<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-demarco-status-attestations-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.2 -->
  <front>
    <title abbrev="OAuth Status Attestations">OAuth Status Attestations</title>
    <seriesInfo name="Internet-Draft" value="draft-demarco-status-attestations-01"/>
    <author fullname="Giuseppe De Marco">
      <organization>Dipartimento per la trasformazione digitale</organization>
      <address>
        <email>gi.demarco@innovazione.gov.it</email>
      </address>
    </author>
    <author fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <author fullname="Francesco Marino">
      <organization>Istituto Poligrafico e Zecca dello Stato</organization>
      <address>
        <email>fa.marino@ipzs.it</email>
      </address>
    </author>
    <date year="2024" month="February" day="05"/>
    <keyword>digital credentials</keyword>
    <keyword>status list</keyword>
    <keyword>revocation</keyword>
    <abstract>
      <?line 45?>

<t>Status Attestation is a signed object that demonstrates the validity status of a
digital credential.
These attestations are ephemeral and periodically provided
to holders, who can present these to Verifiers along
with the corresponding digital credentials.
The approach outlined in this document
makes the verifiers able to check the non-revocation of a digital credential
without requiring to query any third-party entities.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://peppelinux.github.io/draft-demarco-status-attestations/draft-demarco-status-attestations.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-demarco-status-attestations/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/peppelinux/draft-demarco-status-attestations"/>.</t>
    </note>
  </front>
  <middle>
    <?line 56?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Status Attestation plays a crucial role in maintaining the integrity and
trustworthiness of digital credentials,
since these serve as proof that a particular digital credential,
whether in JSON Web Tokens (JWT) or CBOR Web Tokens (CWT) format,
has not been revoked and is still valid.</t>
      <t>A digital credential may be presented to a verifier long after it has been issued.
During this interval, the digital credential could potentially be invalidated for
various reasons (e.g., due to the device lost or holder fraud).
To ensure the digital credential's validity, the issuer provides a short-lived
Status Attestation to the holder.
This attestation is bound to the digital credential and can be provided to a verifier,
together with the digital credential, as evidence of the digital credential's non-revocation status.</t>
      <t>Status Attestation safeguards privacy and is essential in facilitating offline scenarios.
In these circumstances, both the wallet and the verifier work without internet connectivity during the presentation phase;
nonetheless, Status Attestation provides a method to statically validate the validity of the digital credentials,
thus increasing the security of the digital credential system. By limiting the disclosure of status information,
Status Attestation strikes a balance between scalability, security, and privacy.</t>
      <artwork type="ascii-art"><![CDATA[
+-----------------+                             +-------------------+
|                 | Requests Status Attestation |                   |
|                 |---------------------------->|                   |
| Wallet Instance |                             | Credential Issuer |
|                 | Status Attestation          |                   |
|                 |<----------------------------|                   |
+-----------------+                             +-------------------+


+-- ----------------+                             +----------+
|                   | Presents Digital Credential |          |
|  Wallet Instance  | and Status Attestation      | Verifier |
|                   |---------------------------->|          |
+-------------------+                             +----------+
]]></artwork>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This specification uses the terms "End-User", "Entity" as defined by
OpenID Connect Core [@OpenID.Core], the term "JSON Web Token (JWT)"
defined by JSON Web Token (JWT) <xref target="RFC7519"/>.</t>
      <dl>
        <dt>Digital Credential:</dt>
        <dd>
          <t>A set of one or more claims about a subject made by a Credential Issuer.</t>
        </dd>
        <dt>Credential Issuer:</dt>
        <dd>
          <t>Entity that is responsible for the issuance of the Digital Credentials.
The Issuer is responsible for the lifecycle of their issued Digital Credentials
and their validity status.</t>
        </dd>
        <dt>Verifier:</dt>
        <dd>
          <t>Entity that relies on the validity of the Digital Credentials presented to it.
