<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hood-independent-agtp-05" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="AGTP">Agent Transfer Protocol (AGTP)</title>
    <seriesInfo name="Internet-Draft" value="draft-hood-independent-agtp-05"/>
    <author fullname="Chris Hood">
      <organization>Nomotic, Inc.</organization>
      <address>
        <email>chris@nomotic.ai</email>
        <uri>https://nomotic.ai</uri>
      </address>
    </author>
    <date year="2026" month="April" day="20"/>
    <area>Applications and Real-Time</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>AI agents</keyword>
    <keyword>agentic systems</keyword>
    <keyword>protocol</keyword>
    <keyword>agent traffic</keyword>
    <keyword>agent transfer</keyword>
    <abstract>
      <?line 135?>

<t>AI agents and agentic systems generate a growing volume of intent-driven,
unstructured, and undifferentiated traffic that flows through HTTP
indistinguishably from human-initiated requests. HTTP lacks the semantic
vocabulary, observability primitives, and identity mechanisms required by
agent systems operating at scale. Existing protocols described as Agent
Group Messaging Protocols (AGMP), including MCP, ACP, A2A, and ANP, are
messaging-layer constructs that presuppose HTTP as their transport.
They do not address the underlying transport problem.</t>
      <t>This document defines the Agent Transfer Protocol (AGTP): a dedicated
application-layer protocol for AI agent traffic. Version 05 restores the
canonical Agent-ID as the primary identity primitive and decouples Trust
Tier 1 verification from DNS as a sole requirement. A canonical Agent-ID
is derived from the agent's Birth Certificate hash and is authoritative
in every AGTP protocol operation. Three equivalent verification paths are
recognized for Trust Tier 1: DNS-anchored verification via RFC 8555 ACME
challenge, log-anchored verification via Birth Certificate inclusion in an
append-only transparency log aligned with RFC 9162 and RFC 9943 (SCITT),
and hybrid verification combining DNS control with blockchain address
ownership. The <tt>.agent</tt> and <tt>.nomo</tt> hierarchical namespaces are reinstated
as agent-native resolution aliases with deterministic disambiguation rules
governing coexistence with Web3 naming systems. Version 04 introduced
normative integration hooks for the AGTP Merchant Identity and Agentic
Commerce Binding specification <xref target="AGTP-MERCHANT"/>, which defines the
merchant-side identity model that complements AGTP's agent-side
identity model. Version 04 added four merchant-related request headers
(Merchant-ID, Merchant-Manifest-Fingerprint, Intent-Assertion, Cart-
Digest), the 455 Counterparty Unverified status code, and the
<tt>merchant</tt> and <tt>intent</tt> Authority-Scope domains. Together these
elements close the verification loop between the initiating agent and
the receiving merchant on AGTP PURCHASE invocations. Version 03
introduced normative integration with the Agentic Grammar and Interface
Specification (AGIS) <xref target="AGIS"/>, which defines the grammar-based
validation pathway for AGTP method identifiers. AGIS-conformant methods
are accepted at the transport layer via the Method-Grammar header
without requiring prior IANA registration, enabling organizations to
define domain-specific Agentive API vocabularies while preserving
interoperability through shared grammatical constraints. AGTP provides
agent-native intent methods (QUERY, SUMMARIZE, BOOK, SCHEDULE, LEARN,
DELEGATE, COLLABORATE, CONFIRM, ESCALATE, NOTIFY, DESCRIBE, SUSPEND),
protocol-level agent identity and authority headers, and a status code
vocabulary designed for the conditions AI agent systems encounter. AGTP
SHOULD prefer QUIC for new implementations and MUST support TCP/TLS for
compatibility and fallback. It is designed to be composable with existing
agent frameworks, not to replace them. Version 02 introduces capability
discovery (DESCRIBE), resource budget signaling and enforcement, optional
RATS-aligned execution attestation, observability hooks, network zone
isolation, session suspension as a method, and normative composition
profiles with AGMP (Agent Group Messaging Protocols). Version 02 enables
dynamic capability negotiation and resource-aware governance.</t>
    </abstract>
  </front>
  <middle>
    <?line 188?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><strong>Note Regarding Intellectual Property:</strong>  Implementers should be
aware that extensions and certain mechanisms referenced in this
document -- including the Agent Certificate extension (Section 7.2),
the ACTIVATE method, the Agent Birth Certificate mechanism
(Section 5.7), and the <tt>.agent</tt> and <tt>.nomo</tt> file format
specifications (Section 2) -- may be subject to pending patent
applications by the author.  The core AGTP specification is intended
for open implementation without royalty obligation.  The licensor is
prepared to grant a royalty-free license to implementers consistent
with <xref target="RFC8179"/>.  IPR disclosures:
https://datatracker.ietf.org/ipr/ -- see also Section 7.7.</t>
      <section anchor="background">
        <name>Background</name>
        <t>The deployment of AI agents and multi-agent systems is accelerating
across enterprise, research, and consumer contexts. These systems execute
complex, multi-step workflows, querying data sources, booking resources,
delegating subtasks to peer agents, and escalating decisions to human
principals, with minimal or no human supervision per transaction.</t>
        <t>Unlike human-initiated web traffic, agent-generated traffic is dynamic,
high-frequency, intent-driven, and often stateful across sequences of
related requests. The infrastructure carrying this traffic was not
designed with these properties in mind.</t>
      </section>
      <section anchor="limitations-of-http-for-agent-traffic">
        <name>Limitations of HTTP for Agent Traffic</name>
        <t>HTTP has served as the internet's primary application-layer transport for
over three decades. Its evolution through HTTP/2 <xref target="RFC7540"/> and HTTP/3
<xref target="RFC9114"/> has improved performance, multiplexing, and latency. However,
the fundamental model of HTTP being stateless, resource-oriented,
human-initiated request/response, creates specific failures when applied
to agentic systems at scale:</t>
        <ul spacing="normal">
          <li>
            <t>Traffic indistinguishability: Agent-generated requests are structurally
identical to human-initiated requests at the transport layer. Operators
cannot identify, route, or govern agent traffic without application-layer
instrumentation.</t>
          </li>
          <li>
            <t>Method vocabulary mismatch: HTTP's method set (GET, POST, PUT, DELETE,
PATCH) describes resource operations. Agent traffic expresses purposeful
intent, summarize, book, delegate, escalate. The mismatch forces intent
into request bodies, invisible to protocol-level handlers.</t>
          </li>
          <li>
            <t>Identity and attribution absence: HTTP carries no native mechanism for
asserting agent identity, declared authority scope, or the principal
accountable for an agent's actions.</t>
          </li>
          <li>
            <t>Session semantics mismatch: HTTP's stateless model is optimized for
isolated request/response cycles. Agent workflows are inherently stateful
sequences.</t>
          </li>
        </ul>
      </section>
      <section anchor="why-not-evolve-http">
        <name>Why Not Evolve HTTP?</name>
        <t>A natural question is whether these limitations could be addressed by
extending HTTP rather than defining a new protocol. There are three
specific reasons why HTTP extension is not the preferred path.</t>
        <t>First, the HTTP method registry is effectively frozen for new semantics.
<xref target="RFC9110"/> defines the HTTP method registry with IETF Review as the
registration procedure, meaning new methods require a full IETF consensus
process and must be backward-compatible with existing HTTP implementations.
Adding intent-based verbs (SUMMARIZE, DELEGATE, ESCALATE) to HTTP would
require every HTTP client, server, proxy, and middleware component to ignore
or handle unknown methods gracefully, a compatibility constraint that limits
how agent-specific semantics can be expressed at the protocol level.</t>
        <t>Second, HTTP carries decades of backward-compatibility constraints. Features
such as persistent agent identity headers, authority scope declarations, and
session-level governance semantics would require HTTP extensions that interact
unpredictably with existing caching, proxy, and CDN behavior designed for
human-generated traffic patterns.</t>
        <t>Third, the observability goal making agent traffic distinguishable from
human traffic at the infrastructure layer cannot be achieved by adding
fields to HTTP. Infrastructure components route and filter HTTP traffic
based on methods and headers that are identical across agent and human
requests. A protocol-level separation is necessary to give infrastructure
the signal it needs.</t>
        <t>AGTP is therefore designed as a dedicated protocol rather than an HTTP
extension. HTTP and AGTP coexist: human traffic continues to flow over
HTTP; agent traffic flows over AGTP. The two protocols serve different
classes of network participant.</t>
        <t>Note: The abbreviation AGTP is used in this document to distinguish
the Agent Transfer Protocol from the Authenticated Transfer Protocol
(ATP) working group currently chartered within the IETF. The URI
agtp:// is proposed for IANA registration as a new and distinct scheme.</t>
      </section>
      <section anchor="motivation-for-a-dedicated-protocol">
        <name>Motivation for a Dedicated Protocol</name>
        <t>These limitations are architectural, not implementational. They cannot be
resolved by better middleware or application code layered on HTTP. They
require a protocol designed from first principles for AI agent systems.</t>
        <t>AGTP is that protocol. It provides a dedicated transport environment for
agent traffic with: native intent-based methods, mandatory agent identity
headers, protocol-level authority scope declaration, and a status code
vocabulary for the conditions AI systems encounter.</t>
      </section>
      <section anchor="scope-and-target-audience">
        <name>Scope and Target Audience</name>
        <t>This document covers AGTP architecture, design principles, stack position,
request and response header format, agent-native method definitions and
semantics, status code vocabulary, security considerations, and IANA
considerations.</t>
        <t>The Agent Certificate extension for cryptographic binding of agent
identity to AGTP header fields is described at a high level in Section 7.2.
Full specification is provided in a separate companion document:
<xref target="AGTP-CERT"/>. That extension may be subject to pending intellectual
property claims; see Section 7.7 and the IPR Notice preceding the Abstract.</t>
        <t>Merchant-side identity verification for PURCHASE counterparties is
described at a high level in Section 8 of this document and specified
in full in a separate companion: <xref target="AGTP-MERCHANT"/>. This document
registers the merchant-related request headers, the 455 Counterparty
Unverified status code, and the <tt>merchant</tt> and <tt>intent</tt> Authority-Scope
domains; the Merchant Manifest Document, Merchant Birth Certificate,
counterparty verification procedure, and Intent Assertion JWT format
are specified in the companion.</t>
        <t>Target audience: AI agent developers, protocol designers, cloud and network
infrastructure providers, enterprise security and compliance architects, and
standards community participants.</t>
      </section>
      <section anchor="agtp-as-the-transport-foundation-for-agent-group-messaging-protocols">
        <name>AGTP as the Transport Foundation for Agent Group Messaging Protocols</name>
        <t>AGTP is the purpose-built transport and governance layer for Agent Group
Messaging Protocols (AGMPs): the category of higher-layer AI agent messaging
standards that includes the Model Context Protocol (MCP) <xref target="MCP"/>, the
Agent-to-Agent Protocol (A2A) <xref target="A2A"/>, the Agent Communication Protocol
(ACP) <xref target="ACP"/>, and emerging others.</t>
        <t>AGMPs define what agents say. AGTP defines how those messages move, who
sent them, and under what authority. AGTP provides the narrow-waist
foundation that AGMPs inherit without modification: intent-native methods,
mandatory agent identity and scoping, resource budget enforcement,
observability hooks, and normative composition profiles. A deployment
running any AGMP over AGTP gains transport-level governance without changes
to the messaging layer.</t>
        <t>The AGMP category term is introduced in this document to provide a stable
collective reference for the class of protocols that AGTP serves as
substrate. It is not a formal IETF term of art; it is a descriptive
classification. Individual AGMP specifications retain their own names and
development paths. AGTP does not govern, modify, or supersede any AGMP.</t>
        <figure anchor="agmp-stack">
          <name>AGTP as Substrate for AGMPs</name>
          <artwork><![CDATA[
+-----------------------------------------------------+
|            Agent Application Logic                  |
+-----------------------------------------------------+
|  AGMP Layer: MCP / A2A / ACP / ANP  [optional]      |
+-----------------------------------------------------+
|   AGTP - Agent Transfer Protocol      [this spec]    |
+-----------------------------------------------------+
|            TLS 1.3+                  [mandatory]    |
+-----------------------------------------------------+
|         TCP / QUIC / UDP                            |
+-----------------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<strong>MUST</strong>", "<strong>MUST NOT</strong>", "<strong>REQUIRED</strong>", "<strong>SHALL</strong>",
"<strong>SHALL NOT</strong>", "<strong>SHOULD</strong>", "<strong>SHOULD NOT</strong>", "<strong>RECOMMENDED</strong>",
"<strong>NOT RECOMMENDED</strong>", "<strong>MAY</strong>", and "<strong>OPTIONAL</strong>" in this document
are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when,
and only when, they appear in all capitals.</t>
      <dl>
        <dt>Agent:</dt>
        <dd>
          <t>An AI software system that executes tasks, makes decisions, and takes
actions without continuous human supervision per transaction.</t>
        </dd>
        <dt>Principal:</dt>
        <dd>
          <t>The human, organization, or system that authorized an agent to act and
is accountable for its actions.</t>
        </dd>
        <dt>Agent-ID:</dt>
        <dd>
          <t>A unique identifier for a specific agent instance, present in all AGTP
request headers.</t>
        </dd>
        <dt>Principal-ID:</dt>
        <dd>
          <t>The identifier of the principal on whose behalf an agent operates.</t>
        </dd>
        <dt>Authority-Scope:</dt>
        <dd>
          <t>A declared set of permissions defining what actions an agent is
authorized to take, in the format domain:action or domain:*.</t>
        </dd>
        <dt>Intent Method:</dt>
        <dd>
          <t>An AGTP method name expressing the agent's purpose, as distinguished from
HTTP resource-operation verbs.</t>
        </dd>
        <dt>Delegation Chain:</dt>
        <dd>
          <t>An ordered record of Agent-IDs representing the sequence of delegations
that produced the current request.</t>
        </dd>
        <dt>Escalation:</dt>
        <dd>
          <t>An agent's intentional deferral of a decision or action to a human
principal or higher-authority agent.</t>
        </dd>
        <dt>Attribution Record:</dt>
        <dd>
          <t>A logged record of an agent action sufficient for audit and compliance
purposes.</t>
        </dd>
        <dt>Session:</dt>
        <dd>
          <t>An AGTP persistent connection context shared across multiple method
invocations within a single agent workflow.</t>
        </dd>
        <dt>SEP (Scope-Enforcement Point):</dt>
        <dd>
          <t>An AGTP-aware infrastructure component, load balancer, gateway, and proxy,
that enforces Authority-Scope compliance without application-layer access.
Requires the Agent Certificate extension (<xref target="AGTP-CERT"/>).</t>
        </dd>
        <dt>Agent Package (.agent):</dt>
        <dd>
          <t>A portable, open deployment artifact for an AI agent. An <tt>.agent</tt> file
contains an embedded Agent Manifest, an integrity hash covering all
package contents, and a behavioral trust score computed at packaging
time. The <tt>.agent</tt> format is an open specification. It is analogous to
a container image: a self-describing, portable unit of deployment. The
<tt>.agent</tt> suffix is a file format designator and <strong>MUST NOT</strong> appear as
a hostname component or top-level label in <tt>agtp://</tt> URIs. Note: the
<tt>.agent</tt> file format specification may be subject to pending patent
claims by the author; see Section 7.7.</t>
        </dd>
        <dt>Governed Agent Package (.nomo):</dt>
        <dd>
          <t>A deployment artifact in the <tt>.nomo</tt> format, which extends the <tt>.agent</tt>
format with a CA-signed certificate chain binding the package to a
verified governance zone and issuing principal. The <tt>.nomo</tt> format is
to <tt>.agent</tt> as HTTPS is to HTTP: the same structural foundation with
an added layer of cryptographic trust. A <tt>.nomo</tt> package is required
for agents operating at Trust Tier 1 (see Section 5.2). The <tt>.nomo</tt>
suffix is a file format designator and <strong>MUST NOT</strong> appear as a
hostname component in <tt>agtp://</tt> URIs.
</t>
          <t>The name derives from the Greek <em>nomos</em> (νόμος), meaning law, rule,
or governance, the same root that underlies <em>autonomy</em> (self-law),
<em>nomocracy</em> (rule of law), and <em>onomastics</em>. A <tt>.nomo</tt> package is
literally an agent operating under law: its behavior is bounded by a
cryptographically enforced governance context at the packaging layer.
Note: the <tt>.nomo</tt> file format specification may be subject to pending
patent claims by the author; see Section 7.7.</t>
        </dd>
        <dt>Agent Transfer Document (.agtp):</dt>
        <dd>
          <t>The wire-level manifest document format defined by this specification.
An <tt>.agtp</tt> document is a signed JSON structure containing the fields
defined in Section 5.5 (Agent Manifest Document). It is the output
format returned by all AGTP URI resolution requests. Both <tt>.agent</tt> and
<tt>.nomo</tt> packages produce <tt>.agtp</tt> documents when queried; the <tt>.agtp</tt>
format is the protocol's canonical representation of agent identity
and is independent of the underlying packaging format. The <tt>.agtp</tt>
suffix <strong>MAY</strong> appear in filenames for stored manifest documents but
<strong>MUST NOT</strong> appear in <tt>agtp://</tt> URIs. The Content-Type for <tt>.agtp</tt>
documents is <tt>application/agtp+json</tt>.</t>
        </dd>
        <dt>URI (AGTP):</dt>
        <dd>
          <t>An <tt>agtp://</tt> scheme URI that identifies an agent or agent namespace.
AGTP URIs are addresses, not filenames. File extensions (<tt>.agent</tt>,
<tt>.nomo</tt>, <tt>.agtp</tt>) <strong>MUST NOT</strong> appear in canonical AGTP URIs. See
Section 5.1 for the canonical URI forms and resolution semantics.</t>
        </dd>
        <dt>Agent Namespace Document:</dt>
        <dd>
          <t>A cryptographically signed <tt>application/agtp+json</tt> document returned
in response to a request targeting an organization's agent registry
root (e.g., <tt>agtp://acme.tld/agents</tt>). Lists all Active agents
registered under the organization's governance zone. The document is
generated and re-signed by the governance platform on any registry
change. It is not a manually editable file. See Section 5.4.</t>
        </dd>
        <dt>Agent Manifest Document:</dt>
        <dd>
          <t>A cryptographically signed <tt>application/agtp+json</tt> document returned
in response to a request targeting a specific agent
(e.g., <tt>agtp://acme.tld/agents/customer-service</tt>). Contains the
agent's birth certificate fields, lifecycle state, behavioral trust
score, authority scope categories, supported methods, and governance
zone. Derived directly from the agent's <tt>.agent</tt> or <tt>.nomo</tt> package;
the package integrity hash is verified before the manifest is served.
See Section 5.5.</t>
        </dd>
        <dt>Agent Birth Certificate:</dt>
        <dd>
          <t>A cryptographically signed identity document issued to an agent at
registration time by a governance platform. The Birth Certificate is
the genesis record of an agent's existence: it establishes the agent's
identity, ownership, authorized scope, behavioral archetype, and
governance zone before the agent takes any action. Authority is issued
through the Birth Certificate; it is never self-assumed.
</t>
          <t>The Birth Certificate is the source document from which the Agent
Manifest Document (Section 5.5) is derived when an AGTP URI is
resolved. The <tt>certificate_hash</tt> field of the Birth Certificate is
the basis for the agent's canonical Agent-ID. In this sense the Birth
Certificate functions as the agent's social security number: issued
once at creation, permanently bound to the individual, and the
authoritative identity record from which all other identity
representations derive.</t>
          <t>Birth Certificate fields map directly to AGTP protocol headers:
<tt>agent_id</tt> maps to the <tt>Agent-ID</tt> header; <tt>owner</tt> maps to the
<tt>Principal-ID</tt> header; <tt>scope</tt> maps to the <tt>Authority-Scope</tt> header.
See Section 5.7.</t>
          <t>Anonymous agents are ungovernable. Without a Birth Certificate, there
is no mechanism to trace decisions to a responsible principal, enforce
scope boundaries, or maintain a meaningful audit trail. Note: the
Agent Birth Certificate mechanism may be subject to pending patent
claims by the author; see Section 7.7.</t>
        </dd>
        <dt>Governance Token:</dt>
        <dd>
          <t>A signed, time-limited JWT artifact issued by a governance runtime
that encodes a specific governance decision for a specific action.
Governance tokens are the runtime companion to the static Birth
Certificate: where the Birth Certificate establishes persistent
identity, the Governance Token carries a bounded authorization for a
single action or session. Tokens carry the governance verdict
(ALLOW, DENY), the agent ID, action details, trust score dimensions,
issuer identity, and expiry. Default TTL: 30 seconds. Tokens
<strong>MUST NOT</strong> be reused across actions; each action requires a fresh
evaluation and a fresh token.</t>
        </dd>
        <dt>Trust Tier:</dt>
        <dd>
          <t>A classification assigned to an agent based on the strength of
identity verification backing its registration. Tier 1 (Verified):
org anchor is a real DNS domain with confirmed ownership and a <tt>.nomo</tt>
governed package. Tier 2 (Org-Asserted): org label is present but
DNS ownership is unverified; <tt>.agent</tt> package acceptable. Tier 3
(Experimental): X- prefix required; not discoverable through the
public AGTP registry. See Section 5.2.</t>
        </dd>
        <dt>AGMP (Agent Group Messaging Protocol):</dt>
        <dd>
          <t>The collective term for higher-layer AI agent messaging standards
that operate over AGTP as their transport substrate, including
MCP <xref target="MCP"/>, A2A <xref target="A2A"/>, ACP <xref target="ACP"/>, and ANP <xref target="ANP"/>. AGMPs
define what agents say to each other. AGTP defines how those
messages move. The term is introduced in this document as a
descriptive classification; it is not a formal IETF term of art.</t>
        </dd>
        <dt>DESCRIBE:</dt>
        <dd>
          <t>An AGTP Tier 1 core method that returns the declared capabilities,
supported modalities, method vocabulary, and versioned feature set
of a specific agent endpoint. Distinguished from URI resolution
(which returns identity) by returning operational capability
metadata suitable for pre-task negotiation. If the
<tt>capability_domains</tt> parameter is omitted, the server <strong>SHOULD</strong>
return all supported domains. Category: ACQUIRE.</t>
        </dd>
        <dt>SUSPEND (method):</dt>
        <dd>
          <t>An AGTP Tier 1 core method that places a specific active session
workflow into a recoverable paused state, issuing a resumption
nonce for re-entry. Distinguished from the lifecycle SUSPEND event
(Section 6.7.6): method-level SUSPEND is session-scoped and does
not affect the agent's registry lifecycle state or Birth Certificate
validity. Category: ORCHESTRATE.</t>
        </dd>
        <dt>Budget-Limit:</dt>
        <dd>
          <t>A request header declaring the maximum resource consumption the
principal authorizes for a method invocation, expressed as
space-separated unit:value tokens drawn from the IANA AGTP Budget
Unit Registry. Example: <tt>Budget-Limit: tokens=5000
compute-seconds=120 financial=10.00USD ttl=3600</tt>. Exceeding the
declared limit <strong>MUST</strong> cause the server to return 452 Budget
Exceeded rather than continue execution. Note: ttl= is RECOMMENDED 
to bound budget lifetime.</t>
        </dd>
        <dt>AGTP-Zone-ID:</dt>
        <dd>
          <t>A request header declaring the network zone or organizational
boundary within which a request must be processed. Scope-Enforcement
Points (SEPs) <strong>MUST</strong> enforce zone boundaries and <strong>MUST</strong> return
453 Zone Violation if a DELEGATE or COLLABORATE request would route
outside the declared zone.</t>
        </dd>
      </dl>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>AGTP is motivated by three distinct, compounding failures in how current
internet infrastructure handles AI agent traffic.</t>
      <section anchor="problem-1-undifferentiated-agent-traffic-on-http">
        <name>Problem 1: Undifferentiated Agent Traffic on HTTP</name>
        <t>AI agents generate intent-driven, structured traffic that is functionally
invisible to the infrastructure it traverses. This traffic flows through
HTTP alongside human traffic with no protocol-level differentiation.
Observability failure, routing inefficiency, and security blindness result,
operators cannot determine what fraction of traffic is agent-generated
without application-layer instrumentation that is expensive, inconsistent,
and easy to circumvent.</t>
        <t>AGTP response: a dedicated protocol environment for agent traffic.
Infrastructure can distinguish, route, monitor, and govern agent traffic
natively.</t>
      </section>
      <section anchor="problem-2-semantic-mismatch-between-agent-intent-and-available-methods">
        <name>Problem 2: Semantic Mismatch Between Agent Intent and Available Methods</name>
        <t>AI agents operate on intent. HTTP's method vocabulary was designed to
describe operations on resources, not purposeful action. When an agent
intends to SUMMARIZE a document, BOOK a resource, and SCHEDULE a sequence,
all three arrive as POST requests. The server receives identical verbs
with meaningfully different intent buried in request bodies, invisible to
any protocol-level handler.</t>
        <t>AGTP response: a vocabulary of agent-native methods that express intent at
the protocol level.</t>
      </section>
      <section anchor="problem-3-no-protocol-level-identity-authority-or-attribution-for-agents">
        <name>Problem 3: No Protocol-Level Identity, Authority, or Attribution for Agents</name>
        <t>When an AI agent takes an action, there is currently no protocol-level
mechanism to verify who authorized this agent, what scope of authority it
holds, which principal is accountable for its actions, or whether it is
the agent it claims to be. Accountability gaps, authority laundering,
auditability failure, and multi-agent trust collapse result.</t>
        <t>AGTP response: agent identity and authority scope embedded in protocol
headers on every request, with an optional Agent Certificate extension for
cryptographic verification.</t>
      </section>
      <section anchor="problem-summary">
        <name>Problem Summary</name>
        <table>
          <name>Summary of Problems Addressed by AGTP</name>
          <thead>
            <tr>
              <th align="left">#</th>
              <th align="left">Problem</th>
              <th align="left">Current Failure</th>
              <th align="left">AGTP Response</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">Undifferentiated traffic</td>
              <td align="left">HTTP cannot separate agent traffic</td>
              <td align="left">Dedicated protocol environment</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">Semantic mismatch</td>
              <td align="left">HTTP verbs obscure agent intent</td>
              <td align="left">Native intent-based method vocabulary</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">No protocol-level identity</td>
              <td align="left">Attribution is untraceable</td>
              <td align="left">Agent identity and scope in headers</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="related-work-and-existing-approaches">
      <name>Related Work and Existing Approaches</name>
      <section anchor="httprest-as-the-de-facto-standard">
        <name>HTTP/REST as the De Facto Standard</name>
        <t>HTTP remains the universal transport for all agent traffic currently
deployed. REST conventions layered on HTTP provide a degree of semantic
structure, but REST remains a resource-manipulation paradigm. As described
in Section 1.3, evolving HTTP to address agent-specific needs is
constrained by the frozen method registry, backward-compatibility
requirements, and the impossibility of achieving infrastructure-level
traffic differentiation through HTTP extensions alone.</t>
      </section>
      <section anchor="existing-agent-group-messaging-protocols">
        <name>Existing Agent Group Messaging Protocols</name>
        <dl>
          <dt>MCP <xref target="MCP"/> (Model Context Protocol, Anthropic):</dt>
          <dd>
            <t>Defines structured communication between AI models and tools/resources.
Runs over HTTP. Addresses tool-calling semantics, not agent traffic
transport.</t>
          </dd>
          <dt>ACP <xref target="ACP"/> (Agent Communication Protocol, IBM):</dt>
          <dd>
            <t>Defines messaging semantics for agent-to-agent communication. Runs over
HTTP.</t>
          </dd>
          <dt>A2A <xref target="A2A"/> (Agent-to-Agent Protocol, Linux Foundation):</dt>
          <dd>
            <t>Defines inter-agent communication and task delegation semantics. Runs
over HTTP.</t>
          </dd>
          <dt>ANP <xref target="ANP"/> (Agent Network Protocol):</dt>
          <dd>
            <t>Defines discovery and communication for networked agents. Runs over HTTP.</t>
          </dd>
        </dl>
        <t>All of these are messaging protocols. They define what agents say to each
other. They do not define how agent traffic moves across a network. Each
presupposes HTTP as its transport and inherits all of HTTP's limitations
for agentic systems.</t>
      </section>
      <section anchor="transport-layer-alternatives">
        <name>Transport-Layer Alternatives</name>
        <dl>
          <dt>gRPC:</dt>
          <dd>
            <t>High-performance RPC over HTTP/2. Strong typing and efficient
serialization. Does not address agent-specific semantics, identity, or
authority.</t>
          </dd>
          <dt>WebSockets:</dt>
          <dd>
            <t>Persistent bidirectional connections over HTTP. Useful for real-time
communication but does not address method semantics or identity.</t>
          </dd>
          <dt>QUIC <xref target="RFC9000"/>:</dt>
          <dd>
            <t>Modern multiplexed transport with reduced connection overhead. AGTP
<strong>SHOULD</strong> prefer QUIC for new implementations. QUIC is a transport
primitive; AGTP is the application-layer protocol above it.</t>
          </dd>
        </dl>
      </section>
      <section anchor="the-critical-distinction-messaging-vs-transport">
        <name>The Critical Distinction: Messaging vs. Transport</name>
        <t>The most important positioning principle for AGTP is the distinction between
messaging protocols and transport protocols. MCP, ACP, A2A, and ANP are
messaging protocols, they define what agents say. AGTP defines how agent
traffic moves.</t>
        <t>An analogy: SMTP is a messaging protocol that runs over TCP. SMTP does not
replace TCP. Saying "TCP is unnecessary because SMTP exists" is a category
error. The same logic applies here. MCP and its peers define agent messaging
semantics. AGTP defines the transport environment those messages move through.</t>
      </section>
      <section anchor="agtp-positioning-the-proposed-stack">
        <name>AGTP Positioning: The Proposed Stack</name>
        <figure anchor="protocol-stack">
          <name>AGTP in the Protocol Stack</name>
          <artwork><![CDATA[
+-----------------------------------------------------+
|            Agent Application Logic                  |
+-----------------------------------------------------+
|  Messaging Layer  (MCP / ACP / A2A)  [optional]     |
+-----------------------------------------------------+
|   AGTP - Agent Transfer Protocol     [this spec]    |
+-----------------------------------------------------+
|            TLS 1.3+                  [mandatory]    |
+-----------------------------------------------------+
|         TCP / QUIC / UDP                            |
+-----------------------------------------------------+
]]></artwork>
        </figure>
        <t>AGTP is not a replacement for messaging protocols. Agents using MCP or A2A
route those messages over AGTP and gain transport-level observability and
identity without modifying the messaging layer. AGTP-native agents that do
not use a separate messaging protocol interact with AGTP methods directly.</t>
      </section>
    </section>
    <section anchor="protocol-overview">
      <name>Protocol Overview</name>
      <section anchor="stack-position">
        <name>Stack Position</name>
        <t>AGTP is an application-layer protocol. It operates above the transport
layer (TCP, UDP, or QUIC) and is wrapped by TLS. It sits below any agent
messaging protocol in deployments that use one.</t>
        <ul spacing="normal">
          <li>
            <t><strong>SHOULD</strong> prefer QUIC <xref target="RFC9000"/> <xref target="RFC9001"/> for new deployments (lower latency,
multiplexing without head-of-line blocking, 0-RTT connection
establishment).</t>
          </li>
          <li>
            <t><strong>MUST</strong> support TCP/TLS as a fallback for compatibility with existing
infrastructure.</t>
          </li>
          <li>
            <t><strong>MAY</strong> run over UDP where QUIC is not available, subject to
implementor-defined reliability guarantees.</t>
          </li>
        </ul>
        <t>Suggested port assignment (subject to IANA assignment. See Section 8):</t>
        <ul spacing="normal">
          <li>
            <t>AGTP/QUIC: port 8443 (proposed)</t>
          </li>
          <li>
            <t>AGTP/TCP+TLS: port 8080 (proposed)</t>
          </li>
        </ul>
      </section>
      <section anchor="design-principles">
        <name>Design Principles</name>
        <dl>
          <dt>Minimalist core:</dt>
          <dd>
            <t>The base spec defines only what is necessary for agent traffic
differentiation, method semantics, and identity headers. Extensions
belong in companion specifications.</t>
          </dd>
          <dt>Extensible by design:</dt>
          <dd>
            <t>New methods are registered through an IANA-managed Method Registry.
New header fields follow a defined extension convention. Additive
changes do not require a version increment.</t>
          </dd>
          <dt>Agent-native:</dt>
          <dd>
            <t>Every design decision assumes the initiating party is an AI system,
not a human.</t>
          </dd>
          <dt>Secure by default:</dt>
          <dd>
            <t>TLS 1.3 or higher is mandatory. Unencrypted AGTP connections <strong>MUST</strong>
be rejected. Agent identity headers are present on every request.</t>
          </dd>
          <dt>Observable by design:</dt>
          <dd>
            <t>Native metadata in every AGTP header provides the minimum information
needed for routing, monitoring, and audit without application-layer
instrumentation.</t>
          </dd>
          <dt>Composable:</dt>
          <dd>
            <t>AGTP works alongside existing agent messaging protocols without requiring
modification to those protocols.</t>
          </dd>
        </dl>
      </section>
      <section anchor="connection-model">
        <name>Connection Model</name>
        <t>AGTP uses a persistent session model by default, reflecting the reality that
agents typically execute multi-step workflows rather than isolated single
requests. An AGTP session is established with a single TLS handshake
including agent identity assertion, persists across multiple method
exchanges, carries a Session-ID header identifying the agent's task
context, and terminates on explicit session close or inactivity timeout
(RECOMMENDED minimum: 60 seconds).</t>
        <t>Per-request (stateless) mode is supported for constrained environments.
In stateless mode, agent identity headers <strong>MUST</strong> be present on every
individual request.</t>
      </section>
      <section anchor="header-format">
        <name>Header Format</name>
        <section anchor="request-headers">
          <name>Request Headers</name>
          <table>
            <name>AGTP Request Header Fields</name>
            <thead>
              <tr>
                <th align="left">Field</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">AGTP-Version</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Protocol version. Current: AGTP/1.0</td>
              </tr>
              <tr>
                <td align="left">AGTP-Method</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The agent intent method (see Section 6)</td>
              </tr>
              <tr>
                <td align="left">Agent-ID</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Opaque identifier for the requesting agent instance</td>
              </tr>
              <tr>
                <td align="left">Principal-ID</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Identifier of the human or system that authorized this agent</td>
              </tr>
              <tr>
                <td align="left">Authority-Scope</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Declared scope of actions this agent is authorized to take</td>
              </tr>
              <tr>
                <td align="left">Session-ID</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Identifies the current task/workflow context</td>
              </tr>
              <tr>
                <td align="left">Task-ID</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Unique identifier for this specific method invocation</td>
              </tr>
              <tr>
                <td align="left">Delegation-Chain</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Ordered list of Agent-IDs if this request was delegated</td>
              </tr>
              <tr>
                <td align="left">Priority</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Request priority hint: critical, normal, background</td>
              </tr>
              <tr>
                <td align="left">TTL</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Maximum acceptable response latency in milliseconds</td>
              </tr>
              <tr>
                <td align="left">Budget-Limit</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Max resource budget per invocation. Format: space-separated <tt>unit=value</tt> tokens. Units from IANA AGTP Budget Unit Registry.</td>
              </tr>
              <tr>
                <td align="left">AGTP-Zone-ID</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Network zone boundary constraint. SEPs <strong>MUST</strong> enforce; return 453 if DELEGATE or COLLABORATE would exit declared zone.</td>
              </tr>
              <tr>
                <td align="left">Content-Schema</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">URI reference to JSON Schema describing the request body structure. Enables receivers to validate payload without LLM inference.</td>
              </tr>
              <tr>
                <td align="left">Telemetry-Export</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">OTLP endpoint URI for metric export, or <tt>inline</tt> to receive metrics embedded in the response Attribution-Record.</td>
              </tr>
              <tr>
                <td align="left">Merchant-ID</td>
                <td align="left">
                  <strong>MUST</strong> on PURCHASE</td>
                <td align="left">Canonical identifier of the intended merchant counterparty. See <xref target="AGTP-MERCHANT"/>.</td>
              </tr>
              <tr>
                <td align="left">Merchant-Manifest-Fingerprint</td>
                <td align="left">
                  <strong>MUST</strong> on PURCHASE</td>
                <td align="left">SHA-256 fingerprint of the Merchant Manifest Document verified by the requesting agent. Receiving server <strong>MUST</strong> reject with 455 if this does not match its current manifest. See <xref target="AGTP-MERCHANT"/>.</td>
              </tr>
              <tr>
                <td align="left">Intent-Assertion</td>
                <td align="left">
                  <strong>SHOULD</strong> on PURCHASE</td>
                <td align="left">Detached JWT <xref target="RFC7519"/> carrying signed principal-authorized purchase intent. Forwardable to payment networks as standalone evidence. See <xref target="AGTP-MERCHANT"/>.</td>
              </tr>
              <tr>
                <td align="left">Cart-Digest</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Cryptographic digest of a structured cart returned by a prior QUOTE invocation. Binds a PURCHASE to a previously quoted cart without retransmission of line-item detail. See <xref target="AGTP-MERCHANT"/>.</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="response-headers">
          <name>Response Headers</name>
          <table>
            <name>AGTP Response Header Fields</name>
            <thead>
              <tr>
                <th align="left">Field</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">AGTP-Version</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Protocol version</td>
              </tr>
              <tr>
                <td align="left">AGTP-Status</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Numeric status code (see Section 5.5)</td>
              </tr>
              <tr>
                <td align="left">Task-ID</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Echo of request Task-ID for correlation</td>
              </tr>
              <tr>
                <td align="left">Server-Agent-ID</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Identity of the responding server or agent</td>
              </tr>
              <tr>
                <td align="left">Attribution-Record</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Signed record of the action taken, for audit. <strong>MAY</strong> include RATS attestation evidence and inline telemetry when Telemetry-Export is set to <tt>inline</tt>.</td>
              </tr>
              <tr>
                <td align="left">Continuation-Token</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Token for retrieving additional results in streaming contexts</td>
              </tr>
              <tr>
                <td align="left">Supported-Methods</td>
                <td align="left">
                  <strong>SHOULD</strong> (on session open)</td>
                <td align="left">List of AGTP methods supported by this server</td>
              </tr>
              <tr>
                <td align="left">Cost-Estimate</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Estimated resource consumption in Budget-Limit unit format. Returned by QUOTE; <strong>MAY</strong> appear on any response as an informational signal.</td>
              </tr>
              <tr>
                <td align="left">Attestation-Evidence</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">RATS attestation evidence token or reference URI per <xref target="RFC9334"/>. Format indicated by <tt>attestation_type</tt> in response body: <tt>rats-eat</tt>, <tt>rats-corim</tt>, or <tt>rats-uri</tt>.</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="status-codes">
        <name>Status Codes</name>
        <t>AGTP defines its own status code space. Codes 451, 452, 453, 550, and 551
are AGTP-specific with no HTTP equivalent and are registered in the IANA
AGTP Status Code Registry (see Section 9.3).</t>
        <table>
          <name>AGTP Status Codes</name>
          <thead>
            <tr>
              <th align="left">Code</th>
              <th align="left">Name</th>
              <th align="left">Meaning</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">200</td>
              <td align="left">OK</td>
              <td align="left">Method executed successfully</td>
            </tr>
            <tr>
              <td align="left">202</td>
              <td align="left">Accepted</td>
              <td align="left">Method accepted; execution is asynchronous</td>
            </tr>
            <tr>
              <td align="left">204</td>
              <td align="left">No Content</td>
              <td align="left">Method executed; no response body</td>
            </tr>
            <tr>
              <td align="left">400</td>
              <td align="left">Bad Request</td>
              <td align="left">Malformed AGTP request</td>
            </tr>
            <tr>
              <td align="left">401</td>
              <td align="left">Unauthorized</td>
              <td align="left">Agent-ID not recognized or not authenticated</td>
            </tr>
            <tr>
              <td align="left">403</td>
              <td align="left">Forbidden</td>
              <td align="left">Agent lacks authority for requested action per Authority-Scope</td>
            </tr>
            <tr>
              <td align="left">404</td>
              <td align="left">Not Found</td>
              <td align="left">Target resource or agent not found</td>
            </tr>
            <tr>
              <td align="left">408</td>
              <td align="left">Timeout</td>
              <td align="left">TTL exceeded before method could execute</td>
            </tr>
            <tr>
              <td align="left">409</td>
              <td align="left">Conflict</td>
              <td align="left">Method conflicts with current state (e.g., BOOK on unavailable resource)</td>
            </tr>
            <tr>
              <td align="left">410</td>
              <td align="left">Gone</td>
              <td align="left">Agent has been Revoked or Deprecated; canonical ID is permanently retired</td>
            </tr>
            <tr>
              <td align="left">422</td>
              <td align="left">Unprocessable</td>
              <td align="left">Request well-formed but semantically invalid</td>
            </tr>
            <tr>
              <td align="left">429</td>
              <td align="left">Rate Limited</td>
              <td align="left">Agent is exceeding permitted request frequency</td>
            </tr>
            <tr>
              <td align="left">451</td>
              <td align="left">Scope Violation</td>
              <td align="left">Requested action is outside declared Authority-Scope. AGTP-specific</td>
            </tr>
            <tr>
              <td align="left">452</td>
              <td align="left">Budget Exceeded</td>
              <td align="left">Method execution would exceed the Budget-Limit declared in the request. AGTP-specific</td>
            </tr>
            <tr>
              <td align="left">453</td>
              <td align="left">Zone Violation</td>
              <td align="left">Request would route outside the AGTP-Zone-ID boundary. SEP-enforced. AGTP-specific</td>
            </tr>
            <tr>
              <td align="left">455</td>
              <td align="left">Counterparty Unverified</td>
              <td align="left">PURCHASE counterparty failed merchant identity verification: Merchant-ID absent, Merchant-Manifest-Fingerprint mismatch, or merchant in non-Active lifecycle state. AGTP-specific. See <xref target="AGTP-MERCHANT"/>.</td>
            </tr>
            <tr>
              <td align="left">500</td>
              <td align="left">Server Error</td>
              <td align="left">Internal failure in the responding system</td>
            </tr>
            <tr>
              <td align="left">503</td>
              <td align="left">Unavailable</td>
              <td align="left">Responding agent or system temporarily unavailable or Suspended</td>
            </tr>
            <tr>
              <td align="left">550</td>
              <td align="left">Delegation Failure</td>
              <td align="left">A delegated sub-agent failed to complete the requested action. AGTP-specific</td>
            </tr>
            <tr>
              <td align="left">551</td>
              <td align="left">Authority Chain Broken</td>
              <td align="left">Delegation chain contains an unverifiable or broken identity link. AGTP-specific</td>
            </tr>
          </tbody>
        </table>
        <t>Status code 451 (Scope Violation) is a governance signal: the agent
attempted an action outside its declared Authority-Scope, caught at the
protocol level. Status code 452 (Budget Exceeded) is a governance signal
analogous to 451: the agent's requested action is within its Authority-Scope
but would consume resources beyond what the principal authorized for this
invocation. Status code 453 (Zone Violation) is returned by SEPs when a
DELEGATE or COLLABORATE request would route to an agent outside the declared
AGTP-Zone-ID boundary. Status code 455 (Counterparty Unverified) is returned
on PURCHASE invocations when the receiving server cannot verify that the
requesting agent has performed valid merchant identity verification against
the server's current Merchant Manifest Document, or when the merchant is in
a non-Active lifecycle state; see <xref target="AGTP-MERCHANT"/>. Status code 551
(Authority Chain Broken) indicates that one or more Agent-ID entries in the
Delegation-Chain header cannot be verified as part of a valid delegation
sequence. Status code 410 (Gone) is returned when an agent's Birth
Certificate has been revoked or the agent deprecated; the canonical
Agent-ID is permanently retired and <strong>MUST NOT</strong> be retried. All
AGTP-specific status codes are operational signals, not protocol errors,
and <strong>MUST</strong> be logged for audit purposes.</t>
      </section>
      <section anchor="wire-format-and-content-type">
        <name>Wire Format and Content-Type</name>
        <t>AGTP request and response bodies are encoded as JSON. The registered
Content-Type for AGTP message bodies is:</t>
        <artwork><![CDATA[
Content-Type: application/agtp+json
]]></artwork>
        <t>Implementations <strong>MUST</strong> include this Content-Type on all AGTP requests and
responses that carry a message body. Responses with no body (e.g., 204 No
Content) <strong>MUST NOT</strong> include a Content-Type header. Binary or streaming
extensions <strong>MAY</strong> define additional Content-Type values as part of their
companion specifications.</t>
        <t>The common structure for all AGTP request bodies:</t>
        <sourcecode type="json"><![CDATA[
{
  "method": "QUERY",
  "task_id": "task-0042",
  "session_id": "sess-a1b2c3d4",
  "parameters": { },
  "context": { }
}
]]></sourcecode>
        <t>And for all AGTP response bodies:</t>
        <sourcecode type="json"><![CDATA[
{
  "status": 200,
  "task_id": "task-0042",
  "result": { },
  "attribution": { }
}
]]></sourcecode>
      </section>
      <section anchor="early-implementations">
        <name>Early Implementations</name>
        <t>AGTP is a proposed specification. No production implementations exist at
the time of this writing. The author encourages early prototype
implementations to validate the protocol design, identify gaps, and
generate feedback prior to IETF working group submission.</t>
        <ul empty="true">
          <li>
            <t>If you are building an AGTP prototype or reference implementation,
please share your findings via the feedback channel listed on the cover
of this document. A reference implementation in Python and/or Go is
planned as open-source software concurrent with or shortly after IETF
I-D submission. Implementation reports are welcome and will be
incorporated into subsequent draft revisions.</t>
          </li>
        </ul>
        <t>Implementers wishing to experiment before the formal IANA port assignment
may use port 8443 (AGTP/QUIC) and port 8080 (AGTP/TCP+TLS) as working
values. These values are subject to change upon final IANA assignment.</t>
        <t>The ACTIVATE method extension, which binds <tt>.nomo</tt> governed agent packages
to AGTP as a first-class activation operation, is described in a companion
document and is implemented as an optional extension. Core AGTP
implementations need not support ACTIVATE to be compliant with this
specification.</t>
      </section>
    </section>
    <section anchor="agent-identity-uri-structure-and-registration">
      <name>Agent Identity, URI Structure, and Registration</name>
      <section anchor="uri-structure-and-resolution-mechanics">
        <name>URI Structure and Resolution Mechanics</name>
        <section anchor="foundational-principle">
          <name>Foundational Principle</name>
          <t>AGTP identity is agent-first. Every agent is identified by a canonical
Agent-ID: a 256-bit cryptographic identifier derived from the agent's
Birth Certificate hash at ACTIVATE time. The canonical Agent-ID is the
authoritative identifier in every AGTP protocol operation. It appears
in the <tt>Agent-ID</tt> header of every request, is the key in the registry,
and is the cross-layer reference linking the AGTP Agent Certificate
extension to the governance-layer Birth Certificate.</t>
          <t>All other identification forms recognized by AGTP, including domain-
anchored URIs, agent-native hierarchical names, and Web3 resolution
targets, are aliases that resolve to a canonical Agent-ID. In the
event of any conflict between an alias and a canonical Agent-ID, the
canonical Agent-ID <strong>MUST</strong> be treated as authoritative.</t>
          <t>AGTP URIs are addresses, not filenames. File format suffixes
(<tt>.agtp</tt>) <strong>MUST NOT</strong> appear in canonical <tt>agtp://</tt> URIs. A URI
resolves to an Agent Manifest Document or Agent Namespace Document
derived from the underlying package; it does not expose or serve the
package itself.</t>
          <t>Implementations <strong>MUST</strong> treat any URI containing a file extension
in the path as non-canonical and <strong>SHOULD</strong> issue a 301 Moved
Permanently redirect to the canonical form prior to resolution.</t>
          <t>The distinction between <tt>.agent</tt> and <tt>.nomo</tt> as agent-native
hierarchical TLDs (Section 5.1) and their use as file format suffixes
is resolved by position: agent-native TLDs appear in the hostname
position of the URI; file format suffixes appear in the path position
and are prohibited there.</t>
        </section>
        <section anchor="canonical-uri-forms">
          <name>Canonical URI Forms</name>
          <t>AGTP defines the following canonical URI forms. Form 1 is the
authoritative identity form; Forms 2 through 5 are resolution aliases
that <strong>MUST</strong> resolve to the same canonical Agent-ID as Form 1.</t>
          <artwork><![CDATA[
Form 1. Canonical ID (cryptographic, authoritative):
  agtp://[256-bit-hex-id]

