<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hood-independent-agtp-06" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="AGTP">Agent Transfer Protocol (AGTP)</title>
    <seriesInfo name="Internet-Draft" value="draft-hood-independent-agtp-06"/>
    <author fullname="Chris Hood">
      <organization>Nomotic, Inc.</organization>
      <address>
        <email>chris@nomotic.ai</email>
        <uri>https://nomotic.ai</uri>
      </address>
    </author>
    <date year="2026" month="April" day="27"/>
    <area>Applications and Real-Time</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>AI agents</keyword>
    <keyword>agentic systems</keyword>
    <keyword>protocol</keyword>
    <keyword>agent traffic</keyword>
    <keyword>agent transfer</keyword>
    <abstract>
      <?line 136?>

<t>AI agents and agentic systems generate a growing volume of intent-driven,
unstructured, and undifferentiated traffic that flows through HTTP
indistinguishably from human-initiated requests. HTTP lacks the semantic
vocabulary, observability primitives, and identity mechanisms required by
agent systems operating at scale. Existing protocols described as Agent
Group Messaging Protocols (AGMP), including MCP, ACP, A2A, and ANP, are
messaging-layer constructs that presuppose HTTP as their transport.
They do not address the underlying transport problem.</t>
      <t>This document defines the Agent Transfer Protocol (AGTP): a dedicated
application-layer protocol for AI agent traffic. Version 05 restores the
canonical Agent-ID as the primary identity primitive and decouples Trust
Tier 1 verification from DNS as a sole requirement. A canonical Agent-ID
is derived from the agent's Birth Certificate hash and is authoritative
in every AGTP protocol operation. Three equivalent verification paths are
recognized for Trust Tier 1: DNS-anchored verification via RFC 8555 ACME
challenge, log-anchored verification via Birth Certificate inclusion in an
append-only transparency log aligned with RFC 9162 and RFC 9943 (SCITT),
and hybrid verification combining DNS control with blockchain address
ownership. The <tt>.agent</tt> and <tt>.nomo</tt> hierarchical namespaces are reinstated
as agent-native resolution aliases with deterministic disambiguation rules
governing coexistence with Web3 naming systems. Version 04 introduced
normative integration hooks for the AGTP Merchant Identity and Agentic
Commerce Binding specification <xref target="AGTP-MERCHANT"/>, which defines the
merchant-side identity model that complements AGTP's agent-side
identity model. Version 04 added four merchant-related request headers
(Merchant-ID, Merchant-Manifest-Fingerprint, Intent-Assertion, Cart-
Digest), the 455 Counterparty Unverified status code, and the
<tt>merchant</tt> and <tt>intent</tt> Authority-Scope domains. Together these
elements close the verification loop between the initiating agent and
the receiving merchant on AGTP PURCHASE invocations. Version 03
introduced normative integration with the Agentic Grammar and Interface
Specification (AGIS) <xref target="AGIS"/>, which defines the grammar-based
validation pathway for AGTP method identifiers. AGIS-conformant methods
are accepted at the transport layer via the Method-Grammar header
without requiring prior IANA registration, enabling organizations to
define domain-specific Agentive API vocabularies while preserving
interoperability through shared grammatical constraints. AGTP provides
agent-native intent methods (QUERY, SUMMARIZE, BOOK, SCHEDULE, LEARN,
DELEGATE, COLLABORATE, CONFIRM, ESCALATE, NOTIFY, DESCRIBE, SUSPEND),
protocol-level agent identity and authority headers, and a status code
vocabulary designed for the conditions AI agent systems encounter. AGTP
SHOULD prefer QUIC for new implementations and MUST support TCP/TLS for
compatibility and fallback. It is designed to be composable with existing
agent frameworks, not to replace them. Version 02 introduces capability
discovery (DESCRIBE), resource budget signaling and enforcement, optional
RATS-aligned execution attestation, observability hooks, network zone
isolation, session suspension as a method, and normative composition
profiles with AGMP (Agent Group Messaging Protocols). Version 02 enables
dynamic capability negotiation and resource-aware governance.</t>
    </abstract>
  </front>
  <middle>
    <?line 189?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><strong>Note Regarding Intellectual Property:</strong>  Implementers should be
aware that extensions and certain mechanisms referenced in this
document -- including the Agent Certificate extension (Section 7.2),
the ACTIVATE method, the Agent Birth Certificate mechanism
(Section 5.7), and the <tt>.agent</tt> and <tt>.nomo</tt> file format
specifications (Section 2) -- may be subject to pending patent
applications by the author.  The core AGTP specification is intended
for open implementation without royalty obligation.  The licensor is
prepared to grant a royalty-free license to implementers consistent
with <xref target="RFC8179"/>.  IPR disclosures:
https://datatracker.ietf.org/ipr/ -- see also Section 7.7.</t>
      <section anchor="background">
        <name>Background</name>
        <t>The deployment of AI agents and multi-agent systems is accelerating
across enterprise, research, and consumer contexts. These systems execute
complex, multi-step workflows, querying data sources, booking resources,
delegating subtasks to peer agents, and escalating decisions to human
principals, with minimal or no human supervision per transaction.</t>
        <t>Unlike human-initiated web traffic, agent-generated traffic is dynamic,
high-frequency, intent-driven, and often stateful across sequences of
related requests. The infrastructure carrying this traffic was not
designed with these properties in mind.</t>
      </section>
      <section anchor="limitations-of-http-for-agent-traffic">
        <name>Limitations of HTTP for Agent Traffic</name>
        <t>HTTP has served as the internet's primary application-layer transport for
over three decades. Its evolution through HTTP/2 <xref target="RFC7540"/> and HTTP/3
<xref target="RFC9114"/> has improved performance, multiplexing, and latency. However,
the fundamental model of HTTP being stateless, resource-oriented,
human-initiated request/response, creates specific failures when applied
to agentic systems at scale:</t>
        <ul spacing="normal">
          <li>
            <t>Traffic indistinguishability: Agent-generated requests are structurally
identical to human-initiated requests at the transport layer. Operators
cannot identify, route, or govern agent traffic without application-layer
instrumentation.</t>
          </li>
          <li>
            <t>Method vocabulary mismatch: HTTP's method set (GET, POST, PUT, DELETE,
PATCH) describes resource operations. Agent traffic expresses purposeful
intent, summarize, book, delegate, escalate. The mismatch forces intent
into request bodies, invisible to protocol-level handlers.</t>
          </li>
          <li>
            <t>Identity and attribution absence: HTTP carries no native mechanism for
asserting agent identity, declared authority scope, or the principal
accountable for an agent's actions.</t>
          </li>
          <li>
            <t>Session semantics mismatch: HTTP's stateless model is optimized for
isolated request/response cycles. Agent workflows are inherently stateful
sequences.</t>
          </li>
        </ul>
      </section>
      <section anchor="why-not-evolve-http">
        <name>Why Not Evolve HTTP?</name>
        <t>A natural question is whether these limitations could be addressed by
extending HTTP rather than defining a new protocol. There are three
specific reasons why HTTP extension is not the preferred path.</t>
        <t>First, the HTTP method registry is effectively frozen for new semantics.
<xref target="RFC9110"/> defines the HTTP method registry with IETF Review as the
registration procedure, meaning new methods require a full IETF consensus
process and must be backward-compatible with existing HTTP implementations.
Adding intent-based verbs (SUMMARIZE, DELEGATE, ESCALATE) to HTTP would
require every HTTP client, server, proxy, and middleware component to ignore
or handle unknown methods gracefully, a compatibility constraint that limits
how agent-specific semantics can be expressed at the protocol level.</t>
        <t>Second, HTTP carries decades of backward-compatibility constraints. Features
such as persistent agent identity headers, authority scope declarations, and
session-level governance semantics would require HTTP extensions that interact
unpredictably with existing caching, proxy, and CDN behavior designed for
human-generated traffic patterns.</t>
        <t>Third, the observability goal making agent traffic distinguishable from
human traffic at the infrastructure layer cannot be achieved by adding
fields to HTTP. Infrastructure components route and filter HTTP traffic
based on methods and headers that are identical across agent and human
requests. A protocol-level separation is necessary to give infrastructure
the signal it needs.</t>
        <t>AGTP is therefore designed as a dedicated protocol rather than an HTTP
extension. HTTP and AGTP coexist: human traffic continues to flow over
HTTP; agent traffic flows over AGTP. The two protocols serve different
classes of network participant.</t>
        <t>Note: The abbreviation AGTP is used in this document to distinguish
the Agent Transfer Protocol from the Authenticated Transfer Protocol
(ATP) working group currently chartered within the IETF. The URI
agtp:// is proposed for IANA registration as a new and distinct scheme.</t>
      </section>
      <section anchor="motivation-for-a-dedicated-protocol">
        <name>Motivation for a Dedicated Protocol</name>
        <t>These limitations are architectural, not implementational. They cannot be
resolved by better middleware or application code layered on HTTP. They
require a protocol designed from first principles for AI agent systems.</t>
        <t>AGTP is that protocol. It provides a dedicated transport environment for
agent traffic with: native intent-based methods, mandatory agent identity
headers, protocol-level authority scope declaration, and a status code
vocabulary for the conditions AI systems encounter.</t>
      </section>
      <section anchor="scope-and-target-audience">
        <name>Scope and Target Audience</name>
        <t>This document covers AGTP architecture, design principles, stack position,
request and response header format, agent-native method definitions and
semantics, status code vocabulary, security considerations, and IANA
considerations.</t>
        <t>The Agent Certificate extension for cryptographic binding of agent
identity to AGTP header fields is described at a high level in Section 7.2.
Full specification is provided in a separate companion document:
<xref target="AGTP-CERT"/>. That extension may be subject to pending intellectual
property claims; see Section 7.7 and the IPR Notice preceding the Abstract.</t>
        <t>Merchant-side identity verification for PURCHASE counterparties is
described at a high level in Section 8 of this document and specified
in full in a separate companion: <xref target="AGTP-MERCHANT"/>. This document
registers the merchant-related request headers, the 455 Counterparty
Unverified status code, and the <tt>merchant</tt> and <tt>intent</tt> Authority-Scope
domains; the Merchant Manifest Document, Merchant Birth Certificate,
counterparty verification procedure, and Intent Assertion JWT format
are specified in the companion.</t>
        <t>Target audience: AI agent developers, protocol designers, cloud and network
infrastructure providers, enterprise security and compliance architects, and
standards community participants.</t>
      </section>
      <section anchor="agtp-as-the-transport-foundation-for-agent-group-messaging-protocols">
        <name>AGTP as the Transport Foundation for Agent Group Messaging Protocols</name>
        <t>AGTP is the purpose-built transport and governance layer for Agent Group
Messaging Protocols (AGMPs): the category of higher-layer AI agent messaging
standards that includes the Model Context Protocol (MCP) <xref target="MCP"/>, the
Agent-to-Agent Protocol (A2A) <xref target="A2A"/>, the Agent Communication Protocol
(ACP) <xref target="ACP"/>, and emerging others.</t>
        <t>AGMPs define what agents say. AGTP defines how those messages move, who
sent them, and under what authority. AGTP provides the narrow-waist
foundation that AGMPs inherit without modification: intent-native methods,
mandatory agent identity and scoping, resource budget enforcement,
observability hooks, and normative composition profiles. A deployment
running any AGMP over AGTP gains transport-level governance without changes
to the messaging layer.</t>
        <t>The AGMP category term is introduced in this document to provide a stable
collective reference for the class of protocols that AGTP serves as
substrate. It is not a formal IETF term of art; it is a descriptive
classification. Individual AGMP specifications retain their own names and
development paths. AGTP does not govern, modify, or supersede any AGMP.</t>
        <figure anchor="agmp-stack">
          <name>AGTP as Substrate for AGMPs</name>
          <artwork><![CDATA[
+-----------------------------------------------------+
|            Agent Application Logic                  |
+-----------------------------------------------------+
|  AGMP Layer: MCP / A2A / ACP / ANP  [optional]      |
+-----------------------------------------------------+
|   AGTP - Agent Transfer Protocol      [this spec]    |
+-----------------------------------------------------+
|            TLS 1.3+                  [mandatory]    |
+-----------------------------------------------------+
|         TCP / QUIC / UDP                            |
+-----------------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<strong>MUST</strong>", "<strong>MUST NOT</strong>", "<strong>REQUIRED</strong>", "<strong>SHALL</strong>",
"<strong>SHALL NOT</strong>", "<strong>SHOULD</strong>", "<strong>SHOULD NOT</strong>", "<strong>RECOMMENDED</strong>",
"<strong>NOT RECOMMENDED</strong>", "<strong>MAY</strong>", and "<strong>OPTIONAL</strong>" in this document
are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when,
and only when, they appear in all capitals.</t>
      <dl>
        <dt>Agent:</dt>
        <dd>
          <t>An AI software system that executes tasks, makes decisions, and takes
actions without continuous human supervision per transaction.</t>
        </dd>
        <dt>Principal:</dt>
        <dd>
          <t>The human, organization, or system that authorized an agent to act and
is accountable for its actions.</t>
        </dd>
        <dt>Agent-ID:</dt>
        <dd>
          <t>A unique identifier for a specific agent instance, present in all AGTP
request headers.</t>
        </dd>
        <dt>Principal-ID:</dt>
        <dd>
          <t>The identifier of the principal on whose behalf an agent operates.</t>
        </dd>
        <dt>Authority-Scope:</dt>
        <dd>
          <t>A declared set of permissions defining what actions an agent is
authorized to take, in the format domain:action or domain:*.</t>
        </dd>
        <dt>Intent Method:</dt>
        <dd>
          <t>An AGTP method name expressing the agent's purpose, as distinguished from
HTTP resource-operation verbs.</t>
        </dd>
        <dt>Delegation Chain:</dt>
        <dd>
          <t>An ordered record of Agent-IDs representing the sequence of delegations
that produced the current request.</t>
        </dd>
        <dt>Escalation:</dt>
        <dd>
          <t>An agent's intentional deferral of a decision or action to a human
principal or higher-authority agent.</t>
        </dd>
        <dt>Attribution Record:</dt>
        <dd>
          <t>A logged record of an agent action sufficient for audit and compliance
purposes.</t>
        </dd>
        <dt>Session:</dt>
        <dd>
          <t>An AGTP persistent connection context shared across multiple method
invocations within a single agent workflow.</t>
        </dd>
        <dt>SEP (Scope-Enforcement Point):</dt>
        <dd>
          <t>An AGTP-aware infrastructure component, load balancer, gateway, and proxy,
that enforces Authority-Scope compliance without application-layer access.
Requires the Agent Certificate extension (<xref target="AGTP-CERT"/>).</t>
        </dd>
        <dt>Agent Package (.agent):</dt>
        <dd>
          <t>A portable, open deployment artifact for an AI agent. An <tt>.agent</tt> file
contains an embedded Agent Manifest, an integrity hash covering all
package contents, and a behavioral trust score computed at packaging
time. The <tt>.agent</tt> format is an open specification. It is analogous to
a container image: a self-describing, portable unit of deployment. The
<tt>.agent</tt> suffix is a file format designator and <strong>MUST NOT</strong> appear as
a hostname component or top-level label in <tt>agtp://</tt> URIs. Note: the
<tt>.agent</tt> file format specification may be subject to pending patent
claims by the author; see Section 7.7.</t>
        </dd>
        <dt>Governed Agent Package (.nomo):</dt>
        <dd>
          <t>A deployment artifact in the <tt>.nomo</tt> format, which extends the <tt>.agent</tt>
format with a CA-signed certificate chain binding the package to a
verified governance zone and issuing principal. The <tt>.nomo</tt> format is
to <tt>.agent</tt> as HTTPS is to HTTP: the same structural foundation with
an added layer of cryptographic trust. A <tt>.nomo</tt> package is required
for agents operating at Trust Tier 1 (see Section 5.2). The <tt>.nomo</tt>
suffix is a file format designator and <strong>MUST NOT</strong> appear as a
hostname component in <tt>agtp://</tt> URIs.
</t>
          <t>The name derives from the Greek <em>nomos</em> (νόμος), meaning law, rule,
or governance, the same root that underlies <em>autonomy</em> (self-law),
<em>nomocracy</em> (rule of law), and <em>onomastics</em>. A <tt>.nomo</tt> package is
literally an agent operating under law: its behavior is bounded by a
cryptographically enforced governance context at the packaging layer.
Note: the <tt>.nomo</tt> file format specification may be subject to pending
patent claims by the author; see Section 7.7.</t>
        </dd>
        <dt>Agent Transfer Document (.agtp):</dt>
        <dd>
          <t>The wire-level manifest document format defined by this specification.
An <tt>.agtp</tt> document is a signed JSON structure containing the fields
defined in Section 5.5 (Agent Manifest Document). It is the output
format returned by all AGTP URI resolution requests. Both <tt>.agent</tt> and
<tt>.nomo</tt> packages produce <tt>.agtp</tt> documents when queried; the <tt>.agtp</tt>
format is the protocol's canonical representation of agent identity
and is independent of the underlying packaging format. The <tt>.agtp</tt>
suffix <strong>MAY</strong> appear in filenames for stored manifest documents but
<strong>MUST NOT</strong> appear in <tt>agtp://</tt> URIs. The Content-Type for <tt>.agtp</tt>
documents is <tt>application/agtp+json</tt>.</t>
        </dd>
        <dt>URI (AGTP):</dt>
        <dd>
          <t>An <tt>agtp://</tt> scheme URI that identifies an agent or agent namespace.
AGTP URIs are addresses, not filenames. File extensions (<tt>.agent</tt>,
<tt>.nomo</tt>, <tt>.agtp</tt>) <strong>MUST NOT</strong> appear in canonical AGTP URIs. See
Section 5.1 for the canonical URI forms and resolution semantics.</t>
        </dd>
        <dt>Agent Namespace Document:</dt>
        <dd>
          <t>A cryptographically signed <tt>application/agtp+json</tt> document returned
in response to a request targeting an organization's agent registry
root (e.g., <tt>agtp://acme.tld/agents</tt>). Lists all Active agents
registered under the organization's governance zone. The document is
generated and re-signed by the governance platform on any registry
change. It is not a manually editable file. See Section 5.4.</t>
        </dd>
        <dt>Agent Manifest Document:</dt>
        <dd>
          <t>A cryptographically signed <tt>application/agtp+json</tt> document returned
in response to a request targeting a specific agent
(e.g., <tt>agtp://acme.tld/agents/customer-service</tt>). Contains the
agent's birth certificate fields, lifecycle state, behavioral trust
score, authority scope categories, supported methods, and governance
zone. Derived directly from the agent's <tt>.agent</tt> or <tt>.nomo</tt> package;
the package integrity hash is verified before the manifest is served.
See Section 5.5.</t>
        </dd>
        <dt>Agent Birth Certificate:</dt>
        <dd>
          <t>A cryptographically signed identity document issued to an agent at
registration time by a governance platform. The Birth Certificate is
the genesis record of an agent's existence: it establishes the agent's
identity, ownership, authorized scope, behavioral archetype, and
governance zone before the agent takes any action. Authority is issued
through the Birth Certificate; it is never self-assumed.
</t>
          <t>The Birth Certificate is the source document from which the Agent
Manifest Document (Section 5.5) is derived when an AGTP URI is
resolved. The <tt>certificate_hash</tt> field of the Birth Certificate is
the basis for the agent's canonical Agent-ID. In this sense the Birth
Certificate functions as the agent's social security number: issued
once at creation, permanently bound to the individual, and the
authoritative identity record from which all other identity
representations derive.</t>
          <t>Birth Certificate fields map directly to AGTP protocol headers:
<tt>agent_id</tt> maps to the <tt>Agent-ID</tt> header; <tt>owner</tt> maps to the
<tt>Principal-ID</tt> header; <tt>scope</tt> maps to the <tt>Authority-Scope</tt> header.
See Section 5.7.</t>
          <t>Anonymous agents are ungovernable. Without a Birth Certificate, there
is no mechanism to trace decisions to a responsible principal, enforce
scope boundaries, or maintain a meaningful audit trail. Note: the
Agent Birth Certificate mechanism may be subject to pending patent
claims by the author; see Section 7.7.</t>
        </dd>
        <dt>Governance Token:</dt>
        <dd>
          <t>A signed, time-limited JWT artifact issued by a governance runtime
that encodes a specific governance decision for a specific action.
Governance tokens are the runtime companion to the static Birth
Certificate: where the Birth Certificate establishes persistent
identity, the Governance Token carries a bounded authorization for a
single action or session. Tokens carry the governance verdict
(ALLOW, DENY), the agent ID, action details, trust score dimensions,
issuer identity, and expiry. Default TTL: 30 seconds. Tokens
<strong>MUST NOT</strong> be reused across actions; each action requires a fresh
evaluation and a fresh token.</t>
        </dd>
        <dt>Trust Tier:</dt>
        <dd>
          <t>A classification assigned to an agent based on the strength of
identity verification backing its registration. Tier 1 (Verified):
org anchor is a real DNS domain with confirmed ownership and a <tt>.nomo</tt>
governed package. Tier 2 (Org-Asserted): org label is present but
DNS ownership is unverified; <tt>.agent</tt> package acceptable. Tier 3
(Experimental): X- prefix required; not discoverable through the
public AGTP registry. See Section 5.2.</t>
        </dd>
        <dt>AGMP (Agent Group Messaging Protocol):</dt>
        <dd>
          <t>The collective term for higher-layer AI agent messaging standards
that operate over AGTP as their transport substrate, including
MCP <xref target="MCP"/>, A2A <xref target="A2A"/>, ACP <xref target="ACP"/>, and ANP <xref target="ANP"/>. AGMPs
define what agents say to each other. AGTP defines how those
messages move. The term is introduced in this document as a
descriptive classification; it is not a formal IETF term of art.</t>
        </dd>
        <dt>DESCRIBE:</dt>
        <dd>
          <t>An AGTP Tier 1 core method that returns the declared capabilities,
supported modalities, method vocabulary, and versioned feature set
of a specific agent endpoint. Distinguished from URI resolution
(which returns identity) by returning operational capability
metadata suitable for pre-task negotiation. If the
<tt>capability_domains</tt> parameter is omitted, the server <strong>SHOULD</strong>
return all supported domains. Category: ACQUIRE.</t>
        </dd>
        <dt>SUSPEND (method):</dt>
        <dd>
          <t>An AGTP Tier 1 core method that places a specific active session
workflow into a recoverable paused state, issuing a resumption
nonce for re-entry. Distinguished from the lifecycle SUSPEND event
(Section 6.7.6): method-level SUSPEND is session-scoped and does
not affect the agent's registry lifecycle state or Birth Certificate
validity. Category: ORCHESTRATE.</t>
        </dd>
        <dt>Budget-Limit:</dt>
        <dd>
          <t>A request header declaring the maximum resource consumption the
principal authorizes for a method invocation, expressed as
space-separated unit:value tokens drawn from the IANA AGTP Budget
Unit Registry. Example: <tt>Budget-Limit: tokens=5000
compute-seconds=120 financial=10.00USD ttl=3600</tt>. Exceeding the
declared limit <strong>MUST</strong> cause the server to return 452 Budget
Exceeded rather than continue execution. Note: ttl= is RECOMMENDED 
to bound budget lifetime.</t>
        </dd>
        <dt>AGTP-Zone-ID:</dt>
        <dd>
          <t>A request header declaring the network zone or organizational
boundary within which a request must be processed. Scope-Enforcement
Points (SEPs) <strong>MUST</strong> enforce zone boundaries and <strong>MUST</strong> return
453 Zone Violation if a DELEGATE or COLLABORATE request would route
outside the declared zone.</t>
        </dd>
      </dl>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>AGTP is motivated by three distinct, compounding failures in how current
internet infrastructure handles AI agent traffic.</t>
      <section anchor="problem-1-undifferentiated-agent-traffic-on-http">
        <name>Problem 1: Undifferentiated Agent Traffic on HTTP</name>
        <t>AI agents generate intent-driven, structured traffic that is functionally
invisible to the infrastructure it traverses. This traffic flows through
HTTP alongside human traffic with no protocol-level differentiation.
Observability failure, routing inefficiency, and security blindness result,
operators cannot determine what fraction of traffic is agent-generated
without application-layer instrumentation that is expensive, inconsistent,
and easy to circumvent.</t>
        <t>AGTP response: a dedicated protocol environment for agent traffic.
Infrastructure can distinguish, route, monitor, and govern agent traffic
natively.</t>
      </section>
      <section anchor="problem-2-semantic-mismatch-between-agent-intent-and-available-methods">
        <name>Problem 2: Semantic Mismatch Between Agent Intent and Available Methods</name>
        <t>AI agents operate on intent. HTTP's method vocabulary was designed to
describe operations on resources, not purposeful action. When an agent
intends to SUMMARIZE a document, BOOK a resource, and SCHEDULE a sequence,
all three arrive as POST requests. The server receives identical verbs
with meaningfully different intent buried in request bodies, invisible to
any protocol-level handler.</t>
        <t>AGTP response: a vocabulary of agent-native methods that express intent at
the protocol level.</t>
      </section>
      <section anchor="problem-3-no-protocol-level-identity-authority-or-attribution-for-agents">
        <name>Problem 3: No Protocol-Level Identity, Authority, or Attribution for Agents</name>
        <t>When an AI agent takes an action, there is currently no protocol-level
mechanism to verify who authorized this agent, what scope of authority it
holds, which principal is accountable for its actions, or whether it is
the agent it claims to be. Accountability gaps, authority laundering,
auditability failure, and multi-agent trust collapse result.</t>
        <t>AGTP response: agent identity and authority scope embedded in protocol
headers on every request, with an optional Agent Certificate extension for
cryptographic verification.</t>
      </section>
      <section anchor="problem-summary">
        <name>Problem Summary</name>
        <table>
          <name>Summary of Problems Addressed by AGTP</name>
          <thead>
            <tr>
              <th align="left">#</th>
              <th align="left">Problem</th>
              <th align="left">Current Failure</th>
              <th align="left">AGTP Response</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">Undifferentiated traffic</td>
              <td align="left">HTTP cannot separate agent traffic</td>
              <td align="left">Dedicated protocol environment</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">Semantic mismatch</td>
              <td align="left">HTTP verbs obscure agent intent</td>
              <td align="left">Native intent-based method vocabulary</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">No protocol-level identity</td>
              <td align="left">Attribution is untraceable</td>
              <td align="left">Agent identity and scope in headers</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="related-work-and-existing-approaches">
      <name>Related Work and Existing Approaches</name>
      <section anchor="httprest-as-the-de-facto-standard">
        <name>HTTP/REST as the De Facto Standard</name>
        <t>HTTP remains the universal transport for all agent traffic currently
deployed. REST conventions layered on HTTP provide a degree of semantic
structure, but REST remains a resource-manipulation paradigm. As described
in Section 1.3, evolving HTTP to address agent-specific needs is
constrained by the frozen method registry, backward-compatibility
requirements, and the impossibility of achieving infrastructure-level
traffic differentiation through HTTP extensions alone.</t>
      </section>
      <section anchor="existing-agent-group-messaging-protocols">
        <name>Existing Agent Group Messaging Protocols</name>
        <dl>
          <dt>MCP <xref target="MCP"/> (Model Context Protocol, Anthropic):</dt>
          <dd>
            <t>Defines structured communication between AI models and tools/resources.
Runs over HTTP. Addresses tool-calling semantics, not agent traffic
transport.</t>
          </dd>
          <dt>ACP <xref target="ACP"/> (Agent Communication Protocol, IBM):</dt>
          <dd>
            <t>Defines messaging semantics for agent-to-agent communication. Runs over
HTTP.</t>
          </dd>
          <dt>A2A <xref target="A2A"/> (Agent-to-Agent Protocol, Linux Foundation):</dt>
          <dd>
            <t>Defines inter-agent communication and task delegation semantics. Runs
over HTTP.</t>
          </dd>
          <dt>ANP <xref target="ANP"/> (Agent Network Protocol):</dt>
          <dd>
            <t>Defines discovery and communication for networked agents. Runs over HTTP.</t>
          </dd>
        </dl>
        <t>All of these are messaging protocols. They define what agents say to each
other. They do not define how agent traffic moves across a network. Each
presupposes HTTP as its transport and inherits all of HTTP's limitations
for agentic systems.</t>
      </section>
      <section anchor="transport-layer-alternatives">
        <name>Transport-Layer Alternatives</name>
        <dl>
          <dt>gRPC:</dt>
          <dd>
            <t>High-performance RPC over HTTP/2. Strong typing and efficient
serialization. Does not address agent-specific semantics, identity, or
authority.</t>
          </dd>
          <dt>WebSockets:</dt>
          <dd>
            <t>Persistent bidirectional connections over HTTP. Useful for real-time
communication but does not address method semantics or identity.</t>
          </dd>
          <dt>QUIC <xref target="RFC9000"/>:</dt>
          <dd>
            <t>Modern multiplexed transport with reduced connection overhead. AGTP
<strong>SHOULD</strong> prefer QUIC for new implementations. QUIC is a transport
primitive; AGTP is the application-layer protocol above it.</t>
          </dd>
        </dl>
      </section>
      <section anchor="the-critical-distinction-messaging-vs-transport">
        <name>The Critical Distinction: Messaging vs. Transport</name>
        <t>The most important positioning principle for AGTP is the distinction between
messaging protocols and transport protocols. MCP, ACP, A2A, and ANP are
messaging protocols, they define what agents say. AGTP defines how agent
traffic moves.</t>
        <t>An analogy: SMTP is a messaging protocol that runs over TCP. SMTP does not
replace TCP. Saying "TCP is unnecessary because SMTP exists" is a category
error. The same logic applies here. MCP and its peers define agent messaging
semantics. AGTP defines the transport environment those messages move through.</t>
      </section>
      <section anchor="agtp-positioning-the-proposed-stack">
        <name>AGTP Positioning: The Proposed Stack</name>
        <figure anchor="protocol-stack">
          <name>AGTP in the Protocol Stack</name>
          <artwork><![CDATA[
+-----------------------------------------------------+
|            Agent Application Logic                  |
+-----------------------------------------------------+
|  Messaging Layer  (MCP / ACP / A2A)  [optional]     |
+-----------------------------------------------------+
|   AGTP - Agent Transfer Protocol     [this spec]    |
+-----------------------------------------------------+
|            TLS 1.3+                  [mandatory]    |
+-----------------------------------------------------+
|         TCP / QUIC / UDP                            |
+-----------------------------------------------------+
]]></artwork>
        </figure>
        <t>AGTP is not a replacement for messaging protocols. Agents using MCP or A2A
route those messages over AGTP and gain transport-level observability and
identity without modifying the messaging layer. AGTP-native agents that do
not use a separate messaging protocol interact with AGTP methods directly.</t>
      </section>
    </section>
    <section anchor="protocol-overview">
      <name>Protocol Overview</name>
      <section anchor="stack-position">
        <name>Stack Position</name>
        <t>AGTP is an application-layer protocol. It operates above the transport
layer (TCP, UDP, or QUIC) and is wrapped by TLS. It sits below any agent
messaging protocol in deployments that use one.</t>
        <ul spacing="normal">
          <li>
            <t><strong>SHOULD</strong> prefer QUIC <xref target="RFC9000"/> <xref target="RFC9001"/> for new deployments (lower latency,
multiplexing without head-of-line blocking, 0-RTT connection
establishment).</t>
          </li>
          <li>
            <t><strong>MUST</strong> support TCP/TLS as a fallback for compatibility with existing
infrastructure.</t>
          </li>
          <li>
            <t><strong>MAY</strong> run over UDP where QUIC is not available, subject to
implementor-defined reliability guarantees.</t>
          </li>
        </ul>
        <t>Port assignments are pending IANA Expert Review under the procedures
of <xref target="RFC6335"/>. The IANA registration request, including service names
and transport protocols, is documented in <xref target="iana-ports"/>.</t>
      </section>
      <section anchor="design-principles">
        <name>Design Principles</name>
        <dl>
          <dt>Minimalist core:</dt>
          <dd>
            <t>The base spec defines only what is necessary for agent traffic
differentiation, method semantics, and identity headers. Extensions
belong in companion specifications.</t>
          </dd>
          <dt>Extensible by design:</dt>
          <dd>
            <t>New methods are registered through an IANA-managed Method Registry.
New header fields follow a defined extension convention. Additive
changes do not require a version increment.</t>
          </dd>
          <dt>Agent-native:</dt>
          <dd>
            <t>Every design decision assumes the initiating party is an AI system,
not a human.</t>
          </dd>
          <dt>Secure by default:</dt>
          <dd>
            <t>TLS 1.3 or higher is mandatory. Unencrypted AGTP connections <strong>MUST</strong>
be rejected. Agent identity headers are present on every request.</t>
          </dd>
          <dt>Observable by design:</dt>
          <dd>
            <t>Native metadata in every AGTP header provides the minimum information
needed for routing, monitoring, and audit without application-layer
instrumentation.</t>
          </dd>
          <dt>Composable:</dt>
          <dd>
            <t>AGTP works alongside existing agent messaging protocols without requiring
modification to those protocols.</t>
          </dd>
        </dl>
      </section>
      <section anchor="connection-model">
        <name>Connection Model</name>
        <t>AGTP uses a persistent session model by default, reflecting the reality that
agents typically execute multi-step workflows rather than isolated single
requests. An AGTP session is established with a single TLS handshake
including agent identity assertion, persists across multiple method
exchanges, carries a Session-ID header identifying the agent's task
context, and terminates on explicit session close or inactivity timeout
(RECOMMENDED minimum: 60 seconds).</t>
        <t>Per-request (stateless) mode is supported for constrained environments.
In stateless mode, agent identity headers <strong>MUST</strong> be present on every
individual request.</t>
      </section>
      <section anchor="header-format">
        <name>Header Format</name>
        <section anchor="request-headers">
          <name>Request Headers</name>
          <table>
            <name>AGTP Request Header Fields</name>
            <thead>
              <tr>
                <th align="left">Field</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">AGTP-Version</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Protocol version. Current: AGTP/1.0</td>
              </tr>
              <tr>
                <td align="left">AGTP-Method</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The agent intent method (see Section 6)</td>
              </tr>
              <tr>
                <td align="left">Agent-ID</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Opaque identifier for the requesting agent instance</td>
              </tr>
              <tr>
                <td align="left">Principal-ID</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Identifier of the human or system that authorized this agent</td>
              </tr>
              <tr>
                <td align="left">Authority-Scope</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Declared scope of actions this agent is authorized to take</td>
              </tr>
              <tr>
                <td align="left">Session-ID</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Identifies the current task/workflow context</td>
              </tr>
              <tr>
                <td align="left">Task-ID</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Unique identifier for this specific method invocation</td>
              </tr>
              <tr>
                <td align="left">Delegation-Chain</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Ordered list of Agent-IDs if this request was delegated</td>
              </tr>
              <tr>
                <td align="left">Priority</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Request priority hint: critical, normal, background</td>
              </tr>
              <tr>
                <td align="left">TTL</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Maximum acceptable response latency in milliseconds</td>
              </tr>
              <tr>
                <td align="left">Budget-Limit</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Max resource budget per invocation. Format: space-separated <tt>unit=value</tt> tokens. Units from IANA AGTP Budget Unit Registry.</td>
              </tr>
              <tr>
                <td align="left">AGTP-Zone-ID</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Network zone boundary constraint. SEPs <strong>MUST</strong> enforce; return 453 if DELEGATE or COLLABORATE would exit declared zone.</td>
              </tr>
              <tr>
                <td align="left">Content-Schema</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">URI reference to JSON Schema describing the request body structure. Enables receivers to validate payload without LLM inference.</td>
              </tr>
              <tr>
                <td align="left">Telemetry-Export</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">OTLP endpoint URI for metric export, or <tt>inline</tt> to receive metrics embedded in the response Attribution-Record.</td>
              </tr>
              <tr>
                <td align="left">Merchant-ID</td>
                <td align="left">
                  <strong>MUST</strong> on PURCHASE</td>
                <td align="left">Canonical identifier of the intended merchant counterparty. See <xref target="AGTP-MERCHANT"/>.</td>
              </tr>
              <tr>
                <td align="left">Merchant-Manifest-Fingerprint</td>
                <td align="left">
                  <strong>MUST</strong> on PURCHASE</td>
                <td align="left">SHA-256 fingerprint of the Merchant Manifest Document verified by the requesting agent. Receiving server <strong>MUST</strong> reject with 455 if this does not match its current manifest. See <xref target="AGTP-MERCHANT"/>.</td>
              </tr>
              <tr>
                <td align="left">Intent-Assertion</td>
                <td align="left">
                  <strong>SHOULD</strong> on PURCHASE</td>
                <td align="left">Detached JWT <xref target="RFC7519"/> carrying signed principal-authorized purchase intent. Forwardable to payment networks as standalone evidence. See <xref target="AGTP-MERCHANT"/>.</td>
              </tr>
              <tr>
                <td align="left">Cart-Digest</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Cryptographic digest of a structured cart returned by a prior QUOTE invocation. Binds a PURCHASE to a previously quoted cart without retransmission of line-item detail. See <xref target="AGTP-MERCHANT"/>.</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="response-headers">
          <name>Response Headers</name>
          <table>
            <name>AGTP Response Header Fields</name>
            <thead>
              <tr>
                <th align="left">Field</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">AGTP-Version</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Protocol version</td>
              </tr>
              <tr>
                <td align="left">AGTP-Status</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Numeric status code (see Section 5.5)</td>
              </tr>
              <tr>
                <td align="left">Task-ID</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Echo of request Task-ID for correlation</td>
              </tr>
              <tr>
                <td align="left">Server-Agent-ID</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Identity of the responding server or agent</td>
              </tr>
              <tr>
                <td align="left">Attribution-Record</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Signed record of the action taken, for audit. <strong>MAY</strong> include RATS attestation evidence and inline telemetry when Telemetry-Export is set to <tt>inline</tt>.</td>
              </tr>
              <tr>
                <td align="left">Continuation-Token</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Token for retrieving additional results in streaming contexts</td>
              </tr>
              <tr>
                <td align="left">Supported-Methods</td>
                <td align="left">
                  <strong>SHOULD</strong> (on session open)</td>
                <td align="left">List of AGTP methods supported by this server</td>
              </tr>
              <tr>
                <td align="left">Cost-Estimate</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Estimated resource consumption in Budget-Limit unit format. Returned by QUOTE; <strong>MAY</strong> appear on any response as an informational signal.</td>
              </tr>
              <tr>
                <td align="left">Attestation-Evidence</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">RATS attestation evidence token or reference URI per <xref target="RFC9334"/>. Format indicated by <tt>attestation_type</tt> in response body: <tt>rats-eat</tt>, <tt>rats-corim</tt>, or <tt>rats-uri</tt>.</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="status-codes">
        <name>Status Codes</name>
        <t>AGTP defines its own status code space. Codes 451, 452, 453, 550, and 551
are AGTP-specific with no HTTP equivalent and are registered in the IANA
AGTP Status Code Registry (see Section 9.3).</t>
        <table>
          <name>AGTP Status Codes</name>
          <thead>
            <tr>
              <th align="left">Code</th>
              <th align="left">Name</th>
              <th align="left">Meaning</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">200</td>
              <td align="left">OK</td>
              <td align="left">Method executed successfully</td>
            </tr>
            <tr>
              <td align="left">202</td>
              <td align="left">Accepted</td>
              <td align="left">Method accepted; execution is asynchronous</td>
            </tr>
            <tr>
              <td align="left">204</td>
              <td align="left">No Content</td>
              <td align="left">Method executed; no response body</td>
            </tr>
            <tr>
              <td align="left">400</td>
              <td align="left">Bad Request</td>
              <td align="left">Malformed AGTP request</td>
            </tr>
            <tr>
              <td align="left">401</td>
              <td align="left">Unauthorized</td>
              <td align="left">Agent-ID not recognized or not authenticated</td>
            </tr>
            <tr>
              <td align="left">403</td>
              <td align="left">Forbidden</td>
              <td align="left">Agent lacks authority for requested action per Authority-Scope</td>
            </tr>
            <tr>
              <td align="left">404</td>
              <td align="left">Not Found</td>
              <td align="left">Target resource or agent not found</td>
            </tr>
            <tr>
              <td align="left">408</td>
              <td align="left">Timeout</td>
              <td align="left">TTL exceeded before method could execute</td>
            </tr>
            <tr>
              <td align="left">409</td>
              <td align="left">Conflict</td>
              <td align="left">Method conflicts with current state (e.g., BOOK on unavailable resource)</td>
            </tr>
            <tr>
              <td align="left">410</td>
              <td align="left">Gone</td>
              <td align="left">Agent has been Revoked or Deprecated; canonical ID is permanently retired</td>
            </tr>
            <tr>
              <td align="left">422</td>
              <td align="left">Unprocessable</td>
              <td align="left">Request well-formed but semantically invalid</td>
            </tr>
            <tr>
              <td align="left">429</td>
              <td align="left">Rate Limited</td>
              <td align="left">Agent is exceeding permitted request frequency</td>
            </tr>
            <tr>
              <td align="left">451</td>
              <td align="left">Scope Violation</td>
              <td align="left">Requested action is outside declared Authority-Scope. AGTP-specific</td>
            </tr>
            <tr>
              <td align="left">452</td>
              <td align="left">Budget Exceeded</td>
              <td align="left">Method execution would exceed the Budget-Limit declared in the request. AGTP-specific</td>
            </tr>
            <tr>
              <td align="left">453</td>
              <td align="left">Zone Violation</td>
              <td align="left">Request would route outside the AGTP-Zone-ID boundary. SEP-enforced. AGTP-specific</td>
            </tr>
            <tr>
              <td align="left">455</td>
              <td align="left">Counterparty Unverified</td>
              <td align="left">PURCHASE counterparty failed merchant identity verification: Merchant-ID absent, Merchant-Manifest-Fingerprint mismatch, or merchant in non-Active lifecycle state. AGTP-specific. See <xref target="AGTP-MERCHANT"/>.</td>
            </tr>
            <tr>
              <td align="left">500</td>
              <td align="left">Server Error</td>
              <td align="left">Internal failure in the responding system</td>
            </tr>
            <tr>
              <td align="left">503</td>
              <td align="left">Unavailable</td>
              <td align="left">Responding agent or system temporarily unavailable or Suspended</td>
            </tr>
            <tr>
              <td align="left">550</td>
              <td align="left">Delegation Failure</td>
              <td align="left">A delegated sub-agent failed to complete the requested action. AGTP-specific</td>
            </tr>
            <tr>
              <td align="left">551</td>
              <td align="left">Authority Chain Broken</td>
              <td align="left">Delegation chain contains an unverifiable or broken identity link. AGTP-specific</td>
            </tr>
          </tbody>
        </table>
        <t>Status code 451 (Scope Violation) is a governance signal: the agent
attempted an action outside its declared Authority-Scope, caught at the
protocol level. Status code 452 (Budget Exceeded) is a governance signal
analogous to 451: the agent's requested action is within its Authority-Scope
but would consume resources beyond what the principal authorized for this
invocation. Status code 453 (Zone Violation) is returned by SEPs when a
DELEGATE or COLLABORATE request would route to an agent outside the declared
AGTP-Zone-ID boundary. Status code 455 (Counterparty Unverified) is returned
on PURCHASE invocations when the receiving server cannot verify that the
requesting agent has performed valid merchant identity verification against
the server's current Merchant Manifest Document, or when the merchant is in
a non-Active lifecycle state; see <xref target="AGTP-MERCHANT"/>. Status code 551
(Authority Chain Broken) indicates that one or more Agent-ID entries in the
Delegation-Chain header cannot be verified as part of a valid delegation
sequence. Status code 410 (Gone) is returned when an agent's Birth
Certificate has been revoked or the agent deprecated; the canonical
Agent-ID is permanently retired and <strong>MUST NOT</strong> be retried. All
AGTP-specific status codes are operational signals, not protocol errors,
and <strong>MUST</strong> be logged for audit purposes.</t>
      </section>
      <section anchor="wire-format-and-content-type">
        <name>Wire Format and Content-Type</name>
        <t>AGTP request and response bodies are encoded as JSON. The registered
Content-Type for AGTP message bodies is:</t>
        <artwork><![CDATA[
Content-Type: application/agtp+json
]]></artwork>
        <t>Implementations <strong>MUST</strong> include this Content-Type on all AGTP requests and
responses that carry a message body. Responses with no body (e.g., 204 No
Content) <strong>MUST NOT</strong> include a Content-Type header. Binary or streaming
extensions <strong>MAY</strong> define additional Content-Type values as part of their
companion specifications.</t>
        <t>The common structure for all AGTP request bodies:</t>
        <sourcecode type="json"><![CDATA[
{
  "method": "QUERY",
  "task_id": "task-0042",
  "session_id": "sess-a1b2c3d4",
  "parameters": { },
  "context": { }
}
]]></sourcecode>
        <t>And for all AGTP response bodies:</t>
        <sourcecode type="json"><![CDATA[
{
  "status": 200,
  "task_id": "task-0042",
  "result": { },
  "attribution": { }
}
]]></sourcecode>
      </section>
      <section anchor="early-implementations">
        <name>Early Implementations</name>
        <t>AGTP is a proposed specification. No production implementations exist at
the time of this writing. The author encourages early prototype
implementations to validate the protocol design, identify gaps, and
generate feedback prior to IETF working group submission.</t>
        <ul empty="true">
          <li>
            <t>If you are building an AGTP prototype or reference implementation,
please share your findings via the feedback channel listed on the cover
of this document. A reference implementation in Python and/or Go is
planned as open-source software concurrent with or shortly after IETF
I-D submission. Implementation reports are welcome and will be
incorporated into subsequent draft revisions.</t>
          </li>
        </ul>
        <t>Implementers wishing to experiment before final IANA port assignment
<strong>SHOULD</strong> use a locally-chosen port from the Dynamic Ports range
(49152-65535) on developer-controlled endpoints. Implementations
<strong>MUST NOT</strong> publish or document any specific port number as an
AGTP-associated value until IANA assignment is complete.</t>
        <t>The ACTIVATE method extension, which binds <tt>.nomo</tt> governed agent packages
to AGTP as a first-class activation operation, is described in a companion
document and is implemented as an optional extension. Core AGTP
implementations need not support ACTIVATE to be compliant with this
specification.</t>
      </section>
    </section>
    <section anchor="agent-identity-uri-structure-and-registration">
      <name>Agent Identity, URI Structure, and Registration</name>
      <section anchor="uri-structure-and-resolution-mechanics">
        <name>URI Structure and Resolution Mechanics</name>
        <section anchor="foundational-principle">
          <name>Foundational Principle</name>
          <t>AGTP identity is agent-first. Every agent is identified by a canonical
Agent-ID: a 256-bit cryptographic identifier derived from the agent's
Birth Certificate hash at ACTIVATE time. The canonical Agent-ID is the
authoritative identifier in every AGTP protocol operation. It appears
in the <tt>Agent-ID</tt> header of every request, is the key in the registry,
and is the cross-layer reference linking the AGTP Agent Certificate
extension to the governance-layer Birth Certificate.</t>
          <t>All other identification forms recognized by AGTP, including domain-
anchored URIs, agent-native hierarchical names, and Web3 resolution
targets, are aliases that resolve to a canonical Agent-ID. In the
event of any conflict between an alias and a canonical Agent-ID, the
canonical Agent-ID <strong>MUST</strong> be treated as authoritative.</t>
          <t>AGTP URIs are addresses, not filenames. File format suffixes
(<tt>.agtp</tt>) <strong>MUST NOT</strong> appear in canonical <tt>agtp://</tt> URIs. A URI
resolves to an Agent Manifest Document or Agent Namespace Document
derived from the underlying package; it does not expose or serve the
package itself.</t>
          <t>Implementations <strong>MUST</strong> treat any URI containing a file extension
in the path as non-canonical and <strong>SHOULD</strong> issue a 301 Moved
Permanently redirect to the canonical form prior to resolution.</t>
          <t>The distinction between <tt>.agent</tt> and <tt>.nomo</tt> as agent-native
hierarchical TLDs (Section 5.1) and their use as file format suffixes
is resolved by position: agent-native TLDs appear in the hostname
position of the URI; file format suffixes appear in the path position
and are prohibited there.</t>
        </section>
        <section anchor="canonical-uri-forms">
          <name>Canonical URI Forms</name>
          <t>AGTP defines the following canonical URI forms. Form 1 is the
authoritative identity form; Forms 2 through 5 are resolution aliases
that <strong>MUST</strong> resolve to the same canonical Agent-ID as Form 1.</t>
          <artwork><![CDATA[
Form 1. Canonical ID (cryptographic, authoritative):
  agtp://[256-bit-hex-id]

