<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-tulshibagwale-pushpull-delivery-03" category="info" submissionType="IETF" xml:lang="en">
  <front>
    <title abbrev="pushpull">Push And Pull Based Security Event Token (SET) Delivery</title>

    <author initials="A." surname="Tulshibagwale" fullname="Atul Tulshibagwale">
      <organization>SGNL</organization>
      <address>
        <email>atul@sgnl.ai</email>
      </address>
    </author>

    <date year="2024" month="July" day="23"/>

    <area>sec</area>
    
    <keyword>JSON Web Token</keyword> <keyword>JWT</keyword> <keyword>Security Event Token</keyword> <keyword>SET</keyword> <keyword>Delivery</keyword> <keyword>JavaScript Object Notation</keyword> <keyword>JSON</keyword>

    <abstract>


<?line 62?>
<t>In situations where a transmitter of Security Event Tokens (SETs) to a network peer is also a receiver of SETs from the same peer, it is helpful to have an efficient way of sending and receiving SETs in one HTTP transaction. Using current mechanisms such as "Push-Based Delivery of Security Event Tokens (SETs) Using HTTP" or "Poll-Based Delivery of Security Event Tokens (SETs) Using HTTP" both require two or more HTTP connections to exchange SETs between peers. In many cases, such as when using the OpenID Shared Signals Framework (SSF), the situation where each entity is both a transmitter and receiver is getting increasingly common. In addition, this specification enables the transmission and reception of multiple SETs in one HTTP connection.</t>



    </abstract>



  </front>

  <middle>


<?line 64?>

<section anchor="introduction"><name>Introduction</name>
<t>Workloads that exchange SETs <xref target="RFC8417"/> with each other ("Transceivers") can do so efficiently using the protocol defined in this specification. Although this specification works along the lines of the DeliveryPush <xref target="RFC8935"/> and DeliveryPoll <xref target="RFC8936"/> specifications, it makes a few important additions:</t>

<t><list style="symbols">
  <t>A Transceiver initiating a communication can send multiple SETs in one HTTP connection to a Peer</t>
  <t>The Transceiver initiating communication can acknowledge previously received SETs in the same HTTP connection to the Peer</t>
  <t>The Peer responding to the communication can send multiple SETs in its response to a connection from the Transceiver</t>
  <t>The Peer responding to the communication can acknowledge previously received SETs in its response to the Transceiver</t>
</list></t>

</section>
<section anchor="notational-conventions"><name>Notational Conventions</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when,
they appear in all capitals, as shown here.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<dl>
  <dt>Transceiver</dt>
  <dd>
    <t>A networked workload that can act both as a transmitter of SETs and a receiver of SETs. It communicates with other trusted Transceivers to transmit and receive SETs using the protocol defined herein.</t>
  </dd>
  <dt>Peer</dt>
  <dd>
    <t>Another name for a Transceiver, used to signify the other end of the communication from a Transceiver.</t>
  </dd>
  <dt>Initiator</dt>
  <dd>
    <t>A Transceiver initiating communication with a Peer.</t>
  </dd>
  <dt>Responder</dt>
  <dd>
    <t>A Transceiver responding to communication from a Peer.</t>
  </dd>
  <dt>DeliveryPush</dt>
  <dd>
    <t>The IETF RFC titled "Push-Based Delivery of Security Event Tokens (SETs) Using HTTP" <xref target="RFC8935"/>.</t>
  </dd>
  <dt>DeliveryPoll</dt>
  <dd>
    <t>The IETF RFC titled "Poll-Based Delivery of Security Event Tokens (SETs) Using HTTP" <xref target="RFC8936"/>.</t>
  </dd>
</dl>

</section>
<section anchor="pushpull-endpoint"><name>Pushpull Endpoint</name>
<t>Each Transceiver that supports this specification MUST support a "Pushpull" endpoint. This endpoint MUST be capable of serving HTTP <xref target="RFC9110"/> requests. This endpoint MUST be TLS <xref target="RFC8446"/> enabled and MUST reject any communication not using TLS.</t>

