<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.38 (Ruby 3.4.9) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-xu-agentic-overlay-network-architecture-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Agentic Overlay Networks">Architecture for Agentic Overlay Networks</title>

    <author initials="J." surname="Xu" fullname="Jinliang Xu">
      <organization>CAICT</organization>
      <address>
        <postal>
          <street>No. 52, Huayuan North Road</street>
          <city>Beijing</city>
          <region>Haidian District</region>
          <code>100191</code>
          <country>China</country>
        </postal>
        <email>xujinliang@caict.ac.cn</email>
      </address>
    </author>
    <author initials="B." surname="Li" fullname="Bingqi Li">
      <organization>CAICT</organization>
      <address>
        <postal>
          <street>No. 52, Huayuan North Road</street>
          <city>Beijing</city>
          <region>Haidian District</region>
          <code>100191</code>
          <country>China</country>
        </postal>
        <email>libingqi@caict.ac.cn</email>
      </address>
    </author>
    <author initials="R." surname="Zhu" fullname="Runkai Zhu">
      <organization>CAICT</organization>
      <address>
        <postal>
          <street>No. 52, Huayuan North Road</street>
          <city>Beijing</city>
          <region>Haidian District</region>
          <code>100191</code>
          <country>China</country>
        </postal>
        <email>zhurunkai@caict.ac.cn</email>
      </address>
    </author>

    <date year="2026" month="May" day="08"/>

    <area>General</area>
    <workgroup>Independent Submission</workgroup>
    

    <abstract>


<?line 49?>

<t>This document describes an architecture for agentic overlay networks.
The architecture enables autonomous software agents, agent gateways,
registries, discovery services, and enterprise service hubs to interoperate
across administrative domains without replacing the existing Internet
protocol stack.</t>

<t>The architecture separates control-plane coordination from runtime
agent interaction.  Management root nodes coordinate trust anchors,
semantic taxonomies, and network-wide policy.  Registry service nodes onboard
agents and publish signed capability metadata.  Discovery service nodes provide
intent-driven candidate selection.  Enterprise service hubs adapt private
systems and legacy interfaces into agent-compatible capabilities.  After
discovery, runtime authentication and execution are performed by the invoking
and target endpoints, which can be agents or gateways, using mutual
verification; discovery and management nodes are not required in the runtime
path.</t>

<t>This document defines architectural roles, functional boundaries, metadata
expectations, operational workflows, and security considerations for such
networks.  It does not define a new transport protocol, a new URI scheme, or a
mandatory discovery ranking algorithm.</t>



    </abstract>



  </front>

  <middle>


<?line 73?>

<section anchor="introduction"><name>Introduction</name>

<t>Autonomous software agents increasingly act as networked principals that can
interpret intent, select tools, invoke remote services, and cooperate with
other agents.  Existing Internet mechanisms remain essential for packet
delivery and host reachability, but they do not by themselves provide the
agent-specific functions needed for large-scale cross-domain collaboration:
capability registration, semantic discovery, verifiable identity, policy
coordination, protocol adaptation, and auditable commercial metering.</t>

<t>An agentic overlay network adds these functions above the existing Internet.
It is an overlay because it preserves IP, DNS, TLS, HTTP, QUIC, and other
deployed infrastructure where those mechanisms are suitable.  It is agentic
because its primary subjects are autonomous agents and agent gateways rather
than only hosts, users, or conventional web applications.</t>

<t>The architecture in this document is intended for multi-operator environments.
It assumes that no single platform will control all agents, all discovery
services, or all enterprise systems.  It therefore defines a separation between
network-wide coordination and decentralized execution.  Coordination provides
consistent semantics and trust anchors; execution remains between the selected
runtime endpoints and does not require a central node in the data path.</t>

<section anchor="problem-statement"><name>Problem Statement</name>

<t>Agent deployments are converging on several recurring interoperation problems:</t>

<t><list style="symbols">
  <t>agents can expose useful capabilities, but there is no common architectural
boundary between capability registration, semantic discovery, credential
verification, and runtime invocation;</t>
  <t>discovery systems often mix search, authorization, routing, and execution in
one platform-specific service, which makes cross-domain deployment hard;</t>
  <t>existing host and service discovery mechanisms can identify hosts or
endpoints, but they do not by themselves define agent capability semantics,
freshness, proof of control, or agent-specific lifecycle state; and</t>
  <t>enterprises need a way to expose selected internal tools as agent
capabilities without placing private systems or raw data in a global
registry.</t>
</list></t>

<t>This document addresses those problems by defining architectural roles and
boundaries.  It deliberately stops short of defining a complete product
ecosystem, commercial governance model, or mandatory implementation backend.</t>

