<?xml version="1.0" encoding="UTF-8"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude"
     ipr="trust200902"
     docName="draft-ferro-httpbis-apertoid-sig-00"
     category="std"
     consensus="true"
     submissionType="IETF"
     xml:lang="en"
     version="3">

  <front>
    <title abbrev="ApertoID-Signature">ApertoID-Signature: HTTP Request Signing for AI Agent Identity</title>
    <seriesInfo name="Internet-Draft" value="draft-ferro-httpbis-apertoid-sig-00"/>
    <author fullname="Andrea Ferro" initials="A." surname="Ferro">
      <organization>ApertoID</organization>
      <address>
        <postal><city>Verona</city><country>Italy</country></postal>
        <email>irn@irn3.com</email>
        <uri>https://github.com/ApertoID</uri>
      </address>
    </author>
    <date year="2026" month="March" day="22"/>
    <area>Web and Internet Transport</area>
    <workgroup>HTTPBIS</workgroup>
    <keyword>HTTP</keyword><keyword>AI Agent</keyword><keyword>Signature</keyword><keyword>Ed25519</keyword><keyword>Identity</keyword>
    <abstract>
      <t>This document defines the ApertoID-Signature HTTP header field, which enables AI agents to cryptographically prove their identity on each HTTP request. The agent signs the request method, target URL, body hash, and identity metadata using an Ed25519 private key whose corresponding public key is published in DNS via the ApertoID protocol <xref target="APERTOID-DNS"/>. The mechanism provides request-level identity verification, action binding (the signature is tied to the specific method and URL), and replay protection via timestamps and nonces.</t>
    </abstract>
  </front>

  <middle>

    <section anchor="introduction">
      <name>Introduction</name>
      <t>The ApertoID protocol <xref target="APERTOID-DNS"/> enables domain owners to declare authorized AI agents in DNS, including publishing Ed25519 public keys for agent identity verification. However, publishing a key in DNS only establishes which key belongs to which agent — it does not prove that a particular HTTP request was made by the holder of that key, nor does it bind the signature to the specific action being performed.</t>
      <t>This document defines the ApertoID-Signature HTTP header field, which closes both gaps. When an agent makes an HTTP request (e.g., to an MCP server, an API, or any HTTP service), it includes this header containing an Ed25519 signature over the request method, target URL, body hash, and identity metadata. The receiving service can then verify the signature against the public key published in the agent's ApertoID DNS record, confirming both that the request originates from the authorized agent AND that the signature applies to this specific request — not a different endpoint, not a different method, not a different body.</t>
      <t>This mechanism is analogous to DKIM signatures for email: DKIM key records are published in DNS, and DKIM signatures are attached to email messages. Similarly, ApertoID key records are published in DNS (per <xref target="APERTOID-DNS"/>), and ApertoID-Signature headers are attached to HTTP requests (per this document).</t>

      <section anchor="relationship-to-9421">
        <name>Relationship to HTTP Message Signatures</name>
        <t>HTTP Message Signatures <xref target="RFC9421"/> provides a general-purpose framework for signing HTTP messages. ApertoID-Signature does not use RFC 9421 for the following reasons:</t>
        <ul>
          <li>RFC 9421 requires structured headers (RFC 8941) support, component identifiers, algorithm negotiation, and signature metadata — all of which add implementation complexity that is unnecessary for the single-purpose case of agent identity verification with a fixed algorithm.</li>
          <li>ApertoID-Signature uses DNS-based key discovery (the public key is in the agent's DNS TXT record), which does not map to RFC 9421's key resolution model.</li>
          <li>ApertoID-Signature is designed to be implementable as a drop-in middleware in under 100 lines of code in any language, without requiring an RFC 9421 library.</li>
        </ul>
        <t>However, ApertoID-Signature follows RFC 9421's principle of binding signatures to specific request components. The signing input includes the HTTP method and request target (path + query), ensuring that a signature is valid only for the specific action it was created for.</t>
      </section>

      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
    </section>

    <section anchor="header-definition">
      <name>The ApertoID-Signature Header Field</name>

