t><tt>exp</tt>: <bcp14>RECOMMENDED</bcp14>. As generally defined in <xref target="RFC7519"/>. The <tt>exp</tt> (expiration time) claim, if present, <bcp14>MUST</bcp14> specify the time at which the Status List Token is considered expired by the Status Issuer. Consider the guidance provided in <xref target="expiry-and-caching"/>.</t>
          </li>
          <li>
            <t><tt>ttl</tt>: <bcp14>RECOMMENDED</bcp14>. The <tt>ttl</tt> (time to live) claim, if present, <bcp14>MUST</bcp14> specify the maximum amount of time, in seconds, that the Status List Token can be cached by a consumer before a fresh copy <bcp14>SHOULD</bcp14> be retrieved. The value of the claim <bcp14>MUST</bcp14> be a positive number encoded in JSON as a number. Consider the guidance provided in <xref target="expiry-and-caching"/>.</t>
          </li>
          <li>
            <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status_list</tt> (status list) claim <bcp14>MUST</bcp14> specify the Status List conforming to the structure defined in <xref target="status-list-json"/>.</t>
          </li>
        </ul>
        <t>The following additional rules apply:</t>
        <ol spacing="normal" type="1"><li>
            <t>The JWT <bcp14>MAY</bcp14> contain other claims.</t>
          </li>
          <li>
            <t>The JWT <bcp14>MUST</bcp14> be secured using a cryptographic signature or MAC algorithm. Relying Parties <bcp14>MUST</bcp14> reject JWTs with an invalid signature.</t>
          </li>
          <li>
            <t>Relying Parties <bcp14>MUST</bcp14> reject JWTs that are not valid in all other respects per "JSON Web Token (JWT)" <xref target="RFC7519"/>.</t>
          </li>
          <li>
            <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
          </li>
        </ol>
        <t>The following is a non-normative example of a Status List Token in JWT format:</t>
        <artwork><![CDATA[
{
  "alg": "ES256",
  "kid": "12",
  "typ": "statuslist+jwt"
}
.
{
  "exp": 2291720170,
  "iat": 1686920170,
  "status_list": {
    "bits": 1,
    "lst": "eNrbuRgAAhcBXQ"
  },
  "sub": "https://example.com/statuslists/1",
  "ttl": 43200
}
]]></artwork>
      </section>
      <section anchor="status-list-token-cwt">
        <name>Status List Token in CWT Format</name>
        <t>The Status List Token <bcp14>MUST</bcp14> be encoded as a "CBOR Web Token (CWT)" according to <xref target="RFC8392"/>.</t>
        <t>The following content applies to the protected header of the CWT:</t>
        <ul spacing="normal">
          <li>
            <t><tt>16</tt> (type): <bcp14>REQUIRED</bcp14>. The type of the CWT <bcp14>MUST</bcp14> be <tt>application/statuslist+cwt</tt> or the registered CoAP Content-Format ID (see <xref target="coap-content-type"/>) as defined in <xref target="RFC9596"/>.</t>
          </li>
        </ul>
        <t>The following content applies to the CWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>2</tt> (subject): <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC8392"/>. The subject claim <bcp14>MUST</bcp14> specify the URI of the Status List Token. The value <bcp14>MUST</bcp14> be equal to that of the <tt>uri</tt> claim contained in the <tt>status_list</tt> claim of the Referenced Token.</t>
          </li>
          <li>
            <t><tt>6</tt> (issued at): <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC8392"/>. The issued at claim <bcp14>MUST</bcp14> specify the time at which the Status List Token was issued.</t>
          </li>
          <li>
            <t><tt>4</tt> (expiration time): <bcp14>RECOMMENDED</bcp14>. As generally defined in <xref target="RFC8392"/>. The expiration time claim, if present, <bcp14>MUST</bcp14> specify the time at which the Status List Token is considered expired by its issuer. Consider the guidance provided in <xref target="expiry-and-caching"/>.</t>
          </li>
          <li>
            <t><tt>65534</tt> (time to live): <bcp14>RECOMMENDED</bcp14>. Unsigned integer (Major Type 0). The time to live claim, if present, <bcp14>MUST</bcp14> specify the maximum amount of time, in seconds, that the Status List Token can be cached by a consumer before a fresh copy <bcp14>SHOULD</bcp14> be retrieved. The value of the claim <bcp14>MUST</bcp14> be a positive number. Consider the guidance provided in <xref target="expiry-and-caching"/>.</t>
          </li>
          <li>
            <t><tt>65533</tt> (status list): <bcp14>REQUIRED</bcp14>. The status list claim <bcp14>MUST</bcp14> specify the Status List conforming to the structure defined in <xref target="status-list-cbor"/>.</t>
          </li>
        </ul>
        <t>The following additional rules apply:</t>
        <ol spacing="normal" type="1"><li>
            <t>The CWT <bcp14>MAY</bcp14> contain other claims.</t>
          </li>
          <li>
            <t>The CWT <bcp14>MUST</bcp14> be secured using a cryptographic signature or MAC algorithm. Relying Parties <bcp14>MUST</bcp14> reject CWTs with an invalid signature.</t>
          </li>
          <li>
            <t>Relying Parties <bcp14>MUST</bcp14> reject CWTs that are not valid in all other respects per "CBOR Web Token (CWT)" <xref target="RFC8392"/>.</t>
          </li>
          <li>
            <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
          </li>
        </ol>
        <t>The following is a non-normative example of a Status List Token in CWT format in Hex:</t>
        <artwork><![CDATA[
d2845820a2012610781a6170706c69636174696f6e2f7374617475736c6973742b63
7774a1044231325850a502782168747470733a2f2f6578616d706c652e636f6d2f73
74617475736c697374732f31061a648c5bea041a8898dfea19fffe19a8c019fffda2
646269747301636c73744a78dadbb918000217015d584054a98944dbe012e5cdf34f
3f808abc8819cd18c461e0d4ae7b155fb7091616ab98e436be5ea6c8e13d29fdaf51
1ccfc6dc6ed5b980c7aa8cf45ebdc8a989ee33
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
d2                              # tag(18)
  84                            #   array(4)
    58 20                       #     bytes(32)
      a2012610781a6170706c6963  #       "¢\x01&\x10x\x1aapplic"
      6174696f6e2f737461747573  #       "ation/status"
      6c6973742b637774          #       "list+cwt"
    a1                          #     map(1)
      04                        #       uint(4)
      42                        #       bytes(2)
        3132                    #         "12"
    58 50                       #     bytes(80)
      a502782168747470733a2f2f  #       "¥\x02x!https://"
      6578616d706c652e636f6d2f  #       "example.com/"
      7374617475736c697374732f  #       "statuslists/"
      31061a648c5bea041a8898df  #       "1\x06\x1ad\x8c[ê\x04\x1a\x88\x98ß"
      ea19fffe19a8c019fffda264  #       "ê\x19ÿþ\x19¨À\x19ÿý¢d"
      6269747301636c73744a78da  #       "bits\x01clstJxÚ"
      dbb918000217015d          #       "Û¹\x18\x00\x02\x17\x01]"
    58 40                       #     bytes(64)
      54a98944dbe012e5cdf34f3f  #       "T©\x89DÛà\x12åÍóO?"
      808abc8819cd18c461e0d4ae  #       "\x80\x8a¼\x88\x19Í\x18ÄaàÔ®"
      7b155fb7091616ab98e436be  #       "{\x15_·\x09\x16\x16«\x98ä6¾"
      5ea6c8e13d29fdaf511ccfc6  #       "^¦Èá=)ý¯Q\x1cÏÆ"
      dc6ed5b980c7aa8cf45ebdc8  #       "ÜnÕ¹\x80Çª\x8cô^½È"
      a989ee33                  #       "©\x89î3"
]]></artwork>
      </section>
    </section>
    <section anchor="referenced-token">
      <name>Referenced Token</name>
      <section anchor="status-claim">
        <name>Status Claim</name>
        <t>By including a "status" claim in a Referenced Token, the Issuer is referencing a mechanism to retrieve status information about this Referenced Token. This specification defines one possible member of the "status" object, called "status_list". Other members of the "status" object may be defined by other specifications. This is analogous to "cnf" claim in Section 3.1 of <xref target="RFC7800"/> in which different authenticity confirmation methods can be included.</t>
      </section>
      <section anchor="referenced-token-jose">
        <name>Referenced Token in JOSE</name>
        <t>The Referenced Token <bcp14>MAY</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/> or other formats based on JOSE.</t>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status</tt> (status) claim <bcp14>MUST</bcp14> specify a JSON Object that contains at least one reference to a status mechanism.
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14> when the status mechanism defined in this specification is used. It <bcp14>MUST</bcp14> specify a JSON Object that contains a reference to a Status List Token. It <bcp14>MUST</bcp14> at least contain the following claims:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>idx</tt>: <bcp14>REQUIRED</bcp14>. The <tt>idx</tt> (index) claim <bcp14>MUST</bcp14> specify a non-negative Integer that represents the index to check for status information in the Status List for the current Referenced Token.</t>
                  </li>
                  <li>
                    <t><tt>uri</tt>: <bcp14>REQUIRED</bcp14>. The <tt>uri</tt> (URI) claim <bcp14>MUST</bcp14> specify a String value that identifies the Status List Token containing the status information for the Referenced Token. The value of <tt>uri</tt> <bcp14>MUST</bcp14> be a URI conforming to <xref target="RFC3986"/>.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
        <t>The following is a non-normative example of a decoded header and payload of a Referenced Token:</t>
        <artwork type="ascii-art"><![CDATA[
{
  "alg": "ES256",
  "kid": "11"
}
.
{
  "status": {
    "status_list": {
      "idx": 0,
      "uri": "https://example.com/statuslists/1"
    }
  }
}
]]></artwork>
        <t>SD-JWT-based Verifiable Credentials <xref target="SD-JWT.VC"/> section 3.2.2.2. introduces the usage of the status mechanism defined in this section. Therefore, an SD-JWT VC can be considered a Referenced Token. The following is a non-normative example of a Referenced Token in SD-JWT VC serialized form as received from an Issuer:</t>
        <artwork type="ascii-art"><![CDATA[
eyJhbGciOiAiRVMyNTYiLCAidHlwIjogImV4YW1wbGUrc2Qtand0In0.eyJfc2QiOiBb
Ikh2cktYNmZQVjB2OUtfeUNWRkJpTEZIc01heGNEXzExNEVtNlZUOHgxbGciXSwgImlz
cyI6ICJodHRwczovL2V4YW1wbGUuY29tL2lzc3VlciIsICJpYXQiOiAxNjgzMDAwMDAw
LCAiZXhwIjogMTg4MzAwMDAwMCwgInN1YiI6ICI2YzVjMGE0OS1iNTg5LTQzMWQtYmFl
Ny0yMTkxMjJhOWVjMmMiLCAic3RhdHVzIjogeyJzdGF0dXNfbGlzdCI6IHsiaWR4Ijog
MCwgInVyaSI6ICJodHRwczovL2V4YW1wbGUuY29tL3N0YXR1c2xpc3RzLzEifX0sICJf
c2RfYWxnIjogInNoYS0yNTYifQ.-kgS-R-Z4DEDlqb8kb6381_gHHNatsoF1fcVKZk3M
06CrnV8F8k9d2w2V_YAOvgcb0f11FqDFezXBXH30d4vcw~WyIyR0xDNDJzS1F2ZUNmR2
ZyeU5STjl3IiwgInN0cmVldF9hZGRyZXNzIiwgIlNjaHVsc3RyLiAxMiJd~WyJlbHVWN
U9nM2dTTklJOEVZbnN4QV9BIiwgImxvY2FsaXR5IiwgIlNjaHVscGZvcnRhIl0~WyI2S
Wo3dE0tYTVpVlBHYm9TNXRtdlZBIiwgInJlZ2lvbiIsICJTYWNoc2VuLUFuaGFsdCJd~
WyJlSThaV205UW5LUHBOUGVOZW5IZGhRIiwgImNvdW50cnkiLCAiREUiXQ~WyJRZ19PN
jR6cUF4ZTQxMmExMDhpcm9BIiwgImFkZHJlc3MiLCB7Il9zZCI6IFsiNnZoOWJxLXpTN
EdLTV83R3BnZ1ZiWXp6dTZvT0dYcm1OVkdQSFA3NVVkMCIsICI5Z2pWdVh0ZEZST0NnU
nJ0TmNHVVhtRjY1cmRlemlfNkVyX2o3NmttWXlNIiwgIktVUkRQaDRaQzE5LTN0aXotR
GYzOVY4ZWlkeTFvVjNhM0gxRGEyTjBnODgiLCAiV045cjlkQ0JKOEhUQ3NTMmpLQVN4V
GpFeVc1bTV4NjVfWl8ycm8yamZYTSJdfV0~
]]></artwork>
        <t>The resulting payload of the example above:</t>
        <artwork type="ascii-art"><![CDATA[
{
  "_sd": [
    "HvrKX6fPV0v9K_yCVFBiLFHsMaxcD_114Em6VT8x1lg"
  ],
  "iss": "https://example.com/issuer",
  "iat": 1683000000,
  "exp": 1883000000,
  "sub": "6c5c0a49-b589-431d-bae7-219122a9ec2c",
  "status": {
    "status_list": {
      "idx": 0,
      "uri": "https://example.com/statuslists/1"
    }
  },
  "_sd_alg": "sha-256"
}
]]></artwork>
      </section>
      <section anchor="referenced-token-cose">
        <name>Referenced Token in COSE</name>
        <t>The Referenced Token <bcp14>MAY</bcp14> be encoded as a "COSE Web Token (CWT)" object according to <xref target="RFC8392"/> or other formats based on COSE.</t>
        <t>The following content applies to the CWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>65535</tt> (status): <bcp14>REQUIRED</bcp14>. The status claim is encoded as a <tt>Status</tt> CBOR structure and <bcp14>MUST</bcp14> include at least one data item that refers to a status mechanism. Each data item in the <tt>Status</tt> CBOR structure comprises a key-value pair, where the key must be a CBOR text string (Major Type 3) specifying the identifier of the status mechanism and the corresponding value defines its contents. This specification defines the following data items:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>status_list</tt> (status list): <bcp14>REQUIRED</bcp14> when the status mechanism defined in this specification is used. It has the same definition as the <tt>status_list</tt> claim in <xref target="referenced-token-jose"/> but <bcp14>MUST</bcp14> be encoded as a <tt>StatusListInfo</tt> CBOR structure with the following fields:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>idx</tt>: <bcp14>REQUIRED</bcp14>. Unsigned integer (Major Type 0) The <tt>idx</tt> (index) claim <bcp14>MUST</bcp14> specify a non-negative Integer that represents the index to check for status information in the Status List for the current Referenced Token.</t>
                  </li>
                  <li>
                    <t><tt>uri</tt>: <bcp14>REQUIRED</bcp14>. Text string (Major Type 3). The <tt>uri</tt> (URI) claim <bcp14>MUST</bcp14> specify a String value that identifies the Status List Token containing the status information for the Referenced Token. The value of <tt>uri</tt> <bcp14>MUST</bcp14> be a URI conforming to <xref target="RFC3986"/>.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
        <t>The following is a non-normative example of a Referenced Token in CWT format in Hex:</t>
        <artwork><![CDATA[
d28443a10126a1044231325866a502653132333435017368747470733a2f2f657861
6d706c652e636f6d061a648c5bea041a8898dfea19ffffa16b7374617475735f6c69
