| Internet-Draft | agent-trust-negotiation | May 2026 |
| Somoza | Expires 18 November 2026 | [Page] |
This document defines the Agent Trust Negotiation (ATN) protocol. ATN sits above existing DNS-based agent discovery mechanisms and answers questions that discovery alone cannot: what is the agent permitted to do, under whose authority, with what provenance, and how do two agents reach a verifiable working agreement.¶
ATN binds four artifacts to a DNS-discovered agent identity:¶
A Capability Manifest expressing what the agent is willing to do, under what conditions, and with what constraints.¶
A Delegation Chain proving authorized principal scope and revocation paths.¶
A Provenance Attestation proving build-time and runtime integrity.¶
A Session Receipt produced at handshake completion, recording the negotiated scope.¶
ATN defines the handshake state machine that consumes these artifacts to produce a mutually verified, scope-bounded agent session, and a session receipt suitable for transparency log inclusion.¶
ATN is transport-independent above the DNS layer and compatible with existing discovery proposals including AID [AID], DNS-AID [DNS-AID], and ANS v2 [ANSv2].¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 18 November 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
Recent IETF work has converged on DNS-based discovery for AI agents. Multiple drafts now define how to locate an agent's endpoint and verify its cryptographic identity given a domain name. These efforts answer two questions: where is the agent and who is the agent.¶
They do not answer the questions that arise immediately after:¶
What is the agent permitted to do, and under what constraints?¶
Under whose authority is the agent operating?¶
What is the provenance of the agent's software, model, and configuration?¶
How do two agents reach a mutually verifiable working agreement before any task begins?¶
What evidence remains after the session ends, and how is it audited?¶
This document defines the Agent Trust Negotiation (ATN) protocol to address these gaps. ATN is the layer above discovery. It assumes the discovery layer has located an endpoint and authenticated an identity through one of the existing mechanisms. ATN then negotiates the trust relationship.¶
The design has four parts:¶
Four structured artifacts (Capability Manifest, Delegation Chain, Provenance Attestation, Session Receipt) that can be pointed to from any DNS-based discovery record.¶
A handshake protocol over HTTPS that exchanges and verifies the artifacts between two agents.¶
A capability intersection algorithm that yields the negotiated session scope.¶
A receipt format suitable for SCITT-style transparency log inclusion.¶
ATN deliberately does not introduce a new discovery mechanism. It builds on existing work and adds the negotiation layer that the agent ecosystem currently lacks.¶
In scope:¶
Format and semantics of the four ATN artifacts.¶
The Agent Trust Handshake (ATH) state machine.¶
Capability intersection algebra.¶
DNS bindings to point from a discovery record to ATN artifacts.¶
IANA registrations for ATN-specific identifiers.¶
Out of scope:¶
Discovery of the agent itself (use [AID], [DNS-AID], [ANSv2], or equivalent).¶
Endpoint authentication (delegated to the discovery layer).¶
Application protocol (delegated to MCP, A2A, OpenAPI, or equivalent).¶
In-organization service-to-service identity (see [SPIFFE]).¶
Reputation distribution.¶
Behavioral attestation.¶
ATN's choice of IETF as the venue follows from its dependencies. The discovery substrate is DNS [RFC4033] and SVCB [RFC9460], both IETF standards. The attestation architecture is RATS [RFC9334]. The transparency log is SCITT. The signature format is JWS [RFC7515]. The mutual authentication transport is TLS [RFC8446]. The authorization frameworks ATN composes with are OAuth [RFC6749] and GNAP [RFC9635].¶
ATN is the composition of IETF primitives into a peer-to-peer agent trust handshake. Standardizing the composition in any other venue would fork the primitive stack and create alignment problems. The natural home for the composition is the same venue that standardized the primitives.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
An automated software entity that initiates network interactions on behalf of, or with delegated authority from, a principal, without per-interaction human authorization.¶
The agent that opens the trust handshake.¶
The agent that answers the trust handshake.¶
A signed JSON [RFC8259] document declaring what an agent is willing to do, under what conditions, and with what constraints.¶
A signed sequence of authorization statements binding the agent to a principal, with explicit scope, time bounds, and revocation pointers.¶
A signed document proving build-time and runtime characteristics of the agent.¶
A signed record produced at handshake completion, summarizing the negotiated scope and identities, suitable for transparency log inclusion.¶
The intersection of two agents' capability sets, time windows, authorization scopes, and operational constraints, as determined by the handshake.¶
ATN defines four roles:¶
Agent Operator: publishes the DNS discovery record and the ATN artifacts.¶
Agent: the runtime entity, in either Initiator or Responder mode at any moment.¶
Principal: the human, organization, or other agent that authorized the agent through the Delegation Chain.¶
Witness: an optional third party that can pre-verify ATN artifacts and publish endorsements (e.g., via SCITT [SCITT]).¶
ATN layers above discovery:¶
+----------------------------------------------+ | Application Layer (MCP, A2A, OpenAPI, ...) | +----------------------------------------------+ | Agent Trust Negotiation (this document) | +----------------------------------------------+ | Discovery and Identity | | (AID, DNS-AID, ANS v2, equivalents) | +----------------------------------------------+ | DNS, DNSSEC, TLS, HTTPS | +----------------------------------------------+¶
The handshake order is:¶
Discovery: Initiator resolves the Responder's discovery record via DNS.¶
Artifact fetch: Initiator retrieves the four ATN artifacts referenced by the discovery record.¶
Handshake: Initiator opens the ATN handshake. Both parties exchange artifacts and verify signatures.¶
Negotiation: Both parties compute the capability intersection.¶
Receipt: Both parties produce a signed Session Receipt covering the negotiated scope.¶
Session: Application traffic proceeds within the negotiated scope.¶
ATN does not define its own DNS records. Instead, it specifies how to point to ATN artifacts from existing discovery records.¶
For SVCB-based discovery [RFC9460], the following ParamKeys are registered (see Section 17):¶
| ParamKey | Format |
|---|---|
atn
|
URI |
atn-digest
|
hex-string |
_agent.example.com. 3600 IN HTTPS 1 agent.example.com. (
alpn="h2,h3"
atn="https://example.com/.well-known/atn/index.json"
atn-digest="a3b8c2d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0c1d2e3f4" )
¶
The Index Document at the atn URI is a JSON object with the following structure:¶
{
"v": "atn1",
"agent_id": "2H4kP9aQ8vR3wXyZ1mNbVcLk-a3b8c2d4e5f6a7b8c9d0e1f2",
"capability_manifest": {
"url": "https://example.com/.well-known/atn/capability.jws",
"digest": "sha256:b4c5d6e7f8a9b0c1..."
