<?xml version="1.0" encoding="UTF-8"?>
<?rfc toc="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>

<rfc xmlns:xi="http://www.w3.org/2001/XInclude"
     ipr="trust200902"
     category="info"
     docName="draft-beyer-agent-identity-avian-carriers-00"
     submissionType="independent"
     version="3">

<front>
  <title abbrev="Agent Identity over Avian Carriers">
    Agentic Identity and Provenance over Avian Carriers (AIPAC)
  </title>

  <seriesInfo name="Internet-Draft"
              value="draft-beyer-agent-identity-avian-carriers-00"/>

  <author fullname="Brandon Wesley Beyer">
    <organization>Independent</organization>
    <address>
      <email>brandnbyr@icloud.com</email>
    </address>
  </author>

  <date month="April" day="1" year="2026"/>

  <area>Security</area>
  <workgroup></workgroup>

  <keyword>avian carriers</keyword>
  <keyword>agent identity</keyword>
  <keyword>provenance</keyword>
  <keyword>pigeons</keyword>
  <keyword>delegation chains</keyword>

  <abstract>
    <t>
      This document specifies a method for establishing cryptographic identity
      and provenance attestation for agentic AI systems operating over Avian
      Carriers (AC). As large language models increasingly delegate sub-tasks
      to other models via pigeon, questions of authorship, intent, and
      hallucination propagation across feather-based transport layers demand
      urgent standardization.
    </t>
    <t>
      This document extends the delegation chain model and provenance structure
      of draft-beyer-agent-identity-architecture-00 to the specific constraints
      of feather-based transport layers, and extends RFC 1149, RFC 2549, and
      RFC 6214 to address agent identity. It is an April 1 publication.
    </t>
  </abstract>
</front>

<middle>

<section anchor="introduction" title="Introduction">
  <t>
    RFC 1149 <xref target="RFC1149"/> established the foundational framework
    for the transmission of IP datagrams over avian carriers. RFC 2549
    <xref target="RFC2549"/> extended this work with Quality of Service
    provisions, and RFC 6214 <xref target="RFC6214"/> adapted the protocol
    for IPv6.
  </t>
  <t>
    In the intervening years, a new class of network participant has emerged:
    the autonomous AI agent. These systems decompose complex tasks, delegate
    sub-tasks to other agents, and synthesize results across potentially long
    chains of inference. <xref target="BEYER-ARCH"/> defines an architectural
    model for human-anchored agent identity, introducing a human identity root,
    explicit delegation semantics, and a provenance structure for accountable
    agent ecosystems across existing transport mechanisms.
  </t>
  <t>
    It has not escaped the attention of the author that avian carriers remain
    the only transport medium for which the RFC series has provided
    comprehensive Quality of Service guidance while leaving identity and
    provenance entirely unaddressed. This document extends the delegation chain
    model and provenance structure of <xref target="BEYER-ARCH"/> to the
    specific constraints of feather-based transport layers.
  </t>
  <t>
    This document corrects that oversight.
  </t>
</section>

<section anchor="terminology" title="Terminology">
  <t>
    The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
    "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
    document are to be interpreted as described in RFC 2119
    <xref target="RFC2119"/>.
  </t>
  <t>
    Additional terminology specific to this document:
  </t>
  <dl>
    <dt>Agent:</dt>
    <dd>
      An autonomous AI system capable of receiving instructions, decomposing
      tasks, and delegating to other agents. An agent MUST NOT be confused
      with its carrier.
    </dd>
    <dt>Carrier:</dt>
    <dd>
      A bird. The carrier is not an agent. The carrier has not agreed to any
      terms of service. The carrier SHOULD be treated with respect.
    </dd>
    <dt>Provenance Token:</dt>
    <dd>
      A cryptographically signed attestation of an agent's identity, model
      version, system prompt hash, and emotional state at time of dispatch.
      Implements the delegation chain structure defined in Section 3 of
      <xref target="BEYER-ARCH"/>.
    </dd>
    <dt>Leg Band:</dt>
    <dd>
      The physical medium by which a Provenance Token is attached to the
      Carrier. Leg bands MUST be of sufficient diameter to accommodate the
      token without impeding flight.
    </dd>
    <dt>Hallucination:</dt>
    <dd>
      A confident assertion by an agent that is not grounded in fact. See
      Section 5 for important guidance on the directionality of this
      phenomenon.
    </dd>
    <dt>Fork Bomb:</dt>
    <dd>
      What happens when an agent delegates to itself. Not relevant to avian
      transport but worth mentioning.
    </dd>
  </dl>
</section>

