<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-hood-agtp-log-01" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="AGTP-LOG">AGTP Transparency Log Protocol</title>

    <author fullname="Chris Hood">
      <organization>Nomotic, Inc.</organization>
      <address>
        <email>chris@nomotic.ai</email>
        <uri>https://nomotic.ai</uri>
      </address>
    </author>

    <date year="2026" month="May" day="20"/>

    <area>Applications and Real-Time</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>AI agents</keyword> <keyword>transparency log</keyword> <keyword>SCITT</keyword> <keyword>agent identity</keyword> <keyword>governance</keyword>

    <abstract>


<?line 76?>

<t>This document specifies the AGTP Transparency Log (AGTP-LOG): the
append-only audit log protocol that underpins the <spanx style="verb">log-anchored</spanx>
Trust Tier 1 verification path defined in <xref target="AGTP"/> and provides the
post-hoc audit infrastructure for AGTP-based agent operations.
AGTP-LOG aligns with <xref target="RFC9162"/> (Certificate Transparency 2.0) as
the verifiable data structure and issues COSE_Sign1 receipts per
<xref target="RFC9943"/> (SCITT) for cross-ecosystem interoperability. This
document also establishes the AGTP Agent Identity Taxonomy (Agent
Genesis, Canonical Agent-ID, Agent Certificate) that <xref target="AGTP"/> v07
normatively adopts. The log protocol defined here covers entry
submission, receipt retrieval, inclusion-proof retrieval,
consistency-proof retrieval, and discovery via the <spanx style="verb">log_uri</spanx> field
of the Agent Genesis. Per-platform logs are the default; the
federation model follows the SCITT cross-witnessing pattern. Witness
and monitor role definitions, full federation procedures, and the
formal entry-acceptance threat model are deferred to a future
revision.</t>

<t>The audit properties AGTP-LOG provides are structural rather than
retrofitted. Statements are signed by the governance platform that
operates the log, not by the agent the statements concern; an agent
cannot forge its own audit trail because it does not control the
log operator's signing key. This architectural separation
distinguishes AGTP-LOG audit infrastructure from approaches that
layer audit data models onto general-purpose substrates where the
audited party participates in writing the audit trail.</t>



    </abstract>



  </front>

  <middle>


<?line 105?>

<section anchor="introduction"><name>Introduction</name>

<t>AGTP v07 recognizes <spanx style="verb">log-anchored</spanx> as one of three equivalent Trust
Tier 1 verification paths defined in <xref target="AGTP-TRUST"/>. This document
specifies the log protocol that path depends on. Earlier draft
material that referred to an inline AGTP Certificate Transparency Log
(AGTP-CTL) in <xref target="AGTP-CERT"/> is superseded by this document. The next
revision of <xref target="AGTP-CERT"/> will reference AGTP-LOG normatively rather
than define its own log.</t>

<t>AGTP-LOG inherits the verifiable data structure of <xref target="RFC9162"/> and
the receipt format of <xref target="RFC9943"/>. This document does not redefine
the cryptographic primitives or the underlying append-only log
construction; it specifies how an AGTP governance platform operates
a log over those primitives, what kinds of statements the log
accepts, how verifiers discover the log, and how AGTP-LOG receipts
are bound to the Agent Identity Document.</t>

<t>The key requirements language follows <xref target="RFC2119"/> and <xref target="RFC8174"/>.</t>

</section>
<section anchor="audit-infrastructure"><name>AGTP-LOG as Audit Infrastructure</name>

<t>AGTP-LOG is the audit infrastructure for AGTP-based agent
operations. Entries committed to the log constitute the post-hoc
record of agent identity events: creation, lifecycle transitions,
and revocation. These records carry the structural properties that
distinguish protocol-layer audit from application-layer audit
logging:</t>

<t><em>Audited party cannot forge own trail.</em> Statements are signed by
the governance platform that issued the Agent Genesis, not by the
agent. An agent does not control the log operator's signing key
and therefore cannot forge, alter, or omit its own audit records.
This is a structural property of the architecture, not a policy
constraint that requires enforcement.</t>

<t><em>Audit records are append-only and tamper-evident.</em> The verifiable
data structure of <xref target="RFC9162"/> guarantees that committed statements
cannot be retroactively altered without breaking the cryptographic
consistency of the log. A log operator that publishes inconsistent
tree heads is detectable by monitors observing the log.</t>

<t><em>Audit records carry cryptographic provenance.</em> Receipts per
<xref target="RFC9943"/> are independently verifiable: a party holding a
Canonical Agent-ID and the corresponding receipt can confirm the
audit record exists in the log without trusting any single party's
assertion that it does.</t>

<t><em>Audit records are bound to wire-level identity.</em> The
<spanx style="verb">agtp-subject</spanx> field of every statement is a Canonical Agent-ID
that ties the audit record to the protocol-level identity used in
every AGTP request. The audit trail and the operational identity
are the same identity, not separately maintained representations
that must be correlated after the fact.</t>

<section anchor="scope-post-hoc-audit"><name>Scope: Post-Hoc Audit</name>

<t>AGTP-LOG addresses post-hoc audit: the recording of what has
happened, after it has happened, in a form that can be verified
later. This is the audit problem regulatory frameworks and
compliance systems typically address.</t>

<t>Pre-commitment intent declaration — recording what an agent
declares it is about to do, before action evaluation, with ordering
guarantees that prevent ex-post fabrication of intent — is a
distinct concern with different threat-model properties. AGTP-LOG
does not address pre-commitment intent declaration. The AGTP
framework treats pre-commitment intent declaration as adjacent
work; see <xref target="related-audit-work"/>.</t>

</section>
<section anchor="regulatory-context"><name>Regulatory Context</name>

<t>Audit infrastructure for agent operations is increasingly subject
to regulatory requirements. The EU AI Act Article 12 requires
automatic recording of events for high-risk AI systems with
cryptographically verifiable provenance. Similar frameworks are
emerging in other jurisdictions, and industry-specific regulations
(financial services, healthcare, aviation, government) add their
own requirements for agent attribution and audit trails.</t>

<t>AGTP-LOG provides the protocol-layer infrastructure these
regulatory frameworks require: tamper-evident records of agent
identity events, signed by accountable governance platforms,
verifiable by independent third parties, bound to the wire-level
identity used in agent operations. AGTP-LOG does not itself
implement any specific regulatory framework; it provides the
audit primitives that compliance systems built on AGTP can use to
satisfy regulatory requirements.</t>

