We have released -18 for Token Status List that now includes references to SD-JWT VC and SD-CWT. It's available on the datatracker: https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list/18/

Paul

On 2/17/26 00:33, Pierce Gorman wrote:

Thank you very much for being willing to share your thoughts more fully, Brian.  That is very generous of you.  I will respectfully disagree, but I will not try to persuade you (unless you would like to discuss it more privately).  We’re all entitled to our opinions.  Thank you again.

Pierce


CONFIDENTIAL

*From:*Brian Campbell <[email protected]>
*Sent:* Monday, February 16, 2026 1:41 AM
*To:* Pierce Gorman <[email protected]>
*Cc:* Paul Bastian <[email protected]>; [email protected]; oauth <[email protected]>
*Subject:* Re: [SPICE] Re: CBOR/CWT parts in OAuth Token Status List


        

You don't often get email from [email protected]. Learn why this is important <https://aka.ms/LearnAboutSenderIdentification>

        

That's a fair question, Pierce, and it's certainly possible that my reasoning is perfectly clear in my own mind but I've not articulated it well or at all outwardly. If my wife was asked, she'd probably say that it is, in fact, highly likely that I've not been clear about something that's in my head. I'll try and explain my thinking a bit more.

Yes, it's highly annoying when standards are unavailable without paying for them. But it's more than that. There's an entire process of non-transparent and access-restricted development of those standards that precedes the pay-to-view publication model. Do we really want to provide tacit endorsement of that model through what is effectively a link to a publisher's product page? Obviously, I do not.

I'd further suggest that it is not the job of Token Status List (TSL) to help a reader gain a broader understanding of the technology and standards landscape. Readers that find their way to TSL without knowledge of ISO/IEC 18013-5:2021 will be just fine without learning of the opportunity to pay to see ISO/IEC 18013-5:2021 from TSL. And readers that already know about ISO/IEC 18013-5:2021 have no need for TSL to inform them of it.

On Wed, Feb 11, 2026 at 11:22 AM Pierce Gorman <[email protected]> wrote:

    Dear Brian,

    I am genuinely interested in your thinking.  I’ve read numerous
    posts from you and always appreciate your thoughtful candor.  I
    must apologize for commenting in the middle of a thread I haven’t
    followed completely.

    I agree that standards which are unavailable without paying for
    them is annoying.  Sometimes highly annoying. Nevertheless, such
    standards exist and some are very important.  I think the ISO
    mDL/mDoc standards qualify for that designation.  i.e., behind a
    paywall, and yet still very important.  I think it is the latter
    qualification which merits their mention in other relevant
    standards, including standards developed in the IETF.

    I understand that you object to having them being referenced in an
    IETF standard, but I don’t understand why.  The exclusion inhibits
    a reader from gaining a broader understanding of the technology
    and standards landscape that would be easily enhanced by what I
    consider to be a harmless inclusion.

    Apologies again in advance for perhaps asking you to explain
    something you’ve perhaps explained ad nauseum already (too many
    times?).

    Respectfully,

    Pierce Gorman

    CONFIDENTIAL

    *From:*Brian Campbell <[email protected]>
    *Sent:* Wednesday, February 11, 2026 11:42 AM
    *To:* Paul Bastian <[email protected]>
    *Cc:* [email protected]
    *Subject:* [SPICE] Re: CBOR/CWT parts in OAuth Token Status List

    I apologize for any lack of clarity in my previous messages. To be
    direct, I am requesting the removal of the ISO/IEC 18013-5:2021
    references.

    I have made specific suggestions on the pull request
    <https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/350>
    to reflect this.

    On Mon, Feb 9, 2026 at 6:30 PM Brian Campbell
    <[email protected]> wrote:

        My perspective on non-transparent, access-restricted standards
        development and fee-gated publication models has not changed
        since last week
        
https://mailarchive.ietf.org/arch/msg/spice/nYhBMowGdrKeW6BgWqf1t9svRjI/,
        and I again suggest that there be no references to such
        specifications at all.

        I am well aware, by the way, that some work with which I'm
        closely involved has reference to ISO/IEC 18013-5:2021.
        RFC9901/SD-JWT mentions it here
        https://datatracker.ietf.org/doc/html/rfc9901#section-10.1-10
        <https://datatracker.ietf.org/doc/html/rfc9901#section-10.1-10>but
        basically just says "this also exists and has the same
        limitations" while SD-JWT VC mentions it here
        
https://datatracker.ietf.org/doc/html/draft-ietf-oauth-sd-jwt-vc-14#section-11
        but as just one of a list of many credential formats. The
        context of both feels less like any endorsement of the
        paywalled ISO document. Although this conversation has me
        reconsidering some and thinking the mention in SD-JWT VC could
        be further contextualized as such or even removed.