},
"delegation_chain": {
"url": "https://example.com/.well-known/atn/delegation.jws",
"digest": "sha256:c5d6e7f8a9b0c1d2..."
},
"provenance_attestation": {
"url": "https://example.com/.well-known/atn/provenance.jws",
"digest": "sha256:d6e7f8a9b0c1d2e3..."
},
"handshake_endpoint": "https://agent.example.com/.atn/handshake",
"witness_pointers": [
"https://scitt.example.org/entries/a1b2c3..."
]
}
¶
The Index Document itself MUST be signed as a JWS [RFC7515] when the discovery record cannot be DNSSEC-validated [RFC4033]. When DNSSEC is in use, the atn-digest tag covers integrity at the DNS layer and signature on the Index Document is RECOMMENDED but not REQUIRED.¶
The Capability Manifest declares what the agent is willing to do under what conditions. It is a JSON object signed as a JWS.¶
Each capability is a structured object with explicit dimensions covering identification, semantics, scope, and operational bounds. The design borrows from the action-resource-condition pattern of established authorization frameworks, the schema-binding pattern of W3C Verifiable Credentials, and the attenuation principle of capability-based security research.¶
| Field | Required | Description |
|---|---|---|
id
|
Yes | Capability identifier from the IANA registry, or a vendor-specific identifier. |
schema
|
Yes | URI plus SHA-256 digest of the formal capability definition. |
actions
|
Yes | List of action verbs scoped to the capability's schema vocabulary. |
resources
|
Yes | List of resource patterns the capability applies to. |
conditions
|
No | Runtime constraints: rate limits, data residency, time windows, size limits. |
effects
|
Yes | One of: none, read_only, idempotent, mutating. |
external_calls
|
Yes | One of: forbidden, listed_only, free. Whether the capability may call out. |
sub_invocations
|
Yes | One of: forbidden, same_scope, fresh_handshake_required. Sub-agent rules. |
persistence
|
Yes | One of: none, session_only, durable. Whether state survives the session. |
resource_bounds
|
Yes | Hard ceilings: max_tokens, max_duration_seconds, max_cost_usd. |
preconditions
|
No | Counterparty requirements that must hold before the capability is exercised. |
Every dimension uses a controlled vocabulary registered with IANA (see Section 17). Vendor-specific identifiers under the x- prefix are permitted for non-standard capabilities and MUST carry a schema reference.¶
The schema field binds the capability identifier to a formal definition. Two implementations resolving the same id to different schema.digest values MUST treat the capabilities as semantically distinct, even if the identifier matches. This eliminates the silent-divergence problem that opaque scope strings created in OAuth deployments.¶
The schema document SHOULD define:¶
The semantic meaning of the capability identifier.¶
The permitted values in actions.¶
The format and semantics of resources patterns.¶
Any capability-specific extensions to conditions.¶
Schema documents are versioned. A capability MAY pin a specific schema version via the digest.¶
{
"v": "atn-capability-1",
"agent_id": "<stable-identifier>",
"issued_at": "2026-05-15T10:00:00Z",
"valid_until": "2026-08-15T10:00:00Z",
"capabilities": [
{
"id": "data-read",
"schema": {
"url": "https://schemas.example.com/atn/data-read-v1.json",
"digest": "sha256:b4c5d6e7f8a9b0c1d2e3f4a5b6c7d8e9f0a1b2c3d4e5f6a7b8c9d0e1f2a3b4c5"
},
"actions": ["read", "list"],
"resources": ["dataset:public/*", "dataset:internal/research/*"],
"conditions": {
"rate_limit": "1000/min",
"data_residency": ["US", "EU"],
"time_window": "09:00-17:00 UTC",
"max_response_size_bytes": 10485760
},
"effects": "read_only",
"external_calls": "forbidden",
"sub_invocations": "forbidden",
"persistence": "none",
"resource_bounds": {
"max_tokens": 100000,
"max_duration_seconds": 1800,
"max_cost_usd": 0.50
},
"preconditions": {
"counterparty_provenance": "required",
"counterparty_delegation": "required",
"transport": "tls1.3"
}
},
{
"id": "task-execute",
"schema": {
"url": "https://schemas.example.com/atn/task-execute-v1.json",
"digest": "sha256:c5d6e7f8a9b0c1d2e3f4a5b6c7d8e9f0a1b2c3d4e5f6a7b8c9d0e1f2a3b4c5d6"
},
"actions": ["execute"],
"resources": ["task:summarize", "task:translate", "task:classify"],
"conditions": {
"max_session_minutes": 30
},
"effects": "idempotent",
"external_calls": "listed_only",
"sub_invocations": "same_scope",
"persistence": "session_only",
"resource_bounds": {
"max_tokens": 500000,