This Entity, also known as a Relying Party, needs to verify the authenticity and
validity of the Digital Credentials, including their revocation status, before accepting them.</t>
        </dd>
        <dt>Wallet Instance:</dt>
        <dd>
          <t>The digital Wallet in control of a User, also known as Wallet or Holder.
It securely stores the User's Digital Credentials. It can present Digital Credentials to Verifiers
and request Status Attestations from Issuers under the control of the User.</t>
        </dd>
      </dl>
    </section>
    <section anchor="rationale">
      <name>Rationale</name>
      <t>OAuth Status Lists [@!I-D.looker-oauth-jwt-cwt-status-list] are suitable
for specific scenarios, especially when the Verifier needs to verify the
status of a Digital Credential at a later time after the User has presented the
Digital Credential.</t>
      <t>However, there are cases where the Verifier only needs
to check the revocation status of a Digital Credential at the time of
presentation, or situations where the Verifier should not be allowed to
check the status of a Digital Credential over time due to some privacy constraints,
in compliance with national privacy regulations.</t>
      <t>TODO: Add an example of national privacy constraints to give the reader some intuition.</t>
      <t>In scenarios where the Verifier, Credential Issuer, and OAuth Status List
Provider are all part of the same domain or operate within a context where
a high level of trust exists between them and the End-User, the OAuth
Status List is the optimal solution; while there might be other cases
where the OAuth Status List facilitates the exposure to the following
privacy risks:</t>
      <ul spacing="normal">
        <li>
          <t>An OAuth Status List Provider might know the association between a specific
list and a Credential Issuer, especially if the latter issues a
single type of Digital Credential. This could inadvertently reveal the
Status List Provider which list corresponds to which Digital Credential.</t>
        </li>
        <li>
          <t>A Verifier retrieves an OAuth Status List by establishing a TCP/IP connection
with an OAuth Status List Provider. This allows the OAuth Status List Provider to
obtain the IP address of the Verifier and potentially link it to a specific
Digital Credential type and Credential Issuer associated with that OAuth Status List.
A malicious OAuth Status List Provider could use internet diagnostic tools, such as Whois
or GeoIP lookup, to gather additional information about the Verifier.
This could inadvertently disclose to the OAuth Status List Provider which
Digital Credential the requester is using and from which Credential Issuer,
information that should remain confidential.</t>
        </li>
      </ul>
      <t>Status Attestations differ significantly from OAuth Status Lists in several ways:</t>
      <ol spacing="normal" type="1"><li>
          <t><strong>Privacy</strong>: Status Attestations are designed to be privacy-preserving.
They do not require the Verifier to gather any additional information
from third-party entities, thus preventing potential privacy leaks.</t>
        </li>
        <li>
          <t><strong>Static Verification</strong>: Status Attestations are designed to be
statically provided to Verifiers by Wallet Instance.
Once a Status Attestation is issued, it can be verified without any further
communication with the Credential Issuer or any other party.</t>
        </li>
        <li>
          <t><strong>Digital Credentials Formats</strong>: Status Attestations are agnostic from the
Digital Credential format to which they are bound.</t>
        </li>
        <li>
          <t><strong>Trust Model</strong>: Status Attestations operate under a model where
the Verifier trusts the Credential Issuer to provide accurate status information,
while the OAuth Status Lists operate under a model where the Verifier
trusts the Status List Provider to maintain an accurate and up-to-date
list of statuses.</t>
        </li>
        <li>
          <t><strong>Offline flow</strong>: OAuth Status List can be accessed by a Verifier when
an internet connection is present. At the same time,
OAuth Status List defines
how to provide a static Status List Token, to be included within a
Digital Credential. This requires the Wallet Instance to acquire a
new Digital Credential for a specific presentation. Even if similar to
the OAuth Status List Token, the Status Attestations enable the User to
persistently use their preexistent Digital Credentials, as long as
the linked Status Attestation is available and presented to the
Verifier, and not expired.</t>
        </li>
      </ol>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <t>The general requirements for the implementation of Status Attestation are listed in this section.