</section>
<section anchor="related-audit-work"><name>Related Audit Work</name>

<t>Multiple parallel efforts in the agent infrastructure space
address adjacent audit concerns. AGTP-LOG positions explicitly
relative to:</t>

<t><em>Pre-commitment intent declaration:</em> <xref target="IDP"/> defines intent
declaration committed to a tamper-evident log before policy
evaluation executes. The ordering guarantee (declaration &lt;
evaluation &lt; execution) is structurally different from AGTP-LOG's
post-hoc recording. AGTP-LOG and pre-commitment intent declaration
are complementary: both can operate against the same governance
platform, recording different categories of agent events.</t>

<t><em>HTTP-based audit data models:</em> Work in progress in the IETF
(e.g., <xref target="AUDIT-ARCH"/>) proposes audit data models layered over
HTTP and existing token formats. AGTP-LOG's architectural
commitment is different: audit is a structural property of the
protocol substrate, not a data model retrofitted onto a substrate
that was not designed for accountability. Both approaches may
coexist for the agent traffic each substrate carries.</t>

<t><em>Transparency standards (SCITT, RFC 9162):</em> AGTP-LOG reuses these
verifiable data structures and receipt formats. AGTP-LOG is a
profile and deployment pattern for SCITT-aligned audit
infrastructure specific to AGTP agent identity events.</t>

</section>
</section>
<section anchor="terminology"><name>Terminology</name>

<section anchor="identity-taxonomy"><name>AGTP Agent Identity Taxonomy</name>

<t>AGTP identity is composed of three distinct elements. This taxonomy
was formalized concurrent with the v07 revision of <xref target="AGTP"/> and is
normatively adopted throughout the AGTP draft family.</t>

<dl>
  <dt>Agent Genesis:</dt>
  <dd>
    <t>The permanent, signed governance-layer document produced at ACTIVATE
time that establishes an agent's identity. The Agent Genesis is the
origin record from which all other identity artifacts derive. It is
issued by the governance platform, signed with the governance
platform's key, and archived on revocation. An Agent Genesis is
never reissued; the identity it establishes is permanent for the
life of the agent.</t>
  </dd>
  <dt>Canonical Agent-ID:</dt>
  <dd>
    <t>A 256-bit cryptographic hash of the Agent Genesis, used as the
agent's identifier in all AGTP protocol operations. The Canonical
Agent-ID is the value carried in the <spanx style="verb">Agent-ID</spanx> header on every
request, the key in the registry, and the subject of transparency
log entries. The Canonical Agent-ID is derived from the Agent
Genesis; it is not an independent value.</t>
  </dd>
  <dt>Agent Certificate:</dt>
  <dd>
    <t>An optional X.509 v3 credential defined in <xref target="AGTP-CERT"/> that binds
the Canonical Agent-ID to TLS mutual authentication for transport-
layer verification and O(1) scope enforcement at Scope-Enforcement
Points. Agent Certificates are renewable and revocable, with a
recommended 90-day validity period. The Agent Certificate is a
derived credential, not an identity substrate; it references the
Agent Genesis via the <spanx style="verb">activation-certificate-id</spanx> extension.</t>
  </dd>
</dl>

<t>The relationship among these three elements:</t>

<figure><artwork><![CDATA[
ACTIVATE (method call)
   │
   ├──produces──►  Agent Genesis (signed JSON document)
   │                    │
   │                    └──hashed to produce──►  Canonical Agent-ID
   │
   └──optionally, for Level 3 deployments──►  Agent Certificate (X.509)
                                                  │
                                                  └──references──►  Agent Genesis
]]></artwork></figure>

</section>
<section anchor="log-specific-terminology"><name>Log-Specific Terminology</name>

<dl>
  <dt>Log:</dt>
  <dd>
    <t>An append-only, tamper-evident record of AGTP-LOG statements
operated by a governance platform. The log implements the
verifiable data structure of <xref target="RFC9162"/> and issues SCITT
receipts per <xref target="RFC9943"/>.</t>
  </dd>
  <dt>Log Operator:</dt>
  <dd>
    <t>The party that operates a log. In this revision the log operator
is normatively the governance platform that issued the Agent
Genesis statements committed to the log. Future revisions <strong>MAY</strong>
permit log operation to be delegated to a separate entity.</t>
  </dd>
  <dt>Statement:</dt>
  <dd>
    <t>A single AGTP-LOG entry: a signed assertion by a log operator
about an agent identity event. Each statement has an event type,
subject, payload, issuer, and signature. See <xref target="entry-format"/>.</t>
  </dd>
  <dt>Receipt:</dt>
  <dd>
    <t>A COSE_Sign1 envelope per <xref target="RFC9943"/> issued by a log against a
statement, attesting that the statement has been committed to the
log. The receipt is the consumable proof for verifiers. See
<xref target="receipt-format"/>.</t>
  </dd>
  <dt>Inclusion Proof:</dt>
  <dd>
    <t>A cryptographic proof per <xref target="RFC9162"/> demonstrating that a given
statement is present at a specific position in the log's tree
structure. Embedded within a receipt or retrievable independently
via the log protocol.</t>
  </dd>
  <dt>Consistency Proof:</dt>
  <dd>
    <t>A cryptographic proof per <xref target="RFC9162"/> demonstrating that two
signed tree heads at different sizes are consistent (the smaller
tree is a prefix of the larger). Used by monitors to detect
split-view attacks.</t>
  </dd>
  <dt>Signed Tree Head (STH):</dt>
  <dd>
    <t>The log operator's signed assertion of the current tree size and
root hash per <xref target="RFC9162"/> Section 4.10.</t>
  </dd>
  <dt>Witness:</dt>
  <dd>
    <t>A third party that countersigns the log's signed tree heads to
attest that it has observed the log in a consistent state. The
witness role is defined informally here and normatively specified
in a future revision; see <xref target="open-items"/>.</t>
  </dd>
  <dt>Monitor:</dt>
  <dd>
    <t>A party that polls the log's STHs and consistency proofs to detect
split-view attacks or operator misbehavior. The monitor role is
defined informally here and normatively specified in a future
revision; see <xref target="open-items"/>.</t>
  </dd>
  <dt>Verifier:</dt>
  <dd>
    <t>A consumer of an AGTP-LOG receipt that confirms a given Agent
Genesis is committed to a log. Any party holding a Canonical
Agent-ID and a <spanx style="verb">log_uri</spanx> can act as a verifier.</t>
  </dd>
</dl>

