<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-oauth-status-list-15" category="std" consensus="true" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Token Status List (TSL)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-status-list-15"/>
    <author fullname="Tobias Looker">
      <organization>MATTR</organization>
      <address>
        <email>tobias.looker@mattr.global</email>
      </address>
    </author>
    <author fullname="Paul Bastian">
      <organization>Bundesdruckerei</organization>
      <address>
        <email>paul.bastian@posteo.de</email>
      </address>
    </author>
    <author fullname="Christian Bormann">
      <organization>SPRIND</organization>
      <address>
        <email>chris.bormann@gmx.de</email>
      </address>
    </author>
    <date year="2026" month="January" day="06"/>
    <area>Security</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <abstract>
      <?line 130?>

<t>This specification defines a status mechanism called Token Status List (TSL), data structures and processing rules for representing the status of tokens secured by JSON Object Signing and Encryption (JOSE) or CBOR Object Signing and Encryption (COSE), such as JWT, SD-JWT VC, CBOR Web Token, and ISO mdoc. It also defines an extension point and a registry for future status mechanisms.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://oauth-wg.github.io/draft-ietf-oauth-status-list/draft-ietf-oauth-status-list.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Web Authorization Protocol Working Group mailing list (<eref target="mailto:oauth@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/oauth/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/oauth/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/oauth-wg/draft-ietf-oauth-status-list"/>.</t>
    </note>
  </front>
  <middle>
    <?line 134?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Token formats secured by JOSE <xref target="RFC7515"/> or COSE <xref target="RFC9052"/>, such as JWTs <xref target="RFC7519"/>, SD-JWT VCs <xref target="SD-JWT.VC"/>, CWTs <xref target="RFC8392"/> and ISO mdoc <xref target="ISO.mdoc"/>, have vast possible applications. Some of these applications can involve issuing a token whereby certain semantics about the token or its validity may change over time. Communicating these changes to relying parties in an interoperable manner, such as whether the token is considered invalidated or suspended by its issuer is important for many of these applications.</t>
      <t>This document defines a Status List data structure that describes the individual statuses of multiple Referenced Tokens. A Referenced Token may be of any format, but is most commonly a data structure secured by JOSE or COSE. The Referenced Token is referenced by the Status List, which describes the status of the Referenced Token. The statuses of all Referenced Tokens are conveyed via a bit array in the Status List. Each Referenced Token is allocated an index during issuance that represents its position within this bit array. The value of the bit(s) at this index corresponds to the Referenced Token's status. A Status List is provided within a Status List Token protected by cryptographic signature or MAC and this document defines its representations in JWT and CWT format.</t>
      <t>The following diagram depicts the relationship between the artifacts:</t>
      <artwork type="ascii-art"><![CDATA[
┌────────────────┐  describes status ┌──────────────────┐
│  Status List   ├──────────────────►│ Referenced Token │
│ (JSON or CBOR) │◄──────────────────┤ (JOSE, COSE, ..) │
└─────┬──────────┘    references     └──────────────────┘
      │
      │ embedded in
      ▼
┌───────────────────┐
│ Status List Token │
│  (JWT or CWT)     │
└───────────────────┘

]]></artwork>
      <t>An Issuer issues Referenced Tokens to a Holder, the Holder uses and presents those Referenced Tokens to a Relying Party. The Issuer gives updated status information to the Status Issuer, who issues a Status List Token. The Status Issuer can be either the Issuer or an entity that has been authorized by the Issuer to issue Status List Tokens. The Status Issuer provides the Status List Token to the Status Provider, who serves the Status List Token on a public, resolvable endpoint. The Relying Party or the Holder may fetch the Status List Token to retrieve the status of the Referenced Token.</t>
      <t>The roles of the Issuer (of the Referenced Token), the Status Issuer and the Status Provider may be fulfilled by the same entity. If not further specified, the term Issuer may refer to an entity acting for all three roles. This document describes how an Issuer references a Status List Token and how a Relying Party fetches and validates Status Lists.</t>
      <t>The following diagram depicts the relationship between the involved roles (Relying Party is equivalent to Verifier of <xref target="SD-JWT.VC"/>):</t>
      <artwork type="ascii-art"><![CDATA[
           issue                 present
           Referenced            Referenced
┌────────┐ Token      ┌────────┐ Token      ┌───────────────┐
│ Issuer ├───────────►│ Holder ├───────────►│ Relying Party │
└─┬──────┘            └───┬────┘            └──┬────────────┘
  ▼ provide status        │                    │
┌───────────────┐         │                    │
│ Status Issuer │         │                    │
└─┬─────────────┘         │                    │
  ▼ provide Status List   │                    │
┌─────────────────┐       │                    │
│ Status Provider │◄──────┴────────────────────┘
└─────────────────┘     fetch Status List Token

]]></artwork>
      <t>Status Lists can be used to express a variety of Status Types. This document defines basic Status Types for the most common use cases as well as an extensibility mechanism for custom Status Types.</t>
      <t>Furthermore, the document creates an extension point and an IANA registry that enables other specifications to describe additional status mechanisms.</t>
      <section anchor="example-use-cases">
        <name>Example Use Cases</name>
        <t>An example of the usage of a Status List is to manage the statuses of issued access tokens as defined in <xref section="1.4" sectionFormat="of" target="RFC6749"/>. Token Introspection <xref target="RFC7662"/> provides a method to determine the status of an issued access token, but it necessitates the party attempting to validate the state of access tokens to directly contact the Issuer of each token for validation. In contrast, the mechanism defined in this specification allows a party to retrieve the statuses for many tokens, reducing interactions with the Issuer substantially. This not only improves scalability but also enhances privacy by preventing the Issuer from gaining knowledge of access tokens being verified (herd anonymity).</t>
        <t>Another possible use case for the Status List is to express the status of verifiable credentials (Referenced Tokens) issued by an Issuer in the Issuer-Holder-Verifier model <xref target="SD-JWT.VC"/>.</t>
      </section>
      <section anchor="rationale">
        <name>Rationale</name>
        <t>Revocation mechanisms are an essential part of most identity ecosystems. In the past, revocation of X.509 TLS certificates has been proven difficult. Traditional certificate revocation lists (CRLs) have limited scalability; Online Certificate Status Protocol (OCSP) has additional privacy risks, since the client is leaking the requested website to a third party. OCSP stapling is addressing some of these problems at the cost of less up-to-date data. Modern approaches use accumulator-based revocation registries and Zero-Knowledge-Proofs to accommodate for this privacy gap, but face scalability issues again. Another alternative is short-lived Referenced Tokens with regular re-issuance, but this puts additional burden on the Issuer's infrastructure.</t>
        <t>This specification seeks to find a balance between scalability, security and privacy by representing statuses as individual bits, packing them into an array, and compressing the resulting binary data. Thereby, a Status List may contain statuses of many thousands or millions Referenced Tokens while remaining as small as possible. Placing a large number of Referenced Tokens into the same list also offers Holders and Relying Parties herd privacy from the Status Provider.</t>
      </section>
      <section anchor="design-considerations">
        <name>Design Considerations</name>
        <t>The decisions taken in this specification aim to achieve the following design goals:</t>
        <ul spacing="normal">
          <li>
            <t>the specification shall favor a simple and easy-to-understand concept</t>
          </li>
          <li>
            <t>the specification shall be easy, fast and secure to implement in all major programming languages</t>
          </li>
          <li>
            <t>the specification shall be optimized to support the most common use cases and avoid unnecessary complexity of corner cases</t>
          </li>
          <li>
            <t>the Status List shall scale up to millions of tokens to support large-scale government or enterprise use cases</t>
          </li>
          <li>
            <t>the Status List shall enable caching policies and offline support</t>
          </li>
          <li>
            <t>the specification shall support JSON and CBOR based tokens</t>
          </li>
          <li>
            <t>the specification shall not specify key resolution or trust frameworks</t>
          </li>
          <li>
            <t>the specification shall define an extension point that enables other mechanisms to convey information about the status of a Referenced Token</t>
          </li>
        </ul>
      </section>
      <section anchor="prior-work">
        <name>Prior Work</name>
        <t>Representing statuses with bits in an array is a rather old and well-known concept in computer science and there has been prior work to use this for revocation and status management such as a paper by Smith et al. <xref target="smith2020let"/> that proposed a mechanism called Certificate Revocation Vectors based on xz compressed bit vectors for each expiration day and the W3C bit Status List <xref target="W3C.SL"/> that similarly uses a compressed bit representation.</t>
      </section>
      <section anchor="status-mechanisms-registry">
        <name>Status Mechanisms Registry</name>
        <t>This specification establishes IANA "Status Mechanisms" registries for status mechanisms for JOSE-based tokens and for status mechanisms for COSE-based tokens and registers the members defined by this specification. Other specifications can register other members used for status retrieval.</t>
        <t>Other status mechanisms may have different tradeoffs regarding security, privacy, scalability and complexity. The privacy and security considerations in this document only represent the properties of the Status List mechanism.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>Issuer:</dt>
        <dd>
          <t>An entity that issues the Referenced Token. Also known as a Provider.</t>
        </dd>
        <dt>Status Issuer:</dt>
        <dd>
          <t>An entity that issues the Status List Token about the status information of the Referenced Token. This role may be fulfilled by the Issuer.</t>
        </dd>
        <dt>Status Provider:</dt>
        <dd>
          <t>An entity that provides the Status List Token on a public endpoint. This role may be fulfilled by the Status Issuer.</t>
        </dd>
        <dt>Holder:</dt>
        <dd>
          <t>An entity that receives Referenced Tokens from the Issuer and presents them to Relying Parties.</t>
        </dd>
        <dt>Relying Party:</dt>
        <dd>
          <t>An entity that relies on the Referenced Token and fetches the corresponding Status List Token to validate the status of that Referenced Token. Also known as a Verifier.</t>
        </dd>
        <dt>Status List:</dt>
        <dd>
          <t>An object in JSON or CBOR representation containing a compressed byte array that represents the statuses of many Referenced Tokens.</t>
        </dd>
        <dt>Status List Token:</dt>
        <dd>
          <t>A token in JWT (as defined in <xref target="RFC7519"/>) or CWT (as defined in <xref target="RFC8392"/>) representation that contains a cryptographically secured Status List.</t>
        </dd>
        <dt>Referenced Token:</dt>
        <dd>
          <t>A cryptographically secured data structure that contains a "status" claim that references a mechanism to retrieve status information about this Referenced Token. This document defines the Status List mechanism in which case the Referenced Token contains a reference to an entry in a Status List Token. It is <bcp14>RECOMMENDED</bcp14> to use JSON <xref target="RFC8259"/> with JOSE as defined in <xref target="RFC7515"/> or CBOR <xref target="RFC8949"/> with COSE as defined in <xref target="RFC9052"/>. Examples for Referenced Tokens are SD-JWT VC and ISO mdoc.</t>
        </dd>
        <dt>Client:</dt>
        <dd>
          <t>An application that fetches information, such as a Status List Token, from the Status List Provider on behalf of the Holder or Relying Party.</t>
        </dd>
        <dt>base64url:</dt>
        <dd>
          <t>Denotes the URL-safe base64 encoding with all trailing '=' characters omitted as defined in <xref section="2" sectionFormat="of" target="RFC7515"/> as "Base64url Encoding".</t>
        </dd>
      </dl>
    </section>
    <section anchor="status-list">
      <name>Status List</name>
      <t>A Status List is a data structure that contains the statuses of many Referenced Tokens represented by one or multiple bits. <xref target="status-list-byte-array"/> describes how to construct a compressed byte array that is the base component for the Status List data structure. The second and third sections describe how to encode such a Status List in JSON and CBOR representations.</t>
      <section anchor="status-list-byte-array">
        <name>Compressed Byte Array</name>
        <t>A compressed byte array containing the status information of the Referenced Token is composed by the following algorithm:</t>
        <ol spacing="normal" type="1"><li>
            <t>The Status Issuer <bcp14>MUST</bcp14> define a number of bits (<tt>bits</tt>) of either 1,2,4 or 8, that represents the amount of bits used to describe the status of each Referenced Token within this Status List. Therefore, up to 2,4,16 or 256 statuses for a Referenced Token are possible, depending on the bit size. This limitation is intended to limit bit manipulation necessary to a single byte for every operation and thus keeping implementations simpler and less error-prone.</t>
          </li>
          <li>
            <t>The Status Issuer creates a byte array of size = amount of Referenced Tokens * <tt>bits</tt> / 8 or greater. Depending on the <tt>bits</tt>, each byte in the array corresponds to 8/(<tt>bits</tt>) statuses (8,4,2 or 1).</t>
          </li>
          <li>
            <t>The Status Issuer sets the status values for all Referenced Tokens within the byte array. Each Referenced Token is assigned a distinct index from 0 to one less than the number of Referenced Tokens assigned to the Status List. Each index identifies a contiguous block of bits in the byte array, with the blocks being packed into bytes from the least significant bit ("0") to the most significant bit ("7"). These bits contain the encoded status value of the Referenced Token (see <xref target="status-types"/> for more details on the values).</t>
          </li>
          <li>
            <t>The Status Issuer compresses the byte array using DEFLATE <xref target="RFC1951"/> with the ZLIB <xref target="RFC1950"/> data format. Implementations are <bcp14>RECOMMENDED</bcp14> to use the highest compression level available.</t>
          </li>
        </ol>
        <t>The following example illustrates the byte array of a Status List that represents the statuses of 16 Referenced Tokens with a <tt>bits</tt> of 1, requiring 2 bytes (16 bits) for the uncompressed byte array:</t>
        <artwork type="ascii-art"><![CDATA[
status[0] = 0b1
status[1] = 0b0
status[2] = 0b0
status[3] = 0b1
status[4] = 0b1
status[5] = 0b1
status[6] = 0b0
status[7] = 0b1
status[8] = 0b1
status[9] = 0b1
status[10] = 0b0
status[11] = 0b0
status[12] = 0b0
status[13] = 0b1
status[14] = 0b0
status[15] = 0b1
]]></artwork>
        <t>These bits are concatenated:</t>
        <artwork type="ascii-art"><![CDATA[
byte no            0                  1
bit no      7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0
           +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
values     |1|0|1|1|1|0|0|1|  |1|0|1|0|0|0|1|1|
           +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
index       7 6 5 4 3 2 1 0   15   ...  10 9 8
           \_______________/  \_______________/
byte value       0xB9               0xA3

]]></artwork>
        <t>In the following example, the Status List additionally includes the Status Type "SUSPENDED". As the Status Type value for "SUSPENDED" is 0x02 and does not fit into 1 bit, the <tt>bits</tt> is required to be 2. This example illustrates the byte array of a Status List that represents the statuses of 12 Referenced Tokens with a <tt>bits</tt> of 2, requiring 3 bytes (24 bits) for the uncompressed byte array:</t>
        <artwork type="ascii-art"><![CDATA[
status[0] = 0b01
status[1] = 0b10
status[2] = 0b00
status[3] = 0b11
status[4] = 0b0
status[5] = 0b01
status[6] = 0b00
status[7] = 0b01
status[8] = 0b01
status[9] = 0b10
status[10] = 0b11
status[11] = 0b11
]]></artwork>
        <t>These bits are concatenated:</t>
        <artwork type="ascii-art"><![CDATA[
byte no            0                  1                  2
bit no      7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0
           +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
values     |1|1|0|0|1|0|0|1|  |0|1|0|0|0|1|0|0|  |1|1|1|1|1|0|0|1|
           +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
            \ / \ / \ / \ /    \ / \ / \ / \ /    \ / \ / \ / \ /
status      11  00  10  01     01  00  01  00     11  11  10  01
index        3   2   1   0      7   6   5   4      11  10  9   8
             \___________/      \___________/      \___________/
byte value       0xC9               0x44               0xF9