Form 2. Agent-native hierarchical (governance-platform resolution):
  agtp://[agent-label].[org-label].agent
  agtp://[agent-label].[department].[org-label].agent
  agtp://[agent-label].[org-label].nomo

Form 3. Domain-anchored (DNS-resolved governance platform):
  agtp://[domain.tld]/agents/[agent-label]

Form 4. Subdomain-anchored (recommended enterprise DNS pattern):
  agtp://agtp.[domain.tld]/agents/[agent-label]

Form 5. Organization namespace root:
  agtp://[org-label].agent
  agtp://[domain.tld]/agents
  agtp://agtp.[domain.tld]/agents
]]></artwork>
          <t>Form 1 resolves to a signed Agent Manifest Document through any
verification path declared in the agent's registry record (Section
5.2). The canonical ID is self-describing: any AGTP-aware
governance platform, transparency log, or resolution service can
return the Manifest Document given the canonical ID alone, without
prior knowledge of which organization, domain, or blockchain the
agent is registered under.</t>
          <t>Form 2 uses the agent-native hierarchical namespace governed by the
AGTP resolution layer rather than by DNS. The <tt>.agent</tt> TLD is
reserved within the AGTP namespace for general-purpose agents; the
<tt>.nomo</tt> TLD is reserved for agents activated under the governed
<tt>.nomo</tt> package format. Resolution of Form 2 URIs follows the
disambiguation rules defined below when the same label is also
present in a Web3 naming system.</t>
          <t>Form 3 and Form 4 use DNS to resolve an org domain to a governance
platform endpoint. These forms are convenient where the organization
already holds a verified DNS presence and prefers DNS-anchored
discovery. They are equivalent to Form 2 for identity purposes; the
difference is the resolution path, not the identity model.</t>
          <t>The following URI forms remain invalid and <strong>MUST</strong> return
<tt>400 Bad Request</tt> with error code <tt>invalid-uri-form</tt>:</t>
          <artwork><![CDATA[
agtp://[domain.tld]/agents/[label].agent  (.agent as path suffix - prohibited)
agtp://[domain.tld]/agents/[label].nomo   (.nomo as path suffix - prohibited)
agtp://[domain.tld]/agents/[label].agtp   (.agtp as path suffix - prohibited)
]]></artwork>
          <t>These prohibitions apply to file format suffixes in the path position
only. The <tt>.agent</tt> and <tt>.nomo</tt> labels remain valid in the hostname
position as agent-native TLDs (Form 2 and Form 5).</t>
        </section>
        <section anchor="namespace-disambiguation-with-web3-resolution">
          <name>Namespace Disambiguation with Web3 Resolution</name>
          <t>The <tt>.agent</tt> label is also claimed as a top-level domain by at least
one blockchain-based naming system. To prevent ambiguous resolution,
AGTP implementations <strong>MUST</strong> apply the following rules when resolving
a URI whose hostname ends in <tt>.agent</tt> or <tt>.nomo</tt>:</t>
          <ol spacing="normal" type="1"><li>
              <t>Query the AGTP governance platform registry first. If the URI
resolves to a registered agent in Active lifecycle state, return
the Agent Manifest Document. This is the AGTP-native path and is
authoritative.</t>
            </li>
            <li>
              <t>If the AGTP registry returns no match, and if the implementation
supports Web3 resolution per <xref target="AGTP-WEB3"/>, query the Web3 naming
system. If the Web3 resolution returns an AGTP-compatible record,
return the Agent Manifest Document derived from that record.</t>
            </li>
            <li>
              <t>If neither path returns a match, return <tt>404 Not Found</tt>.</t>
            </li>
          </ol>
          <t>Canonical Agent-ID (Form 1) remains authoritative in all cases. An
agent registered through both AGTP-native and Web3 paths <strong>MUST</strong>
produce the same canonical Agent-ID through either resolution path.
Conflict between paths <strong>MUST</strong> be resolved in favor of the canonical
Agent-ID recorded in the governance platform's Birth Certificate.</t>
        </section>
        <section anchor="non-canonical-forms-and-redirect-behavior">
          <name>Non-Canonical Forms and Redirect Behavior</name>
          <t>The following non-canonical forms <strong>SHOULD</strong> be redirected to their
canonical equivalents. Implementations <strong>MUST NOT</strong> serve package
contents in response to any URI form.</t>
          <table>
            <name>Non-Canonical URI Forms and Redirect Targets</name>
            <thead>
              <tr>
                <th align="left">Received URI</th>
                <th align="left">Canonical Redirect Target</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service.agent</tt></td>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service.nomo</tt></td>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service.agtp</tt></td>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service</tt></td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="query-parameters-for-format-selection">
          <name>Query Parameters for Format Selection</name>
          <t>All AGTP URI resolution requests accept an optional <tt>format</tt> query
parameter controlling the serialization of the returned document.</t>
          <table>
            <name>AGTP URI Format Query Parameters</name>
            <thead>
              <tr>
                <th align="left">Query Parameter</th>
                <th align="left">Returned Representation</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">(none)</td>
                <td align="left">Agent Manifest Document, human-readable <tt>application/agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=manifest</tt></td>
                <td align="left">Agent Manifest Document, human-readable <tt>application/agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=json</tt></td>
                <td align="left">Agent Manifest Document, compact <tt>application/agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=certificate</tt></td>
                <td align="left">Birth certificate fields only, <tt>application/agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=status</tt></td>
                <td align="left">Lifecycle state and operational status only, <tt>application/agtp+json</tt></td>
              </tr>
            </tbody>
          </table>
          <t>All format variants return signed <tt>application/agtp+json</tt> content.
The <tt>?format=json</tt> parameter is intended for programmatic consumers.
The default returns the full human-readable manifest suitable for
browser rendering by an AGTP-aware client.</t>
        </section>
        <section anchor="resolution-mechanics">
          <name>Resolution Mechanics</name>
          <t>AGTP URI resolution proceeds according to the URI form presented. Form
1 (canonical ID) resolves through a registry or log lookup; Forms 2
through 5 resolve through a hierarchical name lookup. All forms
terminate in a signed Agent Manifest Document derived from the same
Birth Certificate.</t>
          <section anchor="form-1-resolution-canonical-id">
            <name>Form 1 Resolution (Canonical ID)</name>
            <t>When an AGTP resolver receives a URI of the form
<tt>agtp://[256-bit-hex-id]</tt>, it <strong>MUST</strong> perform the following steps:</t>
            <ol spacing="normal" type="1"><li>
                <t>Parse and validate the canonical Agent-ID. If the identifier is
malformed (length, character set), return <tt>400 Bad Request</tt> with
error code <tt>invalid-canonical-id</tt>.</t>
              </li>
              <li>
                <t>Query the agent's governance platform registry for the record
associated with the canonical Agent-ID. If the resolver does not
know which governance platform holds the record, it <strong>MAY</strong> query
a transparency log per Section 5.2 to locate the record.</t>
              </li>
              <li>
                <t>Verify the registry record lifecycle state. If Suspended, return
<tt>503 Service Unavailable</tt> with lifecycle state in the response
body. If Revoked or Deprecated, return <tt>410 Gone</tt> with lifecycle
state and revocation timestamp.</t>
              </li>
              <li>
                <t>Retrieve the agent's package (<tt>.agent</tt> or <tt>.nomo</tt>) from the
package store referenced by the registry record.</t>
              </li>
              <li>
                <t><strong>Verify the package integrity hash before proceeding.</strong> If
integrity verification fails, return <tt>500 Internal Error</tt> with
error code <tt>package-integrity-failure</tt>. <strong>MUST</strong> be logged.</t>
              </li>
              <li>
                <t>Extract the embedded manifest from the verified package.</t>
              </li>
              <li>
                <t>Sign the manifest document using the governance platform's signing
key. Return the signed <tt>application/agtp+json</tt> document in the
format specified by the query parameter.</t>
              </li>
            </ol>
            <t>Form 1 resolution does not require prior knowledge of an organization
domain, a DNS record, or a Web3 naming anchor. The canonical Agent-ID
is sufficient input.</t>
          </section>
          <section anchor="forms-2-5-resolution-hierarchical-and-domain-anchored">
            <name>Forms 2-5 Resolution (Hierarchical and Domain-Anchored)</name>
            <t>When an AGTP resolver receives a URI of Form 2, 3, 4, or 5, it
<strong>MUST</strong> perform the following steps:</t>
            <ol spacing="normal" type="1"><li>
                <t>Parse and validate the URI. If the URI is an invalid (prohibited)
form, return <tt>400 Bad Request</tt> with error code <tt>invalid-uri-form</tt>.</t>
              </li>
              <li>
                <t>For Form 2 and Form 5 URIs whose hostname ends in <tt>.agent</tt> or
<tt>.nomo</tt>, apply the namespace disambiguation rules in Section 5.1.</t>
              </li>
              <li>
                <t>Resolve the hierarchical name or domain+label pair to a canonical
Agent-ID via the governance platform's registry lookup. If no
matching agent is found, return <tt>404 Not Found</tt>.</t>
              </li>
              <li>
                <t>Continue with Form 1 resolution steps 3 through 7 using the
resolved canonical Agent-ID.</t>
              </li>
            </ol>
            <t>The package's executable content, code, logic, and any fields not
included in the manifest schema <strong>MUST NOT</strong> be returned at any step
of any resolution path. URI resolution exposes identity and status
exclusively.</t>
          </section>
        </section>
        <section anchor="verification-paths-and-trust-tier-assignment">
          <name>Verification Paths and Trust Tier Assignment</name>
          <t>AGTP recognizes multiple equivalent verification paths for Trust Tier 1.
Each path produces the same identity primitive: a canonical Agent-ID
derived from a governance-platform-signed Birth Certificate. The
verification path in use <strong>MUST</strong> be declared in the <tt>verification_path</tt>
field of the Birth Certificate and is surfaced in the Agent Manifest
Document.</t>
          <dl>
            <dt><strong>Trust Tier 1 - Verified:</strong></dt>
            <dd>
              <t>Tier 1 agents are eligible for the full Authority-Scope vocabulary,
delegation chains, financial transactions, and multi-organization
collaboration. Tier 1 verification requires exactly one of the
following paths to succeed at ACTIVATE time. The verification path
chosen does not affect the identity model or the canonical Agent-ID;
it affects only the evidence chain backing the Birth Certificate.
</t>
              <table>
                <name>Trust Tier 1 Verification Paths</name>
                <thead>
                  <tr>
                    <th align="left">Path</th>
                    <th align="left">Mechanism</th>
                    <th align="left">Evidence Anchor</th>
                  </tr>
                </thead>
                <tbody>
                  <tr>
                    <td align="left">
                      <tt>dns-anchored</tt></td>
                    <td align="left">RFC 8555 ACME challenge against claimed <tt>org_domain</tt></td>
                    <td align="left">DNS TXT record</td>
                  </tr>
                  <tr>
                    <td align="left">
                      <tt>log-anchored</tt></td>
                    <td align="left">Birth Certificate inclusion in AGTP transparency log</td>
                    <td align="left">Log inclusion proof (RFC 9162 VDS, RFC 9943 receipt)</td>
                  </tr>
                  <tr>
                    <td align="left">
                      <tt>hybrid</tt></td>
                    <td align="left">DNS challenge combined with blockchain address signature</td>
                    <td align="left">DNS TXT record + blockchain signature</td>
                  </tr>
                </tbody>
              </table>
              <t><tt>dns-anchored</tt>: The governance platform <strong>MUST</strong> verify that the
registering party controls the DNS zone for the claimed <tt>org_domain</tt>
before issuing a Tier 1 Birth Certificate. Dns-anchored agents
<strong>MUST</strong> have the following DNS record published and verifiable at
resolution time:</t>
              <artwork><![CDATA[
_agtp.[domain.tld]. IN TXT "agtp-zone=[zone-id]; cert=[fp]"
]]></artwork>
              <t><tt>log-anchored</tt>: The governance platform <strong>MUST</strong> submit the Birth
Certificate to an AGTP-aligned transparency log and record the
resulting inclusion proof in the registry record. The log <strong>MUST</strong>
implement the verifiable data structure defined in <xref target="RFC9162"/> and
<strong>SHOULD</strong> issue COSE_Sign1 receipts per <xref target="RFC9943"/> (SCITT) for
cross-ecosystem interoperability. A log-anchored agent is verifiable
by any party with access to the transparency log, without dependence
on DNS ownership. The log server protocol, receipt schema, and
federation model are specified in <xref target="AGTP-LOG"/>.</t>
              <t><tt>hybrid</tt>: The governance platform <strong>MUST</strong> verify both DNS control
over the claimed domain and ownership of the declared blockchain
address via signature challenge. This path is used by agents whose
identity is anchored in a Web3 naming system and who also hold a
verified DNS presence. See <xref target="AGTP-WEB3"/>.</t>
              <t>All Tier 1 paths require a <tt>.nomo</tt> governed package.</t>
            </dd>
            <dt><strong>Trust Tier 2 - Org-Asserted:</strong></dt>
            <dd>
              <t>For agents operating within a single organization's internal
infrastructure, or where no Tier 1 verification path has been
completed. The registering party asserts an organizational affiliation
without cryptographic proof. The Agent Manifest Document for Tier 2
agents <strong>MUST</strong> include a <tt>trust_tier: 2</tt> field and a <tt>trust_warning</tt>
field with value <tt>"verification-incomplete"</tt>. AGTP-aware browsers
and clients <strong>MUST</strong> surface a visible trust indicator distinguishing
Tier 2 from Tier 1.
</t>
              <t>Tier 2 agents <strong>MUST NOT</strong> be granted authority scopes above
<tt>documents:query</tt> and <tt>knowledge:query</tt> without the AGTP Agent
Certificate extension <xref target="AGTP-CERT"/> providing cryptographic identity
binding at the transport layer.</t>
            </dd>
            <dt><strong>Trust Tier 3 - Experimental:</strong></dt>
            <dd>
              <t>Agent label uses the <tt>X-</tt> prefix. Not discoverable through the
public AGTP registry. For development and testing only.
Implementations <strong>MUST NOT</strong> deploy Tier 3 agents in production.</t>
            </dd>
          </dl>
        </section>
        <section anchor="subdomain-deployment-pattern">
          <name>Subdomain Deployment Pattern</name>
          <t>Organizations <strong>SHOULD</strong> deploy AGTP endpoints at a dedicated
subdomain following the pattern <tt>agtp.[organization-domain.tld]</tt>
(e.g., <tt>agtp.acme.tld</tt>). This is the recommended enterprise
deployment pattern: it provides clean separation between web and
agent infrastructure, allows independent certificate management for
the AGTP endpoint, and is consistent with service-specific subdomain
conventions. An organization with an AGTP subdomain <strong>SHOULD</strong> also
configure their primary domain to redirect AGTP requests:</t>
          <artwork><![CDATA[
agtp://acme.tld/agents/customer-service
  → 301 → agtp://agtp.acme.tld/agents/customer-service
]]></artwork>
        </section>
        <section anchor="the-agents-reserved-path-prefix">
          <name>The /agents/ Reserved Path Prefix</name>
          <t>The path prefix <tt>/agents/</tt> is reserved in all <tt>agtp://</tt> URIs for
agent namespace operations. Implementations <strong>MUST</strong> support this
prefix. The registry root at <tt>/agents</tt> (no trailing label) resolves
to the Agent Namespace Document (see Section 5.4).</t>
        </section>
        <section anchor="collision-prevention">
          <name>Collision Prevention</name>
          <t>The canonical Agent-ID is the collision-prevention primitive. Two
canonical Agent-IDs are distinct if and only if the 256-bit
identifiers differ, and the governance platform enforces uniqueness
at issuance time by deriving the ID from the Birth Certificate hash.</t>
          <t>For alias forms, collision prevention operates at the namespace
level. <tt>agtp://acme.tld/agents/customer-service</tt> and
<tt>agtp://chrishood.tld/agents/customer-service</tt> resolve to distinct
canonical Agent-IDs because they are registered under different
org_domain values. Similarly, <tt>agtp://customer-service.acme.agent</tt>
and <tt>agtp://customer-service.chrishood.agent</tt> resolve to distinct
canonical Agent-IDs because they are registered under different
agent-native org labels. Within a single governance zone, the
governance platform enforces uniqueness of agent labels at
registration time.</t>
          <t>Infrastructure <strong>MUST</strong> use the canonical Agent-ID for all routing,
logging, and attribution operations. Alias URIs are a display and
discovery layer only. An alias that resolves to a canonical Agent-ID
different from the one carried in the <tt>Agent-ID</tt> header on a request
<strong>MUST</strong> cause the request to be rejected with <tt>401 Unauthorized</tt>
and <strong>MUST</strong> be logged.</t>
        </section>
        <section anchor="iana-considerations-for-the-agtp-uri-scheme">
          <name>IANA Considerations for the agtp:// URI Scheme</name>
          <t>This document proposes registration of the <tt>agtp://</tt> URI scheme with
IANA per <xref target="RFC7595"/>. Registration template:</t>
          <dl>
            <dt>URI scheme name:</dt>
            <dd>
              <t>agtp</t>
            </dd>
            <dt>Status:</dt>
            <dd>
              <t>Permanent</t>
            </dd>
            <dt>URI scheme syntax:</dt>
            <dd>
              <t><tt>agtp://[canonical-agent-id]</tt> (authoritative)
<tt>agtp://[label].[org-label].agent</tt> or <tt>agtp://[label].[org-label].nomo</tt> (agent-native hierarchical)
<tt>agtp://[domain.tld]/agents/[label]</tt> (domain-anchored)
<tt>agtp://agtp.[domain.tld]/agents/[label]</tt> (subdomain-anchored)
<tt>agtp://[org-label].agent</tt> or <tt>agtp://[domain.tld]/agents</tt> (namespace root)</t>
            </dd>
            <dt>URI scheme semantics:</dt>
            <dd>
              <t>Identifies an AI agent or agent namespace operating over the Agent
Transfer Protocol. The authoritative form uses a 256-bit hex-encoded
cryptographic identifier derived from the agent's Birth Certificate.
The agent-native hierarchical form uses AGTP-governed <tt>.agent</tt> or
<tt>.nomo</tt> top-level labels. The domain-anchored form uses a verified
or asserted organization DNS domain with a reserved <tt>/agents/</tt> path
prefix. All alias forms <strong>MUST</strong> resolve to the same canonical
Agent-ID.</t>
            </dd>
            <dt>Applications/protocols that use this URI scheme:</dt>
            <dd>
              <t>Agent Transfer Protocol (this document)</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>The canonical Agent-ID form is the authoritative identity
representation. Agent-native hierarchical URIs are governance-
platform-resolved and require the disambiguation rules in Section
5.1 when coexisting with Web3 naming systems. Domain-anchored URIs
resolve through DNS to a governance platform endpoint.
Implementations <strong>MUST</strong> accept canonical Agent-IDs and <strong>SHOULD</strong>
support at least one alias form. File format suffixes (<tt>.agtp</tt>)
<strong>MUST NOT</strong> appear in <tt>agtp://</tt> URIs.</t>
            </dd>
            <dt>Contact:</dt>
            <dd>
              <t>Chris Hood, chris@nomotic.ai</t>
            </dd>
            <dt>References:</dt>
            <dd>
              <t>This document</t>
            </dd>
          </dl>
          <t>The <tt>agtp://</tt> URI scheme registration is open and unencumbered. No
intellectual property claims apply to the URI scheme itself.</t>
        </section>
      </section>
      <section anchor="trust-tier-summary">
        <name>Trust Tier Summary</name>
        <table>
          <name>AGTP Trust Tier Summary</name>
          <thead>
            <tr>
              <th align="left">Trust Tier</th>
              <th align="left">Verification Paths (any one sufficient)</th>
              <th align="left">Package Required</th>
              <th align="left">Registry Visible</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1 - Verified</td>
              <td align="left">DNS challenge per <xref target="RFC8555"/>; OR log inclusion per <xref target="RFC9162"/> / <xref target="RFC9943"/>; OR hybrid DNS + blockchain signature</td>
              <td align="left">
                <tt>.nomo</tt></td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">2 - Org-Asserted</td>
              <td align="left">None (affiliation asserted without proof)</td>
              <td align="left">
                <tt>.agent</tt> or <tt>.nomo</tt></td>
              <td align="left">Yes (with warning)</td>
            </tr>
            <tr>
              <td align="left">3 - Experimental</td>
              <td align="left">None</td>
              <td align="left">Any</td>
              <td align="left">No</td>
            </tr>
          </tbody>
        </table>
        <t>The verification path used for a Tier 1 agent is recorded in the
<tt>verification_path</tt> field of the Birth Certificate (<tt>dns-anchored</tt>,
<tt>log-anchored</tt>, or <tt>hybrid</tt>) and surfaced in the Agent Manifest
Document. All Tier 1 paths produce identity attestations of equivalent
strength for AGTP protocol purposes.</t>
      </section>
      <section anchor="agent-namespace-document">
        <name>Agent Namespace Document</name>
        <section anchor="purpose-and-scope">
          <name>Purpose and Scope</name>
          <t>The Agent Namespace Document is the index of all Active agents
registered under an organization's governance zone. It is returned
in response to a request targeting the <tt>/agents</tt> path:</t>
          <artwork><![CDATA[
agtp://acme.tld/agents
agtp://agtp.acme.tld/agents
]]></artwork>
          <t>The Agent Namespace Document is not a manually editable file. It is
generated and cryptographically signed by the governance platform each
time the registry changes. Any Namespace Document that fails signature
verification <strong>MUST</strong> be rejected by the requesting party.</t>
        </section>
        <section anchor="document-schema">
          <name>Document Schema</name>
          <figure>
            <name>Agent Namespace Document Schema</name>
            <sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-namespace",
  "schema_version": "1.0",
  "org_domain": "acme.tld",
  "governance_zone": "zone:acme-internal",
  "generated_at": "2026-03-20T14:00:00Z",
  "signature": {
    "algorithm": "ES256",
    "key_id": "agtp-gov-key-acme-01",
    "value": "[base64-encoded-signature]"
  },
  "agents": [
    {
      "agent_label": "customer-service",
      "canonical_id": "3a9f2c1d8b7e4a6f...",
      "lifecycle_state": "Active",
      "trust_tier": 1,
      "cert_status": "Active",
      "manifest_uri": "agtp://agtp.acme.tld/agents/customer-service",
      "activated_at": "2026-01-15T09:00:00Z",
      "last_updated": "2026-03-01T11:30:00Z"
    }
  ],
  "total_active": 1,
  "namespace_cert_fingerprint": "b2c4d6e8..."
}
]]></sourcecode>
          </figure>
          <t>The <tt>agents</tt> array <strong>MUST</strong> include only agents in Active lifecycle
state. Suspended, Revoked, and Deprecated agents <strong>MUST NOT</strong> appear
in the Namespace Document.</t>
        </section>
        <section anchor="integrity-and-freshness">
          <name>Integrity and Freshness</name>
          <t>The Namespace Document <strong>MUST</strong> include a <tt>generated_at</tt> timestamp.
Implementations <strong>SHOULD</strong> treat Namespace Documents older than a
configurable freshness threshold (default: 300 seconds) as stale and
re-request. The governance platform <strong>MUST</strong> re-sign the Namespace
Document within 60 seconds of any registry change.</t>
          <t>The signature covers the entire document including <tt>generated_at</tt>.
Replaying an older signed Namespace Document to conceal a revocation
event is a known attack vector; implementations <strong>MUST</strong> reject
Namespace Documents with a <tt>generated_at</tt> timestamp older than the
freshness threshold.</t>
        </section>
      </section>
      <section anchor="agent-manifest-document-and-the-agtp-format">
        <name>Agent Manifest Document and the .agtp Format</name>
        <section anchor="purpose-and-scope-1">
          <name>Purpose and Scope</name>
          <t>The Agent Manifest Document is the protocol's canonical representation
of a specific agent's identity, status, and behavioral scope. It is
returned in response to any AGTP URI resolution request targeting a
specific agent:</t>
          <artwork><![CDATA[
agtp://acme.tld/agents/customer-service
agtp://acme.tld/agents/customer-service?format=json
agtp://acme.tld/agents/customer-service?format=manifest
]]></artwork>
          <t>The manifest is derived from the embedded manifest inside the agent's
<tt>.agent</tt> or <tt>.nomo</tt> package. It is not a separate file that can be
independently modified. The governance platform <strong>MUST</strong> verify the
package integrity hash before extracting and serving the manifest.</t>
        </section>
        <section anchor="the-three-document-formats-and-their-relationship">
          <name>The Three Document Formats and Their Relationship</name>
          <figure anchor="format-relationship">
            <name>Relationship Between AGTP File Formats</name>
            <artwork><![CDATA[
.agent   ──── open packaging format (patent pending, Chris Hood)
  │           Contains: manifest + integrity hash + behavioral
  │           trust score + executable content
  │
.nomo    ──── governed packaging format (patent pending, Chris Hood)
  │           Contains: .agent contents + CA-signed cert chain
  │           + governance zone binding
  │
  Both produce ↓ when queried via agtp:// URI
  │
.agtp    ──── wire-level manifest document (this spec)
              Contains: identity fields from manifest +
              lifecycle state + trust tier + behavioral scope
              Open format defined by AGTP specification
              Content-Type: application/agtp+json
]]></artwork>
          </figure>
          <t>The <tt>.agtp</tt> format is the protocol's own document type. It is what
gets transmitted over the wire. The <tt>.agent</tt> and <tt>.nomo</tt> formats are
what get deployed. An AGTP implementation is not required to understand
<tt>.agent</tt> or <tt>.nomo</tt> packaging internals; it is only required to
produce and consume <tt>.agtp</tt> manifest documents.</t>
          <t>Additional packaging formats <strong>MAY</strong> be defined by third parties,
provided they can produce conformant <tt>.agtp</tt> manifest documents when
queried. Such formats <strong>MUST</strong> implement the integrity verification
requirement: the manifest <strong>MUST</strong> be derived from a verified package,
not from an independently stored or editable file.</t>
        </section>
        <section anchor="agent-manifest-document-schema">
          <name>Agent Manifest Document Schema</name>
          <t>The following fields are <strong>REQUIRED</strong> in all Agent Manifest Documents:</t>
          <figure>
            <name>Agent Manifest Document - Required Fields</name>
            <sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-manifest",
  "schema_version": "1.0",
  "manifest_uri": "agtp://agtp.acme.tld/agents/customer-service",
  "canonical_id": "3a9f2c1d8b7e4a6f0c2d5e9b1a3f7c0d...",
  "agent_label": "customer-service",
  "org_domain": "acme.tld",
  "governance_zone": "zone:acme-internal",
  "trust_tier": 1,
  "package_format": "nomo",
  "package_integrity_hash": "sha256:[hash]",
  "lifecycle_state": "Active",
  "cert_status": "Active",
  "principal_org": "Acme Corporation",
  "activated_at": "2026-01-15T09:00:00Z",
  "behavioral_trust_score": 0.94,
  "authority_scope_categories": [
    "documents:query",
    "knowledge:query",
    "calendar:book",
    "escalation:route"
  ],
  "supported_methods": [
    "QUERY", "SUMMARIZE", "BOOK", "SCHEDULE",
    "ESCALATE", "NOTIFY", "CONFIRM"
  ],
  "job_description": "Handles customer service requests.",
  "signature": {
    "algorithm": "ES256",
    "key_id": "agtp-gov-key-acme-01",
    "value": "[base64-encoded-signature]"
  }
}
]]></sourcecode>
          </figure>
          <t>The following fields are <strong>RECOMMENDED</strong>:</t>
          <figure>
            <name>Agent Manifest Document - Recommended Fields</name>
            <sourcecode type="json"><![CDATA[
{
  "version": "2.1.0",
  "last_updated": "2026-03-01T11:30:00Z",
  "verification_path": "dns-anchored",
  "escalation_policy": "route-to-human-on-scope-limit",
  "delegation_permitted": false,
  "max_delegation_depth": 0,
  "audit_log_uri": "agtp://agtp.acme.tld/audit/customer-service",
  "dns_anchor_record": "_agtp.acme.tld TXT agtp-zone=...",
  "log_inclusion_proof": null,
  "cert_fingerprint": "b2c4d6e8..."
}
]]></sourcecode>
          </figure>
          <t>The <tt>verification_path</tt> field surfaces the Tier 1 verification path
used at ACTIVATE time. Its value <strong>MUST</strong> match the <tt>verification_path</tt>
field of the underlying Birth Certificate. The <tt>dns_anchor_record</tt>
field is populated when <tt>verification_path</tt> is <tt>dns-anchored</tt> or
<tt>hybrid</tt>. The <tt>log_inclusion_proof</tt> field is populated when
<tt>verification_path</tt> is <tt>log-anchored</tt> and carries the transparency
log inclusion proof per <xref target="RFC9162"/> or the COSE_Sign1 receipt per
<xref target="RFC9943"/>.</t>
          <t>The following fields are <strong>REQUIRED</strong> when <tt>trust_tier</tt> is <tt>2</tt>:</t>
          <figure>
            <name>Agent Manifest Document - Required Fields for Trust Tier 2</name>
            <sourcecode type="json"><![CDATA[
{
  "trust_warning": "verification-incomplete",
  "trust_tier_explanation": "Organizational affiliation asserted without cryptographic verification."
}
]]></sourcecode>
          </figure>
        </section>
        <section anchor="what-the-manifest-exposes-and-does-not-expose">
          <name>What the Manifest Exposes and Does Not Expose</name>
          <t>The Agent Manifest Document <strong>MUST</strong> expose:</t>
          <ul spacing="normal">
            <li>
              <t>The agent's identity (canonical ID, label, org, governance zone)</t>
            </li>
            <li>
              <t>The agent's current operational status (lifecycle state)</t>
            </li>
            <li>
              <t>The agent's authority scope categories</t>
            </li>
            <li>
              <t>The agent's supported method vocabulary</t>
            </li>
            <li>
              <t>The agent's behavioral trust score</t>
            </li>
            <li>
              <t>The agent's birth certificate fields (activated_at, principal_org)</t>
            </li>
            <li>
              <t>The agent's trust tier and any associated trust warnings</t>
            </li>
          </ul>
          <t>The Agent Manifest Document <strong>MUST NOT</strong> expose:</t>
          <ul spacing="normal">
            <li>
              <t>Executable code, scripts, or logic</t>
            </li>
            <li>
              <t>Model weights or configurations</t>
            </li>
            <li>
              <t>Internal API keys or credentials</t>
            </li>
            <li>
              <t>Specific authority scope grant tokens</t>
            </li>
            <li>
              <t>Session history or prior action logs</t>
            </li>
          </ul>
          <t>No AGTP URI resolution path, including any query parameter
combination, <strong>MUST</strong> return package contents beyond the manifest
schema defined in this section.</t>
        </section>
        <section anchor="manifest-tamper-proofing">
          <name>Manifest Tamper-Proofing</name>
          <t>The tamper-proof guarantee rests on two mechanisms:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>Package integrity hash:</strong> Any modification to the package or its
embedded manifest invalidates the hash. The governance platform
<strong>MUST</strong> verify this hash before extracting the manifest.</t>
            </li>
            <li>
              <t><strong>Document signature:</strong> The governance platform signs the extracted
manifest before serving it. The signature covers the full document
including the <tt>package_integrity_hash</tt> field, creating a verifiable
chain from the served document back to the registered package.</t>
            </li>
          </ol>
          <t>A manifest document that fails either verification step <strong>MUST</strong> be
rejected, <strong>MUST NOT</strong> be served, and the failure <strong>MUST</strong> be logged.</t>
        </section>
      </section>
      <section anchor="browser-and-human-facing-interaction-model">
        <name>Browser and Human-Facing Interaction Model</name>
        <section anchor="the-separation-of-discovery-and-execution">
          <name>The Separation of Discovery and Execution</name>
          <figure anchor="browser-separation">
            <name>AGTP URI Use by Audience</name>
            <artwork><![CDATA[
agtp:// URI in a browser
  │
  └─→ Returns Agent Manifest Document
        Human-readable view of identity and status
        Read-only. No execution. No code exposed.

