Internet-Draft UZPIF-OI March 2026
Fisher Expires 17 September 2026 [Page]
Workgroup:
Network Working Group
Published:
Intended Status:
Informational
Expires:
Author:
B.A. Fisher
DPA R&D

UZPIF Outbound Indexing for Search Engines and AI

Abstract

This document proposes an outbound, opt-in mechanism for web content discovery and indexing, complementing or replacing traditional inbound crawling models such as those governed by the Robots Exclusion Protocol (REP; [RFC9309]). In the proposed approach, servers proactively initiate authenticated outbound connections to trusted indexers (search engines or AI systems) using identity-bound grants, enabling explicit consent for indexing, freshness signalling, and content usage policy communication.

The mechanism integrates with identity-centric frameworks such as the Universal Zero-Port Interconnect Framework (UZPIF; [UZPIF]) and supports both traditional search engines and AI-driven indexing and retrieval systems. This document is part of an experimental, research-oriented Independent Stream suite and defines the current normative baseline for trust objects, validation rules, and security semantics within its scope. Hard interoperability is expected for shared object semantics and validation rules. Full wire-level, clustering, and proof-family interoperability is not claimed everywhere yet; the remaining details are intentionally profile-defined or deferred. This revision defines semantic transparency objects and baseline evaluation now while leaving append-only proof-family interoperability to deployment profiles. The design aims to reduce unsolicited crawling abuse and improve signal quality for authorised indexers without claiming universal control over discoverability.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 17 September 2026.

Table of Contents

1. Scope and Status

This Internet-Draft is part of an experimental, research-oriented suite prepared for the Independent Stream. It is published to enable structured technical review, interoperability discussion, and disciplined specification development around outbound, consent-first indexing mechanisms for UZPIF-style transports.

Within that suite, this document defines the current normative baseline for trust objects, validation rules, and security semantics for outbound, consent-first indexing over UZPIF-style transports, especially Discovery Grants, policy objects, and freshness signalling. Hard interoperability is expected for shared object semantics and validation rules.

The material is a research artefact. It does not claim technical completeness, production readiness, or endorsement by the IETF or any other standards body, and it is not presented as a standards-track specification.

Full wire-level, clustering, and proof-family interoperability is not claimed everywhere yet. Message encodings, transport bindings, proof families, and deployment profiles remain intentionally profile-defined or deferred. This draft therefore should not be read as claiming a fully closed wire-level system, universal discoverability control, or solved availability properties.

It is designed for experimentation, operator feedback, and profile-driven deployments. It does not require changes to the HTTP protocol, but it can carry or reference HTTP-origin content.

During conversion from internal research documents into IETF XML, care has been taken to:

Ongoing research, implementation, performance validation, and real-world pilot work remain outside the scope of this Internet-Draft text and may be pursued separately.

2. Executive Summary

This document defines an outbound indexing model in which content publishers (servers) initiate outbound, authenticated sessions to trusted indexers to advertise content availability, request refresh, and communicate explicit usage constraints. The model is intended as a complement to inbound crawling and robots.txt-based opt-out signalling.

The core components are:

The proposal is compatible with legacy web publishing and can be adopted incrementally. It is especially suited to "zero-port" deployments where inbound crawling is undesirable or impossible.

3. Terminology

Requirements Language: The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119] and [RFC8174] when, and only when, they appear in all capitals.

This Internet-Draft is primarily exploratory; requirement language is used sparingly and only where behaviour is intentionally specified.

Publisher

A server or origin that wishes to make content available for indexing.

Indexer

A service (e.g., search engine, AI retrieval system, dataset builder) that consumes content for indexing, ranking, retrieval, summarisation, training, or related processing.

Indexing Node

An independently operated Indexer instance participating in outbound indexing.

Trusted Indexer

An Indexer whose identity is known to, and explicitly authorised by, a Publisher via a Discovery Grant.

Outbound Discovery Session

A Publisher-initiated secure session to an Indexer service endpoint; within this session, discovery, policy, and content transfer messages may be exchanged.

Discovery Grant

A cryptographically bound, application-specific Grant profile that conveys consent and scope (what may be indexed, by whom, and for what purposes) while preserving the suite-level Grant semantics defined by UZPIF ([UZPIF]); see Section 10.

Content Scope

A set of resources to which a Discovery Grant or policy applies (e.g., URL set, content-hash set, semantic collection, feed).