The Status Attestation:</t>
      <ul spacing="normal">
        <li>
          <t><bcp14>MUST</bcp14> be presented in conjunction with the Digital Credential.
The Status Attestation <bcp14>MUST</bcp14> be timestamped with its issuance datetime,
always referring to a previous period to the presentation time.</t>
        </li>
        <li>
          <t><bcp14>MUST</bcp14> contain the expiration datetime after which the Digital Credential
<bcp14>MUST NOT</bcp14> be considered valid anymore. The expiration datetime <bcp14>MUST</bcp14> be
superior to the issuance datetime.</t>
        </li>
        <li>
          <t>enables offline use cases as it <bcp14>MUST</bcp14> be validated using
a cryptographic signature and the cryptographic public key of the Credential Issuer.</t>
        </li>
      </ul>
      <t>Please note: in this specification the examples and the normative properties
of Attestations are reported in accordance with the JWT standard, while
for the purposes of this specification any Digital Credential or Attestation
format may be used, as long as all attributes and requirements
defined in this specification are satisfied, even using equivalent names
or values.</t>
    </section>
    <section anchor="status-attestation-request">
      <name>Status Attestation Request</name>
      <t>The Credential Issuer provides the Wallet Instance with a Status Attestation,
which is bound to a Digital Credential.
This allows the Wallet Instance to present it, along with the Digital Credential itself,
to a Verifier as proof of the Digital Credential's non-revocation status.</t>
      <t>The following diagram shows the Wallet Instance requesting a
Status Attestation to a Credential Issuer,
related to a specific Credential issued by the same Credential Issuer.</t>
      <artwork type="ascii-art"><![CDATA[
+-------------------+                         +--------------------+
|                   |                         |                    |
|  Wallet Instance  |                         | Credential Issuer  |
|                   |                         |                    |
+--------+----------+                         +----------+---------+
         |                                               |
         | HTTP POST /status                             |
         |  credential_pop = $CredentialPoPJWT           |
         +----------------------------------------------->
         |                                               |
         |  Response with Status Attestation JWT         |
         <-----------------------------------------------+
         |                                               |
+--------+----------+                         +----------+---------+
|                   |                         |                    |
|  Wallet Instance  |                         | Credential Issuer  |
|                   |                         |                    |
+-------------------+                         +--------------------+
]]></artwork>
      <t>The Wallet Instance sends the Status Attestation request to the Credential Issuer.
The request <bcp14>MUST</bcp14> contain the Digital Credential, for which the Status Attestation
is requested, and enveloped in a signed object as proof of possession.
The proof of possession <bcp14>MUST</bcp14> be signed with the private key corresponding
to the public key attested by the Credential Issuer and contained within the Digital Credential.</t>
      <artwork><![CDATA[
POST /status HTTP/1.1
Host: issuer.example.org
Content-Type: application/x-www-form-urlencoded

credential_pop=$CredentialPoPJWT
]]></artwork>
      <t>To validate that the Wallet Instance is entitled to request its Status Attestation,
the following requirements <bcp14>MUST</bcp14> be satisfied:</t>
      <ul spacing="normal">
        <li>
          <t>The Credential Issuer <bcp14>MUST</bcp14> verify the signature of the <tt>credential_pop</tt> object using
the public key contained in the Digital Credential;</t>
        </li>
        <li>
          <t>the Credential Issuer <bcp14>MUST</bcp14> verify that it is the legitimate Issuer.</t>
        </li>
      </ul>
      <t>The technical and details about the <tt>credential_pop</tt> object
are defined in the next section.</t>
      <section anchor="digital-credential-proof-of-possession">
        <name>Digital Credential Proof of Possession</name>
        <t>The Wallet Instance that holds a Digital Credential, when requests a Status Attestation,
<bcp14>MUST</bcp14> demonstrate the proof of possession of the Digital Credential to the Credential Issuer.</t>
        <t>The proof of possession is made by enclosing the Digital Credential in an
object (JWT) signed with the private key that its related public key is referenced in the Digital Credential.</t>
        <t>Below is a non-normative example of a Credential proof of possession with
the JWT headers and payload are represented without applying signature and
encoding, for better readability:</t>
        <artwork><![CDATA[
{
    "alg": "ES256",
    "typ": "status-attestation-request+jwt",
    "kid": $WIA-CNF-JWKID

}
.