agtp:// session initiated by an agent or AGTP client
  │
  └─→ Establishes authenticated AGTP session
        Method invocations (QUERY, BOOK, ESCALATE, etc.)
        Full protocol operation - not visible to browsers
]]></artwork>
          </figure>
          <t>The analogy to existing protocol conventions is direct. A <tt>mailto:</tt>
URI surfaces an address and hands off to a mail client; SMTP carries
the actual messages. Similarly, an <tt>agtp://</tt> URI surfaces identity
and status; AGTP carries agent traffic. Browsers do not become AGTP
clients by following an <tt>agtp://</tt> link.</t>
        </section>
        <section anchor="browser-behavior-for-agtp-uris">
          <name>Browser Behavior for agtp:// URIs</name>
          <t>Browsers that encounter an <tt>agtp://</tt> URI <strong>SHOULD</strong> behave as follows:</t>
          <ol spacing="normal" type="1"><li>
              <t>If a registered AGTP client is present (OS protocol handler), hand
off the URI to that client.</t>
            </li>
            <li>
              <t>If the browser supports <tt>agtp://</tt> natively or via extension, render
the returned Agent Manifest Document as a structured human-readable
page. The rendered view <strong>MUST</strong> surface the trust tier indicator
prominently, following the visual convention established for TLS
trust in the browser chrome.</t>
            </li>
            <li>
              <t>If neither condition applies, the browser <strong>MAY</strong> fall back to a
gateway that translates between <tt>https://</tt> and <tt>agtp://</tt>. The
gateway <strong>MUST</strong> preserve all signature and trust tier fields.</t>
            </li>
          </ol>
        </section>
        <section anchor="human-readable-manifest-view">
          <name>Human-Readable Manifest View</name>
          <t>When an Agent Manifest Document is rendered for human consumption,
the following fields <strong>MUST</strong> be prominently displayed:</t>
          <ul spacing="normal">
            <li>
              <t>Agent label and org domain</t>
            </li>
            <li>
              <t>Trust tier indicator (visual distinction between Tier 1, 2, and 3)</t>
            </li>
            <li>
              <t>Lifecycle state (Active / Suspended / Revoked / Deprecated)</t>
            </li>
            <li>
              <t>Job description</t>
            </li>
            <li>
              <t>Principal organization</t>
            </li>
            <li>
              <t>Activation date</t>
            </li>
            <li>
              <t>Behavioral trust score</t>
            </li>
            <li>
              <t>Authority scope categories (in human-readable form)</t>
            </li>
          </ul>
        </section>
        <section anchor="agtp-status-sub-resource">
          <name>AGTP Status Sub-Resource</name>
          <t>Implementations <strong>SHOULD</strong> support a <tt>status</tt> sub-path:</t>
          <artwork><![CDATA[
agtp://acme.tld/agents/customer-service/status
]]></artwork>
          <figure>
            <name>AGTP Status Sub-Resource Response</name>
            <sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-status",
  "canonical_id": "3a9f2c1d8b7e4a6f...",
  "agent_label": "customer-service",
  "org_domain": "acme.tld",
  "lifecycle_state": "Active",
  "cert_status": "Active",
  "last_action_method": "QUERY",
  "last_action_timestamp": "2026-03-20T13:58:22Z",
  "active_session_count": 3,
  "pending_escalations": 0,
  "generated_at": "2026-03-20T14:00:00Z"
}
]]></sourcecode>
          </figure>
          <t>The <tt>active_session_count</tt> field <strong>SHOULD</strong> only be included if the
requester has appropriate observability permissions for the governance
zone.</t>
        </section>
      </section>
      <section anchor="web3-interaction-considerations">
        <name>Web3 Interaction Considerations</name>
        <section anchor="namespace-coexistence-with-web3-naming-systems">
          <name>Namespace Coexistence with Web3 Naming Systems</name>
          <t>The <tt>.agent</tt> label is claimed as a top-level domain by at least one
blockchain-based naming system. In v04 of this specification, the
response to this collision was to prohibit <tt>.agent</tt> and <tt>.nomo</tt> from
the hostname position of <tt>agtp://</tt> URIs. Version 05 reverses that
approach. The agent-native hierarchical namespace is restored, and
coexistence with Web3 naming is handled through the deterministic
resolution order specified in Section 5.1: AGTP-native registry
lookup first, Web3 resolution second, with canonical Agent-ID as the
authoritative tiebreaker.</t>
        </section>
        <section anchor="web3-as-a-verification-and-resolution-path">
          <name>Web3 as a Verification and Resolution Path</name>
          <t>AGTP identity is agent-first and anchored in the Birth Certificate.
Verification paths (DNS, log, hybrid) and resolution paths (canonical
ID, hierarchical name, domain lookup, Web3 lookup) are independent
dimensions of the identity model. A Web3-anchored agent is not a
second-class participant; it is an agent whose Birth Certificate was
verified through the <tt>hybrid</tt> path and whose Agent Manifest Document
is resolvable through a Web3 naming system in addition to the
canonical ID.</t>
          <t>The <tt>verification_path</tt> field in the Birth Certificate replaces the
v04 <tt>resolution_layer</tt> field and declares how the agent's identity
was verified at ACTIVATE time:</t>
          <table>
            <name>verification_path Field Values</name>
            <thead>
              <tr>
                <th align="left">Value</th>
                <th align="left">Meaning</th>
                <th align="left">Default Trust Tier</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>dns-anchored</tt></td>
                <td align="left">DNS ownership verified via RFC 8555 ACME challenge</td>
                <td align="left">Tier 1</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>log-anchored</tt></td>
                <td align="left">Birth Certificate inclusion in an AGTP transparency log per RFC 9162 / RFC 9943</td>
                <td align="left">Tier 1</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>hybrid</tt></td>
                <td align="left">DNS ownership and blockchain address signature both verified</td>
                <td align="left">Tier 1</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>org-asserted</tt></td>
                <td align="left">No cryptographic verification; affiliation asserted only</td>
                <td align="left">Tier 2</td>
              </tr>
            </tbody>
          </table>
          <t>Implementations that encounter an agent whose Birth Certificate
carries an unsupported <tt>verification_path</tt> value <strong>MUST</strong> treat the
agent as Trust Tier 2 (<tt>trust_warning: "verification-path-unsupported"</tt>)
until an extension specification defining the value has been published
and implemented. Full Web3 interoperability and hybrid verification
procedures are specified in <xref target="AGTP-WEB3"/>.</t>
        </section>
      </section>
      <section anchor="agent-registration-process">
        <name>Agent Registration Process</name>
        <section anchor="overview">
          <name>Overview</name>
          <t>An agent cannot participate in AGTP until it has been issued an Agent
Birth Certificate by a governance platform and assigned a canonical
Agent-ID derived from that certificate. Canonical Agent-IDs are issued
through the ACTIVATE transaction; they are never self-declared.</t>
          <t>The Birth Certificate is the genesis record of an agent's legal
existence within the AGTP ecosystem. Its relationship to the canonical
Agent-ID is analogous to the relationship between a government-issued
birth registration and a social security number: the birth event
produces a permanent, authoritative identity record, and a durable
identifier is derived from it. The identifier follows the agent for
its entire lifecycle, including after revocation. It is never reissued
to another agent.</t>
          <t>Any AGTP infrastructure component <strong>MUST</strong> reject requests carrying
an Agent-ID that does not resolve to a Birth Certificate record in
an Active lifecycle state in a reachable registry.</t>
        </section>
        <section anchor="birth-certificate-contents">
          <name>Birth Certificate Contents</name>
          <t>The Agent Birth Certificate is issued by the governance platform at
ACTIVATE time and contains the following fields:</t>
          <table>
            <name>Agent Birth Certificate Fields</name>
            <thead>
              <tr>
                <th align="left">Field</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>agent_id</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Unique identifier for the agent</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>owner</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Human or team responsible for this agent</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>archetype</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Behavioral category (see archetypes below)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>governance_zone</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Environment context (development, staging, production)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>scope</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Authorized action types</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>issued_at</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Timestamp of issuance</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>certificate_hash</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Cryptographic fingerprint - basis for canonical Agent-ID</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>signature</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Signed with the org's governance key</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>package_ref</tt></td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Reference to the <tt>.agent</tt> or <tt>.nomo</tt> package</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>trust_tier</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Registration tier (1, 2, or 3)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>verification_path</tt></td>
                <td align="left">
                  <strong>MUST</strong> (Tier 1)</td>
                <td align="left">Path used to verify identity: <tt>dns-anchored</tt>, <tt>log-anchored</tt>, <tt>hybrid</tt>, or <tt>org-asserted</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>org_domain</tt></td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">DNS-verified or asserted org domain (required for <tt>dns-anchored</tt> and <tt>hybrid</tt>)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>org_label</tt></td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Agent-native org label (required for Form 2 hierarchical resolution)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>log_inclusion_proof</tt></td>
                <td align="left">
                  <strong>MUST</strong> (log-anchored)</td>
                <td align="left">Transparency log inclusion proof (RFC 9162 / RFC 9943)</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="agent-archetypes">
          <name>Agent Archetypes</name>
          <t>The <tt>archetype</tt> field classifies the agent's behavioral category.
Archetypes inform scope enforcement and observability tooling; an
<tt>executor</tt> archetype agent exhibiting read-only query patterns, or a
<tt>monitor</tt> archetype agent attempting booking operations, are anomaly
signals. The archetype field does not restrict scope enforcement, 
Authority-Scope headers govern actual permissions at the protocol
level. Archetypes are a classification and observability signal,
not a security boundary.</t>
          <table>
            <name>Agent Archetypes</name>
            <thead>
              <tr>
                <th align="left">Archetype</th>
                <th align="left">Description</th>
                <th align="left">Typical Scope</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>assistant</tt></td>
                <td align="left">Conversational agent, read-heavy</td>
                <td align="left">
                  <tt>documents:query</tt>, <tt>knowledge:query</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>analyst</tt></td>
                <td align="left">Data analysis, read and aggregate</td>
                <td align="left">
                  <tt>data:read</tt>, <tt>data:aggregate</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>executor</tt></td>
                <td align="left">Takes real-world actions, write-heavy</td>
                <td align="left">
                  <tt>booking:*</tt>, <tt>payments:confirm</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>orchestrator</tt></td>
                <td align="left">Manages other agents</td>
                <td align="left">
                  <tt>delegation:*</tt>, <tt>agents:*</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>monitor</tt></td>
                <td align="left">Observational only</td>
                <td align="left">
                  <tt>telemetry:read</tt>, <tt>logs:read</tt></td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="birth-certificate-to-agtp-header-mapping">
          <name>Birth Certificate to AGTP Header Mapping</name>
          <t>Birth Certificate fields map directly to AGTP protocol headers on
every request. This mapping is the mechanism by which static identity
(the Birth Certificate) becomes runtime identity (the protocol session):</t>
          <table>
            <name>Birth Certificate to AGTP Header Mapping</name>
            <thead>
              <tr>
                <th align="left">Birth Certificate Field</th>
                <th align="left">AGTP Protocol Header</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>agent_id</tt></td>
                <td align="left">
                  <tt>Agent-ID</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>owner</tt></td>
                <td align="left">
                  <tt>Principal-ID</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>scope</tt></td>
                <td align="left">
                  <tt>Authority-Scope</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>certificate_hash</tt></td>
                <td align="left">Basis for canonical Agent-ID</td>
              </tr>
            </tbody>
          </table>
          <t>The canonical Agent-ID is derived from the <tt>certificate_hash</tt>. This
chain, package integrity hash → certificate hash → canonical Agent-ID, 
ensures that the identifier carried in the <tt>Agent-ID</tt> header on
every AGTP request is traceable back to the original Birth Certificate
and the human principal who authorized the agent's creation.</t>
        </section>
        <section anchor="registration-tiers">
          <name>Registration Tiers</name>
          <t><strong>Tier 1 Registration (Verified):</strong></t>
          <t>Required for agents carrying <tt>Authority-Scope</tt> beyond read-only query
operations, or participating in delegation chains, financial
transactions, or multi-agent collaboration with external organizations.
Tier 1 registration requires exactly one of the three verification
paths defined in Section 5.2 to succeed at ACTIVATE time.</t>
          <t>Common requirements for all Tier 1 paths:</t>
          <ul spacing="normal">
            <li>
              <t>Agent package <strong>MUST</strong> be in <tt>.nomo</tt> governed format</t>
            </li>
            <li>
              <t>Package <strong>MUST</strong> include a valid CA-signed certificate chain</t>
            </li>
            <li>
              <t>Governance platform <strong>MUST</strong> validate package integrity hash and
certificate chain before issuing the Birth Certificate</t>
            </li>
            <li>
              <t>Birth Certificate <strong>MUST</strong> record the specific <tt>verification_path</tt>
used (<tt>dns-anchored</tt>, <tt>log-anchored</tt>, or <tt>hybrid</tt>)</t>
            </li>
          </ul>
          <t>Path-specific requirements:</t>
          <ul spacing="normal">
            <li>
              <t><tt>dns-anchored</tt>: Registrant demonstrates DNS control over the
claimed <tt>org_domain</tt> via DNS challenge per <xref target="RFC8555"/>. Tier 1
<tt>_agtp</tt> TXT record <strong>MUST</strong> be published and verifiable at
resolution time.</t>
            </li>
            <li>
              <t><tt>log-anchored</tt>: Governance platform submits the Birth Certificate
to an AGTP-aligned transparency log implementing <xref target="RFC9162"/> and
records the inclusion proof in the registry. COSE_Sign1 receipts
per <xref target="RFC9943"/> (SCITT) <strong>SHOULD</strong> be issued for cross-ecosystem
interoperability. The registering party is not required to control
a DNS domain.</t>
            </li>
            <li>
              <t><tt>hybrid</tt>: Registrant demonstrates both DNS control and blockchain
address ownership. Detailed procedure in <xref target="AGTP-WEB3"/>.</t>
            </li>
          </ul>
          <t><strong>Tier 2 Registration (Org-Asserted):</strong></t>
          <t>For agents operating within a single organization's internal
infrastructure, or where no Tier 1 verification path has been
completed.</t>
          <dl>
            <dt>Requirements:</dt>
            <dd>
              <ul spacing="normal">
                <li>
                  <t>Organizational affiliation is declared but no cryptographic
verification has been performed</t>
                </li>
                <li>
                  <t>Agent package may be <tt>.agent</tt> or <tt>.nomo</tt> format</t>
                </li>
                <li>
                  <t>Governance platform issues Birth Certificate after validating
package integrity hash</t>
                </li>
                <li>
                  <t>Birth Certificate and Manifest <strong>MUST</strong> include <tt>trust_tier: 2</tt>
and <tt>trust_warning: "verification-incomplete"</tt></t>
                </li>
                <li>
                  <t>Authority scope <strong>MUST</strong> be restricted at the SEP layer until
upgraded to Tier 1</t>
                </li>
              </ul>
            </dd>
          </dl>
          <t><strong>Tier 3 Registration (Experimental):</strong></t>
          <t>For development and testing environments only.</t>
          <dl>
            <dt>Requirements:</dt>
            <dd>
              <ul spacing="normal">
                <li>
                  <t>Agent label <strong>MUST</strong> carry <tt>X-</tt> prefix</t>
                </li>
                <li>
                  <t>Not published to the public AGTP registry</t>
                </li>
                <li>
                  <t><strong>MUST NOT</strong> be deployed in production environments</t>
                </li>
                <li>
                  <t>Governance platform issues a locally-scoped Birth Certificate</t>
                </li>
              </ul>
            </dd>
          </dl>
        </section>
        <section anchor="registration-lifecycle">
          <name>Registration Lifecycle</name>
          <figure anchor="agent-reg-lifecycle">
            <name>AGTP Agent Registration Lifecycle</name>
            <artwork><![CDATA[
1. PACKAGE
   Author creates .agent or .nomo package containing:
   - Embedded manifest (agent_label, job_description,
     authority_scope_categories, supported_methods,
     behavioral_trust_score)
   - Integrity hash of all package contents
   - For .nomo: CA-signed certificate chain

2. SUBMIT (ACTIVATE transaction)
   Registrant submits ACTIVATE request to governance endpoint:
   - Package file (.agent or .nomo)
   - Proposed agent label and optional org_domain or org_label
   - Owner identity (maps to Birth Certificate owner field)
   - Archetype declaration
   - For Tier 1: declared verification_path and corresponding
     evidence:
       dns-anchored: DNS challenge token
       log-anchored: log submission intent (challenge issued
         by governance platform)
       hybrid: DNS challenge token + blockchain signature

3. VALIDATE (governance platform)
   Governance platform:
   - Verifies package integrity hash
   - For .nomo: validates certificate chain
   - For Tier 1 dns-anchored: verifies DNS challenge against
     _agtp.[org_domain] TXT record
   - For Tier 1 log-anchored: prepares Birth Certificate for
     transparency log submission per Section 5.2
   - For Tier 1 hybrid: verifies both DNS challenge and
     blockchain address signature per {{AGTP-WEB3}}
   - Checks proposed label for uniqueness within the relevant
     namespace (org_domain, org_label, or log-scoped)

4. ISSUE (Birth Certificate and canonical Agent-ID assigned)
   Governance platform:
   - Issues Agent Birth Certificate with all fields populated,
     including verification_path
   - Derives canonical Agent-ID from certificate_hash
   - For log-anchored Tier 1: submits Birth Certificate to
     transparency log and embeds inclusion proof in the registry
     record
   - Creates registry record with Active lifecycle state
   - Records genesis audit entry in immutable audit log
     (genesis record includes full Birth Certificate and
     verification evidence)
   - Publishes agent to Namespace Document
     (triggers Namespace Document re-signing)

   The Birth Certificate is delivered to the registrant.
   It is the permanent record of the agent's genesis.
   Loss of the Birth Certificate does not invalidate the agent;
   the certificate_hash remains the authoritative identity anchor.

5. ACTIVE
   Agent enters Active lifecycle state.
   Canonical Agent-ID is valid for AGTP protocol sessions.
   All applicable alias URIs resolve to the Agent Manifest
   Document derived from the Birth Certificate.