7374a2636964780063757269782168747470733a2f2f6578616d706c652e636f6d2f
7374617475736c697374732f315840b60099c58267a83fb2b3f84d3cef786d46e1ae
88a5a6427cbcf97385c1a9cbedef610dbdf0e964cbc469363c2e59542d4a6db5f8f1
ff32774c30234238f5a36a
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
d2                              # tag(18)
  84                            #   array(4)
    43                          #     bytes(3)
      a10126                    #       "¡\x01&"
    a1                          #     map(1)
      04                        #       uint(4)
      42                        #       bytes(2)
        3132                    #         "12"
    58 66                       #     bytes(102)
      a50265313233343501736874  #       "¥\x02e12345\x01sht"
      7470733a2f2f6578616d706c  #       "tps://exampl"
      652e636f6d061a648c5bea04  #       "e.com\x06\x1ad\x8c[ê\x04"
      1a8898dfea19ffffa16b7374  #       "\x1a\x88\x98ßê\x19ÿÿ¡kst"
      617475735f6c697374a26369  #       "atus_list¢ci"
      647800637572697821687474  #       "dx\x00curix!htt"
      70733a2f2f6578616d706c65  #       "ps://example"
      2e636f6d2f7374617475736c  #       ".com/statusl"
      697374732f31              #       "ists/1"
    58 40                       #     bytes(64)
      b60099c58267a83fb2b3f84d  #       "¶\x00\x99Å\x82g¨?²³øM"
      3cef786d46e1ae88a5a6427c  #       "<ïxmFá®\x88¥¦B|"
      bcf97385c1a9cbedef610dbd  #       "¼ùs\x85Á©Ëíïa\x0d½"
      f0e964cbc469363c2e59542d  #       "ðédËÄi6<.YT-"
      4a6db5f8f1ff32774c302342  #       "Jmµøñÿ2wL0#B"
      38f5a36a                  #       "8õ£j"
]]></artwork>
        <t>ISO mdoc <xref target="ISO.mdoc"/> may utilize the Status List mechanism by introducing the <tt>status</tt> parameter in the Mobile Security Object (MSO) as specified in Section 9.1.2. The <tt>status</tt> parameter uses the same encoding as a CWT as defined in <xref target="referenced-token-cose"/>.</t>
        <t>It is <bcp14>RECOMMENDED</bcp14> to use <tt>status</tt> for the label of the field that contains the <tt>Status</tt> CBOR structure.</t>
        <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
        <t>The following is a non-normative example of an IssuerAuth as specified in ISO mDL (also referred to as signed MSO) in Hex:</t>
        <artwork type="ascii-art"><![CDATA[
8443a10126a118215901f3308201ef30820195a00302010202140bfec7da97e048e
15ac3dacb9eafe82e64fd07f5300a06082a8648ce3d040302302331143012060355
04030c0b75746f7069612069616361310b3009060355040613025553301e170d323
4313030313030303030305a170d3235313030313030303030305a30213112301006
035504030c0975746f706961206473310b300906035504061302555330593013060
72a8648ce3d020106082a8648ce3d03010703420004ace7ab7340e5d9648c5a72a9
a6f56745c7aad436a03a43efea77b5fa7b88f0197d57d8983e1b37d3a539f4d5883
65e38cbbf5b94d68c547b5bc8731dcd2f146ba381a83081a5301c0603551d1f0415
30133011a00fa00d820b6578616d706c652e636f6d301e0603551d1204173015811
36578616d706c65406578616d706c652e636f6d301d0603551d0e0416041414e290
17a6c35621ffc7a686b7b72db06cd12351301f0603551d2304183016801454fa238
3a04c28e0d930792261c80c4881d2c00b300e0603551d0f0101ff04040302078030
150603551d250101ff040b3009060728818c5d050102300a06082a8648ce3d04030
20348003045022100b7103fd4b90529f50bd6f70c5ae5ce7f4f3d4d15a4e082812f
9fa1f5c2e5aa0a0220070b2822ec7ce6c56804923a85b2cfbffd054cf9a915f070c
fef7179a4bc6569590320d81859031ba766737461747573a16b7374617475735f6c
697374a26369647819019c63757269782168747470733a2f2f6578616d706c652e6
36f6d2f7374617475736c697374732f3167646f6354797065756f72672e69736f2e
31383031332e352e312e6d444c6776657273696f6e63312e306c76616c696469747
9496e666fa3667369676e6564c074323032342d31302d30315431333a33303a3032
5a6976616c696446726f6dc074323032342d31302d30315431333a33303a30325a6
a76616c6964556e74696cc074323032352d31302d30315431333a33303a30325a6c
76616c756544696765737473a1716f72672e69736f2e31383031332e352e31ac005
820a81d65ed5075fbd7ee19fa66e2bb3047ed826e2769873e7ef07c923da7a6f243
01582048701a9546492284d266ed81d439230a582d0e1f17a08ab1859a3efe98069
0a4025820d11fe48c8835b30bfb3895c3905436ddfb63f59ab9eee181b110985329
2a8f62035820a741bf05e20a8bc359e32426106ed0899b2c60262cc3acc637ddc99
41095fb7a045820ab67cb9a8f20a8572f77f02727367d08dc8e57fb89deb46b9c62
6e94457b7d8b055820bacddb4142b3842bd555206eb5acb27ded063294995c7e7fe
fbf93ece522604d065820bfd02b3aebdc05b53b5539226c38088d6d784b0ea0fab6
9eb9311650a48d325307582027dab70fe71da63e5e5d199e8ae5b79cbe8904bc30c
5b7544fb809e02ccb3e6a0858200dbd7ccc9c7727d3d17295f1b6f1914071670ee2
3d4d33530c31f1f406b8e3b7095820a5beb5efadf37f21637209abc519830681cc5
1f334818a823fec13b29552f5ba0a5820d8047c95f9272d7d07b2c13a9f5ac2ee02
380ab272a165e569391d89a2152c3c0b582004939930ffb4911ef03487a153605a3
0368b69f2437d6d21b4c90f92bc144c3e6d6465766963654b6579496e666fa16964
65766963654b6579a40102200121582096313d6c63e24e3372742bfdb1a33ba2c89
7dcd68ab8c753e4fbd48dca6b7f9a2258201fb3269edd418857de1b39a4e4a44b92
fa484caa722c228288f01d0c03a2c3d66f646967657374416c676f726974686d675
348412d3235365840b7c2d4abe85aa5ba814ef95de0385c71c802be8ac33a4a971a
85ed800ba7acb59cb21035f4a68fc0caa450cbefd3b255aec72f83595f0ae7b7d50
fe8a1c4cafe
]]></artwork>
        <t>The following is the CBOR Diagnostic Notation of the example above:</t>
        <artwork><![CDATA[
[
  << {
    1: -7
  } >>,
  {
    33: h'308201ef30820195a00302010202140bfec7da97e048e15ac3dacb9ea
    fe82e64fd07f5300a06082a8648ce3d04030230233114301206035504030c0b
    75746f7069612069616361310b3009060355040613025553301e170d3234313
    030313030303030305a170d3235313030313030303030305a30213112301006
    035504030c0975746f706961206473310b30090603550406130255533059301
    306072a8648ce3d020106082a8648ce3d03010703420004ace7ab7340e5d964
    8c5a72a9a6f56745c7aad436a03a43efea77b5fa7b88f0197d57d8983e1b37d
    3a539f4d588365e38cbbf5b94d68c547b5bc8731dcd2f146ba381a83081a530
    1c0603551d1f041530133011a00fa00d820b6578616d706c652e636f6d301e0
    603551d120417301581136578616d706c65406578616d706c652e636f6d301d
    0603551d0e0416041414e29017a6c35621ffc7a686b7b72db06cd12351301f0
    603551d2304183016801454fa2383a04c28e0d930792261c80c4881d2c00b30
    0e0603551d0f0101ff04040302078030150603551d250101ff040b300906072
    8818c5d050102300a06082a8648ce3d0403020348003045022100b7103fd4b9
    0529f50bd6f70c5ae5ce7f4f3d4d15a4e082812f9fa1f5c2e5aa0a0220070b2
    822ec7ce6c56804923a85b2cfbffd054cf9a915f070cfef7179a4bc6569'
  },
  << 24( << {
    "status": {
      "status_list": {
        "idx": 412,
        "uri": "https://example.com/statuslists/1"
      }
    },
    "docType": "org.iso.18013.5.1.mDL",
    "version": "1.0",
    "validityInfo": {
      "signed": 2024-10-01 13:30:02+00:00,
      "validFrom": 2024-10-01 13:30:02+00:00,
      "validUntil": 2025-10-01 13:30:02+00:00
    },
    "valueDigests": {
      "org.iso.18013.5.1": {
        0: h'a81d65ed5075fbd7ee19fa66e2bb3047ed826e2769873e7ef07c92
        3da7a6f243',
        1: h'48701a9546492284d266ed81d439230a582d0e1f17a08ab1859a3e
        fe980690a4',
        2: h'd11fe48c8835b30bfb3895c3905436ddfb63f59ab9eee181b11098
        53292a8f62',
        3: h'a741bf05e20a8bc359e32426106ed0899b2c60262cc3acc637ddc9
        941095fb7a',
        4: h'ab67cb9a8f20a8572f77f02727367d08dc8e57fb89deb46b9c626e
        94457b7d8b',
        5: h'bacddb4142b3842bd555206eb5acb27ded063294995c7e7fefbf93
        ece522604d',
        6: h'bfd02b3aebdc05b53b5539226c38088d6d784b0ea0fab69eb93116
        50a48d3253',
        7: h'27dab70fe71da63e5e5d199e8ae5b79cbe8904bc30c5b7544fb809
        e02ccb3e6a',
        8: h'0dbd7ccc9c7727d3d17295f1b6f1914071670ee23d4d33530c31f1
        f406b8e3b7',
        9: h'a5beb5efadf37f21637209abc519830681cc51f334818a823fec13
        b29552f5ba',
        10: h'd8047c95f9272d7d07b2c13a9f5ac2ee02380ab272a165e569391
        d89a2152c3c',
        11: h'04939930ffb4911ef03487a153605a30368b69f2437d6d21b4c90
        f92bc144c3e'
      }
    },
    "deviceKeyInfo": {
      "deviceKey": {
        1: 2,
        -1: 1,
        -2: h'96313d6c63e24e3372742bfdb1a33ba2c897dcd68ab8c753e4fbd
        48dca6b7f9a',
        -3: h'1fb3269edd418857de1b39a4e4a44b92fa484caa722c228288f01
        d0c03a2c3d6'
      }
    },
    "digestAlgorithm": "SHA-256"
  } >> ) >>,
  h'b7c2d4abe85aa5ba814ef95de0385c71c802be8ac33a4a971a85ed800ba7acb
  59cb21035f4a68fc0caa450cbefd3b255aec72f83595f0ae7b7d50fe8a1c4cafe'
]
]]></artwork>
      </section>
    </section>
    <section anchor="status-types">
      <name>Status Types</name>
      <t>This document defines the statuses of Referenced Tokens as Status Type values. A status describes the state, mode, condition or stage of an entity that is represented by the Referenced Token.</t>
      <t>A Status List can not represent multiple statuses per Referenced Token. If the Status List contains more than one bit per token (as defined by <tt>bits</tt> in the Status List), then the whole value of bits <bcp14>MUST</bcp14> describe one value. Status Types <bcp14>MUST</bcp14> have a numeric value between 0 and 255 for their representation in the Status List. The issuer of the Status List <bcp14>MUST</bcp14> choose an adequate <tt>bits</tt> value (bit size) to be able to describe the required Status Types for its application.</t>
      <section anchor="status-types-values">
        <name>Status Types Values</name>
        <t>This document creates a registry in <xref target="iana-status-types"/> that includes the most common Status Type values. Additional values may defined for particular use cases. Status Types described by this document comprise:</t>
        <ul spacing="normal">
          <li>
            <t>0x00 - "VALID" - The status of the Referenced Token is valid, correct or legal.</t>
          </li>
          <li>
            <t>0x01 - "INVALID" - The status of the Referenced Token is revoked, annulled, taken back, recalled or cancelled.</t>
          </li>
          <li>
            <t>0x02 - "SUSPENDED" - The status of the Referenced Token is temporarily invalid, hanging, debarred from privilege. This state is usually temporary.</t>
          </li>
        </ul>
        <t>The Status Type value 0x03 and Status Type values in the range 0x0B until 0x0F are permanently reserved as application specific. The processing of Status Types using these values is application specific. All other Status Type values are reserved for future registration.</t>
        <t>The processing rules for Referenced Tokens (such as JWT or CWT) precede any evaluation of a Referenced Token's status. For example, if a token is evaluated as being expired through the "exp" (Expiration Time) but also has a status of 0x00 ("VALID"), the token is considered expired.</t>
        <t>See <xref target="privacy-status-types"/> for privacy considerations on status types.</t>
      </section>
    </section>
    <section anchor="verification-and-processing">
      <name>Verification and Processing</name>
      <t>The fetching, processing and verifying of a Status List Token may be done by either the Holder or the Relying Party. The following section is described from the role of the Relying Party, however the same rules would also apply for the Holder.</t>
      <section anchor="status-list-request">
        <name>Status List Request</name>
        <t>To obtain the Status List Token, the Relying Party <bcp14>MUST</bcp14> send an HTTP GET request to the URI provided in the Referenced Token.</t>
        <t>The HTTP endpoint <bcp14>SHOULD</bcp14> support the use of Cross-Origin Resource Sharing (CORS) <xref target="CORS"/> and/or other methods as appropriate to enable Browser-based clients to access it, unless ecosystems using this specification choose not to support Browser-based clients.</t>
        <t>The Relying Party <bcp14>SHOULD</bcp14> send the following Accept HTTP Header to indicate the requested response type unless the Content-Type of Status List Tokens in the respective ecosystem is known or the Relying Party supports both formats:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+jwt" for Status List Token in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List Token in CWT format</t>
          </li>
        </ul>
        <t>If the Relying Party does not send an Accept Header, the response type is assumed to be known implicitly or out-of-band.</t>
        <t>A successful response that contains a Status List Token <bcp14>MUST</bcp14> use an HTTP status code in the 2xx range.</t>
        <t>A response <bcp14>MAY</bcp14> also choose to redirect the client to another URI using an HTTP status code in the 3xx range, which clients <bcp14>SHOULD</bcp14> follow. See <xref target="redirects"/> for security considerations on redirects.</t>
        <t>The following are non-normative examples of a request and response for a Status List Token with type <tt>application/statuslist+jwt</tt>:</t>
        <artwork type="ascii-art"><![CDATA[
GET /statuslists/1 HTTP/1.1
Host: example.com
Accept: application/statuslist+jwt
]]></artwork>
        <artwork type="ascii-art"><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/statuslist+jwt

eyJhbGciOiJFUzI1NiIsImtpZCI6IjEyIiwidHlwIjoic3RhdHVzbGlzdCtqd3QifQ.e
yJleHAiOjIyOTE3MjAxNzAsImlhdCI6MTY4NjkyMDE3MCwiaXNzIjoiaHR0cHM6Ly9le
GFtcGxlLmNvbSIsInN0YXR1c19saXN0Ijp7ImJpdHMiOjEsImxzdCI6ImVOcmJ1UmdBQ
WhjQlhRIn0sInN1YiI6Imh0dHBzOi8vZXhhbXBsZS5jb20vc3RhdHVzbGlzdHMvMSIsI
nR0bCI6NDMyMDB9._Rp-8Kw6C3qol9XvlKPJaI8Y9tEdvc072kB9yDadEMPRFymG5tSo
EzkSoShylkLrNbsJh14mGWq-i0B7Vkimzw
]]></artwork>
      </section>
      <section anchor="status-list-response">
        <name>Status List Response</name>
        <t>In the successful response, the Status Provider <bcp14>MUST</bcp14> use the following content-type:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+jwt" for Status List Token in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List Token in CWT format</t>
          </li>
        </ul>
        <t>In the case of "application/statuslist+jwt", the response <bcp14>MUST</bcp14> be of type JWT and follow the rules of <xref target="status-list-token-jwt"/>.