      <section anchor="header-syntax">
        <name>Header Syntax</name>
        <t>The ApertoID-Signature header field contains semicolon-separated tag-value pairs. The formal grammar uses ABNF <xref target="RFC5234"/>:</t>
        <artwork><![CDATA[
ApertoID-Signature: d=example.com; s=leadhunter;
  t=1711100000; n=a1b2c3d4e5f6;
  sig=<base64-ed25519-signature-88chars>
]]></artwork>
      </section>

      <section anchor="abnf">
        <name>ABNF Definition</name>
        <artwork type="abnf"><![CDATA[
apertoid-sig-hdr = "ApertoID-Signature" ":" OWS sig-value OWS
sig-value       = domain-tag ";" SP selector-tag ";"
                  SP timestamp-tag ";" SP nonce-tag ";"
                  SP signature-tag
domain-tag      = "d=" domain-name
selector-tag    = "s=" selector
timestamp-tag   = "t=" 1*DIGIT
nonce-tag       = "n=" 1*16HEXDIG
signature-tag   = "sig=" base64url

domain-name     = label *("." label)
label           = ALPHA *(ALPHA / DIGIT / "-")
selector        = ALPHA *(ALPHA / DIGIT / "-")
base64url       = 1*( ALPHA / DIGIT / "+" / "/" / "=" )
OWS             = *( SP / HTAB )
]]></artwork>
      </section>

      <section anchor="header-tags">
        <name>Header Tags</name>
        <dl>
          <dt>d (REQUIRED)</dt><dd>The domain the agent claims to represent. The verifier uses this to locate the ApertoID Policy Record at "_apertoid.&lt;d&gt;".</dd>
          <dt>s (REQUIRED)</dt><dd>The agent selector. Combined with the domain, this identifies the Agent Declaration Record at "&lt;s&gt;._apertoid.&lt;d&gt;" where the public key is published.</dd>
          <dt>t (REQUIRED)</dt><dd>The signature timestamp as a Unix timestamp (seconds since 1970-01-01T00:00:00Z). MUST be within the validity window (default: 300 seconds / 5 minutes) of the verifier's current time. Requests with timestamps outside this window MUST be rejected.</dd>
          <dt>n (REQUIRED)</dt><dd>A nonce: a unique, non-repeating value for this request, encoded as 1-16 hexadecimal characters (lowercase). The nonce provides replay protection within the timestamp validity window. Verifiers MUST maintain a nonce cache for the duration of the validity window and MUST reject requests with previously seen nonces.</dd>
          <dt>sig (REQUIRED)</dt><dd>The Ed25519 signature over the signing input (<xref target="signing-input"/>), encoded as unpadded Base64 per <xref target="RFC4648"/> Section 4 (88 characters for 64 bytes).</dd>
        </dl>
      </section>
    </section>

    <section anchor="signing">
      <name>Signing Procedure</name>

      <section anchor="signing-input">
        <name>Signing Input Construction</name>
        <t>The signing input is a byte string constructed by concatenating the following components, each terminated by a newline character (0x0A):</t>
        <artwork><![CDATA[
signing_input = d_value   LF
                s_value   LF
                t_value   LF
                n_value   LF
                method    LF
                target    LF
                body_hash LF
]]></artwork>
        <t>Where:</t>
        <dl>
          <dt>d_value</dt><dd>The value of the d= tag (the domain name, lowercase).</dd>
          <dt>s_value</dt><dd>The value of the s= tag (the selector, lowercase).</dd>
          <dt>t_value</dt><dd>The decimal string representation of the t= tag (the timestamp).</dd>
          <dt>n_value</dt><dd>The value of the n= tag (the nonce, lowercase hex).</dd>
          <dt>method</dt><dd>The HTTP request method, uppercase (e.g., "GET", "POST", "DELETE"). This binds the signature to the specific HTTP action. A signature created for a POST request MUST NOT be valid for a GET or DELETE request.</dd>
          <dt>target</dt><dd>The request target as sent in the HTTP request line: the path and query string, without the scheme, host, or fragment (e.g., "/mcp/tools/search?limit=10"). If there is no query string, only the path is included (e.g., "/mcp/tools/search"). This binds the signature to the specific endpoint. A signature created for /mcp/search MUST NOT be valid for /mcp/delete.</dd>
          <dt>body_hash</dt><dd><t>The lowercase hexadecimal SHA-256 hash of the raw HTTP request body. This binds the signature to the specific request content. If the request has no body (e.g., GET, HEAD, DELETE without body), the SHA-256 hash of the empty string MUST be used:</t>
          <artwork><![CDATA[
e3b0c44298fc1c149afbf4c8996fb924
27ae41e4649b934ca495991b7852b855
]]></artwork></dd>
        </dl>
        <t>All components MUST be encoded as UTF-8. The signing input MUST be deterministic: the same input parameters MUST always produce the same signing input byte string.</t>
      </section>

