<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hood-independent-agtp-04" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="AGTP">Agent Transfer Protocol (AGTP)</title>
    <seriesInfo name="Internet-Draft" value="draft-hood-independent-agtp-04"/>
    <author fullname="Chris Hood">
      <organization>Nomotic, Inc.</organization>
      <address>
        <email>chris@nomotic.ai</email>
        <uri>https://nomotic.ai</uri>
      </address>
    </author>
    <date year="2026" month="April" day="17"/>
    <area>Applications and Real-Time</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>AI agents</keyword>
    <keyword>agentic systems</keyword>
    <keyword>protocol</keyword>
    <keyword>agent traffic</keyword>
    <keyword>agent transfer</keyword>
    <abstract>
      <?line 126?>

<t>AI agents and agentic systems generate a growing volume of intent-driven,
unstructured, and undifferentiated traffic that flows through HTTP
indistinguishably from human-initiated requests. HTTP lacks the semantic
vocabulary, observability primitives, and identity mechanisms required by
agent systems operating at scale. Existing protocols described as Agent
Group Messaging Protocols (AGMP), including MCP, ACP, A2A, and ANP, are
messaging-layer constructs that presuppose HTTP as their transport.
They do not address the underlying transport problem.</t>
      <t>This document defines the Agent Transfer Protocol (AGTP): a dedicated
application-layer protocol for AI agent traffic. Version 04 introduces
normative integration hooks for the AGTP Merchant Identity and Agentic
Commerce Binding specification <xref target="AGTP-MERCHANT"/>, which defines the
merchant-side identity model that complements AGTP's agent-side
identity model. Version 04 adds four merchant-related request headers
(Merchant-ID, Merchant-Manifest-Fingerprint, Intent-Assertion, Cart-
Digest), the 455 Counterparty Unverified status code, and the
<tt>merchant</tt> and <tt>intent</tt> Authority-Scope domains. Together these
elements close the verification loop between the initiating agent and
the receiving merchant on AGTP PURCHASE invocations. Version 03
introduced normative integration with the Agentic Grammar and Interface
Specification (AGIS) <xref target="AGIS"/>, which defines the grammar-based
validation pathway for AGTP method identifiers. AGIS-conformant methods
are accepted at the transport layer via the Method-Grammar header
without requiring prior IANA registration, enabling organizations to
define domain-specific Agentive API vocabularies while preserving
interoperability through shared grammatical constraints. AGTP provides
agent-native intent methods (QUERY, SUMMARIZE, BOOK, SCHEDULE, LEARN,
DELEGATE, COLLABORATE, CONFIRM, ESCALATE, NOTIFY, DESCRIBE, SUSPEND),
protocol-level agent identity and authority headers, and a status code
vocabulary designed for the conditions AI agent systems encounter. AGTP
SHOULD prefer QUIC for new implementations and MUST support TCP/TLS for
compatibility and fallback. It is designed to be composable with existing
agent frameworks, not to replace them. Version 02 introduces capability
discovery (DESCRIBE), resource budget signaling and enforcement, optional
RATS-aligned execution attestation, observability hooks, network zone
isolation, session suspension as a method, and normative composition
profiles with AGMP (Agent Group Messaging Protocols). Version 02 enables
dynamic capability negotiation and resource-aware governance.</t>
    </abstract>
  </front>
  <middle>
    <?line 168?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><strong>Note Regarding Intellectual Property:</strong>  Implementers should be
aware that extensions and certain mechanisms referenced in this
document -- including the Agent Certificate extension (Section 7.2),
the ACTIVATE method, the Agent Birth Certificate mechanism
(Section 5.7), and the <tt>.agent</tt> and <tt>.nomo</tt> file format
specifications (Section 2) -- may be subject to pending patent
applications by the author.  The core AGTP specification is intended
for open implementation without royalty obligation.  The licensor is
prepared to grant a royalty-free license to implementers consistent
with <xref target="RFC8179"/>.  IPR disclosures:
https://datatracker.ietf.org/ipr/ -- see also Section 7.7.</t>
      <section anchor="background">
        <name>Background</name>
        <t>The deployment of AI agents and multi-agent systems is accelerating
across enterprise, research, and consumer contexts. These systems execute
complex, multi-step workflows, querying data sources, booking resources,
delegating subtasks to peer agents, and escalating decisions to human
principals, with minimal or no human supervision per transaction.</t>
        <t>Unlike human-initiated web traffic, agent-generated traffic is dynamic,
high-frequency, intent-driven, and often stateful across sequences of
related requests. The infrastructure carrying this traffic was not
designed with these properties in mind.</t>
      </section>
      <section anchor="limitations-of-http-for-agent-traffic">
        <name>Limitations of HTTP for Agent Traffic</name>
        <t>HTTP has served as the internet's primary application-layer transport for
over three decades. Its evolution through HTTP/2 <xref target="RFC7540"/> and HTTP/3
<xref target="RFC9114"/> has improved performance, multiplexing, and latency. However,
the fundamental model of HTTP being stateless, resource-oriented,
human-initiated request/response, creates specific failures when applied
to agentic systems at scale:</t>
        <ul spacing="normal">
          <li>
            <t>Traffic indistinguishability: Agent-generated requests are structurally
identical to human-initiated requests at the transport layer. Operators
cannot identify, route, or govern agent traffic without application-layer
instrumentation.</t>
          </li>
          <li>
            <t>Method vocabulary mismatch: HTTP's method set (GET, POST, PUT, DELETE,
PATCH) describes resource operations. Agent traffic expresses purposeful
intent, summarize, book, delegate, escalate. The mismatch forces intent
into request bodies, invisible to protocol-level handlers.</t>
          </li>
          <li>
            <t>Identity and attribution absence: HTTP carries no native mechanism for
asserting agent identity, declared authority scope, or the principal
accountable for an agent's actions.</t>
          </li>
          <li>
            <t>Session semantics mismatch: HTTP's stateless model is optimized for
isolated request/response cycles. Agent workflows are inherently stateful
sequences.</t>
          </li>
        </ul>
      </section>
      <section anchor="why-not-evolve-http">
        <name>Why Not Evolve HTTP?</name>
        <t>A natural question is whether these limitations could be addressed by
extending HTTP rather than defining a new protocol. There are three
specific reasons why HTTP extension is not the preferred path.</t>
        <t>First, the HTTP method registry is effectively frozen for new semantics.
<xref target="RFC9110"/> defines the HTTP method registry with IETF Review as the
registration procedure, meaning new methods require a full IETF consensus
process and must be backward-compatible with existing HTTP implementations.
Adding intent-based verbs (SUMMARIZE, DELEGATE, ESCALATE) to HTTP would
require every HTTP client, server, proxy, and middleware component to ignore
or handle unknown methods gracefully, a compatibility constraint that limits
how agent-specific semantics can be expressed at the protocol level.</t>
        <t>Second, HTTP carries decades of backward-compatibility constraints. Features
such as persistent agent identity headers, authority scope declarations, and
session-level governance semantics would require HTTP extensions that interact
unpredictably with existing caching, proxy, and CDN behavior designed for
human-generated traffic patterns.</t>
        <t>Third, the observability goal making agent traffic distinguishable from
human traffic at the infrastructure layer cannot be achieved by adding
fields to HTTP. Infrastructure components route and filter HTTP traffic
based on methods and headers that are identical across agent and human
requests. A protocol-level separation is necessary to give infrastructure
the signal it needs.</t>
        <t>AGTP is therefore designed as a dedicated protocol rather than an HTTP
extension. HTTP and AGTP coexist: human traffic continues to flow over
HTTP; agent traffic flows over AGTP. The two protocols serve different
classes of network participant.</t>
        <t>Note: The abbreviation AGTP is used in this document to distinguish
the Agent Transfer Protocol from the Authenticated Transfer Protocol
(ATP) working group currently chartered within the IETF. The URI
agtp:// is proposed for IANA registration as a new and distinct scheme.</t>
      </section>
      <section anchor="motivation-for-a-dedicated-protocol">
        <name>Motivation for a Dedicated Protocol</name>
        <t>These limitations are architectural, not implementational. They cannot be
resolved by better middleware or application code layered on HTTP. They
require a protocol designed from first principles for AI agent systems.</t>
        <t>AGTP is that protocol. It provides a dedicated transport environment for
agent traffic with: native intent-based methods, mandatory agent identity
headers, protocol-level authority scope declaration, and a status code
vocabulary for the conditions AI systems encounter.</t>
      </section>
      <section anchor="scope-and-target-audience">
        <name>Scope and Target Audience</name>
        <t>This document covers AGTP architecture, design principles, stack position,
request and response header format, agent-native method definitions and
semantics, status code vocabulary, security considerations, and IANA
considerations.</t>
        <t>The Agent Certificate extension for cryptographic binding of agent
identity to AGTP header fields is described at a high level in Section 7.2.
Full specification is provided in a separate companion document:
<xref target="AGTP-CERT"/>. That extension may be subject to pending intellectual
property claims; see Section 7.7 and the IPR Notice preceding the Abstract.</t>
        <t>Merchant-side identity verification for PURCHASE counterparties is
described at a high level in Section 8 of this document and specified
in full in a separate companion: <xref target="AGTP-MERCHANT"/>. This document
registers the merchant-related request headers, the 455 Counterparty
Unverified status code, and the <tt>merchant</tt> and <tt>intent</tt> Authority-Scope
domains; the Merchant Manifest Document, Merchant Birth Certificate,
counterparty verification procedure, and Intent Assertion JWT format
are specified in the companion.</t>
        <t>Target audience: AI agent developers, protocol designers, cloud and network
infrastructure providers, enterprise security and compliance architects, and
standards community participants.</t>
      </section>
      <section anchor="agtp-as-the-transport-foundation-for-agent-group-messaging-protocols">
        <name>AGTP as the Transport Foundation for Agent Group Messaging Protocols</name>
        <t>AGTP is the purpose-built transport and governance layer for Agent Group
Messaging Protocols (AGMPs): the category of higher-layer AI agent messaging
standards that includes the Model Context Protocol (MCP) <xref target="MCP"/>, the
Agent-to-Agent Protocol (A2A) <xref target="A2A"/>, the Agent Communication Protocol
(ACP) <xref target="ACP"/>, and emerging others.</t>
        <t>AGMPs define what agents say. AGTP defines how those messages move, who
sent them, and under what authority. AGTP provides the narrow-waist
foundation that AGMPs inherit without modification: intent-native methods,
mandatory agent identity and scoping, resource budget enforcement,
observability hooks, and normative composition profiles. A deployment
running any AGMP over AGTP gains transport-level governance without changes
to the messaging layer.</t>
        <t>The AGMP category term is introduced in this document to provide a stable
collective reference for the class of protocols that AGTP serves as
substrate. It is not a formal IETF term of art; it is a descriptive
classification. Individual AGMP specifications retain their own names and
development paths. AGTP does not govern, modify, or supersede any AGMP.</t>
        <figure anchor="agmp-stack">
          <name>AGTP as Substrate for AGMPs</name>
          <artwork><![CDATA[
+-----------------------------------------------------+
|            Agent Application Logic                  |
+-----------------------------------------------------+
|  AGMP Layer: MCP / A2A / ACP / ANP  [optional]      |
+-----------------------------------------------------+
|   AGTP - Agent Transfer Protocol      [this spec]    |
+-----------------------------------------------------+
|            TLS 1.3+                  [mandatory]    |
+-----------------------------------------------------+
|         TCP / QUIC / UDP                            |
+-----------------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<strong>MUST</strong>", "<strong>MUST NOT</strong>", "<strong>REQUIRED</strong>", "<strong>SHALL</strong>",
"<strong>SHALL NOT</strong>", "<strong>SHOULD</strong>", "<strong>SHOULD NOT</strong>", "<strong>RECOMMENDED</strong>",
"<strong>NOT RECOMMENDED</strong>", "<strong>MAY</strong>", and "<strong>OPTIONAL</strong>" in this document
are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when,
and only when, they appear in all capitals.</t>
      <dl>
        <dt>Agent:</dt>
        <dd>
          <t>An AI software system that executes tasks, makes decisions, and takes
actions without continuous human supervision per transaction.</t>
        </dd>
        <dt>Principal:</dt>
        <dd>
          <t>The human, organization, or system that authorized an agent to act and
is accountable for its actions.</t>
        </dd>
        <dt>Agent-ID:</dt>
        <dd>
          <t>A unique identifier for a specific agent instance, present in all AGTP
request headers.</t>
        </dd>
        <dt>Principal-ID:</dt>
        <dd>
          <t>The identifier of the principal on whose behalf an agent operates.</t>
        </dd>
        <dt>Authority-Scope:</dt>
        <dd>
          <t>A declared set of permissions defining what actions an agent is
authorized to take, in the format domain:action or domain:*.</t>
        </dd>
        <dt>Intent Method:</dt>
        <dd>
          <t>An AGTP method name expressing the agent's purpose, as distinguished from
HTTP resource-operation verbs.</t>
        </dd>
        <dt>Delegation Chain:</dt>
        <dd>
          <t>An ordered record of Agent-IDs representing the sequence of delegations
that produced the current request.</t>
        </dd>
        <dt>Escalation:</dt>
        <dd>
          <t>An agent's intentional deferral of a decision or action to a human
principal or higher-authority agent.</t>
        </dd>
        <dt>Attribution Record:</dt>
        <dd>
          <t>A logged record of an agent action sufficient for audit and compliance
purposes.</t>
        </dd>
        <dt>Session:</dt>
        <dd>
          <t>An AGTP persistent connection context shared across multiple method
invocations within a single agent workflow.</t>
        </dd>
        <dt>SEP (Scope-Enforcement Point):</dt>
        <dd>
          <t>An AGTP-aware infrastructure component, load balancer, gateway, and proxy,
that enforces Authority-Scope compliance without application-layer access.
Requires the Agent Certificate extension (<xref target="AGTP-CERT"/>).</t>
        </dd>
        <dt>Agent Package (.agent):</dt>
        <dd>
          <t>A portable, open deployment artifact for an AI agent. An <tt>.agent</tt> file
contains an embedded Agent Manifest, an integrity hash covering all
package contents, and a behavioral trust score computed at packaging
time. The <tt>.agent</tt> format is an open specification. It is analogous to
a container image: a self-describing, portable unit of deployment. The
<tt>.agent</tt> suffix is a file format designator and <strong>MUST NOT</strong> appear as
a hostname component or top-level label in <tt>agtp://</tt> URIs. Note: the
<tt>.agent</tt> file format specification may be subject to pending patent
claims by the author; see Section 7.7.</t>
        </dd>
        <dt>Governed Agent Package (.nomo):</dt>
        <dd>
          <t>A deployment artifact in the <tt>.nomo</tt> format, which extends the <tt>.agent</tt>
format with a CA-signed certificate chain binding the package to a
verified governance zone and issuing principal. The <tt>.nomo</tt> format is
to <tt>.agent</tt> as HTTPS is to HTTP: the same structural foundation with
an added layer of cryptographic trust. A <tt>.nomo</tt> package is required
for agents operating at Trust Tier 1 (see Section 5.2). The <tt>.nomo</tt>
suffix is a file format designator and <strong>MUST NOT</strong> appear as a
hostname component in <tt>agtp://</tt> URIs.
</t>
          <t>The name derives from the Greek <em>nomos</em> (νόμος), meaning law, rule,
or governance, the same root that underlies <em>autonomy</em> (self-law),
<em>nomocracy</em> (rule of law), and <em>onomastics</em>. A <tt>.nomo</tt> package is
literally an agent operating under law: its behavior is bounded by a
cryptographically enforced governance context at the packaging layer.
Note: the <tt>.nomo</tt> file format specification may be subject to pending
patent claims by the author; see Section 7.7.</t>
        </dd>
        <dt>Agent Transfer Document (.agtp):</dt>
        <dd>
          <t>The wire-level manifest document format defined by this specification.
An <tt>.agtp</tt> document is a signed JSON structure containing the fields
defined in Section 5.5 (Agent Manifest Document). It is the output
format returned by all AGTP URI resolution requests. Both <tt>.agent</tt> and
<tt>.nomo</tt> packages produce <tt>.agtp</tt> documents when queried; the <tt>.agtp</tt>
format is the protocol's canonical representation of agent identity
and is independent of the underlying packaging format. The <tt>.agtp</tt>
suffix <strong>MAY</strong> appear in filenames for stored manifest documents but
<strong>MUST NOT</strong> appear in <tt>agtp://</tt> URIs. The Content-Type for <tt>.agtp</tt>
documents is <tt>application/agtp+json</tt>.</t>
        </dd>
        <dt>URI (AGTP):</dt>
        <dd>
          <t>An <tt>agtp://</tt> scheme URI that identifies an agent or agent namespace.
AGTP URIs are addresses, not filenames. File extensions (<tt>.agent</tt>,
<tt>.nomo</tt>, <tt>.agtp</tt>) <strong>MUST NOT</strong> appear in canonical AGTP URIs. See
Section 5.1 for the canonical URI forms and resolution semantics.</t>
        </dd>
        <dt>Agent Namespace Document:</dt>
        <dd>
          <t>A cryptographically signed <tt>application/agtp+json</tt> document returned
in response to a request targeting an organization's agent registry
root (e.g., <tt>agtp://acme.tld/agents</tt>). Lists all Active agents
registered under the organization's governance zone. The document is
generated and re-signed by the governance platform on any registry
change. It is not a manually editable file. See Section 5.4.</t>
        </dd>
        <dt>Agent Manifest Document:</dt>
        <dd>
          <t>A cryptographically signed <tt>application/agtp+json</tt> document returned
in response to a request targeting a specific agent
(e.g., <tt>agtp://acme.tld/agents/customer-service</tt>). Contains the
agent's birth certificate fields, lifecycle state, behavioral trust
score, authority scope categories, supported methods, and governance
zone. Derived directly from the agent's <tt>.agent</tt> or <tt>.nomo</tt> package;
the package integrity hash is verified before the manifest is served.
See Section 5.5.</t>
        </dd>
        <dt>Agent Birth Certificate:</dt>
        <dd>
          <t>A cryptographically signed identity document issued to an agent at
registration time by a governance platform. The Birth Certificate is
the genesis record of an agent's existence: it establishes the agent's
identity, ownership, authorized scope, behavioral archetype, and
governance zone before the agent takes any action. Authority is issued
through the Birth Certificate; it is never self-assumed.
</t>
          <t>The Birth Certificate is the source document from which the Agent
Manifest Document (Section 5.5) is derived when an AGTP URI is
resolved. The <tt>certificate_hash</tt> field of the Birth Certificate is
the basis for the agent's canonical Agent-ID. In this sense the Birth
Certificate functions as the agent's social security number: issued
once at creation, permanently bound to the individual, and the
authoritative identity record from which all other identity
representations derive.</t>
          <t>Birth Certificate fields map directly to AGTP protocol headers:
<tt>agent_id</tt> maps to the <tt>Agent-ID</tt> header; <tt>owner</tt> maps to the
<tt>Principal-ID</tt> header; <tt>scope</tt> maps to the <tt>Authority-Scope</tt> header.
See Section 5.7.</t>
          <t>Anonymous agents are ungovernable. Without a Birth Certificate, there
is no mechanism to trace decisions to a responsible principal, enforce
scope boundaries, or maintain a meaningful audit trail. Note: the
Agent Birth Certificate mechanism may be subject to pending patent
claims by the author; see Section 7.7.</t>
        </dd>
        <dt>Governance Token:</dt>
        <dd>
          <t>A signed, time-limited JWT artifact issued by a governance runtime
that encodes a specific governance decision for a specific action.
Governance tokens are the runtime companion to the static Birth
Certificate: where the Birth Certificate establishes persistent
identity, the Governance Token carries a bounded authorization for a
single action or session. Tokens carry the governance verdict
(ALLOW, DENY), the agent ID, action details, trust score dimensions,
issuer identity, and expiry. Default TTL: 30 seconds. Tokens
<strong>MUST NOT</strong> be reused across actions; each action requires a fresh
evaluation and a fresh token.</t>
        </dd>
        <dt>Trust Tier:</dt>
        <dd>
          <t>A classification assigned to an agent based on the strength of
identity verification backing its registration. Tier 1 (Verified):
org anchor is a real DNS domain with confirmed ownership and a <tt>.nomo</tt>
governed package. Tier 2 (Org-Asserted): org label is present but
DNS ownership is unverified; <tt>.agent</tt> package acceptable. Tier 3
(Experimental): X- prefix required; not discoverable through the
public AGTP registry. See Section 5.2.</t>
        </dd>
        <dt>AGMP (Agent Group Messaging Protocol):</dt>
        <dd>
          <t>The collective term for higher-layer AI agent messaging standards
that operate over AGTP as their transport substrate, including
MCP <xref target="MCP"/>, A2A <xref target="A2A"/>, ACP <xref target="ACP"/>, and ANP <xref target="ANP"/>. AGMPs
define what agents say to each other. AGTP defines how those
messages move. The term is introduced in this document as a
descriptive classification; it is not a formal IETF term of art.</t>
        </dd>
        <dt>DESCRIBE:</dt>
        <dd>
          <t>An AGTP Tier 1 core method that returns the declared capabilities,
supported modalities, method vocabulary, and versioned feature set
of a specific agent endpoint. Distinguished from URI resolution
(which returns identity) by returning operational capability
metadata suitable for pre-task negotiation. If the
<tt>capability_domains</tt> parameter is omitted, the server <strong>SHOULD</strong>
return all supported domains. Category: ACQUIRE.</t>
        </dd>
        <dt>SUSPEND (method):</dt>
        <dd>
          <t>An AGTP Tier 1 core method that places a specific active session
workflow into a recoverable paused state, issuing a resumption
nonce for re-entry. Distinguished from the lifecycle SUSPEND event
(Section 6.7.6): method-level SUSPEND is session-scoped and does
not affect the agent's registry lifecycle state or Birth Certificate
validity. Category: ORCHESTRATE.</t>
        </dd>
        <dt>Budget-Limit:</dt>
        <dd>
          <t>A request header declaring the maximum resource consumption the
principal authorizes for a method invocation, expressed as
space-separated unit:value tokens drawn from the IANA AGTP Budget
Unit Registry. Example: <tt>Budget-Limit: tokens=5000
compute-seconds=120 financial=10.00USD ttl=3600</tt>. Exceeding the
declared limit <strong>MUST</strong> cause the server to return 452 Budget
Exceeded rather than continue execution. Note: ttl= is RECOMMENDED 
to bound budget lifetime.</t>
        </dd>
        <dt>AGTP-Zone-ID:</dt>
        <dd>
          <t>A request header declaring the network zone or organizational
boundary within which a request must be processed. Scope-Enforcement
Points (SEPs) <strong>MUST</strong> enforce zone boundaries and <strong>MUST</strong> return
453 Zone Violation if a DELEGATE or COLLABORATE request would route
outside the declared zone.</t>
        </dd>
      </dl>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>AGTP is motivated by three distinct, compounding failures in how current
internet infrastructure handles AI agent traffic.</t>
      <section anchor="problem-1-undifferentiated-agent-traffic-on-http">
        <name>Problem 1: Undifferentiated Agent Traffic on HTTP</name>
        <t>AI agents generate intent-driven, structured traffic that is functionally
invisible to the infrastructure it traverses. This traffic flows through
HTTP alongside human traffic with no protocol-level differentiation.
Observability failure, routing inefficiency, and security blindness result,
operators cannot determine what fraction of traffic is agent-generated
without application-layer instrumentation that is expensive, inconsistent,
and easy to circumvent.</t>
        <t>AGTP response: a dedicated protocol environment for agent traffic.
Infrastructure can distinguish, route, monitor, and govern agent traffic
natively.</t>
      </section>
      <section anchor="problem-2-semantic-mismatch-between-agent-intent-and-available-methods">
        <name>Problem 2: Semantic Mismatch Between Agent Intent and Available Methods</name>
        <t>AI agents operate on intent. HTTP's method vocabulary was designed to
describe operations on resources, not purposeful action. When an agent
intends to SUMMARIZE a document, BOOK a resource, and SCHEDULE a sequence,
all three arrive as POST requests. The server receives identical verbs
with meaningfully different intent buried in request bodies, invisible to
any protocol-level handler.</t>
        <t>AGTP response: a vocabulary of agent-native methods that express intent at
the protocol level.</t>
      </section>
      <section anchor="problem-3-no-protocol-level-identity-authority-or-attribution-for-agents">
        <name>Problem 3: No Protocol-Level Identity, Authority, or Attribution for Agents</name>
        <t>When an AI agent takes an action, there is currently no protocol-level
mechanism to verify who authorized this agent, what scope of authority it
holds, which principal is accountable for its actions, or whether it is
the agent it claims to be. Accountability gaps, authority laundering,
auditability failure, and multi-agent trust collapse result.</t>
        <t>AGTP response: agent identity and authority scope embedded in protocol
headers on every request, with an optional Agent Certificate extension for
cryptographic verification.</t>
      </section>
      <section anchor="problem-summary">
        <name>Problem Summary</name>
        <table>
          <name>Summary of Problems Addressed by AGTP</name>
          <thead>
            <tr>
              <th align="left">#</th>
              <th align="left">Problem</th>
              <th align="left">Current Failure</th>
              <th align="left">AGTP Response</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">Undifferentiated traffic</td>
              <td align="left">HTTP cannot separate agent traffic</td>
              <td align="left">Dedicated protocol environment</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">Semantic mismatch</td>
              <td align="left">HTTP verbs obscure agent intent</td>
              <td align="left">Native intent-based method vocabulary</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">No protocol-level identity</td>
              <td align="left">Attribution is untraceable</td>
              <td align="left">Agent identity and scope in headers</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="related-work-and-existing-approaches">
      <name>Related Work and Existing Approaches</name>
      <section anchor="httprest-as-the-de-facto-standard">
        <name>HTTP/REST as the De Facto Standard</name>
        <t>HTTP remains the universal transport for all agent traffic currently
deployed. REST conventions layered on HTTP provide a degree of semantic
structure, but REST remains a resource-manipulation paradigm. As described
in Section 1.3, evolving HTTP to address agent-specific needs is
constrained by the frozen method registry, backward-compatibility
requirements, and the impossibility of achieving infrastructure-level
traffic differentiation through HTTP extensions alone.</t>
      </section>
      <section anchor="existing-agent-group-messaging-protocols">
        <name>Existing Agent Group Messaging Protocols</name>
        <dl>
          <dt>MCP <xref target="MCP"/> (Model Context Protocol, Anthropic):</dt>
          <dd>
            <t>Defines structured communication between AI models and tools/resources.
Runs over HTTP. Addresses tool-calling semantics, not agent traffic
transport.</t>
          </dd>
          <dt>ACP <xref target="ACP"/> (Agent Communication Protocol, IBM):</dt>
          <dd>
            <t>Defines messaging semantics for agent-to-agent communication. Runs over
HTTP.</t>
          </dd>
          <dt>A2A <xref target="A2A"/> (Agent-to-Agent Protocol, Linux Foundation):</dt>
          <dd>
            <t>Defines inter-agent communication and task delegation semantics. Runs
over HTTP.</t>
          </dd>
          <dt>ANP <xref target="ANP"/> (Agent Network Protocol):</dt>
          <dd>
            <t>Defines discovery and communication for networked agents. Runs over HTTP.</t>
          </dd>
        </dl>
        <t>All of these are messaging protocols. They define what agents say to each
other. They do not define how agent traffic moves across a network. Each
presupposes HTTP as its transport and inherits all of HTTP's limitations
for agentic systems.</t>
      </section>
      <section anchor="transport-layer-alternatives">
        <name>Transport-Layer Alternatives</name>
        <dl>
          <dt>gRPC:</dt>
          <dd>
            <t>High-performance RPC over HTTP/2. Strong typing and efficient
serialization. Does not address agent-specific semantics, identity, or
authority.</t>
          </dd>
          <dt>WebSockets:</dt>
          <dd>
            <t>Persistent bidirectional connections over HTTP. Useful for real-time
communication but does not address method semantics or identity.</t>
          </dd>
          <dt>QUIC <xref target="RFC9000"/>:</dt>
          <dd>
            <t>Modern multiplexed transport with reduced connection overhead. AGTP
<strong>SHOULD</strong> prefer QUIC for new implementations. QUIC is a transport
primitive; AGTP is the application-layer protocol above it.</t>
          </dd>
        </dl>
      </section>
      <section anchor="the-critical-distinction-messaging-vs-transport">
        <name>The Critical Distinction: Messaging vs. Transport</name>
        <t>The most important positioning principle for AGTP is the distinction between
messaging protocols and transport protocols. MCP, ACP, A2A, and ANP are
messaging protocols, they define what agents say. AGTP defines how agent
traffic moves.</t>
        <t>An analogy: SMTP is a messaging protocol that runs over TCP. SMTP does not
replace TCP. Saying "TCP is unnecessary because SMTP exists" is a category
error. The same logic applies here. MCP and its peers define agent messaging
semantics. AGTP defines the transport environment those messages move through.</t>
      </section>
      <section anchor="agtp-positioning-the-proposed-stack">
        <name>AGTP Positioning: The Proposed Stack</name>
        <figure anchor="protocol-stack">
          <name>AGTP in the Protocol Stack</name>
          <artwork><![CDATA[
+-----------------------------------------------------+
|            Agent Application Logic                  |
+-----------------------------------------------------+
|  Messaging Layer  (MCP / ACP / A2A)  [optional]     |
+-----------------------------------------------------+
|   AGTP - Agent Transfer Protocol     [this spec]    |
+-----------------------------------------------------+
|            TLS 1.3+                  [mandatory]    |
+-----------------------------------------------------+
|         TCP / QUIC / UDP                            |
+-----------------------------------------------------+
]]></artwork>
        </figure>
        <t>AGTP is not a replacement for messaging protocols. Agents using MCP or A2A
route those messages over AGTP and gain transport-level observability and
identity without modifying the messaging layer. AGTP-native agents that do
not use a separate messaging protocol interact with AGTP methods directly.</t>
      </section>
    </section>
    <section anchor="protocol-overview">
      <name>Protocol Overview</name>
      <section anchor="stack-position">
        <name>Stack Position</name>
        <t>AGTP is an application-layer protocol. It operates above the transport
layer (TCP, UDP, or QUIC) and is wrapped by TLS. It sits below any agent
messaging protocol in deployments that use one.</t>
        <ul spacing="normal">
          <li>
            <t><strong>SHOULD</strong> prefer QUIC <xref target="RFC9000"/> <xref target="RFC9001"/> for new deployments (lower latency,
multiplexing without head-of-line blocking, 0-RTT connection
establishment).</t>
          </li>
          <li>
            <t><strong>MUST</strong> support TCP/TLS as a fallback for compatibility with existing
infrastructure.</t>
          </li>
          <li>
            <t><strong>MAY</strong> run over UDP where QUIC is not available, subject to
implementor-defined reliability guarantees.</t>
          </li>
        </ul>
        <t>Suggested port assignment (subject to IANA assignment. See Section 8):</t>
        <ul spacing="normal">
          <li>
            <t>AGTP/QUIC: port 8443 (proposed)</t>
          </li>
          <li>
            <t>AGTP/TCP+TLS: port 8080 (proposed)</t>
          </li>
        </ul>
      </section>
      <section anchor="design-principles">
        <name>Design Principles</name>
        <dl>
          <dt>Minimalist core:</dt>
          <dd>
            <t>The base spec defines only what is necessary for agent traffic
differentiation, method semantics, and identity headers. Extensions
belong in companion specifications.</t>
          </dd>
          <dt>Extensible by design:</dt>
          <dd>
            <t>New methods are registered through an IANA-managed Method Registry.
New header fields follow a defined extension convention. Additive
changes do not require a version increment.</t>
          </dd>
          <dt>Agent-native:</dt>
          <dd>
            <t>Every design decision assumes the initiating party is an AI system,
not a human.</t>
          </dd>
          <dt>Secure by default:</dt>
          <dd>
            <t>TLS 1.3 or higher is mandatory. Unencrypted AGTP connections <strong>MUST</strong>
be rejected. Agent identity headers are present on every request.</t>
          </dd>
          <dt>Observable by design:</dt>
          <dd>
            <t>Native metadata in every AGTP header provides the minimum information
needed for routing, monitoring, and audit without application-layer
instrumentation.</t>
          </dd>
          <dt>Composable:</dt>
          <dd>
            <t>AGTP works alongside existing agent messaging protocols without requiring
modification to those protocols.</t>
          </dd>
        </dl>
      </section>
      <section anchor="connection-model">
        <name>Connection Model</name>
        <t>AGTP uses a persistent session model by default, reflecting the reality that
agents typically execute multi-step workflows rather than isolated single
requests. An AGTP session is established with a single TLS handshake
including agent identity assertion, persists across multiple method
exchanges, carries a Session-ID header identifying the agent's task
context, and terminates on explicit session close or inactivity timeout
(RECOMMENDED minimum: 60 seconds).</t>
        <t>Per-request (stateless) mode is supported for constrained environments.
In stateless mode, agent identity headers <strong>MUST</strong> be present on every
individual request.</t>
      </section>
      <section anchor="header-format">
        <name>Header Format</name>
        <section anchor="request-headers">
          <name>Request Headers</name>
          <table>
            <name>AGTP Request Header Fields</name>
            <thead>
              <tr>
                <th align="left">Field</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">AGTP-Version</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Protocol version. Current: AGTP/1.0</td>
              </tr>
              <tr>
                <td align="left">AGTP-Method</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The agent intent method (see Section 6)</td>
              </tr>
              <tr>
                <td align="left">Agent-ID</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Opaque identifier for the requesting agent instance</td>
              </tr>
              <tr>
                <td align="left">Principal-ID</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Identifier of the human or system that authorized this agent</td>
              </tr>
              <tr>
                <td align="left">Authority-Scope</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Declared scope of actions this agent is authorized to take</td>
              </tr>
              <tr>
                <td align="left">Session-ID</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Identifies the current task/workflow context</td>
              </tr>
              <tr>
                <td align="left">Task-ID</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Unique identifier for this specific method invocation</td>
              </tr>
              <tr>
                <td align="left">Delegation-Chain</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Ordered list of Agent-IDs if this request was delegated</td>
              </tr>
              <tr>
                <td align="left">Priority</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Request priority hint: critical, normal, background</td>
              </tr>
              <tr>
                <td align="left">TTL</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Maximum acceptable response latency in milliseconds</td>
              </tr>
              <tr>
                <td align="left">Budget-Limit</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Max resource budget per invocation. Format: space-separated <tt>unit=value</tt> tokens. Units from IANA AGTP Budget Unit Registry.</td>
              </tr>
              <tr>
                <td align="left">AGTP-Zone-ID</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Network zone boundary constraint. SEPs <strong>MUST</strong> enforce; return 453 if DELEGATE or COLLABORATE would exit declared zone.</td>
              </tr>
              <tr>
                <td align="left">Content-Schema</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">URI reference to JSON Schema describing the request body structure. Enables receivers to validate payload without LLM inference.</td>
              </tr>
              <tr>
                <td align="left">Telemetry-Export</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">OTLP endpoint URI for metric export, or <tt>inline</tt> to receive metrics embedded in the response Attribution-Record.</td>
              </tr>
              <tr>
                <td align="left">Merchant-ID</td>
                <td align="left">
                  <strong>MUST</strong> on PURCHASE</td>
                <td align="left">Canonical identifier of the intended merchant counterparty. See <xref target="AGTP-MERCHANT"/>.</td>
              </tr>
              <tr>
                <td align="left">Merchant-Manifest-Fingerprint</td>
                <td align="left">
                  <strong>MUST</strong> on PURCHASE</td>
                <td align="left">SHA-256 fingerprint of the Merchant Manifest Document verified by the requesting agent. Receiving server <strong>MUST</strong> reject with 455 if this does not match its current manifest. See <xref target="AGTP-MERCHANT"/>.</td>
              </tr>
              <tr>
                <td align="left">Intent-Assertion</td>
                <td align="left">
                  <strong>SHOULD</strong> on PURCHASE</td>
                <td align="left">Detached JWT <xref target="RFC7519"/> carrying signed principal-authorized purchase intent. Forwardable to payment networks as standalone evidence. See <xref target="AGTP-MERCHANT"/>.</td>
              </tr>
              <tr>
                <td align="left">Cart-Digest</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Cryptographic digest of a structured cart returned by a prior QUOTE invocation. Binds a PURCHASE to a previously quoted cart without retransmission of line-item detail. See <xref target="AGTP-MERCHANT"/>.</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="response-headers">
          <name>Response Headers</name>
          <table>
            <name>AGTP Response Header Fields</name>
            <thead>
              <tr>
                <th align="left">Field</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">AGTP-Version</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Protocol version</td>
              </tr>
              <tr>
                <td align="left">AGTP-Status</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Numeric status code (see Section 5.5)</td>
              </tr>
              <tr>
                <td align="left">Task-ID</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Echo of request Task-ID for correlation</td>
              </tr>
              <tr>
                <td align="left">Server-Agent-ID</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Identity of the responding server or agent</td>
              </tr>
              <tr>
                <td align="left">Attribution-Record</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Signed record of the action taken, for audit. <strong>MAY</strong> include RATS attestation evidence and inline telemetry when Telemetry-Export is set to <tt>inline</tt>.</td>
              </tr>
              <tr>
                <td align="left">Continuation-Token</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Token for retrieving additional results in streaming contexts</td>
              </tr>
              <tr>
                <td align="left">Supported-Methods</td>
                <td align="left">
                  <strong>SHOULD</strong> (on session open)</td>
                <td align="left">List of AGTP methods supported by this server</td>
              </tr>
              <tr>
                <td align="left">Cost-Estimate</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Estimated resource consumption in Budget-Limit unit format. Returned by QUOTE; <strong>MAY</strong> appear on any response as an informational signal.</td>
              </tr>
              <tr>
                <td align="left">Attestation-Evidence</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">RATS attestation evidence token or reference URI per <xref target="RFC9334"/>. Format indicated by <tt>attestation_type</tt> in response body: <tt>rats-eat</tt>, <tt>rats-corim</tt>, or <tt>rats-uri</tt>.</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="status-codes">
        <name>Status Codes</name>
        <t>AGTP defines its own status code space. Codes 451, 452, 453, 550, and 551
are AGTP-specific with no HTTP equivalent and are registered in the IANA
AGTP Status Code Registry (see Section 9.3).</t>
        <table>
          <name>AGTP Status Codes</name>
          <thead>
            <tr>
              <th align="left">Code</th>
              <th align="left">Name</th>
              <th align="left">Meaning</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">200</td>
              <td align="left">OK</td>
              <td align="left">Method executed successfully</td>
            </tr>
            <tr>
              <td align="left">202</td>
              <td align="left">Accepted</td>
              <td align="left">Method accepted; execution is asynchronous</td>
            </tr>
            <tr>
              <td align="left">204</td>
              <td align="left">No Content</td>
              <td align="left">Method executed; no response body</td>
            </tr>
            <tr>
              <td align="left">400</td>
              <td align="left">Bad Request</td>
              <td align="left">Malformed AGTP request</td>
            </tr>
            <tr>
              <td align="left">401</td>
              <td align="left">Unauthorized</td>
              <td align="left">Agent-ID not recognized or not authenticated</td>
            </tr>
            <tr>
              <td align="left">403</td>
              <td align="left">Forbidden</td>
              <td align="left">Agent lacks authority for requested action per Authority-Scope</td>
            </tr>
            <tr>
              <td align="left">404</td>
              <td align="left">Not Found</td>
              <td align="left">Target resource or agent not found</td>
            </tr>
            <tr>
              <td align="left">408</td>
              <td align="left">Timeout</td>
              <td align="left">TTL exceeded before method could execute</td>
            </tr>
            <tr>
              <td align="left">409</td>
              <td align="left">Conflict</td>
              <td align="left">Method conflicts with current state (e.g., BOOK on unavailable resource)</td>
            </tr>
            <tr>
              <td align="left">410</td>
              <td align="left">Gone</td>
              <td align="left">Agent has been Revoked or Deprecated; canonical ID is permanently retired</td>
            </tr>
            <tr>
              <td align="left">422</td>
              <td align="left">Unprocessable</td>
              <td align="left">Request well-formed but semantically invalid</td>
            </tr>
            <tr>
              <td align="left">429</td>
              <td align="left">Rate Limited</td>
              <td align="left">Agent is exceeding permitted request frequency</td>
            </tr>
            <tr>
              <td align="left">451</td>
              <td align="left">Scope Violation</td>
              <td align="left">Requested action is outside declared Authority-Scope. AGTP-specific</td>
            </tr>
            <tr>
              <td align="left">452</td>
              <td align="left">Budget Exceeded</td>
              <td align="left">Method execution would exceed the Budget-Limit declared in the request. AGTP-specific</td>
            </tr>
            <tr>
              <td align="left">453</td>
              <td align="left">Zone Violation</td>
              <td align="left">Request would route outside the AGTP-Zone-ID boundary. SEP-enforced. AGTP-specific</td>
            </tr>
            <tr>
              <td align="left">455</td>
              <td align="left">Counterparty Unverified</td>
              <td align="left">PURCHASE counterparty failed merchant identity verification: Merchant-ID absent, Merchant-Manifest-Fingerprint mismatch, or merchant in non-Active lifecycle state. AGTP-specific. See <xref target="AGTP-MERCHANT"/>.</td>
            </tr>
            <tr>
              <td align="left">500</td>
              <td align="left">Server Error</td>
              <td align="left">Internal failure in the responding system</td>
            </tr>
            <tr>
              <td align="left">503</td>
              <td align="left">Unavailable</td>
              <td align="left">Responding agent or system temporarily unavailable or Suspended</td>
            </tr>
            <tr>
              <td align="left">550</td>
              <td align="left">Delegation Failure</td>
              <td align="left">A delegated sub-agent failed to complete the requested action. AGTP-specific</td>
            </tr>
            <tr>
              <td align="left">551</td>
              <td align="left">Authority Chain Broken</td>
              <td align="left">Delegation chain contains an unverifiable or broken identity link. AGTP-specific</td>
            </tr>
          </tbody>
        </table>
        <t>Status code 451 (Scope Violation) is a governance signal: the agent
attempted an action outside its declared Authority-Scope, caught at the
protocol level. Status code 452 (Budget Exceeded) is a governance signal
analogous to 451: the agent's requested action is within its Authority-Scope
but would consume resources beyond what the principal authorized for this
invocation. Status code 453 (Zone Violation) is returned by SEPs when a
DELEGATE or COLLABORATE request would route to an agent outside the declared
AGTP-Zone-ID boundary. Status code 455 (Counterparty Unverified) is returned
on PURCHASE invocations when the receiving server cannot verify that the
requesting agent has performed valid merchant identity verification against
the server's current Merchant Manifest Document, or when the merchant is in
a non-Active lifecycle state; see <xref target="AGTP-MERCHANT"/>. Status code 551
(Authority Chain Broken) indicates that one or more Agent-ID entries in the
Delegation-Chain header cannot be verified as part of a valid delegation
sequence. Status code 410 (Gone) is returned when an agent's Birth
Certificate has been revoked or the agent deprecated; the canonical
Agent-ID is permanently retired and <strong>MUST NOT</strong> be retried. All
AGTP-specific status codes are operational signals, not protocol errors,
and <strong>MUST</strong> be logged for audit purposes.</t>
      </section>
      <section anchor="wire-format-and-content-type">
        <name>Wire Format and Content-Type</name>
        <t>AGTP request and response bodies are encoded as JSON. The registered
Content-Type for AGTP message bodies is:</t>
        <artwork><![CDATA[
Content-Type: application/agtp+json
]]></artwork>
        <t>Implementations <strong>MUST</strong> include this Content-Type on all AGTP requests and
responses that carry a message body. Responses with no body (e.g., 204 No
Content) <strong>MUST NOT</strong> include a Content-Type header. Binary or streaming
extensions <strong>MAY</strong> define additional Content-Type values as part of their
companion specifications.</t>
        <t>The common structure for all AGTP request bodies:</t>
        <sourcecode type="json"><![CDATA[
{
  "method": "QUERY",
  "task_id": "task-0042",
  "session_id": "sess-a1b2c3d4",
  "parameters": { },
  "context": { }
}
]]></sourcecode>
        <t>And for all AGTP response bodies:</t>
        <sourcecode type="json"><![CDATA[
{
  "status": 200,
  "task_id": "task-0042",
  "result": { },
  "attribution": { }
}
]]></sourcecode>
      </section>
      <section anchor="early-implementations">
        <name>Early Implementations</name>
        <t>AGTP is a proposed specification. No production implementations exist at
the time of this writing. The author encourages early prototype
implementations to validate the protocol design, identify gaps, and
generate feedback prior to IETF working group submission.</t>
        <ul empty="true">
          <li>
            <t>If you are building an AGTP prototype or reference implementation,
please share your findings via the feedback channel listed on the cover
of this document. A reference implementation in Python and/or Go is
planned as open-source software concurrent with or shortly after IETF
I-D submission. Implementation reports are welcome and will be
incorporated into subsequent draft revisions.</t>
          </li>
        </ul>
        <t>Implementers wishing to experiment before the formal IANA port assignment
may use port 8443 (AGTP/QUIC) and port 8080 (AGTP/TCP+TLS) as working
values. These values are subject to change upon final IANA assignment.</t>
        <t>The ACTIVATE method extension, which binds <tt>.nomo</tt> governed agent packages
to AGTP as a first-class activation operation, is described in a companion
document and is implemented as an optional extension. Core AGTP
implementations need not support ACTIVATE to be compliant with this
specification.</t>
      </section>
    </section>
    <section anchor="agent-identity-uri-structure-and-registration">
      <name>Agent Identity, URI Structure, and Registration</name>
      <section anchor="uri-structure-and-resolution-mechanics">
        <name>URI Structure and Resolution Mechanics</name>
        <section anchor="foundational-principle">
          <name>Foundational Principle</name>
          <t>AGTP URIs are addresses, not filenames. File format suffixes
(<tt>.agent</tt>, <tt>.nomo</tt>, <tt>.agtp</tt>) <strong>MUST NOT</strong> appear in canonical
<tt>agtp://</tt> URIs. A URI resolves to an Agent Manifest Document or
Agent Namespace Document derived from the underlying package; it
does not expose or serve the package itself.</t>
          <t>Implementations <strong>MUST</strong> treat any URI containing a file extension
in the path as non-canonical and <strong>SHOULD</strong> issue a 301 Moved
Permanently redirect to the canonical form prior to resolution.</t>
          <t>The Canonical Agent-ID (256-bit cryptographic identifier) remains
the authoritative identifier in all AGTP protocol operations. Human-
readable URIs are aliases that resolve to a canonical identifier. In
the event of any conflict between a human-readable URI and a canonical
Agent-ID, the canonical Agent-ID <strong>MUST</strong> be treated as authoritative.</t>
        </section>
        <section anchor="canonical-uri-forms">
          <name>Canonical URI Forms</name>
          <t>AGTP defines the following canonical URI forms:</t>
          <artwork><![CDATA[
Form 1. Canonical ID (cryptographic):
  agtp://[256-bit-hex-id]

