<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.1.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC1035 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1035.xml">
<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC4033 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4033.xml">
<!ENTITY RFC4034 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4034.xml">
<!ENTITY RFC4035 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4035.xml">
<!ENTITY RFC4648 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4648.xml">
<!ENTITY RFC5234 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5234.xml">
<!ENTITY RFC6698 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6698.xml">
<!ENTITY RFC7208 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7208.xml">
<!ENTITY RFC7595 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7595.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC8461 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8461.xml">
<!ENTITY RFC8552 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8552.xml">
<!ENTITY RFC8785 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8785.xml">
<!ENTITY RFC6376 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6376.xml">
<!ENTITY RFC6781 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6781.xml">
<!ENTITY RFC7489 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7489.xml">
<!ENTITY RFC7858 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7858.xml">
<!ENTITY RFC7942 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7942.xml">
<!ENTITY RFC8484 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8484.xml">
<!ENTITY RFC9162 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9162.xml">
]>


<rfc ipr="trust200902" docName="draft-morrison-mcp-dns-discovery-04" category="info" submissionType="independent">
  <front>
    <title abbrev="MCP DNS Discovery">Discovery of Model Context Protocol Servers via DNS TXT Records</title>

    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
      <address>
        <email>blake@truealter.com</email>
      </address>
    </author>

    <date year="2026" month="May" day="18"/>

    
    
    

    <abstract>


<?line 68?>

<t>This document defines a DNS-based mechanism for the discovery of
Model Context Protocol (MCP) servers, the identity properties of
the organisations that operate them, and (new in this revision)
the cryptographic identity envelope bound to an individual Sovereign-
tier <spanx style="verb">~handle</spanx> published under the same zone.  Three TXT resource
records are defined.  The <spanx style="verb">_mcp.&lt;domain&gt;</spanx> record (defined in v01)
advertises the presence, endpoint URL, transport protocol,
cryptographic identity, and capability profile of an MCP server
associated with a domain name.  The <spanx style="verb">_org-alter.&lt;domain&gt;</spanx> record
(introduced in v02) advertises the canonical organisational identity
of the domain operator: legal entity name, registry identifier,
founding date, primary regions of operation, and any regulatory
frameworks under which the operator is bound to refuse external
automated access.  The <spanx style="verb">_alter.&lt;domain&gt;</spanx> record (introduced in this
revision) publishes an Ed25519-signed identity envelope binding a
<spanx style="verb">~handle</spanx> to a public key, an IdentityLog Signed Tree Head root,
and a revocation commitment.  Taken together, the three records
provide service discovery, organisational identity bootstrap, and
individual identity recognition from a single canonical source:
the domain's own DNS zone.  This revision additionally requires
DNSSEC <xref target="RFC4033"></xref> validation of envelope responses and a DANE TLSA
<xref target="RFC6698"></xref> pin binding the MCP endpoint's leaf certificate to the
published zone.  A companion URI scheme (<spanx style="verb">alter:</spanx>) is registered
provisionally with IANA per <xref target="RFC7595"></xref> for handle dispatch.  The
mechanism complements HTTPS-based discovery
(<spanx style="verb">.well-known/mcp/server-card.json</spanx> and
<spanx style="verb">.well-known/alter-envelope.json</spanx>) by providing a lightweight,
resolver-cached bootstrap that requires no HTTPS round-trip.  The
design follows the precedent established by DKIM <xref target="RFC6376"></xref>, SPF
<xref target="RFC7208"></xref>, DMARC <xref target="RFC7489"></xref>, MTA-STS <xref target="RFC8461"></xref>, and the existing
<spanx style="verb">_mcp.</spanx> / <spanx style="verb">_org-alter.</spanx> labels of v01-v02.</t>



    </abstract>



  </front>

  <middle>


<?line 102?>

<section anchor="introduction"><name>Introduction</name>

<t>Model Context Protocol (MCP) <xref target="MCP"></xref> is an open protocol for
structured interaction between AI agents and tool-providing servers.
A complete agent-to-organisation-to-individual interaction chain has
three distinct discovery requirements:</t>

<t><list style="numbers" type="1">
  <t><strong>Service discovery.</strong>  Where is the MCP server endpoint?  What
transport does it speak?  What cryptographic key authenticates
it?  This is the question v01 of this document answers via the
<spanx style="verb">_mcp.&lt;domain&gt;</spanx> record.</t>
  <t><strong>Organisational identity bootstrap.</strong>  Who is the organisation
operating the server?  What is its legal entity?  Where is it
registered?  Under what regulatory frameworks does it operate,
and which automated access pathways must it refuse to participate
in?  This is the question v02 answers via the
<spanx style="verb">_org-alter.&lt;domain&gt;</spanx> record.</t>
  <t><strong>Individual identity recognition.</strong>  Who is the Sovereign-tier
person bound to a <spanx style="verb">~handle</spanx> hosted under the domain?  What public
key signs their statements?  What append-only log anchors the
lifecycle of their identity?  How may their envelope be revoked?
This is the question v03 introduces via the <spanx style="verb">_alter.&lt;domain&gt;</spanx>
record.</t>
</list></t>

<t>The three questions are distinct.  An MCP client may need to
discover an endpoint without caring about the operator's identity
or any individual handle.  An onboarding wizard installing an
org-alter instance may need to read the operator's identity without
caring (yet) about the MCP endpoint.  A recognition verifier
(resolving an <spanx style="verb">alter:~alice</spanx> URI) needs the individual envelope
without necessarily invoking an MCP session.  Conflating any two of
these into a single TXT record would force every consumer to parse
fields it does not need and would crowd the 255-octet
character-string limit.  Splitting them across three
underscore-prefixed labels mirrors the pattern established by DKIM
(<spanx style="verb">_domainkey._domain</spanx>) and DMARC (<spanx style="verb">_dmarc._domain</spanx>): each record
serves a single semantic purpose.</t>

<t>This revision is fully backward-compatible with v01 and v02.
Implementations that consume only the <spanx style="verb">_mcp.&lt;domain&gt;</spanx> record
continue to work unchanged.  Implementations that wish to bootstrap
an org-alter identity may additionally query <spanx style="verb">_org-alter.&lt;domain&gt;</spanx>.
Implementations that wish to recognise an individual <spanx style="verb">~handle</spanx> may
additionally query <spanx style="verb">_alter.&lt;domain&gt;</spanx>.</t>

<t>The envelope layer formalised in the new <spanx style="verb">_alter.&lt;domain&gt;</spanx> record is
specified in full by a companion document, the ALTER DNS Publication
specification <xref target="ALTER-DNS-PUB"></xref>, which pins the envelope JSON schema,
the JSON Canonicalisation Scheme (JCS, <xref target="RFC8785"></xref>) serialisation,
and the resolver-side verification algorithm.  This document is the
IETF-track surface for the underscore-prefixed DNS label registration
and its DNSSEC / DANE / IdentityLog cross-references; it does not
duplicate the envelope wire format beyond what is necessary to
specify a conformant TXT grammar.</t>

<t>The individual-identity layer is grounded, as the organisational
layer is, in the identity field framework of <xref target="MORRISON-IFT"></xref>.  A
<spanx style="verb">~handle</spanx> is not a reserved alphanumeric slot but a durable
recognition attractor in the identity field.  A DNS record provides
a discrete checkpoint into that field: the envelope published at
<spanx style="verb">_alter.&lt;zone&gt;</spanx> is the handle-holder's own canonical declaration,
signed by their Ed25519 key, witnessed by the IdentityLog STH
anchor surface <xref target="ALTER-STH"></xref>, and consumable by any resolver with
access to a DNSSEC-validating recursive resolver.</t>

<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
and "OPTIONAL" in this document are to be interpreted as described
in BCP 14 <xref target="RFC8174">RFC2119</xref> when, and only when, they appear in
all capitals, as shown here.</t>

</section>
</section>
<section anchor="terminology"><name>Terminology</name>

<t>(Terminology from v01 and v02 is retained.  Additional terms
introduced in this revision are defined below.)</t>