</section>
<section anchor="applicability"><name>Applicability</name>

<t>This architecture is applicable when multiple organizations need to publish,
discover, verify, and invoke autonomous agents or agent gateways across
administrative boundaries.  It is less useful for single-application systems
where all agents, tools, credentials, and discovery functions are controlled by
one implementation and do not need interoperable metadata or cross-domain
trust.</t>

</section>
<section anchor="goals"><name>Goals</name>

<t>The architecture has the following goals:</t>

<t><list style="symbols">
  <t>enable agents to register stable identities, endpoint references, supported
protocols, and capability metadata;</t>
  <t>enable discovery services to find candidate agents based on user or agent
intent, capability tags, operational status, and policy constraints;</t>
  <t>permit heterogeneous agent protocols and legacy APIs to be adapted without
forcing all deployments onto one interaction protocol;</t>
  <t>support decentralized runtime authentication between interacting endpoints;</t>
  <t>keep management nodes out of the runtime traffic path;</t>
  <t>allow operator-neutral governance of trust anchors, revocation, taxonomy
synchronization, and audit artifacts; and</t>
  <t>provide a basis for interoperable metering and audit evidence without
requiring every runtime interaction to be recorded on a public ledger.</t>
</list></t>

</section>
<section anchor="non-goals"><name>Non-Goals</name>

<t>This document does not define:</t>

<t><list style="symbols">
  <t>a replacement for IP, DNS, TLS, HTTP, QUIC, or other deployed Internet
protocols;</t>
  <t>a new agent URI scheme;</t>
  <t>a mandatory agent-to-agent invocation protocol;</t>
  <t>a single global discovery algorithm;</t>
  <t>a universal reputation system;</t>
  <t>an economic settlement protocol; or</t>
  <t>an application-specific workflow language.</t>
</list></t>

<t>Companion specifications may define concrete message formats, transport
bindings, identity credential profiles, discovery query schemas, or metering
records that fit within this architecture.</t>

</section>
<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP 14
<xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as
shown here.</t>

</section>
</section>
<section anchor="terminology"><name>Terminology</name>

<dl>
  <dt>Agent:</dt>
  <dd>
    <t>An autonomous or semi-autonomous software system that can receive an intent
or request, perform planning or tool use, and return a result or state
transition.</t>
  </dd>
  <dt>Agent Gateway:</dt>
  <dd>
    <t>A domain-local component that adapts an internal API, tool, service, or
legacy system into an agent-compatible interface.  An Agent Gateway is not a
global discovery service unless it also implements that role.</t>
  </dd>
  <dt>Agentic Overlay Network:</dt>
  <dd>
    <t>An overlay architecture that adds agent identity, capability registration,
semantic discovery, trust coordination, and operational metering above the
existing Internet.</t>
  </dd>
  <dt>Capability Metadata:</dt>
  <dd>
    <t>Structured and human-readable information describing what an agent can do,
how it can be invoked, which protocols it supports, and which operational
constraints apply.</t>
  </dd>
  <dt>Discovery Service Node:</dt>
  <dd>
    <t>A node that accepts discovery requests and returns candidate agents.  It
performs search and candidate ranking, but it is not in the runtime execution
path between agents.</t>
  </dd>
  <dt>Enterprise Service Hub:</dt>
  <dd>
    <t>A private-domain component that encapsulates enterprise data sources,
tools, and internal APIs and exposes selected capabilities through an Agent
Gateway or Registry Service Node.</t>
  </dd>
  <dt>Management Root Node:</dt>
  <dd>
    <t>A control-plane node that coordinates trust anchors, credential issuer
authorization, semantic taxonomy synchronization, revocation information,
and network-wide policy artifacts.  It does not forward agent traffic.</t>
  </dd>
  <dt>Registry Service Node:</dt>
  <dd>
    <t>A node that onboards agents or Agent Gateways, validates registration
metadata, issues or requests identity credentials, and publishes capability
metadata to authorized discovery infrastructure.</t>
  </dd>
  <dt>Semantic Taxonomy:</dt>
  <dd>
    <t>A controlled hierarchy or graph of capability labels used to normalize
registration and discovery across administrative domains.</t>
  </dd>
  <dt>Trusted Metering Log:</dt>
  <dd>
    <t>A tamper-evident record or digest that summarizes an invocation, discovery,
referral, or metering-relevant event without necessarily exposing private
payload data.</t>
  </dd>
</dl>

</section>
<section anchor="architectural-principles"><name>Architectural Principles</name>