Form 2. Domain-anchored agent (verified identity):
  agtp://[domain.tld]/agents/[agent-label]

Form 3. Subdomain-anchored agent (recommended enterprise pattern):
  agtp://agtp.[domain.tld]/agents/[agent-label]

Form 4. Organization namespace root:
  agtp://[domain.tld]/agents
  agtp://agtp.[domain.tld]/agents
]]></artwork>
          <t>The following URI forms are explicitly invalid and <strong>MUST</strong> return
<tt>400 Bad Request</tt> with error code <tt>invalid-uri-form</tt>:</t>
          <artwork><![CDATA[
agtp://[label].agent          (.agent as hostname TLD - prohibited)
agtp://[label].nomo           (.nomo as hostname TLD - prohibited)
agtp://[domain].[label].agent (hybrid dot-notation - prohibited)
agtp://[domain].[label].nomo  (hybrid dot-notation - prohibited)
]]></artwork>
          <t>Note: <tt>.agent</tt> is claimed as a Web3 top-level domain by at least one
blockchain naming system. URI forms that place <tt>.agent</tt> or <tt>.nomo</tt>
in the hostname position are prohibited both for collision avoidance
with Web3 naming systems and because they imply domain ownership
without enforcing it. See Section 5.6 for Web3 guidance.</t>
        </section>
        <section anchor="non-canonical-forms-and-redirect-behavior">
          <name>Non-Canonical Forms and Redirect Behavior</name>
          <t>The following non-canonical forms <strong>SHOULD</strong> be redirected to their
canonical equivalents. Implementations <strong>MUST NOT</strong> serve package
contents in response to any URI form.</t>
          <table>
            <name>Non-Canonical URI Forms and Redirect Targets</name>
            <thead>
              <tr>
                <th align="left">Received URI</th>
                <th align="left">Canonical Redirect Target</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service.agent</tt></td>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service.nomo</tt></td>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service.agtp</tt></td>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service</tt></td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="query-parameters-for-format-selection">
          <name>Query Parameters for Format Selection</name>
          <t>All AGTP URI resolution requests accept an optional <tt>format</tt> query
parameter controlling the serialization of the returned document.</t>
          <table>
            <name>AGTP URI Format Query Parameters</name>
            <thead>
              <tr>
                <th align="left">Query Parameter</th>
                <th align="left">Returned Representation</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">(none)</td>
                <td align="left">Agent Manifest Document, human-readable <tt>application/agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=manifest</tt></td>
                <td align="left">Agent Manifest Document, human-readable <tt>application/agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=json</tt></td>
                <td align="left">Agent Manifest Document, compact <tt>application/agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=certificate</tt></td>
                <td align="left">Birth certificate fields only, <tt>application/agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=status</tt></td>
                <td align="left">Lifecycle state and operational status only, <tt>application/agtp+json</tt></td>
              </tr>
            </tbody>
          </table>
          <t>All format variants return signed <tt>application/agtp+json</tt> content.
The <tt>?format=json</tt> parameter is intended for programmatic consumers.
The default returns the full human-readable manifest suitable for
browser rendering by an AGTP-aware client.</t>
        </section>
        <section anchor="resolution-mechanics">
          <name>Resolution Mechanics</name>
          <t>When an AGTP server receives a request targeting an agent URI, it
<strong>MUST</strong> perform the following steps in order:</t>
          <ol spacing="normal" type="1"><li>
              <t>Parse and validate the URI. If the URI is an invalid (prohibited)
form, return <tt>400 Bad Request</tt> with error code <tt>invalid-uri-form</tt>.</t>
            </li>
            <li>
              <t>Resolve the agent label to a canonical Agent-ID via the governance
platform's registry lookup. If no matching agent is found, return
<tt>404 Not Found</tt>.</t>
            </li>
            <li>
              <t>Verify the registry record lifecycle state. If the agent is
Suspended, return <tt>503 Service Unavailable</tt> with lifecycle state
in the response body. If the agent is Revoked or Deprecated,
return <tt>410 Gone</tt> with lifecycle state and revocation timestamp.</t>
            </li>
            <li>
              <t>Retrieve the agent's package (<tt>.agent</tt> or <tt>.nomo</tt>) from the
package store.</t>
            </li>
            <li>
              <t><strong>Verify the package integrity hash before proceeding.</strong> If
integrity verification fails, return <tt>500 Internal Error</tt> with
error code <tt>package-integrity-failure</tt>. <strong>MUST</strong> be logged.</t>
            </li>
            <li>
              <t>Extract the embedded manifest from the verified package.</t>
            </li>
            <li>
              <t>Sign the manifest document using the governance platform's signing
key. Return the signed <tt>application/agtp+json</tt> document in the
format specified by the query parameter.</t>
            </li>
          </ol>
          <t>The package's executable content, code, logic, and any fields not
included in the manifest schema <strong>MUST NOT</strong> be returned at any
step. URI resolution exposes identity and status exclusively.</t>
        </section>
        <section anchor="domain-anchor-and-trust-tier-assignment">
          <name>Domain Anchor and Trust Tier Assignment</name>
          <t>The org anchor in a domain-anchored URI (Form 2 or Form 3) <strong>MUST</strong>
be validated at registration time to determine the agent's Trust Tier.</t>
          <dl>
            <dt><strong>Trust Tier 1 - Verified (DNS-anchored):</strong></dt>
            <dd>
              <t>The org domain is validated by DNS challenge at ACTIVATE time per
<xref target="RFC8555"/>. The governance platform <strong>MUST</strong> verify that the
registering party controls the DNS zone for the claimed domain before
issuing a Tier 1 Birth Certificate. Requires a <tt>.nomo</tt> governed
package.
</t>
              <t>Trust Tier 1 agents <strong>MUST</strong> have the following DNS record published
and verifiable at resolution time:</t>
              <artwork><![CDATA[
_agtp.[domain.tld]. IN TXT "agtp-zone=[zone-id]; cert=[fp]"
]]></artwork>
            </dd>
            <dt><strong>Trust Tier 2 - Org-Asserted:</strong></dt>
            <dd>
              <t>The org label is present in the URI but DNS ownership has not been
verified. An <tt>.agent</tt> package is acceptable. The Agent Manifest
Document for Tier 2 agents <strong>MUST</strong> include a prominent
<tt>trust_tier: 2</tt> field and a <tt>trust_warning</tt> field with value
<tt>"org-label-unverified"</tt>. AGTP-aware browsers and clients <strong>MUST</strong>
surface a visible trust indicator distinguishing Tier 2 from Tier 1.
</t>
              <t>Tier 2 agents <strong>MUST NOT</strong> be granted authority scopes above
<tt>documents:query</tt> and <tt>knowledge:query</tt> without AGTP-CERT
cryptographic identity binding.</t>
            </dd>
            <dt><strong>Trust Tier 3 - Experimental:</strong></dt>
            <dd>
              <t>Agent label uses the <tt>X-</tt> prefix. Not discoverable through the
public AGTP registry. For development and testing only.
Implementations <strong>MUST NOT</strong> deploy Tier 3 agents in production.</t>
            </dd>
          </dl>
        </section>
        <section anchor="subdomain-deployment-pattern">
          <name>Subdomain Deployment Pattern</name>
          <t>Organizations <strong>SHOULD</strong> deploy AGTP endpoints at a dedicated
subdomain following the pattern <tt>agtp.[organization-domain.tld]</tt>
(e.g., <tt>agtp.acme.tld</tt>). This is the recommended enterprise
deployment pattern: it provides clean separation between web and
agent infrastructure, allows independent certificate management for
the AGTP endpoint, and is consistent with service-specific subdomain
conventions. An organization with an AGTP subdomain <strong>SHOULD</strong> also
configure their primary domain to redirect AGTP requests:</t>
          <artwork><![CDATA[
agtp://acme.tld/agents/customer-service
  → 301 → agtp://agtp.acme.tld/agents/customer-service
]]></artwork>
        </section>
        <section anchor="the-agents-reserved-path-prefix">
          <name>The /agents/ Reserved Path Prefix</name>
          <t>The path prefix <tt>/agents/</tt> is reserved in all <tt>agtp://</tt> URIs for
agent namespace operations. Implementations <strong>MUST</strong> support this
prefix. The registry root at <tt>/agents</tt> (no trailing label) resolves
to the Agent Namespace Document (see Section 5.4).</t>
        </section>
        <section anchor="collision-prevention">
          <name>Collision Prevention</name>
          <t><tt>agtp://acme.tld/agents/customer-service</tt> and
<tt>agtp://chrishood.tld/agents/customer-service</tt> are distinct and
non-colliding because the domain component is the trust root.
No two agents can share a canonical URI if their org domains differ.
Within a single org domain, the governance platform enforces
uniqueness of agent labels at registration time. Infrastructure
<strong>MUST</strong> use the canonical Agent-ID for all routing, logging, and
attribution operations. Human-readable URIs are a display and
discovery layer only.</t>
        </section>
        <section anchor="iana-considerations-for-the-agtp-uri-scheme">
          <name>IANA Considerations for the agtp:// URI Scheme</name>
          <t>This document proposes registration of the <tt>agtp://</tt> URI scheme with
IANA per <xref target="RFC7595"/>. Registration template:</t>
          <dl>
            <dt>URI scheme name:</dt>
            <dd>
              <t>agtp</t>
            </dd>
            <dt>Status:</dt>
            <dd>
              <t>Permanent</t>
            </dd>
            <dt>URI scheme syntax:</dt>
            <dd>
              <t><tt>agtp://[canonical-agent-id]</tt> or <tt>agtp://[domain.tld]/agents/[label]</tt></t>
            </dd>
            <dt>URI scheme semantics:</dt>
            <dd>
              <t>Identifies an AI agent or agent namespace operating over the Agent
Transfer Protocol. The canonical form uses a 256-bit hex-encoded
cryptographic identifier derived from the agent's Birth Certificate.
The domain-anchored form uses a verified or asserted organization
domain with a reserved <tt>/agents/</tt> path prefix.</t>
            </dd>
            <dt>Applications/protocols that use this URI scheme:</dt>
            <dd>
              <t>Agent Transfer Protocol (this document)</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>Domain-anchored URIs are the recommended human-readable form.
Implementations <strong>MUST</strong> accept canonical identifiers and <strong>SHOULD</strong>
support domain-anchored resolution. File extensions <strong>MUST NOT</strong>
appear in <tt>agtp://</tt> URIs.</t>
            </dd>
            <dt>Contact:</dt>
            <dd>
              <t>Chris Hood, chris@nomotic.ai</t>
            </dd>
            <dt>References:</dt>
            <dd>
              <t>This document</t>
            </dd>
          </dl>
          <t>The <tt>agtp://</tt> URI scheme registration is open and unencumbered. No
intellectual property claims apply to the URI scheme itself.</t>
        </section>
      </section>
      <section anchor="trust-tier-summary">
        <name>Trust Tier Summary</name>
        <table>
          <name>AGTP Trust Tier Summary</name>
          <thead>
            <tr>
              <th align="left">Trust Tier</th>
              <th align="left">Verification</th>
              <th align="left">Package Required</th>
              <th align="left">DNS Record Required</th>
              <th align="left">Registry Visible</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1 - Verified</td>
              <td align="left">DNS challenge per <xref target="RFC8555"/></td>
              <td align="left">
                <tt>.nomo</tt></td>
              <td align="left">Yes (<tt>_agtp</tt> TXT)</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">2 - Org-Asserted</td>
              <td align="left">None</td>
              <td align="left">
                <tt>.agent</tt> or <tt>.nomo</tt></td>
              <td align="left">No</td>
              <td align="left">Yes (with warning)</td>
            </tr>
            <tr>
              <td align="left">3 - Experimental</td>
              <td align="left">None</td>
              <td align="left">Any</td>
              <td align="left">No</td>
              <td align="left">No</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="agent-namespace-document">
        <name>Agent Namespace Document</name>
        <section anchor="purpose-and-scope">
          <name>Purpose and Scope</name>
          <t>The Agent Namespace Document is the index of all Active agents
registered under an organization's governance zone. It is returned
in response to a request targeting the <tt>/agents</tt> path:</t>
          <artwork><![CDATA[
agtp://acme.tld/agents
agtp://agtp.acme.tld/agents
]]></artwork>
          <t>The Agent Namespace Document is not a manually editable file. It is
generated and cryptographically signed by the governance platform each
time the registry changes. Any Namespace Document that fails signature
verification <strong>MUST</strong> be rejected by the requesting party.</t>
        </section>
        <section anchor="document-schema">
          <name>Document Schema</name>
          <figure>
            <name>Agent Namespace Document Schema</name>
            <sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-namespace",
  "schema_version": "1.0",
  "org_domain": "acme.tld",
  "governance_zone": "zone:acme-internal",
  "generated_at": "2026-03-20T14:00:00Z",
  "signature": {
    "algorithm": "ES256",
    "key_id": "agtp-gov-key-acme-01",
    "value": "[base64-encoded-signature]"
  },
  "agents": [
    {
      "agent_label": "customer-service",
      "canonical_id": "3a9f2c1d8b7e4a6f...",
      "lifecycle_state": "Active",
      "trust_tier": 1,
      "cert_status": "Active",
      "manifest_uri": "agtp://agtp.acme.tld/agents/customer-service",
      "activated_at": "2026-01-15T09:00:00Z",
      "last_updated": "2026-03-01T11:30:00Z"
    }
  ],
  "total_active": 1,
  "namespace_cert_fingerprint": "b2c4d6e8..."
}
]]></sourcecode>
          </figure>
          <t>The <tt>agents</tt> array <strong>MUST</strong> include only agents in Active lifecycle
state. Suspended, Revoked, and Deprecated agents <strong>MUST NOT</strong> appear
in the Namespace Document.</t>
        </section>
        <section anchor="integrity-and-freshness">
          <name>Integrity and Freshness</name>
          <t>The Namespace Document <strong>MUST</strong> include a <tt>generated_at</tt> timestamp.
Implementations <strong>SHOULD</strong> treat Namespace Documents older than a
configurable freshness threshold (default: 300 seconds) as stale and
re-request. The governance platform <strong>MUST</strong> re-sign the Namespace
Document within 60 seconds of any registry change.</t>
          <t>The signature covers the entire document including <tt>generated_at</tt>.
Replaying an older signed Namespace Document to conceal a revocation
event is a known attack vector; implementations <strong>MUST</strong> reject
Namespace Documents with a <tt>generated_at</tt> timestamp older than the
freshness threshold.</t>
        </section>
      </section>
      <section anchor="agent-manifest-document-and-the-agtp-format">
        <name>Agent Manifest Document and the .agtp Format</name>
        <section anchor="purpose-and-scope-1">
          <name>Purpose and Scope</name>
          <t>The Agent Manifest Document is the protocol's canonical representation
of a specific agent's identity, status, and behavioral scope. It is
returned in response to any AGTP URI resolution request targeting a
specific agent:</t>
          <artwork><![CDATA[
agtp://acme.tld/agents/customer-service
agtp://acme.tld/agents/customer-service?format=json
agtp://acme.tld/agents/customer-service?format=manifest
]]></artwork>
          <t>The manifest is derived from the embedded manifest inside the agent's
<tt>.agent</tt> or <tt>.nomo</tt> package. It is not a separate file that can be
independently modified. The governance platform <strong>MUST</strong> verify the
package integrity hash before extracting and serving the manifest.</t>
        </section>
        <section anchor="the-three-document-formats-and-their-relationship">
          <name>The Three Document Formats and Their Relationship</name>
          <figure anchor="format-relationship">
            <name>Relationship Between AGTP File Formats</name>
            <artwork><![CDATA[
.agent   ──── open packaging format (patent pending, Chris Hood)
  │           Contains: manifest + integrity hash + behavioral
  │           trust score + executable content
  │
.nomo    ──── governed packaging format (patent pending, Chris Hood)
  │           Contains: .agent contents + CA-signed cert chain
  │           + governance zone binding
  │
  Both produce ↓ when queried via agtp:// URI
  │
.agtp    ──── wire-level manifest document (this spec)
              Contains: identity fields from manifest +
              lifecycle state + trust tier + behavioral scope
              Open format defined by AGTP specification
              Content-Type: application/agtp+json
]]></artwork>
          </figure>
          <t>The <tt>.agtp</tt> format is the protocol's own document type. It is what
gets transmitted over the wire. The <tt>.agent</tt> and <tt>.nomo</tt> formats are
what get deployed. An AGTP implementation is not required to understand
<tt>.agent</tt> or <tt>.nomo</tt> packaging internals; it is only required to
produce and consume <tt>.agtp</tt> manifest documents.</t>
          <t>Additional packaging formats <strong>MAY</strong> be defined by third parties,
provided they can produce conformant <tt>.agtp</tt> manifest documents when
queried. Such formats <strong>MUST</strong> implement the integrity verification
requirement: the manifest <strong>MUST</strong> be derived from a verified package,
not from an independently stored or editable file.</t>
        </section>
        <section anchor="agent-manifest-document-schema">
          <name>Agent Manifest Document Schema</name>
          <t>The following fields are <strong>REQUIRED</strong> in all Agent Manifest Documents:</t>
          <figure>
            <name>Agent Manifest Document - Required Fields</name>
            <sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-manifest",
  "schema_version": "1.0",
  "manifest_uri": "agtp://agtp.acme.tld/agents/customer-service",
  "canonical_id": "3a9f2c1d8b7e4a6f0c2d5e9b1a3f7c0d...",
  "agent_label": "customer-service",
  "org_domain": "acme.tld",
  "governance_zone": "zone:acme-internal",
  "trust_tier": 1,
  "package_format": "nomo",
  "package_integrity_hash": "sha256:[hash]",
  "lifecycle_state": "Active",
  "cert_status": "Active",
  "principal_org": "Acme Corporation",
  "activated_at": "2026-01-15T09:00:00Z",
  "behavioral_trust_score": 0.94,
  "authority_scope_categories": [
    "documents:query",
    "knowledge:query",
    "calendar:book",
    "escalation:route"
  ],
  "supported_methods": [
    "QUERY", "SUMMARIZE", "BOOK", "SCHEDULE",
    "ESCALATE", "NOTIFY", "CONFIRM"
  ],
  "job_description": "Handles customer service requests.",
  "signature": {
    "algorithm": "ES256",
    "key_id": "agtp-gov-key-acme-01",
    "value": "[base64-encoded-signature]"
  }
}
]]></sourcecode>
          </figure>
          <t>The following fields are <strong>RECOMMENDED</strong>:</t>
          <figure>
            <name>Agent Manifest Document - Recommended Fields</name>
            <sourcecode type="json"><![CDATA[
{
  "version": "2.1.0",
  "last_updated": "2026-03-01T11:30:00Z",
  "escalation_policy": "route-to-human-on-scope-limit",
  "delegation_permitted": false,
  "max_delegation_depth": 0,
  "audit_log_uri": "agtp://agtp.acme.tld/audit/customer-service",
  "dns_anchor_record": "_agtp.acme.tld TXT agtp-zone=...",
  "cert_fingerprint": "b2c4d6e8..."
}
]]></sourcecode>
          </figure>
          <t>The following fields are <strong>REQUIRED</strong> when <tt>trust_tier</tt> is <tt>2</tt>:</t>
          <figure>
            <name>Agent Manifest Document - Required Fields for Trust Tier 2</name>
            <sourcecode type="json"><![CDATA[
{
  "trust_warning": "org-label-unverified",
  "trust_tier_explanation": "Org label not DNS-verified."
}
]]></sourcecode>
          </figure>
        </section>
        <section anchor="what-the-manifest-exposes-and-does-not-expose">
          <name>What the Manifest Exposes and Does Not Expose</name>
          <t>The Agent Manifest Document <strong>MUST</strong> expose:</t>
          <ul spacing="normal">
            <li>
              <t>The agent's identity (canonical ID, label, org, governance zone)</t>
            </li>
            <li>
              <t>The agent's current operational status (lifecycle state)</t>
            </li>
            <li>
              <t>The agent's authority scope categories</t>
            </li>
            <li>
              <t>The agent's supported method vocabulary</t>
            </li>
            <li>
              <t>The agent's behavioral trust score</t>
            </li>
            <li>
              <t>The agent's birth certificate fields (activated_at, principal_org)</t>
            </li>
            <li>
              <t>The agent's trust tier and any associated trust warnings</t>
            </li>
          </ul>
          <t>The Agent Manifest Document <strong>MUST NOT</strong> expose:</t>
          <ul spacing="normal">
            <li>
              <t>Executable code, scripts, or logic</t>
            </li>
            <li>
              <t>Model weights or configurations</t>
            </li>
            <li>
              <t>Internal API keys or credentials</t>
            </li>
            <li>
              <t>Specific authority scope grant tokens</t>
            </li>
            <li>
              <t>Session history or prior action logs</t>
            </li>
          </ul>
          <t>No AGTP URI resolution path, including any query parameter
combination, <strong>MUST</strong> return package contents beyond the manifest
schema defined in this section.</t>
        </section>
        <section anchor="manifest-tamper-proofing">
          <name>Manifest Tamper-Proofing</name>
          <t>The tamper-proof guarantee rests on two mechanisms:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>Package integrity hash:</strong> Any modification to the package or its
embedded manifest invalidates the hash. The governance platform
<strong>MUST</strong> verify this hash before extracting the manifest.</t>
            </li>
            <li>
              <t><strong>Document signature:</strong> The governance platform signs the extracted
manifest before serving it. The signature covers the full document
including the <tt>package_integrity_hash</tt> field, creating a verifiable
chain from the served document back to the registered package.</t>
            </li>
          </ol>
          <t>A manifest document that fails either verification step <strong>MUST</strong> be
rejected, <strong>MUST NOT</strong> be served, and the failure <strong>MUST</strong> be logged.</t>
        </section>
      </section>
      <section anchor="browser-and-human-facing-interaction-model">
        <name>Browser and Human-Facing Interaction Model</name>
        <section anchor="the-separation-of-discovery-and-execution">
          <name>The Separation of Discovery and Execution</name>
          <figure anchor="browser-separation">
            <name>AGTP URI Use by Audience</name>
            <artwork><![CDATA[
agtp:// URI in a browser
  │
  └─→ Returns Agent Manifest Document
        Human-readable view of identity and status
        Read-only. No execution. No code exposed.

