<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-oauth-status-list-20" category="std" consensus="true" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title>Token Status List (TSL)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-status-list-20"/>
    <author fullname="Tobias Looker">
      <organization>MATTR</organization>
      <address>
        <email>tobias.looker@mattr.global</email>
      </address>
    </author>
    <author fullname="Paul Bastian">
      <organization>Bundesdruckerei</organization>
      <address>
        <email>paul.bastian@posteo.de</email>
      </address>
    </author>
    <author fullname="Christian Bormann">
      <organization>SPRIND</organization>
      <address>
        <email>chris.bormann@gmx.de</email>
      </address>
    </author>
    <date year="2026" month="April" day="20"/>
    <area>Security</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <abstract>
      <?line 133?>

<t>This specification defines a status mechanism called Token Status List (TSL), data structures and processing rules for representing the status of tokens secured by JSON Object Signing and Encryption (JOSE) or CBOR Object Signing and Encryption (COSE), such as JWT, SD-JWT, CBOR Web Token, and ISO mdoc. It also defines an extension point and a registry for future status mechanisms.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://oauth-wg.github.io/draft-ietf-oauth-status-list/draft-ietf-oauth-status-list.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Web Authorization Protocol Working Group mailing list (<eref target="mailto:oauth@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/oauth/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/oauth/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/oauth-wg/draft-ietf-oauth-status-list"/>.</t>
    </note>
  </front>
  <middle>
    <?line 137?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Token formats secured by JOSE <xref target="RFC7515"/> or COSE <xref target="RFC9052"/>, such as JWTs <xref target="RFC7519"/>, SD-JWTs <xref target="RFC9901"/>, SD-JWT VCs <xref target="SD-JWT.VC"/>, CWTs <xref target="RFC8392"/>, SD-CWTs <xref target="SD-CWT"/> and ISO mdoc <xref target="ISO.mdoc"/>, have vast possible applications. Some of these applications can involve issuing a token whereby certain semantics about the token or its validity may change over time. Communicating these changes to relying parties in an interoperable manner, such as whether the token is considered invalidated or suspended by its issuer is important for many of these applications.</t>
      <t>This document defines a Status List data structure that describes the individual statuses of multiple Referenced Tokens. A Referenced Token may be of any format, but is most commonly a data structure secured by JOSE or COSE. The Referenced Token is referenced by the Status List, which describes the status of the Referenced Token. The statuses of all Referenced Tokens are conveyed via a bit array in the Status List. Each Referenced Token is allocated an index during issuance that represents its position within this bit array. The value of the bit(s) at this index corresponds to the Referenced Token's status. A Status List is provided within a Status List Token protected by cryptographic signature or MAC and this document defines its representations in JWT and CWT format.</t>
      <t>The following diagram depicts the relationship between the artifacts:</t>
      <artwork type="ascii-art"><![CDATA[
+----------------+  describes status  +------------------+
|  Status List   |------------------->| Referenced Token |
| (JSON or CBOR) |<-------------------| (JOSE, COSE, ..) |
+-------+--------+     references     +------------------+
        |
        |
        | embedded in
        v
+-------------------+
| Status List Token |
|   (JWT or CWT)    |
+-------------------+

]]></artwork>
      <t>An Issuer issues Referenced Tokens to a Holder, the Holder uses and presents those Referenced Tokens to a Relying Party. The Issuer gives updated status information to the Status Issuer, who issues a Status List Token. The Status Issuer can be either the Issuer or an entity that has been authorized by the Issuer to issue Status List Tokens. The Status Issuer provides the Status List Token to the Status Provider, who serves the Status List Token on an accessible endpoint. The Relying Party or the Holder may fetch the Status List Token to retrieve the status of the Referenced Token.</t>
      <t>The roles of the Issuer (of the Referenced Token), the Status Issuer and the Status Provider may be fulfilled by the same entity. If not further specified, the term Issuer may refer to an entity acting for all three roles. This document describes how an Issuer references a Status List Token and how a Relying Party fetches and validates Status Lists.</t>
      <t>The following diagram depicts the relationship between the involved roles (Relying Party is equivalent to Verifier of <xref target="RFC9901"/>):</t>
      <artwork type="ascii-art"><![CDATA[
           issue                 present
           Referenced            Referenced
+--------+ Token      +--------+ Token      +---------------+
| Issuer |----------->| Holder |----------->| Relying Party |
+---+----+            +---+----+            +-------+-------+
    |                     |                         |
    v provide status      |                         |
+---------------+         |                         |
| Status Issuer |         |                         |
+---+-----------+         |                         |
    |                     |                         |
    v provide Status List |                         |
+-----------------+       |                         |
| Status Provider |<------+-------------------------+
+-----------------+     fetch Status List Token

]]></artwork>
      <t>Status Lists can be used to express a variety of Status Types. This document defines basic Status Types for the most common use cases as well as an extensibility mechanism for custom Status Types.</t>
      <t>Furthermore, the document creates an extension point and an IANA registry that enables other specifications to describe additional status mechanisms.</t>
      <section anchor="example-use-cases">
        <name>Example Use Cases</name>
        <t>An example of the usage of a Status List is to manage the statuses of issued access tokens as defined in <xref section="1.4" sectionFormat="of" target="RFC6749"/>. Token Introspection <xref target="RFC7662"/> provides a method to determine the status of an issued access token, but it necessitates the party attempting to validate the state of access tokens to directly contact the Issuer of each token for validation. In contrast, the mechanism defined in this specification allows a party to retrieve the statuses for many tokens, reducing interactions with the Issuer substantially. This not only improves scalability but also enhances privacy by preventing the Issuer from gaining knowledge of access tokens being verified (herd anonymity).</t>
        <t>Another possible use case for the Status List is to express the status of verifiable credentials (Referenced Tokens) issued by an Issuer in the Issuer-Holder-Verifier model <xref target="RFC9901"/>.</t>
      </section>
      <section anchor="rationale">
        <name>Rationale</name>
        <t>Revocation mechanisms are an essential part of most identity ecosystems. In the past, revocation of X.509 TLS certificates has been proven difficult. Traditional certificate revocation lists (CRLs) have limited scalability; Online Certificate Status Protocol (OCSP) has additional privacy risks, since the client is leaking the requested website to a third party. OCSP stapling addresses some of these problems at the cost of less up-to-date data. Approaches based on cryptographic accumulators and Zero-Knowledge-Proofs try to accommodate for this privacy gap, but are currently (in 2026) facing scalability issues and are not yet standardized. Another alternative is short-lived Referenced Tokens with regular re-issuance, but this puts additional burden on the Issuer's infrastructure.</t>
        <t>This specification seeks to find a balance between scalability, security and privacy by representing statuses as individual bits, packing them into an array, and compressing the resulting binary data. Thereby, a Status List may contain statuses of many thousands or millions Referenced Tokens while remaining as small as possible. Placing a large number of Referenced Tokens into the same list also offers Holders and Relying Parties herd privacy from the Status Provider.</t>
      </section>
      <section anchor="design-considerations">
        <name>Design Considerations</name>
        <t>The decisions taken in this specification aim to achieve the following design goals:</t>
        <ul spacing="normal">
          <li>
            <t>the specification shall be easy, fast and secure to implement in all major programming languages</t>
          </li>
          <li>
            <t>the specification shall be optimized to support the most common use cases, such as revocation, and avoid unnecessary complexity of corner cases, such as providing multiple statuses for a single token</t>
          </li>
          <li>
            <t>the Status List shall scale up to millions of tokens to support large-scale government or enterprise use cases</t>
          </li>
          <li>
            <t>the Status List shall enable caching policies and offline support</t>
          </li>
          <li>
            <t>the specification shall support JSON and CBOR based tokens</t>
          </li>
          <li>
            <t>the specification shall not specify key resolution or trust frameworks</t>
          </li>
          <li>
            <t>the specification shall define an extension point that enables other mechanisms to convey information about the status of a Referenced Token</t>
          </li>
        </ul>
      </section>
      <section anchor="prior-work">
        <name>Prior Work</name>
        <t>Representing statuses with bits in an array is a rather old and well-known concept in computer science. There has been prior work to use this for revocation and status management. For example, a paper by Smith et al. <xref target="smith2020let"/> proposed a mechanism called Certificate Revocation Vectors based on xz compressed bit vectors for each expiration day. The W3C bit Status List <xref target="W3C.SL"/> similarly uses a compressed bit representation.</t>
      </section>
      <section anchor="status-mechanisms-registry">
        <name>Status Mechanisms Registry</name>
        <t>This specification establishes IANA "Status Mechanisms" registries for status mechanisms for JOSE-based tokens and for status mechanisms for COSE-based tokens and registers the members defined by this specification. Other specifications can register other members used for status retrieval.</t>
        <t>Other status mechanisms may have different tradeoffs regarding security, privacy, scalability and complexity. The privacy and security considerations in this document only represent the properties of the Status List mechanism.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>Issuer:</dt>
        <dd>
          <t>An entity that issues the Referenced Token. Also known as a Provider.</t>
        </dd>
        <dt>Status Issuer:</dt>
        <dd>
          <t>An entity that issues the Status List Token about the status information of the Referenced Token. This role may be fulfilled by the Issuer.</t>
        </dd>
        <dt>Status Provider:</dt>
        <dd>
          <t>An entity that provides the Status List Token on an accessible endpoint. This role may be fulfilled by the Status Issuer.</t>
        </dd>
        <dt>Holder:</dt>
        <dd>
          <t>An entity that receives Referenced Tokens from the Issuer and presents them to Relying Parties.</t>
        </dd>
        <dt>Relying Party:</dt>
        <dd>
          <t>An entity that relies on the Referenced Token and fetches the corresponding Status List Token to validate the status of that Referenced Token. Also known as a Verifier.</t>
        </dd>
        <dt>Status:</dt>
        <dd>
          <t>A Status describes the current state, mode, condition or stage of an entity that is represented by the Referenced Token as determined by the Status Issuer.</t>
        </dd>
        <dt>Status List:</dt>
        <dd>
          <t>An object in JSON or CBOR representation containing a compressed byte array that represents the statuses of many Referenced Tokens.</t>
        </dd>
        <dt>Status List Token:</dt>
        <dd>
          <t>A token in JWT (as defined in <xref target="RFC7519"/>) or CWT (as defined in <xref target="RFC8392"/>) representation that contains a cryptographically secured Status List.</t>
        </dd>
        <dt>Referenced Token:</dt>
        <dd>
          <t>A cryptographically secured data structure that contains a "status" claim that references a mechanism to retrieve status information about this Referenced Token. This document defines the Status List mechanism in which case the Referenced Token contains a reference to an entry in a Status List Token. It is <bcp14>RECOMMENDED</bcp14> to use JSON <xref target="RFC8259"/> with JOSE as defined in <xref target="RFC7515"/> or CBOR <xref target="RFC8949"/> with COSE as defined in <xref target="RFC9052"/>. Examples for Referenced Tokens are SD-JWT and ISO mdoc.</t>
        </dd>
        <dt>Client:</dt>
        <dd>
          <t>An application that fetches information, such as a Status List Token, from the Status List Provider on behalf of the Holder or Relying Party.</t>
        </dd>
        <dt>base64url:</dt>
        <dd>
          <t>Denotes the URL-safe base64 encoding with all trailing '=' characters omitted as defined in <xref section="2" sectionFormat="of" target="RFC7515"/> as "Base64url Encoding".</t>
        </dd>
      </dl>
    </section>
    <section anchor="status-list">
      <name>Status List</name>
      <t>A Status List is a data structure that contains the statuses of many Referenced Tokens represented by one or multiple bits. <xref target="status-list-byte-array"/> describes how to construct a compressed byte array that is the base component for the Status List data structure. <xref target="status-list-json"/> and <xref target="status-list-cbor"/> describe how to encode such a Status List in JSON and CBOR representations.</t>
      <section anchor="status-list-byte-array">
        <name>Compressed Byte Array</name>
        <t>A compressed byte array containing the status information of the Referenced Token is composed by the following algorithm:</t>
        <ol spacing="normal" type="1"><li>
            <t>The Status Issuer <bcp14>MUST</bcp14> define a number of bits (<tt>bits</tt>) of either 1,2,4 or 8, that represents the number of bits used to describe the status of each Referenced Token within this Status List. Therefore, up to 2,4,16 or 256 statuses for a Referenced Token are possible, depending on the bit size. This limitation is intended to limit bit manipulation necessary to a single byte for every operation, thus keeping implementations simpler and less error-prone.</t>
          </li>
          <li>
            <t>The Status Issuer creates a byte array of size = number of Referenced Tokens * <tt>bits</tt> / 8 or greater. Depending on the <tt>bits</tt>, each byte in the array corresponds to 8/(<tt>bits</tt>) statuses (8,4,2 or 1).</t>
          </li>
          <li>
            <t>The Status Issuer sets the status values for all Referenced Tokens within the byte array. Each Referenced Token is assigned a distinct index from 0 to one less than the number of Referenced Tokens assigned to the Status List. Each index identifies a contiguous block of bits in the byte array, with the blocks being packed into bytes from the least significant bit ("0") to the most significant bit ("7"). These bits contain the encoded status value of the Referenced Token (see <xref target="status-types"/> for more details on the values).</t>
          </li>
          <li>
            <t>The Status Issuer compresses the byte array using DEFLATE <xref target="RFC1951"/> with the ZLIB <xref target="RFC1950"/> data format. Implementations are <bcp14>RECOMMENDED</bcp14> to use the highest compression level available.</t>
          </li>
        </ol>
        <t>The following example illustrates the byte array of a Status List that represents the statuses of 16 Referenced Tokens with a <tt>bits</tt> of 1, requiring 2 bytes (16 bits) for the uncompressed byte array:</t>
        <artwork type="ascii-art"><![CDATA[
status[0] = 0b1
status[1] = 0b0
status[2] = 0b0
status[3] = 0b1
status[4] = 0b1
status[5] = 0b1
status[6] = 0b0
status[7] = 0b1
status[8] = 0b1
status[9] = 0b1
status[10] = 0b0
status[11] = 0b0
status[12] = 0b0
status[13] = 0b1
status[14] = 0b0
status[15] = 0b1
]]></artwork>
        <t>These bits are concatenated:</t>
        <artwork type="ascii-art"><![CDATA[
Byte Index            0                  1
Bit Position   7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0
              +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
Bit Values    |1|0|1|1|1|0|0|1|  |1|0|1|0|0|0|1|1|
              +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
List Index     7 6 5 4 3 2 1 0   15   ...  10 9 8
              \_______________/  \_______________/
Hex Value           0xB9               0xA3

compressed array (hex): 78dadbb918000217015d
]]></artwork>
        <t>In the following example, the Status List additionally includes the Status Type "SUSPENDED". As the Status Type value for "SUSPENDED" is 0x02 and does not fit into 1 bit, the <tt>bits</tt> is required to be 2. This example illustrates the byte array of a Status List that represents the statuses of 12 Referenced Tokens with a <tt>bits</tt> of 2, requiring 3 bytes (24 bits) for the uncompressed byte array:</t>
        <artwork type="ascii-art"><![CDATA[
status[0] = 0b01
status[1] = 0b10
status[2] = 0b00
status[3] = 0b11
status[4] = 0b00
status[5] = 0b01
status[6] = 0b00
status[7] = 0b01
status[8] = 0b01
status[9] = 0b10
status[10] = 0b11
status[11] = 0b11
]]></artwork>
        <t>These bits are concatenated:</t>
        <artwork type="ascii-art"><![CDATA[
Byte Index             0                  1                  2
Bit Position    7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0
               +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
Bit Values     |1|1|0|0|1|0|0|1|  |0|1|0|0|0|1|0|0|  |1|1|1|1|1|0|0|1|
               +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
                \ / \ / \ / \ /    \ / \ / \ / \ /    \ / \ / \ / \ /
Status Value     11  00  10  01     01  00  01  00     11  11  10  01
List Index        3   2   1   0      7   6   5   4      11  10  9   8
                  \___________/      \___________/      \___________/
Hex Value              0xC9               0x44               0xF9