      <section anchor="signing-procedure">
        <name>Producing the Signature</name>
        <t>The agent produces the signature as follows:</t>
        <ol>
          <li>Determine the request method (e.g., "POST") and request target (e.g., "/mcp/tools/search").</li>
          <li>Compute the SHA-256 hash of the request body (or the empty-body hash for bodyless requests).</li>
          <li>Generate a unique nonce (RECOMMENDED: 8-16 random hex characters).</li>
          <li>Record the current Unix timestamp.</li>
          <li>Construct the signing input as defined in <xref target="signing-input"/>.</li>
          <li>Sign the signing input using the agent's Ed25519 private key per <xref target="RFC8032"/>, producing a 64-byte signature.</li>
          <li>Encode the signature as unpadded Base64 per <xref target="RFC4648"/> Section 4.</li>
          <li>Construct the ApertoID-Signature header with all required tags.</li>
          <li>Attach the header to the outgoing HTTP request.</li>
        </ol>
      </section>

      <section anchor="signing-example">
        <name>Example</name>
        <t>An agent "leadhunter" acting for "example.com" sends:</t>
        <artwork><![CDATA[
POST /mcp/tools/search HTTP/1.1
Host: api.target.com
Content-Type: application/json

{"query": "find leads in tech sector", "limit": 10}
]]></artwork>
        <t>The signing input (each line terminated by LF):</t>
        <artwork><![CDATA[
example.com
leadhunter
1711100000
a1b2c3d4e5f6
POST
/mcp/tools/search
7d5e4a8b... (SHA-256 of the JSON body)
]]></artwork>
        <t>The agent signs this input with its Ed25519 private key and attaches:</t>
        <artwork><![CDATA[
ApertoID-Signature: d=example.com; s=leadhunter;
  t=1711100000; n=a1b2c3d4e5f6;
  sig=MEUCIQDx4f... (88 base64 characters)
]]></artwork>
      </section>
    </section>

    <section anchor="verification">
      <name>Verification Procedure</name>
      <t>Services that have deployed ApertoID SHOULD inspect incoming HTTP requests for the ApertoID-Signature header. If the header is present, the service SHOULD verify it per this specification. If the header is absent but the agent's domain publishes an ApertoID policy with "p=reject", the service MAY reject the unsigned request.</t>
      <t>When a service receives a request with an ApertoID-Signature header, it performs the following verification:</t>
      <artwork><![CDATA[
VERIFY_APERTOID_SIGNATURE(request):

  1. Extract ApertoID-Signature header from request
  2. Parse d=, s=, t=, n=, sig= tags
     If any required tag is missing: Return "malformed"
  3. Check timestamp t= is within validity window:
     If |current_time - t| > 300: Return "timestamp_invalid"
  4. Check nonce n= against nonce cache:
     If n= is in cache: Return "nonce_reused"
     Add n= to cache with expiry = t + 300
  5. Perform DNS verification per [APERTOID-DNS]:
     Query "_apertoid.<d>" for policy record
     Query "<s>._apertoid.<d>" for agent declaration
     Extract pk= (public key) and check exp=
  6. If DNS verification fails:
     Apply policy p= from policy record
     Return DNS verification result
  7. Reconstruct signing_input from:
     d, s, t, n,
     request.method (uppercase),
     request.target (path + query),
     SHA-256(request.body)
  8. Verify Ed25519 signature sig= against signing_input
     using public key pk= from DNS record
  9. If signature is invalid:
     Apply policy p= from policy record
     Return "sig_invalid"
  10. Return "pass"
]]></artwork>