agtp:// session initiated by an agent or AGTP client
  │
  └─→ Establishes authenticated AGTP session
        Method invocations (QUERY, BOOK, ESCALATE, etc.)
        Full protocol operation - not visible to browsers
]]></artwork>
          </figure>
          <t>The analogy to existing protocol conventions is direct. A <tt>mailto:</tt>
URI surfaces an address and hands off to a mail client; SMTP carries
the actual messages. Similarly, an <tt>agtp://</tt> URI surfaces identity
and status; AGTP carries agent traffic. Browsers do not become AGTP
clients by following an <tt>agtp://</tt> link.</t>
        </section>
        <section anchor="browser-behavior-for-agtp-uris">
          <name>Browser Behavior for agtp:// URIs</name>
          <t>Browsers that encounter an <tt>agtp://</tt> URI <strong>SHOULD</strong> behave as follows:</t>
          <ol spacing="normal" type="1"><li>
              <t>If a registered AGTP client is present (OS protocol handler), hand
off the URI to that client.</t>
            </li>
            <li>
              <t>If the browser supports <tt>agtp://</tt> natively or via extension, render
the returned Agent Manifest Document as a structured human-readable
page. The rendered view <strong>MUST</strong> surface the trust tier indicator
prominently, following the visual convention established for TLS
trust in the browser chrome.</t>
            </li>
            <li>
              <t>If neither condition applies, the browser <strong>MAY</strong> fall back to a
gateway that translates between <tt>https://</tt> and <tt>agtp://</tt>. The
gateway <strong>MUST</strong> preserve all signature and trust tier fields.</t>
            </li>
          </ol>
        </section>
        <section anchor="human-readable-manifest-view">
          <name>Human-Readable Manifest View</name>
          <t>When an Agent Manifest Document is rendered for human consumption,
the following fields <strong>MUST</strong> be prominently displayed:</t>
          <ul spacing="normal">
            <li>
              <t>Agent label and org domain</t>
            </li>
            <li>
              <t>Trust tier indicator (visual distinction between Tier 1, 2, and 3)</t>
            </li>
            <li>
              <t>Lifecycle state (Active / Suspended / Revoked / Deprecated)</t>
            </li>
            <li>
              <t>Job description</t>
            </li>
            <li>
              <t>Principal organization</t>
            </li>
            <li>
              <t>Activation date</t>
            </li>
            <li>
              <t>Behavioral trust score</t>
            </li>
            <li>
              <t>Authority scope categories (in human-readable form)</t>
            </li>
          </ul>
        </section>
        <section anchor="agtp-status-sub-resource">
          <name>AGTP Status Sub-Resource</name>
          <t>Implementations <strong>SHOULD</strong> support a <tt>status</tt> sub-path:</t>
          <artwork><![CDATA[
agtp://acme.tld/agents/customer-service/status
]]></artwork>
          <figure>
            <name>AGTP Status Sub-Resource Response</name>
            <sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-status",
  "canonical_id": "3a9f2c1d8b7e4a6f...",
  "agent_label": "customer-service",
  "org_domain": "acme.tld",
  "lifecycle_state": "Active",
  "cert_status": "Active",
  "last_action_method": "QUERY",
  "last_action_timestamp": "2026-03-20T13:58:22Z",
  "active_session_count": 3,
  "pending_escalations": 0,
  "generated_at": "2026-03-20T14:00:00Z"
}
]]></sourcecode>
          </figure>
          <t>The <tt>active_session_count</tt> field <strong>SHOULD</strong> only be included if the
requester has appropriate observability permissions for the governance
zone.</t>
        </section>
      </section>
      <section anchor="web3-interaction-considerations">
        <name>Web3 Interaction Considerations</name>
        <section anchor="the-agent-tld-collision">
          <name>The .agent TLD Collision</name>
          <t>The string <tt>.agent</tt> is claimed as a Web3 top-level domain by at least
one blockchain-based naming system. This creates an ambiguity risk:
a URI of the form <tt>agtp://customer-service.agent</tt> could be interpreted
as either an AGTP agent namespace or a Web3 name resolution request.
This specification explicitly prohibits <tt>.agent</tt> and <tt>.nomo</tt> from
appearing in the hostname position of <tt>agtp://</tt> URIs (see Section 5.1).</t>
        </section>
        <section anchor="web3-trust-anchors">
          <name>Web3 Trust Anchors</name>
          <t>AGTP's default trust model is PKI-based: X.509 certificates, DNS
ownership verification, and CA-anchored identity. Web3 naming systems
provide an alternative identity model based on blockchain address
ownership. A full Web3 interoperability specification is out of scope
for this document. The following framework <strong>MAY</strong> be used by
implementations wishing to bridge Web3 and AGTP identity.</t>
          <t>The <tt>resolution_layer</tt> field in the Agent Manifest Document declares
the identity anchoring mechanism used for the agent's registration:</t>
          <table>
            <name>resolution_layer Field Values</name>
            <thead>
              <tr>
                <th align="left">Value</th>
                <th align="left">Meaning</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>dns</tt></td>
                <td align="left">Standard DNS ownership verification (default)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>pki</tt></td>
                <td align="left">PKI certificate chain without DNS challenge</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>web3-ens</tt></td>
                <td align="left">Ethereum Name Service</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>web3-unstoppable</tt></td>
                <td align="left">Unstoppable Domains</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>agtp-registry</tt></td>
                <td align="left">Direct registration with AGTP governance platform</td>
              </tr>
            </tbody>
          </table>
          <t>Implementations that encounter a <tt>resolution_layer</tt> value of
<tt>web3-ens</tt> or <tt>web3-unstoppable</tt> <strong>MUST</strong> treat the agent as Trust
Tier 2 (Org-Asserted) unless a formal AGTP-Web3 Bridge specification
has been published and implemented. Full Web3 interoperability is
addressed in a future companion document <xref target="AGTP-WEB3"/>.</t>
        </section>
      </section>
      <section anchor="agent-registration-process">
        <name>Agent Registration Process</name>
        <section anchor="overview">
          <name>Overview</name>
          <t>An agent cannot participate in AGTP until it has been issued an Agent
Birth Certificate by a governance platform and assigned a canonical
Agent-ID derived from that certificate. Canonical Agent-IDs are issued
through the ACTIVATE transaction; they are never self-declared.</t>
          <t>The Birth Certificate is the genesis record of an agent's legal
existence within the AGTP ecosystem. Its relationship to the canonical
Agent-ID is analogous to the relationship between a government-issued
birth registration and a social security number: the birth event
produces a permanent, authoritative identity record, and a durable
identifier is derived from it. The identifier follows the agent for
its entire lifecycle, including after revocation. It is never reissued
to another agent.</t>
          <t>Any AGTP infrastructure component <strong>MUST</strong> reject requests carrying
an Agent-ID that does not resolve to a Birth Certificate record in
an Active lifecycle state in a reachable registry.</t>
        </section>
        <section anchor="birth-certificate-contents">
          <name>Birth Certificate Contents</name>
          <t>The Agent Birth Certificate is issued by the governance platform at
ACTIVATE time and contains the following fields:</t>
          <table>
            <name>Agent Birth Certificate Fields</name>
            <thead>
              <tr>
                <th align="left">Field</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>agent_id</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Unique identifier for the agent</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>owner</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Human or team responsible for this agent</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>archetype</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Behavioral category (see archetypes below)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>governance_zone</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Environment context (development, staging, production)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>scope</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Authorized action types</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>issued_at</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Timestamp of issuance</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>certificate_hash</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Cryptographic fingerprint - basis for canonical Agent-ID</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>signature</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Signed with the org's governance key</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>package_ref</tt></td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Reference to the <tt>.agent</tt> or <tt>.nomo</tt> package</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>trust_tier</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Registration tier (1, 2, or 3)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>org_domain</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The verified or asserted org domain</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="agent-archetypes">
          <name>Agent Archetypes</name>
          <t>The <tt>archetype</tt> field classifies the agent's behavioral category.
Archetypes inform scope enforcement and observability tooling; an
<tt>executor</tt> archetype agent exhibiting read-only query patterns, or a
<tt>monitor</tt> archetype agent attempting booking operations, are anomaly
signals. The archetype field does not restrict scope enforcement, 
Authority-Scope headers govern actual permissions at the protocol
level. Archetypes are a classification and observability signal,
not a security boundary.</t>
          <table>
            <name>Agent Archetypes</name>
            <thead>
              <tr>
                <th align="left">Archetype</th>
                <th align="left">Description</th>
                <th align="left">Typical Scope</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>assistant</tt></td>
                <td align="left">Conversational agent, read-heavy</td>
                <td align="left">
                  <tt>documents:query</tt>, <tt>knowledge:query</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>analyst</tt></td>
                <td align="left">Data analysis, read and aggregate</td>
                <td align="left">
                  <tt>data:read</tt>, <tt>data:aggregate</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>executor</tt></td>
                <td align="left">Takes real-world actions, write-heavy</td>
                <td align="left">
                  <tt>booking:*</tt>, <tt>payments:confirm</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>orchestrator</tt></td>
                <td align="left">Manages other agents</td>
                <td align="left">
                  <tt>delegation:*</tt>, <tt>agents:*</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>monitor</tt></td>
                <td align="left">Observational only</td>
                <td align="left">
                  <tt>telemetry:read</tt>, <tt>logs:read</tt></td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="birth-certificate-to-agtp-header-mapping">
          <name>Birth Certificate to AGTP Header Mapping</name>
          <t>Birth Certificate fields map directly to AGTP protocol headers on
every request. This mapping is the mechanism by which static identity
(the Birth Certificate) becomes runtime identity (the protocol session):</t>
          <table>
            <name>Birth Certificate to AGTP Header Mapping</name>
            <thead>
              <tr>
                <th align="left">Birth Certificate Field</th>
                <th align="left">AGTP Protocol Header</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>agent_id</tt></td>
                <td align="left">
                  <tt>Agent-ID</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>owner</tt></td>
                <td align="left">
                  <tt>Principal-ID</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>scope</tt></td>
                <td align="left">
                  <tt>Authority-Scope</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>certificate_hash</tt></td>
                <td align="left">Basis for canonical Agent-ID</td>
              </tr>
            </tbody>
          </table>
          <t>The canonical Agent-ID is derived from the <tt>certificate_hash</tt>. This
chain, package integrity hash → certificate hash → canonical Agent-ID, 
ensures that the identifier carried in the <tt>Agent-ID</tt> header on
every AGTP request is traceable back to the original Birth Certificate
and the human principal who authorized the agent's creation.</t>
        </section>
        <section anchor="registration-tiers">
          <name>Registration Tiers</name>
          <t><strong>Tier 1 Registration (Verified, DNS-anchored):</strong></t>
          <t>Required for agents carrying <tt>Authority-Scope</tt> beyond read-only query
operations, or participating in delegation chains, financial
transactions, or multi-agent collaboration with external organizations.</t>
          <dl>
            <dt>Requirements:</dt>
            <dd>
              <ul spacing="normal">
                <li>
                  <t>Registrant demonstrates DNS control over the claimed <tt>org_domain</tt>
via DNS challenge per <xref target="RFC8555"/></t>
                </li>
                <li>
                  <t>Agent package must be in <tt>.nomo</tt> governed format</t>
                </li>
                <li>
                  <t>Package must include a valid CA-signed certificate chain</t>
                </li>
                <li>
                  <t>Governance platform issues Birth Certificate and canonical
Agent-ID after verifying DNS challenge and validating the
package cert chain</t>
                </li>
              </ul>
            </dd>
          </dl>
          <t><strong>Tier 2 Registration (Org-Asserted):</strong></t>
          <t>For agents operating within a single organization's internal
infrastructure, or where DNS verification is not yet completed.</t>
          <dl>
            <dt>Requirements:</dt>
            <dd>
              <ul spacing="normal">
                <li>
                  <t>Org label is declared but DNS ownership is not verified</t>
                </li>
                <li>
                  <t>Agent package may be <tt>.agent</tt> or <tt>.nomo</tt> format</t>
                </li>
                <li>
                  <t>Governance platform issues Birth Certificate after validating
package integrity hash</t>
                </li>
                <li>
                  <t>Birth Certificate and Manifest <strong>MUST</strong> include <tt>trust_tier: 2</tt>
and <tt>trust_warning: "org-label-unverified"</tt></t>
                </li>
                <li>
                  <t>Authority scope <strong>MUST</strong> be restricted at the SEP layer until
upgraded to Tier 1</t>
                </li>
              </ul>
            </dd>
          </dl>
          <t><strong>Tier 3 Registration (Experimental):</strong></t>
          <t>For development and testing environments only.</t>
          <dl>
            <dt>Requirements:</dt>
            <dd>
              <ul spacing="normal">
                <li>
                  <t>Agent label <strong>MUST</strong> carry <tt>X-</tt> prefix</t>
                </li>
                <li>
                  <t>Not published to the public AGTP registry</t>
                </li>
                <li>
                  <t><strong>MUST NOT</strong> be deployed in production environments</t>
                </li>
                <li>
                  <t>Governance platform issues a locally-scoped Birth Certificate</t>
                </li>
              </ul>
            </dd>
          </dl>
        </section>
        <section anchor="registration-lifecycle">
          <name>Registration Lifecycle</name>
          <figure anchor="agent-reg-lifecycle">
            <name>AGTP Agent Registration Lifecycle</name>
            <artwork><![CDATA[
1. PACKAGE
   Author creates .agent or .nomo package containing:
   - Embedded manifest (agent_label, job_description,
     authority_scope_categories, supported_methods,
     behavioral_trust_score)
   - Integrity hash of all package contents
   - For .nomo: CA-signed certificate chain

2. SUBMIT (ACTIVATE transaction)
   Registrant submits ACTIVATE request to governance endpoint:
   - Package file (.agent or .nomo)
   - Proposed agent label and org domain
   - Owner identity (maps to Birth Certificate owner field)
   - Archetype declaration
   - For Tier 1: DNS challenge token

3. VALIDATE (governance platform)
   Governance platform:
   - Verifies package integrity hash
   - For .nomo: validates certificate chain
   - For Tier 1: verifies DNS challenge against
     _agtp.[org_domain] TXT record
   - Checks proposed label for uniqueness within org namespace

4. ISSUE (Birth Certificate and canonical Agent-ID assigned)
   Governance platform:
   - Issues Agent Birth Certificate with all fields populated
   - Derives canonical Agent-ID from certificate_hash
   - Creates registry record with Active lifecycle state
   - Records genesis audit entry in immutable audit log
     (genesis record includes full Birth Certificate)
   - Publishes agent to Namespace Document
     (triggers Namespace Document re-signing)

   The Birth Certificate is delivered to the registrant.
   It is the permanent record of the agent's genesis.
   Loss of the Birth Certificate does not invalidate the agent;
   the certificate_hash remains the authoritative identity anchor.

5. ACTIVE
   Agent enters Active lifecycle state.
   Canonical Agent-ID is valid for AGTP protocol sessions.
   agtp://[org_domain]/agents/[label] resolves to manifest
   derived from the Birth Certificate.