]]></artwork>
      </section>
      <section anchor="status-list-json">
        <name>Status List in JSON Format</name>
        <t>This section defines the data structure for a JSON-encoded Status List:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>StatusList</tt> structure is a JSON Object that contains the following members:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>bits</tt>: <bcp14>REQUIRED</bcp14>. JSON Integer specifying the number of bits per Referenced Token in the compressed byte array (<tt>lst</tt>). The allowed values for <tt>bits</tt> are 1, 2, 4, and 8.</t>
              </li>
              <li>
                <t><tt>lst</tt>: <bcp14>REQUIRED</bcp14>. JSON String that contains the status values for all the Referenced Tokens it conveys statuses for. The value <bcp14>MUST</bcp14> be the base64url-encoded compressed byte array as specified in <xref target="status-list-byte-array"/>.</t>
              </li>
              <li>
                <t><tt>aggregation_uri</tt>: <bcp14>OPTIONAL</bcp14>. JSON String that contains a URI to retrieve the Status List Aggregation for this type of Referenced Token or Issuer. See <xref target="aggregation"/> for further details.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following example illustrates the JSON representation of the Status List with <tt>bits</tt>=1 from the examples above:</t>
        <artwork><![CDATA[
byte_array = [0xb9, 0xa3] 
encoded:
{
  "bits": 1,
  "lst": "eNrbuRgAAhcBXQ"
}
]]></artwork>
        <t>The following example illustrates the JSON representation of the Status List with <tt>bits</tt>=2 from the examples above:</t>
        <artwork><![CDATA[
byte_array = [0xc9, 0x44, 0xf9] 
encoded:
{
  "bits": 2,
  "lst": "eNo76fITAAPfAgc"
}
]]></artwork>
        <t>See <xref target="test-vectors"/> for more test vectors.</t>
      </section>
      <section anchor="status-list-cbor">
        <name>Status List in CBOR Format</name>
        <t>This section defines the data structure for a CBOR-encoded Status List:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>StatusList</tt> structure is a CBOR map (major type 5) and defines the following entries:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>bits</tt>: <bcp14>REQUIRED</bcp14>. CBOR Unsigned integer (major type 0) that contains the number of bits per Referenced Token in the compressed byte array (<tt>lst</tt>). The allowed values for <tt>bits</tt> are 1, 2, 4, and 8.</t>
              </li>
              <li>
                <t><tt>lst</tt>: <bcp14>REQUIRED</bcp14>. CBOR Byte string (major type 2) that contains the status values for all the Referenced Tokens it conveys statuses for. The value <bcp14>MUST</bcp14> be the compressed byte array as specified in <xref target="status-list-byte-array"/>.</t>
              </li>
              <li>
                <t><tt>aggregation_uri</tt>: <bcp14>OPTIONAL</bcp14>. CBOR Text string (major type 3) that contains a URI to retrieve the Status List Aggregation for this type of Referenced Token. See <xref target="aggregation"/> for further detail.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following is the CDDL <xref target="RFC8610"/> definition of the <tt>StatusList</tt> structure:</t>
        <sourcecode type="cddl"><![CDATA[
StatusList = {
    bits: 1 / 2 / 4 / 8, ; The number of bits used per Referenced Token
    lst: bstr, ; Byte string that contains the Status List
    ? aggregation_uri: tstr ; link to the Status List Aggregation
}
]]></sourcecode>
        <t>The following example illustrates the CBOR representation of the Status List in Hex:</t>
        <artwork><![CDATA[
byte_array = [0xb9, 0xa3] 
encoded:
a2646269747301636c73744a78dadbb918000217015d
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
a2                              # map(2)
  64                            #   string(4)
    62697473                    #     "bits"
  01                            #   uint(1)
  63                            #   string(3)
    6c7374                      #     "lst"
  4a                            #   bytes(10)
    78dadbb918000217015d        #     "xÚÛ¹\x18\x00\x02\x17\x01]"
]]></artwork>
        <t>See <xref target="test-vectors"/> for more test vectors.</t>
      </section>
    </section>
    <section anchor="status-list-token">
      <name>Status List Token</name>
      <t>A Status List Token embeds a Status List into a token that is cryptographically signed and protects the integrity of the Status List. This allows for the Status List Token to be hosted by third parties or be transferred for offline use cases.</t>
      <t>This section specifies Status List Tokens in JSON Web Token (JWT) and CBOR Web Token (CWT) format.</t>
      <section anchor="status-list-token-jwt">
        <name>Status List Token in JWT Format</name>
        <t>The Status List Token <bcp14>MUST</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/>.</t>
        <t>The following content applies to the JWT Header:</t>
        <ul spacing="normal">
          <li>
            <t><tt>typ</tt>: <bcp14>REQUIRED</bcp14>. The JWT type <bcp14>MUST</bcp14> be <tt>statuslist+jwt</tt>.</t>
          </li>
        </ul>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>sub</tt>: <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC7519"/>. The <tt>sub</tt> (subject) claim <bcp14>MUST</bcp14> specify the URI of the Status List Token. The value <bcp14>MUST</bcp14> be equal to that of the <tt>uri</tt> claim contained in the <tt>status_list</tt> claim of the Referenced Token.</t>
          </li>
          <li>
            <t><tt>iat</tt>: <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC7519"/>. The <tt>iat</tt> (issued at) claim <bcp14>MUST</bcp14> specify the time at which the Status List Token was issued.</t>
          </li>
          <li>
            <t><tt>exp</tt>: <bcp14>RECOMMENDED</bcp14>. As generally defined in <xref target="RFC7519"/>. The <tt>exp</tt> (expiration time) claim, if present, <bcp14>MUST</bcp14> specify the time at which the Status List Token is considered expired by the Status Issuer. Consider the guidance provided in <xref target="expiry-and-caching"/>.</t>
          </li>
          <li>
            <t><tt>ttl</tt>: <bcp14>RECOMMENDED</bcp14>. The <tt>ttl</tt> (time to live) claim, if present, <bcp14>MUST</bcp14> specify the maximum amount of time, in seconds, that the Status List Token can be cached by a consumer before a fresh copy <bcp14>SHOULD</bcp14> be retrieved. The value of the claim <bcp14>MUST</bcp14> be a positive number encoded in JSON as a number. Consider the guidance provided in <xref target="expiry-and-caching"/>.</t>
          </li>
          <li>
            <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status_list</tt> (status list) claim <bcp14>MUST</bcp14> specify the Status List conforming to the structure defined in <xref target="status-list-json"/>.</t>
          </li>
        </ul>
        <t>The following additional rules apply:</t>
        <ol spacing="normal" type="1"><li>
            <t>The JWT <bcp14>MAY</bcp14> contain other claims.</t>
          </li>
          <li>
            <t>The JWT <bcp14>MUST</bcp14> be secured using a cryptographic signature or MAC algorithm. Relying Parties <bcp14>MUST</bcp14> reject JWTs with an invalid signature.</t>
          </li>
          <li>
            <t>Relying Parties <bcp14>MUST</bcp14> reject JWTs that are not valid in all other respects per "JSON Web Token (JWT)" <xref target="RFC7519"/>.</t>
          </li>
          <li>
            <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
          </li>
        </ol>
        <t>The following is a non-normative example of a Status List Token in JWT format:</t>
        <artwork><![CDATA[
{
  "alg": "ES256",
  "kid": "12",
  "typ": "statuslist+jwt"
}
.
{
  "exp": 2291720170,
  "iat": 1686920170,
  "status_list": {
    "bits": 1,
    "lst": "eNrbuRgAAhcBXQ"
  },
  "sub": "https://example.com/statuslists/1",
  "ttl": 43200
}
]]></artwork>
      </section>
      <section anchor="status-list-token-cwt">
        <name>Status List Token in CWT Format</name>
        <t>The Status List Token <bcp14>MUST</bcp14> be encoded as a "CBOR Web Token (CWT)" according to <xref target="RFC8392"/>. The Status List Token <bcp14>MUST NOT</bcp14> be tagged with the CWT tag defined in <xref section="6" sectionFormat="of" target="RFC8392"/>. The COSE message <bcp14>MUST</bcp14> either be the tagged COSE_Sign1_Tagged (<tt>18</tt>) or COSE_Mac0_Tagged (<tt>17</tt>) as defined in <xref section="2" sectionFormat="of" target="RFC9052"/>.</t>
        <t>The following content applies to the protected header of the CWT:</t>
        <ul spacing="normal">
          <li>
            <t><tt>16</tt> (type): <bcp14>REQUIRED</bcp14>. The type of the CWT <bcp14>MUST</bcp14> be <tt>application/statuslist+cwt</tt> or the registered CoAP Content-Format ID (see <xref target="coap-content-type"/>) as defined in <xref target="RFC9596"/>.</t>
          </li>
        </ul>
        <t>The following content applies to the CWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>2</tt> (subject): <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC8392"/>. The subject claim <bcp14>MUST</bcp14> specify the URI of the Status List Token. The value <bcp14>MUST</bcp14> be equal to that of the <tt>uri</tt> claim contained in the <tt>status_list</tt> claim of the Referenced Token.</t>
          </li>
          <li>
            <t><tt>6</tt> (issued at): <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC8392"/>. The issued at claim <bcp14>MUST</bcp14> specify the time at which the Status List Token was issued.</t>
          </li>
          <li>
            <t><tt>4</tt> (expiration time): <bcp14>RECOMMENDED</bcp14>. As generally defined in <xref target="RFC8392"/>. The expiration time claim, if present, <bcp14>MUST</bcp14> specify the time at which the Status List Token is considered expired by its issuer. Consider the guidance provided in <xref target="expiry-and-caching"/>.</t>
          </li>
          <li>
            <t><tt>65534</tt> (time to live): <bcp14>RECOMMENDED</bcp14>. Unsigned integer (major type 0). The time to live claim, if present, <bcp14>MUST</bcp14> specify the maximum amount of time, in seconds, that the Status List Token can be cached by a consumer before a fresh copy <bcp14>SHOULD</bcp14> be retrieved. The value of the claim <bcp14>MUST</bcp14> be a positive number. Consider the guidance provided in <xref target="expiry-and-caching"/>.</t>
          </li>
          <li>
            <t><tt>65533</tt> (status list): <bcp14>REQUIRED</bcp14>. The status list claim <bcp14>MUST</bcp14> specify the Status List conforming to the structure defined in <xref target="status-list-cbor"/>.</t>
          </li>
        </ul>
        <t>The following additional rules apply:</t>
        <ol spacing="normal" type="1"><li>
            <t>The CWT <bcp14>MAY</bcp14> contain other claims.</t>
          </li>
          <li>
            <t>The CWT <bcp14>MUST</bcp14> be secured using a cryptographic signature or MAC algorithm. Relying Parties <bcp14>MUST</bcp14> reject CWTs with an invalid signature.</t>
          </li>
          <li>
            <t>Relying Parties <bcp14>MUST</bcp14> reject CWTs that are not valid in all other respects per "CBOR Web Token (CWT)" <xref target="RFC8392"/>.</t>
          </li>
          <li>
            <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
          </li>
        </ol>
        <t>The following is a non-normative example of a Status List Token in CWT format in Hex:</t>
        <artwork><![CDATA[
d2845820a2012610781a6170706c69636174696f6e2f7374617475736c6973742b63
7774a1044231325850a502782168747470733a2f2f6578616d706c652e636f6d2f73
74617475736c697374732f31061a648c5bea041a8898dfea19fffe19a8c019fffda2
646269747301636c73744a78dadbb918000217015d584093fa4d01032b18c35e2fe1
101b77fd6cc9440022caa4694450c4e4e9feab4e99d1fa6d9772ce2bf3a12e0323de
d7c982c5e101a5e67f0cbc1e2b6f57ce99c279
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
d2                              # tag(18)
  84                            #   array(4)
    58 20                       #     bytes(32)
      a2012610781a6170706c6963  #       "¢\x01&\x10x\x1aapplic"
      6174696f6e2f737461747573  #       "ation/status"
      6c6973742b637774          #       "list+cwt"
    a1                          #     map(1)
      04                        #       uint(4)
      42                        #       bytes(2)
        3132                    #         "12"
    58 50                       #     bytes(80)
      a502782168747470733a2f2f  #       "¥\x02x!https://"
      6578616d706c652e636f6d2f  #       "example.com/"
      7374617475736c697374732f  #       "statuslists/"
      31061a648c5bea041a8898df  #       "1\x06\x1ad\x8c[ê\x04\x1a\x88\x98ß"
      ea19fffe19a8c019fffda264  #       "ê\x19ÿþ\x19¨À\x19ÿý¢d"
      6269747301636c73744a78da  #       "bits\x01clstJxÚ"
      dbb918000217015d          #       "Û¹\x18\x00\x02\x17\x01]"
    58 40                       #     bytes(64)
      93fa4d01032b18c35e2fe110  #       "\x93úM\x01\x03+\x18Ã^/á\x10"
      1b77fd6cc9440022caa46944  #       "\x1bwýlÉD\x00"Ê¤iD"
      50c4e4e9feab4e99d1fa6d97  #       "PÄäéþ«N\x99Ñúm\x97"
      72ce2bf3a12e0323ded7c982  #       "rÎ+ó¡.\x03#Þ×É\x82"
      c5e101a5e67f0cbc1e2b6f57  #       "Åá\x01¥æ\x7f\x0c¼\x1e+oW"
      ce99c279                  #       "Î\x99Ây"
]]></artwork>
      </section>
    </section>
    <section anchor="referenced-token">
      <name>Referenced Token</name>
      <section anchor="status-claim">
        <name>Status Claim</name>
        <t>By including a "status" claim in a Referenced Token, the Issuer is referencing a mechanism to retrieve status information about this Referenced Token. This specification defines one possible member of the "status" object, called "status_list". Other members of the "status" object may be defined by other specifications. This is analogous to "cnf" claim in <xref section="3.1" sectionFormat="of" target="RFC7800"/> in which different authenticity confirmation methods can be included.</t>
      </section>
      <section anchor="referenced-token-jose">
        <name>Referenced Token in JOSE</name>
        <t>The Referenced Token <bcp14>MAY</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/> or other formats based on JOSE.</t>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status</tt> (status) claim <bcp14>MUST</bcp14> specify a JSON Object that contains at least one reference to a status mechanism.
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14> when the status mechanism defined in this specification is used. It <bcp14>MUST</bcp14> specify a JSON Object that contains a reference to a Status List Token. It <bcp14>MUST</bcp14> at least contain the following claims:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>idx</tt>: <bcp14>REQUIRED</bcp14>. The <tt>idx</tt> (index) claim <bcp14>MUST</bcp14> specify a non-negative Integer that represents the index to check for status information in the Status List for the current Referenced Token.</t>
                  </li>
                  <li>
                    <t><tt>uri</tt>: <bcp14>REQUIRED</bcp14>. The <tt>uri</tt> (URI) claim <bcp14>MUST</bcp14> specify a String value that identifies the Status List Token containing the status information for the Referenced Token. The value of <tt>uri</tt> <bcp14>MUST</bcp14> be a URI conforming to <xref target="RFC3986"/>.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
        <t>The following is a non-normative example of a decoded header and payload of a Referenced Token:</t>
        <artwork type="ascii-art"><![CDATA[
{
  "alg": "ES256",
  "kid": "11"
}
.
{
  "status": {
    "status_list": {
      "idx": 0,
      "uri": "https://example.com/statuslists/1"
    }
  }
}
]]></artwork>
        <t>SD-JWT-based Verifiable Credentials (Section 3.2.2.2 of <xref target="SD-JWT.VC"/>)  introduces the usage of the status mechanism defined in this section. Therefore, an SD-JWT VC can be considered a Referenced Token. The following is a non-normative example of a Referenced Token in SD-JWT VC serialized form as received from an Issuer:</t>
        <artwork type="ascii-art"><![CDATA[
eyJhbGciOiAiRVMyNTYiLCAidHlwIjogImV4YW1wbGUrc2Qtand0In0.eyJfc2QiOiBb
Ikh2cktYNmZQVjB2OUtfeUNWRkJpTEZIc01heGNEXzExNEVtNlZUOHgxbGciXSwgImlz
cyI6ICJodHRwczovL2V4YW1wbGUuY29tL2lzc3VlciIsICJpYXQiOiAxNjgzMDAwMDAw
LCAiZXhwIjogMTg4MzAwMDAwMCwgInN1YiI6ICI2YzVjMGE0OS1iNTg5LTQzMWQtYmFl
Ny0yMTkxMjJhOWVjMmMiLCAic3RhdHVzIjogeyJzdGF0dXNfbGlzdCI6IHsiaWR4Ijog
MCwgInVyaSI6ICJodHRwczovL2V4YW1wbGUuY29tL3N0YXR1c2xpc3RzLzEifX0sICJf
c2RfYWxnIjogInNoYS0yNTYifQ.-kgS-R-Z4DEDlqb8kb6381_gHHNatsoF1fcVKZk3M
06CrnV8F8k9d2w2V_YAOvgcb0f11FqDFezXBXH30d4vcw~WyIyR0xDNDJzS1F2ZUNmR2
ZyeU5STjl3IiwgInN0cmVldF9hZGRyZXNzIiwgIlNjaHVsc3RyLiAxMiJd~WyJlbHVWN
U9nM2dTTklJOEVZbnN4QV9BIiwgImxvY2FsaXR5IiwgIlNjaHVscGZvcnRhIl0~WyI2S
Wo3dE0tYTVpVlBHYm9TNXRtdlZBIiwgInJlZ2lvbiIsICJTYWNoc2VuLUFuaGFsdCJd~
WyJlSThaV205UW5LUHBOUGVOZW5IZGhRIiwgImNvdW50cnkiLCAiREUiXQ~WyJRZ19PN
jR6cUF4ZTQxMmExMDhpcm9BIiwgImFkZHJlc3MiLCB7Il9zZCI6IFsiNnZoOWJxLXpTN
EdLTV83R3BnZ1ZiWXp6dTZvT0dYcm1OVkdQSFA3NVVkMCIsICI5Z2pWdVh0ZEZST0NnU
nJ0TmNHVVhtRjY1cmRlemlfNkVyX2o3NmttWXlNIiwgIktVUkRQaDRaQzE5LTN0aXotR
GYzOVY4ZWlkeTFvVjNhM0gxRGEyTjBnODgiLCAiV045cjlkQ0JKOEhUQ3NTMmpLQVN4V
GpFeVc1bTV4NjVfWl8ycm8yamZYTSJdfV0~
]]></artwork>
        <t>The resulting payload of the example above:</t>
        <sourcecode type="json"><![CDATA[
{
  "_sd": [
    "HvrKX6fPV0v9K_yCVFBiLFHsMaxcD_114Em6VT8x1lg"
  ],
  "iss": "https://example.com/issuer",
  "iat": 1683000000,
  "exp": 1883000000,
  "sub": "6c5c0a49-b589-431d-bae7-219122a9ec2c",
  "status": {
    "status_list": {
      "idx": 0,
      "uri": "https://example.com/statuslists/1"
    }
  },
  "_sd_alg": "sha-256"
}
]]></sourcecode>
      </section>