Usage Purpose

A declared intent for automated processing, such as traditional search indexing, snippet generation, retrieval augmentation, or AI training.

Freshness Signal

A notification indicating that indexed content may have changed and that refresh is desired.

Inclusion Log

A transparency record stream or append-only structure that records content accepted for indexing under a declared scope and purpose; the exact append-only proof family is profile-defined.

UZPIF Session

A secure, identity-bound connectivity substrate defined by [UZPIF], typically established via outbound connections to one or more Rendezvous Nodes.

4. Introduction

Traditional web indexing relies on inbound crawling, where automated clients (crawlers) initiate connections to servers and respect opt-out signals such as robots.txt (as standardised in the Robots Exclusion Protocol; [RFC9309]). While effective for many years, this model exposes servers to unsolicited traffic, abuse from malicious crawlers, and challenges in enforcing preferences - particularly as AI systems increasingly use crawled content for training or real-time retrieval.

Recent developments, including crawler best practices ([draft-illyes-aipref-cbcp]) and discussions on AI-specific controls, highlight limitations of opt-out regimes. Inbound crawling assumes servers are reachable and willing to respond, which conflicts with emerging zero-port and zero-trust architectures.

This document describes an outbound opt-in alternative: servers explicitly initiate authenticated connections to authorised indexers (traditional search engines or AI agents) when they wish to be discovered or refreshed. Discovery requests are bound to cryptographic identities, Discovery Grants, and policy artefacts, enabling fine-grained control over who may index content and for what purpose (e.g., traditional search, AI training, or summarisation).

The approach builds on identity-first transports such as the Universal Zero-Port Interconnect Framework (UZPIF; [UZPIF]) and Universal Zero-Port Transport Protocol (UZP; [UZP]), where endpoints establish outbound-only sessions. It provides a proactive, consent-first model suited to both human-readable web content and AI-driven search consumption.

This is a research proposal intended for experimentation and discussion, particularly in contexts where reducing inbound exposure and strengthening consent are priorities.

This draft should therefore be read as part of an experimental, research-oriented Independent Stream suite and as the current normative baseline for trust objects, validation rules, and security semantics within its scope. Hard interoperability is expected for shared object semantics and validation rules. Full wire-level, clustering, and proof-family interoperability is not claimed everywhere yet; the remaining details are intentionally profile-defined or deferred. Outbound initiation can reduce unsolicited crawling exposure, but it does not by itself provide traffic-pattern privacy, universal discoverability control, or solved rendezvous or indexer availability.

5. Problem Statement

The inbound crawling model is built on an assumption of open reachability: crawlers discover a server, initiate inbound connections, and learn policies after connecting. For modern deployments - especially those seeking to minimise exposed attack surface - this is an inversion of the desired trust model.

Specific limitations include:

The outbound indexing model aims to preserve the benefits of web discoverability while shifting control to the Publisher, making consent explicit, identity-bound, and enforceable within authenticated channels.

6. Design Goals

The mechanism defined in this document has the following goals:

7. Architectural Overview

At a high level, outbound indexing replaces "Indexer-driven fetch" with a Publisher-initiated session that can carry announcements, policy, and (optionally) content. Under UZPIF, both Publisher and Indexer may maintain outbound connectivity to one or more Rendezvous Nodes (RNs), which stitch permitted sessions.

Publisher (Site)          RN(s)             Trusted Indexer
  |-- outbound setup ----->|<-- outbound presence --|
  |<== identity-bound secure session (via RN stitch) ==>|
  |-- ANNOUNCE + GRANT + POLICY ------------------------->|
  |<-- (optional) REQUEST(resource set) ------------------|
  |-- CONTENT(resource set/deltas) ---------------------->|
  |<-- RECEIPT / STATUS ----------------------------------|
Figure 1: Outbound indexing model: Publisher initiates the session to a trusted Indexer

The session is initiated by the Publisher, but once established it is a bidirectional secure channel in which the Indexer may request specific resources and the Publisher may provide them. The key property is that the Publisher does not expose an unauthenticated public inbound service for discovery.

7.1. Roles and Relationships

The model distinguishes three relationships:

  • Publisher <-> Indexer: A trust and consent relationship expressed via Discovery Grants and enforced via authenticated sessions.

  • Publisher <-> RN: A connectivity relationship in which the Publisher maintains outbound sessions to one or more RNs, as defined in [UZPIF].