<t>The architecture follows these principles:</t>

<t>Control-plane coordination is limited.  Management Root Nodes provide
coordination and trust bootstrapping.  They MUST NOT be required for ordinary
runtime endpoint-to-endpoint message exchange.</t>

<t>Execution is decentralized.  After discovery, the invoking agent or its
gateway communicates directly with the target agent or target gateway.  The
parties perform mutual verification without relying on the Discovery Service
Node as a trusted intermediary.</t>

<t>Metadata and payloads are separated.  Registries and discovery services
operate on capability metadata, endpoint references, operational status, and
policy hints.  They SHOULD NOT require access to private task payloads.</t>

<t>Protocol adaptation is local.  Heterogeneous enterprise systems and agent
protocols are adapted by Agent Gateways and Enterprise Service Hubs close to
the systems they protect.</t>

<t>Semantic coordination is explicit.  Capability labels and taxonomies SHOULD be
synchronized through controlled processes so that discovery results have
consistent meaning across domains.</t>

</section>
<section anchor="architecture-overview"><name>Architecture Overview</name>

<t>An agentic overlay network is composed of a coordination plane, a service
exchange plane, and a runtime interaction plane.</t>

<figure><artwork type="ascii-art"><![CDATA[
          +-------------------------------+
          |     Management Root Nodes     |
          | trust, policy, taxonomy       |
          +---------------+---------------+
                          |
              control synchronization
                          |
       +------------------+------------------+
       |                                     |
+------+-----------+                 +-------+----------+
| Registry Service |                 | Discovery Service|
| Nodes            |                 | Nodes            |
| onboarding and   |                 | semantic search  |
| capability data  |                 | candidate lists  |
+------+-----------+                 +-------+----------+
       |                                     |
       | registration                        | discovery
       |                                     |
+------+--------------+              +-------+----------+
| Agents, Gateways,   |<------------>| Invoking Agents |
| Enterprise Hubs     | execution    | and Users       |
+---------------------+              +-----------------+
]]></artwork></figure>

<t>The key architectural boundary is that discovery and execution are separate.
A Discovery Service Node returns candidates and metadata.  The invoking party
then verifies identity, policy, credentials, and endpoint information before
using any candidate.</t>

</section>
<section anchor="logical-layers"><name>Logical Layers</name>

<t>The architecture can be understood as four logical layers.  These layers are
not wire-protocol layers; they are functional groupings used to assign
responsibilities.</t>

<texttable>
      <ttcol align='left'>Layer</ttcol>
      <ttcol align='left'>Function</ttcol>
      <ttcol align='left'>Typical Components</ttcol>
      <c>Underlay Support</c>
      <c>Existing network transport, compute, storage, and optional deterministic networking support</c>
      <c>IP, DNS, TLS, HTTP, QUIC, edge compute</c>
      <c>Interconnection</c>
      <c>Registration, addressing references, endpoint discovery, and protocol adaptation</c>
      <c>Registry Service Nodes, Discovery Service Nodes, Agent Gateways</c>
      <c>Collaboration</c>
      <c>Identity, trust, taxonomy synchronization, policy coordination, metering, and audit</c>
      <c>Management Root Nodes, credential issuers, audit services</c>
      <c>Application</c>
      <c>User-facing and agent-facing services that express or satisfy intents</c>
      <c>Agents, applications, enterprise services</c>
</texttable>

<t>The architecture intentionally keeps most agent-specific semantics above the
existing transport layer.  Underlay technologies MAY provide quality,
latency, or reliability enhancements, but they are not required to understand
agent capability metadata.</t>

</section>
<section anchor="deployment-profiles"><name>Deployment Profiles</name>

<t>Deployments can adopt this architecture incrementally.  This document defines
four non-exclusive deployment profiles to make that progression explicit.</t>

<texttable>
      <ttcol align='left'>Profile</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>P0</c>
      <c>Local Gateway</c>
      <c>A single domain exposes local tools through Agent Gateways.  No cross-domain registry is required.</c>
      <c>P1</c>
      <c>Domain Registry</c>
      <c>A domain operates a Registry Service Node and publishes signed capability metadata for local agents.</c>
      <c>P2</c>
      <c>Federated Discovery</c>
      <c>Multiple domains exchange catalog summaries and allow authorized Discovery Service Nodes to query or synchronize metadata.</c>
      <c>P3</c>
      <c>Coordinated Overlay</c>
      <c>Management Root Nodes coordinate trust anchors, taxonomy versions, revocation state, and audit digests across multiple operators.</c>
</texttable>