      <section anchor="referenced-token-cose">
        <name>Referenced Token in COSE</name>
        <t>The Referenced Token <bcp14>MAY</bcp14> be encoded as a "CBOR Web Token (CWT)" object according to <xref target="RFC8392"/> or other formats based on COSE. Referenced Tokens in CBOR should share the same core data structure for a status list reference:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>Status</tt> CBOR structure is a Map that <bcp14>MUST</bcp14> include at least one data item that refers to a status mechanism. Each data item in the <tt>Status</tt> CBOR structure comprises a key-value pair, where the key must be a CBOR text string (major type 3) specifying the identifier of the status mechanism and the corresponding value defines its contents.
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>status_list</tt> (status list): <bcp14>REQUIRED</bcp14> when the status mechanism defined in this specification is used. It has the same definition as the <tt>status_list</tt> claim in <xref target="referenced-token-jose"/> but <bcp14>MUST</bcp14> be encoded as a <tt>StatusListInfo</tt> CBOR structure with the following fields:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>idx</tt>: <bcp14>REQUIRED</bcp14>. Unsigned integer (major type 0) The <tt>idx</tt> (index) claim <bcp14>MUST</bcp14> specify a non-negative Integer that represents the index to check for status information in the Status List for the current Referenced Token.</t>
                  </li>
                  <li>
                    <t><tt>uri</tt>: <bcp14>REQUIRED</bcp14>. Text string (major type 3). The <tt>uri</tt> (URI) claim <bcp14>MUST</bcp14> specify a String value that identifies the Status List Token containing the status information for the Referenced Token. The value of <tt>uri</tt> <bcp14>MUST</bcp14> be a URI conforming to <xref target="RFC3986"/>.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <section anchor="referenced-token-cwt">
          <name>CBOR Web Token (CWT)</name>
          <t>The following content applies to the CWT Claims Set:</t>
          <ul spacing="normal">
            <li>
              <t><tt>65535</tt> (status): <bcp14>REQUIRED</bcp14>. The status claim contains the <tt>Status</tt> CBOR structure as described in <xref target="referenced-token-cose"/>.</t>
            </li>
          </ul>
          <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
          <t>The following is a non-normative example of a Referenced Token in CWT format in Hex:</t>
          <artwork><![CDATA[
d28443a10126a1044231325866a502653132333435017368747470733a2f2f657861
6d706c652e636f6d061a648c5bea041a8898dfea19ffffa16b7374617475735f6c69
7374a2636964780063757269782168747470733a2f2f6578616d706c652e636f6d2f
7374617475736c697374732f315840340f7efea10f1a36dc4797636a17b4dd4848b6
8997d1d10e8cceb3a38ff33b3dda72964a83989f6cf98560c2fc97a08bc8977cc6b0
f84cfedab93d3e4481e938
]]></artwork>
          <t>The following is the CBOR Annotated Hex output of the example above:</t>
          <artwork><![CDATA[
d2                              # tag(18)
  84                            #   array(4)
    43                          #     bytes(3)
      a10126                    #       "¡\x01&"
    a1                          #     map(1)
      04                        #       uint(4)
      42                        #       bytes(2)
        3132                    #         "12"
    58 66                       #     bytes(102)
      a50265313233343501736874  #       "¥\x02e12345\x01sht"
      7470733a2f2f6578616d706c  #       "tps://exampl"
      652e636f6d061a648c5bea04  #       "e.com\x06\x1ad\x8c[ê\x04"
      1a8898dfea19ffffa16b7374  #       "\x1a\x88\x98ßê\x19ÿÿ¡kst"
      617475735f6c697374a26369  #       "atus_list¢ci"
      647800637572697821687474  #       "dx\x00curix!htt"
      70733a2f2f6578616d706c65  #       "ps://example"
      2e636f6d2f7374617475736c  #       ".com/statusl"
      697374732f31              #       "ists/1"
    58 40                       #     bytes(64)
      340f7efea10f1a36dc479763  #       "4\x0f~þ¡\x0f\x1a6ÜG\x97c"
      6a17b4dd4848b68997d1d10e  #       "j\x17´ÝHH¶\x89\x97ÑÑ\x0e"
      8cceb3a38ff33b3dda72964a  #       "\x8cÎ³£\x8fó;=Úr\x96J"
      83989f6cf98560c2fc97a08b  #       "\x83\x98\x9flù\x85`Âü\x97\xa0\x8b"
      c8977cc6b0f84cfedab93d3e  #       "È\x97|Æ°øLþÚ¹=>"
      4481e938                  #       "D\x81é8"
]]></artwork>
        </section>
        <section anchor="referenced-token-mdoc">
          <name>ISO mdoc</name>
          <t>ISO mdoc <xref target="ISO.mdoc"/> may utilize the Status List mechanism by introducing the <tt>status</tt> parameter in the Mobile Security Object (MSO) as specified in Section 9.1.2 of <xref target="ISO.mdoc"/>. The <tt>status</tt> parameter contains the <tt>Status</tt> CBOR structure as described in <xref target="referenced-token-cose"/>.</t>
          <t>It is <bcp14>RECOMMENDED</bcp14> to use <tt>status</tt> for the label of the field that contains the <tt>Status</tt> CBOR structure.</t>
          <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
          <t>The following is a non-normative example of an IssuerAuth as specified in ISO mDL (also referred to as signed MSO) in Hex:</t>
          <artwork type="ascii-art"><![CDATA[
8443a10126a118215901f3308201ef30820195a00302010202140bfec7da97e048e
15ac3dacb9eafe82e64fd07f5300a06082a8648ce3d040302302331143012060355
04030c0b75746f7069612069616361310b3009060355040613025553301e170d323
4313030313030303030305a170d3235313030313030303030305a30213112301006
035504030c0975746f706961206473310b300906035504061302555330593013060
72a8648ce3d020106082a8648ce3d03010703420004ace7ab7340e5d9648c5a72a9
a6f56745c7aad436a03a43efea77b5fa7b88f0197d57d8983e1b37d3a539f4d5883
65e38cbbf5b94d68c547b5bc8731dcd2f146ba381a83081a5301c0603551d1f0415
30133011a00fa00d820b6578616d706c652e636f6d301e0603551d1204173015811
36578616d706c65406578616d706c652e636f6d301d0603551d0e0416041414e290
17a6c35621ffc7a686b7b72db06cd12351301f0603551d2304183016801454fa238
3a04c28e0d930792261c80c4881d2c00b300e0603551d0f0101ff04040302078030
150603551d250101ff040b3009060728818c5d050102300a06082a8648ce3d04030
20348003045022100b7103fd4b90529f50bd6f70c5ae5ce7f4f3d4d15a4e082812f
9fa1f5c2e5aa0a0220070b2822ec7ce6c56804923a85b2cfbffd054cf9a915f070c
fef7179a4bc6569590320d81859031ba766737461747573a16b7374617475735f6c
697374a26369647819019c63757269782168747470733a2f2f6578616d706c652e6
36f6d2f7374617475736c697374732f3167646f6354797065756f72672e69736f2e
31383031332e352e312e6d444c6776657273696f6e63312e306c76616c696469747
9496e666fa3667369676e6564c074323032342d31302d30315431333a33303a3032
5a6976616c696446726f6dc074323032342d31302d30315431333a33303a30325a6
a76616c6964556e74696cc074323032352d31302d30315431333a33303a30325a6c
76616c756544696765737473a1716f72672e69736f2e31383031332e352e31ac005
820a81d65ed5075fbd7ee19fa66e2bb3047ed826e2769873e7ef07c923da7a6f243
01582048701a9546492284d266ed81d439230a582d0e1f17a08ab1859a3efe98069
0a4025820d11fe48c8835b30bfb3895c3905436ddfb63f59ab9eee181b110985329
2a8f62035820a741bf05e20a8bc359e32426106ed0899b2c60262cc3acc637ddc99
41095fb7a045820ab67cb9a8f20a8572f77f02727367d08dc8e57fb89deb46b9c62
6e94457b7d8b055820bacddb4142b3842bd555206eb5acb27ded063294995c7e7fe
fbf93ece522604d065820bfd02b3aebdc05b53b5539226c38088d6d784b0ea0fab6
9eb9311650a48d325307582027dab70fe71da63e5e5d199e8ae5b79cbe8904bc30c
5b7544fb809e02ccb3e6a0858200dbd7ccc9c7727d3d17295f1b6f1914071670ee2
3d4d33530c31f1f406b8e3b7095820a5beb5efadf37f21637209abc519830681cc5
1f334818a823fec13b29552f5ba0a5820d8047c95f9272d7d07b2c13a9f5ac2ee02
380ab272a165e569391d89a2152c3c0b582004939930ffb4911ef03487a153605a3
0368b69f2437d6d21b4c90f92bc144c3e6d6465766963654b6579496e666fa16964
65766963654b6579a40102200121582096313d6c63e24e3372742bfdb1a33ba2c89
7dcd68ab8c753e4fbd48dca6b7f9a2258201fb3269edd418857de1b39a4e4a44b92
fa484caa722c228288f01d0c03a2c3d66f646967657374416c676f726974686d675
348412d3235365840b7c2d4abe85aa5ba814ef95de0385c71c802be8ac33a4a971a
85ed800ba7acb59cb21035f4a68fc0caa450cbefd3b255aec72f83595f0ae7b7d50
fe8a1c4cafe
]]></artwork>
          <t>The following is the CBOR Diagnostic Notation of the example above:</t>
          <artwork><![CDATA[
[
  << {
    1: -7
  } >>,
  {
    33: h'308201ef30820195a00302010202140bfec7da97e048e15ac3dacb9ea
    fe82e64fd07f5300a06082a8648ce3d04030230233114301206035504030c0b
    75746f7069612069616361310b3009060355040613025553301e170d3234313
    030313030303030305a170d3235313030313030303030305a30213112301006
    035504030c0975746f706961206473310b30090603550406130255533059301
    306072a8648ce3d020106082a8648ce3d03010703420004ace7ab7340e5d964
    8c5a72a9a6f56745c7aad436a03a43efea77b5fa7b88f0197d57d8983e1b37d
    3a539f4d588365e38cbbf5b94d68c547b5bc8731dcd2f146ba381a83081a530
    1c0603551d1f041530133011a00fa00d820b6578616d706c652e636f6d301e0
    603551d120417301581136578616d706c65406578616d706c652e636f6d301d
    0603551d0e0416041414e29017a6c35621ffc7a686b7b72db06cd12351301f0
    603551d2304183016801454fa2383a04c28e0d930792261c80c4881d2c00b30
    0e0603551d0f0101ff04040302078030150603551d250101ff040b300906072
    8818c5d050102300a06082a8648ce3d0403020348003045022100b7103fd4b9
    0529f50bd6f70c5ae5ce7f4f3d4d15a4e082812f9fa1f5c2e5aa0a0220070b2
    822ec7ce6c56804923a85b2cfbffd054cf9a915f070cfef7179a4bc6569'
  },
  << 24( << {
    "status": {
      "status_list": {
        "idx": 412,
        "uri": "https://example.com/statuslists/1"
      }
    },
    "docType": "org.iso.18013.5.1.mDL",
    "version": "1.0",
    "validityInfo": {
      "signed": 2024-10-01 13:30:02+00:00,
      "validFrom": 2024-10-01 13:30:02+00:00,
      "validUntil": 2025-10-01 13:30:02+00:00
    },
    "valueDigests": {
      "org.iso.18013.5.1": {
        0: h'a81d65ed5075fbd7ee19fa66e2bb3047ed826e2769873e7ef07c92
        3da7a6f243',
        1: h'48701a9546492284d266ed81d439230a582d0e1f17a08ab1859a3e
        fe980690a4',
        2: h'd11fe48c8835b30bfb3895c3905436ddfb63f59ab9eee181b11098
        53292a8f62',
        3: h'a741bf05e20a8bc359e32426106ed0899b2c60262cc3acc637ddc9
        941095fb7a',
        4: h'ab67cb9a8f20a8572f77f02727367d08dc8e57fb89deb46b9c626e
        94457b7d8b',
        5: h'bacddb4142b3842bd555206eb5acb27ded063294995c7e7fefbf93
        ece522604d',
        6: h'bfd02b3aebdc05b53b5539226c38088d6d784b0ea0fab69eb93116
        50a48d3253',
        7: h'27dab70fe71da63e5e5d199e8ae5b79cbe8904bc30c5b7544fb809
        e02ccb3e6a',
        8: h'0dbd7ccc9c7727d3d17295f1b6f1914071670ee23d4d33530c31f1
        f406b8e3b7',
        9: h'a5beb5efadf37f21637209abc519830681cc51f334818a823fec13
        b29552f5ba',
        10: h'd8047c95f9272d7d07b2c13a9f5ac2ee02380ab272a165e569391
        d89a2152c3c',
        11: h'04939930ffb4911ef03487a153605a30368b69f2437d6d21b4c90
        f92bc144c3e'
      }
    },
    "deviceKeyInfo": {
      "deviceKey": {
        1: 2,
        -1: 1,
        -2: h'96313d6c63e24e3372742bfdb1a33ba2c897dcd68ab8c753e4fbd
        48dca6b7f9a',
        -3: h'1fb3269edd418857de1b39a4e4a44b92fa484caa722c228288f01
        d0c03a2c3d6'
      }
    },
    "digestAlgorithm": "SHA-256"
  } >> ) >>,
  h'b7c2d4abe85aa5ba814ef95de0385c71c802be8ac33a4a971a85ed800ba7acb
  59cb21035f4a68fc0caa450cbefd3b255aec72f83595f0ae7b7d50fe8a1c4cafe'
]
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="status-types">
      <name>Status Types</name>
      <t>This document defines the statuses of Referenced Tokens as Status Type values. A status describes the state, mode, condition or stage of an entity that is represented by the Referenced Token.</t>
      <t>A Status List represents exactly one status per Referenced Token. If the Status List contains more than one bit per token (as defined by <tt>bits</tt> in the Status List), then the whole value of bits <bcp14>MUST</bcp14> describe one value. Status Types <bcp14>MUST</bcp14> have a numeric value between 0 and 255 for their representation in the Status List. The issuer of the Status List <bcp14>MUST</bcp14> choose an adequate <tt>bits</tt> value (bit size) to be able to describe the required Status Types for its application.</t>
      <section anchor="status-types-values">
        <name>Status Types Values</name>
        <t>The processing rules for Referenced Tokens (such as JWT or CWT) supersede the Referenced Token's status in a TSL. In particular, a Referenced Token that is evaluated as being expired (e.g. through the <tt>exp</tt> claim) but in a TSL has a status of 0x00 ("VALID"), is considered expired.</t>
        <t>This document creates a registry in <xref target="iana-status-types"/> that includes the most common Status Type values. Applications <bcp14>SHOULD</bcp14> use registered values for statuses if they have the correct semantics. Additional values may be defined for particular use cases. Status Types described by this document comprise:</t>
        <ul spacing="normal">
          <li>
            <t>0x00 - "VALID" - The status of the Referenced Token is valid, correct or legal.</t>
          </li>
          <li>
            <t>0x01 - "INVALID" - The status of the Referenced Token is revoked, annulled, taken back, recalled or cancelled.</t>
          </li>
          <li>
            <t>0x02 - "SUSPENDED" - The status of the Referenced Token is temporarily invalid, hanging, debarred from privilege. This status is usually temporary.</t>
          </li>
        </ul>
        <t>The Status Type value 0x03 and Status Type values in the range 0x0C until 0x0F are permanently reserved as application specific. The processing of Status Types using these values is application specific. All other Status Type values are reserved for future registration.</t>
        <t>See <xref target="privacy-status-types"/> for privacy considerations on status types.</t>
      </section>
    </section>
    <section anchor="verification-and-processing">
      <name>Verification and Processing</name>
      <t>The fetching, processing and verifying of a Status List Token may be done by either the Holder or the Relying Party. The following section is described from the role of the Relying Party, however the same rules apply to the Holder.</t>
      <section anchor="status-list-request">
        <name>Status List Request</name>
        <t>The Status Provider <bcp14>SHOULD</bcp14> provide Status List Token on an endpoint serving an HTTP GET request to the URI provided in the Referenced Token, unless the Relying Party and the Status Provider have alternative methods of distribution.</t>
        <t>The HTTP endpoint <bcp14>SHOULD</bcp14> support the use of Cross-Origin Resource Sharing (CORS) <xref target="CORS"/> and/or other methods as appropriate to enable Browser-based clients to access it, unless ecosystems using this specification choose not to support Browser-based clients.</t>
        <t>The Relying Party <bcp14>SHOULD</bcp14> send the following Accept HTTP Header to indicate the requested response type unless the Content-Type of Status List Tokens in the respective ecosystem is known or the Relying Party supports both formats:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+jwt" for Status List Token in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List Token in CWT format</t>
          </li>
        </ul>
        <t>If the Relying Party does not send an Accept Header, the response type is assumed to be known implicitly or out-of-band.</t>
        <t>The following is a non-normative example of a request for a Status List Token with type <tt>application/statuslist+jwt</tt>:</t>
        <artwork type="ascii-art"><![CDATA[
GET /statuslists/1 HTTP/1.1
Host: example.com
Accept: application/statuslist+jwt
]]></artwork>
      </section>
      <section anchor="status-list-response">
        <name>Status List Response</name>
        <t>A successful response that contains a Status List Token <bcp14>MUST</bcp14> use an HTTP status code in the 2xx range.</t>
        <t>A response <bcp14>MAY</bcp14> also choose to redirect the client to another URI using an HTTP status code in the 3xx range, which clients <bcp14>SHOULD</bcp14> follow. See <xref target="redirects"/> for security considerations on redirects.</t>
        <t>In the successful response, the Status Provider <bcp14>MUST</bcp14> use the following content-type:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+jwt" for Status List Token in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List Token in CWT format</t>
          </li>
        </ul>
        <t>In the case of "application/statuslist+jwt", the response <bcp14>MUST</bcp14> be of type JWT and follow the rules of <xref target="status-list-token-jwt"/>.
In the case of "application/statuslist+cwt", the response <bcp14>MUST</bcp14> be of type CWT and follow the rules of <xref target="status-list-token-cwt"/>.</t>
        <t>The body of such an HTTP response contains the raw Status List Token, that means the binary encoding as defined in <xref section="9.2.1" sectionFormat="of" target="RFC8392"/> for a Status List Token in CWT format and the JWS Compact Serialization form for a Status List Token in JWT format. Note that while the examples for Status List Tokens in CWT format in this document are provided in hex encoding, this is done purely for readability; CWT format response bodies are "in binary".</t>
        <t>The HTTP response <bcp14>SHOULD</bcp14> use gzip Content-Encoding as defined in <xref target="RFC9110"/> for Status List Tokens in JWT format.</t>
        <t>If caching-related HTTP headers are present in the HTTP response, Relying Parties <bcp14>MUST</bcp14> prioritize the exp and ttl claims within the Status List Token over the HTTP headers for determining caching behavior.</t>
        <t>The following is a non-normative example of a response with a Status List Token with type <tt>application/statuslist+jwt</tt>:</t>
        <artwork type="ascii-art"><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/statuslist+jwt