6. LIFECYCLE EVENTS (post-activation)
   SUSPEND:    Agent temporarily inactive. Manifest returns 503.
               Birth Certificate and canonical ID remain valid.
               Initiated by trust violation or human decision.
   REINSTATE:  Human-authorized return to Active state.
               Birth Certificate unchanged. Reinstatement
               recorded in audit trail.
   REVOKE:     Agent permanently deactivated. Manifest returns 410.
               Birth Certificate archived. Canonical ID retired
               permanently and never reissued.
   DEPRECATE:  Controlled end-of-life. Manifest returns 410 with
               successor_agent field if applicable. Birth
               Certificate retained per Section 8.5 retention policy.
]]></artwork>
          </figure>
        </section>
        <section anchor="governance-tokens-and-runtime-authorization">
          <name>Governance Tokens and Runtime Authorization</name>
          <t>Following successful registration, the agent's Birth Certificate is
the static identity anchor. Runtime authorization for specific actions
is carried by Governance Tokens: signed, time-limited JWT artifacts
issued by the governance platform encoding a specific governance
verdict (ALLOW, DENY) for a specific action.</t>
          <t>Governance Tokens <strong>MUST NOT</strong> be reused. Each action requires a
fresh evaluation and a fresh token. Default TTL is 30 seconds. The
token's <tt>agent_id</tt> field <strong>MUST</strong> match the canonical Agent-ID from
the Birth Certificate. Tokens that fail this validation <strong>MUST</strong> be
rejected and the failure <strong>MUST</strong> be logged.</t>
          <t>The relationship between Birth Certificate and Governance Token
parallels the relationship between a passport and a visa: the passport
establishes persistent identity; the visa encodes a specific
time-bounded permission. Holding a passport does not imply holding
any particular visa.</t>
        </section>
        <section anchor="friendly-name-availability-and-re-registration">
          <name>Friendly Name Availability and Re-Registration</name>
          <t>An agent label becomes available for re-registration 90 days after
its associated agent enters Revoked or Deprecated lifecycle state.
The canonical Agent-ID and Birth Certificate are permanently archived.
The canonical Agent-ID <strong>MUST NOT</strong> be reissued under any
circumstances, including re-registration of the same label by the same
organization. This policy prevents ID reuse attacks in which a newly
registered agent inherits the trust history of a revoked predecessor.</t>
        </section>
      </section>
    </section>
    <section anchor="method-definitions">
      <name>Method Definitions</name>
      <section anchor="design-philosophy">
        <name>Design Philosophy</name>
        <t>AGTP methods are intent verbs, not resource operations. Each method
expresses what an agent is trying to accomplish. Method names are
uppercase ASCII strings. Methods that modify state are NOT idempotent
by default unless explicitly marked. All methods accept a context
parameter carrying agent session state. Requirement language follows
<xref target="RFC2119"/>.</t>
      </section>
      <section anchor="core-methods">
        <name>Core Methods</name>
        <section anchor="query">
          <name>QUERY</name>
          <t>Purpose: Semantic data retrieval. The agent specifies what it needs to
know, not where to find it. Distinguished from HTTP GET by expressing an
information need rather than retrieving a known resource at a known
location.</t>
          <table>
            <name>QUERY Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">intent</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Natural language or structured expression of the information need</td>
              </tr>
              <tr>
                <td align="left">scope</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Data domains or sources to include or exclude</td>
              </tr>
              <tr>
                <td align="left">format</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Desired response format: structured, natural, raw</td>
              </tr>
              <tr>
                <td align="left">confidence_threshold</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Minimum confidence score for included results (0.0-1.0)</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Session context for disambiguation</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Result set with confidence scores per item. Server <strong>SHOULD</strong>
indicate provenance of each result. Idempotent: Yes.</t>
        </section>
        <section anchor="summarize">
          <name>SUMMARIZE</name>
          <t>Purpose: Request a concise synthesis of provided content or a referenced
resource. The agent is requesting a cognitive operation on data, not
retrieving data.</t>
          <table>
            <name>SUMMARIZE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">source</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Content inline (up to implementation limit) or URI reference</td>
              </tr>
              <tr>
                <td align="left">length</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Target summary length: brief, standard, detailed</td>
              </tr>
              <tr>
                <td align="left">focus</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Aspect to emphasize in the summary</td>
              </tr>
              <tr>
                <td align="left">format</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Output format: bullets, prose, structured</td>
              </tr>
              <tr>
                <td align="left">audience</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Intended reader context, for calibrating complexity</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Summary content with a source_hash and a confidence score.
Idempotent: Yes.</t>
        </section>
        <section anchor="book">
          <name>BOOK</name>
          <t>Purpose: Reserve a resource, time slot, seat, or allocation on behalf of
the agent's principal. State-modifying. Notable error codes: 409 Conflict
(resource unavailable), 451 Scope Violation (principal not authorized for
this resource type).</t>
          <table>
            <name>BOOK Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">resource_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Identifier of the resource to reserve</td>
              </tr>
              <tr>
                <td align="left">principal_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The human or system on whose behalf the booking is made</td>
              </tr>
              <tr>
                <td align="left">time_slot</td>
                <td align="left">
                  <strong>MUST</strong> (if time-based)</td>
                <td align="left">ISO 8601 datetime or range</td>
              </tr>
              <tr>
                <td align="left">quantity</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Number of units to reserve</td>
              </tr>
              <tr>
                <td align="left">options</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Resource-specific booking parameters</td>
              </tr>
              <tr>
                <td align="left">confirm_immediately</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Boolean; if false, creates a hold pending confirmation</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Booking confirmation with booking_id, status (confirmed / held),
and expiry timestamp if a hold. Idempotent: No.</t>
        </section>
        <section anchor="schedule">
          <name>SCHEDULE</name>
          <t>Purpose: Define a sequence of actions, method calls, or events to be
executed at specified times or in response to specified triggers. Creates
a durable plan, not an immediate execution.</t>
          <table>
            <name>SCHEDULE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">steps</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Ordered list of AGTP method calls with parameters</td>
              </tr>
              <tr>
                <td align="left">trigger</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">immediate, datetime, event, or condition</td>
              </tr>
              <tr>
                <td align="left">trigger_value</td>
                <td align="left">
                  <strong>MUST</strong> (if not immediate)</td>
                <td align="left">Datetime, event name, or condition expression</td>
              </tr>
              <tr>
                <td align="left">on_failure</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Behavior on step failure: abort, skip, retry, escalate</td>
              </tr>
              <tr>
                <td align="left">notify</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Notification targets on completion or failure</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Schedule record with schedule_id, confirmed steps, and next
execution timestamp. Idempotent: No.</t>
        </section>
        <section anchor="learn">
          <name>LEARN</name>
          <t>Purpose: Update the agent's session context, knowledge state, or persistent
memory. An explicit context write where the agent asserts that something should
be retained.</t>
          <table>
            <name>LEARN Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">content</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Information to be learned (structured or unstructured)</td>
              </tr>
              <tr>
                <td align="left">scope</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">session (ephemeral), principal (persists for principal), global (shared)</td>
              </tr>
              <tr>
                <td align="left">category</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Semantic category for retrieval optimization</td>
              </tr>
              <tr>
                <td align="left">confidence</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Agent's confidence in the content (0.0-1.0)</td>
              </tr>
              <tr>
                <td align="left">source</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Provenance of the learned content</td>
              </tr>
              <tr>
                <td align="left">ttl</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Expiry for the learned content</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Confirmation with learn_id and effective scope. Idempotent: No.</t>
        </section>
        <section anchor="delegate">
          <name>DELEGATE</name>
          <t>Purpose: Transfer execution of a task or method to a sub-agent or
downstream system. Initiates a new AGTP session on behalf of the delegating
agent, carrying forward authority lineage.</t>
          <table>
            <name>DELEGATE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">target_agent_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Identifier of the agent to delegate to</td>
              </tr>
              <tr>
                <td align="left">task</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">AGTP method call (or sequence) to execute</td>
              </tr>
              <tr>
                <td align="left">authority_scope</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Scope granted to sub-agent <strong>MUST</strong> be a strict subset of delegating agent's scope</td>
              </tr>
              <tr>
                <td align="left">delegation_token</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Signed token proving delegation authority</td>
              </tr>
              <tr>
                <td align="left">callback</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">AGTP endpoint for result delivery</td>
              </tr>
              <tr>
                <td align="left">deadline</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Maximum time for task completion</td>
              </tr>
            </tbody>
          </table>
          <t>Security note: the authority_scope in a DELEGATE request <strong>MUST NOT</strong>
exceed the delegating agent's own Authority-Scope. Servers <strong>MUST</strong> enforce
this and <strong>MUST</strong> return 451 Scope Violation if violated. This is the
protocol-level defense against authority laundering. Idempotent: No.</t>
        </section>
        <section anchor="collaborate">
          <name>COLLABORATE</name>
          <t>Purpose: Initiate a multi-agent coordinated task where two or more agents
work in parallel or in defined roles toward a shared goal. Unlike DELEGATE
(hierarchical), COLLABORATE is peer-to-peer.</t>
          <table>
            <name>COLLABORATE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">collaborators</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">List of Agent-IDs invited to collaborate</td>
              </tr>
              <tr>
                <td align="left">objective</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Shared goal expressed as a task description or structured specification</td>
              </tr>
              <tr>
                <td align="left">role_assignments</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Map of Agent-IDs to roles within the collaboration</td>
              </tr>
              <tr>
                <td align="left">coordination_model</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">parallel, sequential, or consensus</td>
              </tr>
              <tr>
                <td align="left">result_aggregation</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">How results from collaborators are combined</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Collaboration session receipt with collaboration_id. Each
collaborator receives an AGTP NOTIFY to join. Idempotent: No.</t>
        </section>
        <section anchor="confirm">
          <name>CONFIRM</name>
          <t>Purpose: Explicit acknowledgment of a prior action, state, or data item.
Creates a signed attestation record.</t>
          <table>
            <name>CONFIRM Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">target_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">ID of the action, booking, schedule, or item being confirmed</td>
              </tr>
              <tr>
                <td align="left">status</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">accepted, rejected, or deferred</td>
              </tr>
              <tr>
                <td align="left">reason</td>
                <td align="left">
                  <strong>SHOULD</strong> (if rejected/deferred)</td>
                <td align="left">Explanation of the decision</td>
              </tr>
              <tr>
                <td align="left">attestation</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Agent-signed confirmation payload for audit</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Confirmation receipt with timestamp and attestation_id.
Idempotent: Yes.</t>
        </section>
        <section anchor="escalate">
          <name>ESCALATE</name>
          <t>Purpose: Route a task, decision, or exception to a human principal or
higher-authority agent when the current agent cannot or should not proceed.
ESCALATE is the protocol-level expression of meaningful friction in AI
systems as a first-class method.</t>
          <table>
            <name>ESCALATE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">task_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The task or method invocation triggering escalation</td>
              </tr>
              <tr>
                <td align="left">reason</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Structured reason: confidence_threshold, scope_limit, ethical_flag, ambiguous_instruction, resource_unavailable</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Full context needed for the escalation recipient to act</td>
              </tr>
              <tr>
                <td align="left">priority</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">urgent, normal, or low</td>
              </tr>
              <tr>
                <td align="left">recipient</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Specific human or agent to escalate to; if absent, routes to default handler</td>
              </tr>
              <tr>
                <td align="left">deadline</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Time by which a response is needed</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Escalation receipt with escalation_id and routing confirmation.
The escalated task is paused until resolved via CONFIRM. Idempotent: Yes.
An agent that escalates appropriately is functioning correctly. Governance
frameworks built on AGTP can use escalation frequency and reason codes as
observability signals for systemic issues.</t>
        </section>
        <section anchor="notify">
          <name>NOTIFY</name>
          <t>Purpose: Asynchronous push of information from an agent to a recipient.
Does not expect a response. Fire-and-forget. Delivery confirmation (if
required) returned via a subsequent CONFIRM from the recipient.</t>
          <table>
            <name>NOTIFY Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">recipient</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Target Agent-ID, human endpoint, or broadcast group</td>
              </tr>
              <tr>
                <td align="left">content</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Notification payload</td>
              </tr>
              <tr>
                <td align="left">urgency</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">critical, informational, or background</td>
              </tr>
              <tr>
                <td align="left">delivery_guarantee</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">at_most_once, at_least_once, or exactly_once</td>
              </tr>
              <tr>
                <td align="left">expiry</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Timestamp after which the notification should not be delivered</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Delivery receipt with notification_id. Idempotent: No.</t>
        </section>
        <section anchor="describe">
          <name>DESCRIBE</name>
          <t>Purpose: Return the operational capabilities of a known agent endpoint.
The requesting agent specifies what capability dimensions it needs to
evaluate; the server returns a structured Capability Document. Used for
pre-task negotiation before committing to DELEGATE or COLLABORATE. If
<tt>capability_domains</tt> is omitted, the server <strong>SHOULD</strong> return all supported
domains. Category: ACQUIRE.</t>
          <table>
            <name>DESCRIBE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">capability_domains</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Comma-separated domains to return: <tt>methods</tt>, <tt>modalities</tt>, <tt>tools</tt>, <tt>version</tt>, <tt>budget</tt>, <tt>zones</tt>. If omitted, server <strong>SHOULD</strong> return all.</td>
              </tr>
              <tr>
                <td align="left">version_min</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Minimum acceptable version for capability negotiation.</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Session context for capability filtering.</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Capability Document with the following structure:</t>
          <sourcecode type="json"><![CDATA[
{
  "supported_methods": ["QUERY", "SUMMARIZE", "DESCRIBE"],
  "modalities": ["text", "image", "streaming"],
  "tools": ["web_search", "code_execute"],
  "version": "2.0.0",
  "version_min_satisfied": true,
  "behavioral_trust_score": 0.94,
  "budget_units_accepted": ["tokens", "compute-seconds"],
  "zones_accepted": ["zone:internal", "zone:partner"]
}
]]></sourcecode>
          <t>Idempotent: Yes. Primary error codes: 404, 422.</t>
        </section>
        <section anchor="suspend">
          <name>SUSPEND</name>
          <t>Purpose: Pause a specific active session workflow in a recoverable state.
Issues a resumption nonce the requesting agent uses to resume the session.
Method-level SUSPEND is session-scoped and does not affect registry
lifecycle state or Birth Certificate validity. The distinction between
method-level SUSPEND and lifecycle SUSPEND (Section 6.7.6) is
architectural: method-level SUSPEND is a workflow primitive; lifecycle
SUSPEND is an administrative action on the agent's registry record.
Category: ORCHESTRATE.</t>
          <table>
            <name>SUSPEND Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">session_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The session to suspend.</td>
              </tr>
              <tr>
                <td align="left">reason</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Structured reason: <tt>awaiting_input</tt>, <tt>resource_limit</tt>, <tt>scheduled_pause</tt>, <tt>external_dependency</tt>.</td>
              </tr>
              <tr>
                <td align="left">resume_by</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">ISO 8601 deadline for resumption. If exceeded without RESUME, session transitions to expired.</td>
              </tr>
              <tr>
                <td align="left">checkpoint</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Agent-provided state snapshot for resumption context. Stored by server for duration of suspension.</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Suspension receipt with the following structure:</t>
          <sourcecode type="json"><![CDATA[
{
  "suspension_id": "susp-0042",
  "session_id": "sess-a1b2c3d4",
  "resumption_nonce": "[128-bit random value, base64url]",
  "resume_by": "2026-04-15T09:00:00Z",
  "status": "suspended"
}
]]></sourcecode>
          <t>The <tt>resumption_nonce</tt> <strong>MUST</strong> be a cryptographically random 128-bit
value encoded as base64url. It is single-use: once presented to resume
a session, the nonce is invalidated and <strong>MUST NOT</strong> be accepted again.
Idempotent: No. Primary error codes: 404, 408.</t>
          <t>Servers MUST generate nonces with at least 128 bits of entropy using 
a CSPRNG.</t>
        </section>
      </section>
      <section anchor="method-summary-table">
        <name>Method Summary Table</name>
        <table>
          <name>AGTP Core Method Summary</name>
          <thead>
            <tr>
              <th align="left">Method</th>
              <th align="left">Intent</th>
              <th align="left">State-Modifying</th>
              <th align="left">Idempotent</th>
              <th align="left">Primary Error Codes</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">QUERY</td>
              <td align="left">Retrieve information</td>
              <td align="left">No</td>
              <td align="left">Yes</td>
              <td align="left">404, 422</td>
            </tr>
            <tr>
              <td align="left">SUMMARIZE</td>
              <td align="left">Synthesize content</td>
              <td align="left">No</td>
              <td align="left">Yes</td>
              <td align="left">400, 422</td>
            </tr>
            <tr>
              <td align="left">BOOK</td>
              <td align="left">Reserve a resource</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">409, 451</td>
            </tr>
            <tr>
              <td align="left">SCHEDULE</td>
              <td align="left">Plan future actions</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">400, 409</td>
            </tr>
            <tr>
              <td align="left">LEARN</td>
              <td align="left">Update agent context</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">400, 403</td>
            </tr>
            <tr>
              <td align="left">DELEGATE</td>
              <td align="left">Transfer task to sub-agent</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">403, 451, 551</td>
            </tr>
            <tr>
              <td align="left">COLLABORATE</td>
              <td align="left">Coordinate peer agents</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">404, 403</td>
            </tr>
            <tr>
              <td align="left">CONFIRM</td>
              <td align="left">Attest to a prior action</td>
              <td align="left">Yes</td>
              <td align="left">Yes</td>
              <td align="left">404, 400</td>
            </tr>
            <tr>
              <td align="left">ESCALATE</td>
              <td align="left">Defer to human/authority</td>
              <td align="left">Yes</td>
              <td align="left">Yes</td>
              <td align="left">404</td>
            </tr>
            <tr>
              <td align="left">NOTIFY</td>
              <td align="left">Push information</td>
              <td align="left">No</td>
              <td align="left">No</td>
              <td align="left">400, 404</td>
            </tr>
            <tr>
              <td align="left">DESCRIBE</td>
              <td align="left">Retrieve endpoint capabilities</td>
              <td align="left">No</td>
              <td align="left">Yes</td>
              <td align="left">404, 422</td>
            </tr>
            <tr>
              <td align="left">SUSPEND</td>
              <td align="left">Pause session workflow</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">404, 408</td>
            </tr>
            <tr>
              <td align="left">PROPOSE</td>
              <td align="left">Submit a dynamic endpoint proposal</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">400, 403, 460</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="method-registry-and-extensibility">
        <name>Method Registry and Extensibility</name>
        <t>AGTP defines a formal Method Registry maintained by IANA (see Section 8.2).
Any party may submit a new method for registration. The registration
procedure is Expert Review, and registration <strong>MUST</strong> be accompanied by a
published specification, at minimum an IETF Internet-Draft or equivalent
publicly available document. Registered methods <strong>MUST</strong>:</t>
        <ol spacing="normal" type="1"><li>
            <t>Have a unique uppercase ASCII name</t>
          </li>
          <li>
            <t>Define required and optional parameters</t>
          </li>
          <li>
            <t>Define expected response structure</t>
          </li>
          <li>
            <t>Specify idempotency behavior</t>
          </li>
          <li>
            <t>Specify applicable error codes</t>
          </li>
          <li>
            <t>Include a security considerations section</t>
          </li>
          <li>
            <t>Be accompanied by a published reference specification (Internet-Draft or RFC)</t>
          </li>
          <li>
            <t>Conform to the AGIS Grammar Specification <xref target="AGIS"/>, demonstrating
membership in the action-intent semantic class as defined therein.
Submissions that do not satisfy AGIS syntactic and semantic class
requirements <strong>MUST</strong> be rejected by the Designated Expert.</t>
          </li>
        </ol>
        <t>Experimental methods <strong>MAY</strong> be used prior to registration using the X-
prefix convention (e.g., X-NEGOTIATE). Experimental methods <strong>MUST NOT</strong>
be used in production deployments without registration. Experimental
methods <strong>MUST</strong> also conform to AGIS grammar rules; non-conformant
experimental methods <strong>MUST NOT</strong> be forwarded by AGTP-aware
infrastructure components.</t>
        <section anchor="grammar-based-method-validation-method-grammar-header">
          <name>Grammar-Based Method Validation (Method-Grammar Header)</name>
          <t>In addition to the IANA registry pathway, AGTP version 03 introduces a
grammar-based method validation pathway. When an AGTP request carries the
<tt>Method-Grammar</tt> header, the receiving infrastructure validates the method
identifier against the declared grammar specification rather than checking
the IANA registry exclusively.</t>
          <artwork><![CDATA[
Method-Grammar: AGIS/1.0
]]></artwork>
          <t><strong>Behavior when Method-Grammar: AGIS/1.0 is present:</strong></t>
          <ol spacing="normal" type="1"><li>
              <t>The AGTP infrastructure layer validates the method identifier against
the AGIS Grammar Specification <xref target="AGIS"/>.</t>
            </li>
            <li>
              <t>If the method identifier is AGIS-conformant (imperative base-form verb,
action-intent semantic class, not an HTTP method or state descriptor),
the request proceeds regardless of whether the method appears in the
IANA registry.</t>
            </li>
            <li>
              <t>If the method identifier fails AGIS validation, the infrastructure
<strong>MUST</strong> return status 454 (Grammar Violation) and <strong>MUST NOT</strong> forward
the request.</t>
            </li>
            <li>
              <t>AGIS-conformant custom methods carry the same transport-level identity,
authority scope, and governance semantics as registered methods.</t>
            </li>
          </ol>
          <t>This pathway enables organizations to define domain-specific Agentive API
vocabularies -- RESERVE instead of BOOK, LOCATE instead of FIND, ADMIT
and TRIAGE for healthcare contexts -- without requiring IANA registration
while maintaining full AGTP transport governance. The IANA registry
continues to serve as the reference vocabulary for maximum cross-system
interoperability; the grammar pathway enables domain specificity within
those constraints.</t>
          <t><strong>Status code 454 Grammar Violation:</strong>
Returned when a method identifier is present with <tt>Method-Grammar: AGIS/1.0</tt>
but fails AGIS grammar validation. The response body <strong>MUST</strong> include the
specific validation failure from the AGIS eight-pass validator. This status
code is registered in the AGTP Status Code Registry (see Section 8.3).</t>
          <t>Capability negotiation occurs during session establishment. The server
returns a Supported-Methods header listing the methods it implements.
Clients <strong>SHOULD</strong> check this list before invoking non-core methods.</t>
          <t>The <tt>Negotiation-ID</tt> header is used to correlate turns within a dynamic
endpoint negotiation sequence (see Section 6.5). It <strong>MUST</strong> be a
UUID generated by the service upon receiving a PROPOSE request and
<strong>MUST</strong> be echoed in all subsequent turns of the same negotiation.
Maximum three turns before the agent <strong>MUST</strong> ESCALATE.</t>
          <artwork><![CDATA[
Negotiation-ID: 550e8400-e29b-41d4-a716-446655440000
]]></artwork>
          <t>QUOTE is defined as a Tier 2 Standard Extended Method in <xref target="AGTP-METHODS"/>.
QUOTE provides pre-flight cost estimation for a proposed method invocation:
the requesting agent submits a proposed method call; the server returns a
<tt>Cost-Estimate</tt> response without executing the method. Servers supporting
budget negotiation via the <tt>Budget-Limit</tt> header <strong>SHOULD</strong> implement QUOTE
to enable agents to validate cost before committing to execution. Servers
that implement QUOTE <strong>MUST</strong> list it in the <tt>Supported-Methods</tt> response
header at session establishment.</t>
        </section>
      </section>
      <section anchor="dynamic-endpoint-negotiation">
        <name>Dynamic Endpoint Negotiation</name>
        <section anchor="overview-1">
          <name>Overview</name>
          <t>AGTP version 03 introduces a dynamic endpoint negotiation protocol
enabling agents to discover data availability and instantiate endpoints
on demand, without requiring pre-built API definitions. This protocol
realizes the agentic API vision in which organizations expose data
availability rather than pre-designed endpoints, and agents construct
the interface they need at runtime.</t>
          <t>The negotiation protocol operates at the transport layer. AGIS <xref target="AGIS"/>
provides the grammar for proposal and acceptance documents. The agent's
identity and authority credentials (via the AGTP-CERT extension
<xref target="AGTP-CERT"/> where deployed) govern authorization decisions.</t>
        </section>
        <section anchor="protocol-flow">
          <name>Protocol Flow</name>
          <artwork><![CDATA[
Step 1:  Pre-auth discovery
         Agent issues unauthenticated GET to agtp://service.example.com
         Service returns AGIS document + data_manifest block
         No credentials required at this step

Step 2:  Agent evaluates data_manifest
         Agent determines the service has relevant data
         Agent assesses whether `negotiable: true` is declared
         Agent constructs an AGIS-formatted endpoint proposal

Step 3:  PROPOSE request
         Agent sends PROPOSE with AGIS endpoint definition in body
         Request MAY be unauthenticated if data sensitivity is low
         Request MUST include Method-Grammar: AGIS/1.0 header

Step 4a: Authorization required (262)
         Service returns 262 with required authorization mechanism
         Agent establishes credentials via specified mechanism
         Agent resubmits PROPOSE with credentials
         Negotiation-ID issued by service in 262 response

Step 4b: Negotiation in progress (261)
         Service evaluates proposal asynchronously
         Service returns 261 with Negotiation-ID
         Agent polls or awaits outcome

Step 5a: Endpoint instantiated (263)
         Service returns 263 with complete AGIS endpoint definition
         Negotiation-ID matches original proposal
         Instantiated endpoint is session-scoped by default
         Agent MAY call the endpoint immediately