6. LIFECYCLE EVENTS (post-activation)
   SUSPEND:    Agent temporarily inactive. Manifest returns 503.
               Birth Certificate and canonical ID remain valid.
               Initiated by trust violation or human decision.
   REINSTATE:  Human-authorized return to Active state.
               Birth Certificate unchanged. Reinstatement
               recorded in audit trail.
   REVOKE:     Agent permanently deactivated. Manifest returns 410.
               Birth Certificate archived. Canonical ID retired
               permanently and never reissued.
   DEPRECATE:  Controlled end-of-life. Manifest returns 410 with
               successor_agent field if applicable. Birth
               Certificate retained per Section 8.5 retention policy.
]]></artwork>
          </figure>
        </section>
        <section anchor="governance-tokens-and-runtime-authorization">
          <name>Governance Tokens and Runtime Authorization</name>
          <t>Following successful registration, the agent's Birth Certificate is
the static identity anchor. Runtime authorization for specific actions
is carried by Governance Tokens: signed, time-limited JWT artifacts
issued by the governance platform encoding a specific governance
verdict (ALLOW, DENY) for a specific action.</t>
          <t>Governance Tokens <strong>MUST NOT</strong> be reused. Each action requires a
fresh evaluation and a fresh token. Default TTL is 30 seconds. The
token's <tt>agent_id</tt> field <strong>MUST</strong> match the canonical Agent-ID from
the Birth Certificate. Tokens that fail this validation <strong>MUST</strong> be
rejected and the failure <strong>MUST</strong> be logged.</t>
          <t>The relationship between Birth Certificate and Governance Token
parallels the relationship between a passport and a visa: the passport
establishes persistent identity; the visa encodes a specific
time-bounded permission. Holding a passport does not imply holding
any particular visa.</t>
        </section>
        <section anchor="friendly-name-availability-and-re-registration">
          <name>Friendly Name Availability and Re-Registration</name>
          <t>An agent label becomes available for re-registration 90 days after
its associated agent enters Revoked or Deprecated lifecycle state.
The canonical Agent-ID and Birth Certificate are permanently archived.
The canonical Agent-ID <strong>MUST NOT</strong> be reissued under any
circumstances, including re-registration of the same label by the same
organization. This policy prevents ID reuse attacks in which a newly
registered agent inherits the trust history of a revoked predecessor.</t>
        </section>
      </section>
    </section>
    <section anchor="method-definitions">
      <name>Method Definitions</name>
      <section anchor="design-philosophy">
        <name>Design Philosophy</name>
        <t>AGTP methods are intent verbs, not resource operations. Each method
expresses what an agent is trying to accomplish. Method names are
uppercase ASCII strings. Methods that modify state are NOT idempotent
by default unless explicitly marked. All methods accept a context
parameter carrying agent session state. Requirement language follows
<xref target="RFC2119"/>.</t>
      </section>
      <section anchor="core-methods">
        <name>Core Methods</name>
        <section anchor="query">
          <name>QUERY</name>
          <t>Purpose: Semantic data retrieval. The agent specifies what it needs to
know, not where to find it. Distinguished from HTTP GET by expressing an
information need rather than retrieving a known resource at a known
location.</t>
          <table>
            <name>QUERY Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">intent</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Natural language or structured expression of the information need</td>
              </tr>
              <tr>
                <td align="left">scope</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Data domains or sources to include or exclude</td>
              </tr>
              <tr>
                <td align="left">format</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Desired response format: structured, natural, raw</td>
              </tr>
              <tr>
                <td align="left">confidence_threshold</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Minimum confidence score for included results (0.0-1.0)</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Session context for disambiguation</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Result set with confidence scores per item. Server <strong>SHOULD</strong>
indicate provenance of each result. Idempotent: Yes.</t>
        </section>
        <section anchor="summarize">
          <name>SUMMARIZE</name>
          <t>Purpose: Request a concise synthesis of provided content or a referenced
resource. The agent is requesting a cognitive operation on data, not
retrieving data.</t>
          <table>
            <name>SUMMARIZE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">source</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Content inline (up to implementation limit) or URI reference</td>
              </tr>
              <tr>
                <td align="left">length</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Target summary length: brief, standard, detailed</td>
              </tr>
              <tr>
                <td align="left">focus</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Aspect to emphasize in the summary</td>
              </tr>
              <tr>
                <td align="left">format</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Output format: bullets, prose, structured</td>
              </tr>
              <tr>
                <td align="left">audience</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Intended reader context, for calibrating complexity</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Summary content with a source_hash and a confidence score.
Idempotent: Yes.</t>
        </section>
        <section anchor="book">
          <name>BOOK</name>
          <t>Purpose: Reserve a resource, time slot, seat, or allocation on behalf of
the agent's principal. State-modifying. Notable error codes: 409 Conflict
(resource unavailable), 451 Scope Violation (principal not authorized for
this resource type).</t>
          <table>
            <name>BOOK Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">resource_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Identifier of the resource to reserve</td>
              </tr>
              <tr>
                <td align="left">principal_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The human or system on whose behalf the booking is made</td>
              </tr>
              <tr>
                <td align="left">time_slot</td>
                <td align="left">
                  <strong>MUST</strong> (if time-based)</td>
                <td align="left">ISO 8601 datetime or range</td>
              </tr>
              <tr>
                <td align="left">quantity</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Number of units to reserve</td>
              </tr>
              <tr>
                <td align="left">options</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Resource-specific booking parameters</td>
              </tr>
              <tr>
                <td align="left">confirm_immediately</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Boolean; if false, creates a hold pending confirmation</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Booking confirmation with booking_id, status (confirmed / held),
and expiry timestamp if a hold. Idempotent: No.</t>
        </section>
        <section anchor="schedule">
          <name>SCHEDULE</name>
          <t>Purpose: Define a sequence of actions, method calls, or events to be
executed at specified times or in response to specified triggers. Creates
a durable plan, not an immediate execution.</t>
          <table>
            <name>SCHEDULE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">steps</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Ordered list of AGTP method calls with parameters</td>
              </tr>
              <tr>
                <td align="left">trigger</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">immediate, datetime, event, or condition</td>
              </tr>
              <tr>
                <td align="left">trigger_value</td>
                <td align="left">
                  <strong>MUST</strong> (if not immediate)</td>
                <td align="left">Datetime, event name, or condition expression</td>
              </tr>
              <tr>
                <td align="left">on_failure</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Behavior on step failure: abort, skip, retry, escalate</td>
              </tr>
              <tr>
                <td align="left">notify</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Notification targets on completion or failure</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Schedule record with schedule_id, confirmed steps, and next
execution timestamp. Idempotent: No.</t>
        </section>
        <section anchor="learn">
          <name>LEARN</name>
          <t>Purpose: Update the agent's session context, knowledge state, or persistent
memory. An explicit context write where the agent asserts that something should
be retained.</t>
          <table>
            <name>LEARN Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">content</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Information to be learned (structured or unstructured)</td>
              </tr>
              <tr>
                <td align="left">scope</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">session (ephemeral), principal (persists for principal), global (shared)</td>
              </tr>
              <tr>
                <td align="left">category</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Semantic category for retrieval optimization</td>
              </tr>
              <tr>
                <td align="left">confidence</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Agent's confidence in the content (0.0-1.0)</td>
              </tr>
              <tr>
                <td align="left">source</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Provenance of the learned content</td>
              </tr>
              <tr>
                <td align="left">ttl</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Expiry for the learned content</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Confirmation with learn_id and effective scope. Idempotent: No.</t>
        </section>
        <section anchor="delegate">
          <name>DELEGATE</name>
          <t>Purpose: Transfer execution of a task or method to a sub-agent or
downstream system. Initiates a new AGTP session on behalf of the delegating
agent, carrying forward authority lineage.</t>
          <table>
            <name>DELEGATE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">target_agent_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Identifier of the agent to delegate to</td>
              </tr>
              <tr>
                <td align="left">task</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">AGTP method call (or sequence) to execute</td>
              </tr>
              <tr>
                <td align="left">authority_scope</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Scope granted to sub-agent <strong>MUST</strong> be a strict subset of delegating agent's scope</td>
              </tr>
              <tr>
                <td align="left">delegation_token</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Signed token proving delegation authority</td>
              </tr>
              <tr>
                <td align="left">callback</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">AGTP endpoint for result delivery</td>
              </tr>
              <tr>
                <td align="left">deadline</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Maximum time for task completion</td>
              </tr>
            </tbody>
          </table>
          <t>Security note: the authority_scope in a DELEGATE request <strong>MUST NOT</strong>
exceed the delegating agent's own Authority-Scope. Servers <strong>MUST</strong> enforce
this and <strong>MUST</strong> return 451 Scope Violation if violated. This is the
protocol-level defense against authority laundering. Idempotent: No.</t>
        </section>
        <section anchor="collaborate">
          <name>COLLABORATE</name>
          <t>Purpose: Initiate a multi-agent coordinated task where two or more agents
work in parallel or in defined roles toward a shared goal. Unlike DELEGATE
(hierarchical), COLLABORATE is peer-to-peer.</t>
          <table>
            <name>COLLABORATE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">collaborators</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">List of Agent-IDs invited to collaborate</td>
              </tr>
              <tr>
                <td align="left">objective</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Shared goal expressed as a task description or structured specification</td>
              </tr>
              <tr>
                <td align="left">role_assignments</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Map of Agent-IDs to roles within the collaboration</td>
              </tr>
              <tr>
                <td align="left">coordination_model</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">parallel, sequential, or consensus</td>
              </tr>
              <tr>
                <td align="left">result_aggregation</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">How results from collaborators are combined</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Collaboration session receipt with collaboration_id. Each
collaborator receives an AGTP NOTIFY to join. Idempotent: No.</t>
        </section>
        <section anchor="confirm">
          <name>CONFIRM</name>
          <t>Purpose: Explicit acknowledgment of a prior action, state, or data item.
Creates a signed attestation record.</t>
          <table>
            <name>CONFIRM Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">target_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">ID of the action, booking, schedule, or item being confirmed</td>
              </tr>
              <tr>
                <td align="left">status</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">accepted, rejected, or deferred</td>
              </tr>
              <tr>
                <td align="left">reason</td>
                <td align="left">
                  <strong>SHOULD</strong> (if rejected/deferred)</td>
                <td align="left">Explanation of the decision</td>
              </tr>
              <tr>
                <td align="left">attestation</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Agent-signed confirmation payload for audit</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Confirmation receipt with timestamp and attestation_id.
Idempotent: Yes.</t>
        </section>
        <section anchor="escalate">
          <name>ESCALATE</name>
          <t>Purpose: Route a task, decision, or exception to a human principal or
higher-authority agent when the current agent cannot or should not proceed.
ESCALATE is the protocol-level expression of meaningful friction in AI
systems as a first-class method.</t>
          <table>
            <name>ESCALATE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">task_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The task or method invocation triggering escalation</td>
              </tr>
              <tr>
                <td align="left">reason</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Structured reason: confidence_threshold, scope_limit, ethical_flag, ambiguous_instruction, resource_unavailable</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Full context needed for the escalation recipient to act</td>
              </tr>
              <tr>
                <td align="left">priority</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">urgent, normal, or low</td>
              </tr>
              <tr>
                <td align="left">recipient</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Specific human or agent to escalate to; if absent, routes to default handler</td>
              </tr>
              <tr>
                <td align="left">deadline</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Time by which a response is needed</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Escalation receipt with escalation_id and routing confirmation.
The escalated task is paused until resolved via CONFIRM. Idempotent: Yes.
An agent that escalates appropriately is functioning correctly. Governance
frameworks built on AGTP can use escalation frequency and reason codes as
observability signals for systemic issues.</t>
        </section>
        <section anchor="notify">
          <name>NOTIFY</name>
          <t>Purpose: Asynchronous push of information from an agent to a recipient.
Does not expect a response. Fire-and-forget. Delivery confirmation (if
required) returned via a subsequent CONFIRM from the recipient.</t>
          <table>
            <name>NOTIFY Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">recipient</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Target Agent-ID, human endpoint, or broadcast group</td>
              </tr>
              <tr>
                <td align="left">content</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Notification payload</td>
              </tr>
              <tr>
                <td align="left">urgency</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">critical, informational, or background</td>
              </tr>
              <tr>
                <td align="left">delivery_guarantee</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">at_most_once, at_least_once, or exactly_once</td>
              </tr>
              <tr>
                <td align="left">expiry</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Timestamp after which the notification should not be delivered</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Delivery receipt with notification_id. Idempotent: No.</t>
        </section>
        <section anchor="describe">
          <name>DESCRIBE</name>
          <t>Purpose: Return the operational capabilities of a known agent endpoint.
The requesting agent specifies what capability dimensions it needs to
evaluate; the server returns a structured Capability Document. Used for
pre-task negotiation before committing to DELEGATE or COLLABORATE. If
<tt>capability_domains</tt> is omitted, the server <strong>SHOULD</strong> return all supported
domains. Category: ACQUIRE.</t>
          <table>
            <name>DESCRIBE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">capability_domains</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Comma-separated domains to return: <tt>methods</tt>, <tt>modalities</tt>, <tt>tools</tt>, <tt>version</tt>, <tt>budget</tt>, <tt>zones</tt>. If omitted, server <strong>SHOULD</strong> return all.</td>
              </tr>
              <tr>
                <td align="left">version_min</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Minimum acceptable version for capability negotiation.</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Session context for capability filtering.</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Capability Document with the following structure:</t>
          <sourcecode type="json"><![CDATA[
{
  "supported_methods": ["QUERY", "SUMMARIZE", "DESCRIBE"],
  "modalities": ["text", "image", "streaming"],
  "tools": ["web_search", "code_execute"],
  "version": "2.0.0",
  "version_min_satisfied": true,
  "behavioral_trust_score": 0.94,
  "budget_units_accepted": ["tokens", "compute-seconds"],
  "zones_accepted": ["zone:internal", "zone:partner"]
}
]]></sourcecode>
          <t>Idempotent: Yes. Primary error codes: 404, 422.</t>
        </section>
        <section anchor="suspend">
          <name>SUSPEND</name>
          <t>Purpose: Pause a specific active session workflow in a recoverable state.
Issues a resumption nonce the requesting agent uses to resume the session.
Method-level SUSPEND is session-scoped and does not affect registry
lifecycle state or Birth Certificate validity. The distinction between
method-level SUSPEND and lifecycle SUSPEND (Section 6.7.6) is
architectural: method-level SUSPEND is a workflow primitive; lifecycle
SUSPEND is an administrative action on the agent's registry record.
Category: ORCHESTRATE.</t>
          <table>
            <name>SUSPEND Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">session_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The session to suspend.</td>
              </tr>
              <tr>
                <td align="left">reason</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Structured reason: <tt>awaiting_input</tt>, <tt>resource_limit</tt>, <tt>scheduled_pause</tt>, <tt>external_dependency</tt>.</td>
              </tr>
              <tr>
                <td align="left">resume_by</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">ISO 8601 deadline for resumption. If exceeded without RESUME, session transitions to expired.</td>
              </tr>
              <tr>
                <td align="left">checkpoint</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Agent-provided state snapshot for resumption context. Stored by server for duration of suspension.</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Suspension receipt with the following structure:</t>
          <sourcecode type="json"><![CDATA[
{
  "suspension_id": "susp-0042",
  "session_id": "sess-a1b2c3d4",
  "resumption_nonce": "[128-bit random value, base64url]",
  "resume_by": "2026-04-15T09:00:00Z",
  "status": "suspended"
}
]]></sourcecode>
          <t>The <tt>resumption_nonce</tt> <strong>MUST</strong> be a cryptographically random 128-bit
value encoded as base64url. It is single-use: once presented to resume
a session, the nonce is invalidated and <strong>MUST NOT</strong> be accepted again.
Idempotent: No. Primary error codes: 404, 408.</t>
          <t>Servers MUST generate nonces with at least 128 bits of entropy using 
a CSPRNG.</t>
        </section>
      </section>
      <section anchor="method-summary-table">
        <name>Method Summary Table</name>
        <table>
          <name>AGTP Core Method Summary</name>
          <thead>
            <tr>
              <th align="left">Method</th>
              <th align="left">Intent</th>
              <th align="left">State-Modifying</th>
              <th align="left">Idempotent</th>
              <th align="left">Primary Error Codes</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">QUERY</td>
              <td align="left">Retrieve information</td>
              <td align="left">No</td>
              <td align="left">Yes</td>
              <td align="left">404, 422</td>
            </tr>
            <tr>
              <td align="left">SUMMARIZE</td>
              <td align="left">Synthesize content</td>
              <td align="left">No</td>
              <td align="left">Yes</td>
              <td align="left">400, 422</td>
            </tr>
            <tr>
              <td align="left">BOOK</td>
              <td align="left">Reserve a resource</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">409, 451</td>
            </tr>
            <tr>
              <td align="left">SCHEDULE</td>
              <td align="left">Plan future actions</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">400, 409</td>
            </tr>
            <tr>
              <td align="left">LEARN</td>
              <td align="left">Update agent context</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">400, 403</td>
            </tr>
            <tr>
              <td align="left">DELEGATE</td>
              <td align="left">Transfer task to sub-agent</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">403, 451, 551</td>
            </tr>
            <tr>
              <td align="left">COLLABORATE</td>
              <td align="left">Coordinate peer agents</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">404, 403</td>
            </tr>
            <tr>
              <td align="left">CONFIRM</td>
              <td align="left">Attest to a prior action</td>
              <td align="left">Yes</td>
              <td align="left">Yes</td>
              <td align="left">404, 400</td>
            </tr>
            <tr>
              <td align="left">ESCALATE</td>
              <td align="left">Defer to human/authority</td>
              <td align="left">Yes</td>
              <td align="left">Yes</td>
              <td align="left">404</td>
            </tr>
            <tr>
              <td align="left">NOTIFY</td>
              <td align="left">Push information</td>
              <td align="left">No</td>
              <td align="left">No</td>
              <td align="left">400, 404</td>
            </tr>
            <tr>
              <td align="left">DESCRIBE</td>
              <td align="left">Retrieve endpoint capabilities</td>
              <td align="left">No</td>
              <td align="left">Yes</td>
              <td align="left">404, 422</td>
            </tr>
            <tr>
              <td align="left">SUSPEND</td>
              <td align="left">Pause session workflow</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">404, 408</td>
            </tr>
            <tr>
              <td align="left">PROPOSE</td>
              <td align="left">Submit a dynamic endpoint proposal</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">400, 403, 460</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="method-registry-and-extensibility">
        <name>Method Registry and Extensibility</name>
        <t>AGTP defines a formal Method Registry maintained by IANA (see Section 8.2).
Any party may submit a new method for registration. The registration
procedure is Expert Review, and registration <strong>MUST</strong> be accompanied by a
published specification, at minimum an IETF Internet-Draft or equivalent
publicly available document. Registered methods <strong>MUST</strong>:</t>
        <ol spacing="normal" type="1"><li>
            <t>Have a unique uppercase ASCII name</t>
          </li>
          <li>
            <t>Define required and optional parameters</t>
          </li>
          <li>
            <t>Define expected response structure</t>
          </li>
          <li>
            <t>Specify idempotency behavior</t>
          </li>
          <li>
            <t>Specify applicable error codes</t>
          </li>
          <li>
            <t>Include a security considerations section</t>
          </li>
          <li>
            <t>Be accompanied by a published reference specification (Internet-Draft or RFC)</t>
          </li>
          <li>
            <t>Conform to the AGIS Grammar Specification <xref target="AGIS"/>, demonstrating
membership in the action-intent semantic class as defined therein.
Submissions that do not satisfy AGIS syntactic and semantic class
requirements <strong>MUST</strong> be rejected by the Designated Expert.</t>
          </li>
        </ol>
        <t>Experimental methods <strong>MAY</strong> be used prior to registration using the X-
prefix convention (e.g., X-NEGOTIATE). Experimental methods <strong>MUST NOT</strong>
be used in production deployments without registration. Experimental
methods <strong>MUST</strong> also conform to AGIS grammar rules; non-conformant
experimental methods <strong>MUST NOT</strong> be forwarded by AGTP-aware
infrastructure components.</t>
        <section anchor="grammar-based-method-validation-method-grammar-header">
          <name>Grammar-Based Method Validation (Method-Grammar Header)</name>
          <t>In addition to the IANA registry pathway, AGTP version 03 introduces a
grammar-based method validation pathway. When an AGTP request carries the
<tt>Method-Grammar</tt> header, the receiving infrastructure validates the method
identifier against the declared grammar specification rather than checking
the IANA registry exclusively.</t>
          <artwork><![CDATA[
Method-Grammar: AGIS/1.0
]]></artwork>
          <t><strong>Behavior when Method-Grammar: AGIS/1.0 is present:</strong></t>
          <ol spacing="normal" type="1"><li>
              <t>The AGTP infrastructure layer validates the method identifier against
the AGIS Grammar Specification <xref target="AGIS"/>.</t>
            </li>
            <li>
              <t>If the method identifier is AGIS-conformant (imperative base-form verb,
action-intent semantic class, not an HTTP method or state descriptor),
the request proceeds regardless of whether the method appears in the
IANA registry.</t>
            </li>
            <li>
              <t>If the method identifier fails AGIS validation, the infrastructure
<strong>MUST</strong> return status 454 (Grammar Violation) and <strong>MUST NOT</strong> forward
the request.</t>
            </li>
            <li>
              <t>AGIS-conformant custom methods carry the same transport-level identity,
authority scope, and governance semantics as registered methods.</t>
            </li>
          </ol>
          <t>This pathway enables organizations to define domain-specific Agentive API
vocabularies -- RESERVE instead of BOOK, LOCATE instead of FIND, ADMIT
and TRIAGE for healthcare contexts -- without requiring IANA registration
while maintaining full AGTP transport governance. The IANA registry
continues to serve as the reference vocabulary for maximum cross-system
interoperability; the grammar pathway enables domain specificity within
those constraints.</t>
          <t><strong>Status code 454 Grammar Violation:</strong>
Returned when a method identifier is present with <tt>Method-Grammar: AGIS/1.0</tt>
but fails AGIS grammar validation. The response body <strong>MUST</strong> include the
specific validation failure from the AGIS eight-pass validator. This status
code is registered in the AGTP Status Code Registry (see Section 8.3).</t>
          <t>Capability negotiation occurs during session establishment. The server
returns a Supported-Methods header listing the methods it implements.
Clients <strong>SHOULD</strong> check this list before invoking non-core methods.</t>
          <t>The <tt>Negotiation-ID</tt> header is used to correlate turns within a dynamic
endpoint negotiation sequence (see Section 6.5). It <strong>MUST</strong> be a
UUID generated by the service upon receiving a PROPOSE request and
<strong>MUST</strong> be echoed in all subsequent turns of the same negotiation.
Maximum three turns before the agent <strong>MUST</strong> ESCALATE.</t>
          <artwork><![CDATA[
Negotiation-ID: 550e8400-e29b-41d4-a716-446655440000
]]></artwork>
          <t>QUOTE is defined as a Tier 2 Standard Extended Method in <xref target="AGTP-METHODS"/>.
QUOTE provides pre-flight cost estimation for a proposed method invocation:
the requesting agent submits a proposed method call; the server returns a
<tt>Cost-Estimate</tt> response without executing the method. Servers supporting
budget negotiation via the <tt>Budget-Limit</tt> header <strong>SHOULD</strong> implement QUOTE
to enable agents to validate cost before committing to execution. Servers
that implement QUOTE <strong>MUST</strong> list it in the <tt>Supported-Methods</tt> response
header at session establishment.</t>
        </section>
      </section>
      <section anchor="dynamic-endpoint-negotiation">
        <name>Dynamic Endpoint Negotiation</name>
        <section anchor="overview-1">
          <name>Overview</name>
          <t>AGTP version 03 introduces a dynamic endpoint negotiation protocol
enabling agents to discover data availability and instantiate endpoints
on demand, without requiring pre-built API definitions. This protocol
realizes the agentic API vision in which organizations expose data
availability rather than pre-designed endpoints, and agents construct
the interface they need at runtime.</t>
          <t>The negotiation protocol operates at the transport layer. AGIS <xref target="AGIS"/>
provides the grammar for proposal and acceptance documents. The agent's
identity and authority credentials (via the AGTP-CERT extension
<xref target="AGTP-CERT"/> where deployed) govern authorization decisions.</t>
        </section>
        <section anchor="protocol-flow">
          <name>Protocol Flow</name>
          <artwork><![CDATA[
Step 1:  Pre-auth discovery
         Agent issues unauthenticated GET to agtp://service.example.com
         Service returns AGIS document + data_manifest block
         No credentials required at this step

Step 2:  Agent evaluates data_manifest
         Agent determines the service has relevant data
         Agent assesses whether `negotiable: true` is declared
         Agent constructs an AGIS-formatted endpoint proposal

Step 3:  PROPOSE request
         Agent sends PROPOSE with AGIS endpoint definition in body
         Request MAY be unauthenticated if data sensitivity is low
         Request MUST include Method-Grammar: AGIS/1.0 header

Step 4a: Authorization required (262)
         Service returns 262 with required authorization mechanism
         Agent establishes credentials via specified mechanism
         Agent resubmits PROPOSE with credentials
         Negotiation-ID issued by service in 262 response

Step 4b: Negotiation in progress (261)
         Service evaluates proposal asynchronously
         Service returns 261 with Negotiation-ID
         Agent polls or awaits outcome

Step 5a: Endpoint instantiated (263)
         Service returns 263 with complete AGIS endpoint definition
         Negotiation-ID matches original proposal
         Instantiated endpoint is session-scoped by default
         Agent MAY call the endpoint immediately

