You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: draft-ietf-oauth-status-list.md
+14-2Lines changed: 14 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,7 +79,19 @@ The following diagram depicts the basic conceptual relationship.
79
79
80
80
Revocation mechanisms are an essential part for most identity ecosystems. In the past, revocation of X.509 TLS certificates has been proven difficult. Traditional certificate revocation lists (CRLs) have limited scalability; Online Certificate Status Protocol (OCSP) has additional privacy risks, since the client is leaking the requested website to a third party. OCSP stapling is addressing some of these problems at the cost of less up-to-date data. Modern approaches use accumulator-based revocation registries and Zero-Knowledge-Proofs to accommodate for this privacy gap, but face scalability issues again.
81
81
82
-
This specification seeks to find a balance between scalability, security, and privacy by minimizing the status information to mere bits (often a single bit) and compressing the resulting binary data. Thereby, a Status List may contain statuses of 100,000 or more Referenced Tokens, but still remain relatively small. Placing large amounts of Referenced Tokens into the same list also enables herd privacy relative to the Issuer.
82
+
This specification seeks to find a balance between scalability, security, and privacy by minimizing the status information to mere bits (often a single bit) and compressing the resulting binary data. Thereby, a Status List may contain statuses of many thousands or millions Referenced Tokens while remaining as small as possible. Placing large amounts of Referenced Tokens into the same list also enables herd privacy relative to the Issuer.
83
+
84
+
## Design Considerations
85
+
86
+
The decisions taken in this specification aim to achieve the following design goals:
87
+
88
+
* the specification shall favor a simple and easy to understand concept
89
+
* the specification shall be easy, fast and secure to implement in all major programming languages
90
+
* the specification shall be optimized to support the most common use cases and avoid unneccessary complexity of corner cases
91
+
* the Status List shall scale up to millions of tokens to support large scale government or enterprise use cases
92
+
* the Status List shall enable caching policies and offline support
93
+
* the specification shall support JSON and CBOR based tokens
94
+
* the specification shall not specify key resolution or trust frameworks
83
95
84
96
# Conventions and Definitions
85
97
@@ -537,7 +549,7 @@ for their valuable contributions, discussions and feedback to this specification
0 commit comments