<dl>
  <dt>Envelope</dt>
  <dd>
    <t>An Ed25519-signed JSON object binding a <spanx style="verb">~handle</spanx> to a public
key, an IdentityLog root reference, an inception timestamp, a
revocation hash commitment, a signature algorithm tag, a detached
signature, and a caveats array.  The envelope is the unification
primitive of the ALTER identity architecture.  Its full JSON
schema, canonical serialisation rule, and verification procedure
are pinned by <xref target="ALTER-DNS-PUB"></xref>.  This document specifies only the
TXT grammar that carries the five load-bearing envelope fields
across DNS.</t>
  </dd>
  <dt>~handle</dt>
  <dd>
    <t>A Sovereign-tier identifier, leading tilde mandatory (e.g.
<spanx style="verb">~alice</spanx>).  Bot-tier handles carry a <spanx style="verb">.bot</spanx> suffix (e.g.
<spanx style="verb">~example-bot.bot</spanx>); Instrument-tier handles use the prefix
<spanx style="verb">~cc-</spanx> (e.g. <spanx style="verb">~cc-example-model</spanx>).</t>
  </dd>
  <dt>IdentityLog</dt>
  <dd>
    <t>The append-only transparency log anchoring envelope lifecycle
events (mint, caveat-add, revocation, key-rotation).  A Signed
Tree Head ("STH") is emitted per-minute and cross-anchored to
Cloudflare R2, IPFS, a federation of independent mirrors, and the
Base L2 chain via the <spanx style="verb">IdentityLogAnchor</spanx> contract.  Protocol
details are in <xref target="ALTER-STH"></xref>.</t>
  </dd>
  <dt>Organ</dt>
  <dd>
    <t>A broadcast surface for the envelope.  The three organs are: DNS
publication (this document), the local <spanx style="verb">alter-runtime</spanx> L3 daemon,
and a hardware-anchored device-organ quorum.  The term is
canonical; do not substitute "channel", "vector", or "emitter" at
the architectural level.</t>
  </dd>
  <dt>Recognition</dt>
  <dd>
    <t>The act of a resolver observing and verifying an envelope on
cryptographic merit.  Recognition is distinct from claim:
publishing a TXT record is not a claim of identity, it is an
observable assertion that the resolver may verify or reject.  No
field of this document carries a claim verb; resolvers recognise
envelopes, they do not honour publisher assertions about them.</t>
  </dd>
  <dt>DNSSEC Validation</dt>
  <dd>
    <t>The act of an authenticating DNS resolver verifying the RRSIG
chain from the root trust anchor to the TXT RRset, per <xref target="RFC4033"></xref>,
<xref target="RFC4034"></xref>, and <xref target="RFC4035"></xref>, and setting the AD bit on the response
delivered to the stub client.</t>
  </dd>
  <dt>DANE TLSA Pin</dt>
  <dd>
    <t>A DNS TLSA resource record <xref target="RFC6698"></xref> binding a server's leaf TLS
certificate (or the public key therein) to the zone that hosts
the envelope.  In this document, the pin applies to the MCP
endpoint at <spanx style="verb">mcp.&lt;zone&gt;</spanx>.</t>
  </dd>
  <dt><spanx style="verb">alter:</spanx> URI</dt>
  <dd>
    <t>A dispatch URI scheme provisionally registered with IANA per
<xref target="RFC7595"></xref>.  Full registration body and handler guidance are
specified in <xref target="ALTER-DNS-PUB"></xref> Section 7; a normative cross-
reference is given in Section 9 of this document.</t>
  </dd>
</dl>

<t>(Terms from v02, Org-Identity Record, Identity Bootstrap,
Canonical Entity Identifier, Regulatory Refusal Marker, are
retained.)</t>

</section>
<section anchor="record-format-mcpdomain-service-discovery"><name>Record Format: <spanx style="verb">_mcp.&lt;domain&gt;</spanx> (Service Discovery)</name>

<t>Section 3 of v01 of this document defines the <spanx style="verb">_mcp.&lt;domain&gt;</spanx>
record, its ABNF grammar, field definitions (<spanx style="verb">v</spanx>, <spanx style="verb">url</spanx>, <spanx style="verb">proto</spanx>,
<spanx style="verb">pk</spanx>, <spanx style="verb">epoch</spanx>, <spanx style="verb">cap</spanx>, <spanx style="verb">attest</spanx>, <spanx style="verb">scope</spanx>, <spanx style="verb">priority</spanx>, <spanx style="verb">ttl</spanx>, <spanx style="verb">ext</spanx>),
forward-compatibility rules, and multi-string concatenation
behaviour.  These definitions are unchanged in this revision and
are incorporated here by reference.  Implementations MUST treat any
existing <spanx style="verb">_mcp.&lt;domain&gt;</spanx> record as conformant to the v01
specification.</t>

</section>
<section anchor="record-format-org-alterdomain-identity-bootstrap"><name>Record Format: <spanx style="verb">_org-alter.&lt;domain&gt;</spanx> (Identity Bootstrap)</name>

<t>Section 4 of v02 of this document defines the <spanx style="verb">_org-alter.&lt;domain&gt;</spanx>
record, its ABNF grammar, field definitions (<spanx style="verb">v</spanx>, <spanx style="verb">org</spanx>, <spanx style="verb">entity</spanx>,
<spanx style="verb">entity-type</spanx>, <spanx style="verb">founded</spanx>, <spanx style="verb">regions</spanx>, <spanx style="verb">regulated</spanx>, <spanx style="verb">bootstrap</spanx>,
<spanx style="verb">mcp-policy</spanx>, <spanx style="verb">epoch</spanx>, <spanx style="verb">pk</spanx>, <spanx style="verb">attest</spanx>, <spanx style="verb">ext</spanx>), identity bootstrap
procedure, and registry cross-checks.  These definitions are
unchanged in this revision and are incorporated here by reference.
Implementations MUST treat any existing <spanx style="verb">_org-alter.&lt;domain&gt;</spanx>
record as conformant to the v02 specification.</t>

</section>
<section anchor="alter-record"><name>Record Format: <spanx style="verb">_alter.&lt;domain&gt;</spanx> (Envelope Publication)</name>

<t>This section defines the new Envelope Publication record introduced
in v03.  The record publishes the five load-bearing fields of the
ALTER identity envelope (binding a <spanx style="verb">~handle</spanx> to its Ed25519 public
key, IdentityLog root, inception timestamp, revocation commitment,
and detached signature) at an underscore-prefixed label under the
handle's hosting zone.  The full envelope JSON schema and wire
format, including fields not carried over DNS (the implicit
<spanx style="verb">signature_alg</spanx> constant and the optional <spanx style="verb">caveats</spanx> array), is
pinned by <xref target="ALTER-DNS-PUB"></xref>.</t>

<section anchor="dns-location"><name>DNS Location</name>

<t>The Envelope Record is a DNS TXT resource record <xref target="RFC1035"></xref>
published at the label <spanx style="verb">_alter</spanx> prepended to the hosting zone:</t>

<t><spanx style="verb">
_alter.&lt;zone&gt;. IN TXT "&lt;record-value&gt;"
</spanx></t>

<t>The underscore prefix conforms to the conventions established in
<xref target="RFC8552"></xref> for globally scoped, underscore-prefixed DNS node names.</t>

<t>A zone MAY host more than one <spanx style="verb">~handle</spanx> (one envelope per handle);
in that case the zone MUST publish multiple TXT RRs at the same
owner name.  Resolvers MUST disambiguate returned records by the
<spanx style="verb">h=</spanx> field and select the record matching the requested handle.</t>

<t>A domain MAY publish any combination of <spanx style="verb">_mcp.&lt;domain&gt;</spanx>,
<spanx style="verb">_org-alter.&lt;domain&gt;</spanx>, and <spanx style="verb">_alter.&lt;domain&gt;</spanx> records independently
(service-only, identity-only, envelope-only, or any intersection).
The recommended pattern for an operator running an org-alter
instance that hosts the operator's own principal handle (e.g.
<spanx style="verb">~alice</spanx> at <spanx style="verb">example.com</spanx>) is to publish all three.</t>

</section>
<section anchor="abnf-grammar"><name>ABNF Grammar</name>

<t>The record value is a semicolon-delimited sequence of key-value
pairs.  The following ABNF (per <xref target="RFC5234"></xref>) defines the syntax:</t>

<t>```
alter-record   = version ";" SP handle-field
                 ";" SP pubkey-field
                 ";" SP ilr-field
                 ";" SP ts-field
                 ";" SP rev-field
                 ";" SP sig-field
                 *( ";" SP unknown-field )</t>

<t>version        = "v=alter1"
handle-field   = "h=" handle
pubkey-field   = "pk=" algo ":" base64url
ilr-field      = "ilr=" base64url     ; SHA-256 of IdentityLog root
ts-field       = "ts=" 1*DIGIT        ; inception_ts, Unix seconds
rev-field      = "rev=" base64url     ; SHA-256 of revocation pre-image
sig-field      = "sig=" base64url     ; Ed25519 detached signature
unknown-field  = token "=" *VCHAR</t>

