<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hood-independent-agtp-03" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="AGTP">Agent Transfer Protocol (AGTP)</title>
    <seriesInfo name="Internet-Draft" value="draft-hood-independent-agtp-03"/>
    <author fullname="Chris Hood">
      <organization>Nomotic, Inc.</organization>
      <address>
        <email>chris@nomotic.ai</email>
        <uri>https://nomotic.ai</uri>
      </address>
    </author>
    <date year="2026" month="April" day="16"/>
    <area>Applications and Real-Time</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>AI agents</keyword>
    <keyword>agentic systems</keyword>
    <keyword>protocol</keyword>
    <keyword>agent traffic</keyword>
    <keyword>agent transfer</keyword>
    <abstract>
      <?line 118?>

<t>AI agents and agentic systems generate a growing volume of intent-driven,
unstructured, and undifferentiated traffic that flows through HTTP
indistinguishably from human-initiated requests. HTTP lacks the semantic
vocabulary, observability primitives, and identity mechanisms required by
agent systems operating at scale. Existing protocols described as Agent
Group Messaging Protocols (AGMP), including MCP, ACP, A2A, and ANP, are
messaging-layer constructs that presuppose HTTP as their transport.
They do not address the underlying transport problem.</t>
      <t>This document defines the Agent Transfer Protocol (AGTP): a dedicated
application-layer protocol for AI agent traffic. Version 03 introduces
normative integration with the Agentic Grammar and Interface Specification
(AGIS) <xref target="AGIS"/>, which defines the grammar-based validation pathway for
AGTP method identifiers. AGIS-conformant methods are accepted at the
transport layer via the Method-Grammar header without requiring prior IANA
registration, enabling organizations to define domain-specific Agentive
API vocabularies while preserving interoperability through shared
grammatical constraints. AGTP provides agent-native
intent methods (QUERY, SUMMARIZE, BOOK, SCHEDULE, LEARN, DELEGATE,
COLLABORATE, CONFIRM, ESCALATE, NOTIFY, DESCRIBE, SUSPEND),
protocol-level agent identity and authority headers, and a status code
vocabulary designed for the conditions AI agent systems encounter. AGTP
SHOULD prefer QUIC for new implementations and MUST support TCP/TLS for
compatibility and fallback. It is designed to be composable with existing
agent frameworks, not to replace them. Version 02 introduces capability
discovery (DESCRIBE), resource budget signaling and enforcement, optional
RATS-aligned execution attestation, observability hooks, network zone
isolation, session suspension as a method, and normative composition
profiles with AGMP (Agent Group Messaging Protocols). Version 02 enables
dynamic capability negotiation and resource-aware governance.</t>
    </abstract>
  </front>
  <middle>
    <?line 151?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><strong>Note Regarding Intellectual Property:</strong>  Implementers should be
aware that extensions and certain mechanisms referenced in this
document -- including the Agent Certificate extension (Section 7.2),
the ACTIVATE method, the Agent Birth Certificate mechanism
(Section 5.7), and the <tt>.agent</tt> and <tt>.nomo</tt> file format
specifications (Section 2) -- may be subject to pending patent
applications by the author.  The core AGTP specification is intended
for open implementation without royalty obligation.  The licensor is
prepared to grant a royalty-free license to implementers consistent
with <xref target="RFC8179"/>.  IPR disclosures:
https://datatracker.ietf.org/ipr/ -- see also Section 7.7.</t>
      <section anchor="background">
        <name>Background</name>
        <t>The deployment of AI agents and multi-agent systems is accelerating
across enterprise, research, and consumer contexts. These systems execute
complex, multi-step workflows, querying data sources, booking resources,
delegating subtasks to peer agents, and escalating decisions to human
principals, with minimal or no human supervision per transaction.</t>
        <t>Unlike human-initiated web traffic, agent-generated traffic is dynamic,
high-frequency, intent-driven, and often stateful across sequences of
related requests. The infrastructure carrying this traffic was not
designed with these properties in mind.</t>
      </section>
      <section anchor="limitations-of-http-for-agent-traffic">
        <name>Limitations of HTTP for Agent Traffic</name>
        <t>HTTP has served as the internet's primary application-layer transport for
over three decades. Its evolution through HTTP/2 <xref target="RFC7540"/> and HTTP/3
<xref target="RFC9114"/> has improved performance, multiplexing, and latency. However,
the fundamental model of HTTP being stateless, resource-oriented,
human-initiated request/response, creates specific failures when applied
to agentic systems at scale:</t>
        <ul spacing="normal">
          <li>
            <t>Traffic indistinguishability: Agent-generated requests are structurally
identical to human-initiated requests at the transport layer. Operators
cannot identify, route, or govern agent traffic without application-layer
instrumentation.</t>
          </li>
          <li>
            <t>Method vocabulary mismatch: HTTP's method set (GET, POST, PUT, DELETE,
PATCH) describes resource operations. Agent traffic expresses purposeful
intent, summarize, book, delegate, escalate. The mismatch forces intent
into request bodies, invisible to protocol-level handlers.</t>
          </li>
          <li>
            <t>Identity and attribution absence: HTTP carries no native mechanism for
asserting agent identity, declared authority scope, or the principal
accountable for an agent's actions.</t>
          </li>
          <li>
            <t>Session semantics mismatch: HTTP's stateless model is optimized for
isolated request/response cycles. Agent workflows are inherently stateful
sequences.</t>
          </li>
        </ul>
      </section>
      <section anchor="why-not-evolve-http">
        <name>Why Not Evolve HTTP?</name>
        <t>A natural question is whether these limitations could be addressed by
extending HTTP rather than defining a new protocol. There are three
specific reasons why HTTP extension is not the preferred path.</t>
        <t>First, the HTTP method registry is effectively frozen for new semantics.
<xref target="RFC9110"/> defines the HTTP method registry with IETF Review as the
registration procedure, meaning new methods require a full IETF consensus
process and must be backward-compatible with existing HTTP implementations.
Adding intent-based verbs (SUMMARIZE, DELEGATE, ESCALATE) to HTTP would
require every HTTP client, server, proxy, and middleware component to ignore
or handle unknown methods gracefully, a compatibility constraint that limits
how agent-specific semantics can be expressed at the protocol level.</t>
        <t>Second, HTTP carries decades of backward-compatibility constraints. Features
such as persistent agent identity headers, authority scope declarations, and
session-level governance semantics would require HTTP extensions that interact
unpredictably with existing caching, proxy, and CDN behavior designed for
human-generated traffic patterns.</t>
        <t>Third, the observability goal making agent traffic distinguishable from
human traffic at the infrastructure layer cannot be achieved by adding
fields to HTTP. Infrastructure components route and filter HTTP traffic
based on methods and headers that are identical across agent and human
requests. A protocol-level separation is necessary to give infrastructure
the signal it needs.</t>
        <t>AGTP is therefore designed as a dedicated protocol rather than an HTTP
extension. HTTP and AGTP coexist: human traffic continues to flow over
HTTP; agent traffic flows over AGTP. The two protocols serve different
classes of network participant.</t>
        <t>Note: The abbreviation AGTP is used in this document to distinguish
the Agent Transfer Protocol from the Authenticated Transfer Protocol
(ATP) working group currently chartered within the IETF. The URI
agtp:// is proposed for IANA registration as a new and distinct scheme.</t>
      </section>
      <section anchor="motivation-for-a-dedicated-protocol">
        <name>Motivation for a Dedicated Protocol</name>
        <t>These limitations are architectural, not implementational. They cannot be
resolved by better middleware or application code layered on HTTP. They
require a protocol designed from first principles for AI agent systems.</t>
        <t>AGTP is that protocol. It provides a dedicated transport environment for
agent traffic with: native intent-based methods, mandatory agent identity
headers, protocol-level authority scope declaration, and a status code
vocabulary for the conditions AI systems encounter.</t>
      </section>
      <section anchor="scope-and-target-audience">
        <name>Scope and Target Audience</name>
        <t>This document covers AGTP architecture, design principles, stack position,
request and response header format, agent-native method definitions and
semantics, status code vocabulary, security considerations, and IANA
considerations.</t>
        <t>The Agent Certificate extension for cryptographic binding of agent
identity to AGTP header fields is described at a high level in Section 7.2.
Full specification is provided in a separate companion document:
<xref target="AGTP-CERT"/>. That extension may be subject to pending intellectual
property claims; see Section 7.7 and the IPR Notice preceding the Abstract.</t>
        <t>Target audience: AI agent developers, protocol designers, cloud and network
infrastructure providers, enterprise security and compliance architects, and
standards community participants.</t>
      </section>
      <section anchor="agtp-as-the-transport-foundation-for-agent-group-messaging-protocols">
        <name>AGTP as the Transport Foundation for Agent Group Messaging Protocols</name>
        <t>AGTP is the purpose-built transport and governance layer for Agent Group
Messaging Protocols (AGMPs): the category of higher-layer AI agent messaging
standards that includes the Model Context Protocol (MCP) <xref target="MCP"/>, the
Agent-to-Agent Protocol (A2A) <xref target="A2A"/>, the Agent Communication Protocol
(ACP) <xref target="ACP"/>, and emerging others.</t>
        <t>AGMPs define what agents say. AGTP defines how those messages move, who
sent them, and under what authority. AGTP provides the narrow-waist
foundation that AGMPs inherit without modification: intent-native methods,
mandatory agent identity and scoping, resource budget enforcement,
observability hooks, and normative composition profiles. A deployment
running any AGMP over AGTP gains transport-level governance without changes
to the messaging layer.</t>
        <t>The AGMP category term is introduced in this document to provide a stable
collective reference for the class of protocols that AGTP serves as
substrate. It is not a formal IETF term of art; it is a descriptive
classification. Individual AGMP specifications retain their own names and
development paths. AGTP does not govern, modify, or supersede any AGMP.</t>
        <figure anchor="agmp-stack">
          <name>AGTP as Substrate for AGMPs</name>
          <artwork><![CDATA[
+-----------------------------------------------------+
|            Agent Application Logic                  |
+-----------------------------------------------------+
|  AGMP Layer: MCP / A2A / ACP / ANP  [optional]      |
+-----------------------------------------------------+
|   AGTP - Agent Transfer Protocol      [this spec]    |
+-----------------------------------------------------+
|            TLS 1.3+                  [mandatory]    |
+-----------------------------------------------------+
|         TCP / QUIC / UDP                            |
+-----------------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<strong>MUST</strong>", "<strong>MUST NOT</strong>", "<strong>REQUIRED</strong>", "<strong>SHALL</strong>",
"<strong>SHALL NOT</strong>", "<strong>SHOULD</strong>", "<strong>SHOULD NOT</strong>", "<strong>RECOMMENDED</strong>",
"<strong>NOT RECOMMENDED</strong>", "<strong>MAY</strong>", and "<strong>OPTIONAL</strong>" in this document
are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when,
and only when, they appear in all capitals.</t>
      <dl>
        <dt>Agent:</dt>
        <dd>
          <t>An AI software system that executes tasks, makes decisions, and takes
actions without continuous human supervision per transaction.</t>
        </dd>
        <dt>Principal:</dt>
        <dd>
          <t>The human, organization, or system that authorized an agent to act and
is accountable for its actions.</t>
        </dd>
        <dt>Agent-ID:</dt>
        <dd>
          <t>A unique identifier for a specific agent instance, present in all AGTP
request headers.</t>
        </dd>
        <dt>Principal-ID:</dt>
        <dd>
          <t>The identifier of the principal on whose behalf an agent operates.</t>
        </dd>
        <dt>Authority-Scope:</dt>
        <dd>
          <t>A declared set of permissions defining what actions an agent is
authorized to take, in the format domain:action or domain:*.</t>
        </dd>
        <dt>Intent Method:</dt>
        <dd>
          <t>An AGTP method name expressing the agent's purpose, as distinguished from
HTTP resource-operation verbs.</t>
        </dd>
        <dt>Delegation Chain:</dt>
        <dd>
          <t>An ordered record of Agent-IDs representing the sequence of delegations
that produced the current request.</t>
        </dd>
        <dt>Escalation:</dt>
        <dd>
          <t>An agent's intentional deferral of a decision or action to a human
principal or higher-authority agent.</t>
        </dd>
        <dt>Attribution Record:</dt>
        <dd>
          <t>A logged record of an agent action sufficient for audit and compliance
purposes.</t>
        </dd>
        <dt>Session:</dt>
        <dd>
          <t>An AGTP persistent connection context shared across multiple method
invocations within a single agent workflow.</t>
        </dd>
        <dt>SEP (Scope-Enforcement Point):</dt>
        <dd>
          <t>An AGTP-aware infrastructure component, load balancer, gateway, and proxy,
that enforces Authority-Scope compliance without application-layer access.
Requires the Agent Certificate extension (<xref target="AGTP-CERT"/>).</t>
        </dd>
        <dt>Agent Package (.agent):</dt>
        <dd>
          <t>A portable, open deployment artifact for an AI agent. An <tt>.agent</tt> file
contains an embedded Agent Manifest, an integrity hash covering all
package contents, and a behavioral trust score computed at packaging
time. The <tt>.agent</tt> format is an open specification. It is analogous to
a container image: a self-describing, portable unit of deployment. The
<tt>.agent</tt> suffix is a file format designator and <strong>MUST NOT</strong> appear as
a hostname component or top-level label in <tt>agtp://</tt> URIs. Note: the
<tt>.agent</tt> file format specification may be subject to pending patent
claims by the author; see Section 7.7.</t>
        </dd>
        <dt>Governed Agent Package (.nomo):</dt>
        <dd>
          <t>A deployment artifact in the <tt>.nomo</tt> format, which extends the <tt>.agent</tt>
format with a CA-signed certificate chain binding the package to a
verified governance zone and issuing principal. The <tt>.nomo</tt> format is
to <tt>.agent</tt> as HTTPS is to HTTP: the same structural foundation with
an added layer of cryptographic trust. A <tt>.nomo</tt> package is required
for agents operating at Trust Tier 1 (see Section 5.2). The <tt>.nomo</tt>
suffix is a file format designator and <strong>MUST NOT</strong> appear as a
hostname component in <tt>agtp://</tt> URIs.
</t>
          <t>The name derives from the Greek <em>nomos</em> (νόμος), meaning law, rule,
or governance, the same root that underlies <em>autonomy</em> (self-law),
<em>nomocracy</em> (rule of law), and <em>onomastics</em>. A <tt>.nomo</tt> package is
literally an agent operating under law: its behavior is bounded by a
cryptographically enforced governance context at the packaging layer.
Note: the <tt>.nomo</tt> file format specification may be subject to pending
patent claims by the author; see Section 7.7.</t>
        </dd>
        <dt>Agent Transfer Document (.agtp):</dt>
        <dd>
          <t>The wire-level manifest document format defined by this specification.
An <tt>.agtp</tt> document is a signed JSON structure containing the fields
defined in Section 5.5 (Agent Manifest Document). It is the output
format returned by all AGTP URI resolution requests. Both <tt>.agent</tt> and
<tt>.nomo</tt> packages produce <tt>.agtp</tt> documents when queried; the <tt>.agtp</tt>
format is the protocol's canonical representation of agent identity
and is independent of the underlying packaging format. The <tt>.agtp</tt>
suffix <strong>MAY</strong> appear in filenames for stored manifest documents but
<strong>MUST NOT</strong> appear in <tt>agtp://</tt> URIs. The Content-Type for <tt>.agtp</tt>
documents is <tt>application/agtp+json</tt>.</t>
        </dd>
        <dt>URI (AGTP):</dt>
        <dd>
          <t>An <tt>agtp://</tt> scheme URI that identifies an agent or agent namespace.
AGTP URIs are addresses, not filenames. File extensions (<tt>.agent</tt>,
<tt>.nomo</tt>, <tt>.agtp</tt>) <strong>MUST NOT</strong> appear in canonical AGTP URIs. See
Section 5.1 for the canonical URI forms and resolution semantics.</t>
        </dd>
        <dt>Agent Namespace Document:</dt>
        <dd>
          <t>A cryptographically signed <tt>application/agtp+json</tt> document returned
in response to a request targeting an organization's agent registry
root (e.g., <tt>agtp://acme.tld/agents</tt>). Lists all Active agents
registered under the organization's governance zone. The document is
generated and re-signed by the governance platform on any registry
change. It is not a manually editable file. See Section 5.4.</t>
        </dd>
        <dt>Agent Manifest Document:</dt>
        <dd>
          <t>A cryptographically signed <tt>application/agtp+json</tt> document returned
in response to a request targeting a specific agent
(e.g., <tt>agtp://acme.tld/agents/customer-service</tt>). Contains the
agent's birth certificate fields, lifecycle state, behavioral trust
score, authority scope categories, supported methods, and governance
zone. Derived directly from the agent's <tt>.agent</tt> or <tt>.nomo</tt> package;
the package integrity hash is verified before the manifest is served.
See Section 5.5.</t>
        </dd>
        <dt>Agent Birth Certificate:</dt>
        <dd>
          <t>A cryptographically signed identity document issued to an agent at
registration time by a governance platform. The Birth Certificate is
the genesis record of an agent's existence: it establishes the agent's
identity, ownership, authorized scope, behavioral archetype, and
governance zone before the agent takes any action. Authority is issued
through the Birth Certificate; it is never self-assumed.
</t>
          <t>The Birth Certificate is the source document from which the Agent
Manifest Document (Section 5.5) is derived when an AGTP URI is
resolved. The <tt>certificate_hash</tt> field of the Birth Certificate is
the basis for the agent's canonical Agent-ID. In this sense the Birth
Certificate functions as the agent's social security number: issued
once at creation, permanently bound to the individual, and the
authoritative identity record from which all other identity
representations derive.</t>
          <t>Birth Certificate fields map directly to AGTP protocol headers:
<tt>agent_id</tt> maps to the <tt>Agent-ID</tt> header; <tt>owner</tt> maps to the
<tt>Principal-ID</tt> header; <tt>scope</tt> maps to the <tt>Authority-Scope</tt> header.
See Section 5.7.</t>
          <t>Anonymous agents are ungovernable. Without a Birth Certificate, there
is no mechanism to trace decisions to a responsible principal, enforce
scope boundaries, or maintain a meaningful audit trail. Note: the
Agent Birth Certificate mechanism may be subject to pending patent
claims by the author; see Section 7.7.</t>
        </dd>
        <dt>Governance Token:</dt>
        <dd>
          <t>A signed, time-limited JWT artifact issued by a governance runtime
that encodes a specific governance decision for a specific action.
Governance tokens are the runtime companion to the static Birth
Certificate: where the Birth Certificate establishes persistent
identity, the Governance Token carries a bounded authorization for a
single action or session. Tokens carry the governance verdict
(ALLOW, DENY), the agent ID, action details, trust score dimensions,
issuer identity, and expiry. Default TTL: 30 seconds. Tokens
<strong>MUST NOT</strong> be reused across actions; each action requires a fresh
evaluation and a fresh token.</t>
        </dd>
        <dt>Trust Tier:</dt>
        <dd>
          <t>A classification assigned to an agent based on the strength of
identity verification backing its registration. Tier 1 (Verified):
org anchor is a real DNS domain with confirmed ownership and a <tt>.nomo</tt>
governed package. Tier 2 (Org-Asserted): org label is present but
DNS ownership is unverified; <tt>.agent</tt> package acceptable. Tier 3
(Experimental): X- prefix required; not discoverable through the
public AGTP registry. See Section 5.2.</t>
        </dd>
        <dt>AGMP (Agent Group Messaging Protocol):</dt>
        <dd>
          <t>The collective term for higher-layer AI agent messaging standards
that operate over AGTP as their transport substrate, including
MCP <xref target="MCP"/>, A2A <xref target="A2A"/>, ACP <xref target="ACP"/>, and ANP <xref target="ANP"/>. AGMPs
define what agents say to each other. AGTP defines how those
messages move. The term is introduced in this document as a
descriptive classification; it is not a formal IETF term of art.</t>
        </dd>
        <dt>DESCRIBE:</dt>
        <dd>
          <t>An AGTP Tier 1 core method that returns the declared capabilities,
supported modalities, method vocabulary, and versioned feature set
of a specific agent endpoint. Distinguished from URI resolution
(which returns identity) by returning operational capability
metadata suitable for pre-task negotiation. If the
<tt>capability_domains</tt> parameter is omitted, the server <strong>SHOULD</strong>
return all supported domains. Category: ACQUIRE.</t>
        </dd>
        <dt>SUSPEND (method):</dt>
        <dd>
          <t>An AGTP Tier 1 core method that places a specific active session
workflow into a recoverable paused state, issuing a resumption
nonce for re-entry. Distinguished from the lifecycle SUSPEND event
(Section 6.7.6): method-level SUSPEND is session-scoped and does
not affect the agent's registry lifecycle state or Birth Certificate
validity. Category: ORCHESTRATE.</t>
        </dd>
        <dt>Budget-Limit:</dt>
        <dd>
          <t>A request header declaring the maximum resource consumption the
principal authorizes for a method invocation, expressed as
space-separated unit:value tokens drawn from the IANA AGTP Budget
Unit Registry. Example: <tt>Budget-Limit: tokens=5000
compute-seconds=120 financial=10.00USD ttl=3600</tt>. Exceeding the
declared limit <strong>MUST</strong> cause the server to return 452 Budget
Exceeded rather than continue execution. Note: ttl= is RECOMMENDED 
to bound budget lifetime.</t>
        </dd>
        <dt>AGTP-Zone-ID:</dt>
        <dd>
          <t>A request header declaring the network zone or organizational
boundary within which a request must be processed. Scope-Enforcement
Points (SEPs) <strong>MUST</strong> enforce zone boundaries and <strong>MUST</strong> return
453 Zone Violation if a DELEGATE or COLLABORATE request would route
outside the declared zone.</t>
        </dd>
      </dl>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>AGTP is motivated by three distinct, compounding failures in how current
internet infrastructure handles AI agent traffic.</t>
      <section anchor="problem-1-undifferentiated-agent-traffic-on-http">
        <name>Problem 1: Undifferentiated Agent Traffic on HTTP</name>
        <t>AI agents generate intent-driven, structured traffic that is functionally
invisible to the infrastructure it traverses. This traffic flows through
HTTP alongside human traffic with no protocol-level differentiation.
Observability failure, routing inefficiency, and security blindness result,
operators cannot determine what fraction of traffic is agent-generated
without application-layer instrumentation that is expensive, inconsistent,
and easy to circumvent.</t>
        <t>AGTP response: a dedicated protocol environment for agent traffic.
Infrastructure can distinguish, route, monitor, and govern agent traffic
natively.</t>
      </section>
      <section anchor="problem-2-semantic-mismatch-between-agent-intent-and-available-methods">
        <name>Problem 2: Semantic Mismatch Between Agent Intent and Available Methods</name>
        <t>AI agents operate on intent. HTTP's method vocabulary was designed to
describe operations on resources, not purposeful action. When an agent
intends to SUMMARIZE a document, BOOK a resource, and SCHEDULE a sequence,
all three arrive as POST requests. The server receives identical verbs
with meaningfully different intent buried in request bodies, invisible to
any protocol-level handler.</t>
        <t>AGTP response: a vocabulary of agent-native methods that express intent at
the protocol level.</t>
      </section>
      <section anchor="problem-3-no-protocol-level-identity-authority-or-attribution-for-agents">