Step 5b: Proposal rejected (460)
         Service returns 460 with rejection reason
         Response SHOULD reference data_manifest alternatives
         Agent MAY modify proposal and retry (maximum 3 turns)
         After 3 rejections agent MUST ESCALATE
]]></artwork>
        </section>
        <section anchor="propose-method">
          <name>PROPOSE Method</name>
          <t>PROPOSE is a Tier 1 AGTP method. The requesting agent submits an
AGIS-formatted endpoint definition describing the interface it needs.
The service evaluates whether it can fulfill the proposal against its
data manifest and authorization policy.</t>
          <t>Parameters:</t>
          <table>
            <name>PROPOSE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">proposal</td>
                <td align="left">Yes</td>
                <td align="left">Complete AGIS endpoint definition (method + path + semantic block + input schema + output schema)</td>
              </tr>
              <tr>
                <td align="left">session_id</td>
                <td align="left">Yes</td>
                <td align="left">The active AGTP session identifier</td>
              </tr>
              <tr>
                <td align="left">data_class</td>
                <td align="left">Yes</td>
                <td align="left">The data_manifest class the proposal targets</td>
              </tr>
              <tr>
                <td align="left">scope_requested</td>
                <td align="left">Recommended</td>
                <td align="left">The authority scope the agent requests for this endpoint</td>
              </tr>
              <tr>
                <td align="left">persistence</td>
                <td align="left">Optional</td>
                <td align="left">session (default) or persistent; persistent requires elevated authorization</td>
              </tr>
            </tbody>
          </table>
          <t>Response on 263 Endpoint Instantiated:</t>
          <sourcecode type="json"><![CDATA[
{
  "negotiation_id": "550e8400-e29b-41d4-a716-446655440000",
  "instantiated_endpoint": {
    "method": "LOCATE",
    "path": "/customer/{id}/location",
    "semantic": {
      "intent": "Returns the last known location for a customer",
      "actor": "agent",
      "outcome": "Location coordinates and address are returned",
      "capability": "retrieval",
      "confidence_guidance": 0.70,
      "impact_tier": "informational",
      "is_idempotent": true
    },
    "input": { "required": ["id"] },
    "output": { "coordinates": "object", "address": "string" },
    "errors": ["customer_not_found", "location_not_available"],
    "proposed": true,
    "scope_required": "location:read",
    "expires": "session"
  }
}
]]></sourcecode>
          <t>The <tt>proposed: true</tt> flag marks this as a dynamically instantiated
endpoint per the AGIS specification <xref target="AGIS"/>.</t>
        </section>
        <section anchor="credential-free-negotiation">
          <name>Credential-Free Negotiation</name>
          <t>For data classes declared with <tt>sensitivity: informational</tt> and
<tt>requires_authorization: false</tt> in the data manifest, services MAY
complete the full negotiation flow without requiring credentials.
The agent arrives, proposes, and receives an instantiated endpoint
without API keys.</t>
          <t>For sensitive data classes, services MUST require credential
establishment at Step 4a. The negotiation protocol is the mechanism
by which credentials are established, not a prerequisite. This
distinction is fundamental: the agent does not need credentials to
begin a negotiation; it needs credentials to complete one for
sensitive data.</t>
          <t>AGTP-CERT <xref target="AGTP-CERT"/> provides the cryptographic identity binding
that enables services to make fine-grained authorization decisions
during negotiation based on the agent's verified identity, principal,
and authority scope.</t>
        </section>
        <section anchor="session-scope-and-persistence">
          <name>Session Scope and Persistence</name>
          <t>Instantiated endpoints are session-scoped by default. They cease to
exist when the AGTP session terminates. Services MAY offer persistent
instantiation (the endpoint survives session termination and is added
to the service's AGIS document) subject to elevated authorization.</t>
          <t>Persistent instantiation SHOULD be treated as a modification to the
service's published AGIS document. Services supporting persistent
instantiation MUST increment their AGIS-Version header on the next
discovery request following persistence.</t>
        </section>
      </section>
      <section anchor="extended-method-vocabulary-and-industry-profiles">
        <name>Extended Method Vocabulary and Industry Profiles</name>
        <section anchor="three-tier-method-architecture">
          <name>Three-Tier Method Architecture</name>
          <t>The AGTP method vocabulary is organized into three tiers reflecting
different levels of universality, specificity, and domain relevance. All
methods at all tiers <strong>MUST</strong> conform to the AGIS Grammar Specification
<xref target="AGIS"/>. The AGIS action-intent semantic class constraint applies to
every method in the IANA registry and to every AGIS-validated custom
method accepted via the Method-Grammar header pathway.</t>
          <dl>
            <dt>Tier 1. Core Methods (defined in Section 6.2):</dt>
            <dd>
              <t>The baseline vocabulary required for AGTP compliance. Every conformant
AGTP implementation <strong>MUST</strong> support all Tier 1 methods. All Tier 1
methods are AGIS-conformant; they are defined instances of the
action-intent semantic class standardized in <xref target="AGIS"/>.</t>
            </dd>
            <dt>Tier 2. Standard Extended Methods:</dt>
            <dd>
              <t>Registered in the IANA AGTP Method Registry and available for use in any
AGTP implementation. Not required for baseline compliance but <strong>SHOULD</strong>
be implemented where their semantics apply. Defined in <xref target="AGTP-METHODS"/>.
All Tier 2 methods satisfy AGIS grammar requirements.</t>
            </dd>
            <dt>Tier 3. Industry Profile Methods:</dt>
            <dd>
              <t>Domain-specific method sets defined and registered by industry
communities as named AGTP profiles. Valid within deployments that declare
support for the relevant profile. Not required in general-purpose
implementations. All Tier 3 profile method submissions <strong>MUST</strong> include
AGIS conformance verification as part of their specification.</t>
            </dd>
            <dt>Tier 4. AGIS-Validated Custom Methods:</dt>
            <dd>
              <t>Organization-defined methods that are not registered in the IANA AGTP
Method Registry but conform to the AGIS Grammar Specification and are
accepted at the transport layer via the <tt>Method-Grammar: AGIS/1.0</tt>
header. Valid within the deploying organization's AGTP services. The
action-intent semantic class constraint applies identically. Agents
discover and interpret these methods through natural language inference
against AGIS semantic declarations, as validated empirically in
<xref target="HOOD2026"/>.</t>
            </dd>
          </dl>
        </section>
        <section anchor="method-category-taxonomy">
          <name>Method Category Taxonomy</name>
          <t>All AGTP methods are organized into five categories:</t>
          <dl>
            <dt>ACQUIRE:</dt>
            <dd>
              <t>Retrieve data, resources, or state without modifying it. Typically
idempotent; no state modification.</t>
            </dd>
            <dt>COMPUTE:</dt>
            <dd>
              <t>Process, transform, or analyze information and produce a derived result.
Typically idempotent given the same input.</t>
            </dd>
            <dt>TRANSACT:</dt>
            <dd>
              <t>Perform state-changing operations with external systems, resources, or
records. Not idempotent by default; subject to reversibility
classification.</t>
            </dd>
            <dt>COMMUNICATE:</dt>
            <dd>
              <t>Send information, notifications, or signals to recipients. Fire-and-
forget or confirm-receipt delivery models.</t>
            </dd>
            <dt>ORCHESTRATE:</dt>
            <dd>
              <t>Coordinate, sequence, or manage multiple agents, tasks, or workflows.
May spawn sub-agents or sessions; delegation chain semantics apply.</t>
            </dd>
          </dl>
          <table>
            <name>Core Method Category Mapping</name>
            <thead>
              <tr>
                <th align="left">Core Method</th>
                <th align="left">Category</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">QUERY</td>
                <td align="left">Acquire</td>
              </tr>
              <tr>
                <td align="left">SUMMARIZE</td>
                <td align="left">Compute</td>
              </tr>
              <tr>
                <td align="left">BOOK</td>
                <td align="left">Transact</td>
              </tr>
              <tr>
                <td align="left">SCHEDULE</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">LEARN</td>
                <td align="left">Compute</td>
              </tr>
              <tr>
                <td align="left">DELEGATE</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">COLLABORATE</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">CONFIRM</td>
                <td align="left">Transact</td>
              </tr>
              <tr>
                <td align="left">ESCALATE</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">NOTIFY</td>
                <td align="left">Communicate</td>
              </tr>
              <tr>
                <td align="left">DESCRIBE</td>
                <td align="left">Acquire</td>
              </tr>
              <tr>
                <td align="left">SUSPEND</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">PROPOSE</td>
                <td align="left">Orchestrate</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="standard-extended-methods-tier-2">
          <name>Standard Extended Methods (Tier 2)</name>
          <t>The following methods constitute the initial Tier 2 registration set,
defined in <xref target="AGTP-METHODS"/>. Listed here by category with brief semantic
definitions; full parameter specifications are in the companion document.</t>
          <t>ACQUIRE category: FETCH, SEARCH, SCAN, PULL, IMPORT, FIND.</t>
          <t>COMPUTE category: EXTRACT, FILTER, VALIDATE, TRANSFORM, TRANSLATE,
NORMALIZE, PREDICT, RANK, MAP.</t>
          <t>TRANSACT category: REGISTER, SUBMIT, TRANSFER, PURCHASE, SIGN, MERGE,
LINK, LOG, SYNC, PUBLISH.</t>
          <t>COMMUNICATE category: REPLY, SEND, REPORT.</t>
          <t>ORCHESTRATE category: MONITOR, ROUTE, RETRY, PAUSE, RESUME, RUN, CHECK.</t>
          <t>Notable constraints: PURCHASE <strong>MUST</strong> carry explicit principal_id and
scope enforcement; 451 Scope Violation applies if payments:purchase is
not in the agent's Authority-Scope. RUN requires explicit procedure_id
parameter; implementations <strong>MUST NOT</strong> accept free-form execution strings.</t>
        </section>
        <section anchor="short-form-and-industry-inspired-methods">
          <name>Short-Form and Industry-Inspired Methods</name>
          <t>A set of short-form verb methods, e.g., SET, TAKE, OPEN, START, CALL, MAKE,
TURN, BREAK, are provisionally catalogued as candidates for Tier 2
registration. These verbs are highly context-dependent and their semantics
vary significantly across deployment domains.</t>
          <t>Short-form methods will be registered individually only when a published
companion specification provides unambiguous semantic definitions
demonstrably distinct from existing registered methods. Provisional
registrations using the X- prefix (e.g., X-SET, X-CALL) are encouraged
during the experimentation period.</t>
        </section>
        <section anchor="industry-profile-method-sets">
          <name>Industry Profile Method Sets</name>
          <t>AGTP recognizes that specific industries require method vocabularies
reflecting domain-specific operations that would be inappropriate in a
general-purpose standard. Industry profile method sets are defined and
registered as named AGTP profiles. A profile is a published companion
specification that:</t>
          <ol spacing="normal" type="1"><li>
              <t>Declares a profile name (e.g., agtp-profile-healthcare,
agtp-profile-financial, agtp-profile-legaltech)</t>
            </li>
            <li>
              <t>Defines one or more industry-specific methods with full parameter
specifications, error codes, and security considerations</t>
            </li>
            <li>
              <t>Specifies which Tier 1 and Tier 2 methods are REQUIRED, RECOMMENDED,
or NOT APPLICABLE within the profile</t>
            </li>
            <li>
              <t>Addresses regulatory or compliance considerations specific to the
domain (e.g., HIPAA for healthcare, PCI-DSS for financial services)</t>
            </li>
          </ol>
          <t>Illustrative examples of potential industry profile methods (not yet
registered; listed for directional purposes only):</t>
          <t>Healthcare: PRESCRIBE, AUTHORIZE, REFER, DISPENSE, TRIAGE, CONSENT, REDACT</t>
          <t>Financial services: SETTLE, RECONCILE, HEDGE, CLEAR, UNDERWRITE, KYC, AML</t>
          <t>Legal and compliance: ATTEST, NOTARIZE, DISCLOSE, REDLINE, EXECUTE,
PRESERVE</t>
          <t>Infrastructure: PROVISION, DEPROVISION, ROLLBACK, SNAPSHOT, FAILOVER</t>
          <t>Industry communities are encouraged to develop and submit profile
specifications through the IETF process. The IANA AGTP Method Registry will
maintain a profile index alongside the core and standard method registries.</t>
        </section>
        <section anchor="registration-path-for-new-methods">
          <name>Registration Path for New Methods</name>
          <dl>
            <dt>For Tier 2 Standard Methods:</dt>
            <dd>
              <t>Submit an Internet-Draft to the IETF providing full method specification
per Section 6.4. The Designated Expert reviews for semantic uniqueness,
clarity, AGIS grammar conformance <xref target="AGIS"/>, and security considerations.
Submissions that fail AGIS validation <strong>MUST</strong> be returned to the submitter
before review proceeds.</t>
            </dd>
            <dt>For Industry Profile Methods (Tier 3):</dt>
            <dd>
              <t>Submit a profile specification to the IETF (or a recognized domain
standards body with an established AGTP registry liaison) covering all
methods in the profile and profile compliance requirements. The
specification <strong>MUST</strong> include AGIS conformance statements for every
method defined in the profile.</t>
            </dd>
            <dt>For AGIS-Validated Custom Methods (Tier 4):</dt>
            <dd>
              <t>No IANA registration required. The implementing organization defines
its method vocabulary in an AGIS document served at the service's AGTP
address. Methods are validated at the transport layer using the
<tt>Method-Grammar: AGIS/1.0</tt> header. The method vocabulary is declared
in the AGIS vocabulary block and discoverable by agents at runtime.
Organizations adopting Tier 4 methods are encouraged to publish their
AGIS documents at <tt>agtp://[service-address]</tt> to enable cross-system
agent discovery.</t>
            </dd>
            <dt>For Experimental Methods:</dt>
            <dd>
              <t>Use the X- prefix without registration. Implementations <strong>MUST NOT</strong>
deploy experimental methods in production without completing either the
IANA registration process (Tier 2/3) or deploying a conformant AGIS
document (Tier 4). Experimental method names do not reserve the
unprefixed name.</t>
            </dd>
          </dl>
          <t>The AGTP Method Registry is published at:
https://www.iana.org/assignments/agtp-methods/</t>
          <t>The AGIS conformance test suite is maintained at:
https://agtp.io/agis/conformance</t>
        </section>
        <section anchor="real-time-service-adaptation">
          <name>Real-time Service Adaptation</name>
          <t>Services that update their AGIS documents at runtime MUST signal changes
via the <tt>AGIS-Version</tt> response header. This header MUST be present on
all AGTP responses from negotiable services.</t>
          <artwork><![CDATA[
AGIS-Version: 1.2.4
]]></artwork>
          <t>Agent runtimes MUST cache the AGIS-Version value from each service.
When a response carries an AGIS-Version value different from the cached
value, the agent runtime MUST re-fetch and re-validate the AGIS document
before issuing further method calls. This mechanism supports real-time
service adaptation without requiring push notifications.</t>
          <artwork><![CDATA[
Adaptation flow:
  Agent calls BOOK /reservation
  Response includes AGIS-Version: 1.2.5 (was 1.2.4)
  Agent re-fetches agtp://service.example.com
  Service returns updated AGIS document (new endpoint added)
  Agent updates service map
  Agent resumes operation with updated capability knowledge
]]></artwork>
          <t>Services SHOULD increment AGIS-Version when:
  - A new endpoint is added to the AGIS document
  - An existing endpoint's semantic declaration changes
  - A new verb is added to the vocabulary block
  - A new data class is added to the data_manifest</t>
          <t>Services MUST NOT decrement or reuse AGIS-Version values.</t>
        </section>
      </section>
    </section>
    <section anchor="merchant-identity-and-agentic-commerce-binding">
      <name>Merchant Identity and Agentic Commerce Binding</name>
      <section anchor="overview-2">
        <name>Overview</name>
        <t>AGTP specifies agent-side identity through the Agent Birth
Certificate, canonical Agent-ID, Agent Manifest Document, and Trust
Tier model defined in Section 5. PURCHASE invocations carrying
<tt>payments:purchase</tt> in the Authority-Scope header and a Budget-Limit
constraint are fully governed on the sending side. The receiving side
of a PURCHASE -- the merchant counterparty -- does not have an
equivalent protocol-level identity in the base specification.</t>
        <t>Version 04 of AGTP introduces normative integration hooks for the
AGTP Merchant Identity and Agentic Commerce Binding specification
<xref target="AGTP-MERCHANT"/>, which defines the merchant-side identity model.
The integration is hook-based: this document registers the required
headers, status code, and Authority-Scope domains; the detailed
semantics, Merchant Manifest Document schema, Merchant Birth
Certificate structure, and counterparty verification procedure are
specified in the companion.</t>
      </section>
      <section anchor="merchant-identity-headers-summary">
        <name>Merchant Identity Headers (Summary)</name>
        <t>PURCHASE invocations in a fully conformant v04 deployment carry the
following additional headers:</t>
        <ul spacing="normal">
          <li>
            <t><tt>Merchant-ID</tt>: canonical identifier of the intended merchant
counterparty.</t>
          </li>
          <li>
            <t><tt>Merchant-Manifest-Fingerprint</tt>: SHA-256 fingerprint of the
Merchant Manifest Document the requesting agent verified during
pre-flight counterparty verification.</t>
          </li>
          <li>
            <t><tt>Intent-Assertion</tt>: detached JWT carrying principal-authorized
purchase intent, forwardable to payment networks as standalone
evidence.</t>
          </li>
          <li>
            <t><tt>Cart-Digest</tt>: digest of a structured cart returned by a prior
QUOTE invocation, binding this PURCHASE to that cart.</t>
          </li>
        </ul>
        <t>Full field definitions, wire examples, and security requirements are
in <xref target="AGTP-MERCHANT"/>.</t>
      </section>
      <section anchor="counterparty-unverified-summary">
        <name>455 Counterparty Unverified (Summary)</name>
        <t>Receiving servers <strong>MUST</strong> return 455 Counterparty Unverified on
PURCHASE invocations that fail merchant identity verification:
missing <tt>Merchant-ID</tt> or <tt>Merchant-Manifest-Fingerprint</tt> headers,
fingerprint mismatch, Merchant-ID mismatch, or a target merchant in
any lifecycle state other than Active. 455 is a governance signal,
parallel in role to 451 Scope Violation and 453 Zone Violation:
<strong>MUST</strong> be logged; <strong>MUST NOT</strong> be retried without re-running
counterparty verification.</t>
      </section>
      <section anchor="integration-with-purchase-discover-and-attribution-record">
        <name>Integration with PURCHASE, DISCOVER, and Attribution-Record</name>
        <t>Three existing AGTP primitives interact with merchant identity:</t>
        <ul spacing="normal">
          <li>
            <t><strong>PURCHASE</strong>: Counterparty verification runs before PURCHASE is
sent on the wire. A verified PURCHASE produces an Attribution-
Record naming both the agent and the merchant cryptographically.</t>
          </li>
          <li>
            <t><strong>DISCOVER</strong>: The DISCOVER method defined in <xref target="AGTP-DISCOVER"/> is
extended by <xref target="AGTP-MERCHANT"/> to return Merchant Manifest
Documents when the query carries <tt>result_type: "merchant"</tt>, and to
return mixed agent/merchant result sets when <tt>result_type: "any"</tt>.
The existing DISCOVER signature model, ranking model, and
governance-zone enforcement apply unchanged.</t>
          </li>
          <li>
            <t><strong>Attribution-Record</strong>: The Attribution-Record returned on
PURCHASE includes <tt>merchant_id</tt>, <tt>merchant_fingerprint</tt>, and
<tt>intent_assertion_jti</tt> fields when merchant identity binding is
in effect. This produces a dual-party cryptographic record
consumable by downstream audit and dispute-resolution processes
without requiring those processes to speak AGTP.</t>
          </li>
        </ul>
      </section>
      <section anchor="relationship-to-payment-networks">
        <name>Relationship to Payment Networks</name>
        <t>The merchant identity model defined in this document is payment-rail
neutral. It does not define payment credential handling, tokenized
card-on-file representations, authorization messaging to card
networks, or settlement. Payment networks wishing to extend
protection, fraud coverage, or dispute handling to agent-initiated
transactions consume the Intent-Assertion JWT and the Attribution-
Record as verifiable inputs to their own authorization and dispute
flows; no AGTP-layer integration is required on the payment-network
side. The specific mapping between AGTP merchant identity artifacts
and payment-network message formats is expected to be defined
bilaterally between governance platforms and individual networks and
is out of scope for this document.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This section satisfies the mandatory IETF Security Considerations
requirement. All AGTP implementations <strong>MUST</strong> address the considerations
described here.</t>
      <section anchor="mandatory-tls">
        <name>Mandatory TLS</name>
        <t>All AGTP connections <strong>MUST</strong> use TLS 1.3 or higher. Implementations
<strong>MUST</strong> reject connections using TLS 1.2 or below. Certificate validation
follows standard PKI practices per <xref target="RFC5280"/>. Servers <strong>MUST</strong> present
a valid certificate.</t>
      </section>
      <section anchor="agent-identity-verification-three-levels">
        <name>Agent Identity Verification: Three Levels</name>
        <t>AGTP defines three distinct levels at which agent identity and
Authority-Scope can be verified. Each level serves a different deployment
profile and operational tradeoff. Understanding the distinction is
essential for implementers: the AGTP Agent Certificate extension
(<xref target="AGTP-CERT"/>) is OPTIONAL, and base AGTP provides cryptographic
verification at the application layer without it.</t>
        <t><strong>Level 1 - Self-asserted headers (raw request fields).</strong>
Every AGTP request <strong>MUST</strong> include <tt>Agent-ID</tt> and <tt>Principal-ID</tt>
header fields. As raw header values on an individual request, these
fields are self-asserted: a client writes the values into the request
and the server records what was written. Level 1 verification is
limited to mandatory logging and anomaly detection against the
recorded stream. This is the minimum baseline every AGTP implementation
provides.</t>
        <t><strong>Level 2 - Application-layer cryptographic verification (signed
Agent Manifest Document).</strong> A canonical Agent-ID resolves to a
signed Agent Manifest Document (Section 5.5) that carries the Birth
Certificate's Authority-Scope grant and is signed by the governance
platform that issued it. A verifier (including a stranger with no
prior relationship to the agent's organization) can cryptographically
verify identity and scope at the application layer by performing the
following steps:</t>
        <ol spacing="normal" type="1"><li>
            <t>Resolve the canonical Agent-ID to retrieve the signed Agent
Manifest Document.</t>
          </li>
          <li>
            <t>Verify the governance platform's signature on the manifest against
the platform's published key.</t>
          </li>
          <li>
            <t>Confirm that the canonical Agent-ID in the manifest matches the
hash of the Birth Certificate.</t>
          </li>
          <li>
            <t>Read the Authority-Scope grant from the verified manifest.</t>
          </li>
        </ol>
        <t>Level 2 verification is available in base AGTP without the Agent
Certificate extension. It is the identity mechanism the protocol
depends on. Self-asserted headers (Level 1) are bound to verified
identity (Level 2) by the resolver's retrieval of the signed
manifest for the declared canonical Agent-ID.</t>
        <t><strong>Level 3 - Transport-layer cryptographic verification (AGTP-CERT
extension).</strong> The AGTP Agent Certificate extension <xref target="AGTP-CERT"/>
binds <tt>Agent-ID</tt>, <tt>Principal-ID</tt>, and Authority-Scope to an X.509 v3
certificate presented during TLS 1.3 mutual authentication. Level 3
accelerates the Level 2 check to the TLS handshake and enables
Scope-Enforcement Points (SEPs) to verify Authority-Scope at O(1)
per-request cost without application-layer access. Level 3 is an
acceleration and enforcement path for Level 2, not a replacement of
it. Deployments that require line-rate scope enforcement at
infrastructure layers (load balancers, governance gateways) <strong>SHOULD</strong>
implement <xref target="AGTP-CERT"/>.</t>
        <ul empty="true">
          <li>
            <t>Note: The Agent Certificate extension and the Agent Birth Certificate
mechanism may be subject to pending intellectual property claims.
See Section 7.7 and the IPR Notice preceding the Abstract for details.
The licensor is prepared to grant a royalty-free license to implementers.</t>
          </li>
        </ul>
        <t>Every AGTP server <strong>MUST</strong> log Agent-ID and Principal-ID fields for every
request, creating an attributable audit trail at Level 1 even in
deployments that do not implement Level 2 retrieval or Level 3 transport
binding.</t>
      </section>
      <section anchor="authority-scope-enforcement">
        <name>Authority Scope Enforcement</name>
        <t>The Authority-Scope header declares what actions the agent is authorized
to take. Compliant AGTP servers <strong>MUST</strong> parse the Authority-Scope on every
request, return 451 Scope Violation for any method that exceeds declared
scope, and log all scope violations for audit purposes. At Level 1, scope
declarations are self-asserted in the request header, analogous to scope
assertions in OAuth 2.0 <xref target="RFC6749"/>. At Level 2, scope is cryptographically
verifiable through the signed Agent Manifest Document; servers <strong>SHOULD</strong>
retrieve and verify the manifest for any Agent-ID whose declared scope
exceeds read-only operations. Level 3 cryptographically signed and
infrastructure-enforced scopes are defined in <xref target="AGTP-CERT"/>.</t>
      </section>
      <section anchor="threat-model">
        <name>Threat Model</name>
        <section anchor="agent-spoofing">
          <name>Agent Spoofing</name>
          <t>Threat: A malicious actor forges Agent-ID and Principal-ID headers to
impersonate a trusted agent. Mitigation: Level 2 application-layer
verification binds a declared Agent-ID to the signed Agent Manifest
Document retrieved via canonical ID resolution. A forged Agent-ID
either fails to resolve or resolves to a manifest whose signature
cannot be verified against the claimed governance platform's published
key. Level 3 raises the mitigation to the TLS handshake via
<xref target="AGTP-CERT"/>. Implementations <strong>SHOULD</strong> retrieve and verify the
manifest for any Agent-ID carrying scope beyond read-only query
operations. Mandatory Level 1 logging provides an anomaly-detection
baseline for deployments that do not perform active verification on
every request.</t>
        </section>
        <section anchor="authority-laundering">
          <name>Authority Laundering</name>
          <t>Threat: An agent claims an Authority-Scope broader than what it was
granted. Mitigation: server-side scope enforcement; 451 Scope Violation
returned and logged. In DELEGATE chains, each hop's scope <strong>MUST</strong> be a
strict subset of the delegating agent's scope.</t>
        </section>
        <section anchor="delegation-chain-poisoning">
          <name>Delegation Chain Poisoning</name>
          <t>Threat: A malicious agent inserts itself into a DELEGATE chain. Mitigation:
Delegation-Chain headers are logged at each hop. 551 Authority Chain Broken
is returned if any chain entry is unverifiable. Full mitigation requires
<xref target="AGTP-CERT"/> for signed delegation tokens.</t>
        </section>
        <section anchor="denial-of-service-via-high-frequency-agent-traffic">
          <name>Denial of Service via High-Frequency Agent Traffic</name>
          <t>Threat: Agents that are compromised, misconfigured, or adversarial generate
extremely high request volumes. Mitigation: 429 Rate Limited status code.
Rate limiting <strong>SHOULD</strong> be applied per Agent-ID and per Principal-ID.
When <xref target="AGTP-CERT"/> is deployed, per-Agent-ID quotas can be cryptographically
tied to verified identity, preventing quota evasion through Agent-ID
spoofing.</t>
        </section>
        <section anchor="session-hijacking">
          <name>Session Hijacking</name>
          <t>Threat: An attacker intercepts or forges a Session-ID. Mitigation:
mandatory TLS protects sessions in transit. Session-IDs <strong>MUST</strong> be