<t>handle         = "~" 1<em>( ALPHA / DIGIT / "-" / "_" )
                 [ "." "bot" ]
               / "~cc-" 1</em>( ALPHA / DIGIT / "-" / "." )
algo           = "ed25519"
base64url      = 1<em>( ALPHA / DIGIT / "-" / "_" )
token          = 1</em>( ALPHA / DIGIT / "-" / "_" )
```</t>

<t>The seven keys above are REQUIRED and MUST appear in the order
shown.  Publishers MUST NOT omit or reorder them.  Resolvers MUST
tolerate additional (unknown) fields appended after the seven
required fields and MUST ignore them per the forward-compatibility
rule (Section 6.4 below).  Resolvers MUST tolerate arbitrary
inter-field ordering on parse (publishers-emit-ordered, parsers-
accept-unordered); canonicalisation for signature verification is
specified in Section 6.3.</t>

</section>
<section anchor="field-definitions"><name>Field Definitions</name>

<section anchor="v-required"><name>v (REQUIRED)</name>

<t>Protocol version identifier.  MUST be the literal string <spanx style="verb">alter1</spanx>.
MUST appear as the first field in the record.  Resolvers MUST
reject any record whose <spanx style="verb">v</spanx> field is absent, is not the first
field, or contains a value other than <spanx style="verb">alter1</spanx>.</t>

<t>The version namespace <spanx style="verb">v=alter1</spanx> on <spanx style="verb">_alter.&lt;zone&gt;</spanx> is independent
of the identically-named <spanx style="verb">v=alter1</spanx> on <spanx style="verb">_org-alter.&lt;zone&gt;</spanx>.  The
two namespaces are disambiguated by the enclosing record label and
MUST NOT be conflated.  Future versions of either record may
advance independently (e.g. <spanx style="verb">_alter.&lt;zone&gt;</spanx> may progress to
<spanx style="verb">v=alter2</spanx> while <spanx style="verb">_org-alter.&lt;zone&gt;</spanx> remains at <spanx style="verb">v=alter1</spanx>, or the
reverse).</t>

</section>
<section anchor="h-required"><name>h (REQUIRED)</name>

<t>The Sovereign-, Bot-, or Instrument-tier <spanx style="verb">~handle</spanx> to which the
envelope binds.  The leading tilde is mandatory.  The <spanx style="verb">h=</spanx> value is
the sole field resolvers MAY use to disambiguate multiple envelope
TXT RRs sharing an owner name.</t>

</section>
<section anchor="pk-required"><name>pk (REQUIRED)</name>

<t>An Ed25519 public key prefixed by its algorithm namespace and
encoded in base64url without padding per <xref target="RFC4648"></xref> Section 5:</t>

<t><spanx style="verb">
pk=ed25519:&lt;base64url-no-pad-32-bytes&gt;
</spanx></t>

<t>Resolvers MUST reject records whose algorithm prefix is not
<spanx style="verb">ed25519</spanx> until a future revision registers additional algorithms.
The <spanx style="verb">pk</spanx> value is the verification key for the detached signature
in the <spanx style="verb">sig</spanx> field.</t>

</section>
<section anchor="ilr-required"><name>ilr (REQUIRED)</name>

<t>Base64url-no-pad SHA-256 digest of the IdentityLog root witnessed
at envelope creation.  Resolvers MUST cross-reference this value
against the IdentityLog witness surface <xref target="ALTER-STH"></xref> to confirm the
envelope was minted within a recognised tree state.  Failure to
cross-reference renders the envelope unverified.</t>

</section>
<section anchor="ts-required"><name>ts (REQUIRED)</name>

<t>Envelope inception timestamp, expressed as decimal Unix seconds
(integer).  Resolvers MAY use this field to detect clock skew,
evaluate caveat maturity, or reject envelopes with implausibly
future inception.</t>

</section>
<section anchor="rev-required"><name>rev (REQUIRED)</name>

<t>Base64url-no-pad SHA-256 digest of the revocation pre-image.
Revocation is effected by revealing the pre-image to the
IdentityLog; upon reveal, the envelope is considered revoked and
MUST NOT be honoured by resolvers.  The <spanx style="verb">rev</spanx> field is a
forward-secure commitment: the pre-image is never published in DNS
and is released only at revocation time to the log.</t>

<t>Publishers MUST NOT treat removal of the TXT record as revocation.
Absence of a record is indistinguishable from misconfiguration; only
pre-image reveal is load-bearing.</t>

</section>
<section anchor="sig-required"><name>sig (REQUIRED)</name>

<t>Base64url-no-pad Ed25519 detached signature over the JCS-
canonicalised envelope JSON with the <spanx style="verb">signature</spanx> field absent.
Canonicalisation is specified by <xref target="RFC8785"></xref>.  The signing input is
the envelope JSON reconstructed from the parsed TXT fields plus the
implicit constant <spanx style="verb">signature_alg: "Ed25519"</spanx> and an empty <spanx style="verb">caveats</spanx>
array; caveats, when present, ride the HTTPS <spanx style="verb">.well-known</spanx> organ
and do not appear in the DNS record.  The canonical envelope
schema, including JCS input construction, is pinned in
<xref target="ALTER-DNS-PUB"></xref> Section 4.</t>

</section>
<section anchor="unknown-fields"><name>Unknown fields</name>

<t>Fields not enumerated above MUST be ignored by v03 resolvers per
the forward-compatibility rule (Section 6.4).  Future revisions of
this document MAY register additional envelope fields; such
extensions MUST be distinguishable from private-use extensions by
registration via the mechanism in Section 10.</t>

</section>
</section>
<section anchor="canonical-serialisation"><name>Canonical Serialisation</name>

<t>The <spanx style="verb">sig</spanx> input is constructed as follows:</t>

<t><list style="numbers" type="1">
  <t>Parse the TXT RR character-strings into key-value pairs.</t>
  <t>Construct the envelope JSON object:  <vspace blankLines='1'/>
<spanx style="verb">json
{
  "handle": "&lt;h&gt;",
  "pubkey": "&lt;pk&gt;",
  "identitylog_root": "&lt;ilr&gt;",
  "inception_ts": &lt;ts&gt;,
  "revocation_hash": "&lt;rev&gt;",
  "signature_alg": "Ed25519",
  "caveats": []
}
</spanx>  <vspace blankLines='1'/>
Values are typed per Section 6.2 (<spanx style="verb">inception_ts</spanx> as JSON
integer; all other values as JSON strings; <spanx style="verb">caveats</spanx> as JSON
array, empty unless a companion <spanx style="verb">.well-known</spanx> fetch supplies
content).  The <spanx style="verb">signature</spanx> field MUST be absent from the signing
input.</t>
  <t>Apply <xref target="RFC8785"></xref> JSON Canonicalisation Scheme to the object.</t>
  <t>The resulting byte stream is the Ed25519 signing input.</t>
</list></t>

<t>Verification reverses this construction and checks the detached
signature in the <spanx style="verb">sig</spanx> field against the derived byte stream.</t>

<t>Publishers MUST emit TXT fields in the order given in Section 6.2,
but the DNS key=value ordering has no role in signature
computation: the signed bytes are always the JCS serialisation of
the JSON object.</t>

</section>
<section anchor="forward-compatibility"><name>Forward Compatibility</name>

<t>Resolvers MUST ignore unknown fields in the <spanx style="verb">_alter.&lt;domain&gt;</spanx>
record.  This rule, identical to the v01 <spanx style="verb">_mcp</spanx> and v02
<spanx style="verb">_org-alter</spanx> specifications, ensures that future extensions do not
break existing implementations.</t>

<t>Publishers MUST NOT introduce new fields that repurpose or overload
the seven required field names; new fields MUST use new names
registered via the procedure in Section 10.</t>

</section>
<section anchor="multi-string-reassembly"><name>Multi-String Reassembly</name>

<t>Where the serialised envelope exceeds the 255-octet character-string
limit of <xref target="RFC1035"></xref> Section 3.3.14, publishers MUST split at <spanx style="verb">; </spanx>
boundaries between complete key-value pairs.  Splitting within a
key-value pair is prohibited.  Resolvers MUST concatenate the
character-strings of a TXT RR in the order returned by the DNS
library (i.e. the RR wire order) before parsing.</t>

</section>
</section>
<section anchor="dnssec"><name>DNSSEC Requirement</name>

<t>The zone publishing an <spanx style="verb">_alter.&lt;domain&gt;</spanx> envelope record MUST be
DNSSEC-signed per <xref target="RFC4033"></xref>, <xref target="RFC4034"></xref>, and <xref target="RFC4035"></xref>.
Authoritative servers MUST respond with valid RRSIG coverage for
the TXT RRset.  Recursive resolvers handling queries for the
envelope RRset MUST perform DNSSEC validation and MUST set the AD