        <name>Problem 3: No Protocol-Level Identity, Authority, or Attribution for Agents</name>
        <t>When an AI agent takes an action, there is currently no protocol-level
mechanism to verify who authorized this agent, what scope of authority it
holds, which principal is accountable for its actions, or whether it is
the agent it claims to be. Accountability gaps, authority laundering,
auditability failure, and multi-agent trust collapse result.</t>
        <t>AGTP response: agent identity and authority scope embedded in protocol
headers on every request, with an optional Agent Certificate extension for
cryptographic verification.</t>
      </section>
      <section anchor="problem-summary">
        <name>Problem Summary</name>
        <table>
          <name>Summary of Problems Addressed by AGTP</name>
          <thead>
            <tr>
              <th align="left">#</th>
              <th align="left">Problem</th>
              <th align="left">Current Failure</th>
              <th align="left">AGTP Response</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">Undifferentiated traffic</td>
              <td align="left">HTTP cannot separate agent traffic</td>
              <td align="left">Dedicated protocol environment</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">Semantic mismatch</td>
              <td align="left">HTTP verbs obscure agent intent</td>
              <td align="left">Native intent-based method vocabulary</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">No protocol-level identity</td>
              <td align="left">Attribution is untraceable</td>
              <td align="left">Agent identity and scope in headers</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="related-work-and-existing-approaches">
      <name>Related Work and Existing Approaches</name>
      <section anchor="httprest-as-the-de-facto-standard">
        <name>HTTP/REST as the De Facto Standard</name>
        <t>HTTP remains the universal transport for all agent traffic currently
deployed. REST conventions layered on HTTP provide a degree of semantic
structure, but REST remains a resource-manipulation paradigm. As described
in Section 1.3, evolving HTTP to address agent-specific needs is
constrained by the frozen method registry, backward-compatibility
requirements, and the impossibility of achieving infrastructure-level
traffic differentiation through HTTP extensions alone.</t>
      </section>
      <section anchor="existing-agent-group-messaging-protocols">
        <name>Existing Agent Group Messaging Protocols</name>
        <dl>
          <dt>MCP <xref target="MCP"/> (Model Context Protocol, Anthropic):</dt>
          <dd>
            <t>Defines structured communication between AI models and tools/resources.
Runs over HTTP. Addresses tool-calling semantics, not agent traffic
transport.</t>
          </dd>
          <dt>ACP <xref target="ACP"/> (Agent Communication Protocol, IBM):</dt>
          <dd>
            <t>Defines messaging semantics for agent-to-agent communication. Runs over
HTTP.</t>
          </dd>
          <dt>A2A <xref target="A2A"/> (Agent-to-Agent Protocol, Linux Foundation):</dt>
          <dd>
            <t>Defines inter-agent communication and task delegation semantics. Runs
over HTTP.</t>
          </dd>
          <dt>ANP <xref target="ANP"/> (Agent Network Protocol):</dt>
          <dd>
            <t>Defines discovery and communication for networked agents. Runs over HTTP.</t>
          </dd>
        </dl>
        <t>All of these are messaging protocols. They define what agents say to each
other. They do not define how agent traffic moves across a network. Each
presupposes HTTP as its transport and inherits all of HTTP's limitations
for agentic systems.</t>
      </section>
      <section anchor="transport-layer-alternatives">
        <name>Transport-Layer Alternatives</name>
        <dl>
          <dt>gRPC:</dt>
          <dd>
            <t>High-performance RPC over HTTP/2. Strong typing and efficient
serialization. Does not address agent-specific semantics, identity, or
authority.</t>
          </dd>
          <dt>WebSockets:</dt>
          <dd>
            <t>Persistent bidirectional connections over HTTP. Useful for real-time
communication but does not address method semantics or identity.</t>
          </dd>
          <dt>QUIC <xref target="RFC9000"/>:</dt>
          <dd>
            <t>Modern multiplexed transport with reduced connection overhead. AGTP
<strong>SHOULD</strong> prefer QUIC for new implementations. QUIC is a transport
primitive; AGTP is the application-layer protocol above it.</t>
          </dd>
        </dl>
      </section>
      <section anchor="the-critical-distinction-messaging-vs-transport">
        <name>The Critical Distinction: Messaging vs. Transport</name>
        <t>The most important positioning principle for AGTP is the distinction between
messaging protocols and transport protocols. MCP, ACP, A2A, and ANP are
messaging protocols, they define what agents say. AGTP defines how agent
traffic moves.</t>
        <t>An analogy: SMTP is a messaging protocol that runs over TCP. SMTP does not
replace TCP. Saying "TCP is unnecessary because SMTP exists" is a category
error. The same logic applies here. MCP and its peers define agent messaging
semantics. AGTP defines the transport environment those messages move through.</t>
      </section>
      <section anchor="agtp-positioning-the-proposed-stack">
        <name>AGTP Positioning: The Proposed Stack</name>
        <figure anchor="protocol-stack">
          <name>AGTP in the Protocol Stack</name>
          <artwork><![CDATA[
+-----------------------------------------------------+
|            Agent Application Logic                  |
+-----------------------------------------------------+
|  Messaging Layer  (MCP / ACP / A2A)  [optional]     |
+-----------------------------------------------------+
|   AGTP - Agent Transfer Protocol     [this spec]    |
+-----------------------------------------------------+
|            TLS 1.3+                  [mandatory]    |
+-----------------------------------------------------+
|         TCP / QUIC / UDP                            |
+-----------------------------------------------------+
]]></artwork>
        </figure>
        <t>AGTP is not a replacement for messaging protocols. Agents using MCP or A2A
route those messages over AGTP and gain transport-level observability and
identity without modifying the messaging layer. AGTP-native agents that do
not use a separate messaging protocol interact with AGTP methods directly.</t>
      </section>
    </section>
    <section anchor="protocol-overview">
      <name>Protocol Overview</name>
      <section anchor="stack-position">
        <name>Stack Position</name>
        <t>AGTP is an application-layer protocol. It operates above the transport
layer (TCP, UDP, or QUIC) and is wrapped by TLS. It sits below any agent
messaging protocol in deployments that use one.</t>
        <ul spacing="normal">
          <li>
            <t><strong>SHOULD</strong> prefer QUIC <xref target="RFC9000"/> <xref target="RFC9001"/> for new deployments (lower latency,
multiplexing without head-of-line blocking, 0-RTT connection
establishment).</t>
          </li>
          <li>
            <t><strong>MUST</strong> support TCP/TLS as a fallback for compatibility with existing
infrastructure.</t>
          </li>
          <li>
            <t><strong>MAY</strong> run over UDP where QUIC is not available, subject to
implementor-defined reliability guarantees.</t>
          </li>
        </ul>
        <t>Suggested port assignment (subject to IANA assignment. See Section 8):</t>
        <ul spacing="normal">
          <li>
            <t>AGTP/QUIC: port 8443 (proposed)</t>
          </li>
          <li>
            <t>AGTP/TCP+TLS: port 8080 (proposed)</t>
          </li>
        </ul>
      </section>
      <section anchor="design-principles">
        <name>Design Principles</name>
        <dl>
          <dt>Minimalist core:</dt>
          <dd>
            <t>The base spec defines only what is necessary for agent traffic
differentiation, method semantics, and identity headers. Extensions
belong in companion specifications.</t>
          </dd>
          <dt>Extensible by design:</dt>
          <dd>
            <t>New methods are registered through an IANA-managed Method Registry.
New header fields follow a defined extension convention. Additive
changes do not require a version increment.</t>
          </dd>
          <dt>Agent-native:</dt>
          <dd>
            <t>Every design decision assumes the initiating party is an AI system,
not a human.</t>
          </dd>
          <dt>Secure by default:</dt>
          <dd>
            <t>TLS 1.3 or higher is mandatory. Unencrypted AGTP connections <strong>MUST</strong>
be rejected. Agent identity headers are present on every request.</t>
          </dd>
          <dt>Observable by design:</dt>
          <dd>
            <t>Native metadata in every AGTP header provides the minimum information
needed for routing, monitoring, and audit without application-layer
instrumentation.</t>
          </dd>
          <dt>Composable:</dt>
          <dd>
            <t>AGTP works alongside existing agent messaging protocols without requiring
modification to those protocols.</t>
          </dd>
        </dl>
      </section>
      <section anchor="connection-model">
        <name>Connection Model</name>
        <t>AGTP uses a persistent session model by default, reflecting the reality that
agents typically execute multi-step workflows rather than isolated single
requests. An AGTP session is established with a single TLS handshake
including agent identity assertion, persists across multiple method
exchanges, carries a Session-ID header identifying the agent's task
context, and terminates on explicit session close or inactivity timeout
(RECOMMENDED minimum: 60 seconds).</t>
        <t>Per-request (stateless) mode is supported for constrained environments.
In stateless mode, agent identity headers <strong>MUST</strong> be present on every
individual request.</t>
      </section>
      <section anchor="header-format">
        <name>Header Format</name>
        <section anchor="request-headers">
          <name>Request Headers</name>
          <table>
            <name>AGTP Request Header Fields</name>
            <thead>
              <tr>
                <th align="left">Field</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">AGTP-Version</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Protocol version. Current: AGTP/1.0</td>
              </tr>
              <tr>
                <td align="left">AGTP-Method</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The agent intent method (see Section 6)</td>
              </tr>
              <tr>
                <td align="left">Agent-ID</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Opaque identifier for the requesting agent instance</td>
              </tr>
              <tr>
                <td align="left">Principal-ID</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Identifier of the human or system that authorized this agent</td>
              </tr>
              <tr>
                <td align="left">Authority-Scope</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Declared scope of actions this agent is authorized to take</td>
              </tr>
              <tr>
                <td align="left">Session-ID</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Identifies the current task/workflow context</td>
              </tr>
              <tr>
                <td align="left">Task-ID</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Unique identifier for this specific method invocation</td>
              </tr>
              <tr>
                <td align="left">Delegation-Chain</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Ordered list of Agent-IDs if this request was delegated</td>
              </tr>
              <tr>
                <td align="left">Priority</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Request priority hint: critical, normal, background</td>
              </tr>
              <tr>
                <td align="left">TTL</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Maximum acceptable response latency in milliseconds</td>
              </tr>
              <tr>
                <td align="left">Budget-Limit</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Max resource budget per invocation. Format: space-separated <tt>unit=value</tt> tokens. Units from IANA AGTP Budget Unit Registry.</td>
              </tr>
              <tr>
                <td align="left">AGTP-Zone-ID</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Network zone boundary constraint. SEPs <strong>MUST</strong> enforce; return 453 if DELEGATE or COLLABORATE would exit declared zone.</td>
              </tr>
              <tr>
                <td align="left">Content-Schema</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">URI reference to JSON Schema describing the request body structure. Enables receivers to validate payload without LLM inference.</td>
              </tr>
              <tr>
                <td align="left">Telemetry-Export</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">OTLP endpoint URI for metric export, or <tt>inline</tt> to receive metrics embedded in the response Attribution-Record.</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="response-headers">
          <name>Response Headers</name>
          <table>
            <name>AGTP Response Header Fields</name>
            <thead>
              <tr>
                <th align="left">Field</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">AGTP-Version</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Protocol version</td>
              </tr>
              <tr>
                <td align="left">AGTP-Status</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Numeric status code (see Section 5.5)</td>
              </tr>
              <tr>
                <td align="left">Task-ID</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Echo of request Task-ID for correlation</td>
              </tr>
              <tr>
                <td align="left">Server-Agent-ID</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Identity of the responding server or agent</td>
              </tr>
              <tr>
                <td align="left">Attribution-Record</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Signed record of the action taken, for audit. <strong>MAY</strong> include RATS attestation evidence and inline telemetry when Telemetry-Export is set to <tt>inline</tt>.</td>
              </tr>
              <tr>
                <td align="left">Continuation-Token</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Token for retrieving additional results in streaming contexts</td>
              </tr>
              <tr>
                <td align="left">Supported-Methods</td>
                <td align="left">
                  <strong>SHOULD</strong> (on session open)</td>
                <td align="left">List of AGTP methods supported by this server</td>
              </tr>
              <tr>
                <td align="left">Cost-Estimate</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Estimated resource consumption in Budget-Limit unit format. Returned by QUOTE; <strong>MAY</strong> appear on any response as an informational signal.</td>
              </tr>
              <tr>
                <td align="left">Attestation-Evidence</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">RATS attestation evidence token or reference URI per <xref target="RFC9334"/>. Format indicated by <tt>attestation_type</tt> in response body: <tt>rats-eat</tt>, <tt>rats-corim</tt>, or <tt>rats-uri</tt>.</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="status-codes">
        <name>Status Codes</name>
        <t>AGTP defines its own status code space. Codes 451, 452, 453, 550, and 551
are AGTP-specific with no HTTP equivalent and are registered in the IANA
AGTP Status Code Registry (see Section 9.3).</t>
        <table>
          <name>AGTP Status Codes</name>
          <thead>
            <tr>
              <th align="left">Code</th>
              <th align="left">Name</th>
              <th align="left">Meaning</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">200</td>
              <td align="left">OK</td>
              <td align="left">Method executed successfully</td>
            </tr>
            <tr>
              <td align="left">202</td>
              <td align="left">Accepted</td>
              <td align="left">Method accepted; execution is asynchronous</td>
            </tr>
            <tr>
              <td align="left">204</td>
              <td align="left">No Content</td>
              <td align="left">Method executed; no response body</td>
            </tr>
            <tr>
              <td align="left">400</td>
              <td align="left">Bad Request</td>
              <td align="left">Malformed AGTP request</td>
            </tr>
            <tr>
              <td align="left">401</td>
              <td align="left">Unauthorized</td>
              <td align="left">Agent-ID not recognized or not authenticated</td>
            </tr>
            <tr>
              <td align="left">403</td>
              <td align="left">Forbidden</td>
              <td align="left">Agent lacks authority for requested action per Authority-Scope</td>
            </tr>
            <tr>
              <td align="left">404</td>
              <td align="left">Not Found</td>
              <td align="left">Target resource or agent not found</td>
            </tr>
            <tr>
              <td align="left">408</td>
              <td align="left">Timeout</td>
              <td align="left">TTL exceeded before method could execute</td>
            </tr>
            <tr>
              <td align="left">409</td>
              <td align="left">Conflict</td>
              <td align="left">Method conflicts with current state (e.g., BOOK on unavailable resource)</td>
            </tr>
            <tr>
              <td align="left">410</td>
              <td align="left">Gone</td>
              <td align="left">Agent has been Revoked or Deprecated; canonical ID is permanently retired</td>
            </tr>
            <tr>
              <td align="left">422</td>
              <td align="left">Unprocessable</td>
              <td align="left">Request well-formed but semantically invalid</td>
            </tr>
            <tr>
              <td align="left">429</td>
              <td align="left">Rate Limited</td>
              <td align="left">Agent is exceeding permitted request frequency</td>
            </tr>
            <tr>
              <td align="left">451</td>
              <td align="left">Scope Violation</td>
              <td align="left">Requested action is outside declared Authority-Scope. AGTP-specific</td>
            </tr>
            <tr>
              <td align="left">452</td>
              <td align="left">Budget Exceeded</td>
              <td align="left">Method execution would exceed the Budget-Limit declared in the request. AGTP-specific</td>
            </tr>
            <tr>
              <td align="left">453</td>
              <td align="left">Zone Violation</td>
              <td align="left">Request would route outside the AGTP-Zone-ID boundary. SEP-enforced. AGTP-specific</td>
            </tr>
            <tr>
              <td align="left">500</td>
              <td align="left">Server Error</td>
              <td align="left">Internal failure in the responding system</td>
            </tr>
            <tr>
              <td align="left">503</td>
              <td align="left">Unavailable</td>
              <td align="left">Responding agent or system temporarily unavailable or Suspended</td>
            </tr>
            <tr>
              <td align="left">550</td>
              <td align="left">Delegation Failure</td>
              <td align="left">A delegated sub-agent failed to complete the requested action. AGTP-specific</td>
            </tr>
            <tr>
              <td align="left">551</td>
              <td align="left">Authority Chain Broken</td>
              <td align="left">Delegation chain contains an unverifiable or broken identity link. AGTP-specific</td>
            </tr>
          </tbody>
        </table>
        <t>Status code 451 (Scope Violation) is a governance signal: the agent
attempted an action outside its declared Authority-Scope, caught at the
protocol level. Status code 452 (Budget Exceeded) is a governance signal
analogous to 451: the agent's requested action is within its Authority-Scope
but would consume resources beyond what the principal authorized for this
invocation. Status code 453 (Zone Violation) is returned by SEPs when a
DELEGATE or COLLABORATE request would route to an agent outside the declared
AGTP-Zone-ID boundary. Status code 551 (Authority Chain Broken) indicates
that one or more Agent-ID entries in the Delegation-Chain header cannot be
verified as part of a valid delegation sequence. Status code 410 (Gone)
is returned when an agent's Birth Certificate has been revoked or the agent
deprecated; the canonical Agent-ID is permanently retired and <strong>MUST NOT</strong>
be retried. All AGTP-specific status codes are operational signals, not
protocol errors, and <strong>MUST</strong> be logged for audit purposes.</t>
      </section>
      <section anchor="wire-format-and-content-type">
        <name>Wire Format and Content-Type</name>
        <t>AGTP request and response bodies are encoded as JSON. The registered
Content-Type for AGTP message bodies is:</t>
        <artwork><![CDATA[
Content-Type: application/agtp+json
]]></artwork>
        <t>Implementations <strong>MUST</strong> include this Content-Type on all AGTP requests and
responses that carry a message body. Responses with no body (e.g., 204 No
Content) <strong>MUST NOT</strong> include a Content-Type header. Binary or streaming
extensions <strong>MAY</strong> define additional Content-Type values as part of their
companion specifications.</t>
        <t>The common structure for all AGTP request bodies:</t>
        <sourcecode type="json"><![CDATA[
{
  "method": "QUERY",
  "task_id": "task-0042",
  "session_id": "sess-a1b2c3d4",
  "parameters": { },
  "context": { }
}
]]></sourcecode>
        <t>And for all AGTP response bodies:</t>
        <sourcecode type="json"><![CDATA[
{
  "status": 200,
  "task_id": "task-0042",
  "result": { },
  "attribution": { }
}
]]></sourcecode>
      </section>
      <section anchor="early-implementations">
        <name>Early Implementations</name>
        <t>AGTP is a proposed specification. No production implementations exist at
the time of this writing. The author encourages early prototype
implementations to validate the protocol design, identify gaps, and
generate feedback prior to IETF working group submission.</t>
        <ul empty="true">
          <li>
            <t>If you are building an AGTP prototype or reference implementation,
please share your findings via the feedback channel listed on the cover
of this document. A reference implementation in Python and/or Go is
planned as open-source software concurrent with or shortly after IETF
I-D submission. Implementation reports are welcome and will be
incorporated into subsequent draft revisions.</t>
          </li>
        </ul>
        <t>Implementers wishing to experiment before the formal IANA port assignment
may use port 8443 (AGTP/QUIC) and port 8080 (AGTP/TCP+TLS) as working
values. These values are subject to change upon final IANA assignment.</t>
        <t>The ACTIVATE method extension, which binds <tt>.nomo</tt> governed agent packages
to AGTP as a first-class activation operation, is described in a companion
document and is implemented as an optional extension. Core AGTP
implementations need not support ACTIVATE to be compliant with this
specification.</t>
      </section>
    </section>
    <section anchor="agent-identity-uri-structure-and-registration">
      <name>Agent Identity, URI Structure, and Registration</name>
      <section anchor="uri-structure-and-resolution-mechanics">
        <name>URI Structure and Resolution Mechanics</name>
        <section anchor="foundational-principle">
          <name>Foundational Principle</name>
          <t>AGTP URIs are addresses, not filenames. File format suffixes
(<tt>.agent</tt>, <tt>.nomo</tt>, <tt>.agtp</tt>) <strong>MUST NOT</strong> appear in canonical
<tt>agtp://</tt> URIs. A URI resolves to an Agent Manifest Document or
Agent Namespace Document derived from the underlying package; it
does not expose or serve the package itself.</t>
          <t>Implementations <strong>MUST</strong> treat any URI containing a file extension
in the path as non-canonical and <strong>SHOULD</strong> issue a 301 Moved
Permanently redirect to the canonical form prior to resolution.</t>
          <t>The Canonical Agent-ID (256-bit cryptographic identifier) remains
the authoritative identifier in all AGTP protocol operations. Human-
readable URIs are aliases that resolve to a canonical identifier. In
the event of any conflict between a human-readable URI and a canonical
Agent-ID, the canonical Agent-ID <strong>MUST</strong> be treated as authoritative.</t>
        </section>
        <section anchor="canonical-uri-forms">
          <name>Canonical URI Forms</name>
          <t>AGTP defines the following canonical URI forms:</t>
          <artwork><![CDATA[
Form 1. Canonical ID (cryptographic):
  agtp://[256-bit-hex-id]