compressed array (hex): 78da3be9f2130003df0207
]]></artwork>
      </section>
      <section anchor="status-list-json">
        <name>Status List in JSON Format</name>
        <t>This section defines the data structure for a JSON-encoded Status List:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>StatusList</tt> structure is a JSON Object that contains the following members:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>bits</tt>: <bcp14>REQUIRED</bcp14>. JSON Integer specifying the number of bits per Referenced Token in the compressed byte array (<tt>lst</tt>). The allowed values for <tt>bits</tt> are 1, 2, 4, and 8.</t>
              </li>
              <li>
                <t><tt>lst</tt>: <bcp14>REQUIRED</bcp14>. JSON String that contains the status values for all the Referenced Tokens it conveys statuses for. The value <bcp14>MUST</bcp14> be the base64url-encoded compressed byte array as specified in <xref target="status-list-byte-array"/>.</t>
              </li>
              <li>
                <t><tt>aggregation_uri</tt>: <bcp14>OPTIONAL</bcp14>. JSON String that contains a URI to retrieve the Status List Aggregation for this type of Referenced Token or Issuer. See <xref target="aggregation"/> for further details.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following example illustrates the JSON representation of the Status List with <tt>bits</tt>=1 from the examples above:</t>
        <artwork><![CDATA[
byte_array = [0xb9, 0xa3] 
encoded:
{
  "bits": 1,
  "lst": "eNrbuRgAAhcBXQ"
}
]]></artwork>
        <t>The following example illustrates the JSON representation of the Status List with <tt>bits</tt>=2 from the examples above:</t>
        <artwork><![CDATA[
byte_array = [0xc9, 0x44, 0xf9] 
encoded:
{
  "bits": 2,
  "lst": "eNo76fITAAPfAgc"
}
]]></artwork>
        <t>See <xref target="test-vectors"/> for more test vectors.</t>
      </section>
      <section anchor="status-list-cbor">
        <name>Status List in CBOR Format</name>
        <t>This section defines the data structure for a CBOR-encoded Status List:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>StatusList</tt> structure is a CBOR map (major type 5) and defines the following entries:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>bits</tt>: <bcp14>REQUIRED</bcp14>. CBOR Unsigned integer (major type 0) that contains the number of bits per Referenced Token in the compressed byte array (<tt>lst</tt>). The allowed values for <tt>bits</tt> are 1, 2, 4, and 8.</t>
              </li>
              <li>
                <t><tt>lst</tt>: <bcp14>REQUIRED</bcp14>. CBOR Byte string (major type 2) that contains the status values for all the Referenced Tokens it conveys statuses for. The value <bcp14>MUST</bcp14> be the compressed byte array as specified in <xref target="status-list-byte-array"/>.</t>
              </li>
              <li>
                <t><tt>aggregation_uri</tt>: <bcp14>OPTIONAL</bcp14>. CBOR Text string (major type 3) that contains a URI to retrieve the Status List Aggregation for this type of Referenced Token. See <xref target="aggregation"/> for further detail.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following is the CDDL <xref target="RFC8610"/> definition of the <tt>StatusList</tt> structure:</t>
        <sourcecode type="cddl"><![CDATA[
StatusList = {
    bits: 1 / 2 / 4 / 8, ; The number of bits used per Referenced Token
    lst: bstr, ; Byte string that contains the Status List
    ? aggregation_uri: tstr ; link to the Status List Aggregation
}
]]></sourcecode>
        <t>The following example illustrates the CBOR representation of the Status List in Hex:</t>
        <artwork><![CDATA[
byte_array = [0xb9, 0xa3] 
encoded:
a2646269747301636c73744a78dadbb918000217015d
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
a2                              # map(2)
  64                            #   string(4)
    62697473                    #     "bits"
  01                            #   uint(1)
  63                            #   string(3)
    6c7374                      #     "lst"
  4a                            #   bytes(10)
    78dadbb918000217015d        #     "xÚÛ¹\x18\x00\x02\x17\x01]"
]]></artwork>
        <t>See <xref target="test-vectors"/> for more test vectors.</t>
      </section>
    </section>
    <section anchor="status-list-token">
      <name>Status List Token</name>
      <t>A Status List Token embeds a Status List into a token that is cryptographically signed and protects the integrity of the Status List. This allows for the Status List Token to be hosted by third parties or be transferred for offline use cases.</t>
      <t>This section specifies Status List Tokens in JSON Web Token (JWT) and CBOR Web Token (CWT) format.</t>
      <section anchor="status-list-token-jwt">
        <name>Status List Token in JWT Format</name>
        <t>The Status List Token <bcp14>MUST</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/>.</t>
        <t>The following content applies to the JWT Header:</t>
        <ul spacing="normal">
          <li>
            <t><tt>typ</tt>: <bcp14>REQUIRED</bcp14>. The JWT type <bcp14>MUST</bcp14> be <tt>statuslist+jwt</tt>.</t>
          </li>
        </ul>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>sub</tt>: <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC7519"/>. The <tt>sub</tt> (subject) claim <bcp14>MUST</bcp14> specify the URI of the Status List Token. The value <bcp14>MUST</bcp14> be equal to that of the <tt>uri</tt> claim contained in the <tt>status_list</tt> claim of the Referenced Token.</t>
          </li>
          <li>
            <t><tt>iat</tt>: <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC7519"/>. The <tt>iat</tt> (issued at) claim <bcp14>MUST</bcp14> specify the time at which the Status List Token was issued.</t>
          </li>
          <li>
            <t><tt>exp</tt>: <bcp14>RECOMMENDED</bcp14>. As generally defined in <xref target="RFC7519"/>. The <tt>exp</tt> (expiration time) claim, if present, <bcp14>MUST</bcp14> specify the time at which the Status List Token is considered expired by the Status Issuer. Consider the guidance provided in <xref target="expiry-and-caching"/>.</t>
          </li>
          <li>
            <t><tt>ttl</tt>: <bcp14>RECOMMENDED</bcp14>. The <tt>ttl</tt> (time to live) claim, if present, <bcp14>MUST</bcp14> specify the maximum amount of time, in seconds, that the Status List Token can be cached by a consumer before a fresh copy <bcp14>SHOULD</bcp14> be retrieved. The value of the claim <bcp14>MUST</bcp14> be a positive number encoded in JSON as a number. Consider the guidance provided in <xref target="expiry-and-caching"/>.</t>
          </li>
          <li>
            <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status_list</tt> (status list) claim <bcp14>MUST</bcp14> specify the Status List conforming to the structure defined in <xref target="status-list-json"/>.</t>
          </li>
        </ul>
        <t>The following additional rules apply:</t>
        <ol spacing="normal" type="1"><li>
            <t>The JWT <bcp14>MAY</bcp14> contain other claims.</t>
          </li>
          <li>
            <t>The JWT <bcp14>MUST</bcp14> be secured using a cryptographic signature or MAC algorithm. Relying Parties <bcp14>MUST</bcp14> reject JWTs with an invalid signature.</t>
          </li>
          <li>
            <t>Relying Parties <bcp14>MUST</bcp14> reject JWTs that are not valid in all other respects per "JSON Web Token (JWT)" <xref target="RFC7519"/>.</t>
          </li>
          <li>
            <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
          </li>
        </ol>
        <t>The following is a non-normative example of a Status List Token in JWT format:</t>
        <artwork><![CDATA[
{
  "alg": "ES256",
  "kid": "12",
  "typ": "statuslist+jwt"
}
.
{
  "exp": 2291720170,
  "iat": 1686920170,
  "status_list": {
    "bits": 1,
    "lst": "eNrbuRgAAhcBXQ"
  },
  "sub": "https://example.com/statuslists/1",
  "ttl": 43200
}
]]></artwork>
      </section>
      <section anchor="status-list-token-cwt">
        <name>Status List Token in CWT Format</name>
        <t>The Status List Token <bcp14>MUST</bcp14> be encoded as a "CBOR Web Token (CWT)" according to <xref target="RFC8392"/>. The Status List Token <bcp14>MUST NOT</bcp14> be tagged with the CWT tag defined in <xref section="6" sectionFormat="of" target="RFC8392"/>. The COSE message <bcp14>MUST</bcp14> either be the tagged COSE_Sign1_Tagged (<tt>18</tt>) or COSE_Mac0_Tagged (<tt>17</tt>) as defined in <xref section="2" sectionFormat="of" target="RFC9052"/>.</t>
        <t>The following content applies to the protected header of the CWT:</t>
        <ul spacing="normal">
          <li>
            <t><tt>16</tt> (type): <bcp14>REQUIRED</bcp14>. The type of the CWT <bcp14>MUST</bcp14> be <tt>application/statuslist+cwt</tt> or the registered CoAP Content-Format ID (see <xref target="coap-content-type"/>) as defined in <xref target="RFC9596"/>.</t>
          </li>
        </ul>
        <t>The following content applies to the CWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>2</tt> (subject): <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC8392"/>. The subject claim <bcp14>MUST</bcp14> specify the URI of the Status List Token. The value <bcp14>MUST</bcp14> be equal to that of the <tt>uri</tt> claim contained in the <tt>status_list</tt> claim of the Referenced Token.</t>
          </li>
          <li>
            <t><tt>6</tt> (issued at): <bcp14>REQUIRED</bcp14>. As generally defined in <xref target="RFC8392"/>. The issued at claim <bcp14>MUST</bcp14> specify the time at which the Status List Token was issued.</t>
          </li>
          <li>
            <t><tt>4</tt> (expiration time): <bcp14>RECOMMENDED</bcp14>. As generally defined in <xref target="RFC8392"/>. The expiration time claim, if present, <bcp14>MUST</bcp14> specify the time at which the Status List Token is considered expired by its issuer. Consider the guidance provided in <xref target="expiry-and-caching"/>.</t>
          </li>
          <li>
            <t><tt>65534</tt> (time to live): <bcp14>RECOMMENDED</bcp14>. Unsigned integer (major type 0). The time to live claim, if present, <bcp14>MUST</bcp14> specify the maximum amount of time, in seconds, that the Status List Token can be cached by a consumer before a fresh copy <bcp14>SHOULD</bcp14> be retrieved. The value of the claim <bcp14>MUST</bcp14> be a positive number. Consider the guidance provided in <xref target="expiry-and-caching"/>.</t>
          </li>
          <li>
            <t><tt>65533</tt> (status list): <bcp14>REQUIRED</bcp14>. The status list claim <bcp14>MUST</bcp14> specify the Status List conforming to the structure defined in <xref target="status-list-cbor"/>.</t>
          </li>
        </ul>
        <t>The following additional rules apply:</t>
        <ol spacing="normal" type="1"><li>
            <t>The CWT <bcp14>MAY</bcp14> contain other claims.</t>
          </li>
          <li>
            <t>The CWT <bcp14>MUST</bcp14> be secured using a cryptographic signature or MAC algorithm. Relying Parties <bcp14>MUST</bcp14> reject CWTs with an invalid signature.</t>
          </li>
          <li>
            <t>Relying Parties <bcp14>MUST</bcp14> reject CWTs that are not valid in all other respects per "CBOR Web Token (CWT)" <xref target="RFC8392"/>.</t>
          </li>
          <li>
            <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
          </li>
        </ol>
        <t>The following is a non-normative example of a Status List Token in CWT format in Hex:</t>
        <artwork><![CDATA[
d2845820a2012610781a6170706c69636174696f6e2f7374617475736c6973742b63
7774a1044231325850a502782168747470733a2f2f6578616d706c652e636f6d2f73
74617475736c697374732f31061a648c5bea041a8898dfea19fffe19a8c019fffda2
646269747301636c73744a78dadbb918000217015d584093fa4d01032b18c35e2fe1
101b77fd6cc9440022caa4694450c4e4e9feab4e99d1fa6d9772ce2bf3a12e0323de
d7c982c5e101a5e67f0cbc1e2b6f57ce99c279
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
d2                              # tag(18)
  84                            #   array(4)
    58 20                       #     bytes(32)
      a2012610781a6170706c6963  #       "¢\x01&\x10x\x1aapplic"
      6174696f6e2f737461747573  #       "ation/status"
      6c6973742b637774          #       "list+cwt"
    a1                          #     map(1)
      04                        #       uint(4)
      42                        #       bytes(2)
        3132                    #         "12"
    58 50                       #     bytes(80)
      a502782168747470733a2f2f  #       "¥\x02x!https://"
      6578616d706c652e636f6d2f  #       "example.com/"
      7374617475736c697374732f  #       "statuslists/"
      31061a648c5bea041a8898df  #       "1\x06\x1ad\x8c[ê\x04\x1a\x88\x98ß"
      ea19fffe19a8c019fffda264  #       "ê\x19ÿþ\x19¨À\x19ÿý¢d"
      6269747301636c73744a78da  #       "bits\x01clstJxÚ"
      dbb918000217015d          #       "Û¹\x18\x00\x02\x17\x01]"
    58 40                       #     bytes(64)
      93fa4d01032b18c35e2fe110  #       "\x93úM\x01\x03+\x18Ã^/á\x10"
      1b77fd6cc9440022caa46944  #       "\x1bwýlÉD\x00"Ê¤iD"
      50c4e4e9feab4e99d1fa6d97  #       "PÄäéþ«N\x99Ñúm\x97"
      72ce2bf3a12e0323ded7c982  #       "rÎ+ó¡.\x03#Þ×É\x82"
      c5e101a5e67f0cbc1e2b6f57  #       "Åá\x01¥æ\x7f\x0c¼\x1e+oW"
      ce99c279                  #       "Î\x99Ây"
]]></artwork>
      </section>
    </section>
    <section anchor="referenced-token">
      <name>Referenced Token</name>
      <section anchor="status-claim">
        <name>Status Claim</name>
        <t>By including a "status" claim in a Referenced Token, the Issuer is referencing a mechanism to retrieve status information about this Referenced Token. This specification defines one possible member of the "status" object, called "status_list". Other members of the "status" object may be defined by other specifications. This is analogous to "cnf" claim in <xref section="3.1" sectionFormat="of" target="RFC7800"/> in which different authenticity confirmation methods can be included.</t>
      </section>
      <section anchor="referenced-token-jose">
        <name>Referenced Token in JOSE</name>