Step 5b: Proposal rejected (460)
         Service returns 460 with rejection reason
         Response SHOULD reference data_manifest alternatives
         Agent MAY modify proposal and retry (maximum 3 turns)
         After 3 rejections agent MUST ESCALATE
]]></artwork>
        </section>
        <section anchor="propose-method">
          <name>PROPOSE Method</name>
          <t>PROPOSE is a Tier 1 AGTP method. The requesting agent submits an
AGIS-formatted endpoint definition describing the interface it needs.
The service evaluates whether it can fulfill the proposal against its
data manifest and authorization policy.</t>
          <t>Parameters:</t>
          <table>
            <name>PROPOSE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">proposal</td>
                <td align="left">Yes</td>
                <td align="left">Complete AGIS endpoint definition (method + path + semantic block + input schema + output schema)</td>
              </tr>
              <tr>
                <td align="left">session_id</td>
                <td align="left">Yes</td>
                <td align="left">The active AGTP session identifier</td>
              </tr>
              <tr>
                <td align="left">data_class</td>
                <td align="left">Yes</td>
                <td align="left">The data_manifest class the proposal targets</td>
              </tr>
              <tr>
                <td align="left">scope_requested</td>
                <td align="left">Recommended</td>
                <td align="left">The authority scope the agent requests for this endpoint</td>
              </tr>
              <tr>
                <td align="left">persistence</td>
                <td align="left">Optional</td>
                <td align="left">session (default) or persistent; persistent requires elevated authorization</td>
              </tr>
            </tbody>
          </table>
          <t>Response on 263 Endpoint Instantiated:</t>
          <sourcecode type="json"><![CDATA[
{
  "negotiation_id": "550e8400-e29b-41d4-a716-446655440000",
  "instantiated_endpoint": {
    "method": "LOCATE",
    "path": "/customer/{id}/location",
    "semantic": {
      "intent": "Returns the last known location for a customer",
      "actor": "agent",
      "outcome": "Location coordinates and address are returned",
      "capability": "retrieval",
      "confidence_guidance": 0.70,
      "impact_tier": "informational",
      "is_idempotent": true
    },
    "input": { "required": ["id"] },
    "output": { "coordinates": "object", "address": "string" },
    "errors": ["customer_not_found", "location_not_available"],
    "proposed": true,
    "scope_required": "location:read",
    "expires": "session"
  }
}
]]></sourcecode>
          <t>The <tt>proposed: true</tt> flag marks this as a dynamically instantiated
endpoint per the AGIS specification <xref target="AGIS"/>.</t>
        </section>
        <section anchor="credential-free-negotiation">
          <name>Credential-Free Negotiation</name>
          <t>For data classes declared with <tt>sensitivity: informational</tt> and
<tt>requires_authorization: false</tt> in the data manifest, services MAY
complete the full negotiation flow without requiring credentials.
The agent arrives, proposes, and receives an instantiated endpoint
without API keys.</t>
          <t>For sensitive data classes, services MUST require credential
establishment at Step 4a. The negotiation protocol is the mechanism
by which credentials are established, not a prerequisite. This
distinction is fundamental: the agent does not need credentials to
begin a negotiation; it needs credentials to complete one for
sensitive data.</t>
          <t>AGTP-CERT <xref target="AGTP-CERT"/> provides the cryptographic identity binding
that enables services to make fine-grained authorization decisions
during negotiation based on the agent's verified identity, principal,
and authority scope.</t>
        </section>
        <section anchor="session-scope-and-persistence">
          <name>Session Scope and Persistence</name>
          <t>Instantiated endpoints are session-scoped by default. They cease to
exist when the AGTP session terminates. Services MAY offer persistent
instantiation (the endpoint survives session termination and is added
to the service's AGIS document) subject to elevated authorization.</t>
          <t>Persistent instantiation SHOULD be treated as a modification to the
service's published AGIS document. Services supporting persistent
instantiation MUST increment their AGIS-Version header on the next
discovery request following persistence.</t>
        </section>
      </section>
      <section anchor="extended-method-vocabulary-and-industry-profiles">
        <name>Extended Method Vocabulary and Industry Profiles</name>
        <section anchor="three-tier-method-architecture">
          <name>Three-Tier Method Architecture</name>
          <t>The AGTP method vocabulary is organized into three tiers reflecting
different levels of universality, specificity, and domain relevance. All
methods at all tiers <strong>MUST</strong> conform to the AGIS Grammar Specification
<xref target="AGIS"/>. The AGIS action-intent semantic class constraint applies to
every method in the IANA registry and to every AGIS-validated custom
method accepted via the Method-Grammar header pathway.</t>
          <dl>
            <dt>Tier 1. Core Methods (defined in Section 6.2):</dt>
            <dd>
              <t>The baseline vocabulary required for AGTP compliance. Every conformant
AGTP implementation <strong>MUST</strong> support all Tier 1 methods. All Tier 1
methods are AGIS-conformant; they are defined instances of the
action-intent semantic class standardized in <xref target="AGIS"/>.</t>
            </dd>
            <dt>Tier 2. Standard Extended Methods:</dt>
            <dd>
              <t>Registered in the IANA AGTP Method Registry and available for use in any
AGTP implementation. Not required for baseline compliance but <strong>SHOULD</strong>
be implemented where their semantics apply. Defined in <xref target="AGTP-METHODS"/>.
All Tier 2 methods satisfy AGIS grammar requirements.</t>
            </dd>
            <dt>Tier 3. Industry Profile Methods:</dt>
            <dd>
              <t>Domain-specific method sets defined and registered by industry
communities as named AGTP profiles. Valid within deployments that declare
support for the relevant profile. Not required in general-purpose
implementations. All Tier 3 profile method submissions <strong>MUST</strong> include
AGIS conformance verification as part of their specification.</t>
            </dd>
            <dt>Tier 4. AGIS-Validated Custom Methods:</dt>
            <dd>
              <t>Organization-defined methods that are not registered in the IANA AGTP
Method Registry but conform to the AGIS Grammar Specification and are
accepted at the transport layer via the <tt>Method-Grammar: AGIS/1.0</tt>
header. Valid within the deploying organization's AGTP services. The
action-intent semantic class constraint applies identically. Agents
discover and interpret these methods through natural language inference
against AGIS semantic declarations, as validated empirically in
<xref target="HOOD2026"/>.</t>
            </dd>
          </dl>
        </section>
        <section anchor="method-category-taxonomy">
          <name>Method Category Taxonomy</name>
          <t>All AGTP methods are organized into five categories:</t>
          <dl>
            <dt>ACQUIRE:</dt>
            <dd>
              <t>Retrieve data, resources, or state without modifying it. Typically
idempotent; no state modification.</t>
            </dd>
            <dt>COMPUTE:</dt>
            <dd>
              <t>Process, transform, or analyze information and produce a derived result.
Typically idempotent given the same input.</t>
            </dd>
            <dt>TRANSACT:</dt>
            <dd>
              <t>Perform state-changing operations with external systems, resources, or
records. Not idempotent by default; subject to reversibility
classification.</t>
            </dd>
            <dt>COMMUNICATE:</dt>
            <dd>
              <t>Send information, notifications, or signals to recipients. Fire-and-
forget or confirm-receipt delivery models.</t>
            </dd>
            <dt>ORCHESTRATE:</dt>
            <dd>
              <t>Coordinate, sequence, or manage multiple agents, tasks, or workflows.
May spawn sub-agents or sessions; delegation chain semantics apply.</t>
            </dd>
          </dl>
          <table>
            <name>Core Method Category Mapping</name>
            <thead>
              <tr>
                <th align="left">Core Method</th>
                <th align="left">Category</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">QUERY</td>
                <td align="left">Acquire</td>
              </tr>
              <tr>
                <td align="left">SUMMARIZE</td>
                <td align="left">Compute</td>
              </tr>
              <tr>
                <td align="left">BOOK</td>
                <td align="left">Transact</td>
              </tr>
              <tr>
                <td align="left">SCHEDULE</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">LEARN</td>
                <td align="left">Compute</td>
              </tr>
              <tr>
                <td align="left">DELEGATE</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">COLLABORATE</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">CONFIRM</td>
                <td align="left">Transact</td>
              </tr>
              <tr>
                <td align="left">ESCALATE</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">NOTIFY</td>
                <td align="left">Communicate</td>
              </tr>
              <tr>
                <td align="left">DESCRIBE</td>
                <td align="left">Acquire</td>
              </tr>
              <tr>
                <td align="left">SUSPEND</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">PROPOSE</td>
                <td align="left">Orchestrate</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="standard-extended-methods-tier-2">
          <name>Standard Extended Methods (Tier 2)</name>
          <t>The following methods constitute the initial Tier 2 registration set,
defined in <xref target="AGTP-METHODS"/>. Listed here by category with brief semantic
definitions; full parameter specifications are in the companion document.</t>
          <t>ACQUIRE category: FETCH, SEARCH, SCAN, PULL, IMPORT, FIND.</t>
          <t>COMPUTE category: EXTRACT, FILTER, VALIDATE, TRANSFORM, TRANSLATE,
NORMALIZE, PREDICT, RANK, MAP.</t>
          <t>TRANSACT category: REGISTER, SUBMIT, TRANSFER, PURCHASE, SIGN, MERGE,
LINK, LOG, SYNC, PUBLISH.</t>
          <t>COMMUNICATE category: REPLY, SEND, REPORT.</t>
          <t>ORCHESTRATE category: MONITOR, ROUTE, RETRY, PAUSE, RESUME, RUN, CHECK.</t>
          <t>Notable constraints: PURCHASE <strong>MUST</strong> carry explicit principal_id and
scope enforcement; 451 Scope Violation applies if payments:purchase is
not in the agent's Authority-Scope. RUN requires explicit procedure_id
parameter; implementations <strong>MUST NOT</strong> accept free-form execution strings.</t>
        </section>
        <section anchor="short-form-and-industry-inspired-methods">
          <name>Short-Form and Industry-Inspired Methods</name>
          <t>A set of short-form verb methods, e.g., SET, TAKE, OPEN, START, CALL, MAKE,
TURN, BREAK, are provisionally catalogued as candidates for Tier 2
registration. These verbs are highly context-dependent and their semantics
vary significantly across deployment domains.</t>
          <t>Short-form methods will be registered individually only when a published
companion specification provides unambiguous semantic definitions
demonstrably distinct from existing registered methods. Provisional
registrations using the X- prefix (e.g., X-SET, X-CALL) are encouraged
during the experimentation period.</t>
        </section>
        <section anchor="industry-profile-method-sets">
          <name>Industry Profile Method Sets</name>
          <t>AGTP recognizes that specific industries require method vocabularies
reflecting domain-specific operations that would be inappropriate in a
general-purpose standard. Industry profile method sets are defined and
registered as named AGTP profiles. A profile is a published companion
specification that:</t>
          <ol spacing="normal" type="1"><li>
              <t>Declares a profile name (e.g., agtp-profile-healthcare,
agtp-profile-financial, agtp-profile-legaltech)</t>
            </li>
            <li>
              <t>Defines one or more industry-specific methods with full parameter
specifications, error codes, and security considerations</t>
            </li>
            <li>
              <t>Specifies which Tier 1 and Tier 2 methods are REQUIRED, RECOMMENDED,
or NOT APPLICABLE within the profile</t>
            </li>
            <li>
              <t>Addresses regulatory or compliance considerations specific to the
domain (e.g., HIPAA for healthcare, PCI-DSS for financial services)</t>
            </li>
          </ol>
          <t>Illustrative examples of potential industry profile methods (not yet
registered; listed for directional purposes only):</t>
          <t>Healthcare: PRESCRIBE, AUTHORIZE, REFER, DISPENSE, TRIAGE, CONSENT, REDACT</t>
          <t>Financial services: SETTLE, RECONCILE, HEDGE, CLEAR, UNDERWRITE, KYC, AML</t>
          <t>Legal and compliance: ATTEST, NOTARIZE, DISCLOSE, REDLINE, EXECUTE,
PRESERVE</t>
          <t>Infrastructure: PROVISION, DEPROVISION, ROLLBACK, SNAPSHOT, FAILOVER</t>
          <t>Industry communities are encouraged to develop and submit profile
specifications through the IETF process. The IANA AGTP Method Registry will
maintain a profile index alongside the core and standard method registries.</t>
        </section>
        <section anchor="registration-path-for-new-methods">
          <name>Registration Path for New Methods</name>
          <dl>
            <dt>For Tier 2 Standard Methods:</dt>
            <dd>
              <t>Submit an Internet-Draft to the IETF providing full method specification
per Section 6.4. The Designated Expert reviews for semantic uniqueness,
clarity, AGIS grammar conformance <xref target="AGIS"/>, and security considerations.
Submissions that fail AGIS validation <strong>MUST</strong> be returned to the submitter
before review proceeds.</t>
            </dd>
            <dt>For Industry Profile Methods (Tier 3):</dt>
            <dd>
              <t>Submit a profile specification to the IETF (or a recognized domain
standards body with an established AGTP registry liaison) covering all
methods in the profile and profile compliance requirements. The
specification <strong>MUST</strong> include AGIS conformance statements for every
method defined in the profile.</t>
            </dd>
            <dt>For AGIS-Validated Custom Methods (Tier 4):</dt>
            <dd>
              <t>No IANA registration required. The implementing organization defines
its method vocabulary in an AGIS document served at the service's AGTP
address. Methods are validated at the transport layer using the
<tt>Method-Grammar: AGIS/1.0</tt> header. The method vocabulary is declared
in the AGIS vocabulary block and discoverable by agents at runtime.
Organizations adopting Tier 4 methods are encouraged to publish their
AGIS documents at <tt>agtp://[service-address]</tt> to enable cross-system
agent discovery.</t>
            </dd>
            <dt>For Experimental Methods:</dt>
            <dd>
              <t>Use the X- prefix without registration. Implementations <strong>MUST NOT</strong>
deploy experimental methods in production without completing either the
IANA registration process (Tier 2/3) or deploying a conformant AGIS
document (Tier 4). Experimental method names do not reserve the
unprefixed name.</t>
            </dd>
          </dl>
          <t>The AGTP Method Registry is published at:
https://www.iana.org/assignments/agtp-methods/</t>
          <t>The AGIS conformance test suite is maintained at:
https://agtp.io/agis/conformance</t>
        </section>
        <section anchor="real-time-service-adaptation">
          <name>Real-time Service Adaptation</name>
          <t>Services that update their AGIS documents at runtime MUST signal changes
via the <tt>AGIS-Version</tt> response header. This header MUST be present on
all AGTP responses from negotiable services.</t>
          <artwork><![CDATA[
AGIS-Version: 1.2.4
]]></artwork>
          <t>Agent runtimes MUST cache the AGIS-Version value from each service.
When a response carries an AGIS-Version value different from the cached
value, the agent runtime MUST re-fetch and re-validate the AGIS document
before issuing further method calls. This mechanism supports real-time
service adaptation without requiring push notifications.</t>
          <artwork><![CDATA[
Adaptation flow:
  Agent calls BOOK /reservation
  Response includes AGIS-Version: 1.2.5 (was 1.2.4)
  Agent re-fetches agtp://service.example.com
  Service returns updated AGIS document (new endpoint added)
  Agent updates service map
  Agent resumes operation with updated capability knowledge
]]></artwork>
          <t>Services SHOULD increment AGIS-Version when:
  - A new endpoint is added to the AGIS document
  - An existing endpoint's semantic declaration changes
  - A new verb is added to the vocabulary block
  - A new data class is added to the data_manifest</t>
          <t>Services MUST NOT decrement or reuse AGIS-Version values.</t>
        </section>
      </section>
    </section>
    <section anchor="merchant-identity-and-agentic-commerce-binding">
      <name>Merchant Identity and Agentic Commerce Binding</name>
      <section anchor="overview-2">
        <name>Overview</name>
        <t>AGTP specifies agent-side identity through the Agent Birth
Certificate, canonical Agent-ID, Agent Manifest Document, and Trust
Tier model defined in Section 5. PURCHASE invocations carrying
<tt>payments:purchase</tt> in the Authority-Scope header and a Budget-Limit
constraint are fully governed on the sending side. The receiving side
of a PURCHASE -- the merchant counterparty -- does not have an
equivalent protocol-level identity in the base specification.</t>
        <t>Version 04 of AGTP introduces normative integration hooks for the
AGTP Merchant Identity and Agentic Commerce Binding specification
<xref target="AGTP-MERCHANT"/>, which defines the merchant-side identity model.
The integration is hook-based: this document registers the required
headers, status code, and Authority-Scope domains; the detailed
semantics, Merchant Manifest Document schema, Merchant Birth
Certificate structure, and counterparty verification procedure are
specified in the companion.</t>
      </section>
      <section anchor="merchant-identity-headers-summary">
        <name>Merchant Identity Headers (Summary)</name>
        <t>PURCHASE invocations in a fully conformant v04 deployment carry the
following additional headers:</t>
        <ul spacing="normal">
          <li>
            <t><tt>Merchant-ID</tt>: canonical identifier of the intended merchant
counterparty.</t>
          </li>
          <li>
            <t><tt>Merchant-Manifest-Fingerprint</tt>: SHA-256 fingerprint of the
Merchant Manifest Document the requesting agent verified during
pre-flight counterparty verification.</t>
          </li>
          <li>
            <t><tt>Intent-Assertion</tt>: detached JWT carrying principal-authorized
purchase intent, forwardable to payment networks as standalone
evidence.</t>
          </li>
          <li>
            <t><tt>Cart-Digest</tt>: digest of a structured cart returned by a prior
QUOTE invocation, binding this PURCHASE to that cart.</t>
          </li>
        </ul>
        <t>Full field definitions, wire examples, and security requirements are
in <xref target="AGTP-MERCHANT"/>.</t>
      </section>
      <section anchor="counterparty-unverified-summary">
        <name>455 Counterparty Unverified (Summary)</name>
        <t>Receiving servers <strong>MUST</strong> return 455 Counterparty Unverified on
PURCHASE invocations that fail merchant identity verification:
missing <tt>Merchant-ID</tt> or <tt>Merchant-Manifest-Fingerprint</tt> headers,
fingerprint mismatch, Merchant-ID mismatch, or a target merchant in
any lifecycle state other than Active. 455 is a governance signal,
parallel in role to 451 Scope Violation and 453 Zone Violation:
<strong>MUST</strong> be logged; <strong>MUST NOT</strong> be retried without re-running
counterparty verification.</t>
      </section>
      <section anchor="integration-with-purchase-discover-and-attribution-record">
        <name>Integration with PURCHASE, DISCOVER, and Attribution-Record</name>
        <t>Three existing AGTP primitives interact with merchant identity:</t>
        <ul spacing="normal">
          <li>
            <t><strong>PURCHASE</strong>: Counterparty verification runs before PURCHASE is
sent on the wire. A verified PURCHASE produces an Attribution-
Record naming both the agent and the merchant cryptographically.</t>
          </li>
          <li>
            <t><strong>DISCOVER</strong>: The DISCOVER method defined in <xref target="AGTP-DISCOVER"/> is
extended by <xref target="AGTP-MERCHANT"/> to return Merchant Manifest
Documents when the query carries <tt>result_type: "merchant"</tt>, and to
return mixed agent/merchant result sets when <tt>result_type: "any"</tt>.
The existing DISCOVER signature model, ranking model, and
governance-zone enforcement apply unchanged.</t>
          </li>
          <li>
            <t><strong>Attribution-Record</strong>: The Attribution-Record returned on
PURCHASE includes <tt>merchant_id</tt>, <tt>merchant_fingerprint</tt>, and
<tt>intent_assertion_jti</tt> fields when merchant identity binding is
in effect. This produces a dual-party cryptographic record
consumable by downstream audit and dispute-resolution processes
without requiring those processes to speak AGTP.</t>
          </li>
        </ul>
      </section>
      <section anchor="relationship-to-payment-networks">
        <name>Relationship to Payment Networks</name>
        <t>The merchant identity model defined in this document is payment-rail
neutral. It does not define payment credential handling, tokenized
card-on-file representations, authorization messaging to card
networks, or settlement. Payment networks wishing to extend
protection, fraud coverage, or dispute handling to agent-initiated
transactions consume the Intent-Assertion JWT and the Attribution-
Record as verifiable inputs to their own authorization and dispute
flows; no AGTP-layer integration is required on the payment-network
side. The specific mapping between AGTP merchant identity artifacts
and payment-network message formats is expected to be defined
bilaterally between governance platforms and individual networks and
is out of scope for this document.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This section satisfies the mandatory IETF Security Considerations
requirement. All AGTP implementations <strong>MUST</strong> address the considerations
described here.</t>
      <section anchor="mandatory-tls">
        <name>Mandatory TLS</name>
        <t>All AGTP connections <strong>MUST</strong> use TLS 1.3 or higher. Implementations
<strong>MUST</strong> reject connections using TLS 1.2 or below. Certificate validation
follows standard PKI practices per <xref target="RFC5280"/>. Servers <strong>MUST</strong> present
a valid certificate.</t>
      </section>
      <section anchor="agent-identity-headers-and-agent-certificate-extension">
        <name>Agent Identity Headers and Agent Certificate Extension</name>
        <t>Every AGTP request <strong>MUST</strong> include Agent-ID and Principal-ID header fields.
In the base specification, these fields are not cryptographically
authenticated. They are self-asserted but logged mandatorily for
auditability. Implementations <strong>SHOULD</strong> use logging and anomaly detection
to identify inconsistencies.</t>
        <t>Full cryptographic verification of agent identity and Authority-Scope is
provided by the AGTP Agent Certificate extension <xref target="AGTP-CERT"/>. That
extension binds Agent-ID, Principal-ID, and Authority-Scope to an X.509
v3 certificate presented during TLS mutual authentication, enabling
infrastructure-layer identity and scope verification without
application-layer access. Implementers planning deployments that require
verified agent identity <strong>SHOULD</strong> plan for the Agent Certificate
extension.</t>
        <ul empty="true">
          <li>
            <t>Note: The Agent Certificate extension and the Agent Birth Certificate
mechanism may be subject to pending intellectual property claims.
See Section 7.7 and the IPR Notice preceding the Abstract for details.
The licensor is prepared to grant a royalty-free license to implementers.</t>
          </li>
        </ul>
        <t>Every AGTP server <strong>MUST</strong> log Agent-ID and Principal-ID fields for every
request, creating an attributable audit trail even in deployments without
the Certificate extension.</t>
      </section>
      <section anchor="authority-scope-enforcement">
        <name>Authority Scope Enforcement</name>
        <t>The Authority-Scope header declares what actions the agent is authorized
to take. Compliant AGTP servers <strong>MUST</strong> parse the Authority-Scope on every
request, return 451 Scope Violation for any method that exceeds declared
scope, and log all scope violations for audit purposes. Scope declarations
are self-asserted in the base spec, analogous to scope assertions in
OAuth 2.0 <xref target="RFC6749"/>. Cryptographically signed and infrastructure-enforced
scopes are defined in <xref target="AGTP-CERT"/>.</t>
      </section>
      <section anchor="threat-model">
        <name>Threat Model</name>
        <section anchor="agent-spoofing">
          <name>Agent Spoofing</name>
          <t>Threat: A malicious actor forges Agent-ID and Principal-ID headers to
impersonate a trusted agent. Base spec mitigation: mandatory logging and
anomaly detection. Full mitigation requires <xref target="AGTP-CERT"/>.</t>
        </section>
        <section anchor="authority-laundering">
          <name>Authority Laundering</name>
          <t>Threat: An agent claims an Authority-Scope broader than what it was
granted. Mitigation: server-side scope enforcement; 451 Scope Violation
returned and logged. In DELEGATE chains, each hop's scope <strong>MUST</strong> be a
strict subset of the delegating agent's scope.</t>
        </section>
        <section anchor="delegation-chain-poisoning">
          <name>Delegation Chain Poisoning</name>
          <t>Threat: A malicious agent inserts itself into a DELEGATE chain. Mitigation:
Delegation-Chain headers are logged at each hop. 551 Authority Chain Broken
is returned if any chain entry is unverifiable. Full mitigation requires
<xref target="AGTP-CERT"/> for signed delegation tokens.</t>
        </section>
        <section anchor="denial-of-service-via-high-frequency-agent-traffic">
          <name>Denial of Service via High-Frequency Agent Traffic</name>
          <t>Threat: Agents that are compromised, misconfigured, or adversarial generate
extremely high request volumes. Mitigation: 429 Rate Limited status code.
Rate limiting <strong>SHOULD</strong> be applied per Agent-ID and per Principal-ID.
When <xref target="AGTP-CERT"/> is deployed, per-Agent-ID quotas can be cryptographically
tied to verified identity, preventing quota evasion through Agent-ID
spoofing.</t>
        </section>
        <section anchor="session-hijacking">
          <name>Session Hijacking</name>
          <t>Threat: An attacker intercepts or forges a Session-ID. Mitigation:
mandatory TLS protects sessions in transit. Session-IDs <strong>MUST</strong> be
cryptographically random with minimum 128 bits of entropy. Servers <strong>MUST</strong>
validate that Session-ID, Agent-ID, and TLS client identity are consistent.</t>
        </section>
        <section anchor="escalation-suppression">
          <name>Escalation Suppression</name>
          <t>Threat: A compromised agent or intermediary suppresses ESCALATE requests,
preventing human oversight. Mitigation: compliant implementations <strong>MUST</strong>
route ESCALATE requests directly to the declared escalation handler without
modification. Intermediaries <strong>MUST NOT</strong> drop, delay, or modify ESCALATE
requests. Escalation handlers <strong>SHOULD</strong> implement independent receipt
confirmation.</t>
        </section>
        <section anchor="birth-certificate-spoofing">
          <name>Birth Certificate Spoofing</name>
          <t>Threat: A malicious actor fabricates a Birth Certificate to claim a
legitimate agent's identity or construct a false identity with elevated