Form 2. Domain-anchored agent (verified identity):
  agtp://[domain.tld]/agents/[agent-label]

Form 3. Subdomain-anchored agent (recommended enterprise pattern):
  agtp://agtp.[domain.tld]/agents/[agent-label]

Form 4. Organization namespace root:
  agtp://[domain.tld]/agents
  agtp://agtp.[domain.tld]/agents
]]></artwork>
          <t>The following URI forms are explicitly invalid and <strong>MUST</strong> return
<tt>400 Bad Request</tt> with error code <tt>invalid-uri-form</tt>:</t>
          <artwork><![CDATA[
agtp://[label].agent          (.agent as hostname TLD - prohibited)
agtp://[label].nomo           (.nomo as hostname TLD - prohibited)
agtp://[domain].[label].agent (hybrid dot-notation - prohibited)
agtp://[domain].[label].nomo  (hybrid dot-notation - prohibited)
]]></artwork>
          <t>Note: <tt>.agent</tt> is claimed as a Web3 top-level domain by at least one
blockchain naming system. URI forms that place <tt>.agent</tt> or <tt>.nomo</tt>
in the hostname position are prohibited both for collision avoidance
with Web3 naming systems and because they imply domain ownership
without enforcing it. See Section 5.6 for Web3 guidance.</t>
        </section>
        <section anchor="non-canonical-forms-and-redirect-behavior">
          <name>Non-Canonical Forms and Redirect Behavior</name>
          <t>The following non-canonical forms <strong>SHOULD</strong> be redirected to their
canonical equivalents. Implementations <strong>MUST NOT</strong> serve package
contents in response to any URI form.</t>
          <table>
            <name>Non-Canonical URI Forms and Redirect Targets</name>
            <thead>
              <tr>
                <th align="left">Received URI</th>
                <th align="left">Canonical Redirect Target</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service.agent</tt></td>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service.nomo</tt></td>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service.agtp</tt></td>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service</tt></td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="query-parameters-for-format-selection">
          <name>Query Parameters for Format Selection</name>
          <t>All AGTP URI resolution requests accept an optional <tt>format</tt> query
parameter controlling the serialization of the returned document.</t>
          <table>
            <name>AGTP URI Format Query Parameters</name>
            <thead>
              <tr>
                <th align="left">Query Parameter</th>
                <th align="left">Returned Representation</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">(none)</td>
                <td align="left">Agent Manifest Document, human-readable <tt>application/agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=manifest</tt></td>
                <td align="left">Agent Manifest Document, human-readable <tt>application/agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=json</tt></td>
                <td align="left">Agent Manifest Document, compact <tt>application/agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=certificate</tt></td>
                <td align="left">Birth certificate fields only, <tt>application/agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=status</tt></td>
                <td align="left">Lifecycle state and operational status only, <tt>application/agtp+json</tt></td>
              </tr>
            </tbody>
          </table>
          <t>All format variants return signed <tt>application/agtp+json</tt> content.
The <tt>?format=json</tt> parameter is intended for programmatic consumers.
The default returns the full human-readable manifest suitable for
browser rendering by an AGTP-aware client.</t>
        </section>
        <section anchor="resolution-mechanics">
          <name>Resolution Mechanics</name>
          <t>When an AGTP server receives a request targeting an agent URI, it
<strong>MUST</strong> perform the following steps in order:</t>
          <ol spacing="normal" type="1"><li>
              <t>Parse and validate the URI. If the URI is an invalid (prohibited)
form, return <tt>400 Bad Request</tt> with error code <tt>invalid-uri-form</tt>.</t>
            </li>
            <li>
              <t>Resolve the agent label to a canonical Agent-ID via the governance
platform's registry lookup. If no matching agent is found, return
<tt>404 Not Found</tt>.</t>
            </li>
            <li>
              <t>Verify the registry record lifecycle state. If the agent is
Suspended, return <tt>503 Service Unavailable</tt> with lifecycle state
in the response body. If the agent is Revoked or Deprecated,
return <tt>410 Gone</tt> with lifecycle state and revocation timestamp.</t>
            </li>
            <li>
              <t>Retrieve the agent's package (<tt>.agent</tt> or <tt>.nomo</tt>) from the
package store.</t>
            </li>
            <li>
              <t><strong>Verify the package integrity hash before proceeding.</strong> If
integrity verification fails, return <tt>500 Internal Error</tt> with
error code <tt>package-integrity-failure</tt>. <strong>MUST</strong> be logged.</t>
            </li>
            <li>
              <t>Extract the embedded manifest from the verified package.</t>
            </li>
            <li>
              <t>Sign the manifest document using the governance platform's signing
key. Return the signed <tt>application/agtp+json</tt> document in the
format specified by the query parameter.</t>
            </li>
          </ol>
          <t>The package's executable content, code, logic, and any fields not
included in the manifest schema <strong>MUST NOT</strong> be returned at any
step. URI resolution exposes identity and status exclusively.</t>
        </section>
        <section anchor="domain-anchor-and-trust-tier-assignment">
          <name>Domain Anchor and Trust Tier Assignment</name>
          <t>The org anchor in a domain-anchored URI (Form 2 or Form 3) <strong>MUST</strong>
be validated at registration time to determine the agent's Trust Tier.</t>
          <dl>
            <dt><strong>Trust Tier 1 - Verified (DNS-anchored):</strong></dt>
            <dd>
              <t>The org domain is validated by DNS challenge at ACTIVATE time per
<xref target="RFC8555"/>. The governance platform <strong>MUST</strong> verify that the
registering party controls the DNS zone for the claimed domain before
issuing a Tier 1 Birth Certificate. Requires a <tt>.nomo</tt> governed
package.
</t>
              <t>Trust Tier 1 agents <strong>MUST</strong> have the following DNS record published
and verifiable at resolution time:</t>
              <artwork><![CDATA[
_agtp.[domain.tld]. IN TXT "agtp-zone=[zone-id]; cert=[fp]"
]]></artwork>
            </dd>
            <dt><strong>Trust Tier 2 - Org-Asserted:</strong></dt>
            <dd>
              <t>The org label is present in the URI but DNS ownership has not been
verified. An <tt>.agent</tt> package is acceptable. The Agent Manifest
Document for Tier 2 agents <strong>MUST</strong> include a prominent
<tt>trust_tier: 2</tt> field and a <tt>trust_warning</tt> field with value
<tt>"org-label-unverified"</tt>. AGTP-aware browsers and clients <strong>MUST</strong>
surface a visible trust indicator distinguishing Tier 2 from Tier 1.
</t>
              <t>Tier 2 agents <strong>MUST NOT</strong> be granted authority scopes above
<tt>documents:query</tt> and <tt>knowledge:query</tt> without AGTP-CERT
cryptographic identity binding.</t>
            </dd>
            <dt><strong>Trust Tier 3 - Experimental:</strong></dt>
            <dd>
              <t>Agent label uses the <tt>X-</tt> prefix. Not discoverable through the
public AGTP registry. For development and testing only.
Implementations <strong>MUST NOT</strong> deploy Tier 3 agents in production.</t>
            </dd>
          </dl>
        </section>
        <section anchor="subdomain-deployment-pattern">
          <name>Subdomain Deployment Pattern</name>
          <t>Organizations <strong>SHOULD</strong> deploy AGTP endpoints at a dedicated
subdomain following the pattern <tt>agtp.[organization-domain.tld]</tt>
(e.g., <tt>agtp.acme.tld</tt>). This is the recommended enterprise
deployment pattern: it provides clean separation between web and
agent infrastructure, allows independent certificate management for
the AGTP endpoint, and is consistent with service-specific subdomain
conventions. An organization with an AGTP subdomain <strong>SHOULD</strong> also
configure their primary domain to redirect AGTP requests:</t>
          <artwork><![CDATA[
agtp://acme.tld/agents/customer-service
  → 301 → agtp://agtp.acme.tld/agents/customer-service
]]></artwork>
        </section>
        <section anchor="the-agents-reserved-path-prefix">
          <name>The /agents/ Reserved Path Prefix</name>
          <t>The path prefix <tt>/agents/</tt> is reserved in all <tt>agtp://</tt> URIs for
agent namespace operations. Implementations <strong>MUST</strong> support this
prefix. The registry root at <tt>/agents</tt> (no trailing label) resolves
to the Agent Namespace Document (see Section 5.4).</t>
        </section>
        <section anchor="collision-prevention">
          <name>Collision Prevention</name>
          <t><tt>agtp://acme.tld/agents/customer-service</tt> and
<tt>agtp://chrishood.tld/agents/customer-service</tt> are distinct and
non-colliding because the domain component is the trust root.
No two agents can share a canonical URI if their org domains differ.
Within a single org domain, the governance platform enforces
uniqueness of agent labels at registration time. Infrastructure
<strong>MUST</strong> use the canonical Agent-ID for all routing, logging, and
attribution operations. Human-readable URIs are a display and
discovery layer only.</t>
        </section>
        <section anchor="iana-considerations-for-the-agtp-uri-scheme">
          <name>IANA Considerations for the agtp:// URI Scheme</name>
          <t>This document proposes registration of the <tt>agtp://</tt> URI scheme with
IANA per <xref target="RFC7595"/>. Registration template:</t>
          <dl>
            <dt>URI scheme name:</dt>
            <dd>
              <t>agtp</t>
            </dd>
            <dt>Status:</dt>
            <dd>
              <t>Permanent</t>
            </dd>
            <dt>URI scheme syntax:</dt>
            <dd>
              <t><tt>agtp://[canonical-agent-id]</tt> or <tt>agtp://[domain.tld]/agents/[label]</tt></t>
            </dd>
            <dt>URI scheme semantics:</dt>
            <dd>
              <t>Identifies an AI agent or agent namespace operating over the Agent
Transfer Protocol. The canonical form uses a 256-bit hex-encoded
cryptographic identifier derived from the agent's Birth Certificate.
The domain-anchored form uses a verified or asserted organization
domain with a reserved <tt>/agents/</tt> path prefix.</t>
            </dd>
            <dt>Applications/protocols that use this URI scheme:</dt>
            <dd>
              <t>Agent Transfer Protocol (this document)</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>Domain-anchored URIs are the recommended human-readable form.
Implementations <strong>MUST</strong> accept canonical identifiers and <strong>SHOULD</strong>
support domain-anchored resolution. File extensions <strong>MUST NOT</strong>
appear in <tt>agtp://</tt> URIs.</t>
            </dd>
            <dt>Contact:</dt>
            <dd>
              <t>Chris Hood, chris@nomotic.ai</t>
            </dd>
            <dt>References:</dt>
            <dd>
              <t>This document</t>
            </dd>
          </dl>
          <t>The <tt>agtp://</tt> URI scheme registration is open and unencumbered. No
intellectual property claims apply to the URI scheme itself.</t>
        </section>
      </section>
      <section anchor="trust-tier-summary">
        <name>Trust Tier Summary</name>
        <table>
          <name>AGTP Trust Tier Summary</name>
          <thead>
            <tr>
              <th align="left">Trust Tier</th>
              <th align="left">Verification</th>
              <th align="left">Package Required</th>
              <th align="left">DNS Record Required</th>
              <th align="left">Registry Visible</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1 - Verified</td>
              <td align="left">DNS challenge per <xref target="RFC8555"/></td>
              <td align="left">
                <tt>.nomo</tt></td>
              <td align="left">Yes (<tt>_agtp</tt> TXT)</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">2 - Org-Asserted</td>
              <td align="left">None</td>
              <td align="left">
                <tt>.agent</tt> or <tt>.nomo</tt></td>
              <td align="left">No</td>
              <td align="left">Yes (with warning)</td>
            </tr>
            <tr>
              <td align="left">3 - Experimental</td>
              <td align="left">None</td>
              <td align="left">Any</td>
              <td align="left">No</td>
              <td align="left">No</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="agent-namespace-document">
        <name>Agent Namespace Document</name>
        <section anchor="purpose-and-scope">
          <name>Purpose and Scope</name>
          <t>The Agent Namespace Document is the index of all Active agents
registered under an organization's governance zone. It is returned
in response to a request targeting the <tt>/agents</tt> path:</t>
          <artwork><![CDATA[
agtp://acme.tld/agents
agtp://agtp.acme.tld/agents
]]></artwork>
          <t>The Agent Namespace Document is not a manually editable file. It is
generated and cryptographically signed by the governance platform each
time the registry changes. Any Namespace Document that fails signature
verification <strong>MUST</strong> be rejected by the requesting party.</t>
        </section>
        <section anchor="document-schema">
          <name>Document Schema</name>
          <figure>
            <name>Agent Namespace Document Schema</name>
            <sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-namespace",
  "schema_version": "1.0",
  "org_domain": "acme.tld",
  "governance_zone": "zone:acme-internal",
  "generated_at": "2026-03-20T14:00:00Z",
  "signature": {
    "algorithm": "ES256",
    "key_id": "agtp-gov-key-acme-01",
    "value": "[base64-encoded-signature]"
  },
  "agents": [
    {
      "agent_label": "customer-service",
      "canonical_id": "3a9f2c1d8b7e4a6f...",
      "lifecycle_state": "Active",
      "trust_tier": 1,
      "cert_status": "Active",
      "manifest_uri": "agtp://agtp.acme.tld/agents/customer-service",
      "activated_at": "2026-01-15T09:00:00Z",
      "last_updated": "2026-03-01T11:30:00Z"
    }
  ],
  "total_active": 1,
  "namespace_cert_fingerprint": "b2c4d6e8..."
}
]]></sourcecode>
          </figure>
          <t>The <tt>agents</tt> array <strong>MUST</strong> include only agents in Active lifecycle
state. Suspended, Revoked, and Deprecated agents <strong>MUST NOT</strong> appear
in the Namespace Document.</t>
        </section>
        <section anchor="integrity-and-freshness">
          <name>Integrity and Freshness</name>
          <t>The Namespace Document <strong>MUST</strong> include a <tt>generated_at</tt> timestamp.
Implementations <strong>SHOULD</strong> treat Namespace Documents older than a
configurable freshness threshold (default: 300 seconds) as stale and
re-request. The governance platform <strong>MUST</strong> re-sign the Namespace
Document within 60 seconds of any registry change.</t>
          <t>The signature covers the entire document including <tt>generated_at</tt>.
Replaying an older signed Namespace Document to conceal a revocation
event is a known attack vector; implementations <strong>MUST</strong> reject
Namespace Documents with a <tt>generated_at</tt> timestamp older than the
freshness threshold.</t>
        </section>
      </section>
      <section anchor="agent-manifest-document-and-the-agtp-format">
        <name>Agent Manifest Document and the .agtp Format</name>
        <section anchor="purpose-and-scope-1">
          <name>Purpose and Scope</name>
          <t>The Agent Manifest Document is the protocol's canonical representation
of a specific agent's identity, status, and behavioral scope. It is
returned in response to any AGTP URI resolution request targeting a
specific agent:</t>
          <artwork><![CDATA[
agtp://acme.tld/agents/customer-service
agtp://acme.tld/agents/customer-service?format=json
agtp://acme.tld/agents/customer-service?format=manifest
]]></artwork>
          <t>The manifest is derived from the embedded manifest inside the agent's
<tt>.agent</tt> or <tt>.nomo</tt> package. It is not a separate file that can be
independently modified. The governance platform <strong>MUST</strong> verify the
package integrity hash before extracting and serving the manifest.</t>
        </section>
        <section anchor="the-three-document-formats-and-their-relationship">
          <name>The Three Document Formats and Their Relationship</name>
          <figure anchor="format-relationship">
            <name>Relationship Between AGTP File Formats</name>
            <artwork><![CDATA[
.agent   ──── open packaging format (patent pending, Chris Hood)
  │           Contains: manifest + integrity hash + behavioral
  │           trust score + executable content
  │
.nomo    ──── governed packaging format (patent pending, Chris Hood)
  │           Contains: .agent contents + CA-signed cert chain
  │           + governance zone binding
  │
  Both produce ↓ when queried via agtp:// URI
  │
.agtp    ──── wire-level manifest document (this spec)
              Contains: identity fields from manifest +
              lifecycle state + trust tier + behavioral scope
              Open format defined by AGTP specification
              Content-Type: application/agtp+json
]]></artwork>
          </figure>
          <t>The <tt>.agtp</tt> format is the protocol's own document type. It is what
gets transmitted over the wire. The <tt>.agent</tt> and <tt>.nomo</tt> formats are
what get deployed. An AGTP implementation is not required to understand
<tt>.agent</tt> or <tt>.nomo</tt> packaging internals; it is only required to
produce and consume <tt>.agtp</tt> manifest documents.</t>
          <t>Additional packaging formats <strong>MAY</strong> be defined by third parties,
provided they can produce conformant <tt>.agtp</tt> manifest documents when
queried. Such formats <strong>MUST</strong> implement the integrity verification
requirement: the manifest <strong>MUST</strong> be derived from a verified package,
not from an independently stored or editable file.</t>
        </section>
        <section anchor="agent-manifest-document-schema">
          <name>Agent Manifest Document Schema</name>
          <t>The following fields are <strong>REQUIRED</strong> in all Agent Manifest Documents:</t>
          <figure>
            <name>Agent Manifest Document - Required Fields</name>
            <sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-manifest",
  "schema_version": "1.0",
  "manifest_uri": "agtp://agtp.acme.tld/agents/customer-service",
  "canonical_id": "3a9f2c1d8b7e4a6f0c2d5e9b1a3f7c0d...",
  "agent_label": "customer-service",
  "org_domain": "acme.tld",
  "governance_zone": "zone:acme-internal",
  "trust_tier": 1,
  "package_format": "nomo",
  "package_integrity_hash": "sha256:[hash]",
  "lifecycle_state": "Active",
  "cert_status": "Active",
  "principal_org": "Acme Corporation",
  "activated_at": "2026-01-15T09:00:00Z",
  "behavioral_trust_score": 0.94,
  "authority_scope_categories": [
    "documents:query",
    "knowledge:query",
    "calendar:book",
    "escalation:route"
  ],
  "supported_methods": [
    "QUERY", "SUMMARIZE", "BOOK", "SCHEDULE",
    "ESCALATE", "NOTIFY", "CONFIRM"
  ],
  "job_description": "Handles customer service requests.",
  "signature": {
    "algorithm": "ES256",
    "key_id": "agtp-gov-key-acme-01",
    "value": "[base64-encoded-signature]"
  }
}
]]></sourcecode>
          </figure>
          <t>The following fields are <strong>RECOMMENDED</strong>:</t>
          <figure>
            <name>Agent Manifest Document - Recommended Fields</name>
            <sourcecode type="json"><![CDATA[
{
  "version": "2.1.0",
  "last_updated": "2026-03-01T11:30:00Z",
  "escalation_policy": "route-to-human-on-scope-limit",
  "delegation_permitted": false,
  "max_delegation_depth": 0,
  "audit_log_uri": "agtp://agtp.acme.tld/audit/customer-service",
  "dns_anchor_record": "_agtp.acme.tld TXT agtp-zone=...",
  "cert_fingerprint": "b2c4d6e8..."
}
]]></sourcecode>
          </figure>
          <t>The following fields are <strong>REQUIRED</strong> when <tt>trust_tier</tt> is <tt>2</tt>:</t>
          <figure>
            <name>Agent Manifest Document - Required Fields for Trust Tier 2</name>
            <sourcecode type="json"><![CDATA[
{
  "trust_warning": "org-label-unverified",
  "trust_tier_explanation": "Org label not DNS-verified."
}
]]></sourcecode>
          </figure>
        </section>
        <section anchor="what-the-manifest-exposes-and-does-not-expose">
          <name>What the Manifest Exposes and Does Not Expose</name>
          <t>The Agent Manifest Document <strong>MUST</strong> expose:</t>
          <ul spacing="normal">
            <li>
              <t>The agent's identity (canonical ID, label, org, governance zone)</t>
            </li>
            <li>
              <t>The agent's current operational status (lifecycle state)</t>
            </li>
            <li>
              <t>The agent's authority scope categories</t>
            </li>
            <li>
              <t>The agent's supported method vocabulary</t>
            </li>
            <li>
              <t>The agent's behavioral trust score</t>
            </li>
            <li>
              <t>The agent's birth certificate fields (activated_at, principal_org)</t>
            </li>
            <li>
              <t>The agent's trust tier and any associated trust warnings</t>
            </li>
          </ul>
          <t>The Agent Manifest Document <strong>MUST NOT</strong> expose:</t>
          <ul spacing="normal">
            <li>
              <t>Executable code, scripts, or logic</t>
            </li>
            <li>
              <t>Model weights or configurations</t>
            </li>
            <li>
              <t>Internal API keys or credentials</t>
            </li>
            <li>
              <t>Specific authority scope grant tokens</t>
            </li>
            <li>
              <t>Session history or prior action logs</t>
            </li>
          </ul>
          <t>No AGTP URI resolution path, including any query parameter
combination, <strong>MUST</strong> return package contents beyond the manifest
schema defined in this section.</t>
        </section>
        <section anchor="manifest-tamper-proofing">
          <name>Manifest Tamper-Proofing</name>
          <t>The tamper-proof guarantee rests on two mechanisms:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>Package integrity hash:</strong> Any modification to the package or its
embedded manifest invalidates the hash. The governance platform
<strong>MUST</strong> verify this hash before extracting the manifest.</t>
            </li>
            <li>
              <t><strong>Document signature:</strong> The governance platform signs the extracted
manifest before serving it. The signature covers the full document
including the <tt>package_integrity_hash</tt> field, creating a verifiable
chain from the served document back to the registered package.</t>
            </li>
          </ol>
          <t>A manifest document that fails either verification step <strong>MUST</strong> be
rejected, <strong>MUST NOT</strong> be served, and the failure <strong>MUST</strong> be logged.</t>
        </section>
      </section>
      <section anchor="browser-and-human-facing-interaction-model">
        <name>Browser and Human-Facing Interaction Model</name>
        <section anchor="the-separation-of-discovery-and-execution">
          <name>The Separation of Discovery and Execution</name>
          <figure anchor="browser-separation">
            <name>AGTP URI Use by Audience</name>
            <artwork><![CDATA[
agtp:// URI in a browser
  │
  └─→ Returns Agent Manifest Document
        Human-readable view of identity and status
        Read-only. No execution. No code exposed.