In the case of "application/statuslist+cwt", the response <bcp14>MUST</bcp14> be of type CWT and follow the rules of <xref target="status-list-token-cwt"/>.</t>
        <t>The body of such an HTTP response contains the raw Status List Token, that means the binary encoding as defined in section 9.2.1 of <xref target="RFC8392"/> for a Status List Token in CWT format and the JWS Compact Serialization form for a Status List Token in JWT format. Note that while the examples for Status List Tokens in CWT format in this document are provided in hex encoding, this is done purely for readability and does not mean that hex encoding is expected for HTTP messages.</t>
        <t>The HTTP response <bcp14>SHOULD</bcp14> use gzip Content-Encoding as defined in <xref target="RFC9110"/>.</t>
        <t>If caching-related HTTP headers are present in the HTTP response, Relying Parties <bcp14>MUST</bcp14> prioritize the exp and ttl claims within the Status List Token over the HTTP headers for determining caching behavior.</t>
      </section>
      <section anchor="validation-rules">
        <name>Validation Rules</name>
        <t>Upon receiving a Referenced Token, a Relying Party <bcp14>MUST</bcp14> first perform the validation of the Referenced Token - e.g., checking for expected attributes, valid signature and expiration time. The processing rules for Referenced Tokens (such as JWT or CWT) <bcp14>MUST</bcp14> precede any evaluation of a Referenced Token's status. For example, if a token is evaluated as being expired through the "exp" (Expiration Time) but also has a status of 0x00 ("VALID"), the token is considered expired. As this is out of scope for this document, this validation is not described here, but is expected to be done according to the format of the Referenced Token.</t>
        <t>If this validation is not successful, the Referenced Token <bcp14>MUST</bcp14> be rejected. If the validation was successful, the Relying Party <bcp14>MUST</bcp14> perform the following validation steps to evaluate the status of the reference token:</t>
        <ol spacing="normal" type="1"><li>
            <t>Check for the existence of a <tt>status</tt> claim, check for the existence of a <tt>status_list</tt> claim within the <tt>status</tt> claim and validate that the content of <tt>status_list</tt> adheres to the rules defined in <xref target="referenced-token-jose"/> for JOSE-based Referenced Tokens and <xref target="referenced-token-cose"/> for COSE-based Referenced Tokens. Other formats of Referenced Tokens may define other encoding of the URI and index.</t>
          </li>
          <li>
            <t>Resolve the Status List Token from the provided URI</t>
          </li>
          <li>
            <t>Validate the Status List Token:
            </t>
            <ol spacing="normal" type="a"><li>
                <t>Validate the Status List Token by following the rules defined in section 7.2 of <xref target="RFC7519"/> for JWTs and section 7.2 of <xref target="RFC8392"/> for CWTs. This step might require the resolution of a public key as described in <xref target="key-management"/>.</t>
              </li>
              <li>
                <t>Check for the existence of the required claims as defined in <xref target="status-list-token-jwt"/> and <xref target="status-list-token-cwt"/> depending on the token type</t>
              </li>
            </ol>
          </li>
          <li>
            <t>All existing claims in the Status List Token <bcp14>MUST</bcp14> be checked according to the rules in <xref target="status-list-token-jwt"/> and <xref target="status-list-token-cwt"/>
            </t>
            <ol spacing="normal" type="a"><li>
                <t>The subject claim (<tt>sub</tt> or <tt>2</tt>) of the Status List Token <bcp14>MUST</bcp14> be equal to the <tt>uri</tt> claim in the <tt>status_list</tt> object of the Referenced Token</t>
              </li>
              <li>
                <t>If the Relying Party has custom policies regarding the freshness of the Status List Token, it <bcp14>SHOULD</bcp14> check the issued at claim (<tt>iat</tt> or <tt>6</tt>)</t>
              </li>
              <li>
                <t>If the expiration time is defined (<tt>exp</tt> or <tt>4</tt>), it <bcp14>MUST</bcp14> be checked if the Status List Token is expired</t>
              </li>
              <li>
                <t>If the Relying Party is using a system for caching the Status List Token, it <bcp14>SHOULD</bcp14> check the <tt>ttl</tt> claim of the Status List Token and retrieve a fresh copy if (time status was resolved + ttl &lt; current time)</t>
              </li>
            </ol>
          </li>
          <li>
            <t>Decompress the Status List with a decompressor that is compatible with DEFLATE <xref target="RFC1951"/> and ZLIB <xref target="RFC1950"/></t>
          </li>
          <li>
            <t>Retrieve the status value of the index specified in the Referenced Token as described in <xref target="status-list"/>. Fail if the provided index is out of bounds of the Status List</t>
          </li>
          <li>
            <t>Check the status value as described in <xref target="status-types"/></t>
          </li>
        </ol>
        <t>If any of these checks fails, no statement about the status of the Referenced Token can be made and the Referenced Token <bcp14>SHOULD</bcp14> be rejected.</t>
      </section>
      <section anchor="historical-resolution">
        <name>Historical resolution</name>
        <t>By default, the status mechanism defined in this specification only conveys information about the state of Reference Tokens at the time the Status List Token was issued. The validity period for this information, as defined by the issuer, is explicitly stated by the <tt>iat</tt> (issued at) and <tt>exp</tt> (expiration time) claims for JWT and their corresponding ones for the CWT representation. If support for historical status information is required, this can be achieved by extending the request for the Status List Token as defined in <xref target="status-list-request"/> with a timestamp. This feature has additional privacy implications as described in <xref target="privacy-historical"/>.</t>
        <t>To obtain the Status List Token, the Relying Party <bcp14>MUST</bcp14> send an HTTP GET request to the URI provided in the Referenced Token with the additional query parameter <tt>time</tt> and its value being a unix timestamp. The response for a valid request <bcp14>SHOULD</bcp14> contain a Status List Token that was valid for that specified time or an error.</t>
        <t>If the Server does not support the additional query parameter, it <bcp14>SHOULD</bcp14> return a status code of 501 (Not Implemented) or if the requested time is not supported it <bcp14>SHOULD</bcp14> return a status code of 406 (Not Acceptable). A Status List Token might be served via static file hosting (e.g., leveraging a Content Delivery Network), which would result in the client not being able to retrieve those status codes. Thus, the client <bcp14>MUST</bcp14> verify support for this feature by verifying that the requested timestamp is within the valid time of the returned token signaled via <tt>iat</tt> (<tt>6</tt> for CWT) and <tt>exp</tt> (<tt>4</tt> for CWT).</t>
        <t>The following is a non-normative example of a GET request using the <tt>time</tt> query parameter:</t>
        <artwork type="ascii-art"><![CDATA[
GET /statuslists/1?time=1686925000 HTTP/1.1
Host: example.com
Accept: application/statuslist+jwt
]]></artwork>
        <t>The following is a non-normative example of a response for the above Request:</t>
        <artwork type="ascii-art"><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/statuslist+jwt

eyJhbGciOiJFUzI1NiIsImtpZCI6IjEyIiwidHlwIjoic3RhdHVzbGlzdCtqd3QifQ.e
yJleHAiOjIyOTE3MjAxNzAsImlhdCI6MTY4NjkyMDE3MCwiaXNzIjoiaHR0cHM6Ly9le
GFtcGxlLmNvbSIsInN0YXR1c19saXN0Ijp7ImJpdHMiOjEsImxzdCI6ImVOcmJ1UmdBQ
WhjQlhRIn0sInN1YiI6Imh0dHBzOi8vZXhhbXBsZS5jb20vc3RhdHVzbGlzdHMvMSIsI
nR0bCI6NDMyMDB9._Rp-8Kw6C3qol9XvlKPJaI8Y9tEdvc072kB9yDadEMPRFymG5tSo
EzkSoShylkLrNbsJh14mGWq-i0B7Vkimzw
]]></artwork>
      </section>
    </section>
    <section anchor="aggregation">
      <name>Status List Aggregation</name>
      <t>Status List Aggregation is an optional mechanism offered by the Issuer to publish a list of one or more Status List Tokens URIs, allowing a Relying Party to fetch Status List Tokens provided by this Issuer. This mechanism is intended to support fetching and caching mechanisms and allow offline validation of the status of a reference token for a period of time.</t>
      <t>If a Relying Party encounters an error while validating one of the Status List Tokens returned from the Status List Aggregation endpoint, it <bcp14>SHOULD</bcp14> continue processing the other Status List Tokens.</t>
      <t>There are two options for a Relying Party to retrieve the Status List Aggregation.
An Issuer <bcp14>MAY</bcp14> support any of these mechanisms:</t>
      <ul spacing="normal">
        <li>
          <t>Issuer metadata: The Issuer of the Referenced Token publishes an URI which links to Status List Aggregation, e.g. in publicly available metadata of an issuance protocol</t>
        </li>
        <li>
          <t>Status List Parameter: The Status Issuer includes an additional claim in the Status List Token that contains the Status List Aggregation URI.</t>
        </li>
      </ul>
      <artwork type="ascii-art"><![CDATA[
                                      ┌─────────────────┐
                                      │                 │
                                      │ Issuer Metadata │
                                      │                 │
                                      └───┬─────────────┘
                                          │
  ┌───────────────────┐                   │ link within metadata
 ┌───────────────────┐│  link all         ▼
┌───────────────────┐││◄───────┐  ┌─────────────────────────┐
│                   ││◄────────┤  │                         │
│ Status List Token │◄┴────────┴──┤ Status List Aggregation │
│                   │┘            │                         │
└───────┬───────────┘             └─────────────────────────┘
        │                                 ▲
        │   link by aggregation_uri       │
        └─────────────────────────────────┘
]]></artwork>
      <section anchor="issuer-metadata">
        <name>Issuer Metadata</name>
        <t>The Issuer <bcp14>MAY</bcp14> link to the Status List Aggregation URI in metadata that can be provided by different means like .well-known metadata as is used commonly in OAuth and OpenID Connect, or within Issuer certificates or trust lists (such as VICAL as defined in Annex C of <xref target="ISO.mdoc"/>). If the Issuer is an OAuth Authorization Server according to <xref target="RFC6749"/>, it is <bcp14>RECOMMENDED</bcp14> to use <tt>status_list_aggregation_endpoint</tt> for its metadata defined by <xref target="RFC8414"/>. The Issuer <bcp14>MAY</bcp14> limit the Status List Tokens listed by a Status List Aggregation to a particular type of Referenced Token.</t>
        <t>The concrete implementation details depend on the specific ecosystem and are out of scope of this specification.</t>
      </section>
      <section anchor="status-list-parameter">
        <name>Status List Parameter</name>
        <t>The URI to the Status List Aggregation <bcp14>MAY</bcp14> be provided as the optional parameter <tt>aggregation_uri</tt> in the Status List itself as explained in <xref target="status-list-cbor"/> and <xref target="status-list-json"/> respectively. A Relying Party may use this URI to retrieve an up-to-date list of relevant Status Lists.</t>
      </section>
      <section anchor="status-list-aggregation-in-json-format">
        <name>Status List Aggregation in JSON Format</name>
        <t>This section defines the structure for a JSON-encoded Status List Aggregation:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status_lists</tt>: <bcp14>REQUIRED</bcp14>. JSON array of strings that contains URIs linking to Status List Tokens.</t>
          </li>
        </ul>
        <t>The Status List Aggregation URI provides a list of Status List Token URIs. This aggregation in JSON and the media type return <bcp14>MUST</bcp14> be <tt>application/json</tt>. A Relying Party can iterate through this list and fetch all Status List Tokens before encountering the specific URI in a Referenced Token.</t>
        <t>The following is a non-normative example for media type <tt>application/json</tt>:</t>
        <sourcecode type="json"><![CDATA[
{
   "status_lists" : [
      "https://example.com/statuslists/1",
      "https://example.com/statuslists/2",
      "https://example.com/statuslists/3"
   ]
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="eku">
      <name>X.509 Certificate Extended Key Usage Extension</name>
      <t><xref target="RFC5280"/> specifies the Extended Key Usage (EKU) X.509 certificate extension for use on end entity certificates. The extension indicates one or more purposes for which the certified public key is valid. The EKU extension can be used in conjunction with the Key Usage (KU) extension, which indicates the set of basic cryptographic operations for which the certified key may be used. A certificate's issuer explicitly delegates Status List Token signing authority by issuing a X.509 certificate containing the KeyPurposeId defined below in the extended key usage extension.