{
    "iss": "0b434530-e151-4c40-98b7-74c75a5ef760",
    "aud": "https://issuer.example.org/status-attestation-endpoint",
    "iat": 1698744039,
    "exp": 1698834139,
    "jti": "6f204f7e-e453-4dfd-814e-9d155319408c",
    "credential_format": "vc+sd-jwt",
    "credential": $Issuer-Signed-JWT
}
]]></artwork>
        <t>When the JWT format is used, the JWT <bcp14>MUST</bcp14> contain the parameters defined in the following table.</t>
        <table>
          <thead>
            <tr>
              <th align="left">JOSE Header</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <strong>typ</strong></td>
              <td align="left">It <bcp14>MUST</bcp14> be set to <tt>status-attestation-request+jwt</tt></td>
              <td align="left">
                <xref target="RFC7516"/> Section 4.1.1</td>
            </tr>
            <tr>
              <td align="left">
                <strong>alg</strong></td>
              <td align="left">A digital signature algorithm identifier such as per IANA "JSON Web Signature and Encryption Algorithms" registry. It <bcp14>MUST NOT</bcp14> be set to <tt>none</tt> or any symmetric algorithm (MAC) identifier.</td>
              <td align="left">
                <xref target="RFC7516"/> Section 4.1.1</td>
            </tr>
            <tr>
              <td align="left">
                <strong>kid</strong></td>
              <td align="left">Unique identifier of the JWK used for the signature of the Status Attestation Request, it <bcp14>MUST</bcp14> match the one contained in the Credential <tt>cnf.jwk</tt>.</td>
              <td align="left">
                <xref target="RFC7515"/></td>
            </tr>
          </tbody>
        </table>
        <table>
          <thead>
            <tr>
              <th align="left">JOSE Payload</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <strong>iss</strong></td>
              <td align="left">Wallet identifier.</td>
              <td align="left">
                <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
            </tr>
            <tr>
              <td align="left">
                <strong>aud</strong></td>
              <td align="left">It <bcp14>MUST</bcp14> be set to the identifier of the Credential Issuer.</td>
              <td align="left">
                <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
            </tr>
            <tr>
              <td align="left">
                <strong>exp</strong></td>
              <td align="left">UNIX Timestamp with the expiration time of the JWT.</td>
              <td align="left">
                <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
            </tr>
            <tr>
              <td align="left">
                <strong>iat</strong></td>
              <td align="left">UNIX Timestamp with the time of JWT issuance.</td>
              <td align="left">
                <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
            </tr>
            <tr>
              <td align="left">
                <strong>jti</strong></td>
              <td align="left">Unique identifier for the JWT.</td>
              <td align="left">
                <xref target="RFC7519"/> Section 4.1.7</td>
            </tr>
            <tr>
              <td align="left">
                <strong>credential_format</strong></td>
              <td align="left">The data format of the Credential. Eg: <tt>vc+sd-jwt</tt> for SD-JWT, <tt>vc+mdoc</tt> for ISO/IEC 18013-5 MDOC CBOR [@ISO.18013-5]</td>
              <td align="left">this specification</td>
            </tr>
            <tr>
              <td align="left">
                <strong>credential</strong></td>
              <td align="left">It <bcp14>MUST</bcp14> contain the Credential according to the data format given in the <tt>format</tt> claim.</td>
              <td align="left">this specification</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="status-attestation">
      <name>Status Attestation</name>
      <t>When a Status Attestation is requested to a Credential Issuer, the
Issuer checks the status of the Digital Credential and creates a Status Attestation bound to it.</t>
      <t>If the Digital Credential is valid, the Credential Issuer creates a new Status Attestation, which a non-normative example is given below.</t>
      <artwork><![CDATA[
{
    "alg": "ES256",
    "typ": "status-attestation+jwt",
    "kid": $ISSUER-JWKID
}
.