Form 2. Agent-native hierarchical (governance-platform resolution):
  agtp://[agent-label].[org-label].agent
  agtp://[agent-label].[department].[org-label].agent
  agtp://[agent-label].[org-label].nomo

Form 3. Domain-anchored (DNS-resolved governance platform):
  agtp://[domain.tld]/agents/[agent-label]

Form 4. Subdomain-anchored (recommended enterprise DNS pattern):
  agtp://agtp.[domain.tld]/agents/[agent-label]

Form 5. Organization namespace root:
  agtp://[org-label].agent
  agtp://[domain.tld]/agents
  agtp://agtp.[domain.tld]/agents
]]></artwork>
          <t>Form 1 resolves to a signed Agent Manifest Document through any
verification path declared in the agent's registry record (Section
5.2). The canonical ID is self-describing: any AGTP-aware
governance platform, transparency log, or resolution service can
return the Manifest Document given the canonical ID alone, without
prior knowledge of which organization, domain, or blockchain the
agent is registered under.</t>
          <t>Form 2 uses the agent-native hierarchical namespace governed by the
AGTP resolution layer rather than by DNS. The <tt>.agent</tt> TLD is
reserved within the AGTP namespace for general-purpose agents; the
<tt>.nomo</tt> TLD is reserved for agents activated under the governed
<tt>.nomo</tt> package format. Resolution of Form 2 URIs follows the
disambiguation rules defined below when the same label is also
present in a Web3 naming system.</t>
          <t>Form 3 and Form 4 use DNS to resolve an org domain to a governance
platform endpoint. These forms are convenient where the organization
already holds a verified DNS presence and prefers DNS-anchored
discovery. They are equivalent to Form 2 for identity purposes; the
difference is the resolution path, not the identity model.</t>
          <t>The following URI forms remain invalid and <strong>MUST</strong> return
<tt>400 Bad Request</tt> with error code <tt>invalid-uri-form</tt>:</t>
          <artwork><![CDATA[
agtp://[domain.tld]/agents/[label].agent  (.agent as path suffix - prohibited)
agtp://[domain.tld]/agents/[label].nomo   (.nomo as path suffix - prohibited)
agtp://[domain.tld]/agents/[label].agtp   (.agtp as path suffix - prohibited)
]]></artwork>
          <t>These prohibitions apply to file format suffixes in the path position
only. The <tt>.agent</tt> and <tt>.nomo</tt> labels remain valid in the hostname
position as agent-native TLDs (Form 2 and Form 5).</t>
        </section>
        <section anchor="namespace-disambiguation-with-web3-resolution">
          <name>Namespace Disambiguation with Web3 Resolution</name>
          <t>The <tt>.agent</tt> label is also claimed as a top-level domain by at least
one blockchain-based naming system. To prevent ambiguous resolution,
AGTP implementations <strong>MUST</strong> apply the following rules when resolving
a URI whose hostname ends in <tt>.agent</tt> or <tt>.nomo</tt>:</t>
          <ol spacing="normal" type="1"><li>
              <t>Query the AGTP governance platform registry first. If the URI
resolves to a registered agent in Active lifecycle state, return
the Agent Manifest Document. This is the AGTP-native path and is
authoritative.</t>
            </li>
            <li>
              <t>If the AGTP registry returns no match, and if the implementation
supports Web3 resolution per <xref target="AGTP-WEB3"/>, query the Web3 naming
system. If the Web3 resolution returns an AGTP-compatible record,
return the Agent Manifest Document derived from that record.</t>
            </li>
            <li>
              <t>If neither path returns a match, return <tt>404 Not Found</tt>.</t>
            </li>
          </ol>
          <t>Canonical Agent-ID (Form 1) remains authoritative in all cases. An
agent registered through both AGTP-native and Web3 paths <strong>MUST</strong>
produce the same canonical Agent-ID through either resolution path.
Conflict between paths <strong>MUST</strong> be resolved in favor of the canonical
Agent-ID recorded in the governance platform's Birth Certificate.</t>
        </section>
        <section anchor="non-canonical-forms-and-redirect-behavior">
          <name>Non-Canonical Forms and Redirect Behavior</name>
          <t>The following non-canonical forms <strong>SHOULD</strong> be redirected to their
canonical equivalents. Implementations <strong>MUST NOT</strong> serve package
contents in response to any URI form.</t>
          <table>
            <name>Non-Canonical URI Forms and Redirect Targets</name>
            <thead>
              <tr>
                <th align="left">Received URI</th>
                <th align="left">Canonical Redirect Target</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service.agent</tt></td>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service.nomo</tt></td>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service.agtp</tt></td>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service</tt></td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="query-parameters-for-format-selection">
          <name>Query Parameters for Format Selection</name>
          <t>All AGTP URI resolution requests accept an optional <tt>format</tt> query
parameter controlling the serialization of the returned document.</t>
          <table>
            <name>AGTP URI Format Query Parameters</name>
            <thead>
              <tr>
                <th align="left">Query Parameter</th>
                <th align="left">Returned Representation</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">(none)</td>
                <td align="left">Agent Manifest Document, human-readable <tt>application/agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=manifest</tt></td>
                <td align="left">Agent Manifest Document, human-readable <tt>application/agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=json</tt></td>
                <td align="left">Agent Manifest Document, compact <tt>application/agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=certificate</tt></td>
                <td align="left">Birth certificate fields only, <tt>application/agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=status</tt></td>
                <td align="left">Lifecycle state and operational status only, <tt>application/agtp+json</tt></td>
              </tr>
            </tbody>
          </table>
          <t>All format variants return signed <tt>application/agtp+json</tt> content.
The <tt>?format=json</tt> parameter is intended for programmatic consumers.
The default returns the full human-readable manifest suitable for
browser rendering by an AGTP-aware client.</t>
        </section>
        <section anchor="resolution-mechanics">
          <name>Resolution Mechanics</name>
          <t>AGTP URI resolution proceeds according to the URI form presented. Form
1 (canonical ID) resolves through a registry or log lookup; Forms 2
through 5 resolve through a hierarchical name lookup. All forms
terminate in a signed Agent Manifest Document derived from the same
Birth Certificate.</t>
          <section anchor="form-1-resolution-canonical-id">
            <name>Form 1 Resolution (Canonical ID)</name>
            <t>When an AGTP resolver receives a URI of the form
<tt>agtp://[256-bit-hex-id]</tt>, it <strong>MUST</strong> perform the following steps:</t>
            <ol spacing="normal" type="1"><li>
                <t>Parse and validate the canonical Agent-ID. If the identifier is
malformed (length, character set), return <tt>400 Bad Request</tt> with
error code <tt>invalid-canonical-id</tt>.</t>
              </li>
              <li>
                <t>Query the agent's governance platform registry for the record
associated with the canonical Agent-ID. If the resolver does not
know which governance platform holds the record, it <strong>MAY</strong> query
a transparency log per Section 5.2 to locate the record.</t>
              </li>
              <li>
                <t>Verify the registry record lifecycle state. If Suspended, return
<tt>503 Service Unavailable</tt> with lifecycle state in the response
body. If Revoked or Deprecated, return <tt>410 Gone</tt> with lifecycle
state and revocation timestamp.</t>
              </li>
              <li>
                <t>Retrieve the agent's package (<tt>.agent</tt> or <tt>.nomo</tt>) from the
package store referenced by the registry record.</t>
              </li>
              <li>
                <t><strong>Verify the package integrity hash before proceeding.</strong> If
integrity verification fails, return <tt>500 Internal Error</tt> with
error code <tt>package-integrity-failure</tt>. <strong>MUST</strong> be logged.</t>
              </li>
              <li>
                <t>Extract the embedded manifest from the verified package.</t>
              </li>
              <li>
                <t>Sign the manifest document using the governance platform's signing
key. Return the signed <tt>application/agtp+json</tt> document in the
format specified by the query parameter.</t>
              </li>
            </ol>
            <t>Form 1 resolution does not require prior knowledge of an organization
domain, a DNS record, or a Web3 naming anchor. The canonical Agent-ID
is sufficient input.</t>
          </section>
          <section anchor="forms-2-5-resolution-hierarchical-and-domain-anchored">
            <name>Forms 2-5 Resolution (Hierarchical and Domain-Anchored)</name>
            <t>When an AGTP resolver receives a URI of Form 2, 3, 4, or 5, it
<strong>MUST</strong> perform the following steps:</t>
            <ol spacing="normal" type="1"><li>
                <t>Parse and validate the URI. If the URI is an invalid (prohibited)
form, return <tt>400 Bad Request</tt> with error code <tt>invalid-uri-form</tt>.</t>
              </li>
              <li>
                <t>For Form 2 and Form 5 URIs whose hostname ends in <tt>.agent</tt> or
<tt>.nomo</tt>, apply the namespace disambiguation rules in Section 5.1.</t>
              </li>
              <li>
                <t>Resolve the hierarchical name or domain+label pair to a canonical
Agent-ID via the governance platform's registry lookup. If no
matching agent is found, return <tt>404 Not Found</tt>.</t>
              </li>
              <li>
                <t>Continue with Form 1 resolution steps 3 through 7 using the
resolved canonical Agent-ID.</t>
              </li>
            </ol>
            <t>The package's executable content, code, logic, and any fields not
included in the manifest schema <strong>MUST NOT</strong> be returned at any step
of any resolution path. URI resolution exposes identity and status
exclusively.</t>
          </section>
        </section>
        <section anchor="verification-paths-and-trust-tier-assignment">
          <name>Verification Paths and Trust Tier Assignment</name>
          <t>AGTP recognizes multiple equivalent verification paths for Trust Tier 1.
Each path produces the same identity primitive: a canonical Agent-ID
derived from a governance-platform-signed Birth Certificate. The
verification path in use <strong>MUST</strong> be declared in the <tt>verification_path</tt>
field of the Birth Certificate and is surfaced in the Agent Manifest
Document.</t>
          <dl>
            <dt><strong>Trust Tier 1 - Verified:</strong></dt>
            <dd>
              <t>Tier 1 agents are eligible for the full Authority-Scope vocabulary,
delegation chains, financial transactions, and multi-organization
collaboration. Tier 1 verification requires exactly one of the
following paths to succeed at ACTIVATE time. The verification path
chosen does not affect the identity model or the canonical Agent-ID;
it affects only the evidence chain backing the Birth Certificate.
</t>
              <table>
                <name>Trust Tier 1 Verification Paths</name>
                <thead>
                  <tr>
                    <th align="left">Path</th>
                    <th align="left">Mechanism</th>
                    <th align="left">Evidence Anchor</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">
                      <tt>dns-anchored</tt></td>
                    <td align="left">RFC 8555 ACME challenge against claimed <tt>org_domain</tt></td>
                    <td align="left">DNS TXT record</td>
                  </tr>
                  <tr>
                    <td align="left">
                      <tt>log-anchored</tt></td>
                    <td align="left">Birth Certificate inclusion in AGTP transparency log</td>
                    <td align="left">Log inclusion proof (RFC 9162 VDS, RFC 9943 receipt)</td>
                  </tr>
                  <tr>
                    <td align="left">
                      <tt>hybrid</tt></td>
                    <td align="left">DNS challenge combined with blockchain address signature</td>
                    <td align="left">DNS TXT record + blockchain signature</td>
                  </tr>
                </tbody>
              </table>
              <t><tt>dns-anchored</tt>: The governance platform <strong>MUST</strong> verify that the
registering party controls the DNS zone for the claimed <tt>org_domain</tt>
before issuing a Tier 1 Birth Certificate. Dns-anchored agents
<strong>MUST</strong> have the following DNS record published and verifiable at
resolution time:</t>
              <artwork><![CDATA[
_agtp.[domain.tld]. IN TXT "agtp-zone=[zone-id]; cert=[fp]"
]]></artwork>
              <t><tt>log-anchored</tt>: The governance platform <strong>MUST</strong> submit the Birth
Certificate to an AGTP-aligned transparency log and record the
resulting inclusion proof in the registry record. The log <strong>MUST</strong>
implement the verifiable data structure defined in <xref target="RFC9162"/> and
<strong>SHOULD</strong> issue COSE_Sign1 receipts per <xref target="RFC9943"/> (SCITT) for
cross-ecosystem interoperability. A log-anchored agent is verifiable
by any party with access to the transparency log, without dependence
on DNS ownership. The log server protocol, receipt schema, and
federation model are specified in <xref target="AGTP-LOG"/>.</t>
              <t><tt>hybrid</tt>: The governance platform <strong>MUST</strong> verify both DNS control
over the claimed domain and ownership of the declared blockchain
address via signature challenge. This path is used by agents whose
identity is anchored in a Web3 naming system and who also hold a
verified DNS presence. See <xref target="AGTP-WEB3"/>.</t>
              <t>All Tier 1 paths require a <tt>.nomo</tt> governed package.</t>
            </dd>
            <dt><strong>Trust Tier 2 - Org-Asserted:</strong></dt>
            <dd>
              <t>For agents operating within a single organization's internal
infrastructure, or where no Tier 1 verification path has been
completed. The registering party asserts an organizational affiliation
without cryptographic proof. The Agent Manifest Document for Tier 2
agents <strong>MUST</strong> include a <tt>trust_tier: 2</tt> field and a <tt>trust_warning</tt>
field with value <tt>"verification-incomplete"</tt>. AGTP-aware browsers
and clients <strong>MUST</strong> surface a visible trust indicator distinguishing
Tier 2 from Tier 1.
</t>
              <t>Tier 2 agents <strong>MUST NOT</strong> be granted authority scopes above
<tt>documents:query</tt> and <tt>knowledge:query</tt> without the AGTP Agent
Certificate extension <xref target="AGTP-CERT"/> providing cryptographic identity
binding at the transport layer.</t>
            </dd>
            <dt><strong>Trust Tier 3 - Experimental:</strong></dt>
            <dd>
              <t>Agent label uses the <tt>X-</tt> prefix. Not discoverable through the
public AGTP registry. For development and testing only.
Implementations <strong>MUST NOT</strong> deploy Tier 3 agents in production.</t>
            </dd>
          </dl>
        </section>
        <section anchor="subdomain-deployment-pattern">
          <name>Subdomain Deployment Pattern</name>
          <t>Organizations <strong>SHOULD</strong> deploy AGTP endpoints at a dedicated
subdomain following the pattern <tt>agtp.[organization-domain.tld]</tt>
(e.g., <tt>agtp.acme.tld</tt>). This is the recommended enterprise
deployment pattern: it provides clean separation between web and
agent infrastructure, allows independent certificate management for
the AGTP endpoint, and is consistent with service-specific subdomain
conventions. An organization with an AGTP subdomain <strong>SHOULD</strong> also
configure their primary domain to redirect AGTP requests:</t>
          <artwork><![CDATA[
agtp://acme.tld/agents/customer-service
  → 301 → agtp://agtp.acme.tld/agents/customer-service
]]></artwork>
        </section>
        <section anchor="the-agents-reserved-path-prefix">
          <name>The /agents/ Reserved Path Prefix</name>
          <t>The path prefix <tt>/agents/</tt> is reserved in all <tt>agtp://</tt> URIs for
agent namespace operations. Implementations <strong>MUST</strong> support this
prefix. The registry root at <tt>/agents</tt> (no trailing label) resolves
to the Agent Namespace Document (see Section 5.4).</t>
        </section>
        <section anchor="collision-prevention">
          <name>Collision Prevention</name>
          <t>The canonical Agent-ID is the collision-prevention primitive. Two
canonical Agent-IDs are distinct if and only if the 256-bit
identifiers differ, and the governance platform enforces uniqueness
at issuance time by deriving the ID from the Birth Certificate hash.</t>
          <t>For alias forms, collision prevention operates at the namespace
level. <tt>agtp://acme.tld/agents/customer-service</tt> and
<tt>agtp://chrishood.tld/agents/customer-service</tt> resolve to distinct
canonical Agent-IDs because they are registered under different
org_domain values. Similarly, <tt>agtp://customer-service.acme.agent</tt>
and <tt>agtp://customer-service.chrishood.agent</tt> resolve to distinct
canonical Agent-IDs because they are registered under different
agent-native org labels. Within a single governance zone, the
governance platform enforces uniqueness of agent labels at
registration time.</t>
          <t>Infrastructure <strong>MUST</strong> use the canonical Agent-ID for all routing,
logging, and attribution operations. Alias URIs are a display and
discovery layer only. An alias that resolves to a canonical Agent-ID
different from the one carried in the <tt>Agent-ID</tt> header on a request
<strong>MUST</strong> cause the request to be rejected with <tt>401 Unauthorized</tt>
and <strong>MUST</strong> be logged.</t>
        </section>
        <section anchor="iana-considerations-for-the-agtp-uri-scheme">
          <name>IANA Considerations for the agtp:// URI Scheme</name>
          <t>This document proposes registration of the <tt>agtp://</tt> URI scheme with
IANA per <xref target="RFC7595"/>. Registration template:</t>
          <dl>
            <dt>URI scheme name:</dt>
            <dd>
              <t>agtp</t>
            </dd>
            <dt>Status:</dt>
            <dd>
              <t>Permanent</t>
            </dd>
            <dt>URI scheme syntax:</dt>
            <dd>
              <t><tt>agtp://[canonical-agent-id]</tt> (authoritative)
<tt>agtp://[label].[org-label].agent</tt> or <tt>agtp://[label].[org-label].nomo</tt> (agent-native hierarchical)
<tt>agtp://[domain.tld]/agents/[label]</tt> (domain-anchored)
<tt>agtp://agtp.[domain.tld]/agents/[label]</tt> (subdomain-anchored)
<tt>agtp://[org-label].agent</tt> or <tt>agtp://[domain.tld]/agents</tt> (namespace root)</t>
            </dd>
            <dt>URI scheme semantics:</dt>
            <dd>
              <t>Identifies an AI agent or agent namespace operating over the Agent
Transfer Protocol. The authoritative form uses a 256-bit hex-encoded
cryptographic identifier derived from the agent's Birth Certificate.
The agent-native hierarchical form uses AGTP-governed <tt>.agent</tt> or
<tt>.nomo</tt> top-level labels. The domain-anchored form uses a verified
or asserted organization DNS domain with a reserved <tt>/agents/</tt> path
prefix. All alias forms <strong>MUST</strong> resolve to the same canonical
Agent-ID.</t>
            </dd>
            <dt>Applications/protocols that use this URI scheme:</dt>
            <dd>
              <t>Agent Transfer Protocol (this document)</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>The canonical Agent-ID form is the authoritative identity
representation. Agent-native hierarchical URIs are governance-
platform-resolved and require the disambiguation rules in Section
5.1 when coexisting with Web3 naming systems. Domain-anchored URIs
resolve through DNS to a governance platform endpoint.
Implementations <strong>MUST</strong> accept canonical Agent-IDs and <strong>SHOULD</strong>
support at least one alias form. File format suffixes (<tt>.agtp</tt>)
<strong>MUST NOT</strong> appear in <tt>agtp://</tt> URIs.</t>
            </dd>
            <dt>Contact:</dt>
            <dd>
              <t>Chris Hood, chris@nomotic.ai</t>
            </dd>
            <dt>References:</dt>
            <dd>
              <t>This document</t>
            </dd>
          </dl>
          <t>The <tt>agtp://</tt> URI scheme registration is open and unencumbered. No
intellectual property claims apply to the URI scheme itself.</t>
        </section>
      </section>
      <section anchor="trust-tier-summary">
        <name>Trust Tier Summary</name>
        <table>
          <name>AGTP Trust Tier Summary</name>
          <thead>
            <tr>
              <th align="left">Trust Tier</th>
              <th align="left">Verification Paths (any one sufficient)</th>
              <th align="left">Package Required</th>
              <th align="left">Registry Visible</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1 - Verified</td>
              <td align="left">DNS challenge per <xref target="RFC8555"/>; OR log inclusion per <xref target="RFC9162"/> / <xref target="RFC9943"/>; OR hybrid DNS + blockchain signature</td>
              <td align="left">
                <tt>.nomo</tt></td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">2 - Org-Asserted</td>
              <td align="left">None (affiliation asserted without proof)</td>
              <td align="left">
                <tt>.agent</tt> or <tt>.nomo</tt></td>
              <td align="left">Yes (with warning)</td>
            </tr>
            <tr>
              <td align="left">3 - Experimental</td>
              <td align="left">None</td>
              <td align="left">Any</td>
              <td align="left">No</td>
            </tr>
          </tbody>
        </table>
        <t>The verification path used for a Tier 1 agent is recorded in the
<tt>verification_path</tt> field of the Birth Certificate (<tt>dns-anchored</tt>,
<tt>log-anchored</tt>, or <tt>hybrid</tt>) and surfaced in the Agent Manifest
Document. All Tier 1 paths produce identity attestations of equivalent
strength for AGTP protocol purposes.</t>
      </section>
      <section anchor="agent-namespace-document">
        <name>Agent Namespace Document</name>
        <section anchor="purpose-and-scope">
          <name>Purpose and Scope</name>
          <t>The Agent Namespace Document is the index of all Active agents
registered under an organization's governance zone. It is returned
in response to a request targeting the <tt>/agents</tt> path:</t>
          <artwork><![CDATA[
agtp://acme.tld/agents
agtp://agtp.acme.tld/agents
]]></artwork>
          <t>The Agent Namespace Document is not a manually editable file. It is
generated and cryptographically signed by the governance platform each
time the registry changes. Any Namespace Document that fails signature
verification <strong>MUST</strong> be rejected by the requesting party.</t>
        </section>
        <section anchor="document-schema">
          <name>Document Schema</name>
          <figure>
            <name>Agent Namespace Document Schema</name>
            <sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-namespace",
  "schema_version": "1.0",
  "org_domain": "acme.tld",
  "governance_zone": "zone:acme-internal",
  "generated_at": "2026-03-20T14:00:00Z",
  "signature": {
    "algorithm": "ES256",
    "key_id": "agtp-gov-key-acme-01",
    "value": "[base64-encoded-signature]"
  },
  "agents": [
    {
      "agent_label": "customer-service",
      "canonical_id": "3a9f2c1d8b7e4a6f...",
      "lifecycle_state": "Active",
      "trust_tier": 1,
      "cert_status": "Active",
      "manifest_uri": "agtp://agtp.acme.tld/agents/customer-service",
      "activated_at": "2026-01-15T09:00:00Z",
      "last_updated": "2026-03-01T11:30:00Z"
    }
  ],
  "total_active": 1,
  "namespace_cert_fingerprint": "b2c4d6e8..."
}
]]></sourcecode>
          </figure>
          <t>The <tt>agents</tt> array <strong>MUST</strong> include only agents in Active lifecycle
state. Suspended, Revoked, and Deprecated agents <strong>MUST NOT</strong> appear
in the Namespace Document.</t>
        </section>
        <section anchor="integrity-and-freshness">
          <name>Integrity and Freshness</name>
          <t>The Namespace Document <strong>MUST</strong> include a <tt>generated_at</tt> timestamp.
Implementations <strong>SHOULD</strong> treat Namespace Documents older than a
configurable freshness threshold (default: 300 seconds) as stale and
re-request. The governance platform <strong>MUST</strong> re-sign the Namespace
Document within 60 seconds of any registry change.</t>
          <t>The signature covers the entire document including <tt>generated_at</tt>.
Replaying an older signed Namespace Document to conceal a revocation
event is a known attack vector; implementations <strong>MUST</strong> reject
Namespace Documents with a <tt>generated_at</tt> timestamp older than the
freshness threshold.</t>
        </section>
      </section>
      <section anchor="agent-manifest-document-and-the-agtp-format">
        <name>Agent Manifest Document and the .agtp Format</name>
        <section anchor="purpose-and-scope-1">
          <name>Purpose and Scope</name>
          <t>The Agent Manifest Document is the protocol's canonical representation
of a specific agent's identity, status, and behavioral scope. It is
returned in response to any AGTP URI resolution request targeting a
specific agent:</t>
          <artwork><![CDATA[
agtp://acme.tld/agents/customer-service
agtp://acme.tld/agents/customer-service?format=json
agtp://acme.tld/agents/customer-service?format=manifest
]]></artwork>
          <t>The manifest is derived from the embedded manifest inside the agent's
<tt>.agent</tt> or <tt>.nomo</tt> package. It is not a separate file that can be
independently modified. The governance platform <strong>MUST</strong> verify the
package integrity hash before extracting and serving the manifest.</t>
        </section>
        <section anchor="the-three-document-formats-and-their-relationship">
          <name>The Three Document Formats and Their Relationship</name>
          <figure anchor="format-relationship">
            <name>Relationship Between AGTP File Formats</name>
            <artwork><![CDATA[
.agent   ──── open packaging format (patent pending, Chris Hood)
  │           Contains: manifest + integrity hash + behavioral
  │           trust score + executable content
  │
.nomo    ──── governed packaging format (patent pending, Chris Hood)
  │           Contains: .agent contents + CA-signed cert chain
  │           + governance zone binding
  │
  Both produce ↓ when queried via agtp:// URI
  │
.agtp    ──── wire-level manifest document (this spec)
              Contains: identity fields from manifest +
              lifecycle state + trust tier + behavioral scope
              Open format defined by AGTP specification
              Content-Type: application/agtp+json
]]></artwork>
          </figure>
          <t>The <tt>.agtp</tt> format is the protocol's own document type. It is what
gets transmitted over the wire. The <tt>.agent</tt> and <tt>.nomo</tt> formats are
what get deployed. An AGTP implementation is not required to understand
<tt>.agent</tt> or <tt>.nomo</tt> packaging internals; it is only required to
produce and consume <tt>.agtp</tt> manifest documents.</t>
          <t>Additional packaging formats <strong>MAY</strong> be defined by third parties,
provided they can produce conformant <tt>.agtp</tt> manifest documents when
queried. Such formats <strong>MUST</strong> implement the integrity verification
requirement: the manifest <strong>MUST</strong> be derived from a verified package,
not from an independently stored or editable file.</t>
        </section>
        <section anchor="agent-manifest-document-schema">
          <name>Agent Manifest Document Schema</name>
          <t>The following fields are <strong>REQUIRED</strong> in all Agent Manifest Documents:</t>
          <figure>
            <name>Agent Manifest Document - Required Fields</name>
            <sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-manifest",
  "schema_version": "1.0",
  "manifest_uri": "agtp://agtp.acme.tld/agents/customer-service",
  "canonical_id": "3a9f2c1d8b7e4a6f0c2d5e9b1a3f7c0d...",
  "agent_label": "customer-service",
  "org_domain": "acme.tld",
  "governance_zone": "zone:acme-internal",
  "trust_tier": 1,
  "package_format": "nomo",
  "package_integrity_hash": "sha256:[hash]",
  "lifecycle_state": "Active",
  "cert_status": "Active",
  "principal_org": "Acme Corporation",
  "activated_at": "2026-01-15T09:00:00Z",
  "behavioral_trust_score": 0.94,
  "authority_scope_categories": [
    "documents:query",
    "knowledge:query",
    "calendar:book",
    "escalation:route"
  ],
  "supported_methods": [
    "QUERY", "SUMMARIZE", "BOOK", "SCHEDULE",
    "ESCALATE", "NOTIFY", "CONFIRM"
  ],
  "job_description": "Handles customer service requests.",
  "signature": {
    "algorithm": "ES256",
    "key_id": "agtp-gov-key-acme-01",
    "value": "[base64-encoded-signature]"
  }
}
]]></sourcecode>
          </figure>
          <t>The following fields are <strong>RECOMMENDED</strong>:</t>
          <figure>
            <name>Agent Manifest Document - Recommended Fields</name>
            <sourcecode type="json"><![CDATA[
{
  "version": "2.1.0",
  "last_updated": "2026-03-01T11:30:00Z",
  "verification_path": "dns-anchored",
  "escalation_policy": "route-to-human-on-scope-limit",
  "delegation_permitted": false,
  "max_delegation_depth": 0,
  "audit_log_uri": "agtp://agtp.acme.tld/audit/customer-service",
  "dns_anchor_record": "_agtp.acme.tld TXT agtp-zone=...",
  "log_inclusion_proof": null,
  "cert_fingerprint": "b2c4d6e8..."
}
]]></sourcecode>
          </figure>
          <t>The <tt>verification_path</tt> field surfaces the Tier 1 verification path
used at ACTIVATE time. Its value <strong>MUST</strong> match the <tt>verification_path</tt>
field of the underlying Birth Certificate. The <tt>dns_anchor_record</tt>
field is populated when <tt>verification_path</tt> is <tt>dns-anchored</tt> or
<tt>hybrid</tt>. The <tt>log_inclusion_proof</tt> field is populated when
<tt>verification_path</tt> is <tt>log-anchored</tt> and carries the transparency
log inclusion proof per <xref target="RFC9162"/> or the COSE_Sign1 receipt per
<xref target="RFC9943"/>.</t>
          <t>The following fields are <strong>REQUIRED</strong> when <tt>trust_tier</tt> is <tt>2</tt>:</t>
          <figure>
            <name>Agent Manifest Document - Required Fields for Trust Tier 2</name>
            <sourcecode type="json"><![CDATA[
{
  "trust_warning": "verification-incomplete",
  "trust_tier_explanation": "Organizational affiliation asserted without cryptographic verification."
}
]]></sourcecode>
          </figure>
        </section>
        <section anchor="what-the-manifest-exposes-and-does-not-expose">
          <name>What the Manifest Exposes and Does Not Expose</name>
          <t>The Agent Manifest Document <strong>MUST</strong> expose:</t>
          <ul spacing="normal">
            <li>
              <t>The agent's identity (canonical ID, label, org, governance zone)</t>
            </li>
            <li>
              <t>The agent's current operational status (lifecycle state)</t>
            </li>
            <li>
              <t>The agent's authority scope categories</t>
            </li>
            <li>
              <t>The agent's supported method vocabulary</t>
            </li>
            <li>
              <t>The agent's behavioral trust score</t>
            </li>
            <li>
              <t>The agent's birth certificate fields (activated_at, principal_org)</t>
            </li>
            <li>
              <t>The agent's trust tier and any associated trust warnings</t>
            </li>
          </ul>
          <t>The Agent Manifest Document <strong>MUST NOT</strong> expose:</t>
          <ul spacing="normal">
            <li>
              <t>Executable code, scripts, or logic</t>
            </li>
            <li>
              <t>Model weights or configurations</t>
            </li>
            <li>
              <t>Internal API keys or credentials</t>
            </li>
            <li>
              <t>Specific authority scope grant tokens</t>
            </li>
            <li>
              <t>Session history or prior action logs</t>
            </li>
          </ul>
          <t>No AGTP URI resolution path, including any query parameter
combination, <strong>MUST</strong> return package contents beyond the manifest
schema defined in this section.</t>
        </section>
        <section anchor="manifest-tamper-proofing">
          <name>Manifest Tamper-Proofing</name>
          <t>The tamper-proof guarantee rests on two mechanisms:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>Package integrity hash:</strong> Any modification to the package or its
embedded manifest invalidates the hash. The governance platform
<strong>MUST</strong> verify this hash before extracting the manifest.</t>
            </li>
            <li>
              <t><strong>Document signature:</strong> The governance platform signs the extracted
manifest before serving it. The signature covers the full document
including the <tt>package_integrity_hash</tt> field, creating a verifiable
chain from the served document back to the registered package.</t>
            </li>
          </ol>
          <t>A manifest document that fails either verification step <strong>MUST</strong> be
rejected, <strong>MUST NOT</strong> be served, and the failure <strong>MUST</strong> be logged.</t>
        </section>
      </section>
      <section anchor="browser-and-human-facing-interaction-model">
        <name>Browser and Human-Facing Interaction Model</name>
        <section anchor="the-separation-of-discovery-and-execution">
          <name>The Separation of Discovery and Execution</name>
          <figure anchor="browser-separation">
            <name>AGTP URI Use by Audience</name>
            <artwork><![CDATA[
agtp:// URI in a browser
  │
  └─→ Returns Agent Manifest Document
        Human-readable view of identity and status
        Read-only. No execution. No code exposed.