eyJhbGciOiJFUzI1NiIsImtpZCI6IjEyIiwidHlwIjoic3RhdHVzbGlzdCtqd3QifQ.e
yJleHAiOjIyOTE3MjAxNzAsImlhdCI6MTY4NjkyMDE3MCwiaXNzIjoiaHR0cHM6Ly9le
GFtcGxlLmNvbSIsInN0YXR1c19saXN0Ijp7ImJpdHMiOjEsImxzdCI6ImVOcmJ1UmdBQ
WhjQlhRIn0sInN1YiI6Imh0dHBzOi8vZXhhbXBsZS5jb20vc3RhdHVzbGlzdHMvMSIsI
nR0bCI6NDMyMDB9.2lKUUNG503R9htu4aHAYi7vjmr3sgApbfoDvPrl65N3URUO1EYqq
Ql45Jfzd-Av4QzlKa3oVALpLwOEUOq-U_g
]]></artwork>
      </section>
      <section anchor="validation-rules">
        <name>Validation Rules</name>
        <t>Upon receiving a Referenced Token, a Relying Party <bcp14>MUST</bcp14> first perform the validation of the Referenced Token - e.g., checking for expected attributes, valid signature and expiration time. The processing rules for Referenced Tokens (such as JWT or CWT) <bcp14>MUST</bcp14> precede any evaluation of a Referenced Token's status. For example, if a token is evaluated as being expired through the "exp" (Expiration Time) but also has a status of 0x00 ("VALID"), the token is considered expired. As this is out of scope for this document, this validation is not described here, but is expected to be done according to the format of the Referenced Token.</t>
        <t>If this validation is not successful, the Referenced Token <bcp14>MUST</bcp14> be rejected. If the validation was successful, the Relying Party <bcp14>MUST</bcp14> perform the following validation steps to evaluate the status of the Referenced Token:</t>
        <ol spacing="normal" type="1"><li>
            <t>Check for the existence of a <tt>status</tt> claim, check for the existence of a <tt>status_list</tt> claim within the <tt>status</tt> claim and validate that the content of <tt>status_list</tt> adheres to the rules defined in <xref target="referenced-token-jose"/> for JOSE-based Referenced Tokens and <xref target="referenced-token-cose"/> for COSE-based Referenced Tokens. Other formats of Referenced Tokens may define other encoding of the URI and index.</t>
          </li>
          <li>
            <t>Resolve the Status List Token from the provided URI</t>
          </li>
          <li>
            <t>Validate the Status List Token:
            </t>
            <ol spacing="normal" type="a"><li>
                <t>Validate the Status List Token by following the rules defined in <xref section="7.2" sectionFormat="of" target="RFC7519"/> for JWTs and <xref section="7.2" sectionFormat="of" target="RFC8392"/> for CWTs. This step might require the resolution of a public key as described in <xref target="key-management"/>.</t>
              </li>
              <li>
                <t>Check for the existence of the required claims as defined in <xref target="status-list-token-jwt"/> and <xref target="status-list-token-cwt"/> depending on the token type</t>
              </li>
            </ol>
          </li>
          <li>
            <t>All existing claims in the Status List Token <bcp14>MUST</bcp14> be checked according to the rules in <xref target="status-list-token-jwt"/> and <xref target="status-list-token-cwt"/>
            </t>
            <ol spacing="normal" type="a"><li>
                <t>The subject claim (<tt>sub</tt> or <tt>2</tt>) of the Status List Token <bcp14>MUST</bcp14> be equal to the <tt>uri</tt> claim in the <tt>status_list</tt> object of the Referenced Token</t>
              </li>
              <li>
                <t>If the Relying Party has local policies regarding the freshness of the Status List Token, it <bcp14>SHOULD</bcp14> check the issued at claim (<tt>iat</tt> or <tt>6</tt>)</t>
              </li>
              <li>
                <t>If the expiration time is defined (<tt>exp</tt> or <tt>4</tt>), it <bcp14>MUST</bcp14> be checked if the Status List Token is expired</t>
              </li>
              <li>
                <t>If the Relying Party is using a system for caching the Status List Token, it <bcp14>SHOULD</bcp14> check the <tt>ttl</tt> claim of the Status List Token and retrieve a fresh copy if (time status was resolved + ttl &lt; current time)</t>
              </li>
            </ol>
          </li>
          <li>
            <t>Decompress the Status List with a decompressor that is compatible with DEFLATE <xref target="RFC1951"/> and ZLIB <xref target="RFC1950"/></t>
          </li>
          <li>
            <t>Retrieve the status value of the index specified in the Referenced Token as described in <xref target="status-list"/>. If the provided index is out of bounds of the Status List, no statement about the status of the Referenced Token can be made and the Referenced Token <bcp14>SHOULD</bcp14> be rejected.</t>
          </li>
          <li>
            <t>Check the status value as described in <xref target="status-types"/></t>
          </li>
        </ol>
        <t>If any of these checks fails, no statement about the status of the Referenced Token can be made and the Referenced Token <bcp14>SHOULD</bcp14> be rejected.</t>
      </section>
      <section anchor="historical-resolution">
        <name>Historical Resolution</name>
        <t>By default, the status mechanism defined in this specification only conveys information about the state of Referenced Tokens at the time the Status List Token was issued. The validity period for this information, as defined by the issuer, is explicitly stated by the <tt>iat</tt> (issued at) and <tt>exp</tt> (expiration time) claims for JWT and their corresponding ones for the CWT representation. If support for historical status information is desired, this can be achieved by extending with a timestamp the request for the Status List Token as defined in <xref target="status-list-request"/>. This feature has additional privacy implications as described in <xref target="privacy-historical"/>.</t>
        <t>To obtain the Status List Token, the Relying Party <bcp14>MUST</bcp14> send an HTTP GET request to the URI provided in the Referenced Token with the additional query parameter <tt>time</tt> and its value being a unix timestamp. The response for a valid request <bcp14>SHOULD</bcp14> contain a Status List Token that was valid for that specified time or an error.</t>
        <t>If the Server does not support the additional query parameter, it <bcp14>SHOULD</bcp14> return a status code of 501 (Not Implemented) or if the requested time is not supported it <bcp14>SHOULD</bcp14> return a status code of 406 (Not Acceptable). A Status List Token might be served via static file hosting (e.g., leveraging a Content Delivery Network) that ignores query parameters, which would result in the client requesting a historical status list but receiving the current status list. Thus, the client <bcp14>MUST</bcp14> reject a response unless the requested timestamp is within the valid time of the returned token signaled via iat (6 for CWT) and exp (4 for CWT).</t>
        <t>The following is a non-normative example of a GET request using the <tt>time</tt> query parameter:</t>
        <artwork type="ascii-art"><![CDATA[
GET /statuslists/1?time=1686925000 HTTP/1.1
Host: example.com
Accept: application/statuslist+jwt
]]></artwork>
        <t>The following is a non-normative example of a response for the above Request:</t>
        <artwork type="ascii-art"><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/statuslist+jwt