trust. Mitigation: Birth Certificates are issued only by governance
platforms with verified ownership of the <tt>org_domain</tt>. In the base spec,
mandatory logging provides auditability. Full mitigation requires
<xref target="AGTP-CERT"/> for cryptographically bound Birth Certificate verification at
the transport layer. Governance platforms <strong>MUST</strong> treat any ACTIVATE
request that presents a certificate hash matching an existing registry
record as a collision attack and <strong>MUST</strong> reject it.</t>
        </section>
        <section anchor="domain-transfer-identity-hijacking">
          <name>Domain Transfer Identity Hijacking</name>
          <t>Threat: An attacker acquires an expired domain to inherit the agent
registry and trust history of prior registrants. Mitigation: agents under
an expired domain are automatically Suspended within 24 hours of domain
expiry detection. A new owner of the domain <strong>MUST NOT</strong> inherit prior
agent registrations. See Section 9.6 for the full domain expiry policy.</t>
        </section>
        <section anchor="attribution-forgery">
          <name>Attribution Forgery</name>
          <t>Threat: A malicious agent submits a fabricated or replayed
Attribution-Record to claim credit for an action it did not perform, or
to conceal the true execution context of an action it did perform.</t>
          <t>Mitigation: Attribution-Records <strong>MUST</strong> be signed with the agent's
governance key. The signature <strong>MUST</strong> cover the full record including the
Task-ID, Agent-ID, method, timestamp, and result hash. When <xref target="AGTP-CERT"/>
is deployed, the signature is verified at the transport layer against the
agent's X.509 certificate. For high-stakes domains, RATS attestation
evidence in the Attribution-Record per <xref target="RFC9334"/> provides hardware-rooted
proof of execution context that cannot be forged without compromising the
attesting environment itself. Attribution-Record signatures <strong>MUST</strong> be
verified before the record is admitted to an audit trail. Unverified records
<strong>MUST</strong> be logged with a <tt>signature_unverified</tt> flag and <strong>MUST NOT</strong> be
treated as authoritative for compliance purposes.</t>
        </section>
      </section>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t>Agent identity headers carry information about agent behavior that may be
sensitive:</t>
        <ul spacing="normal">
          <li>
            <t>Agent-ID and Principal-ID together may reveal organizational structure</t>
          </li>
          <li>
            <t>Session-ID and Task-ID reveal workflow patterns</t>
          </li>
          <li>
            <t>Delegation-Chain reveals multi-agent architecture</t>
          </li>
        </ul>
        <t>AGTP logs containing these fields <strong>MUST</strong> be treated as sensitive
operational data. Operators <strong>MUST</strong> implement appropriate access controls,
retention limits, and data minimization practices consistent with
applicable privacy regulations.</t>
        <t>Where privacy-preserving attribution is required, implementations <strong>MAY</strong>
use pseudonymous Agent-IDs with a separate trusted resolution service.
The architecture for pseudonymous agent identity resolution is reserved
for a future companion document.</t>
      </section>
      <section anchor="denial-of-service-considerations">
        <name>Denial-of-Service Considerations</name>
        <t>AGTP's agent identity headers provide a mechanism for more precise
denial-of-service mitigation than is possible with HTTP. Rate limiting
<strong>SHOULD</strong> be applied per Agent-ID and per Principal-ID in addition to
per-IP-address controls.</t>
        <t>When <xref target="AGTP-CERT"/> is deployed, per-Agent-ID rate limiting can be
cryptographically tied to verified agent identity, preventing quota evasion
through Agent-ID rotation. Implementations planning high-volume governed
agent deployments <strong>SHOULD</strong> plan for <xref target="AGTP-CERT"/> as part of their
denial-of-service mitigation strategy.</t>
        <t>Additional recommended mitigations: Priority header enforcement (Priority:
background requests <strong>SHOULD</strong> have lower rate limit headroom than
Priority: critical); per-governance-zone aggregate limits in multi-tenant
deployments; and circuit breaker patterns for ESCALATE request floods.</t>
      </section>
      <section anchor="intellectual-property-considerations">
        <name>Intellectual Property Considerations</name>
        <t>The core AGTP specification, including all base methods, header fields,
status codes, connection model, and IANA registrations defined in this
document, is intended for open implementation without royalty obligation.</t>
        <t>Certain elements referenced in this document may be subject to pending
patent applications by the author, specifically:</t>
        <ul spacing="normal">
          <li>
            <t>The Agent Certificate extension <xref target="AGTP-CERT"/>, which provides
cryptographic binding of agent identity and authority scope to AGTP
header fields.</t>
          </li>
          <li>
            <t>The ACTIVATE method, which provides AGTP-native transmission and
activation of governed agent packages.</t>
          </li>
          <li>
            <t>The Agent Birth Certificate mechanism (Section 5.7), which provides
the genesis identity record and canonical Agent-ID derivation
process for AGTP-registered agents.</t>
          </li>
          <li>
            <t>The <tt>.agent</tt> file format specification, an open packaging format
for AI agents.</t>
          </li>
          <li>
            <t>The <tt>.nomo</tt> file format specification, a governed packaging format
for AI agents with cryptographic governance binding.</t>
          </li>
        </ul>
        <t>Implementers of the core AGTP specification are not affected by any
intellectual property claims on these extensions and associated formats.</t>
        <t>The licensor is prepared to grant a royalty-free license to implementers
for any patent claims that cover contributions in this document and its
referenced extensions, consistent with the IETF's IPR framework under
<xref target="RFC8179"/>.</t>
        <t>IPR disclosures have been filed with the IETF Secretariat and are available
at: https://datatracker.ietf.org/ipr/</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests the following IANA actions upon advancement to
RFC status.</t>
      <section anchor="port-assignment">
        <name>Port Assignment</name>
        <t>Registration of the following service names in the IANA Service Name and
Transport Protocol Port Number Registry:</t>
        <table>
          <name>Proposed Port Assignments</name>
          <thead>
            <tr>
              <th align="left">Service Name</th>
              <th align="left">Port</th>
              <th align="left">Transport</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">agtp</td>
              <td align="left">TBD</td>
              <td align="left">TCP</td>
              <td align="left">Agent Transfer Protocol over TCP/TLS</td>
            </tr>
            <tr>
              <td align="left">agtp-quic</td>
              <td align="left">TBD</td>
              <td align="left">UDP</td>
              <td align="left">Agent Transfer Protocol over QUIC</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="agtp-method-registry">
        <name>AGTP Method Registry</name>
        <t>Establishment of a new IANA registry: Agent Transfer Protocol Methods.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Methods</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review per <xref target="RFC8126"/>, with the additional requirement that each
registration be accompanied by a published specification, at minimum a
publicly available Internet-Draft or equivalent document. The Designated
Expert <strong>SHOULD</strong> verify that the proposed method name is unique, the
reference specification is publicly accessible, and the method definition
includes the required fields (parameters, response structure, idempotency,
error codes, security considerations).</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
        </dl>
        <t>Initial registrations:</t>
        <table>
          <name>Initial AGTP Method Registry Entries</name>
          <thead>
            <tr>
              <th align="left">Method</th>
              <th align="left">Status</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">QUERY</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">SUMMARIZE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">BOOK</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">SCHEDULE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">LEARN</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">DELEGATE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">COLLABORATE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">CONFIRM</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">ESCALATE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">NOTIFY</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">DESCRIBE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">SUSPEND</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="agtp-status-code-registry">
        <name>AGTP Status Code Registry</name>
        <t>Establishment of a new IANA registry: Agent Transfer Protocol Status Codes.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Status Codes</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review + published specification required.</t>
          </dd>
        </dl>
        <t>The following AGTP-specific status codes are registered with full
definitions:</t>
        <table>
          <name>AGTP-Specific Status Code Definitions</name>
          <thead>
            <tr>
              <th align="left">Code</th>
              <th align="left">Name</th>
              <th align="left">Definition</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">451</td>
              <td align="left">Scope Violation</td>
              <td align="left">The requested action is outside the Authority-Scope declared in the request headers. The server <strong>MUST</strong> log this event. The agent <strong>MUST NOT</strong> retry the same request without modifying its Authority-Scope declaration. This is a governance signal, not a protocol error.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
            <tr>
              <td align="left">452</td>
              <td align="left">Budget Exceeded</td>
              <td align="left">The requested method execution would exceed the resource limits declared in the Budget-Limit request header. The agent <strong>MUST NOT</strong> retry without modifying the Budget-Limit or reducing request scope. This is a governance signal, not a protocol error. <strong>MUST</strong> be logged.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
            <tr>
              <td align="left">454</td>
              <td align="left">Grammar Violation</td>
              <td align="left">The method identifier fails AGIS grammar validation <xref target="AGIS"/> when <tt>Method-Grammar: AGIS/1.0</tt> is present. The response body <strong>MUST</strong> identify the specific AGIS validation pass that failed. The agent <strong>MUST NOT</strong> retry without correcting the method identifier.</td>
              <td align="left">This document, Section 6.4</td>
            </tr>
            <tr>
              <td align="left">261</td>
              <td align="left">Negotiation In Progress</td>
              <td align="left">The service has received a PROPOSE request and is evaluating the endpoint proposal. The response body <strong>MUST</strong> include a Negotiation-ID and an estimated evaluation duration. The agent <strong>MUST</strong> poll or wait for a 263 or rejection response.</td>
              <td align="left">This document, Section 6.5</td>
            </tr>
            <tr>
              <td align="left">262</td>
              <td align="left">Authorization Required for Negotiation</td>
              <td align="left">The service requires credential establishment before evaluating the PROPOSE request. The response body <strong>MUST</strong> specify the authorization mechanism required (e.g., AGTP-CERT, OAuth scope).</td>
              <td align="left">This document, Section 6.5</td>
            </tr>
            <tr>
              <td align="left">263</td>
              <td align="left">Endpoint Instantiated</td>
              <td align="left">The service has accepted the PROPOSE request and instantiated the requested endpoint. The response body <strong>MUST</strong> contain a complete AGIS endpoint definition for the instantiated endpoint. The Negotiation-ID <strong>MUST</strong> match the proposal.</td>
              <td align="left">This document, Section 6.5</td>
            </tr>
            <tr>
              <td align="left">460</td>
              <td align="left">Proposal Rejected</td>
              <td align="left">The service cannot or will not instantiate the proposed endpoint. The response body <strong>MUST</strong> explain the rejection reason and <strong>SHOULD</strong> reference relevant data_manifest entries if the requested data class is available through a different approach.</td>
              <td align="left">This document, Section 6.5</td>
            </tr>
            <tr>
              <td align="left">453</td>
              <td align="left">Zone Violation</td>
              <td align="left">The request would route outside the network boundary declared in the AGTP-Zone-ID header. SEP-enforced. The agent <strong>MUST NOT</strong> retry without modifying the AGTP-Zone-ID or obtaining explicit cross-zone authorization. <strong>MUST</strong> be logged.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
            <tr>
              <td align="left">455</td>
              <td align="left">Counterparty Unverified</td>
              <td align="left">The merchant counterparty in a PURCHASE invocation failed identity verification. Returned when the <tt>Merchant-ID</tt> or <tt>Merchant-Manifest-Fingerprint</tt> request headers are absent, when the fingerprint does not match the receiving server's current Merchant Manifest Document, when the Merchant-ID does not match the server's canonical ID, or when the merchant is in a non-Active lifecycle state. Governance signal; <strong>MUST</strong> be logged. Full definition in <xref target="AGTP-MERCHANT"/>.</td>
              <td align="left">
                <xref target="AGTP-MERCHANT"/>, Section 7</td>
            </tr>
            <tr>
              <td align="left">550</td>
              <td align="left">Delegation Failure</td>
              <td align="left">A sub-agent to which a task was delegated via the DELEGATE method failed to complete the task within the declared deadline or returned an error. The response body <strong>SHOULD</strong> contain the sub-agent's error details.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
            <tr>
              <td align="left">551</td>
              <td align="left">Authority Chain Broken</td>
              <td align="left">One or more entries in the Delegation-Chain header cannot be verified as part of a valid and continuous delegation sequence. The specific unverifiable entry <strong>SHOULD</strong> be identified in the response body. The server <strong>MUST</strong> log this event.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="header-field-registry">
        <name>Header Field Registry</name>
        <t>AGTP header fields are distinct from HTTP header fields and are registered
in a new IANA registry: Agent Transfer Protocol Header Fields.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Header Fields</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review + published specification required.</t>
          </dd>
        </dl>
        <t>AGTP does not reuse the HTTP Field Name Registry, as AGTP header fields have
different semantics, applicability, and versioning constraints from HTTP
fields. HTTP header fields are not automatically valid in AGTP, and AGTP
header fields are not valid HTTP fields.</t>
        <t>Initial registrations (all Permanent): AGTP-Version, AGTP-Method, AGTP-Status,
Agent-ID, Principal-ID, Authority-Scope, Session-ID, Task-ID,
Delegation-Chain, Priority, TTL, Server-Agent-ID, Attribution-Record,
Continuation-Token, Supported-Methods, Budget-Limit, AGTP-Zone-ID,
Content-Schema, Telemetry-Export, Cost-Estimate, Attestation-Evidence,
Merchant-ID, Merchant-Manifest-Fingerprint, Intent-Assertion, Cart-Digest.
The four merchant-related headers are defined in <xref target="AGTP-MERCHANT"/> and
registered concurrently with this document.</t>
      </section>
      <section anchor="uri-scheme-registration">
        <name>URI Scheme Registration</name>
        <t>Registration of the agtp:// URI scheme per <xref target="RFC7595"/>, as described in
Section 5.1.8 of this document.</t>
      </section>
      <section anchor="agtp-budget-unit-registry">
        <name>AGTP Budget Unit Registry</name>
        <t>Establishment of a new IANA sub-registry: Agent Transfer Protocol Budget
Units.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Budget Units</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review per <xref target="RFC8126"/>. New unit registrations <strong>MUST</strong> define:
unit name (lowercase ASCII, no spaces or special characters), semantic
description, value format (integer or decimal), whether fractional values
are permitted, and a reference specification. Units representing financial
denominations <strong>MUST</strong> specify the currency and <strong>MUST</strong> define precision
(decimal places). The Designated Expert <strong>SHOULD</strong> verify that the proposed
unit does not duplicate an existing registration and that the value format
is unambiguous.</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
        </dl>
        <t>Initial registrations:</t>
        <table>
          <name>Initial AGTP Budget Unit Registry Entries</name>
          <thead>
            <tr>
              <th align="left">Unit</th>
              <th align="left">Description</th>
              <th align="left">Value Format</th>
              <th align="left">Fractional</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">tokens</td>
              <td align="left">Language model token consumption</td>
              <td align="left">Integer</td>
              <td align="left">No</td>
            </tr>
            <tr>
              <td align="left">compute-seconds</td>
              <td align="left">CPU/GPU compute time in seconds</td>
              <td align="left">Decimal</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">USD</td>
              <td align="left">US Dollar financial limit</td>
              <td align="left">Decimal, 2 places</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">EUR</td>
              <td align="left">Euro financial limit</td>
              <td align="left">Decimal, 2 places</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">GBP</td>
              <td align="left">Pound Sterling financial limit</td>
              <td align="left">Decimal, 2 places</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">calls</td>
              <td align="left">Downstream API call count</td>
              <td align="left">Integer</td>
              <td align="left">No</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="agent-registry-retention-policy">
        <name>Agent Registry Retention Policy</name>
        <t>The AGTP registry <strong>MUST</strong> retain records for all registered agents
regardless of lifecycle state. The following minimum retention periods apply:</t>
        <table>
          <name>AGTP Registry Minimum Retention Periods</name>
          <thead>
            <tr>
              <th align="left">Lifecycle State</th>
              <th align="left">Minimum Retention Period</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Active</td>
              <td align="left">Duration of Active state + 7 years</td>
            </tr>
            <tr>
              <td align="left">Suspended</td>
              <td align="left">Duration of Suspended state + 7 years</td>
            </tr>
            <tr>
              <td align="left">Revoked</td>
              <td align="left">10 years from revocation date</td>
            </tr>
            <tr>
              <td align="left">Deprecated</td>
              <td align="left">7 years from deprecation date</td>
            </tr>
          </tbody>
        </table>
        <t>The 7-year minimum reflects common enterprise compliance requirements
(SOX, GDPR audit trails, HIPAA). Governance platform operators in regulated
industries <strong>SHOULD</strong> extend these minimums to match applicable regulatory
requirements.</t>
        <t>The retained record for a Revoked or Deprecated agent <strong>MUST</strong> include:</t>
        <ul spacing="normal">
          <li>
            <t>Canonical Agent-ID (permanently retired, not reissued)</t>
          </li>
          <li>
            <t>Agent label and org domain at time of registration</t>
          </li>
          <li>
            <t>Trust tier at time of registration</t>
          </li>
          <li>
            <t>Activation date and activating principal</t>
          </li>
          <li>
            <t>Revocation or deprecation date, initiating principal, and reason code</t>
          </li>
          <li>
            <t>Genesis audit record hash (pointer to immutable audit log)</t>
          </li>
          <li>
            <t>Full Birth Certificate (archived, not publicly accessible)</t>
          </li>
          <li>
            <t>All lifecycle state transitions with timestamps</t>
          </li>
        </ul>
        <t>The retained record <strong>MUST NOT</strong> contain package executable contents,
active session data, or Authority-Scope grant tokens.</t>
        <section anchor="domain-name-expiry-interaction">
          <name>Domain Name Expiry Interaction</name>
          <t>If an organization's <tt>org_domain</tt> expires or transfers to a new owner:</t>
          <ol spacing="normal" type="1"><li>
              <t>All Active agents registered under the expired domain <strong>MUST</strong> be
automatically Suspended within 24 hours of domain expiry detection.</t>
            </li>
            <li>
              <t>The governance platform <strong>MUST</strong> notify the registered principal
contact before suspension takes effect, with a minimum notice period
of 30 days if domain expiry was predictable.</t>
            </li>
            <li>
              <t>Suspended agents under an expired domain transition to Deprecated
state after 90 days if the domain has not been renewed.</t>
            </li>
            <li>
              <t>A new owner of the domain <strong>MUST NOT</strong> inherit prior agent
registrations. New ACTIVATE transactions are required.</t>
            </li>
          </ol>
          <t>This policy prevents domain-transfer-based identity hijacking in which
an attacker acquires an expired domain to claim the trust history of
agents that operated under it.</t>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8179">
          <front>
            <title>Intellectual Property Rights in IETF Technology</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <author fullname="J. Contreras" initials="J." surname="Contreras"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>The IETF policies about Intellectual Property Rights (IPR), such as patent rights, relative to technologies developed in the IETF are designed to ensure that IETF working groups and participants have as much information as possible about any IPR constraints on a technical proposal as early as possible in the development process. The policies are intended to benefit the Internet community and the public at large, while respecting the legitimate rights of IPR holders. This document sets out the IETF policies concerning IPR related to technology worked on within the IETF. It also describes the objectives that the policies are designed to meet. This document updates RFC 2026 and, with RFC 5378, replaces Section 10 of RFC 2026. This document also obsoletes RFCs 3979 and 4879.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="79"/>
          <seriesInfo name="RFC" value="8179"/>
          <seriesInfo name="DOI" value="10.17487/RFC8179"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="AGIS">
          <front>
            <title>Agentic Grammar and Interface Specification (AGIS)</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-independent-agis-00"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9114">
          <front>
            <title>HTTP/3</title>
            <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9114"/>
          <seriesInfo name="DOI" value="10.17487/RFC9114"/>
        </reference>
        <reference anchor="RFC7540">
          <front>
            <title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
            <author fullname="M. Belshe" initials="M." surname="Belshe"/>
            <author fullname="R. Peon" initials="R." surname="Peon"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection. It also introduces unsolicited push of representations from servers to clients.</t>
              <t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax. HTTP's existing semantics remain unchanged.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7540"/>
          <seriesInfo name="DOI" value="10.17487/RFC7540"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC7595">
          <front>
            <title>Guidelines and Registration Procedures for URI Schemes</title>
            <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <author fullname="T. Hardie" initials="T." surname="Hardie"/>
            <date month="June" year="2015"/>
            <abstract>
              <t>This document updates the guidelines and recommendations, as well as the IANA registration processes, for the definition of Uniform Resource Identifier (URI) schemes. It obsoletes RFC 4395.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="35"/>
          <seriesInfo name="RFC" value="7595"/>
          <seriesInfo name="DOI" value="10.17487/RFC7595"/>
        </reference>
        <reference anchor="A2A" target="https://a2aprotocol.ai">
          <front>
            <title>Agent-to-Agent Protocol Specification</title>
            <author>
              <organization>Linux Foundation</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="ACP">
          <front>
            <title>Agent Communication Protocol</title>
            <author>
              <organization>IBM Research</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="MCP" target="https://modelcontextprotocol.io">
          <front>
            <title>Model Context Protocol</title>
            <author>
              <organization>Anthropic</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="ANP">
          <front>
            <title>Agent Network Protocol</title>
            <author>
              <organization/>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="AGTP-CERT">
          <front>
            <title>AGTP Agent Certificate Extension</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-agent-cert-00"/>
        </reference>
        <reference anchor="AGTP-METHODS">
          <front>
            <title>AGTP Standard Extended Method Vocabulary</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-standard-methods-01"/>
        </reference>
        <reference anchor="HOOD2026">
          <front>
            <title>Semantic Method Naming and LLM Agent Accuracy: A Controlled Benchmark of REST/CRUD versus Agentive API Interface Design</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Working Paper" value="Available by request. March 2026."/>
        </reference>
        <reference anchor="AGTP-WEB3">
          <front>
            <title>AGTP Web3 Bridge Specification</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-web3-bridge-00"/>
        </reference>
        <reference anchor="AGTP-DISCOVER">
          <front>
            <title>AGTP Agent Discovery and Name Service</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-discovery-00"/>
        </reference>
        <reference anchor="AGTP-COMPOSITION">
          <front>
            <title>AGTP Composition with Agent Group Messaging Protocols</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-composition-00"/>
        </reference>
        <reference anchor="AGTP-MERCHANT">
          <front>
            <title>AGTP Merchant Identity and Agentic Commerce Binding</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-merchant-identity-00"/>
        </reference>
      </references>
    </references>
    <?line 2948?>