        <t>The Referenced Token <bcp14>MAY</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/>, as an SD-JWT <xref target="RFC9901"/>, as an SD-JWT VC <xref target="SD-JWT.VC"/> or other formats based on JOSE.</t>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status</tt> (status) claim <bcp14>MUST</bcp14> specify a JSON Object that contains at least one reference to a status mechanism.
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14> when the status mechanism defined in this specification is used. It <bcp14>MUST</bcp14> specify a JSON Object that contains a reference to a Status List Token. It <bcp14>MUST</bcp14> at least contain the following claims:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>idx</tt>: <bcp14>REQUIRED</bcp14>. The <tt>idx</tt> (index) claim <bcp14>MUST</bcp14> specify a non-negative Integer that represents the index to check for status information in the Status List for the current Referenced Token.</t>
                  </li>
                  <li>
                    <t><tt>uri</tt>: <bcp14>REQUIRED</bcp14>. The <tt>uri</tt> (URI) claim <bcp14>MUST</bcp14> specify a String value that identifies the Status List Token containing the status information for the Referenced Token. The value of <tt>uri</tt> <bcp14>MUST</bcp14> be a URI conforming to <xref target="RFC3986"/>.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
        <t>The following is a non-normative example of a decoded header and payload of a Referenced Token:</t>
        <artwork type="ascii-art"><![CDATA[
{
  "alg": "ES256",
  "kid": "11"
}
.
{
  "status": {
    "status_list": {
      "idx": 0,
      "uri": "https://example.com/statuslists/1"
    }
  }
}
]]></artwork>
        <t>The following is a non-normative example of a Referenced Token in SD-JWT serialized form as received from an Issuer:</t>
        <artwork type="ascii-art"><![CDATA[
eyJhbGciOiAiRVMyNTYiLCAidHlwIjogImV4YW1wbGUrc2Qtand0In0.eyJfc2QiOiBb
Ikh2cktYNmZQVjB2OUtfeUNWRkJpTEZIc01heGNEXzExNEVtNlZUOHgxbGciXSwgImlz
cyI6ICJodHRwczovL2V4YW1wbGUuY29tL2lzc3VlciIsICJpYXQiOiAxNjgzMDAwMDAw
LCAiZXhwIjogMTg4MzAwMDAwMCwgInN1YiI6ICI2YzVjMGE0OS1iNTg5LTQzMWQtYmFl
Ny0yMTkxMjJhOWVjMmMiLCAic3RhdHVzIjogeyJzdGF0dXNfbGlzdCI6IHsiaWR4Ijog
MCwgInVyaSI6ICJodHRwczovL2V4YW1wbGUuY29tL3N0YXR1c2xpc3RzLzEifX0sICJf
c2RfYWxnIjogInNoYS0yNTYifQ.-kgS-R-Z4DEDlqb8kb6381_gHHNatsoF1fcVKZk3M
06CrnV8F8k9d2w2V_YAOvgcb0f11FqDFezXBXH30d4vcw~WyIyR0xDNDJzS1F2ZUNmR2
ZyeU5STjl3IiwgInN0cmVldF9hZGRyZXNzIiwgIlNjaHVsc3RyLiAxMiJd~WyJlbHVWN
U9nM2dTTklJOEVZbnN4QV9BIiwgImxvY2FsaXR5IiwgIlNjaHVscGZvcnRhIl0~WyI2S
Wo3dE0tYTVpVlBHYm9TNXRtdlZBIiwgInJlZ2lvbiIsICJTYWNoc2VuLUFuaGFsdCJd~
WyJlSThaV205UW5LUHBOUGVOZW5IZGhRIiwgImNvdW50cnkiLCAiREUiXQ~WyJRZ19PN
jR6cUF4ZTQxMmExMDhpcm9BIiwgImFkZHJlc3MiLCB7Il9zZCI6IFsiNnZoOWJxLXpTN
EdLTV83R3BnZ1ZiWXp6dTZvT0dYcm1OVkdQSFA3NVVkMCIsICI5Z2pWdVh0ZEZST0NnU
nJ0TmNHVVhtRjY1cmRlemlfNkVyX2o3NmttWXlNIiwgIktVUkRQaDRaQzE5LTN0aXotR
GYzOVY4ZWlkeTFvVjNhM0gxRGEyTjBnODgiLCAiV045cjlkQ0JKOEhUQ3NTMmpLQVN4V
GpFeVc1bTV4NjVfWl8ycm8yamZYTSJdfV0~
]]></artwork>
        <t>The resulting payload of the example above:</t>
        <sourcecode type="json"><![CDATA[
{
  "_sd": [
    "HvrKX6fPV0v9K_yCVFBiLFHsMaxcD_114Em6VT8x1lg"
  ],
  "iss": "https://example.com/issuer",
  "iat": 1683000000,
  "exp": 1883000000,
  "sub": "6c5c0a49-b589-431d-bae7-219122a9ec2c",
  "status": {
    "status_list": {
      "idx": 0,
      "uri": "https://example.com/statuslists/1"
    }
  },
  "_sd_alg": "sha-256"
}
]]></sourcecode>
      </section>
      <section anchor="referenced-token-cose">
        <name>Referenced Token in COSE</name>
        <t>The Referenced Token <bcp14>MAY</bcp14> be encoded as a "CBOR Web Token (CWT)" object according to <xref target="RFC8392"/>, as an SD-CWTs <xref target="SD-CWT"/> or as an ISO mdoc according to <xref target="ISO.mdoc"/> or other formats based on COSE. Referenced Tokens in CBOR <bcp14>SHOULD</bcp14> share the same core data structure for a status list reference:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>Status</tt> CBOR structure is a Map that <bcp14>MUST</bcp14> include at least one data item that refers to a status mechanism. Each data item in the <tt>Status</tt> CBOR structure comprises a key-value pair, where the key <bcp14>MUST</bcp14> be a CBOR text string (major type 3) specifying the identifier of the status mechanism and the corresponding value defines its contents.
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>status_list</tt> (status list): <bcp14>REQUIRED</bcp14> when the status mechanism defined in this specification is used. It has the same definition as the <tt>status_list</tt> claim in <xref target="referenced-token-jose"/> but <bcp14>MUST</bcp14> be encoded as a <tt>StatusListInfo</tt> CBOR structure with the following fields:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>idx</tt>: <bcp14>REQUIRED</bcp14>. Unsigned integer (major type 0). The <tt>idx</tt> (index) claim <bcp14>MUST</bcp14> specify a non-negative Integer that represents the index to check for status information in the Status List for the current Referenced Token.</t>
                  </li>
                  <li>
                    <t><tt>uri</tt>: <bcp14>REQUIRED</bcp14>. Text string (major type 3). The <tt>uri</tt> (URI) claim <bcp14>MUST</bcp14> specify a String value that identifies the Status List Token containing the status information for the Referenced Token. The value of <tt>uri</tt> <bcp14>MUST</bcp14> be a URI conforming to <xref target="RFC3986"/>.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <t>If the Referenced Token is a CWT, the following content applies to the CWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>65535</tt> (status): <bcp14>REQUIRED</bcp14>. The status claim contains the <tt>Status</tt> CBOR structure as described in this section.</t>
          </li>
        </ul>
        <t>Application of additional restrictions and policies are at the discretion of the Relying Party.</t>
        <t>The following is a non-normative example of a Referenced Token in CWT format in Hex:</t>
        <artwork><![CDATA[
d28443a10126a1044231325866a502653132333435017368747470733a2f2f657861
6d706c652e636f6d061a648c5bea041a8898dfea19ffffa16b7374617475735f6c69
7374a2636964780063757269782168747470733a2f2f6578616d706c652e636f6d2f
7374617475736c697374732f315840340f7efea10f1a36dc4797636a17b4dd4848b6
8997d1d10e8cceb3a38ff33b3dda72964a83989f6cf98560c2fc97a08bc8977cc6b0
f84cfedab93d3e4481e938
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
d2                              # tag(18)
  84                            #   array(4)
    43                          #     bytes(3)
      a10126                    #       "¡\x01&"
    a1                          #     map(1)
      04                        #       uint(4)
      42                        #       bytes(2)
        3132                    #         "12"
    58 66                       #     bytes(102)
      a50265313233343501736874  #       "¥\x02e12345\x01sht"
      7470733a2f2f6578616d706c  #       "tps://exampl"
      652e636f6d061a648c5bea04  #       "e.com\x06\x1ad\x8c[ê\x04"
      1a8898dfea19ffffa16b7374  #       "\x1a\x88\x98ßê\x19ÿÿ¡kst"
      617475735f6c697374a26369  #       "atus_list¢ci"
      647800637572697821687474  #       "dx\x00curix!htt"
      70733a2f2f6578616d706c65  #       "ps://example"
      2e636f6d2f7374617475736c  #       ".com/statusl"
      697374732f31              #       "ists/1"
    58 40                       #     bytes(64)
      340f7efea10f1a36dc479763  #       "4\x0f~þ¡\x0f\x1a6ÜG\x97c"
      6a17b4dd4848b68997d1d10e  #       "j\x17´ÝHH¶\x89\x97ÑÑ\x0e"
      8cceb3a38ff33b3dda72964a  #       "\x8cÎ³£\x8fó;=Úr\x96J"
      83989f6cf98560c2fc97a08b  #       "\x83\x98\x9flù\x85`Âü\x97\xa0\x8b"
      c8977cc6b0f84cfedab93d3e  #       "È\x97|Æ°øLþÚ¹=>"
      4481e938                  #       "D\x81é8"
]]></artwork>
      </section>
    </section>
    <section anchor="status-types">
      <name>Status Types</name>
      <t>This document defines the statuses of Referenced Tokens as Status Type values.
A Status List represents exactly one status per Referenced Token. If the Status List contains more than one bit per token (as defined by <tt>bits</tt> in the Status List), then the whole value of bits <bcp14>MUST</bcp14> describe one value. Status Types <bcp14>MUST</bcp14> have a numeric value between 0 and 255 for their representation in the Status List. The issuer of the Status List <bcp14>MUST</bcp14> choose an adequate <tt>bits</tt> value (bit size) to be able to describe the required Status Types for its application.</t>
      <section anchor="status-types-values">
        <name>Status Types Values</name>
        <t>The processing rules for Referenced Tokens (such as JWT or CWT) supersede the Referenced Token's status in a TSL. In particular, a Referenced Token that is evaluated as being expired (e.g. through the <tt>exp</tt> claim) but in a TSL has a status of 0x00 ("VALID"), is considered expired.</t>
        <t>This document creates a registry in <xref target="iana-status-types"/> that includes the most common Status Type values. To improve interoperability, applications <bcp14>MUST</bcp14> use registered values for statuses if they have the same or compatiable semantics of the use-case. Additional values may be defined for particular use cases. Status Types described by this document comprise:</t>
        <ul spacing="normal">
          <li>
            <t>0x00 - "VALID" - The status of the Referenced Token is valid, correct or legal.</t>
          </li>
          <li>
            <t>0x01 - "INVALID" - The status of the Referenced Token is revoked, annulled, taken back, recalled or cancelled.</t>
          </li>
          <li>
            <t>0x02 - "SUSPENDED" - The status of the Referenced Token is temporarily invalid, hanging, debarred from privilege. This status is usually temporary.</t>
          </li>
        </ul>
        <t>The Status Type value 0x03 and Status Type values in the range 0x0C until 0x0F are permanently reserved as application specific. The processing of Status Types using these values is application specific. All other Status Type values are reserved for future registration.</t>
        <t>See <xref target="privacy-status-types"/> for privacy considerations on status types.</t>
      </section>
    </section>
    <section anchor="verification-and-processing">
      <name>Verification and Processing</name>
      <t>The fetching, processing and verifying of a Status List Token may be done by either the Holder or the Relying Party. The following section is described from the role of the Relying Party, however the same rules apply to the Holder.</t>
      <section anchor="status-list-request">
        <name>Status List Request</name>
        <t>The default Status List request and response mechanism uses HTTP semantics and Content negotiation as defined in <xref target="RFC9110"/>.</t>
        <t>The Status Provider <bcp14>MUST</bcp14> return the Status List Token in response to an HTTP GET request to the URI provided in the Referenced Token, unless the Relying Party and the Status Provider have alternative methods of distribution for the Status List Token.</t>
        <t>The HTTP endpoint <bcp14>SHOULD</bcp14> support the use of Cross-Origin Resource Sharing (CORS) <xref target="CORS"/> and/or other methods as appropriate to enable Browser-based clients to access it, unless ecosystems using this specification choose not to support Browser-based clients.</t>
        <t>The following media types are defined by this specification for HTTP based Content negotiation:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+jwt" for Status List Token in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List Token in CWT format</t>
          </li>
        </ul>
        <t>The following is a non-normative example of a request for a Status List Token with type <tt>application/statuslist+jwt</tt>:</t>
        <artwork type="ascii-art"><![CDATA[
GET /statuslists/1 HTTP/1.1
Host: example.com
Accept: application/statuslist+jwt
]]></artwork>
      </section>
      <section anchor="status-list-response">
        <name>Status List Response</name>
        <t>A successful response that contains a Status List Token <bcp14>MUST</bcp14> use an HTTP status code in the 2xx range.</t>
        <t>A response <bcp14>MAY</bcp14> also choose to redirect the client to another URI using an HTTP status code in the 3xx range, which clients <bcp14>SHOULD</bcp14> follow. See <xref target="redirects"/> for security considerations on redirects.</t>
        <t>In the successful response, the Status Provider <bcp14>MUST</bcp14> use the following content-type:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+jwt" for Status List Token in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List Token in CWT format</t>
          </li>
        </ul>
        <t>In the case of "application/statuslist+jwt", the response <bcp14>MUST</bcp14> be of type JWT and follow the rules of <xref target="status-list-token-jwt"/>.
In the case of "application/statuslist+cwt", the response <bcp14>MUST</bcp14> be of type CWT and follow the rules of <xref target="status-list-token-cwt"/>.</t>
        <t>The body of such an HTTP response contains the raw Status List Token, that means the binary encoding as defined in <xref section="9.2.1" sectionFormat="of" target="RFC8392"/> for a Status List Token in CWT format and the JWS Compact Serialization form for a Status List Token in JWT format. Note that while the examples for Status List Tokens in CWT format in this document are provided in hex encoding, this is done purely for readability; CWT format response bodies are "in binary".</t>
        <t>The HTTP response <bcp14>SHOULD</bcp14> use Content-Encoding (such as gzip) using the content negotiation and encoding mechanisms as defined in <xref target="RFC9110"/> for Status List Tokens in JWT format.</t>
        <t>If caching-related HTTP headers are present in the HTTP response, Relying Parties <bcp14>MUST</bcp14> prioritize the exp and ttl claims within the Status List Token over the HTTP headers for determining caching behavior.</t>
        <t>The following is a non-normative example of a response with a Status List Token with type <tt>application/statuslist+jwt</tt>:</t>
        <artwork type="ascii-art"><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/statuslist+jwt