agtp:// session initiated by an agent or AGTP client
  │
  └─→ Establishes authenticated AGTP session
        Method invocations (QUERY, BOOK, ESCALATE, etc.)
        Full protocol operation - not visible to browsers
]]></artwork>
          </figure>
          <t>The analogy to existing protocol conventions is direct. A <tt>mailto:</tt>
URI surfaces an address and hands off to a mail client; SMTP carries
the actual messages. Similarly, an <tt>agtp://</tt> URI surfaces identity
and status; AGTP carries agent traffic. Browsers do not become AGTP
clients by following an <tt>agtp://</tt> link.</t>
        </section>
        <section anchor="browser-behavior-for-agtp-uris">
          <name>Browser Behavior for agtp:// URIs</name>
          <t>Browsers that encounter an <tt>agtp://</tt> URI <strong>SHOULD</strong> behave as follows:</t>
          <ol spacing="normal" type="1"><li>
              <t>If a registered AGTP client is present (OS protocol handler), hand
off the URI to that client.</t>
            </li>
            <li>
              <t>If the browser supports <tt>agtp://</tt> natively or via extension, render
the returned Agent Manifest Document as a structured human-readable
page. The rendered view <strong>MUST</strong> surface the trust tier indicator
prominently, following the visual convention established for TLS
trust in the browser chrome.</t>
            </li>
            <li>
              <t>If neither condition applies, the browser <strong>MAY</strong> fall back to a
gateway that translates between <tt>https://</tt> and <tt>agtp://</tt>. The
gateway <strong>MUST</strong> preserve all signature and trust tier fields.</t>
            </li>
          </ol>
        </section>
        <section anchor="human-readable-manifest-view">
          <name>Human-Readable Manifest View</name>
          <t>When an Agent Manifest Document is rendered for human consumption,
the following fields <strong>MUST</strong> be prominently displayed:</t>
          <ul spacing="normal">
            <li>
              <t>Agent label and org domain</t>
            </li>
            <li>
              <t>Trust tier indicator (visual distinction between Tier 1, 2, and 3)</t>
            </li>
            <li>
              <t>Lifecycle state (Active / Suspended / Revoked / Deprecated)</t>
            </li>
            <li>
              <t>Job description</t>
            </li>
            <li>
              <t>Principal organization</t>
            </li>
            <li>
              <t>Activation date</t>
            </li>
            <li>
              <t>Behavioral trust score</t>
            </li>
            <li>
              <t>Authority scope categories (in human-readable form)</t>
            </li>
          </ul>
        </section>
        <section anchor="agtp-status-sub-resource">
          <name>AGTP Status Sub-Resource</name>
          <t>Implementations <strong>SHOULD</strong> support a <tt>status</tt> sub-path:</t>
          <artwork><![CDATA[
agtp://acme.tld/agents/customer-service/status
]]></artwork>
          <figure>
            <name>AGTP Status Sub-Resource Response</name>
            <sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-status",
  "canonical_id": "3a9f2c1d8b7e4a6f...",
  "agent_label": "customer-service",
  "org_domain": "acme.tld",
  "lifecycle_state": "Active",
  "cert_status": "Active",
  "last_action_method": "QUERY",
  "last_action_timestamp": "2026-03-20T13:58:22Z",
  "active_session_count": 3,
  "pending_escalations": 0,
  "generated_at": "2026-03-20T14:00:00Z"
}
]]></sourcecode>
          </figure>
          <t>The <tt>active_session_count</tt> field <strong>SHOULD</strong> only be included if the
requester has appropriate observability permissions for the governance
zone.</t>
        </section>
      </section>
      <section anchor="web3-interaction-considerations">
        <name>Web3 Interaction Considerations</name>
        <section anchor="the-agent-tld-collision">
          <name>The .agent TLD Collision</name>
          <t>The string <tt>.agent</tt> is claimed as a Web3 top-level domain by at least
one blockchain-based naming system. This creates an ambiguity risk:
a URI of the form <tt>agtp://customer-service.agent</tt> could be interpreted
as either an AGTP agent namespace or a Web3 name resolution request.
This specification explicitly prohibits <tt>.agent</tt> and <tt>.nomo</tt> from
appearing in the hostname position of <tt>agtp://</tt> URIs (see Section 5.1).</t>
        </section>
        <section anchor="web3-trust-anchors">
          <name>Web3 Trust Anchors</name>
          <t>AGTP's default trust model is PKI-based: X.509 certificates, DNS
ownership verification, and CA-anchored identity. Web3 naming systems
provide an alternative identity model based on blockchain address
ownership. A full Web3 interoperability specification is out of scope
for this document. The following framework <strong>MAY</strong> be used by
implementations wishing to bridge Web3 and AGTP identity.</t>
          <t>The <tt>resolution_layer</tt> field in the Agent Manifest Document declares
the identity anchoring mechanism used for the agent's registration:</t>
          <table>
            <name>resolution_layer Field Values</name>
            <thead>
              <tr>
                <th align="left">Value</th>
                <th align="left">Meaning</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>dns</tt></td>
                <td align="left">Standard DNS ownership verification (default)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>pki</tt></td>
                <td align="left">PKI certificate chain without DNS challenge</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>web3-ens</tt></td>
                <td align="left">Ethereum Name Service</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>web3-unstoppable</tt></td>
                <td align="left">Unstoppable Domains</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>agtp-registry</tt></td>
                <td align="left">Direct registration with AGTP governance platform</td>
              </tr>
            </tbody>
          </table>
          <t>Implementations that encounter a <tt>resolution_layer</tt> value of
<tt>web3-ens</tt> or <tt>web3-unstoppable</tt> <strong>MUST</strong> treat the agent as Trust
Tier 2 (Org-Asserted) unless a formal AGTP-Web3 Bridge specification
has been published and implemented. Full Web3 interoperability is
addressed in a future companion document <xref target="AGTP-WEB3"/>.</t>
        </section>
      </section>
      <section anchor="agent-registration-process">
        <name>Agent Registration Process</name>
        <section anchor="overview">
          <name>Overview</name>
          <t>An agent cannot participate in AGTP until it has been issued an Agent
Birth Certificate by a governance platform and assigned a canonical
Agent-ID derived from that certificate. Canonical Agent-IDs are issued
through the ACTIVATE transaction; they are never self-declared.</t>
          <t>The Birth Certificate is the genesis record of an agent's legal
existence within the AGTP ecosystem. Its relationship to the canonical
Agent-ID is analogous to the relationship between a government-issued
birth registration and a social security number: the birth event
produces a permanent, authoritative identity record, and a durable
identifier is derived from it. The identifier follows the agent for
its entire lifecycle, including after revocation. It is never reissued
to another agent.</t>
          <t>Any AGTP infrastructure component <strong>MUST</strong> reject requests carrying
an Agent-ID that does not resolve to a Birth Certificate record in
an Active lifecycle state in a reachable registry.</t>
        </section>
        <section anchor="birth-certificate-contents">
          <name>Birth Certificate Contents</name>
          <t>The Agent Birth Certificate is issued by the governance platform at
ACTIVATE time and contains the following fields:</t>
          <table>
            <name>Agent Birth Certificate Fields</name>
            <thead>
              <tr>
                <th align="left">Field</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>agent_id</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Unique identifier for the agent</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>owner</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Human or team responsible for this agent</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>archetype</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Behavioral category (see archetypes below)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>governance_zone</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Environment context (development, staging, production)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>scope</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Authorized action types</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>issued_at</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Timestamp of issuance</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>certificate_hash</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Cryptographic fingerprint - basis for canonical Agent-ID</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>signature</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Signed with the org's governance key</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>package_ref</tt></td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Reference to the <tt>.agent</tt> or <tt>.nomo</tt> package</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>trust_tier</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Registration tier (1, 2, or 3)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>org_domain</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The verified or asserted org domain</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="agent-archetypes">
          <name>Agent Archetypes</name>
          <t>The <tt>archetype</tt> field classifies the agent's behavioral category.
Archetypes inform scope enforcement and observability tooling; an
<tt>executor</tt> archetype agent exhibiting read-only query patterns, or a
<tt>monitor</tt> archetype agent attempting booking operations, are anomaly
signals. The archetype field does not restrict scope enforcement, 
Authority-Scope headers govern actual permissions at the protocol
level. Archetypes are a classification and observability signal,
not a security boundary.</t>
          <table>
            <name>Agent Archetypes</name>
            <thead>
              <tr>
                <th align="left">Archetype</th>
                <th align="left">Description</th>
                <th align="left">Typical Scope</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>assistant</tt></td>
                <td align="left">Conversational agent, read-heavy</td>
                <td align="left">
                  <tt>documents:query</tt>, <tt>knowledge:query</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>analyst</tt></td>
                <td align="left">Data analysis, read and aggregate</td>
                <td align="left">
                  <tt>data:read</tt>, <tt>data:aggregate</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>executor</tt></td>
                <td align="left">Takes real-world actions, write-heavy</td>
                <td align="left">
                  <tt>booking:*</tt>, <tt>payments:confirm</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>orchestrator</tt></td>
                <td align="left">Manages other agents</td>
                <td align="left">
                  <tt>delegation:*</tt>, <tt>agents:*</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>monitor</tt></td>
                <td align="left">Observational only</td>
                <td align="left">
                  <tt>telemetry:read</tt>, <tt>logs:read</tt></td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="birth-certificate-to-agtp-header-mapping">
          <name>Birth Certificate to AGTP Header Mapping</name>
          <t>Birth Certificate fields map directly to AGTP protocol headers on
every request. This mapping is the mechanism by which static identity
(the Birth Certificate) becomes runtime identity (the protocol session):</t>
          <table>
            <name>Birth Certificate to AGTP Header Mapping</name>
            <thead>
              <tr>
                <th align="left">Birth Certificate Field</th>
                <th align="left">AGTP Protocol Header</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>agent_id</tt></td>
                <td align="left">
                  <tt>Agent-ID</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>owner</tt></td>
                <td align="left">
                  <tt>Principal-ID</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>scope</tt></td>
                <td align="left">
                  <tt>Authority-Scope</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>certificate_hash</tt></td>
                <td align="left">Basis for canonical Agent-ID</td>
              </tr>
            </tbody>
          </table>
          <t>The canonical Agent-ID is derived from the <tt>certificate_hash</tt>. This
chain, package integrity hash → certificate hash → canonical Agent-ID, 
ensures that the identifier carried in the <tt>Agent-ID</tt> header on
every AGTP request is traceable back to the original Birth Certificate
and the human principal who authorized the agent's creation.</t>
        </section>
        <section anchor="registration-tiers">
          <name>Registration Tiers</name>
          <t><strong>Tier 1 Registration (Verified, DNS-anchored):</strong></t>
          <t>Required for agents carrying <tt>Authority-Scope</tt> beyond read-only query
operations, or participating in delegation chains, financial
transactions, or multi-agent collaboration with external organizations.</t>
          <dl>
            <dt>Requirements:</dt>
            <dd>
              <ul spacing="normal">
                <li>
                  <t>Registrant demonstrates DNS control over the claimed <tt>org_domain</tt>
via DNS challenge per <xref target="RFC8555"/></t>
                </li>
                <li>
                  <t>Agent package must be in <tt>.nomo</tt> governed format</t>
                </li>
                <li>
                  <t>Package must include a valid CA-signed certificate chain</t>
                </li>
                <li>
                  <t>Governance platform issues Birth Certificate and canonical
Agent-ID after verifying DNS challenge and validating the
package cert chain</t>
                </li>
              </ul>
            </dd>
          </dl>
          <t><strong>Tier 2 Registration (Org-Asserted):</strong></t>
          <t>For agents operating within a single organization's internal
infrastructure, or where DNS verification is not yet completed.</t>
          <dl>
            <dt>Requirements:</dt>
            <dd>
              <ul spacing="normal">
                <li>
                  <t>Org label is declared but DNS ownership is not verified</t>
                </li>
                <li>
                  <t>Agent package may be <tt>.agent</tt> or <tt>.nomo</tt> format</t>
                </li>
                <li>
                  <t>Governance platform issues Birth Certificate after validating
package integrity hash</t>
                </li>
                <li>
                  <t>Birth Certificate and Manifest <strong>MUST</strong> include <tt>trust_tier: 2</tt>
and <tt>trust_warning: "org-label-unverified"</tt></t>
                </li>
                <li>
                  <t>Authority scope <strong>MUST</strong> be restricted at the SEP layer until
upgraded to Tier 1</t>
                </li>
              </ul>
            </dd>
          </dl>
          <t><strong>Tier 3 Registration (Experimental):</strong></t>
          <t>For development and testing environments only.</t>
          <dl>
            <dt>Requirements:</dt>
            <dd>
              <ul spacing="normal">
                <li>
                  <t>Agent label <strong>MUST</strong> carry <tt>X-</tt> prefix</t>
                </li>
                <li>
                  <t>Not published to the public AGTP registry</t>
                </li>
                <li>
                  <t><strong>MUST NOT</strong> be deployed in production environments</t>
                </li>
                <li>
                  <t>Governance platform issues a locally-scoped Birth Certificate</t>
                </li>
              </ul>
            </dd>
          </dl>
        </section>
        <section anchor="registration-lifecycle">
          <name>Registration Lifecycle</name>
          <figure anchor="agent-reg-lifecycle">
            <name>AGTP Agent Registration Lifecycle</name>
            <artwork><![CDATA[
1. PACKAGE
   Author creates .agent or .nomo package containing:
   - Embedded manifest (agent_label, job_description,
     authority_scope_categories, supported_methods,
     behavioral_trust_score)
   - Integrity hash of all package contents
   - For .nomo: CA-signed certificate chain

2. SUBMIT (ACTIVATE transaction)
   Registrant submits ACTIVATE request to governance endpoint:
   - Package file (.agent or .nomo)
   - Proposed agent label and org domain
   - Owner identity (maps to Birth Certificate owner field)
   - Archetype declaration
   - For Tier 1: DNS challenge token

3. VALIDATE (governance platform)
   Governance platform:
   - Verifies package integrity hash
   - For .nomo: validates certificate chain
   - For Tier 1: verifies DNS challenge against
     _agtp.[org_domain] TXT record
   - Checks proposed label for uniqueness within org namespace

4. ISSUE (Birth Certificate and canonical Agent-ID assigned)
   Governance platform:
   - Issues Agent Birth Certificate with all fields populated
   - Derives canonical Agent-ID from certificate_hash
   - Creates registry record with Active lifecycle state
   - Records genesis audit entry in immutable audit log
     (genesis record includes full Birth Certificate)
   - Publishes agent to Namespace Document
     (triggers Namespace Document re-signing)

   The Birth Certificate is delivered to the registrant.
   It is the permanent record of the agent's genesis.
   Loss of the Birth Certificate does not invalidate the agent;
   the certificate_hash remains the authoritative identity anchor.

5. ACTIVE
   Agent enters Active lifecycle state.
   Canonical Agent-ID is valid for AGTP protocol sessions.
   agtp://[org_domain]/agents/[label] resolves to manifest
   derived from the Birth Certificate.