eyJhbGciOiJFUzI1NiIsImtpZCI6IjEyIiwidHlwIjoic3RhdHVzbGlzdCtqd3QifQ.e
yJleHAiOjIyOTE3MjAxNzAsImlhdCI6MTY4NjkyMDE3MCwiaXNzIjoiaHR0cHM6Ly9le
GFtcGxlLmNvbSIsInN0YXR1c19saXN0Ijp7ImJpdHMiOjEsImxzdCI6ImVOcmJ1UmdBQ
WhjQlhRIn0sInN1YiI6Imh0dHBzOi8vZXhhbXBsZS5jb20vc3RhdHVzbGlzdHMvMSIsI
nR0bCI6NDMyMDB9.2lKUUNG503R9htu4aHAYi7vjmr3sgApbfoDvPrl65N3URUO1EYqq
Ql45Jfzd-Av4QzlKa3oVALpLwOEUOq-U_g
]]></artwork>
      </section>
    </section>
    <section anchor="aggregation">
      <name>Status List Aggregation</name>
      <t>Status List Aggregation is an optional mechanism offered by the Issuer to publish a list of one or more Status List Tokens URIs, allowing a Relying Party to fetch Status List Tokens provided by this Issuer. This mechanism is intended to support fetching and caching mechanisms and allow offline validation of the status of a Referenced Token for a period of time.</t>
      <t>If a Relying Party encounters an error while validating one of the Status List Tokens returned from the Status List Aggregation endpoint, it <bcp14>SHOULD</bcp14> continue processing the other Status List Tokens.</t>
      <t>There are two options for a Relying Party to retrieve the Status List Aggregation.
An Issuer <bcp14>MAY</bcp14> support any of these mechanisms:</t>
      <ul spacing="normal">
        <li>
          <t>Issuer metadata: The Issuer of the Referenced Token publishes an URI which links to Status List Aggregation, e.g. in publicly available metadata of an issuance protocol</t>
        </li>
        <li>
          <t>Status List Parameter: The Status Issuer includes an additional claim in the Status List Token that contains the Status List Aggregation URI.</t>
        </li>
      </ul>
      <artwork type="ascii-art"><![CDATA[
                                      ┌─────────────────┐
                                      │                 │
                                      │ Issuer Metadata │
                                      │                 │
                                      └───┬─────────────┘
                                          │
  ┌───────────────────┐                   │ link within metadata
 ┌───────────────────┐│  link all         ▼
┌───────────────────┐││◄───────┐  ┌─────────────────────────┐
│                   ││◄────────┤  │                         │
│ Status List Token │◄┴────────┴──┤ Status List Aggregation │
│                   │┘            │                         │
└───────┬───────────┘             └─────────────────────────┘
        │                                 ▲
        │   link by aggregation_uri       │
        └─────────────────────────────────┘
]]></artwork>
      <section anchor="issuer-metadata">
        <name>Issuer Metadata</name>
        <t>The Issuer <bcp14>MAY</bcp14> link to the Status List Aggregation URI in metadata that can be provided by different means like .well-known metadata as is used commonly in OAuth and OpenID Connect, or within Issuer certificates or trust lists (such as VICAL as defined in Annex C of <xref target="ISO.mdoc"/>). If the Issuer is an OAuth Authorization Server according to <xref target="RFC6749"/>, it is <bcp14>RECOMMENDED</bcp14> to use the <tt>status_list_aggregation_endpoint</tt> parameter within its metadata defined by <xref target="RFC8414"/>. The Issuer <bcp14>MAY</bcp14> limit the Status List Tokens listed by a Status List Aggregation to a particular type of Referenced Token.</t>
        <t>The concrete implementation details depend on the specific ecosystem and are out of scope of this specification.</t>
      </section>
      <section anchor="status-list-parameter">
        <name>Status List Parameter</name>
        <t>The URI to the Status List Aggregation <bcp14>MAY</bcp14> be provided as the optional parameter <tt>aggregation_uri</tt> in the Status List itself as explained in <xref target="status-list-cbor"/> and <xref target="status-list-json"/> respectively. A Relying Party may use this URI to retrieve an up-to-date list of relevant Status Lists.</t>
      </section>
      <section anchor="status-list-aggregation-data-structure">
        <name>Status List Aggregation Data Structure</name>
        <t>This section defines the structure for a JSON-encoded Status List Aggregation:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status_lists</tt>: <bcp14>REQUIRED</bcp14>. JSON array of strings that contains URIs linking to Status List Tokens.</t>
          </li>
        </ul>
        <t>The Status List Aggregation URI provides a list of Status List Token URIs. This aggregation is in JSON and the returned media type <bcp14>MUST</bcp14> be <tt>application/json</tt>. A Relying Party can iterate through this list and fetch all Status List Tokens before encountering the specific URI in a Referenced Token.</t>
        <t>The following is a non-normative example for media type <tt>application/json</tt>:</t>
        <sourcecode type="json"><![CDATA[
{
   "status_lists" : [
      "https://example.com/statuslists/1",
      "https://example.com/statuslists/2",
      "https://example.com/statuslists/3"
   ]
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="eku">
      <name>X.509 Certificate Extended Key Usage Extension</name>
      <t><xref target="RFC5280"/> specifies the Extended Key Usage (EKU) X.509 certificate extension for use on end entity certificates. The extension indicates one or more purposes for which the certified public key is valid. The EKU extension can be used in conjunction with the Key Usage (KU) extension, which indicates the set of basic cryptographic operations for which the certified key may be used. A certificate's issuer explicitly delegates Status List Token signing authority by issuing an X.509 certificate containing the KeyPurposeId defined below in the extended key usage extension.
Other specifications <bcp14>MAY</bcp14> choose to re-use this OID for other status mechanisms under the condition that they are registered in the "JWT Status Mechanisms" or "CWT Status Mechanisms" registries.</t>
      <t>The following OID is defined for usage in the EKU extension:</t>
      <artwork><![CDATA[
  id-kp  OBJECT IDENTIFIER  ::=
       { iso(1) identified-organization(3) dod(6) internet(1)
         security(5) mechanisms(5) pkix(7) kp(3) }