eyJhbGciOiJFUzI1NiIsImtpZCI6IjEyIiwidHlwIjoic3RhdHVzbGlzdCtqd3QifQ.e
yJleHAiOjIyOTE3MjAxNzAsImlhdCI6MTY4NjkyMDE3MCwiaXNzIjoiaHR0cHM6Ly9le
GFtcGxlLmNvbSIsInN0YXR1c19saXN0Ijp7ImJpdHMiOjEsImxzdCI6ImVOcmJ1UmdBQ
WhjQlhRIn0sInN1YiI6Imh0dHBzOi8vZXhhbXBsZS5jb20vc3RhdHVzbGlzdHMvMSIsI
nR0bCI6NDMyMDB9.2lKUUNG503R9htu4aHAYi7vjmr3sgApbfoDvPrl65N3URUO1EYqq
Ql45Jfzd-Av4QzlKa3oVALpLwOEUOq-U_g
]]></artwork>
      </section>
      <section anchor="validation-rules">
        <name>Validation Rules</name>
        <t>Upon receiving a Referenced Token, a Relying Party <bcp14>MUST</bcp14> first perform the validation of the Referenced Token - e.g., checking for expected attributes, valid signature and expiration time. The processing rules for Referenced Tokens (such as JWT or CWT) <bcp14>MUST</bcp14> precede any evaluation of a Referenced Token's status. For example, if a token is evaluated as being expired through the "exp" (Expiration Time) but also has a status of 0x00 ("VALID"), the token is considered expired. If the validation procedures for the Referenced Token determine it is invalid, further procedures regarding Status List <bcp14>MUST NOT</bcp14> be performed, e.g. fetching a Status List Token, unless the Referenced Token procedures or the use case require further evaluation.</t>
        <t>If this validation is not successful, the Referenced Token <bcp14>MUST</bcp14> be rejected. If the validation was successful, the Relying Party <bcp14>MUST</bcp14> perform the following validation steps to evaluate the status of the Referenced Token:</t>
        <ol spacing="normal" type="1"><li>
            <t>Check for the existence of a <tt>status</tt> claim, check for the existence of a <tt>status_list</tt> claim within the <tt>status</tt> claim and validate that the content of <tt>status_list</tt> adheres to the rules defined in <xref target="referenced-token-jose"/> for JOSE-based Referenced Tokens and <xref target="referenced-token-cose"/> for COSE-based Referenced Tokens. Other formats of Referenced Tokens may define other encoding of the URI and index.</t>
          </li>
          <li>
            <t>Resolve the Status List Token from the provided URI</t>
          </li>
          <li>
            <t>Validate the Status List Token:
            </t>
            <ol spacing="normal" type="a"><li>
                <t>Validate the Status List Token by following the rules defined in <xref section="7.2" sectionFormat="of" target="RFC7519"/> for JWTs and <xref section="7.2" sectionFormat="of" target="RFC8392"/> for CWTs. This step might require the resolution of a public key as described in <xref target="key-management"/>.</t>
              </li>
              <li>
                <t>Check for the existence of the required claims as defined in <xref target="status-list-token-jwt"/> and <xref target="status-list-token-cwt"/> depending on the token type</t>
              </li>
            </ol>
          </li>
          <li>
            <t>All existing claims in the Status List Token <bcp14>MUST</bcp14> be checked according to the rules in <xref target="status-list-token-jwt"/> and <xref target="status-list-token-cwt"/>
            </t>
            <ol spacing="normal" type="a"><li>
                <t>The subject claim (<tt>sub</tt> or <tt>2</tt>) of the Status List Token <bcp14>MUST</bcp14> be equal to the <tt>uri</tt> claim in the <tt>status_list</tt> object of the Referenced Token</t>
              </li>
              <li>
                <t>If the Relying Party has local policies regarding the freshness of the Status List Token, it <bcp14>SHOULD</bcp14> check the issued at claim (<tt>iat</tt> or <tt>6</tt>)</t>
              </li>
              <li>
                <t>If the expiration time is defined (<tt>exp</tt> or <tt>4</tt>), it <bcp14>MUST</bcp14> be checked if the Status List Token is expired</t>
              </li>
              <li>
                <t>If the Relying Party is using a system for caching the Status List Token, it <bcp14>SHOULD</bcp14> check the <tt>ttl</tt> claim of the Status List Token and retrieve a fresh copy if (time status was resolved + ttl &lt; current time)</t>
              </li>
            </ol>
          </li>
          <li>
            <t>Decompress the Status List with a decompressor that is compatible with DEFLATE <xref target="RFC1951"/> and ZLIB <xref target="RFC1950"/></t>
          </li>
          <li>
            <t>Retrieve the status value of the index specified in the Referenced Token as described in <xref target="status-list"/>. If the provided index is out of bounds of the Status List, no statement about the status of the Referenced Token can be made and the Referenced Token <bcp14>MUST</bcp14> be rejected.</t>
          </li>
          <li>
            <t>Check the status value as described in <xref target="status-types"/></t>
          </li>
        </ol>
        <t>If any of these checks fails, no statement about the status of the Referenced Token can be made and the Referenced Token <bcp14>SHOULD</bcp14> be rejected.</t>
      </section>
      <section anchor="historical-resolution">
        <name>Historical Resolution</name>
        <t>By default, the status mechanism defined in this specification only conveys information about the state of Referenced Tokens at the time the Status List Token was issued. The validity period for this information, as defined by the issuer, is explicitly stated by the <tt>iat</tt> (issued at) and <tt>exp</tt> (expiration time) claims for JWT and their corresponding ones for the CWT representation. If support for historical status information is desired, this can be achieved by extending with a timestamp the request for the Status List Token as defined in <xref target="status-list-request"/>. This feature has additional privacy implications as described in <xref target="privacy-historical"/>.</t>
        <t>To obtain the Status List Token, the Relying Party <bcp14>MUST</bcp14> send an HTTP GET request to the URI provided in the Referenced Token with the additional query parameter <tt>time</tt> and its value being a unix timestamp, forming the query component <tt>time=&lt;timestamp&gt;</tt> (see below for a non-normative example of a request using such a query). The response for a valid request <bcp14>SHOULD</bcp14> contain a Status List Token that was valid for that specified time or an error.</t>
        <t>If the Server does not support the additional query parameter, it <bcp14>SHOULD</bcp14> return a status code of 501 (Not Implemented) or if the requested time is not supported it <bcp14>SHOULD</bcp14> return a status code of 404 (Not Found). A Status List Token might be served via static file hosting (e.g., leveraging a Content Delivery Network) that ignores query parameters, which would result in the client requesting a historical status list but receiving the current status list. Thus, the client <bcp14>MUST</bcp14> reject a response unless the requested timestamp is within the valid time of the returned token signaled via iat (6 for CWT) and exp (4 for CWT).</t>
        <t>The following is a non-normative example of a GET request using the <tt>time</tt> query parameter:</t>
        <artwork type="ascii-art"><![CDATA[
GET /statuslists/1?time=1686925000 HTTP/1.1
Host: example.com
Accept: application/statuslist+jwt
]]></artwork>
        <t>The following is a non-normative example of a response for the above Request:</t>
        <artwork type="ascii-art"><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/statuslist+jwt