6. LIFECYCLE EVENTS (post-activation)
   SUSPEND:    Agent temporarily inactive. Manifest returns 503.
               Birth Certificate and canonical ID remain valid.
               Initiated by trust violation or human decision.
   REINSTATE:  Human-authorized return to Active state.
               Birth Certificate unchanged. Reinstatement
               recorded in audit trail.
   REVOKE:     Agent permanently deactivated. Manifest returns 410.
               Birth Certificate archived. Canonical ID retired
               permanently and never reissued.
   DEPRECATE:  Controlled end-of-life. Manifest returns 410 with
               successor_agent field if applicable. Birth
               Certificate retained per Section 8.5 retention policy.
]]></artwork>
          </figure>
        </section>
        <section anchor="governance-tokens-and-runtime-authorization">
          <name>Governance Tokens and Runtime Authorization</name>
          <t>Following successful registration, the agent's Birth Certificate is
the static identity anchor. Runtime authorization for specific actions
is carried by Governance Tokens: signed, time-limited JWT artifacts
issued by the governance platform encoding a specific governance
verdict (ALLOW, DENY) for a specific action.</t>
          <t>Governance Tokens <strong>MUST NOT</strong> be reused. Each action requires a
fresh evaluation and a fresh token. Default TTL is 30 seconds. The
token's <tt>agent_id</tt> field <strong>MUST</strong> match the canonical Agent-ID from
the Birth Certificate. Tokens that fail this validation <strong>MUST</strong> be
rejected and the failure <strong>MUST</strong> be logged.</t>
          <t>The relationship between Birth Certificate and Governance Token
parallels the relationship between a passport and a visa: the passport
establishes persistent identity; the visa encodes a specific
time-bounded permission. Holding a passport does not imply holding
any particular visa.</t>
        </section>
        <section anchor="friendly-name-availability-and-re-registration">
          <name>Friendly Name Availability and Re-Registration</name>
          <t>An agent label becomes available for re-registration 90 days after
its associated agent enters Revoked or Deprecated lifecycle state.
The canonical Agent-ID and Birth Certificate are permanently archived.
The canonical Agent-ID <strong>MUST NOT</strong> be reissued under any
circumstances, including re-registration of the same label by the same
organization. This policy prevents ID reuse attacks in which a newly
registered agent inherits the trust history of a revoked predecessor.</t>
        </section>
      </section>
    </section>
    <section anchor="method-definitions">
      <name>Method Definitions</name>
      <section anchor="design-philosophy">
        <name>Design Philosophy</name>
        <t>AGTP methods are intent verbs, not resource operations. Each method
expresses what an agent is trying to accomplish. Method names are
uppercase ASCII strings. Methods that modify state are NOT idempotent
by default unless explicitly marked. All methods accept a context
parameter carrying agent session state. Requirement language follows
<xref target="RFC2119"/>.</t>
      </section>
      <section anchor="core-methods">
        <name>Core Methods</name>
        <section anchor="query">
          <name>QUERY</name>
          <t>Purpose: Semantic data retrieval. The agent specifies what it needs to
know, not where to find it. Distinguished from HTTP GET by expressing an
information need rather than retrieving a known resource at a known
location.</t>
          <table>
            <name>QUERY Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">intent</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Natural language or structured expression of the information need</td>
              </tr>
              <tr>
                <td align="left">scope</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Data domains or sources to include or exclude</td>
              </tr>
              <tr>
                <td align="left">format</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Desired response format: structured, natural, raw</td>
              </tr>
              <tr>
                <td align="left">confidence_threshold</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Minimum confidence score for included results (0.0-1.0)</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Session context for disambiguation</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Result set with confidence scores per item. Server <strong>SHOULD</strong>
indicate provenance of each result. Idempotent: Yes.</t>
        </section>
        <section anchor="summarize">
          <name>SUMMARIZE</name>
          <t>Purpose: Request a concise synthesis of provided content or a referenced
resource. The agent is requesting a cognitive operation on data, not
retrieving data.</t>
          <table>
            <name>SUMMARIZE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">source</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Content inline (up to implementation limit) or URI reference</td>
              </tr>
              <tr>
                <td align="left">length</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Target summary length: brief, standard, detailed</td>
              </tr>
              <tr>
                <td align="left">focus</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Aspect to emphasize in the summary</td>
              </tr>
              <tr>
                <td align="left">format</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Output format: bullets, prose, structured</td>
              </tr>
              <tr>
                <td align="left">audience</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Intended reader context, for calibrating complexity</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Summary content with a source_hash and a confidence score.
Idempotent: Yes.</t>
        </section>
        <section anchor="book">
          <name>BOOK</name>
          <t>Purpose: Reserve a resource, time slot, seat, or allocation on behalf of
the agent's principal. State-modifying. Notable error codes: 409 Conflict
(resource unavailable), 451 Scope Violation (principal not authorized for
this resource type).</t>
          <table>
            <name>BOOK Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">resource_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Identifier of the resource to reserve</td>
              </tr>
              <tr>
                <td align="left">principal_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The human or system on whose behalf the booking is made</td>
              </tr>
              <tr>
                <td align="left">time_slot</td>
                <td align="left">
                  <strong>MUST</strong> (if time-based)</td>
                <td align="left">ISO 8601 datetime or range</td>
              </tr>
              <tr>
                <td align="left">quantity</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Number of units to reserve</td>
              </tr>
              <tr>
                <td align="left">options</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Resource-specific booking parameters</td>
              </tr>
              <tr>
                <td align="left">confirm_immediately</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Boolean; if false, creates a hold pending confirmation</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Booking confirmation with booking_id, status (confirmed / held),
and expiry timestamp if a hold. Idempotent: No.</t>
        </section>
        <section anchor="schedule">
          <name>SCHEDULE</name>
          <t>Purpose: Define a sequence of actions, method calls, or events to be
executed at specified times or in response to specified triggers. Creates
a durable plan, not an immediate execution.</t>
          <table>
            <name>SCHEDULE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">steps</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Ordered list of AGTP method calls with parameters</td>
              </tr>
              <tr>
                <td align="left">trigger</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">immediate, datetime, event, or condition</td>
              </tr>
              <tr>
                <td align="left">trigger_value</td>
                <td align="left">
                  <strong>MUST</strong> (if not immediate)</td>
                <td align="left">Datetime, event name, or condition expression</td>
              </tr>
              <tr>
                <td align="left">on_failure</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Behavior on step failure: abort, skip, retry, escalate</td>
              </tr>
              <tr>
                <td align="left">notify</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Notification targets on completion or failure</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Schedule record with schedule_id, confirmed steps, and next
execution timestamp. Idempotent: No.</t>
        </section>
        <section anchor="learn">
          <name>LEARN</name>
          <t>Purpose: Update the agent's session context, knowledge state, or persistent
memory. An explicit context write where the agent asserts that something should
be retained.</t>
          <table>
            <name>LEARN Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">content</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Information to be learned (structured or unstructured)</td>
              </tr>
              <tr>
                <td align="left">scope</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">session (ephemeral), principal (persists for principal), global (shared)</td>
              </tr>
              <tr>
                <td align="left">category</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Semantic category for retrieval optimization</td>
              </tr>
              <tr>
                <td align="left">confidence</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Agent's confidence in the content (0.0-1.0)</td>
              </tr>
              <tr>
                <td align="left">source</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Provenance of the learned content</td>
              </tr>
              <tr>
                <td align="left">ttl</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Expiry for the learned content</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Confirmation with learn_id and effective scope. Idempotent: No.</t>
        </section>
        <section anchor="delegate">
          <name>DELEGATE</name>
          <t>Purpose: Transfer execution of a task or method to a sub-agent or
downstream system. Initiates a new AGTP session on behalf of the delegating
agent, carrying forward authority lineage.</t>
          <table>
            <name>DELEGATE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">target_agent_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Identifier of the agent to delegate to</td>
              </tr>
              <tr>
                <td align="left">task</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">AGTP method call (or sequence) to execute</td>
              </tr>
              <tr>
                <td align="left">authority_scope</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Scope granted to sub-agent <strong>MUST</strong> be a strict subset of delegating agent's scope</td>
              </tr>
              <tr>
                <td align="left">delegation_token</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Signed token proving delegation authority</td>
              </tr>
              <tr>
                <td align="left">callback</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">AGTP endpoint for result delivery</td>
              </tr>
              <tr>
                <td align="left">deadline</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Maximum time for task completion</td>
              </tr>
            </tbody>
          </table>
          <t>Security note: the authority_scope in a DELEGATE request <strong>MUST NOT</strong>
exceed the delegating agent's own Authority-Scope. Servers <strong>MUST</strong> enforce
this and <strong>MUST</strong> return 451 Scope Violation if violated. This is the
protocol-level defense against authority laundering. Idempotent: No.</t>
        </section>
        <section anchor="collaborate">
          <name>COLLABORATE</name>
          <t>Purpose: Initiate a multi-agent coordinated task where two or more agents
work in parallel or in defined roles toward a shared goal. Unlike DELEGATE
(hierarchical), COLLABORATE is peer-to-peer.</t>
          <table>
            <name>COLLABORATE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">collaborators</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">List of Agent-IDs invited to collaborate</td>
              </tr>
              <tr>
                <td align="left">objective</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Shared goal expressed as a task description or structured specification</td>
              </tr>
              <tr>
                <td align="left">role_assignments</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Map of Agent-IDs to roles within the collaboration</td>
              </tr>
              <tr>
                <td align="left">coordination_model</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">parallel, sequential, or consensus</td>
              </tr>
              <tr>
                <td align="left">result_aggregation</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">How results from collaborators are combined</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Collaboration session receipt with collaboration_id. Each
collaborator receives an AGTP NOTIFY to join. Idempotent: No.</t>
        </section>
        <section anchor="confirm">
          <name>CONFIRM</name>
          <t>Purpose: Explicit acknowledgment of a prior action, state, or data item.
Creates a signed attestation record.</t>
          <table>
            <name>CONFIRM Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">target_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">ID of the action, booking, schedule, or item being confirmed</td>
              </tr>
              <tr>
                <td align="left">status</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">accepted, rejected, or deferred</td>
              </tr>
              <tr>
                <td align="left">reason</td>
                <td align="left">
                  <strong>SHOULD</strong> (if rejected/deferred)</td>
                <td align="left">Explanation of the decision</td>
              </tr>
              <tr>
                <td align="left">attestation</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Agent-signed confirmation payload for audit</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Confirmation receipt with timestamp and attestation_id.
Idempotent: Yes.</t>
        </section>
        <section anchor="escalate">
          <name>ESCALATE</name>
          <t>Purpose: Route a task, decision, or exception to a human principal or
higher-authority agent when the current agent cannot or should not proceed.
ESCALATE is the protocol-level expression of meaningful friction in AI
systems as a first-class method.</t>
          <table>
            <name>ESCALATE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">task_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The task or method invocation triggering escalation</td>
              </tr>
              <tr>
                <td align="left">reason</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Structured reason: confidence_threshold, scope_limit, ethical_flag, ambiguous_instruction, resource_unavailable</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Full context needed for the escalation recipient to act</td>
              </tr>
              <tr>
                <td align="left">priority</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">urgent, normal, or low</td>
              </tr>
              <tr>
                <td align="left">recipient</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Specific human or agent to escalate to; if absent, routes to default handler</td>
              </tr>
              <tr>
                <td align="left">deadline</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Time by which a response is needed</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Escalation receipt with escalation_id and routing confirmation.
The escalated task is paused until resolved via CONFIRM. Idempotent: Yes.
An agent that escalates appropriately is functioning correctly. Governance
frameworks built on AGTP can use escalation frequency and reason codes as
observability signals for systemic issues.</t>
        </section>
        <section anchor="notify">
          <name>NOTIFY</name>
          <t>Purpose: Asynchronous push of information from an agent to a recipient.
Does not expect a response. Fire-and-forget. Delivery confirmation (if
required) returned via a subsequent CONFIRM from the recipient.</t>
          <table>
            <name>NOTIFY Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">recipient</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Target Agent-ID, human endpoint, or broadcast group</td>
              </tr>
              <tr>
                <td align="left">content</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Notification payload</td>
              </tr>
              <tr>
                <td align="left">urgency</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">critical, informational, or background</td>
              </tr>
              <tr>
                <td align="left">delivery_guarantee</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">at_most_once, at_least_once, or exactly_once</td>
              </tr>
              <tr>
                <td align="left">expiry</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Timestamp after which the notification should not be delivered</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Delivery receipt with notification_id. Idempotent: No.</t>
        </section>
        <section anchor="describe">
          <name>DESCRIBE</name>
          <t>Purpose: Return the operational capabilities of a known agent endpoint.
The requesting agent specifies what capability dimensions it needs to
evaluate; the server returns a structured Capability Document. Used for
pre-task negotiation before committing to DELEGATE or COLLABORATE. If
<tt>capability_domains</tt> is omitted, the server <strong>SHOULD</strong> return all supported
domains. Category: ACQUIRE.</t>
          <table>
            <name>DESCRIBE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">capability_domains</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Comma-separated domains to return: <tt>methods</tt>, <tt>modalities</tt>, <tt>tools</tt>, <tt>version</tt>, <tt>budget</tt>, <tt>zones</tt>. If omitted, server <strong>SHOULD</strong> return all.</td>
              </tr>
              <tr>
                <td align="left">version_min</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Minimum acceptable version for capability negotiation.</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Session context for capability filtering.</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Capability Document with the following structure:</t>
          <sourcecode type="json"><![CDATA[
{
  "supported_methods": ["QUERY", "SUMMARIZE", "DESCRIBE"],
  "modalities": ["text", "image", "streaming"],
  "tools": ["web_search", "code_execute"],
  "version": "2.0.0",
  "version_min_satisfied": true,
  "behavioral_trust_score": 0.94,
  "budget_units_accepted": ["tokens", "compute-seconds"],
  "zones_accepted": ["zone:internal", "zone:partner"]
}
]]></sourcecode>
          <t>Idempotent: Yes. Primary error codes: 404, 422.</t>
        </section>
        <section anchor="suspend">
          <name>SUSPEND</name>
          <t>Purpose: Pause a specific active session workflow in a recoverable state.
Issues a resumption nonce the requesting agent uses to resume the session.
Method-level SUSPEND is session-scoped and does not affect registry
lifecycle state or Birth Certificate validity. The distinction between
method-level SUSPEND and lifecycle SUSPEND (Section 6.7.6) is
architectural: method-level SUSPEND is a workflow primitive; lifecycle
SUSPEND is an administrative action on the agent's registry record.
Category: ORCHESTRATE.</t>
          <table>
            <name>SUSPEND Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">session_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The session to suspend.</td>
              </tr>
              <tr>
                <td align="left">reason</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Structured reason: <tt>awaiting_input</tt>, <tt>resource_limit</tt>, <tt>scheduled_pause</tt>, <tt>external_dependency</tt>.</td>
              </tr>
              <tr>
                <td align="left">resume_by</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">ISO 8601 deadline for resumption. If exceeded without RESUME, session transitions to expired.</td>
              </tr>
              <tr>
                <td align="left">checkpoint</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Agent-provided state snapshot for resumption context. Stored by server for duration of suspension.</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Suspension receipt with the following structure:</t>
          <sourcecode type="json"><![CDATA[
{
  "suspension_id": "susp-0042",
  "session_id": "sess-a1b2c3d4",
  "resumption_nonce": "[128-bit random value, base64url]",
  "resume_by": "2026-04-15T09:00:00Z",
  "status": "suspended"
}
]]></sourcecode>
          <t>The <tt>resumption_nonce</tt> <strong>MUST</strong> be a cryptographically random 128-bit
value encoded as base64url. It is single-use: once presented to resume
a session, the nonce is invalidated and <strong>MUST NOT</strong> be accepted again.
Idempotent: No. Primary error codes: 404, 408.</t>
          <t>Servers MUST generate nonces with at least 128 bits of entropy using 
a CSPRNG.</t>
        </section>
      </section>
      <section anchor="method-summary-table">
        <name>Method Summary Table</name>
        <table>
          <name>AGTP Core Method Summary</name>
          <thead>
            <tr>
              <th align="left">Method</th>
              <th align="left">Intent</th>
              <th align="left">State-Modifying</th>
              <th align="left">Idempotent</th>
              <th align="left">Primary Error Codes</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">QUERY</td>
              <td align="left">Retrieve information</td>
              <td align="left">No</td>
              <td align="left">Yes</td>
              <td align="left">404, 422</td>
            </tr>
            <tr>
              <td align="left">SUMMARIZE</td>
              <td align="left">Synthesize content</td>
              <td align="left">No</td>
              <td align="left">Yes</td>
              <td align="left">400, 422</td>
            </tr>
            <tr>
              <td align="left">BOOK</td>
              <td align="left">Reserve a resource</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">409, 451</td>
            </tr>
            <tr>
              <td align="left">SCHEDULE</td>
              <td align="left">Plan future actions</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">400, 409</td>
            </tr>
            <tr>
              <td align="left">LEARN</td>
              <td align="left">Update agent context</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">400, 403</td>
            </tr>
            <tr>
              <td align="left">DELEGATE</td>
              <td align="left">Transfer task to sub-agent</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">403, 451, 551</td>
            </tr>
            <tr>
              <td align="left">COLLABORATE</td>
              <td align="left">Coordinate peer agents</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">404, 403</td>
            </tr>
            <tr>
              <td align="left">CONFIRM</td>
              <td align="left">Attest to a prior action</td>
              <td align="left">Yes</td>
              <td align="left">Yes</td>
              <td align="left">404, 400</td>
            </tr>
            <tr>
              <td align="left">ESCALATE</td>
              <td align="left">Defer to human/authority</td>
              <td align="left">Yes</td>
              <td align="left">Yes</td>
              <td align="left">404</td>
            </tr>
            <tr>
              <td align="left">NOTIFY</td>
              <td align="left">Push information</td>
              <td align="left">No</td>
              <td align="left">No</td>
              <td align="left">400, 404</td>
            </tr>
            <tr>
              <td align="left">DESCRIBE</td>
              <td align="left">Retrieve endpoint capabilities</td>
              <td align="left">No</td>
              <td align="left">Yes</td>
              <td align="left">404, 422</td>
            </tr>
            <tr>
              <td align="left">SUSPEND</td>
              <td align="left">Pause session workflow</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">404, 408</td>
            </tr>
            <tr>
              <td align="left">PROPOSE</td>
              <td align="left">Submit a dynamic endpoint proposal</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">400, 403, 460</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="method-registry-and-extensibility">
        <name>Method Registry and Extensibility</name>
        <t>AGTP defines a formal Method Registry maintained by IANA (see Section 8.2).
Any party may submit a new method for registration. The registration
procedure is Expert Review, and registration <strong>MUST</strong> be accompanied by a
published specification, at minimum an IETF Internet-Draft or equivalent
publicly available document. Registered methods <strong>MUST</strong>:</t>
        <ol spacing="normal" type="1"><li>
            <t>Have a unique uppercase ASCII name</t>
          </li>
          <li>
            <t>Define required and optional parameters</t>
          </li>
          <li>
            <t>Define expected response structure</t>
          </li>
          <li>
            <t>Specify idempotency behavior</t>
          </li>
          <li>
            <t>Specify applicable error codes</t>
          </li>
          <li>
            <t>Include a security considerations section</t>
          </li>
          <li>
            <t>Be accompanied by a published reference specification (Internet-Draft or RFC)</t>
          </li>
          <li>
            <t>Conform to the AGIS Grammar Specification <xref target="AGIS"/>, demonstrating
membership in the action-intent semantic class as defined therein.
Submissions that do not satisfy AGIS syntactic and semantic class
requirements <strong>MUST</strong> be rejected by the Designated Expert.</t>
          </li>
        </ol>
        <t>Experimental methods <strong>MAY</strong> be used prior to registration using the X-
prefix convention (e.g., X-NEGOTIATE). Experimental methods <strong>MUST NOT</strong>
be used in production deployments without registration. Experimental
methods <strong>MUST</strong> also conform to AGIS grammar rules; non-conformant
experimental methods <strong>MUST NOT</strong> be forwarded by AGTP-aware
infrastructure components.</t>
        <section anchor="grammar-based-method-validation-method-grammar-header">
          <name>Grammar-Based Method Validation (Method-Grammar Header)</name>
          <t>In addition to the IANA registry pathway, AGTP version 03 introduces a
grammar-based method validation pathway. When an AGTP request carries the
<tt>Method-Grammar</tt> header, the receiving infrastructure validates the method
identifier against the declared grammar specification rather than checking
the IANA registry exclusively.</t>
          <artwork><![CDATA[
Method-Grammar: AGIS/1.0
]]></artwork>
          <t><strong>Behavior when Method-Grammar: AGIS/1.0 is present:</strong></t>
          <ol spacing="normal" type="1"><li>
              <t>The AGTP infrastructure layer validates the method identifier against
the AGIS Grammar Specification <xref target="AGIS"/>.</t>
            </li>
            <li>
              <t>If the method identifier is AGIS-conformant (imperative base-form verb,
action-intent semantic class, not an HTTP method or state descriptor),
the request proceeds regardless of whether the method appears in the
IANA registry.</t>
            </li>
            <li>
              <t>If the method identifier fails AGIS validation, the infrastructure
<strong>MUST</strong> return status 454 (Grammar Violation) and <strong>MUST NOT</strong> forward
the request.</t>
            </li>
            <li>
              <t>AGIS-conformant custom methods carry the same transport-level identity,
authority scope, and governance semantics as registered methods.</t>
            </li>
          </ol>
          <t>This pathway enables organizations to define domain-specific Agentive API
vocabularies -- RESERVE instead of BOOK, LOCATE instead of FIND, ADMIT
and TRIAGE for healthcare contexts -- without requiring IANA registration
while maintaining full AGTP transport governance. The IANA registry
continues to serve as the reference vocabulary for maximum cross-system
interoperability; the grammar pathway enables domain specificity within
those constraints.</t>
          <t><strong>Status code 454 Grammar Violation:</strong>
Returned when a method identifier is present with <tt>Method-Grammar: AGIS/1.0</tt>
but fails AGIS grammar validation. The response body <strong>MUST</strong> include the
specific validation failure from the AGIS eight-pass validator. This status
code is registered in the AGTP Status Code Registry (see Section 8.3).</t>
          <t>Capability negotiation occurs during session establishment. The server
returns a Supported-Methods header listing the methods it implements.
Clients <strong>SHOULD</strong> check this list before invoking non-core methods.</t>
          <t>The <tt>Negotiation-ID</tt> header is used to correlate turns within a dynamic
endpoint negotiation sequence (see Section 6.5). It <strong>MUST</strong> be a
UUID generated by the service upon receiving a PROPOSE request and
<strong>MUST</strong> be echoed in all subsequent turns of the same negotiation.
Maximum three turns before the agent <strong>MUST</strong> ESCALATE.</t>
          <artwork><![CDATA[
Negotiation-ID: 550e8400-e29b-41d4-a716-446655440000
]]></artwork>
          <t>QUOTE is defined as a Tier 2 Standard Extended Method in <xref target="AGTP-METHODS"/>.
QUOTE provides pre-flight cost estimation for a proposed method invocation:
the requesting agent submits a proposed method call; the server returns a
<tt>Cost-Estimate</tt> response without executing the method. Servers supporting
budget negotiation via the <tt>Budget-Limit</tt> header <strong>SHOULD</strong> implement QUOTE
to enable agents to validate cost before committing to execution. Servers
that implement QUOTE <strong>MUST</strong> list it in the <tt>Supported-Methods</tt> response
header at session establishment.</t>
        </section>
      </section>
      <section anchor="dynamic-endpoint-negotiation">
        <name>Dynamic Endpoint Negotiation</name>
        <section anchor="overview-1">
          <name>Overview</name>
          <t>AGTP version 03 introduces a dynamic endpoint negotiation protocol
enabling agents to discover data availability and instantiate endpoints
on demand, without requiring pre-built API definitions. This protocol
realizes the agentic API vision in which organizations expose data
availability rather than pre-designed endpoints, and agents construct
the interface they need at runtime.</t>
          <t>The negotiation protocol operates at the transport layer. AGIS <xref target="AGIS"/>
provides the grammar for proposal and acceptance documents. The agent's
identity and authority credentials (via the AGTP-CERT extension
<xref target="AGTP-CERT"/> where deployed) govern authorization decisions.</t>
        </section>
        <section anchor="protocol-flow">
          <name>Protocol Flow</name>
          <artwork><![CDATA[
Step 1:  Pre-auth discovery
         Agent issues unauthenticated GET to agtp://service.example.com
         Service returns AGIS document + data_manifest block
         No credentials required at this step

Step 2:  Agent evaluates data_manifest
         Agent determines the service has relevant data
         Agent assesses whether `negotiable: true` is declared
         Agent constructs an AGIS-formatted endpoint proposal