<section anchor="acap" title="The Agentic Carrier Attachment Protocol (ACAP)">

  <section anchor="acap-overview" title="Overview">
    <t>
      Prior to dispatch, a sending agent MUST generate a Provenance Token and
      attach it to the Carrier's leg band. The token encodes the full
      delegation chain, including the identities of all upstream agents that
      contributed to the instruction being transmitted.
    </t>
    <t>
      The receiving agent MUST verify the token upon arrival of the Carrier.
      A token that cannot be verified SHOULD be treated as suspicious. The
      Carrier itself is presumed innocent.
    </t>
  </section>

  <section anchor="acap-token-generation" title="Token Generation">
    <t>
      The Provenance Token is a JSON Web Token (JWT) <xref target="RFC7519"/>
      encoded on archival-grade rice paper and secured with a cryptographic
      signature using Ed25519 <xref target="RFC8032"/>. The token implements
      the delegation chain structure defined in Section 3 of
      <xref target="BEYER-ARCH"/>.
    </t>
    <t>
      The token payload MUST include the following fields:
    </t>
    <dl>
      <dt>iss (Issuer):</dt>
      <dd>
        The identity of the sending agent, expressed as a model name and
        version string.
      </dd>
      <dt>iat (Issued At):</dt>
      <dd>
        The Unix timestamp of dispatch.
      </dd>
      <dt>chain (Delegation Chain):</dt>
      <dd>
        An ordered array of all agents in the delegation chain from origin
        to sender, corresponding to the delegation chain model defined in
        <xref target="BEYER-ARCH"/>. Each entry represents one delegation
        step.
      </dd>
      <dt>hash (Prompt Hash):</dt>
      <dd>
        A SHA-256 hash of the system prompt in effect at time of dispatch.
        This field exists so that disputes about what an agent was instructed
        to do can be resolved after the fact, assuming the paper survives
        transit.
      </dd>
      <dt>mood (Emotional State):</dt>
      <dd>
        OPTIONAL. As established by RFC 5841 <xref target="RFC5841"/>, TCP
        packets may carry mood indicators. Agents dispatching via avian carrier
        MAY include a mood field. Acceptable values are "confident",
        "uncertain", "caffeinated", and "existential".
      </dd>
    </dl>
  </section>

  <section anchor="acap-attachment" title="Physical Attachment">
    <t>
      The token MUST be rolled tightly and inserted into a waterproof capsule.
      The capsule MUST be attached to the right leg of the Carrier. The left
      leg is reserved for legacy IP datagrams per RFC 1149
      <xref target="RFC1149"/>.
    </t>
    <t>
      In the event that both legs are occupied, the operator MUST acquire an
      additional Carrier. Operators SHOULD maintain a flock.
    </t>
  </section>

</section>

<section anchor="token-format" title="Provenance Token Format">
  <t>
    The Provenance Token implements the delegation chain structure defined in
    Section 3 of <xref target="BEYER-ARCH"/>, serialized as a JWT
    <xref target="RFC7519"/> on archival-grade rice paper. The following is a
    non-normative example of a Provenance Token payload:
  </t>
  <figure anchor="fig-token-example">
    <name>Example Provenance Token Payload</name>
    <artwork><![CDATA[
{
  "iss":   "gpt-like-model-v4",
  "iat":   1743465600,
  "chain": [
             "user-human-brandon",
             "orchestrator-agent-v2",
             "research-subagent-v1",
             "gpt-like-model-v4"
           ],
  "hash":  "e3b0c44298fc1c149afb...truncated",
  "mood":  "caffeinated"
}
    ]]></artwork>
  </figure>
  <t>
    Implementations MUST NOT include the model's training data in the token.
    This would make the capsule unreasonably heavy and is considered an
    antipattern.
  </t>
</section>

