Hi Andy,

Thanks for the review, please see below for our response.

> Status Label
> 956 It is RECOMMENDED to use status for the label of the field that
> 957 contains the Status CBOR structure.
>
> Keeping in mind that I am not familiar with ISO mdoc, why is this RECOMMENDED?
> Will there be an interoperability failure if an implementer does not follow
> this advice? Or is this just a common practice? If it is just a practice, can
> this be a non-normative "recommended"?

Agreed, we will change this to "recommended"

> Status Type Values
> 1112 This document creates a registry in Section 14.5 that includes the
> 1113 most common Status Type values. Applications SHOULD use registered
> 1114 values for statuses if they have the correct semantics. Additional
> 1115 values may be defined for particular use cases. Status Types
> 1116 described by this document comprise:
>
> Why is this a SHOULD and not a MUST? Is there some circumstance when type 
> VALID
> is to be used when INVALID is more appropriate?

The SHOULD (given that the semantics are fitting with the use-case) is intended 
to allow application specific status values if necessary, but encourage usage 
of the pre-defined ones if applicable

> Status List Request
> 1145 The Status Provider SHOULD provide Status List Token on an endpoint
> 1146 serving an HTTP GET request to the URI provided in the Referenced
> 1147 Token, unless the Relying Party and the Status Provider have
> 1148 alternative methods of distribution.
>
> Can this be a MUST as well? If there is no other pre-arranged distribution
> method, would it be acceptable for the status list to be available in any 
> other
> method than HTTP GET?

We can change this to a MUST with the given condition (that still allows other 
ways of distribution)

> 1155 The Relying Party SHOULD send the following Accept HTTP Header to
> 1156 indicate the requested response type unless the Content-Type of
> 1157 Status List Tokens in the respective ecosystem is known or the
> 1158 Relying Party supports both formats:
>
> 1160 * "application/statuslist+jwt" for Status List Token in JWT format
>
> 1162 * "application/statuslist+cwt" for Status List Token in CWT format
>
> 1164 If the Relying Party does not send an Accept Header, the response
> 1165 type is assumed to be known implicitly or out-of-band.
>
> Is this using something other than normal HTTP content negotiation? If not, I
> think it is better to identify the media types for the status list formats and
> defer to how HTTP does content negotiation.

Our intention was to use standard HTTP content negotiation. If that is not 
clear from the text, we can change the section to just define the media types 
and point to rfc9110?

> Security Guidance
> 1482 A Status List Token in the JWT format SHOULD follow the security
> 1483 considerations of [RFC7519] and the best current practices of
> 1484 [RFC8725].
>
> 1486 A Status List Token in the CWT format SHOULD follow the security
> 1487 considerations of [RFC8392].
>
> Why aren't these a MUST? Is there something in those considerations that would
> cause interoperability problems?

Agreed, this can be changed to a MUST

> Redirection
> 1557 HTTP clients that follow 3xx (Redirection) class of status codes
> 1558 SHOULD be aware of the possible dangers of redirects, such as
> 1559 infinite redirection loops, since they can be used for denial of
> 1560 service attacks on clients. A client SHOULD detect and intervene in
> 1561 infinite redirections. Clients SHOULD apply the guidance for
> 1562 redirects given in Section 15.4 of [RFC9110].
>
> Why aren't these MUST? Is there a reasonable scenario in which a client is
> advised to be unaware of infinite redirection loops, etc...?

In our opinion, the first should can be non-normative, but the decision for a 
client to implement detection etc. also heavily depends on trust assumptions 
etc. In cases where the client fully trusts the Status List Issuer, it might 
not be necessary to implement such measures. We were also not entirely certain 
how easy this is to implement in practice (or well supported in libraries).

Thanks,

[MATTR website]<https://mattr.global/>



Tobias Looker

CTO - MATTR

+64 273 780 461
[email protected]<mailto:[email protected]>

[MATTR website]<https://mattr.global/>

[MATTR on LinkedIn]<https://www.linkedin.com/company/mattrglobal>

[MATTR on Twitter]<https://twitter.com/mattrglobal>

[MATTR on Github]<https://github.com/mattrglobal>

This communication, including any attachments, is confidential. If you are not 
the intended recipient, you should not read it – please contact me immediately, 
destroy it, and do not copy or use any part of this communication or disclose 
anything about it. Thank you. Please note that this communication does not 
designate an information system for the purposes of the Electronic Transactions 
Act 2002.