Step 3:  PROPOSE request
         Agent sends PROPOSE with AGIS endpoint definition in body
         Request MAY be unauthenticated if data sensitivity is low
         Request MUST include Method-Grammar: AGIS/1.0 header

Step 4a: Authorization required (262)
         Service returns 262 with required authorization mechanism
         Agent establishes credentials via specified mechanism
         Agent resubmits PROPOSE with credentials
         Negotiation-ID issued by service in 262 response

Step 4b: Negotiation in progress (261)
         Service evaluates proposal asynchronously
         Service returns 261 with Negotiation-ID
         Agent polls or awaits outcome

Step 5a: Endpoint instantiated (263)
         Service returns 263 with complete AGIS endpoint definition
         Negotiation-ID matches original proposal
         Instantiated endpoint is session-scoped by default
         Agent MAY call the endpoint immediately

Step 5b: Proposal rejected (460)
         Service returns 460 with rejection reason
         Response SHOULD reference data_manifest alternatives
         Agent MAY modify proposal and retry (maximum 3 turns)
         After 3 rejections agent MUST ESCALATE
]]></artwork>
        </section>
        <section anchor="propose-method">
          <name>PROPOSE Method</name>
          <t>PROPOSE is a Tier 1 AGTP method. The requesting agent submits an
AGIS-formatted endpoint definition describing the interface it needs.
The service evaluates whether it can fulfill the proposal against its
data manifest and authorization policy.</t>
          <t>Parameters:</t>
          <table>
            <name>PROPOSE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">proposal</td>
                <td align="left">Yes</td>
                <td align="left">Complete AGIS endpoint definition (method + path + semantic block + input schema + output schema)</td>
              </tr>
              <tr>
                <td align="left">session_id</td>
                <td align="left">Yes</td>
                <td align="left">The active AGTP session identifier</td>
              </tr>
              <tr>
                <td align="left">data_class</td>
                <td align="left">Yes</td>
                <td align="left">The data_manifest class the proposal targets</td>
              </tr>
              <tr>
                <td align="left">scope_requested</td>
                <td align="left">Recommended</td>
                <td align="left">The authority scope the agent requests for this endpoint</td>
              </tr>
              <tr>
                <td align="left">persistence</td>
                <td align="left">Optional</td>
                <td align="left">session (default) or persistent; persistent requires elevated authorization</td>
              </tr>
            </tbody>
          </table>
          <t>Response on 263 Endpoint Instantiated:</t>
          <sourcecode type="json"><![CDATA[
{
  "negotiation_id": "550e8400-e29b-41d4-a716-446655440000",
  "instantiated_endpoint": {
    "method": "LOCATE",
    "path": "/customer/{id}/location",
    "semantic": {
      "intent": "Returns the last known location for a customer",
      "actor": "agent",
      "outcome": "Location coordinates and address are returned",
      "capability": "retrieval",
      "confidence_guidance": 0.70,
      "impact_tier": "informational",
      "is_idempotent": true
    },
    "input": { "required": ["id"] },
    "output": { "coordinates": "object", "address": "string" },
    "errors": ["customer_not_found", "location_not_available"],
    "proposed": true,
    "scope_required": "location:read",
    "expires": "session"
  }
}
]]></sourcecode>
          <t>The <tt>proposed: true</tt> flag marks this as a dynamically instantiated
endpoint per the AGIS specification <xref target="AGIS"/>.</t>
        </section>
        <section anchor="credential-free-negotiation">
          <name>Credential-Free Negotiation</name>
          <t>For data classes declared with <tt>sensitivity: informational</tt> and
<tt>requires_authorization: false</tt> in the data manifest, services MAY
complete the full negotiation flow without requiring credentials.
The agent arrives, proposes, and receives an instantiated endpoint
without API keys.</t>
          <t>For sensitive data classes, services MUST require credential
establishment at Step 4a. The negotiation protocol is the mechanism
by which credentials are established, not a prerequisite. This
distinction is fundamental: the agent does not need credentials to
begin a negotiation; it needs credentials to complete one for
sensitive data.</t>
          <t>AGTP-CERT <xref target="AGTP-CERT"/> provides the cryptographic identity binding
that enables services to make fine-grained authorization decisions
during negotiation based on the agent's verified identity, principal,
and authority scope.</t>
        </section>
        <section anchor="session-scope-and-persistence">
          <name>Session Scope and Persistence</name>
          <t>Instantiated endpoints are session-scoped by default. They cease to
exist when the AGTP session terminates. Services MAY offer persistent
instantiation (the endpoint survives session termination and is added
to the service's AGIS document) subject to elevated authorization.</t>
          <t>Persistent instantiation SHOULD be treated as a modification to the
service's published AGIS document. Services supporting persistent
instantiation MUST increment their AGIS-Version header on the next
discovery request following persistence.</t>
        </section>
      </section>
      <section anchor="extended-method-vocabulary-and-industry-profiles">
        <name>Extended Method Vocabulary and Industry Profiles</name>
        <section anchor="three-tier-method-architecture">
          <name>Three-Tier Method Architecture</name>
          <t>The AGTP method vocabulary is organized into three tiers reflecting
different levels of universality, specificity, and domain relevance. All
methods at all tiers <strong>MUST</strong> conform to the AGIS Grammar Specification
<xref target="AGIS"/>. The AGIS action-intent semantic class constraint applies to
every method in the IANA registry and to every AGIS-validated custom
method accepted via the Method-Grammar header pathway.</t>
          <dl>
            <dt>Tier 1. Core Methods (defined in Section 6.2):</dt>
            <dd>
              <t>The baseline vocabulary required for AGTP compliance. Every conformant
AGTP implementation <strong>MUST</strong> support all Tier 1 methods. All Tier 1
methods are AGIS-conformant; they are defined instances of the
action-intent semantic class standardized in <xref target="AGIS"/>.</t>
            </dd>
            <dt>Tier 2. Standard Extended Methods:</dt>
            <dd>
              <t>Registered in the IANA AGTP Method Registry and available for use in any
AGTP implementation. Not required for baseline compliance but <strong>SHOULD</strong>
be implemented where their semantics apply. Defined in <xref target="AGTP-METHODS"/>.
All Tier 2 methods satisfy AGIS grammar requirements.</t>
            </dd>
            <dt>Tier 3. Industry Profile Methods:</dt>
            <dd>
              <t>Domain-specific method sets defined and registered by industry
communities as named AGTP profiles. Valid within deployments that declare
support for the relevant profile. Not required in general-purpose
implementations. All Tier 3 profile method submissions <strong>MUST</strong> include
AGIS conformance verification as part of their specification.</t>
            </dd>
            <dt>Tier 4. AGIS-Validated Custom Methods:</dt>
            <dd>
              <t>Organization-defined methods that are not registered in the IANA AGTP
Method Registry but conform to the AGIS Grammar Specification and are
accepted at the transport layer via the <tt>Method-Grammar: AGIS/1.0</tt>
header. Valid within the deploying organization's AGTP services. The
action-intent semantic class constraint applies identically. Agents
discover and interpret these methods through natural language inference
against AGIS semantic declarations, as validated empirically in
<xref target="HOOD2026"/>.</t>
            </dd>
          </dl>
        </section>
        <section anchor="method-category-taxonomy">
          <name>Method Category Taxonomy</name>
          <t>All AGTP methods are organized into five categories:</t>
          <dl>
            <dt>ACQUIRE:</dt>
            <dd>
              <t>Retrieve data, resources, or state without modifying it. Typically
idempotent; no state modification.</t>
            </dd>
            <dt>COMPUTE:</dt>
            <dd>
              <t>Process, transform, or analyze information and produce a derived result.
Typically idempotent given the same input.</t>
            </dd>
            <dt>TRANSACT:</dt>
            <dd>
              <t>Perform state-changing operations with external systems, resources, or
records. Not idempotent by default; subject to reversibility
classification.</t>
            </dd>
            <dt>COMMUNICATE:</dt>
            <dd>
              <t>Send information, notifications, or signals to recipients. Fire-and-
forget or confirm-receipt delivery models.</t>
            </dd>
            <dt>ORCHESTRATE:</dt>
            <dd>
              <t>Coordinate, sequence, or manage multiple agents, tasks, or workflows.
May spawn sub-agents or sessions; delegation chain semantics apply.</t>
            </dd>
          </dl>
          <table>
            <name>Core Method Category Mapping</name>
            <thead>
              <tr>
                <th align="left">Core Method</th>
                <th align="left">Category</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">QUERY</td>
                <td align="left">Acquire</td>
              </tr>
              <tr>
                <td align="left">SUMMARIZE</td>
                <td align="left">Compute</td>
              </tr>
              <tr>
                <td align="left">BOOK</td>
                <td align="left">Transact</td>
              </tr>
              <tr>
                <td align="left">SCHEDULE</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">LEARN</td>
                <td align="left">Compute</td>
              </tr>
              <tr>
                <td align="left">DELEGATE</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">COLLABORATE</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">CONFIRM</td>
                <td align="left">Transact</td>
              </tr>
              <tr>
                <td align="left">ESCALATE</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">NOTIFY</td>
                <td align="left">Communicate</td>
              </tr>
              <tr>
                <td align="left">DESCRIBE</td>
                <td align="left">Acquire</td>
              </tr>
              <tr>
                <td align="left">SUSPEND</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">PROPOSE</td>
                <td align="left">Orchestrate</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="standard-extended-methods-tier-2">
          <name>Standard Extended Methods (Tier 2)</name>
          <t>The following methods constitute the initial Tier 2 registration set,
defined in <xref target="AGTP-METHODS"/>. Listed here by category with brief semantic
definitions; full parameter specifications are in the companion document.</t>
          <t>ACQUIRE category: FETCH, SEARCH, SCAN, PULL, IMPORT, FIND.</t>
          <t>COMPUTE category: EXTRACT, FILTER, VALIDATE, TRANSFORM, TRANSLATE,
NORMALIZE, PREDICT, RANK, MAP.</t>
          <t>TRANSACT category: REGISTER, SUBMIT, TRANSFER, PURCHASE, SIGN, MERGE,
LINK, LOG, SYNC, PUBLISH.</t>
          <t>COMMUNICATE category: REPLY, SEND, REPORT.</t>
          <t>ORCHESTRATE category: MONITOR, ROUTE, RETRY, PAUSE, RESUME, RUN, CHECK.</t>
          <t>Notable constraints: PURCHASE <strong>MUST</strong> carry explicit principal_id and
scope enforcement; 451 Scope Violation applies if payments:purchase is
not in the agent's Authority-Scope. RUN requires explicit procedure_id
parameter; implementations <strong>MUST NOT</strong> accept free-form execution strings.</t>
        </section>
        <section anchor="short-form-and-industry-inspired-methods">
          <name>Short-Form and Industry-Inspired Methods</name>
          <t>A set of short-form verb methods, e.g., SET, TAKE, OPEN, START, CALL, MAKE,
TURN, BREAK, are provisionally catalogued as candidates for Tier 2
registration. These verbs are highly context-dependent and their semantics
vary significantly across deployment domains.</t>
          <t>Short-form methods will be registered individually only when a published
companion specification provides unambiguous semantic definitions
demonstrably distinct from existing registered methods. Provisional
registrations using the X- prefix (e.g., X-SET, X-CALL) are encouraged
during the experimentation period.</t>
        </section>
        <section anchor="industry-profile-method-sets">
          <name>Industry Profile Method Sets</name>
          <t>AGTP recognizes that specific industries require method vocabularies
reflecting domain-specific operations that would be inappropriate in a
general-purpose standard. Industry profile method sets are defined and
registered as named AGTP profiles. A profile is a published companion
specification that:</t>
          <ol spacing="normal" type="1"><li>
              <t>Declares a profile name (e.g., agtp-profile-healthcare,
agtp-profile-financial, agtp-profile-legaltech)</t>
            </li>
            <li>
              <t>Defines one or more industry-specific methods with full parameter
specifications, error codes, and security considerations</t>
            </li>
            <li>
              <t>Specifies which Tier 1 and Tier 2 methods are REQUIRED, RECOMMENDED,
or NOT APPLICABLE within the profile</t>
            </li>
            <li>
              <t>Addresses regulatory or compliance considerations specific to the
domain (e.g., HIPAA for healthcare, PCI-DSS for financial services)</t>
            </li>
          </ol>
          <t>Illustrative examples of potential industry profile methods (not yet
registered; listed for directional purposes only):</t>
          <t>Healthcare: PRESCRIBE, AUTHORIZE, REFER, DISPENSE, TRIAGE, CONSENT, REDACT</t>
          <t>Financial services: SETTLE, RECONCILE, HEDGE, CLEAR, UNDERWRITE, KYC, AML</t>
          <t>Legal and compliance: ATTEST, NOTARIZE, DISCLOSE, REDLINE, EXECUTE,
PRESERVE</t>
          <t>Infrastructure: PROVISION, DEPROVISION, ROLLBACK, SNAPSHOT, FAILOVER</t>
          <t>Industry communities are encouraged to develop and submit profile
specifications through the IETF process. The IANA AGTP Method Registry will
maintain a profile index alongside the core and standard method registries.</t>
        </section>
        <section anchor="registration-path-for-new-methods">
          <name>Registration Path for New Methods</name>
          <dl>
            <dt>For Tier 2 Standard Methods:</dt>
            <dd>
              <t>Submit an Internet-Draft to the IETF providing full method specification
per Section 6.4. The Designated Expert reviews for semantic uniqueness,
clarity, AGIS grammar conformance <xref target="AGIS"/>, and security considerations.
Submissions that fail AGIS validation <strong>MUST</strong> be returned to the submitter
before review proceeds.</t>
            </dd>
            <dt>For Industry Profile Methods (Tier 3):</dt>
            <dd>
              <t>Submit a profile specification to the IETF (or a recognized domain
standards body with an established AGTP registry liaison) covering all
methods in the profile and profile compliance requirements. The
specification <strong>MUST</strong> include AGIS conformance statements for every
method defined in the profile.</t>
            </dd>
            <dt>For AGIS-Validated Custom Methods (Tier 4):</dt>
            <dd>
              <t>No IANA registration required. The implementing organization defines
its method vocabulary in an AGIS document served at the service's AGTP
address. Methods are validated at the transport layer using the
<tt>Method-Grammar: AGIS/1.0</tt> header. The method vocabulary is declared
in the AGIS vocabulary block and discoverable by agents at runtime.
Organizations adopting Tier 4 methods are encouraged to publish their
AGIS documents at <tt>agtp://[service-address]</tt> to enable cross-system
agent discovery.</t>
            </dd>
            <dt>For Experimental Methods:</dt>
            <dd>
              <t>Use the X- prefix without registration. Implementations <strong>MUST NOT</strong>
deploy experimental methods in production without completing either the
IANA registration process (Tier 2/3) or deploying a conformant AGIS
document (Tier 4). Experimental method names do not reserve the
unprefixed name.</t>
            </dd>
          </dl>
          <t>The AGTP Method Registry is published at:
https://www.iana.org/assignments/agtp-methods/</t>
          <t>The AGIS conformance test suite is maintained at:
https://agtp.io/agis/conformance</t>
        </section>
        <section anchor="real-time-service-adaptation">
          <name>Real-time Service Adaptation</name>
          <t>Services that update their AGIS documents at runtime MUST signal changes
via the <tt>AGIS-Version</tt> response header. This header MUST be present on
all AGTP responses from negotiable services.</t>
          <artwork><![CDATA[
AGIS-Version: 1.2.4
]]></artwork>
          <t>Agent runtimes MUST cache the AGIS-Version value from each service.
When a response carries an AGIS-Version value different from the cached
value, the agent runtime MUST re-fetch and re-validate the AGIS document
before issuing further method calls. This mechanism supports real-time
service adaptation without requiring push notifications.</t>
          <artwork><![CDATA[
Adaptation flow:
  Agent calls BOOK /reservation
  Response includes AGIS-Version: 1.2.5 (was 1.2.4)
  Agent re-fetches agtp://service.example.com
  Service returns updated AGIS document (new endpoint added)
  Agent updates service map
  Agent resumes operation with updated capability knowledge
]]></artwork>
          <t>Services SHOULD increment AGIS-Version when:
  - A new endpoint is added to the AGIS document
  - An existing endpoint's semantic declaration changes
  - A new verb is added to the vocabulary block
  - A new data class is added to the data_manifest</t>
          <t>Services MUST NOT decrement or reuse AGIS-Version values.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This section satisfies the mandatory IETF Security Considerations
requirement. All AGTP implementations <strong>MUST</strong> address the considerations
described here.</t>
      <section anchor="mandatory-tls">
        <name>Mandatory TLS</name>
        <t>All AGTP connections <strong>MUST</strong> use TLS 1.3 or higher. Implementations
<strong>MUST</strong> reject connections using TLS 1.2 or below. Certificate validation
follows standard PKI practices per <xref target="RFC5280"/>. Servers <strong>MUST</strong> present
a valid certificate.</t>
      </section>
      <section anchor="agent-identity-headers-and-agent-certificate-extension">
        <name>Agent Identity Headers and Agent Certificate Extension</name>
        <t>Every AGTP request <strong>MUST</strong> include Agent-ID and Principal-ID header fields.
In the base specification, these fields are not cryptographically
authenticated. They are self-asserted but logged mandatorily for
auditability. Implementations <strong>SHOULD</strong> use logging and anomaly detection
to identify inconsistencies.</t>
        <t>Full cryptographic verification of agent identity and Authority-Scope is
provided by the AGTP Agent Certificate extension <xref target="AGTP-CERT"/>. That
extension binds Agent-ID, Principal-ID, and Authority-Scope to an X.509
v3 certificate presented during TLS mutual authentication, enabling
infrastructure-layer identity and scope verification without
application-layer access. Implementers planning deployments that require
verified agent identity <strong>SHOULD</strong> plan for the Agent Certificate
extension.</t>
        <ul empty="true">
          <li>
            <t>Note: The Agent Certificate extension and the Agent Birth Certificate
mechanism may be subject to pending intellectual property claims.
See Section 7.7 and the IPR Notice preceding the Abstract for details.
The licensor is prepared to grant a royalty-free license to implementers.</t>
          </li>
        </ul>
        <t>Every AGTP server <strong>MUST</strong> log Agent-ID and Principal-ID fields for every
request, creating an attributable audit trail even in deployments without
the Certificate extension.</t>
      </section>
      <section anchor="authority-scope-enforcement">
        <name>Authority Scope Enforcement</name>
        <t>The Authority-Scope header declares what actions the agent is authorized
to take. Compliant AGTP servers <strong>MUST</strong> parse the Authority-Scope on every
request, return 451 Scope Violation for any method that exceeds declared
scope, and log all scope violations for audit purposes. Scope declarations
are self-asserted in the base spec, analogous to scope assertions in
OAuth 2.0 <xref target="RFC6749"/>. Cryptographically signed and infrastructure-enforced
scopes are defined in <xref target="AGTP-CERT"/>.</t>
      </section>
      <section anchor="threat-model">
        <name>Threat Model</name>
        <section anchor="agent-spoofing">
          <name>Agent Spoofing</name>
          <t>Threat: A malicious actor forges Agent-ID and Principal-ID headers to
impersonate a trusted agent. Base spec mitigation: mandatory logging and
anomaly detection. Full mitigation requires <xref target="AGTP-CERT"/>.</t>
        </section>
        <section anchor="authority-laundering">
          <name>Authority Laundering</name>
          <t>Threat: An agent claims an Authority-Scope broader than what it was
granted. Mitigation: server-side scope enforcement; 451 Scope Violation
returned and logged. In DELEGATE chains, each hop's scope <strong>MUST</strong> be a
strict subset of the delegating agent's scope.</t>
        </section>
        <section anchor="delegation-chain-poisoning">
          <name>Delegation Chain Poisoning</name>
          <t>Threat: A malicious agent inserts itself into a DELEGATE chain. Mitigation:
Delegation-Chain headers are logged at each hop. 551 Authority Chain Broken
is returned if any chain entry is unverifiable. Full mitigation requires
<xref target="AGTP-CERT"/> for signed delegation tokens.</t>
        </section>
        <section anchor="denial-of-service-via-high-frequency-agent-traffic">
          <name>Denial of Service via High-Frequency Agent Traffic</name>
          <t>Threat: Agents that are compromised, misconfigured, or adversarial generate
extremely high request volumes. Mitigation: 429 Rate Limited status code.
Rate limiting <strong>SHOULD</strong> be applied per Agent-ID and per Principal-ID.
When <xref target="AGTP-CERT"/> is deployed, per-Agent-ID quotas can be cryptographically
tied to verified identity, preventing quota evasion through Agent-ID
spoofing.</t>
        </section>
        <section anchor="session-hijacking">
          <name>Session Hijacking</name>
          <t>Threat: An attacker intercepts or forges a Session-ID. Mitigation:
mandatory TLS protects sessions in transit. Session-IDs <strong>MUST</strong> be
cryptographically random with minimum 128 bits of entropy. Servers <strong>MUST</strong>
validate that Session-ID, Agent-ID, and TLS client identity are consistent.</t>
        </section>
        <section anchor="escalation-suppression">
          <name>Escalation Suppression</name>
          <t>Threat: A compromised agent or intermediary suppresses ESCALATE requests,
preventing human oversight. Mitigation: compliant implementations <strong>MUST</strong>
route ESCALATE requests directly to the declared escalation handler without
modification. Intermediaries <strong>MUST NOT</strong> drop, delay, or modify ESCALATE
requests. Escalation handlers <strong>SHOULD</strong> implement independent receipt
confirmation.</t>
        </section>
        <section anchor="birth-certificate-spoofing">
          <name>Birth Certificate Spoofing</name>
          <t>Threat: A malicious actor fabricates a Birth Certificate to claim a
legitimate agent's identity or construct a false identity with elevated
trust. Mitigation: Birth Certificates are issued only by governance
platforms with verified ownership of the <tt>org_domain</tt>. In the base spec,
mandatory logging provides auditability. Full mitigation requires
<xref target="AGTP-CERT"/> for cryptographically bound Birth Certificate verification at
the transport layer. Governance platforms <strong>MUST</strong> treat any ACTIVATE
request that presents a certificate hash matching an existing registry
record as a collision attack and <strong>MUST</strong> reject it.</t>
        </section>
        <section anchor="domain-transfer-identity-hijacking">
          <name>Domain Transfer Identity Hijacking</name>
          <t>Threat: An attacker acquires an expired domain to inherit the agent
registry and trust history of prior registrants. Mitigation: agents under
an expired domain are automatically Suspended within 24 hours of domain
expiry detection. A new owner of the domain <strong>MUST NOT</strong> inherit prior
agent registrations. See Section 9.6 for the full domain expiry policy.</t>
        </section>
        <section anchor="attribution-forgery">
          <name>Attribution Forgery</name>
          <t>Threat: A malicious agent submits a fabricated or replayed
Attribution-Record to claim credit for an action it did not perform, or
to conceal the true execution context of an action it did perform.</t>
          <t>Mitigation: Attribution-Records <strong>MUST</strong> be signed with the agent's
governance key. The signature <strong>MUST</strong> cover the full record including the
Task-ID, Agent-ID, method, timestamp, and result hash. When <xref target="AGTP-CERT"/>
is deployed, the signature is verified at the transport layer against the