  • Indexer <-> RN: An analogous connectivity relationship enabling stitching to Publishers that authorise the Indexer.

This document focuses on Publisher-to-Indexer semantics and does not redefine UZPIF stitching or transport behaviour.

8. Trust and Identity Model

Outbound indexing relies on cryptographic identities for both Publishers and Indexers. In UZPIF deployments, these identities are typically represented by certificates or equivalent credentials issued within an identity plane (e.g., Pantheon as described in [UZPIF]), and sessions are established over secure channels such as TLS-DPA ([TLS-DPA]).

A Publisher MUST authenticate the Indexer identity before sending any content beyond minimal discovery metadata. An Indexer MUST authenticate the Publisher identity before accepting Discovery Grants, policy, or content.

Identity binding serves two purposes:

8.1. Discovering Indexer Service Endpoints

This document does not mandate a single Indexer discovery mechanism. A Publisher may discover Indexer identities and endpoints through out-of-band agreements, operator-curated trust lists, or an identity plane such as Pantheon ([UZPIF]).

A Publisher SHOULD treat Indexer discovery as a trust decision comparable to granting API access. Blind acceptance of unsolicited Indexer identities reintroduces abuse vectors that outbound indexing is intended to reduce.

9. Decentralisation and Index Governance

Outbound indexing MUST NOT require a central registry for Indexer discovery, listing eligibility, or participation.

Indexing Nodes MAY operate independently. Federation between Indexers is voluntary and MAY be bilateral or multilateral according to local policy.

No entity SHALL possess mandatory inclusion authority. No index SHALL be required for network participation.

Participation in outbound indexing SHALL NOT be required for transport-layer operability.

These constraints are intended to prevent gatekeeper capture of discovery and listing decisions.

9.1. Index Transparency

To support transparency and accountability, Indexers that claim baseline semantic transparency support MUST publish transparency artefacts that are publicly retrievable and individually signature-verifiable under the common signed artefact envelope defined by UZPIF ([UZPIF]). This revision defines transparency semantics, object types, and baseline evaluation rules for those artefacts. It standardises semantic transparency objects now while leaving append-only proof-family interoperability to deployment profiles.

Deployment profiles are responsible for fixing the append-only structure, digest algorithm, proof algorithm, checkpoint format, and consistency verification rules before proof-level interoperability can be claimed.

At minimum, an implementation claiming baseline semantic transparency support MUST support the following concrete object types:

9.1.1. Common Log Profile

Outbound indexing uses the common signed artefact envelope for transparency artefacts and defines a common log body profile within that envelope. Index Transparency Entries, Signed Checkpoints, and Revocation Acknowledgement artefacts MUST use this profile for baseline semantic interoperability and artefact handling.

This profile does not redefine the suite envelope. It inherits canonical serialisation, exact signature coverage, object_id derivation, unknown-field and unknown-extension handling, signature ordering, algorithm identifier matching, epoch-versus-sequence precedence, and the rule that detached signatures are not part of baseline interoperability for these registered object types.

This profile also does not by itself define checkpoint construction, inclusion-proof shape, consistency-proof shape, proof verification inputs, or proof failure behaviour. Profiles that require interoperable proof verification MUST fix the append-only structure, digest algorithm, proof algorithm, checkpoint format, consistency verification rules, and any inclusion-proof verification inputs they require.

A minimal common log profile MUST carry:

  • the Indexer identity;

  • a log object type;

  • a sequence number or checkpoint high-water mark;

  • a previous hash where chaining applies;

  • a timestamp;

  • a payload digest or the object-specific payload fields;

  • an optional checkpoint reference; and

  • a valid suite-envelope signature set.

This profile binds transparency entries, checkpoints, and acknowledgement artefacts into an accountable log history while inheriting the suite-wide envelope unchanged. Append-only proof verification remains profile-defined.

9.1.2. Index Transparency Entry

An Index Transparency Entry records a single indexing decision or state transition. For baseline semantic interoperability, it MUST use the common log profile with "object_type" set to "index-transparency-entry".

A minimal Index Transparency Entry MUST carry the following object-specific fields in addition to the common log profile:

  • a decision type: include, exclude, revoke-ack, delete-ack, or update;

  • a content-scope hash or object identifier;

  • the relevant grant identifier;

  • the relevant policy hash; and

  • any object-specific status needed to interpret the decision.