eyJhbGciOiJFUzI1NiIsImtpZCI6IjEyIiwidHlwIjoic3RhdHVzbGlzdCtqd3QifQ.e
yJleHAiOjIyOTE3MjAxNzAsImlhdCI6MTY4NjkyMDE3MCwiaXNzIjoiaHR0cHM6Ly9le
GFtcGxlLmNvbSIsInN0YXR1c19saXN0Ijp7ImJpdHMiOjEsImxzdCI6ImVOcmJ1UmdBQ
WhjQlhRIn0sInN1YiI6Imh0dHBzOi8vZXhhbXBsZS5jb20vc3RhdHVzbGlzdHMvMSIsI
nR0bCI6NDMyMDB9.2lKUUNG503R9htu4aHAYi7vjmr3sgApbfoDvPrl65N3URUO1EYqq
Ql45Jfzd-Av4QzlKa3oVALpLwOEUOq-U_g
]]></artwork>
      </section>
    </section>
    <section anchor="aggregation">
      <name>Status List Aggregation</name>
      <t>Status List Aggregation is an optional mechanism offered by the Issuer to publish a list of one or more Status List Tokens URIs, allowing a Relying Party to fetch Status List Tokens provided by this Issuer. This mechanism is intended to support fetching and caching mechanisms and allow offline validation of the status of a Referenced Token for a period of time.</t>
      <t>If a Relying Party encounters an error while validating one of the Status List Tokens returned from the Status List Aggregation endpoint, it <bcp14>SHOULD</bcp14> continue processing the other Status List Tokens.</t>
      <t>There are two options for a Relying Party to retrieve the Status List Aggregation.
An Issuer <bcp14>MAY</bcp14> support any of these mechanisms:</t>
      <ul spacing="normal">
        <li>
          <t>Issuer metadata: The Issuer of the Referenced Token publishes a URI which links to Status List Aggregation, e.g. in publicly available metadata of an issuance protocol</t>
        </li>
        <li>
          <t>Status List Parameter: The Status Issuer includes an additional claim in the Status List Token that contains the Status List Aggregation URI.</t>
        </li>
      </ul>
      <artwork type="ascii-art"><![CDATA[
                                      +-----------------+
                                      |                 |
                                      | Issuer Metadata |
                                      |                 |
                                      +---------+-------+
        batch of                                |
  +-------------------+                         | link within metadata
 +-------------------+|  link all               v
+-------------------+||<-------+  +-------------------------+
|                   ||<--------+  |                         |
| Status List Token |<---------+--| Status List Aggregation |
|                   |+            |                         |
+-------+-----------+             +-------------------------+
        |                                     ^
        |                                     |
        |   link by aggregation_uri           |
        +-------------------------------------+
]]></artwork>
      <section anchor="issuer-metadata">
        <name>Issuer Metadata</name>
        <t>The Issuer <bcp14>MAY</bcp14> link to the Status List Aggregation URI in metadata that can be provided by different means like .well-known metadata as is used commonly in OAuth as defined in <xref target="RFC8414"/>, or within Issuer certificates or trust lists (such as VICAL as defined in Annex C of <xref target="ISO.mdoc"/>). If the Issuer is an OAuth Authorization Server according to <xref target="RFC6749"/>, it is <bcp14>RECOMMENDED</bcp14> to use the <tt>status_list_aggregation_endpoint</tt> parameter within its metadata defined by <xref target="RFC8414"/>. The Issuer <bcp14>MAY</bcp14> limit the Status List Tokens listed by a Status List Aggregation to a particular type of Referenced Token.</t>
        <t>The concrete implementation details depend on the specific ecosystem and are out of scope of this specification.</t>
      </section>
      <section anchor="status-list-parameter">
        <name>Status List Parameter</name>
        <t>The URI to the Status List Aggregation <bcp14>MAY</bcp14> be provided as the optional parameter <tt>aggregation_uri</tt> in the Status List itself as explained in <xref target="status-list-cbor"/> and <xref target="status-list-json"/> respectively. A Relying Party may use this URI to retrieve an up-to-date list of relevant Status Lists.</t>
      </section>
      <section anchor="status-list-aggregation-data-structure">
        <name>Status List Aggregation Data Structure</name>
        <t>This section defines the structure for a JSON-encoded Status List Aggregation:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status_lists</tt>: <bcp14>REQUIRED</bcp14>. JSON array of strings that contains URIs linking to Status List Tokens.</t>
          </li>
        </ul>
        <t>The Status List Aggregation URI provides a list of Status List Token URIs. This aggregation is in JSON and the returned media type <bcp14>MUST</bcp14> be <tt>application/json</tt>. A Relying Party can iterate through this list and fetch all Status List Tokens before encountering the specific URI in a Referenced Token.</t>
        <t>The following is a non-normative example for media type <tt>application/json</tt>:</t>
        <sourcecode type="json"><![CDATA[
{
   "status_lists" : [
      "https://example.com/statuslists/1",
      "https://example.com/statuslists/2",
      "https://example.com/statuslists/3"
   ]
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="eku">
      <name>X.509 Certificate Extended Key Usage Extension</name>
      <t><xref target="RFC5280"/> specifies the Extended Key Usage (EKU) X.509 certificate extension for use on end entity certificates. The extension indicates one or more purposes for which the certified public key is valid. The EKU extension can be used in conjunction with the Key Usage (KU) extension, which indicates the set of basic cryptographic operations for which the certified key may be used. A certificate's issuer explicitly delegates Status List Token signing authority by issuing an X.509 certificate containing the KeyPurposeId defined below in the extended key usage extension.
Other specifications <bcp14>MAY</bcp14> choose to re-use this OID for other status mechanisms under the condition that they are registered in the "JWT Status Mechanisms" or "CWT Status Mechanisms" registries.</t>
      <t>The following OID is defined for usage in the EKU extension:</t>
      <artwork><![CDATA[
  id-kp  OBJECT IDENTIFIER  ::=
       { iso(1) identified-organization(3) dod(6) internet(1)
         security(5) mechanisms(5) pkix(7) kp(3) }

  id-kp-oauthStatusSigning OBJECT IDENTIFIER ::= { id-kp TBD }
]]></artwork>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>Status List Tokens as defined in <xref target="status-list-token"/> only exist in cryptographically secured containers which allow checking the integrity and origin without relying on other factors such as transport security or web PKI.</t>
      <section anchor="correct-decoding-and-parsing-of-the-encoded-status-list">
        <name>Correct decoding and parsing of the encoded Status List</name>
        <t>Implementers should be particularly careful with the correct parsing and decoding of the Status List. Incorrect implementations might check the index on the wrong data or miscalculate the bit and byte index leading to an erroneous status of the Referenced Token. Beware, that bits are indexed (bit order) from least significant bit to most significant bit (also called "right to left") while bytes are indexed (byte order) in their natural incrementing byte order (usually written for display purpose from left to right). Endianness does not apply here because each status value fits within a single byte.</t>
        <t>Implementations <bcp14>SHOULD</bcp14> verify correctness using the test vectors given by this specification.</t>
      </section>
      <section anchor="security-guidance-for-jwt-and-cwt">
        <name>Security Guidance for JWT and CWT</name>
        <t>A Status List Token in the JWT format <bcp14>MUST</bcp14> follow the security considerations of <xref target="RFC7519"/> and the best current practices of <xref target="RFC8725"/>.</t>
        <t>A Status List Token in the CWT format <bcp14>MUST</bcp14> follow the security considerations of <xref target="RFC8392"/>.</t>
      </section>
      <section anchor="key-management">
        <name>Key Resolution and Trust Management</name>
        <t>This specification does not mandate specific methods for key resolution and trust management, however the following recommendations are made for specifications, profiles, or ecosystems that are planning to make use of the Status List mechanism:</t>
        <t>If the Issuer of the Referenced Token is the same entity as the Status Issuer, then the same key that is embedded into the Referenced Token may be used for the Status List Token. In this case the Status List Token may use:</t>
        <ul spacing="normal">
          <li>
            <t>the same <tt>x5c</tt> value or an <tt>x5t</tt>, <tt>x5t#S256</tt> or <tt>kid</tt> parameter referencing to the same key as used in the Referenced Token for JOSE.</t>
          </li>
          <li>
            <t>the same <tt>x5chain</tt> value or an <tt>x5t</tt> or <tt>kid</tt> parameter referencing to the same key as used in the Referenced Token for COSE.</t>
          </li>
        </ul>
        <t>Alternatively, the Status Issuer may use the same web-based key resolution that is used for the Referenced Token. In this case the Status List Token may use:</t>
        <ul spacing="normal">
          <li>
            <t>an <tt>x5u</tt>, <tt>jwks</tt>, <tt>jwks_uri</tt> or <tt>kid</tt> parameter referencing to a key using the same web-based resolution as used in the Referenced Token for JOSE.</t>
          </li>
          <li>
            <t>an <tt>x5u</tt> or <tt>kid</tt> parameter referencing to a key using the same web-based resolution as used in the Referenced Token for COSE.</t>
          </li>
        </ul>
        <artwork type="ascii-art"><![CDATA[
+--------+    host keys    +----------------------+
| Issuer |----------+----->| .well-known metadata |
+---+----+          |      +----------------------+
    |               |
    v update status |
+---------------+   |
| Status Issuer |---+
+---+-----------+
    |
    v provide Status List
+-----------------+
| Status Provider |
+-----------------+
]]></artwork>
        <t>If the Issuer of the Referenced Token is a different entity than the Status Issuer, then the keys used for the Status List Token may be cryptographically linked, e.g. by a Certificate Authority through an x.509 PKI. The certificate of the Issuer for the Referenced Token and the Status Issuer should be issued by the same Certificate Authority and the Status Issuer's certificate should utilize <xref target="eku">extended key usage</xref>.</t>
        <artwork type="ascii-art"><![CDATA[
+-----------------------+
| Certificate Authority |
+---+-------------------+
    |
    | authorize
    |
    |    +--------+
    +--->| Issuer |
    |    +-+------+
    |      |
    |      v update status
    |    +---------------+
    +--->| Status Issuer |
         +-+-------------+
           |
           v provide Status List
         +-----------------+
         | Status Provider |
         +-----------------+
]]></artwork>
      </section>
      <section anchor="redirects">
        <name>Redirection 3xx</name>
        <t>HTTP clients that follow 3xx (Redirection) status codes <bcp14>MUST</bcp14> be aware of the possible dangers of redirects, such as infinite redirection loops, since they can be used for denial-of-service attacks on clients. HTTP clients <bcp14>MUST</bcp14> follow the guidance provided in <xref section="15.4" sectionFormat="of" target="RFC9110"/> for handling redirects.</t>
      </section>
      <section anchor="security-ttl">
        <name>Expiration and Caching</name>
        <t>Expiration and caching information is conveyed via the <tt>exp</tt> and <tt>ttl</tt> claims as explained in <xref target="expiry-and-caching"/>. Clients <bcp14>SHOULD</bcp14> check that both values are within reasonable ranges before requesting new Status List Tokens based on these values to prevent accidentally creating unreasonable amounts of requests for a specific URL. Status Issuers could accidentally or maliciously use this mechanism to effectively DDoS the contained URL of the Status Provider.</t>
        <t>Reasonable values for both claims highly depend on the use-case requirements and clients should be configured with lower/upper bounds for these values that fit their respective use-cases.</t>
      </section>
      <section anchor="security-mac">
        <name>Status List Token Protection</name>
        <t>This specification allows both, digital signatures using asymmetric cryptography, and Message Authentication Codes (MAC) to be used to protect Status List Tokens. Implementers should only use MACs to secure the integrity of Status List Tokens if they fully understand the risks of MACs when compared to digital signatures and especially the requirements of their use-case scenarios. These use-cases typically represent deployments where Status Issuer and Relying Party have a trust relationship and the possibility to securely exchange keys out of band or are the same entity and no other entity needs to verify the Status List Token. We expect most deployments to use digital signatures for the protection of Status List Tokens and implementers <bcp14>SHOULD</bcp14> default to digital signatures if they are unsure.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <section anchor="privacy-issuer">
        <name>Observability of Issuers</name>
        <t>The main privacy consideration for a Status List, especially in the context of the Issuer-Holder-Verifier model <xref target="RFC9901"/>, is to prevent the Issuer from tracking the usage of the Referenced Token when the status is being checked. If an Issuer offers status information by referencing a specific token, this would enable the Issuer to create a profile for the issued token by correlating the date and identity of Relying Parties, that are requesting the status.</t>
        <t>The Status List approaches these privacy implications by integrating the status information of many Referenced Tokens into the same list. Therefore, the Issuer does not learn for which Referenced Token the Relying Party is requesting the Status List. The privacy of the Holder is protected by the anonymity within the set of Referenced Tokens in the Status List, also called herd privacy. This limits the possibilities of tracking by the Issuer.</t>
        <t>The herd privacy is depending on the number of entities within the Status List called its size. A larger size results in better privacy but also impacts the performance as more data has to be transferred to read the Status List.</t>
        <t>Additionally, the Issuer may analyse data from the HTTP request to identify the Relying Party, e.g. through the sender's IP address.</t>
        <t>This behaviour may be mitigated by:</t>
        <ul spacing="normal">
          <li>
            <t>private relay protocols or other mechanisms hiding the original sender like <xref target="RFC9458"/>.</t>
          </li>
          <li>
            <t>using trusted Third Party Hosting, see <xref target="third-party-hosting"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="issuer-tracking-of-referenced-tokens">
        <name>Issuer Tracking of Referenced Tokens</name>
        <t>An Issuer could maliciously or accidentally bypass the privacy benefits of the herd privacy by either:</t>
        <ul spacing="normal">
          <li>
            <t>Generating a unique Status List for every Referenced Token. By these means, the Issuer could maintain a mapping between Referenced Tokens and Status Lists and thus track the usage of Referenced Tokens by utilizing this mapping for the incoming requests.</t>
          </li>
          <li>
            <t>Encoding a unique URI in each Referenced Token which points to the underlying Status List. This may involve using URI components such as query parameters, unique path segments, or fragments to make the URI unique.</t>
          </li>
        </ul>
        <t>This malicious behavior can be detected by Relying Parties that request large amounts of Referenced Tokens by comparing the number of different Status Lists and their sizes with the volume of Referenced Tokens being verified.</t>
      </section>
      <section anchor="privacy-relying-party">
        <name>Observability of Relying Parties</name>
        <t>Once the Relying Party receives the Referenced Token, the Relying Party can request the Status List through the provided <tt>uri</tt> parameter and can validate the Referenced Token's status by looking up the corresponding <tt>index</tt>. However, the Relying Party may persistently store the <tt>uri</tt> and <tt>index</tt> of the Referenced Token to request the Status List again at a later time. By doing so regularly, the Relying Party may create a profile of the Referenced Token's validity status. This behaviour may be intended as a feature, e.g. for an identity proofing (e.g. Know-Your-Customer process in finance industry) that requires regular validity checks, but might also be abused in cases where this is not intended and unknown to the Holder, e.g. profiling the suspension of an employee credential.</t>
        <t>This behaviour could be mitigated by:</t>
        <ul spacing="normal">
          <li>
            <t>regular re-issuance of the Referenced Token, see <xref target="implementation-linkability"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="privacy-outsider">
        <name>Observability of Outsiders</name>
        <t>Outside actors may analyse the publicly available Status Lists to get information on the internal processes of the Issuer and its related business, e.g. number of customers or clients. This data may allow inferences on the total number of issued Referenced Tokens and the revocation rate. Additionally, actors may regularly fetch this data or use the historic data functionality to learn how these numbers change over time.</t>
        <t>This behaviour could be mitigated by:</t>
        <ul spacing="normal">
          <li>
            <t>disabling the historical data feature <xref target="historical-resolution"/></t>
          </li>
          <li>
            <t>disabling the Status List Aggregation <xref target="aggregation"/></t>
          </li>
          <li>
            <t>choosing non-sequential, pseudo-random or random indices</t>
          </li>
          <li>
            <t>using decoy entries to obfuscate the real number of Referenced Tokens within a Status List</t>
          </li>
          <li>
            <t>choosing to deploy and utilize multiple Status Lists simultaneously</t>
          </li>
        </ul>
      </section>
      <section anchor="unlinkability">
        <name>Unlinkability</name>
        <t>The tuple of uri and index inside the Referenced Token are unique and therefore is traceable data.</t>
        <section anchor="cross-party-collusion">
          <name>Cross-party Collusion</name>
          <t>Two or more colluding parties (e.g Relying Parties and or the Status Issuer) may link two transactions involving the same Referenced Token by comparing the status claims of received Referenced Tokens and therefore determine that they have interacted with the same Holder.</t>
          <t>To avoid privacy risks of this possible collusion, it is <bcp14>RECOMMENDED</bcp14> that Issuers provide the ability to issue batches of one-time-use Referenced Tokens, enabling Holders to use them in a single interaction with a Relying Party before discarding. See <xref target="implementation-linkability"/> to avoid further correlatable information by the values of <tt>uri</tt> and <tt>idx</tt>, Status Issuers are <bcp14>RECOMMENDED</bcp14> to:</t>
          <ul spacing="normal">
            <li>
              <t>choose non-sequential, pseudo-random or random indices</t>
            </li>
            <li>
              <t>use decoy entries to obfuscate the real number of Referenced Tokens within a Status List</t>
            </li>
            <li>
              <t>choose to deploy and utilize multiple Status Lists simultaneously</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="third-party-hosting">
        <name>External Status Provider for Privacy</name>
        <t>If the roles of the Status Issuer and the Status Provider are performed by different entities, this may give additional privacy assurances as the Issuer has no means to identify the Relying Party or its request.</t>
        <t>Third-Party hosting may also allow for greater scalability, as the Status List Tokens may be served by operators with greater resources, like CDNs, while still ensuring authenticity and integrity of Token Status List, as it is signed by the Status Issuer.</t>
      </section>
      <section anchor="privacy-historical">
        <name>Historical Resolution</name>
        <t>By default, this specification only supports providing Status List information for the most recent status information and does not allow the lookup of historical information like a validity state at a specific point in time. There exists optional support for a query parameter that allows this kind of historic lookup as described in <xref target="historical-resolution"/>. There are scenarios where such a functionality is necessary, but this feature should only be implemented when the scenario and the consequences of enabling historical resolution are fully understood.</t>
        <t>There are strong privacy concerns that have to be carefully taken into consideration when providing a mechanism that allows historic requests for status information - see <xref target="privacy-relying-party"/> for more details. Support for this functionality is optional and Implementers are <bcp14>RECOMMENDED</bcp14> to not support historic requests unless there are strong reasons to do so and after carefully considering the privacy implications.</t>
      </section>
      <section anchor="privacy-status-types">
        <name>Status Types</name>
        <t>As previously explained, there is the potential risk of observability by Relying Parties (see <xref target="privacy-relying-party"/>) and Outsiders (see <xref target="privacy-outsider"/>). That means that any Status Type that transports information beyond the routine statuses VALID and INVALID about a Referenced Token can leak information to other parties. This document defines one additional Status Type with "SUSPENDED" that conveys such additional information, but in practice all statuses other than VALID and INVALID are likely to contain information with privacy implications.</t>
        <t>Ecosystems that want to use other Status Types than "VALID" and "INVALID" should consider the possible leakage of data and profiling possibilities before doing so and evaluate if revocation and re-issuance might be a better fit for their use-case.</t>
      </section>
    </section>
    <section anchor="implementation">
      <name>Operational Considerations</name>
      <section anchor="implementation-lifecycle">
        <name>Token Lifecycle</name>
        <t>The lifetime of a Status List Token depends on the lifetime of its Referenced Tokens. Once all Referenced Tokens are expired, the Issuer may stop serving the Status List Token.</t>
      </section>
      <section anchor="implementation-linkability">
        <name>Linkability Mitigation</name>
        <t>Referenced Tokens may be regularly re-issued to mitigate the linkability of presentations to Relying Parties. In this case, every re-issued Referenced Token <bcp14>MUST</bcp14> have a fresh Status List entry in order to prevent the index value from becoming a possible source of correlation.</t>
        <t>Referenced Tokens may also be issued in batches and be presented by Holders in a one-time-use policy to avoid linkability. In this case, every Referenced Token <bcp14>MUST</bcp14> have a dedicated Status List entry and <bcp14>MAY</bcp14> be spread across multiple Status List Tokens. Batch revocation of a batch of Referenced Tokens might reveal that they are all members of the same batch.</t>
        <t>Beware that this mechanism solves linkability issues between Relying Parties but does not prevent traceability by Issuers.</t>
      </section>
      <section anchor="default-values-and-double-allocation">
        <name>Default Values and Double Allocation</name>
        <t>The Status Issuer is <bcp14>RECOMMENDED</bcp14> to initialize the Status List byte array with a default value provided as
an initialization parameter by the Issuer of the Referenced Token. The Issuer is <bcp14>RECOMMENDED</bcp14> to use a default value that represents the most common value for its Referenced Tokens to avoid an update during issuance (usually 0x00, VALID). This preserves the benefits from compression and effectively hides the number of managed Referenced Tokens since an unused index value can not be distinguished from a valid Referenced Token.</t>
        <t>The Status Issuer is <bcp14>RECOMMENDED</bcp14> to prevent double allocation, i.e. re-using the same <tt>uri</tt> and <tt>idx</tt> for multiple Referenced Tokens (since <tt>uri</tt> and <tt>idx</tt> form a unique identifier that might be used for tracking, see <xref target="privacy-considerations"/> for more details). The Status Issuer <bcp14>MUST</bcp14> prevent any unintended double allocation.</t>
      </section>
      <section anchor="status-list-size">
        <name>Status List Size</name>
        <t>The storage and transmission size of the Status Issuer's Status List Tokens depend on:</t>
        <ul spacing="normal">
          <li>
            <t>the size of the Status List, i.e. the number of Referenced Tokens</t>
          </li>
          <li>
            <t>the revocation rate and distribution of the Status List data (due to compression, revocation rates close to 0% or 100% lead to the lowest sizes while revocation rates closer to 50% and random distribution lead to the highest sizes)</t>
          </li>
          <li>
            <t>the lifetime of Referenced Tokens (shorter lifetimes allows for earlier retirement of Status List Tokens)</t>
          </li>
        </ul>
        <t>The Status List Issuer may increase the size of a Status List if it requires indices for additional Referenced Tokens. It is <bcp14>RECOMMENDED</bcp14> that the size of a Status List in bits is divisible in bytes (8 bits) without a remainder, i.e. <tt>size-in-bits</tt> % 8 = 0.</t>
        <t>The Status List Issuer may divide its Referenced Tokens up into multiple Status Lists to reduce the transmission size of an individual Status List Token. This may be useful for ecosystems where some entities operate in constrained environments, e.g. for mobile internet or embedded devices. The Status List Issuer may organize the Status List Tokens depending on the Referenced Token's expiry date to align their lifecycles and allow for easier retiring of Status List Tokens, however the Status Issuer must be aware of possible privacy risks due to correlations.</t>
      </section>
      <section anchor="external-status-issuer">
        <name>External Status Issuer</name>
        <t>If the roles of the Issuer of the Referenced Token and the Status Issuer are performed by different entities, this may allow for use cases that require revocation of Referenced Tokens to be managed by different entities, e.g. for regulatory or privacy reasons. In this scenario both parties must align on:</t>
        <ul spacing="normal">
          <li>
            <t>the key and trust management as described in <xref target="key-management"/></t>
          </li>
          <li>
            <t>parameters for the Status List
            </t>
            <ul spacing="normal">
              <li>
                <t>number of <tt>bits</tt> for the Status Type as described in <xref target="status-list"/></t>
              </li>
              <li>
                <t>update cycle of the Issuer used for <tt>ttl</tt> in the Status List Token as described in <xref target="status-list-token"/></t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="external-status-provider-for-scalability">
        <name>External Status Provider for Scalability</name>
        <t>If the roles of the Status Issuer and the Status Provider are performed by different entities, this may allow for greater scalability, as the Status List Tokens may be served by operators with greater resources, like CDNs. At the same time the authenticity and integrity of Token Status List is still guaranteed, as it is signed by the Status Issuer.</t>
      </section>
      <section anchor="expiry-and-caching">
        <name>Status List Update Interval and Caching</name>
        <t>Status Issuers have two options to communicate their update interval policy for the status of their Referenced Tokens:</t>
        <ul spacing="normal">
          <li>
            <t>the <tt>exp</tt> claim specifies an absolute timestamp, marking the point in time when the Status List expires and <bcp14>MUST NOT</bcp14> be relied upon any longer</t>
          </li>
          <li>
            <t>the <tt>ttl</tt> claim represents a duration to be interpreted relative to the time the Status List is fetched, indicating when a new version of the Status List may be available</t>
          </li>
        </ul>
        <t>Both <tt>ttl</tt> and <tt>exp</tt> are <bcp14>RECOMMENDED</bcp14> to be used by the Status Issuer.</t>
        <t>When fetching a Status List Token, Relying Parties must carefully evaluate how long a Status List is cached for. Collectively the <tt>iat</tt>, <tt>exp</tt> and <tt>ttl</tt> claims when present in a Status List Token communicate how long a Status List should be cached and should be considered valid for. Relying Parties have different options for caching the Status List:</t>
        <ul spacing="normal">
          <li>
            <t>After time of fetching, the Relying Party caches the Status List for time duration of <tt>ttl</tt> before making checks for updates. This method is <bcp14>RECOMMENDED</bcp14> to distribute the load for the Status Provider.</t>
          </li>
          <li>
            <t>After initial fetching, the Relying Party checks for updates at time of <tt>iat</tt> + <tt>ttl</tt>. This method ensures the most up-to-date information for critical use cases. The Relying Party should account a minimal offset due to the signing and distribution process of the Status Issuer.</t>
          </li>
          <li>
            <t>If no <tt>ttl</tt> is given, then Relying Party <bcp14>SHOULD</bcp14> check for updates latest after the time of <tt>exp</tt>.</t>
          </li>
        </ul>
        <t>Ultimately, it's the Relying Parties decision how often to check for updates, ecosystems may define their own guidelines and policies for updating the Status List information. Clients should ensure that <tt>exp</tt> and <tt>ttl</tt> are within reasonable bounds before creating requests to get a fresh Status List Token (see <xref target="security-ttl"/> for more details).</t>
        <t>The following diagram illustrates the relationship between these claims and how they are designed to influence caching:</t>
        <artwork type="ascii-art"><![CDATA[
       Time of        Check for        Check for        Check for
       Fetching        updates          updates          updates