Other specifications <bcp14>MAY</bcp14> choose to re-use this OID for other status mechanisms under the condition that they are registered in the "JWT Status Mechanisms" or "CWT Status Mechanisms" registries.</t>
      <t>The following OID is defined for usage in the EKU extension</t>
      <artwork><![CDATA[
  id-kp  OBJECT IDENTIFIER  ::=
       { iso(1) identified-organization(3) dod(6) internet(1)
         security(5) mechanisms(5) pkix(7) 3 }

  id-kp-oauthStatusSigning OBJECT IDENTIFIER ::= { id-kp TBD }
]]></artwork>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>The Status List as defined in <xref target="status-list"/> only exists in cryptographically secured containers which allows checking the integrity and origin without relying on other aspects like transport security (e.g., the web PKI).</t>
      <section anchor="correct-decoding-and-parsing-of-the-encoded-status-list">
        <name>Correct decoding and parsing of the encoded Status List</name>
        <t>Implementers should be particularly careful for the correct parsing and decoding of the Status List. Incorrect implementations might check the index on the wrong data or miscalculate the bit and byte index leading to an erroneous status of the Referenced Token. Beware, that bits are indexed (bit order) from least significant bit to most significant bit (also called "right to left") while bytes are indexed (byte order) in their natural incrementing byte order (usually written for display purpose from left to right). Endianness does not apply here because each status value fits within a single byte.</t>
        <t>Implementations are <bcp14>RECOMMENDED</bcp14> to verify correctness using the test vectors given by this specification.</t>
      </section>
      <section anchor="security-guidance-for-jwt-and-cwt">
        <name>Security Guidance for JWT and CWT</name>
        <t>A Status List Token in the JWT format should follow the security considerations of <xref target="RFC7519"/> and the best current practices of <xref target="RFC8725"/>.</t>
        <t>A Status List Token in the CWT format should follow the security considerations of <xref target="RFC8392"/>.</t>
      </section>
      <section anchor="key-management">
        <name>Key Resolution and Trust Management</name>
        <t>This specification does not mandate specific methods for key resolution and trust management, however the following recommendations are made for specifications, profiles, or ecosystems that are planning to make use of the Status List mechanism:</t>
        <t>If the Issuer of the Referenced Token is the same entity as the Status Issuer, then the same key that is embedded into the Referenced Token may be used for the Status List Token. In this case the Status List Token may use:</t>
        <ul spacing="normal">
          <li>
            <t>the same <tt>x5c</tt> value or an <tt>x5t</tt>, <tt>x5t#S256</tt> or <tt>kid</tt> parameter referencing to the same key as used in the Referenced Token for JOSE.</t>
          </li>
          <li>
            <t>the same <tt>x5chain</tt> value or an <tt>x5t</tt> or <tt>kid</tt> parameter referencing to the same key as used in the Referenced Token for COSE.</t>
          </li>
        </ul>
        <t>Alternatively, the Status Issuer may use the same web-based key resolution that is used for the Referenced Token. In this case the Status List Token may use:</t>
        <ul spacing="normal">
          <li>
            <t>an <tt>x5u</tt>, <tt>jwks</tt>, <tt>jwks_uri</tt> or <tt>kid</tt> parameter referencing to a key using the same web-based resolution as used in the Referenced Token for JOSE.</t>
          </li>
          <li>
            <t>an <tt>x5u</tt> or <tt>kid</tt> parameter referencing to a key using the same web-based resolution as used in the Referenced Token for COSE.</t>
          </li>
        </ul>
        <artwork type="ascii-art"><![CDATA[
┌────────┐  host keys  ┌──────────────────────┐
│ Issuer ├────────┬───►│ .well-known metadata │
└─┬──────┘        │    └──────────────────────┘
  ▼ update status │
┌───────────────┐ │
│ Status Issuer ├─┘
└─┬─────────────┘
  ▼ provide Status List
┌─────────────────┐
│ Status Provider │
└─────────────────┘
]]></artwork>
        <t>If the Issuer of the Referenced Token is a different entity than the Status Issuer, then the keys used for the Status List Token may be cryptographically linked, e.g. by a Certificate Authority through an x.509 PKI. The certificate of the Issuer for the Referenced Token and the Status Issuer should be issued by the same Certificate Authority and the Status Issuer's certificate should utilize <xref target="eku">extended key usage</xref>.</t>
        <artwork type="ascii-art"><![CDATA[
┌───────────────────────┐
│ Certificate Authority │
└─┬─────────────────────┘
  │ authorize
  │  ┌────────┐
  ├─►│ Issuer │
  │  └─┬──────┘
  │    ▼ update status
  │  ┌───────────────┐
  └─►│ Status Issuer │
     └─┬─────────────┘
       ▼ provide Status List
     ┌─────────────────┐
     │ Status Provider │
     └─────────────────┘
]]></artwork>
      </section>
      <section anchor="redirects">
        <name>Redirection 3xx</name>
        <t>Clients that follow 3xx (Redirection) class of status codes should be aware of possible dangers of redirects, such as infinite redirection loops since they could be used as an attack vector for possible denial of service attacks on clients. A client <bcp14>SHOULD</bcp14> detect and intervene in cyclical redirections (i.e., "infinite" redirection loops). More guidance for redirects given in Section 15.4 of <xref target="RFC9110"/> should be applied.</t>
      </section>
      <section anchor="security-ttl">
        <name>Expiration and Caching</name>
        <t>Expiration and caching information is conveyed via the <tt>exp</tt> and <tt>ttl</tt> claims as explained in <xref target="expiry-and-caching"/>. Clients should check that both values are within reasonable ranges before requesting new Status List Tokens based on these values to prevent accidentally creating unreasonable amounts of requests for a specific URL. Status Issuers could accidentally or maliciously use this mechanism to effectively DDoS the contained URL of the Status Provider.</t>
        <t>Concrete values for both claims highly depend on the use-case requirements and clients should be configured with lower/upper bounds for these values that fit their respective use-cases.</t>
      </section>
      <section anchor="security-mac">
        <name>Status List Token Protection</name>
        <t>This specification allows both, digital signatures using asymmetric cryptography, and Message Authentication Codes (MAC) to be used to protect Status List Tokens. Implementers should only use MACs to secure the integrity of Status List Tokens if they fully understand the risks of MACs when compared to digital signatures and especially the requirements of their use-case scenarios. These use-cases typically represent deployments where Status Issuer and Relying Party have a trust relationship and the possibility to securely exchange keys out of band or are the same entity and no other entity needs to verify the Status List Token. We expect most deployments to use digital signatures for the protection of Status List Tokens and implementers should default to digital signatures if they are unsure.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <section anchor="privacy-issuer">
        <name>Observability of Issuers</name>
        <t>The main privacy consideration for a Status List, especially in the context of the Issuer-Holder-Verifier model <xref target="SD-JWT.VC"/>, is to prevent the Issuer from tracking the usage of the Referenced Token when the status is being checked. If an Issuer offers status information by referencing a specific token, this would enable the Issuer to create a profile for the issued token by correlating the date and identity of Relying Parties, that are requesting the status.</t>
        <t>The Status List approaches these privacy implications by integrating the status information of many Referenced Tokens into the same list. Therefore, the Issuer does not learn for which Referenced Token the Relying Party is requesting the Status List. The privacy of the Holder is protected by the anonymity within the set of Referenced Tokens in the Status List, also called herd privacy. This limits the possibilities of tracking by the Issuer.</t>
        <t>The herd privacy is depending on the number of entities within the Status List called its size. A larger size results in better privacy but also impacts the performance as more data has to be transferred to read the Status List.</t>
        <t>Additionally, the Issuer may analyse data from the HTTP request to identify the Relying Party, e.g. through the sender's IP address.</t>
        <t>This behaviour may be mitigated by:</t>
        <ul spacing="normal">
          <li>
            <t>private relay protocols or other mechanisms hiding the original sender like <xref target="RFC9458"/>.</t>
          </li>
          <li>
            <t>using trusted Third Party Hosting, see <xref target="third-party-hosting"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="issuer-tracking-of-reference-tokens">
        <name>Issuer Tracking of Reference Tokens</name>
        <t>An Issuer could maliciously or accidentally bypass the privacy benefits of the herd privacy by either:</t>
        <ul spacing="normal">
          <li>
            <t>Generating a unique Status List for every Referenced Token. By these means, the Issuer could maintain a mapping between Referenced Tokens and Status Lists and thus track the usage of Referenced Tokens by utilizing this mapping for the incoming requests.</t>
          </li>
          <li>
            <t>Encoding a unique URI in each Reference Token which points to the underlying Status List. This may involve using URI components such as query parameters, unique path segments, or fragments to make the URI unique.</t>
          </li>
        </ul>
        <t>This malicious behavior can be detected by Relying Parties that request large amounts of Referenced Tokens by comparing the number of different Status Lists and their sizes with the volume of Reference Tokens being verified.</t>
      </section>
      <section anchor="privacy-relying-party">
        <name>Observability of Relying Parties</name>
        <t>Once the Relying Party receives the Referenced Token, this enables them to request the Status List to validate its status through the provided <tt>uri</tt> parameter and look up the corresponding <tt>index</tt>. However, the Relying Party may persistently store the <tt>uri</tt> and <tt>index</tt> of the Referenced Token to request the Status List again at a later time. By doing so regularly, the Relying Party may create a profile of the Referenced Token's validity status. This behaviour may be intended as a feature, e.g. for an identity proofing (e.g. Know-Your-Customer process in finance industry) that requires regular validity checks, but might also be abused in cases where this is not intended and unknown to the Holder, e.g. profiling the suspension of a driving license or checking the employment status of an employee credential.</t>
        <t>This behaviour could be mitigated by:</t>
        <ul spacing="normal">
          <li>
            <t>regular re-issuance of the Referenced Token, see <xref target="implementation-linkability"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="privacy-outsider">
        <name>Observability of Outsiders</name>
        <t>Outside actors may analyse the publicly available Status Lists to get information on the internal processes of the Issuer and its related business, e.g. number of customers or clients. This data may allow inferences on the total number of issued Reference Tokens and the revocation rate. Additionally, actors may regularly fetch this data or use the historic data functionality to learn how these numbers change over time.</t>
        <t>This behaviour could be mitigated by:</t>
        <ul spacing="normal">
          <li>
            <t>disabling the historical data feature <xref target="historical-resolution"/></t>
          </li>
          <li>
            <t>disabling the Status List Aggregation <xref target="aggregation"/></t>
          </li>
          <li>
            <t>choosing non-sequential, pseudo-random or random indices</t>
          </li>
          <li>
            <t>using decoy entries to obfuscate the real number of Referenced Tokens within a Status List</t>
          </li>
          <li>
            <t>choosing to deploy and utilize multiple Status Lists simultaneously</t>
          </li>
        </ul>
      </section>
      <section anchor="unlinkability">
        <name>Unlinkability</name>
        <t>The tuple of uri and index inside the Referenced Token are unique and therefore is traceable data.</t>
        <section anchor="colluding-relying-parties">
          <name>Colluding Relying Parties</name>
          <t>Two or more colluding Relying Parties may link two transactions involving the same Referenced Token by comparing the status claims of received Referenced Tokens and therefore determine that they have interacted with the same Holder.</t>
          <t>To avoid privacy risks for colluding Relying Parties, it is <bcp14>RECOMMENDED</bcp14> that Issuers provide the ability to issue batches of one-time-use Referenced Tokens, enabling Holders to use in a single interaction with a Relying Party before discarding. See <xref target="implementation-linkability"/> to avoid further correlatable information by the values of <tt>uri</tt> and <tt>index</tt>, Status Issuers are <bcp14>RECOMMENDED</bcp14> to:</t>
          <ul spacing="normal">
            <li>
              <t>choose non-sequential, pseudo-random or random indices</t>
            </li>
            <li>
              <t>use decoy entries to obfuscate the real number of Referenced Tokens within a Status List</t>
            </li>
            <li>
              <t>choose to deploy and utilize multiple Status Lists simultaneously</t>
            </li>
          </ul>
        </section>
        <section anchor="colluding-status-issuer-and-relying-party">
          <name>Colluding Status Issuer and Relying Party</name>
          <t>A Status Issuer and a Relying Party Issuer may link two transaction involving the same Referenced Tokens by comparing the status claims of the Referenced Token and therefore determine that they have interacted with the same Holder. It is therefore recommended to use Status Lists for Referenced Token formats that have similar unlinkability properties.</t>
        </section>
      </section>
      <section anchor="third-party-hosting">
        <name>External Status Provider for Privacy</name>
        <t>If the roles of the Status Issuer and the Status Provider are performed by different entities, this may give additional privacy assurances as the Issuer has no means to identify the Relying Party or its request.</t>
        <t>Third-Party hosting may also allow for greater scalability, as the Status List Tokens may be served by operators with greater resources, like CDNs, while still ensuring authenticity and integrity of Token Status List, as it is signed by the Status Issuer.</t>