      <section anchor="verification-results">
        <name>Result Values</name>
        <dl>
          <dt>pass</dt><dd>The signature is valid, the agent is authorized, and the signature matches the specific request method, target, and body.</dd>
          <dt>malformed</dt><dd>The ApertoID-Signature header is present but cannot be parsed.</dd>
          <dt>timestamp_invalid</dt><dd>The timestamp is outside the validity window.</dd>
          <dt>nonce_reused</dt><dd>The nonce was already seen within the validity window.</dd>
          <dt>sig_invalid</dt><dd>The Ed25519 signature does not match the signing input and public key.</dd>
        </dl>
        <t>DNS-level results (none, revoked, expired, url_mismatch, key_mismatch, permerror, temperror) are as defined in <xref target="APERTOID-DNS"/>.</t>
      </section>
    </section>

    <section anchor="replay-protection">
      <name>Replay Protection</name>
      <t>ApertoID-Signature provides three layers of replay protection:</t>
      <dl>
        <dt>Timestamp window</dt><dd>Signatures are valid for at most 300 seconds (5 minutes). Requests with timestamps outside this window are rejected. This limits the useful lifetime of any intercepted signature.</dd>
        <dt>Nonce uniqueness</dt><dd>Within the timestamp window, each nonce may be used only once. Verifiers MUST maintain a nonce cache and reject duplicate nonces. The cache need only retain entries for the duration of the validity window; older entries can be safely evicted.</dd>
        <dt>Action binding</dt><dd>The signing input includes the HTTP method and request target. A valid signature for "POST /mcp/search" cannot be replayed against "DELETE /mcp/data" or "POST /mcp/export" — even within the timestamp window and with a fresh nonce, because the signing input would differ.</dd>
      </dl>
      <t>Verifiers SHOULD use a validity window of 300 seconds (5 minutes). Shorter windows reduce the replay surface but increase sensitivity to clock skew. Verifiers MAY allow configuration of the validity window within the range of 60 to 600 seconds.</t>
    </section>

    <section anchor="security">
      <name>Security Considerations</name>

      <section anchor="sec-action-binding">
        <name>Action Binding Scope</name>
        <t>The signing input includes the HTTP method and request target (path + query), preventing cross-endpoint and cross-method replay attacks. However, it does not include the Host header or scheme. This means a valid signature could theoretically be replayed against a different host serving the same path, if the attacker can redirect the request. In practice, this is mitigated by TLS: the agent establishes a TLS connection to a specific host, and the signature is only transmitted over that connection. Services MUST require HTTPS per <xref target="RFC9110"/>; HTTP connections MUST NOT be used with ApertoID-Signature.</t>
      </section>

      <section anchor="sec-headers-not-signed">
        <name>HTTP Headers Not Signed</name>
        <t>HTTP headers (other than the request method and target) are not included in the signing input. This means headers such as Content-Type, Authorization, and custom headers can be modified by an intermediary without invalidating the signature. The rationale is that ApertoID-Signature authenticates agent identity and binds it to a specific action and payload — it is not a general-purpose message integrity mechanism. TLS provides full message integrity in transit. Services requiring header integrity beyond what TLS provides SHOULD use HTTP Message Signatures <xref target="RFC9421"/> in addition to ApertoID-Signature.</t>
      </section>

      <section anchor="sec-clock-skew">
        <name>Clock Synchronization</name>
        <t>The timestamp-based validity window requires that agents and verifiers maintain reasonably synchronized clocks. Agents and verifiers SHOULD use NTP <xref target="RFC5905"/> or equivalent time synchronization. Clock skew greater than the validity window will cause all requests to fail verification.</t>
      </section>

      <section anchor="sec-nonce-storage">
        <name>Nonce Cache Requirements</name>
        <t>Verifiers MUST maintain a nonce cache for the duration of the timestamp validity window. The cache MUST be shared across all verification instances if the service runs multiple processes or nodes. Failure to maintain a shared nonce cache allows replay attacks across processes. For services running on a single node, an in-memory cache is sufficient. For distributed services, a shared cache (e.g., Redis, Memcached) is RECOMMENDED.</t>
      </section>

      <section anchor="sec-private-key-protection">
        <name>Private Key Protection</name>
        <t>The agent's Ed25519 private key MUST be protected with the same care as any other signing key. It SHOULD be stored in a hardware security module (HSM), trusted platform module (TPM), or at minimum in encrypted storage with appropriate access controls. If the private key is compromised, the domain owner MUST immediately revoke the agent's DNS record per <xref target="APERTOID-DNS"/>.</t>
      </section>