{
    "iss": "https://issuer.example.org",
    "iat": 1504699136,
    "exp": 1504700136,
    "credential_hash": $CREDENTIAL-HASH,
    "credential_hash_alg": "sha-256",
    "cnf": {
        "jwk": {...}
    }
}
]]></artwork>
      <t>The Status Attestation <bcp14>MUST</bcp14> contain the following claims when the JWT format is used.</t>
      <table>
        <thead>
          <tr>
            <th align="left">JOSE Header</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>alg</strong></td>
            <td align="left">A digital signature algorithm identifier such as per IANA "JSON Web Signature and Encryption Algorithms" registry. It <bcp14>MUST NOT</bcp14> be set to <tt>none</tt> or to a symmetric algorithm (MAC) identifier.</td>
            <td align="left">
              <xref target="RFC7515"/>, <xref target="RFC7517"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>typ</strong></td>
            <td align="left">It <bcp14>MUST</bcp14> be set to <tt>status-attestation+jwt</tt>.</td>
            <td align="left">
              <xref target="RFC7515"/>, <xref target="RFC7517"/> and this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>kid</strong></td>
            <td align="left">Unique identifier of the Issuer JWK.</td>
            <td align="left">
              <xref target="RFC7515"/></td>
          </tr>
        </tbody>
      </table>
      <table>
        <thead>
          <tr>
            <th align="left">JOSE Payload</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>iss</strong></td>
            <td align="left">It <bcp14>MUST</bcp14> be set to the identifier of the Issuer.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>iat</strong></td>
            <td align="left">UNIX Timestamp with the time of the Status Attestation issuance.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>exp</strong></td>
            <td align="left">UNIX Timestamp with the expiry time of the Status Attestation.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash</strong></td>
            <td align="left">Hash value of the Digital Credential the Status Attestation is bound to.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash_alg</strong></td>
            <td align="left">The Algorithm used of hashing the Digital Credential to which the Status Attestation is bound. The value <bcp14>SHOULD</bcp14> be set to <tt>S256</tt>.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>cnf</strong></td>
            <td align="left">JSON object containing the cryptographic key binding. The <tt>cnf.jwk</tt> value <bcp14>MUST</bcp14> match with the one provided within the related Digital Credential.</td>
            <td align="left">
              <xref target="RFC7800"/> Section 3.1</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="status-attestation-response">
      <name>Status Attestation Response</name>
      <t>If the Status Attestation is requested for a non-existent, expired, revoked or invalid Digital Credential, the
Credential Issuer <bcp14>MUST</bcp14> respond with an HTTP Response with the status code set to 404.</t>
      <t>If the Digital Credential is valid, the Credential Issuer then returns the Status Attestation to the Wallet Instance,
as in the following non-normative example.</t>
      <artwork><![CDATA[
HTTP/1.1 201 OK
Content-Type: application/json

{
    "status_attestation": "eyJhbGciOiJFUzI1Ni ...",
}
]]></artwork>
    </section>
    <section anchor="credential-issuers-supporting-status-attestations">
      <name>Credential Issuers Supporting Status Attestations</name>
      <section anchor="credential-issuer-metadata">
        <name>Credential Issuer Metadata</name>
        <t>The Credential Issuers that uses the Status Attestations <bcp14>MUST</bcp14> include in their