From: Andy Newton via Datatracker <[email protected]>
Date: Wednesday, 7 January 2026 at 10:56 AM
To: The IESG <[email protected]>
Cc: [email protected] 
<[email protected]>, [email protected] 
<[email protected]>, [email protected] <[email protected]>, 
[email protected] <[email protected]>
Subject: Andy Newton's Discuss on draft-ietf-oauth-status-list-15: (with 
DISCUSS)

EXTERNAL EMAIL: This email originated outside of our organisation. Do not click 
links or open attachments unless you recognise the sender and know the content 
is safe.


Andy Newton has entered the following ballot position for
draft-ietf-oauth-status-list-15: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

# Andy Newton, ART AD, comments for draft-ietf-oauth-status-list-15
CC @anewton1998

* line numbers:
  -
  
https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-oauth-status-list-15.txt&submitcheck=True

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Thanks to the Reviewers

Thanks to John Levine for the ARTART review.

## Discuss

As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/,
a DISCUSS ballot is just a request to have a discussion on the following topics.

Thanks for the work on this document. I have a few DISCUSS issues which I think
are easily addressed. All of my issues are around the use of SHOULD and
RECOMMENDED.

### Status Label

956        It is RECOMMENDED to use status for the label of the field that
957        contains the Status CBOR structure.

Keeping in mind that I am not familiar with ISO mdoc, why is this RECOMMENDED?
Will there be an interoperability failure if an implementer does not follow
this advice? Or is this just a common practice? If it is just a practice, can
this be a non-normative "recommended"?

### Status Type Values

1112       This document creates a registry in Section 14.5 that includes the
1113       most common Status Type values.  Applications SHOULD use registered
1114       values for statuses if they have the correct semantics.  Additional
1115       values may be defined for particular use cases.  Status Types
1116       described by this document comprise:

Why is this a SHOULD and not a MUST? Is there some circumstance when type VALID
is to be used when INVALID is more appropriate?

### Status List Request

1145       The Status Provider SHOULD provide Status List Token on an endpoint
1146       serving an HTTP GET request to the URI provided in the Referenced
1147       Token, unless the Relying Party and the Status Provider have
1148       alternative methods of distribution.

Can this be a MUST as well? If there is no other pre-arranged distribution
method, would it be acceptable for the status list to be available in any other
method than HTTP GET?

1155       The Relying Party SHOULD send the following Accept HTTP Header to
1156       indicate the requested response type unless the Content-Type of
1157       Status List Tokens in the respective ecosystem is known or the
1158       Relying Party supports both formats:

1160       *  "application/statuslist+jwt" for Status List Token in JWT format

1162       *  "application/statuslist+cwt" for Status List Token in CWT format

1164       If the Relying Party does not send an Accept Header, the response
1165       type is assumed to be known implicitly or out-of-band.

Is this using something other than normal HTTP content negotiation? If not, I
think it is better to identify the media types for the status list formats and
defer to how HTTP does content negotiation.

### Security Guidance

1482       A Status List Token in the JWT format SHOULD follow the security
1483       considerations of [RFC7519] and the best current practices of
1484       [RFC8725].

1486       A Status List Token in the CWT format SHOULD follow the security
1487       considerations of [RFC8392].

Why aren't these a MUST? Is there something in those considerations that would
cause interoperability problems?

### Redirection

1557       HTTP clients that follow 3xx (Redirection) class of status codes
1558       SHOULD be aware of the possible dangers of redirects, such as
1559       infinite redirection loops, since they can be used for denial of
1560       service attacks on clients.  A client SHOULD detect and intervene in
1561       infinite redirections.  Clients SHOULD apply the guidance for
1562       redirects given in Section 15.4 of [RFC9110].

Why aren't these MUST? Is there a reasonable scenario in which a client is
advised to be unaware of infinite redirection loops, etc...?





_______________________________________________
OAuth mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to