      </section>
      <section anchor="privacy-historical">
        <name>Historical Resolution</name>
        <t>By default, this specification only supports providing Status List information for the most recent status information and does not allow the lookup of historical information like a validity state at a specific point in time. There exists optional support for a query parameter that allows these kind of historic lookups as described in <xref target="historical-resolution"/>. There are scenarios where such a functionality is necessary, but this feature should only be implemented when the scenario and the consequences of enabling historical resolution are fully understood.</t>
        <t>There are strong privacy concerns that have to be carefully taken into consideration when providing a mechanism that allows historic requests for status information - see <xref target="privacy-relying-party"/> for more details. Support for this functionality is optional and Implementers are <bcp14>RECOMMENDED</bcp14> to not support historic requests unless there are strong reasons to do so and after carefully considering the privacy implications.</t>
      </section>
      <section anchor="privacy-status-types">
        <name>Status Types</name>
        <t>As previously explained, there is the potential risk of observability by Relying Parties (see <xref target="privacy-relying-party"/>) and Outsiders (see <xref target="privacy-outsider"/>). That means that any Status Type that transports special information about a Referenced Token can leak information to other parties. This document defines one additional Status Type with "SUSPENDED" that conveys such additional information.</t>
        <t>A concrete example for "SUSPENDED" would be a driver's license, where the digital driver's license might still be useful to prove other information about its holder, but suspended could signal that it should not be considered valid in the scope of being allowed to drive a car. This case could be solved by either introducing a special status type, or by revoking the Referenced Token and re-issuing with changed attributes. For such a case, the status type suspended might be dangerous as it would leak the information of a suspended driver's license even if the driver's license is used as a mean of identification and not in the context of driving a car. This could also allow for the unwanted collection of statistical data on the status of driver's licenses.</t>
        <t>Ecosystems that want to use other Status Types than "VALID" and "INVALID" should consider the possible leakage of data and profiling possibilities before doing so and evaluate if revocation and re-issuance might a better fit for their use-case.</t>
      </section>
    </section>
    <section anchor="implementation">
      <name>Implementation Considerations</name>
      <section anchor="implementation-lifecycle">
        <name>Token Lifecycle</name>
        <t>The lifetime of a Status List Token depends on the lifetime of its Referenced Tokens. Once all Referenced Tokens are expired, the Issuer may stop serving the Status List Token.</t>
      </section>
      <section anchor="implementation-linkability">
        <name>Linkability Mitigation</name>
        <t>Referenced Tokens may be regularly re-issued to mitigate the linkability of presentations to Relying Parties. In this case, every re-issued Referenced Token <bcp14>MUST</bcp14> have a fresh Status List entry in order to prevent this from becoming a possible source of correlation.</t>
        <t>Referenced Tokens may also be issued in batches and be presented by Holders in a one-time-use policy to avoid linkability. In this case, every Referenced Token <bcp14>MUST</bcp14> have a dedicated Status List entry and <bcp14>MAY</bcp14> be spread across multiple Status List Tokens. Revoking batch-issued Referenced Tokens might reveal this correlation later on.</t>
        <t>Beware, that this mechanism solves linkability issues between Relying Parties, but does not prevent traceability by Issuers.</t>
      </section>
      <section anchor="default-values-and-double-allocation">
        <name>Default Values and Double Allocation</name>
        <t>The Status Issuer is <bcp14>RECOMMENDED</bcp14> to initialize the Status List byte array with a default value provided as
an initialization parameter by the Issuer of the Referenced Token. The Issuer is <bcp14>RECOMMENDED</bcp14> to use a default value that represents the most common value for its Referenced Tokens to avoid an update during issuance (usually 0x00, VALID). This preserves the benefits from compression and effectively hides the number of managed Referenced Tokens since an unused index value can not be distinguished from a valid Referenced Token.</t>
        <t>The Status Issuer is <bcp14>RECOMMENDED</bcp14> to prevent double allocation, i.e. re-using the same <tt>uri</tt> and <tt>index</tt> for multiple Referenced Tokens (since <tt>uri</tt> and <tt>index</tt> form a unique identifier that might be used for tracking, see <xref target="privacy-considerations"/> for more details). The Status Issuer <bcp14>MUST</bcp14> prevent any unintended double allocation.</t>
      </section>
      <section anchor="status-list-size">
        <name>Status List Size</name>
        <t>The storage and transmission size of the Status Issuer's Status List Tokens depends on:</t>
        <ul spacing="normal">
          <li>
            <t>the size of the Status List, i.e. the number of Referenced Tokens</t>
          </li>
          <li>
            <t>the revocation rate and distribution of the Status List data (due to compression, revocation rates close to 0% or 100% create lowest sizes while revocation rates closer to 50% and random distribution create highest sizes)</t>
          </li>
          <li>
            <t>the lifetime of Referenced Tokens (shorter lifetimes allows for earlier retirement of Status List Tokens)</t>
          </li>
        </ul>
        <t>The Status List Issuer may increase the size of a Status List if it requires indices for additional Referenced Tokens. It is <bcp14>RECOMMENDED</bcp14> that the size of a Status List in bits is divisible in bytes (8 bits) without a remainder, i.e. <tt>size-in-bits</tt> % 8 = 0.</t>
        <t>The Status List Issuer may divide its Referenced Tokens up into multiple Status Lists to reduce the transmission size of an individual Status List Token. This may be useful for setups where some entities operate in constrained environments, e.g. for mobile internet or embedded devices. The Status List Issuer may organize the Status List Tokens depending on the Referenced Token's expiry date to align their lifecycles and allow for easier retiring of Status List Tokens, however the Status Issuer must be aware of possible privacy risks due to correlations.</t>
      </section>
      <section anchor="external-status-issuer">
        <name>External Status Issuer</name>
        <t>If the roles of the Issuer of the Referenced Token and the Status Issuer are performed by different entities, this may allow for use case that require revocations of Referenced Tokens to be managed by a different entities, e.g. for regulatory or privacy reasons. In this scenario both parties must align on:</t>
        <ul spacing="normal">
          <li>
            <t>the key and trust management as described in <xref target="key-management"/></t>
          </li>
          <li>
            <t>parameters for the Status List
            </t>
            <ul spacing="normal">
              <li>
                <t>number of <tt>bits</tt> for the Status Type as described in <xref target="status-list"/></t>
              </li>
              <li>
                <t>update cycle of the Issuer used for <tt>ttl</tt> in the Status List Token as described in <xref target="status-list-token"/></t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="external-status-provider-for-scalability">
        <name>External Status Provider for Scalability</name>
        <t>If the roles of the Status Issuer and the Status Provider are performed by different entities, this may allow for greater scalability, as the Status List Tokens may be served by operators with greater resources, like CDNs. At the same time the authenticity and integrity of Token Status List is still guaranteed, as it is signed by the Status Issuer.</t>
      </section>
      <section anchor="expiry-and-caching">
        <name>Status List Update Interval and Caching</name>
        <t>Status Issuers have two options to communicate their update interval policy for the status of their Referenced Tokens:</t>
        <ul spacing="normal">
          <li>
            <t>the <tt>exp</tt> claim specifies an absolute timestamp, marking the point in time when the Status List expires and <bcp14>MUST NOT</bcp14> be relied upon any longer</t>
          </li>
          <li>
            <t>the <tt>ttl</tt> claim represents a duration to be interpreted relative to the time the Status List is fetched, indicating when a new version of the Status List may be available</t>
          </li>
        </ul>
        <t>Both <tt>ttl</tt> and <tt>exp</tt> are <bcp14>RECOMMENDED</bcp14> to be used by the Status Issuer.</t>
        <t>When fetching a Status List Token, Relying Parties must carefully evaluate how long a Status List is cached for. Collectively the <tt>iat</tt>, <tt>exp</tt> and <tt>ttl</tt> claims when present in a Status List Token communicate how long a Status List should be cached and should be considered valid for. Relying Parties have different options for caching the Status List:</t>
        <ul spacing="normal">
          <li>
            <t>After time of fetching, the Relying Party caches the Status List for time duration of <tt>ttl</tt> before making checks for updates. This method is <bcp14>RECOMMENDED</bcp14> to distribute the load for the Status Provider.</t>
          </li>
          <li>
            <t>After initial fetching, the Relying Party checks for updates at time of <tt>iat</tt> + <tt>ttl</tt>. This method ensures the most up-to-date information for critical use cases. The Relying Party should account a minimal offset due to the signing and distribution process of the Status Issuer.</t>
          </li>
          <li>
            <t>If no <tt>ttl</tt> is given, then Relying Party <bcp14>SHOULD</bcp14> check for updates latest after time of <tt>exp</tt>.</t>
          </li>
        </ul>
        <t>Ultimately, it's the Relying Parties decision how often to check for updates, ecosystems may define their own guidelines and policies for updating the Status List information. Clients should ensure that <tt>exp</tt> and <tt>ttl</tt> are within reasonable bounds before creating requests to get a fresh Status List Token (see <xref target="security-ttl"/> for more details).</t>
        <t>The following diagram illustrates the relationship between these claims and how they are designed to influence caching:</t>
        <artwork type="ascii-art"><![CDATA[
       Time of        Check for        Check for        Check for
       Fetching        updates          updates          updates

 iat     │                │                │                │    exp
         │                │                │                │
  │      │                │                │                │     │
  │      │                │                │                │     │
  │      │                │                │                │     │
  │      │                │                │                │     │
  │      │      ttl       │      ttl       │      ttl       │     │
  │      │ ─────────────► │ ─────────────► │ ─────────────► │ ──► │
  │      │                │                │                │     │
  │      │                │                │                │     │
  │                                                               │
──┼───────────────────────────────────────────────────────────────┼─►
  │                                                               │
]]></artwork>
      </section>
      <section anchor="relying-parties-avoiding-correlatable-information">
        <name>Relying Parties avoiding correlatable Information</name>
        <t>If the Relying Party does not require the Referenced Token or the Status List Token, e.g. for subsequent status checks or audit trail, it is <bcp14>RECOMMENDED</bcp14> to delete correlatable information, in particular:</t>
        <ul spacing="normal">
          <li>
            <t>the <tt>status</tt> claim in the Referenced Token (after the presentation)</t>
          </li>
          <li>
            <t>the Status List Token itself (after expiration or update)</t>
          </li>
        </ul>
        <t>The Relying Party should instead only keep the relevant payload from the Referenced Token.</t>
      </section>
      <section anchor="status-list-formats">
        <name>Status List Formats</name>
        <t>This specification defines 2 different token formats of the Status List:</t>
        <ul spacing="normal">
          <li>
            <t>JWT</t>
          </li>
          <li>
            <t>CWT</t>
          </li>
        </ul>
        <t>This specification states no requirements to not mix different formats like a CBOR based Referenced Token using a JWT for the Status List, but the expectation is that within an ecosystem, a choice for specific formats is made.
Within such an ecosystem, only support for those selected variants is required and implementations should know what to expect via a profile.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="json-web-token-claims-registration">
        <name>JSON Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "JSON Web Token Claims" registry <xref target="IANA.JWT"/> established by <xref target="RFC7519"/>.</t>
        <section anchor="registry-contents">
          <name>Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Description: A JSON object containing a reference to a status mechanism from the JWT Status Mechanisms Registry.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-claim"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Description: A JSON object containing up-to-date status information on multiple tokens using the Token Status List mechanism.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-jwt"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Description: Time to Live</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-jwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="iana-registry">
        <name>JWT Status Mechanisms Registry</name>
        <t>This specification establishes the IANA "JWT Status Mechanisms" registry for JWT "status" member values and adds it to the "JSON Web Token (JWT)" registry group at https://www.iana.org/assignments/jwt. The registry records the status mechanism member and a reference to the specification that defines it.</t>
        <t>JWT Status Mechanisms are registered by Specification Required <xref target="RFC8126"/> after a three-week
review period on the jwt-reg-review@ietf.org mailing list, on the advice of one or more Designated Experts.