(Authenticated Data) bit on the response delivered to the stub
client.</t>

<t>Stub clients (MCP clients, alter-runtime daemons, onboarding
wizards, recognition verifiers) consuming <spanx style="verb">_alter.&lt;domain&gt;</spanx>
envelope records MUST reject any response that lacks a set AD bit
or that fails local RRSIG verification when operating in
validating-stub mode.  An envelope obtained over an unvalidated DNS
path is not an envelope; it is unauthenticated TXT content.
Treating it otherwise is a downgrade vulnerability (Section 11).</t>

<t>This requirement is specific to <spanx style="verb">_alter.&lt;domain&gt;</spanx> records.  DNSSEC
is RECOMMENDED but not REQUIRED for <spanx style="verb">_mcp.&lt;domain&gt;</spanx> and
<spanx style="verb">_org-alter.&lt;domain&gt;</spanx> records in this revision, for backward
compatibility with v01 and v02 deployments.  Future revisions of
this document MAY promote DNSSEC to REQUIRED for the other two
records once deployment data justifies the promotion.</t>

</section>
<section anchor="dane-tlsa"><name>DANE TLSA Pin</name>

<t>The MCP endpoint associated with a published envelope MUST carry a
DANE TLSA resource record <xref target="RFC6698"></xref> binding the endpoint's leaf TLS
certificate or SubjectPublicKeyInfo to the zone.  The TLSA record
MUST be published at:</t>

<t><spanx style="verb">
_443._tcp.mcp.&lt;zone&gt;. IN TLSA &lt;usage&gt; &lt;selector&gt; &lt;matching-type&gt; &lt;cert-association-data&gt;
</spanx></t>

<t>Recommended parameters:</t>

<t><list style="symbols">
  <t><strong>Usage field.</strong> <spanx style="verb">3</spanx> (DANE-EE), pin the end-entity certificate
directly, with no CA chain reliance.  A publisher that explicitly
requires CA-chain validation MAY use <spanx style="verb">1</spanx> (PKIX-EE) instead.
Publishers MUST NOT use <spanx style="verb">0</spanx> (PKIX-TA) or <spanx style="verb">2</spanx> (DANE-TA) for the
envelope organ; the trust basis of the envelope is the
end-entity leaf.</t>
  <t><strong>Selector field.</strong> <spanx style="verb">1</spanx> (SPKI), pin the SubjectPublicKeyInfo so
that certificate rotations preserving the keypair do not
invalidate the record.  Selector <spanx style="verb">0</spanx> (full certificate) MAY be
used but requires more frequent TLSA republication.</t>
  <t><strong>Matching-type field.</strong> <spanx style="verb">1</spanx> (SHA-256).  Matching type <spanx style="verb">2</spanx>
(SHA-512) is reserved for future revisions.</t>
</list></t>

<t>Clients establishing an MCP session at <spanx style="verb">https://mcp.&lt;zone&gt;/</spanx> in
conjunction with a resolved envelope MUST fetch and validate the
TLSA record, MUST abort the TLS handshake on mismatch, and MUST NOT
fall back to PKIX-only validation on TLSA failure.</t>

<t>The TLSA requirement is scoped to envelopes whose MCP session
establishment is triggered by the resolved envelope (i.e. when the
envelope resolution and the subsequent MCP session are part of a
single recognition transaction).  MCP clients that do not resolve
an envelope (e.g. v01-only clients consuming only <spanx style="verb">_mcp.&lt;domain&gt;</spanx>)
are out of scope for this requirement and continue to operate
under v01 rules.</t>

</section>
<section anchor="identitylog"><name>IdentityLog Cross-Reference</name>

<t>The <spanx style="verb">ilr=</spanx> field of the <spanx style="verb">_alter.&lt;domain&gt;</spanx> record carries a
base64url-no-pad SHA-256 digest of an IdentityLog Signed Tree Head
(STH) root witnessed at envelope creation.  The IdentityLog
protocol (leaf hashing, Merkle-tree construction, STH cadence,
witness federation, Cloudflare R2 / IPFS / Base L2 anchor path)
is specified in full by <xref target="ALTER-STH"></xref>; this document does not
duplicate that specification.</t>

<t>Resolvers verifying an envelope from DNS MUST cross-reference the
<spanx style="verb">ilr=</spanx> value against at least one IdentityLog witness surface
(federation mirror, R2 canonical read, IPFS content address, or
Base L2 <spanx style="verb">IdentityLogAnchor</spanx> contract).  The specific surface is a
matter of deployment preference; <xref target="ALTER-STH"></xref> Section 6 gives
conforming client profiles.  Failure to cross-reference renders the
envelope unverified and it MUST NOT be admitted to any
recognition-gated decision.</t>

<t>The revocation check also crosses the IdentityLog: a resolver MUST
consult the IdentityLog revocation-witness surface for any reveal
whose SHA-256 equals the <spanx style="verb">rev=</spanx> field of the envelope.  If a
matching pre-image has been revealed, the envelope is revoked and
MUST NOT be honoured regardless of the freshness of the TXT RRset.</t>

</section>
<section anchor="alter-uri"><name><spanx style="verb">alter:</spanx> URI Scheme Cross-Reference</name>

<t>An IANA-registered URI scheme <spanx style="verb">alter:</spanx> provides a dispatchable
surface for <spanx style="verb">~handle</spanx> references: operating-system URI handlers
(xdg-mime, LSHandlers, Windows registry, Android intent-filter)
invoke a resolver that retrieves and verifies the envelope through
the organ chain defined in <xref target="ALTER-DNS-PUB"></xref> (DNS first, with
fallback to the HTTPS <spanx style="verb">.well-known</spanx> surface and, where available,
the local <spanx style="verb">alter-runtime</spanx> L3 daemon).</t>

<t>Registration is provisional per <xref target="RFC7595"></xref> Section 3.  The full
registration body, scheme syntax, semantics, encoding
considerations, interoperability and security considerations,
author and change controller, is published in <xref target="ALTER-DNS-PUB"></xref>
Section 7 and submitted to IANA separately from this document.
The IANA request is in progress as of the publication date of this
revision; the final registration reference will be substituted when
available.</t>

<t>Handlers invoked via <spanx style="verb">alter:</spanx> URIs MUST perform full envelope
verification, DNSSEC validation (Section 7), DANE TLSA binding
(Section 8) when establishing any HTTPS session, IdentityLog cross-
reference (Section 9), and the eleven-step verification algorithm
of <xref target="ALTER-DNS-PUB"></xref> Section 8, before acting on any content or
directive derived from the envelope.</t>

</section>
<section anchor="discovery-and-bootstrap-procedures"><name>Discovery and Bootstrap Procedures</name>

<section anchor="discovery-procedure-mcpdomain"><name>Discovery Procedure: <spanx style="verb">_mcp.&lt;domain&gt;</spanx></name>

<t>The discovery procedure defined in Section 4 of v01 is unchanged
in this revision.  Clients querying <spanx style="verb">_mcp.&lt;domain&gt;</spanx> follow the v01
algorithm exactly.</t>

</section>
<section anchor="identity-bootstrap-procedure-org-alterdomain"><name>Identity Bootstrap Procedure: <spanx style="verb">_org-alter.&lt;domain&gt;</spanx></name>

<t>The identity bootstrap procedure defined in Section 6 of v02 is
unchanged in this revision.  Onboarding wizards reading
<spanx style="verb">_org-alter.&lt;domain&gt;</spanx> follow the v02 algorithm exactly.</t>

</section>
<section anchor="envelope-recognition-procedure-alterdomain"><name>Envelope Recognition Procedure: <spanx style="verb">_alter.&lt;domain&gt;</spanx></name>

<t>Given an <spanx style="verb">alter:~&lt;handle&gt;</spanx> reference, a zone hint, or a raw
<spanx style="verb">_alter.&lt;zone&gt;.</spanx> query, a resolver MUST execute the following steps
in order.  Any failure terminates recognition and the envelope
MUST be treated as unverified.</t>

<t><list style="numbers" type="1">
  <t><strong>Query.</strong>  Issue a DNS TXT query for <spanx style="verb">_alter.&lt;zone&gt;.</spanx>.  Use
DoH or DoT in preference to UDP/53 where operationally feasible.</t>
  <t><strong>DNSSEC validation.</strong>  Validate the RRSIG chain from the root
trust anchor to the TXT RRset (Section 7).  Confirm the AD bit
on the response when relying on an upstream validating resolver,
or locally RRSIG-validate in validating-stub mode.  On failure,
abort.</t>
  <t><strong>Chunk reassembly.</strong>  Concatenate character-strings in RR order;
parse <spanx style="verb">; </spanx>-separated key-value pairs.</t>
  <t><strong>Handle disambiguation.</strong>  Select the record whose <spanx style="verb">h=</spanx> field