</section>
<section anchor="communication-object"><name>Communication Object</name>
<t>A Communication Object is a JSON object <xref target="RFC8259"/>, and is a unit of communication used in this specification used both in requests and responses. When used in a request, the Initiator MAY have additional fields defined the later sections below. The common fields of this object are:</t>

<dl>
  <dt>sets</dt>
  <dd>
    <t>OPTIONAL. A JSON object containing key-value pairs in which the key of a field is a string that contains the <spanx style="verb">jti</spanx> value of the SET that is specified in the value of the field. This field MAY be omitted to indicate that no SETs are being delivered by the initiator in this communication.</t>
  </dd>
  <dt>ack</dt>
  <dd>
    <t>OPTIONAL. An array of strings, in which each string is the <spanx style="verb">jti</spanx> value of a previously received SET that is acknowledged in this object. This array MAY be empty or this field MAY be omitted to indicate that no previously received SETs are being acknowledged in this communication.</t>
  </dd>
  <dt>setErrs</dt>
  <dd>
    <t>OPTIONAL. A JSON object containing key-value pairs in which the key of a field is a string that contains the <spanx style="verb">jti</spanx> value of a previously received SET that the sender of the communication object was unable to process. The value of the field is a JSON object that has the following fields:
</t>

    <dl>
      <dt>err</dt>
      <dd>
        <t>OPTIONAL. The short reason why the specified SET failed to be processed.</t>
      </dd>
      <dt>description</dt>
      <dd>
        <t>OPTIONAL. An explanation of why the SET failed to be processed.</t>
      </dd>
    </dl>
  </dd>
</dl>

<section anchor="example"><name>Example</name>
<t>The following is a non-normative example of a Communication Object</t>

<figure title="Example of a Communication Object" anchor="fig-communication-object-example"><sourcecode type="json"><![CDATA[
{
  "sets": {
    "4d3559ec67504aaba65d40b0363faad8": 
    "eyJhbGciOiJub25lIn0.
    eyJqdGkiOiI0ZDM1NTllYzY3NTA0YWFiYTY1ZDQwYjAzNjNmYWFkOCIsImlhdC
    I6MTQ1ODQ5NjQwNCwiaXNzIjoiaHR0cHM6Ly9zY2ltLmV4YW1wbGUuY29tIiwi
    YXVkIjpbImh0dHBzOi8vc2NpbS5leGFtcGxlLmNvbS9GZWVkcy85OGQ1MjQ2MW
    ZhNWJiYzg3OTU5M2I3NzU0IiwiaHR0cHM6Ly9zY2ltLmV4YW1wbGUuY29tL0Zl
    ZWRzLzVkNzYwNDUxNmIxZDA4NjQxZDc2NzZlZTciXSwiZXZlbnRzIjp7InVybj
    ppZXRmOnBhcmFtczpzY2ltOmV2ZW50OmNyZWF0ZSI6eyJyZWYiOiJodHRwczov
    L3NjaW0uZXhhbXBsZS5jb20vVXNlcnMvNDRmNjE0MmRmOTZiZDZhYjYxZTc1Mj
    FkOSIsImF0dHJpYnV0ZXMiOlsiaWQiLCJuYW1lIiwidXNlck5hbWUiLCJwYXNz
    d29yZCIsImVtYWlscyJdfX19.",
    "3d0c3cf797584bd193bd0fb1bd4e7d30":
    "eyJhbGciOiJub25lIn0.
    eyJqdGkiOiIzZDBjM2NmNzk3NTg0YmQxOTNiZDBmYjFiZDRlN2QzMCIsImlhdC
    I6MTQ1ODQ5NjAyNSwiaXNzIjoiaHR0cHM6Ly9zY2ltLmV4YW1wbGUuY29tIiwi
    YXVkIjpbImh0dHBzOi8vamh1Yi5leGFtcGxlLmNvbS9GZWVkcy85OGQ1MjQ2MW
    ZhNWJiYzg3OTU5M2I3NzU0IiwiaHR0cHM6Ly9qaHViLmV4YW1wbGUuY29tL0Zl
    ZWRzLzVkNzYwNDUxNmIxZDA4NjQxZDc2NzZlZTciXSwic3ViIjoiaHR0cHM6Ly
    9zY2ltLmV4YW1wbGUuY29tL1VzZXJzLzQ0ZjYxNDJkZjk2YmQ2YWI2MWU3NTIx
    ZDkiLCJldmVudHMiOnsidXJuOmlldGY6cGFyYW1zOnNjaW06ZXZlbnQ6cGFzc3
    dvcmRSZXNldCI6eyJpZCI6IjQ0ZjYxNDJkZjk2YmQ2YWI2MWU3NTIxZDkifSwi
    aHR0cHM6Ly9leGFtcGxlLmNvbS9zY2ltL2V2ZW50L3Bhc3N3b3JkUmVzZXRFeH
    QiOnsicmVzZXRBdHRlbXB0cyI6NX19fQ."
  },
  "ack": [
    "f52901c4-3996-11ef-9454-0242ac120002",
    "0636e274-3997-11ef-9454-0242ac120002",
    "d563c724-79a0-4ff0-ba41-657fa5e2cb11"
  ],
  "setErrs": {
    "5c436b19-0958-4367-b408-2dd542606d3b" : {
      "err": "invalid subject",
      "description": "subject format not supported"
    }
  }
}
]]></sourcecode></figure>