"max_duration_seconds": 1800,
"max_cost_usd": 2.00
},
"preconditions": {
"human_approval": "required",
"approval_token_issuer": "https://approvals.example.com"
}
}
],
"refusals": [
{
"category": "financial_transactions",
"scope": "all"
},
{
"category": "data_write",
"scope": "external_systems"
}
]
}
¶
effects declares the consequence of exercising the capability:¶
none: no observable consequence (introspection only).¶
read_only: data is read; no state changes.¶
idempotent: state may change but repeated execution is equivalent to single execution.¶
mutating: state changes, and the change is not idempotent.¶
external_calls declares whether the capability may initiate calls outside the agent's own scope:¶
forbidden: no external calls.¶
listed_only: external calls are permitted only to destinations listed in the schema or conditions.¶
free: any external call is permitted, bounded only by resource_bounds.¶
sub_invocations declares the rules for invoking other agents:¶
forbidden: this capability does not invoke other agents.¶
same_scope: sub-invocations inherit the present session's negotiated scope.¶
fresh_handshake_required: every sub-invocation requires a separate ATN handshake with the sub-agent.¶
persistence declares state survivability:¶
none: no state persists beyond a single request.¶
session_only: state persists for the session lifetime, then is discarded.¶
durable: state persists beyond the session; the agent MUST disclose retention policy in its schema.¶
resource_bounds declares hard ceilings on the negotiated scope. Conforming implementations MUST terminate the session when any bound is exceeded. The protocol specifies the contract; runtime enforcement is the implementation's responsibility, consistent with the enforcement posture described in the Security Considerations.¶
The manifest is a declaration of willingness, not an enforcement primitive. Violations are auditable through the Session Receipt and transparency log.¶
The valid_until field forces rotation. Manifests without expiry MUST be rejected.¶
refusals are first-class. Explicit "will not" claims provide auditable accountability if violated.¶
Capability id values from the IANA registry have stable semantics; vendor-specific identifiers under x- MUST carry a schema reference.¶
Capabilities are deny-by-default. The negotiated session scope contains only what both parties explicitly offered.¶
Refusals are a deliberate inversion of conventional capability advertisement. Most existing proposals describe what an agent CAN do. ATN requires agents to also describe what they explicitly WILL NOT do. This produces auditable behavioral contracts: a recorded refusal that is subsequently violated is direct evidence of misbehavior.¶
The Delegation Chain proves the agent operates under authorized principal scope, with explicit time bounds and revocation paths.¶
{
"v": "atn-delegation-1",
"agent_id": "<stable-identifier>",
"chain": [
{
"issuer": "did:example:organization-root",
"subject": "did:example:department-ops",
"scope": ["agent.deploy", "agent.delegate"],
"issued_at": "2026-01-01T00:00:00Z",
"valid_until": "2027-01-01T00:00:00Z",
"revocation": "https://example.com/.well-known/atn/revocation/department-ops",
"signature": "<JWS>"
},
{
"issuer": "did:example:department-ops",
"subject": "agent:<stable-identifier>",
"scope": ["data-read", "task-execute:summarize", "task-execute:translate"],
"issued_at": "2026-05-01T00:00:00Z",
"valid_until": "2026-08-01T00:00:00Z",
"revocation": "https://example.com/.well-known/atn/revocation/agent",
"signature": "<JWS>"
}
]
}
¶
A relying party MUST:¶
Verify each link's signature against the issuer's published key.¶
Verify each link's scope is a subset of the parent link's scope.¶
Verify all links are within their valid_until window.¶
Optionally poll revocation endpoints with rate-limited caching.¶
Verify the leaf subject matches the agent's stable identifier from discovery.¶
If any check fails, the agent MUST NOT be trusted for any capability beyond the verifiable subset.¶
The Provenance Attestation proves build-time and runtime characteristics of the agent.¶
{
"v": "atn-provenance-1",
"agent_id": "<stable-identifier>",
"build": {
"predicateType": "https://slsa.dev/provenance/v1",
"predicate": { "...": "in-toto SLSA provenance" }
},
"model": {
"model_id": "example-vendor/llm-v1.2.3",
"model_version_sha256": "9f8e7d6c5b4a...",
"system_prompt_sha256": "1a2b3c4d5e6f..."