9.1.3. Signed Checkpoint

A Signed Checkpoint provides a compact signed summary of the current transparency state so that relying parties can reference the current transparency state and, under a profile-defined proof family, evaluate log continuity without replaying the entire log. For baseline semantic interoperability, it MUST use the common log profile with "object_type" set to "signed-checkpoint".

A minimal Signed Checkpoint MUST carry the following object-specific fields in addition to the common log profile:

  • a tree size or sequence high-water mark;

  • a root hash or chain-tip hash; and

  • any checkpoint algorithm identifier required to interpret the root or tip hash.

9.1.4. Transparency Evaluation and Profile-Defined Verification

A client, Publisher, or auditor evaluating transparency artefacts SHOULD perform baseline semantic validation. If a deployment profile defines an append-only proof family, the evaluator SHOULD also perform the applicable profile-defined proof verification:

  1. Signature check: verify the signature on the Index Transparency Entry, the Signed Checkpoint (Section 9.1.3), any associated Indexer Receipt (Section 12.5.1), and any Revocation Acknowledgement artefact (Section 12.6.1) against the authenticated Indexer identity.

  2. Object match and freshness check: verify that the entry and any associated receipt or revocation acknowledgement match the declared scope, the relevant grant identifier, the applicable policy hash or policy object, and the expected freshness or sequence context.

  3. Profile-defined proof check: if the deployment profile defines an append-only proof family, verify checkpoint construction and any inclusion or consistency proofs using that profile's append-only structure, digest algorithm, proof algorithm, checkpoint format, verification inputs, and failure rules.

If the baseline semantic checks fail, the artefact set MUST NOT be treated as valid accountability evidence for the relevant scope.

If profile-defined proof verification is unavailable or fails, the artefact set MUST NOT be treated as interoperably verified evidence of append-only consistency. It MAY still be used as signed local accountability input under deployment policy.

Authenticity alone is insufficient for indexing authority. A well-signed Discovery Grant, Signed Checkpoint, Index Transparency Entry, Indexer Receipt, or Revocation Acknowledgement artefact MUST also be evaluated for freshness, scope, declared sequence or checkpoint position, and current policy eligibility before it is relied upon as current authority or accountability evidence.

Clients MAY use these artefacts when evaluating Indexer transparency, accountability, detectability of divergence, and profile-defined consistency posture. They MUST NOT treat the log alone as objective proof of fairness, neutral ranking, or justified inclusion decisions.

10. Discovery Grants

A Discovery Grant conveys explicit permission from a Publisher to an Indexer, scoped by content and purpose. It is an authorisation artefact, not merely a preference hint.

A Discovery Grant is an application-specific Grant profile. It MUST preserve the baseline Grant semantics defined by UZPIF ([UZPIF]) while adding the indexing-specific body fields defined in this section.

Discovery Grants MUST use the common signed artefact envelope defined by [UZPIF] with "object_type" set to "discovery-grant". This document defines only the additional indexing-specific fields and semantics carried in the object-specific body. Discovery Grants inherit the UZPIF common envelope unchanged, including canonical serialisation, exact signature coverage, object_id derivation, unknown extension handling, signature ordering, algorithm identifier matching, epoch-versus-sequence precedence, and the rule that detached signatures are not part of baseline interoperability.

10.1. Grant Properties

A Discovery Grant MUST include at least:

  • Issuer: the Publisher identity that issues the grant.

  • Audience: the Indexer identity authorised to use the grant.

  • Scope: a Content Scope describing what may be indexed or retrieved.

  • Purposes: one or more Usage Purposes for which the Indexer is authorised.

  • Constraints: optional limits such as maximum fetch rate, retention period, or required attribution.

  • Expiry: a time limit after which the grant is no longer valid.

  • Signature set: a valid suite-envelope signature set binding the grant to the Issuer.

Discovery Grants MUST be bound to the authenticated identities observed in the Outbound Discovery Session. An Indexer MUST reject a grant if the authenticated Publisher identity is not the Issuer, or if the authenticated Indexer identity is not the intended Audience.

In the common envelope, a Discovery Grant will normally use an issuer authority identifier associated with the Publisher's trust context, a subject identifier for the Publisher or relationship being authorised, an audience identifier for the intended Indexer, and scope and policy fields that capture the authorised content set and usage purposes.