        On Sun, Feb 8, 2026 at 2:40 PM Paul Bastian
        <[email protected]> wrote:

            Hi all,

            I don't mind mentioning all of them:
            https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/350

            If anybody want's to add a non-normative example for
            SD-CWT, feel free to do so.

            Otherwise I would merge this in the next days and we can
            move this forward hopefully.

            Best regards,
            Paul

            On 2/6/26 07:46, Rohan Mahy wrote:

                Hi,

                I have seen an implementation of SD-CWT with status
                lists, intended for production use at scale.

                Yes, as long as SD-CWT is not a normative reference,
                you can mention it in the draft. It will be described
                in the Informative References as
                draft-ietf-spice-sd-cwt-xx (work in progress), and if
                anyone clicks on a link in status lists or goes to the
                datatracker looking for SD-CWT using the draft name,
                they will find the document even after it becomes an RFC.

                And yes, as an author of SD-CWT, please include a
                reference in status list.

                thanks,

                -rohan

                On Thu, 5 Feb 2026, 12:31 Paul Bastian,
                <[email protected]> wrote:

                    Hi Brian,

                    in the most recent version, we:

                    - removed the examples for ISO mdoc, it is merely
                    named as a possible type of Referenced Token
                    - we removed the occurence of SD-JWT VC and
                    replaced it with SD-JWT, as this makes it more
                    widely applicable and SD-JWT is a final RFC
                    compared to SD-JWT VC
                    - we already have CWT in the draft as an explicit
                    example
                    - following this line of though, I'm not in favor
                    of referencing SD-CWT, because it is not final, is
                    it even possible to mention SD-CWT unless it is final?

                    Best regards, Paul

                    On 2/3/26 22:20, Brian Campbell wrote:

                        In full disclosure, I have expressed
                        concerns about scope (eg
                        
https://mailarchive.ietf.org/arch/msg/oauth/suJmeCHxLPhV9htUQEuzVcmUbrA/
                        and
                        
https://mailarchive.ietf.org/arch/msg/oauth/ZB-yrl3XDzo58hVyn16_gwPCQWM/)
                        but setting that aside here and assuming the
                        scope won't change.

                        From the SPICE WG perspective, wouldn't it be
                        preferable to use SD-CWT (IETF SPICE's
                        representation of digital credentials with
                        selective disclosure secured using COSE) as
                        the example rather than mDoc (ISO/IEC JTC 1/SC
                        17/WG 10's representation of digital
                        credentials with selective disclosure secured
                        using COSE)?

                        On Thu, Jan 22, 2026 at 3:11 AM Christian
                        Bormann
                        <[email protected]> wrote:

                            Hi Orie,

                            Thanks for the feedback!

                            Yeah the SD-JWT VC part is a fair point.
                            My understanding would be that SD-JWT is
                            more on the level of the container format
                            whereas SD-JWT VC is a concrete credential
                            format with additional/pre-defined
                            semantics. I was under the impression that
                            SD-JWT (or JWT for that matter) would not
                            be the best level to introduce a status
                            mechanism since status is usually bound to
                            the semantics of a concrete use-cases /
                            instantiation (like a credential or for
                            example an access token).

                            Our intention is definitely that everyone
                            that wants to use this mechanism can use
                            it and our definition is not bound to
                            SD-JWT VC but rather on the JWT (or CWT
                            for that matter) payload level. We used
                            SD-JWT VC and mDoc (ISO 18013-5) as
                            examples since those are two drafts that
                            are describing in their respective
                            documents how to use status list as a
                            status mechanism in their context. We
                            tried to always make clear that mDoc and
                            SD-JWT VC are examples and not normative
                            in the draft.

                            On the presentation of a Status List Token
                            in combination with the respective
                            credential/token: We also thought about
                            this but that felt like something that
                            needs to be defined on the exchange
                            protocol level instead of this document.

                            Best Regards,

                            Christian

                                On 16. Jan 2026, at 15:06, Orie
                                <[email protected]> wrote:

                                Hi,

                                (as an individual).

                                I considered this when I read the
                                OAuth Token Status List draft.