agent's X.509 certificate. For high-stakes domains, RATS attestation
evidence in the Attribution-Record per <xref target="RFC9334"/> provides hardware-rooted
proof of execution context that cannot be forged without compromising the
attesting environment itself. Attribution-Record signatures <strong>MUST</strong> be
verified before the record is admitted to an audit trail. Unverified records
<strong>MUST</strong> be logged with a <tt>signature_unverified</tt> flag and <strong>MUST NOT</strong> be
treated as authoritative for compliance purposes.</t>
        </section>
      </section>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t>Agent identity headers carry information about agent behavior that may be
sensitive:</t>
        <ul spacing="normal">
          <li>
            <t>Agent-ID and Principal-ID together may reveal organizational structure</t>
          </li>
          <li>
            <t>Session-ID and Task-ID reveal workflow patterns</t>
          </li>
          <li>
            <t>Delegation-Chain reveals multi-agent architecture</t>
          </li>
        </ul>
        <t>AGTP logs containing these fields <strong>MUST</strong> be treated as sensitive
operational data. Operators <strong>MUST</strong> implement appropriate access controls,
retention limits, and data minimization practices consistent with
applicable privacy regulations.</t>
        <t>Where privacy-preserving attribution is required, implementations <strong>MAY</strong>
use pseudonymous Agent-IDs with a separate trusted resolution service.
The architecture for pseudonymous agent identity resolution is reserved
for a future companion document.</t>
      </section>
      <section anchor="denial-of-service-considerations">
        <name>Denial-of-Service Considerations</name>
        <t>AGTP's agent identity headers provide a mechanism for more precise
denial-of-service mitigation than is possible with HTTP. Rate limiting
<strong>SHOULD</strong> be applied per Agent-ID and per Principal-ID in addition to
per-IP-address controls.</t>
        <t>When <xref target="AGTP-CERT"/> is deployed, per-Agent-ID rate limiting can be
cryptographically tied to verified agent identity, preventing quota evasion
through Agent-ID rotation. Implementations planning high-volume governed
agent deployments <strong>SHOULD</strong> plan for <xref target="AGTP-CERT"/> as part of their
denial-of-service mitigation strategy.</t>
        <t>Additional recommended mitigations: Priority header enforcement (Priority:
background requests <strong>SHOULD</strong> have lower rate limit headroom than
Priority: critical); per-governance-zone aggregate limits in multi-tenant
deployments; and circuit breaker patterns for ESCALATE request floods.</t>
      </section>
      <section anchor="intellectual-property-considerations">
        <name>Intellectual Property Considerations</name>
        <t>The core AGTP specification, including all base methods, header fields,
status codes, connection model, and IANA registrations defined in this
document, is intended for open implementation without royalty obligation.</t>
        <t>Certain elements referenced in this document may be subject to pending
patent applications by the author, specifically:</t>
        <ul spacing="normal">
          <li>
            <t>The Agent Certificate extension <xref target="AGTP-CERT"/>, which provides
cryptographic binding of agent identity and authority scope to AGTP
header fields.</t>
          </li>
          <li>
            <t>The ACTIVATE method, which provides AGTP-native transmission and
activation of governed agent packages.</t>
          </li>
          <li>
            <t>The Agent Birth Certificate mechanism (Section 5.7), which provides
the genesis identity record and canonical Agent-ID derivation
process for AGTP-registered agents.</t>
          </li>
          <li>
            <t>The <tt>.agent</tt> file format specification, an open packaging format
for AI agents.</t>
          </li>
          <li>
            <t>The <tt>.nomo</tt> file format specification, a governed packaging format
for AI agents with cryptographic governance binding.</t>
          </li>
        </ul>
        <t>Implementers of the core AGTP specification are not affected by any
intellectual property claims on these extensions and associated formats.</t>
        <t>The licensor is prepared to grant a royalty-free license to implementers
for any patent claims that cover contributions in this document and its
referenced extensions, consistent with the IETF's IPR framework under
<xref target="RFC8179"/>.</t>
        <t>IPR disclosures have been filed with the IETF Secretariat and are available
at: https://datatracker.ietf.org/ipr/</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests the following IANA actions upon advancement to
RFC status.</t>
      <section anchor="port-assignment">
        <name>Port Assignment</name>
        <t>Registration of the following service names in the IANA Service Name and
Transport Protocol Port Number Registry:</t>
        <table>
          <name>Proposed Port Assignments</name>
          <thead>
            <tr>
              <th align="left">Service Name</th>
              <th align="left">Port</th>
              <th align="left">Transport</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">agtp</td>
              <td align="left">TBD</td>
              <td align="left">TCP</td>
              <td align="left">Agent Transfer Protocol over TCP/TLS</td>
            </tr>
            <tr>
              <td align="left">agtp-quic</td>
              <td align="left">TBD</td>
              <td align="left">UDP</td>
              <td align="left">Agent Transfer Protocol over QUIC</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="agtp-method-registry">
        <name>AGTP Method Registry</name>
        <t>Establishment of a new IANA registry: Agent Transfer Protocol Methods.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Methods</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review per <xref target="RFC8126"/>, with the additional requirement that each
registration be accompanied by a published specification, at minimum a
publicly available Internet-Draft or equivalent document. The Designated
Expert <strong>SHOULD</strong> verify that the proposed method name is unique, the
reference specification is publicly accessible, and the method definition
includes the required fields (parameters, response structure, idempotency,
error codes, security considerations).</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
        </dl>
        <t>Initial registrations:</t>
        <table>
          <name>Initial AGTP Method Registry Entries</name>
          <thead>
            <tr>
              <th align="left">Method</th>
              <th align="left">Status</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">QUERY</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">SUMMARIZE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">BOOK</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">SCHEDULE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">LEARN</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">DELEGATE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">COLLABORATE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">CONFIRM</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">ESCALATE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">NOTIFY</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">DESCRIBE</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
            <tr>
              <td align="left">SUSPEND</td>
              <td align="left">Permanent</td>
              <td align="left">This document, Section 7.2</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="agtp-status-code-registry">
        <name>AGTP Status Code Registry</name>
        <t>Establishment of a new IANA registry: Agent Transfer Protocol Status Codes.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Status Codes</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review + published specification required.</t>
          </dd>
        </dl>
        <t>The following AGTP-specific status codes are registered with full
definitions:</t>
        <table>
          <name>AGTP-Specific Status Code Definitions</name>
          <thead>
            <tr>
              <th align="left">Code</th>
              <th align="left">Name</th>
              <th align="left">Definition</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">451</td>
              <td align="left">Scope Violation</td>
              <td align="left">The requested action is outside the Authority-Scope declared in the request headers. The server <strong>MUST</strong> log this event. The agent <strong>MUST NOT</strong> retry the same request without modifying its Authority-Scope declaration. This is a governance signal, not a protocol error.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
            <tr>
              <td align="left">452</td>
              <td align="left">Budget Exceeded</td>
              <td align="left">The requested method execution would exceed the resource limits declared in the Budget-Limit request header. The agent <strong>MUST NOT</strong> retry without modifying the Budget-Limit or reducing request scope. This is a governance signal, not a protocol error. <strong>MUST</strong> be logged.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
            <tr>
              <td align="left">454</td>
              <td align="left">Grammar Violation</td>
              <td align="left">The method identifier fails AGIS grammar validation <xref target="AGIS"/> when <tt>Method-Grammar: AGIS/1.0</tt> is present. The response body <strong>MUST</strong> identify the specific AGIS validation pass that failed. The agent <strong>MUST NOT</strong> retry without correcting the method identifier.</td>
              <td align="left">This document, Section 6.4</td>
            </tr>
            <tr>
              <td align="left">261</td>
              <td align="left">Negotiation In Progress</td>
              <td align="left">The service has received a PROPOSE request and is evaluating the endpoint proposal. The response body <strong>MUST</strong> include a Negotiation-ID and an estimated evaluation duration. The agent <strong>MUST</strong> poll or wait for a 263 or rejection response.</td>
              <td align="left">This document, Section 6.5</td>
            </tr>
            <tr>
              <td align="left">262</td>
              <td align="left">Authorization Required for Negotiation</td>
              <td align="left">The service requires credential establishment before evaluating the PROPOSE request. The response body <strong>MUST</strong> specify the authorization mechanism required (e.g., AGTP-CERT, OAuth scope).</td>
              <td align="left">This document, Section 6.5</td>
            </tr>
            <tr>
              <td align="left">263</td>
              <td align="left">Endpoint Instantiated</td>
              <td align="left">The service has accepted the PROPOSE request and instantiated the requested endpoint. The response body <strong>MUST</strong> contain a complete AGIS endpoint definition for the instantiated endpoint. The Negotiation-ID <strong>MUST</strong> match the proposal.</td>
              <td align="left">This document, Section 6.5</td>
            </tr>
            <tr>
              <td align="left">460</td>
              <td align="left">Proposal Rejected</td>
              <td align="left">The service cannot or will not instantiate the proposed endpoint. The response body <strong>MUST</strong> explain the rejection reason and <strong>SHOULD</strong> reference relevant data_manifest entries if the requested data class is available through a different approach.</td>
              <td align="left">This document, Section 6.5</td>
            </tr>
            <tr>
              <td align="left">453</td>
              <td align="left">Zone Violation</td>
              <td align="left">The request would route outside the network boundary declared in the AGTP-Zone-ID header. SEP-enforced. The agent <strong>MUST NOT</strong> retry without modifying the AGTP-Zone-ID or obtaining explicit cross-zone authorization. <strong>MUST</strong> be logged.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
            <tr>
              <td align="left">550</td>
              <td align="left">Delegation Failure</td>
              <td align="left">A sub-agent to which a task was delegated via the DELEGATE method failed to complete the task within the declared deadline or returned an error. The response body <strong>SHOULD</strong> contain the sub-agent's error details.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
            <tr>
              <td align="left">551</td>
              <td align="left">Authority Chain Broken</td>
              <td align="left">One or more entries in the Delegation-Chain header cannot be verified as part of a valid and continuous delegation sequence. The specific unverifiable entry <strong>SHOULD</strong> be identified in the response body. The server <strong>MUST</strong> log this event.</td>
              <td align="left">This document, Section 5.5</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="header-field-registry">
        <name>Header Field Registry</name>
        <t>AGTP header fields are distinct from HTTP header fields and are registered
in a new IANA registry: Agent Transfer Protocol Header Fields.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Header Fields</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review + published specification required.</t>
          </dd>
        </dl>
        <t>AGTP does not reuse the HTTP Field Name Registry, as AGTP header fields have
different semantics, applicability, and versioning constraints from HTTP
fields. HTTP header fields are not automatically valid in AGTP, and AGTP
header fields are not valid HTTP fields.</t>
        <t>Initial registrations (all Permanent): AGTP-Version, AGTP-Method, AGTP-Status,
Agent-ID, Principal-ID, Authority-Scope, Session-ID, Task-ID,
Delegation-Chain, Priority, TTL, Server-Agent-ID, Attribution-Record,
Continuation-Token, Supported-Methods, Budget-Limit, AGTP-Zone-ID,
Content-Schema, Telemetry-Export, Cost-Estimate, Attestation-Evidence.</t>
      </section>
      <section anchor="uri-scheme-registration">
        <name>URI Scheme Registration</name>
        <t>Registration of the agtp:// URI scheme per <xref target="RFC7595"/>, as described in
Section 5.1.8 of this document.</t>
      </section>
      <section anchor="agtp-budget-unit-registry">
        <name>AGTP Budget Unit Registry</name>
        <t>Establishment of a new IANA sub-registry: Agent Transfer Protocol Budget
Units.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Budget Units</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review per <xref target="RFC8126"/>. New unit registrations <strong>MUST</strong> define:
unit name (lowercase ASCII, no spaces or special characters), semantic
description, value format (integer or decimal), whether fractional values
are permitted, and a reference specification. Units representing financial
denominations <strong>MUST</strong> specify the currency and <strong>MUST</strong> define precision
(decimal places). The Designated Expert <strong>SHOULD</strong> verify that the proposed
unit does not duplicate an existing registration and that the value format
is unambiguous.</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
        </dl>
        <t>Initial registrations:</t>
        <table>
          <name>Initial AGTP Budget Unit Registry Entries</name>
          <thead>
            <tr>
              <th align="left">Unit</th>
              <th align="left">Description</th>
              <th align="left">Value Format</th>
              <th align="left">Fractional</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">tokens</td>
              <td align="left">Language model token consumption</td>
              <td align="left">Integer</td>
              <td align="left">No</td>
            </tr>
            <tr>
              <td align="left">compute-seconds</td>
              <td align="left">CPU/GPU compute time in seconds</td>
              <td align="left">Decimal</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">USD</td>
              <td align="left">US Dollar financial limit</td>
              <td align="left">Decimal, 2 places</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">EUR</td>
              <td align="left">Euro financial limit</td>
              <td align="left">Decimal, 2 places</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">GBP</td>
              <td align="left">Pound Sterling financial limit</td>
              <td align="left">Decimal, 2 places</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">calls</td>
              <td align="left">Downstream API call count</td>
              <td align="left">Integer</td>
              <td align="left">No</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="agent-registry-retention-policy">
        <name>Agent Registry Retention Policy</name>
        <t>The AGTP registry <strong>MUST</strong> retain records for all registered agents
regardless of lifecycle state. The following minimum retention periods apply:</t>
        <table>
          <name>AGTP Registry Minimum Retention Periods</name>
          <thead>
            <tr>
              <th align="left">Lifecycle State</th>
              <th align="left">Minimum Retention Period</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Active</td>
              <td align="left">Duration of Active state + 7 years</td>
            </tr>
            <tr>
              <td align="left">Suspended</td>
              <td align="left">Duration of Suspended state + 7 years</td>
            </tr>
            <tr>
              <td align="left">Revoked</td>
              <td align="left">10 years from revocation date</td>
            </tr>
            <tr>
              <td align="left">Deprecated</td>
              <td align="left">7 years from deprecation date</td>
            </tr>
          </tbody>
        </table>
        <t>The 7-year minimum reflects common enterprise compliance requirements
(SOX, GDPR audit trails, HIPAA). Governance platform operators in regulated
industries <strong>SHOULD</strong> extend these minimums to match applicable regulatory
requirements.</t>
        <t>The retained record for a Revoked or Deprecated agent <strong>MUST</strong> include:</t>
        <ul spacing="normal">
          <li>
            <t>Canonical Agent-ID (permanently retired, not reissued)</t>
          </li>
          <li>
            <t>Agent label and org domain at time of registration</t>
          </li>
          <li>
            <t>Trust tier at time of registration</t>
          </li>
          <li>
            <t>Activation date and activating principal</t>
          </li>
          <li>
            <t>Revocation or deprecation date, initiating principal, and reason code</t>
          </li>
          <li>
            <t>Genesis audit record hash (pointer to immutable audit log)</t>
          </li>
          <li>
            <t>Full Birth Certificate (archived, not publicly accessible)</t>
          </li>
          <li>
            <t>All lifecycle state transitions with timestamps</t>
          </li>
        </ul>
        <t>The retained record <strong>MUST NOT</strong> contain package executable contents,
active session data, or Authority-Scope grant tokens.</t>
        <section anchor="domain-name-expiry-interaction">
          <name>Domain Name Expiry Interaction</name>
          <t>If an organization's <tt>org_domain</tt> expires or transfers to a new owner:</t>
          <ol spacing="normal" type="1"><li>
              <t>All Active agents registered under the expired domain <strong>MUST</strong> be
automatically Suspended within 24 hours of domain expiry detection.</t>
            </li>
            <li>
              <t>The governance platform <strong>MUST</strong> notify the registered principal
contact before suspension takes effect, with a minimum notice period
of 30 days if domain expiry was predictable.</t>
            </li>
            <li>
              <t>Suspended agents under an expired domain transition to Deprecated
state after 90 days if the domain has not been renewed.</t>
            </li>
            <li>
              <t>A new owner of the domain <strong>MUST NOT</strong> inherit prior agent
registrations. New ACTIVATE transactions are required.</t>
            </li>
          </ol>
          <t>This policy prevents domain-transfer-based identity hijacking in which
an attacker acquires an expired domain to claim the trust history of
agents that operated under it.</t>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8179">
          <front>
            <title>Intellectual Property Rights in IETF Technology</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <author fullname="J. Contreras" initials="J." surname="Contreras"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>The IETF policies about Intellectual Property Rights (IPR), such as patent rights, relative to technologies developed in the IETF are designed to ensure that IETF working groups and participants have as much information as possible about any IPR constraints on a technical proposal as early as possible in the development process. The policies are intended to benefit the Internet community and the public at large, while respecting the legitimate rights of IPR holders. This document sets out the IETF policies concerning IPR related to technology worked on within the IETF. It also describes the objectives that the policies are designed to meet. This document updates RFC 2026 and, with RFC 5378, replaces Section 10 of RFC 2026. This document also obsoletes RFCs 3979 and 4879.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="79"/>
          <seriesInfo name="RFC" value="8179"/>
          <seriesInfo name="DOI" value="10.17487/RFC8179"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="AGIS">
          <front>
            <title>Agentic Grammar and Interface Specification (AGIS)</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-independent-agis-00"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9114">
          <front>
            <title>HTTP/3</title>
            <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9114"/>
          <seriesInfo name="DOI" value="10.17487/RFC9114"/>
        </reference>
        <reference anchor="RFC7540">
          <front>
            <title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
            <author fullname="M. Belshe" initials="M." surname="Belshe"/>
            <author fullname="R. Peon" initials="R." surname="Peon"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection. It also introduces unsolicited push of representations from servers to clients.</t>
              <t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax. HTTP's existing semantics remain unchanged.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7540"/>
          <seriesInfo name="DOI" value="10.17487/RFC7540"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7595">
          <front>
            <title>Guidelines and Registration Procedures for URI Schemes</title>
            <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <author fullname="T. Hardie" initials="T." surname="Hardie"/>
            <date month="June" year="2015"/>
            <abstract>
              <t>This document updates the guidelines and recommendations, as well as the IANA registration processes, for the definition of Uniform Resource Identifier (URI) schemes. It obsoletes RFC 4395.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="35"/>
          <seriesInfo name="RFC" value="7595"/>
          <seriesInfo name="DOI" value="10.17487/RFC7595"/>
        </reference>
        <reference anchor="A2A" target="https://a2aprotocol.ai">
          <front>
            <title>Agent-to-Agent Protocol Specification</title>
            <author>
              <organization>Linux Foundation</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="ACP">
          <front>
            <title>Agent Communication Protocol</title>
            <author>
              <organization>IBM Research</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="MCP" target="https://modelcontextprotocol.io">
          <front>
            <title>Model Context Protocol</title>
            <author>
              <organization>Anthropic</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="ANP">
          <front>
            <title>Agent Network Protocol</title>
            <author>
              <organization/>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="AGTP-CERT">
          <front>
            <title>AGTP Agent Certificate Extension</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-agent-cert-00"/>
        </reference>
        <reference anchor="AGTP-METHODS">
          <front>
            <title>AGTP Standard Extended Method Vocabulary</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-standard-methods-01"/>
        </reference>
        <reference anchor="HOOD2026">
          <front>
            <title>Semantic Method Naming and LLM Agent Accuracy: A Controlled Benchmark of REST/CRUD versus Agentive API Interface Design</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Working Paper" value="Available by request. March 2026."/>
        </reference>
        <reference anchor="AGTP-WEB3">
          <front>
            <title>AGTP Web3 Bridge Specification</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-web3-bridge-00"/>
        </reference>
        <reference anchor="AGTP-DISCOVER">
          <front>
            <title>AGTP Agent Discovery and Name Service</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-discovery-00"/>
        </reference>
        <reference anchor="AGTP-COMPOSITION">
          <front>
            <title>AGTP Composition with Agent Group Messaging Protocols</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-composition-00"/>
        </reference>
      </references>
    </references>
    <?line 2820?>

