<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.1.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC4648 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4648.xml">
<!ENTITY RFC8032 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8032.xml">
<!ENTITY RFC8152 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8152.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC8615 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8615.xml">
<!ENTITY RFC8949 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8949.xml">
<!ENTITY RFC9052 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9052.xml">
<!ENTITY RFC8785 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8785.xml">
<!ENTITY RFC6962 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6962.xml">
]>


<rfc ipr="trust200902" docName="draft-morrison-identity-accord-01" category="info" submissionType="independent">
  <front>
    <title abbrev="Identity Accord">Identity Accord Protocol: A Peer Ceremony for Bilateral Agreements Between Identity-Substrate-Bound Principals</title>

    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
      <address>
        <email>blake@truealter.com</email>
      </address>
    </author>

    <date year="2026" month="May" day="18"/>

    
    
    

    <abstract>


<?line 62?>

<t>This memo specifies the Identity Accord Protocol, a peer ceremony
by which two principals, each represented by an organisational
identity substrate and acting under a recorded delegation from a
legal entity, execute a bilateral agreement as a portable,
self-verifying COSE-signed CBOR document.  The protocol composes
DNS-based substrate discovery, Ed25519 sovereign signatures, an
append-only identity log, and a tamper-evidence descriptor quorum
into a single artefact that is verifiable by any third party with
access to the public DNS, the parties' identity logs, and an
on-chain anchor of the agreement's content hash.  The protocol does
not require a central registry, a designated verifier, or any
infrastructure operated by the specification's author; verification
succeeds when the author's reference deployment is offline.  The
canonical bilateral target is a mutual non-disclosure agreement,
but the wire format generalises to any bilateral consent envelope
between two legal entities each represented by an identity
substrate.  An associated MCP tool surface, an associated pre-send
enforcement gate, and an associated disclosure-ledger schema are
specified, all of which are optional layers above the wire format.
The memo is Informational; the underlying COSE and CBOR formats
are normative per <xref target="RFC9052"></xref> and <xref target="RFC8949"></xref>.</t>



    </abstract>



  </front>

  <middle>


<?line 86?>

<section anchor="status-of-this-memo"><name>Status of This Memo</name>

<t>This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.</t>

<t>Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF).  Note that other groups may also distribute
working documents as Internet-Drafts.  The list of current
Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.</t>

<t>Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time.  It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."</t>

</section>
<section anchor="introduction"><name>Introduction</name>

<t>A bilateral agreement between two organisations is, in current
commercial practice, a document drafted by either party's legal
counsel, signed by an authorised officer of each party, exchanged
by email or by a third-party signature platform, and stored in
each party's document-management system.  The agreement's
existence, its terms, and its lifecycle events (execution,
amendment, revocation, expiry) are not directly verifiable by any
third party; they are matters between the parties and their
records.  A third party who needs to verify that an agreement is
in force may, at best, request a copy from one of the parties.</t>

<t>This memo specifies a different arrangement.  Two principals, each
representing a legal entity and each bound to an organisational
identity substrate, execute the agreement as a portable
self-verifying document.  The document carries the contract text,
the parties' identities, the delegations under which the principals
sign, the agreement's term and jurisdiction, and a set of
tamper-evidence descriptors anchored in independent substrates.
A third party who receives the document, or who resolves the
agreement's content address through public discovery, can verify
the agreement's authenticity and lifecycle status against the
public DNS, the parties' identity logs, and any on-chain anchor
the descriptors reference.  No party holds an authoritative copy
that the other party lacks; the agreement is symmetric.</t>

<t>The protocol composes with <xref target="MCPDNS"></xref> for substrate discovery, with
<xref target="IDPRONOUNS"></xref> for the principal-handle namespace, with <xref target="IDCOMMITS"></xref>
for the attribution grammar that names the authorising officer,
and with <xref target="ORGPOLICY"></xref> for the policy stack under which the agreement
is admitted to the parties' agent-runtime sessions.  An associated
pre-send enforcement gate (Section 9) integrates with the agent-
runtime governance flow specified by <xref target="ORGPOLICY"></xref> so that an
agreement's permitted-purpose scope can be applied to outbound
tool invocations of either party's runtimes.</t>

<t>The canonical bilateral target of the v0 specification is a mutual
non-disclosure agreement.  The wire format generalises to any
bilateral consent envelope: master services agreements, data
processing agreements, statements of work, reseller agreements,
partnership letters.  Multi-party extensions (three or more
parties) are out of scope for this version and are anticipated for
a successor draft.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
and "OPTIONAL" in this document are to be interpreted as described
in BCP 14 <xref target="RFC8174">RFC2119</xref> when, and only when, they appear in
all capitals, as shown here.</t>

<t>The following terms are defined for the purposes of this document.</t>

<dl>
  <dt>Accord</dt>
  <dd>
    <t>A bilateral agreement executed under the protocol of this memo.
The wire-format artefact is the Accord document; the act of
reaching mutual signature is the Accord ceremony.</t>
  </dd>
  <dt>Identity substrate</dt>
  <dd>
    <t>An organisational identity primitive of the kind specified by
<xref target="ORGPOLICY"></xref>, addressable by a domain-qualified handle (e.g.
<spanx style="verb">~example.com</spanx>).  Each party to an Accord is represented by
one substrate.</t>
  </dd>
  <dt>Sovereign-tier handle</dt>
  <dd>
    <t>A principal identity handle in the Sovereign trust tier of
<xref target="IDPRONOUNS"></xref> (e.g. <spanx style="verb">~alice</spanx>).  An authorised officer of a legal
entity signs an Accord under their Sovereign-tier handle.</t>
  </dd>
  <dt>Delegation instrument</dt>
  <dd>
    <t>A recorded, bounded, revocable, content-addressed assertion by
the authorising officer of a party that a named handle (the
delegate) is authorised to execute a specified Accord on the
party's behalf.  The delegation instrument is itself a
COSE-signed CBOR document and is included by content address in
the Accord payload.</t>
  </dd>
  <dt>Tamper-evidence descriptor</dt>
  <dd>
    <t>A pointer to an independent substrate against which the Accord's
content address is anchored.  The minimum descriptor set is
defined in Section 7.  A verifier requires a substrate-defined
quorum of descriptors to consider the Accord tamper-evident.</t>
  </dd>
  <dt>Permitted purpose</dt>
  <dd>
    <t>A natural-language paragraph in the Accord payload that defines
the scope of disclosures permitted under the agreement.  The
permitted-purpose paragraph is legally authoritative; the
structured topic taxonomy of Section 8 is a deterministic
runtime classifier and is subordinate to the permitted-purpose
prose in any conflict.</t>
  </dd>
  <dt>Topic taxonomy</dt>
  <dd>
    <t>A structured tag list, scoped to the Accord, identifying the
topics on which disclosures are permitted, blocked, or
require explicit consent.  The taxonomy is operative for
runtime gating (Section 9) and is informative for legal
interpretation.</t>
  </dd>
  <dt>Disclosure-ledger event</dt>
  <dd>
    <t>A typed signed event written to an Accord party's identity log
recording a permitted disclosure, a blocked attempt, an
amendment, a revocation, or an expiry.  Events carry metadata
and content hashes only; they do not carry the disclosed
content.</t>
  </dd>
</dl>