<section anchor="authority-scope-format">
      <name>Authority-Scope Format</name>
      <t>Authority-Scope values are expressed as a space-separated list of scope
tokens following the pattern: [domain]:[action] or [domain]:* for
full domain access. Tokens <strong>MUST</strong> be lowercase ASCII with a single colon
separator.</t>
      <t>Examples:</t>
      <artwork><![CDATA[
Authority-Scope: calendar:book calendar:query
Authority-Scope: documents:summarize documents:query knowledge:learn
Authority-Scope: *:query
Authority-Scope: booking:* payments:confirm
]]></artwork>
      <t>Reserved domains (initial set):</t>
      <table>
        <name>Reserved Authority-Scope Domains</name>
        <thead>
          <tr>
            <th align="left">Domain</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">calendar</td>
            <td align="left">Scheduling and time-based resource management</td>
          </tr>
          <tr>
            <td align="left">documents</td>
            <td align="left">Document access, summarization, and annotation</td>
          </tr>
          <tr>
            <td align="left">knowledge</td>
            <td align="left">Agent context and memory operations</td>
          </tr>
          <tr>
            <td align="left">booking</td>
            <td align="left">Reservation and resource allocation</td>
          </tr>
          <tr>
            <td align="left">payments</td>
            <td align="left">Financial transactions and confirmations</td>
          </tr>
          <tr>
            <td align="left">agents</td>
            <td align="left">Delegation and collaboration with other agents</td>
          </tr>
          <tr>
            <td align="left">escalation</td>
            <td align="left">Escalation routing and handler management</td>
          </tr>
          <tr>
            <td align="left">activation</td>
            <td align="left">Governed agent package activation (ACTIVATE method extension)</td>
          </tr>
          <tr>
            <td align="left">discovery</td>
            <td align="left">Agent discovery and capability query operations (DISCOVER, DESCRIBE)</td>
          </tr>
          <tr>
            <td align="left">budget</td>
            <td align="left">Resource budget declaration and QUOTE pre-flight operations</td>
          </tr>
          <tr>
            <td align="left">telemetry</td>
            <td align="left">Telemetry export and observability operations</td>
          </tr>
          <tr>
            <td align="left">zone</td>
            <td align="left">Network zone boundary declaration and enforcement</td>
          </tr>
          <tr>
            <td align="left">suspend</td>
            <td align="left">Session suspension and resumption operations</td>
          </tr>
          <tr>
            <td align="left">merchant</td>
            <td align="left">Merchant identity resolution and counterparty verification (see <xref target="AGTP-MERCHANT"/>)</td>
          </tr>
          <tr>
            <td align="left">intent</td>
            <td align="left">Intent Assertion issuance and validation (see <xref target="AGTP-MERCHANT"/>)</td>
          </tr>
          <tr>
            <td align="left">*</td>
            <td align="left">All domains require explicit grant; use with caution</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="example-agtp-wire-formats">
      <name>Example AGTP Wire Formats</name>
      <t>The following examples use a human-readable pseudo-wire format with
HTTP-style headers followed by a JSON body. The Content-Type for all AGTP
message bodies is application/agtp+json.</t>
      <section anchor="query-request-and-response">
        <name>QUERY Request and Response</name>
        <artwork><![CDATA[
AGTP/1.0 QUERY
Agent-ID: agt-7f3a9c2d
Principal-ID: usr-chris-hood
Authority-Scope: documents:query knowledge:query
Session-ID: sess-a1b2c3d4
Task-ID: task-0042
TTL: 3000
Content-Type: application/agtp+json