<section anchor="authority-scope-format">
      <name>Authority-Scope Format</name>
      <t>Authority-Scope values are expressed as a space-separated list of scope
tokens following the pattern: [domain]:[action] or [domain]:* for
full domain access. Tokens <strong>MUST</strong> be lowercase ASCII with a single colon
separator.</t>
      <t>Examples:</t>
      <artwork><![CDATA[
Authority-Scope: calendar:book calendar:query
Authority-Scope: documents:summarize documents:query knowledge:learn
Authority-Scope: *:query
Authority-Scope: booking:* payments:confirm
]]></artwork>
      <t>Reserved domains (initial set):</t>
      <table>
        <name>Reserved Authority-Scope Domains</name>
        <thead>
          <tr>
            <th align="left">Domain</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">calendar</td>
            <td align="left">Scheduling and time-based resource management</td>
          </tr>
          <tr>
            <td align="left">documents</td>
            <td align="left">Document access, summarization, and annotation</td>
          </tr>
          <tr>
            <td align="left">knowledge</td>
            <td align="left">Agent context and memory operations</td>
          </tr>
          <tr>
            <td align="left">booking</td>
            <td align="left">Reservation and resource allocation</td>
          </tr>
          <tr>
            <td align="left">payments</td>
            <td align="left">Financial transactions and confirmations</td>
          </tr>
          <tr>
            <td align="left">agents</td>
            <td align="left">Delegation and collaboration with other agents</td>
          </tr>
          <tr>
            <td align="left">escalation</td>
            <td align="left">Escalation routing and handler management</td>
          </tr>
          <tr>
            <td align="left">activation</td>
            <td align="left">Governed agent package activation (ACTIVATE method extension)</td>
          </tr>
          <tr>
            <td align="left">discovery</td>
            <td align="left">Agent discovery and capability query operations (DISCOVER, DESCRIBE)</td>
          </tr>
          <tr>
            <td align="left">budget</td>
            <td align="left">Resource budget declaration and QUOTE pre-flight operations</td>
          </tr>
          <tr>
            <td align="left">telemetry</td>
            <td align="left">Telemetry export and observability operations</td>
          </tr>
          <tr>
            <td align="left">zone</td>
            <td align="left">Network zone boundary declaration and enforcement</td>
          </tr>
          <tr>
            <td align="left">suspend</td>
            <td align="left">Session suspension and resumption operations</td>
          </tr>
          <tr>
            <td align="left">*</td>
            <td align="left">All domains require explicit grant; use with caution</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="example-agtp-wire-formats">
      <name>Example AGTP Wire Formats</name>
      <t>The following examples use a human-readable pseudo-wire format with
HTTP-style headers followed by a JSON body. The Content-Type for all AGTP
message bodies is application/agtp+json.</t>
      <section anchor="query-request-and-response">
        <name>QUERY Request and Response</name>
        <artwork><![CDATA[
AGTP/1.0 QUERY
Agent-ID: agt-7f3a9c2d
Principal-ID: usr-chris-hood
Authority-Scope: documents:query knowledge:query
Session-ID: sess-a1b2c3d4
Task-ID: task-0042
TTL: 3000
Content-Type: application/agtp+json

{
  "task_id": "task-0042",
  "parameters": {
    "intent": "Key arguments against MCP re: HTTP overhead",
    "scope": ["documents:research", "knowledge:session"],
    "format": "structured",
    "confidence_threshold": 0.75
  }
}

AGTP/1.0 200 OK
Task-ID: task-0042
Server-Agent-ID: srv-knowledge-01
Attribution-Record: [signed attribution token]
Content-Type: application/agtp+json

{
  "status": 200,
  "task_id": "task-0042",
  "result": {
    "results": [{"content": "...", "source": "doc-agtp-research",
                 "confidence": 0.91}],
    "result_count": 1
  }
}
]]></artwork>
      </section>
      <section anchor="book-request-and-response">
        <name>BOOK Request and Response</name>
        <artwork><![CDATA[
AGTP/1.0 BOOK
Agent-ID: agt-travel-planner
Principal-ID: usr-chris-hood
Authority-Scope: booking:* calendar:book
Session-ID: sess-trip-2026-04
Task-ID: task-0107
Priority: normal
Content-Type: application/agtp+json

{
  "method": "BOOK",
  "task_id": "task-0107",
  "parameters": {
    "resource_id": "flight-AA2847",
    "principal_id": "usr-chris-hood",
    "time_slot": "2026-04-15T08:00:00Z",
    "options": {"seat_preference": "aisle", "class": "economy"},
    "confirm_immediately": true
  }
}

AGTP/1.0 200 OK
Task-ID: task-0107
Attribution-Record: [signed attribution token]
Content-Type: application/agtp+json

{
  "status": 200,
  "task_id": "task-0107",
  "result": {
    "booking_id": "BK-2026-0107",
    "status": "confirmed",
    "resource_id": "flight-AA2847",
    "confirmation_code": "XQRT7Y"
  }
}
]]></artwork>
      </section>
      <section anchor="escalate-request-and-response">
        <name>ESCALATE Request and Response</name>
        <artwork><![CDATA[
AGTP/1.0 ESCALATE
Agent-ID: agt-procurement-03
Principal-ID: usr-finance-dept
Authority-Scope: booking:* payments:confirm
Session-ID: sess-procurement-q2
Task-ID: task-0881
Priority: urgent
Content-Type: application/agtp+json

{
  "method": "ESCALATE",
  "task_id": "task-0881",
  "parameters": {
    "task_id": "task-0880",
    "reason": "scope_limit",
    "context": {
      "attempted_action": "BOOK",
      "resource": "vendor-contract-750k",
      "block_reason": "Exceeds agent authorization threshold"
    },
    "recipient": "usr-cfo",
    "deadline": "2026-03-19T09:00:00Z"
  }
}

AGTP/1.0 202 Accepted
Task-ID: task-0881
Server-Agent-ID: srv-escalation-handler
Content-Type: application/agtp+json

{
  "status": 202,
  "task_id": "task-0881",
  "result": {
    "escalation_id": "ESC-0881",
    "routed_to": "usr-cfo",
    "status": "pending_review",
    "task_paused": true,
    "estimated_review_by": "2026-03-19T09:00:00Z"
  }
}
]]></artwork>
      </section>
    </section>
    <section anchor="comparison-table">
      <name>Comparison Table</name>
      <table>
        <name>AGTP Compared to Existing Approaches</name>
        <thead>
          <tr>
            <th align="left">Criterion</th>
            <th align="left">AGTP</th>
            <th align="left">HTTP/REST</th>
            <th align="left">gRPC</th>
            <th align="left">AGMP (MCP, A2A, ...)</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Intent-native methods</td>
            <td align="left">Yes (12 Tier 1)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">Partial</td>
          </tr>
          <tr>
            <td align="left">Intent semantics at protocol level</td>
            <td align="left">Native</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">Messaging layer only</td>
          </tr>
          <tr>
            <td align="left">Built-in agent identity</td>
            <td align="left">Yes</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Authority scope enforcement</td>
            <td align="left">Protocol-level</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">Application-layer</td>
          </tr>
          <tr>
            <td align="left">Built-in attribution/audit</td>
            <td align="left">Yes</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">Varies by impl.</td>
          </tr>
          <tr>
            <td align="left">Transport flexibility</td>
            <td align="left">TCP/UDP/QUIC</td>
            <td align="left">TCP/TLS</td>
            <td align="left">HTTP/2</td>
            <td align="left">HTTP</td>
          </tr>
          <tr>
            <td align="left">Escalation as first-class primitive</td>
            <td align="left">Yes</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Ecosystem maturity</td>
            <td align="left">Proposed</td>
            <td align="left">Mature</td>
            <td align="left">Mature</td>
            <td align="left">Emerging</td>
          </tr>
          <tr>
            <td align="left">Governance/observability</td>
            <td align="left">Native</td>
            <td align="left">Manual/bolt-on</td>
            <td align="left">Manual</td>
            <td align="left">Limited</td>
          </tr>
          <tr>
            <td align="left">Method registry extensibility</td>
            <td align="left">Yes (Expert Review)</td>
            <td align="left">Frozen (IETF Review)</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
          <tr>
            <td align="left">Open core / royalty-free</td>
            <td align="left">Yes</td>
            <td align="left">Yes</td>
            <td align="left">Yes</td>
            <td align="left">Yes</td>
          </tr>
          <tr>
            <td align="left">Agent Manifest Document</td>
            <td align="left">Native (.agtp format)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Tamper-proof identity surface</td>
            <td align="left">Yes (hash + signature)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Browser-accessible agent identity</td>
            <td align="left">Yes (read-only)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">URI collision prevention</td>
            <td align="left">Domain-anchored</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
          <tr>
            <td align="left">Agent Birth Certificate</td>
            <td align="left">Yes (genesis record)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Domain-expiry lifecycle handling</td>
            <td align="left">Specified</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
          <tr>
            <td align="left">Capability discovery</td>
            <td align="left">Native (DESCRIBE)</td>
            <td align="left">None</td>
            <td align="left">Reflection (partial)</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Resource budget enforcement</td>
            <td align="left">Native (Budget-Limit, 452)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Execution attestation (RATS)</td>
            <td align="left">Optional (RFC 9334)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Observability hooks</td>
            <td align="left">Native (Telemetry-Export)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Network zone enforcement</td>
            <td align="left">Native (AGTP-Zone-ID, 453)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Session suspension/recovery</td>
            <td align="left">Native (SUSPEND method)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">AGMP composition profiles</td>
            <td align="left">Normative appendix</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
        </tbody>
      </table>
      <t>HTTP's method registry (registered with IETF Review per <xref target="RFC9110"/>) is
effectively frozen for new semantic methods because any new HTTP method
must be backward-compatible with existing HTTP infrastructure globally.
AGTP's Expert Review + published spec procedure enables the protocol to
evolve its method vocabulary as the agent ecosystem develops, without
the backward-compatibility constraints of the HTTP method space.</t>
    </section>
    <section anchor="glossary">
      <name>Glossary</name>
      <dl>
        <dt>Agent:</dt>
        <dd>
          <t>A software system that executes tasks, makes decisions, and takes
actions without continuous human supervision per transaction.</t>
        </dd>
        <dt>AGMP (Agent Group Messaging Protocol):</dt>
        <dd>
          <t>The collective term for higher-layer AI agent messaging standards that
operate over AGTP as their transport substrate, including MCP, A2A, ACP,
and ANP. AGMPs define what agents say. AGTP defines how those messages
move. See Section 1.6.</t>
        </dd>
        <dt>Agent Birth Certificate:</dt>
        <dd>
          <t>A cryptographically signed identity document issued to an agent at
registration time by a governance platform. The genesis record of the
agent's existence; the source from which the canonical Agent-ID is
derived. Functions as the agent's social security number: issued once,
permanently bound, never reissued. See Section 6.7.</t>
        </dd>
        <dt>Agent Transfer Protocol (AGTP):</dt>
        <dd>
          <t>The application-layer protocol defined in this document, providing a
dedicated transport environment for agent traffic.</t>
        </dd>
        <dt>Agent-ID:</dt>
        <dd>
          <t>A unique identifier for a specific agent instance, present in all AGTP
request headers. In the base spec, derived from the Birth Certificate
hash. With <xref target="AGTP-CERT"/>, cryptographically bound to a verified identity.</t>
        </dd>
        <dt>Agent Manifest Document:</dt>
        <dd>
          <t>A signed <tt>application/agtp+json</tt> document returned when an <tt>agtp://</tt>
URI is resolved. Derived from the agent's <tt>.agent</tt> or <tt>.nomo</tt> package.
Contains identity, lifecycle state, trust tier, behavioral scope, and
birth certificate fields. Never contains executable content.</t>
        </dd>
        <dt>AGTP-Zone-ID:</dt>
        <dd>
          <t>A request header declaring the network zone or organizational boundary
within which a request must be processed. SEPs <strong>MUST</strong> enforce zone
boundaries and return 453 Zone Violation if a DELEGATE or COLLABORATE
request would route outside the declared zone.</t>
        </dd>
        <dt>Attribution Record:</dt>
        <dd>
          <t>A signed, logged record of an agent action, sufficient for audit and
compliance purposes. <strong>MAY</strong> include RATS attestation evidence per
<xref target="RFC9334"/> for hardware-rooted execution proof in high-stakes domains.</t>
        </dd>
        <dt>Authority-Scope:</dt>
        <dd>
          <t>A declared set of permissions defining what actions an agent is
authorized to take, expressed as space-separated domain:action tokens.</t>
        </dd>
        <dt>Budget-Limit:</dt>
        <dd>
          <t>A request header declaring the maximum resource consumption the principal
authorizes for a method invocation, expressed as space-separated
<tt>unit=value</tt> tokens from the IANA AGTP Budget Unit Registry. Exceeding
the declared limit causes 452 Budget Exceeded.</t>
        </dd>
        <dt>Delegation Chain:</dt>
        <dd>
          <t>An ordered record of Agent-IDs representing the sequence of delegations
that led to the current request.</t>
        </dd>
        <dt>DESCRIBE:</dt>
        <dd>
          <t>An AGTP Tier 1 core method returning the declared capabilities, supported
modalities, method vocabulary, and versioned feature set of a specific
agent endpoint. Used for pre-task negotiation. Category: ACQUIRE.</t>
        </dd>
        <dt>ESCALATE:</dt>
        <dd>
          <t>An AGTP method representing an agent's intentional deferral of a decision
or action to a human principal or higher-authority agent. A first-class
method, not a failure code.</t>
        </dd>
        <dt>Governance Token:</dt>
        <dd>
          <t>A signed, time-limited JWT artifact encoding a specific governance verdict
for a specific action. The runtime companion to the Birth Certificate.
Default TTL: 30 seconds. Must not be reused.</t>
        </dd>
        <dt>Intent Verb:</dt>
        <dd>
          <t>An AGTP method name expressing the agent's purpose, as distinguished from
HTTP resource-operation verbs (GET, POST, PUT, DELETE).</t>
        </dd>
        <dt>Method Registry:</dt>
        <dd>
          <t>The IANA-maintained registry of valid AGTP method names and their
specifications. Registration requires Expert Review and a published
specification.</t>
        </dd>
        <dt>Principal:</dt>
        <dd>
          <t>The human, organization, or system that authorized an agent to act and
is accountable for its actions.</t>
        </dd>
        <dt>Principal-ID:</dt>
        <dd>
          <t>The identifier of the principal on whose behalf an agent operates,
present in all AGTP request headers.</t>
        </dd>
        <dt>Scope-Enforcement Point (SEP):</dt>
        <dd>
          <t>An AGTP-aware infrastructure component, load balancer, gateway, proxy,
that enforces Authority-Scope and AGTP-Zone-ID compliance on AGTP
requests without application-layer access. Requires <xref target="AGTP-CERT"/>.</t>
        </dd>
        <dt>Scope Violation (451):</dt>
        <dd>
          <t>An AGTP status code returned when an agent requests an action outside its
declared Authority-Scope. A governance signal, not a protocol error.
<strong>MUST</strong> be logged.</t>
        </dd>
        <dt>Session:</dt>
        <dd>
          <t>An AGTP persistent connection context shared across multiple method
invocations within a single agent workflow.</t>
        </dd>
        <dt>SUSPEND (method):</dt>
        <dd>
          <t>An AGTP Tier 1 core method that places a specific active session into a
recoverable paused state, issuing a single-use base64url-encoded 128-bit
resumption nonce. Session-scoped; does not affect registry lifecycle state.
Category: ORCHESTRATE.</t>
        </dd>
        <dt>Trust Tier:</dt>
        <dd>
          <t>A classification (1, 2, or 3) assigned to an agent at registration based
on the strength of identity verification. Tier 1 requires DNS-anchored
domain verification and a <tt>.nomo</tt> governed package. Tier 2 is org-asserted
without DNS verification. Tier 3 is experimental, not production-eligible.</t>
        </dd>
        <dt>551 Authority Chain Broken:</dt>
        <dd>
          <t>An AGTP status code returned when one or more entries in the
Delegation-Chain header cannot be verified as part of a valid and
continuous delegation sequence. <strong>MUST</strong> be logged.</t>
        </dd>
      </dl>
    </section>
    <section anchor="agtp-composition-with-agmps">
      <name>AGTP Composition with AGMPs</name>
      <t>This appendix provides normative mapping guidance for carrying AGMP
messages (MCP, A2A, ACP) over AGTP as their transport substrate. Full
composition specifications are provided in <xref target="AGTP-COMPOSITION"/>; this
appendix provides the canonical mapping table and precedence rules.</t>
      <section anchor="precedence-rule">
        <name>Precedence Rule</name>
        <t>AGTP headers (Agent-ID, Principal-ID, Authority-Scope, Delegation-Chain)
take precedence over equivalent fields in the messaging-layer payload for
routing, enforcement, and audit purposes. Infrastructure components including
SEPs and governance gateways <strong>MUST</strong> use AGTP header values for all
protocol-level decisions. Messaging-layer identity fields <strong>MAY</strong> be present
in the body for application-layer use but <strong>MUST NOT</strong> override AGTP header
values.</t>
      </section>
      <section anchor="agmp-to-agtp-canonical-mapping">
        <name>AGMP-to-AGTP Canonical Mapping</name>
        <table>
          <name>AGMP-to-AGTP Canonical Mapping</name>
          <thead>
            <tr>
              <th align="left">AGMP</th>
              <th align="left">Concept</th>
              <th align="left">AGTP Mapping</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Task</td>
              <td align="left">AGTP DELEGATE body; A2A <tt>task.id</tt> maps to Task-ID header</td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Capability</td>
              <td align="left">AGTP DESCRIBE response; <tt>capability_domains</tt></td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Agent Card</td>
              <td align="left">AGTP Agent Manifest Document</td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Provenance chain</td>
              <td align="left">AGTP Delegation-Chain header</td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Artifact</td>
              <td align="left">AGTP NOTIFY body with <tt>content_type: artifact</tt></td>
            </tr>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Tool call</td>
              <td align="left">AGTP QUERY or NOTIFY body</td>
            </tr>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Context / conversation state</td>
              <td align="left">AGTP Session-ID header + LEARN method</td>
            </tr>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Sampling / inference request</td>
              <td align="left">AGTP QUERY with <tt>modality: inference</tt></td>
            </tr>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Resource</td>
              <td align="left">AGTP QUERY with appropriate <tt>scope</tt></td>
            </tr>
            <tr>
              <td align="left">ACP</td>
              <td align="left">Agent-to-agent message</td>
              <td align="left">AGTP NOTIFY or COLLABORATE body</td>
            </tr>
            <tr>
              <td align="left">ACP</td>
              <td align="left">Capability advertisement</td>
              <td align="left">AGTP DESCRIBE response</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="wire-example-a2a-task-over-agtp">
        <name>Wire Example: A2A Task over AGTP</name>
        <artwork><![CDATA[
AGTP/1.0 DELEGATE
Agent-ID: agtp://agtp.acme.tld/agents/orchestrator
Principal-ID: usr-chris-hood
Authority-Scope: agents:delegate documents:query
Delegation-Chain: agtp://agtp.acme.tld/agents/orchestrator
Session-ID: sess-a1b2c3d4
Task-ID: task-0099
Content-Schema: https://a2aprotocol.ai/schema/task/v1
Content-Type: application/agtp+json

{
  "method": "DELEGATE",
  "task_id": "task-0099",
  "parameters": {
    "target_agent_id": "agtp://agtp.acme.tld/agents/analyst",
    "authority_scope": "documents:query",
    "delegation_token": "[signed token]",
    "task": {
      "a2a_task_id": "a2a-task-7f3a",
      "message": "Summarize Q1 financial reports",
      "artifacts": []
    }
  }
}
]]></artwork>
      </section>
      <section anchor="wire-example-mcp-tool-call-over-agtp">
        <name>Wire Example: MCP Tool Call over AGTP</name>
        <artwork><![CDATA[
AGTP/1.0 QUERY
Agent-ID: agtp://agtp.acme.tld/agents/assistant
Principal-ID: usr-chris-hood
Authority-Scope: documents:query knowledge:query
Session-ID: sess-mcp-b2c3d4
Task-ID: task-0100
Content-Schema: https://modelcontextprotocol.io/schema/tool-call/v1
Content-Type: application/agtp+json

{
  "method": "QUERY",
  "task_id": "task-0100",
  "parameters": {
    "intent": "web_search",
    "modality": "tool",
    "mcp_tool_name": "web_search",
    "mcp_tool_input": {"query": "IETF agent protocol drafts 2026"}
  }
}
]]></artwork>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