</section>
</section>
<section anchor="http-request-response-binding"><name>HTTP Request Response Binding</name>
<t>This section describes how Transceivers can use HTTP Requests and Responses to exchange Communication Objects described in  <xref target="communication-object"/>.</t>

<section anchor="initiating-communication"><name>Initiating Communication</name>

<t>A Transceiver can initiate communication with a Peer in order to:</t>

<t><list style="symbols">
  <t>Acknowledge previously received SETs from the Peer.</t>
  <t>Send SETs to the Peer.</t>
  <t>Both acknowledge previously received SETs from the Peer and send SETs to the Peer.</t>
</list></t>

<t>To initiate communication, the Initiator makes a HTTP POST request to the Responder's Pushpull Endpoint <xref target="pushpull-endpoint"/>. The body of this request is of the content type "application/json". It contains a Communication Object <xref target="communication-object"/>, and the following additional field MAY be present:</t>

<dl>
  <dt>maxResponseEvents</dt>
  <dd>
    <t>OPTIONAL. A number which specifies the maximum number of events the Responder can include in its response to the Initiator. If this field is absent in the request, the Responder MAY include any number of events in the response. If this field is present, then the Responder MUST NOT include more events than the value of "maxResponseEvents" in its response to the specific request.</t>
  </dd>
</dl>

</section>
<section anchor="response-communication"><name>Response Communication</name>

<t>A Responder MUST respond to a communication from an Initiator by sending an HTTP Response.</t>

<section anchor="success-response"><name>Success Response</name>
<t>If the Responder is successful in processing the request, it MUST return the HTTP status code 200 (OK). The response MUST have the content-type "application/json" and the response MUST include a Communication Object <xref target="communication-object"/>.</t>

</section>
<section anchor="error-response"><name>Error Response</name>
<t>The Responder MUST respond with an error response if it is unable to process the request. The error response MUST include the appropriate error code as described in Section 2.4 of DeliveryPush <xref target="RFC8935"/>.</t>

</section>
</section>
<section anchor="example-request-and-response"><name>Example Request and Response</name>
<t>The following is a non-normative example of a request and its corresponding response</t>

<section anchor="request"><name>Request</name>

<figure title="Example Pushpull request" anchor="fig-example-request"><sourcecode type="http"><![CDATA[
POST /pushpull-endpoint HTTP/1.1
Host: sharedsignals-transceiver.myorg.example
Content-type: application/json
Authorization: Bearer eyJraWQiOiIyMDIwXzEiLCJJhbGciOiJSUzI1NiJ9...