agtp:// session initiated by an agent or AGTP client
  │
  └─→ Establishes authenticated AGTP session
        Method invocations (QUERY, BOOK, ESCALATE, etc.)
        Full protocol operation - not visible to browsers
]]></artwork>
          </figure>
          <t>The analogy to existing protocol conventions is direct. A <tt>mailto:</tt>
URI surfaces an address and hands off to a mail client; SMTP carries
the actual messages. Similarly, an <tt>agtp://</tt> URI surfaces identity
and status; AGTP carries agent traffic. Browsers do not become AGTP
clients by following an <tt>agtp://</tt> link.</t>
        </section>
        <section anchor="browser-behavior-for-agtp-uris">
          <name>Browser Behavior for agtp:// URIs</name>
          <t>Browsers that encounter an <tt>agtp://</tt> URI <strong>SHOULD</strong> behave as follows:</t>
          <ol spacing="normal" type="1"><li>
              <t>If a registered AGTP client is present (OS protocol handler), hand
off the URI to that client.</t>
            </li>
            <li>
              <t>If the browser supports <tt>agtp://</tt> natively or via extension, render
the returned Agent Manifest Document as a structured human-readable
page. The rendered view <strong>MUST</strong> surface the trust tier indicator
prominently, following the visual convention established for TLS
trust in the browser chrome.</t>
            </li>
            <li>
              <t>If neither condition applies, the browser <strong>MAY</strong> fall back to a
gateway that translates between <tt>https://</tt> and <tt>agtp://</tt>. The
gateway <strong>MUST</strong> preserve all signature and trust tier fields.</t>
            </li>
          </ol>
        </section>
        <section anchor="human-readable-manifest-view">
          <name>Human-Readable Manifest View</name>
          <t>When an Agent Manifest Document is rendered for human consumption,
the following fields <strong>MUST</strong> be prominently displayed:</t>
          <ul spacing="normal">
            <li>
              <t>Agent label and org domain</t>
            </li>
            <li>
              <t>Trust tier indicator (visual distinction between Tier 1, 2, and 3)</t>
            </li>
            <li>
              <t>Lifecycle state (Active / Suspended / Revoked / Deprecated)</t>
            </li>
            <li>
              <t>Job description</t>
            </li>
            <li>
              <t>Principal organization</t>
            </li>
            <li>
              <t>Activation date</t>
            </li>
            <li>
              <t>Behavioral trust score</t>
            </li>
            <li>
              <t>Authority scope categories (in human-readable form)</t>
            </li>
          </ul>
        </section>
        <section anchor="agtp-status-sub-resource">
          <name>AGTP Status Sub-Resource</name>
          <t>Implementations <strong>SHOULD</strong> support a <tt>status</tt> sub-path:</t>
          <artwork><![CDATA[
agtp://acme.tld/agents/customer-service/status
]]></artwork>
          <figure>
            <name>AGTP Status Sub-Resource Response</name>
            <sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-status",
  "canonical_id": "3a9f2c1d8b7e4a6f...",
  "agent_label": "customer-service",
  "org_domain": "acme.tld",
  "lifecycle_state": "Active",
  "cert_status": "Active",
  "last_action_method": "QUERY",
  "last_action_timestamp": "2026-03-20T13:58:22Z",
  "active_session_count": 3,
  "pending_escalations": 0,
  "generated_at": "2026-03-20T14:00:00Z"
}
]]></sourcecode>
          </figure>
          <t>The <tt>active_session_count</tt> field <strong>SHOULD</strong> only be included if the
requester has appropriate observability permissions for the governance
zone.</t>
        </section>
      </section>
      <section anchor="web3-interaction-considerations">
        <name>Web3 Interaction Considerations</name>
        <section anchor="namespace-coexistence-with-web3-naming-systems">
          <name>Namespace Coexistence with Web3 Naming Systems</name>
          <t>The <tt>.agent</tt> label is claimed as a top-level domain by at least one
blockchain-based naming system. In v04 of this specification, the
response to this collision was to prohibit <tt>.agent</tt> and <tt>.nomo</tt> from
the hostname position of <tt>agtp://</tt> URIs. Version 05 reverses that
approach. The agent-native hierarchical namespace is restored, and
coexistence with Web3 naming is handled through the deterministic
resolution order specified in Section 5.1: AGTP-native registry
lookup first, Web3 resolution second, with canonical Agent-ID as the
authoritative tiebreaker.</t>
        </section>
        <section anchor="web3-as-a-verification-and-resolution-path">
          <name>Web3 as a Verification and Resolution Path</name>
          <t>AGTP identity is agent-first and anchored in the Birth Certificate.
Verification paths (DNS, log, hybrid) and resolution paths (canonical
ID, hierarchical name, domain lookup, Web3 lookup) are independent
dimensions of the identity model. A Web3-anchored agent is not a
second-class participant; it is an agent whose Birth Certificate was
verified through the <tt>hybrid</tt> path and whose Agent Manifest Document
is resolvable through a Web3 naming system in addition to the
canonical ID.</t>
          <t>The <tt>verification_path</tt> field in the Birth Certificate replaces the
v04 <tt>resolution_layer</tt> field and declares how the agent's identity
was verified at ACTIVATE time:</t>
          <table>
            <name>verification_path Field Values</name>
            <thead>
              <tr>
                <th align="left">Value</th>
                <th align="left">Meaning</th>
                <th align="left">Default Trust Tier</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>dns-anchored</tt></td>
                <td align="left">DNS ownership verified via RFC 8555 ACME challenge</td>
                <td align="left">Tier 1</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>log-anchored</tt></td>
                <td align="left">Birth Certificate inclusion in an AGTP transparency log per RFC 9162 / RFC 9943</td>
                <td align="left">Tier 1</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>hybrid</tt></td>
                <td align="left">DNS ownership and blockchain address signature both verified</td>
                <td align="left">Tier 1</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>org-asserted</tt></td>
                <td align="left">No cryptographic verification; affiliation asserted only</td>
                <td align="left">Tier 2</td>
              </tr>
            </tbody>
          </table>
          <t>Implementations that encounter an agent whose Birth Certificate
carries an unsupported <tt>verification_path</tt> value <strong>MUST</strong> treat the
agent as Trust Tier 2 (<tt>trust_warning: "verification-path-unsupported"</tt>)
until an extension specification defining the value has been published
and implemented. Full Web3 interoperability and hybrid verification
procedures are specified in <xref target="AGTP-WEB3"/>.</t>
        </section>
      </section>
      <section anchor="agent-registration-process">
        <name>Agent Registration Process</name>
        <section anchor="overview">
          <name>Overview</name>
          <t>An agent cannot participate in AGTP until it has been issued an Agent
Birth Certificate by a governance platform and assigned a canonical
Agent-ID derived from that certificate. Canonical Agent-IDs are issued
through the ACTIVATE transaction; they are never self-declared.</t>
          <t>The Birth Certificate is the genesis record of an agent's legal
existence within the AGTP ecosystem. Its relationship to the canonical
Agent-ID is analogous to the relationship between a government-issued
birth registration and a social security number: the birth event
produces a permanent, authoritative identity record, and a durable
identifier is derived from it. The identifier follows the agent for
its entire lifecycle, including after revocation. It is never reissued
to another agent.</t>
          <t>Any AGTP infrastructure component <strong>MUST</strong> reject requests carrying
an Agent-ID that does not resolve to a Birth Certificate record in
an Active lifecycle state in a reachable registry.</t>
        </section>
        <section anchor="birth-certificate-contents">
          <name>Birth Certificate Contents</name>
          <t>The Agent Birth Certificate is issued by the governance platform at
ACTIVATE time and contains the following fields:</t>
          <table>
            <name>Agent Birth Certificate Fields</name>
            <thead>
              <tr>
                <th align="left">Field</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>agent_id</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Unique identifier for the agent</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>owner</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Human or team responsible for this agent</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>archetype</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Behavioral category (see archetypes below)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>governance_zone</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Environment context (development, staging, production)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>scope</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Authorized action types</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>issued_at</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Timestamp of issuance</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>certificate_hash</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Cryptographic fingerprint - basis for canonical Agent-ID</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>signature</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Signed with the org's governance key</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>package_ref</tt></td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Reference to the <tt>.agent</tt> or <tt>.nomo</tt> package</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>trust_tier</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Registration tier (1, 2, or 3)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>verification_path</tt></td>
                <td align="left">
                  <strong>MUST</strong> (Tier 1)</td>
                <td align="left">Path used to verify identity: <tt>dns-anchored</tt>, <tt>log-anchored</tt>, <tt>hybrid</tt>, or <tt>org-asserted</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>org_domain</tt></td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">DNS-verified or asserted org domain (required for <tt>dns-anchored</tt> and <tt>hybrid</tt>)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>org_label</tt></td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Agent-native org label (required for Form 2 hierarchical resolution)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>log_inclusion_proof</tt></td>
                <td align="left">
                  <strong>MUST</strong> (log-anchored)</td>
                <td align="left">Transparency log inclusion proof (RFC 9162 / RFC 9943)</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="agent-archetypes">
          <name>Agent Archetypes</name>
          <t>The <tt>archetype</tt> field classifies the agent's behavioral category.
Archetypes inform scope enforcement and observability tooling; an
<tt>executor</tt> archetype agent exhibiting read-only query patterns, or a
<tt>monitor</tt> archetype agent attempting booking operations, are anomaly
signals. The archetype field does not restrict scope enforcement, 
Authority-Scope headers govern actual permissions at the protocol
level. Archetypes are a classification and observability signal,
not a security boundary.</t>
          <table>
            <name>Agent Archetypes</name>
            <thead>
              <tr>
                <th align="left">Archetype</th>
                <th align="left">Description</th>
                <th align="left">Typical Scope</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>assistant</tt></td>
                <td align="left">Conversational agent, read-heavy</td>
                <td align="left">
                  <tt>documents:query</tt>, <tt>knowledge:query</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>analyst</tt></td>
                <td align="left">Data analysis, read and aggregate</td>
                <td align="left">
                  <tt>data:read</tt>, <tt>data:aggregate</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>executor</tt></td>
                <td align="left">Takes real-world actions, write-heavy</td>
                <td align="left">
                  <tt>booking:*</tt>, <tt>payments:confirm</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>orchestrator</tt></td>
                <td align="left">Manages other agents</td>
                <td align="left">
                  <tt>delegation:*</tt>, <tt>agents:*</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>monitor</tt></td>
                <td align="left">Observational only</td>
                <td align="left">
                  <tt>telemetry:read</tt>, <tt>logs:read</tt></td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="birth-certificate-to-agtp-header-mapping">
          <name>Birth Certificate to AGTP Header Mapping</name>
          <t>Birth Certificate fields map directly to AGTP protocol headers on
every request. This mapping is the mechanism by which static identity
(the Birth Certificate) becomes runtime identity (the protocol session):</t>
          <table>
            <name>Birth Certificate to AGTP Header Mapping</name>
            <thead>
              <tr>
                <th align="left">Birth Certificate Field</th>
                <th align="left">AGTP Protocol Header</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>agent_id</tt></td>
                <td align="left">
                  <tt>Agent-ID</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>owner</tt></td>
                <td align="left">
                  <tt>Principal-ID</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>scope</tt></td>
                <td align="left">
                  <tt>Authority-Scope</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>certificate_hash</tt></td>
                <td align="left">Basis for canonical Agent-ID</td>
              </tr>
            </tbody>
          </table>
          <t>The canonical Agent-ID is derived from the <tt>certificate_hash</tt>. This
chain, package integrity hash → certificate hash → canonical Agent-ID, 
ensures that the identifier carried in the <tt>Agent-ID</tt> header on
every AGTP request is traceable back to the original Birth Certificate
and the human principal who authorized the agent's creation.</t>
        </section>
        <section anchor="registration-tiers">
          <name>Registration Tiers</name>
          <t><strong>Tier 1 Registration (Verified):</strong></t>
          <t>Required for agents carrying <tt>Authority-Scope</tt> beyond read-only query
operations, or participating in delegation chains, financial
transactions, or multi-agent collaboration with external organizations.
Tier 1 registration requires exactly one of the three verification
paths defined in Section 5.2 to succeed at ACTIVATE time.</t>
          <t>Common requirements for all Tier 1 paths:</t>
          <ul spacing="normal">
            <li>
              <t>Agent package <strong>MUST</strong> be in <tt>.nomo</tt> governed format</t>
            </li>
            <li>
              <t>Package <strong>MUST</strong> include a valid CA-signed certificate chain</t>
            </li>
            <li>
              <t>Governance platform <strong>MUST</strong> validate package integrity hash and
certificate chain before issuing the Birth Certificate</t>
            </li>
            <li>
              <t>Birth Certificate <strong>MUST</strong> record the specific <tt>verification_path</tt>
used (<tt>dns-anchored</tt>, <tt>log-anchored</tt>, or <tt>hybrid</tt>)</t>
            </li>
          </ul>
          <t>Path-specific requirements:</t>
          <ul spacing="normal">
            <li>
              <t><tt>dns-anchored</tt>: Registrant demonstrates DNS control over the
claimed <tt>org_domain</tt> via DNS challenge per <xref target="RFC8555"/>. Tier 1
<tt>_agtp</tt> TXT record <strong>MUST</strong> be published and verifiable at
resolution time.</t>
            </li>
            <li>
              <t><tt>log-anchored</tt>: Governance platform submits the Birth Certificate
to an AGTP-aligned transparency log implementing <xref target="RFC9162"/> and
records the inclusion proof in the registry. COSE_Sign1 receipts
per <xref target="RFC9943"/> (SCITT) <strong>SHOULD</strong> be issued for cross-ecosystem
interoperability. The registering party is not required to control
a DNS domain.</t>
            </li>
            <li>
              <t><tt>hybrid</tt>: Registrant demonstrates both DNS control and blockchain
address ownership. Detailed procedure in <xref target="AGTP-WEB3"/>.</t>
            </li>
          </ul>
          <t><strong>Tier 2 Registration (Org-Asserted):</strong></t>
          <t>For agents operating within a single organization's internal
infrastructure, or where no Tier 1 verification path has been
completed.</t>
          <dl>
            <dt>Requirements:</dt>
            <dd>
              <ul spacing="normal">
                <li>
                  <t>Organizational affiliation is declared but no cryptographic
verification has been performed</t>
                </li>
                <li>
                  <t>Agent package may be <tt>.agent</tt> or <tt>.nomo</tt> format</t>
                </li>
                <li>
                  <t>Governance platform issues Birth Certificate after validating
package integrity hash</t>
                </li>
                <li>
                  <t>Birth Certificate and Manifest <strong>MUST</strong> include <tt>trust_tier: 2</tt>
and <tt>trust_warning: "verification-incomplete"</tt></t>
                </li>
                <li>
                  <t>Authority scope <strong>MUST</strong> be restricted at the SEP layer until
upgraded to Tier 1</t>
                </li>
              </ul>
            </dd>
          </dl>
          <t><strong>Tier 3 Registration (Experimental):</strong></t>
          <t>For development and testing environments only.</t>
          <dl>
            <dt>Requirements:</dt>
            <dd>
              <ul spacing="normal">
                <li>
                  <t>Agent label <strong>MUST</strong> carry <tt>X-</tt> prefix</t>
                </li>
                <li>
                  <t>Not published to the public AGTP registry</t>
                </li>
                <li>
                  <t><strong>MUST NOT</strong> be deployed in production environments</t>
                </li>
                <li>
                  <t>Governance platform issues a locally-scoped Birth Certificate</t>
                </li>
              </ul>
            </dd>
          </dl>
        </section>
        <section anchor="registration-lifecycle">
          <name>Registration Lifecycle</name>
          <figure anchor="agent-reg-lifecycle">
            <name>AGTP Agent Registration Lifecycle</name>
            <artwork><![CDATA[
1. PACKAGE
   Author creates .agent or .nomo package containing:
   - Embedded manifest (agent_label, job_description,
     authority_scope_categories, supported_methods,
     behavioral_trust_score)
   - Integrity hash of all package contents
   - For .nomo: CA-signed certificate chain

2. SUBMIT (ACTIVATE transaction)
   Registrant submits ACTIVATE request to governance endpoint:
   - Package file (.agent or .nomo)
   - Proposed agent label and optional org_domain or org_label
   - Owner identity (maps to Birth Certificate owner field)
   - Archetype declaration
   - For Tier 1: declared verification_path and corresponding
     evidence:
       dns-anchored: DNS challenge token
       log-anchored: log submission intent (challenge issued
         by governance platform)
       hybrid: DNS challenge token + blockchain signature

3. VALIDATE (governance platform)
   Governance platform:
   - Verifies package integrity hash
   - For .nomo: validates certificate chain
   - For Tier 1 dns-anchored: verifies DNS challenge against
     _agtp.[org_domain] TXT record
   - For Tier 1 log-anchored: prepares Birth Certificate for
     transparency log submission per Section 5.2
   - For Tier 1 hybrid: verifies both DNS challenge and
     blockchain address signature per {{AGTP-WEB3}}
   - Checks proposed label for uniqueness within the relevant
     namespace (org_domain, org_label, or log-scoped)

4. ISSUE (Birth Certificate and canonical Agent-ID assigned)
   Governance platform:
   - Issues Agent Birth Certificate with all fields populated,
     including verification_path
   - Derives canonical Agent-ID from certificate_hash
   - For log-anchored Tier 1: submits Birth Certificate to
     transparency log and embeds inclusion proof in the registry
     record
   - Creates registry record with Active lifecycle state
   - Records genesis audit entry in immutable audit log
     (genesis record includes full Birth Certificate and
     verification evidence)
   - Publishes agent to Namespace Document
     (triggers Namespace Document re-signing)

   The Birth Certificate is delivered to the registrant.
   It is the permanent record of the agent's genesis.
   Loss of the Birth Certificate does not invalidate the agent;
   the certificate_hash remains the authoritative identity anchor.

5. ACTIVE
   Agent enters Active lifecycle state.
   Canonical Agent-ID is valid for AGTP protocol sessions.
   All applicable alias URIs resolve to the Agent Manifest
   Document derived from the Birth Certificate.