 iat     |                |                |                |    exp
         |                |                |                |
  |      |                |                |                |     |
  |      |                |                |                |     |
  |      |                |                |                |     |
  |      |                |                |                |     |
  |      |      ttl       |      ttl       |      ttl       |     |
  |      | -------------> | -------------> | -------------> | --> |
  |      |                |                |                |     |
  |      |                |                |                |     |
  |                                                               |
--+---------------------------------------------------------------+-->
  |                                                               |
]]></artwork>
      </section>
      <section anchor="relying-parties-avoiding-correlatable-information">
        <name>Relying Parties avoiding correlatable Information</name>
        <t>If the Relying Party does not require the Referenced Token or the Status List Token for further processing, it is <bcp14>RECOMMENDED</bcp14> to delete correlatable information, in particular:</t>
        <ul spacing="normal">
          <li>
            <t>the <tt>status</tt> claim in the Referenced Token (after the validation)</t>
          </li>
          <li>
            <t>the Status List Token itself (after expiration or update)</t>
          </li>
        </ul>
        <t>The Relying Party should instead only keep the needed fields from the Referenced Token.</t>
      </section>
      <section anchor="status-list-formats">
        <name>Status List Formats</name>
        <t>This specification defines 2 different token formats of the Status List:</t>
        <ul spacing="normal">
          <li>
            <t>JWT</t>
          </li>
          <li>
            <t>CWT</t>
          </li>
        </ul>
        <t>This specification states no requirements to not mix different formats like a CBOR based Referenced Token using a JWT for the Status List, but the expectation is that within an ecosystem, a choice for specific formats is made.
Within such an ecosystem, only support for those selected variants is required and implementations should know what to expect via a profile.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="json-web-token-claims-registration">
        <name>JSON Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "JSON Web Token Claims" registry <xref target="IANA.JWT"/> established by <xref target="RFC7519"/>.</t>
        <section anchor="registry-contents">
          <name>Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Description: A JSON object containing a reference to a status mechanism from the JWT Status Mechanisms Registry.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-claim"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Description: A JSON object containing up-to-date status information on multiple tokens using the Token Status List mechanism.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-jwt"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Description: Time to Live</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-jwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="iana-registry">
        <name>JWT Status Mechanisms Registry</name>
        <t>This specification establishes the IANA "JWT Status Mechanisms" registry for JWT "status" member values and adds it to the "JSON Web Token (JWT)" registry group at https://www.iana.org/assignments/jwt. The registry records the status mechanism member and a reference to the specification that defines it.</t>
        <t>JWT Status Mechanisms are registered by Specification Required <xref target="RFC8126"/> after a three-week
review period on the jwt-reg-review@ietf.org mailing list, on the advice of one or more Designated Experts. To allow for the allocation of values prior to publication of the final version of a specification, the designated experts may approve registration once they are satisfied that the specification will be completed and published. However, if the specification is not completed and published in a timely manner, as determined by the designated experts, the designated experts may request that IANA withdraw the registration.</t>
        <t>Registration requests sent to the mailing list for review should use an appropriate subject (e.g., "Request to register JWT Status Mechanism: example").</t>
        <t>Within the review period, the designated experts will either approve or deny the registration request, communicating this decision to the review list and IANA. Denials should include an explanation and, if applicable, suggestions as to how to make the request successful. If the designated experts are not responsive, the registration requesters should contact IANA to escalate the process.</t>
        <t>Designated experts should apply at least the following criteria when reviewing proposed registrations:</t>
        <ul spacing="normal">
          <li>
            <t>they should not duplicate existing functionality</t>
          </li>
          <li>
            <t>they are likely generally applicable, as opposed to being used for a single application</t>
          </li>
          <li>
            <t>they are clear and fit the purpose of the registry</t>
          </li>
          <li>
            <t>they use and extend the terminology of this document to describe the mechanism</t>
          </li>
        </ul>
        <t>IANA must only accept registry updates from the designated experts and should direct all requests for registration to the review mailing list.</t>
        <t>In order to enable broadly informed review of registration decisions, there should be multiple designated experts to represent the perspectives of different applications using this specification. In cases where registration may be perceived as a conflict of interest for a particular expert, that expert should defer to the judgment of the other experts.</t>
        <t>The mailing list is used to enable public review of registration requests, which enables both designated experts and other interested parties to provide feedback on proposed registrations. Designated experts may allocate values prior to publication of the final specification. This allows authors to receive guidance from the designated experts early, so any identified issues can be fixed before the final specification is published.</t>
        <section anchor="registration-template">
          <name>Registration Template</name>
          <t>Status Mechanism Value:</t>
          <ul empty="true">
            <li>
              <t>The name requested (e.g., "status_list"). The name is case-sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts state that there is a compelling reason to allow an exception.</t>
            </li>
          </ul>
          <t>Status Mechanism Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the status mechanism.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For IETF Stream RFCs, list the IETF. For others, give the name of the responsible party. Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents. An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Mechanism Value: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Status Mechanism Description: A Token Status List containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="referenced-token-jose"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cbor-web-token-claims-registration">
        <name>CBOR Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "CBOR Web Token (CWT) Claims" registry <xref target="IANA.CWT"/> established by <xref target="RFC8392"/>.</t>
        <section anchor="registry-contents-1">
          <name>Registry Contents</name>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Description: A CBOR structure containing a reference to a status mechanism from the CWT Status Mechanisms Registry.</t>
            </li>
            <li>
              <t>JWT Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65535)</t>
            </li>
            <li>
              <t>Claim Value Type: map</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Reference: <xref target="status-claim"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Description: A CBOR structure containing up-to-date status information on multiple tokens using the Token Status List mechanism.</t>
            </li>
            <li>
              <t>JWT Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65533)</t>
            </li>
            <li>
              <t>Claim Value Type: map</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-cwt"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Description: Time to Live</t>
            </li>
            <li>
              <t>JWT Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65534)</t>
            </li>
            <li>
              <t>Claim Value Type: unsigned integer</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-cwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cwt-iana-registry">
        <name>CWT Status Mechanisms Registry</name>
        <t>This specification establishes the IANA "CWT Status Mechanisms" registry for CWT "status" member values and adds it to the "CBOR Web Token (CWT) Claims" registry group at https://www.iana.org/assignments/cwt. The registry records the status mechanism member and a reference to the specification that defines it.</t>
        <t>CWT Status Mechanisms are registered by Specification Required <xref target="RFC8126"/> after a three-week
review period on the cwt-reg-review@ietf.org mailing list, on the advice of one or more Designated Experts. To allow for the allocation of values prior to publication of the final version of a specification, the designated experts may approve registration once they are satisfied that the specification will be completed and published. However, if the specification is not completed and published in a timely manner, as determined by the designated experts, the designated experts may request that IANA withdraw the registration.</t>
        <t>Registration requests sent to the mailing list for review should use an appropriate subject (e.g., "Request to register CWT Status Mechanism: example").</t>
        <t>Within the review period, the designated experts will either approve or deny the registration request, communicating this decision to the review list and IANA. Denials should include an explanation and, if applicable, suggestions as to how to make the request successful. If the designated experts are not responsive, the registration requesters should contact IANA to escalate the process.</t>
        <t>Designated experts should at least apply the following criteria when reviewing proposed registrations:</t>
        <ul spacing="normal">
          <li>
            <t>they should not duplicate existing functionality</t>
          </li>
          <li>
            <t>they are likely generally applicable, as opposed to being used for a single application</t>
          </li>
          <li>
            <t>they are clear and fit the purpose of the registry</t>
          </li>
          <li>
            <t>they use and extend the terminology of this document to describe the mechanism</t>
          </li>
        </ul>
        <t>IANA must only accept registry updates from the designated experts and should direct all requests for registration to the review mailing list.</t>
        <t>In order to enable broadly informed review of registration decisions, there should be multiple designated experts to represent the perspectives of different applications using this specification. In cases where registration may be perceived as a conflict of interest for a particular expert, that expert should defer to the judgment of the other experts.</t>
        <t>The mailing list is used to enable public review of registration requests, which enables both designated experts and other interested parties to provide feedback on proposed registrations. Designated experts may allocate values prior to publication of the final specification. This allows authors to receive guidance from the designated experts early, so any identified issues can be fixed before the final specification is published.</t>
        <section anchor="registration-template-1">
          <name>Registration Template</name>
          <t>Status Mechanism Value:</t>
          <ul empty="true">
            <li>
              <t>The name requested (e.g., "status_list"). The name is case-sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts state that there is a compelling reason to allow an exception.</t>
            </li>
          </ul>
          <t>Status Mechanism Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the status mechanism.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For IETF Stream RFCs, list the IETF. For others, give the name of the responsible party. Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents. An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents-1">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Mechanism Value: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Status Mechanism Description: A Token Status List containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="referenced-token-cose"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="iana-status-types">
        <name>OAuth Status Types Registry</name>
        <t>This specification establishes the IANA "OAuth Status Types" registry for Status List values and adds it to the "OAuth Parameters" registry group at https://www.iana.org/assignments/oauth-parameters. The registry records a human-readable label, the bit representation and a common description for it.</t>
        <t>Status Types are registered by Specification Required <xref target="RFC8126"/> after a two-week
review period on the oauth-ext-review@ietf.org mailing list, on the advice of one or more Designated Experts. To allow for the allocation of values prior to publication of the final version of a specification, the designated experts may approve registration once they are satisfied that the specification will be completed and published. However, if the specification is not completed and published in a timely manner, as determined by the designated experts, the designated experts may request that IANA withdraw the registration.</t>
        <t>Registration requests sent to the mailing list for review should use an appropriate subject (e.g., "Request to register Status Type name: example").</t>
        <t>Within the review period, the designated experts will either approve or deny the registration request, communicating this decision to the review list and IANA. Denials should include an explanation and, if applicable, suggestions as to how to make the request successful. If the designated experts are not responsive, the registration requesters should contact IANA to escalate the process.</t>
        <t>Designated experts should apply at least the following criteria when reviewing proposed registrations:</t>
        <ul spacing="normal">
          <li>
            <t>they should not duplicate existing functionality</t>
          </li>
          <li>
            <t>they are likely generally applicable, as opposed to being used for a single application</t>
          </li>
          <li>
            <t>the Status Type Name is short, clear and using well-known terms</t>
          </li>
          <li>
            <t>the Status Type Description gives a good explanation for the intended use</t>
          </li>
          <li>
            <t>the Status Type value does not collide with existing values</t>
          </li>
        </ul>
        <t>IANA must only accept registry updates from the designated experts and should direct all requests for registration to the review mailing list.</t>
        <t>In order to enable broadly informed review of registration decisions, there should be multiple designated experts to represent the perspectives of different applications using this specification. In cases where registration may be perceived as a conflict of interest for a particular expert, that expert should defer to the judgment of the other experts.</t>
        <t>The mailing list is used to enable public review of registration requests, which enables both designated experts and other interested parties to provide feedback on proposed registrations. Designated experts may allocate values prior to publication of the final specification. This allows authors to receive guidance from the designated experts early, so any identified issues can be fixed before the final specification is published.</t>
        <section anchor="registration-template-2">
          <name>Registration Template</name>
          <t>Status Type Name:</t>
          <ul empty="true">
            <li>
              <t>The name is a human-readable case-insensitive label for the Status Type that helps to talk about the status of Referenced Token in common language.</t>
            </li>
          </ul>
          <t>Status Type Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the Status Type and optional examples.</t>
            </li>
          </ul>
          <t>Status Type value:</t>
          <ul empty="true">
            <li>
              <t>The bit representation of the Status Type in a byte hex representation. Valid Status Type values range from 0x00-0xFF. Values are filled up with zeros if they have less than 8 bits.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For IETF Stream RFCs, list the IETF. For others, give the name of the responsible party. Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents. An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents-2">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: VALID</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is valid, correct or legal.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x00</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: INVALID</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is revoked, annulled, taken back, recalled or cancelled.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x01</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: SUSPENDED</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is temporarily invalid, hanging or debarred from privilege. This state is usually temporary.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x02</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: APPLICATION_SPECIFIC</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is application specific.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x03</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Status Type Name: APPLICATION_SPECIFIC</t>
            </li>
            <li>
              <t>Status Type Description: The status of the Referenced Token is application specific.</t>
            </li>
            <li>
              <t>Status Type value: <tt>0x0C-0x0F</tt></t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-types"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
        </section>
      </section>
      <section anchor="oauth-parameters-registration">
        <name>OAuth Parameters Registration</name>
        <t>This specification requests registration of the following values in the IANA "OAuth Authorization Server Metadata" registry <xref target="IANA.OAuth.Params"/> established by <xref target="RFC8414"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Metadata Name: status_list_aggregation_endpoint</t>
          </li>
          <li>
            <t>Metadata Description: URL of the Authorization Server aggregating OAuth Token Status List URLs for token status management.</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Reference: <xref target="aggregation"/> of this specification</t>
          </li>
        </ul>
      </section>
      <section anchor="media-type-registration">
        <name>Media Type Registration</name>
        <t>This section requests registration of the following media types <xref target="RFC2046"/> in
the "Media Types" registry <xref target="IANA.MediaTypes"/> in the manner described
in <xref target="RFC6838"/>.</t>
        <t>To indicate that the content is a JWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: See <xref target="status-list-token-jwt"/> of this specification</t>
          </li>
          <li>
            <t>Security considerations: See <xref target="Security"/> of this specification</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information: n/a</t>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: OAuth WG mailing list, oauth@ietf.org</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: OAuth WG mailing list, oauth@ietf.org</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a CWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: See <xref target="status-list-token-cwt"/> of this specification</t>
          </li>
          <li>
            <t>Security considerations: See <xref target="Security"/> of this specification</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information: n/a</t>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: OAuth WG mailing list, oauth@ietf.org</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: OAuth WG mailing list, oauth@ietf.org</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
      </section>
      <section anchor="coap-content-type">
        <name>CoAP Content-Format Registrations</name>
        <t>IANA is requested to register the following Content-Format numbers in
the "CoAP Content-Formats" sub-registry, within the "Constrained
RESTful Environments (CoRE) Parameters" Registry <xref target="IANA.Core.Params"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Content Type: application/statuslist+cwt</t>
          </li>
          <li>
            <t>Content Coding: -</t>
          </li>
          <li>
            <t>ID: TBD</t>
          </li>
          <li>
            <t>Reference: this specification</t>
          </li>
        </ul>
      </section>
      <section anchor="x509-certificate-extended-key-purpose-oid-registration">
        <name>X.509 Certificate Extended Key Purpose OID Registration</name>
        <t>IANA is requested to register the following OID "1.3.6.1.5.5.7.3.TBD" with a description of "id-kp-oauthStatusSigning" in the "SMI Security for PKIX Extended Key Purpose" registry (1.3.6.1.5.5.7.3). This OID is defined in <xref target="eku"/>.</t>
        <t>IANA is requested to register the following OID "1.3.6.1.5.5.7.0.TBD" with a description of "id-mod-oauth-status-signing-eku" in the "SMI Security for PKIX Module Identifier" registry (1.3.6.1.5.5.7.0). This OID is defined in <xref target="asn1-module"/>.</t>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank
Andrii Deinega,
Brian Campbell,
Dan Moore,
Denis Pinkas,
Filip Skokan,
Francesco Marino,
Giuseppe De Marco,
Hannes Tschofenig,
Kristina Yasuda,
Markus Kreusch,
Martijn Haring,
Michael B. Jones,
Micha Kraus,
Michael Schwartz,
Mike Prorock,
Mirko Mollik,
Oliver Terbu,
Orie Steele,
Rifaat Shekh-Yusef,
Rohan Mahy,
Takahiko Kawasaki,
Timo Glastra
and
Torsten Lodderstedt</t>
      <t>for their valuable contributions, discussions and feedback to this specification.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1950">
          <front>
            <title>ZLIB Compressed Data Format Specification version 3.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <author fullname="J-L. Gailly" surname="J-L. Gailly"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1950"/>
          <seriesInfo name="DOI" value="10.17487/RFC1950"/>
        </reference>
        <reference anchor="RFC1951">
          <front>
            <title>DEFLATE Compressed Data Format Specification version 1.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1951"/>
          <seriesInfo name="DOI" value="10.17487/RFC1951"/>
        </reference>
        <reference anchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC9596">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) "typ" (type) Header Parameter</title>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <author fullname="O. Steele" initials="O." surname="Steele"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This specification adds the equivalent of the JSON Object Signing and Encryption (JOSE) "typ" (type) header parameter to CBOR Object Signing and Encryption (COSE). This enables the benefits of explicit typing (as defined in RFC 8725, "JSON Web Token Best Current Practices") to be brought to COSE objects. The syntax of the COSE type header parameter value is the same as the existing COSE content type header parameter.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9596"/>
          <seriesInfo name="DOI" value="10.17487/RFC9596"/>
        </reference>
        <reference anchor="CORS" target="https://fetch.spec.whatwg.org/commit-snapshots/4775fcb48042c8411df497c0b7cf167b4240004f/#http-cors-protocol">
          <front>
            <title>Fetch Living Standard</title>
            <author>
              <organization>WHATWG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="X.680">
          <front>
            <title>Information Technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
        </reference>
        <reference anchor="X.690">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7662">
          <front>
            <title>OAuth 2.0 Token Introspection</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This specification defines a method for a protected resource to query an OAuth 2.0 authorization server to determine the active state of an OAuth 2.0 token and to determine meta-information about this token. OAuth 2.0 deployments can use this method to convey information about the authorization context of the token from the authorization server to the protected resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7662"/>
          <seriesInfo name="DOI" value="10.17487/RFC7662"/>
        </reference>
        <reference anchor="RFC7800">
          <front>
            <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7800"/>
          <seriesInfo name="DOI" value="10.17487/RFC7800"/>
        </reference>
        <reference anchor="RFC8414">
          <front>
            <title>OAuth 2.0 Authorization Server Metadata</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <date month="June" year="2018"/>
            <abstract>
              <t>This specification defines a metadata format that an OAuth 2.0 client can use to obtain the information needed to interact with an OAuth 2.0 authorization server, including its endpoint locations and authorization server capabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8414"/>
          <seriesInfo name="DOI" value="10.17487/RFC8414"/>
        </reference>
        <reference anchor="RFC9458">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9458"/>
          <seriesInfo name="DOI" value="10.17487/RFC9458"/>
        </reference>
        <reference anchor="RFC9901">
          <front>
            <title>Selective Disclosure for JSON Web Tokens</title>
            <author fullname="D. Fett" initials="D." surname="Fett"/>
            <author fullname="K. Yasuda" initials="K." surname="Yasuda"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <date month="November" year="2025"/>
            <abstract>
              <t>This specification defines a mechanism for the selective disclosure
of individual elements of a JSON data structure used as the payload
of a JSON Web Signature (JWS). The primary use case is the selective
disclosure of JSON Web Token (JWT) claims.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9901"/>
          <seriesInfo name="DOI" value="10.17487/RFC9901"/>
        </reference>
        <reference anchor="SD-JWT.VC">
          <front>
            <title>SD-JWT-based Verifiable Digital Credentials (SD-JWT VC)</title>
            <author fullname="Oliver Terbu" initials="O." surname="Terbu">
              <organization>MATTR</organization>
            </author>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete Inc.</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="26" month="February" year="2026"/>
            <abstract>
              <t>   This specification describes data formats as well as validation and
   processing rules to express Verifiable Digital Credentials with JSON
   payloads with and without selective disclosure based on the SD-JWT
   [RFC9901] format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-sd-jwt-vc-15"/>
        </reference>
        <reference anchor="SD-CWT">
          <front>
            <title>Selective Disclosure CBOR Web Tokens (SD-CWT)</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>mesur.io</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Rohan Mahy" initials="R." surname="Mahy">
         </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This specification describes a data minimization technique for use
   with CBOR Web Tokens (CWTs).  The approach is inspired by the
   Selective Disclosure JSON Web Token (SD-JWT), with changes to align
   with CBOR Object Signing and Encryption (COSE) and CWTs.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-spice-sd-cwt-07"/>
        </reference>
        <reference anchor="IANA.MediaTypes" target="https://www.iana.org/assignments/media-types/media-types.xhtml">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JWT" target="https://www.iana.org/assignments/jwt/jwt.xhtml">
          <front>
            <title>JSON Web Token Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.CWT" target="https://www.iana.org/assignments/cwt/cwt.xhtml">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.OAuth.Params" target="https://www.iana.org/assignments/oauth-parameters/oauth-parameters.xhtml#authorization-server-metadata">
          <front>
            <title>OAuth Authorization Server Metadata</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.Core.Params" target="https://www.iana.org/assignments/core-parameters/core-parameters.xhtml">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ISO.mdoc" target="https://www.iso.org/standard/69084.html">
          <front>
            <title>ISO/IEC 18013-5:2021 ISO-compliant driving licence</title>
            <author>
              <organization>ISO/IEC JTC 1/SC 17</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="smith2020let" target="https://www.ndss-symposium.org/ndss-paper/lets-revoke-scalable-global-certificate-revocation/">
          <front>
            <title>Let's revoke: Scalable global certificate revocation</title>
            <author initials="T." surname="Smith" fullname="Trevor Smith">
              <organization>Brigham Young University</organization>
            </author>
            <author initials="L." surname="Dickinson" fullname="Luke Dickinson">
              <organization>Brigham Young University</organization>
            </author>
            <author initials="K." surname="Seamons" fullname="Kent Seamons">
              <organization>Brigham Young University</organization>
            </author>
            <date>n.d.</date>
          </front>
          <seriesInfo name="Network and Distributed Systems Security (NDSS) Symposium 2020" value=""/>
        </reference>
        <reference anchor="W3C.SL" target="https://www.w3.org/TR/vc-bitstring-status-list/">
          <front>
            <title>W3C Bitstring Status List v1.0</title>
            <author initials="D." surname="Longley" fullname="Dave Longley">
              <organization>Digital Bazaar</organization>
            </author>
            <author initials="M." surname="Sporny" fullname="Manu Sporny">
              <organization>Digital Bazaar</organization>
            </author>
            <author initials="O." surname="Steele" fullname="Orie Steele">
              <organization>Transmute</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9562">
          <front>
            <title>Universally Unique IDentifiers (UUIDs)</title>
            <author fullname="K. Davis" initials="K." surname="Davis"/>
            <author fullname="B. Peabody" initials="B." surname="Peabody"/>
            <author fullname="P. Leach" initials="P." surname="Leach"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This specification defines UUIDs (Universally Unique IDentifiers) --
also known as GUIDs (Globally Unique IDentifiers) -- and a Uniform
Resource Name namespace for UUIDs. A UUID is 128 bits long and is
intended to guarantee uniqueness across space and time. UUIDs were
originally used in the Apollo Network Computing System (NCS), later
in the Open Software Foundation's (OSF's) Distributed Computing
Environment (DCE), and then in Microsoft Windows platforms.</t>
              <t>This specification is derived from the OSF DCE specification with the
kind permission of the OSF (now known as "The Open Group"). Information from earlier versions of the OSF DCE specification have
been incorporated into this document. This document obsoletes RFC
4122.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9562"/>
          <seriesInfo name="DOI" value="10.17487/RFC9562"/>
        </reference>
      </references>
    </references>
    <?line 1541?>