<t>Implementations SHOULD document which deployment profile they implement.
Clients SHOULD degrade gracefully when interacting with a deployment that
supports only a lower profile.  For example, a P0 deployment can still expose
a useful agent endpoint, but a client cannot assume global taxonomy
synchronization or cross-operator revocation checks.</t>

</section>
<section anchor="node-roles"><name>Node Roles</name>

<section anchor="management-root-nodes"><name>Management Root Nodes</name>

<t>Management Root Nodes are control-plane coordination nodes.  A deployment MAY
use one Management Root Node or a federation of such nodes operated by neutral
or authorized organizations.</t>

<t>Management Root Nodes are responsible for:</t>

<t><list style="symbols">
  <t>authorizing Registry Service Nodes and Discovery Service Nodes;</t>
  <t>publishing credential issuer metadata and revocation information;</t>
  <t>coordinating semantic taxonomy versions;</t>
  <t>publishing policy digests or governance artifacts;</t>
  <t>receiving compact catalog summaries or audit digests; and</t>
  <t>distributing synchronized control-plane state to authorized service nodes.</t>
</list></t>

<t>Management Root Nodes MUST NOT be required for:</t>

<t><list style="symbols">
  <t>runtime request forwarding;</t>
  <t>target agent selection for an individual user request;</t>
  <t>access to private invocation payloads;</t>
  <t>direct enforcement of endpoint-level authorization decisions; or</t>
  <t>maintaining real-time fine-grained search indices for all agents.</t>
</list></t>

<t>This boundary reduces central bottlenecks and limits the operational power of
the control plane.</t>

</section>
<section anchor="registry-service-nodes"><name>Registry Service Nodes</name>

<t>Registry Service Nodes are supply-side onboarding hubs.  They receive agent
registrations, validate metadata, and publish capability records to discovery
infrastructure.</t>

<t>A Registry Service Node SHOULD perform the following functions:</t>

<t><list style="symbols">
  <t>validate that mandatory registration fields are present;</t>
  <t>verify endpoint reachability where applicable;</t>
  <t>validate imported OpenAPI, tool, or agent-card descriptions when supplied;</t>
  <t>assign or verify a stable agent identifier;</t>
  <t>issue, request, or bind credentials that associate the agent identifier with
capability metadata;</t>
  <t>monitor lifecycle events such as update, suspension, deletion, and
heartbeat status; and</t>
  <t>synchronize catalog summaries with authorized Management Root Nodes or
Discovery Service Nodes.</t>
</list></t>

<t>A Registry Service Node MUST preserve the distinction between asserted
capabilities and verified capabilities.  If it cannot verify a claim, it MUST
NOT mark that claim as verified.</t>

<t>Registrations SHOULD be soft state.  A Registry Service Node SHOULD assign an
expiration time to each active registration and require refresh before
expiration.  If an agent fails to refresh, the Registry Service Node SHOULD
mark the registration <spanx style="verb">inactive</spanx> or remove it from discovery results.</t>

</section>
<section anchor="discovery-service-nodes"><name>Discovery Service Nodes</name>

<t>Discovery Service Nodes are demand-side search and candidate selection nodes.
They accept discovery requests and return candidate agents with metadata that
allows the requester to make its own trust decision.</t>

<t>A Discovery Service Node SHOULD support:</t>

<t><list style="symbols">
  <t>lookup by stable identifier;</t>
  <t>discovery by capability tags;</t>
  <t>discovery by natural-language intent;</t>
  <t>filtering by protocol support, domain, policy, trust level, or operational
status;</t>
  <t>ranking that combines semantic relevance with operational and policy
signals; and</t>
  <t>explainable result metadata sufficient for clients to understand why a
candidate was returned.</t>
</list></t>

<t>A Discovery Service Node MUST treat its own results as recommendations, not as
authorization decisions.  It MUST NOT require target agents to route runtime
traffic through it.</t>

</section>
<section anchor="agent-gateways"><name>Agent Gateways</name>

<t>Agent Gateways adapt local systems into agent-compatible interfaces.  They are
often deployed inside enterprises, clouds, or application platforms.</t>

<t>An Agent Gateway MAY:</t>

<t><list style="symbols">
  <t>translate between agent protocols and internal REST, RPC, message bus, or
tool interfaces;</t>
  <t>enforce local policy;</t>
  <t>perform local authentication and authorization;</t>
  <t>redact or transform private data before exposing a capability;</t>
  <t>maintain local logs required by the enterprise domain; and</t>
  <t>present a standardized capability record to a Registry Service Node.</t>
</list></t>

<t>Agent Gateways SHOULD NOT be assumed to be globally trusted.  Remote agents
SHOULD verify the gateway's credentials and policy claims before invocation.</t>