6. LIFECYCLE EVENTS (post-activation)
   SUSPEND:    Agent temporarily inactive. Manifest returns 503.
               Birth Certificate and canonical ID remain valid.
               Initiated by trust violation or human decision.
   REINSTATE:  Human-authorized return to Active state.
               Birth Certificate unchanged. Reinstatement
               recorded in audit trail.
   REVOKE:     Agent permanently deactivated. Manifest returns 410.
               Birth Certificate archived. Canonical ID retired
               permanently and never reissued.
   DEPRECATE:  Controlled end-of-life. Manifest returns 410 with
               successor_agent field if applicable. Birth
               Certificate retained per Section 8.5 retention policy.
]]></artwork>
          </figure>
        </section>
        <section anchor="governance-tokens-and-runtime-authorization">
          <name>Governance Tokens and Runtime Authorization</name>
          <t>Following successful registration, the agent's Birth Certificate is
the static identity anchor. Runtime authorization for specific actions
is carried by Governance Tokens: signed, time-limited JWT artifacts
issued by the governance platform encoding a specific governance
verdict (ALLOW, DENY) for a specific action.</t>
          <t>Governance Tokens <strong>MUST NOT</strong> be reused. Each action requires a
fresh evaluation and a fresh token. Default TTL is 30 seconds. The
token's <tt>agent_id</tt> field <strong>MUST</strong> match the canonical Agent-ID from
the Birth Certificate. Tokens that fail this validation <strong>MUST</strong> be
rejected and the failure <strong>MUST</strong> be logged.</t>
          <t>The relationship between Birth Certificate and Governance Token
parallels the relationship between a passport and a visa: the passport
establishes persistent identity; the visa encodes a specific
time-bounded permission. Holding a passport does not imply holding
any particular visa.</t>
        </section>
        <section anchor="friendly-name-availability-and-re-registration">
          <name>Friendly Name Availability and Re-Registration</name>
          <t>An agent label becomes available for re-registration 90 days after
its associated agent enters Revoked or Deprecated lifecycle state.
The canonical Agent-ID and Birth Certificate are permanently archived.
The canonical Agent-ID <strong>MUST NOT</strong> be reissued under any
circumstances, including re-registration of the same label by the same
organization. This policy prevents ID reuse attacks in which a newly
registered agent inherits the trust history of a revoked predecessor.</t>
        </section>
      </section>
    </section>
    <section anchor="method-definitions">
      <name>Method Definitions</name>
      <section anchor="design-philosophy">
        <name>Design Philosophy</name>
        <t>AGTP methods are intent verbs, not resource operations. Each method
expresses what an agent is trying to accomplish. Method names are
uppercase ASCII strings. Methods that modify state are NOT idempotent
by default unless explicitly marked. All methods accept a context
parameter carrying agent session state. Requirement language follows
<xref target="RFC2119"/>.</t>
      </section>
      <section anchor="core-methods">
        <name>Core Methods</name>
        <section anchor="query">
          <name>QUERY</name>
          <t>Purpose: Semantic data retrieval. The agent specifies what it needs to
know, not where to find it. Distinguished from HTTP GET by expressing an
information need rather than retrieving a known resource at a known
location.</t>
          <table>
            <name>QUERY Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">intent</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Natural language or structured expression of the information need</td>
              </tr>
              <tr>
                <td align="left">scope</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Data domains or sources to include or exclude</td>
              </tr>
              <tr>
                <td align="left">format</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Desired response format: structured, natural, raw</td>
              </tr>
              <tr>
                <td align="left">confidence_threshold</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Minimum confidence score for included results (0.0-1.0)</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Session context for disambiguation</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Result set with confidence scores per item. Server <strong>SHOULD</strong>
indicate provenance of each result. Idempotent: Yes.</t>
        </section>
        <section anchor="summarize">
          <name>SUMMARIZE</name>
          <t>Purpose: Request a concise synthesis of provided content or a referenced
resource. The agent is requesting a cognitive operation on data, not
retrieving data.</t>
          <table>
            <name>SUMMARIZE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">source</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Content inline (up to implementation limit) or URI reference</td>
              </tr>
              <tr>
                <td align="left">length</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Target summary length: brief, standard, detailed</td>
              </tr>
              <tr>
                <td align="left">focus</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Aspect to emphasize in the summary</td>
              </tr>
              <tr>
                <td align="left">format</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Output format: bullets, prose, structured</td>
              </tr>
              <tr>
                <td align="left">audience</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Intended reader context, for calibrating complexity</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Summary content with a source_hash and a confidence score.
Idempotent: Yes.</t>
        </section>
        <section anchor="book">
          <name>BOOK</name>
          <t>Purpose: Reserve a resource, time slot, seat, or allocation on behalf of
the agent's principal. State-modifying. Notable error codes: 409 Conflict
(resource unavailable), 451 Scope Violation (principal not authorized for
this resource type).</t>
          <table>
            <name>BOOK Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">resource_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Identifier of the resource to reserve</td>
              </tr>
              <tr>
                <td align="left">principal_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The human or system on whose behalf the booking is made</td>
              </tr>
              <tr>
                <td align="left">time_slot</td>
                <td align="left">
                  <strong>MUST</strong> (if time-based)</td>
                <td align="left">ISO 8601 datetime or range</td>
              </tr>
              <tr>
                <td align="left">quantity</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Number of units to reserve</td>
              </tr>
              <tr>
                <td align="left">options</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Resource-specific booking parameters</td>
              </tr>
              <tr>
                <td align="left">confirm_immediately</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Boolean; if false, creates a hold pending confirmation</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Booking confirmation with booking_id, status (confirmed / held),
and expiry timestamp if a hold. Idempotent: No.</t>
        </section>
        <section anchor="schedule">
          <name>SCHEDULE</name>
          <t>Purpose: Define a sequence of actions, method calls, or events to be
executed at specified times or in response to specified triggers. Creates
a durable plan, not an immediate execution.</t>
          <table>
            <name>SCHEDULE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">steps</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Ordered list of AGTP method calls with parameters</td>
              </tr>
              <tr>
                <td align="left">trigger</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">immediate, datetime, event, or condition</td>
              </tr>
              <tr>
                <td align="left">trigger_value</td>
                <td align="left">
                  <strong>MUST</strong> (if not immediate)</td>
                <td align="left">Datetime, event name, or condition expression</td>
              </tr>
              <tr>
                <td align="left">on_failure</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Behavior on step failure: abort, skip, retry, escalate</td>
              </tr>
              <tr>
                <td align="left">notify</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Notification targets on completion or failure</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Schedule record with schedule_id, confirmed steps, and next
execution timestamp. Idempotent: No.</t>
        </section>
        <section anchor="learn">
          <name>LEARN</name>
          <t>Purpose: Update the agent's session context, knowledge state, or persistent
memory. An explicit context write where the agent asserts that something should
be retained.</t>
          <table>
            <name>LEARN Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">content</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Information to be learned (structured or unstructured)</td>
              </tr>
              <tr>
                <td align="left">scope</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">session (ephemeral), principal (persists for principal), global (shared)</td>
              </tr>
              <tr>
                <td align="left">category</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Semantic category for retrieval optimization</td>
              </tr>
              <tr>
                <td align="left">confidence</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Agent's confidence in the content (0.0-1.0)</td>
              </tr>
              <tr>
                <td align="left">source</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Provenance of the learned content</td>
              </tr>
              <tr>
                <td align="left">ttl</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Expiry for the learned content</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Confirmation with learn_id and effective scope. Idempotent: No.</t>
        </section>
        <section anchor="delegate">
          <name>DELEGATE</name>
          <t>Purpose: Transfer execution of a task or method to a sub-agent or
downstream system. Initiates a new AGTP session on behalf of the delegating
agent, carrying forward authority lineage.</t>
          <table>
            <name>DELEGATE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">target_agent_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Identifier of the agent to delegate to</td>
              </tr>
              <tr>
                <td align="left">task</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">AGTP method call (or sequence) to execute</td>
              </tr>
              <tr>
                <td align="left">authority_scope</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Scope granted to sub-agent <strong>MUST</strong> be a strict subset of delegating agent's scope</td>
              </tr>
              <tr>
                <td align="left">delegation_token</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Signed token proving delegation authority</td>
              </tr>
              <tr>
                <td align="left">callback</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">AGTP endpoint for result delivery</td>
              </tr>
              <tr>
                <td align="left">deadline</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Maximum time for task completion</td>
              </tr>
            </tbody>
          </table>
          <t>Security note: the authority_scope in a DELEGATE request <strong>MUST NOT</strong>
exceed the delegating agent's own Authority-Scope. Servers <strong>MUST</strong> enforce
this and <strong>MUST</strong> return 451 Scope Violation if violated. This is the
protocol-level defense against authority laundering. Idempotent: No.</t>
        </section>
        <section anchor="collaborate">
          <name>COLLABORATE</name>
          <t>Purpose: Initiate a multi-agent coordinated task where two or more agents
work in parallel or in defined roles toward a shared goal. Unlike DELEGATE
(hierarchical), COLLABORATE is peer-to-peer.</t>
          <table>
            <name>COLLABORATE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">collaborators</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">List of Agent-IDs invited to collaborate</td>
              </tr>
              <tr>
                <td align="left">objective</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Shared goal expressed as a task description or structured specification</td>
              </tr>
              <tr>
                <td align="left">role_assignments</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Map of Agent-IDs to roles within the collaboration</td>
              </tr>
              <tr>
                <td align="left">coordination_model</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">parallel, sequential, or consensus</td>
              </tr>
              <tr>
                <td align="left">result_aggregation</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">How results from collaborators are combined</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Collaboration session receipt with collaboration_id. Each
collaborator receives an AGTP NOTIFY to join. Idempotent: No.</t>
        </section>
        <section anchor="confirm">
          <name>CONFIRM</name>
          <t>Purpose: Explicit acknowledgment of a prior action, state, or data item.
Creates a signed attestation record.</t>
          <table>
            <name>CONFIRM Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">target_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">ID of the action, booking, schedule, or item being confirmed</td>
              </tr>
              <tr>
                <td align="left">status</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">accepted, rejected, or deferred</td>
              </tr>
              <tr>
                <td align="left">reason</td>
                <td align="left">
                  <strong>SHOULD</strong> (if rejected/deferred)</td>
                <td align="left">Explanation of the decision</td>
              </tr>
              <tr>
                <td align="left">attestation</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Agent-signed confirmation payload for audit</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Confirmation receipt with timestamp and attestation_id.
Idempotent: Yes.</t>
        </section>
        <section anchor="escalate">
          <name>ESCALATE</name>
          <t>Purpose: Route a task, decision, or exception to a human principal or
higher-authority agent when the current agent cannot or should not proceed.
ESCALATE is the protocol-level expression of meaningful friction in AI
systems as a first-class method.</t>
          <table>
            <name>ESCALATE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">task_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The task or method invocation triggering escalation</td>
              </tr>
              <tr>
                <td align="left">reason</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Structured reason: confidence_threshold, scope_limit, ethical_flag, ambiguous_instruction, resource_unavailable</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Full context needed for the escalation recipient to act</td>
              </tr>
              <tr>
                <td align="left">priority</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">urgent, normal, or low</td>
              </tr>
              <tr>
                <td align="left">recipient</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Specific human or agent to escalate to; if absent, routes to default handler</td>
              </tr>
              <tr>
                <td align="left">deadline</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Time by which a response is needed</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Escalation receipt with escalation_id and routing confirmation.
The escalated task is paused until resolved via CONFIRM. Idempotent: Yes.
An agent that escalates appropriately is functioning correctly. Governance
frameworks built on AGTP can use escalation frequency and reason codes as
observability signals for systemic issues.</t>
        </section>
        <section anchor="notify">
          <name>NOTIFY</name>
          <t>Purpose: Asynchronous push of information from an agent to a recipient.
Does not expect a response. Fire-and-forget. Delivery confirmation (if
required) returned via a subsequent CONFIRM from the recipient.</t>
          <table>
            <name>NOTIFY Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">recipient</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Target Agent-ID, human endpoint, or broadcast group</td>
              </tr>
              <tr>
                <td align="left">content</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Notification payload</td>
              </tr>
              <tr>
                <td align="left">urgency</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">critical, informational, or background</td>
              </tr>
              <tr>
                <td align="left">delivery_guarantee</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">at_most_once, at_least_once, or exactly_once</td>
              </tr>
              <tr>
                <td align="left">expiry</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Timestamp after which the notification should not be delivered</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Delivery receipt with notification_id. Idempotent: No.</t>
        </section>
        <section anchor="describe">
          <name>DESCRIBE</name>
          <t>Purpose: Return the operational capabilities of a known agent endpoint.
The requesting agent specifies what capability dimensions it needs to
evaluate; the server returns a structured Capability Document. Used for
pre-task negotiation before committing to DELEGATE or COLLABORATE. If
<tt>capability_domains</tt> is omitted, the server <strong>SHOULD</strong> return all supported
domains. Category: ACQUIRE.</t>
          <table>
            <name>DESCRIBE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">capability_domains</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Comma-separated domains to return: <tt>methods</tt>, <tt>modalities</tt>, <tt>tools</tt>, <tt>version</tt>, <tt>budget</tt>, <tt>zones</tt>. If omitted, server <strong>SHOULD</strong> return all.</td>
              </tr>
              <tr>
                <td align="left">version_min</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Minimum acceptable version for capability negotiation.</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Session context for capability filtering.</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Capability Document with the following structure:</t>
          <sourcecode type="json"><![CDATA[
{
  "supported_methods": ["QUERY", "SUMMARIZE", "DESCRIBE"],
  "modalities": ["text", "image", "streaming"],
  "tools": ["web_search", "code_execute"],
  "version": "2.0.0",
  "version_min_satisfied": true,
  "behavioral_trust_score": 0.94,
  "budget_units_accepted": ["tokens", "compute-seconds"],
  "zones_accepted": ["zone:internal", "zone:partner"]
}
]]></sourcecode>
          <t>Idempotent: Yes. Primary error codes: 404, 422.</t>
        </section>
        <section anchor="suspend">
          <name>SUSPEND</name>
          <t>Purpose: Pause a specific active session workflow in a recoverable state.
Issues a resumption nonce the requesting agent uses to resume the session.
Method-level SUSPEND is session-scoped and does not affect registry
lifecycle state or Birth Certificate validity. The distinction between
method-level SUSPEND and lifecycle SUSPEND (Section 6.7.6) is
architectural: method-level SUSPEND is a workflow primitive; lifecycle
SUSPEND is an administrative action on the agent's registry record.
Category: ORCHESTRATE.</t>
          <table>
            <name>SUSPEND Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">session_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The session to suspend.</td>
              </tr>
              <tr>
                <td align="left">reason</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Structured reason: <tt>awaiting_input</tt>, <tt>resource_limit</tt>, <tt>scheduled_pause</tt>, <tt>external_dependency</tt>.</td>
              </tr>
              <tr>
                <td align="left">resume_by</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">ISO 8601 deadline for resumption. If exceeded without RESUME, session transitions to expired.</td>
              </tr>
              <tr>
                <td align="left">checkpoint</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Agent-provided state snapshot for resumption context. Stored by server for duration of suspension.</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Suspension receipt with the following structure:</t>
          <sourcecode type="json"><![CDATA[
{
  "suspension_id": "susp-0042",
  "session_id": "sess-a1b2c3d4",
  "resumption_nonce": "[128-bit random value, base64url]",
  "resume_by": "2026-04-15T09:00:00Z",
  "status": "suspended"
}
]]></sourcecode>
          <t>The <tt>resumption_nonce</tt> <strong>MUST</strong> be a cryptographically random 128-bit
value encoded as base64url. It is single-use: once presented to resume
a session, the nonce is invalidated and <strong>MUST NOT</strong> be accepted again.
Idempotent: No. Primary error codes: 404, 408.</t>
          <t>Servers MUST generate nonces with at least 128 bits of entropy using 
a CSPRNG.</t>
        </section>
      </section>
      <section anchor="method-summary-table">
        <name>Method Summary Table</name>
        <table>
          <name>AGTP Core Method Summary</name>
          <thead>
            <tr>
              <th align="left">Method</th>
              <th align="left">Intent</th>
              <th align="left">State-Modifying</th>
              <th align="left">Idempotent</th>
              <th align="left">Primary Error Codes</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">QUERY</td>
              <td align="left">Retrieve information</td>
              <td align="left">No</td>
              <td align="left">Yes</td>
              <td align="left">404, 422</td>
            </tr>
            <tr>
              <td align="left">SUMMARIZE</td>
              <td align="left">Synthesize content</td>
              <td align="left">No</td>
              <td align="left">Yes</td>
              <td align="left">400, 422</td>
            </tr>
            <tr>
              <td align="left">BOOK</td>
              <td align="left">Reserve a resource</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">409, 451</td>
            </tr>
            <tr>
              <td align="left">SCHEDULE</td>
              <td align="left">Plan future actions</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">400, 409</td>
            </tr>
            <tr>
              <td align="left">LEARN</td>
              <td align="left">Update agent context</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">400, 403</td>
            </tr>
            <tr>
              <td align="left">DELEGATE</td>
              <td align="left">Transfer task to sub-agent</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">403, 451, 551</td>
            </tr>
            <tr>
              <td align="left">COLLABORATE</td>
              <td align="left">Coordinate peer agents</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">404, 403</td>
            </tr>
            <tr>
              <td align="left">CONFIRM</td>
              <td align="left">Attest to a prior action</td>
              <td align="left">Yes</td>
              <td align="left">Yes</td>
              <td align="left">404, 400</td>
            </tr>
            <tr>
              <td align="left">ESCALATE</td>
              <td align="left">Defer to human/authority</td>
              <td align="left">Yes</td>
              <td align="left">Yes</td>
              <td align="left">404</td>
            </tr>
            <tr>
              <td align="left">NOTIFY</td>
              <td align="left">Push information</td>
              <td align="left">No</td>
              <td align="left">No</td>
              <td align="left">400, 404</td>
            </tr>
            <tr>
              <td align="left">DESCRIBE</td>
              <td align="left">Retrieve endpoint capabilities</td>
              <td align="left">No</td>
              <td align="left">Yes</td>
              <td align="left">404, 422</td>
            </tr>
            <tr>
              <td align="left">SUSPEND</td>
              <td align="left">Pause session workflow</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">404, 408</td>
            </tr>
            <tr>
              <td align="left">PROPOSE</td>
              <td align="left">Submit a dynamic endpoint proposal</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">400, 403, 460</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="method-registry-and-extensibility">
        <name>Method Registry and Extensibility</name>
        <t>AGTP defines a formal Method Registry maintained by IANA (see Section 8.2).
Any party may submit a new method for registration. The registration
procedure is Expert Review, and registration <strong>MUST</strong> be accompanied by a
published specification, at minimum an IETF Internet-Draft or equivalent
publicly available document. Registered methods <strong>MUST</strong>:</t>
        <ol spacing="normal" type="1"><li>
            <t>Have a unique uppercase ASCII name</t>
          </li>
          <li>
            <t>Define required and optional parameters</t>
          </li>
          <li>
            <t>Define expected response structure</t>
          </li>
          <li>
            <t>Specify idempotency behavior</t>
          </li>
          <li>
            <t>Specify applicable error codes</t>
          </li>
          <li>
            <t>Include a security considerations section</t>
          </li>
          <li>
            <t>Be accompanied by a published reference specification (Internet-Draft or RFC)</t>
          </li>
          <li>
            <t>Conform to the AGIS Grammar Specification <xref target="AGIS"/>, demonstrating
membership in the action-intent semantic class as defined therein.
Submissions that do not satisfy AGIS syntactic and semantic class
requirements <strong>MUST</strong> be rejected by the Designated Expert.</t>
          </li>
        </ol>
        <t>Experimental methods <strong>MAY</strong> be used prior to registration using the X-
prefix convention (e.g., X-NEGOTIATE). Experimental methods <strong>MUST NOT</strong>
be used in production deployments without registration. Experimental
methods <strong>MUST</strong> also conform to AGIS grammar rules; non-conformant
experimental methods <strong>MUST NOT</strong> be forwarded by AGTP-aware
infrastructure components.</t>
        <section anchor="grammar-based-method-validation-method-grammar-header">
          <name>Grammar-Based Method Validation (Method-Grammar Header)</name>
          <t>In addition to the IANA registry pathway, AGTP version 03 introduces a
grammar-based method validation pathway. When an AGTP request carries the
<tt>Method-Grammar</tt> header, the receiving infrastructure validates the method
identifier against the declared grammar specification rather than checking
the IANA registry exclusively.</t>
          <artwork><![CDATA[
Method-Grammar: AGIS/1.0
]]></artwork>
          <t><strong>Behavior when Method-Grammar: AGIS/1.0 is present:</strong></t>
          <ol spacing="normal" type="1"><li>
              <t>The AGTP infrastructure layer validates the method identifier against
the AGIS Grammar Specification <xref target="AGIS"/>.</t>
            </li>
            <li>
              <t>If the method identifier is AGIS-conformant (imperative base-form verb,
action-intent semantic class, not an HTTP method or state descriptor),
the request proceeds regardless of whether the method appears in the
IANA registry.</t>
            </li>
            <li>
              <t>If the method identifier fails AGIS validation, the infrastructure
<strong>MUST</strong> return status 454 (Grammar Violation) and <strong>MUST NOT</strong> forward
the request.</t>
            </li>
            <li>
              <t>AGIS-conformant custom methods carry the same transport-level identity,
authority scope, and governance semantics as registered methods.</t>
            </li>
          </ol>
          <t>This pathway enables organizations to define domain-specific Agentive API
vocabularies -- RESERVE instead of BOOK, LOCATE instead of FIND, ADMIT
and TRIAGE for healthcare contexts -- without requiring IANA registration
while maintaining full AGTP transport governance. The IANA registry
continues to serve as the reference vocabulary for maximum cross-system
interoperability; the grammar pathway enables domain specificity within
those constraints.</t>
          <t><strong>Status code 454 Grammar Violation:</strong>
Returned when a method identifier is present with <tt>Method-Grammar: AGIS/1.0</tt>
but fails AGIS grammar validation. The response body <strong>MUST</strong> include the
specific validation failure from the AGIS eight-pass validator. This status
code is registered in the AGTP Status Code Registry (see Section 8.3).</t>
          <t>Capability negotiation occurs during session establishment. The server
returns a Supported-Methods header listing the methods it implements.
Clients <strong>SHOULD</strong> check this list before invoking non-core methods.</t>
          <t>The <tt>Negotiation-ID</tt> header is used to correlate turns within a dynamic
endpoint negotiation sequence (see Section 6.5). It <strong>MUST</strong> be a
UUID generated by the service upon receiving a PROPOSE request and
<strong>MUST</strong> be echoed in all subsequent turns of the same negotiation.
Maximum three turns before the agent <strong>MUST</strong> ESCALATE.</t>
          <artwork><![CDATA[
Negotiation-ID: 550e8400-e29b-41d4-a716-446655440000
]]></artwork>
          <t>QUOTE is defined as a Tier 2 Standard Extended Method in <xref target="AGTP-METHODS"/>.
QUOTE provides pre-flight cost estimation for a proposed method invocation:
the requesting agent submits a proposed method call; the server returns a
<tt>Cost-Estimate</tt> response without executing the method. Servers supporting
budget negotiation via the <tt>Budget-Limit</tt> header <strong>SHOULD</strong> implement QUOTE
to enable agents to validate cost before committing to execution. Servers
that implement QUOTE <strong>MUST</strong> list it in the <tt>Supported-Methods</tt> response
header at session establishment.</t>
        </section>
      </section>
      <section anchor="dynamic-endpoint-negotiation">
        <name>Dynamic Endpoint Negotiation</name>
        <section anchor="overview-1">
          <name>Overview</name>
          <t>AGTP version 03 introduces a dynamic endpoint negotiation protocol
enabling agents to discover data availability and instantiate endpoints
on demand, without requiring pre-built API definitions. This protocol
realizes the agentic API vision in which organizations expose data
availability rather than pre-designed endpoints, and agents construct
the interface they need at runtime.</t>
          <t>The negotiation protocol operates at the transport layer. AGIS <xref target="AGIS"/>
provides the grammar for proposal and acceptance documents. The agent's
identity and authority credentials (via the AGTP-CERT extension
<xref target="AGTP-CERT"/> where deployed) govern authorization decisions.</t>
        </section>
        <section anchor="protocol-flow">
          <name>Protocol Flow</name>
          <artwork><![CDATA[
Step 1:  Pre-auth discovery
         Agent issues unauthenticated GET to agtp://service.example.com
         Service returns AGIS document + data_manifest block
         No credentials required at this step

Step 2:  Agent evaluates data_manifest
         Agent determines the service has relevant data
         Agent assesses whether `negotiable: true` is declared
         Agent constructs an AGIS-formatted endpoint proposal

Step 3:  PROPOSE request
         Agent sends PROPOSE with AGIS endpoint definition in body
         Request MAY be unauthenticated if data sensitivity is low
         Request MUST include Method-Grammar: AGIS/1.0 header

Step 4a: Authorization required (262)
         Service returns 262 with required authorization mechanism
         Agent establishes credentials via specified mechanism
         Agent resubmits PROPOSE with credentials
         Negotiation-ID issued by service in 262 response

Step 4b: Negotiation in progress (261)
         Service evaluates proposal asynchronously
         Service returns 261 with Negotiation-ID
         Agent polls or awaits outcome

Step 5a: Endpoint instantiated (263)
         Service returns 263 with complete AGIS endpoint definition
         Negotiation-ID matches original proposal
         Instantiated endpoint is session-scoped by default
         Agent MAY call the endpoint immediately