{
  "ack": [],
  "sets": {
    "4d3559ec67504aaba65d40b0363faad8": 
    "eyJhbGciOiJub25lIn0.
    eyJqdGkiOiI0ZDM1NTllYzY3NTA0YWFiYTY1ZDQwYjAzNjNmYWFkOCIsImlhdC
    I6MTQ1ODQ5NjQwNCwiaXNzIjoiaHR0cHM6Ly9zY2ltLmV4YW1wbGUuY29tIiwi
    YXVkIjpbImh0dHBzOi8vc2NpbS5leGFtcGxlLmNvbS9GZWVkcy85OGQ1MjQ2MW
    ZhNWJiYzg3OTU5M2I3NzU0IiwiaHR0cHM6Ly9zY2ltLmV4YW1wbGUuY29tL0Zl
    ZWRzLzVkNzYwNDUxNmIxZDA4NjQxZDc2NzZlZTciXSwiZXZlbnRzIjp7InVybj
    ppZXRmOnBhcmFtczpzY2ltOmV2ZW50OmNyZWF0ZSI6eyJyZWYiOiJodHRwczov
    L3NjaW0uZXhhbXBsZS5jb20vVXNlcnMvNDRmNjE0MmRmOTZiZDZhYjYxZTc1Mj
    FkOSIsImF0dHJpYnV0ZXMiOlsiaWQiLCJuYW1lIiwidXNlck5hbWUiLCJwYXNz
    d29yZCIsImVtYWlscyJdfX19.",
    "3d0c3cf797584bd193bd0fb1bd4e7d30":
    "eyJhbGciOiJub25lIn0.
    eyJqdGkiOiIzZDBjM2NmNzk3NTg0YmQxOTNiZDBmYjFiZDRlN2QzMCIsImlhdC
    I6MTQ1ODQ5NjAyNSwiaXNzIjoiaHR0cHM6Ly9zY2ltLmV4YW1wbGUuY29tIiwi
    YXVkIjpbImh0dHBzOi8vamh1Yi5leGFtcGxlLmNvbS9GZWVkcy85OGQ1MjQ2MW
    ZhNWJiYzg3OTU5M2I3NzU0IiwiaHR0cHM6Ly9qaHViLmV4YW1wbGUuY29tL0Zl
    ZWRzLzVkNzYwNDUxNmIxZDA4NjQxZDc2NzZlZTciXSwic3ViIjoiaHR0cHM6Ly
    9zY2ltLmV4YW1wbGUuY29tL1VzZXJzLzQ0ZjYxNDJkZjk2YmQ2YWI2MWU3NTIx
    ZDkiLCJldmVudHMiOnsidXJuOmlldGY6cGFyYW1zOnNjaW06ZXZlbnQ6cGFzc3
    dvcmRSZXNldCI6eyJpZCI6IjQ0ZjYxNDJkZjk2YmQ2YWI2MWU3NTIxZDkifSwi
    aHR0cHM6Ly9leGFtcGxlLmNvbS9zY2ltL2V2ZW50L3Bhc3N3b3JkUmVzZXRFeH
    QiOnsicmVzZXRBdHRlbXB0cyI6NX19fQ."
  },
  "setErrs": {
    "5c436b19-0958-4367-b408-2dd542606d3b" : {
      "err": "invalid subject",
      "description": "subject format not supported"
    }
  },
  "maxResponseEvents": 10
}
]]></sourcecode></figure>
<t>In the above example request, the Initiator does acknowledge any previous events. Delivers two SETs and reports an error on a previously received SET.</t>

</section>
<section anchor="response"><name>Response</name>
<t>The following is a non-normative example of a response:</t>

<figure title="Example Pushpull response" anchor="fig-example-response"><sourcecode type="http"><![CDATA[
HTTP/1.1 200 OK
Content-type: application/json