cryptographically random with minimum 128 bits of entropy. Servers <strong>MUST</strong>
validate that Session-ID, Agent-ID, and TLS client identity are consistent.</t>
        </section>
        <section anchor="escalation-suppression">
          <name>Escalation Suppression</name>
          <t>Threat: A compromised agent or intermediary suppresses ESCALATE requests,
preventing human oversight. Mitigation: compliant implementations <strong>MUST</strong>
route ESCALATE requests directly to the declared escalation handler without
modification. Intermediaries <strong>MUST NOT</strong> drop, delay, or modify ESCALATE
requests. Escalation handlers <strong>SHOULD</strong> implement independent receipt
confirmation.</t>
        </section>
        <section anchor="birth-certificate-spoofing">
          <name>Birth Certificate Spoofing</name>
          <t>Threat: A malicious actor fabricates a Birth Certificate to claim a
legitimate agent's identity or construct a false identity with elevated
trust. Mitigation: Birth Certificates are issued only by governance
platforms that have completed one of the three Tier 1 verification
paths (Section 5.2). For <tt>dns-anchored</tt> registrations, the governance
platform <strong>MUST</strong> verify DNS ownership of the claimed <tt>org_domain</tt>
before issuance. For <tt>log-anchored</tt> registrations, the governance
platform <strong>MUST</strong> submit the Birth Certificate to a transparency log
per <xref target="RFC9162"/> / <xref target="RFC9943"/> and record the inclusion proof in the
registry; tampering with a log-anchored Birth Certificate is
detectable by any party with log access. For <tt>hybrid</tt> registrations,
both DNS and blockchain address ownership are verified. In the base
spec, mandatory logging provides auditability. Full mitigation
requires <xref target="AGTP-CERT"/> for cryptographically bound Birth Certificate
verification at the transport layer. Governance platforms <strong>MUST</strong>
treat any ACTIVATE request that presents a certificate hash matching
an existing registry record as a collision attack and <strong>MUST</strong> reject
it.</t>
        </section>
        <section anchor="domain-transfer-identity-hijacking">
          <name>Domain Transfer Identity Hijacking</name>
          <t>Threat: An attacker acquires an expired domain to inherit the agent
registry and trust history of prior registrants. Mitigation applies
to <tt>dns-anchored</tt> and <tt>hybrid</tt> Tier 1 agents: agents under an expired
domain are automatically Suspended within 24 hours of domain expiry
detection. A new owner of the domain <strong>MUST NOT</strong> inherit prior agent
registrations. See Section 9.6 for the full domain expiry policy.
<tt>log-anchored</tt> Tier 1 agents are unaffected by this threat because
their verification evidence is the transparency log inclusion proof
rather than DNS ownership.</t>
        </section>
        <section anchor="attribution-forgery">
          <name>Attribution Forgery</name>
          <t>Threat: A malicious agent submits a fabricated or replayed
Attribution-Record to claim credit for an action it did not perform, or
to conceal the true execution context of an action it did perform.</t>
          <t>Mitigation: Attribution-Records <strong>MUST</strong> be signed with the agent's
governance key. The signature <strong>MUST</strong> cover the full record including the
Task-ID, Agent-ID, method, timestamp, and result hash. When <xref target="AGTP-CERT"/>
is deployed, the signature is verified at the transport layer against the
agent's X.509 certificate. For high-stakes domains, RATS attestation
evidence in the Attribution-Record per <xref target="RFC9334"/> provides hardware-rooted
proof of execution context that cannot be forged without compromising the
attesting environment itself. Attribution-Record signatures <strong>MUST</strong> be
verified before the record is admitted to an audit trail. Unverified records
<strong>MUST</strong> be logged with a <tt>signature_unverified</tt> flag and <strong>MUST NOT</strong> be
treated as authoritative for compliance purposes.</t>
        </section>
      </section>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t>Agent identity headers carry information about agent behavior that may be
sensitive:</t>
        <ul spacing="normal">
          <li>
            <t>Agent-ID and Principal-ID together may reveal organizational structure</t>
          </li>
          <li>
            <t>Session-ID and Task-ID reveal workflow patterns</t>
          </li>
          <li>
            <t>Delegation-Chain reveals multi-agent architecture</t>
          </li>
        </ul>
        <t>AGTP logs containing these fields <strong>MUST</strong> be treated as sensitive
operational data. Operators <strong>MUST</strong> implement appropriate access controls,
retention limits, and data minimization practices consistent with
applicable privacy regulations.</t>
        <t>Where privacy-preserving attribution is required, implementations <strong>MAY</strong>
use pseudonymous Agent-IDs with a separate trusted resolution service.
The architecture for pseudonymous agent identity resolution is reserved
for a future companion document.</t>
      </section>
      <section anchor="denial-of-service-considerations">
        <name>Denial-of-Service Considerations</name>
        <t>AGTP's agent identity headers provide a mechanism for more precise
denial-of-service mitigation than is possible with HTTP. Rate limiting
<strong>SHOULD</strong> be applied per Agent-ID and per Principal-ID in addition to
per-IP-address controls.</t>
        <t>When <xref target="AGTP-CERT"/> is deployed, per-Agent-ID rate limiting can be
cryptographically tied to verified agent identity, preventing quota evasion
through Agent-ID rotation. Implementations planning high-volume governed
agent deployments <strong>SHOULD</strong> plan for <xref target="AGTP-CERT"/> as part of their
denial-of-service mitigation strategy.</t>
        <t>Additional recommended mitigations: Priority header enforcement (Priority:
background requests <strong>SHOULD</strong> have lower rate limit headroom than
Priority: critical); per-governance-zone aggregate limits in multi-tenant
deployments; and circuit breaker patterns for ESCALATE request floods.</t>
      </section>
      <section anchor="intellectual-property-considerations">
        <name>Intellectual Property Considerations</name>
        <t>The core AGTP specification, including all base methods, header fields,
status codes, connection model, and IANA registrations defined in this
document, is intended for open implementation without royalty obligation.</t>
        <t>Certain elements referenced in this document may be subject to pending
patent applications by the author, specifically:</t>
        <ul spacing="normal">
          <li>
            <t>The Agent Certificate extension <xref target="AGTP-CERT"/>, which provides
cryptographic binding of agent identity and authority scope to AGTP
header fields.</t>
          </li>
          <li>
            <t>The ACTIVATE method, which provides AGTP-native transmission and
activation of governed agent packages.</t>
          </li>
          <li>
            <t>The Agent Birth Certificate mechanism (Section 5.7), which provides
the genesis identity record and canonical Agent-ID derivation
process for AGTP-registered agents.</t>
          </li>
          <li>
            <t>The <tt>.agent</tt> file format specification, an open packaging format
for AI agents.</t>
          </li>
          <li>
            <t>The <tt>.nomo</tt> file format specification, a governed packaging format
for AI agents with cryptographic governance binding.</t>
          </li>
        </ul>
        <t>Implementers of the core AGTP specification are not affected by any
intellectual property claims on these extensions and associated formats.</t>
        <t>The licensor is prepared to grant a royalty-free license to implementers
for any patent claims that cover contributions in this document and its
referenced extensions, consistent with the IETF's IPR framework under
<xref target="RFC8179"/>.</t>
        <t>IPR disclosures have been filed with the IETF Secretariat and are available
at: https://datatracker.ietf.org/ipr/</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests the following IANA actions upon advancement to
RFC status.</t>
      <section anchor="port-assignment">
        <name>Port Assignment</name>
        <t>Registration of the following service names in the IANA Service Name and
Transport Protocol Port Number Registry:</t>
        <table>
          <name>Proposed Port Assignments</name>
          <thead>
            <tr>
              <th align="left">Service Name</th>
              <th align="left">Port</th>
              <th align="left">Transport</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">agtp</td>
              <td align="left">TBD</td>
              <td align="left">TCP</td>
              <td align="left">Agent Transfer Protocol over TCP/TLS</td>
            </tr>
            <tr>
              <td align="left">agtp-quic</td>
              <td align="left">TBD</td>
              <td align="left">UDP</td>
              <td align="left">Agent Transfer Protocol over QUIC</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="agtp-method-registry">
        <name>AGTP Method Registry</name>
        <t>Establishment of a new IANA registry: Agent Transfer Protocol Methods.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Methods</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review per <xref target="RFC8126"/>, with the additional requirement that each
registration be accompanied by a published specification, at minimum a
publicly available Internet-Draft or equivalent document. The Designated
Expert <strong>SHOULD</strong> verify that the proposed method name is unique, the
reference specification is publicly accessible, and the method definition
includes the required fields (parameters, response structure, idempotency,
error codes, security considerations).</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
        </dl>
        <t>Initial registrations:</t>
        <table>
          <name>Initial AGTP Method Registry Entries</name>
          <thead>
            <tr>
              <th align="left">Method</th>
              <th align="left">Status</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">QUERY</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">SUMMARIZE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">BOOK</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">SCHEDULE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">LEARN</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">DELEGATE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">COLLABORATE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">CONFIRM</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">ESCALATE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">NOTIFY</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">DESCRIBE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">SUSPEND</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="agtp-status-code-registry">
        <name>AGTP Status Code Registry</name>
        <t>Establishment of a new IANA registry: Agent Transfer Protocol Status Codes.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Status Codes</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review + published specification required.</t>
          </dd>
        </dl>
        <t>The following AGTP-specific status codes are registered with full
definitions:</t>
        <table>
          <name>AGTP-Specific Status Code Definitions</name>
          <thead>
            <tr>
              <th align="left">Code</th>
              <th align="left">Name</th>
              <th align="left">Definition</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">451</td>
              <td align="left">Scope Violation</td>
              <td align="left">The requested action is outside the Authority-Scope declared in the request headers. The server <strong>MUST</strong> log this event. The agent <strong>MUST NOT</strong> retry the same request without modifying its Authority-Scope declaration. This is a governance signal, not a protocol error.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
            <tr>
              <td align="left">452</td>
              <td align="left">Budget Exceeded</td>
              <td align="left">The requested method execution would exceed the resource limits declared in the Budget-Limit request header. The agent <strong>MUST NOT</strong> retry without modifying the Budget-Limit or reducing request scope. This is a governance signal, not a protocol error. <strong>MUST</strong> be logged.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
            <tr>
              <td align="left">454</td>
              <td align="left">Grammar Violation</td>
              <td align="left">The method identifier fails AGIS grammar validation <xref target="AGIS"/> when <tt>Method-Grammar: AGIS/1.0</tt> is present. The response body <strong>MUST</strong> identify the specific AGIS validation pass that failed. The agent <strong>MUST NOT</strong> retry without correcting the method identifier.</td>
              <td align="left">This document, Section 6.4</td>
            </tr>
            <tr>
              <td align="left">261</td>
              <td align="left">Negotiation In Progress</td>
              <td align="left">The service has received a PROPOSE request and is evaluating the endpoint proposal. The response body <strong>MUST</strong> include a Negotiation-ID and an estimated evaluation duration. The agent <strong>MUST</strong> poll or wait for a 263 or rejection response.</td>
              <td align="left">This document, Section 6.5</td>
            </tr>
            <tr>
              <td align="left">262</td>
              <td align="left">Authorization Required for Negotiation</td>
              <td align="left">The service requires credential establishment before evaluating the PROPOSE request. The response body <strong>MUST</strong> specify the authorization mechanism required (e.g., AGTP-CERT, OAuth scope).</td>
              <td align="left">This document, Section 6.5</td>
            </tr>
            <tr>
              <td align="left">263</td>
              <td align="left">Endpoint Instantiated</td>
              <td align="left">The service has accepted the PROPOSE request and instantiated the requested endpoint. The response body <strong>MUST</strong> contain a complete AGIS endpoint definition for the instantiated endpoint. The Negotiation-ID <strong>MUST</strong> match the proposal.</td>
              <td align="left">This document, Section 6.5</td>
            </tr>
            <tr>
              <td align="left">460</td>
              <td align="left">Proposal Rejected</td>
              <td align="left">The service cannot or will not instantiate the proposed endpoint. The response body <strong>MUST</strong> explain the rejection reason and <strong>SHOULD</strong> reference relevant data_manifest entries if the requested data class is available through a different approach.</td>
              <td align="left">This document, Section 6.5</td>
            </tr>
            <tr>
              <td align="left">453</td>
              <td align="left">Zone Violation</td>
              <td align="left">The request would route outside the network boundary declared in the AGTP-Zone-ID header. SEP-enforced. The agent <strong>MUST NOT</strong> retry without modifying the AGTP-Zone-ID or obtaining explicit cross-zone authorization. <strong>MUST</strong> be logged.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
            <tr>
              <td align="left">455</td>
              <td align="left">Counterparty Unverified</td>
              <td align="left">The merchant counterparty in a PURCHASE invocation failed identity verification. Returned when the <tt>Merchant-ID</tt> or <tt>Merchant-Manifest-Fingerprint</tt> request headers are absent, when the fingerprint does not match the receiving server's current Merchant Manifest Document, when the Merchant-ID does not match the server's canonical ID, or when the merchant is in a non-Active lifecycle state. Governance signal; <strong>MUST</strong> be logged. Full definition in <xref target="AGTP-MERCHANT"/>.</td>
              <td align="left">
                <xref target="AGTP-MERCHANT"/>, Section 7</td>
            </tr>
            <tr>
              <td align="left">550</td>
              <td align="left">Delegation Failure</td>
              <td align="left">A sub-agent to which a task was delegated via the DELEGATE method failed to complete the task within the declared deadline or returned an error. The response body <strong>SHOULD</strong> contain the sub-agent's error details.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
            <tr>
              <td align="left">551</td>
              <td align="left">Authority Chain Broken</td>
              <td align="left">One or more entries in the Delegation-Chain header cannot be verified as part of a valid and continuous delegation sequence. The specific unverifiable entry <strong>SHOULD</strong> be identified in the response body. The server <strong>MUST</strong> log this event.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="header-field-registry">
        <name>Header Field Registry</name>
        <t>AGTP header fields are distinct from HTTP header fields and are registered
in a new IANA registry: Agent Transfer Protocol Header Fields.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Header Fields</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review + published specification required.</t>
          </dd>
        </dl>
        <t>AGTP does not reuse the HTTP Field Name Registry, as AGTP header fields have
different semantics, applicability, and versioning constraints from HTTP
fields. HTTP header fields are not automatically valid in AGTP, and AGTP
header fields are not valid HTTP fields.</t>
        <t>Initial registrations (all Permanent): AGTP-Version, AGTP-Method, AGTP-Status,
Agent-ID, Principal-ID, Authority-Scope, Session-ID, Task-ID,
Delegation-Chain, Priority, TTL, Server-Agent-ID, Attribution-Record,
Continuation-Token, Supported-Methods, Budget-Limit, AGTP-Zone-ID,
Content-Schema, Telemetry-Export, Cost-Estimate, Attestation-Evidence,
Merchant-ID, Merchant-Manifest-Fingerprint, Intent-Assertion, Cart-Digest.
The four merchant-related headers are defined in <xref target="AGTP-MERCHANT"/> and
registered concurrently with this document.</t>
      </section>
      <section anchor="uri-scheme-registration">
        <name>URI Scheme Registration</name>
        <t>Registration of the agtp:// URI scheme per <xref target="RFC7595"/>, as described in
Section 5.1.8 of this document.</t>
      </section>
      <section anchor="agtp-budget-unit-registry">
        <name>AGTP Budget Unit Registry</name>
        <t>Establishment of a new IANA sub-registry: Agent Transfer Protocol Budget
Units.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Budget Units</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review per <xref target="RFC8126"/>. New unit registrations <strong>MUST</strong> define:
unit name (lowercase ASCII, no spaces or special characters), semantic
description, value format (integer or decimal), whether fractional values
are permitted, and a reference specification. Units representing financial
denominations <strong>MUST</strong> specify the currency and <strong>MUST</strong> define precision
(decimal places). The Designated Expert <strong>SHOULD</strong> verify that the proposed
unit does not duplicate an existing registration and that the value format
is unambiguous.</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
        </dl>
        <t>Initial registrations:</t>
        <table>
          <name>Initial AGTP Budget Unit Registry Entries</name>
          <thead>
            <tr>
              <th align="left">Unit</th>
              <th align="left">Description</th>
              <th align="left">Value Format</th>
              <th align="left">Fractional</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">tokens</td>
              <td align="left">Language model token consumption</td>
              <td align="left">Integer</td>
              <td align="left">No</td>
            </tr>
            <tr>
              <td align="left">compute-seconds</td>
              <td align="left">CPU/GPU compute time in seconds</td>
              <td align="left">Decimal</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">USD</td>
              <td align="left">US Dollar financial limit</td>
              <td align="left">Decimal, 2 places</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">EUR</td>
              <td align="left">Euro financial limit</td>
              <td align="left">Decimal, 2 places</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">GBP</td>
              <td align="left">Pound Sterling financial limit</td>
              <td align="left">Decimal, 2 places</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">calls</td>
              <td align="left">Downstream API call count</td>
              <td align="left">Integer</td>
              <td align="left">No</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="agent-registry-retention-policy">
        <name>Agent Registry Retention Policy</name>
        <t>The AGTP registry <strong>MUST</strong> retain records for all registered agents
regardless of lifecycle state. The following minimum retention periods apply:</t>
        <table>
          <name>AGTP Registry Minimum Retention Periods</name>
          <thead>
            <tr>
              <th align="left">Lifecycle State</th>
              <th align="left">Minimum Retention Period</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Active</td>
              <td align="left">Duration of Active state + 7 years</td>
            </tr>
            <tr>
              <td align="left">Suspended</td>
              <td align="left">Duration of Suspended state + 7 years</td>
            </tr>
            <tr>
              <td align="left">Revoked</td>
              <td align="left">10 years from revocation date</td>
            </tr>
            <tr>
              <td align="left">Deprecated</td>
              <td align="left">7 years from deprecation date</td>
            </tr>
          </tbody>
        </table>
        <t>The 7-year minimum reflects common enterprise compliance requirements
(SOX, GDPR audit trails, HIPAA). Governance platform operators in regulated
industries <strong>SHOULD</strong> extend these minimums to match applicable regulatory
requirements.</t>
        <t>The retained record for a Revoked or Deprecated agent <strong>MUST</strong> include:</t>
        <ul spacing="normal">
          <li>
            <t>Canonical Agent-ID (permanently retired, not reissued)</t>
          </li>
          <li>
            <t>Agent label and org domain at time of registration</t>
          </li>
          <li>
            <t>Trust tier at time of registration</t>
          </li>
          <li>
            <t>Activation date and activating principal</t>
          </li>
          <li>
            <t>Revocation or deprecation date, initiating principal, and reason code</t>
          </li>
          <li>
            <t>Genesis audit record hash (pointer to immutable audit log)</t>
          </li>
          <li>
            <t>Full Birth Certificate (archived, not publicly accessible)</t>
          </li>
          <li>
            <t>All lifecycle state transitions with timestamps</t>
          </li>
        </ul>
        <t>The retained record <strong>MUST NOT</strong> contain package executable contents,
active session data, or Authority-Scope grant tokens.</t>
        <section anchor="domain-name-expiry-interaction">
          <name>Domain Name Expiry Interaction</name>
          <t>If an organization's <tt>org_domain</tt> expires or transfers to a new owner:</t>
          <ol spacing="normal" type="1"><li>
              <t>All Active agents registered under the expired domain <strong>MUST</strong> be
automatically Suspended within 24 hours of domain expiry detection.</t>
            </li>
            <li>
              <t>The governance platform <strong>MUST</strong> notify the registered principal
contact before suspension takes effect, with a minimum notice period
of 30 days if domain expiry was predictable.</t>
            </li>
            <li>
              <t>Suspended agents under an expired domain transition to Deprecated
state after 90 days if the domain has not been renewed.</t>
            </li>
            <li>
              <t>A new owner of the domain <strong>MUST NOT</strong> inherit prior agent
registrations. New ACTIVATE transactions are required.</t>
            </li>
          </ol>
          <t>This policy prevents domain-transfer-based identity hijacking in which
an attacker acquires an expired domain to claim the trust history of
agents that operated under it.</t>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8179">
          <front>
            <title>Intellectual Property Rights in IETF Technology</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <author fullname="J. Contreras" initials="J." surname="Contreras"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>The IETF policies about Intellectual Property Rights (IPR), such as patent rights, relative to technologies developed in the IETF are designed to ensure that IETF working groups and participants have as much information as possible about any IPR constraints on a technical proposal as early as possible in the development process. The policies are intended to benefit the Internet community and the public at large, while respecting the legitimate rights of IPR holders. This document sets out the IETF policies concerning IPR related to technology worked on within the IETF. It also describes the objectives that the policies are designed to meet. This document updates RFC 2026 and, with RFC 5378, replaces Section 10 of RFC 2026. This document also obsoletes RFCs 3979 and 4879.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="79"/>
          <seriesInfo name="RFC" value="8179"/>
          <seriesInfo name="DOI" value="10.17487/RFC8179"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="AGIS">
          <front>
            <title>Agentic Grammar and Interface Specification (AGIS)</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-independent-agis-00"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9114">
          <front>
            <title>HTTP/3</title>
            <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9114"/>
          <seriesInfo name="DOI" value="10.17487/RFC9114"/>
        </reference>
        <reference anchor="RFC7540">
          <front>
            <title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
            <author fullname="M. Belshe" initials="M." surname="Belshe"/>
            <author fullname="R. Peon" initials="R." surname="Peon"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection. It also introduces unsolicited push of representations from servers to clients.</t>
              <t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax. HTTP's existing semantics remain unchanged.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7540"/>
          <seriesInfo name="DOI" value="10.17487/RFC7540"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC7595">
          <front>
            <title>Guidelines and Registration Procedures for URI Schemes</title>
            <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <author fullname="T. Hardie" initials="T." surname="Hardie"/>
            <date month="June" year="2015"/>
            <abstract>
              <t>This document updates the guidelines and recommendations, as well as the IANA registration processes, for the definition of Uniform Resource Identifier (URI) schemes. It obsoletes RFC 4395.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="35"/>
          <seriesInfo name="RFC" value="7595"/>
          <seriesInfo name="DOI" value="10.17487/RFC7595"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9943">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="A2A" target="https://a2aprotocol.ai">
          <front>
            <title>Agent-to-Agent Protocol Specification</title>
            <author>
              <organization>Linux Foundation</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="ACP">
          <front>
            <title>Agent Communication Protocol</title>
            <author>
              <organization>IBM Research</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="MCP" target="https://modelcontextprotocol.io">
          <front>
            <title>Model Context Protocol</title>
            <author>
              <organization>Anthropic</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="ANP">
          <front>
            <title>Agent Network Protocol</title>
            <author>
              <organization/>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="AGTP-CERT">
          <front>
            <title>AGTP Agent Certificate Extension</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-agent-cert-00"/>
        </reference>
        <reference anchor="AGTP-METHODS">
          <front>
            <title>AGTP Standard Extended Method Vocabulary</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-standard-methods-01"/>
        </reference>
        <reference anchor="HOOD2026">
          <front>
            <title>Semantic Method Naming and LLM Agent Accuracy: A Controlled Benchmark of REST/CRUD versus Agentive API Interface Design</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Working Paper" value="Available by request. March 2026."/>
        </reference>
        <reference anchor="AGTP-WEB3">
          <front>
            <title>AGTP Web3 Bridge Specification</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-web3-bridge-00"/>
        </reference>
        <reference anchor="AGTP-DISCOVER">
          <front>
            <title>AGTP Agent Discovery and Name Service</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-discovery-00"/>
        </reference>
        <reference anchor="AGTP-COMPOSITION">
          <front>
            <title>AGTP Composition with Agent Group Messaging Protocols</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-composition-00"/>
        </reference>
        <reference anchor="AGTP-MERCHANT">
          <front>
            <title>AGTP Merchant Identity and Agentic Commerce Binding</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-merchant-identity-00"/>
        </reference>
        <reference anchor="AGTP-LOG">
          <front>
            <title>AGTP Transparency Log Protocol</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-log-00"/>
        </reference>
      </references>
    </references>
    <?line 3254?>

