| Internet-Draft | witnessd Revocation | February 2026 |
| Condrey | Expires 11 August 2026 | [Page] |
This document specifies mechanisms for revoking and updating Evidence status in the witnessd Proof of Process framework. It defines how authors can mark Evidence as superseded or revoked, how device key compromise is handled, and how Verifiers can efficiently check Evidence validity.¶
The specification also defines an External Verifier Registry protocol that enables Relying Parties to discover trusted Verifiers and obtain federated verification services.¶
This note is to be removed before publishing as an RFC.¶
This is a companion document to draft-condrey-rats-pop, which defines the core Proof of Process evidence framework. This document addresses Evidence lifecycle management after initial generation.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 11 August 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
The Proof of Process (PoP) specification [I-D.condrey-rats-pop] defines how Attesters generate Evidence during document authorship. However, Evidence is not immutable once generated. Authors may need to:¶
This document defines protocols for Evidence status management and revocation, as well as a Verifier registry enabling federated verification services.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
Evidence packets may have the following status values:¶
Status updates are CBOR-encoded structures signed by the original Evidence author. The following CDDL defines the status update format:¶
status-update = {
packet-id: bstr, ; Evidence packet being updated
new-status: status-code,
reason: reason-code,
? superseded-by: bstr, ; For superseded status
? explanation: tstr, ; Optional human-readable text
timestamp: time,
signature: bstr ; Author signature over update
}
status-code = &(
active: 0,
superseded: 1,
revoked: 2,
suspended: 3,
expired: 4
)
reason-code = &(
unspecified: 0,
key-compromise: 1,
content-error: 2,
metadata-error: 3,
generated-in-error: 4,
duress: 5,
newer-version: 6,
validity-expired: 7
)
¶
Status transitions MUST follow these rules:¶
The signature MUST be created using the same key that signed the original Evidence packet. If the original key is compromised, the key compromise protocol in Section 3.2 applies.¶
When a device signing key is compromised, all Evidence signed by that key may be affected. The key compromise protocol:¶
This section defines a protocol for discovering trusted Verifiers and obtaining federated verification services.¶
Organizations may publish their trusted Verifiers at:¶
/.well-known/witnessd-verifiers¶
This endpoint returns a signed JSON document listing:¶
Federated verification enables Relying Parties in one organization to accept Attestation Results from Verifiers in another organization. The protocol operates as follows:¶
Trust delegation allows organizations to designate other Verifiers as authoritative for specific author domains. Delegation statements are signed by the delegating organization and published in the Verifier registry.¶
Attestation Results from federated Verifiers MUST include:¶
Verifiers MUST maintain audit logs of all appraisal operations. Audit logs include:¶
Audit logs MUST be retained for a minimum of 7 years to support legal and compliance requirements. Logs SHOULD be stored in append-only format to prevent tampering.¶
Misbehavior reporting enables Relying Parties to report Verifiers that issue inconsistent or incorrect Attestation Results:¶
Organizations MAY implement reputation scoring for Verifiers based on consistency, availability, and misbehavior history. Reputation scores are advisory and do not replace explicit trust decisions.¶
Verifiers MUST check revocation status using fresh data. Cached revocation lists have a maximum validity period (RECOMMENDED: 24 hours for general use, 1 hour for high-security contexts).¶
Verifiers MUST handle revocation service unavailability gracefully. Two modes are defined:¶
Verifiers SHOULD implement the following availability measures:¶
Relying Parties MUST be informed of the Verifier's failure mode and MAY override the default based on their risk tolerance.¶
Revocation queries may reveal which Evidence packets a Verifier is checking, potentially leaking information about document verification patterns. The following mitigations apply:¶
For high-privacy deployments, Verifiers MAY use Private Information Retrieval (PIR) techniques to query revocation status without revealing which packet-id is being checked. PIR support is OPTIONAL and deployment-specific.¶
Revocation lists MUST NOT include information beyond what is necessary for status determination. Specifically, revocation reasons are available only to authenticated parties with a legitimate need to know.¶
This section addresses privacy implications of Evidence status management and Verifier registry operations.¶
Verifiers process Evidence from multiple authors and may accumulate significant metadata about verification patterns. To prevent misuse:¶
Status updates and revocation statements contain metadata that could be privacy-sensitive. Implementations MUST:¶
For privacy-sensitive contexts, Verifiers MAY support anonymous verification where:¶
Anonymous verification provides weaker accountability guarantees and is not suitable for all deployment contexts. Verifiers MUST clearly document whether anonymous mode is supported.¶
This document requests registration of the following well-known URIs:¶
Change controller: IETF¶
Specification document: [this document]¶