</section>
</section>
<section anchor="log-scope"><name>Log Scope</name>

<t>A log <strong>MUST</strong> accept statements for at least the following five
AGTP-LOG event types. The event type is recorded in the statement
envelope (see <xref target="entry-format"/>).</t>

<texttable title="AGTP-LOG Event Types">
      <ttcol align='left'>Event Type</ttcol>
      <ttcol align='left'>Triggered By</ttcol>
      <ttcol align='left'>Subject</ttcol>
      <c><spanx style="verb">agent-genesis-issued</spanx></c>
      <c>ACTIVATE method completion</c>
      <c>Canonical Agent-ID derived from the new Agent Genesis</c>
      <c><spanx style="verb">agent-genesis-revoked</spanx></c>
      <c>REVOKE method completion</c>
      <c>Canonical Agent-ID being retired</c>
      <c><spanx style="verb">agent-lifecycle-suspended</spanx></c>
      <c>SUSPEND method completion</c>
      <c>Canonical Agent-ID entering Suspended state</c>
      <c><spanx style="verb">agent-lifecycle-reinstated</spanx></c>
      <c>REINSTATE method completion</c>
      <c>Canonical Agent-ID returning to Active state</c>
      <c><spanx style="verb">agent-lifecycle-deprecated</spanx></c>
      <c>DEPRECATE method completion</c>
      <c>Canonical Agent-ID entering Deprecated state</c>
</texttable>

<t>The above five event types form the initial AGTP-LOG event-type
registry (see <xref target="future-registries"/>). Future event types <strong>MAY</strong>
be registered as new operational categories arise without requiring
revision of this document.</t>

<t>Implementations <strong>MAY</strong> log additional event types beyond the above
five. Agent Certificate issuance and revocation events, defined in
<xref target="AGTP-CERT"/>, are explicit candidates: a deployment that operates
both AGTP-LOG and an Agent Certificate authority <strong>MAY</strong> log
certificate-lifecycle events to the same log. Whether a deployment
logs certificate events is a deployment decision; logging them is
<strong>NOT</strong> required by this document. When logged, the event types
<strong>MUST</strong> be registered in the AGTP-LOG event-type registry; ad-hoc
event-type strings <strong>MUST NOT</strong> be admitted.</t>

<t>Statements <strong>MUST NOT</strong> carry secret material. The Agent Genesis is
public by design; the Canonical Agent-ID is derived from a public
hash; lifecycle states are operational facts. A log operator that
finds itself wanting to commit a secret to the log is misusing the
protocol.</t>

</section>
<section anchor="log-architecture"><name>Log Architecture</name>

<section anchor="per-platform-logs-default"><name>Per-Platform Logs (Default)</name>

<t>Each AGTP governance platform <strong>MUST</strong> operate a log if it issues
Agent Genesis statements with <spanx style="verb">verification_path: log-anchored</spanx>.
The governance platform is the log operator. Statements committed
to the log are signed by the governance platform's key as recorded
in the Agent Genesis <spanx style="verb">issuer</spanx> field.</t>

<t>A governance platform operating a log advertises the log's URI in
the <spanx style="verb">log_uri</spanx> field of every Agent Genesis it produces under the
log-anchored path. See <xref target="discovery"/>.</t>

<t>Per-platform logs follow the SCITT issuer-local convention: each
issuer commits its own statements to its own log, signed with its
own key, with receipts referencing that issuer's identity. This
matches typical deployment patterns and minimizes operational
coupling between governance platforms.</t>

</section>
<section anchor="federation-via-cross-witnessing"><name>Federation via Cross-Witnessing</name>

<t>When a deployment requires that statements from one governance
platform be verifiable by participants who do not implicitly trust
that platform's log operator, the platform <strong>MAY</strong> invite a witness
to countersign its signed tree heads. The witness adds a second
signature over the STH, attesting that the witness has observed the
log in a consistent state at that tree size.</t>

<t>The cross-witnessing model preserves per-platform log operation
while introducing third-party attestation. A verifier presented
with an Agent Genesis from platform A and the corresponding receipt
<strong>MAY</strong> require the STH to be countersigned by a witness whose key
the verifier trusts before accepting the inclusion proof.</t>

<t>The witness protocol, witness selection, witness key publication,
and the schema of countersigned STHs are deferred to a future
revision per <xref target="open-items"/>.</t>

</section>
</section>
<section anchor="entry-format"><name>Entry Format</name>

<t>Every statement is a SCITT-aligned signed envelope per <xref target="RFC9943"/>.
The envelope is a COSE_Sign1 structure per <xref target="RFC9052"/> containing
the following protected and unprotected header parameters and
payload.</t>

<t>The protected header <strong>MUST</strong> carry:</t>

<texttable title="AGTP-LOG Statement Protected Header">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>CBOR Label</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c><spanx style="verb">alg</spanx></c>
      <c>1</c>
      <c>Signing algorithm. <strong>MUST</strong> be <spanx style="verb">ES256</spanx> (-7), <spanx style="verb">ES384</spanx> (-35), <spanx style="verb">ES512</spanx> (-36), or <spanx style="verb">EdDSA</spanx> (-8).</c>
      <c><spanx style="verb">kid</spanx></c>
      <c>4</c>
      <c>Key identifier of the log operator's signing key (governance platform key).</c>
      <c><spanx style="verb">cty</spanx></c>
      <c>3</c>
      <c>Content type. <strong>MUST</strong> be <spanx style="verb">application/agtp-log-statement+cbor</spanx>.</c>
      <c><spanx style="verb">agtp-event-type</spanx></c>
      <c>TBD</c>
      <c>One of the event-type strings registered in the AGTP-LOG event-type registry.</c>
      <c><spanx style="verb">agtp-subject</spanx></c>
      <c>TBD</c>
      <c>Canonical Agent-ID, encoded as a 32-byte CBOR byte string.</c>
      <c><spanx style="verb">agtp-issuer</spanx></c>
      <c>TBD</c>
      <c>URI of the governance platform issuing this statement.</c>
      <c><spanx style="verb">agtp-issued-at</spanx></c>
      <c>TBD</c>
      <c>Statement issuance time as an RFC 3339 timestamp.</c>
</texttable>