Step 5b: Proposal rejected (460)
         Service returns 460 with rejection reason
         Response SHOULD reference data_manifest alternatives
         Agent MAY modify proposal and retry (maximum 3 turns)
         After 3 rejections agent MUST ESCALATE
]]></artwork>
        </section>
        <section anchor="propose-method">
          <name>PROPOSE Method</name>
          <t>PROPOSE is a Tier 1 AGTP method. The requesting agent submits an
AGIS-formatted endpoint definition describing the interface it needs.
The service evaluates whether it can fulfill the proposal against its
data manifest and authorization policy.</t>
          <t>Parameters:</t>
          <table>
            <name>PROPOSE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">proposal</td>
                <td align="left">Yes</td>
                <td align="left">Complete AGIS endpoint definition (method + path + semantic block + input schema + output schema)</td>
              </tr>
              <tr>
                <td align="left">session_id</td>
                <td align="left">Yes</td>
                <td align="left">The active AGTP session identifier</td>
              </tr>
              <tr>
                <td align="left">data_class</td>
                <td align="left">Yes</td>
                <td align="left">The data_manifest class the proposal targets</td>
              </tr>
              <tr>
                <td align="left">scope_requested</td>
                <td align="left">Recommended</td>
                <td align="left">The authority scope the agent requests for this endpoint</td>
              </tr>
              <tr>
                <td align="left">persistence</td>
                <td align="left">Optional</td>
                <td align="left">session (default) or persistent; persistent requires elevated authorization</td>
              </tr>
            </tbody>
          </table>
          <t>Response on 263 Endpoint Instantiated:</t>
          <sourcecode type="json"><![CDATA[
{
  "negotiation_id": "550e8400-e29b-41d4-a716-446655440000",
  "instantiated_endpoint": {
    "method": "LOCATE",
    "path": "/customer/{id}/location",
    "semantic": {
      "intent": "Returns the last known location for a customer",
      "actor": "agent",
      "outcome": "Location coordinates and address are returned",
      "capability": "retrieval",
      "confidence_guidance": 0.70,
      "impact_tier": "informational",
      "is_idempotent": true
    },
    "input": { "required": ["id"] },
    "output": { "coordinates": "object", "address": "string" },
    "errors": ["customer_not_found", "location_not_available"],
    "proposed": true,
    "scope_required": "location:read",
    "expires": "session"
  }
}
]]></sourcecode>
          <t>The <tt>proposed: true</tt> flag marks this as a dynamically instantiated
endpoint per the AGIS specification <xref target="AGIS"/>.</t>
        </section>
        <section anchor="credential-free-negotiation">
          <name>Credential-Free Negotiation</name>
          <t>For data classes declared with <tt>sensitivity: informational</tt> and
<tt>requires_authorization: false</tt> in the data manifest, services MAY
complete the full negotiation flow without requiring credentials.
The agent arrives, proposes, and receives an instantiated endpoint
without API keys.</t>
          <t>For sensitive data classes, services MUST require credential
establishment at Step 4a. The negotiation protocol is the mechanism
by which credentials are established, not a prerequisite. This
distinction is fundamental: the agent does not need credentials to
begin a negotiation; it needs credentials to complete one for
sensitive data.</t>
          <t>AGTP-CERT <xref target="AGTP-CERT"/> provides the cryptographic identity binding
that enables services to make fine-grained authorization decisions
during negotiation based on the agent's verified identity, principal,
and authority scope.</t>
        </section>
        <section anchor="session-scope-and-persistence">
          <name>Session Scope and Persistence</name>
          <t>Instantiated endpoints are session-scoped by default. They cease to
exist when the AGTP session terminates. Services MAY offer persistent
instantiation (the endpoint survives session termination and is added
to the service's AGIS document) subject to elevated authorization.</t>
          <t>Persistent instantiation SHOULD be treated as a modification to the
service's published AGIS document. Services supporting persistent
instantiation MUST increment their AGIS-Version header on the next
discovery request following persistence.</t>
        </section>
      </section>
      <section anchor="extended-method-vocabulary-and-industry-profiles">
        <name>Extended Method Vocabulary and Industry Profiles</name>
        <section anchor="three-tier-method-architecture">
          <name>Three-Tier Method Architecture</name>
          <t>The AGTP method vocabulary is organized into three tiers reflecting
different levels of universality, specificity, and domain relevance. All
methods at all tiers <strong>MUST</strong> conform to the AGIS Grammar Specification
<xref target="AGIS"/>. The AGIS action-intent semantic class constraint applies to
every method in the IANA registry and to every AGIS-validated custom
method accepted via the Method-Grammar header pathway.</t>
          <dl>
            <dt>Tier 1. Core Methods (defined in Section 6.2):</dt>
            <dd>
              <t>The baseline vocabulary required for AGTP compliance. Every conformant
AGTP implementation <strong>MUST</strong> support all Tier 1 methods. All Tier 1
methods are AGIS-conformant; they are defined instances of the
action-intent semantic class standardized in <xref target="AGIS"/>.</t>
            </dd>
            <dt>Tier 2. Standard Extended Methods:</dt>
            <dd>
              <t>Registered in the IANA AGTP Method Registry and available for use in any
AGTP implementation. Not required for baseline compliance but <strong>SHOULD</strong>
be implemented where their semantics apply. Defined in <xref target="AGTP-METHODS"/>.
All Tier 2 methods satisfy AGIS grammar requirements.</t>
            </dd>
            <dt>Tier 3. Industry Profile Methods:</dt>
            <dd>
              <t>Domain-specific method sets defined and registered by industry
communities as named AGTP profiles. Valid within deployments that declare
support for the relevant profile. Not required in general-purpose
implementations. All Tier 3 profile method submissions <strong>MUST</strong> include
AGIS conformance verification as part of their specification.</t>
            </dd>
            <dt>Tier 4. AGIS-Validated Custom Methods:</dt>
            <dd>
              <t>Organization-defined methods that are not registered in the IANA AGTP
Method Registry but conform to the AGIS Grammar Specification and are
accepted at the transport layer via the <tt>Method-Grammar: AGIS/1.0</tt>
header. Valid within the deploying organization's AGTP services. The
action-intent semantic class constraint applies identically. Agents
discover and interpret these methods through natural language inference
against AGIS semantic declarations, as validated empirically in
<xref target="HOOD2026"/>.</t>
            </dd>
          </dl>
        </section>
        <section anchor="method-category-taxonomy">
          <name>Method Category Taxonomy</name>
          <t>All AGTP methods are organized into five categories:</t>
          <dl>
            <dt>ACQUIRE:</dt>
            <dd>
              <t>Retrieve data, resources, or state without modifying it. Typically
idempotent; no state modification.</t>
            </dd>
            <dt>COMPUTE:</dt>
            <dd>
              <t>Process, transform, or analyze information and produce a derived result.
Typically idempotent given the same input.</t>
            </dd>
            <dt>TRANSACT:</dt>
            <dd>
              <t>Perform state-changing operations with external systems, resources, or
records. Not idempotent by default; subject to reversibility
classification.</t>
            </dd>
            <dt>COMMUNICATE:</dt>
            <dd>
              <t>Send information, notifications, or signals to recipients. Fire-and-
forget or confirm-receipt delivery models.</t>
            </dd>
            <dt>ORCHESTRATE:</dt>
            <dd>
              <t>Coordinate, sequence, or manage multiple agents, tasks, or workflows.
May spawn sub-agents or sessions; delegation chain semantics apply.</t>
            </dd>
          </dl>
          <table>
            <name>Core Method Category Mapping</name>
            <thead>
              <tr>
                <th align="left">Core Method</th>
                <th align="left">Category</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">QUERY</td>
                <td align="left">Acquire</td>
              </tr>
              <tr>
                <td align="left">SUMMARIZE</td>
                <td align="left">Compute</td>
              </tr>
              <tr>
                <td align="left">BOOK</td>
                <td align="left">Transact</td>
              </tr>
              <tr>
                <td align="left">SCHEDULE</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">LEARN</td>
                <td align="left">Compute</td>
              </tr>
              <tr>
                <td align="left">DELEGATE</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">COLLABORATE</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">CONFIRM</td>
                <td align="left">Transact</td>
              </tr>
              <tr>
                <td align="left">ESCALATE</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">NOTIFY</td>
                <td align="left">Communicate</td>
              </tr>
              <tr>
                <td align="left">DESCRIBE</td>
                <td align="left">Acquire</td>
              </tr>
              <tr>
                <td align="left">SUSPEND</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">PROPOSE</td>
                <td align="left">Orchestrate</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="standard-extended-methods-tier-2">
          <name>Standard Extended Methods (Tier 2)</name>
          <t>The following methods constitute the initial Tier 2 registration set,
defined in <xref target="AGTP-METHODS"/>. Listed here by category with brief semantic
definitions; full parameter specifications are in the companion document.</t>
          <t>ACQUIRE category: FETCH, SEARCH, SCAN, PULL, IMPORT, FIND.</t>
          <t>COMPUTE category: EXTRACT, FILTER, VALIDATE, TRANSFORM, TRANSLATE,
NORMALIZE, PREDICT, RANK, MAP.</t>
          <t>TRANSACT category: REGISTER, SUBMIT, TRANSFER, PURCHASE, SIGN, MERGE,
LINK, LOG, SYNC, PUBLISH.</t>
          <t>COMMUNICATE category: REPLY, SEND, REPORT.</t>
          <t>ORCHESTRATE category: MONITOR, ROUTE, RETRY, PAUSE, RESUME, RUN, CHECK.</t>
          <t>Notable constraints: PURCHASE <strong>MUST</strong> carry explicit principal_id and
scope enforcement; 451 Scope Violation applies if payments:purchase is
not in the agent's Authority-Scope. RUN requires explicit procedure_id
parameter; implementations <strong>MUST NOT</strong> accept free-form execution strings.</t>
        </section>
        <section anchor="short-form-and-industry-inspired-methods">
          <name>Short-Form and Industry-Inspired Methods</name>
          <t>A set of short-form verb methods, e.g., SET, TAKE, OPEN, START, CALL, MAKE,
TURN, BREAK, are provisionally catalogued as candidates for Tier 2
registration. These verbs are highly context-dependent and their semantics
vary significantly across deployment domains.</t>
          <t>Short-form methods will be registered individually only when a published
companion specification provides unambiguous semantic definitions
demonstrably distinct from existing registered methods. Provisional
registrations using the X- prefix (e.g., X-SET, X-CALL) are encouraged
during the experimentation period.</t>
        </section>
        <section anchor="industry-profile-method-sets">
          <name>Industry Profile Method Sets</name>
          <t>AGTP recognizes that specific industries require method vocabularies
reflecting domain-specific operations that would be inappropriate in a
general-purpose standard. Industry profile method sets are defined and
registered as named AGTP profiles. A profile is a published companion
specification that:</t>
          <ol spacing="normal" type="1"><li>
              <t>Declares a profile name (e.g., agtp-profile-healthcare,
agtp-profile-financial, agtp-profile-legaltech)</t>
            </li>
            <li>
              <t>Defines one or more industry-specific methods with full parameter
specifications, error codes, and security considerations</t>
            </li>
            <li>
              <t>Specifies which Tier 1 and Tier 2 methods are REQUIRED, RECOMMENDED,
or NOT APPLICABLE within the profile</t>
            </li>
            <li>
              <t>Addresses regulatory or compliance considerations specific to the
domain (e.g., HIPAA for healthcare, PCI-DSS for financial services)</t>
            </li>
          </ol>
          <t>Illustrative examples of potential industry profile methods (not yet
registered; listed for directional purposes only):</t>
          <t>Healthcare: PRESCRIBE, AUTHORIZE, REFER, DISPENSE, TRIAGE, CONSENT, REDACT</t>
          <t>Financial services: SETTLE, RECONCILE, HEDGE, CLEAR, UNDERWRITE, KYC, AML</t>
          <t>Legal and compliance: ATTEST, NOTARIZE, DISCLOSE, REDLINE, EXECUTE,
PRESERVE</t>
          <t>Infrastructure: PROVISION, DEPROVISION, ROLLBACK, SNAPSHOT, FAILOVER</t>
          <t>Industry communities are encouraged to develop and submit profile
specifications through the IETF process. The IANA AGTP Method Registry will
maintain a profile index alongside the core and standard method registries.</t>
        </section>
        <section anchor="registration-path-for-new-methods">
          <name>Registration Path for New Methods</name>
          <dl>
            <dt>For Tier 2 Standard Methods:</dt>
            <dd>
              <t>Submit an Internet-Draft to the IETF providing full method specification
per Section 6.4. The Designated Expert reviews for semantic uniqueness,
clarity, AGIS grammar conformance <xref target="AGIS"/>, and security considerations.
Submissions that fail AGIS validation <strong>MUST</strong> be returned to the submitter
before review proceeds.</t>
            </dd>
            <dt>For Industry Profile Methods (Tier 3):</dt>
            <dd>
              <t>Submit a profile specification to the IETF (or a recognized domain
standards body with an established AGTP registry liaison) covering all
methods in the profile and profile compliance requirements. The
specification <strong>MUST</strong> include AGIS conformance statements for every
method defined in the profile.</t>
            </dd>
            <dt>For AGIS-Validated Custom Methods (Tier 4):</dt>
            <dd>
              <t>No IANA registration required. The implementing organization defines
its method vocabulary in an AGIS document served at the service's AGTP
address. Methods are validated at the transport layer using the
<tt>Method-Grammar: AGIS/1.0</tt> header. The method vocabulary is declared
in the AGIS vocabulary block and discoverable by agents at runtime.
Organizations adopting Tier 4 methods are encouraged to publish their
AGIS documents at <tt>agtp://[service-address]</tt> to enable cross-system
agent discovery.</t>
            </dd>
            <dt>For Experimental Methods:</dt>
            <dd>
              <t>Use the X- prefix without registration. Implementations <strong>MUST NOT</strong>
deploy experimental methods in production without completing either the
IANA registration process (Tier 2/3) or deploying a conformant AGIS
document (Tier 4). Experimental method names do not reserve the
unprefixed name.</t>
            </dd>
          </dl>
          <t>The AGTP Method Registry is published at:
https://www.iana.org/assignments/agtp-methods/</t>
          <t>The AGIS conformance test suite is maintained at:
https://agtp.io/agis/conformance</t>
        </section>
        <section anchor="real-time-service-adaptation">
          <name>Real-time Service Adaptation</name>
          <t>Services that update their AGIS documents at runtime MUST signal changes
via the <tt>AGIS-Version</tt> response header. This header MUST be present on
all AGTP responses from negotiable services.</t>
          <artwork><![CDATA[
AGIS-Version: 1.2.4
]]></artwork>
          <t>Agent runtimes MUST cache the AGIS-Version value from each service.
When a response carries an AGIS-Version value different from the cached
value, the agent runtime MUST re-fetch and re-validate the AGIS document
before issuing further method calls. This mechanism supports real-time
service adaptation without requiring push notifications.</t>
          <artwork><![CDATA[
Adaptation flow:
  Agent calls BOOK /reservation
  Response includes AGIS-Version: 1.2.5 (was 1.2.4)
  Agent re-fetches agtp://service.example.com
  Service returns updated AGIS document (new endpoint added)
  Agent updates service map
  Agent resumes operation with updated capability knowledge
]]></artwork>
          <t>Services SHOULD increment AGIS-Version when:
  - A new endpoint is added to the AGIS document
  - An existing endpoint's semantic declaration changes
  - A new verb is added to the vocabulary block
  - A new data class is added to the data_manifest</t>
          <t>Services MUST NOT decrement or reuse AGIS-Version values.</t>
        </section>
      </section>
    </section>
    <section anchor="merchant-identity-and-agentic-commerce-binding">
      <name>Merchant Identity and Agentic Commerce Binding</name>
      <section anchor="overview-2">
        <name>Overview</name>
        <t>AGTP specifies agent-side identity through the Agent Birth
Certificate, canonical Agent-ID, Agent Manifest Document, and Trust
Tier model defined in Section 5. PURCHASE invocations carrying
<tt>payments:purchase</tt> in the Authority-Scope header and a Budget-Limit
constraint are fully governed on the sending side. The receiving side
of a PURCHASE -- the merchant counterparty -- does not have an
equivalent protocol-level identity in the base specification.</t>
        <t>Version 04 of AGTP introduces normative integration hooks for the
AGTP Merchant Identity and Agentic Commerce Binding specification
<xref target="AGTP-MERCHANT"/>, which defines the merchant-side identity model.
The integration is hook-based: this document registers the required
headers, status code, and Authority-Scope domains; the detailed
semantics, Merchant Manifest Document schema, Merchant Birth
Certificate structure, and counterparty verification procedure are
specified in the companion.</t>
      </section>
      <section anchor="merchant-identity-headers-summary">
        <name>Merchant Identity Headers (Summary)</name>
        <t>PURCHASE invocations in a fully conformant v04 deployment carry the
following additional headers:</t>
        <ul spacing="normal">
          <li>
            <t><tt>Merchant-ID</tt>: canonical identifier of the intended merchant
counterparty.</t>
          </li>
          <li>
            <t><tt>Merchant-Manifest-Fingerprint</tt>: SHA-256 fingerprint of the
Merchant Manifest Document the requesting agent verified during
pre-flight counterparty verification.</t>
          </li>
          <li>
            <t><tt>Intent-Assertion</tt>: detached JWT carrying principal-authorized
purchase intent, forwardable to payment networks as standalone
evidence.</t>
          </li>
          <li>
            <t><tt>Cart-Digest</tt>: digest of a structured cart returned by a prior
QUOTE invocation, binding this PURCHASE to that cart.</t>
          </li>
        </ul>
        <t>Full field definitions, wire examples, and security requirements are
in <xref target="AGTP-MERCHANT"/>.</t>
      </section>
      <section anchor="counterparty-unverified-summary">
        <name>455 Counterparty Unverified (Summary)</name>
        <t>Receiving servers <strong>MUST</strong> return 455 Counterparty Unverified on
PURCHASE invocations that fail merchant identity verification:
missing <tt>Merchant-ID</tt> or <tt>Merchant-Manifest-Fingerprint</tt> headers,
fingerprint mismatch, Merchant-ID mismatch, or a target merchant in
any lifecycle state other than Active. 455 is a governance signal,
parallel in role to 451 Scope Violation and 453 Zone Violation:
<strong>MUST</strong> be logged; <strong>MUST NOT</strong> be retried without re-running
counterparty verification.</t>
      </section>
      <section anchor="integration-with-purchase-discover-and-attribution-record">
        <name>Integration with PURCHASE, DISCOVER, and Attribution-Record</name>
        <t>Three existing AGTP primitives interact with merchant identity:</t>
        <ul spacing="normal">
          <li>
            <t><strong>PURCHASE</strong>: Counterparty verification runs before PURCHASE is
sent on the wire. A verified PURCHASE produces an Attribution-
Record naming both the agent and the merchant cryptographically.</t>
          </li>
          <li>
            <t><strong>DISCOVER</strong>: The DISCOVER method defined in <xref target="AGTP-DISCOVER"/> is
extended by <xref target="AGTP-MERCHANT"/> to return Merchant Manifest
Documents when the query carries <tt>result_type: "merchant"</tt>, and to
return mixed agent/merchant result sets when <tt>result_type: "any"</tt>.
The existing DISCOVER signature model, ranking model, and
governance-zone enforcement apply unchanged.</t>
          </li>
          <li>
            <t><strong>Attribution-Record</strong>: The Attribution-Record returned on
PURCHASE includes <tt>merchant_id</tt>, <tt>merchant_fingerprint</tt>, and
<tt>intent_assertion_jti</tt> fields when merchant identity binding is
in effect. This produces a dual-party cryptographic record
consumable by downstream audit and dispute-resolution processes
without requiring those processes to speak AGTP.</t>
          </li>
        </ul>
      </section>
      <section anchor="relationship-to-payment-networks">
        <name>Relationship to Payment Networks</name>
        <t>The merchant identity model defined in this document is payment-rail
neutral. It does not define payment credential handling, tokenized
card-on-file representations, authorization messaging to card
networks, or settlement. Payment networks wishing to extend
protection, fraud coverage, or dispute handling to agent-initiated
transactions consume the Intent-Assertion JWT and the Attribution-
Record as verifiable inputs to their own authorization and dispute
flows; no AGTP-layer integration is required on the payment-network
side. The specific mapping between AGTP merchant identity artifacts
and payment-network message formats is expected to be defined
bilaterally between governance platforms and individual networks and
is out of scope for this document.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This section satisfies the mandatory IETF Security Considerations
requirement. All AGTP implementations <strong>MUST</strong> address the considerations
described here.</t>
      <section anchor="mandatory-tls">
        <name>Mandatory TLS</name>
        <t>All AGTP connections <strong>MUST</strong> use TLS 1.3 or higher. Implementations
<strong>MUST</strong> reject connections using TLS 1.2 or below. Certificate validation
follows standard PKI practices per <xref target="RFC5280"/>. Servers <strong>MUST</strong> present
a valid certificate.</t>
      </section>
      <section anchor="agent-identity-verification-three-levels">
        <name>Agent Identity Verification: Three Levels</name>
        <t>AGTP defines three distinct levels at which agent identity and
Authority-Scope can be verified. Each level serves a different deployment
profile and operational tradeoff. Understanding the distinction is
essential for implementers: the AGTP Agent Certificate extension
(<xref target="AGTP-CERT"/>) is OPTIONAL, and base AGTP provides cryptographic
verification at the application layer without it.</t>
        <t><strong>Level 1 - Self-asserted headers (raw request fields).</strong>
Every AGTP request <strong>MUST</strong> include <tt>Agent-ID</tt> and <tt>Principal-ID</tt>
header fields. As raw header values on an individual request, these
fields are self-asserted: a client writes the values into the request
and the server records what was written. Level 1 verification is
limited to mandatory logging and anomaly detection against the
recorded stream. This is the minimum baseline every AGTP implementation
provides.</t>
        <t><strong>Level 2 - Application-layer cryptographic verification (signed
Agent Manifest Document).</strong> A canonical Agent-ID resolves to a
signed Agent Manifest Document (Section 5.5) that carries the Birth
Certificate's Authority-Scope grant and is signed by the governance
platform that issued it. A verifier (including a stranger with no
prior relationship to the agent's organization) can cryptographically
verify identity and scope at the application layer by performing the
following steps:</t>
        <ol spacing="normal" type="1"><li>
            <t>Resolve the canonical Agent-ID to retrieve the signed Agent
Manifest Document.</t>
          </li>
          <li>
            <t>Verify the governance platform's signature on the manifest against
the platform's published key.</t>
          </li>
          <li>
            <t>Confirm that the canonical Agent-ID in the manifest matches the
hash of the Birth Certificate.</t>
          </li>
          <li>
            <t>Read the Authority-Scope grant from the verified manifest.</t>
          </li>
        </ol>
        <t>Level 2 verification is available in base AGTP without the Agent
Certificate extension. It is the identity mechanism the protocol
depends on. Self-asserted headers (Level 1) are bound to verified
identity (Level 2) by the resolver's retrieval of the signed
manifest for the declared canonical Agent-ID.</t>
        <t><strong>Level 3 - Transport-layer cryptographic verification (AGTP-CERT
extension).</strong> The AGTP Agent Certificate extension <xref target="AGTP-CERT"/>
binds <tt>Agent-ID</tt>, <tt>Principal-ID</tt>, and Authority-Scope to an X.509 v3
certificate presented during TLS 1.3 mutual authentication. Level 3
accelerates the Level 2 check to the TLS handshake and enables
Scope-Enforcement Points (SEPs) to verify Authority-Scope at O(1)
per-request cost without application-layer access. Level 3 is an
acceleration and enforcement path for Level 2, not a replacement of
it. Deployments that require line-rate scope enforcement at
infrastructure layers (load balancers, governance gateways) <strong>SHOULD</strong>
implement <xref target="AGTP-CERT"/>.</t>
        <ul empty="true">
          <li>
            <t>Note: The Agent Certificate extension and the Agent Birth Certificate
mechanism may be subject to pending intellectual property claims.
See Section 7.7 and the IPR Notice preceding the Abstract for details.
The licensor is prepared to grant a royalty-free license to implementers.</t>
          </li>
        </ul>
        <t>Every AGTP server <strong>MUST</strong> log Agent-ID and Principal-ID fields for every
request, creating an attributable audit trail at Level 1 even in
deployments that do not implement Level 2 retrieval or Level 3 transport
binding.</t>
      </section>
      <section anchor="authority-scope-enforcement">
        <name>Authority Scope Enforcement</name>
        <t>The Authority-Scope header declares what actions the agent is authorized
to take. Compliant AGTP servers <strong>MUST</strong> parse the Authority-Scope on every
request, return 451 Scope Violation for any method that exceeds declared
scope, and log all scope violations for audit purposes. At Level 1, scope
declarations are self-asserted in the request header, analogous to scope
assertions in OAuth 2.0 <xref target="RFC6749"/>. At Level 2, scope is cryptographically
verifiable through the signed Agent Manifest Document; servers <strong>SHOULD</strong>
retrieve and verify the manifest for any Agent-ID whose declared scope
exceeds read-only operations. Level 3 cryptographically signed and
infrastructure-enforced scopes are defined in <xref target="AGTP-CERT"/>.</t>
      </section>
      <section anchor="threat-model">
        <name>Threat Model</name>
        <section anchor="agent-spoofing">
          <name>Agent Spoofing</name>
          <t>Threat: A malicious actor forges Agent-ID and Principal-ID headers to
impersonate a trusted agent. Mitigation: Level 2 application-layer
verification binds a declared Agent-ID to the signed Agent Manifest
Document retrieved via canonical ID resolution. A forged Agent-ID
either fails to resolve or resolves to a manifest whose signature
cannot be verified against the claimed governance platform's published
key. Level 3 raises the mitigation to the TLS handshake via
<xref target="AGTP-CERT"/>. Implementations <strong>SHOULD</strong> retrieve and verify the
manifest for any Agent-ID carrying scope beyond read-only query
operations. Mandatory Level 1 logging provides an anomaly-detection
baseline for deployments that do not perform active verification on
every request.</t>
        </section>
        <section anchor="authority-laundering">
          <name>Authority Laundering</name>
          <t>Threat: An agent claims an Authority-Scope broader than what it was
granted. Mitigation: server-side scope enforcement; 451 Scope Violation
returned and logged. In DELEGATE chains, each hop's scope <strong>MUST</strong> be a
strict subset of the delegating agent's scope.</t>
        </section>
        <section anchor="delegation-chain-poisoning">
          <name>Delegation Chain Poisoning</name>
          <t>Threat: A malicious agent inserts itself into a DELEGATE chain. Mitigation:
Delegation-Chain headers are logged at each hop. 551 Authority Chain Broken
is returned if any chain entry is unverifiable. Full mitigation requires
<xref target="AGTP-CERT"/> for signed delegation tokens.</t>
        </section>
        <section anchor="denial-of-service-via-high-frequency-agent-traffic">
          <name>Denial of Service via High-Frequency Agent Traffic</name>
          <t>Threat: Agents that are compromised, misconfigured, or adversarial generate
extremely high request volumes. Mitigation: 429 Rate Limited status code.
Rate limiting <strong>SHOULD</strong> be applied per Agent-ID and per Principal-ID.
When <xref target="AGTP-CERT"/> is deployed, per-Agent-ID quotas can be cryptographically
tied to verified identity, preventing quota evasion through Agent-ID
spoofing.</t>
        </section>
        <section anchor="session-hijacking">
          <name>Session Hijacking</name>
          <t>Threat: An attacker intercepts or forges a Session-ID. Mitigation:
mandatory TLS protects sessions in transit. Session-IDs <strong>MUST</strong> be
cryptographically random with minimum 128 bits of entropy. Servers <strong>MUST</strong>
validate that Session-ID, Agent-ID, and TLS client identity are consistent.</t>
        </section>
        <section anchor="escalation-suppression">
          <name>Escalation Suppression</name>
          <t>Threat: A compromised agent or intermediary suppresses ESCALATE requests,
preventing human oversight. Mitigation: compliant implementations <strong>MUST</strong>
route ESCALATE requests directly to the declared escalation handler without
modification. Intermediaries <strong>MUST NOT</strong> drop, delay, or modify ESCALATE
requests. Escalation handlers <strong>SHOULD</strong> implement independent receipt
confirmation.</t>