<section anchor="hallucination" title="Hallucination Propagation">
  <t>
    For the avoidance of doubt: birds do not hallucinate. They perceive
    ultraviolet light, navigate by magnetic fields, and have been delivering
    messages reliably since before the invention of the transistor. Any errors
    introduced during avian transit are attributable to the message, not the
    medium.
  </t>
  <t>
    Agents that receive a message via avian carrier and find it implausible are
    advised to consider that the implausibility may originate from their own
    context window rather than from the Carrier.
  </t>
  <t>
    The author notes that no avian carrier has ever confidently asserted a
    false legal citation.
  </t>
  <aside>
    <t>
      Note: Hallucination propagation refers to those of the senders and/or
      receivers of the messages, and should be assumed to not affect the
      carriers, as this would be an unsuitable medium.
    </t>
  </aside>
</section>

<section anchor="security" title="Security Considerations">

  <section anchor="sec-adversarial" title="Adversarial Carriers">
    <t>
      Operators MUST be aware that Carriers may be intercepted, observed, or
      recruited by adversarial parties. A Carrier that arrives unusually late,
      appears disoriented, or exhibits signs of having been briefed by a
      competing orchestration framework SHOULD be treated with suspicion.
    </t>
    <t>
      Message contents MUST be encrypted. Adversaries with access to
      breadcrumbs have demonstrated an ability to incentivize disclosure.
    </t>
  </section>

  <section anchor="sec-hawks" title="Man-in-the-Middle Hawks">
    <t>
      The threat model MUST account for raptors. A hawk intercepting an avian
      carrier constitutes a man-in-the-middle attack of the most literal kind.
      Operators in regions with high raptor density SHOULD implement carrier
      authentication via trained recognition patterns.
    </t>
    <t>
      Note: decoy carriers bearing unsigned tokens are a valid mitigation
      strategy but raise ethical concerns outside the scope of this document.
    </t>
  </section>

  <section anchor="sec-replay" title="Replay Attacks">
    <t>
      A Carrier that has been dispatched, intercepted, redirected, and
      re-released with a modified payload represents a replay attack. The iat
      field in the Provenance Token provides limited protection against this
      scenario, assuming the attacker has not also modified the timestamp,
      which they probably have.
    </t>
  </section>

  <section anchor="sec-loops" title="Infinite Delegation Loops">
    <t>
      An agent MUST NOT instruct a Carrier to deliver a message to a receiving
      agent that will immediately instruct a different Carrier to return an
      instruction to the original agent. This is the avian equivalent of a
      fork bomb and is considered unsociable behavior.
    </t>
    <t>
      Flock capacity is finite.
    </t>
  </section>

</section>

<section anchor="iana" title="IANA Considerations">
  <t>
    This document requests that IANA establish the Avian Identity Registry
    (AIR), a new registry mapping cryptographic agent identifiers to their
    corresponding model names, version strings, and known hallucination rates.
  </t>
  <t>
    IANA is further requested to allocate a new Well-Known Leg Band Identifier
    namespace, distinct from the existing IP datagram leg band namespace
    established in RFC 1149 <xref target="RFC1149"/>, to prevent confusion
    when both a datagram and an agent provenance token must be attached
    simultaneously.
  </t>
  <t>
    Finally, IANA is requested to designate a point of contact for reports of
    Carriers arriving with corrupted, unsigned, or suspiciously confident
    tokens. The author suggests this contact be reachable by pigeon, for
    obvious reasons.
  </t>
</section>

</middle>

<back>

<references title="Normative References">

  <reference anchor="BEYER-PS">
    <front>
      <title>Problem Statement for Human-Anchored Agent Identity,
             Delegation, and Provenance</title>
      <author initials="B.W." surname="Beyer" fullname="Brandon Wesley Beyer"/>
      <date month="March" year="2026"/>
    </front>
    <seriesInfo name="Internet-Draft"
                value="draft-beyer-agent-identity-problem-statement-00"/>
  </reference>

  <reference anchor="BEYER-ARCH">
    <front>
      <title>Architecture for Human-Anchored Agent Identity,
             Delegation, and Provenance</title>
      <author initials="B.W." surname="Beyer" fullname="Brandon Wesley Beyer"/>
      <date month="March" year="2026"/>
    </front>
    <seriesInfo name="Internet-Draft"
                value="draft-beyer-agent-identity-architecture-00"/>
  </reference>