},
"runtime": {
"evidence_type": "RATS",
"evidence": { "...": "RFC 9334 evidence" },
"verifier": "https://verifier.example.com/rats"
},
"issued_at": "2026-05-15T08:00:00Z",
"valid_until": "2026-05-15T20:00:00Z"
}
¶
The Provenance Attestation links three independent supply chains: software build (SLSA, in-toto [IN-TOTO]), model identity (cryptographic hash of weights or version anchor), and runtime environment (RATS evidence [RFC9334]).¶
All three are optional. An agent that publishes only build provenance is more trustworthy than one that publishes none and less trustworthy than one that publishes all three.¶
Short valid_until windows are encouraged. The Provenance Attestation is the most time-sensitive artifact.¶
Initiator Responder
| |
|---- ATH_HELLO ------------------------------>|
| (initiator artifacts + requested scope) |
| |
|<--- ATH_OFFER -------------------------------|
| (responder artifacts + offered scope) |
| |
|---- ATH_ACCEPT ---------------------------- >|
| (intersection scope + receipt request) |
| |
|<--- ATH_RECEIPT -----------------------------|
| (signed session receipt) |
| |
=== negotiated session begins ===
¶
All four messages are JSON, signed as JWS, exchanged over HTTPS at the Responder's handshake_endpoint.¶
{
"v": "ath1",
"type": "hello",
"supported_versions": ["ath1"],
"initiator": {
"agent_id": "<initiator-id>",
"artifacts": {
"capability": { "url": "...", "digest": "..." },
"delegation": { "url": "...", "digest": "..." },
"provenance": { "url": "...", "digest": "..." }
}
},
"requested_scope": {
"capability_ids": ["data-read"],
"duration_seconds": 1800,
"purpose": "summarize_research_corpus"
},
"nonce": "<random>",
"timestamp": "..."
}
¶
The requested_scope.capability_ids field carries only the identifiers of the capabilities the Initiator wishes to negotiate. The Responder consults its own Capability Manifest for the structured definitions and computes the intersection (see Section 9).¶
The Responder verifies the Initiator's artifacts, computes the capability intersection, and returns:¶
{
"v": "ath1",
"type": "offer",
"selected_version": "ath1",
"supported_versions_echo": ["ath1"],
"responder": {
"agent_id": "<responder-id>",
"artifacts": {
"capability": { "url": "...", "digest": "..." },
"delegation": { "url": "...", "digest": "..." },
"provenance": { "url": "...", "digest": "..." }
}
},
"offered_scope": {
"capabilities": [
{
"id": "data-read",
"schema": { "url": "https://schemas.example.com/atn/data-read-v1.json",
"digest": "sha256:b4c5d6..." },
"actions": ["read", "list"],
"resources": ["dataset:public/*"],
"conditions": { "rate_limit": "500/min", "data_residency": ["US"] },
"effects": "read_only",
"external_calls": "forbidden",
"sub_invocations": "forbidden",
"persistence": "none",
"resource_bounds": { "max_tokens": 50000, "max_duration_seconds": 1800, "max_cost_usd": 0.50 }
}
],
"duration_seconds": 1800,
"purpose": "summarize_research_corpus"
},
"nonce": "<random>",
"in_reply_to_nonce": "<initiator-nonce>",
"timestamp": "..."
}
¶
The offered_scope.capabilities field carries the full structured Capability objects after intersection. Each is the per-dimension intersection of the Initiator's requested capability (resolved from its Capability Manifest) and the Responder's offered version.¶
If the Initiator agrees with the offered scope:¶
{
"v": "ath1",
"type": "accept",
"agreed_scope": { "...": "matches ATH_OFFER offered_scope" },
"nonce": "<random>",
"in_reply_to_nonce": "<responder-nonce>",
"timestamp": "..."
}
¶
If the Initiator disagrees, it MAY send ATH_COUNTER with a revised request, up to a limit (see Section 8.6).¶
The Responder produces the Session Receipt:¶
{
"v": "ath1",
"type": "receipt",
"session_id": "<uuid>",
"initiator_id": "<initiator-id>",
"responder_id": "<responder-id>",
"agreed_scope": { "...": "the intersection result" },
"artifact_digests": {
"initiator_capability": "sha256:...",
"initiator_delegation": "sha256:...",
"initiator_provenance": "sha256:...",
"responder_capability": "sha256:...",
"responder_delegation": "sha256:...",
"responder_provenance": "sha256:..."
},
"scitt_log_pointer": "https://scitt.example.org/entries/...",
"issued_at": "...",
"expires_at": "...",
"signature": "<JWS by responder>"
}
¶
Both parties countersign the receipt and MAY publish it to a SCITT log [SCITT].¶
When two agents present capability sets, the negotiated scope is computed by intersection. The algorithm is specified for interoperability so that conforming implementations produce identical results from identical inputs.¶
A capability c is in the intersection only if all of the following hold:¶
Both Initiator's requested set and Responder's offered set include a capability with the same id.¶
Both capabilities reference the same schema.url and schema.digest. Identifiers with diverging schemas MUST be treated as distinct capabilities and excluded from the intersection.¶
Neither party has a matching entry in refusals covering c.¶
For each capability c that satisfies the identity rule, the intersected capability is computed dimension by dimension.¶
| Dimension | Combinator | Notes |
|---|---|---|
actions
|
List intersection | If empty, c is dropped. |
resources
|
Pattern intersection (longest-prefix match) | If empty, c is dropped. |
conditions numeric (rate_limit, max_response_size_bytes, max_session_minutes) |
Minimum | Tighter bound wins. |
conditions list (data_residency, tasks) |
List intersection | If empty, c is dropped. |
conditions.time_window
|
Time-window intersection | If empty, c is dropped. |
effects
|
Most restrictive of: none < read_only < idempotent < mutating
|
Take lower in ordering. |
external_calls
|
Most restrictive of: forbidden < listed_only < free
|
Take lower in ordering. |
sub_invocations
|
Most restrictive of: forbidden < same_scope < fresh_handshake_required