</section>
<section anchor="architectural-overview"><name>Architectural Overview</name>

<t>The protocol comprises five composed layers, each addressable
independently:</t>

<t><list style="numbers" type="1">
  <t><strong>Wire format</strong> (Section 5).  A COSE-signed CBOR document
carrying the Accord payload, with two counter-signatures (one
per party).</t>
  <t><strong>Sovereign signing</strong> (Section 6).  Each party's signature is
produced by an Ed25519 sovereign key associated with the
authorising officer's <spanx style="verb">~handle</spanx>, with the signature carried in
a COSE_Sign or COSE_Sign1 envelope per <xref target="RFC9052"></xref>.</t>
  <t><strong>Discovery</strong> (Section 7).  The Accord is publicly discoverable
via a content-addressed DNS TXT record under each party's
substrate zone, complementing the existing <spanx style="verb">_alter.&lt;domain&gt;</spanx>
record of <xref target="MCPDNS"></xref>.</t>
  <t><strong>Tamper-evidence descriptor quorum</strong> (Section 8).  Each party
contributes descriptors anchoring the Accord's content address
in independent substrates: per-party identity log, on-chain
anchor, public DNS record.  A verifier requires a quorum
sufficient for the policy under which the verifier operates.</t>
  <t><strong>MCP tool surface and enforcement</strong> (Sections 10 and 11).  An
optional MCP tool surface allows agent runtimes of either
party to participate in the ceremony, query Accord state, and
record disclosure events.  An optional pre-send enforcement
gate applies the Accord's topic taxonomy to outbound tool
invocations of either party's runtimes.</t>
</list></t>

<t>Layers 1 through 4 are required for any conformant Accord.  Layers
10 and 11 are optional implementation surfaces and may be omitted
by parties whose use of the protocol does not extend to
agent-runtime-mediated execution.</t>

</section>
<section anchor="wire-format"><name>Wire Format</name>

<t>An Accord is a CBOR object <xref target="RFC8949"></xref> carrying the Accord payload,
wrapped in a COSE signature envelope <xref target="RFC9052"></xref>.</t>

<t>The Accord payload is a CBOR map with the following keys.</t>

<dl>
  <dt><spanx style="verb">version</spanx> (text string, REQUIRED)</dt>
  <dd>
    <t>The wire-format version.  v0 of this specification uses the
literal <spanx style="verb">"identity-accord-v0"</spanx>.</t>
  </dd>
  <dt><spanx style="verb">accord_type</spanx> (text string, REQUIRED)</dt>
  <dd>
    <t>A token identifying the agreement type.  Recognised values for
v0:
</t>

    <t><list style="symbols">
      <t><spanx style="verb">mutual-nda-v2</spanx> for the canonical mutual non-disclosure target.</t>
      <t><spanx style="verb">msa-v1</spanx>, <spanx style="verb">dpa-v1</spanx>, <spanx style="verb">sow-v1</spanx>, <spanx style="verb">reseller-v1</spanx>, <spanx style="verb">partnership-v1</spanx>
for the additional bilateral types this memo anticipates.</t>
    </list></t>

    <t>Additional values MAY be registered in the IANA Accord Types
registry (Section 13).</t>
  </dd>
  <dt><spanx style="verb">accord_id</spanx> (text string, REQUIRED)</dt>
  <dd>
    <t>A UUIDv4 assigned at ceremony commencement.  Identifies the
Accord within each party's records and in the disclosure
ledger.</t>
  </dd>
  <dt><spanx style="verb">contract_body</spanx> (CBOR map, REQUIRED)</dt>
  <dd>
    <t>The contract text and its content address.
</t>

    <t><list style="symbols">
      <t><spanx style="verb">text</spanx> (text string): the UTF-8 contract body.  Legally
authoritative.</t>
      <t><spanx style="verb">content_address</spanx> (byte string): the SHA-256 hash of the
UTF-8 text.  Verifiers MUST recompute and compare.</t>
    </list></t>
  </dd>
  <dt><spanx style="verb">parties</spanx> (CBOR array, REQUIRED, length 2)</dt>
  <dd>
    <t>One entry per party.  Each entry is a CBOR map:
</t>

    <t><list style="symbols">
      <t><spanx style="verb">role</spanx> (text string): one of <spanx style="verb">party_a</spanx>, <spanx style="verb">party_b</spanx>.</t>
      <t><spanx style="verb">handle</spanx> (text string): the authorising officer's Sovereign-
tier handle per <xref target="IDPRONOUNS"></xref> (e.g. <spanx style="verb">~alice</spanx>).</t>
      <t><spanx style="verb">legal_entity</spanx> (text string): the registered name of the
party's legal entity.</t>
      <t><spanx style="verb">entity_registry_id</spanx> (text string): the entity's registry
identifier (e.g. ACN, EIN, company number).  Format is
jurisdiction-specific.</t>
      <t><spanx style="verb">sovereign_pubkey</spanx> (byte string): the Ed25519 public key
against which the party's signature verifies.</t>
      <t><spanx style="verb">delegation_ref</spanx> (byte string): the content address of the
delegation instrument (Section 6.2).</t>
    </list></t>
  </dd>
  <dt><spanx style="verb">permitted_purpose</spanx> (CBOR map, REQUIRED)</dt>
  <dd>
    <t>The agreement's scope.
</t>

    <t><list style="symbols">
      <t><spanx style="verb">text</spanx> (text string): the natural-language permitted-purpose
paragraph.  Legally authoritative in any conflict.</t>
      <t><spanx style="verb">hash</spanx> (byte string): SHA-256 of the UTF-8 text.</t>
    </list></t>
  </dd>
  <dt><spanx style="verb">topic_taxonomy</spanx> (CBOR map, OPTIONAL)</dt>
  <dd>
    <t>The structured tag list for runtime gating.
</t>

    <t><list style="symbols">
      <t><spanx style="verb">version</spanx> (text string): the taxonomy version identifier
(e.g. <spanx style="verb">"v1"</spanx>).</t>
      <t><spanx style="verb">permitted_tags</spanx> (array of text strings): topic tags on which
disclosure is permitted.</t>
      <t><spanx style="verb">blocked_tags</spanx> (array of text strings): topic tags on which
disclosure is refused.</t>
      <t><spanx style="verb">escalation_tags</spanx> (array of text strings, OPTIONAL): topic
tags that require explicit consent from the disclosing
principal at disclosure time.</t>
      <t><spanx style="verb">nl_authority_anchor</spanx> (byte string): the hash of
<spanx style="verb">permitted_purpose.text</spanx>, binding the taxonomy to its
natural-language source.</t>
    </list></t>
  </dd>
  <dt><spanx style="verb">term</spanx> (CBOR map, REQUIRED)</dt>
  <dd>
    <t>Lifecycle parameters.
</t>