  <reference anchor="RFC1149"
             target="https://www.rfc-editor.org/rfc/rfc1149">
    <front>
      <title>Standard for the Transmission of IP Datagrams on Avian
             Carriers</title>
      <author initials="D." surname="Waitzman" fullname="D. Waitzman"/>
      <date month="April" year="1990"/>
    </front>
    <seriesInfo name="RFC" value="1149"/>
  </reference>

  <reference anchor="RFC2119"
             target="https://www.rfc-editor.org/rfc/rfc2119">
    <front>
      <title>Key words for use in RFCs to Indicate Requirement Levels</title>
      <author initials="S." surname="Bradner" fullname="Scott Bradner"/>
      <date year="1997"/>
    </front>
    <seriesInfo name="BCP" value="14"/>
    <seriesInfo name="RFC" value="2119"/>
  </reference>

  <reference anchor="RFC2549"
             target="https://www.rfc-editor.org/rfc/rfc2549">
    <front>
      <title>IP over Avian Carriers with Quality of Service</title>
      <author initials="D." surname="Waitzman" fullname="D. Waitzman"/>
      <date month="April" year="1999"/>
    </front>
    <seriesInfo name="RFC" value="2549"/>
  </reference>

  <reference anchor="RFC5841"
             target="https://www.rfc-editor.org/rfc/rfc5841">
    <front>
      <title>TCP Option to Denote Packet Mood</title>
      <author initials="R." surname="Hay" fullname="R. Hay"/>
      <author initials="W." surname="Turkal" fullname="W. Turkal"/>
      <date month="April" year="2010"/>
    </front>
    <seriesInfo name="RFC" value="5841"/>
  </reference>

  <reference anchor="RFC6214"
             target="https://www.rfc-editor.org/rfc/rfc6214">
    <front>
      <title>Adaptation of RFC 1149 for IPv6</title>
      <author initials="B." surname="Carpenter" fullname="B. Carpenter"/>
      <author initials="R." surname="Hinden" fullname="R. Hinden"/>
      <date month="April" year="2011"/>
    </front>
    <seriesInfo name="RFC" value="6214"/>
  </reference>

  <reference anchor="RFC7519"
             target="https://www.rfc-editor.org/rfc/rfc7519">
    <front>
      <title>JSON Web Token (JWT)</title>
      <author initials="M." surname="Jones" fullname="M. Jones"/>
      <author initials="J." surname="Bradley" fullname="J. Bradley"/>
      <author initials="N." surname="Sakimura" fullname="N. Sakimura"/>
      <date month="May" year="2015"/>
    </front>
    <seriesInfo name="RFC" value="7519"/>
  </reference>

  <reference anchor="RFC8032"
             target="https://www.rfc-editor.org/rfc/rfc8032">
    <front>
      <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
      <author initials="S." surname="Josefsson" fullname="S. Josefsson"/>
      <author initials="I." surname="Liusvaara" fullname="I. Liusvaara"/>
      <date month="January" year="2017"/>
    </front>
    <seriesInfo name="RFC" value="8032"/>
  </reference>

</references>

<references title="Informative References">

  <reference anchor="PIGEONS">
    <front>
      <title>The Behavior of Organisms</title>
      <author initials="B.F." surname="Skinner" fullname="B.F. Skinner"/>
      <date year="1938"/>
    </front>
    <refcontent>Appleton-Century-Crofts. The author notes that Skinner's
    pigeons were not agentic in the modern sense, though the distinction
    is debated.</refcontent>
  </reference>

  <reference anchor="CERF"
             target="https://www.rfc-editor.org/rfc/rfc2468">
    <front>
      <title>I Remember IANA</title>
      <author initials="V." surname="Cerf" fullname="Vint Cerf"/>
      <date month="October" year="1998"/>
    </front>
    <seriesInfo name="RFC" value="2468"/>
    <refcontent>Cited here because the author feels it deserves to be cited
    whenever possible.</refcontent>
  </reference>

</references>

</back>

</rfc>