  id-kp-oauthStatusSigning OBJECT IDENTIFIER ::= { id-kp TBD }
]]></artwork>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>Status List Tokens as defined in <xref target="status-list-token"/> only exist in cryptographically secured containers which allow checking the integrity and origin without relying on other factors such as transport security or web PKI.</t>
      <section anchor="correct-decoding-and-parsing-of-the-encoded-status-list">
        <name>Correct decoding and parsing of the encoded Status List</name>
        <t>Implementers should be particularly careful for the correct parsing and decoding of the Status List. Incorrect implementations might check the index on the wrong data or miscalculate the bit and byte index leading to an erroneous status of the Referenced Token. Beware, that bits are indexed (bit order) from least significant bit to most significant bit (also called "right to left") while bytes are indexed (byte order) in their natural incrementing byte order (usually written for display purpose from left to right). Endianness does not apply here because each status value fits within a single byte.</t>
        <t>Implementations <bcp14>SHOULD</bcp14> verify correctness using the test vectors given by this specification.</t>
      </section>
      <section anchor="security-guidance-for-jwt-and-cwt">
        <name>Security Guidance for JWT and CWT</name>
        <t>A Status List Token in the JWT format <bcp14>SHOULD</bcp14> follow the security considerations of <xref target="RFC7519"/> and the best current practices of <xref target="RFC8725"/>.</t>
        <t>A Status List Token in the CWT format <bcp14>SHOULD</bcp14> follow the security considerations of <xref target="RFC8392"/>.</t>
      </section>
      <section anchor="key-management">
        <name>Key Resolution and Trust Management</name>
        <t>This specification does not mandate specific methods for key resolution and trust management, however the following recommendations are made for specifications, profiles, or ecosystems that are planning to make use of the Status List mechanism:</t>
        <t>If the Issuer of the Referenced Token is the same entity as the Status Issuer, then the same key that is embedded into the Referenced Token may be used for the Status List Token. In this case the Status List Token may use:</t>
        <ul spacing="normal">
          <li>
            <t>the same <tt>x5c</tt> value or an <tt>x5t</tt>, <tt>x5t#S256</tt> or <tt>kid</tt> parameter referencing to the same key as used in the Referenced Token for JOSE.</t>
          </li>
          <li>
            <t>the same <tt>x5chain</tt> value or an <tt>x5t</tt> or <tt>kid</tt> parameter referencing to the same key as used in the Referenced Token for COSE.</t>
          </li>
        </ul>
        <t>Alternatively, the Status Issuer may use the same web-based key resolution that is used for the Referenced Token. In this case the Status List Token may use:</t>
        <ul spacing="normal">
          <li>
            <t>an <tt>x5u</tt>, <tt>jwks</tt>, <tt>jwks_uri</tt> or <tt>kid</tt> parameter referencing to a key using the same web-based resolution as used in the Referenced Token for JOSE.</t>
          </li>
          <li>
            <t>an <tt>x5u</tt> or <tt>kid</tt> parameter referencing to a key using the same web-based resolution as used in the Referenced Token for COSE.</t>
          </li>
        </ul>
        <artwork type="ascii-art"><![CDATA[
┌────────┐  host keys  ┌──────────────────────┐
│ Issuer ├────────┬───►│ .well-known metadata │
└─┬──────┘        │    └──────────────────────┘
  ▼ update status │
┌───────────────┐ │
│ Status Issuer ├─┘
└─┬─────────────┘
  ▼ provide Status List
┌─────────────────┐
│ Status Provider │
└─────────────────┘
]]></artwork>
        <t>If the Issuer of the Referenced Token is a different entity than the Status Issuer, then the keys used for the Status List Token may be cryptographically linked, e.g. by a Certificate Authority through an x.509 PKI. The certificate of the Issuer for the Referenced Token and the Status Issuer should be issued by the same Certificate Authority and the Status Issuer's certificate should utilize <xref target="eku">extended key usage</xref>.</t>
        <artwork type="ascii-art"><![CDATA[
┌───────────────────────┐
│ Certificate Authority │
└─┬─────────────────────┘
  │ authorize
  │  ┌────────┐
  ├─►│ Issuer │
  │  └─┬──────┘
  │    ▼ update status
  │  ┌───────────────┐
  └─►│ Status Issuer │
     └─┬─────────────┘
       ▼ provide Status List
     ┌─────────────────┐
     │ Status Provider │
     └─────────────────┘
]]></artwork>
      </section>
      <section anchor="redirects">
        <name>Redirection 3xx</name>
        <t>HTTP clients that follow 3xx (Redirection) class of status codes <bcp14>SHOULD</bcp14> be aware of the possible dangers of redirects, such as infinite redirection loops, since they can be used for denial of service attacks on clients. A client <bcp14>SHOULD</bcp14> detect and intervene in infinite redirections. Clients <bcp14>SHOULD</bcp14> apply the guidance for redirects given in <xref section="15.4" sectionFormat="of" target="RFC9110"/>.</t>
      </section>
      <section anchor="security-ttl">
        <name>Expiration and Caching</name>
        <t>Expiration and caching information is conveyed via the <tt>exp</tt> and <tt>ttl</tt> claims as explained in <xref target="expiry-and-caching"/>. Clients <bcp14>SHOULD</bcp14> check that both values are within reasonable ranges before requesting new Status List Tokens based on these values to prevent accidentally creating unreasonable amounts of requests for a specific URL. Status Issuers could accidentally or maliciously use this mechanism to effectively DDoS the contained URL of the Status Provider.</t>
        <t>Reasonable values for both claims highly depend on the use-case requirements and clients <bcp14>SHOULD</bcp14> be configured with lower/upper bounds for these values that fit their respective use-cases.</t>
      </section>
      <section anchor="security-mac">
        <name>Status List Token Protection</name>
        <t>This specification allows both, digital signatures using asymmetric cryptography, and Message Authentication Codes (MAC) to be used to protect Status List Tokens. Implementers <bcp14>SHOULD</bcp14> only use MACs to secure the integrity of Status List Tokens if they fully understand the risks of MACs when compared to digital signatures and especially the requirements of their use-case scenarios. These use-cases typically represent deployments where Status Issuer and Relying Party have a trust relationship and the possibility to securely exchange keys out of band or are the same entity and no other entity needs to verify the Status List Token. We expect most deployments to use digital signatures for the protection of Status List Tokens and implementers <bcp14>SHOULD</bcp14> default to digital signatures if they are unsure.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <section anchor="privacy-issuer">
        <name>Observability of Issuers</name>
        <t>The main privacy consideration for a Status List, especially in the context of the Issuer-Holder-Verifier model <xref target="SD-JWT.VC"/>, is to prevent the Issuer from tracking the usage of the Referenced Token when the status is being checked. If an Issuer offers status information by referencing a specific token, this would enable the Issuer to create a profile for the issued token by correlating the date and identity of Relying Parties, that are requesting the status.</t>
        <t>The Status List approaches these privacy implications by integrating the status information of many Referenced Tokens into the same list. Therefore, the Issuer does not learn for which Referenced Token the Relying Party is requesting the Status List. The privacy of the Holder is protected by the anonymity within the set of Referenced Tokens in the Status List, also called herd privacy. This limits the possibilities of tracking by the Issuer.</t>
        <t>The herd privacy is depending on the number of entities within the Status List called its size. A larger size results in better privacy but also impacts the performance as more data has to be transferred to read the Status List.</t>
        <t>Additionally, the Issuer may analyse data from the HTTP request to identify the Relying Party, e.g. through the sender's IP address.</t>
        <t>This behaviour may be mitigated by:</t>
        <ul spacing="normal">
          <li>
            <t>private relay protocols or other mechanisms hiding the original sender like <xref target="RFC9458"/>.</t>
          </li>
          <li>
            <t>using trusted Third Party Hosting, see <xref target="third-party-hosting"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="issuer-tracking-of-referenced-tokens">
        <name>Issuer Tracking of Referenced Tokens</name>
        <t>An Issuer could maliciously or accidentally bypass the privacy benefits of the herd privacy by either:</t>
        <ul spacing="normal">
          <li>
            <t>Generating a unique Status List for every Referenced Token. By these means, the Issuer could maintain a mapping between Referenced Tokens and Status Lists and thus track the usage of Referenced Tokens by utilizing this mapping for the incoming requests.</t>
          </li>
          <li>
            <t>Encoding a unique URI in each Referenced Token which points to the underlying Status List. This may involve using URI components such as query parameters, unique path segments, or fragments to make the URI unique.</t>
          </li>
        </ul>
        <t>This malicious behavior can be detected by Relying Parties that request large amounts of Referenced Tokens by comparing the number of different Status Lists and their sizes with the volume of Referenced Tokens being verified.</t>
      </section>
      <section anchor="privacy-relying-party">
        <name>Observability of Relying Parties</name>
        <t>Once the Relying Party receives the Referenced Token, the Relying Party can request the Status List through the provided <tt>uri</tt> parameter and can validate the Referenced Token's status by looking up the corresponding <tt>index</tt>. However, the Relying Party may persistently store the <tt>uri</tt> and <tt>index</tt> of the Referenced Token to request the Status List again at a later time. By doing so regularly, the Relying Party may create a profile of the Referenced Token's validity status. This behaviour may be intended as a feature, e.g. for an identity proofing (e.g. Know-Your-Customer process in finance industry) that requires regular validity checks, but might also be abused in cases where this is not intended and unknown to the Holder, e.g. profiling the suspension of an employee credential.</t>
        <t>This behaviour could be mitigated by:</t>
        <ul spacing="normal">
          <li>
            <t>regular re-issuance of the Referenced Token, see <xref target="implementation-linkability"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="privacy-outsider">
        <name>Observability of Outsiders</name>
        <t>Outside actors may analyse the publicly available Status Lists to get information on the internal processes of the Issuer and its related business, e.g. number of customers or clients. This data may allow inferences on the total number of issued Referenced Tokens and the revocation rate. Additionally, actors may regularly fetch this data or use the historic data functionality to learn how these numbers change over time.</t>
        <t>This behaviour could be mitigated by:</t>
        <ul spacing="normal">
          <li>
            <t>disabling the historical data feature <xref target="historical-resolution"/></t>
          </li>
          <li>
            <t>disabling the Status List Aggregation <xref target="aggregation"/></t>
          </li>
          <li>
            <t>choosing non-sequential, pseudo-random or random indices</t>
          </li>
          <li>
            <t>using decoy entries to obfuscate the real number of Referenced Tokens within a Status List</t>
          </li>
          <li>
            <t>choosing to deploy and utilize multiple Status Lists simultaneously</t>
          </li>
        </ul>
      </section>
      <section anchor="unlinkability">
        <name>Unlinkability</name>
        <t>The tuple of uri and index inside the Referenced Token are unique and therefore is traceable data.</t>
        <section anchor="colluding-relying-parties">
          <name>Colluding Relying Parties</name>
          <t>Two or more colluding Relying Parties may link two transactions involving the same Referenced Token by comparing the status claims of received Referenced Tokens and therefore determine that they have interacted with the same Holder.</t>
          <t>To avoid privacy risks of colluding Relying Parties, it is <bcp14>RECOMMENDED</bcp14> that Issuers provide the ability to issue batches of one-time-use Referenced Tokens, enabling Holders to use in a single interaction with a Relying Party before discarding. See <xref target="implementation-linkability"/> to avoid further correlatable information by the values of <tt>uri</tt> and <tt>idx</tt>, Status Issuers are <bcp14>RECOMMENDED</bcp14> to:</t>
          <ul spacing="normal">
            <li>
              <t>choose non-sequential, pseudo-random or random indices</t>
            </li>
            <li>
              <t>use decoy entries to obfuscate the real number of Referenced Tokens within a Status List</t>
            </li>
            <li>
              <t>choose to deploy and utilize multiple Status Lists simultaneously</t>
            </li>
          </ul>
        </section>
        <section anchor="colluding-status-issuer-and-relying-party">
          <name>Colluding Status Issuer and Relying Party</name>
          <t>A Status Issuer and a Relying Party Issuer may link two transactions involving the same Referenced Tokens by comparing the status claims of the Referenced Token and therefore determine that they have interacted with the same Holder. It is therefore recommended to use Status Lists for Referenced Token formats that have similar unlinkability properties.</t>
        </section>
      </section>
      <section anchor="third-party-hosting">
        <name>External Status Provider for Privacy</name>
        <t>If the roles of the Status Issuer and the Status Provider are performed by different entities, this may give additional privacy assurances as the Issuer has no means to identify the Relying Party or its request.</t>
        <t>Third-Party hosting may also allow for greater scalability, as the Status List Tokens may be served by operators with greater resources, like CDNs, while still ensuring authenticity and integrity of Token Status List, as it is signed by the Status Issuer.</t>
      </section>
      <section anchor="privacy-historical">
        <name>Historical Resolution</name>
        <t>By default, this specification only supports providing Status List information for the most recent status information and does not allow the lookup of historical information like a validity state at a specific point in time. There exists optional support for a query parameter that allows these kind of historic lookups as described in <xref target="historical-resolution"/>. There are scenarios where such a functionality is necessary, but this feature should only be implemented when the scenario and the consequences of enabling historical resolution are fully understood.</t>
        <t>There are strong privacy concerns that have to be carefully taken into consideration when providing a mechanism that allows historic requests for status information - see <xref target="privacy-relying-party"/> for more details. Support for this functionality is optional and Implementers are <bcp14>RECOMMENDED</bcp14> to not support historic requests unless there are strong reasons to do so and after carefully considering the privacy implications.</t>
      </section>
      <section anchor="privacy-status-types">
        <name>Status Types</name>
        <t>As previously explained, there is the potential risk of observability by Relying Parties (see <xref target="privacy-relying-party"/>) and Outsiders (see <xref target="privacy-outsider"/>). That means that any Status Type that transports information beyond the routine statuses VALID and INVALID about a Referenced Token can leak information to other parties. This document defines one additional Status Type with "SUSPENDED" that conveys such additional information, but in practice all statuses other than VALID and INVALID are likely to contain information with privacy implications.</t>
        <t>Ecosystems that want to use other Status Types than "VALID" and "INVALID" should consider the possible leakage of data and profiling possibilities before doing so and evaluate if revocation and re-issuance might a better fit for their use-case.</t>
      </section>
    </section>
    <section anchor="implementation">
      <name>Operational Considerations</name>
      <section anchor="implementation-lifecycle">
        <name>Token Lifecycle</name>
        <t>The lifetime of a Status List Token depends on the lifetime of its Referenced Tokens. Once all Referenced Tokens are expired, the Issuer may stop serving the Status List Token.</t>
      </section>
      <section anchor="implementation-linkability">
        <name>Linkability Mitigation</name>
        <t>Referenced Tokens may be regularly re-issued to mitigate the linkability of presentations to Relying Parties. In this case, every re-issued Referenced Token <bcp14>MUST</bcp14> have a fresh Status List entry in order to prevent the index value from becoming a possible source of correlation.</t>
        <t>Referenced Tokens may also be issued in batches and be presented by Holders in a one-time-use policy to avoid linkability. In this case, every Referenced Token <bcp14>MUST</bcp14> have a dedicated Status List entry and <bcp14>MAY</bcp14> be spread across multiple Status List Tokens. Batch revocation of a batch of Referenced Tokens might reveal that they are all members of the same batch.</t>
        <t>Beware, that this mechanism solves linkability issues between Relying Parties, but does not prevent traceability by Issuers.</t>
      </section>
      <section anchor="default-values-and-double-allocation">
        <name>Default Values and Double Allocation</name>
        <t>The Status Issuer is <bcp14>RECOMMENDED</bcp14> to initialize the Status List byte array with a default value provided as
an initialization parameter by the Issuer of the Referenced Token. The Issuer is <bcp14>RECOMMENDED</bcp14> to use a default value that represents the most common value for its Referenced Tokens to avoid an update during issuance (usually 0x00, VALID). This preserves the benefits from compression and effectively hides the number of managed Referenced Tokens since an unused index value can not be distinguished from a valid Referenced Token.</t>
        <t>The Status Issuer is <bcp14>RECOMMENDED</bcp14> to prevent double allocation, i.e. re-using the same <tt>uri</tt> and <tt>idx</tt> for multiple Referenced Tokens (since <tt>uri</tt> and <tt>idx</tt> form a unique identifier that might be used for tracking, see <xref target="privacy-considerations"/> for more details). The Status Issuer <bcp14>MUST</bcp14> prevent any unintended double allocation.</t>
      </section>
      <section anchor="status-list-size">
        <name>Status List Size</name>
        <t>The storage and transmission size of the Status Issuer's Status List Tokens depend on:</t>
        <ul spacing="normal">
          <li>
            <t>the size of the Status List, i.e. the number of Referenced Tokens</t>
          </li>
          <li>
            <t>the revocation rate and distribution of the Status List data (due to compression, revocation rates close to 0% or 100% create lowest sizes while revocation rates closer to 50% and random distribution create highest sizes)</t>
          </li>
          <li>
            <t>the lifetime of Referenced Tokens (shorter lifetimes allows for earlier retirement of Status List Tokens)</t>
          </li>
        </ul>
        <t>The Status List Issuer may increase the size of a Status List if it requires indices for additional Referenced Tokens. It is <bcp14>RECOMMENDED</bcp14> that the size of a Status List in bits is divisible in bytes (8 bits) without a remainder, i.e. <tt>size-in-bits</tt> % 8 = 0.</t>
        <t>The Status List Issuer may divide its Referenced Tokens up into multiple Status Lists to reduce the transmission size of an individual Status List Token. This may be useful for ecosystems where some entities operate in constrained environments, e.g. for mobile internet or embedded devices. The Status List Issuer may organize the Status List Tokens depending on the Referenced Token's expiry date to align their lifecycles and allow for easier retiring of Status List Tokens, however the Status Issuer must be aware of possible privacy risks due to correlations.</t>
      </section>
      <section anchor="external-status-issuer">
        <name>External Status Issuer</name>
        <t>If the roles of the Issuer of the Referenced Token and the Status Issuer are performed by different entities, this may allow for use cases that require revocation of Referenced Tokens to be managed by different entities, e.g. for regulatory or privacy reasons. In this scenario both parties must align on:</t>
        <ul spacing="normal">
          <li>
            <t>the key and trust management as described in <xref target="key-management"/></t>
          </li>
          <li>
            <t>parameters for the Status List
            </t>
            <ul spacing="normal">
              <li>
                <t>number of <tt>bits</tt> for the Status Type as described in <xref target="status-list"/></t>
              </li>
              <li>
                <t>update cycle of the Issuer used for <tt>ttl</tt> in the Status List Token as described in <xref target="status-list-token"/></t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="external-status-provider-for-scalability">
        <name>External Status Provider for Scalability</name>
        <t>If the roles of the Status Issuer and the Status Provider are performed by different entities, this may allow for greater scalability, as the Status List Tokens may be served by operators with greater resources, like CDNs. At the same time the authenticity and integrity of Token Status List is still guaranteed, as it is signed by the Status Issuer.</t>
      </section>
      <section anchor="expiry-and-caching">
        <name>Status List Update Interval and Caching</name>
        <t>Status Issuers have two options to communicate their update interval policy for the status of their Referenced Tokens:</t>
        <ul spacing="normal">
          <li>
            <t>the <tt>exp</tt> claim specifies an absolute timestamp, marking the point in time when the Status List expires and <bcp14>MUST NOT</bcp14> be relied upon any longer</t>
          </li>
          <li>
            <t>the <tt>ttl</tt> claim represents a duration to be interpreted relative to the time the Status List is fetched, indicating when a new version of the Status List may be available</t>
          </li>
        </ul>
        <t>Both <tt>ttl</tt> and <tt>exp</tt> are <bcp14>RECOMMENDED</bcp14> to be used by the Status Issuer.</t>
        <t>When fetching a Status List Token, Relying Parties must carefully evaluate how long a Status List is cached for. Collectively the <tt>iat</tt>, <tt>exp</tt> and <tt>ttl</tt> claims when present in a Status List Token communicate how long a Status List should be cached and should be considered valid for. Relying Parties have different options for caching the Status List:</t>
        <ul spacing="normal">
          <li>
            <t>After time of fetching, the Relying Party caches the Status List for time duration of <tt>ttl</tt> before making checks for updates. This method is <bcp14>RECOMMENDED</bcp14> to distribute the load for the Status Provider.</t>
          </li>
          <li>
            <t>After initial fetching, the Relying Party checks for updates at time of <tt>iat</tt> + <tt>ttl</tt>. This method ensures the most up-to-date information for critical use cases. The Relying Party should account a minimal offset due to the signing and distribution process of the Status Issuer.</t>
          </li>
          <li>
            <t>If no <tt>ttl</tt> is given, then Relying Party <bcp14>SHOULD</bcp14> check for updates latest after the time of <tt>exp</tt>.</t>
          </li>
        </ul>
        <t>Ultimately, it's the Relying Parties decision how often to check for updates, ecosystems may define their own guidelines and policies for updating the Status List information. Clients should ensure that <tt>exp</tt> and <tt>ttl</tt> are within reasonable bounds before creating requests to get a fresh Status List Token (see <xref target="security-ttl"/> for more details).</t>
        <t>The following diagram illustrates the relationship between these claims and how they are designed to influence caching:</t>
        <artwork type="ascii-art"><![CDATA[
       Time of        Check for        Check for        Check for
       Fetching        updates          updates          updates