<t>The unprotected header <strong>MAY</strong> carry implementation-specific
parameters; verifiers <strong>MUST</strong> ignore unprotected parameters not
recognized.</t>

<t>The payload <strong>MUST</strong> be a CBOR-encoded map whose contents depend on
the event type:</t>

<t>For <spanx style="verb">agent-genesis-issued</spanx>:</t>

<figure><artwork><![CDATA[
{
  "agent-genesis": <bytes>,             ; the canonical CBOR-encoded
                                         ; Agent Genesis document
  "log-position": <uint>,                ; assigned by log operator
                                         ; on entry commit
  "previous-tree-size": <uint>           ; tree size before this entry
}
]]></artwork></figure>

<t>For <spanx style="verb">agent-genesis-revoked</spanx>, <spanx style="verb">agent-lifecycle-suspended</spanx>,
<spanx style="verb">agent-lifecycle-reinstated</spanx>, and <spanx style="verb">agent-lifecycle-deprecated</spanx>:</t>

<figure><artwork><![CDATA[
{
  "lifecycle-event": <text>,             ; matches event-type
  "reason": <text>,                      ; operator-supplied reason
  "previous-state": <text>,              ; lifecycle state prior to event
  "new-state": <text>,                   ; lifecycle state after event
  "log-position": <uint>,
  "previous-tree-size": <uint>
}
]]></artwork></figure>

<t>The CBOR encoding <strong>MUST</strong> be deterministic per <xref target="RFC8949"/>
Section 4.2 (Canonical CBOR). The signature is computed over the
COSE_Sign1 <spanx style="verb">Sig_structure</spanx> per <xref target="RFC9052"/> Section 4.4.</t>

<t>A statement is accepted into the log only after the log operator
has verified:</t>

<t><list style="numbers" type="1">
  <t>The signature is valid against the log operator's published key.</t>
  <t>The <spanx style="verb">agtp-issuer</spanx> URI matches the log operator's identity.</t>
  <t>The <spanx style="verb">agtp-subject</spanx> is a well-formed 32-byte Canonical Agent-ID.</t>
  <t>The <spanx style="verb">agtp-event-type</spanx> is registered in the AGTP-LOG event-type
registry.</t>
  <t>The payload structure conforms to the schema for the declared
event type.</t>
  <t>For <spanx style="verb">agent-genesis-issued</spanx>, the hash of the embedded Agent
Genesis matches the <spanx style="verb">agtp-subject</spanx> byte for byte.</t>
</list></t>

<t>Statements failing any of these checks <strong>MUST NOT</strong> be appended to
the log. The log operator <strong>MUST</strong> record the rejection in its
operational logs but <strong>MUST NOT</strong> commit the rejected statement to
the verifiable tree.</t>

</section>
<section anchor="receipt-format"><name>Receipt Format</name>

<t>A receipt is a COSE_Sign1 envelope per <xref target="RFC9943"/> attesting that
a statement has been committed to the log. Receipts are the
consumable proof for AGTP verifiers.</t>

<t>The receipt's content type is <spanx style="verb">application/scitt-receipt+cose</spanx> per
<xref target="RFC9943"/>. The receipt's payload references the statement's
position in the log and embeds an inclusion proof against a signed
tree head.</t>

<t>The protected header <strong>MUST</strong> carry:</t>

<texttable title="AGTP-LOG Receipt Protected Header">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>CBOR Label</ttcol>
      <ttcol align='left'>Value</ttcol>
      <c><spanx style="verb">alg</spanx></c>
      <c>1</c>
      <c>Signing algorithm; same constraint as statement signing.</c>
      <c><spanx style="verb">kid</spanx></c>
      <c>4</c>
      <c>Key identifier of the log operator's signing key.</c>
      <c><spanx style="verb">cty</spanx></c>
      <c>3</c>
      <c>Content type. <strong>MUST</strong> be <spanx style="verb">application/scitt-receipt+cose</spanx>.</c>
      <c><spanx style="verb">verifiable-data-structure</spanx></c>
      <c>TBD</c>
      <c><strong>MUST</strong> be <spanx style="verb">RFC9162_SHA256</spanx> per <xref target="RFC9162"/>.</c>
      <c><spanx style="verb">agtp-statement-position</spanx></c>
      <c>TBD</c>
      <c>The log position (zero-indexed) of the committed statement.</c>
      <c><spanx style="verb">agtp-statement-hash</spanx></c>
      <c>TBD</c>
      <c>SHA-256 hash of the canonical CBOR-encoded statement.</c>
      <c><spanx style="verb">agtp-signed-tree-head</spanx></c>
      <c>TBD</c>
      <c>The STH the inclusion proof attests against.</c>
</texttable>

<t>The payload <strong>MUST</strong> be a CBOR-encoded map carrying the inclusion
proof:</t>

<figure><artwork><![CDATA[
{
  "tree-size": <uint>,                   ; STH tree size
  "leaf-index": <uint>,                  ; position of statement
  "audit-path": [<bytes>, <bytes>, ...]  ; Merkle audit path per RFC 9162
}
]]></artwork></figure>

<t>Receipts <strong>MUST</strong> be retrievable by any party that holds the
Canonical Agent-ID and the <spanx style="verb">log_uri</spanx>. The receipt <strong>MUST NOT</strong>
contain the statement itself; verifiers requiring the statement
<strong>MUST</strong> retrieve it separately. This separation keeps receipts
small enough to embed in the Agent Genesis (<spanx style="verb">log_inclusion_proof</spanx>
field) without bloating the Agent Identity Document.</t>

<t>The receipt for an <spanx style="verb">agent-genesis-issued</spanx> event <strong>MUST</strong> be embedded
in the Agent Genesis's <spanx style="verb">log_inclusion_proof</spanx> field at the moment the
Agent Genesis is finalized. The governance platform commits the
statement to the log, retrieves the resulting receipt, embeds the
receipt in the Agent Genesis, and only then signs the Agent Genesis
and computes the Canonical Agent-ID. This ordering ensures the
Canonical Agent-ID hashes a document containing its own inclusion
proof.</t>