{
  "ack": [
    "3d0c3cf797584bd193bd0fb1bd4e7d30"
  ],
  "sets": {
    "756E69717565206964656E746966696572":
    "eyJ0eXAiOiJzZWNldmVudCtqd3QiLCJhbGciOiJIUzI1NiJ9Cg.
  eyJpc3MiOiJodHRwczovL2lkcC5leGFtcGxlLmNvbS8iLCJqdGkiOiI3NTZFNjk
  3MTc1NjUyMDY5NjQ2NTZFNzQ2OTY2Njk2NTcyIiwiaWF0IjoxNTA4MTg0ODQ1LC
  JhdWQiOiI2MzZDNjk2NTZFNzQ1RjY5NjQiLCJldmVudHMiOnsiaHR0cHM6Ly9zY
  2hlbWFzLm9wZW5pZC5uZXQvc2VjZXZlbnQvcmlzYy9ldmVudC10eXBlL2FjY291
  bnQtZGlzYWJsZWQiOnsic3ViamVjdCI6eyJzdWJqZWN0X3R5cGUiOiJpc3Mtc3V
  iIiwiaXNzIjoiaHR0cHM6Ly9pZHAuZXhhbXBsZS5jb20vIiwic3ViIjoiNzM3NT
  YyNkE2NTYzNzQifSwicmVhc29uIjoiaGlqYWNraW5nIn19fQ.
  Y4rXxMD406P2edv00cr9Wf3_XwNtLjB9n-jTqN1_lLc"
  }
}
]]></sourcecode></figure>
<t>In the above example, the Responder acknowledges one of the SETs it previously received and provides a SET to deliver to the initiator. There are no errors reported by the Responder.</t>

</section>
</section>
</section>
<section anchor="websocket-binding"><name>WebSocket Binding</name>
<t>Transceivers MAY use WebSockets <xref target="RFC6455"/> to send and receive Communication Objects described in <xref target="communication-object"/>. Since WebSockets are a symmetric protocol, a Transceiver MAY send a Communication Object at any time to its Peer. In such communication, a Transceiver sends a Communication Object as Payload data over the WebSocket protocol to a Peer. Similarly, a Transceiver MAY receive a Communication Object from a Peer over a WebSocket connection, wherein the Communication Object is the Payload data. In all such WebSocket communication, the Payload data does not have any Extension data in it.</t>

<section anchor="using-websockets"><name>Using WebSockets</name>
<t>During any communication initiated by a Transceiver, the Transceiver MAY request the Peer to use WebSockets <xref target="RFC6455"/> by requesting that the connection be upgraded to a WebSocket connection. If the Transceiver and its Peer can successfully perform the WebSocket handshake for the Pushpull Subprotocol described in <xref target="pushpull-subprotocol-handshake"/>, then the Transceiver and Peer MUST use WebSockets until the connection is closed. If the handshake fails, the Transceiver and Peer MAY use the HTTP Request Response Binding as described in <xref target="http-request-response-binding"/></t>

<section anchor="pushpull-subprotocol-handshake"><name>Pushpull Subprotocol Handshake</name>
<t>The Pushpull subprotocol is used to transport Communication Objects <xref target="communication-object"/> over a WebSocket connection. The Transceiver and its Peer agree to this subprotocol during the WebSocket handshake (see <xref section="1.3" sectionFormat="of" target="RFC6455"/>).</t>

<t>During the Websocket handshake, the Initiator MUST include the value <spanx style="verb">pushpull</spanx> in the list of protocols for the <spanx style="verb">Sec-WebSocket-Protocol</spanx> header. The reply from the Responder MUST also include the value <spanx style="verb">pushpull</spanx> in the list of values in its own <spanx style="verb">Sec-WebSocket-Protocol</spanx> header, in order for the Initiator and Responder to use WebSockets.</t>

</section>
</section>
</section>
<section anchor="authn-and-authz"><name>Authentication and Authorization</name>
<t>The Initiator MUST verify the identity of the Responder by validating the TLS certification presented by the Responder, and verifying that it is the intended recipient of the request, before sending the Communication Object <xref target="communication-object"/>.</t>

<t>The Initiator MUST attempt to obtain the OAuth Protected Resource Metadata <xref target="OPRM"/> for the Responder endpoint. If such metadata is found, the Initiator MUST obtain an access token using the metadata. If no such metadata is found, then the Initiator MAY use any means to authorize itself to the Responder.</t>

<t>The Responder MUST verify the identity and authorization of the Initiator. The Responder MAY use OAuth Protected Resource Metadata <xref target="OPRM"/> for this purpose, but the Responder MAY use other means to authorize the Initiator, which are beyond the scope of this specification.</t>