{
  "task_id": "task-0042",
  "parameters": {
    "intent": "Key arguments against MCP re: HTTP overhead",
    "scope": ["documents:research", "knowledge:session"],
    "format": "structured",
    "confidence_threshold": 0.75
  }
}

AGTP/1.0 200 OK
Task-ID: task-0042
Server-Agent-ID: srv-knowledge-01
Attribution-Record: [signed attribution token]
Content-Type: application/agtp+json

{
  "status": 200,
  "task_id": "task-0042",
  "result": {
    "results": [{"content": "...", "source": "doc-agtp-research",
                 "confidence": 0.91}],
    "result_count": 1
  }
}
]]></artwork>
      </section>
      <section anchor="book-request-and-response">
        <name>BOOK Request and Response</name>
        <artwork><![CDATA[
AGTP/1.0 BOOK
Agent-ID: agt-travel-planner
Principal-ID: usr-chris-hood
Authority-Scope: booking:* calendar:book
Session-ID: sess-trip-2026-04
Task-ID: task-0107
Priority: normal
Content-Type: application/agtp+json

{
  "method": "BOOK",
  "task_id": "task-0107",
  "parameters": {
    "resource_id": "flight-AA2847",
    "principal_id": "usr-chris-hood",
    "time_slot": "2026-04-15T08:00:00Z",
    "options": {"seat_preference": "aisle", "class": "economy"},
    "confirm_immediately": true
  }
}

AGTP/1.0 200 OK
Task-ID: task-0107
Attribution-Record: [signed attribution token]
Content-Type: application/agtp+json

{
  "status": 200,
  "task_id": "task-0107",
  "result": {
    "booking_id": "BK-2026-0107",
    "status": "confirmed",
    "resource_id": "flight-AA2847",
    "confirmation_code": "XQRT7Y"
  }
}
]]></artwork>
      </section>
      <section anchor="escalate-request-and-response">
        <name>ESCALATE Request and Response</name>
        <artwork><![CDATA[
AGTP/1.0 ESCALATE
Agent-ID: agt-procurement-03
Principal-ID: usr-finance-dept
Authority-Scope: booking:* payments:confirm
Session-ID: sess-procurement-q2
Task-ID: task-0881
Priority: urgent
Content-Type: application/agtp+json

{
  "method": "ESCALATE",
  "task_id": "task-0881",
  "parameters": {
    "task_id": "task-0880",
    "reason": "scope_limit",
    "context": {
      "attempted_action": "BOOK",
      "resource": "vendor-contract-750k",
      "block_reason": "Exceeds agent authorization threshold"
    },
    "recipient": "usr-cfo",
    "deadline": "2026-03-19T09:00:00Z"
  }
}

AGTP/1.0 202 Accepted
Task-ID: task-0881
Server-Agent-ID: srv-escalation-handler
Content-Type: application/agtp+json

{
  "status": 202,
  "task_id": "task-0881",
  "result": {
    "escalation_id": "ESC-0881",
    "routed_to": "usr-cfo",
    "status": "pending_review",
    "task_paused": true,
    "estimated_review_by": "2026-03-19T09:00:00Z"
  }
}
]]></artwork>
      </section>
    </section>
    <section anchor="comparison-table">
      <name>Comparison Table</name>
      <table>
        <name>AGTP Compared to Existing Approaches</name>
        <thead>
          <tr>
            <th align="left">Criterion</th>
            <th align="left">AGTP</th>
            <th align="left">HTTP/REST</th>
            <th align="left">gRPC</th>
            <th align="left">AGMP (MCP, A2A, ...)</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Intent-native methods</td>
            <td align="left">Yes (12 Tier 1)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">Partial</td>
          </tr>
          <tr>
            <td align="left">Intent semantics at protocol level</td>
            <td align="left">Native</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">Messaging layer only</td>
          </tr>
          <tr>
            <td align="left">Built-in agent identity</td>
            <td align="left">Yes</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Authority scope enforcement</td>
            <td align="left">Protocol-level</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">Application-layer</td>
          </tr>
          <tr>
            <td align="left">Built-in attribution/audit</td>
            <td align="left">Yes</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">Varies by impl.</td>
          </tr>
          <tr>
            <td align="left">Transport flexibility</td>
            <td align="left">TCP/UDP/QUIC</td>
            <td align="left">TCP/TLS</td>
            <td align="left">HTTP/2</td>
            <td align="left">HTTP</td>
          </tr>
          <tr>
            <td align="left">Escalation as first-class primitive</td>
            <td align="left">Yes</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Ecosystem maturity</td>
            <td align="left">Proposed</td>
            <td align="left">Mature</td>
            <td align="left">Mature</td>
            <td align="left">Emerging</td>
          </tr>
          <tr>
            <td align="left">Governance/observability</td>
            <td align="left">Native</td>
            <td align="left">Manual/bolt-on</td>
            <td align="left">Manual</td>
            <td align="left">Limited</td>
          </tr>
          <tr>
            <td align="left">Method registry extensibility</td>
            <td align="left">Yes (Expert Review)</td>
            <td align="left">Frozen (IETF Review)</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
          <tr>
            <td align="left">Open core / royalty-free</td>
            <td align="left">Yes</td>
            <td align="left">Yes</td>
            <td align="left">Yes</td>
            <td align="left">Yes</td>
          </tr>
          <tr>
            <td align="left">Agent Manifest Document</td>
            <td align="left">Native (.agtp format)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Tamper-proof identity surface</td>
            <td align="left">Yes (hash + signature)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Browser-accessible agent identity</td>
            <td align="left">Yes (read-only)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">URI collision prevention</td>
            <td align="left">Domain-anchored</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
          <tr>
            <td align="left">Agent Birth Certificate</td>
            <td align="left">Yes (genesis record)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Domain-expiry lifecycle handling</td>
            <td align="left">Specified</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
          <tr>
            <td align="left">Capability discovery</td>
            <td align="left">Native (DESCRIBE)</td>
            <td align="left">None</td>
            <td align="left">Reflection (partial)</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Resource budget enforcement</td>
            <td align="left">Native (Budget-Limit, 452)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Execution attestation (RATS)</td>
            <td align="left">Optional (RFC 9334)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Observability hooks</td>
            <td align="left">Native (Telemetry-Export)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Network zone enforcement</td>
            <td align="left">Native (AGTP-Zone-ID, 453)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Session suspension/recovery</td>
            <td align="left">Native (SUSPEND method)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">AGMP composition profiles</td>
            <td align="left">Normative appendix</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
        </tbody>
      </table>
      <t>HTTP's method registry (registered with IETF Review per <xref target="RFC9110"/>) is
effectively frozen for new semantic methods because any new HTTP method
must be backward-compatible with existing HTTP infrastructure globally.
AGTP's Expert Review + published spec procedure enables the protocol to
evolve its method vocabulary as the agent ecosystem develops, without
the backward-compatibility constraints of the HTTP method space.</t>
    </section>
    <section anchor="glossary">
      <name>Glossary</name>
      <dl>
        <dt>Agent:</dt>
        <dd>
          <t>A software system that executes tasks, makes decisions, and takes
actions without continuous human supervision per transaction.</t>
        </dd>
        <dt>AGMP (Agent Group Messaging Protocol):</dt>
        <dd>
          <t>The collective term for higher-layer AI agent messaging standards that
operate over AGTP as their transport substrate, including MCP, A2A, ACP,
and ANP. AGMPs define what agents say. AGTP defines how those messages
move. See Section 1.6.</t>
        </dd>
        <dt>Agent Birth Certificate:</dt>
        <dd>
          <t>A cryptographically signed identity document issued to an agent at
registration time by a governance platform. The genesis record of the
agent's existence; the source from which the canonical Agent-ID is
derived. Functions as the agent's social security number: issued once,
permanently bound, never reissued. See Section 6.7.</t>
        </dd>
        <dt>Agent Transfer Protocol (AGTP):</dt>
        <dd>
          <t>The application-layer protocol defined in this document, providing a
dedicated transport environment for agent traffic.</t>
        </dd>
        <dt>Agent-ID:</dt>
        <dd>
          <t>A unique identifier for a specific agent instance, present in all AGTP
request headers. In the base spec, derived from the Birth Certificate
hash. With <xref target="AGTP-CERT"/>, cryptographically bound to a verified identity.</t>
        </dd>
        <dt>Agent Manifest Document:</dt>
        <dd>
          <t>A signed <tt>application/agtp+json</tt> document returned when an <tt>agtp://</tt>
URI is resolved. Derived from the agent's <tt>.agent</tt> or <tt>.nomo</tt> package.
Contains identity, lifecycle state, trust tier, behavioral scope, and
birth certificate fields. Never contains executable content.</t>
        </dd>
        <dt>AGTP-Zone-ID:</dt>
        <dd>
          <t>A request header declaring the network zone or organizational boundary
within which a request must be processed. SEPs <strong>MUST</strong> enforce zone
boundaries and return 453 Zone Violation if a DELEGATE or COLLABORATE
request would route outside the declared zone.</t>
        </dd>
        <dt>Attribution Record:</dt>
        <dd>
          <t>A signed, logged record of an agent action, sufficient for audit and
compliance purposes. <strong>MAY</strong> include RATS attestation evidence per
<xref target="RFC9334"/> for hardware-rooted execution proof in high-stakes domains.</t>
        </dd>
        <dt>Authority-Scope:</dt>
        <dd>
          <t>A declared set of permissions defining what actions an agent is
authorized to take, expressed as space-separated domain:action tokens.</t>
        </dd>
        <dt>Budget-Limit:</dt>
        <dd>
          <t>A request header declaring the maximum resource consumption the principal
authorizes for a method invocation, expressed as space-separated
<tt>unit=value</tt> tokens from the IANA AGTP Budget Unit Registry. Exceeding
the declared limit causes 452 Budget Exceeded.</t>
        </dd>
        <dt>Delegation Chain:</dt>
        <dd>
          <t>An ordered record of Agent-IDs representing the sequence of delegations
that led to the current request.</t>
        </dd>
        <dt>DESCRIBE:</dt>
        <dd>
          <t>An AGTP Tier 1 core method returning the declared capabilities, supported
modalities, method vocabulary, and versioned feature set of a specific
agent endpoint. Used for pre-task negotiation. Category: ACQUIRE.</t>
        </dd>
        <dt>ESCALATE:</dt>
        <dd>
          <t>An AGTP method representing an agent's intentional deferral of a decision
or action to a human principal or higher-authority agent. A first-class
method, not a failure code.</t>
        </dd>
        <dt>Governance Token:</dt>
        <dd>
          <t>A signed, time-limited JWT artifact encoding a specific governance verdict
for a specific action. The runtime companion to the Birth Certificate.
Default TTL: 30 seconds. Must not be reused.</t>
        </dd>
        <dt>Intent Verb:</dt>
        <dd>
          <t>An AGTP method name expressing the agent's purpose, as distinguished from
HTTP resource-operation verbs (GET, POST, PUT, DELETE).</t>
        </dd>
        <dt>Method Registry:</dt>
        <dd>
          <t>The IANA-maintained registry of valid AGTP method names and their
specifications. Registration requires Expert Review and a published
specification.</t>
        </dd>
        <dt>Principal:</dt>
        <dd>
          <t>The human, organization, or system that authorized an agent to act and
is accountable for its actions.</t>
        </dd>
        <dt>Principal-ID:</dt>
        <dd>
          <t>The identifier of the principal on whose behalf an agent operates,
present in all AGTP request headers.</t>
        </dd>
        <dt>Scope-Enforcement Point (SEP):</dt>
        <dd>
          <t>An AGTP-aware infrastructure component, load balancer, gateway, proxy,
that enforces Authority-Scope and AGTP-Zone-ID compliance on AGTP
requests without application-layer access. Requires <xref target="AGTP-CERT"/>.</t>
        </dd>
        <dt>Scope Violation (451):</dt>
        <dd>
          <t>An AGTP status code returned when an agent requests an action outside its
declared Authority-Scope. A governance signal, not a protocol error.
<strong>MUST</strong> be logged.</t>
        </dd>
        <dt>Session:</dt>
        <dd>
          <t>An AGTP persistent connection context shared across multiple method
invocations within a single agent workflow.</t>
        </dd>
        <dt>SUSPEND (method):</dt>
        <dd>
          <t>An AGTP Tier 1 core method that places a specific active session into a
recoverable paused state, issuing a single-use base64url-encoded 128-bit
resumption nonce. Session-scoped; does not affect registry lifecycle state.
Category: ORCHESTRATE.</t>
        </dd>
        <dt>Trust Tier:</dt>
        <dd>
          <t>A classification (1, 2, or 3) assigned to an agent at registration based
on the strength of identity verification. Tier 1 requires DNS-anchored
domain verification and a <tt>.nomo</tt> governed package. Tier 2 is org-asserted
without DNS verification. Tier 3 is experimental, not production-eligible.</t>
        </dd>
        <dt>551 Authority Chain Broken:</dt>
        <dd>
          <t>An AGTP status code returned when one or more entries in the
Delegation-Chain header cannot be verified as part of a valid and
continuous delegation sequence. <strong>MUST</strong> be logged.</t>
        </dd>
      </dl>
    </section>
    <section anchor="agtp-composition-with-agmps">
      <name>AGTP Composition with AGMPs</name>
      <t>This appendix provides normative mapping guidance for carrying AGMP
messages (MCP, A2A, ACP) over AGTP as their transport substrate. Full
composition specifications are provided in <xref target="AGTP-COMPOSITION"/>; this
appendix provides the canonical mapping table and precedence rules.</t>
      <section anchor="precedence-rule">
        <name>Precedence Rule</name>
        <t>AGTP headers (Agent-ID, Principal-ID, Authority-Scope, Delegation-Chain)
take precedence over equivalent fields in the messaging-layer payload for
routing, enforcement, and audit purposes. Infrastructure components including
SEPs and governance gateways <strong>MUST</strong> use AGTP header values for all
protocol-level decisions. Messaging-layer identity fields <strong>MAY</strong> be present
in the body for application-layer use but <strong>MUST NOT</strong> override AGTP header
values.</t>
      </section>
      <section anchor="agmp-to-agtp-canonical-mapping">
        <name>AGMP-to-AGTP Canonical Mapping</name>
        <table>
          <name>AGMP-to-AGTP Canonical Mapping</name>
          <thead>
            <tr>
              <th align="left">AGMP</th>
              <th align="left">Concept</th>
              <th align="left">AGTP Mapping</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Task</td>
              <td align="left">AGTP DELEGATE body; A2A <tt>task.id</tt> maps to Task-ID header</td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Capability</td>
              <td align="left">AGTP DESCRIBE response; <tt>capability_domains</tt></td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Agent Card</td>
              <td align="left">AGTP Agent Manifest Document</td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Provenance chain</td>
              <td align="left">AGTP Delegation-Chain header</td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Artifact</td>
              <td align="left">AGTP NOTIFY body with <tt>content_type: artifact</tt></td>
            </tr>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Tool call</td>
              <td align="left">AGTP QUERY or NOTIFY body</td>
            </tr>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Context / conversation state</td>
              <td align="left">AGTP Session-ID header + LEARN method</td>
            </tr>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Sampling / inference request</td>
              <td align="left">AGTP QUERY with <tt>modality: inference</tt></td>
            </tr>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Resource</td>
              <td align="left">AGTP QUERY with appropriate <tt>scope</tt></td>
            </tr>
            <tr>
              <td align="left">ACP</td>
              <td align="left">Agent-to-agent message</td>
              <td align="left">AGTP NOTIFY or COLLABORATE body</td>
            </tr>
            <tr>
              <td align="left">ACP</td>
              <td align="left">Capability advertisement</td>
              <td align="left">AGTP DESCRIBE response</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="wire-example-a2a-task-over-agtp">
        <name>Wire Example: A2A Task over AGTP</name>
        <artwork><![CDATA[
AGTP/1.0 DELEGATE
Agent-ID: agtp://agtp.acme.tld/agents/orchestrator
Principal-ID: usr-chris-hood
Authority-Scope: agents:delegate documents:query
Delegation-Chain: agtp://agtp.acme.tld/agents/orchestrator
Session-ID: sess-a1b2c3d4
Task-ID: task-0099
Content-Schema: https://a2aprotocol.ai/schema/task/v1
Content-Type: application/agtp+json

{
  "method": "DELEGATE",
  "task_id": "task-0099",
  "parameters": {
    "target_agent_id": "agtp://agtp.acme.tld/agents/analyst",
    "authority_scope": "documents:query",
    "delegation_token": "[signed token]",
    "task": {
      "a2a_task_id": "a2a-task-7f3a",
      "message": "Summarize Q1 financial reports",
      "artifacts": []
    }
  }
}
]]></artwork>
      </section>
      <section anchor="wire-example-mcp-tool-call-over-agtp">
        <name>Wire Example: MCP Tool Call over AGTP</name>
        <artwork><![CDATA[
AGTP/1.0 QUERY
Agent-ID: agtp://agtp.acme.tld/agents/assistant
Principal-ID: usr-chris-hood
Authority-Scope: documents:query knowledge:query
Session-ID: sess-mcp-b2c3d4
Task-ID: task-0100
Content-Schema: https://modelcontextprotocol.io/schema/tool-call/v1
Content-Type: application/agtp+json

{
  "method": "QUERY",
  "task_id": "task-0100",
  "parameters": {
    "intent": "web_search",
    "modality": "tool",
    "mcp_tool_name": "web_search",
    "mcp_tool_input": {"query": "IETF agent protocol drafts 2026"}
  }
}
]]></artwork>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