                                I do not see any issues:

                                SD-JWT -> SD-JWT (as referenced token)
                                + JWT (as Status List Token) ->
                                presentation with key binding and
                                status list revocation.
                                SD-CWT -> SD-CWT  (as referenced
                                token) + CWT (as Status List Token) ->
                                presentation with key binding and
                                status list revocation.

                                I don't understand why the OAuth draft
                                focuses on "VC" instead of just
                                SD-JWT, ... as you can see above,
                                without that focus the translation is
                                perhaps a bit more intuitive.

                                Let me highlight some similarities and
                                differences to SD-JWT, and perhaps
                                others might see issues:

                                After verification, the SD-CWT
                                claimset IS a CWT Claimset (all the SD
                                stuff gets removed as part of the
                                verification process)... This means we
                                should not have any challenges
                                regarding claims.
                                SD-CWT presentation format is a KBT
                                that wraps the SD-CWT... this is
                                different from the ~ or json encoding
                                for SD-JWT VC.
                                I don't think that creates any issues,
                                but it did make me wonder why the
                                holder could not just present the
                                status list token to the verifier, and
                                let the verifier decide if it was
                                fresh enough.

                                Another difference between CBOR and
                                JSON flavored tokens to watch out for
                                is aud, in CBOR its singular.... I
                                don't see any mention of aud in your
                                draft, so this probably does not matter.

                                In SD-CWT we used kcwt (Confirmation
                                Key CWT), when I read the oauth draft
                                I wondered if there might be CBOR use
                                cases where this was used with status
                                lists where the collision could be an
                                issue, but none came to mind
                                immediately... and JOSE does not have
                                an equivalent iirc.

                                Hopefully this is helpful, TLDR, I
                                don't see any issues.

                                Regards,

                                OS


                                On Fri, Jan 16, 2026 at 7:43 AM
                                Christian Bormann
                                <[email protected]>
                                wrote:

                                    Hello SPICE WG,

                                    We are currently finalising the
                                    OAuth Token Status List draft
                                    
(https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list/).
                                    While the draft started with only
                                    JSON-based representations, upon
                                    request we added a CBOR/CWT based
                                    variant.

                                    We are aware that CBOR/CWT-related
                                    work is typically the domain of
                                    the SPICE or ACE WGs and outside
                                    of OAuth. However, given that the
                                    draft consists of an
                                    encoding-agnostic core data model
                                    and only adds JSON and CBOR
                                    encoding on top, we felt that this
                                    adds more benefits for using a
                                    consistent method across these two
                                    common data representation
                                    formats, which have a history of
                                    shared standards. The
                                    CBOR-specific parts are currently
                                    a rather small part of the overall
                                    draft and mirror the JSON-based
                                    definitions.

                                    Are there any concerns with the
                                    current situation of including the
                                    CBOR/CWT parts in the draft? Could
                                    you please provide feedback on the
                                    situation and our proposal to keep
                                    the CBOR/CWT parts in the current
                                    draft, preferably within ~2 weeks.

                                    Best Regards,
                                    Christian + Paul + Tobias
-- SPICE mailing list -- [email protected]
                                    To unsubscribe send an email to
                                    [email protected]

-- SPICE mailing list -- [email protected]
                                To unsubscribe send an email to
                                [email protected]

-- SPICE mailing list -- [email protected]
                            To unsubscribe send an email to
                            [email protected]


                        */CONFIDENTIALITY NOTICE: This email may
                        contain confidential and privileged material
                        for the sole use of the intended recipient(s).
                        Any review, use, distribution or disclosure by
                        others is strictly prohibited. If you have
                        received this communication in error, please
                        notify the sender immediately by e-mail and
                        delete the message and any file attachments
                        from your computer. Thank you./*

-- SPICE mailing list -- [email protected]
                    To unsubscribe send an email to [email protected]

-- SPICE mailing list -- [email protected]
            To unsubscribe send an email to [email protected]


    */CONFIDENTIALITY NOTICE: This email may contain confidential and
    privileged material for the sole use of the intended recipient(s).
    Any review, use, distribution or disclosure by others is strictly
    prohibited.  If you have received this communication in error,
    please notify the sender immediately by e-mail and delete the
    message and any file attachments from your computer. Thank you./*


*/CONFIDENTIALITY NOTICE: This email may contain confidential and privileged material for the sole use of the intended recipient(s). Any review, use, distribution or disclosure by others is strictly prohibited.  If you have received this communication in error, please notify the sender immediately by e-mail and delete the message and any file attachments from your computer. Thank you./*
_______________________________________________
OAuth mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to