matches the requested <spanx style="verb">~handle</spanx>.  If no record matches, abort.</t>
  <t><strong>Field extraction.</strong>  Confirm presence of the seven required
fields (<spanx style="verb">v</spanx>, <spanx style="verb">h</spanx>, <spanx style="verb">pk</spanx>, <spanx style="verb">ilr</spanx>, <spanx style="verb">ts</spanx>, <spanx style="verb">rev</spanx>, <spanx style="verb">sig</spanx>).  Reject any
record missing any required field, or whose <spanx style="verb">v</spanx> is not
<spanx style="verb">alter1</spanx>.</t>
  <t><strong>Envelope reconstruction.</strong>  Build the envelope JSON per
Section 6.3, inserting the implicit <spanx style="verb">signature_alg: "Ed25519"</spanx>
constant and an empty <spanx style="verb">caveats</spanx> array.</t>
  <t><strong>JCS canonicalisation.</strong>  Apply <xref target="RFC8785"></xref> JCS to the envelope
with the <spanx style="verb">signature</spanx> field absent.</t>
  <t><strong>Ed25519 verification.</strong>  Verify the detached <spanx style="verb">sig</spanx> over the
JCS byte stream using the public key in <spanx style="verb">pk</spanx>.  On failure,
abort.</t>
  <t><strong>IdentityLog cross-reference.</strong>  Confirm <spanx style="verb">ilr=</spanx> corresponds to
a STH recognised in the IdentityLog witness set at or after <spanx style="verb">ts</spanx>
(Section 9; <xref target="ALTER-STH"></xref>).  On failure, abort.</t>
  <t><strong>DANE TLSA validation.</strong>  When establishing an MCP session at
<spanx style="verb">mcp.&lt;zone&gt;</spanx> as part of the same recognition transaction, fetch
the TLSA record at <spanx style="verb">_443._tcp.mcp.&lt;zone&gt;.</spanx> and gate the TLS
handshake on the binding (Section 8).  On mismatch, abort.</t>
  <t><strong>Caveats evaluation.</strong>  Fetch the HTTPS <spanx style="verb">.well-known</spanx>
companion surface and evaluate any caveats on the envelope
per <xref target="ALTER-DNS-PUB"></xref>.  Caveats that cannot be satisfied bound
the subsequent use of the envelope but are not grounds to
abort recognition.</t>
  <t><strong>Revocation check.</strong>  Consult the IdentityLog revocation-
witness surface.  If a pre-image whose SHA-256 equals <spanx style="verb">rev=</spanx>
has been revealed, the envelope is revoked; abort.</t>
</list></t>

<t>Only after all twelve steps succeed is the envelope considered
verified.  A verified envelope is the sole admissible input to a
recognition-over-qualification gate; unverified envelopes MUST be
refused upstream of any authorisation or trust decision.</t>

<t>The twelve-step procedure above is the IETF-surface summary of the
eleven-step verification algorithm in <xref target="ALTER-DNS-PUB"></xref> Section 8;
they differ only in that this document splits caveats and
revocation into distinct steps for clarity.</t>

</section>
</section>
<section anchor="caching"><name>Caching</name>

<t>Caching of <spanx style="verb">_mcp.&lt;domain&gt;</spanx> records follows v01.  Caching of
<spanx style="verb">_org-alter.&lt;domain&gt;</spanx> records follows v02.</t>

<t><spanx style="verb">_alter.&lt;domain&gt;</spanx> records SHOULD be cached for the duration of the
DNS TTL.  Resolvers MUST NOT serve stale envelope TXT past the
RRset TTL unless they are themselves validating caches and can
re-confirm RRSIG coverage on each serve.  Recognition verifiers
MAY cache successful verification results locally for a short
interval (bounded above by the RRset TTL or 3600 seconds,
whichever is smaller) to amortise the cost of repeated JCS and
Ed25519 operations, but MUST re-run the revocation check
(Section 11.12) on each recognition event, not on each cache
refresh.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>(Security considerations from v01 and v02 are retained.  Additional
considerations introduced by the envelope layer are below.)</t>

<section anchor="dnssec-downgrade"><name>DNSSEC Downgrade</name>

<t>The mandatory DNSSEC requirement in Section 7 is the primary
defence against on-path manipulation of envelope TXT content.  An
attacker who can inject unsigned responses, e.g. via a compromised
resolver or a DNS middlebox that strips RRSIG, would otherwise
be able to substitute an attacker-controlled envelope at the resolver
boundary.  Stub clients MUST reject any response lacking AD or
failing local RRSIG verification.  Operators MUST NOT downgrade the
<spanx style="verb">_alter.</spanx> RRset to unsigned during KSK/ZSK rollover (see <xref target="RFC6781"></xref>
for best-current practice on rollover).</t>

</section>
<section anchor="tlsa-pin-rotation"><name>TLSA Pin Rotation</name>

<t>The DANE TLSA requirement in Section 8 binds the MCP endpoint's TLS
leaf to a specific hash.  Operators rotating certificates MUST
publish the new TLSA record before the new certificate is activated
on the live listener, with a grace window of at least twice the
TLSA RRset TTL.  Selector 1 (SPKI) survives rotations that preserve
the keypair; selector 0 requires republication on every rotation.
Loss of the TLS private key forces revocation via the
<spanx style="verb">revocation_hash</spanx> reveal path (Section 9) rather than silent
cert replacement.</t>

</section>
<section anchor="envelope-substitution"><name>Envelope Substitution</name>

<t>An attacker in control of a domain's DNS can publish an arbitrary
envelope for any <spanx style="verb">~handle</spanx> claimed to be hosted under that zone.
The three structural defences are:</t>

<t><list style="numbers" type="1">
  <t><strong>IdentityLog witness.</strong> The <spanx style="verb">ilr=</spanx> cross-reference constrains
the envelope to STHs witnessed by the IdentityLog federation;
substitution of a locally-minted envelope that has not been
witnessed will fail Section 11.9.  An attacker who wishes to
substitute must also corrupt at least one IdentityLog mirror,
which is a detectable equivocation per <xref target="RFC9162"></xref> design.</t>
  <t><strong>Ed25519 signature.</strong>  The detached signature binds the
envelope to a specific Ed25519 key.  An attacker who does not
hold the private key cannot forge a valid <spanx style="verb">sig</spanx>.  An attacker
who does hold the private key has already compromised the
handle; the revocation path (Section 9) is the residual mitigation.</t>
  <t><strong>DNSSEC.</strong>  Section 7 prevents tampering with the TXT RRset in
transit.  This does not prevent a malicious zone operator from
publishing a malicious envelope, that attack is caught at
(1) and (2), but it prevents third-party substitution.</t>
</list></t>

</section>
<section anchor="revocation-opacity"><name>Revocation Opacity</name>

<t>Revocation is effected by revealing the pre-image to the
IdentityLog, not by removing the TXT record.  Absence of a record
is indistinguishable from misconfiguration; resolvers MUST NOT
treat absence as revocation.  This design is deliberate: a zone
briefly unreachable (DNS outage, registrar incident, tooling error)
must not accidentally become a revocation event.</t>

<t>The cost is that a compromised zone may continue to serve a valid
(but intended-to-be-revoked) envelope until the rightful
handle-holder reveals the pre-image.  Pre-image reveal is a
low-friction operation, a single authenticated POST to any
IdentityLog mirror, but it requires the rightful holder to act.
Handle-holders SHOULD establish a pre-committed revocation reveal
procedure at mint time.</t>

</section>
<section anchor="clock-skew-and-ts"><name>Clock Skew and <spanx style="verb">ts=</spanx></name>

<t>The <spanx style="verb">ts=</spanx> inception timestamp is advisory: resolvers MAY use it to
detect implausibly future envelopes (e.g. minted more than a few
hundred seconds after current wall time) but MUST NOT rely on
local clock for security-critical decisions.  The authoritative
ordering anchor is the IdentityLog STH tree position, not the
inception timestamp.</t>

</section>
<section anchor="cross-record-key-consistency"><name>Cross-Record Key Consistency</name>

<t>When all three records (<spanx style="verb">_mcp</spanx>, <spanx style="verb">_org-alter</spanx>, <spanx style="verb">_alter</spanx>) are
published under the same zone and each carries a <spanx style="verb">pk</spanx> field, the
values MUST be evaluated for consistency.  The <spanx style="verb">_mcp.pk</spanx> and
<spanx style="verb">_org-alter.pk</spanx> fields are v01/v02 service and organisational keys