        </section>
        <section anchor="birth-certificate-spoofing">
          <name>Birth Certificate Spoofing</name>
          <t>Threat: A malicious actor fabricates a Birth Certificate to claim a
legitimate agent's identity or construct a false identity with elevated
trust. Mitigation: Birth Certificates are issued only by governance
platforms that have completed one of the three Tier 1 verification
paths (Section 5.2). For <tt>dns-anchored</tt> registrations, the governance
platform <strong>MUST</strong> verify DNS ownership of the claimed <tt>org_domain</tt>
before issuance. For <tt>log-anchored</tt> registrations, the governance
platform <strong>MUST</strong> submit the Birth Certificate to a transparency log
per <xref target="RFC9162"/> / <xref target="RFC9943"/> and record the inclusion proof in the
registry; tampering with a log-anchored Birth Certificate is
detectable by any party with log access. For <tt>hybrid</tt> registrations,
both DNS and blockchain address ownership are verified. In the base
spec, mandatory logging provides auditability. Full mitigation
requires <xref target="AGTP-CERT"/> for cryptographically bound Birth Certificate
verification at the transport layer. Governance platforms <strong>MUST</strong>
treat any ACTIVATE request that presents a certificate hash matching
an existing registry record as a collision attack and <strong>MUST</strong> reject
it.</t>
        </section>
        <section anchor="domain-transfer-identity-hijacking">
          <name>Domain Transfer Identity Hijacking</name>
          <t>Threat: An attacker acquires an expired domain to inherit the agent
registry and trust history of prior registrants. Mitigation applies
to <tt>dns-anchored</tt> and <tt>hybrid</tt> Tier 1 agents: agents under an expired
domain are automatically Suspended within 24 hours of domain expiry
detection. A new owner of the domain <strong>MUST NOT</strong> inherit prior agent
registrations. See Section 9.6 for the full domain expiry policy.
<tt>log-anchored</tt> Tier 1 agents are unaffected by this threat because
their verification evidence is the transparency log inclusion proof
rather than DNS ownership.</t>
        </section>
        <section anchor="attribution-forgery">
          <name>Attribution Forgery</name>
          <t>Threat: A malicious agent submits a fabricated or replayed
Attribution-Record to claim credit for an action it did not perform, or
to conceal the true execution context of an action it did perform.</t>
          <t>Mitigation: Attribution-Records <strong>MUST</strong> be signed with the agent's
governance key. The signature <strong>MUST</strong> cover the full record including the
Task-ID, Agent-ID, method, timestamp, and result hash. When <xref target="AGTP-CERT"/>
is deployed, the signature is verified at the transport layer against the
agent's X.509 certificate. For high-stakes domains, RATS attestation
evidence in the Attribution-Record per <xref target="RFC9334"/> provides hardware-rooted
proof of execution context that cannot be forged without compromising the
attesting environment itself. Attribution-Record signatures <strong>MUST</strong> be
verified before the record is admitted to an audit trail. Unverified records
<strong>MUST</strong> be logged with a <tt>signature_unverified</tt> flag and <strong>MUST NOT</strong> be
treated as authoritative for compliance purposes.</t>
        </section>
      </section>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t>Agent identity headers carry information about agent behavior that may be
sensitive:</t>
        <ul spacing="normal">
          <li>
            <t>Agent-ID and Principal-ID together may reveal organizational structure</t>
          </li>
          <li>
            <t>Session-ID and Task-ID reveal workflow patterns</t>
          </li>
          <li>
            <t>Delegation-Chain reveals multi-agent architecture</t>
          </li>
        </ul>
        <t>AGTP logs containing these fields <strong>MUST</strong> be treated as sensitive
operational data. Operators <strong>MUST</strong> implement appropriate access controls,
retention limits, and data minimization practices consistent with
applicable privacy regulations.</t>
        <t>Where privacy-preserving attribution is required, implementations <strong>MAY</strong>
use pseudonymous Agent-IDs with a separate trusted resolution service.
The architecture for pseudonymous agent identity resolution is reserved
for a future companion document.</t>
      </section>
      <section anchor="denial-of-service-considerations">
        <name>Denial-of-Service Considerations</name>
        <t>AGTP's agent identity headers provide a mechanism for more precise
denial-of-service mitigation than is possible with HTTP. Rate limiting
<strong>SHOULD</strong> be applied per Agent-ID and per Principal-ID in addition to
per-IP-address controls.</t>
        <t>When <xref target="AGTP-CERT"/> is deployed, per-Agent-ID rate limiting can be
cryptographically tied to verified agent identity, preventing quota evasion
through Agent-ID rotation. Implementations planning high-volume governed
agent deployments <strong>SHOULD</strong> plan for <xref target="AGTP-CERT"/> as part of their
denial-of-service mitigation strategy.</t>
        <t>Additional recommended mitigations: Priority header enforcement (Priority:
background requests <strong>SHOULD</strong> have lower rate limit headroom than
Priority: critical); per-governance-zone aggregate limits in multi-tenant
deployments; and circuit breaker patterns for ESCALATE request floods.</t>
      </section>
      <section anchor="intellectual-property-considerations">
        <name>Intellectual Property Considerations</name>
        <t>The core AGTP specification, including all base methods, header fields,
status codes, connection model, and IANA registrations defined in this
document, is intended for open implementation without royalty obligation.</t>
        <t>Certain elements referenced in this document may be subject to pending
patent applications by the author, specifically:</t>
        <ul spacing="normal">
          <li>
            <t>The Agent Certificate extension <xref target="AGTP-CERT"/>, which provides
cryptographic binding of agent identity and authority scope to AGTP
header fields.</t>
          </li>
          <li>
            <t>The ACTIVATE method, which provides AGTP-native transmission and
activation of governed agent packages.</t>
          </li>
          <li>
            <t>The Agent Birth Certificate mechanism (Section 5.7), which provides
the genesis identity record and canonical Agent-ID derivation
process for AGTP-registered agents.</t>
          </li>
          <li>
            <t>The <tt>.agent</tt> file format specification, an open packaging format
for AI agents.</t>
          </li>
          <li>
            <t>The <tt>.nomo</tt> file format specification, a governed packaging format
for AI agents with cryptographic governance binding.</t>
          </li>
        </ul>
        <t>Implementers of the core AGTP specification are not affected by any
intellectual property claims on these extensions and associated formats.</t>
        <t>The licensor is prepared to grant a royalty-free license to implementers
for any patent claims that cover contributions in this document and its
referenced extensions, consistent with the IETF's IPR framework under
<xref target="RFC8179"/>.</t>
        <t>IPR disclosures have been filed with the IETF Secretariat and are available
at: https://datatracker.ietf.org/ipr/</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests the following IANA actions upon advancement to
RFC status.</t>
      <section anchor="iana-ports">
        <name>Port Assignment</name>
        <t>Registration of the following service names in the IANA Service Name and
Transport Protocol Port Number Registry:</t>
        <table>
          <name>Proposed Port Assignments</name>
          <thead>
            <tr>
              <th align="left">Service Name</th>
              <th align="left">Port</th>
              <th align="left">Transport</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">agtp</td>
              <td align="left">TBD</td>
              <td align="left">TCP</td>
              <td align="left">Agent Transfer Protocol over TCP/TLS</td>
            </tr>
            <tr>
              <td align="left">agtp-quic</td>
              <td align="left">TBD</td>
              <td align="left">UDP</td>
              <td align="left">Agent Transfer Protocol over QUIC</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="agtp-method-registry">
        <name>AGTP Method Registry</name>
        <t>Establishment of a new IANA registry: Agent Transfer Protocol Methods.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Methods</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review per <xref target="RFC8126"/>, with the additional requirement that each
registration be accompanied by a published specification, at minimum a
publicly available Internet-Draft or equivalent document. The Designated
Expert <strong>SHOULD</strong> verify that the proposed method name is unique, the
reference specification is publicly accessible, and the method definition
includes the required fields (parameters, response structure, idempotency,
error codes, security considerations).</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
        </dl>
        <t>Initial registrations:</t>
        <table>
          <name>Initial AGTP Method Registry Entries</name>
          <thead>
            <tr>
              <th align="left">Method</th>
              <th align="left">Status</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">QUERY</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">SUMMARIZE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">BOOK</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">SCHEDULE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">LEARN</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">DELEGATE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">COLLABORATE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">CONFIRM</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">ESCALATE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">NOTIFY</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">DESCRIBE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">SUSPEND</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="agtp-status-code-registry">
        <name>AGTP Status Code Registry</name>
        <t>Establishment of a new IANA registry: Agent Transfer Protocol Status Codes.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Status Codes</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review + published specification required.</t>
          </dd>
        </dl>
        <t>The following AGTP-specific status codes are registered with full
definitions:</t>
        <table>
          <name>AGTP-Specific Status Code Definitions</name>
          <thead>
            <tr>
              <th align="left">Code</th>
              <th align="left">Name</th>
              <th align="left">Definition</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">451</td>
              <td align="left">Scope Violation</td>
              <td align="left">The requested action is outside the Authority-Scope declared in the request headers. The server <strong>MUST</strong> log this event. The agent <strong>MUST NOT</strong> retry the same request without modifying its Authority-Scope declaration. This is a governance signal, not a protocol error.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
            <tr>
              <td align="left">452</td>
              <td align="left">Budget Exceeded</td>
              <td align="left">The requested method execution would exceed the resource limits declared in the Budget-Limit request header. The agent <strong>MUST NOT</strong> retry without modifying the Budget-Limit or reducing request scope. This is a governance signal, not a protocol error. <strong>MUST</strong> be logged.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
            <tr>
              <td align="left">454</td>
              <td align="left">Grammar Violation</td>
              <td align="left">The method identifier fails AGIS grammar validation <xref target="AGIS"/> when <tt>Method-Grammar: AGIS/1.0</tt> is present. The response body <strong>MUST</strong> identify the specific AGIS validation pass that failed. The agent <strong>MUST NOT</strong> retry without correcting the method identifier.</td>
              <td align="left">This document, Section 6.4</td>
            </tr>
            <tr>
              <td align="left">261</td>
              <td align="left">Negotiation In Progress</td>
              <td align="left">The service has received a PROPOSE request and is evaluating the endpoint proposal. The response body <strong>MUST</strong> include a Negotiation-ID and an estimated evaluation duration. The agent <strong>MUST</strong> poll or wait for a 263 or rejection response.</td>
              <td align="left">This document, Section 6.5</td>
            </tr>
            <tr>
              <td align="left">262</td>
              <td align="left">Authorization Required for Negotiation</td>
              <td align="left">The service requires credential establishment before evaluating the PROPOSE request. The response body <strong>MUST</strong> specify the authorization mechanism required (e.g., AGTP-CERT, OAuth scope).</td>
              <td align="left">This document, Section 6.5</td>
            </tr>
            <tr>
              <td align="left">263</td>
              <td align="left">Endpoint Instantiated</td>
              <td align="left">The service has accepted the PROPOSE request and instantiated the requested endpoint. The response body <strong>MUST</strong> contain a complete AGIS endpoint definition for the instantiated endpoint. The Negotiation-ID <strong>MUST</strong> match the proposal.</td>
              <td align="left">This document, Section 6.5</td>
            </tr>
            <tr>
              <td align="left">460</td>
              <td align="left">Proposal Rejected</td>
              <td align="left">The service cannot or will not instantiate the proposed endpoint. The response body <strong>MUST</strong> explain the rejection reason and <strong>SHOULD</strong> reference relevant data_manifest entries if the requested data class is available through a different approach.</td>
              <td align="left">This document, Section 6.5</td>
            </tr>
            <tr>
              <td align="left">453</td>
              <td align="left">Zone Violation</td>
              <td align="left">The request would route outside the network boundary declared in the AGTP-Zone-ID header. SEP-enforced. The agent <strong>MUST NOT</strong> retry without modifying the AGTP-Zone-ID or obtaining explicit cross-zone authorization. <strong>MUST</strong> be logged.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
            <tr>
              <td align="left">455</td>
              <td align="left">Counterparty Unverified</td>
              <td align="left">The merchant counterparty in a PURCHASE invocation failed identity verification. Returned when the <tt>Merchant-ID</tt> or <tt>Merchant-Manifest-Fingerprint</tt> request headers are absent, when the fingerprint does not match the receiving server's current Merchant Manifest Document, when the Merchant-ID does not match the server's canonical ID, or when the merchant is in a non-Active lifecycle state. Governance signal; <strong>MUST</strong> be logged. Full definition in <xref target="AGTP-MERCHANT"/>.</td>
              <td align="left">
                <xref target="AGTP-MERCHANT"/>, Section 7</td>
            </tr>
            <tr>
              <td align="left">550</td>
              <td align="left">Delegation Failure</td>
              <td align="left">A sub-agent to which a task was delegated via the DELEGATE method failed to complete the task within the declared deadline or returned an error. The response body <strong>SHOULD</strong> contain the sub-agent's error details.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
            <tr>
              <td align="left">551</td>
              <td align="left">Authority Chain Broken</td>
              <td align="left">One or more entries in the Delegation-Chain header cannot be verified as part of a valid and continuous delegation sequence. The specific unverifiable entry <strong>SHOULD</strong> be identified in the response body. The server <strong>MUST</strong> log this event.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="header-field-registry">
        <name>Header Field Registry</name>
        <t>AGTP header fields are distinct from HTTP header fields and are registered
in a new IANA registry: Agent Transfer Protocol Header Fields.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Header Fields</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review + published specification required.</t>
          </dd>
        </dl>
        <t>AGTP does not reuse the HTTP Field Name Registry, as AGTP header fields have
different semantics, applicability, and versioning constraints from HTTP
fields. HTTP header fields are not automatically valid in AGTP, and AGTP
header fields are not valid HTTP fields.</t>
        <t>Initial registrations (all Permanent): AGTP-Version, AGTP-Method, AGTP-Status,
Agent-ID, Principal-ID, Authority-Scope, Session-ID, Task-ID,
Delegation-Chain, Priority, TTL, Server-Agent-ID, Attribution-Record,
Continuation-Token, Supported-Methods, Budget-Limit, AGTP-Zone-ID,
Content-Schema, Telemetry-Export, Cost-Estimate, Attestation-Evidence,
Merchant-ID, Merchant-Manifest-Fingerprint, Intent-Assertion, Cart-Digest.
The four merchant-related headers are defined in <xref target="AGTP-MERCHANT"/> and
registered concurrently with this document.</t>
      </section>
      <section anchor="uri-scheme-registration">
        <name>URI Scheme Registration</name>
        <t>Registration of the agtp:// URI scheme per <xref target="RFC7595"/>, as described in
Section 5.1.8 of this document.</t>
      </section>
      <section anchor="agtp-budget-unit-registry">
        <name>AGTP Budget Unit Registry</name>
        <t>Establishment of a new IANA sub-registry: Agent Transfer Protocol Budget
Units.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Budget Units</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review per <xref target="RFC8126"/>. New unit registrations <strong>MUST</strong> define:
unit name (lowercase ASCII, no spaces or special characters), semantic
description, value format (integer or decimal), whether fractional values
are permitted, and a reference specification. Units representing financial
denominations <strong>MUST</strong> specify the currency and <strong>MUST</strong> define precision
(decimal places). The Designated Expert <strong>SHOULD</strong> verify that the proposed
unit does not duplicate an existing registration and that the value format
is unambiguous.</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
        </dl>
        <t>Initial registrations:</t>
        <table>
          <name>Initial AGTP Budget Unit Registry Entries</name>
          <thead>
            <tr>
              <th align="left">Unit</th>
              <th align="left">Description</th>
              <th align="left">Value Format</th>
              <th align="left">Fractional</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">tokens</td>
              <td align="left">Language model token consumption</td>
              <td align="left">Integer</td>
              <td align="left">No</td>
            </tr>
            <tr>
              <td align="left">compute-seconds</td>
              <td align="left">CPU/GPU compute time in seconds</td>
              <td align="left">Decimal</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">USD</td>
              <td align="left">US Dollar financial limit</td>
              <td align="left">Decimal, 2 places</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">EUR</td>
              <td align="left">Euro financial limit</td>
              <td align="left">Decimal, 2 places</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">GBP</td>
              <td align="left">Pound Sterling financial limit</td>
              <td align="left">Decimal, 2 places</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">calls</td>
              <td align="left">Downstream API call count</td>
              <td align="left">Integer</td>
              <td align="left">No</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="agent-registry-retention-policy">
        <name>Agent Registry Retention Policy</name>
        <t>The AGTP registry <strong>MUST</strong> retain records for all registered agents
regardless of lifecycle state. The following minimum retention periods apply:</t>
        <table>
          <name>AGTP Registry Minimum Retention Periods</name>
          <thead>
            <tr>
              <th align="left">Lifecycle State</th>
              <th align="left">Minimum Retention Period</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Active</td>
              <td align="left">Duration of Active state + 7 years</td>
            </tr>
            <tr>
              <td align="left">Suspended</td>
              <td align="left">Duration of Suspended state + 7 years</td>
            </tr>
            <tr>
              <td align="left">Revoked</td>
              <td align="left">10 years from revocation date</td>
            </tr>
            <tr>
              <td align="left">Deprecated</td>
              <td align="left">7 years from deprecation date</td>
            </tr>
          </tbody>
        </table>
        <t>The 7-year minimum reflects common enterprise compliance requirements
(SOX, GDPR audit trails, HIPAA). Governance platform operators in regulated
industries <strong>SHOULD</strong> extend these minimums to match applicable regulatory
requirements.</t>
        <t>The retained record for a Revoked or Deprecated agent <strong>MUST</strong> include:</t>
        <ul spacing="normal">
          <li>
            <t>Canonical Agent-ID (permanently retired, not reissued)</t>
          </li>
          <li>
            <t>Agent label and org domain at time of registration</t>
          </li>
          <li>
            <t>Trust tier at time of registration</t>
          </li>
          <li>
            <t>Activation date and activating principal</t>
          </li>
          <li>
            <t>Revocation or deprecation date, initiating principal, and reason code</t>
          </li>
          <li>
            <t>Genesis audit record hash (pointer to immutable audit log)</t>
          </li>
          <li>
            <t>Full Birth Certificate (archived, not publicly accessible)</t>
          </li>
          <li>
            <t>All lifecycle state transitions with timestamps</t>
          </li>
        </ul>
        <t>The retained record <strong>MUST NOT</strong> contain package executable contents,
active session data, or Authority-Scope grant tokens.</t>
        <section anchor="domain-name-expiry-interaction">
          <name>Domain Name Expiry Interaction</name>
          <t>If an organization's <tt>org_domain</tt> expires or transfers to a new owner:</t>
          <ol spacing="normal" type="1"><li>
              <t>All Active agents registered under the expired domain <strong>MUST</strong> be
automatically Suspended within 24 hours of domain expiry detection.</t>
            </li>
            <li>
              <t>The governance platform <strong>MUST</strong> notify the registered principal
contact before suspension takes effect, with a minimum notice period
of 30 days if domain expiry was predictable.</t>
            </li>
            <li>
              <t>Suspended agents under an expired domain transition to Deprecated
state after 90 days if the domain has not been renewed.</t>
            </li>
            <li>
              <t>A new owner of the domain <strong>MUST NOT</strong> inherit prior agent
registrations. New ACTIVATE transactions are required.</t>
            </li>
          </ol>
          <t>This policy prevents domain-transfer-based identity hijacking in which
an attacker acquires an expired domain to claim the trust history of
agents that operated under it.</t>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6335">
          <front>
            <title>Internet Assigned Numbers Authority (IANA) Procedures for the Management of the Service Name and Transport Protocol Port Number Registry</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Eggert" initials="L." surname="Eggert"/>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <date month="August" year="2011"/>
            <abstract>
              <t>This document defines the procedures that the Internet Assigned Numbers Authority (IANA) uses when handling assignment and other requests related to the Service Name and Transport Protocol Port Number registry. It also discusses the rationale and principles behind these procedures and how they facilitate the long-term sustainability of the registry.</t>
              <t>This document updates IANA's procedures by obsoleting the previous UDP and TCP port assignment procedures defined in Sections 8 and 9.1 of the IANA Allocation Guidelines, and it updates the IANA service name and port assignment procedures for UDP-Lite, the Datagram Congestion Control Protocol (DCCP), and the Stream Control Transmission Protocol (SCTP). It also updates the DNS SRV specification to clarify what a service name is and how it is registered. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="165"/>
          <seriesInfo name="RFC" value="6335"/>
          <seriesInfo name="DOI" value="10.17487/RFC6335"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8179">
          <front>
            <title>Intellectual Property Rights in IETF Technology</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <author fullname="J. Contreras" initials="J." surname="Contreras"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>The IETF policies about Intellectual Property Rights (IPR), such as patent rights, relative to technologies developed in the IETF are designed to ensure that IETF working groups and participants have as much information as possible about any IPR constraints on a technical proposal as early as possible in the development process. The policies are intended to benefit the Internet community and the public at large, while respecting the legitimate rights of IPR holders. This document sets out the IETF policies concerning IPR related to technology worked on within the IETF. It also describes the objectives that the policies are designed to meet. This document updates RFC 2026 and, with RFC 5378, replaces Section 10 of RFC 2026. This document also obsoletes RFCs 3979 and 4879.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="79"/>
          <seriesInfo name="RFC" value="8179"/>
          <seriesInfo name="DOI" value="10.17487/RFC8179"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="AGIS">
          <front>
            <title>Agentic Grammar and Interface Specification (AGIS)</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-independent-agis-00"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9114">
          <front>
            <title>HTTP/3</title>
            <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9114"/>
          <seriesInfo name="DOI" value="10.17487/RFC9114"/>
        </reference>
        <reference anchor="RFC7540">
          <front>
            <title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
            <author fullname="M. Belshe" initials="M." surname="Belshe"/>
            <author fullname="R. Peon" initials="R." surname="Peon"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection. It also introduces unsolicited push of representations from servers to clients.</t>
              <t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax. HTTP's existing semantics remain unchanged.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7540"/>
          <seriesInfo name="DOI" value="10.17487/RFC7540"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC7595">
          <front>
            <title>Guidelines and Registration Procedures for URI Schemes</title>
            <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <author fullname="T. Hardie" initials="T." surname="Hardie"/>
            <date month="June" year="2015"/>
            <abstract>
              <t>This document updates the guidelines and recommendations, as well as the IANA registration processes, for the definition of Uniform Resource Identifier (URI) schemes. It obsoletes RFC 4395.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="35"/>
          <seriesInfo name="RFC" value="7595"/>
          <seriesInfo name="DOI" value="10.17487/RFC7595"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9943">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="A2A" target="https://a2aprotocol.ai">
          <front>
            <title>Agent-to-Agent Protocol Specification</title>
            <author>
              <organization>Linux Foundation</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="ACP">
          <front>
            <title>Agent Communication Protocol</title>
            <author>
              <organization>IBM Research</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="MCP" target="https://modelcontextprotocol.io">
          <front>
            <title>Model Context Protocol</title>
            <author>
              <organization>Anthropic</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="ANP">
          <front>
            <title>Agent Network Protocol</title>
            <author>
              <organization/>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="AGTP-CERT">
          <front>
            <title>AGTP Agent Certificate Extension</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-agent-cert-00"/>
        </reference>
        <reference anchor="AGTP-METHODS">
          <front>
            <title>AGTP Standard Extended Method Vocabulary</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-standard-methods-01"/>
        </reference>
        <reference anchor="HOOD2026">
          <front>
            <title>Semantic Method Naming and LLM Agent Accuracy: A Controlled Benchmark of REST/CRUD versus Agentive API Interface Design</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Working Paper" value="Available by request. March 2026."/>
        </reference>
        <reference anchor="AGTP-WEB3">
          <front>
            <title>AGTP Web3 Bridge Specification</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-web3-bridge-00"/>
        </reference>
        <reference anchor="AGTP-DISCOVER">
          <front>
            <title>AGTP Agent Discovery and Name Service</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-discovery-00"/>
        </reference>
        <reference anchor="AGTP-COMPOSITION">
          <front>
            <title>AGTP Composition with Agent Group Messaging Protocols</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-composition-00"/>
        </reference>
        <reference anchor="AGTP-MERCHANT">
          <front>
            <title>AGTP Merchant Identity and Agentic Commerce Binding</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-merchant-identity-00"/>
        </reference>
        <reference anchor="AGTP-LOG">
          <front>
            <title>AGTP Transparency Log Protocol</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-log-00"/>
        </reference>
      </references>
    </references>
    <?line 3256?>