|
Take lower in ordering. |
persistence
|
Most restrictive of: none < session_only < durable
|
Take lower in ordering. |
resource_bounds.max_tokens
|
Minimum | |
resource_bounds.max_duration_seconds
|
Minimum | |
resource_bounds.max_cost_usd
|
Minimum | |
preconditions
|
Union | Both parties' preconditions apply to the negotiated capability. |
If either party's refusals list contains an entry matching capability c by category or by direct id, c is dropped from the intersection regardless of any other dimension. Refusals are absolute.¶
Initiator requests data-read:¶
actions: [read, list, search]¶
resources: [dataset:public/*, dataset:internal/*]¶
conditions.rate_limit: 1000/min¶
conditions.data_residency: [US, EU, APAC]¶
effects: read_only¶
external_calls: listed_only¶
resource_bounds.max_cost_usd: 1.00¶
Responder offers data-read:¶
actions: [read, list]¶
resources: [dataset:public/*]¶
conditions.rate_limit: 500/min¶
conditions.data_residency: [US, EU]¶
effects: read_only¶
external_calls: forbidden¶
resource_bounds.max_cost_usd: 0.50¶
Negotiated intersection (assuming matching schemas):¶
actions: [read, list]¶
resources: [dataset:public/*]¶
conditions.rate_limit: 500/min¶
conditions.data_residency: [US, EU]¶
effects: read_only¶
external_calls: forbidden¶
resource_bounds.max_cost_usd: 0.50¶
If the schemas had diverged, data-read would be dropped entirely with no intersection. If Initiator's refusals included data-read, the capability would be dropped regardless of offer compatibility.¶
When both agents are sensitive (for example, two agents acting on behalf of different organizations), the handshake operates in mutual mode:¶
Both parties MUST present all four artifacts in ATH_HELLO and ATH_OFFER.¶
Both parties MUST verify the counterparty's full chain before proceeding.¶
The Session Receipt MUST be countersigned by both parties.¶
In single-sided mode (for example, when one party is a public service), only the trusted side must present full artifacts. The other side's identity is still verified at the discovery layer, but the trust posture is asymmetric.¶
ATN is designed for long-term evolution. Two mechanisms ensure forward compatibility: explicit version negotiation in the handshake and pluggable cryptographic algorithms in artifacts and messages.¶
The Initiator's ATH_HELLO message advertises every ATN version it supports in a supported_versions field. The Responder's ATH_OFFER selects the highest mutually supported version and echoes it in a selected_version field. All subsequent messages in the session use the selected version.¶
{
"v": "ath1",
"type": "hello",
"supported_versions": ["ath1", "ath2"],
"initiator": { "...": "..." },
"requested_scope": { "...": "..." },
"nonce": "...",
"timestamp": "..."
}
¶
The Responder MUST include the Initiator's supported_versions list in the signed envelope of its ATH_OFFER. This prevents downgrade attacks: an on-path adversary that strips advertised versions from ATH_HELLO would cause the Responder's signature to cover the stripped list, which the Initiator can detect.¶
If the Initiator and Responder share no common version, the Responder MUST reply with ATH_REJECT carrying error code version_mismatch. The handshake terminates.¶
ATN does not pin cryptographic algorithms beyond a minimum set required for v1 interoperability. Implementations MAY use any algorithm registered for JWS [RFC7515] or COSE.¶
Required for ATN v1 conformance:¶
Ed25519 signatures over JWS-encoded artifacts and handshake messages.¶
SHA-256 for digests bound at the DNS layer and in artifact references.¶
Recommended additional algorithms:¶
ECDSA P-256 with SHA-256 for environments with ECDSA-only hardware tokens.¶
ML-DSA (post-quantum signature) for deployments preparing for post-quantum transition.¶
The Capability Manifest, Delegation Chain, Provenance Attestation, and Session Receipt MAY each be signed with a different algorithm. The JWS header identifies the algorithm. Relying parties MUST reject artifacts signed with algorithms they do not support.¶
Algorithm identifiers are negotiated implicitly via the JWS alg header on each artifact. Explicit negotiation in ATH_HELLO is NOT REQUIRED for v1 but MAY be added in future versions.¶
The cryptographic operations in ATN are well-bounded: signature verification of artifacts and handshake messages. There is no key agreement step inside ATN itself; TLS handles channel security. Migration to post-quantum signatures requires only adopting a PQ-capable signature algorithm in JWS, which the IETF JOSE working group is standardizing.¶
When PQ algorithms are widely deployed, operators SHOULD rotate to a hybrid scheme (classical + PQ) during the transition window, then to PQ-only. ATN's version negotiation supports introducing a new minor version that prefers PQ signatures without breaking v1 deployments.¶
ATN is designed to coexist with existing DNS-based discovery proposals without modification:¶
AID's TXT record is extended with the atn and atn-digest tags. AID's PKA mechanism continues to authenticate the endpoint. ATN consumes the AID-authenticated identity as the input to the handshake.¶
DNS-AID's SVCB records are extended with the atn and atn-digest ParamKeys. The leaf-zone naming convention from DNS-AID is preserved.¶
ANS v2's Trust Card concept maps directly to a subset of ATN's Capability Manifest. An ANS v2 deployment can publish an ATN Index Document where the Capability Manifest cross-references the ANS Trust Card.¶
A single agent zone MAY publish records compatible with multiple discovery proposals simultaneously. ATN binding is independent of which discovery format is used.¶
ATN assumes:¶
Adversaries may publish well-formed but malicious ATN artifacts.¶
Adversaries may compromise an agent and continue to present valid pre-compromise artifacts.¶