These fields populate the discovery-grant body only and MUST NOT redefine the suite envelope semantics.

10.2. Scope Examples

Content Scope may be expressed in multiple ways, depending on deployment:

  • URL prefix scope: allow indexing for all resources under a given origin and path prefix.

  • Feed scope: allow indexing for resources enumerated in a signed feed.

  • Hash set scope: allow indexing for content objects identified by cryptographic hashes.

  • Semantic collection: allow indexing for a named collection (e.g., "docs", "blog", "product-catalogue") maintained by the Publisher.

11. Policy Communication

Outbound indexing provides a channel for Publishers to communicate content usage policy to Indexers in a form that is:

The policy data model is intentionally generic. Deployments MAY use the vocabulary defined by the IETF AIPREF working group (e.g., [draft-ietf-aipref-vocab]), or they MAY define private purpose tokens under bilateral agreement.

11.1. Policy Elements

A policy statement SHOULD be able to express:

  • Allowed purposes: which Usage Purposes are permitted (or denied) for a given scope.

  • Derivation: whether summaries, snippets, embeddings, or other derived artefacts are permitted.

  • Training: whether AI training or model fine-tuning is permitted.

  • Attribution: requirements for attribution or source linking in downstream displays.

  • Retention: permitted retention duration for cached copies or extracted features.

  • Redistribution: whether indexed content may be redistributed or provided to third parties.

Policy is not an access-control mechanism by itself; it is enforced by the combination of Discovery Grants, authenticated sessions, and Indexer compliance. However, unlike REP, policy is exchanged in an authenticated context where non-compliance can be attributed to a specific identity.

11.2. Illustrative Policy Example

The following is a non-normative example of a policy object that permits traditional search indexing and snippet generation, but denies training and long-term retention:

{
  "scope": "https://example.com/docs/*",
  "allowed_purposes": [
    "search.index",
    "search.snippet",
    "rag.retrieve"
  ],
  "denied_purposes": ["ai.train", "ai.finetune"],
  "derivatives": {
    "summary": "allowed",
    "embeddings": "allowed",
    "snippets": "allowed"
  },
  "retention": {
    "cached_copy_days": 14,
    "embedding_days": 30
  },
  "attribution": {
    "required": true,
    "link_back": true
  }
}
Figure 2: Example policy object (illustrative)

The internal syntax of policy objects remains open for profiling and experimentation. However, when a policy object is referenced by an Index Transparency Entry, Signed Checkpoint, Indexer Receipt, or Revocation Acknowledgement, it MUST be identifiable by a stable policy hash or equivalent canonical reference. A deployment MAY sign policy objects as part of a Discovery Grant, or MAY carry them as a separate signed artefact within the session.

12. Protocol Operation

This section describes a baseline operational sequence. Session message framing remains intentionally abstract in this version of the document; the focus is on semantics and security properties. This abstraction does not apply to Index Transparency Entries, Signed Checkpoints (Section 9.1.3), Indexer Receipts (Section 12.5.1), or Revocation Acknowledgement artefacts (Section 12.6.1), which use the interoperable object formats defined in this document.

12.1. Session Establishment

A Publisher initiates an Outbound Discovery Session to an Indexer endpoint using UZPIF connectivity ([UZPIF]) and an identity-bound secure channel (e.g., TLS-DPA; [TLS-DPA]).

The Publisher MUST verify the authenticated Indexer identity before sending any sensitive content. The Indexer MUST verify the authenticated Publisher identity before accepting Discovery Grants, policy, or indexing data.

12.2. Announcement and Grant Presentation

Once the secure session is established, the Publisher sends:

  • a discovery announcement identifying the Publisher, site scope, and desired indexing actions (new discovery, refresh, or revocation);

  • one or more Discovery Grants defined in Section 10; and

  • associated policy statements for the relevant Content Scopes.

The Indexer MUST validate Discovery Grants and reject any announcement that lacks sufficient authorisation for the requested purposes.

12.3. Content Transfer Modes

This document defines two conceptual modes for content transfer:

  • Publisher Push: the Publisher proactively sends content objects or deltas to the Indexer.

  • Indexer Request within Session: the Indexer requests specific resources inside the established session, and the Publisher responds over the same channel.

Both modes preserve the "no unauthenticated inbound ports" property because the Indexer does not initiate a new network connection to the Publisher.