<section anchor="changes-from-v04">
      <name>Changes from v04</name>
      <t>Version 05 restores the canonical Agent-ID as the primary identity
primitive of AGTP and decouples Trust Tier 1 verification from DNS as
a sole requirement. This undoes a drift introduced across v02 through
v04 in which domain anchoring quietly became the operative trust root
despite the v00 architecture establishing the canonical Agent-ID in
that role.</t>
      <section anchor="substantive-changes">
        <name>Substantive Changes</name>
        <t>The following substantive changes were made:</t>
        <ol spacing="normal" type="1"><li>
            <t>The Foundational Principle (Section 5.1) has been rewritten to
state explicitly that AGTP identity is agent-first and that all
other identification forms are aliases resolving to a canonical
Agent-ID.</t>
          </li>
          <li>
            <t>The Canonical URI Forms have been expanded from four to five.
Form 1 (canonical ID URI) is now explicitly marked authoritative.
Form 2 restores the agent-native hierarchical namespace
(<tt>agtp://[label].[org-label].agent</tt>) that was removed in the v04
response to the Web3 <tt>.agent</tt> TLD collision.</t>
          </li>
          <li>
            <t>The v04 prohibition on <tt>.agent</tt> and <tt>.nomo</tt> in the hostname
position has been removed. Namespace collision with Web3 naming
systems is now handled through a deterministic resolution order
(Section 5.1): AGTP registry first, Web3 second, canonical
Agent-ID as authoritative tiebreaker. File format suffixes remain
prohibited in the path position only.</t>
          </li>
          <li>
            <t>Resolution Mechanics (Section 5.1) now defines two resolution
paths: a Form 1 path that resolves canonical Agent-IDs via registry
or transparency log lookup without requiring a domain anchor, and
a Forms 2-5 path that resolves hierarchical and domain-anchored
aliases through a governance platform registry lookup.</t>
          </li>
          <li>
            <t>Trust Tier 1 verification has been decoupled from DNS. Section 5.2
now recognizes three equivalent verification paths: <tt>dns-anchored</tt>
(RFC 8555 ACME challenge), <tt>log-anchored</tt> (Birth Certificate
inclusion in a transparency log per RFC 9162 with optional RFC 9943
SCITT receipts), and <tt>hybrid</tt> (DNS control combined with blockchain
address signature). All three paths produce identity attestations
of equivalent strength for AGTP protocol purposes.</t>
          </li>
          <li>
            <t>The Birth Certificate schema has added a <tt>verification_path</tt>
field (REQUIRED for Tier 1) declaring which path was used at
ACTIVATE time, an <tt>org_label</tt> field supporting Form 2 hierarchical
resolution, and a <tt>log_inclusion_proof</tt> field (REQUIRED for
<tt>log-anchored</tt> Tier 1). The <tt>org_domain</tt> field is downgraded from
<strong>MUST</strong> to <strong>SHOULD</strong>, required only for the <tt>dns-anchored</tt> and
<tt>hybrid</tt> paths.</t>
          </li>
          <li>
            <t>The Agent Manifest Document now surfaces <tt>verification_path</tt> and
<tt>log_inclusion_proof</tt> in the RECOMMENDED fields. The Tier 2
<tt>trust_warning</tt> value has changed from <tt>"org-label-unverified"</tt>
to <tt>"verification-incomplete"</tt> to reflect that DNS is no longer
the sole verification path.</t>
          </li>
          <li>
            <t>The v04 Web3 Trust Anchors section has been rewritten. The
<tt>resolution_layer</tt> field is replaced by <tt>verification_path</tt>. Web3
identity is no longer a degraded fallback capped at Tier 2; a
Web3-anchored agent with a completed <tt>hybrid</tt> verification path
is a full Tier 1 participant.</t>
          </li>
          <li>
            <t>The IANA URI scheme registration (Section 5.1) has been updated to
list all five URI forms with explicit syntax and semantics, and to
state that the canonical Agent-ID form is the authoritative
identity representation.</t>
          </li>
          <li>
            <t>Threat Model entries for Birth Certificate Spoofing and Domain
Transfer Identity Hijacking have been updated to reflect the
multi-path model. Log-anchored Tier 1 agents are explicitly noted
as unaffected by the domain-transfer threat.</t>
          </li>
        </ol>
      </section>
      <section anchor="rationale">
        <name>Rationale</name>
        <t>The v04 architecture inverted the v00 intent by treating DNS ownership
as the trust root and the canonical Agent-ID as a routing artifact.
This created three specific problems that motivated the v05 revision:</t>
        <t><em>Stranger verification without prior relationship.</em> In the v04 model,
two agents from unrelated organizations with no shared DNS infrastructure
had no first-class verification path. The v05 <tt>log-anchored</tt> path
closes this gap: a stranger presented with a canonical Agent-ID and a
transparency log inclusion proof can verify the Birth Certificate
signature and read the Agent Manifest Document without resolving any
domain.</t>
        <t><em>Cross-ecosystem transparency log interoperability.</em> The v04 AGTP-CTL
sketch referenced RFC 6962 (Certificate Transparency v1). The v05
<tt>log-anchored</tt> path targets RFC 9162 (CT v2) as the verifiable data
structure with RFC 9943 (SCITT) COSE_Sign1 receipts for cross-ecosystem
interoperability with deployed SCITT infrastructure.</t>
        <t><em>Identity stability across organizational change.</em> A canonical
Agent-ID derived from the Birth Certificate hash is stable across
organizational renames, domain transfers, and resolution-path changes.
Re-anchoring primary identity to DNS in v04 tied agent identity to a
mutable external state (domain registration) that the v00 design
subordinated to the canonical Agent-ID rather than treating as a
primary anchor.</t>
        <t>Version 05 does not deprecate DNS-anchored verification. Implementations
deployed on the v04 model continue to be Tier 1 compliant under the
<tt>dns-anchored</tt> path. Version 05 expands the verification model rather
than replacing it.</t>
      </section>
    </section>
    <section anchor="authority-scope-format">
      <name>Authority-Scope Format</name>
      <t>Authority-Scope values are expressed as a space-separated list of scope
tokens following the pattern: [domain]:[action] or [domain]:* for
full domain access. Tokens <strong>MUST</strong> be lowercase ASCII with a single colon
separator.</t>
      <t>Examples:</t>
      <artwork><![CDATA[
Authority-Scope: calendar:book calendar:query
Authority-Scope: documents:summarize documents:query knowledge:learn
Authority-Scope: *:query
Authority-Scope: booking:* payments:confirm
]]></artwork>
      <t>Reserved domains (initial set):</t>
      <table>
        <name>Reserved Authority-Scope Domains</name>
        <thead>
          <tr>
            <th align="left">Domain</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">calendar</td>
            <td align="left">Scheduling and time-based resource management</td>
          </tr>
          <tr>
            <td align="left">documents</td>
            <td align="left">Document access, summarization, and annotation</td>
          </tr>
          <tr>
            <td align="left">knowledge</td>
            <td align="left">Agent context and memory operations</td>
          </tr>
          <tr>
            <td align="left">booking</td>
            <td align="left">Reservation and resource allocation</td>
          </tr>
          <tr>
            <td align="left">payments</td>
            <td align="left">Financial transactions and confirmations</td>
          </tr>
          <tr>
            <td align="left">agents</td>
            <td align="left">Delegation and collaboration with other agents</td>
          </tr>
          <tr>
            <td align="left">escalation</td>
            <td align="left">Escalation routing and handler management</td>
          </tr>
          <tr>
            <td align="left">activation</td>
            <td align="left">Governed agent package activation (ACTIVATE method extension)</td>
          </tr>
          <tr>
            <td align="left">discovery</td>
            <td align="left">Agent discovery and capability query operations (DISCOVER, DESCRIBE)</td>
          </tr>
          <tr>
            <td align="left">budget</td>
            <td align="left">Resource budget declaration and QUOTE pre-flight operations</td>
          </tr>
          <tr>
            <td align="left">telemetry</td>
            <td align="left">Telemetry export and observability operations</td>
          </tr>
          <tr>
            <td align="left">zone</td>
            <td align="left">Network zone boundary declaration and enforcement</td>
          </tr>
          <tr>
            <td align="left">suspend</td>
            <td align="left">Session suspension and resumption operations</td>
          </tr>
          <tr>
            <td align="left">merchant</td>
            <td align="left">Merchant identity resolution and counterparty verification (see <xref target="AGTP-MERCHANT"/>)</td>
          </tr>
          <tr>
            <td align="left">intent</td>
            <td align="left">Intent Assertion issuance and validation (see <xref target="AGTP-MERCHANT"/>)</td>
          </tr>
          <tr>
            <td align="left">*</td>
            <td align="left">All domains require explicit grant; use with caution</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="example-agtp-wire-formats">
      <name>Example AGTP Wire Formats</name>
      <t>The following examples use a human-readable pseudo-wire format with
HTTP-style headers followed by a JSON body. The Content-Type for all AGTP
message bodies is application/agtp+json.</t>
      <section anchor="query-request-and-response">
        <name>QUERY Request and Response</name>
        <artwork><![CDATA[
AGTP/1.0 QUERY
Agent-ID: agt-7f3a9c2d
Principal-ID: usr-chris-hood
Authority-Scope: documents:query knowledge:query
Session-ID: sess-a1b2c3d4
Task-ID: task-0042
TTL: 3000
Content-Type: application/agtp+json