 iat     │                │                │                │    exp
         │                │                │                │
  │      │                │                │                │     │
  │      │                │                │                │     │
  │      │                │                │                │     │
  │      │                │                │                │     │
  │      │      ttl       │      ttl       │      ttl       │     │
  │      │ ─────────────► │ ─────────────► │ ─────────────► │ ──► │
  │      │                │                │                │     │
  │      │                │                │                │     │
  │                                                               │
──┼───────────────────────────────────────────────────────────────┼─►
  │                                                               │
]]></artwork>
      </section>
      <section anchor="relying-parties-avoiding-correlatable-information">
        <name>Relying Parties avoiding correlatable Information</name>
        <t>If the Relying Party does not require the Referenced Token or the Status List Token for further processing, it is <bcp14>RECOMMENDED</bcp14> to delete correlatable information, in particular:</t>
        <ul spacing="normal">
          <li>
            <t>the <tt>status</tt> claim in the Referenced Token (after the validation)</t>
          </li>
          <li>
            <t>the Status List Token itself (after expiration or update)</t>
          </li>
        </ul>
        <t>The Relying Party should instead only keep the needed fields from the Referenced Token.</t>
      </section>
      <section anchor="status-list-formats">
        <name>Status List Formats</name>
        <t>This specification defines 2 different token formats of the Status List:</t>
        <ul spacing="normal">
          <li>
            <t>JWT</t>
          </li>
          <li>
            <t>CWT</t>
          </li>
        </ul>
        <t>This specification states no requirements to not mix different formats like a CBOR based Referenced Token using a JWT for the Status List, but the expectation is that within an ecosystem, a choice for specific formats is made.
Within such an ecosystem, only support for those selected variants is required and implementations should know what to expect via a profile.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="json-web-token-claims-registration">
        <name>JSON Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "JSON Web Token Claims" registry <xref target="IANA.JWT"/> established by <xref target="RFC7519"/>.</t>
        <section anchor="registry-contents">
          <name>Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Description: A JSON object containing a reference to a status mechanism from the JWT Status Mechanisms Registry.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-claim"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Description: A JSON object containing up-to-date status information on multiple tokens using the Token Status List mechanism.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-jwt"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Description: Time to Live</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-jwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="iana-registry">
        <name>JWT Status Mechanisms Registry</name>
        <t>This specification establishes the IANA "JWT Status Mechanisms" registry for JWT "status" member values and adds it to the "JSON Web Token (JWT)" registry group at https://www.iana.org/assignments/jwt. The registry records the status mechanism member and a reference to the specification that defines it.</t>
        <t>JWT Status Mechanisms are registered by Specification Required <xref target="RFC8126"/> after a three-week
review period on the jwt-reg-review@ietf.org mailing list, on the advice of one or more Designated Experts.
However, to allow for the allocation of names prior to publication, the Designated Expert(s) may approve
registration once they are satisfied that such a specification will be published.</t>
        <t>Registration requests sent to the mailing list for review should use an appropriate subject (e.g., "Request to register JWT Status Mechanism: example").</t>
        <t>Within the review period, the Designated Expert(s) will either approve or deny the registration request, communicating this decision
to the review list and IANA. Denials should include an explanation and, if applicable, suggestions as to how to make the request
successful.</t>
        <t>IANA must only accept registry updates from the Designated Expert(s) and should direct all requests for registration to the review mailing list.</t>
        <section anchor="registration-template">
          <name>Registration Template</name>
          <t>Status Mechanism Value:</t>
          <ul empty="true">
            <li>
              <t>The name requested (e.g., "status_list"). The name is case sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts state that there is a compelling reason to allow an exception.</t>
            </li>
          </ul>
          <t>Status Mechanism Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the status mechanism.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For IETF Stream RFCs, list the IETF. For others, give the name of the responsible party. Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents. An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Mechanism Value: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Status Mechanism Description: A Token Status List containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="referenced-token-jose"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cbor-web-token-claims-registration">
        <name>CBOR Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "CBOR Web Token (CWT) Claims" registry <xref target="IANA.CWT"/> established by <xref target="RFC8392"/>.</t>
        <section anchor="registry-contents-1">
          <name>Registry Contents</name>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Description: A CBOR structure containing a reference to a status mechanism from the CWT Status Mechanisms Registry.</t>
            </li>
            <li>
              <t>JWT Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65535)</t>
            </li>
            <li>
              <t>Claim Value Type: map</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Reference: <xref target="status-claim"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Description: A CBOR structure containing up-to-date status information on multiple tokens using the Token Status List mechanism.</t>
            </li>
            <li>
              <t>JWT Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65533)</t>
            </li>
            <li>
              <t>Claim Value Type: map</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-cwt"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Description: Time to Live</t>
            </li>
            <li>
              <t>JWT Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65534)</t>
            </li>
            <li>
              <t>Claim Value Type: unsigned integer</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-cwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cwt-iana-registry">
        <name>CWT Status Mechanisms Registry</name>
        <t>This specification establishes the IANA "CWT Status Mechanisms" registry for CWT "status" member values and adds it to the "CBOR Web Token (CWT) Claims" registry group at https://www.iana.org/assignments/cwt. The registry records the status mechanism member and a reference to the specification that defines it.</t>
        <t>CWT Status Mechanisms are registered by Specification Required <xref target="RFC8126"/> after a three-week
review period on the cwt-reg-review@ietf.org mailing list, on the advice of one or more Designated Experts. However, to allow for the allocation of names prior to publication, the Designated Expert(s) may approve registration once they are satisfied that such a
specification will be published.</t>
        <t>Registration requests sent to the mailing list for review should use an appropriate subject (e.g., "Request to register CWT Status Mechanism: example").</t>
        <t>Within the review period, the Designated Expert(s) will either approve or deny the registration request, communicating this decision
to the review list and IANA. Denials should include an explanation and, if applicable, suggestions as to how to make the request
successful.</t>
        <t>IANA must only accept registry updates from the Designated Expert(s) and should direct all requests for registration to the review mailing list.</t>
        <section anchor="registration-template-1">
          <name>Registration Template</name>
          <t>Status Mechanism Value:</t>
          <ul empty="true">
            <li>
              <t>The name requested (e.g., "status_list"). The name is case sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts state that there is a compelling reason to allow an exception.</t>
            </li>
          </ul>
          <t>Status Mechanism Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the status mechanism.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For IETF Stream RFCs, list the IETF. For others, give the name of the responsible party. Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents. An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents-1">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Mechanism Value: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Status Mechanism Description: A Token Status List containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="referenced-token-cose"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="iana-status-types">
        <name>OAuth Status Types Registry</name>
        <t>This specification establishes the IANA "OAuth Status Types" registry for Status List values and adds it to the "OAuth Parameters" registry group at https://www.iana.org/assignments/oauth-parameters. The registry records a human readable label, the bit representation and a common description for it.</t>
        <t>Status Types are registered by Specification Required <xref target="RFC8126"/> after a two-week
review period on the oauth-ext-review@ietf.org mailing list, on the advice of one or more Designated Experts. However, to allow for the allocation of names prior to publication, the Designated Expert(s) may approve registration once they are satisfied that such a
specification will be published.</t>
        <t>Registration requests sent to the mailing list for review should use an appropriate subject (e.g., "Request to register Status Type name: example").</t>
        <t>Within the review period, the Designated Expert(s) will either approve or deny the registration request, communicating this decision
to the review list and IANA. Denials should include an explanation and, if applicable, suggestions as to how to make the request
successful.</t>
        <t>IANA must only accept registry updates from the Designated Expert(s) and should direct all requests for registration to the review mailing list.</t>
        <section anchor="registration-template-2">
          <name>Registration Template</name>
          <t>Status Type Name:</t>
          <ul empty="true">
            <li>
              <t>The name is a human-readable case insensitive label for the Status Type that helps to talk about the status of Referenced Token in common language.</t>
            </li>
          </ul>
          <t>Status Type Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the Status Type and optional examples.</t>
            </li>
          </ul>
          <t>Status Type value:</t>
          <ul empty="true">
            <li>
              <t>The bit representation of the Status Type in a byte hex representation. Valid Status Type values range from 0x00-0xFF. Values are filled up with zeros if they have less than 8 bits.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For IETF Stream RFCs, list the IETF. For others, give the name of the responsible party. Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents. An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents-2">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: VALID</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is valid, correct or legal.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x00</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: INVALID</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is revoked, annulled, taken back, recalled or cancelled.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x01</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: SUSPENDED</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is temporarily invalid, hanging or debarred from privilege. This state is usually temporary.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x02</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: APPLICATION_SPECIFIC</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is application specific.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x03</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: APPLICATION_SPECIFIC</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is application specific.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x0C-0xOF</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
        </section>
      </section>
      <section anchor="oauth-parameters-registration">
        <name>OAuth Parameters Registration</name>
        <t>This specification requests registration of the following values in the IANA "OAuth Authorization Server Metadata" registry <xref target="IANA.OAuth.Params"/> established by <xref target="RFC8414"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Metadata Name: status_list_aggregation_endpoint</t>
          </li>
          <li>
            <t>Metadata Description: URL of the Authorization Server aggregating OAuth Token Status List URLs for token status management.</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Reference: <xref target="aggregation"/> of this specification</t>
          </li>
        </ul>
      </section>
      <section anchor="media-type-registration">
        <name>Media Type Registration</name>
        <t>This section requests registration of the following media types <xref target="RFC2046"/> in
the "Media Types" registry <xref target="IANA.MediaTypes"/> in the manner described
in <xref target="RFC6838"/>.</t>
        <t>To indicate that the content is an JWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: See <xref target="status-list-token-jwt"/> of this specification</t>
          </li>
          <li>
            <t>Security considerations: See <xref target="Security"/> of this specification</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information: n/a</t>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an CWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: See <xref target="status-list-token-cwt"/> of this specification</t>
          </li>
          <li>
            <t>Security considerations: See <xref target="Security"/> of this specification</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information: n/a</t>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
      </section>
      <section anchor="coap-content-type">
        <name>CoAP Content-Format Registrations</name>
        <t>IANA is requested to register the following Content-Format numbers in
the "CoAP Content-Formats" sub-registry, within the "Constrained
RESTful Environments (CoRE) Parameters" Registry <xref target="IANA.Core.Params"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Content Type: application/statuslist+cwt</t>
          </li>
          <li>
            <t>Content Coding: -</t>
          </li>
          <li>
            <t>ID: TBD</t>
          </li>
          <li>
            <t>Reference: this specification</t>
          </li>
        </ul>
      </section>
      <section anchor="x509-certificate-extended-key-purpose-oid-registration">
        <name>X.509 Certificate Extended Key Purpose OID Registration</name>
        <t>IANA is requested to register the following OID "1.3.6.1.5.5.7.3.TBD" with a description of "id-kp-oauthStatusSigning" in the "SMI Security for PKIX Extended Key Purpose" registry (1.3.6.1.5.5.7.3). This OID is defined in section <xref target="eku"/>.</t>
        <t>IANA is requested to register the following OID "1.3.6.1.5.5.7.0.TBD" with a description of "id-mod-oauth-status-signing-eku" in the "SMI Security for PKIX Module Identifier" registry (1.3.6.1.5.5.7.0). This OID is defined in section <xref target="asn1-module"/>.</t>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank
Andrii Deinega,
Brian Campbell,
Dan Moore,
Denis Pinkas,
Filip Skokan,
Francesco Marino,
Giuseppe De Marco,
Hannes Tschofenig,
Kristina Yasuda,
Markus Kreusch,
Martijn Haring,
Michael B. Jones,
Micha Kraus,
Michael Schwartz,
Mike Prorock,
Mirko Mollik,
Oliver Terbu,
Orie Steele,
Rifaat Shekh-Yusef,
Rohan Mahy,
Takahiko Kawasaki,
Timo Glastra
and
Torsten Lodderstedt</t>
      <t>for their valuable contributions, discussions and feedback to this specification.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1950">
          <front>
            <title>ZLIB Compressed Data Format Specification version 3.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <author fullname="J-L. Gailly" surname="J-L. Gailly"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1950"/>
          <seriesInfo name="DOI" value="10.17487/RFC1950"/>
        </reference>
        <reference anchor="RFC1951">
          <front>
            <title>DEFLATE Compressed Data Format Specification version 1.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1951"/>
          <seriesInfo name="DOI" value="10.17487/RFC1951"/>
        </reference>
        <reference anchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC9596">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) "typ" (type) Header Parameter</title>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <author fullname="O. Steele" initials="O." surname="Steele"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This specification adds the equivalent of the JSON Object Signing and Encryption (JOSE) "typ" (type) header parameter to CBOR Object Signing and Encryption (COSE). This enables the benefits of explicit typing (as defined in RFC 8725, "JSON Web Token Best Current Practices") to be brought to COSE objects. The syntax of the COSE type header parameter value is the same as the existing COSE content type header parameter.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9596"/>
          <seriesInfo name="DOI" value="10.17487/RFC9596"/>
        </reference>
        <reference anchor="CORS" target="https://fetch.spec.whatwg.org/commit-snapshots/4775fcb48042c8411df497c0b7cf167b4240004f/#http-cors-protocol">
          <front>
            <title>Fetch Living Standard</title>
            <author>
              <organization>WHATWG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="X.680">
          <front>
            <title>Information Technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
        </reference>
        <reference anchor="X.690">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7662">
          <front>
            <title>OAuth 2.0 Token Introspection</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This specification defines a method for a protected resource to query an OAuth 2.0 authorization server to determine the active state of an OAuth 2.0 token and to determine meta-information about this token. OAuth 2.0 deployments can use this method to convey information about the authorization context of the token from the authorization server to the protected resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7662"/>
          <seriesInfo name="DOI" value="10.17487/RFC7662"/>
        </reference>
        <reference anchor="RFC7800">
          <front>
            <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7800"/>
          <seriesInfo name="DOI" value="10.17487/RFC7800"/>
        </reference>
        <reference anchor="RFC8414">
          <front>
            <title>OAuth 2.0 Authorization Server Metadata</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <date month="June" year="2018"/>
            <abstract>
              <t>This specification defines a metadata format that an OAuth 2.0 client can use to obtain the information needed to interact with an OAuth 2.0 authorization server, including its endpoint locations and authorization server capabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8414"/>
          <seriesInfo name="DOI" value="10.17487/RFC8414"/>
        </reference>
        <reference anchor="RFC9458">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9458"/>
          <seriesInfo name="DOI" value="10.17487/RFC9458"/>
        </reference>
        <reference anchor="SD-JWT.VC">
          <front>
            <title>SD-JWT-based Verifiable Credentials (SD-JWT VC)</title>
            <author fullname="Oliver Terbu" initials="O." surname="Terbu">
              <organization>MATTR</organization>
            </author>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete Inc.</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="6" month="November" year="2025"/>
            <abstract>
              <t>   This specification describes data formats as well as validation and
   processing rules to express Verifiable Credentials with JSON payloads
   with and without selective disclosure based on the SD-JWT
   [I-D.ietf-oauth-selective-disclosure-jwt] format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-sd-jwt-vc-13"/>
        </reference>
        <reference anchor="IANA.MediaTypes" target="https://www.iana.org/assignments/media-types/media-types.xhtml">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JWT" target="https://www.iana.org/assignments/jwt/jwt.xhtml">
          <front>
            <title>JSON Web Token Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.CWT" target="https://www.iana.org/assignments/cwt/cwt.xhtml">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.OAuth.Params" target="https://www.iana.org/assignments/oauth-parameters/oauth-parameters.xhtml#authorization-server-metadata">
          <front>
            <title>OAuth Authorization Server Metadata</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.Core.Params" target="https://www.iana.org/assignments/core-parameters/core-parameters.xhtml">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ISO.mdoc">
          <front>
            <title>ISO/IEC 18013-5:2021 ISO-compliant driving licence</title>
            <author>
              <organization>ISO/IEC JTC 1/SC 17</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="smith2020let" target="https://www.ndss-symposium.org/ndss-paper/lets-revoke-scalable-global-certificate-revocation/">
          <front>
            <title>Let's revoke: Scalable global certificate revocation</title>
            <author initials="T." surname="Smith" fullname="Trevor Smith">
              <organization>Brigham Young University</organization>
            </author>
            <author initials="L." surname="Dickinson" fullname="Luke Dickinson">
              <organization>Brigham Young University</organization>
            </author>
            <author initials="K." surname="Seamons" fullname="Kent Seamons">
              <organization>Brigham Young University</organization>
            </author>
            <date>n.d.</date>
          </front>
          <seriesInfo name="Network and Distributed Systems Security (NDSS) Symposium 2020" value=""/>
        </reference>
        <reference anchor="W3C.SL" target="https://www.w3.org/TR/vc-bitstring-status-list/">
          <front>
            <title>W3C Bitstring Status List v1.0</title>
            <author initials="D." surname="Longley" fullname="Dave Longley">
              <organization>Digital Bazaar</organization>
            </author>
            <author initials="M." surname="Sporny" fullname="Manu Sporny">
              <organization>Digital Bazaar</organization>
            </author>
            <author initials="O." surname="Steele" fullname="Orie Steele">
              <organization>Transmute</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9562">
          <front>
            <title>Universally Unique IDentifiers (UUIDs)</title>
            <author fullname="K. Davis" initials="K." surname="Davis"/>
            <author fullname="B. Peabody" initials="B." surname="Peabody"/>
            <author fullname="P. Leach" initials="P." surname="Leach"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This specification defines UUIDs (Universally Unique IDentifiers) --
also known as GUIDs (Globally Unique IDentifiers) -- and a Uniform
Resource Name namespace for UUIDs. A UUID is 128 bits long and is
intended to guarantee uniqueness across space and time. UUIDs were
originally used in the Apollo Network Computing System (NCS), later
in the Open Software Foundation's (OSF's) Distributed Computing
Environment (DCE), and then in Microsoft Windows platforms.</t>
              <t>This specification is derived from the OSF DCE specification with the
kind permission of the OSF (now known as "The Open Group"). Information from earlier versions of the OSF DCE specification have
been incorporated into this document. This document obsoletes RFC
4122.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9562"/>
          <seriesInfo name="DOI" value="10.17487/RFC9562"/>
        </reference>
      </references>
    </references>
    <?line 1648?>

<section anchor="asn1-module">
      <name>ASN.1 Module</name>
      <t>The following module adheres to ASN.1 specifications <xref target="X.680"/> and <xref target="X.690"/>. It defines the OID used for OAuth Status Mechanism Key Extended Key Usage.</t>
      <sourcecode markers="true"><![CDATA[

  OauthStatusSigning-EKU
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-oauth-status-signing-eku (TBD) }

  DEFINITIONS IMPLICIT TAGS ::=
  BEGIN

  -- OID Arc

  id-kp OBJECT IDENTIFIER ::=
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) kp(3) }