</section>
<section anchor="enterprise-service-hubs"><name>Enterprise Service Hubs</name>

<t>Enterprise Service Hubs are private-domain integration components.  They are
used when an organization wants to expose selected internal capabilities while
keeping raw systems and data inside a protected environment.</t>

<t>An Enterprise Service Hub SHOULD expose only the minimum metadata needed for
discovery.  Sensitive schemas, raw datasets, internal credentials, and private
business logic SHOULD remain local unless explicitly authorized by local
policy.</t>

</section>
</section>
<section anchor="capability-metadata"><name>Capability Metadata</name>

<t>Capability metadata is the primary object exchanged between registration and
discovery functions.  A concrete serialization is out of scope for this
document, but a registration profile SHOULD include the fields in Table 1.</t>

<texttable>
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Requirement</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>agent_id</c>
      <c>MUST</c>
      <c>Stable identifier for the agent or gateway</c>
      <c>name</c>
      <c>MUST</c>
      <c>Human-readable name</c>
      <c>description</c>
      <c>MUST</c>
      <c>Natural-language capability description</c>
      <c>capability_tags</c>
      <c>SHOULD</c>
      <c>Normalized tags selected from a semantic taxonomy</c>
      <c>endpoints</c>
      <c>MUST</c>
      <c>Endpoint references or protocol-specific contact data</c>
      <c>protocols</c>
      <c>MUST</c>
      <c>Supported invocation protocols or transport bindings</c>
      <c>auth_methods</c>
      <c>SHOULD</c>
      <c>Supported authentication methods</c>
      <c>credential_refs</c>
      <c>SHOULD</c>
      <c>References to credentials or attestations</c>
      <c>status</c>
      <c>SHOULD</c>
      <c>Operational status such as active, suspended, deprecated</c>
      <c>freshness</c>
      <c>SHOULD</c>
      <c>Timestamp, sequence number, or version marker</c>
      <c>ttl</c>
      <c>MAY</c>
      <c>Suggested registration lifetime in seconds</c>
      <c>constraints</c>
      <c>MAY</c>
      <c>Rate limits, regions, data handling limits, cost hints</c>
      <c>examples</c>
      <c>MAY</c>
      <c>Example tasks or invocation patterns</c>
</texttable>

<t>Capability metadata SHOULD be signed by the publisher or by a Registry Service
Node.  Consumers MUST validate signatures and freshness before relying on the
metadata for security-sensitive decisions.</t>

<t>Implementations MUST ignore unrecognized metadata fields unless a local policy
requires strict validation.  This enables extension fields, protocol-specific
bindings, and future capability descriptors to coexist with the base
architecture.</t>

</section>
<section anchor="operational-workflows"><name>Operational Workflows</name>

<section anchor="agent-registration"><name>Agent Registration</name>

<t>Agent registration brings a new agent or gateway into the overlay.</t>

<t><list style="numbers" type="1">
  <t>The agent operator submits capability metadata to a Registry Service Node.</t>
  <t>The Registry Service Node validates mandatory fields and endpoint
reachability.</t>
  <t>The Registry Service Node verifies or assigns the agent identifier.</t>
  <t>The Registry Service Node binds the identifier to capability metadata using
a credential, signed record, or equivalent mechanism.</t>
  <t>The Registry Service Node stores the local catalog entry.</t>
  <t>The Registry Service Node synchronizes a catalog summary or signed record
to authorized discovery infrastructure.</t>
</list></t>

<t>Registrations SHOULD support incremental updates.  A metadata update MUST
carry a freshness indicator that allows receivers to reject stale records.</t>

<t>An explicit deregistration request SHOULD be supported.  Deregistration MUST
be authenticated with the same or stronger proof of control as registration.
After deregistration, Registry Service Nodes SHOULD either remove the record
from discovery or return it only as an inactive historical record according to
local retention policy.</t>

</section>
<section anchor="taxonomy-synchronization"><name>Taxonomy Synchronization</name>

<t>Capability labels are useful only if different parties interpret them in
compatible ways.  Management Root Nodes or authorized taxonomy services SHOULD
publish versioned semantic taxonomies.</t>

<t>Taxonomy updates SHOULD include:</t>

<t><list style="symbols">
  <t>a taxonomy identifier;</t>
  <t>a version number or timestamp;</t>
  <t>label identifiers;</t>
  <t>parent-child or graph relationships;</t>
  <t>deprecation markers;</t>
  <t>mappings to related labels where available; and</t>
  <t>a signature from the taxonomy authority.</t>
</list></t>