{
  "task_id": "task-0042",
  "parameters": {
    "intent": "Key arguments against MCP re: HTTP overhead",
    "scope": ["documents:research", "knowledge:session"],
    "format": "structured",
    "confidence_threshold": 0.75
  }
}

AGTP/1.0 200 OK
Task-ID: task-0042
Server-Agent-ID: srv-knowledge-01
Attribution-Record: [signed attribution token]
Content-Type: application/agtp+json

{
  "status": 200,
  "task_id": "task-0042",
  "result": {
    "results": [{"content": "...", "source": "doc-agtp-research",
                 "confidence": 0.91}],
    "result_count": 1
  }
}
]]></artwork>
      </section>
      <section anchor="book-request-and-response">
        <name>BOOK Request and Response</name>
        <artwork><![CDATA[
AGTP/1.0 BOOK
Agent-ID: agt-travel-planner
Principal-ID: usr-chris-hood
Authority-Scope: booking:* calendar:book
Session-ID: sess-trip-2026-04
Task-ID: task-0107
Priority: normal
Content-Type: application/agtp+json

{
  "method": "BOOK",
  "task_id": "task-0107",
  "parameters": {
    "resource_id": "flight-AA2847",
    "principal_id": "usr-chris-hood",
    "time_slot": "2026-04-15T08:00:00Z",
    "options": {"seat_preference": "aisle", "class": "economy"},
    "confirm_immediately": true
  }
}

AGTP/1.0 200 OK
Task-ID: task-0107
Attribution-Record: [signed attribution token]
Content-Type: application/agtp+json

{
  "status": 200,
  "task_id": "task-0107",
  "result": {
    "booking_id": "BK-2026-0107",
    "status": "confirmed",
    "resource_id": "flight-AA2847",
    "confirmation_code": "XQRT7Y"
  }
}
]]></artwork>
      </section>
      <section anchor="escalate-request-and-response">
        <name>ESCALATE Request and Response</name>
        <artwork><![CDATA[
AGTP/1.0 ESCALATE
Agent-ID: agt-procurement-03
Principal-ID: usr-finance-dept
Authority-Scope: booking:* payments:confirm
Session-ID: sess-procurement-q2
Task-ID: task-0881
Priority: urgent
Content-Type: application/agtp+json

{
  "method": "ESCALATE",
  "task_id": "task-0881",
  "parameters": {
    "task_id": "task-0880",
    "reason": "scope_limit",
    "context": {
      "attempted_action": "BOOK",
      "resource": "vendor-contract-750k",
      "block_reason": "Exceeds agent authorization threshold"
    },
    "recipient": "usr-cfo",
    "deadline": "2026-03-19T09:00:00Z"
  }
}

AGTP/1.0 202 Accepted
Task-ID: task-0881
Server-Agent-ID: srv-escalation-handler
Content-Type: application/agtp+json

{
  "status": 202,
  "task_id": "task-0881",
  "result": {
    "escalation_id": "ESC-0881",
    "routed_to": "usr-cfo",
    "status": "pending_review",
    "task_paused": true,
    "estimated_review_by": "2026-03-19T09:00:00Z"
  }
}
]]></artwork>
      </section>
    </section>
    <section anchor="comparison-table">
      <name>Comparison Table</name>
      <table>
        <name>AGTP Compared to Existing Approaches</name>
        <thead>
          <tr>
            <th align="left">Criterion</th>
            <th align="left">AGTP</th>
            <th align="left">HTTP/REST</th>
            <th align="left">gRPC</th>
            <th align="left">AGMP (MCP, A2A, ...)</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Intent-native methods</td>
            <td align="left">Yes (12 Tier 1)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">Partial</td>
          </tr>
          <tr>
            <td align="left">Intent semantics at protocol level</td>
            <td align="left">Native</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">Messaging layer only</td>
          </tr>
          <tr>
            <td align="left">Built-in agent identity</td>
            <td align="left">Yes</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Authority scope enforcement</td>
            <td align="left">Protocol-level</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">Application-layer</td>
          </tr>
          <tr>
            <td align="left">Built-in attribution/audit</td>
            <td align="left">Yes</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">Varies by impl.</td>
          </tr>
          <tr>
            <td align="left">Transport flexibility</td>
            <td align="left">TCP/UDP/QUIC</td>
            <td align="left">TCP/TLS</td>
            <td align="left">HTTP/2</td>
            <td align="left">HTTP</td>
          </tr>
          <tr>
            <td align="left">Escalation as first-class primitive</td>
            <td align="left">Yes</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Ecosystem maturity</td>
            <td align="left">Proposed</td>
            <td align="left">Mature</td>
            <td align="left">Mature</td>
            <td align="left">Emerging</td>
          </tr>
          <tr>
            <td align="left">Governance/observability</td>
            <td align="left">Native</td>
            <td align="left">Manual/bolt-on</td>
            <td align="left">Manual</td>
            <td align="left">Limited</td>
          </tr>
          <tr>
            <td align="left">Method registry extensibility</td>
            <td align="left">Yes (Expert Review)</td>
            <td align="left">Frozen (IETF Review)</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
          <tr>
            <td align="left">Open core / royalty-free</td>
            <td align="left">Yes</td>
            <td align="left">Yes</td>
            <td align="left">Yes</td>
            <td align="left">Yes</td>
          </tr>
          <tr>
            <td align="left">Agent Manifest Document</td>
            <td align="left">Native (.agtp format)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Tamper-proof identity surface</td>
            <td align="left">Yes (hash + signature)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Browser-accessible agent identity</td>
            <td align="left">Yes (read-only)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">URI collision prevention</td>
            <td align="left">Domain-anchored</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
          <tr>
            <td align="left">Agent Birth Certificate</td>
            <td align="left">Yes (genesis record)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Domain-expiry lifecycle handling</td>
            <td align="left">Specified</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
          <tr>
            <td align="left">Capability discovery</td>
            <td align="left">Native (DESCRIBE)</td>
            <td align="left">None</td>
            <td align="left">Reflection (partial)</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Resource budget enforcement</td>
            <td align="left">Native (Budget-Limit, 452)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Execution attestation (RATS)</td>
            <td align="left">Optional (RFC 9334)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Observability hooks</td>
            <td align="left">Native (Telemetry-Export)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Network zone enforcement</td>
            <td align="left">Native (AGTP-Zone-ID, 453)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Session suspension/recovery</td>
            <td align="left">Native (SUSPEND method)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">AGMP composition profiles</td>
            <td align="left">Normative appendix</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
        </tbody>
      </table>
      <t>HTTP's method registry (registered with IETF Review per <xref target="RFC9110"/>) is
effectively frozen for new semantic methods because any new HTTP method
must be backward-compatible with existing HTTP infrastructure globally.
AGTP's Expert Review + published spec procedure enables the protocol to
evolve its method vocabulary as the agent ecosystem develops, without
the backward-compatibility constraints of the HTTP method space.</t>
    </section>
    <section anchor="glossary">
      <name>Glossary</name>
      <dl>
        <dt>Agent:</dt>
        <dd>
          <t>A software system that executes tasks, makes decisions, and takes
actions without continuous human supervision per transaction.</t>
        </dd>
        <dt>AGMP (Agent Group Messaging Protocol):</dt>
        <dd>
          <t>The collective term for higher-layer AI agent messaging standards that
operate over AGTP as their transport substrate, including MCP, A2A, ACP,
and ANP. AGMPs define what agents say. AGTP defines how those messages
move. See Section 1.6.</t>
        </dd>
        <dt>Agent Birth Certificate:</dt>
        <dd>
          <t>A cryptographically signed identity document issued to an agent at
registration time by a governance platform. The genesis record of the
agent's existence; the source from which the canonical Agent-ID is
derived. Functions as the agent's social security number: issued once,
permanently bound, never reissued. See Section 6.7.</t>
        </dd>
        <dt>Agent Transfer Protocol (AGTP):</dt>
        <dd>
          <t>The application-layer protocol defined in this document, providing a
dedicated transport environment for agent traffic.</t>
        </dd>
        <dt>Agent-ID:</dt>
        <dd>
          <t>A unique identifier for a specific agent instance, present in all AGTP
request headers. In the base spec, derived from the Birth Certificate
hash. With <xref target="AGTP-CERT"/>, cryptographically bound to a verified identity.</t>
        </dd>
        <dt>Agent Manifest Document:</dt>
        <dd>
          <t>A signed <tt>application/agtp+json</tt> document returned when an <tt>agtp://</tt>
URI is resolved. Derived from the agent's <tt>.agent</tt> or <tt>.nomo</tt> package.
Contains identity, lifecycle state, trust tier, behavioral scope, and
birth certificate fields. Never contains executable content.</t>
        </dd>
        <dt>AGTP-Zone-ID:</dt>
        <dd>
          <t>A request header declaring the network zone or organizational boundary
within which a request must be processed. SEPs <strong>MUST</strong> enforce zone
boundaries and return 453 Zone Violation if a DELEGATE or COLLABORATE
request would route outside the declared zone.</t>
        </dd>
        <dt>Attribution Record:</dt>
        <dd>
          <t>A signed, logged record of an agent action, sufficient for audit and
compliance purposes. <strong>MAY</strong> include RATS attestation evidence per
<xref target="RFC9334"/> for hardware-rooted execution proof in high-stakes domains.</t>
        </dd>
        <dt>Authority-Scope:</dt>
        <dd>
          <t>A declared set of permissions defining what actions an agent is
authorized to take, expressed as space-separated domain:action tokens.</t>
        </dd>
        <dt>Budget-Limit:</dt>
        <dd>
          <t>A request header declaring the maximum resource consumption the principal
authorizes for a method invocation, expressed as space-separated
<tt>unit=value</tt> tokens from the IANA AGTP Budget Unit Registry. Exceeding
the declared limit causes 452 Budget Exceeded.</t>
        </dd>
        <dt>Delegation Chain:</dt>
        <dd>
          <t>An ordered record of Agent-IDs representing the sequence of delegations
that led to the current request.</t>
        </dd>
        <dt>DESCRIBE:</dt>
        <dd>
          <t>An AGTP Tier 1 core method returning the declared capabilities, supported
modalities, method vocabulary, and versioned feature set of a specific
agent endpoint. Used for pre-task negotiation. Category: ACQUIRE.</t>
        </dd>
        <dt>ESCALATE:</dt>
        <dd>
          <t>An AGTP method representing an agent's intentional deferral of a decision
or action to a human principal or higher-authority agent. A first-class
method, not a failure code.</t>
        </dd>
        <dt>Governance Token:</dt>
        <dd>
          <t>A signed, time-limited JWT artifact encoding a specific governance verdict
for a specific action. The runtime companion to the Birth Certificate.
Default TTL: 30 seconds. Must not be reused.</t>
        </dd>
        <dt>Intent Verb:</dt>
        <dd>
          <t>An AGTP method name expressing the agent's purpose, as distinguished from
HTTP resource-operation verbs (GET, POST, PUT, DELETE).</t>
        </dd>
        <dt>Method Registry:</dt>
        <dd>
          <t>The IANA-maintained registry of valid AGTP method names and their
specifications. Registration requires Expert Review and a published
specification.</t>
        </dd>
        <dt>Principal:</dt>
        <dd>
          <t>The human, organization, or system that authorized an agent to act and
is accountable for its actions.</t>
        </dd>
        <dt>Principal-ID:</dt>
        <dd>
          <t>The identifier of the principal on whose behalf an agent operates,
present in all AGTP request headers.</t>
        </dd>
        <dt>Scope-Enforcement Point (SEP):</dt>
        <dd>
          <t>An AGTP-aware infrastructure component, load balancer, gateway, proxy,
that enforces Authority-Scope and AGTP-Zone-ID compliance on AGTP
requests without application-layer access. Requires <xref target="AGTP-CERT"/>.</t>
        </dd>
        <dt>Scope Violation (451):</dt>
        <dd>
          <t>An AGTP status code returned when an agent requests an action outside its
declared Authority-Scope. A governance signal, not a protocol error.
<strong>MUST</strong> be logged.</t>
        </dd>
        <dt>Session:</dt>
        <dd>
          <t>An AGTP persistent connection context shared across multiple method
invocations within a single agent workflow.</t>
        </dd>
        <dt>SUSPEND (method):</dt>
        <dd>
          <t>An AGTP Tier 1 core method that places a specific active session into a
recoverable paused state, issuing a single-use base64url-encoded 128-bit
resumption nonce. Session-scoped; does not affect registry lifecycle state.
Category: ORCHESTRATE.</t>
        </dd>
        <dt>Trust Tier:</dt>
        <dd>
          <t>A classification (1, 2, or 3) assigned to an agent at registration based
on the strength of identity verification. Tier 1 requires one of three
verification paths (DNS-anchored, log-anchored, or hybrid) and a <tt>.nomo</tt>
governed package. Tier 2 is org-asserted without cryptographic
verification. Tier 3 is experimental, not production-eligible.</t>
        </dd>
        <dt>551 Authority Chain Broken:</dt>
        <dd>
          <t>An AGTP status code returned when one or more entries in the
Delegation-Chain header cannot be verified as part of a valid and
continuous delegation sequence. <strong>MUST</strong> be logged.</t>
        </dd>
      </dl>
    </section>
    <section anchor="agtp-composition-with-agmps">
      <name>AGTP Composition with AGMPs</name>
      <t>This appendix provides normative mapping guidance for carrying AGMP
messages (MCP, A2A, ACP) over AGTP as their transport substrate. Full
composition specifications are provided in <xref target="AGTP-COMPOSITION"/>; this
appendix provides the canonical mapping table and precedence rules.</t>
      <section anchor="precedence-rule">
        <name>Precedence Rule</name>
        <t>AGTP headers (Agent-ID, Principal-ID, Authority-Scope, Delegation-Chain)
take precedence over equivalent fields in the messaging-layer payload for
routing, enforcement, and audit purposes. Infrastructure components including
SEPs and governance gateways <strong>MUST</strong> use AGTP header values for all
protocol-level decisions. Messaging-layer identity fields <strong>MAY</strong> be present
in the body for application-layer use but <strong>MUST NOT</strong> override AGTP header
values.</t>
      </section>
      <section anchor="agmp-to-agtp-canonical-mapping">
        <name>AGMP-to-AGTP Canonical Mapping</name>
        <table>
          <name>AGMP-to-AGTP Canonical Mapping</name>
          <thead>
            <tr>
              <th align="left">AGMP</th>
              <th align="left">Concept</th>
              <th align="left">AGTP Mapping</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Task</td>
              <td align="left">AGTP DELEGATE body; A2A <tt>task.id</tt> maps to Task-ID header</td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Capability</td>
              <td align="left">AGTP DESCRIBE response; <tt>capability_domains</tt></td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Agent Card</td>
              <td align="left">AGTP Agent Manifest Document</td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Provenance chain</td>
              <td align="left">AGTP Delegation-Chain header</td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Artifact</td>
              <td align="left">AGTP NOTIFY body with <tt>content_type: artifact</tt></td>
            </tr>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Tool call</td>
              <td align="left">AGTP QUERY or NOTIFY body</td>
            </tr>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Context / conversation state</td>
              <td align="left">AGTP Session-ID header + LEARN method</td>
            </tr>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Sampling / inference request</td>
              <td align="left">AGTP QUERY with <tt>modality: inference</tt></td>
            </tr>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Resource</td>
              <td align="left">AGTP QUERY with appropriate <tt>scope</tt></td>
            </tr>
            <tr>
              <td align="left">ACP</td>
              <td align="left">Agent-to-agent message</td>
              <td align="left">AGTP NOTIFY or COLLABORATE body</td>
            </tr>
            <tr>
              <td align="left">ACP</td>
              <td align="left">Capability advertisement</td>
              <td align="left">AGTP DESCRIBE response</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="wire-example-a2a-task-over-agtp">
        <name>Wire Example: A2A Task over AGTP</name>
        <artwork><![CDATA[
AGTP/1.0 DELEGATE
Agent-ID: agtp://agtp.acme.tld/agents/orchestrator
Principal-ID: usr-chris-hood
Authority-Scope: agents:delegate documents:query
Delegation-Chain: agtp://agtp.acme.tld/agents/orchestrator
Session-ID: sess-a1b2c3d4
Task-ID: task-0099
Content-Schema: https://a2aprotocol.ai/schema/task/v1
Content-Type: application/agtp+json

{
  "method": "DELEGATE",
  "task_id": "task-0099",
  "parameters": {
    "target_agent_id": "agtp://agtp.acme.tld/agents/analyst",
    "authority_scope": "documents:query",
    "delegation_token": "[signed token]",
    "task": {
      "a2a_task_id": "a2a-task-7f3a",
      "message": "Summarize Q1 financial reports",
      "artifacts": []
    }
  }
}
]]></artwork>
      </section>
      <section anchor="wire-example-mcp-tool-call-over-agtp">
        <name>Wire Example: MCP Tool Call over AGTP</name>
        <artwork><![CDATA[
AGTP/1.0 QUERY
Agent-ID: agtp://agtp.acme.tld/agents/assistant
Principal-ID: usr-chris-hood
Authority-Scope: documents:query knowledge:query
Session-ID: sess-mcp-b2c3d4
Task-ID: task-0100
Content-Schema: https://modelcontextprotocol.io/schema/tool-call/v1
Content-Type: application/agtp+json

{
  "method": "QUERY",
  "task_id": "task-0100",
  "parameters": {
    "intent": "web_search",
    "modality": "tool",
    "mcp_tool_name": "web_search",
    "mcp_tool_input": {"query": "IETF agent protocol drafts 2026"}
  }
}
]]></artwork>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