    <t><list style="symbols">
      <t><spanx style="verb">effective_date</spanx> (text string, RFC 3339 timestamp)</t>
      <t><spanx style="verb">initial_term_days</spanx> (unsigned integer)</t>
      <t><spanx style="verb">ordinary_survival_days</spanx> (unsigned integer, optional)</t>
      <t><spanx style="verb">categorical_survival</spanx> (CBOR map, optional): per-category
survival rules, where the keys are category identifiers
(e.g. <spanx style="verb">trade_secret</spanx>, <spanx style="verb">personal_information</spanx>) and the values
are either an unsigned integer day-count or the literal
<spanx style="verb">"indefinite"</spanx>.</t>
    </list></t>
  </dd>
  <dt><spanx style="verb">jurisdiction</spanx> (CBOR map, REQUIRED)</dt>
  <dd>
    <t>Governing law and forum.
</t>

    <t><list style="symbols">
      <t><spanx style="verb">governing_law</spanx> (text string): jurisdiction identifier
(e.g. <spanx style="verb">"NSW, Australia"</spanx>).</t>
      <t><spanx style="verb">exclusive_forum</spanx> (text string, OPTIONAL).</t>
    </list></t>
  </dd>
  <dt><spanx style="verb">tamper_evidence_descriptors</spanx> (CBOR array, REQUIRED, length &gt;= 2)</dt>
  <dd>
    <t>An array of descriptors per Section 7.  Each descriptor is a
CBOR map with a <spanx style="verb">type</spanx> key and type-specific fields.</t>
  </dd>
</dl>

<t>The Accord payload is canonicalised per the deterministic CBOR
encoding rules of <xref target="RFC8949"></xref> Section 4.2 before signing.  Verifiers
MUST canonicalise before recomputing content addresses or
verifying signatures.</t>

</section>
<section anchor="signing"><name>Signing</name>

<section anchor="sovereign-signature"><name>Sovereign Signature</name>

<t>Each party signs the canonicalised Accord payload with the
Ed25519 private key associated with the Sovereign-tier handle
named in the party's entry.  Signatures are carried in a COSE
envelope per <xref target="RFC9052"></xref>:</t>

<t><list style="symbols">
  <t>For ceremonies completed in a single co-signing event, a
<spanx style="verb">COSE_Sign</spanx> envelope with two signatures is REQUIRED.</t>
  <t>For ceremonies completed in two stages (party A signs and
publishes; party B counter-signs from the published artefact),
each stage MAY emit a <spanx style="verb">COSE_Sign1</spanx> envelope and a counter-
signature MAY be added later per <xref target="RFC9052"></xref> counter-signature
semantics.  Verifiers MUST treat the combined two-signature
envelope as authoritative; a single-signature artefact is a
draft, not an Accord.</t>
</list></t>

<t>The signature's protected header SHALL carry:</t>

<t><list style="symbols">
  <t><spanx style="verb">alg</spanx>: EdDSA (RFC 8032).</t>
  <t><spanx style="verb">content type</spanx>: <spanx style="verb">application/identity-accord+cbor</spanx>.</t>
  <t><spanx style="verb">kid</spanx>: the content address of the Accord payload.</t>
</list></t>

<t>The signature's unprotected header MAY carry implementation-
specific metadata; verifiers MUST NOT rely on unprotected-header
fields for authenticity.</t>

</section>
<section anchor="delegation-instrument"><name>Delegation Instrument</name>

<t>Each <spanx style="verb">parties[].delegation_ref</spanx> resolves to a delegation
instrument: a separate COSE-signed CBOR document, signed by the
party's Sovereign-tier handle, that names the authorised
signatory of the present Accord and bounds the delegation's
scope.</t>

<t>The delegation instrument's payload is a CBOR map with keys:</t>

<t><list style="symbols">
  <t><spanx style="verb">version</spanx> (text string): <spanx style="verb">"identity-accord-delegation-v0"</spanx>.</t>
  <t><spanx style="verb">principal_handle</spanx> (text string): the Sovereign-tier handle
granting the delegation.</t>
  <t><spanx style="verb">delegate_handle</spanx> (text string): the handle authorised to act.
In v0, the delegate handle MUST equal the principal handle;
Sovereign-to-Instrument delegation is anticipated for a
successor draft.</t>
  <t><spanx style="verb">delegated_accord_id</spanx> (text string): the <spanx style="verb">accord_id</spanx> of the
present Accord.</t>
  <t><spanx style="verb">scope</spanx> (text string): a natural-language description of the
scope of the delegation (e.g. <spanx style="verb">"execution of the present
Accord and any amendments to it"</spanx>).</t>
  <t><spanx style="verb">inception</spanx> (text string, RFC 3339): start of the delegation
validity window.</t>
  <t><spanx style="verb">expiry</spanx> (text string, RFC 3339, OPTIONAL): end of the
delegation validity window; absent implies no expiry beyond
the Accord's own term.</t>
  <t><spanx style="verb">revocation_commitment</spanx> (byte string): the hash of a
revocation token; revocation is effected by publishing the
preimage to the principal's identity log.</t>
</list></t>

<t>Verifiers MUST resolve each delegation instrument from its
content address, verify its signature against the principal
handle's sovereign key, and verify that the delegation's
<spanx style="verb">delegated_accord_id</spanx> equals the Accord's <spanx style="verb">accord_id</spanx>.</t>

</section>
</section>
<section anchor="tamper-evidence-descriptor-quorum"><name>Tamper-Evidence Descriptor Quorum</name>

<t>Each party contributes one or more tamper-evidence descriptors to
the Accord's <spanx style="verb">tamper_evidence_descriptors</spanx> array.  Descriptors
anchor the Accord's content address (the SHA-256 of the
canonicalised Accord payload) in an independent substrate.</t>

<t>The minimum descriptor types for v0:</t>

<dl>
  <dt><spanx style="verb">identitylog_entry</spanx></dt>
  <dd>
    <t>A reference to an event in a party's append-only identity log,
the event recording the Accord's content address at execution.
</t>