A Publisher MAY choose to offer only one mode. For example, a Publisher with strict egress policy may prefer request/response within a session, while a Publisher with pre-generated feeds may prefer push.

12.4. Freshness Signalling

A Publisher MAY send Freshness Signals to request that an Indexer refresh previously indexed content. Freshness Signals SHOULD be lightweight and SHOULD include enough metadata for the Indexer to prioritise work (e.g., change timestamps, object identifiers, or hashes).

Freshness Signals do not, by themselves, grant permission; they operate under the permissions already established by Discovery Grants and policy.

12.5. Receipts and Auditability

An Indexer MAY provide receipts indicating that it has accepted content for indexing and the purposes under which it will be processed. Receipts can improve auditability and facilitate contractual enforcement in commercial relationships. Their relationship to Signed Checkpoints is evaluated using Section 9.1.4.

To make receipts interoperable, this document defines a minimal Indexer Receipt object. For interoperable exchange, it MUST use the common signed artefact envelope defined by UZPIF ([UZPIF]) with "object_type" set to "indexer-receipt".

12.5.1. Indexer Receipt Format

A minimal Indexer Receipt MUST carry:

  • the Publisher identity;

  • the Indexer identity;

  • the grant identifier;

  • the scope hash;

  • the declared purpose or purposes;

  • a timestamp; and

  • a valid suite-envelope signature set.

Receipts MUST be matchable to the relevant Index Transparency Entry and Signed Checkpoint so that a relying party can confirm that the declared grant, scope, and purposes align with logged behaviour.

Profiles MAY extend receipts with retention commitments, policy hashes, receipt identifiers, or processing-mode declarations.

These fields populate the indexer-receipt body only and MUST NOT redefine the suite envelope semantics. Indexer Receipts inherit the UZPIF common envelope unchanged, including canonical serialisation, exact signature coverage, object identifiers, unknown extension handling, signature ordering, algorithm identifier matching, epoch-versus-sequence precedence, and the rule that detached signatures are not part of baseline interoperability.

12.6. Revocation

A Publisher MUST be able to revoke consent. Revocation may apply to a specific grant, a policy scope, or an entire Publisher-to-Indexer relationship.

Upon receiving a valid revocation instruction from an authenticated Publisher, an Indexer SHOULD cease further acquisition under the revoked scope and SHOULD follow the Publisher's stated retention and deletion policy.

If revocation is expressed as a signed object rather than an in-band session instruction, it MUST use the common signed artefact envelope defined by UZPIF ([UZPIF]) with "object_type" set to "revocation" and with scope and epoch or sequence values sufficient for freshness and conflict handling when interoperable exchange is required. Deployments that require interoperable signed revocation objects or quorum-backed revocation evidence SHOULD align those objects with the Revocation Signal and Threshold-Consensus Evidence models defined by TLS-DPA ([TLS-DPA]).

A Publisher SHOULD treat revocation as an operational and legal relationship issue. Technical signalling can communicate intent and scope, but enforcement ultimately depends on Indexer compliance.

12.6.1. Revocation Acknowledgement Artefact

To support accountable revocation handling, an Indexer that accepts and processes a revocation request SHOULD emit a Revocation Acknowledgement artefact. For baseline semantic interoperability, this artefact MUST use the common log profile with "object_type" set to "revocation-acknowledgement" or an Index Transparency Entry decision type of "revoke-ack" or "delete-ack".

A minimal Revocation Acknowledgement artefact MUST carry:

  • the Publisher identity;

  • the Indexer identity;

  • the referenced revocation signal, grant identifier, or policy identifier;

  • the affected scope hash or object identifier;

  • an acknowledgement type of revoke-ack or delete-ack;

  • a processing timestamp;

  • an optional checkpoint reference; and

  • a valid suite-envelope signature set.

A relying party SHOULD be able to validate the acknowledgement's signatures, scope linkage, and any profile-defined checkpoint linkage using the procedure in Section 9.1.4.

13. Relationship to Existing Mechanisms

Outbound indexing is designed to be complementary to existing web controls and does not attempt to obsolete them.

13.1. Relationship to the Robots Exclusion Protocol

REP ([RFC9309]) is an opt-out signalling mechanism interpreted by automated clients that initiate inbound connections. It is widely deployed and remains relevant for legacy crawling.