<section anchor="changes-from-v04">
      <name>Changes from v04</name>
      <t>Version 05 restores the canonical Agent-ID as the primary identity
primitive of AGTP and decouples Trust Tier 1 verification from DNS as
a sole requirement. This undoes a drift introduced across v02 through
v04 in which domain anchoring quietly became the operative trust root
despite the v00 architecture establishing the canonical Agent-ID in
that role.</t>
      <section anchor="substantive-changes">
        <name>Substantive Changes</name>
        <t>The following substantive changes were made:</t>
        <ol spacing="normal" type="1"><li>
            <t>The Foundational Principle (Section 5.1) has been rewritten to
state explicitly that AGTP identity is agent-first and that all
other identification forms are aliases resolving to a canonical
Agent-ID.</t>
          </li>
          <li>
            <t>The Canonical URI Forms have been expanded from four to five.
Form 1 (canonical ID URI) is now explicitly marked authoritative.
Form 2 restores the agent-native hierarchical namespace
(<tt>agtp://[label].[org-label].agent</tt>) that was removed in the v04
response to the Web3 <tt>.agent</tt> TLD collision.</t>
          </li>
          <li>
            <t>The v04 prohibition on <tt>.agent</tt> and <tt>.nomo</tt> in the hostname
position has been removed. Namespace collision with Web3 naming
systems is now handled through a deterministic resolution order
(Section 5.1): AGTP registry first, Web3 second, canonical
Agent-ID as authoritative tiebreaker. File format suffixes remain
prohibited in the path position only.</t>
          </li>
          <li>
            <t>Resolution Mechanics (Section 5.1) now defines two resolution
paths: a Form 1 path that resolves canonical Agent-IDs via registry
or transparency log lookup without requiring a domain anchor, and
a Forms 2-5 path that resolves hierarchical and domain-anchored
aliases through a governance platform registry lookup.</t>
          </li>
          <li>
            <t>Trust Tier 1 verification has been decoupled from DNS. Section 5.2
now recognizes three equivalent verification paths: <tt>dns-anchored</tt>
(RFC 8555 ACME challenge), <tt>log-anchored</tt> (Birth Certificate
inclusion in a transparency log per RFC 9162 with optional RFC 9943
SCITT receipts), and <tt>hybrid</tt> (DNS control combined with blockchain
address signature). All three paths produce identity attestations
of equivalent strength for AGTP protocol purposes.</t>
          </li>
          <li>
            <t>The Birth Certificate schema has added a <tt>verification_path</tt>
field (REQUIRED for Tier 1) declaring which path was used at
ACTIVATE time, an <tt>org_label</tt> field supporting Form 2 hierarchical
resolution, and a <tt>log_inclusion_proof</tt> field (REQUIRED for
<tt>log-anchored</tt> Tier 1). The <tt>org_domain</tt> field is downgraded from
<strong>MUST</strong> to <strong>SHOULD</strong>, required only for the <tt>dns-anchored</tt> and
<tt>hybrid</tt> paths.</t>
          </li>
          <li>
            <t>The Agent Manifest Document now surfaces <tt>verification_path</tt> and
<tt>log_inclusion_proof</tt> in the RECOMMENDED fields. The Tier 2
<tt>trust_warning</tt> value has changed from <tt>"org-label-unverified"</tt>
to <tt>"verification-incomplete"</tt> to reflect that DNS is no longer
the sole verification path.</t>
          </li>
          <li>
            <t>The v04 Web3 Trust Anchors section has been rewritten. The
<tt>resolution_layer</tt> field is replaced by <tt>verification_path</tt>. Web3
identity is no longer a degraded fallback capped at Tier 2; a
Web3-anchored agent with a completed <tt>hybrid</tt> verification path
is a full Tier 1 participant.</t>
          </li>
          <li>
            <t>The IANA URI scheme registration (Section 5.1) has been updated to
list all five URI forms with explicit syntax and semantics, and to
state that the canonical Agent-ID form is the authoritative
identity representation.</t>
          </li>
          <li>
            <t>Threat Model entries for Birth Certificate Spoofing and Domain
Transfer Identity Hijacking have been updated to reflect the
multi-path model. Log-anchored Tier 1 agents are explicitly noted
as unaffected by the domain-transfer threat.</t>
          </li>
        </ol>
      </section>
      <section anchor="rationale">
        <name>Rationale</name>
        <t>The v04 architecture inverted the v00 intent by treating DNS ownership
as the trust root and the canonical Agent-ID as a routing artifact.
This created three specific problems that motivated the v05 revision:</t>
        <t><em>Stranger verification without prior relationship.</em> In the v04 model,
two agents from unrelated organizations with no shared DNS infrastructure
had no first-class verification path. The v05 <tt>log-anchored</tt> path
closes this gap: a stranger presented with a canonical Agent-ID and a
transparency log inclusion proof can verify the Birth Certificate
signature and read the Agent Manifest Document without resolving any
domain.</t>
        <t><em>Cross-ecosystem transparency log interoperability.</em> The v04 AGTP-CTL
sketch referenced RFC 6962 (Certificate Transparency v1). The v05
<tt>log-anchored</tt> path targets RFC 9162 (CT v2) as the verifiable data
structure with RFC 9943 (SCITT) COSE_Sign1 receipts for cross-ecosystem
interoperability with deployed SCITT infrastructure.</t>
        <t><em>Identity stability across organizational change.</em> A canonical
Agent-ID derived from the Birth Certificate hash is stable across
organizational renames, domain transfers, and resolution-path changes.
Re-anchoring primary identity to DNS in v04 tied agent identity to a
mutable external state (domain registration) that the v00 design
subordinated to the canonical Agent-ID rather than treating as a
primary anchor.</t>
        <t>Version 05 does not deprecate DNS-anchored verification. Implementations
deployed on the v04 model continue to be Tier 1 compliant under the
<tt>dns-anchored</tt> path. Version 05 expands the verification model rather
than replacing it.</t>
      </section>
    </section>
    <section anchor="authority-scope-format">
      <name>Authority-Scope Format</name>
      <t>Authority-Scope values are expressed as a space-separated list of scope
tokens following the pattern: [domain]:[action] or [domain]:* for
full domain access. Tokens <strong>MUST</strong> be lowercase ASCII with a single colon
separator.</t>
      <t>Examples:</t>
      <artwork><![CDATA[
Authority-Scope: calendar:book calendar:query
Authority-Scope: documents:summarize documents:query knowledge:learn
Authority-Scope: *:query
Authority-Scope: booking:* payments:confirm
]]></artwork>
      <t>Reserved domains (initial set):</t>
      <table>
        <name>Reserved Authority-Scope Domains</name>
        <thead>
          <tr>
            <th align="left">Domain</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">calendar</td>
            <td align="left">Scheduling and time-based resource management</td>
          </tr>
          <tr>
            <td align="left">documents</td>
            <td align="left">Document access, summarization, and annotation</td>
          </tr>
          <tr>
            <td align="left">knowledge</td>
            <td align="left">Agent context and memory operations</td>
          </tr>
          <tr>
            <td align="left">booking</td>
            <td align="left">Reservation and resource allocation</td>
          </tr>
          <tr>
            <td align="left">payments</td>
            <td align="left">Financial transactions and confirmations</td>
          </tr>
          <tr>
            <td align="left">agents</td>
            <td align="left">Delegation and collaboration with other agents</td>
          </tr>
          <tr>
            <td align="left">escalation</td>
            <td align="left">Escalation routing and handler management</td>
          </tr>
          <tr>
            <td align="left">activation</td>
            <td align="left">Governed agent package activation (ACTIVATE method extension)</td>
          </tr>
          <tr>
            <td align="left">discovery</td>
            <td align="left">Agent discovery and capability query operations (DISCOVER, DESCRIBE)</td>
          </tr>
          <tr>
            <td align="left">budget</td>
            <td align="left">Resource budget declaration and QUOTE pre-flight operations</td>
          </tr>
          <tr>
            <td align="left">telemetry</td>
            <td align="left">Telemetry export and observability operations</td>
          </tr>
          <tr>
            <td align="left">zone</td>
            <td align="left">Network zone boundary declaration and enforcement</td>
          </tr>
          <tr>
            <td align="left">suspend</td>
            <td align="left">Session suspension and resumption operations</td>
          </tr>
          <tr>
            <td align="left">merchant</td>
            <td align="left">Merchant identity resolution and counterparty verification (see <xref target="AGTP-MERCHANT"/>)</td>
          </tr>
          <tr>
            <td align="left">intent</td>
            <td align="left">Intent Assertion issuance and validation (see <xref target="AGTP-MERCHANT"/>)</td>
          </tr>
          <tr>
            <td align="left">*</td>
            <td align="left">All domains require explicit grant; use with caution</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="example-agtp-wire-formats">
      <name>Example AGTP Wire Formats</name>
      <t>The following examples use a human-readable pseudo-wire format with
HTTP-style headers followed by a JSON body. The Content-Type for all AGTP
message bodies is application/agtp+json.</t>
      <section anchor="query-request-and-response">
        <name>QUERY Request and Response</name>
        <artwork><![CDATA[
AGTP/1.0 QUERY
Agent-ID: agt-7f3a9c2d
Principal-ID: usr-chris-hood
Authority-Scope: documents:query knowledge:query
Session-ID: sess-a1b2c3d4
Task-ID: task-0042
TTL: 3000
Content-Type: application/agtp+json