</section>
<section anchor="log-protocol"><name>Log Protocol</name>

<t>The log operator exposes four operations to clients. All operations
<strong>MUST</strong> be available over HTTPS at paths relative to the log's
base URI (the <spanx style="verb">log_uri</spanx> value advertised in the Agent Genesis).
Implementations <strong>SHOULD</strong> also expose these operations over AGTP
at the same logical paths once AGTP transport bindings are stable.</t>

<section anchor="submit-statement"><name>Submit Statement</name>

<t><spanx style="verb">POST {log_uri}/statements</spanx></t>

<t>Request body: a single COSE_Sign1 statement per <xref target="entry-format"/>.
Content-Type <spanx style="verb">application/agtp-log-statement+cose</spanx>.</t>

<t>Response on success: HTTP 201 with the resulting receipt per
<xref target="receipt-format"/>. Content-Type <spanx style="verb">application/scitt-receipt+cose</spanx>.</t>

<t>Response on signature failure: HTTP 400 with body indicating
which validation step failed (signature, issuer match, subject
format, event type, payload schema, or genesis hash mismatch).</t>

<t>Submission is normatively restricted to the log operator itself:
external parties <strong>MUST NOT</strong> be able to submit statements directly.
The log operator validates and signs internally, then commits. This
preserves the log's role as an attestation of the operator's own
governance decisions.</t>

</section>
<section anchor="retrieve-receipt"><name>Retrieve Receipt</name>

<t><spanx style="verb">GET {log_uri}/receipts/{statement-hash}</spanx></t>

<t>Path parameter: hex-encoded SHA-256 hash of the canonical CBOR
statement.</t>

<t>Response on success: HTTP 200 with the receipt per
<xref target="receipt-format"/>.</t>

<t>Response on miss: HTTP 404 with body indicating whether the hash is
unknown to this log or refers to a statement that has not yet been
committed.</t>

</section>
<section anchor="retrieve-inclusion-proof"><name>Retrieve Inclusion Proof</name>

<t><spanx style="verb">GET {log_uri}/proofs/inclusion?leaf-index={index}&amp;tree-size={size}</spanx></t>

<t>Query parameters:</t>

<t><list style="symbols">
  <t><spanx style="verb">leaf-index</spanx>: the position of the statement (zero-indexed)</t>
  <t><spanx style="verb">tree-size</spanx>: the STH tree size against which the proof is computed</t>
</list></t>

<t>Response on success: HTTP 200 with a CBOR-encoded inclusion proof
per <xref target="RFC9162"/> Section 4.11. The proof is the audit path; the
caller is responsible for verifying it against the STH at the
requested tree size.</t>

<t>This operation duplicates information already in receipts; it
exists for clients that hold a position and need a fresh proof
against a different STH than the one originally bound in the
receipt.</t>

</section>
<section anchor="retrieve-consistency-proof"><name>Retrieve Consistency Proof</name>

<t><spanx style="verb">GET {log_uri}/proofs/consistency?first-tree-size={n}&amp;second-tree-size={m}</spanx></t>

<t>Query parameters:</t>

<t><list style="symbols">
  <t><spanx style="verb">first-tree-size</spanx>: the smaller tree size</t>
  <t><spanx style="verb">second-tree-size</spanx>: the larger tree size</t>
</list></t>

<t>Response on success: HTTP 200 with a CBOR-encoded consistency proof
per <xref target="RFC9162"/> Section 4.12. The proof attests that the tree at
size <spanx style="verb">n</spanx> is a prefix of the tree at size <spanx style="verb">m</spanx>.</t>

<t>Used by monitors to detect split-view attacks. A monitor that
observes two different signed tree heads from the same log
operator at the same tree size <strong>MUST</strong> treat that as evidence of
operator misbehavior.</t>

</section>
<section anchor="retrieve-signed-tree-head"><name>Retrieve Signed Tree Head</name>

<t><spanx style="verb">GET {log_uri}/sth</spanx></t>

<t>Response on success: HTTP 200 with the current STH per <xref target="RFC9162"/>
Section 4.10. The response is a CBOR-encoded structure carrying
tree size, root hash, timestamp, and the log operator's signature
over those fields.</t>

<t>The STH is the anchor for all inclusion and consistency proofs
issued by the log. Verifiers <strong>MUST</strong> retrieve and cache the STH
before validating any proof.</t>

</section>
</section>
<section anchor="discovery"><name>Discovery</name>

<t>A verifier holding a Canonical Agent-ID locates the log containing
the relevant inclusion proof via the <spanx style="verb">log_uri</spanx> field of the Agent
Genesis. This document proposes <spanx style="verb">log_uri</spanx> as a new field to be
added to the Agent Identity Document schema defined in <xref target="AGTP"/>;
adoption of the field is anticipated in a future revision of
<xref target="AGTP"/>, coordinated with the publication of this document.</t>

<t>The <spanx style="verb">log_uri</spanx> field, once adopted, carries an absolute HTTPS URI
pointing to the base of the log's protocol surface. All log
protocol operations defined in this document are exposed at paths
relative to this URI.</t>

<t>A verifier that has retrieved an Agent Genesis (whether via
canonical Agent-ID resolution per <xref target="AGTP"/>, via the AGTP DISCOVER
method, or via any other means) <strong>MUST</strong>:</t>

<t><list style="numbers" type="1">
  <t>Read the <spanx style="verb">log_uri</spanx> field.</t>
  <t>Validate that the URI uses the <spanx style="verb">https://</spanx> scheme.</t>
  <t>Open a TLS connection to the log endpoint.</t>
  <t>Retrieve the STH, verify its signature against the governance
platform's published key.</t>
  <t>Retrieve the inclusion proof for the Agent Genesis (either by
parsing the embedded <spanx style="verb">log_inclusion_proof</spanx> receipt or by
requesting a fresh proof from the log).</t>
  <t>Verify the inclusion proof against the STH.</t>
</list></t>

<t>If the <spanx style="verb">log_uri</spanx> field is absent from an Agent Genesis whose
<spanx style="verb">verification_path</spanx> is <spanx style="verb">log-anchored</spanx>, the Agent Genesis is
<strong>malformed</strong> and the verifier <strong>MUST</strong> reject the agent identity.</t>