OpenID4VCI [@!OpenID.VCI] metadata the claim <tt>status_attestation_endpoint</tt>,
which its value <bcp14>MUST</bcp14> be an HTTPs URL indicating the endpoint where
the Wallet Instances can request Status Attestations.</t>
      </section>
      <section anchor="issued-digital-credentials">
        <name>Issued Digital Credentials</name>
        <t>The Credential Issuers that uses the Status Attestations <bcp14>SHOULD</bcp14> include in the
issued Digital Credentials the object <tt>status</tt> with the
JSON member <tt>status_attestation</tt> set to a JSON Object containing the following
member:</t>
        <ul spacing="normal">
          <li>
            <t><tt>credential_hash_alg</tt>. <bcp14>REQUIRED</bcp14>. The Algorithm used of hashing the Digital Credential to which the Status Attestation is bound. The value <bcp14>SHOULD</bcp14> be set to <tt>S256</tt>.</t>
          </li>
        </ul>
        <t>The non-normative example of an unsecured payload of
an SD-JWT VC is shown below.</t>
        <ul empty="true">
          <li>
            <t>TODO: alignments with the OAuth2 Status List schema and IANA registration.</t>
          </li>
        </ul>
        <artwork><![CDATA[
{
 "vct": "https://credentials.example.com/identity_credential",
 "given_name": "John",
 "family_name": "Doe",
 "email": "johndoe@example.com",
 "phone_number": "+1-202-555-0101",
 "address": {
   "street_address": "123 Main St",
   "locality": "Anytown",
   "region": "Anystate",
   "country": "US"
 },
 "birthdate": "1940-01-01",
 "is_over_18": true,
 "is_over_21": true,
 "is_over_65": true,
 "status": {
    "status_attestation": {
        "credential_hash_alg": "S256",
    }
 }
}
]]></artwork>
      </section>
    </section>
    <section anchor="presenting-status-attestations">
      <name>Presenting Status Attestations</name>
      <t>The Wallet Instance that provides the Status Attestations <bcp14>SHOULD</bcp14> be included in the
<tt>vp_token</tt> JSON array, as defined in [@OpenID4VP], the Status Attestation along with the
related Digital Credential.</t>
      <t>The Verifier that receives a Digital Credential supporting the Status Attestation,
<bcp14>SHOULD</bcp14>:</t>
      <ul spacing="normal">
        <li>
          <t>Decode and validate the Digital Credential;</t>
        </li>
        <li>
          <t>check the presence of <tt>status.status_attestation</tt> in the Digital Credential. If true, the Verifier <bcp14>SHOULD</bcp14>:
          </t>
          <ul spacing="normal">
            <li>
              <t>produce the hash of the Digital Credential using the hashing algorithm defined in <tt>status.status_attestation</tt>;</t>
            </li>
            <li>
              <t>decode all the Status Attestations provided in the presentation, by matching the JWS Header parameter <tt>typ</tt> set to <tt>status-attestation+jwt</tt> and looking for the <tt>credential_hash</tt> value that matches with the hash produced at the previous point;</t>
            </li>
            <li>
              <t>evaluate the validity of the Status Attestation.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>Please note: The importance of checking the revocation status of Digital Credentials as a '<bcp14>SHOULD</bcp14>' rather than a '<bcp14>MUST</bcp14>' for a Verifier
who gets Status Attestation for the Digital Credential stems from the fact that the decision of a Verifier to check the revocation status
of Digital Credentials is not absolute and can be influenced by numerous variables. Consider as an example the case of age-over x;
even if it has expired, it may still perform its intended purpose. As a result, the expiration status alone does not render it invalid.