respectively; the <spanx style="verb">_alter.pk</spanx> field is the Sovereign-tier envelope
key.  These are structurally distinct purposes, and the keys MAY
differ.  However, where a zone operator deliberately binds all
three to the same Ed25519 key (a common pattern for a
single-operator deployment), a mismatch across records indicates
either rotation-in-progress or compromise; resolvers SHOULD surface
the discrepancy.</t>

</section>
<section anchor="passive-stream-coupling"><name>Passive-Stream Coupling</name>

<t>The <spanx style="verb">_alter.&lt;domain&gt;</spanx> record carries only the five load-bearing
envelope fields and the protocol version.  No inferred trait, no
passive-stream derivative, and no provenance-tagged attribute rides
this record.  This is a structural property, not a recommendation:
the ABNF of Section 6.2 enumerates every field the resolver
accepts, and the forward-compatibility rule only permits future
named extensions, not arbitrary attribute carriage.  The privacy
implications of passive inference are addressed at the envelope
semantic layer <xref target="ALTER-DNS-PUB"></xref> and its caveats surface, not in DNS.</t>

</section>
</section>
<section anchor="privacy-considerations"><name>Privacy Considerations</name>

<t>(Privacy considerations from v01 and v02 are retained.  Additional
considerations introduced by the envelope layer are below.)</t>

<section anchor="public-handle-disclosure"><name>Public Handle Disclosure</name>

<t>Publishing <spanx style="verb">_alter.&lt;domain&gt;</spanx> exposes the bound <spanx style="verb">~handle</spanx>, its
Ed25519 public key, its IdentityLog root, its inception timestamp,
and its revocation-hash commitment to any DNS observer.  For a
Sovereign-tier handle this is by design: the envelope is intended
to be publicly verifiable.  Handle-holders who require concealment
MUST NOT publish an <spanx style="verb">_alter.&lt;domain&gt;</spanx> record; alternative organs
(the local <spanx style="verb">alter-runtime</spanx> daemon for local-only recognition, or
a hardware-anchored device-organ quorum for device-local presence
proof) support recognition without DNS publication.</t>

</section>
<section anchor="dns-query-metadata"><name>DNS Query Metadata</name>

<t>A resolver querying <spanx style="verb">_alter.example.com</spanx> reveals to its recursive
resolver that it intends to verify the envelope hosted under that
zone.  Query metadata privacy is addressed at the transport layer:
clients SHOULD prefer DoH (<xref target="RFC8484"></xref>) or DoT (<xref target="RFC7858"></xref>) over
UDP/53 where operationally feasible.  This consideration is
identical to v01 / v02 and is repeated here for emphasis given the
greater individual-identity sensitivity of the envelope surface.</t>

</section>
<section anchor="revocation-unlinkability"><name>Revocation Unlinkability</name>

<t>The <spanx style="verb">rev=</spanx> field is the SHA-256 of a secret pre-image; publishing
it does not disclose the pre-image.  An observer cannot predict
the pre-image or link it back to any identifier.  Reveal at
revocation time links the pre-image to the envelope, but only at
the moment of revocation, not during the envelope's active
lifetime.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="underscored-dns-node-name-registration"><name>Underscored DNS Node Name Registration</name>

<t>This document requests IANA to update the entries in the
"Underscored and Globally Scoped DNS Node Names" registry
established by <xref target="RFC8552"></xref> to reflect v03:</t>

<t><spanx style="verb">
+--------+--------------+----------------------------------+
| RR Type| _NODE NAME   | Reference                        |
+--------+--------------+----------------------------------+
| TXT    | _mcp         | [this document], v01 Sec.3       |
| TXT    | _org-alter   | [this document], v02 Sec.4       |
| TXT    | _alter       | [this document], v03 Sec.6       |
+--------+--------------+----------------------------------+
</spanx></t>

<t>The <spanx style="verb">_alter</spanx> label is used to publish envelope records as defined
in Section 6 of this document.  Formal registration of <spanx style="verb">_alter</spanx>
in the RFC 8552 registry is proposed on Standards Action
maturation of this draft; during the Internet-Draft phase, the
label operates under the provisional-use convention established by
<spanx style="verb">_dmarc</spanx>, <spanx style="verb">_mta-sts</spanx>, <spanx style="verb">_mcp</spanx> (this draft), and <spanx style="verb">_org-alter</spanx> (this
draft).</t>

</section>
<section anchor="alter-uri-scheme-registration"><name><spanx style="verb">alter:</spanx> URI Scheme Registration</name>

<t>This document cross-references the provisional URI scheme
registration of <spanx style="verb">alter:</spanx> per <xref target="RFC7595"></xref> Section 3.  The full
registration body is published in <xref target="ALTER-DNS-PUB"></xref> Section 7 and is
submitted to IANA separately.  This document does not duplicate
the registration body; it refers to the sibling specification and
notes that recognition verifiers invoked via <spanx style="verb">alter:</spanx> URIs MUST
follow Section 11.12 of this document for envelope verification.</t>

</section>
<section anchor="envelope-version-registry"><name>Envelope Version Registry</name>

<t>This document defines the version tag <spanx style="verb">v=alter1</spanx> for the
<spanx style="verb">_alter.&lt;domain&gt;</spanx> record, independent of the identically-named tag
on the <spanx style="verb">_org-alter.&lt;domain&gt;</spanx> record.  Future versions (<spanx style="verb">v=alter2</spanx>
and beyond) SHOULD be coordinated with the ALTER implementation
community and documented in successor revisions of this draft.
Until a formal IETF working group is chartered for identity-
envelope DNS publication, the authors maintain the version
namespace.</t>

</section>
<section anchor="org-alter-version-registry-unchanged-from-v02"><name>Org-Alter Version Registry (unchanged from v02)</name>

<t>The version tag <spanx style="verb">v=alter1</spanx> for the <spanx style="verb">_org-alter.&lt;domain&gt;</spanx> record is
preserved from v02.  No changes are requested in this revision.</t>

</section>
<section anchor="registry-namespace-registry-unchanged-from-v02"><name>Registry Namespace Registry (unchanged from v02)</name>

<t>The initial set of <spanx style="verb">entity</spanx> field registry namespaces (<spanx style="verb">abn</spanx>,
<spanx style="verb">acn</spanx>, <spanx style="verb">ein</spanx>, <spanx style="verb">ch</spanx>, <spanx style="verb">cro</spanx>, <spanx style="verb">lei</spanx>) defined in v02 is preserved
unchanged.</t>

</section>
<section anchor="framework-token-registry-unchanged-from-v02"><name>Framework Token Registry (unchanged from v02)</name>

<t>The initial set of <spanx style="verb">regulated</spanx> framework tokens (<spanx style="verb">disp</spanx>, <spanx style="verb">itar</spanx>,
<spanx style="verb">ear</spanx>, <spanx style="verb">hipaa</spanx>, <spanx style="verb">gdpr</spanx>, <spanx style="verb">soc2</spanx>, <spanx style="verb">iso27001</spanx>, <spanx style="verb">iso42001</spanx>,
<spanx style="verb">essential8</spanx>, <spanx style="verb">aprs</spanx>) defined in v02 is preserved unchanged.</t>

</section>
<section anchor="signature-algorithm-registry"><name>Signature Algorithm Registry</name>

<t>This document defines the initial <spanx style="verb">pk=</spanx> and <spanx style="verb">sig=</spanx> algorithm
namespace <spanx style="verb">ed25519</spanx> for the <spanx style="verb">_alter.&lt;domain&gt;</spanx> record.  Future
algorithms (e.g. <spanx style="verb">ed448</spanx>, <spanx style="verb">ml-dsa-65</spanx>) MAY be registered by
successor documents.  Resolvers MUST reject records whose
algorithm prefix is not registered at the resolver's protocol
version.</t>

</section>
</section>
<section anchor="examples"><name>Examples</name>

<t>This section provides non-normative examples of Envelope Records
for common deployment scenarios.</t>

<section anchor="minimal-envelope-for-a-single-handle"><name>Minimal Envelope for a Single Handle</name>

<t>A zone hosting a single Sovereign-tier handle publishes its
envelope at <spanx style="verb">_alter.&lt;zone&gt;.</spanx>:</t>

<t><spanx style="verb">
_alter.example.com. 3600 IN TXT (