<section anchor="asn1-module">
      <name>ASN.1 Module</name>
      <t>The following module adheres to ASN.1 specifications <xref target="X.680"/> and <xref target="X.690"/>. It defines the OID used for OAuth Status Mechanism Key Extended Key Usage.</t>
      <sourcecode markers="true"><![CDATA[

  OauthStatusSigning-EKU
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-oauth-status-signing-eku (TBD) }

  DEFINITIONS IMPLICIT TAGS ::=
  BEGIN

  -- OID Arc

  id-kp OBJECT IDENTIFIER ::=
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) kp(3) }

  -- OAuth Extended Key Usage

  id-kp-oauthStatusSigning OBJECT IDENTIFIER ::= { id-kp TBD }

  END

]]></sourcecode>
    </section>
    <section anchor="size-comparison">
      <name>Size Comparison</name>
      <t>The following tables show a size comparison for a Status List (compressed byte array as defined in <xref target="status-list-byte-array"/>) and a compressed Byte Array of UUIDs <xref target="RFC9562"/> (as an approximation to the list of IDs of Referenced Tokens in a Certificate Revocation List). Readers must be aware that these are not sizes for complete Status List Tokens in JSON/CBOR nor Certificate Revocation Lists (CRLs), as they don't contain metadata, certificates, and signatures.</t>
      <t>If no further metadata is provided in Status List Tokens or CRLs, then the size of Status Lists or arrays of Certificate ids (represented as UUIDs) will be the main factors deciding on the overall size of a Status List Token or CRL, respectively.</t>
      <section numbered="false" anchor="size-of-status-lists-for-varying-amount-of-entries-and-revocation-rates">
        <name>Size of Status Lists for varying amount of entries and revocation rates</name>
        <table>
          <name>Status List Size examples for varying amount of entries and revocation rates</name>
          <thead>
            <tr>
              <th align="left">Size</th>
              <th align="left">0.01%</th>
              <th align="left">0.1%</th>
              <th align="left">1%</th>
              <th align="left">2%</th>
              <th align="left">5%</th>
              <th align="left">10%</th>
              <th align="left">25%</th>
              <th align="left">50%</th>
              <th align="left">75%</th>
              <th align="left">100%</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">100k</td>
              <td align="left">81 B</td>
              <td align="left">252 B</td>
              <td align="left">1.4 KB</td>
              <td align="left">2.3 KB</td>
              <td align="left">4.5 KB</td>
              <td align="left">6.9 KB</td>
              <td align="left">10.2 KB</td>
              <td align="left">12.2 KB</td>
              <td align="left">10.2 KB</td>
              <td align="left">35 B</td>
            </tr>
            <tr>
              <td align="left">1M</td>
              <td align="left">442 B</td>
              <td align="left">2.2 KB</td>
              <td align="left">13.7 KB</td>
              <td align="left">23.0 KB</td>
              <td align="left">43.9 KB</td>
              <td align="left">67.6 KB</td>
              <td align="left">102.2 KB</td>
              <td align="left">122.1 KB</td>
              <td align="left">102.4 KB</td>
              <td align="left">144 B</td>
            </tr>
            <tr>
              <td align="left">10M</td>
              <td align="left">3.8 KB</td>
              <td align="left">21.1 KB</td>
              <td align="left">135.4 KB</td>
              <td align="left">230.0 KB</td>
              <td align="left">437.0 KB</td>
              <td align="left">672.9 KB</td>
              <td align="left">1023.4 KB</td>
              <td align="left">1.2 MB</td>
              <td align="left">1023.5 KB</td>
              <td align="left">1.2 KB</td>
            </tr>
            <tr>
              <td align="left">100M</td>
              <td align="left">38.3 KB</td>
              <td align="left">213.0 KB</td>
              <td align="left">1.3 MB</td>
              <td align="left">2.2 MB</td>
              <td align="left">4.3 MB</td>
              <td align="left">6.6 MB</td>
              <td align="left">10.0 MB</td>
              <td align="left">11.9 MB</td>
              <td align="left">10.0 MB</td>
              <td align="left">11.9 KB</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section numbered="false" anchor="size-of-compressed-array-of-uuidv4-128-bit-uuids-for-varying-amount-of-entries-and-revocation-rates">
        <name>Size of compressed array of UUIDv4 (128-bit UUIDs) for varying amount of entries and revocation rates</name>
        <t>This is a simple approximation of a CRL using an array of UUIDs without any additional metadata (128-bit UUID per revoked entry).</t>
        <table>
          <name>Size examples for 128-bit UUIDs for varying amount of entries and revocation rates</name>
          <thead>
            <tr>
              <th align="left">Size</th>
              <th align="left">0.01%</th>
              <th align="left">0.1%</th>
              <th align="left">1%</th>
              <th align="left">2%</th>
              <th align="left">5%</th>
              <th align="left">10%</th>
              <th align="left">25%</th>
              <th align="left">50%</th>
              <th align="left">75%</th>
              <th align="left">100%</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">100k</td>
              <td align="left">219 B</td>
              <td align="left">1.6 KB</td>
              <td align="left">15.4 KB</td>
              <td align="left">29.7 KB</td>
              <td align="left">78.1 KB</td>
              <td align="left">154.9 KB</td>
              <td align="left">392.9 KB</td>
              <td align="left">783.1 KB</td>
              <td align="left">1.1 MB</td>
              <td align="left">1.5 MB</td>
            </tr>
            <tr>
              <td align="left">1M</td>
              <td align="left">1.6 KB</td>
              <td align="left">16.4 KB</td>
              <td align="left">157.7 KB</td>
              <td align="left">310.4 KB</td>
              <td align="left">781 KB</td>
              <td align="left">1.5 MB</td>
              <td align="left">3.8 MB</td>
              <td align="left">7.6 MB</td>
              <td align="left">11.4 MB</td>
              <td align="left">15.3 MB</td>
            </tr>
            <tr>
              <td align="left">10M</td>
              <td align="left">15.3 KB</td>
              <td align="left">155.9 KB</td>
              <td align="left">1.5 MB</td>
              <td align="left">3.1 MB</td>
              <td align="left">7.6 MB</td>
              <td align="left">15.2 MB</td>
              <td align="left">38.2 MB</td>
              <td align="left">76.3 MB</td>
              <td align="left">114.4 MB</td>
              <td align="left">152.6 MB</td>
            </tr>
            <tr>
              <td align="left">100M</td>
              <td align="left">157.6 KB</td>
              <td align="left">1.5 MB</td>
              <td align="left">15.3 MB</td>
              <td align="left">30.5 MB</td>
              <td align="left">76.3 MB</td>
              <td align="left">152.6 MB</td>
              <td align="left">381.4 MB</td>
              <td align="left">762.9 MB</td>
              <td align="left">1.1 GB</td>
              <td align="left">1.5 GB</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="test-vectors">
      <name>Test vectors for Status List encoding</name>
      <t>All examples here are given in the form of JSON or CBOR payloads. The examples are encoded according to <xref target="status-list-json"/> for JSON and <xref target="status-list-cbor"/> for CBOR. The CBOR examples are displayed as hex values.</t>
      <t>All values that are not mentioned for the examples below can be assumed to be 0 (VALID). All examples are initialized with a size of 2^20 entries.</t>
      <section anchor="bit-status-list">
        <name>1-bit Status List</name>
        <t>The following example uses a 1-bit Status List (2 possible values):</t>
        <artwork><![CDATA[
status[0] = 0b1
status[1993] = 0b1
status[25460] = 0b1
status[159495] = 0b1
status[495669] = 0b1
status[554353] = 0b1
status[645645] = 0b1
status[723232] = 0b1
status[854545] = 0b1
status[934534] = 0b1
status[1000345] = 0b1
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 1,
  "lst": "eNrt3AENwCAMAEGogklACtKQPg9LugC9k_ACvreiogE
  AAKkeCQAAAAAAAAAAAAAAAAAAAIBylgQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAXG9IAAAAAAAAAPwsJAAAAAAAAAAAAAAAvhsSAAAAAAAAAAA
  A7KpLAAAAAAAAAAAAAAAAAAAAAJsLCQAAAAAAAAAAADjelAAAAAAAAAAAKjDMAQAAA
  ACAZC8L2AEb"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[
a2646269747301636c737458bd78daeddc010dc0200c0041a88249400ad2903e0f4b
ba00bd93f002beb7a2a2010000a91e09000000000000000000000000000000807296
04000000000000000000000000000000000000000000000000000000000000000000
000000000000005c6f4800000000000000fc2c240000000000000000000000be1b12
000000000000000000ecaa4b000000000000000000000000000000009b0b09000000
00000000000038de9400000000000000002a30cc010000000080642f0bd8011b
]]></artwork>
      </section>
      <section anchor="bit-status-list-1">
        <name>2-bit Status List</name>
        <t>The following example uses a 2-bit Status List (4 possible values):</t>
        <artwork><![CDATA[
status[0] = 0b01
status[1993] = 0b10
status[25460]= 0b01
status[159495] = 0b11
status[495669] = 0b01
status[554353] = 0b01
status[645645] = 0b10
status[723232] = 0b01
status[854545] = 0b01
status[934534] = 0b10
status[1000345] = 0b11
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 2,
  "lst": "eNrt2zENACEQAEEuoaBABP5VIO01fCjIHTMStt9ovGV
  IAAAAAABAbiEBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEB5WwIAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAID0ugQAAAAAAAAAAAAAAAAAQG12SgAAA
  AAAAAAAAAAAAAAAAAAAAAAAAOCSIQEAAAAAAAAAAAAAAAAAAAAAAAD8ExIAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwJEuAQAAAAAAAAAAAAAAAAAAAAAAAMB9S
  wIAAAAAAAAAAAAAAAAAAACoYUoAAAAAAAAAAAAAAEBqH81gAQw"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[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]]></artwork>
      </section>
      <section anchor="bit-status-list-2">
        <name>4-bit Status List</name>
        <t>The following example uses a 4-bit Status List (16 possible values):</t>
        <artwork><![CDATA[
status[0] = 0b0001
status[1993] = 0b0010
status[35460] = 0b0011
status[459495] = 0b0100
status[595669] = 0b0101
status[754353] = 0b0110
status[845645] = 0b0111
status[923232] = 0b1000
status[924445] = 0b1001
status[934534] = 0b1010
status[1004534] = 0b1011
status[1000345] = 0b1100
status[1030203] = 0b1101
status[1030204] = 0b1110
status[1030205] = 0b1111
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 4,
  "lst": "eNrt0EENgDAQADAIHwImkIIEJEwCUpCEBBQRHOy35Li
  1EjoOQGabAgAAAAAAAAAAAAAAAAAAACC1SQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABADrsCAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAADoxaEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIIoCgAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACArpwKAAAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAAAAAAAGhqVkAzlwIAAAAAiGVRAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAAAAAAAAAAAAAAABx3AoAgLpVAQAAAAAAAAAAAAAAwM89rwMAAAAAAAAAA
  AjsA9xMBMA"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[
a2646269747304636c737459024878daedd0410d8030100030081f0226908204244c
025290840414111cecb7e4b8b5123a0e40669b020000000000000000000000000000
0020b549010000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000
0000000000400ebb0200000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000
000000000000e8c5a100000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000082280a00000000000000000000000000
00000000000000000000000000000000000000000000000000000000000080ae9c0a
00000000000000000000000000000000000000000000000000000000000000000000
000000686a5640339702000000008865510000000000000000000000000000000000
00000000000000000000000000000071dc0a0080ba55010000000000000000000000
c0cf3daf03000000000000000008ec03dc4c04c0
]]></artwork>
      </section>
      <section anchor="bit-status-list-3">
        <name>8-bit Status List</name>
        <t>The following example uses an 8-bit Status List (256 possible values):</t>
        <artwork><![CDATA[
status[233478] = 0b00000000
status[52451] = 0b00000001
status[576778] = 0b00000010
status[513575] = 0b00000011
status[468106] = 0b00000100
status[292632] = 0b00000101
status[214947] = 0b00000110
status[182323] = 0b00000111
status[884834] = 0b00001000
status[66653] = 0b00001001
status[62489] = 0b00001010
status[196493] = 0b00001011
status[458517] = 0b00001100
status[487925] = 0b00001101
status[55649] = 0b00001110
status[416992] = 0b00001111
status[879796] = 0b00010000
status[462297] = 0b00010001
status[942059] = 0b00010010
status[583408] = 0b00010011
status[13628] = 0b00010100
status[334829] = 0b00010101
status[886286] = 0b00010110
status[713557] = 0b00010111
status[582738] = 0b00011000
status[326064] = 0b00011001
status[451545] = 0b00011010
status[705889] = 0b00011011
status[214350] = 0b00011100
status[194502] = 0b00011101
status[796765] = 0b00011110
status[202828] = 0b00011111
status[752834] = 0b00100000
status[721327] = 0b00100001
status[554740] = 0b00100010
status[91122] = 0b00100011
status[963483] = 0b00100100
status[261779] = 0b00100101
status[793844] = 0b00100110
status[165255] = 0b00100111
status[614839] = 0b00101000
status[758403] = 0b00101001
status[403258] = 0b00101010
status[145867] = 0b00101011
status[96100] = 0b00101100
status[477937] = 0b00101101
status[606890] = 0b00101110
status[167335] = 0b00101111
status[488197] = 0b00110000
status[211815] = 0b00110001
status[797182] = 0b00110010
status[582952] = 0b00110011
status[950870] = 0b00110100
status[765108] = 0b00110101
status[341110] = 0b00110110
status[776325] = 0b00110111
status[745056] = 0b00111000
status[439368] = 0b00111001
status[559893] = 0b00111010
status[149741] = 0b00111011
status[358903] = 0b00111100
status[513405] = 0b00111101
status[342679] = 0b00111110
status[969429] = 0b00111111
status[795775] = 0b01000000
status[566121] = 0b01000001
status[460566] = 0b01000010
status[680070] = 0b01000011
status[117310] = 0b01000100
status[480348] = 0b01000101
status[67319] = 0b01000110
status[661552] = 0b01000111
status[841303] = 0b01001000
status[561493] = 0b01001001
status[138807] = 0b01001010
status[442463] = 0b01001011
status[659927] = 0b01001100
status[445910] = 0b01001101
status[1046963] = 0b01001110
status[829700] = 0b01001111
status[962282] = 0b01010000
status[299623] = 0b01010001
status[555493] = 0b01010010
status[292826] = 0b01010011
status[517215] = 0b01010100
status[551009] = 0b01010101
status[898490] = 0b01010110
status[837603] = 0b01010111
status[759161] = 0b01011000
status[459948] = 0b01011001
status[290102] = 0b01011010
status[1034977] = 0b01011011
status[190650] = 0b01011100
status[98810] = 0b01011101
status[229950] = 0b01011110
status[320531] = 0b01011111
status[335506] = 0b01100000
status[885333] = 0b01100001
status[133227] = 0b01100010
status[806915] = 0b01100011
status[800313] = 0b01100100
status[981571] = 0b01100101
status[527253] = 0b01100110
status[24077] = 0b01100111
status[240232] = 0b01101000
status[559572] = 0b01101001
status[713399] = 0b01101010
status[233941] = 0b01101011
status[615514] = 0b01101100
status[911768] = 0b01101101
status[331680] = 0b01101110
status[951527] = 0b01101111
status[6805] = 0b01110000
status[552366] = 0b01110001
status[374660] = 0b01110010
status[223159] = 0b01110011
status[625884] = 0b01110100
status[417146] = 0b01110101
status[320527] = 0b01110110
status[784154] = 0b01110111
status[338792] = 0b01111000
status[1199] = 0b01111001
status[679804] = 0b01111010
status[1024680] = 0b01111011
status[40845] = 0b01111100
status[234603] = 0b01111101
status[761225] = 0b01111110
status[644903] = 0b01111111
status[502167] = 0b10000000
status[121477] = 0b10000001
status[505144] = 0b10000010
status[165165] = 0b10000011
status[179628] = 0b10000100
status[1019195] = 0b10000101
status[145149] = 0b10000110
status[263738] = 0b10000111
status[269256] = 0b10001000
status[996739] = 0b10001001
status[346296] = 0b10001010
status[555864] = 0b10001011
status[887384] = 0b10001100
status[444173] = 0b10001101
status[421844] = 0b10001110
status[653716] = 0b10001111
status[836747] = 0b10010000
status[783119] = 0b10010001
status[918762] = 0b10010010
status[946835] = 0b10010011
status[253764] = 0b10010100
status[519895] = 0b10010101
status[471224] = 0b10010110
status[134272] = 0b10010111
status[709016] = 0b10011000
status[44112] = 0b10011001
status[482585] = 0b10011010
status[461829] = 0b10011011
status[15080] = 0b10011100
status[148883] = 0b10011101
status[123467] = 0b10011110
status[480125] = 0b10011111
status[141348] = 0b10100000
status[65877] = 0b10100001
status[692958] = 0b10100010
status[148598] = 0b10100011
status[499131] = 0b10100100
status[584009] = 0b10100101
status[1017987] = 0b10100110
status[449287] = 0b10100111
status[277478] = 0b10101000
status[991262] = 0b10101001
status[509602] = 0b10101010
status[991896] = 0b10101011
status[853666] = 0b10101100
status[399318] = 0b10101101
status[197815] = 0b10101110
status[203278] = 0b10101111
status[903979] = 0b10110000
status[743015] = 0b10110001
status[888308] = 0b10110010
status[862143] = 0b10110011
status[979421] = 0b10110100
status[113605] = 0b10110101
status[206397] = 0b10110110
status[127113] = 0b10110111
status[844358] = 0b10111000
status[711569] = 0b10111001
status[229153] = 0b10111010
status[521470] = 0b10111011
status[401793] = 0b10111100
status[398896] = 0b10111101
status[940810] = 0b10111110
status[293983] = 0b10111111
status[884749] = 0b11000000
status[384802] = 0b11000001
status[584151] = 0b11000010
status[970201] = 0b11000011
status[523882] = 0b11000100
status[158093] = 0b11000101
status[929312] = 0b11000110
status[205329] = 0b11000111
status[106091] = 0b11001000
status[30949] = 0b11001001
status[195586] = 0b11001010
status[495723] = 0b11001011
status[348779] = 0b11001100
status[852312] = 0b11001101
status[1018463] = 0b11001110
status[1009481] = 0b11001111
status[448260] = 0b11010000
status[841042] = 0b11010001
status[122967] = 0b11010010
status[345269] = 0b11010011
status[794764] = 0b11010100
status[4520] = 0b11010101
status[818773] = 0b11010110
status[556171] = 0b11010111
status[954221] = 0b11011000
status[598210] = 0b11011001
status[887110] = 0b11011010
status[1020623] = 0b11011011
status[324632] = 0b11011100
status[398244] = 0b11011101
status[622241] = 0b11011110
status[456551] = 0b11011111
status[122648] = 0b11100000
status[127837] = 0b11100001
status[657676] = 0b11100010
status[119884] = 0b11100011
status[105156] = 0b11100100
status[999897] = 0b11100101
status[330160] = 0b11100110
status[119285] = 0b11100111
status[168005] = 0b11101000
status[389703] = 0b11101001
status[143699] = 0b11101010
status[142524] = 0b11101011
status[493258] = 0b11101100
status[846778] = 0b11101101
status[251420] = 0b11101110
status[516351] = 0b11101111