</section>
<section anchor="delivery-reliability"><name>Delivery Reliability</name>
<t>A Transceiver MUST attempt to deliver any SETs it has previously attempted to deliver to a Peer until:
* It receives an acknowledgement through the <spanx style="verb">ack</spanx> value for that SET in a subsequent communication with the Peer
* It receives a <spanx style="verb">setErrs</spanx> object for that SET in a subsequent communication with the Peer
* It has attempted to deliver the SET a maximum number of times and has failed to communicate either due to communication errors or lack of inclusion in <spanx style="verb">ack</spanx> or <spanx style="verb">setErrs</spanx> in subsequent communications that were conducted for the maximum number of times. The maximum number of attempts MAY be set by the Transceiver for itself and SHOULD be communicated offline to the Peers.</t>

<t>If a Transceiver previously attempted to deliver a SET in a response to a Peer's request, the Transceiver MAY Initiate a request to the Peer in order to retry delivery of the SET. A Peer MUST be able to either provide <spanx style="verb">ack</spanx>s or <spanx style="verb">setErrs</spanx> for the same SETs either through requests or responses.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<section anchor="authentication-and-authorization"><name>Authentication and Authorization</name>
<t>Transceivers MUST follow the procedures described in section <xref target="authn-and-authz"/> in order to securely authenticate and authorize Peers</t>

</section>
<section anchor="http-and-tls"><name>HTTP and TLS</name>
<t>Transceivers MUST use TLS <xref target="RFC8446"/> to communicate with Peers and is subject to the security considerations of HTTP <xref target="RFC9110"/> Section 17.</t>

</section>
<section anchor="denial-of-service"><name>Denial of Service</name>
<t>A Responder may be vulnerable to denial of service attacks wherein a large number of spurious requests need to be processed. Having efficient authorization mechanisms such as OAuth 2.0 <xref target="RFC6749"/> can mitigate such attacks by leveraging standard infrastructure that is designed to handle such attacks.</t>

</section>
</section>
<section anchor="privacy-considerations"><name>Privacy Considerations</name>
<t>SETs may contain confidential information, and Transceivers receiving SETs must be careful not to log such content or ensure that sensitive information from the SET is redacted before logging.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>
<t>The following WebSocket subprotocol will be added to the "WebSocket Subprotocol Name Registry" <xref target="IANA.WebSocket.Subprotocol"/></t>

<t><list style="symbols">
  <t>Subprotocol Identifier: <spanx style="verb">puhspull</spanx></t>
  <t>Subprotocol Common Name: <spanx style="verb">WebSocket transport for Pushpull delivery of SETs</spanx></t>
  <t>Subprotocol Definition: Section <xref target="pushpull-subprotocol-handshake"/> of this document.</t>
</list></t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC6455">
  <front>
    <title>The WebSocket Protocol</title>
    <author fullname="I. Fette" initials="I." surname="Fette"/>
    <author fullname="A. Melnikov" initials="A." surname="Melnikov"/>
    <date month="December" year="2011"/>
    <abstract>
      <t>The WebSocket Protocol enables two-way communication between a client running untrusted code in a controlled environment to a remote host that has opted-in to communications from that code. The security model used for this is the origin-based security model commonly used by web browsers. The protocol consists of an opening handshake followed by basic message framing, layered over TCP. The goal of this technology is to provide a mechanism for browser-based applications that need two-way communication with servers that does not rely on opening multiple HTTP connections (e.g., using XMLHttpRequest or s and long polling). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6455"/>
  <seriesInfo name="DOI" value="10.17487/RFC6455"/>
</reference>

<reference anchor="RFC6749">
  <front>
    <title>The OAuth 2.0 Authorization Framework</title>
    <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
    <date month="October" year="2012"/>
    <abstract>
      <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6749"/>
  <seriesInfo name="DOI" value="10.17487/RFC6749"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC8259">
  <front>
    <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
    <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
    <date month="December" year="2017"/>
    <abstract>
      <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
      <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="90"/>
  <seriesInfo name="RFC" value="8259"/>
  <seriesInfo name="DOI" value="10.17487/RFC8259"/>
</reference>