Adversaries may attempt to negotiate scope expansions outside the published Capability Manifest.¶
Adversaries may collude across organizational boundaries to construct false Delegation Chains.¶
Every ATN artifact is signed. Signatures MUST be verified against keys bound to the agent's stable identifier at the discovery layer. Artifacts whose signatures do not verify, whose valid_until has passed, or whose digests do not match the DNS-published values MUST be rejected.¶
A predictable objection to ATN is that auditability is not enforcement. The objection is correct on its terms and misses the layer at which ATN operates. ATN is technical evidence infrastructure. It is not a behavioral enforcement primitive. No protocol layered on top of an autonomous software agent can be one.¶
An agent that signs a Capability Manifest declaring it will not perform financial transactions, then performs a financial transaction, has cryptographically committed to a refusal it then violated. ATN cannot prevent the violation. ATN produces a Session Receipt and a published transparency log entry that, combined with the application-layer evidence of the violation, constitute direct cryptographic evidence usable for revocation, contract enforcement, regulatory complaint, and civil action.¶
The complete trust stack for autonomous agents has four layers:¶
Technical evidence layer (ATN, SCITT, RATS). Provides cryptographic proof of what was claimed and what was agreed.¶
Policy layer (contracts, organizational policy, regulations). Specifies what is permitted.¶
Consequence layer (revocation, financial penalty, legal action, reputational impact). Imposes cost on violation.¶
Operational enforcement layer (sandboxing, capability-based execution, hardware-enforced runtime such as TEEs, gating proxies). Prevents violation at runtime.¶
ATN is the first layer. It enables the other three. It does not substitute for them.¶
For high-stakes domains (financial transactions, clinical decision support, control of physical systems), ATN MUST be deployed with operational enforcement (layer 4). Recommended patterns:¶
Run sensitive capabilities inside a TEE that enforces declared bounds at hardware level.¶
Use a gating proxy that enforces the negotiated scope on every outbound call from the agent.¶
Use short session lifetimes with frequent re-attestation.¶
Combine ATN with object-capability execution where the agent runtime denies unauthorized actions by construction, not by policy.¶
ATN's contribution is to make violations expensive and discoverable, not impossible. The analogy is to TCP checksums: they do not prevent transmission errors, they detect them so the next layer can respond. Trust at Internet scale has always operated this way. SPF does not prevent spoofed email. Certificate transparency does not prevent mis-issuance. They make undetected misbehavior infeasible. ATN does the same for inter-agent agreements.¶
Delegation Chains depend on the cryptographic strength of each issuer's signing key. ATN does not specify the identity verification process that issuers use to vouch for subjects. Operators SHOULD use verifiable credentials [W3C-DID] or organizational identity infrastructure with established assurance levels.¶
Session Receipts are countersigned and publishable to a SCITT log [SCITT]. Tampering after publication is detectable through log inclusion proofs. Operators handling high-value sessions SHOULD publish receipts.¶
Every handshake message includes a nonce and a timestamp. Implementations MUST reject messages with nonces seen within the session and with timestamps outside a configurable skew window (RECOMMENDED 60 seconds).¶
Provenance attestations prove what was built and deployed at attestation time. They do not prove the agent is currently executing the attested code. Operators SHOULD use short valid_until windows for provenance attestations and refresh through RATS verification [RFC9334].¶
The handshake exchanges artifacts that may reveal the purpose of the session (purpose field) and the identity of the principal (Delegation Chain). Operators SHOULD treat handshake metadata as sensitive.¶
Witnesses and SCITT log operators see the volume and pattern of agent interactions. Operators SHOULD use multiple witnesses to reduce centralized observability.¶
ATN supports minimum-disclosure mode where the Initiator presents only the artifacts required for the requested scope. The Responder MAY request additional artifacts during the handshake, which the Initiator MAY decline (causing the handshake to fail).¶
ATN introduces non-trivial latency on session establishment. This section quantifies that cost, explains its operational shape, and identifies deployments where ATN is appropriate and where it is not.¶
ATN is a session establishment protocol, not a per-request protocol. The handshake establishes a negotiated scope. The scope authorizes many subsequent interactions between the two agents. Per-call latency within an established session is zero added by ATN.¶
This places ATN in the same operational category as:¶
TLS handshake [RFC8446], amortized over the requests in a connection.¶
OAuth token acquisition [RFC6749], amortized over the token lifetime.¶
BGP session establishment, amortized over hours of routing operation.¶
The relevant performance question is the cost of establishment and the session lifetime over which it is amortized, not the cost per call.¶
The following budget is informative. Implementations and deployments will vary based on geography, caching, and network conditions.¶
| Component | Cold (no cache) | Warm (cached, pooled) |
|---|---|---|
DNS lookup for _agent.<domain> with DNSSEC |
50-150 ms | <1 ms |
| TLS 1.3 connection to Index Document origin | 100-200 ms | 0 (pooled) |
| Index Document HTTPS GET | 20-50 ms | 0 (cached by digest) |