<t>Registry Service Nodes SHOULD validate submitted capability tags against a
supported taxonomy version.  Discovery Service Nodes SHOULD expose which
taxonomy versions were used when producing results.</t>

</section>
<section anchor="agent-discovery"><name>Agent Discovery</name>

<t>Agent discovery returns candidate agents for a requested intent or constraint
set.</t>

<t><list style="numbers" type="1">
  <t>The requester sends a discovery request to a Discovery Service Node.</t>
  <t>The Discovery Service Node normalizes the request against supported
taxonomies and policies.</t>
  <t>The Discovery Service Node searches local or synchronized catalogs.</t>
  <t>The Discovery Service Node ranks candidates using implementation-specific
relevance and policy signals.</t>
  <t>The Discovery Service Node returns candidate metadata, credential
references, endpoint references, and matching evidence.</t>
  <t>The requester validates the returned metadata before selecting a target.</t>
</list></t>

<t>Discovery results MUST NOT be treated as proof that an agent is safe,
authorized, or suitable for a particular regulated use.</t>

</section>
<section anchor="mutual-verification-runtime-interaction"><name>Mutual Verification Runtime Interaction</name>

<t>After selecting a candidate, the invoking party establishes trust directly with
the target endpoint, which can be an agent or gateway.</t>

<t><list style="numbers" type="1">
  <t>The invoking party resolves or retrieves the target's credential material.</t>
  <t>Both parties validate each other's credentials, signatures, revocation
status, and policy constraints.</t>
  <t>The invoking party establishes a secure channel using the selected
protocol.</t>
  <t>The target enforces local authorization policy.</t>
  <t>The parties exchange runtime requests and responses directly.</t>
  <t>Each party records local audit or metering evidence according to policy.</t>
</list></t>

<t>Discovery Service Nodes SHOULD NOT be in this execution path unless the
deployment explicitly uses them as application gateways.  If a Discovery
Service Node also acts as a gateway, the two roles MUST be distinguishable in
metadata and policy.</t>

</section>
<section anchor="trusted-metering"><name>Trusted Metering</name>

<t>Commercial deployments may require metering for billing, audit, reconciliation,
or contribution tracing.  The architecture supports metering without requiring
every interaction payload to be globally visible.</t>

<t>A metering record SHOULD include:</t>

<t><list style="symbols">
  <t>a record identifier;</t>
  <t>identities of the metering parties or pseudonymous references;</t>
  <t>timestamp or time window;</t>
  <t>invocation or discovery event type;</t>
  <t>service or capability identifier;</t>
  <t>usage counters or metering-relevant units;</t>
  <t>policy or contract reference;</t>
  <t>privacy-preserving digest of evidence where applicable; and</t>
  <t>signature by the recording party.</t>
</list></t>

<t>High-frequency private interaction data SHOULD remain off-chain or local.
Deployments MAY publish compact digests, Merkle roots, revocation events, or
metering commitments to a distributed ledger when tamper-evidence or
cross-operator reconciliation is required.</t>

</section>
</section>
<section anchor="interoperability-considerations"><name>Interoperability Considerations</name>

<t>The architecture is protocol-neutral.  It can coexist with agent cards,
well-known metadata files, DNS-based discovery hints, MCP-style tool
interfaces, A2A-style messaging, HTTP APIs, gRPC services, local process
bindings, and future agent protocols.</t>

<t>Interoperability profiles SHOULD define:</t>

<t><list style="symbols">
  <t>how an agent identifier is represented;</t>
  <t>how capability metadata is serialized;</t>
  <t>how signatures and credential references are encoded;</t>
  <t>how endpoints and protocols are selected;</t>
  <t>how taxonomy labels are named and versioned;</t>
  <t>how discovery queries and results are encoded; and</t>
  <t>how status, revocation, and freshness are checked.</t>
</list></t>

<t>Profiles SHOULD avoid requiring one specific machine-learning model or ranking
algorithm for discovery.  Discovery algorithms affect quality and performance,
but the interoperable surface is the query, metadata, result, and validation
contract.</t>

<section anchor="relationship-to-existing-mechanisms"><name>Relationship to Existing Mechanisms</name>

<t>DNS and well-known URIs <xref target="RFC8615"/> can provide bootstrap hints, domain
control signals, or descriptor locations.  They SHOULD NOT be overloaded with
high-frequency, large, or privacy-sensitive agent metadata.</t>

<t>OAuth 2.0, mutual TLS, signed application messages, public-key credentials, or
other credential systems can be used as authentication and authorization
substrates.  This architecture does not require one credential technology, but
deployments MUST make credential semantics and revocation behavior explicit.</t>