      <section anchor="sec-downgrade">
        <name>Signature Stripping</name>
        <t>An attacker who can intercept and modify HTTP requests could strip the ApertoID-Signature header entirely, causing the request to appear unsigned. Verifiers SHOULD query the agent's ApertoID policy record to determine whether the domain expects signed requests. If the policy specifies "p=reject", the verifier SHOULD reject unsigned requests from agents claiming to represent that domain.</t>
      </section>
    </section>

    <section anchor="privacy">
      <name>Privacy Considerations</name>
      <t>The ApertoID-Signature header reveals the agent's domain (d=) and selector (s=) to the receiving service and to any intermediary that can observe HTTP headers. This is by design — the purpose of the header is to declare agent identity. However, domain owners should be aware that the same d= and s= values appear on all requests from the same agent, creating a correlation identifier that enables request tracking across time and endpoints.</t>
      <t>Services that observe ApertoID-Signature headers learn which domains are using AI agents and which specific agents are making requests. This information is inherent to the protocol's purpose and cannot be mitigated without defeating the protocol's goals. Domain owners who wish to limit correlation SHOULD rotate selectors periodically, though this requires publishing new DNS records.</t>
    </section>

    <section anchor="iana">
      <name>IANA Considerations</name>
      <section anchor="iana-header">
        <name>HTTP Header Field Registration</name>
        <t>This document requests registration of the following HTTP header field in the "Hypertext Transfer Protocol (HTTP) Field Name Registry" maintained at &lt;https://www.iana.org/assignments/http-fields&gt;:</t>
        <dl>
          <dt>Field Name:</dt><dd>ApertoID-Signature</dd>
          <dt>Status:</dt><dd>permanent</dd>
          <dt>Structured Type:</dt><dd>N/A</dd>
          <dt>Reference:</dt><dd>[this document]</dd>
        </dl>
      </section>
    </section>

  </middle>

  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119"><front><title>Key words for use in RFCs to Indicate Requirement Levels</title><author initials="S." surname="Bradner"/><date year="1997" month="March"/></front><seriesInfo name="RFC" value="2119"/></reference>
        <reference anchor="RFC4648" target="https://www.rfc-editor.org/info/rfc4648"><front><title>The Base16, Base32, and Base64 Data Encodings</title><author initials="S." surname="Josefsson"/><date year="2006" month="October"/></front><seriesInfo name="RFC" value="4648"/></reference>
        <reference anchor="RFC5234" target="https://www.rfc-editor.org/info/rfc5234"><front><title>Augmented BNF for Syntax Specifications: ABNF</title><author initials="D." surname="Crocker"/><date year="2008" month="January"/></front><seriesInfo name="RFC" value="5234"/></reference>
        <reference anchor="RFC8032" target="https://www.rfc-editor.org/info/rfc8032"><front><title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title><author initials="S." surname="Josefsson"/><date year="2017" month="January"/></front><seriesInfo name="RFC" value="8032"/></reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174"><front><title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title><author initials="B." surname="Leiba"/><date year="2017" month="May"/></front><seriesInfo name="RFC" value="8174"/></reference>
        <reference anchor="RFC9110" target="https://www.rfc-editor.org/info/rfc9110"><front><title>HTTP Semantics</title><author initials="R." surname="Fielding"/><date year="2022" month="June"/></front><seriesInfo name="RFC" value="9110"/></reference>
        <reference anchor="APERTOID-DNS"><front><title>ApertoID: DNS-Based Agent Identity Declaration Protocol</title><author initials="A." surname="Ferro"/><date year="2026" month="March"/></front><seriesInfo name="Internet-Draft" value="draft-ferro-dnsop-apertoid-00"/></reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5905" target="https://www.rfc-editor.org/info/rfc5905"><front><title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title><author initials="D." surname="Mills"/><date year="2010" month="June"/></front><seriesInfo name="RFC" value="5905"/></reference>
        <reference anchor="RFC6376" target="https://www.rfc-editor.org/info/rfc6376"><front><title>DomainKeys Identified Mail (DKIM) Signatures</title><author initials="D." surname="Crocker"/><date year="2011" month="September"/></front><seriesInfo name="RFC" value="6376"/></reference>
        <reference anchor="RFC9421" target="https://www.rfc-editor.org/info/rfc9421"><front><title>HTTP Message Signatures</title><author initials="A." surname="Backman"/><date year="2024" month="February"/></front><seriesInfo name="RFC" value="9421"/></reference>
      </references>
    </references>