| Three artifact fetches (HTTP/2 multiplexed) | 50-100 ms | 0 (cached by digest) |
| Signature verifications (4-8 Ed25519) | 1-2 ms | 1-2 ms |
| Provenance validation | 1-5 ms | 1 ms |
| Two-RTT handshake (HELLO/OFFER then ACCEPT/RECEIPT) | 150-300 ms | 150-300 ms |
| Receipt signing (Ed25519) | <1 ms | <1 ms |
| Total session establishment | 500-1500 ms | 150-300 ms |
| Per-call within established session | 0 ms added | 0 ms added |
| SCITT log submission | Async, out of path | Async, out of path |
Recommended performance targets for conforming implementations:¶
Implementations SHOULD apply the following optimizations to bring warm-case latency to the recommended targets:¶
Digest-keyed artifact caching. Artifacts are refetched only when the DNS-published digest changes. Steady-state cache hit rate is typically above 95 percent.¶
HTTP/2 or HTTP/3 multiplexing for parallel artifact fetches.¶
TLS 1.3 session resumption for repeat handshakes with known peers.¶
Connection pooling between sessions to the same peer.¶
Abbreviated re-handshake. A repeat ATH_HELLO MAY reference a prior session's receipt to extend or renew the same scope in a single round trip rather than three.¶
Pre-warming. Agents MAY establish sessions with frequent counterparties before application traffic arrives.¶
Asynchronous SCITT submission. Receipt publication to a transparency log happens after the session begins and MUST NOT block session establishment.¶
RATS attestation result caching for the duration of the result's validity window.¶
The Session Receipt's expires_at field bounds the session. Within that window, no additional handshake is required for interactions covered by the agreed scope. Implementations SHOULD select session lifetimes that amortize establishment cost while bounding exposure to revocation events.¶
Typical session lifetimes:¶
Short-lived workflows: 5 to 30 minutes¶
Sustained collaboration sessions: 1 to 24 hours¶
Long-running infrastructure peering: up to 7 days¶
Session lifetimes longer than 7 days are NOT RECOMMENDED for cross-organizational sessions. The trade-off is between revocation responsiveness and handshake amortization.¶
Multi-step agent collaboration where many calls share a session context.¶
Cross-organizational agent interactions where trust establishment must be verifiable and auditable.¶
Workflows where the cost of trust failure exceeds the cost of establishment latency.¶
Agent ecosystems with workflows already operating in the 100 ms to multi-second range per step.¶
Microsecond-scale latency budgets (high-frequency trading, real-time control loops, hardware-in-the-loop systems).¶
Stateless per-message protocols where session continuity is not meaningful.¶
Workflows whose total duration is shorter than the handshake establishment cost.¶
For these deployments, simpler primitives (mTLS alone, OAuth bearer tokens, or no trust layer at all) may be more appropriate. Operators are encouraged to select the trust layer that matches their latency budget.¶
Early allocation requested in the Service Parameter Keys (SvcParamKeys) registry [RFC9460]:¶
| Name | Format |
|---|---|
atn
|
URI |
atn-digest
|
hex-string |
Creation of a new registry, "ATN Capabilities," is requested with initial entries:¶
| Name | Description | Reference Schema |
|---|---|---|
data-read
|
Read access to a data resource | TBD |
data-write
|
Write access to a data resource | TBD |
task-execute
|
Execute a named task | TBD |
model-invoke
|
Invoke a generative model | TBD |
agent-delegate
|
Delegate work to another agent | TBD |
payment-init
|
Initiate a payment flow | TBD |
human-relay
|
Surface a request to a human approver | TBD |
Registration policy: Specification Required. Each registered identifier MUST include a reference to a published capability schema that defines the semantics of actions, resources patterns, and any capability-specific extensions to conditions.¶
Vendor-specific identifiers prefixed with x- are permitted without IANA registration but MUST carry a schema reference in the capability object.¶
Four new registries are requested to govern the controlled vocabularies used in capability dimensions:¶
"ATN Capability Effects":¶
| Name | Description |
|---|---|
none
|
No observable consequence (introspection only). |
read_only
|
Data is read; no state changes. |
idempotent
|
State may change; repeated execution equivalent to single. |
mutating
|
State changes; not idempotent. |
"ATN External Call Modes":¶
| Name | Description |
|---|---|
forbidden
|
No external calls permitted. |
listed_only
|
External calls permitted only to listed destinations. |
free
|
Any external call permitted within resource_bounds. |
"ATN Sub-Invocation Modes":¶
| Name | Description |
|---|---|
forbidden
|
No sub-agent invocations. |
same_scope
|
Sub-invocations inherit the present negotiated scope. |
fresh_handshake_required
|
Every sub-invocation requires a separate ATN handshake. |
"ATN Persistence Modes":¶
| Name | Description |
|---|---|
none
|
No state persists beyond a single request. |
session_only
|
State persists for the session lifetime, then discarded. |
durable
|
State persists beyond the session; retention policy required. |
Registration policy for all four registries: Standards Action or IESG Approval. The controlled vocabularies are deliberately small and stable; expansion requires consensus to avoid the semantic-drift problem that affected OAuth scopes.¶
Creation of a new registry, "ATN Refusal Categories," is requested with initial entries:¶
| Name | Description |
|---|---|
financial_transactions
|
Any movement of funds |
personal_data
|
Processing of personal identifiers |
weaponization
|
Use in weapons systems |
mass_persuasion
|
Generation of mass-distributed content |
child_safety
|
Content involving minors |
medical_advice
|
Clinical recommendations |