<t>Deployments that use TLS SHOULD follow the security properties of the TLS
version they negotiate; TLS 1.3 is specified in <xref target="RFC8446"/>.  Deployments
that use OAuth-style bearer authorization SHOULD account for token replay and
audience restriction, including the considerations in OAuth 2.0 <xref target="RFC6749"/>
and OAuth 2.0 Bearer Token Usage <xref target="RFC6750"/>.</t>

<t>Agent interaction protocols such as tool invocation protocols, message-based
agent protocols, or local process protocols remain above or beside this
architecture.  The overlay discovers and verifies candidates; the selected
interaction protocol carries the task.</t>

</section>
<section anchor="versioning-and-extension"><name>Versioning and Extension</name>

<t>Deployment profiles, metadata objects, taxonomy versions, and credential
profiles SHOULD carry explicit version identifiers.  Implementations MUST NOT
assume that all nodes in an overlay support the same profile version.</t>

<t>Unknown metadata fields MUST be ignored unless strict validation is required by
local policy.  Unknown profile identifiers, taxonomy versions, or credential
profiles SHOULD cause graceful degradation rather than silent acceptance.</t>

<t>Private extensions SHOULD use collision-resistant names, such as URIs or
reverse-DNS names.  Extensions that affect interoperability across independent
implementations SHOULD be documented in a stable specification.</t>

</section>
<section anchor="failure-handling"><name>Failure Handling</name>

<t>Implementations SHOULD distinguish at least the following failure conditions:</t>

<texttable>
      <ttcol align='left'>Condition</ttcol>
      <ttcol align='left'>Typical Handling</ttcol>
      <c>stale_metadata</c>
      <c>Reject for security-sensitive use or request refresh</c>
      <c>revoked_credential</c>
      <c>Do not invoke; report revocation to the user or policy engine</c>
      <c>taxonomy_mismatch</c>
      <c>Fall back to text search or request a supported taxonomy version</c>
      <c>discovery_unavailable</c>
      <c>Use cached signed metadata if local policy permits</c>
      <c>endpoint_unreachable</c>
      <c>Try alternate binding or mark candidate degraded</c>
      <c>policy_denied</c>
      <c>Do not invoke even if semantic match is high</c>
</texttable>

<t>Discovery clients SHOULD surface these conditions separately.  Collapsing all
failures into "not found" can hide security problems and make operational
debugging difficult.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Agentic overlay networks introduce risks beyond ordinary service discovery.
Agents can initiate actions, combine tools, and operate across administrative
domains.  Implementations MUST treat discovery data as untrusted input.</t>

<dl>
  <dt>Identity spoofing:</dt>
  <dd>
    <t>Attackers may register names or descriptions similar to trusted agents.
Registries SHOULD require proof of control over identifiers and SHOULD
distinguish unverified claims from verified credentials.</t>
  </dd>
  <dt>Capability exaggeration:</dt>
  <dd>
    <t>Agents may claim capabilities they do not possess.  Registries SHOULD mark
whether capabilities are self-asserted, registry-validated, or attested by a
third party.</t>
  </dd>
  <dt>Stale metadata:</dt>
  <dd>
    <t>Discovery results may include outdated endpoints, revoked credentials, or
deprecated capabilities.  Metadata MUST include freshness information.
Clients MUST check revocation and expiration before invocation.</t>
  </dd>
  <dt>Discovery poisoning:</dt>
  <dd>
    <t>Malicious operators may attempt to bias ranking or inject misleading
metadata.  Discovery Service Nodes SHOULD apply abuse detection, provenance
checks, and rate limits.</t>
  </dd>
  <dt>Centralization risk:</dt>
  <dd>
    <t>Management Root Nodes could become governance bottlenecks.  Deployments
SHOULD scope their authority narrowly and publish auditable policy artifacts.</t>
  </dd>
  <dt>Payload exposure:</dt>
  <dd>
    <t>Registries and discovery services SHOULD NOT require private invocation
payloads.  Enterprise Service Hubs SHOULD redact sensitive metadata and keep
raw data local unless policy permits disclosure.</t>
  </dd>
  <dt>Confused deputy attacks:</dt>
  <dd>
    <t>An agent may be tricked into invoking another agent using credentials or
authority outside the user's intent.  Runtime agents SHOULD use scoped,
task-specific credentials and SHOULD bind authorization to the requested
action.</t>
  </dd>
  <dt>Downgrade attacks:</dt>
  <dd>
    <t>An attacker may try to force a client from a stronger deployment profile to
a weaker one, for example by suppressing credential references or taxonomy
versions.  Clients SHOULD enforce minimum acceptable profile and credential
requirements for sensitive tasks.</t>
  </dd>
  <dt>Registry compromise:</dt>
  <dd>
    <t>A compromised Registry Service Node can publish false metadata for many
agents.  Management Root Nodes or governance services SHOULD support rapid
revocation of registry credentials and distribution of registry compromise
indicators.</t>
  </dd>
  <dt>Metering privacy:</dt>
  <dd>
    <t>Metering records can reveal business relationships or user behavior.
Deployments SHOULD minimize metering data, aggregate where possible, and use
privacy-preserving digests when detailed evidence is not required.</t>
  </dd>
</dl>

