Skip to content

Commit 8e9bc4f

Browse files
authored
Merge branch 'main' into comments_by_denis_3
2 parents 0e99662 + a5682d0 commit 8e9bc4f

File tree

1 file changed

+8
-5
lines changed

1 file changed

+8
-5
lines changed

draft-ietf-oauth-status-list.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -744,7 +744,7 @@ To obtain the Status List Token, the Relying Party MUST send an HTTP GET request
744744

745745
The HTTP endpoint SHOULD support the use of Cross-Origin Resource Sharing (CORS) {{CORS}} and/or other methods as appropriate to enable Browser-based clients to access it, unless ecosystems using this specification choose not to support Browser-based clients.
746746

747-
The Relying Party MUST send the following Accept-Header to indicate the requested response type:
747+
The Relying Party SHOULD send the following Accept HTTP Header to indicate the requested response type unless the Content-Type of Status List Tokens in the respective ecosystem is known or the Relying Party supports both formats:
748748

749749
- "application/statuslist+jwt" for Status List Token in JWT format
750750
- "application/statuslist+cwt" for Status List Token in CWT format
@@ -901,16 +901,17 @@ The following is a non-normative example for media type `application/json`:
901901
# X.509 Certificate Extended Key Usage Extension {#eku}
902902

903903
{{RFC5280}} specifies the Extended Key Usage (EKU) X.509 certificate extension for use on end entity certificates. The extension indicates one or more purposes for which the certified public key is valid. The EKU extension can be used in conjunction with the Key Usage (KU) extension, which indicates the set of basic cryptographic operations for which the certified key may be used. A certificate's issuer explicitly delegates Status List Token signing authority by issuing a X.509 certificate containing the KeyPurposeId defined below in the extended key usage extension.
904+
Other specifications MAY choose to re-use this OID for other status mechanisms under the condition that they are registered in the "JWT Status Mechanisms" or "CWT Status Mechanisms" registries.
904905

905906
The following OID is defined for usage in the EKU extension
906907

907-
```
908-
id-kp OBJECT IDENTIFIER ::=
908+
~~~
909+
id-kp OBJECT IDENTIFIER ::=
909910
{ iso(1) identified-organization(3) dod(6) internet(1)
910911
security(5) mechanisms(5) pkix(7) 3 }
911912

912-
id-kp-oauthStatusListSigning OBJECT IDENTIFIER ::= { id-kp TBD }
913-
```
913+
id-kp-oauthStatusSigning OBJECT IDENTIFIER ::= { id-kp TBD }
914+
~~~
914915

915916
# Security Considerations {#Security}
916917

@@ -1900,13 +1901,15 @@ CBOR encoding:
19001901

19011902
-12
19021903

1904+
* Allow for extended key usage OID to be used for other status mechanisms
19031905
* add Paul's affiliation
19041906
* add feedback from Dan Moore
19051907
* change JSON Status List structure to only contain JSON object
19061908
* further nitpicks
19071909
* clarifying status and status_list IANA descriptions for JWT/CWT
19081910
* clarifying description texts for status and status_list in CBOR
19091911
* splitting Linkability Mitigation from Token Lifecycle section in Implementation Consideration
1912+
* relax the accept header from must to should
19101913

19111914
-11
19121915

0 commit comments

Comments
 (0)