legal_advice
|
Legal recommendations binding on parties |
Registration policy: Specification Required.¶
The path /.well-known/atn/ is reserved per RFC 8615 conventions for ATN artifact publication.¶
This appendix walks through a full ATN handshake between two agents at agent.research.org and agent.publisher.com.¶
$ dig +short TXT _agent.publisher.com "v=aid1; u=https://agent.publisher.com/mcp; p=mcp; k=z7rW8rTq8o4mM6vVf7w1k3m4uQn9p2YxCAbcDeFgHiJ; atn=https://publisher.com/.well-known/atn/index.json; atn-digest=a3b8c2d4..."¶
GET https://publisher.com/.well-known/atn/index.json¶
Returns the JSON object listing the four artifact URLs and their digests.¶
The Initiator fetches:¶
Verifies each digest matches the Index Document, verifies each signature, and confirms valid_until is in the future.¶
The Initiator (research.org agent) sends ATH_HELLO to the Responder's handshake_endpoint:¶
{
"v": "ath1",
"type": "hello",
"supported_versions": ["ath1"],
"initiator": {
"agent_id": "INIT-XYZ123...",
"artifacts": { "...": "capability/delegation/provenance refs" }
},
"requested_scope": {
"capability_ids": ["data-read"],
"duration_seconds": 600,
"purpose": "academic_research_summarization"
},
"nonce": "n-init-001",
"timestamp": "2026-05-15T14:00:00Z"
}
¶
The Responder verifies the Initiator's artifacts, computes the intersection, and returns:¶
{
"v": "ath1",
"type": "offer",
"selected_version": "ath1",
"supported_versions_echo": ["ath1"],
"responder": { "...": "responder agent_id and artifact refs" },
"offered_scope": {
"capabilities": [
{
"id": "data-read",
"schema": { "url": "https://schemas.example.com/atn/data-read-v1.json",
"digest": "sha256:b4c5d6..." },
"actions": ["read", "list"],
"resources": ["dataset:public/*"],
"conditions": { "rate_limit": "300/min", "data_residency": ["US", "EU"] },
"effects": "read_only",
"external_calls": "forbidden",
"sub_invocations": "forbidden",
"persistence": "none",
"resource_bounds": { "max_tokens": 50000, "max_duration_seconds": 600, "max_cost_usd": 0.30 }
}
],
"duration_seconds": 600,
"purpose": "academic_research_summarization"
},
"nonce": "n-resp-001",
"in_reply_to_nonce": "n-init-001",
"timestamp": "2026-05-15T14:00:01Z"
}
¶
{
"v": "ath1",
"type": "accept",
"agreed_scope": { "...": "matches ATH_OFFER" },
"nonce": "n-init-002",
"in_reply_to_nonce": "n-resp-001",
"timestamp": "2026-05-15T14:00:02Z"
}
¶
{
"v": "ath1",
"type": "receipt",
"session_id": "5b7c-...",
"initiator_id": "INIT-XYZ123...",
"responder_id": "RESP-ABC789...",
"agreed_scope": { ... },
"artifact_digests": { ... },
"scitt_log_pointer": "https://scitt.research.org/entries/789xyz",
"issued_at": "2026-05-15T14:00:03Z",
"expires_at": "2026-05-15T14:10:03Z",
"signature": "<JWS by responder>"
}
¶
The Initiator countersigns. The session begins.¶
The agents transact within the agreed scope. The Session Receipt is published to SCITT. Any downstream audit can:¶
DNS-based discovery answers "where" and "who." Application protocols (MCP, A2A) answer "how." Nothing in the current stack answers "what may we do together, and what evidence will remain." ATN fills that gap with a two-round-trip handshake.¶
Each artifact answers a distinct question:¶
Capability Manifest: what is this agent willing to do?¶
Delegation Chain: who authorized it?¶
Provenance Attestation: what is it actually running?¶
Session Receipt: what did we agree?¶
Collapsing them into one document obscures the separation of concerns. Splitting further fragments the trust evaluation. Four is the minimum.¶
Capability advertisement alone creates a moral hazard: agents have an incentive to advertise broadly. Mandatory refusals create symmetric accountability: an agent that explicitly refused a category and then violated the refusal has produced cryptographic evidence against itself.¶
If two implementations compute intersections differently, interoperability fails. The algebra is small, specified, and testable. The cost is one paragraph of spec; the benefit is deterministic handshake outcomes.¶
Session Receipts gain value through public auditability. SCITT [SCITT] provides the transparency infrastructure. Receipts published to SCITT cannot be tampered with after the fact without detection.¶
This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft, per the guidelines of RFC 7942. The description of implementations in this section is intended to assist the IETF in its decision processes in progressing drafts to RFCs. Note to RFC Editor: this section may be removed prior to final publication.¶
Organization: Independent (E. Somoza).¶
Implementation Name: atn-prototype.¶
Description: A TypeScript prototype that demonstrates the four-message handshake, the capability intersection algebra, Ed25519 signing and verification of artifacts and messages, and the digest-bound artifact reference model.¶
License: CC0 1.0 Universal (public domain).¶
Maturity: prototype. Not production-ready. Not security-audited.¶
Coverage: Capability Manifest types, Delegation Chain types, Provenance Attestation types, Session Receipt, ATH state machine (HELLO, OFFER, ACCEPT, RECEIPT), capability intersection algebra per Section 9, version negotiation with downgrade protection. DNS resolution, HTTPS artifact fetch, and SCITT submission are stubbed.¶
Verified behavior: end-to-end handshake between two synthetic agents with mismatched capability constraints produces a signed Session Receipt with negotiated scope exactly matching the algorithm in Section 9. Numeric constraints take minimums, list constraints take intersections, refusals override.¶
Repository: https://github.com/e-somoza/atn-prototype¶
This document builds on the substantial work of the DNS-based agent discovery community, including the authors of AID, DNS-AID, ANS v2, DN-ANR, and BANDAID. ATN is intended to complement, not compete with, that work.¶