However, to allow for the allocation of names prior to publication, the Designated Expert(s) may approve
registration once they are satisfied that such a specification will be published.</t>
        <t>Registration requests sent to the mailing list for review should use an appropriate subject (e.g., "Request to register JWT Status Mechanism: example").</t>
        <t>Within the review period, the Designated Expert(s) will either approve or deny the registration request, communicating this decision
to the review list and IANA. Denials should include an explanation and, if applicable, suggestions as to how to make the request
successful.</t>
        <t>IANA must only accept registry updates from the Designated Expert(s) and should direct all requests for registration to the review mailing list.</t>
        <section anchor="registration-template">
          <name>Registration Template</name>
          <t>Status Mechanism Value:</t>
          <ul empty="true">
            <li>
              <t>The name requested (e.g., "status_list"). The name is case sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts state that there is a compelling reason to allow an exception.</t>
            </li>
          </ul>
          <t>Status Mechanism Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the status mechanism.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For IETF Stream RFCs, list the IETF. For others, give the name of the responsible party. Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents. An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Mechanism Value: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Status Mechanism Description: A Token Status List containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="referenced-token-jose"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cbor-web-token-claims-registration">
        <name>CBOR Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "CBOR Web Token (CWT) Claims" registry <xref target="IANA.CWT"/> established by <xref target="RFC8392"/>.</t>
        <section anchor="registry-contents-1">
          <name>Registry Contents</name>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Description: A CBOR structure containing a reference to a status mechanism from the CWT Status Mechanisms Registry.</t>
            </li>
            <li>
              <t>JWT Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65535)</t>
            </li>
            <li>
              <t>Claim Value Type: map</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Reference: <xref target="status-claim"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Description: A CBOR structure containing up-to-date status information on multiple tokens using the Token Status List mechanism.</t>
            </li>
            <li>
              <t>JWT Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65533)</t>
            </li>
            <li>
              <t>Claim Value Type: map</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-cwt"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Description: Time to Live</t>
            </li>
            <li>
              <t>JWT Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65534)</t>
            </li>
            <li>
              <t>Claim Value Type: unsigned integer</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-cwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cwt-iana-registry">
        <name>CWT Status Mechanisms Registry</name>
        <t>This specification establishes the IANA "CWT Status Mechanisms" registry for CWT "status" member values and adds it to the "CBOR Web Token (CWT) Claims" registry group at https://www.iana.org/assignments/cwt. The registry records the status mechanism member and a reference to the specification that defines it.</t>
        <t>CWT Status Mechanisms are registered by Specification Required <xref target="RFC8126"/> after a three-week
review period on the cwt-reg-review@ietf.org mailing list, on the advice of one or more Designated Experts. However, to allow for the allocation of names prior to publication, the Designated Expert(s) may approve registration once they are satisfied that such a
specification will be published.</t>
        <t>Registration requests sent to the mailing list for review should use an appropriate subject (e.g., "Request to register CWT Status Mechanism: example").</t>
        <t>Within the review period, the Designated Expert(s) will either approve or deny the registration request, communicating this decision
to the review list and IANA. Denials should include an explanation and, if applicable, suggestions as to how to make the request
successful.</t>
        <t>IANA must only accept registry updates from the Designated Expert(s) and should direct all requests for registration to the review mailing list.</t>
        <section anchor="registration-template-1">
          <name>Registration Template</name>
          <t>Status Mechanism Value:</t>
          <ul empty="true">
            <li>
              <t>The name requested (e.g., "status_list"). The name is case sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts state that there is a compelling reason to allow an exception.</t>
            </li>
          </ul>
          <t>Status Mechanism Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the status mechanism.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For IETF Stream RFCs, list the IETF. For others, give the name of the responsible party. Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents. An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents-1">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Mechanism Value: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Status Mechanism Description: A Token Status List containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="referenced-token-cose"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="iana-status-types">
        <name>OAuth Status Types Registry</name>
        <t>This specification establishes the IANA "OAuth Status Types" registry for Status List values and adds it to the "OAuth Parameters" registry group at https://www.iana.org/assignments/oauth-parameters. The registry records a human readable label, the bit representation and a common description for it.</t>
        <t>Status Types are registered by Specification Required <xref target="RFC8126"/> after a two-week
review period on the oauth-ext-review@ietf.org mailing list, on the advice of one or more Designated Experts. However, to allow for the allocation of names prior to publication, the Designated Expert(s) may approve registration once they are satisfied that such a
specification will be published.</t>
        <t>Registration requests sent to the mailing list for review should use an appropriate subject (e.g., "Request to register Status Type name: example").</t>
        <t>Within the review period, the Designated Expert(s) will either approve or deny the registration request, communicating this decision
to the review list and IANA. Denials should include an explanation and, if applicable, suggestions as to how to make the request
successful.</t>
        <t>IANA must only accept registry updates from the Designated Expert(s) and should direct all requests for registration to the review mailing list.</t>
        <section anchor="registration-template-2">
          <name>Registration Template</name>
          <t>Status Type Name:</t>
          <ul empty="true">
            <li>
              <t>The name is a human-readable case insensitive label for the Status Type that helps to talk about the status of Referenced Token in common language.</t>
            </li>
          </ul>
          <t>Status Type Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the Status Type and optional examples.</t>
            </li>
          </ul>
          <t>Status Type value:</t>
          <ul empty="true">
            <li>
              <t>The bit representation of the Status Type in a byte hex representation. Valid Status Type values range from 0x00-0xFF. Values are filled up with zeros if they have less than 8 bits.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For IETF Stream RFCs, list the IETF. For others, give the name of the responsible party. Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents. An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents-2">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: VALID</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is valid, correct or legal.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x00</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: INVALID</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is revoked, annulled, taken back, recalled or cancelled.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x01</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: SUSPENDED</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is temporarily invalid, hanging or debarred from privilege. This state is usually temporary.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x02</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: APPLICATION_SPECIFIC</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is application specific.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x03</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: APPLICATION_SPECIFIC</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is application specific.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x0B-0xOF</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
        </section>
      </section>
      <section anchor="oauth-parameters-registration">
        <name>OAuth Parameters Registration</name>
        <t>This specification requests registration of the following values in the IANA "OAuth Authorization Server Metadata" registry <xref target="IANA.OAuth.Params"/> established by <xref target="RFC8414"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Metadata Name: status_list_aggregation_endpoint</t>
          </li>
          <li>
            <t>Metadata Description: URL of the Authorization Server aggregating OAuth Token Status List URLs for token status management.</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Reference: <xref target="aggregation"/> of this specification</t>
          </li>
        </ul>
      </section>
      <section anchor="media-type-registration">
        <name>Media Type Registration</name>
        <t>This section requests registration of the following media types <xref target="RFC2046"/> in
the "Media Types" registry <xref target="IANA.MediaTypes"/> in the manner described
in <xref target="RFC6838"/>.</t>
        <t>To indicate that the content is an JWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: See <xref target="status-list-token-jwt"/> of this specification</t>
          </li>
          <li>
            <t>Security considerations: See <xref target="Security"/> of this specification</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information: n/a</t>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an CWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: See <xref target="status-list-token-cwt"/> of this specification</t>
          </li>
          <li>
            <t>Security considerations: See <xref target="Security"/> of this specification</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information: n/a</t>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
      </section>
      <section anchor="coap-content-type">
        <name>CoAP Content-Format Registrations</name>
        <t>IANA is requested to register the following Content-Format numbers in
the "CoAP Content-Formats" sub-registry, within the "Constrained
RESTful Environments (CoRE) Parameters" Registry <xref target="IANA.Core.Params"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Content Type: application/statuslist+cwt</t>
          </li>
          <li>
            <t>Content Coding: -</t>
          </li>
          <li>
            <t>ID: TBD</t>
          </li>
          <li>
            <t>Reference: this specification</t>
          </li>
        </ul>
      </section>
      <section anchor="x509-certificate-extended-key-purpose-oid-registration">
        <name>X.509 Certificate Extended Key Purpose OID Registration</name>
        <t>IANA is also requested to register the following OID "1.3.6.1.5.5.7.3.TBD" in the "SMI Security for PKIX Extended Key Purpose" registry (1.3.6.1.5.5.7.3), this OID is defined in section <xref target="eku"/>.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1950">
          <front>
            <title>ZLIB Compressed Data Format Specification version 3.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <author fullname="J-L. Gailly" surname="J-L. Gailly"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1950"/>
          <seriesInfo name="DOI" value="10.17487/RFC1950"/>
        </reference>
        <reference anchor="RFC1951">
          <front>
            <title>DEFLATE Compressed Data Format Specification version 1.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1951"/>
          <seriesInfo name="DOI" value="10.17487/RFC1951"/>
        </reference>
        <reference anchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC9596">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) "typ" (type) Header Parameter</title>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <author fullname="O. Steele" initials="O." surname="Steele"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This specification adds the equivalent of the JSON Object Signing and Encryption (JOSE) "typ" (type) header parameter to CBOR Object Signing and Encryption (COSE). This enables the benefits of explicit typing (as defined in RFC 8725, "JSON Web Token Best Current Practices") to be brought to COSE objects. The syntax of the COSE type header parameter value is the same as the existing COSE content type header parameter.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9596"/>
          <seriesInfo name="DOI" value="10.17487/RFC9596"/>
        </reference>
        <reference anchor="IANA.MediaTypes" target="https://www.iana.org/assignments/media-types/media-types.xhtml">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JOSE" target="https://www.iana.org/assignments/jose/jose.xhtml">
          <front>
            <title>JSON Object Signing and Encryption (JOSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JWT" target="https://www.iana.org/assignments/jwt/jwt.xhtml">
          <front>
            <title>JSON Web Token Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.CWT" target="https://www.iana.org/assignments/cwt/cwt.xhtml">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.OAuth.Params" target="https://www.iana.org/assignments/oauth-parameters/oauth-parameters.xhtml#authorization-server-metadata">
          <front>
            <title>OAuth Authorization Server Metadata</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.Core.Params" target="https://www.iana.org/assignments/core-parameters/core-parameters.xhtml">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CORS" target="https://fetch.spec.whatwg.org/commit-snapshots/4775fcb48042c8411df497c0b7cf167b4240004f/#http-cors-protocol">
          <front>
            <title>Fetch Living Standard</title>
            <author>
              <organization>WHATWG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7662">
          <front>
            <title>OAuth 2.0 Token Introspection</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This specification defines a method for a protected resource to query an OAuth 2.0 authorization server to determine the active state of an OAuth 2.0 token and to determine meta-information about this token. OAuth 2.0 deployments can use this method to convey information about the authorization context of the token from the authorization server to the protected resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7662"/>
          <seriesInfo name="DOI" value="10.17487/RFC7662"/>
        </reference>
        <reference anchor="RFC7800">
          <front>
            <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7800"/>
          <seriesInfo name="DOI" value="10.17487/RFC7800"/>
        </reference>
        <reference anchor="RFC8414">
          <front>
            <title>OAuth 2.0 Authorization Server Metadata</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <date month="June" year="2018"/>
            <abstract>
              <t>This specification defines a metadata format that an OAuth 2.0 client can use to obtain the information needed to interact with an OAuth 2.0 authorization server, including its endpoint locations and authorization server capabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8414"/>
          <seriesInfo name="DOI" value="10.17487/RFC8414"/>
        </reference>
        <reference anchor="RFC9458">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9458"/>
          <seriesInfo name="DOI" value="10.17487/RFC9458"/>