    <t><list style="symbols">
      <t><spanx style="verb">party</spanx> (text string): <spanx style="verb">party_a</spanx> or <spanx style="verb">party_b</spanx>.</t>
      <t><spanx style="verb">log_handle</spanx> (text string): the substrate handle whose log
carries the entry.</t>
      <t><spanx style="verb">entry_id</spanx> (text string): the log entry identifier.</t>
      <t><spanx style="verb">signature</spanx> (byte string): the log's signature over the entry.</t>
    </list></t>
  </dd>
  <dt><spanx style="verb">onchain_anchor</spanx></dt>
  <dd>
    <t>A reference to a transaction on a public blockchain whose
payload anchors the Accord's content address (typically via
inclusion in a Signed Tree Head of a per-substrate Merkle log
inspired by <xref target="RFC6962"></xref>).
</t>

    <t><list style="symbols">
      <t><spanx style="verb">chain</spanx> (text string): chain identifier (e.g. <spanx style="verb">"base"</spanx>,
<spanx style="verb">"ethereum"</spanx>).</t>
      <t><spanx style="verb">block</spanx> (unsigned integer): block number.</t>
      <t><spanx style="verb">tx</spanx> (byte string): transaction hash.</t>
      <t><spanx style="verb">sth_root</spanx> (byte string): the Merkle root including the
Accord's content address.</t>
    </list></t>
  </dd>
  <dt><spanx style="verb">dns_txt_record</spanx></dt>
  <dd>
    <t>A reference to a DNS TXT record under a party's substrate
zone whose value is the Accord's content address.
</t>

    <t><list style="symbols">
      <t><spanx style="verb">domain</spanx> (text string): the fully-qualified domain name of
the TXT record (typically <spanx style="verb">_agreement.&lt;content-address-
base32&gt;._alter.&lt;party-domain&gt;</spanx>).</t>
      <t><spanx style="verb">record_value</spanx> (text string): the TXT record's value
encoding the content address.</t>
    </list></t>

    <t>The TXT record SHOULD be DNSSEC-validated [RFC4033] per the
practice established by <xref target="MCPDNS"></xref>.</t>
  </dd>
  <dt><spanx style="verb">wellknown_artefact</spanx></dt>
  <dd>
    <t>A reference to a content-addressed artefact published at a
party's well-known URI per <xref target="RFC8615"></xref>.
</t>

    <t><list style="symbols">
      <t><spanx style="verb">url</spanx> (text string): the fully-qualified URL of the
well-known resource.</t>
      <t><spanx style="verb">expected_hash</spanx> (byte string): SHA-256 of the resource body.</t>
    </list></t>
  </dd>
</dl>

<t>Additional descriptor types MAY be registered in the IANA
Tamper-Evidence Descriptor Types registry (Section 13).</t>

<t>A descriptor quorum is sufficient when at least two descriptors
of independent type and independent substrate operator have
been verified.  Implementations SHOULD treat a quorum of one
type, or a quorum of two descriptors operated by the same
substrate operator, as INSUFFICIENT and refuse to admit the
Accord as tamper-evident.  Substrate operators SHOULD publish
the quorum policy they apply.</t>

<t>Graceful degradation is REQUIRED, meaning parties without
access to the full descriptor set SHOULD participate at the
minimum-conformant quorum rather than be excluded.</t>

</section>
<section anchor="discovery"><name>Discovery</name>

<section anchor="substrate-discovery"><name>Substrate Discovery</name>

<t>Each party SHALL publish the existence and metadata of its
identity substrate under the <spanx style="verb">_alter.&lt;domain&gt;</spanx> DNS TXT scheme
of <xref target="MCPDNS"></xref>.  Substrate discovery for the Accord protocol
reuses <xref target="MCPDNS"></xref> without modification.</t>

</section>
<section anchor="accord-discovery"><name>Accord Discovery</name>

<t>The existence of an Accord MAY be advertised by each party under
a content-addressed sub-record:</t>

<t><spanx style="verb">_agreement.&lt;content-address-base32&gt;._alter.&lt;party-domain&gt;</spanx></t>

<t>The record's value is a TXT carrying:</t>

<t><list style="symbols">
  <t><spanx style="verb">content_address</spanx>: the base32 encoding of the SHA-256 content
address.</t>
  <t><spanx style="verb">accord_type</spanx>: the value of the Accord payload's <spanx style="verb">accord_type</spanx>
field.</t>
  <t><spanx style="verb">effective_date</spanx>: the effective date in RFC 3339.</t>
  <t><spanx style="verb">expiry</spanx>: the expected expiry timestamp in RFC 3339, computed
from <spanx style="verb">effective_date + initial_term_days</spanx>.</t>
  <t><spanx style="verb">parties</spanx>: a comma-separated pair of Sovereign-tier handles
(e.g. <spanx style="verb">~alice,~bob</spanx>) for human readability.</t>
  <t><spanx style="verb">sth_anchor</spanx> (OPTIONAL): a reference to an on-chain anchor
per the <spanx style="verb">onchain_anchor</spanx> descriptor type.</t>
</list></t>

<t>Implementations SHOULD treat absence of an Accord discovery
record as orthogonal to Accord validity; parties MAY execute a
private Accord (with <spanx style="verb">dns_txt_record</spanx> descriptors omitted) and
distribute the Accord artefact directly out of band.  An Accord
without DNS discovery still verifies against the descriptor
quorum if at least two non-DNS descriptors are present.</t>

</section>
<section anchor="third-party-verification-walkthrough"><name>Third-Party Verification Walkthrough</name>

<t>A third party who receives an Accord artefact and a content
address performs the following verification:</t>

<t><list style="numbers" type="1">
  <t>Canonicalise the Accord payload per <xref target="RFC8949"></xref> and recompute
the SHA-256 content address.  Compare to the provided value.</t>
  <t>For each party in <spanx style="verb">parties</spanx>:
  <list style="symbols">
      <t>Resolve the party's <spanx style="verb">_alter.&lt;domain&gt;</spanx> per <xref target="MCPDNS"></xref>.</t>
      <t>Verify the party's <spanx style="verb">sovereign_pubkey</spanx> against the public
envelope published under <xref target="MCPDNS"></xref>.</t>
      <t>Resolve the <spanx style="verb">delegation_ref</spanx> content address and verify
the delegation instrument per Section 6.2.</t>
    </list></t>
  <t>Verify the COSE signatures against each party's
<spanx style="verb">sovereign_pubkey</spanx>.</t>
  <t>Verify the descriptor quorum per Section 7.</t>
  <t>For each party, query the party's identity log for any
<spanx style="verb">accord_revoked</spanx> event referencing the Accord's content
address.  Refuse to admit a revoked Accord.</t>
  <t>Confirm the Accord has not expired against <spanx style="verb">term</spanx>.</t>
</list></t>

<t>A third-party verifier requires no access to ALTER infrastructure
or to either party's private systems beyond the public DNS, the
public identity logs, and the on-chain anchor.</t>

</section>
</section>
<section anchor="topic-taxonomy"><name>Topic Taxonomy</name>