  "v=alter1; h=~alice; "
  "pk=ed25519:&lt;EXAMPLE-pubkey-32B-base64url&gt;; "
  "ilr=&lt;EXAMPLE-sth-root-32B-base64url&gt;; "
  "ts=1729123456; "
  "rev=&lt;EXAMPLE-revocation-hash-32B-base64url&gt;; "
  "sig=&lt;EXAMPLE-ed25519-signature-64B-base64url&gt;"
)
</spanx></t>

<t>All base64url values in this example are illustrative.  Production
values are the Ed25519 public key, SHA-256 digests, and 64-byte
detached signature encoded per <xref target="RFC4648"></xref> Section 5 without
padding.</t>

</section>
<section anchor="zone-hosting-multiple-handles"><name>Zone Hosting Multiple Handles</name>

<t>A zone hosting more than one handle publishes multiple envelope
TXT RRs at the same owner name.  Resolvers disambiguate by the
<spanx style="verb">h=</spanx> field:</t>

<t><spanx style="verb">
_alter.example.org. 3600 IN TXT "v=alter1; h=~alice; pk=ed25519:..."
_alter.example.org. 3600 IN TXT "v=alter1; h=~bob; pk=ed25519:..."
_alter.example.org. 3600 IN TXT "v=alter1; h=~carol.bot; pk=ed25519:..."
</spanx></t>

<t>A resolver asked to verify <spanx style="verb">~bob</spanx> at <spanx style="verb">example.org</spanx> selects the
second RR.</t>

</section>
<section anchor="full-zone-all-three-records"><name>Full Zone (All Three Records)</name>

<t>A zone operator running an org-alter instance for their own
principal handle publishes all three records:</t>

<t><spanx style="verb">
_mcp.example.com.       IN TXT "v=mcp1; url=https://mcp.example.com/ ..."
_org-alter.example.com. IN TXT "v=alter1; org=Example Org; ..."
_alter.example.com.     IN TXT "v=alter1; h=~alice; pk=ed25519:...; ilr=...; ts=...; rev=...; sig=..."
_443._tcp.mcp.example.com. IN TLSA 3 1 1 &lt;sha256-of-spki&gt;
</spanx></t>

<t>Together these expose: the MCP service endpoint and its
capabilities (<spanx style="verb">_mcp</spanx>); the legal entity, regulatory posture, and
jurisdictional regions (<spanx style="verb">_org-alter</spanx>); the Sovereign-tier
envelope for <spanx style="verb">~alice</spanx> (<spanx style="verb">_alter</spanx>); and the DANE TLSA pin on the
MCP endpoint.  A resolver may consume any subset according to its
recognition requirement.</t>

</section>
<section anchor="instrument-tier-handle"><name>Instrument-Tier Handle</name>

<t>An AI instrument handle uses the <spanx style="verb">~cc-</spanx> prefix:</t>

<t><spanx style="verb">
_alter.example.com. 3600 IN TXT (
  "v=alter1; h=~cc-example-model; "
  "pk=ed25519:...; ilr=...; ts=...; rev=...; sig=..."
)
</spanx></t>

<t>Instrument-tier envelopes are bound to a specific model version.
Rotation of the model version produces a new <spanx style="verb">~cc-</spanx> handle with a
new envelope; the prior envelope remains verifiable over its
active lifetime and is revoked by the IdentityLog reveal path when
the model is retired.</t>

</section>
</section>
<section anchor="interoperability-with-v01-and-v02"><name>Interoperability with v01 and v02</name>

<t>A domain that publishes only a v01 <spanx style="verb">_mcp.&lt;domain&gt;</spanx> record
continues to work with all v01, v02, and v03 clients.</t>

<t>A domain that publishes <spanx style="verb">_mcp.&lt;domain&gt;</spanx> and
<spanx style="verb">_org-alter.&lt;domain&gt;</spanx> (v02) continues to work with v02 and v03
clients unchanged.  v03 clients gain the ability to additionally
query <spanx style="verb">_alter.&lt;domain&gt;</spanx> and gracefully handle its absence.</t>

<t>A domain that publishes all three records benefits from:</t>

<t><list style="symbols">
  <t>Service discovery via <spanx style="verb">_mcp.&lt;domain&gt;</spanx> (v01).</t>
  <t>Organisational identity bootstrap via <spanx style="verb">_org-alter.&lt;domain&gt;</spanx>
(v02).</t>
  <t>Individual identity recognition via <spanx style="verb">_alter.&lt;domain&gt;</spanx> (v03).</t>
  <t>DNSSEC-authenticated envelope delivery (Section 7).</t>
  <t>DANE TLSA binding on the MCP endpoint (Section 8).</t>
  <t>IdentityLog-anchored envelope lifecycle (Section 9).</t>
</list></t>

<t>A domain that publishes only <spanx style="verb">_alter.&lt;domain&gt;</spanx> (envelope-only, no
MCP server, no organisational record) is permitted.  This is the
appropriate configuration for a Sovereign-tier individual who
wishes to be recognisable under their own zone without operating
an MCP server endpoint or declaring an organisational identity.</t>

<t>The three records are orthogonal along their semantic axes but
share the zone's DNSSEC trust root.  A v03-compliant resolver that
successfully resolves any subset of the three records treats each
resolution as independent and does not fail the resolution of one
record because another is absent or malformed.</t>

</section>
<section anchor="implementation-status"><name>Implementation Status</name>

<t>This section records the status of known implementations at the
time of publication, per <xref target="RFC7942"></xref>.</t>

<t>ALTER (https://truealter.com) maintains a reference implementation
of all three records:</t>

<t><list style="symbols">
  <t><spanx style="verb">_mcp.truealter.com</spanx> exercising the v01 field set including
<spanx style="verb">pk</spanx>, <spanx style="verb">epoch</spanx>, <spanx style="verb">attest</spanx>, and <spanx style="verb">ext</spanx>.</t>
  <t><spanx style="verb">_org-alter.truealter.com</spanx> exercising the v02 field set including
<spanx style="verb">entity</spanx>, <spanx style="verb">regulated</spanx>, <spanx style="verb">mcp-policy</spanx>, and <spanx style="verb">bootstrap</spanx>.</t>
  <t><spanx style="verb">_alter.truealter.com</spanx> exercising the v03 envelope field set
(<spanx style="verb">h</spanx>, <spanx style="verb">pk</spanx>, <spanx style="verb">ilr</spanx>, <spanx style="verb">ts</spanx>, <spanx style="verb">rev</spanx>, <spanx style="verb">sig</spanx>) for the operator's
Sovereign-tier handle.</t>
  <t><spanx style="verb">_443._tcp.mcp.truealter.com</spanx> publishing a DANE-EE / SPKI /
SHA-256 TLSA pin on the MCP endpoint leaf.</t>
  <t>An IdentityLog STH anchor federation with four independent
witness surfaces (Cloudflare R2 canonical, IPFS content-
addressed, two federation mirrors, Base L2
<spanx style="verb">IdentityLogAnchor</spanx> contract).</t>
  <t>A standalone L0 discovery and recognition library
(<spanx style="verb">alter_discover</spanx>) that resolves all three records, validates
DNSSEC locally, fetches and verifies the DANE TLSA pin, cross-
references the IdentityLog witness surface, and produces a
structured recognition report.</t>
  <t>An <spanx style="verb">alter:</spanx> URI handler registered via xdg-mime on Linux/BSD and
the corresponding platform registration paths on macOS, Windows,
iOS, and Android.</t>
  <t>An onboarding wizard tool (<spanx style="verb">mcp-org-alter onboard</spanx>) that
bootstraps a new org-alter instance from the published records
with no manual data entry beyond the domain name.</t>
</list></t>

<t>The reference implementation targets MCP specification version
2025-11, uses <spanx style="verb">streamable-http</spanx> as the default transport, and
treats DNSSEC + DANE + IdentityLog as a mandatory verification
chain for any <spanx style="verb">_alter.&lt;domain&gt;</spanx>-derived recognition.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

&RFC1035;
&RFC2119;
&RFC4033;
&RFC4034;
&RFC4035;
&RFC4648;
&RFC5234;
&RFC6698;
&RFC7208;
&RFC7595;
&RFC8174;
&RFC8461;
&RFC8552;
&RFC8785;
<reference anchor="MCP" target="https://modelcontextprotocol.io">
  <front>
    <title>Model Context Protocol Specification</title>
    <author >
      <organization>Agentic AI Foundation</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">

&RFC6376;
&RFC6781;
&RFC7489;
&RFC7858;
&RFC7942;
&RFC8484;
&RFC9162;
<reference anchor="MORRISON-IFT" target="https://doi.org/10.6084/m9.figshare.31951383">
  <front>
    <title>Identity Field Theory: Toward a Physics of Being Known</title>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="ALTER-DNS-PUB" target="https://truealter.com/docs/protocol/alter-dns-publication-v1">
  <front>
    <title>ALTER DNS Publication, v1</title>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="ALTER-STH" target="https://truealter.com/docs/protocol/identitylog-sth-anchor-v1">
  <front>
    <title>IdentityLog STH Anchor, v1</title>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>


    </references>

</references>