        </reference>
        <reference anchor="SD-JWT.VC">
          <front>
            <title>SD-JWT-based Verifiable Credentials (SD-JWT VC)</title>
            <author fullname="Oliver Terbu" initials="O." surname="Terbu">
              <organization>MATTR</organization>
            </author>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete Inc.</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This specification describes data formats as well as validation and
   processing rules to express Verifiable Credentials with JSON payloads
   with and without selective disclosure based on the SD-JWT
   [I-D.ietf-oauth-selective-disclosure-jwt] format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-sd-jwt-vc-12"/>
        </reference>
        <reference anchor="ISO.mdoc">
          <front>
            <title>ISO/IEC 18013-5:2021 ISO-compliant driving licence</title>
            <author>
              <organization>ISO/IEC JTC 1/SC 17</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="smith2020let" target="https://www.ndss-symposium.org/ndss-paper/lets-revoke-scalable-global-certificate-revocation/">
          <front>
            <title>Let's revoke: Scalable global certificate revocation</title>
            <author initials="T." surname="Smith" fullname="Trevor Smith">
              <organization>Brigham Young University</organization>
            </author>
            <author initials="L." surname="Dickinson" fullname="Luke Dickinson">
              <organization>Brigham Young University</organization>
            </author>
            <author initials="K." surname="Seamons" fullname="Kent Seamons">
              <organization>Brigham Young University</organization>
            </author>
            <date>n.d.</date>
          </front>
          <seriesInfo name="Network and Distributed Systems Security (NDSS) Symposium 2020" value=""/>
        </reference>
        <reference anchor="W3C.SL" target="https://www.w3.org/TR/vc-bitstring-status-list/">
          <front>
            <title>W3C Bitstring Status List v1.0</title>
            <author initials="D." surname="Longley" fullname="Dave Longley">
              <organization>Digital Bazaar</organization>
            </author>
            <author initials="M." surname="Sporny" fullname="Manu Sporny">
              <organization>Digital Bazaar</organization>
            </author>
            <author initials="O." surname="Steele" fullname="Orie Steele">
              <organization>Transmute</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 1607?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank
Andrii Deinega,
Brian Campbell,
Dan Moore,
Denis Pinkas,
Filip Skokan,
Francesco Marino,
Giuseppe De Marco,
Hannes Tschofenig,
Kristina Yasuda,
Markus Kreusch,
Martijn Haring,
Michael B. Jones,
Micha Kraus,
Michael Schwartz,
Mike Prorock,
Mirko Mollik,
Oliver Terbu,
Orie Steele,
Rifaat Shekh-Yusef,
Rohan Mahy,
Timo Glastra
and
Torsten Lodderstedt</t>
      <t>for their valuable contributions, discussions and feedback to this specification.</t>
    </section>
    <section numbered="false" anchor="size-comparison">
      <name>Size comparison</name>
      <t>The following tables show a size comparison for a Status List (compressed byte array as defined in <xref target="status-list-byte-array"/> and a compressed Byte Array of UUIDs (as an approximation for a Certificate Revocation List). Readers must be aware that these are not sizes for complete Status List Tokens in JSON/CBOR nor Certificate Revocation Lists (CRLs), as they don't contain metadata, certificates and signatures.</t>
      <section numbered="false" anchor="status-list-size-for-varying-sizes-and-revocation-rates">
        <name>Status List size for varying sizes and revocation rates</name>
        <table>
          <name>Status List Size examples for varying sizes and revocation rates</name>
          <thead>
            <tr>
              <th align="left">Size</th>
              <th align="left">0.01%</th>
              <th align="left">0.1%</th>
              <th align="left">1%</th>
              <th align="left">2%</th>
              <th align="left">5%</th>
              <th align="left">10%</th>
              <th align="left">25%</th>
              <th align="left">50%</th>
              <th align="left">75%</th>
              <th align="left">100%</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">100k</td>
              <td align="left">81 B</td>
              <td align="left">252 B</td>
              <td align="left">1.4 KB</td>
              <td align="left">2.3 KB</td>
              <td align="left">4.5 KB</td>
              <td align="left">6.9 KB</td>
              <td align="left">10.2 KB</td>
              <td align="left">12.2 KB</td>
              <td align="left">10.2 KB</td>
              <td align="left">35 B</td>
            </tr>
            <tr>
              <td align="left">1M</td>
              <td align="left">442 B</td>
              <td align="left">2.2 KB</td>
              <td align="left">13.7 KB</td>
              <td align="left">23.0 KB</td>
              <td align="left">43.9 KB</td>
              <td align="left">67.6 KB</td>
              <td align="left">102.2 KB</td>
              <td align="left">122.1 KB</td>
              <td align="left">102.4 KB</td>
              <td align="left">144 B</td>
            </tr>
            <tr>
              <td align="left">10M</td>
              <td align="left">3.8 KB</td>
              <td align="left">21.1 KB</td>
              <td align="left">135.4 KB</td>
              <td align="left">230.0 KB</td>
              <td align="left">437.0 KB</td>
              <td align="left">672.9 KB</td>
              <td align="left">1023.4 KB</td>
              <td align="left">1.2 MB</td>
              <td align="left">1023.5 KB</td>
              <td align="left">1.2 KB</td>
            </tr>
            <tr>
              <td align="left">100M</td>
              <td align="left">38.3 KB</td>
              <td align="left">213.0 KB</td>
              <td align="left">1.3 MB</td>
              <td align="left">2.2 MB</td>
              <td align="left">4.3 MB</td>
              <td align="left">6.6 MB</td>
              <td align="left">10.0 MB</td>
              <td align="left">11.9 MB</td>
              <td align="left">10.0 MB</td>
              <td align="left">11.9 KB</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section numbered="false" anchor="compressed-array-of-uuidv4-128-bit-uuids-for-varying-sizes-and-revocation-rates">
        <name>Compressed array of UUIDv4 (128 bit UUIDs) for varying sizes and revocation rates</name>
        <t>This is a simple approximation of a Certificate Revocation List using an array of UUIDs without any additional metadata (128 bit UUID per revoked entry).</t>
        <table>
          <name>Size examples for 128 bit UUIDs for varying sizes and revocation rates</name>
          <thead>
            <tr>
              <th align="left">Size</th>
              <th align="left">0.01%</th>
              <th align="left">0.1%</th>
              <th align="left">1%</th>
              <th align="left">2%</th>
              <th align="left">5%</th>
              <th align="left">10%</th>
              <th align="left">25%</th>
              <th align="left">50%</th>
              <th align="left">75%</th>
              <th align="left">100%</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">100k</td>
              <td align="left">219 B</td>
              <td align="left">1.6 KB</td>
              <td align="left">15.4 KB</td>
              <td align="left">29.7 KB</td>
              <td align="left">78.1 KB</td>
              <td align="left">154.9 KB</td>
              <td align="left">392.9 KB</td>
              <td align="left">783.1 KB</td>
              <td align="left">1.1 MB</td>
              <td align="left">1.5 MB</td>
            </tr>
            <tr>
              <td align="left">1M</td>
              <td align="left">1.6 KB</td>
              <td align="left">16.4 KB</td>
              <td align="left">157.7 KB</td>
              <td align="left">310.4 KB</td>
              <td align="left">781 KB</td>
              <td align="left">1.5 MB</td>
              <td align="left">3.8 MB</td>
              <td align="left">7.6 MB</td>
              <td align="left">11.4 MB</td>
              <td align="left">15.3 MB</td>
            </tr>
            <tr>
              <td align="left">10M</td>
              <td align="left">15.3 KB</td>
              <td align="left">155.9 KB</td>
              <td align="left">1.5 MB</td>
              <td align="left">3.1 MB</td>
              <td align="left">7.6 MB</td>
              <td align="left">15.2 MB</td>
              <td align="left">38.2 MB</td>
              <td align="left">76.3 MB</td>
              <td align="left">114.4 MB</td>
              <td align="left">152.6 MB</td>
            </tr>
            <tr>
              <td align="left">100M</td>
              <td align="left">157.6 KB</td>
              <td align="left">1.5 MB</td>
              <td align="left">15.3 MB</td>
              <td align="left">30.5 MB</td>
              <td align="left">76.3 MB</td>
              <td align="left">152.6 MB</td>
              <td align="left">381.4 MB</td>
              <td align="left">762.9 MB</td>
              <td align="left">1.1 GB</td>
              <td align="left">1.5 GB</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section numbered="false" anchor="test-vectors">
      <name>Test vectors for Status List encoding</name>
      <t>All examples here are given in the form of JSON or CBOR payloads. The examples are encoded according to <xref target="status-list-json"/> for JSON and <xref target="status-list-cbor"/> for CBOR. The CBOR examples are displayed as hex values.</t>
      <t>All values that are not mentioned for the examples below can be assumed to be 0 (VALID). All examples are initialized with a size of 2^20 entries.</t>
      <section numbered="false" anchor="bit-status-list">
        <name>1 bit Status List</name>
        <t>The following example uses a 1 bit Status List (2 possible values):</t>
        <artwork><![CDATA[
status[0]=1
status[1993]=1
status[25460]=1
status[159495]=1
status[495669]=1
status[554353]=1
status[645645]=1
status[723232]=1
status[854545]=1
status[934534]=1
status[1000345]=1
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 1,
  "lst": "eNrt3AENwCAMAEGogklACtKQPg9LugC9k_ACvreiogE
  AAKkeCQAAAAAAAAAAAAAAAAAAAIBylgQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAXG9IAAAAAAAAAPwsJAAAAAAAAAAAAAAAvhsSAAAAAAAAAAA
  A7KpLAAAAAAAAAAAAAAAAAAAAAJsLCQAAAAAAAAAAADjelAAAAAAAAAAAKjDMAQAAA
  ACAZC8L2AEb"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[
a2646269747301636c737458bd78daeddc010dc0200c0041a88249400ad2903e0f4b
ba00bd93f002beb7a2a2010000a91e09000000000000000000000000000000807296
04000000000000000000000000000000000000000000000000000000000000000000
000000000000005c6f4800000000000000fc2c240000000000000000000000be1b12
000000000000000000ecaa4b000000000000000000000000000000009b0b09000000
00000000000038de9400000000000000002a30cc010000000080642f0bd8011b
]]></artwork>
      </section>
      <section numbered="false" anchor="bit-status-list-1">
        <name>2 bit Status List</name>
        <t>The following example uses a 2 bit Status List (4 possible values):</t>
        <artwork><![CDATA[
status[0]=1
status[1993]=2
status[25460]=1
status[159495]=3
status[495669]=1
status[554353]=1
status[645645]=2
status[723232]=1
status[854545]=1
status[934534]=2
status[1000345]=3
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 2,
  "lst": "eNrt2zENACEQAEEuoaBABP5VIO01fCjIHTMStt9ovGV
  IAAAAAABAbiEBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEB5WwIAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAID0ugQAAAAAAAAAAAAAAAAAQG12SgAAA
  AAAAAAAAAAAAAAAAAAAAAAAAOCSIQEAAAAAAAAAAAAAAAAAAAAAAAD8ExIAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwJEuAQAAAAAAAAAAAAAAAAAAAAAAAMB9S
  wIAAAAAAAAAAAAAAAAAAACoYUoAAAAAAAAAAAAAAEBqH81gAQw"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[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]]></artwork>
      </section>
      <section numbered="false" anchor="bit-status-list-2">
        <name>4 bit Status List</name>
        <t>The following example uses a 4 bit Status List (16 possible values):</t>
        <artwork><![CDATA[
status[0]=1
status[1993]=2
status[35460]=3
status[459495]=4
status[595669]=5
status[754353]=6
status[845645]=7
status[923232]=8
status[924445]=9
status[934534]=10
status[1004534]=11
status[1000345]=12
status[1030203]=13
status[1030204]=14
status[1030205]=15
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 4,
  "lst": "eNrt0EENgDAQADAIHwImkIIEJEwCUpCEBBQRHOy35Li
  1EjoOQGabAgAAAAAAAAAAAAAAAAAAACC1SQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABADrsCAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAADoxaEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIIoCgAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACArpwKAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAGhqVkAzlwIAAAAAiGVRAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAABx3AoAgLpVAQAAAAAAAAAAAAAAwM89rwMAAAAAAAAAA
  AjsA9xMBMA"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[
a2646269747304636c737459024878daedd0410d8030100030081f0226908204244c
025290840414111cecb7e4b8b5123a0e40669b020000000000000000000000000000
0020b549010000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000
0000000000400ebb0200000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000
000000000000e8c5a100000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000082280a00000000000000000000000000
00000000000000000000000000000000000000000000000000000000000080ae9c0a
00000000000000000000000000000000000000000000000000000000000000000000
000000686a5640339702000000008865510000000000000000000000000000000000
00000000000000000000000000000071dc0a0080ba55010000000000000000000000
c0cf3daf03000000000000000008ec03dc4c04c0
]]></artwork>
      </section>
      <section numbered="false" anchor="bit-status-list-3">
        <name>8 bit Status List</name>
        <t>The following example uses a 8 bit Status List (256 possible values):</t>
        <artwork><![CDATA[
status[233478] = 0
status[52451] = 1
status[576778] = 2
status[513575] = 3
status[468106] = 4
status[292632] = 5
status[214947] = 6
status[182323] = 7
status[884834] = 8
status[66653] = 9
status[62489] = 10
status[196493] = 11
status[458517] = 12
status[487925] = 13
status[55649] = 14
status[416992] = 15
status[879796] = 16
status[462297] = 17
status[942059] = 18
status[583408] = 19
status[13628] = 20
status[334829] = 21
status[886286] = 22
status[713557] = 23
status[582738] = 24
status[326064] = 25
status[451545] = 26
status[705889] = 27
status[214350] = 28
status[194502] = 29
status[796765] = 30
status[202828] = 31
status[752834] = 32
status[721327] = 33
status[554740] = 34
status[91122] = 35
status[963483] = 36
status[261779] = 37
status[793844] = 38
status[165255] = 39
status[614839] = 40
status[758403] = 41
status[403258] = 42
status[145867] = 43
status[96100] = 44
status[477937] = 45
status[606890] = 46
status[167335] = 47
status[488197] = 48
status[211815] = 49
status[797182] = 50
status[582952] = 51
status[950870] = 52
status[765108] = 53
status[341110] = 54
status[776325] = 55
status[745056] = 56
status[439368] = 57
status[559893] = 58
status[149741] = 59
status[358903] = 60
status[513405] = 61
status[342679] = 62
status[969429] = 63
status[795775] = 64
status[566121] = 65
status[460566] = 66
status[680070] = 67
status[117310] = 68
status[480348] = 69
status[67319] = 70
status[661552] = 71
status[841303] = 72
status[561493] = 73
status[138807] = 74
status[442463] = 75
status[659927] = 76
status[445910] = 77
status[1046963] = 78
status[829700] = 79
status[962282] = 80
status[299623] = 81
status[555493] = 82
status[292826] = 83
status[517215] = 84
status[551009] = 85
status[898490] = 86
status[837603] = 87
status[759161] = 88
status[459948] = 89
status[290102] = 90
status[1034977] = 91
status[190650] = 92
status[98810] = 93
status[229950] = 94
status[320531] = 95
status[335506] = 96
status[885333] = 97
status[133227] = 98
status[806915] = 99
status[800313] = 100
status[981571] = 101
status[527253] = 102
status[24077] = 103
status[240232] = 104
status[559572] = 105
status[713399] = 106
status[233941] = 107
status[615514] = 108
status[911768] = 109
status[331680] = 110
status[951527] = 111
status[6805] = 112
status[552366] = 113
status[374660] = 114
status[223159] = 115
status[625884] = 116
status[417146] = 117
status[320527] = 118
status[784154] = 119
status[338792] = 120
status[1199] = 121
status[679804] = 122
status[1024680] = 123
status[40845] = 124
status[234603] = 125
status[761225] = 126
status[644903] = 127
status[502167] = 128
status[121477] = 129
status[505144] = 130
status[165165] = 131
status[179628] = 132
status[1019195] = 133
status[145149] = 134
status[263738] = 135
status[269256] = 136
status[996739] = 137
status[346296] = 138
status[555864] = 139
status[887384] = 140