<t>The optional <spanx style="verb">topic_taxonomy</spanx> field of the Accord payload provides
a deterministic runtime classifier of the agreement's permitted
scope.  Taxonomy tags are short structured identifiers (e.g.
<spanx style="verb">engineering.architecture</spanx>, <spanx style="verb">finance.revenue</spanx>, <spanx style="verb">personnel.salaries</spanx>)
drawn from a substrate-published canonical registry or from a
per-Accord extension thereof.</t>

<t>The taxonomy is informative for legal interpretation and
operative for runtime gating.  In the event of a conflict between
the topic taxonomy and the permitted-purpose paragraph, the
natural-language paragraph prevails per Section 4
(<spanx style="verb">permitted_purpose.text</spanx> legally authoritative).</t>

<t>Substrate operators SHOULD publish a canonical topic-taxonomy
registry at a stable URL under their substrate zone (typical
location: <spanx style="verb">https://registry.&lt;substrate-domain&gt;/topic-taxonomy/v1</spanx>).
Accords SHOULD reference the registry version they extend and
SHOULD declare per-Accord additions or restrictions explicitly.</t>

</section>
<section anchor="mcp-tool-surface-optional"><name>MCP Tool Surface (Optional)</name>

<t>Substrates MAY expose the following MCP tool surface to
authenticated agent runtimes of recognised members, enabling
runtime participation in Accord ceremony and lifecycle.</t>

<dl>
  <dt><spanx style="verb">begin_agreement(counterparty_handle, accord_type)</spanx></dt>
  <dd>
    <t>Creates a draft Accord between the calling party and a
counterparty handle.  Returns an <spanx style="verb">accord_draft_id</spanx>.</t>
  </dd>
  <dt>`propose_terms(accord_draft_id, contract_content_address,</dt>
  <dd><t/></dd>
  <dt>permitted_purpose, topic_taxonomy, term, jurisdiction,</dt>
  <dd><t/></dd>
  <dt>delegation_ref)`</dt>
  <dd>
    <t>Populates the draft with proposed terms.</t>
  </dd>
  <dt><spanx style="verb">accept_terms(accord_draft_id)</spanx></dt>
  <dd>
    <t>Counterparty's acceptance; moves the draft to a signing-ready
state.</t>
  </dd>
  <dt><spanx style="verb">sign_accord(accord_draft_id, sovereign_signature)</spanx></dt>
  <dd>
    <t>Attaches an Ed25519 signature from the authorising officer's
Sovereign-tier handle.</t>
  </dd>
  <dt><spanx style="verb">publish_tamper_evidence(accord_id, descriptor_set)</spanx></dt>
  <dd>
    <t>Emits tamper-evidence descriptors to the substrate's identity
log, to on-chain anchors, and to DNS as configured.</t>
  </dd>
  <dt><spanx style="verb">query_accord_status(accord_id_or_content_address)</spanx></dt>
  <dd>
    <t>Returns the Accord's lifecycle state (draft, executed, active,
revoked, expired) and the descriptor set.  Available to any
caller who knows the content address; no privileged
authentication is required for this read.</t>
  </dd>
  <dt><spanx style="verb">revoke_accord(accord_id, reason)</spanx></dt>
  <dd>
    <t>Either party MAY invoke; triggers return-or-destruction
obligations and emits <spanx style="verb">agreement_revoked</spanx> to the identity log.</t>
  </dd>
  <dt>`record_disclosure(accord_id, recipient_handle, topic_tags,</dt>
  <dd><t/></dd>
  <dt>content_hash, size, method)`</dt>
  <dd>
    <t>Records a permitted disclosure to the disclosure ledger.</t>
  </dd>
  <dt><spanx style="verb">record_scope_violation(accord_id, attempted_tags, reason)</spanx></dt>
  <dd>
    <t>Records a blocked disclosure attempt for audit.</t>
  </dd>
</dl>

<t>The MCP tool names above SHALL be registered in the MCP Tool
Surface Names registry referenced in <xref target="ORGPOLICY"></xref> (or a successor
specification establishing said registry).</t>

</section>
<section anchor="pre-send-enforcement-gate-optional"><name>Pre-Send Enforcement Gate (Optional)</name>

<t>A party MAY operate a pre-send enforcement gate that intercepts
outbound tool invocations from the party's agent runtimes and
classifies the invocation's payload against the topic taxonomies
of any active Accords binding the calling principal to the
recipient principal.</t>

<t>The gate algorithm:</t>

<t><list style="numbers" type="1">
  <t>For each prospective outbound tool invocation:  <list style="symbols">
      <t>Resolve the recipient handle from the invocation's
arguments.</t>
      <t>Look up any active Accord whose <spanx style="verb">parties</spanx> set includes
the caller and the recipient.</t>
      <t>If no active Accord exists between the parties, the gate
does not apply; the invocation proceeds per the runtime's
default policy (which may be <spanx style="verb">block</spanx>, <spanx style="verb">prompt</spanx>, or
<spanx style="verb">allow</spanx> per the runtime's enforcement-gate specification
of <xref target="ORGPOLICY"></xref>).</t>
    </list></t>
  <t>For each active Accord:  <list style="symbols">
      <t>Classify the invocation's payload into a set of topic tags
using a substrate-defined classifier.  The classifier MAY
combine a fast-path structured matcher on payload metadata
with a slow-path model-based classifier on payload content.</t>
      <t>Compare the classified tag set to the Accord's
<spanx style="verb">permitted_tags</spanx>, <spanx style="verb">blocked_tags</spanx>, and <spanx style="verb">escalation_tags</spanx>.</t>
    </list></t>
  <t>Take action:  <list style="symbols">
      <t>If the classified set lies entirely within <spanx style="verb">permitted_tags</spanx>,
emit a <spanx style="verb">disclosure_recorded</spanx> event and allow the
invocation.</t>
      <t>If the classified set intersects <spanx style="verb">blocked_tags</spanx>, emit a
<spanx style="verb">scope_violation_blocked</spanx> event and refuse the invocation
with a structured error.</t>
      <t>If the classified set intersects <spanx style="verb">escalation_tags</spanx>,
present a confirmation prompt to the Sovereign-tier
principal and proceed only on confirmation.</t>
      <t>If classification is ambiguous, fail closed: refuse the
invocation and emit <spanx style="verb">scope_violation_blocked</spanx> with the
ambiguity flagged.</t>
    </list></t>
</list></t>

<t>Disclosure-ledger events are written to the calling party's
identity log under the event types of Section 11.</t>

<t>The enforcement gate is composable with the per-runtime
enforcement-gate specification of <xref target="ORGPOLICY"></xref>: an outbound
invocation MUST satisfy both the party's runtime gates and any
applicable Accord gates.  Where both apply, the more restrictive
action prevails.</t>

</section>
<section anchor="disclosure-ledger"><name>Disclosure Ledger</name>

<t>Each party SHALL maintain, in its identity log, the following
event types under the agreement scope:</t>