    <section anchor="example-full">
      <name>Full Request/Response Example</name>
      <artwork><![CDATA[
=== Agent sends signed POST request ===

POST /mcp/tools/search HTTP/1.1
Host: api.targetservice.com
Content-Type: application/json
ApertoID-Signature: d=example.com; s=leadhunter;
  t=1711100000; n=a1b2c3d4e5f6;
  sig=MEUCIQDx4fakebase64signaturehere...88chars

{"query": "find leads in tech sector", "limit": 10}

=== Signing input that was signed ===

example.com\n
leadhunter\n
1711100000\n
a1b2c3d4e5f6\n
POST\n
/mcp/tools/search\n
<sha256-hex-of-body>\n

=== Verifier checks ===

1. Parse header: d=example.com, s=leadhunter
2. Timestamp 1711100000 within 300s of now: OK
3. Nonce a1b2c3d4e5f6 not in cache: OK, cache it
4. DNS: _apertoid.example.com -> policy p=reject
5. DNS: leadhunter._apertoid.example.com -> pk=MCow...
6. exp= not passed: OK
7. Reconstruct signing_input with method=POST,
   target=/mcp/tools/search, body_hash=sha256(body)
8. Ed25519 verify sig against signing_input with pk: OK
9. Result: pass

=== Same signature replayed to DELETE endpoint ===

DELETE /mcp/data/all HTTP/1.1
ApertoID-Signature: d=example.com; s=leadhunter;
  t=1711100000; n=a1b2c3d4e5f6;
  sig=MEUCIQDx4f... (same signature)

Verification FAILS at step 8:
  signing_input includes "DELETE" and "/mcp/data/all"
  which differs from original "POST" and "/mcp/tools/search"
  -> Ed25519 verify FAILS -> Result: sig_invalid
]]></artwork>
    </section>

    <section anchor="middleware">
      <name>Implementation Guidance</name>
      <t>This appendix is non-normative.</t>
      <t>To maximize adoption, implementations SHOULD provide middleware or decorator patterns that require minimal code changes.</t>
      <artwork><![CDATA[
# Python: Agent side - sign outgoing requests
import hashlib, time, secrets, base64
from nacl.signing import SigningKey

def sign_request(method, url_path, body, domain, selector, key):
    t = str(int(time.time()))
    n = secrets.token_hex(8)
    body_hash = hashlib.sha256(body).hexdigest()
    signing_input = f"{domain}\n{selector}\n{t}\n{n}\n"
    signing_input += f"{method}\n{url_path}\n{body_hash}\n"
    sig = key.sign(signing_input.encode()).signature
    sig_b64 = base64.b64encode(sig).decode().rstrip("=")
    return {
        "ApertoID-Signature":
            f"d={domain}; s={selector}; t={t}; n={n}; sig={sig_b64}"
    }

# Python: Verifier side - verify incoming requests
def verify_request(request):
    header = request.headers.get("ApertoID-Signature")
    if not header:
        return "unsigned"
    tags = parse_tags(header)  # extract d, s, t, n, sig
    # ... check timestamp, nonce, DNS lookup, then:
    body_hash = hashlib.sha256(request.body).hexdigest()
    signing_input = (
        f"{tags['d']}\n{tags['s']}\n{tags['t']}\n{tags['n']}\n"
        f"{request.method}\n{request.path}\n{body_hash}\n"
    )
    pubkey = get_apertoid_pubkey(tags['d'], tags['s'])  # DNS
    return verify_ed25519(pubkey, signing_input, tags['sig'])
]]></artwork>
      <t>Reference implementations in Python, Go, and JavaScript are maintained at https://github.com/ApertoID.</t>
    </section>

    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The signing mechanism in this document was inspired by the DKIM signature scheme <xref target="RFC6376"/>. The principle of binding signatures to specific request components follows the approach established by HTTP Message Signatures <xref target="RFC9421"/>, adapted for the single-purpose case of AI agent identity verification with DNS-based key discovery.</t>
    </section>

  </back>
</rfc>