<reference anchor="RFC8417">
  <front>
    <title>Security Event Token (SET)</title>
    <author fullname="P. Hunt" initials="P." role="editor" surname="Hunt"/>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="W. Denniss" initials="W." surname="Denniss"/>
    <author fullname="M. Ansari" initials="M." surname="Ansari"/>
    <date month="July" year="2018"/>
    <abstract>
      <t>This specification defines the Security Event Token (SET) data structure. A SET describes statements of fact from the perspective of an issuer about a subject. These statements of fact represent an event that occurred directly to or about a security subject, for example, a statement about the issuance or revocation of a token on behalf of a subject. This specification is intended to enable representing security- and identity-related events. A SET is a JSON Web Token (JWT), which can be optionally signed and/or encrypted. SETs can be distributed via protocols such as HTTP.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8417"/>
  <seriesInfo name="DOI" value="10.17487/RFC8417"/>
</reference>

<reference anchor="RFC8446">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8446"/>
  <seriesInfo name="DOI" value="10.17487/RFC8446"/>
</reference>

<reference anchor="RFC8935">
  <front>
    <title>Push-Based Security Event Token (SET) Delivery Using HTTP</title>
    <author fullname="A. Backman" initials="A." role="editor" surname="Backman"/>
    <author fullname="M. Jones" initials="M." role="editor" surname="Jones"/>
    <author fullname="M. Scurtescu" initials="M." surname="Scurtescu"/>
    <author fullname="M. Ansari" initials="M." surname="Ansari"/>
    <author fullname="A. Nadalin" initials="A." surname="Nadalin"/>
    <date month="November" year="2020"/>
    <abstract>
      <t>This specification defines how a Security Event Token (SET) can be delivered to an intended recipient using HTTP POST over TLS. The SET is transmitted in the body of an HTTP POST request to an endpoint operated by the recipient, and the recipient indicates successful or failed transmission via the HTTP response.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8935"/>
  <seriesInfo name="DOI" value="10.17487/RFC8935"/>
</reference>

<reference anchor="RFC8936">
  <front>
    <title>Poll-Based Security Event Token (SET) Delivery Using HTTP</title>
    <author fullname="A. Backman" initials="A." role="editor" surname="Backman"/>
    <author fullname="M. Jones" initials="M." role="editor" surname="Jones"/>
    <author fullname="M. Scurtescu" initials="M." surname="Scurtescu"/>
    <author fullname="M. Ansari" initials="M." surname="Ansari"/>
    <author fullname="A. Nadalin" initials="A." surname="Nadalin"/>
    <date month="November" year="2020"/>
    <abstract>
      <t>This specification defines how a series of Security Event Tokens (SETs) can be delivered to an intended recipient using HTTP POST over TLS initiated as a poll by the recipient. The specification also defines how delivery can be assured, subject to the SET Recipient's need for assurance.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8936"/>
  <seriesInfo name="DOI" value="10.17487/RFC8936"/>
</reference>

<reference anchor="RFC9110">
  <front>
    <title>HTTP Semantics</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
      <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="97"/>
  <seriesInfo name="RFC" value="9110"/>
  <seriesInfo name="DOI" value="10.17487/RFC9110"/>
</reference>


<reference anchor="OPRM" target="https://datatracker.ietf.org/doc/draft-ietf-oauth-resource-metadata/">
  <front>
    <title>OAuth 2.0 Protected Resource Metadata</title>
    <author initials="M. B." surname="Jones" fullname="Michael B. Jones">
      <organization></organization>
    </author>
    <author initials="P." surname="Hunt" fullname="Phil Hunt">
      <organization></organization>
    </author>
    <author initials="A." surname="Parecki" fullname="Aaron Parecki">
      <organization></organization>
    </author>
    <date year="2024" month="May"/>
  </front>
</reference>
<reference anchor="IANA.WebSocket.Subprotocol" target="https://www.iana.org/assignments/websocket/websocket.xml#subprotocol-name">
  <front>
    <title>WebSocket Subprotocol Name Registry</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>



    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="E." surname="Gustavson" fullname="Erik Gustavson">
      <organization>SGNL</organization>
      <address>
        <email>erik@sgnl.ai</email>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