<dl>
  <dt><spanx style="verb">agreement_executed</spanx></dt>
  <dd>
    <t>Emitted by both parties on ceremony completion.  Payload:
the Accord's content address, the descriptor quorum, and the
signing handle.</t>
  </dd>
  <dt><spanx style="verb">disclosure_recorded</spanx></dt>
  <dd>
    <t>Emitted per permitted outbound disclosure.  Payload: the
Accord's content address, the recipient handle, the topic
tag set, the content hash, the size in bytes, the method
(tool name).  Content is NEVER included; only the hash.</t>
  </dd>
  <dt><spanx style="verb">scope_violation_blocked</spanx></dt>
  <dd>
    <t>Emitted per blocked disclosure attempt.  Payload: the
Accord's content address, the attempted topic tag set, the
block reason.</t>
  </dd>
  <dt><spanx style="verb">agreement_amended</spanx></dt>
  <dd>
    <t>Emitted on negotiated amendment of an Accord.  Payload: the
prior and successor content addresses, the diff hash, and
the authorising signatures of both parties.</t>
  </dd>
  <dt><spanx style="verb">agreement_revoked</spanx></dt>
  <dd>
    <t>Emitted on revocation by either party.  Payload: the Accord's
content address, the revoking party, the reason, the
revocation token preimage.</t>
  </dd>
  <dt><spanx style="verb">agreement_expired</spanx></dt>
  <dd>
    <t>Emitted on term expiry.  Payload: the Accord's content
address and the expiry timestamp.</t>
  </dd>
</dl>

<t>Each party's identity log SHOULD be cross-anchored to the
counterparty's log via periodic hash-chain exchange so that
both parties hold matching event subsets for the agreement.
Cross-anchoring is a substrate-side concern and is not
specified here beyond the requirement that each party's log
is verifiable independently.</t>

</section>
<section anchor="revocation"><name>Revocation</name>

<t>Either party MAY revoke an Accord at any time during its term.
Revocation:</t>

<t><list style="numbers" type="1">
  <t>The revoking party publishes a <spanx style="verb">agreement_revoked</spanx> event to
its identity log carrying the revocation token preimage.</t>
  <t>The substrate emits a notification to the counterparty's
subscription channel for the Accord.</t>
  <t>The counterparty's substrate records the receipt in its own
identity log under <spanx style="verb">agreement_revoked</spanx> with the cross-
reference to the originating event.</t>
  <t>Any pre-send enforcement gate (Section 9) ceases admitting
the Accord; subsequent outbound invocations between the
parties default to the runtime's no-Accord policy.</t>
  <t>Return-or-destruction obligations under the contract body
take effect per the contract's terms.  The protocol records
the lifecycle event; the contract specifies the substantive
obligations.</t>
</list></t>

<t>Revocation is not retractable.  A re-executed agreement between
the same parties on the same subject matter is a new Accord with
a new <spanx style="verb">accord_id</spanx> and a new content address.</t>

</section>
<section anchor="discovery-identity-and-trust-tier-composition"><name>Discovery, Identity, and Trust-Tier Composition</name>

<t>The Accord protocol composes with the broader Morrison-family
identity architecture as follows.</t>

<section anchor="with-substrate-discovery"><name>With Substrate Discovery</name>

<t>The <spanx style="verb">_alter.&lt;domain&gt;</spanx> TXT scheme of <xref target="MCPDNS"></xref> supplies both
parties' substrate endpoints, signing keys, and capability
profiles.  Accord-specific records under
<spanx style="verb">_agreement.&lt;content-address&gt;._alter.&lt;domain&gt;</spanx> extend the same
zone without creating a new label namespace.</t>

</section>
<section anchor="with-handle-tier-semantics"><name>With Handle Tier Semantics</name>

<t>Sovereign-tier handles per <xref target="IDPRONOUNS"></xref> are the only tier
authorised to sign an Accord in v0.  Instrument-tier handles MAY
participate in the ceremony surfaces (Section 10) under
Sovereign-tier delegation per <xref target="IDCOMMITS"></xref> attribution
(<spanx style="verb">Acted-By:</spanx> is the Sovereign signer; <spanx style="verb">Drafted-With:</spanx> may name
the Instrument that drafted the contract body), but the
authoritative signature is always Sovereign-tier.</t>

</section>
<section anchor="with-org-alter-policy-provision"><name>With Org-Alter Policy Provision</name>

<t>When either party operates an agent runtime under the policy-
provision flow of <xref target="ORGPOLICY"></xref>, any active Accord adds an
enforcement-gate composition layer above the substrate's
default policy stack.  The composition rule of Section 9 applies
in addition to the strictest-applicable rule of <xref target="ORGPOLICY"></xref>
Section 8.</t>

</section>
<section anchor="multi-party-anticipation"><name>Multi-Party Anticipation</name>

<t>This memo specifies bilateral Accords only.  An N-party Accord
(N &gt; 2) requires N-way signature collection, an N-way
descriptor quorum, and a generalised topic-taxonomy composition
rule.  These extensions are anticipated for a successor draft
and are explicitly out of scope here.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This memo requests that IANA establish two registries.</t>

<section anchor="accord-types-registry"><name>Accord Types Registry</name>

<t>A registry of <spanx style="verb">accord_type</spanx> values for the wire-format field of
Section 5.  Initial entries:</t>

<texttable>
      <ttcol align='left'>accord_type</ttcol>
      <ttcol align='left'>reference</ttcol>
      <ttcol align='left'>description</ttcol>
      <c><spanx style="verb">mutual-nda-v2</spanx></c>
      <c>this document</c>
      <c>Mutual non-disclosure agreement, v2 template family.</c>
      <c><spanx style="verb">msa-v1</spanx></c>
      <c>this document</c>
      <c>Master services agreement.</c>
      <c><spanx style="verb">dpa-v1</spanx></c>
      <c>this document</c>
      <c>Data processing agreement.</c>
      <c><spanx style="verb">sow-v1</spanx></c>
      <c>this document</c>
      <c>Statement of work.</c>
      <c><spanx style="verb">reseller-v1</spanx></c>
      <c>this document</c>
      <c>Reseller agreement.</c>
      <c><spanx style="verb">partnership-v1</spanx></c>
      <c>this document</c>
      <c>Partnership letter.</c>
</texttable>

<t>Registration policy: Specification Required.  New <spanx style="verb">accord_type</spanx>
values are registered by Internet-Draft or by an RFC defining
the contract-body shape and any type-specific protocol
extensions.</t>

</section>
<section anchor="tamper-evidence-descriptor-types-registry"><name>Tamper-Evidence Descriptor Types Registry</name>

<t>A registry of <spanx style="verb">tamper_evidence_descriptors[].type</spanx> values for
Section 7.  Initial entries:</t>