status[444173] = 141
status[421844] = 142
status[653716] = 143
status[836747] = 144
status[783119] = 145
status[918762] = 146
status[946835] = 147
status[253764] = 148
status[519895] = 149
status[471224] = 150
status[134272] = 151
status[709016] = 152
status[44112] = 153
status[482585] = 154
status[461829] = 155
status[15080] = 156
status[148883] = 157
status[123467] = 158
status[480125] = 159
status[141348] = 160
status[65877] = 161
status[692958] = 162
status[148598] = 163
status[499131] = 164
status[584009] = 165
status[1017987] = 166
status[449287] = 167
status[277478] = 168
status[991262] = 169
status[509602] = 170
status[991896] = 171
status[853666] = 172
status[399318] = 173
status[197815] = 174
status[203278] = 175
status[903979] = 176
status[743015] = 177
status[888308] = 178
status[862143] = 179
status[979421] = 180
status[113605] = 181
status[206397] = 182
status[127113] = 183
status[844358] = 184
status[711569] = 185
status[229153] = 186
status[521470] = 187
status[401793] = 188
status[398896] = 189
status[940810] = 190
status[293983] = 191
status[884749] = 192
status[384802] = 193
status[584151] = 194
status[970201] = 195
status[523882] = 196
status[158093] = 197
status[929312] = 198
status[205329] = 199
status[106091] = 200
status[30949] = 201
status[195586] = 202
status[495723] = 203
status[348779] = 204
status[852312] = 205
status[1018463] = 206
status[1009481] = 207
status[448260] = 208
status[841042] = 209
status[122967] = 210
status[345269] = 211
status[794764] = 212
status[4520] = 213
status[818773] = 214
status[556171] = 215
status[954221] = 216
status[598210] = 217
status[887110] = 218
status[1020623] = 219
status[324632] = 220
status[398244] = 221
status[622241] = 222
status[456551] = 223
status[122648] = 224
status[127837] = 225
status[657676] = 226
status[119884] = 227
status[105156] = 228
status[999897] = 229
status[330160] = 230
status[119285] = 231
status[168005] = 232
status[389703] = 233
status[143699] = 234
status[142524] = 235
status[493258] = 236
status[846778] = 237
status[251420] = 238
status[516351] = 239
status[83344] = 240
status[171931] = 241
status[879178] = 242
status[663475] = 243
status[546865] = 244
status[428362] = 245
status[658891] = 246
status[500560] = 247
status[557034] = 248
status[830023] = 249
status[274471] = 250
status[629139] = 251
status[958869] = 252
status[663071] = 253
status[152133] = 254
status[19535] = 255
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 8,
  "lst": "eNrt0WOQM2kYhtGsbdu2bdu2bdu2bdu2bdu2jVnU1my
  -SWYm6U5enFPVf7ue97orFYAo7CQBAACQuuckAABStqUEAAAAAAAAtN6wEgAE71QJA
  AAAAIrwhwQAAAAAAdtAAgAAAAAAACLwkAQAAAAAAAAAAACUaFcJAACAeJwkAQAAAAA
  AAABQvL4kAAAAWmJwCQAAAAAAAAjAwBIAAAB06ywJoDKQBARpfgkAAAAAAAAAAAAAA
  AAAAACo50sJAAAAAAAAAOiRcSQAAAAAgAJNKgEAAG23mgQAAAAAAECw3pUAQvegBAA
  AAAAAAADduE4CAAAAyjSvBAAQiw8koHjvSABAb-wlARCONyVoxtMSZOd0CQAAAOjWD
  RKQmLckAAAAAACysLYEQGcnSAAAAAAQooUlAABI15kSAIH5RAIgLB9LABC4_SUgGZN
  IAABAmM6RoLbTJIASzCIBAEAhfpcAAAAAAABquk8CAAAAAAAAaJl9SvvzBOICAFWmk
  IBgfSgBAAAANOgrCQAAAAAAAADStK8EAAC03gASAAAAAAAAAADFWFUCAAAAMjOaBEA
  DHpYAQjCIBADduFwCAAAAAGitMSSI3BUSAECOHpAA6IHrJQAAAAAAsjeVBAAAKRpVA
  orWvwQAAAAAAAAAkKRtJAAAAAAAgCbcLAF0bXUJAAAAoF02kYDg7CYBAAAAAEB6NpQ
  AAAAAAAAAAAAAAEr1uQQAAF06VgIAAAAAAAAAqDaeBAAQqgMkAAAAAABogQMlAAAAA
  AAa87MEAAAQiwslAAAAAAAAAAAAAAAAMrOyBAAAiekv-hcsY0Sgne6QAAAAAAAgaUt
  JAAAAAAAAAAAAAAAAAAAAAAAAAADwt-07vjVkAAAAgDy8KgFAUEaSAAAAAJL3vgQAW
  dhcAgAAoBHDSUDo1pQAAACI2o4SAABZm14CALoyuwQAAPznGQkgZwdLAAAQukclAAA
  AAAAAAAAAgKbMKgEAAAAAAAAAAAAAAAAAAECftpYAAAAAAAAAAAAACnaXBAAAAADk7
  iMJAAAAAAAAAABqe00CAnGbBBG4TAIAgFDdKgFAXCaWAAAAAAAAAAAAAAAAAKAJQwR
  72XbGAQAAAKAhh0sAAAAAAABQgO8kAAAAAAAAAAAAACAaM0kAAAC5W0QCAIJ3mAQAx
  GwxCQAA6nhSAsjZBRIAANEbWQIAAAAAaJE3JACAwA0qAUBIVpKAlphbAiAPp0iQnKE
  kAAAAAAAgBP1KAAAAdOl4CQAAAAAAAPjLZBIAAG10RtrPm8_CAEBMTpYAAAAAAIjQY
  BL8z5QSAAAAAEDYPpUAACAsj0gAAADQkHMlAAjHDxIA0Lg9JQAAgHDsLQEAAABAQS6
  WAAAAgLjNFs2l_RgLAIAEfCEBlGZZCQAAaIHjJACgtlskAAAozb0SAAAAVFtfAgAAA
  AAAAAAAAAAAAAAAAAAAAKDDtxIAAAAAVZaTAKB5W0kAANCAsSUgJ0tL0GqHSNBbL0g
  AZflRAgCARG0kQXNmlgCABiwkAQAAAEB25pIAAAAAAAAAAAAAoFh9SwAAAAAAADWNm
  OSrpjFsEoaRgDKcF9Q1dxsEAAAAAAAAAAAAAAAAgPZ6SQIAAAAAAAAAgChMLgEAAAA
  AAAAAqZlQAsK2qQQAAAAAAAD06XUJAAAAqG9bCQAAgLD9IgEAAAAAAAAAAAAAAAAAA
  EBNe0gAAAAAAAAAAEBPHSEBAAAAlOZtCYA4fS8B0GFRCQAo0gISAOTgNwmC840EAAA
  AAAAAAAAAAAAAAAAAUJydJfjXPBIAAAAAAAAAAAAAAABk6WwJAAAAAAAAAAAAAAAAq
  G8UCQAAgPpOlAAAIA83SQAANWwc9HUjGAgAAAAAAACAusaSAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAqHKVBACQjxklAAAAAAAAAKBHxpQAAAAAACBME0lAdlaUAACyt7sEAAAA0
  Nl0EgAAAAAAAAAAAABA-8wgAQAAAAAAAKU4SgKgUtlBAgAAAAAAAAAAgMCMLwEE51k
  JICdzSgCJGl2CsE0tAQAA0L11JQAAAAAAAAjUOhIAAAAAAAAAAAAAAGTqeQkAAAAAA
  AAAAAAAKM8SEjTrJwkAAAAAAACocqQEULgVJAAAACjDUxJUKgtKAAAAqbpRAgCA0n0
  mAQAAAABAGzwmAUCTLpUAAAAAAAAAAEjZNRIAAAAAAAAAAAAAAAAAAAAA8I-vJaAlh
  pQAAAAAAHrvzjJ-OqCuuVlLAojP8BJAr70sQZVDJYAgXS0BAAAAAAAAAAAAtMnyEgA
  AAAAAFONKCQAAAAAAAADorc0kAAAAAAAAgDqOlgAAAAAAAAAAAADIwv0SAAAAAAAAA
  AAAAADBuV0CIFVDSwAAAABAAI6RAAAAAGIwrQSEZAsJAABouRclAAAAAKDDrxIAAAA
  0bkkJgFiMKwEAAAAAAHQyhwRk7h4JAAAAAAAAAAAgatdKAACUYj0JAAAAAAAAAAAAQ
  nORBLTFJRIAAAAAkIaDJAAAAJryngQAAAAAAAAAAAA98oQEAAAAAAAAAEC2zpcgWY9
  LQKL2kwAgGK9IAAAAAPHaRQIAAAAAAAAAAADIxyoSAAAAAAAAAAAAAADQFotLAECz_
  gQ1PX-B"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[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]]></artwork>
      </section>
    </section>
    <section numbered="false" anchor="document-history">
      <name>Document History</name>
      <t>-13</t>
      <ul spacing="normal">
        <li>
          <t>add definition of client to terminology</t>
        </li>
        <li>
          <t>Make exp and ttl recommended in claim description (fixes inconsistency, was recommended in other text)</t>
        </li>
        <li>
          <t>Add short security consideraiton on redirects and ttl</t>
        </li>
        <li>
          <t>fix CORS spec to specific version</t>
        </li>
        <li>
          <t>explain KYC</t>
        </li>
        <li>
          <t>link implementation guidance to exp and ttl in Status List Token definition</t>
        </li>
        <li>
          <t>reference RFC7515 instead of IANA:JOSE</t>
        </li>
        <li>
          <t>add a note that cwt is encoded in raw/binary.</t>
        </li>
        <li>
          <t>added further privacy consideration around issuer tracking using unique URIs</t>
        </li>
      </ul>
      <t>-12</t>
      <ul spacing="normal">
        <li>
          <t>Allow for extended key usage OID to be used for other status mechanisms</t>
        </li>
        <li>
          <t>add Paul's affiliation</t>
        </li>
        <li>
          <t>add feedback from Dan Moore</t>
        </li>
        <li>
          <t>change JSON Status List structure to only contain JSON object</t>
        </li>
        <li>
          <t>further nitpicks</t>
        </li>
        <li>
          <t>clarifying status and status_list IANA descriptions for JWT/CWT</t>
        </li>
        <li>
          <t>clarifying description texts for status and status_list in CBOR</t>
        </li>
        <li>
          <t>splitting Linkability Mitigation from Token Lifecycle section in Implementation Consideration</t>
        </li>
        <li>
          <t>relax the accept header from must to should</t>
        </li>
      </ul>
      <t>-11</t>
      <ul spacing="normal">
        <li>
          <t>incorporate feedback from shepherd review</t>
        </li>
        <li>
          <t>some nitpicks</t>
        </li>
        <li>
          <t>even more nitpicks</t>
        </li>
      </ul>
      <t>-10</t>
      <ul spacing="normal">
        <li>
          <t>improve caching guidelines and move them to implementaiton considerations</t>
        </li>
        <li>
          <t>Add CoAP Content-Format ID and IANA registration</t>
        </li>
        <li>
          <t>Add size comparison for status list and compressed uuids</t>
        </li>
        <li>
          <t>Change Controller IESG for OAuths Parameters Registration</t>
        </li>
      </ul>
      <t>-09</t>
      <ul spacing="normal">
        <li>
          <t>update acknowledgments</t>
        </li>
        <li>
          <t>introduce dedicated section for compressed byte array of the Status List</t>
        </li>
        <li>
          <t>fix Status List definitions</t>
        </li>
        <li>
          <t>Add CDDL for CBOR StatusList encoding</t>
        </li>
        <li>
          <t>add diagram for Status List Aggregation for further explanation</t>
        </li>
        <li>
          <t>rename "chunking" of Status List Tokens (for scalability reasons) into "divide .. up"</t>
        </li>
      </ul>
      <t>-08</t>
      <ul spacing="normal">
        <li>
          <t>Fix cwt typ value to full media type</t>
        </li>
        <li>
          <t>Holders may also fetch and verify Status List Tokens</t>
        </li>
        <li>
          <t>Update terminology for referenced token and Status List Token</t>
        </li>
      </ul>
      <t>-07</t>
      <ul spacing="normal">
        <li>
          <t>add considerations about External Status Issuer or Status Provider</t>
        </li>
        <li>
          <t>add recommendations for Key Resolution and Trust Management</t>
        </li>
        <li>
          <t>add extended key usage extensions for x509</t>
        </li>
        <li>
          <t>Relying Parties avoiding correlatable Information</t>
        </li>
        <li>
          <t>editorial changes on terminology and Referenced Tokens</t>
        </li>
        <li>
          <t>clarify privacy consideration around one time use reference tokens</t>
        </li>
        <li>
          <t>explain the Status List Token size dependencies</t>
        </li>
        <li>
          <t>explain possibility to chunk Status List Tokens depending on Referenced Token's expiry date</t>
        </li>
        <li>
          <t>add short-lived tokens in the Rationale</t>
        </li>
        <li>
          <t>rename Status Mechanism Methods registry to Status Mechanisms registry</t>
        </li>
        <li>
          <t>changes as requested by IANA review</t>
        </li>
        <li>
          <t>emphasize that security and privacy considerations only apply to Status List and no other status mechanisms</t>
        </li>
        <li>
          <t>differentiate unlinkability between Issuer-RP and RP-RP</t>
        </li>
        <li>
          <t>add more test vectors for the status list encoding</t>
        </li>
        <li>
          <t>add prior art</t>
        </li>
        <li>
          <t>updated language around application specific status type values and assigned ranges for application specific usage</t>
        </li>
        <li>
          <t>add short security considerations section for mac based deployments</t>
        </li>
        <li>
          <t>privacy considerations for other status types like suspended</t>
        </li>
        <li>
          <t>fix aggregation_uri text in referenced token</t>
        </li>
        <li>
          <t>mention key resolution in validation rules</t>
        </li>
      </ul>
      <t>-06</t>
      <ul spacing="normal">
        <li>
          <t>iana registration text updated with update procedures</t>
        </li>
        <li>
          <t>explicitly mention that status list is expected to be contained in cryptographically secured containers</t>
        </li>
        <li>
          <t>reworked and simplified introduction and abstract</t>
        </li>
        <li>
          <t>specify http status codes and allow redirects</t>
        </li>
        <li>
          <t>add status_list_aggregation_endpoint OAuth metadata</t>
        </li>
        <li>
          <t>remove unsigned options (json/cbor) of status list</t>
        </li>
        <li>
          <t>add section about mixing status list formats and media type</t>
        </li>
        <li>
          <t>fixes from IETF review</t>
        </li>
        <li>
          <t>update guidance around ttl</t>
        </li>
        <li>
          <t>add guidance around aggregation endpoint</t>
        </li>
      </ul>
      <t>-05</t>
      <ul spacing="normal">
        <li>
          <t>add optional support for historical requests</t>
        </li>
        <li>
          <t>update CBOR claim definitions</t>
        </li>
        <li>
          <t>improve section on Status Types and introduce IANA registry for it</t>
        </li>
        <li>
          <t>add Status Issuer and Status Provider role description to the introduction/terminology</t>
        </li>
        <li>
          <t>add information on third party hosting to security consideration</t>
        </li>
        <li>
          <t>remove constraint that Status List Token must not use a MAC</t>
        </li>
      </ul>
      <t>-04</t>
      <ul spacing="normal">
        <li>
          <t>add mDL example as Referenced Token and consolidate CWT and CBOR sections</t>
        </li>
        <li>
          <t>add implementation consideration for Default Values, Double Allocation and Status List Size</t>
        </li>
        <li>
          <t>add privacy consideration on using private relay protocols</t>
        </li>
        <li>
          <t>add privacy consideration on observability of outsiders</t>
        </li>
        <li>
          <t>add security considerations on correct parsing and decoding</t>
        </li>
        <li>
          <t>remove requirement for matching iss claim in Referenced Token and Status List Token</t>
        </li>
        <li>
          <t>add sd-jwt-vc example</t>
        </li>
        <li>
          <t>fix CWT status_list map encoding</t>
        </li>
        <li>
          <t>editorial fixes</t>
        </li>
        <li>
          <t>add CORS considerations to the http endpoint</t>
        </li>
        <li>
          <t>fix reference of Status List in CBOR format</t>
        </li>
        <li>
          <t>added status_list CWT claim key assigned</t>
        </li>
        <li>
          <t>move base64url definition to terminology</t>
        </li>
      </ul>
      <t>-03</t>
      <ul spacing="normal">
        <li>
          <t>remove unused reference to RFC9111</t>
        </li>
        <li>
          <t>add validation rules for status list token</t>
        </li>
        <li>
          <t>introduce the status list aggregation mechanism</t>
        </li>
        <li>
          <t>relax requirements for status_list claims to contain other parameters</t>
        </li>
        <li>
          <t>change cwt referenced token example to hex and annotated hex</t>
        </li>
        <li>
          <t>require TLS only for fetching Status List, not for Status List Token</t>
        </li>
        <li>
          <t>remove the undefined phrase Status List endpoint</t>
        </li>
        <li>
          <t>remove http caching in favor of the new ttl claim</t>
        </li>
        <li>
          <t>clarify the sub claim of Status List Token</t>
        </li>
        <li>
          <t>relax status_list iss requirements for CWT</t>
        </li>
        <li>
          <t>Fixes missing parts &amp; iana ttl registration in CWT examples</t>
        </li>
      </ul>
      <t>-02</t>
      <ul spacing="normal">
        <li>
          <t>add ttl claim to Status List Token to convey caching</t>
        </li>
        <li>
          <t>relax requirements on referenced token</t>
        </li>
        <li>
          <t>clarify Deflate / zlib compression</t>
        </li>
        <li>
          <t>make a reference to the Issuer-Holder-Verifier model of SD-JWT VC</t>
        </li>
        <li>
          <t>add COSE/CWT/CBOR encoding</t>
        </li>
      </ul>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Rename title of the draft</t>
        </li>
        <li>
          <t>add design consideration to the introduction</t>
        </li>
        <li>
          <t>Change status claim to in referenced token to allow re-use for other mechanisms</t>
        </li>
        <li>
          <t>Add IANA Registry for status mechanisms</t>
        </li>
        <li>
          <t>restructure the sections of this document</t>
        </li>
        <li>
          <t>add option to return an unsigned Status List</t>
        </li>
        <li>
          <t>Changing compression from gzip to zlib</t>
        </li>
        <li>
          <t>Change typo in Status List Token sub claim description</t>
        </li>
        <li>
          <t>Add access token as an example use-case</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft after working group adoption</t>
        </li>
        <li>
          <t>update acknowledgments</t>
        </li>
        <li>
          <t>renamed Verifier to Relying Party</t>
        </li>
        <li>
          <t>added IANA consideration</t>
        </li>
      </ul>
      <t>[ draft-ietf-oauth-status-list ]</t>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Applied editorial improvements suggested by Michael Jones.</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