{
  "task_id": "task-0042",
  "parameters": {
    "intent": "Key arguments against MCP re: HTTP overhead",
    "scope": ["documents:research", "knowledge:session"],
    "format": "structured",
    "confidence_threshold": 0.75
  }
}

AGTP/1.0 200 OK
Task-ID: task-0042
Server-Agent-ID: srv-knowledge-01
Attribution-Record: [signed attribution token]
Content-Type: application/agtp+json

{
  "status": 200,
  "task_id": "task-0042",
  "result": {
    "results": [{"content": "...", "source": "doc-agtp-research",
                 "confidence": 0.91}],
    "result_count": 1
  }
}
]]></artwork>
      </section>
      <section anchor="book-request-and-response">
        <name>BOOK Request and Response</name>
        <artwork><![CDATA[
AGTP/1.0 BOOK
Agent-ID: agt-travel-planner
Principal-ID: usr-chris-hood
Authority-Scope: booking:* calendar:book
Session-ID: sess-trip-2026-04
Task-ID: task-0107
Priority: normal
Content-Type: application/agtp+json

{
  "method": "BOOK",
  "task_id": "task-0107",
  "parameters": {
    "resource_id": "flight-AA2847",
    "principal_id": "usr-chris-hood",
    "time_slot": "2026-04-15T08:00:00Z",
    "options": {"seat_preference": "aisle", "class": "economy"},
    "confirm_immediately": true
  }
}

AGTP/1.0 200 OK
Task-ID: task-0107
Attribution-Record: [signed attribution token]
Content-Type: application/agtp+json

{
  "status": 200,
  "task_id": "task-0107",
  "result": {
    "booking_id": "BK-2026-0107",
    "status": "confirmed",
    "resource_id": "flight-AA2847",
    "confirmation_code": "XQRT7Y"
  }
}
]]></artwork>
      </section>
      <section anchor="escalate-request-and-response">
        <name>ESCALATE Request and Response</name>
        <artwork><![CDATA[
AGTP/1.0 ESCALATE
Agent-ID: agt-procurement-03
Principal-ID: usr-finance-dept
Authority-Scope: booking:* payments:confirm
Session-ID: sess-procurement-q2
Task-ID: task-0881
Priority: urgent
Content-Type: application/agtp+json

{
  "method": "ESCALATE",
  "task_id": "task-0881",
  "parameters": {
    "task_id": "task-0880",
    "reason": "scope_limit",
    "context": {
      "attempted_action": "BOOK",
      "resource": "vendor-contract-750k",
      "block_reason": "Exceeds agent authorization threshold"
    },
    "recipient": "usr-cfo",
    "deadline": "2026-03-19T09:00:00Z"
  }
}

AGTP/1.0 202 Accepted
Task-ID: task-0881
Server-Agent-ID: srv-escalation-handler
Content-Type: application/agtp+json

{
  "status": 202,
  "task_id": "task-0881",
  "result": {
    "escalation_id": "ESC-0881",
    "routed_to": "usr-cfo",
    "status": "pending_review",
    "task_paused": true,
    "estimated_review_by": "2026-03-19T09:00:00Z"
  }
}
]]></artwork>
      </section>
    </section>
    <section anchor="comparison-table">
      <name>Comparison Table</name>
      <table>
        <name>AGTP Compared to Existing Approaches</name>
        <thead>
          <tr>
            <th align="left">Criterion</th>
            <th align="left">AGTP</th>
            <th align="left">HTTP/REST</th>
            <th align="left">gRPC</th>
            <th align="left">AGMP (MCP, A2A, ...)</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Intent-native methods</td>
            <td align="left">Yes (12 Tier 1)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">Partial</td>
          </tr>
          <tr>
            <td align="left">Intent semantics at protocol level</td>
            <td align="left">Native</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">Messaging layer only</td>
          </tr>
          <tr>
            <td align="left">Built-in agent identity</td>
            <td align="left">Yes</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Authority scope enforcement</td>
            <td align="left">Protocol-level</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">Application-layer</td>
          </tr>
          <tr>
            <td align="left">Built-in attribution/audit</td>
            <td align="left">Yes</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">Varies by impl.</td>
          </tr>
          <tr>
            <td align="left">Transport flexibility</td>
            <td align="left">TCP/UDP/QUIC</td>
            <td align="left">TCP/TLS</td>
            <td align="left">HTTP/2</td>
            <td align="left">HTTP</td>
          </tr>
          <tr>
            <td align="left">Escalation as first-class primitive</td>
            <td align="left">Yes</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Ecosystem maturity</td>
            <td align="left">Proposed</td>
            <td align="left">Mature</td>
            <td align="left">Mature</td>
            <td align="left">Emerging</td>
          </tr>
          <tr>
            <td align="left">Governance/observability</td>
            <td align="left">Native</td>
            <td align="left">Manual/bolt-on</td>
            <td align="left">Manual</td>
            <td align="left">Limited</td>
          </tr>
          <tr>
            <td align="left">Method registry extensibility</td>
            <td align="left">Yes (Expert Review)</td>
            <td align="left">Frozen (IETF Review)</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
          <tr>
            <td align="left">Open core / royalty-free</td>
            <td align="left">Yes</td>
            <td align="left">Yes</td>
            <td align="left">Yes</td>
            <td align="left">Yes</td>
          </tr>
          <tr>
            <td align="left">Agent Manifest Document</td>
            <td align="left">Native (.agtp format)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Tamper-proof identity surface</td>
            <td align="left">Yes (hash + signature)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Browser-accessible agent identity</td>
            <td align="left">Yes (read-only)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">URI collision prevention</td>
            <td align="left">Domain-anchored</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
          <tr>
            <td align="left">Agent Birth Certificate</td>
            <td align="left">Yes (genesis record)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Domain-expiry lifecycle handling</td>
            <td align="left">Specified</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
          <tr>
            <td align="left">Capability discovery</td>
            <td align="left">Native (DESCRIBE)</td>
            <td align="left">None</td>
            <td align="left">Reflection (partial)</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Resource budget enforcement</td>
            <td align="left">Native (Budget-Limit, 452)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Execution attestation (RATS)</td>
            <td align="left">Optional (RFC 9334)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Observability hooks</td>
            <td align="left">Native (Telemetry-Export)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Network zone enforcement</td>
            <td align="left">Native (AGTP-Zone-ID, 453)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Session suspension/recovery</td>
            <td align="left">Native (SUSPEND method)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">AGMP composition profiles</td>
            <td align="left">Normative appendix</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
        </tbody>
      </table>
      <t>HTTP's method registry (registered with IETF Review per <xref target="RFC9110"/>) is
effectively frozen for new semantic methods because any new HTTP method
must be backward-compatible with existing HTTP infrastructure globally.
AGTP's Expert Review + published spec procedure enables the protocol to
evolve its method vocabulary as the agent ecosystem develops, without
the backward-compatibility constraints of the HTTP method space.</t>
    </section>
    <section anchor="glossary">
      <name>Glossary</name>
      <dl>
        <dt>Agent:</dt>
        <dd>
          <t>A software system that executes tasks, makes decisions, and takes
actions without continuous human supervision per transaction.</t>
        </dd>
        <dt>AGMP (Agent Group Messaging Protocol):</dt>
        <dd>
          <t>The collective term for higher-layer AI agent messaging standards that
operate over AGTP as their transport substrate, including MCP, A2A, ACP,
and ANP. AGMPs define what agents say. AGTP defines how those messages
move. See Section 1.6.</t>
        </dd>
        <dt>Agent Birth Certificate:</dt>
        <dd>
          <t>A cryptographically signed identity document issued to an agent at
registration time by a governance platform. The genesis record of the
agent's existence; the source from which the canonical Agent-ID is
derived. Functions as the agent's social security number: issued once,
permanently bound, never reissued. See Section 6.7.</t>
        </dd>
        <dt>Agent Transfer Protocol (AGTP):</dt>
        <dd>
          <t>The application-layer protocol defined in this document, providing a
dedicated transport environment for agent traffic.</t>
        </dd>
        <dt>Agent-ID:</dt>
        <dd>
          <t>A unique identifier for a specific agent instance, present in all AGTP
request headers. In the base spec, derived from the Birth Certificate
hash. With <xref target="AGTP-CERT"/>, cryptographically bound to a verified identity.</t>
        </dd>
        <dt>Agent Manifest Document:</dt>
        <dd>
          <t>A signed <tt>application/agtp+json</tt> document returned when an <tt>agtp://</tt>
URI is resolved. Derived from the agent's <tt>.agent</tt> or <tt>.nomo</tt> package.
Contains identity, lifecycle state, trust tier, behavioral scope, and
birth certificate fields. Never contains executable content.</t>
        </dd>
        <dt>AGTP-Zone-ID:</dt>
        <dd>
          <t>A request header declaring the network zone or organizational boundary
within which a request must be processed. SEPs <strong>MUST</strong> enforce zone
boundaries and return 453 Zone Violation if a DELEGATE or COLLABORATE
request would route outside the declared zone.</t>
        </dd>
        <dt>Attribution Record:</dt>
        <dd>
          <t>A signed, logged record of an agent action, sufficient for audit and
compliance purposes. <strong>MAY</strong> include RATS attestation evidence per
<xref target="RFC9334"/> for hardware-rooted execution proof in high-stakes domains.</t>
        </dd>
        <dt>Authority-Scope:</dt>
        <dd>
          <t>A declared set of permissions defining what actions an agent is
authorized to take, expressed as space-separated domain:action tokens.</t>
        </dd>
        <dt>Budget-Limit:</dt>
        <dd>
          <t>A request header declaring the maximum resource consumption the principal
authorizes for a method invocation, expressed as space-separated
<tt>unit=value</tt> tokens from the IANA AGTP Budget Unit Registry. Exceeding
the declared limit causes 452 Budget Exceeded.</t>
        </dd>
        <dt>Delegation Chain:</dt>
        <dd>
          <t>An ordered record of Agent-IDs representing the sequence of delegations
that led to the current request.</t>
        </dd>
        <dt>DESCRIBE:</dt>
        <dd>
          <t>An AGTP Tier 1 core method returning the declared capabilities, supported
modalities, method vocabulary, and versioned feature set of a specific
agent endpoint. Used for pre-task negotiation. Category: ACQUIRE.</t>
        </dd>
        <dt>ESCALATE:</dt>
        <dd>
          <t>An AGTP method representing an agent's intentional deferral of a decision
or action to a human principal or higher-authority agent. A first-class
method, not a failure code.</t>
        </dd>
        <dt>Governance Token:</dt>
        <dd>
          <t>A signed, time-limited JWT artifact encoding a specific governance verdict
for a specific action. The runtime companion to the Birth Certificate.
Default TTL: 30 seconds. Must not be reused.</t>
        </dd>
        <dt>Intent Verb:</dt>
        <dd>
          <t>An AGTP method name expressing the agent's purpose, as distinguished from
HTTP resource-operation verbs (GET, POST, PUT, DELETE).</t>
        </dd>
        <dt>Method Registry:</dt>
        <dd>
          <t>The IANA-maintained registry of valid AGTP method names and their
specifications. Registration requires Expert Review and a published
specification.</t>
        </dd>
        <dt>Principal:</dt>
        <dd>
          <t>The human, organization, or system that authorized an agent to act and
is accountable for its actions.</t>
        </dd>
        <dt>Principal-ID:</dt>
        <dd>
          <t>The identifier of the principal on whose behalf an agent operates,
present in all AGTP request headers.</t>
        </dd>
        <dt>Scope-Enforcement Point (SEP):</dt>
        <dd>
          <t>An AGTP-aware infrastructure component, load balancer, gateway, proxy,
that enforces Authority-Scope and AGTP-Zone-ID compliance on AGTP
requests without application-layer access. Requires <xref target="AGTP-CERT"/>.</t>
        </dd>
        <dt>Scope Violation (451):</dt>
        <dd>
          <t>An AGTP status code returned when an agent requests an action outside its
declared Authority-Scope. A governance signal, not a protocol error.
<strong>MUST</strong> be logged.</t>
        </dd>
        <dt>Session:</dt>
        <dd>
          <t>An AGTP persistent connection context shared across multiple method
invocations within a single agent workflow.</t>
        </dd>
        <dt>SUSPEND (method):</dt>
        <dd>
          <t>An AGTP Tier 1 core method that places a specific active session into a
recoverable paused state, issuing a single-use base64url-encoded 128-bit
resumption nonce. Session-scoped; does not affect registry lifecycle state.
Category: ORCHESTRATE.</t>
        </dd>
        <dt>Trust Tier:</dt>
        <dd>
          <t>A classification (1, 2, or 3) assigned to an agent at registration based
on the strength of identity verification. Tier 1 requires one of three
verification paths (DNS-anchored, log-anchored, or hybrid) and a <tt>.nomo</tt>
governed package. Tier 2 is org-asserted without cryptographic
verification. Tier 3 is experimental, not production-eligible.</t>
        </dd>
        <dt>551 Authority Chain Broken:</dt>
        <dd>
          <t>An AGTP status code returned when one or more entries in the
Delegation-Chain header cannot be verified as part of a valid and
continuous delegation sequence. <strong>MUST</strong> be logged.</t>
        </dd>
      </dl>
    </section>
    <section anchor="agtp-composition-with-agmps">
      <name>AGTP Composition with AGMPs</name>
      <t>This appendix provides normative mapping guidance for carrying AGMP
messages (MCP, A2A, ACP) over AGTP as their transport substrate. Full
composition specifications are provided in <xref target="AGTP-COMPOSITION"/>; this
appendix provides the canonical mapping table and precedence rules.</t>
      <section anchor="precedence-rule">
        <name>Precedence Rule</name>
        <t>AGTP headers (Agent-ID, Principal-ID, Authority-Scope, Delegation-Chain)
take precedence over equivalent fields in the messaging-layer payload for
routing, enforcement, and audit purposes. Infrastructure components including
SEPs and governance gateways <strong>MUST</strong> use AGTP header values for all
protocol-level decisions. Messaging-layer identity fields <strong>MAY</strong> be present
in the body for application-layer use but <strong>MUST NOT</strong> override AGTP header
values.</t>
      </section>
      <section anchor="agmp-to-agtp-canonical-mapping">
        <name>AGMP-to-AGTP Canonical Mapping</name>
        <table>
          <name>AGMP-to-AGTP Canonical Mapping</name>
          <thead>
            <tr>
              <th align="left">AGMP</th>
              <th align="left">Concept</th>
              <th align="left">AGTP Mapping</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Task</td>
              <td align="left">AGTP DELEGATE body; A2A <tt>task.id</tt> maps to Task-ID header</td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Capability</td>
              <td align="left">AGTP DESCRIBE response; <tt>capability_domains</tt></td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Agent Card</td>
              <td align="left">AGTP Agent Manifest Document</td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Provenance chain</td>
              <td align="left">AGTP Delegation-Chain header</td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Artifact</td>
              <td align="left">AGTP NOTIFY body with <tt>content_type: artifact</tt></td>
            </tr>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Tool call</td>
              <td align="left">AGTP QUERY or NOTIFY body</td>
            </tr>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Context / conversation state</td>
              <td align="left">AGTP Session-ID header + LEARN method</td>
            </tr>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Sampling / inference request</td>
              <td align="left">AGTP QUERY with <tt>modality: inference</tt></td>
            </tr>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Resource</td>
              <td align="left">AGTP QUERY with appropriate <tt>scope</tt></td>
            </tr>
            <tr>
              <td align="left">ACP</td>
              <td align="left">Agent-to-agent message</td>
              <td align="left">AGTP NOTIFY or COLLABORATE body</td>
            </tr>
            <tr>
              <td align="left">ACP</td>
              <td align="left">Capability advertisement</td>
              <td align="left">AGTP DESCRIBE response</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="wire-example-a2a-task-over-agtp">
        <name>Wire Example: A2A Task over AGTP</name>
        <artwork><![CDATA[
AGTP/1.0 DELEGATE
Agent-ID: agtp://agtp.acme.tld/agents/orchestrator
Principal-ID: usr-chris-hood
Authority-Scope: agents:delegate documents:query
Delegation-Chain: agtp://agtp.acme.tld/agents/orchestrator
Session-ID: sess-a1b2c3d4
Task-ID: task-0099
Content-Schema: https://a2aprotocol.ai/schema/task/v1
Content-Type: application/agtp+json

{
  "method": "DELEGATE",
  "task_id": "task-0099",
  "parameters": {
    "target_agent_id": "agtp://agtp.acme.tld/agents/analyst",
    "authority_scope": "documents:query",
    "delegation_token": "[signed token]",
    "task": {
      "a2a_task_id": "a2a-task-7f3a",
      "message": "Summarize Q1 financial reports",
      "artifacts": []
    }
  }
}
]]></artwork>
      </section>
      <section anchor="wire-example-mcp-tool-call-over-agtp">
        <name>Wire Example: MCP Tool Call over AGTP</name>
        <artwork><![CDATA[
AGTP/1.0 QUERY
Agent-ID: agtp://agtp.acme.tld/agents/assistant
Principal-ID: usr-chris-hood
Authority-Scope: documents:query knowledge:query
Session-ID: sess-mcp-b2c3d4
Task-ID: task-0100
Content-Schema: https://modelcontextprotocol.io/schema/tool-call/v1
Content-Type: application/agtp+json

{
  "method": "QUERY",
  "task_id": "task-0100",
  "parameters": {
    "intent": "web_search",
    "modality": "tool",
    "mcp_tool_name": "web_search",
    "mcp_tool_input": {"query": "IETF agent protocol drafts 2026"}
  }
}
]]></artwork>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