<texttable>
      <ttcol align='left'>type</ttcol>
      <ttcol align='left'>reference</ttcol>
      <ttcol align='left'>description</ttcol>
      <c><spanx style="verb">identitylog_entry</spanx></c>
      <c>this document</c>
      <c>Reference to an event in a party's append-only identity log.</c>
      <c><spanx style="verb">onchain_anchor</spanx></c>
      <c>this document</c>
      <c>Reference to a transaction on a public blockchain anchoring the content address.</c>
      <c><spanx style="verb">dns_txt_record</spanx></c>
      <c>this document</c>
      <c>Reference to a DNS TXT record bearing the content address.</c>
      <c><spanx style="verb">wellknown_artefact</spanx></c>
      <c>this document</c>
      <c>Reference to a well-known URI artefact bearing the content address.</c>
</texttable>

<t>Registration policy: Specification Required.  New descriptor
types are registered by Internet-Draft or RFC defining the
descriptor fields and the verification procedure.</t>

</section>
<section anchor="mcp-tool-surface-names"><name>MCP Tool Surface Names</name>

<t>The MCP tool surface names of Section 10 (<spanx style="verb">begin_agreement</spanx>,
<spanx style="verb">propose_terms</spanx>, <spanx style="verb">accept_terms</spanx>, <spanx style="verb">sign_accord</spanx>,
<spanx style="verb">publish_tamper_evidence</spanx>, <spanx style="verb">query_accord_status</spanx>, <spanx style="verb">revoke_accord</spanx>,
<spanx style="verb">record_disclosure</spanx>, <spanx style="verb">record_scope_violation</spanx>) are registered in
the MCP Tool Surface Names registry referenced in <xref target="ORGPOLICY"></xref>.
Establishment of that registry, if not already done, is the
subject of <xref target="ORGPOLICY"></xref>'s IANA Considerations.</t>

</section>
<section anchor="media-type"><name>Media Type</name>

<t>This memo requests registration of the media type
<spanx style="verb">application/identity-accord+cbor</spanx> per RFC 6838, with the
following information:</t>

<t><list style="symbols">
  <t>Type name: application</t>
  <t>Subtype name: identity-accord+cbor</t>
  <t>Required parameters: none</t>
  <t>Optional parameters: <spanx style="verb">version</spanx> (the value of the Accord
payload's <spanx style="verb">version</spanx> field).</t>
  <t>Encoding considerations: binary; deterministic CBOR per
<xref target="RFC8949"></xref> Section 4.2.</t>
  <t>Security considerations: see Section 14 of this document.</t>
  <t>Interoperability considerations: see Section 5 of this
document.</t>
  <t>Published specification: this document.</t>
</list></t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<section anchor="sovereign-key-compromise"><name>Sovereign-Key Compromise</name>

<t>An Accord's authenticity rests on the Sovereign-tier handle's
Ed25519 signing key.  Compromise of either party's signing key
permits an attacker to forge new Accords under the party's
identity, or to forge revocations of existing Accords.
Mitigations:</t>

<t><list style="symbols">
  <t>Sovereign-tier signing keys SHOULD be held in hardware-backed
custody (HSM, secure enclave, hardware security token) and
SHOULD NOT be exported in plaintext under any circumstances.</t>
  <t>The handle's published envelope per <xref target="MCPDNS"></xref> is the canonical
pubkey; a compromised key SHALL be rotated by publishing a
new envelope and recording the rotation in the substrate's
identity log.  Verifiers SHOULD check whether the signing key
recorded in the Accord was the current key at the time of
the Accord's effective date.</t>
  <t>Tamper-evidence descriptors anchored at the time of execution
defend the Accord against post-hoc forgery by anchoring the
content address in substrates the attacker does not control.</t>
</list></t>

</section>
<section anchor="descriptor-quorum-subversion"><name>Descriptor-Quorum Subversion</name>

<t>An attacker controlling one substrate party may attempt to
publish descriptors anchoring a falsified Accord content
address.  Mitigations:</t>

<t><list style="symbols">
  <t>The quorum policy of Section 7 requires descriptors of
independent type and independent substrate operator.  An
attacker controlling a single substrate cannot satisfy the
quorum alone.</t>
  <t>On-chain anchors SHOULD reference chains the attacker does
not control; well-known artefacts SHOULD be hosted under the
party's verifiable substrate zone, not under an attacker-
controllable third party.</t>
  <t>Verifiers SHOULD compare independent descriptors against each
other; descriptors anchoring conflicting content addresses
for the same Accord ID are evidence of an attempted forgery.</t>
</list></t>

</section>
<section anchor="delegation-instrument-replay"><name>Delegation-Instrument Replay</name>

<t>A revoked delegation instrument, if its revocation has not been
propagated, may be replayed to forge new signatures.
Mitigations:</t>

<t><list style="symbols">
  <t>Delegation revocations SHALL be recorded in the principal's
identity log under a typed event before any reliance on the
delegation is admitted.</t>
  <t>Verifiers SHALL check the principal's identity log for any
revocation event referencing the delegation's content address
before treating the delegation as valid.</t>
  <t>Delegation expiry timestamps SHOULD be set conservatively;
a delegation that outlives the Accord's effective scope is
an unnecessary liability.</t>
</list></t>

</section>
<section anchor="enforcement-gate-bypass"><name>Enforcement-Gate Bypass</name>

<t>A party operating the pre-send enforcement gate of Section 9
may have its gate bypassed by a runtime that does not source its
policy from the substrate per <xref target="ORGPOLICY"></xref>.  Mitigations:</t>

<t><list style="symbols">
  <t>Parties SHOULD configure all agent runtimes bound to the
party's identity to operate under <xref target="ORGPOLICY"></xref> policy provision.</t>
  <t>Outbound tool invocations from non-conformant runtimes
SHOULD be detected by the substrate's audit-signal flow and
the disclosure-ledger comparison SHOULD reveal the
divergence.</t>
  <t>Outbound network traffic from non-conformant runtimes is
outside the scope of this memo; the Accord's enforcement
posture is a protocol layer, not a perimeter control.</t>
</list></t>

</section>
<section anchor="classifier-adversarial-inputs"><name>Classifier Adversarial Inputs</name>

<t>The pre-send enforcement gate's topic-tag classifier may be
adversarially manipulated through crafted payloads that evade
classification or that classify into permitted tags
spuriously.  Mitigations:</t>

<t><list style="symbols">
  <t>The classifier's ambiguity threshold SHOULD be conservative;
ambiguous classifications SHALL fail closed per Section 9.</t>
  <t>The classifier's structured fast-path SHOULD operate on
payload metadata under cryptographic integrity binding, not
solely on payload content susceptible to crafting.</t>
  <t>Periodic adversarial-payload rehearsal of the classifier is
RECOMMENDED.</t>
</list></t>