<?line 1061?>

<section anchor="recognition-pseudocode"><name>Recognition Pseudocode</name>

<t>The following pseudocode illustrates the combined recognition
procedure defined in Section 11.3.  It is non-normative; the
normative procedure is the twelve-step algorithm in the body of
the document and the eleven-step algorithm in <xref target="ALTER-DNS-PUB"></xref>
Section 8 to which it cross-references.</t>

<t>```
function recognise_envelope(handle, zone):
    # Step 1-2: Query + DNSSEC
    response = dns_query("_alter." + zone, type=TXT, prefer=DoH)
    if not response.ad_bit and not local_rrsig_validate(response):
        raise UnauthenticatedResponse</t>

<figure><artwork><![CDATA[
# Step 3-5: Chunk reassembly + handle disambiguation + fields
records = [parse_alter_record(rr) for rr in response.rrset]
record = find(records, lambda r: r.h == handle)
if record is None or record.v != "alter1":
    raise RecordNotFound
for f in ["h", "pk", "ilr", "ts", "rev", "sig"]:
    if not hasattr(record, f):
        raise MalformedRecord

# Step 6-7: Envelope reconstruction + JCS
envelope = {
    "handle": record.h,
    "pubkey": record.pk,
    "identitylog_root": record.ilr,
    "inception_ts": int(record.ts),
    "revocation_hash": record.rev,
    "signature_alg": "Ed25519",
    "caveats": [],
}
signing_input = jcs_canonicalise(envelope)

# Step 8: Ed25519 verify
if not ed25519_verify(record.pk, record.sig, signing_input):
    raise SignatureInvalid

# Step 9: IdentityLog cross-ref
if not identitylog_witness_contains(record.ilr, record.ts):
    raise WitnessMissing

# Step 10: DANE TLSA (if establishing MCP session)
if establishing_mcp_session(zone):
    tlsa = dns_query("_443._tcp.mcp." + zone, type=TLSA)
    if not tlsa_matches_endpoint(tlsa, "mcp." + zone):
        raise TLSAFailure

# Step 11: Caveats (advisory only; bounds subsequent use)
caveats = fetch_well_known_caveats(zone, handle)

# Step 12: Revocation
if identitylog_revocation_revealed(record.rev):
    raise EnvelopeRevoked

return VerifiedEnvelope(record, caveats) ```
]]></artwork></figure>

</section>
<section anchor="document-history"><name>Document History</name>

<t>draft-morrison-mcp-dns-discovery-03 (April 2026):</t>

<t>Editorial corrections (retiring -02):</t>

<t><list style="symbols">
  <t>Removes the third-party-domain worked example used in -02 and
replaces all instances with [RFC2606] reserved example-domain
forms; no third-party operational domain appears in any
illustrative DNS record in this revision.</t>
  <t>Strips city and locality fields from the author front-matter
block, retaining only name, organisation, and email per editorial
policy.</t>
</list></t>

<t>Substantive additions:</t>

<t><list style="symbols">
  <t>Adds the <spanx style="verb">_alter.&lt;domain&gt;</spanx> Envelope Record (Section 6).</t>
  <t>Defines <spanx style="verb">v</spanx>, <spanx style="verb">h</spanx>, <spanx style="verb">pk</spanx>, <spanx style="verb">ilr</spanx>, <spanx style="verb">ts</spanx>, <spanx style="verb">rev</spanx>, <spanx style="verb">sig</spanx> fields for the
new record, mirroring the canonical envelope fragment pinned by
<xref target="ALTER-DNS-PUB"></xref>.</t>
  <t>Introduces a mandatory DNSSEC validation requirement for
<spanx style="verb">_alter.&lt;domain&gt;</spanx> responses (Section 7).</t>
  <t>Introduces a mandatory DANE TLSA <xref target="RFC6698"></xref> pin on the MCP
endpoint (Section 8) for envelope-triggered MCP sessions.</t>
  <t>Adds the IdentityLog STH cross-reference requirement (Section
9), pointing at <xref target="ALTER-STH"></xref> for the log protocol specification.</t>
  <t>Adds a provisional <spanx style="verb">alter:</spanx> URI scheme cross-reference per
<xref target="RFC7595"></xref> (Section 10).</t>
  <t>Adds the envelope recognition procedure (Section 11.3), a
twelve-step algorithm that cross-refers to the eleven-step
algorithm of <xref target="ALTER-DNS-PUB"></xref> Section 8.</t>
  <t>Adds IANA registration for <spanx style="verb">_alter</spanx> underscore-prefixed label
(Section 13.1) and the independent <spanx style="verb">v=alter1</spanx> envelope version
namespace.</t>
  <t>Adds a Signature Algorithm Registry (Section 13.8) with initial
value <spanx style="verb">ed25519</spanx>.</t>
  <t>Adds Security Considerations for DNSSEC downgrade, TLSA pin
rotation, envelope substitution, revocation opacity, clock skew,
cross-record key consistency, and passive-stream coupling.</t>
  <t>Adds Privacy Considerations for public handle disclosure, DNS
query metadata, and revocation unlinkability.</t>
  <t>Adds Examples for minimal envelope, multi-handle zone, full
ALTER zone with all three records, and Instrument-tier handle.</t>
  <t>Adds Implementation Status entry for the envelope reference
implementation.</t>
  <t>v01 <spanx style="verb">_mcp.&lt;domain&gt;</spanx> and v02 <spanx style="verb">_org-alter.&lt;domain&gt;</spanx> record
specifications are incorporated by reference and remain
unchanged.</t>
</list></t>

<t>draft-morrison-mcp-dns-discovery-02 (April 2026):</t>

<t><list style="symbols">
  <t>Adds the <spanx style="verb">_org-alter.&lt;domain&gt;</spanx> Org-Identity Record.</t>
  <t>Defines <spanx style="verb">org</spanx>, <spanx style="verb">entity</spanx>, <spanx style="verb">entity-type</spanx>, <spanx style="verb">founded</spanx>, <spanx style="verb">regions</spanx>,
<spanx style="verb">regulated</spanx>, <spanx style="verb">bootstrap</spanx>, <spanx style="verb">mcp-policy</spanx>, <spanx style="verb">epoch</spanx>, <spanx style="verb">pk</spanx>, <spanx style="verb">attest</spanx>,
<spanx style="verb">ext</spanx> fields for the organisational record.</t>
  <t>Adds the Identity Bootstrap procedure.</t>
  <t>Adds IANA registration for <spanx style="verb">_org-alter</spanx> underscore-prefixed
label.</t>
  <t>Adds version tag <spanx style="verb">v=alter1</spanx> (org-alter namespace) and registry
namespace and framework token registries.</t>
  <t>Adds Examples for minimal, full, regulated (DISP), and
multi-regulator deployments.</t>
  <t>Adds Implementation Status entry for the orgalter_discover
reference library.</t>
  <t>v01 <spanx style="verb">_mcp.&lt;domain&gt;</spanx> record specification is incorporated by
reference and remains unchanged.</t>
</list></t>

<t>draft-morrison-mcp-dns-discovery-01 (April 2026):</t>

<t><list style="symbols">
  <t>Adds Identity Field Theory grounding for <spanx style="verb">epoch</spanx> and <spanx style="verb">scope</spanx>.</t>
  <t>Refines security considerations for identity assurance decay.</t>
  <t>Refines privacy considerations for scope as a privacy boundary.</t>
  <t>Adds Coexistence section with SEP-1959, AID, A2A.</t>
  <t>Adds Implementation Status section.</t>
</list></t>

<t>draft-morrison-mcp-dns-discovery-00 (April 2026):</t>

<t><list style="symbols">
  <t>Initial submission.</t>
  <t>Defines <spanx style="verb">_mcp.&lt;domain&gt;</spanx> TXT record format with ABNF grammar.</t>
  <t>Defines discovery procedure with HTTPS fallback.</t>
  <t>Defines <spanx style="verb">pk</spanx>, <spanx style="verb">epoch</spanx>, <spanx style="verb">attest</spanx>, <spanx style="verb">scope</spanx>, <spanx style="verb">cap</spanx>, <spanx style="verb">priority</spanx>,
<spanx style="verb">ttl</spanx>, and <spanx style="verb">ext</spanx> fields.</t>
  <t>Registers <spanx style="verb">_mcp</spanx> in the underscored DNS node name registry.</t>
</list></t>

</section>
<section anchor="normative-references"><name>Normative References</name>

<t>(References from v01 and v02 are retained.  References added in
this revision: <xref target="RFC4033"></xref>, <xref target="RFC4034"></xref>, <xref target="RFC4035"></xref>, <xref target="RFC6698"></xref>,
<xref target="RFC7595"></xref>, <xref target="RFC8785"></xref>, <xref target="ALTER-DNS-PUB"></xref>, <xref target="ALTER-STH"></xref>.)</t>

</section>
<section anchor="informative-references"><name>Informative References</name>

<t>(References from v01 and v02 are retained.  References added in
this revision: [RFC6962], <xref target="RFC9162"></xref>, [ALTER-ERC8004],
[MORRISON-COMMITS], [MORRISON-PRONOUNS].)</t>

</section>
<section anchor="authors-addresses"><name>Authors' Addresses</name>

<t>Blake Morrison
Alter Meridian Pty Ltd</t>

<t>Email: blake@truealter.com
URI: https://truealter.com</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