The adaptability recognizes that the need to verify revocation status may not always coincide with the actual usability of a Digital Credential,
allowing Verifiers to examine and make educated conclusions based on a variety of scenarios.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="json-web-token-claims-registration">
        <name>JSON Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "JSON Web Token Claims" registry [@IANA.JWT] established by <xref target="RFC7519"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: <tt>credential_format</tt></t>
          </li>
          <li>
            <t>Claim Description: The Digital Credential format the Status Attestation is bound to.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s):  [[ (#digital-credential-proof-of-possession) of this specification ]]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: <tt>credential</tt></t>
          </li>
          <li>
            <t>Claim Description: The Digital Credential the Status Attestation is bound to.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s):  [[ (#digital-credential-proof-of-possession) of this specification ]]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: <tt>credential_hash</tt></t>
          </li>
          <li>
            <t>Claim Description: Hash value of the Digital Credential the Status Attestation is bound to.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s):  [[ (#status-attestation) of this specification ]]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: <tt>credential_hash_alg</tt></t>
          </li>
          <li>
            <t>Claim Description: The Algorithm used of hashing the Digital Credential to which the Status Attestation is bound.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s):  [[ (#status-attestation) of this specification ]]</t>
          </li>
        </ul>
      </section>
      <section anchor="media-type-registration">
        <name>Media Type Registration</name>
        <t>This section requests registration of the following media types [@RFC2046] in
the "Media Types" registry [@IANA.MediaTypes] in the manner described
in [@RFC6838].</t>
        <t>To indicate that the content is an JWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-attestation-request+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary; A JWT-based Status Attestation Request object is a JWT; JWT values are encoded as a series of base64url-encoded values (some of which may be the empty string) separated by period ('.') characters.</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [[ this specification ]]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [[ this specification ]]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [[ this specification ]] for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an CWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-attestation+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [[ this specification ]]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [[ this specification ]]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [[ this specification ]] for status attestation of tokens and Digital Credentials</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC7515">
        <front>
          <title>JSON Web Signature (JWS)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7515"/>
        <seriesInfo name="DOI" value="10.17487/RFC7515"/>
      </reference>
      <reference anchor="RFC7516">
        <front>
          <title>JSON Web Encryption (JWE)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Hildebrand" initials="J." surname="Hildebrand"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification. Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7516"/>
        <seriesInfo name="DOI" value="10.17487/RFC7516"/>
      </reference>
      <reference anchor="RFC7517">
        <front>
          <title>JSON Web Key (JWK)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7517"/>
        <seriesInfo name="DOI" value="10.17487/RFC7517"/>
      </reference>
      <reference anchor="RFC7519">
        <front>
          <title>JSON Web Token (JWT)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7519"/>
        <seriesInfo name="DOI" value="10.17487/RFC7519"/>
      </reference>
      <reference anchor="RFC7800">
        <front>
          <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="April" year="2016"/>
          <abstract>
            <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7800"/>
        <seriesInfo name="DOI" value="10.17487/RFC7800"/>
      </reference>
      <reference anchor="RFC9126">
        <front>
          <title>OAuth 2.0 Pushed Authorization Requests</title>
          <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
          <author fullname="B. Campbell" initials="B." surname="Campbell"/>
          <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
          <author fullname="D. Tonge" initials="D." surname="Tonge"/>
          <author fullname="F. Skokan" initials="F." surname="Skokan"/>
          <date month="September" year="2021"/>
          <abstract>
            <t>This document defines the pushed authorization request (PAR) endpoint, which allows clients to push the payload of an OAuth 2.0 authorization request to the authorization server via a direct request and provides them with a request URI that is used as reference to the data in a subsequent call to the authorization endpoint.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9126"/>
        <seriesInfo name="DOI" value="10.17487/RFC9126"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 570?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank:</t>
      <ul spacing="normal">
        <li>
          <t>Paul Bastien</t>
        </li>
        <li>
          <t>Riccardo Iaconelli</t>
        </li>
        <li>
          <t>Victor Näslund</t>
        </li>
        <li>
          <t>Giada Sciarretta</t>
        </li>
        <li>
          <t>Amir Sharif</t>
        </li>
      </ul>
    </section>
    <section anchor="document-history">
      <name>Document History</name>
      <t>TODO changelog.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