</section>
</section>
<section anchor="privacy-considerations"><name>Privacy Considerations</name>

<section anchor="content-confidentiality"><name>Content Confidentiality</name>

<t>The Accord's contract body MAY contain confidential terms; the
Accord wire format preserves the body's confidentiality only to
the extent that the artefact is not published.  Parties wishing
to retain content confidentiality SHOULD:</t>

<t><list style="symbols">
  <t>Omit the <spanx style="verb">dns_txt_record</spanx> and <spanx style="verb">wellknown_artefact</spanx> descriptors,
retaining only <spanx style="verb">identitylog_entry</spanx> and <spanx style="verb">onchain_anchor</spanx>
(which record content addresses, not content).</t>
  <t>Distribute the artefact directly between the parties, out of
band of the public substrate surface.</t>
</list></t>

</section>
<section anchor="disclosure-ledger-privacy"><name>Disclosure-Ledger Privacy</name>

<t>Events under the disclosure ledger of Section 11 record content
hashes, recipient handles, and topic-tag sets.  An adversary
with access to a party's identity log can observe disclosure
patterns even without access to disclosed content.  Mitigations:</t>

<t><list style="symbols">
  <t>Identity logs MAY be encrypted at rest; the cross-anchor
hash-chain exchange between parties' logs does not require
exposing log contents.</t>
  <t>Recipient handles in disclosure events SHOULD be pseudonymous
where the substrate permits; the Accord's permitted-purpose
scope binds the disclosure regardless of recipient
pseudonymity.</t>
</list></t>

</section>
<section anchor="third-party-verification-privacy"><name>Third-Party Verification Privacy</name>

<t>A third-party verifier accessing public discovery records and
on-chain anchors leaves network and chain-observation
footprints.  Such verifiers SHOULD operate over privacy-
preserving DNS (DNS over HTTPS or DNS over TLS) and SHOULD
treat their verification queries as potentially observable.</t>

</section>
<section anchor="cross-substrate-audit-fan-out"><name>Cross-Substrate Audit Fan-Out</name>

<t>Where an outbound tool invocation between Accord parties
involves a third substrate (e.g. a tool whose execution is
mediated by a third party), the disclosure-ledger event is
written to all participating substrates per the audit fan-out
of <xref target="ORGPOLICY"></xref> Section 8.  Parties SHOULD declare in their
permitted-purpose paragraph any third-substrate involvement so
that fan-out is anticipated rather than incidental.</t>

</section>
</section>
<section anchor="relation-to-companion-memos"><name>Relation to Companion Memos</name>

<t>This memo composes with five Morrison-family Internet-Drafts.</t>

<t><xref target="MCPDNS"></xref> supplies substrate discovery (<spanx style="verb">_alter.&lt;domain&gt;</spanx> TXT
scheme) and the cryptographic identity envelope that publishes
each party's Sovereign-tier signing key.  The Accord protocol
does not introduce new DNS labels except as content-addressed
sub-records under the existing <spanx style="verb">_alter.</spanx> zone.</t>

<t><xref target="IDPRONOUNS"></xref> supplies the handle namespace and trust-tier
taxonomy.  Sovereign-tier handles are the authoritative
signatories of an Accord.  No new tier is introduced.</t>

<t><xref target="IDCOMMITS"></xref> supplies the attribution grammar used by the
optional MCP tool surface and by Accord-adjacent git commits
recording amendment activity.  The Accord protocol's
<spanx style="verb">parties[].handle</spanx> field corresponds semantically to the
<spanx style="verb">Acted-By:</spanx> trailer slot of <xref target="IDCOMMITS"></xref>.</t>

<t><xref target="ORGPOLICY"></xref> supplies the agent-runtime policy provision flow
into which the Accord's enforcement gate composes.  The Accord
gate of Section 9 layers above the per-runtime gate set of
<xref target="ORGPOLICY"></xref> Section 5 under a strictest-applicable composition
rule.</t>

<t>The substrate-observation posture of the companion
substrate-observation memo (the present author's prior I-D) is
not directly invoked by the Accord protocol but is a sibling
posture: both rest on the principle that bilateral and
multilateral coordination problems benefit from substrate-
physics commitments rather than from canonical-broker
arbitration.</t>

</section>
<section anchor="implementation-status"><name>Implementation Status</name>

<t>A reference implementation of the bilateral Accord ceremony is
in active development by the specification's author.  Initial
ceremony targets are private; post-ceremony case studies are
anticipated as the public artefacts of this work.</t>

<t>In the spirit of [RFC7942], the present author notes that this
section documents implementation intent and is expected to be
removed before the document advances beyond the Independent
Stream.  No claim of interoperability is made; the reference
deployment is a single substrate operated by the
specification's author with a single anticipated counterparty.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

&RFC2119;
&RFC4648;
&RFC8032;
&RFC8152;
&RFC8174;
&RFC8615;
&RFC8949;
&RFC9052;
<reference anchor="MCPDNS" target="https://datatracker.ietf.org/doc/draft-morrison-mcp-dns-discovery/">
  <front>
    <title>Discovery of Model Context Protocol Servers via DNS TXT Records</title>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="IDPRONOUNS" target="https://datatracker.ietf.org/doc/draft-morrison-identity-pronouns/">
  <front>
    <title>Identity Pronouns: A Reference-Axis Extension to ~handle Identity Systems</title>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="IDCOMMITS" target="https://datatracker.ietf.org/doc/draft-morrison-identity-attributed-commits/">
  <front>
    <title>Identity-Attributed Git Commits via Tier-Structured Trailers</title>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="ORGPOLICY" target="https://datatracker.ietf.org/doc/draft-morrison-org-alter-policy-provision/">
  <front>
    <title>Org-Alter-Mediated Policy Provision and Governance Inheritance for Agent Runtimes Bound to a Principal Identity</title>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">

&RFC8785;
&RFC6962;
<reference anchor="RFC8615-WK" target="https://www.rfc-editor.org/rfc/rfc8615">
  <front>
    <title>Well-Known URIs</title>
    <author >
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>


    </references>

</references>


<?line 1034?>

<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>This memo grew out of internal architectural work on the
question of how two organisations, each represented by an
identity substrate, can execute a bilateral agreement as a
self-verifying portable artefact without recourse to a central
registry, a third-party signature platform, or any infrastructure
operated by either party's vendor.  The realisation that the
agreement substrate, the identity substrate, and the audit
substrate are the same substrate, and that this collapse is what
makes a third-party signature platform structurally redundant
between parties who hold their own identity logs, is the
load-bearing insight behind this specification.</t>

</section>
<section numbered="false" anchor="authors-address"><name>Author's Address</name>

<t>Blake Morrison
Alter Meridian Pty Ltd
Email: blake@truealter.com</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