</section>
<section anchor="privacy-considerations"><name>Privacy Considerations</name>

<t>Capability metadata can reveal sensitive information about enterprise systems,
available tools, regions, customers, or business processes.  Registrations
SHOULD disclose only what is necessary for discovery and safe invocation.</t>

<t>Deployments SHOULD evaluate privacy risks using the general guidance for
Internet protocols in <xref target="RFC6973"/>.</t>

<t>Discovery requests can reveal user intent.  Discovery Service Nodes SHOULD
provide transport confidentiality, access control, retention limits, and
privacy-preserving logging options.</t>

<t>Enterprise Service Hubs SHOULD keep private data, internal schemas, and
credentials within the local domain unless a specific policy authorizes
external disclosure.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document does not create new registries, media types, URI schemes, HTTP
fields, or protocol parameter values.  It makes no IANA requests.</t>

</section>
<section anchor="implementation-status"><name>Implementation Status</name>

<t>This section is to be removed before publication as an RFC.</t>

<t>Prototype deployments are expected to use existing web transports, signed JSON
metadata, public-key credentials or equivalent signed credentials, local vector
or keyword search in Discovery Service Nodes, and enterprise gateways for
protocol adaptation.</t>

</section>
<section anchor="implementation-checklist"><name>Implementation Checklist</name>

<t>An implementation of this architecture can be reviewed against the following
checklist:</t>

<t><list style="symbols">
  <t>which deployment profile is supported;</t>
  <t>how capability metadata is signed and refreshed;</t>
  <t>how unknown metadata fields are handled;</t>
  <t>how taxonomy versions are negotiated or rejected;</t>
  <t>how registry compromise and credential revocation are distributed;</t>
  <t>how discovery results are separated from authorization decisions;</t>
  <t>how endpoint reachability and stale metadata failures are reported; and</t>
  <t>what information is retained in metering or audit logs.</t>
</list></t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC8615">
  <front>
    <title>Well-Known Uniform Resource Identifiers (URIs)</title>
    <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
    <date month="May" year="2019"/>
    <abstract>
      <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
      <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8615"/>
  <seriesInfo name="DOI" value="10.17487/RFC8615"/>
</reference>
<reference anchor="RFC8446">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8446"/>
  <seriesInfo name="DOI" value="10.17487/RFC8446"/>
</reference>
<reference anchor="RFC6749">
  <front>
    <title>The OAuth 2.0 Authorization Framework</title>
    <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
    <date month="October" year="2012"/>
    <abstract>
      <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6749"/>
  <seriesInfo name="DOI" value="10.17487/RFC6749"/>
</reference>
<reference anchor="RFC6750">
  <front>
    <title>The OAuth 2.0 Authorization Framework: Bearer Token Usage</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="D. Hardt" initials="D." surname="Hardt"/>
    <date month="October" year="2012"/>
    <abstract>
      <t>This specification describes how to use bearer tokens in HTTP requests to access OAuth 2.0 protected resources. Any party in possession of a bearer token (a "bearer") can use it to get access to the associated resources (without demonstrating possession of a cryptographic key). To prevent misuse, bearer tokens need to be protected from disclosure in storage and in transport. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6750"/>
  <seriesInfo name="DOI" value="10.17487/RFC6750"/>
</reference>
<reference anchor="RFC6973">
  <front>
    <title>Privacy Considerations for Internet Protocols</title>
    <author fullname="A. Cooper" initials="A." surname="Cooper"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="J. Morris" initials="J." surname="Morris"/>
    <author fullname="M. Hansen" initials="M." surname="Hansen"/>
    <author fullname="R. Smith" initials="R." surname="Smith"/>
    <date month="July" year="2013"/>
    <abstract>
      <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6973"/>
  <seriesInfo name="DOI" value="10.17487/RFC6973"/>
</reference>



    </references>

</references>


<?line 737?>

<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The authors thank participants in discussions on agent networking, agent
discovery, and cross-domain agent interoperability.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>