status[83344] = 0b11110000
status[171931] = 0b11110001
status[879178] = 0b11110010
status[663475] = 0b11110011
status[546865] = 0b11110100
status[428362] = 0b11110101
status[658891] = 0b11110110
status[500560] = 0b11110111
status[557034] = 0b11111000
status[830023] = 0b11111001
status[274471] = 0b11111010
status[629139] = 0b11111011
status[958869] = 0b11111100
status[663071] = 0b11111101
status[152133] = 0b11111110
status[19535] = 0b11111111
]]></artwork>
        <t>JSON encoding:</t>
        <artwork><![CDATA[
{
  "bits": 8,
  "lst": "eNrt0WOQM2kYhtGsbdu2bdu2bdu2bdu2bdu2jVnU1my
  -SWYm6U5enFPVf7ue97orFYAo7CQBAACQuuckAABStqUEAAAAAAAAtN6wEgAE71QJA
  AAAAIrwhwQAAAAAAdtAAgAAAAAAACLwkAQAAAAAAAAAAACUaFcJAACAeJwkAQAAAAA
  AAABQvL4kAAAAWmJwCQAAAAAAAAjAwBIAAAB06ywJoDKQBARpfgkAAAAAAAAAAAAAA
  AAAAACo50sJAAAAAAAAAOiRcSQAAAAAgAJNKgEAAG23mgQAAAAAAECw3pUAQvegBAA
  AAAAAAADduE4CAAAAyjSvBAAQiw8koHjvSABAb-wlARCONyVoxtMSZOd0CQAAAOjWD
  RKQmLckAAAAAACysLYEQGcnSAAAAAAQooUlAABI15kSAIH5RAIgLB9LABC4_SUgGZN
  IAABAmM6RoLbTJIASzCIBAEAhfpcAAAAAAABquk8CAAAAAAAAaJl9SvvzBOICAFWmk
  IBgfSgBAAAANOgrCQAAAAAAAADStK8EAAC03gASAAAAAAAAAADFWFUCAAAAMjOaBEA
  DHpYAQjCIBADduFwCAAAAAGitMSSI3BUSAECOHpAA6IHrJQAAAAAAsjeVBAAAKRpVA
  orWvwQAAAAAAAAAkKRtJAAAAAAAgCbcLAF0bXUJAAAAoF02kYDg7CYBAAAAAEB6NpQ
  AAAAAAAAAAAAAAEr1uQQAAF06VgIAAAAAAAAAqDaeBAAQqgMkAAAAAABogQMlAAAAA
  AAa87MEAAAQiwslAAAAAAAAAAAAAAAAMrOyBAAAiekv-hcsY0Sgne6QAAAAAAAgaUt
  JAAAAAAAAAAAAAAAAAAAAAAAAAADwt-07vjVkAAAAgDy8KgFAUEaSAAAAAJL3vgQAW
  dhcAgAAoBHDSUDo1pQAAACI2o4SAABZm14CALoyuwQAAPznGQkgZwdLAAAQukclAAA
  AAAAAAAAAgKbMKgEAAAAAAAAAAAAAAAAAAECftpYAAAAAAAAAAAAACnaXBAAAAADk7
  iMJAAAAAAAAAABqe00CAnGbBBG4TAIAgFDdKgFAXCaWAAAAAAAAAAAAAAAAAKAJQwR
  72XbGAQAAAKAhh0sAAAAAAABQgO8kAAAAAAAAAAAAACAaM0kAAAC5W0QCAIJ3mAQAx
  GwxCQAA6nhSAsjZBRIAANEbWQIAAAAAaJE3JACAwA0qAUBIVpKAlphbAiAPp0iQnKE
  kAAAAAAAgBP1KAAAAdOl4CQAAAAAAAPjLZBIAAG10RtrPm8_CAEBMTpYAAAAAAIjQY
  BL8z5QSAAAAAEDYPpUAACAsj0gAAADQkHMlAAjHDxIA0Lg9JQAAgHDsLQEAAABAQS6
  WAAAAgLjNFs2l_RgLAIAEfCEBlGZZCQAAaIHjJACgtlskAAAozb0SAAAAVFtfAgAAA
  AAAAAAAAAAAAAAAAAAAAKDDtxIAAAAAVZaTAKB5W0kAANCAsSUgJ0tL0GqHSNBbL0g
  AZflRAgCARG0kQXNmlgCABiwkAQAAAEB25pIAAAAAAAAAAAAAoFh9SwAAAAAAADWNm
  OSrpjFsEoaRgDKcF9Q1dxsEAAAAAAAAAAAAAAAAgPZ6SQIAAAAAAAAAgChMLgEAAAA
  AAAAAqZlQAsK2qQQAAAAAAAD06XUJAAAAqG9bCQAAgLD9IgEAAAAAAAAAAAAAAAAAA
  EBNe0gAAAAAAAAAAEBPHSEBAAAAlOZtCYA4fS8B0GFRCQAo0gISAOTgNwmC840EAAA
  AAAAAAAAAAAAAAAAAUJydJfjXPBIAAAAAAAAAAAAAAABk6WwJAAAAAAAAAAAAAAAAq
  G8UCQAAgPpOlAAAIA83SQAANWwc9HUjGAgAAAAAAACAusaSAAAAAAAAAAAAAAAAAAA
  AAAAAAAAAqHKVBACQjxklAAAAAAAAAKBHxpQAAAAAACBME0lAdlaUAACyt7sEAAAA0
  Nl0EgAAAAAAAAAAAABA-8wgAQAAAAAAAKU4SgKgUtlBAgAAAAAAAAAAgMCMLwEE51k
  JICdzSgCJGl2CsE0tAQAA0L11JQAAAAAAAAjUOhIAAAAAAAAAAAAAAGTqeQkAAAAAA
  AAAAAAAKM8SEjTrJwkAAAAAAACocqQEULgVJAAAACjDUxJUKgtKAAAAqbpRAgCA0n0
  mAQAAAABAGzwmAUCTLpUAAAAAAAAAAEjZNRIAAAAAAAAAAAAAAAAAAAAA8I-vJaAlh
  pQAAAAAAHrvzjJ-OqCuuVlLAojP8BJAr70sQZVDJYAgXS0BAAAAAAAAAAAAtMnyEgA
  AAAAAFONKCQAAAAAAAADorc0kAAAAAAAAgDqOlgAAAAAAAAAAAADIwv0SAAAAAAAAA
  AAAAADBuV0CIFVDSwAAAABAAI6RAAAAAGIwrQSEZAsJAABouRclAAAAAKDDrxIAAAA
  0bkkJgFiMKwEAAAAAAHQyhwRk7h4JAAAAAAAAAAAgatdKAACUYj0JAAAAAAAAAAAAQ
  nORBLTFJRIAAAAAkIaDJAAAAJryngQAAAAAAAAAAAA98oQEAAAAAAAAAEC2zpcgWY9
  LQKL2kwAgGK9IAAAAAPHaRQIAAAAAAAAAAADIxyoSAAAAAAAAAAAAAADQFotLAECz_
  gQ1PX-B"
}
]]></artwork>
        <t>CBOR encoding:</t>
        <artwork><![CDATA[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]]></artwork>
      </section>
    </section>
    <section numbered="false" anchor="document-history">
      <name>Document History</name>
      <t>[[ To be removed from the final specification ]]</t>
      <t>-20</t>
      <ul spacing="normal">
        <li>
          <t>extend requirements for IANA registries</t>
        </li>
      </ul>
      <t>-19</t>
      <ul spacing="normal">
        <li>
          <t>revert grapahics to ASCII</t>
        </li>
        <li>
          <t>grammar, spelling, nits</t>
        </li>
        <li>
          <t>add official link to ISO 18013-5 specification</t>
        </li>
      </ul>
      <t>-18</t>
      <ul spacing="normal">
        <li>
          <t>add references to SD-JWT VC and SD-CWT</t>
        </li>
      </ul>
      <t>-17</t>
      <ul spacing="normal">
        <li>
          <t>change SD-JWT VC reference to SD-JWT</t>
        </li>
        <li>
          <t>clarify that Status List validation <bcp14>MUST</bcp14> not be performed if Referenced Token validation is deemed invalid already</t>
        </li>
      </ul>
      <t>-16</t>
      <ul spacing="normal">
        <li>
          <t>change http status codes &amp; query parameter wording for the historical resolution</t>
        </li>
        <li>
          <t>grammatical/style fixes</t>
        </li>
        <li>
          <t>making several SHOULDs non-normative</t>
        </li>
        <li>
          <t>small corrections in the introduction</t>
        </li>
        <li>
          <t>change guidance around HTTP content negotiation to refer to RFC 9110</t>
        </li>
        <li>
          <t>strengthen normative guidance around handling cases or redirection</t>
        </li>
        <li>
          <t>changing media type contact to oauth WG mailing list</t>
        </li>
        <li>
          <t>update discussion around collusion risk in unlinkability section</t>
        </li>
        <li>
          <t>strength guidance to <bcp14>MUST</bcp14> about rejecting reference tokens with an index which is out of bounds of the resolved list</t>
        </li>
        <li>
          <t>remove non-normative ISO mdoc examples</t>
        </li>
      </ul>
      <t>-15</t>
      <ul spacing="normal">
        <li>
          <t>limit Status List Token CWT COSE message to Sign1/Mac0</t>
        </li>
        <li>
          <t>be explicit about tagging and re-add cose_sign1 tag to example</t>
        </li>
        <li>
          <t>add description field to EKU iana registration request</t>
        </li>
        <li>
          <t>fix typos in referenced token</t>
        </li>
        <li>
          <t>fix typos</t>
        </li>
        <li>
          <t>make IANA references informative</t>
        </li>
        <li>
          <t>remove unused iana.jose reference</t>
        </li>
      </ul>
      <t>-14</t>
      <ul spacing="normal">
        <li>
          <t>use binary value encoding for all test vectors (display purposes only)</t>
        </li>
        <li>
          <t>removed bytes from graphic that were intepreted as padding bytes</t>
        </li>
        <li>
          <t>removed 0x0B from application-specific Status Type</t>
        </li>
        <li>
          <t>reemphasized that expired tokens with status "VALID" are still expired</t>
        </li>
        <li>
          <t>renamed section "Status List Aggregation in JSON Format" to "Status List Aggregation Data Structure"</t>
        </li>
        <li>
          <t>slightly restructure/clarify referenced token cose section</t>
        </li>
        <li>
          <t>Add ASN.1 module</t>
        </li>
        <li>
          <t>many nits and improvements from genart review</t>
        </li>
        <li>
          <t>remove cose_sign1 tag from statuslist in cwt form examples</t>
        </li>
        <li>
          <t>slightly restructure/clarify referenced token cose section</t>
        </li>
        <li>
          <t>Add ASN.1 module</t>
        </li>
        <li>
          <t>removed DL suspension example</t>
        </li>
      </ul>
      <t>-13</t>
      <ul spacing="normal">
        <li>
          <t>add definition of client to terminology</t>
        </li>
        <li>
          <t>Make exp and ttl recommended in claim description (fixes inconsistency, was recommended in other text)</t>
        </li>
        <li>
          <t>Add short security consideraiton on redirects and ttl</t>
        </li>
        <li>
          <t>fix CORS spec to specific version</t>
        </li>
        <li>
          <t>explain KYC</t>
        </li>
        <li>
          <t>link implementation guidance to exp and ttl in Status List Token definition</t>
        </li>
        <li>
          <t>reference RFC7515 instead of IANA:JOSE</t>
        </li>
        <li>
          <t>add a note that cwt is encoded in raw/binary.</t>
        </li>
        <li>
          <t>added further privacy consideration around issuer tracking using unique URIs</t>
        </li>
      </ul>
      <t>-12</t>
      <ul spacing="normal">
        <li>
          <t>Allow for extended key usage OID to be used for other status mechanisms</t>
        </li>
        <li>
          <t>add Paul's affiliation</t>
        </li>
        <li>
          <t>add feedback from Dan Moore</t>
        </li>
        <li>
          <t>change JSON Status List structure to only contain JSON object</t>
        </li>
        <li>
          <t>further nitpicks</t>
        </li>
        <li>
          <t>clarifying status and status_list IANA descriptions for JWT/CWT</t>
        </li>
        <li>
          <t>clarifying description texts for status and status_list in CBOR</t>
        </li>
        <li>
          <t>splitting Linkability Mitigation from Token Lifecycle section in Implementation Consideration</t>
        </li>
        <li>
          <t>relax the accept header from must to should</t>
        </li>
      </ul>
      <t>-11</t>
      <ul spacing="normal">
        <li>
          <t>incorporate feedback from shepherd review</t>
        </li>
        <li>
          <t>some nitpicks</t>
        </li>
        <li>
          <t>even more nitpicks</t>
        </li>
      </ul>
      <t>-10</t>
      <ul spacing="normal">
        <li>
          <t>improve caching guidelines and move them to implementaiton considerations</t>
        </li>
        <li>
          <t>Add CoAP Content-Format ID and IANA registration</t>
        </li>
        <li>
          <t>Add size comparison for status list and compressed uuids</t>
        </li>
        <li>
          <t>Change Controller IESG for OAuths Parameters Registration</t>
        </li>
      </ul>
      <t>-09</t>
      <ul spacing="normal">
        <li>
          <t>update acknowledgments</t>
        </li>
        <li>
          <t>introduce dedicated section for compressed byte array of the Status List</t>
        </li>
        <li>
          <t>fix Status List definitions</t>
        </li>
        <li>
          <t>Add CDDL for CBOR StatusList encoding</t>
        </li>
        <li>
          <t>add diagram for Status List Aggregation for further explanation</t>
        </li>
        <li>
          <t>rename "chunking" of Status List Tokens (for scalability reasons) into "divide .. up"</t>
        </li>
      </ul>
      <t>-08</t>
      <ul spacing="normal">
        <li>
          <t>Fix cwt typ value to full media type</t>
        </li>
        <li>
          <t>Holders may also fetch and verify Status List Tokens</t>
        </li>
        <li>
          <t>Update terminology for referenced token and Status List Token</t>
        </li>
      </ul>
      <t>-07</t>
      <ul spacing="normal">
        <li>
          <t>add considerations about External Status Issuer or Status Provider</t>
        </li>
        <li>
          <t>add recommendations for Key Resolution and Trust Management</t>
        </li>
        <li>
          <t>add extended key usage extensions for x509</t>
        </li>
        <li>
          <t>Relying Parties avoiding correlatable Information</t>
        </li>
        <li>
          <t>editorial changes on terminology and Referenced Tokens</t>
        </li>
        <li>
          <t>clarify privacy consideration around one time use referenced tokens</t>
        </li>
        <li>
          <t>explain the Status List Token size dependencies</t>
        </li>
        <li>
          <t>explain possibility to chunk Status List Tokens depending on Referenced Token's expiry date</t>
        </li>
        <li>
          <t>add short-lived tokens in the Rationale</t>
        </li>
        <li>
          <t>rename Status Mechanism Methods registry to Status Mechanisms registry</t>
        </li>
        <li>
          <t>changes as requested by IANA review</t>
        </li>
        <li>
          <t>emphasize that security and privacy considerations only apply to Status List and no other status mechanisms</t>
        </li>
        <li>
          <t>differentiate unlinkability between Issuer-RP and RP-RP</t>
        </li>
        <li>
          <t>add more test vectors for the status list encoding</t>
        </li>
        <li>
          <t>add prior art</t>
        </li>
        <li>
          <t>updated language around application specific status type values and assigned ranges for application specific usage</t>
        </li>
        <li>
          <t>add short security considerations section for mac based deployments</t>
        </li>
        <li>
          <t>privacy considerations for other status types like suspended</t>
        </li>
        <li>
          <t>fix aggregation_uri text in referenced token</t>
        </li>
        <li>
          <t>mention key resolution in validation rules</t>
        </li>
      </ul>
      <t>-06</t>
      <ul spacing="normal">
        <li>
          <t>iana registration text updated with update procedures</t>
        </li>
        <li>
          <t>explicitly mention that status list is expected to be contained in cryptographically secured containers</t>
        </li>
        <li>
          <t>reworked and simplified introduction and abstract</t>
        </li>
        <li>
          <t>specify http status codes and allow redirects</t>
        </li>
        <li>
          <t>add status_list_aggregation_endpoint OAuth metadata</t>
        </li>
        <li>
          <t>remove unsigned options (json/cbor) of status list</t>
        </li>
        <li>
          <t>add section about mixing status list formats and media type</t>
        </li>
        <li>
          <t>fixes from IETF review</t>
        </li>
        <li>
          <t>update guidance around ttl</t>
        </li>
        <li>
          <t>add guidance around aggregation endpoint</t>
        </li>
      </ul>
      <t>-05</t>
      <ul spacing="normal">
        <li>
          <t>add optional support for historical requests</t>
        </li>
        <li>
          <t>update CBOR claim definitions</t>
        </li>
        <li>
          <t>improve section on Status Types and introduce IANA registry for it</t>
        </li>
        <li>
          <t>add Status Issuer and Status Provider role description to the introduction/terminology</t>
        </li>
        <li>
          <t>add information on third party hosting to security consideration</t>
        </li>
        <li>
          <t>remove constraint that Status List Token must not use a MAC</t>
        </li>
      </ul>
      <t>-04</t>
      <ul spacing="normal">
        <li>
          <t>add mDL example as Referenced Token and consolidate CWT and CBOR sections</t>
        </li>
        <li>
          <t>add implementation consideration for Default Values, Double Allocation and Status List Size</t>
        </li>
        <li>
          <t>add privacy consideration on using private relay protocols</t>
        </li>
        <li>
          <t>add privacy consideration on observability of outsiders</t>
        </li>
        <li>
          <t>add security considerations on correct parsing and decoding</t>
        </li>
        <li>
          <t>remove requirement for matching iss claim in Referenced Token and Status List Token</t>
        </li>
        <li>
          <t>add sd-jwt-vc example</t>
        </li>
        <li>
          <t>fix CWT status_list map encoding</t>
        </li>
        <li>
          <t>editorial fixes</t>
        </li>
        <li>
          <t>add CORS considerations to the http endpoint</t>
        </li>
        <li>
          <t>fix reference of Status List in CBOR format</t>
        </li>
        <li>
          <t>added status_list CWT claim key assigned</t>
        </li>
        <li>
          <t>move base64url definition to terminology</t>
        </li>
      </ul>
      <t>-03</t>
      <ul spacing="normal">
        <li>
          <t>remove unused reference to RFC9111</t>
        </li>
        <li>
          <t>add validation rules for status list token</t>
        </li>
        <li>
          <t>introduce the status list aggregation mechanism</t>
        </li>
        <li>
          <t>relax requirements for status_list claims to contain other parameters</t>
        </li>
        <li>
          <t>change cwt referenced token example to hex and annotated hex</t>
        </li>
        <li>
          <t>require TLS only for fetching Status List, not for Status List Token</t>
        </li>
        <li>
          <t>remove the undefined phrase Status List endpoint</t>
        </li>
        <li>
          <t>remove http caching in favor of the new ttl claim</t>
        </li>
        <li>
          <t>clarify the <tt>sub</tt> claim of Status List Token</t>
        </li>
        <li>
          <t>relax status_list iss requirements for CWT</t>
        </li>
        <li>
          <t>Fixes missing parts &amp; iana ttl registration in CWT examples</t>
        </li>
      </ul>
      <t>-02</t>
      <ul spacing="normal">
        <li>
          <t>add ttl claim to Status List Token to convey caching</t>
        </li>
        <li>
          <t>relax requirements on referenced token</t>
        </li>
        <li>
          <t>clarify Deflate / zlib compression</t>
        </li>
        <li>
          <t>make a reference to the Issuer-Holder-Verifier model of SD-JWT VC</t>
        </li>
        <li>
          <t>add COSE/CWT/CBOR encoding</t>
        </li>
      </ul>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Rename title of the draft</t>
        </li>
        <li>
          <t>add design consideration to the introduction</t>
        </li>
        <li>
          <t>Change status claim to in referenced token to allow re-use for other mechanisms</t>
        </li>
        <li>
          <t>Add IANA Registry for status mechanisms</t>
        </li>
        <li>
          <t>restructure the sections of this document</t>
        </li>
        <li>
          <t>add option to return an unsigned Status List</t>
        </li>
        <li>
          <t>Changing compression from gzip to zlib</t>
        </li>
        <li>
          <t>Change typo in Status List Token <tt>sub</tt> claim description</t>
        </li>
        <li>
          <t>Add access token as an example use-case</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft after working group adoption</t>
        </li>
        <li>
          <t>update acknowledgments</t>
        </li>
        <li>
          <t>renamed Verifier to Relying Party</t>
        </li>
        <li>
          <t>added IANA consideration</t>
        </li>
      </ul>
      <t>[ draft-ietf-oauth-status-list ]</t>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Applied editorial improvements suggested by Michael Jones.</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