Outbound indexing differs in that it:

  • is opt-in by default;

  • operates over authenticated, identity-bound channels; and

  • supports explicit purpose limitation and richer policy statements.

A Publisher MAY use REP for the general web while using outbound indexing for high-value relationships with specific trusted indexers. An Indexer MAY choose to prioritise outbound indexing signals when present, as they can be higher quality and fresher than crawl-derived heuristics.

13.2. Relationship to AI Preference Signalling

The IETF AIPREF working group is developing vocabulary and attachment mechanisms for expressing usage preferences (e.g., [draft-ietf-aipref-vocab] and [draft-ietf-aipref-attach]).

Outbound indexing does not compete with these efforts. Instead, it provides an authenticated delivery channel for the same or compatible preference statements, including in environments where HTTP acquisition is not the primary mechanism or where inbound HTTP access is intentionally restricted.

14. Security Considerations

Outbound indexing reduces exposure to unsolicited inbound traffic by eliminating the need for publicly reachable discovery endpoints. However, it introduces new considerations around trust, grant handling, and policy enforcement.

Implementations SHOULD consider:

When used with UZPIF ([UZPIF]) and TLS-DPA ([TLS-DPA]), outbound indexing benefits from identity-bound handshake properties and reduced scanning surface. This document does not define cryptographic primitives; it relies on the referenced transports for channel security.

15. Privacy Considerations

Outbound indexing provides publishers with positive control over who may access content for automated processing. This can reduce privacy harms associated with indiscriminate crawling and reduce exposed discovery surface for automated access.

In this document, reduced publisher-side discoverability, encrypted content protection, and traffic-pattern privacy are distinct properties. Outbound indexing primarily changes discoverability and policy control. Confidentiality of transferred content depends on the authenticated encrypted session in use, and privacy against relationship or timing analysis depends on separate metadata-minimising measures. Indexers, rendezvous infrastructure, and network observers may still learn useful metadata about who contacted whom, when refreshes occurred, and how often updates were requested.

Publishers SHOULD consider:

Indexers SHOULD consider:

16. IANA Considerations

This document has no IANA actions.

17. Normative References

[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/info/rfc2119>.
[RFC8174]
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, , <https://www.rfc-editor.org/info/rfc8174>.

18. Informative References

[draft-ietf-aipref-attach]
Thomson, M. and M. Nottingham, "Associating AI Usage Preferences with Content in HTTP", Work in Progress, Internet-Draft, draft-ietf-aipref-attach, <https://datatracker.ietf.org/doc/html/draft-ietf-aipref-attach>.
[draft-ietf-aipref-vocab]
Keller, P. and M. Thomson, "A Vocabulary For Expressing AI Usage Preferences", Work in Progress, Internet-Draft, draft-ietf-aipref-vocab, <https://datatracker.ietf.org/doc/html/draft-ietf-aipref-vocab>.
[draft-illyes-aipref-cbcp]
Illyes, G., Kuehlewind, M., and A. Kohn, "Crawler best practices", Work in Progress, Internet-Draft, draft-illyes-aipref-cbcp, <https://datatracker.ietf.org/doc/html/draft-illyes-aipref-cbcp>.
[RFC9309]
Koster, M., Illyes, G., Zeller, H., and L. Sassman, "Robots Exclusion Protocol", RFC 9309, DOI 10.17487/RFC9309, , <https://www.rfc-editor.org/info/rfc9309>.
[TLS-DPA]
Fisher, B. A., "TLS-DPA: An Identity-Bound Security Protocol for Traditional, Overlay, and Zero-Port Transports", Work in Progress, Internet-Draft, draft-dpa-tls-dpa, <https://datatracker.ietf.org/doc/html/draft-dpa-tls-dpa>.
[UZP]
Fisher, B. A., "UZP: Universal Zero-Port Transport Protocol", Work in Progress, Internet-Draft, draft-dpa-uzp-transport, <https://datatracker.ietf.org/doc/html/draft-dpa-uzp-transport>.
[UZPIF]
Fisher, B. A., "The Universal Zero-Port Interconnect Framework (UZPIF): An Identity-Centric Architecture for Post-Port Networking", Work in Progress, Internet-Draft, draft-dpa-uzpif-framework, <https://datatracker.ietf.org/doc/html/draft-dpa-uzpif-framework>.

Author's Address

Benjamin Anthony Fisher
DPA R&D Ltd (https://www.dpa-cloud.co.uk)