<t>If the <spanx style="verb">log_uri</spanx> is present but the log is unreachable at
verification time, the verifier <strong>MAY</strong> fall back to the cached
inclusion proof embedded in the Agent Genesis's
<spanx style="verb">log_inclusion_proof</spanx> field if such a cached proof exists and
remains valid against the verifier's last-known good STH.</t>

<t>Until the <spanx style="verb">log_uri</spanx> field is adopted into <xref target="AGTP"/>, implementations
<strong>MAY</strong> convey the log URI through other means: as an out-of-band
configuration value keyed on the governance platform's <spanx style="verb">issuer</spanx>
URL, or as a well-known location relative to <spanx style="verb">issuer</spanx> (e.g.,
<spanx style="verb">{issuer}/log</spanx>). These mechanisms are deployment-specific and
<strong>MUST NOT</strong> be relied on for cross-platform interoperability. The
normative discovery mechanism is the <spanx style="verb">log_uri</spanx> field once adopted.</t>

<t>A well-known URI discovery mechanism (e.g.,
<spanx style="verb">/.well-known/agtp-log</spanx>) is not specified in this revision. AGTP
v07 does not currently define any well-known URI conventions, and
introducing one solely for AGTP-LOG discovery is premature. Future
revisions of AGTP-LOG <strong>MAY</strong> define a well-known discovery path
if the broader AGTP family adopts well-known URI conventions.</t>

</section>
<section anchor="integration-with-agtp"><name>Integration with AGTP</name>

<t>The <spanx style="verb">log_inclusion_proof</spanx> field defined in the Agent Identity
Document of <xref target="AGTP"/> v07 references the inclusion proof produced by
this log. A verifier retrieves the proof, validates it against the
log's signed tree head, and confirms the Agent Genesis is committed
to the log.</t>

<t>The <spanx style="verb">verification_path: log-anchored</spanx> value defined in <xref target="AGTP-TRUST"/>
indicates that the agent's Trust Tier 1 verification depends on a
log-committed Agent Genesis. Verifiers consuming such an agent
<strong>MUST</strong> perform the inclusion-proof verification described in
<xref target="discovery"/> before granting Authority-Scope decisions on the
agent's behalf.</t>

<t>The <spanx style="verb">log_uri</spanx> field is proposed by this document as an addition to
the Agent Identity Document defined in <xref target="AGTP"/>. Its adoption is
anticipated in a future revision of <xref target="AGTP"/>, coordinated with the
publication of this document. Until adoption, deployments <strong>MAY</strong>
convey log location through the alternative mechanisms described
in <xref target="discovery"/>.</t>

</section>
<section anchor="security"><name>Security Considerations</name>

<section anchor="audited-party-forgery"><name>Audited Party Forgery</name>

<t>A common threat model for audit systems is the audited party
forging, altering, or omitting their own audit records. AGTP-LOG
addresses this structurally rather than through policy controls.</t>

<t>Statements in AGTP-LOG are signed by the governance platform that
operates the log, not by the agent the statements concern. The
agent does not control the log operator's signing key. An agent
cannot:</t>

<t><list style="symbols">
  <t>Forge a statement attributing actions to a different agent
identity (statements bind to <spanx style="verb">agtp-subject</spanx> and are signed by the
log operator)</t>
  <t>Omit an event from its own audit trail (commit decisions are made
by the log operator, not by the agent)</t>
  <t>Alter a committed statement after the fact (the verifiable data
structure of <xref target="RFC9162"/> prevents retroactive modification
without breaking tree consistency)</t>
  <t>Replace its audit history with a forged sequence (statements are
identified by position in an append-only log; replacing history
is detectable by monitors observing the log)</t>
</list></t>

<t>The threat shifts to compromising the governance platform itself
(<xref target="log-operator-compromise"/>) rather than compromising the agent.
This is a higher bar architecturally: the governance platform's
signing key is a long-lived infrastructure credential typically
protected with hardware security modules and key ceremonies, while
agent credentials may be more numerous and shorter-lived.</t>

<t>This structural property distinguishes AGTP-LOG from audit
approaches where the audited party participates in writing the
audit trail. In application-layer audit logging on HTTP-based
substrates, an agent or its operator typically generates audit
records about its own behavior; ensuring those records cannot be
altered by the audited party requires additional cryptographic
machinery layered on top of the substrate. In AGTP-LOG, the
separation is built into the protocol architecture.</t>

</section>
<section anchor="log-operator-compromise"><name>Log Operator Compromise</name>

<t>The log operator is also the issuer of statements in the AGTP-LOG
model in this revision. A compromised log operator could:</t>

<t><list style="symbols">
  <t>Sign a fraudulent Agent Genesis for an Agent-ID it does not
control, commit it to the log, and present the resulting receipt
as proof of a non-existent agent's existence.</t>
  <t>Refuse to commit valid statements, denying agents legitimate
Trust Tier 1 standing.</t>
  <t>Backdate statements by manipulating its internal clock prior to
signing.</t>
  <t>Operate two parallel logs presenting different signed tree heads
to different verifiers (a split-view attack).</t>
</list></t>

<t>The first three threats are inherent to any single-issuer log model
and are partially mitigated by the witness mechanism (deferred to a
future revision) and by external monitors that detect inconsistency.
The split-view attack is specifically detectable via the consistency
proof operation: a monitor that observes a second STH at the same
tree size as a previously-observed STH from the same operator
<strong>MUST</strong> treat the divergence as evidence of compromise.</t>

<t>Deployments that require defense against log operator compromise
<strong>SHOULD</strong> require witness countersignatures on STHs (when a future revision
specifies the witness protocol) and <strong>SHOULD</strong> subscribe to
independent monitors that surface inconsistency evidence.</t>

</section>
<section anchor="witness-collusion"><name>Witness Collusion</name>

<t>In a future revision incorporating witnesses, two or more witnesses
colluding with a malicious log operator could countersign
inconsistent STHs. This threat is structurally identical to log
operator compromise from the verifier's perspective: the verifier
trusts the witness set, and a colluding witness set is no better
than a colluding operator. Mitigations are deferred to a future revision along
with the witness protocol itself.</t>

</section>
<section anchor="private-key-handling"><name>Private Key Handling</name>

