You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: draft-ietf-oauth-status-list.md
+10-6
Original file line number
Diff line number
Diff line change
@@ -91,7 +91,7 @@ The decisions taken in this specification aim to achieve the following design go
91
91
92
92
* the specification shall favor a simple and easy to understand concept
93
93
* the specification shall be easy, fast and secure to implement in all major programming languages
94
-
* the specification shall be optimized to support the most common use cases and avoid unneccessary complexity of corner cases
94
+
* the specification shall be optimized to support the most common use cases and avoid unnecessary complexity of corner cases
95
95
* the Status List shall scale up to millions of tokens to support large scale government or enterprise use cases
96
96
* the Status List shall enable caching policies and offline support
97
97
* the specification shall support JSON and CBOR based tokens
@@ -327,6 +327,8 @@ If caching is required (e.g., to enable the use of alternative mechanisms for ho
327
327
328
328
## Validation Rules
329
329
330
+
TBD
331
+
330
332
# Further Examples
331
333
332
334
## Status List Token with 2-Bit Status Values in JWT format
@@ -404,24 +406,24 @@ A malicious Issuer could bypass the privacy benefits of the herd privacy by gene
404
406
405
407
## Relying Party tracking {#privacy-relying-party}
406
408
407
-
Once the Relying Party gets the Referenced Token, this enables him to request the Status List to validate the status of the Token through the provided "uri" property and look up the corresponding "index". However, the Relying Party may persistently store the "uri" and "index" of the Referenced Token to request the Status List again at a later time. By doing so regularly, the Relying Party may create a profile of the Referenced Token's validity status. This behaviour may be inteded as a feature, e.g. for a KYC process that requires regular validity checks, but might also be abused in cases where this is not intended and unknown to the Holder, e.g. profiling the suspension of a driving license or checking the employment status of an employee credential. This behaviour could be constrained by adding authorization rules to the Status List, see [](#security-authorization).
409
+
Once the Relying Party gets the Referenced Token, this enables him to request the Status List to validate the status of the Token through the provided "uri" property and look up the corresponding "index". However, the Relying Party may persistently store the "uri" and "index" of the Referenced Token to request the Status List again at a later time. By doing so regularly, the Relying Party may create a profile of the Referenced Token's validity status. This behaviour may be intended as a feature, e.g. for a KYC process that requires regular validity checks, but might also be abused in cases where this is not intended and unknown to the Holder, e.g. profiling the suspension of a driving license or checking the employment status of an employee credential. This behaviour could be constrained by adding authorization rules to the Status List, see [](#security-authorization).
408
410
409
411
## Correlation Risks and Tracking
410
412
411
413
Colluding Issuers and Relying Parties have the possibility to identify the usage of credentials of a particular Holder, as the Referenced Token contains unique, trackable data.
412
414
413
-
To avoid privacy risks for colluding Relying Parties, it is recommended that Issuers use batch issuance to issue multiple tokens, such that Holders can use individual tokens for specific Relying Parties. In this case, every Referenced Token MUST have a dedicated Status List entry. Revoking batch issued Referenced Tokens might reveal this correlation lateron.
415
+
To avoid privacy risks for colluding Relying Parties, it is recommended that Issuers use batch issuance to issue multiple tokens, such that Holders can use individual tokens for specific Relying Parties. In this case, every Referenced Token MUST have a dedicated Status List entry. Revoking batch issued Referenced Tokens might reveal this correlation later on.
414
416
415
417
To avoid information leakage by the values of "uri" and "index", Issuers are RECOMMENDED to:
416
418
417
419
- choose non-sequential, pseudo-random or random indices
418
420
- use decoy or dead entries to obfuscate the real number of Referenced Tokens within a Status List
419
-
- choose to deploy and utilize multiple Status Lists simulantaniously
421
+
- choose to deploy and utilize multiple Status Lists simultaneously
420
422
421
423
## Third Party Hosting
422
424
423
-
TODO elaborate on increased privacy if the status list is hosted by a third party instead of the issuer reducing tracking possiblities
424
-
TODO evaluate deifnition of Status List Provider?
425
+
TODO elaborate on increased privacy if the status list is hosted by a third party instead of the issuer reducing tracking possibilities
426
+
TODO evaluate definition of Status List Provider?
425
427
An entity that hosts the Status List as a resource for potential Relying Parties. The Status List Provider may be the issuer of the Status List but may also be outsourced to a trusted third party.
426
428
427
429
# Implementation Considerations {#implementation}
@@ -590,8 +592,10 @@ for their valuable contributions, discussions and feedback to this specification
590
592
591
593
-01
592
594
595
+
* Rename title of the draft
593
596
* add design consideration to the introduction
594
597
* Change status claim to in referenced token to allow re-use for other mechanisms
0 commit comments