  -- OAuth Extended Key Usage

  id-kp-oauthStatusSigning OBJECT IDENTIFIER ::= { id-kp TBD }

  END

]]></sourcecode>
    </section>
    <section anchor="size-comparison">
      <name>Size Comparison</name>
      <t>The following tables show a size comparison for a Status List (compressed byte array as defined in <xref target="status-list-byte-array"/>) and a compressed Byte Array of UUIDs <xref target="RFC9562"/> (as an approximation to the list of IDs of Referenced Tokens in a Certificate Revocation List). Readers must be aware that these are not sizes for complete Status List Tokens in JSON/CBOR nor Certificate Revocation Lists (CRLs), as they don't contain metadata, certificates, and signatures.</t>
      <t>If no further metadata is provided in Status List Tokens or CRLs, then the size of Status Lists or arrays of Certificate ids (represented as UUIDs) will be the main factors deciding on the overall size of a Status List Token or CRL, respectively.</t>
      <section numbered="false" anchor="size-of-status-lists-for-varying-amount-of-entries-and-revocation-rates">
        <name>Size of Status Lists for varying amount of entries and revocation rates</name>
        <table>
          <name>Status List Size examples for varying amount of entries and revocation rates</name>
          <thead>
            <tr>
              <th align="left">Size</th>
              <th align="left">0.01%</th>
              <th align="left">0.1%</th>
              <th align="left">1%</th>
              <th align="left">2%</th>
              <th align="left">5%</th>
              <th align="left">10%</th>
              <th align="left">25%</th>
              <th align="left">50%</th>
              <th align="left">75%</th>
              <th align="left">100%</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">100k</td>
              <td align="left">81 B</td>
              <td align="left">252 B</td>
              <td align="left">1.4 KB</td>
              <td align="left">2.3 KB</td>
              <td align="left">4.5 KB</td>
              <td align="left">6.9 KB</td>
              <td align="left">10.2 KB</td>
              <td align="left">12.2 KB</td>
              <td align="left">10.2 KB</td>
              <td align="left">35 B</td>
            </tr>
            <tr>
              <td align="left">1M</td>
              <td align="left">442 B</td>
              <td align="left">2.2 KB</td>
              <td align="left">13.7 KB</td>
              <td align="left">23.0 KB</td>
              <td align="left">43.9 KB</td>
              <td align="left">67.6 KB</td>
              <td align="left">102.2 KB</td>
              <td align="left">122.1 KB</td>
              <td align="left">102.4 KB</td>
              <td align="left">144 B</td>
            </tr>
            <tr>
              <td align="left">10M</td>
              <td align="left">3.8 KB</td>
              <td align="left">21.1 KB</td>
              <td align="left">135.4 KB</td>
              <td align="left">230.0 KB</td>
              <td align="left">437.0 KB</td>
              <td align="left">672.9 KB</td>
              <td align="left">1023.4 KB</td>
              <td align="left">1.2 MB</td>
              <td align="left">1023.5 KB</td>
              <td align="left">1.2 KB</td>
            </tr>
            <tr>
              <td align="left">100M</td>
              <td align="left">38.3 KB</td>
              <td align="left">213.0 KB</td>
              <td align="left">1.3 MB</td>
              <td align="left">2.2 MB</td>
              <td align="left">4.3 MB</td>
              <td align="left">6.6 MB</td>
              <td align="left">10.0 MB</td>
              <td align="left">11.9 MB</td>
              <td align="left">10.0 MB</td>
              <td align="left">11.9 KB</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section numbered="false" anchor="size-of-compressed-array-of-uuidv4-128-bit-uuids-for-varying-amount-of-entries-and-revocation-rates">
        <name>Size of compressed array of UUIDv4 (128-bit UUIDs) for varying amount of entries and revocation rates</name>
        <t>This is a simple approximation of a CRL using an array of UUIDs without any additional metadata (128-bit UUID per revoked entry).</t>
        <table>
          <name>Size examples for 128-bit UUIDs for varying amount of entries and revocation rates</name>
          <thead>
            <tr>
              <th align="left">Size</th>
              <th align="left">0.01%</th>
              <th align="left">0.1%</th>
              <th align="left">1%</th>
              <th align="left">2%</th>
              <th align="left">5%</th>
              <th align="left">10%</th>
              <th align="left">25%</th>
              <th align="left">50%</th>
              <th align="left">75%</th>
              <th align="left">100%</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">100k</td>
              <td align="left">219 B</td>
              <td align="left">1.6 KB</td>
              <td align="left">15.4 KB</td>
              <td align="left">29.7 KB</td>
              <td align="left">78.1 KB</td>
              <td align="left">154.9 KB</td>
              <td align="left">392.9 KB</td>
              <td align="left">783.1 KB</td>
              <td align="left">1.1 MB</td>
              <td align="left">1.5 MB</td>
            </tr>
            <tr>
              <td align="left">1M</td>
              <td align="left">1.6 KB</td>
              <td align="left">16.4 KB</td>
              <td align="left">157.7 KB</td>
              <td align="left">310.4 KB</td>
              <td align="left">781 KB</td>
              <td align="left">1.5 MB</td>
              <td align="left">3.8 MB</td>
              <td align="left">7.6 MB</td>
              <td align="left">11.4 MB</td>
              <td align="left">15.3 MB</td>
            </tr>
            <tr>
              <td align="left">10M</td>
              <td align="left">15.3 KB</td>
              <td align="left">155.9 KB</td>
              <td align="left">1.5 MB</td>
              <td align="left">3.1 MB</td>
              <td align="left">7.6 MB</td>
              <td align="left">15.2 MB</td>
              <td align="left">38.2 MB</td>
              <td align="left">76.3 MB</td>
              <td align="left">114.4 MB</td>
              <td align="left">152.6 MB</td>
            </tr>
            <tr>
              <td align="left">100M</td>
              <td align="left">157.6 KB</td>
              <td align="left">1.5 MB</td>
              <td align="left">15.3 MB</td>
              <td align="left">30.5 MB</td>
              <td align="left">76.3 MB</td>
              <td align="left">152.6 MB</td>
              <td align="left">381.4 MB</td>
              <td align="left">762.9 MB</td>
              <td align="left">1.1 GB</td>
              <td align="left">1.5 GB</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="test-vectors">
      <name>Test vectors for Status List encoding</name>
      <t>All examples here are given in the form of JSON or CBOR payloads. The examples are encoded according to <xref target="status-list-json"/> for JSON and <xref target="status-list-cbor"/> for CBOR. The CBOR examples are displayed as hex values.</t>
      <t>All values that are not mentioned for the examples below can be assumed to be 0 (VALID). All examples are initialized with a size of 2^20 entries.</t>
      <section anchor="bit-status-list">
        <name>1-bit Status List</name>
        <t>The following example uses a 1-bit Status List (2 possible values):</t>
        <artwork><![CDATA[
status[0] = 0b1
status[1993] = 0b1
status[25460] = 0b1
status[159495] = 0b1
status[495669] = 0b1
status[554353] = 0b1
status[645645] = 0b1
status[723232] = 0b1
status[854545] = 0b1
status[934534] = 0b1
status[1000345] = 0b1
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 1,
  "lst": "eNrt3AENwCAMAEGogklACtKQPg9LugC9k_ACvreiogE
  AAKkeCQAAAAAAAAAAAAAAAAAAAIBylgQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAXG9IAAAAAAAAAPwsJAAAAAAAAAAAAAAAvhsSAAAAAAAAAAA
  A7KpLAAAAAAAAAAAAAAAAAAAAAJsLCQAAAAAAAAAAADjelAAAAAAAAAAAKjDMAQAAA
  ACAZC8L2AEb"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[
a2646269747301636c737458bd78daeddc010dc0200c0041a88249400ad2903e0f4b
ba00bd93f002beb7a2a2010000a91e09000000000000000000000000000000807296
04000000000000000000000000000000000000000000000000000000000000000000
000000000000005c6f4800000000000000fc2c240000000000000000000000be1b12
000000000000000000ecaa4b000000000000000000000000000000009b0b09000000
00000000000038de9400000000000000002a30cc010000000080642f0bd8011b
]]></artwork>
      </section>
      <section anchor="bit-status-list-1">
        <name>2-bit Status List</name>
        <t>The following example uses a 2-bit Status List (4 possible values):</t>
        <artwork><![CDATA[
status[0] = 0b01
status[1993] = 0b10
status[25460]= 0b01
status[159495] = 0b11
status[495669] = 0b01
status[554353] = 0b01
status[645645] = 0b10
status[723232] = 0b01
status[854545] = 0b01
status[934534] = 0b10
status[1000345] = 0b11
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 2,
  "lst": "eNrt2zENACEQAEEuoaBABP5VIO01fCjIHTMStt9ovGV
  IAAAAAABAbiEBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEB5WwIAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAID0ugQAAAAAAAAAAAAAAAAAQG12SgAAA
  AAAAAAAAAAAAAAAAAAAAAAAAOCSIQEAAAAAAAAAAAAAAAAAAAAAAAD8ExIAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwJEuAQAAAAAAAAAAAAAAAAAAAAAAAMB9S
  wIAAAAAAAAAAAAAAAAAAACoYUoAAAAAAAAAAAAAAEBqH81gAQw"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[
a2646269747302636c737459013d78daeddb310d00211000412ea1a04004fe5520ed
357c28c81d3312b6df68bc65480000000000406e2101000000000000000000000000
0000000000000000000000000000000000000040795b020000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000
0080f4ba0400000000000000000000000000406d764a000000000000000000000000
000000000000000000e0922101000000000000000000000000000000000000fc1312
00000000000000000000000000000000000000000000000000000000000000c0912e
01000000000000000000000000000000000000c07d4b020000000000000000000000
00000000a8614a0000000000000000000000406a1fcd60010c
]]></artwork>
      </section>
      <section anchor="bit-status-list-2">
        <name>4-bit Status List</name>
        <t>The following example uses a 4-bit Status List (16 possible values):</t>
        <artwork><![CDATA[
status[0] = 0b0001
status[1993] = 0b0010
status[35460] = 0b0011
status[459495] = 0b0100
status[595669] = 0b0101
status[754353] = 0b0110
status[845645] = 0b0111
status[923232] = 0b1000
status[924445] = 0b1001
status[934534] = 0b1010
status[1004534] = 0b1011
status[1000345] = 0b1100
status[1030203] = 0b1101
status[1030204] = 0b1110
status[1030205] = 0b1111
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 4,
  "lst": "eNrt0EENgDAQADAIHwImkIIEJEwCUpCEBBQRHOy35Li
  1EjoOQGabAgAAAAAAAAAAAAAAAAAAACC1SQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABADrsCAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAADoxaEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIIoCgAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACArpwKAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAGhqVkAzlwIAAAAAiGVRAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAABx3AoAgLpVAQAAAAAAAAAAAAAAwM89rwMAAAAAAAAAA
  AjsA9xMBMA"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[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]]></artwork>
      </section>
      <section anchor="bit-status-list-3">
        <name>8-bit Status List</name>
        <t>The following example uses a 8-bit Status List (256 possible values):</t>
        <artwork><![CDATA[
status[233478] = 0b00000000
status[52451] = 0b00000001
status[576778] = 0b00000010
status[513575] = 0b00000011
status[468106] = 0b00000100
status[292632] = 0b00000101
status[214947] = 0b00000110
status[182323] = 0b00000111
status[884834] = 0b00001000
status[66653] = 0b00001001
status[62489] = 0b00001010
status[196493] = 0b00001011
status[458517] = 0b00001100
status[487925] = 0b00001101
status[55649] = 0b00001110
status[416992] = 0b00001111
status[879796] = 0b00010000
status[462297] = 0b00010001
status[942059] = 0b00010010
status[583408] = 0b00010011
status[13628] = 0b00010100
status[334829] = 0b00010101
status[886286] = 0b00010110
status[713557] = 0b00010111
status[582738] = 0b00011000
status[326064] = 0b00011001
status[451545] = 0b00011010
status[705889] = 0b00011011
status[214350] = 0b00011100
status[194502] = 0b00011101
status[796765] = 0b00011110
status[202828] = 0b00011111
status[752834] = 0b00100000
status[721327] = 0b00100001
status[554740] = 0b00100010
status[91122] = 0b00100011
status[963483] = 0b00100100
status[261779] = 0b00100101
status[793844] = 0b00100110
status[165255] = 0b00100111
status[614839] = 0b00101000
status[758403] = 0b00101001
status[403258] = 0b00101010
status[145867] = 0b00101011
status[96100] = 0b00101100
status[477937] = 0b00101101
status[606890] = 0b00101110
status[167335] = 0b00101111
status[488197] = 0b00110000
status[211815] = 0b00110001
status[797182] = 0b00110010
status[582952] = 0b00110011
status[950870] = 0b00110100
status[765108] = 0b00110101
status[341110] = 0b00110110
status[776325] = 0b00110111
status[745056] = 0b00111000
status[439368] = 0b00111001
status[559893] = 0b00111010
status[149741] = 0b00111011
status[358903] = 0b00111100
status[513405] = 0b00111101
status[342679] = 0b00111110
status[969429] = 0b00111111
status[795775] = 0b01000000
status[566121] = 0b01000001
status[460566] = 0b01000010
status[680070] = 0b01000011
status[117310] = 0b01000100
status[480348] = 0b01000101
status[67319] = 0b01000110
status[661552] = 0b01000111
status[841303] = 0b01001000
status[561493] = 0b01001001
status[138807] = 0b01001010
status[442463] = 0b01001011
status[659927] = 0b01001100
status[445910] = 0b01001101
status[1046963] = 0b01001110
status[829700] = 0b01001111
status[962282] = 0b01010000
status[299623] = 0b01010001
status[555493] = 0b01010010
status[292826] = 0b01010011
status[517215] = 0b01010100
status[551009] = 0b01010101
status[898490] = 0b01010110
status[837603] = 0b01010111
status[759161] = 0b01011000
status[459948] = 0b01011001
status[290102] = 0b01011010
status[1034977] = 0b01011011
status[190650] = 0b01011100
status[98810] = 0b01011101
status[229950] = 0b01011110
status[320531] = 0b01011111
status[335506] = 0b01100000
status[885333] = 0b01100001
status[133227] = 0b01100010
status[806915] = 0b01100011
status[800313] = 0b01100100
status[981571] = 0b01100101
status[527253] = 0b01100110
status[24077] = 0b01100111
status[240232] = 0b01101000
status[559572] = 0b01101001
status[713399] = 0b01101010
status[233941] = 0b01101011
status[615514] = 0b01101100
status[911768] = 0b01101101
status[331680] = 0b01101110
status[951527] = 0b01101111
status[6805] = 0b01110000
status[552366] = 0b01110001
status[374660] = 0b01110010
status[223159] = 0b01110011
status[625884] = 0b01110100
status[417146] = 0b01110101
status[320527] = 0b01110110
status[784154] = 0b01110111
status[338792] = 0b01111000
status[1199] = 0b01111001
status[679804] = 0b01111010
status[1024680] = 0b01111011
status[40845] = 0b01111100
status[234603] = 0b01111101
status[761225] = 0b01111110
status[644903] = 0b01111111
status[502167] = 0b10000000
status[121477] = 0b10000001
status[505144] = 0b10000010
status[165165] = 0b10000011
status[179628] = 0b10000100
status[1019195] = 0b10000101
status[145149] = 0b10000110
status[263738] = 0b10000111
status[269256] = 0b10001000
status[996739] = 0b10001001
status[346296] = 0b10001010
status[555864] = 0b10001011
status[887384] = 0b10001100
status[444173] = 0b10001101
status[421844] = 0b10001110
status[653716] = 0b10001111
status[836747] = 0b10010000
status[783119] = 0b10010001
status[918762] = 0b10010010
status[946835] = 0b10010011
status[253764] = 0b10010100
status[519895] = 0b10010101
status[471224] = 0b10010110
status[134272] = 0b10010111
status[709016] = 0b10011000
status[44112] = 0b10011001
status[482585] = 0b10011010
status[461829] = 0b10011011
status[15080] = 0b10011100
status[148883] = 0b10011101
status[123467] = 0b10011110
status[480125] = 0b10011111
status[141348] = 0b10100000
status[65877] = 0b10100001
status[692958] = 0b10100010
status[148598] = 0b10100011
status[499131] = 0b10100100
status[584009] = 0b10100101
status[1017987] = 0b10100110
status[449287] = 0b10100111
status[277478] = 0b10101000
status[991262] = 0b10101001
status[509602] = 0b10101010
status[991896] = 0b10101011
status[853666] = 0b10101100
status[399318] = 0b10101101
status[197815] = 0b10101110
status[203278] = 0b10101111
status[903979] = 0b10110000
status[743015] = 0b10110001
status[888308] = 0b10110010
status[862143] = 0b10110011
status[979421] = 0b10110100
status[113605] = 0b10110101
status[206397] = 0b10110110
status[127113] = 0b10110111
status[844358] = 0b10111000
status[711569] = 0b10111001
status[229153] = 0b10111010
status[521470] = 0b10111011
status[401793] = 0b10111100
status[398896] = 0b10111101
status[940810] = 0b10111110
status[293983] = 0b10111111
status[884749] = 0b11000000
status[384802] = 0b11000001
status[584151] = 0b11000010
status[970201] = 0b11000011
status[523882] = 0b11000100
status[158093] = 0b11000101
status[929312] = 0b11000110
status[205329] = 0b11000111
status[106091] = 0b11001000
status[30949] = 0b11001001
status[195586] = 0b11001010
status[495723] = 0b11001011
status[348779] = 0b11001100
status[852312] = 0b11001101
status[1018463] = 0b11001110
status[1009481] = 0b11001111
status[448260] = 0b11010000
status[841042] = 0b11010001
status[122967] = 0b11010010
status[345269] = 0b11010011
status[794764] = 0b11010100
status[4520] = 0b11010101
status[818773] = 0b11010110
status[556171] = 0b11010111
status[954221] = 0b11011000
status[598210] = 0b11011001
status[887110] = 0b11011010
status[1020623] = 0b11011011
status[324632] = 0b11011100
status[398244] = 0b11011101
status[622241] = 0b11011110
status[456551] = 0b11011111
status[122648] = 0b11100000
status[127837] = 0b11100001
status[657676] = 0b11100010
status[119884] = 0b11100011
status[105156] = 0b11100100
status[999897] = 0b11100101
status[330160] = 0b11100110
status[119285] = 0b11100111
status[168005] = 0b11101000
status[389703] = 0b11101001
status[143699] = 0b11101010
status[142524] = 0b11101011
status[493258] = 0b11101100
status[846778] = 0b11101101
status[251420] = 0b11101110
status[516351] = 0b11101111
status[83344] = 0b11110000
status[171931] = 0b11110001
status[879178] = 0b11110010
status[663475] = 0b11110011
status[546865] = 0b11110100
status[428362] = 0b11110101
status[658891] = 0b11110110
status[500560] = 0b11110111
status[557034] = 0b11111000
status[830023] = 0b11111001
status[274471] = 0b11111010
status[629139] = 0b11111011
status[958869] = 0b11111100
status[663071] = 0b11111101
status[152133] = 0b11111110
status[19535] = 0b11111111
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 8,
  "lst": "eNrt0WOQM2kYhtGsbdu2bdu2bdu2bdu2bdu2jVnU1my
  -SWYm6U5enFPVf7ue97orFYAo7CQBAACQuuckAABStqUEAAAAAAAAtN6wEgAE71QJA
  AAAAIrwhwQAAAAAAdtAAgAAAAAAACLwkAQAAAAAAAAAAACUaFcJAACAeJwkAQAAAAA
  AAABQvL4kAAAAWmJwCQAAAAAAAAjAwBIAAAB06ywJoDKQBARpfgkAAAAAAAAAAAAAA
  AAAAACo50sJAAAAAAAAAOiRcSQAAAAAgAJNKgEAAG23mgQAAAAAAECw3pUAQvegBAA
  AAAAAAADduE4CAAAAyjSvBAAQiw8koHjvSABAb-wlARCONyVoxtMSZOd0CQAAAOjWD
  RKQmLckAAAAAACysLYEQGcnSAAAAAAQooUlAABI15kSAIH5RAIgLB9LABC4_SUgGZN
  IAABAmM6RoLbTJIASzCIBAEAhfpcAAAAAAABquk8CAAAAAAAAaJl9SvvzBOICAFWmk
  IBgfSgBAAAANOgrCQAAAAAAAADStK8EAAC03gASAAAAAAAAAADFWFUCAAAAMjOaBEA
  DHpYAQjCIBADduFwCAAAAAGitMSSI3BUSAECOHpAA6IHrJQAAAAAAsjeVBAAAKRpVA
  orWvwQAAAAAAAAAkKRtJAAAAAAAgCbcLAF0bXUJAAAAoF02kYDg7CYBAAAAAEB6NpQ
  AAAAAAAAAAAAAAEr1uQQAAF06VgIAAAAAAAAAqDaeBAAQqgMkAAAAAABogQMlAAAAA
  AAa87MEAAAQiwslAAAAAAAAAAAAAAAAMrOyBAAAiekv-hcsY0Sgne6QAAAAAAAgaUt
  JAAAAAAAAAAAAAAAAAAAAAAAAAADwt-07vjVkAAAAgDy8KgFAUEaSAAAAAJL3vgQAW
  dhcAgAAoBHDSUDo1pQAAACI2o4SAABZm14CALoyuwQAAPznGQkgZwdLAAAQukclAAA
  AAAAAAAAAgKbMKgEAAAAAAAAAAAAAAAAAAECftpYAAAAAAAAAAAAACnaXBAAAAADk7
  iMJAAAAAAAAAABqe00CAnGbBBG4TAIAgFDdKgFAXCaWAAAAAAAAAAAAAAAAAKAJQwR
  72XbGAQAAAKAhh0sAAAAAAABQgO8kAAAAAAAAAAAAACAaM0kAAAC5W0QCAIJ3mAQAx
  GwxCQAA6nhSAsjZBRIAANEbWQIAAAAAaJE3JACAwA0qAUBIVpKAlphbAiAPp0iQnKE
  kAAAAAAAgBP1KAAAAdOl4CQAAAAAAAPjLZBIAAG10RtrPm8_CAEBMTpYAAAAAAIjQY
  BL8z5QSAAAAAEDYPpUAACAsj0gAAADQkHMlAAjHDxIA0Lg9JQAAgHDsLQEAAABAQS6
  WAAAAgLjNFs2l_RgLAIAEfCEBlGZZCQAAaIHjJACgtlskAAAozb0SAAAAVFtfAgAAA
  AAAAAAAAAAAAAAAAAAAAKDDtxIAAAAAVZaTAKB5W0kAANCAsSUgJ0tL0GqHSNBbL0g
  AZflRAgCARG0kQXNmlgCABiwkAQAAAEB25pIAAAAAAAAAAAAAoFh9SwAAAAAAADWNm
  OSrpjFsEoaRgDKcF9Q1dxsEAAAAAAAAAAAAAAAAgPZ6SQIAAAAAAAAAgChMLgEAAAA
  AAAAAqZlQAsK2qQQAAAAAAAD06XUJAAAAqG9bCQAAgLD9IgEAAAAAAAAAAAAAAAAAA
  EBNe0gAAAAAAAAAAEBPHSEBAAAAlOZtCYA4fS8B0GFRCQAo0gISAOTgNwmC840EAAA
  AAAAAAAAAAAAAAAAAUJydJfjXPBIAAAAAAAAAAAAAAABk6WwJAAAAAAAAAAAAAAAAq
  G8UCQAAgPpOlAAAIA83SQAANWwc9HUjGAgAAAAAAACAusaSAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAqHKVBACQjxklAAAAAAAAAKBHxpQAAAAAACBME0lAdlaUAACyt7sEAAAA0
  Nl0EgAAAAAAAAAAAABA-8wgAQAAAAAAAKU4SgKgUtlBAgAAAAAAAAAAgMCMLwEE51k
  JICdzSgCJGl2CsE0tAQAA0L11JQAAAAAAAAjUOhIAAAAAAAAAAAAAAGTqeQkAAAAAA
  AAAAAAAKM8SEjTrJwkAAAAAAACocqQEULgVJAAAACjDUxJUKgtKAAAAqbpRAgCA0n0
  mAQAAAABAGzwmAUCTLpUAAAAAAAAAAEjZNRIAAAAAAAAAAAAAAAAAAAAA8I-vJaAlh
  pQAAAAAAHrvzjJ-OqCuuVlLAojP8BJAr70sQZVDJYAgXS0BAAAAAAAAAAAAtMnyEgA
  AAAAAFONKCQAAAAAAAADorc0kAAAAAAAAgDqOlgAAAAAAAAAAAADIwv0SAAAAAAAAA
  AAAAADBuV0CIFVDSwAAAABAAI6RAAAAAGIwrQSEZAsJAABouRclAAAAAKDDrxIAAAA
  0bkkJgFiMKwEAAAAAAHQyhwRk7h4JAAAAAAAAAAAgatdKAACUYj0JAAAAAAAAAAAAQ
  nORBLTFJRIAAAAAkIaDJAAAAJryngQAAAAAAAAAAAA98oQEAAAAAAAAAEC2zpcgWY9
  LQKL2kwAgGK9IAAAAAPHaRQIAAAAAAAAAAADIxyoSAAAAAAAAAAAAAADQFotLAECz_
  gQ1PX-B"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[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]]></artwork>
      </section>
    </section>
    <section numbered="false" anchor="document-history">
      <name>Document History</name>
      <t>[[ To be removed from the final specification ]]</t>
      <t>-15</t>
      <ul spacing="normal">
        <li>
          <t>limit Status List Token CWT COSE message to Sign1/Mac0</t>
        </li>
        <li>
          <t>be explicit about tagging and re-add cose_sign1 tag to example</t>
        </li>
        <li>
          <t>add description field to EKU iana registration request</t>
        </li>
        <li>
          <t>fix typos in referenced token</t>
        </li>
        <li>
          <t>fix typos</t>
        </li>
        <li>
          <t>make IANA references informative</t>
        </li>
        <li>
          <t>remove unused iana.jose reference</t>
        </li>
      </ul>
      <t>-14</t>
      <ul spacing="normal">
        <li>
          <t>use binary value encoding for all test vectors (display purposes only)</t>
        </li>
        <li>
          <t>removed bytes from graphic that were intepreted as padding bytes</t>
        </li>
        <li>
          <t>removed 0x0B from application-specific Status Type</t>
        </li>
        <li>
          <t>reemphasized that expired tokens with status "VALID" are still expired</t>
        </li>
        <li>
          <t>renamed section "Status List Aggregation in JSON Format" to "Status List Aggregation Data Structure"</t>
        </li>
        <li>
          <t>slightly restructure/clarify referenced token cose section</t>
        </li>
        <li>
          <t>Add ASN.1 module</t>
        </li>
        <li>
          <t>many nits and improvements from genart review</t>
        </li>
        <li>
          <t>remove cose_sign1 tag from statuslist in cwt form examples</t>
        </li>
        <li>
          <t>slightly restructure/clarify referenced token cose section</t>
        </li>
        <li>
          <t>Add ASN.1 module</t>
        </li>
        <li>
          <t>removed DL suspension example</t>
        </li>
      </ul>
      <t>-13</t>
      <ul spacing="normal">
        <li>
          <t>add definition of client to terminology</t>
        </li>
        <li>
          <t>Make exp and ttl recommended in claim description (fixes inconsistency, was recommended in other text)</t>
        </li>
        <li>
          <t>Add short security consideraiton on redirects and ttl</t>
        </li>
        <li>
          <t>fix CORS spec to specific version</t>
        </li>
        <li>
          <t>explain KYC</t>
        </li>
        <li>
          <t>link implementation guidance to exp and ttl in Status List Token definition</t>
        </li>
        <li>
          <t>reference RFC7515 instead of IANA:JOSE</t>
        </li>
        <li>
          <t>add a note that cwt is encoded in raw/binary.</t>
        </li>
        <li>
          <t>added further privacy consideration around issuer tracking using unique URIs</t>
        </li>
      </ul>
      <t>-12</t>
      <ul spacing="normal">
        <li>
          <t>Allow for extended key usage OID to be used for other status mechanisms</t>
        </li>
        <li>
          <t>add Paul's affiliation</t>
        </li>
        <li>
          <t>add feedback from Dan Moore</t>
        </li>
        <li>
          <t>change JSON Status List structure to only contain JSON object</t>
        </li>
        <li>
          <t>further nitpicks</t>
        </li>
        <li>
          <t>clarifying status and status_list IANA descriptions for JWT/CWT</t>
        </li>
        <li>
          <t>clarifying description texts for status and status_list in CBOR</t>
        </li>
        <li>
          <t>splitting Linkability Mitigation from Token Lifecycle section in Implementation Consideration</t>
        </li>
        <li>
          <t>relax the accept header from must to should</t>
        </li>
      </ul>
      <t>-11</t>
      <ul spacing="normal">
        <li>
          <t>incorporate feedback from shepherd review</t>
        </li>
        <li>
          <t>some nitpicks</t>
        </li>
        <li>
          <t>even more nitpicks</t>
        </li>
      </ul>
      <t>-10</t>
      <ul spacing="normal">
        <li>
          <t>improve caching guidelines and move them to implementaiton considerations</t>
        </li>
        <li>
          <t>Add CoAP Content-Format ID and IANA registration</t>
        </li>
        <li>
          <t>Add size comparison for status list and compressed uuids</t>
        </li>
        <li>
          <t>Change Controller IESG for OAuths Parameters Registration</t>
        </li>
      </ul>
      <t>-09</t>
      <ul spacing="normal">
        <li>
          <t>update acknowledgments</t>
        </li>
        <li>
          <t>introduce dedicated section for compressed byte array of the Status List</t>
        </li>
        <li>
          <t>fix Status List definitions</t>
        </li>
        <li>
          <t>Add CDDL for CBOR StatusList encoding</t>
        </li>
        <li>
          <t>add diagram for Status List Aggregation for further explanation</t>
        </li>
        <li>
          <t>rename "chunking" of Status List Tokens (for scalability reasons) into "divide .. up"</t>
        </li>
      </ul>
      <t>-08</t>
      <ul spacing="normal">
        <li>
          <t>Fix cwt typ value to full media type</t>
        </li>
        <li>
          <t>Holders may also fetch and verify Status List Tokens</t>
        </li>
        <li>
          <t>Update terminology for referenced token and Status List Token</t>
        </li>
      </ul>
      <t>-07</t>
      <ul spacing="normal">
        <li>
          <t>add considerations about External Status Issuer or Status Provider</t>
        </li>
        <li>
          <t>add recommendations for Key Resolution and Trust Management</t>
        </li>
        <li>
          <t>add extended key usage extensions for x509</t>
        </li>
        <li>
          <t>Relying Parties avoiding correlatable Information</t>
        </li>
        <li>
          <t>editorial changes on terminology and Referenced Tokens</t>
        </li>
        <li>
          <t>clarify privacy consideration around one time use referenced tokens</t>
        </li>
        <li>
          <t>explain the Status List Token size dependencies</t>
        </li>
        <li>
          <t>explain possibility to chunk Status List Tokens depending on Referenced Token's expiry date</t>
        </li>
        <li>
          <t>add short-lived tokens in the Rationale</t>
        </li>
        <li>
          <t>rename Status Mechanism Methods registry to Status Mechanisms registry</t>
        </li>
        <li>
          <t>changes as requested by IANA review</t>
        </li>
        <li>
          <t>emphasize that security and privacy considerations only apply to Status List and no other status mechanisms</t>
        </li>
        <li>
          <t>differentiate unlinkability between Issuer-RP and RP-RP</t>
        </li>
        <li>
          <t>add more test vectors for the status list encoding</t>
        </li>
        <li>
          <t>add prior art</t>
        </li>
        <li>
          <t>updated language around application specific status type values and assigned ranges for application specific usage</t>
        </li>
        <li>
          <t>add short security considerations section for mac based deployments</t>
        </li>
        <li>
          <t>privacy considerations for other status types like suspended</t>
        </li>
        <li>
          <t>fix aggregation_uri text in referenced token</t>
        </li>
        <li>
          <t>mention key resolution in validation rules</t>
        </li>
      </ul>
      <t>-06</t>
      <ul spacing="normal">
        <li>
          <t>iana registration text updated with update procedures</t>
        </li>
        <li>
          <t>explicitly mention that status list is expected to be contained in cryptographically secured containers</t>
        </li>
        <li>
          <t>reworked and simplified introduction and abstract</t>
        </li>
        <li>
          <t>specify http status codes and allow redirects</t>
        </li>
        <li>
          <t>add status_list_aggregation_endpoint OAuth metadata</t>
        </li>
        <li>
          <t>remove unsigned options (json/cbor) of status list</t>
        </li>
        <li>
          <t>add section about mixing status list formats and media type</t>
        </li>
        <li>
          <t>fixes from IETF review</t>
        </li>
        <li>
          <t>update guidance around ttl</t>
        </li>
        <li>
          <t>add guidance around aggregation endpoint</t>
        </li>
      </ul>
      <t>-05</t>
      <ul spacing="normal">
        <li>
          <t>add optional support for historical requests</t>
        </li>
        <li>
          <t>update CBOR claim definitions</t>
        </li>
        <li>
          <t>improve section on Status Types and introduce IANA registry for it</t>
        </li>
        <li>
          <t>add Status Issuer and Status Provider role description to the introduction/terminology</t>
        </li>
        <li>
          <t>add information on third party hosting to security consideration</t>
        </li>
        <li>
          <t>remove constraint that Status List Token must not use a MAC</t>
        </li>
      </ul>
      <t>-04</t>
      <ul spacing="normal">
        <li>
          <t>add mDL example as Referenced Token and consolidate CWT and CBOR sections</t>
        </li>
        <li>
          <t>add implementation consideration for Default Values, Double Allocation and Status List Size</t>
        </li>
        <li>
          <t>add privacy consideration on using private relay protocols</t>
        </li>
        <li>
          <t>add privacy consideration on observability of outsiders</t>
        </li>
        <li>
          <t>add security considerations on correct parsing and decoding</t>
        </li>
        <li>
          <t>remove requirement for matching iss claim in Referenced Token and Status List Token</t>
        </li>
        <li>
          <t>add sd-jwt-vc example</t>
        </li>
        <li>
          <t>fix CWT status_list map encoding</t>
        </li>
        <li>
          <t>editorial fixes</t>
        </li>
        <li>
          <t>add CORS considerations to the http endpoint</t>
        </li>
        <li>
          <t>fix reference of Status List in CBOR format</t>
        </li>
        <li>
          <t>added status_list CWT claim key assigned</t>
        </li>
        <li>
          <t>move base64url definition to terminology</t>
        </li>
      </ul>
      <t>-03</t>
      <ul spacing="normal">
        <li>
          <t>remove unused reference to RFC9111</t>
        </li>
        <li>
          <t>add validation rules for status list token</t>
        </li>
        <li>
          <t>introduce the status list aggregation mechanism</t>
        </li>
        <li>
          <t>relax requirements for status_list claims to contain other parameters</t>
        </li>
        <li>
          <t>change cwt referenced token example to hex and annotated hex</t>
        </li>
        <li>
          <t>require TLS only for fetching Status List, not for Status List Token</t>
        </li>
        <li>
          <t>remove the undefined phrase Status List endpoint</t>
        </li>
        <li>
          <t>remove http caching in favor of the new ttl claim</t>
        </li>
        <li>
          <t>clarify the sub claim of Status List Token</t>
        </li>
        <li>
          <t>relax status_list iss requirements for CWT</t>
        </li>
        <li>
          <t>Fixes missing parts &amp; iana ttl registration in CWT examples</t>
        </li>
      </ul>
      <t>-02</t>
      <ul spacing="normal">
        <li>
          <t>add ttl claim to Status List Token to convey caching</t>
        </li>
        <li>
          <t>relax requirements on referenced token</t>
        </li>
        <li>
          <t>clarify Deflate / zlib compression</t>
        </li>
        <li>
          <t>make a reference to the Issuer-Holder-Verifier model of SD-JWT VC</t>
        </li>
        <li>
          <t>add COSE/CWT/CBOR encoding</t>
        </li>
      </ul>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Rename title of the draft</t>
        </li>
        <li>
          <t>add design consideration to the introduction</t>
        </li>
        <li>
          <t>Change status claim to in referenced token to allow re-use for other mechanisms</t>
        </li>
        <li>
          <t>Add IANA Registry for status mechanisms</t>
        </li>
        <li>
          <t>restructure the sections of this document</t>
        </li>
        <li>
          <t>add option to return an unsigned Status List</t>
        </li>
        <li>
          <t>Changing compression from gzip to zlib</t>
        </li>
        <li>
          <t>Change typo in Status List Token sub claim description</t>
        </li>
        <li>
          <t>Add access token as an example use-case</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft after working group adoption</t>
        </li>
        <li>
          <t>update acknowledgments</t>
        </li>
        <li>
          <t>renamed Verifier to Relying Party</t>
        </li>
        <li>
          <t>added IANA consideration</t>
        </li>
      </ul>
      <t>[ draft-ietf-oauth-status-list ]</t>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Applied editorial improvements suggested by Michael Jones.</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