<t>The log operator's signing key is the root of all trust in
AGTP-LOG. Operators <strong>MUST</strong> protect this key with controls
appropriate to a long-lived signing identity: hardware security
modules, key ceremonies for key generation and rotation, and
documented operational procedures for key recovery.</t>

<t>Key rotation procedures and the binding of historical STHs to
retired keys are not specified in this revision; see
<xref target="open-items"/>.</t>

</section>
<section anchor="statement-privacy"><name>Statement Privacy</name>

<t>Statements in AGTP-LOG are public by design. The Agent Genesis
itself is published as the canonical identity record of an agent;
the lifecycle events that follow it are operational facts. AGTP-LOG
is not a confidential audit log.</t>

<t>Operators <strong>MUST NOT</strong> commit statements containing secrets,
operational credentials, or other sensitive material. The validation
gates in <xref target="entry-format"/> are insufficient to filter privacy
violations; preventing privacy leaks in statement payloads is the
operator's responsibility.</t>

</section>
<section anchor="replay-and-statement-substitution"><name>Replay and Statement Substitution</name>

<t>A statement signed by a valid log operator and committed to a log
is durable: the log operator cannot retroactively replace it
without breaking the consistency property of the tree. However,
duplicate submissions of the same logical statement at different
positions are not prevented by the protocol; the log operator
<strong>SHOULD</strong> deduplicate statements before commit, using the
canonical CBOR encoding as the deduplication key.</t>

</section>
<section anchor="threat-model-reference"><name>Threat Model Reference</name>

<t>The full Trust Tier 1 threat model is specified in <xref target="AGTP"/>
Section 7 and <xref target="AGTP-TRUST"/>. AGTP-LOG is one of three equivalent
verification paths; the threat model considers attacks against the
log-anchored path within the broader context of <spanx style="verb">dns-anchored</spanx> and
<spanx style="verb">hybrid</spanx> alternatives.</t>

</section>
</section>
<section anchor="future-registries"><name>Future Registry Considerations</name>

<t>The AGTP family includes several constructs (status codes, header
fields, identity document fields, method names, media types) whose
long-term stewardship will require coordinated management once the
ecosystem matures. Several of these constructs are AGTP-specific
and have no current home in existing standards-body registries. The
appropriate venue for AGTP registry stewardship — IANA, an AGTP
governance forum, a foundation, or some combination — is an open
question for the broader AGTP family and is not decided in this
document.</t>

<t>This section enumerates the registry-shaped artifacts AGTP-LOG
defines, so that whichever stewardship model the AGTP family
eventually adopts has a clear inventory of what AGTP-LOG
contributes. No commitment to any specific registry venue is made
by this document.</t>

<section anchor="agtp-log-event-types"><name>AGTP-LOG Event Types</name>

<t>The five event types defined in this revision form an extensible event-type set:</t>

<texttable title="AGTP-LOG Event Types Registry">
      <ttcol align='left'>Event Type</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c><spanx style="verb">agent-genesis-issued</spanx></c>
      <c>This document, <xref target="log-scope"/></c>
      <c><spanx style="verb">agent-genesis-revoked</spanx></c>
      <c>This document, <xref target="log-scope"/></c>
      <c><spanx style="verb">agent-lifecycle-suspended</spanx></c>
      <c>This document, <xref target="log-scope"/></c>
      <c><spanx style="verb">agent-lifecycle-reinstated</spanx></c>
      <c>This document, <xref target="log-scope"/></c>
      <c><spanx style="verb">agent-lifecycle-deprecated</spanx></c>
      <c>This document, <xref target="log-scope"/></c>
</texttable>

<t>New event types <strong>MUST</strong> be defined in a published specification
that describes the triggering condition, subject, payload schema,
and the validation rules a log operator applies before commit.
Implementers introducing event types prior to a formal registry
process <strong>SHOULD</strong> prefix experimental types with <spanx style="verb">x-</spanx> to avoid
namespace collisions with future registered types.</t>

</section>
<section anchor="media-types"><name>Media Types</name>

<t>This document defines two media types for AGTP-LOG message
serialization:</t>

<dl>
  <dt><spanx style="verb">application/agtp-log-statement+cose</spanx></dt>
  <dd>
    <t>AGTP-LOG statement envelope (COSE_Sign1 per <xref target="RFC9052"/>).</t>
  </dd>
  <dt><spanx style="verb">application/agtp-log-statement+cbor</spanx></dt>
  <dd>
    <t>AGTP-LOG statement payload (CBOR, deterministic encoding per
<xref target="RFC8949"/> Section 4.2). Used as the payload of the COSE_Sign1
envelope.</t>
  </dd>
</dl>

<t>The SCITT receipt media type <spanx style="verb">application/scitt-receipt+cose</spanx> is
defined in <xref target="RFC9943"/> and reused without redefinition.</t>

</section>
<section anchor="cose-header-parameters"><name>COSE Header Parameters</name>

<t>The following protected-header parameter names are introduced by
this document. CBOR label assignments are not made by this
document; implementations prior to a formal registry process
<strong>SHOULD</strong> use string-form labels in the protected header rather
than numeric labels, and <strong>MUST</strong> document their string-to-numeric
mapping for downstream tooling.</t>

<texttable title="AGTP-LOG Protected Header Parameter Names">
      <ttcol align='left'>Parameter Name</ttcol>
      <ttcol align='left'>Use</ttcol>
      <c><spanx style="verb">agtp-event-type</spanx></c>
      <c>Event type string for the AGTP-LOG statement.</c>
      <c><spanx style="verb">agtp-subject</spanx></c>
      <c>Canonical Agent-ID (32 bytes) the statement concerns.</c>
      <c><spanx style="verb">agtp-issuer</spanx></c>
      <c>Governance platform URI signing the statement.</c>
      <c><spanx style="verb">agtp-issued-at</spanx></c>
      <c>Issuance timestamp per RFC 3339.</c>
      <c><spanx style="verb">verifiable-data-structure</spanx></c>
      <c>Receipt parameter; <strong>MUST</strong> be <spanx style="verb">RFC9162_SHA256</spanx>.</c>
      <c><spanx style="verb">agtp-statement-position</spanx></c>
      <c>Log position of the statement the receipt covers.</c>
      <c><spanx style="verb">agtp-statement-hash</spanx></c>
      <c>SHA-256 of the canonical statement encoding.</c>
      <c><spanx style="verb">agtp-signed-tree-head</spanx></c>
      <c>The STH the receipt attests against.</c>
</texttable>

</section>
<section anchor="identity-document-field"><name>Identity Document Field</name>

<t>The <spanx style="verb">log_uri</spanx> field defined in <xref target="discovery"/> is proposed as an
addition to the Agent Identity Document defined in <xref target="AGTP"/>. Its
adoption is anticipated in a future revision of <xref target="AGTP"/> and will
be reflected in whichever field-management mechanism the AGTP
family adopts for the Agent Identity Document schema.</t>

</section>
</section>
<section anchor="open-items"><name>Open Items</name>

<t>The following items are explicitly out of scope for this revision
and are anticipated in future revisions:</t>

<t><list style="symbols">
  <t><strong>Witness protocol.</strong> Witness selection, key publication,
countersigned STH schema, witness inclusion in receipts, and the
failure modes when witness signatures are inconsistent.</t>
  <t><strong>Monitor role.</strong> Formal monitor specification: polling cadence,
consistency-proof retention, split-view reporting protocol, and
monitor discoverability.</t>
  <t><strong>Federation across governance platforms.</strong> Cross-platform agent
identity resolution when multiple governance platforms operate
independent logs and an agent originates from one but is invoked
via another. This revision assumes per-platform isolation.</t>
  <t><strong>Key rotation.</strong> Procedures for rotating the log operator's
signing key, binding historical STHs to retired keys, and
ensuring older inclusion proofs remain verifiable across key
rotations.</t>
  <t><strong>Log operator delegation.</strong> Whether and how a governance
platform may delegate log operation to a separate entity while
preserving the issuer-equals-operator property.</t>
  <t><strong>Statement deduplication.</strong> A normative deduplication algorithm
that is robust to byte-level variations in CBOR encoding (the
protocol currently relies on deterministic encoding to make this
tractable).</t>
  <t><strong>Discovery via well-known URI.</strong> Specification of a well-known
discovery endpoint per <xref target="RFC8615"/> once the broader AGTP family
adopts well-known URI conventions.</t>
  <t><strong>CBOR label assignments for AGTP-LOG header parameters.</strong> The
table in <xref target="future-registries"/> marks these as TBD pending the
outcome of AGTP family registry stewardship decisions. Until
numeric labels are assigned, implementations <strong>SHOULD</strong> use the
string-form parameter names and document their string-to-numeric
mapping for downstream tooling.</t>
  <t><strong>Registry stewardship venue.</strong> Whether AGTP-LOG registries
(event types, media types, header parameters, identity document
fields) are stewarded through IANA, an AGTP governance forum, or
another mechanism is an open question for the AGTP family. This
document enumerates the registry-shaped artifacts it contributes
without committing to a venue.</t>
</list></t>

</section>
<section anchor="contributors"><name>Contributors</name>

<t>Feedback from Scott Courtney (GoDaddy / ANS) on SCITT alignment and
production deployment considerations informed this draft. The
event-type registry structure follows the SCITT philosophy of
deterministic CBOR statement envelopes with externally-managed
event-type names, allowing the AGTP ecosystem to add new event
categories without spec revisions.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC8949">
  <front>
    <title>Concise Binary Object Representation (CBOR)</title>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="December" year="2020"/>
    <abstract>
      <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
      <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="94"/>
  <seriesInfo name="RFC" value="8949"/>
  <seriesInfo name="DOI" value="10.17487/RFC8949"/>
</reference>

<reference anchor="RFC9052">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
      <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="96"/>
  <seriesInfo name="RFC" value="9052"/>
  <seriesInfo name="DOI" value="10.17487/RFC9052"/>
</reference>

<reference anchor="RFC9162">
  <front>
    <title>Certificate Transparency Version 2.0</title>
    <author fullname="B. Laurie" initials="B." surname="Laurie"/>
    <author fullname="E. Messeri" initials="E." surname="Messeri"/>
    <author fullname="R. Stradling" initials="R." surname="Stradling"/>
    <date month="December" year="2021"/>
    <abstract>
      <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
      <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
      <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9162"/>
  <seriesInfo name="DOI" value="10.17487/RFC9162"/>
</reference>

<reference anchor="RFC9943" target="https://www.rfc-editor.org/info/rfc9943">
  <front>
    <title>An Architecture for Trustworthy and Transparent Digital Supply Chains (SCITT)</title>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <author fullname="D. Cooley" initials="D." surname="Cooley"/>
    <author fullname="A. Delignat-Lavaud" initials="A." surname="Delignat-Lavaud"/>
    <author fullname="C. Fournet" initials="C." surname="Fournet"/>
    <author fullname="Y. Deshpande" initials="Y." surname="Deshpande"/>
    <date month="January" year="2026"/>
  </front>
  <seriesInfo name="RFC" value="9943"/>
  <seriesInfo name="DOI" value="10.17487/RFC9943"/>
</reference>

<reference anchor="AGTP" >
  <front>
    <title>Agent Transfer Protocol (AGTP)</title>
    <author fullname="Chris Hood">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-hood-independent-agtp-07"/>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC8615">
  <front>
    <title>Well-Known Uniform Resource Identifiers (URIs)</title>
    <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
    <date month="May" year="2019"/>
    <abstract>
      <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
      <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8615"/>
  <seriesInfo name="DOI" value="10.17487/RFC8615"/>
</reference>


<reference anchor="AGTP-CERT" >
  <front>
    <title>AGTP Agent Certificate Extension</title>
    <author fullname="Chris Hood">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-hood-agtp-agent-cert-00"/>
</reference>
<reference anchor="AGTP-TRUST" >
  <front>
    <title>AGTP Trust and Verification Specification</title>
    <author fullname="Chris Hood">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-hood-agtp-trust-00"/>
</reference>
<reference anchor="IDP" >
  <front>
    <title>Intent Declaration Protocol</title>
    <author fullname="Tom Sato">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-sato-soos-idp-00"/>
</reference>
<reference anchor="AUDIT-ARCH" >
  <front>
    <title>AI Agent Auditing Architecture</title>
    <author fullname="Mirja Kuehlewind">
      <organization></organization>
    </author>
    <author fullname="Henk Birkholz">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-kuehlewind-audit-architecture-00"/>
</reference>


    </references>

</references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

