<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.38 (Ruby 3.2.3) -->
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hood-independent-agtp-07" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="AGTP">Agent Transfer Protocol (AGTP)</title>
    <seriesInfo name="Internet-Draft" value="draft-hood-independent-agtp-07"/>
    <author fullname="Chris Hood">
      <organization>Nomotic, Inc.</organization>
      <address>
        <email>chris@nomotic.ai</email>
        <uri>https://nomotic.ai</uri>
      </address>
    </author>
    <date year="2026" month="May" day="12"/>
    <area>Applications and Real-Time</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>AI agents</keyword>
    <keyword>agentic systems</keyword>
    <keyword>protocol</keyword>
    <keyword>agent traffic</keyword>
    <keyword>agent transfer</keyword>
    <abstract>
      <?line 138?>

<t>AI agents and agentic systems generate a growing volume of intent-driven,
unstructured, and undifferentiated traffic that flows through HTTP
indistinguishably from human-initiated requests. HTTP lacks the semantic
vocabulary, observability primitives, and identity mechanisms required by
agent systems operating at scale. Existing protocols described as Agent
Group Messaging Protocols (AGMP), including MCP, ACP, A2A, and ANP, are
messaging-layer constructs that presuppose HTTP as their transport.
They do not address the underlying transport problem.</t>
      <t>This document defines the Agent Transfer Protocol (AGTP): a dedicated
application-layer protocol for AI agent traffic. AGTP is a runtime
contract negotiation substrate (RCNS): a transport that fixes only a
twelve-method protocol floor and negotiates any additional method
surface at runtime between agent and server in a single round-trip,
governed by the AGTP-API companion specification <xref target="AGTP-API"/>, which
defines the curated method catalog, path grammar, endpoint primitive, and
synthesis semantics. Version 07 confirms the
IANA-registered <tt>agtp://</tt> URI scheme and IANA-assigned port 4480 for
TCP/TLS and QUIC, formalizes Form 1a URI grammar
(<tt>agtp://{agent-id}@{host}</tt>) for direct addressing, renames the Agent
Manifest Document to the Agent Identity Document with an enumerated
schema, redesigns the protocol-defined method floor to a 12-method set
organized as six cognitive verbs (QUERY, DISCOVER, DESCRIBE, SUMMARIZE,
PLAN, PROPOSE) and six mechanics verbs (EXECUTE, DELEGATE, ESCALATE,
CONFIRM, SUSPEND, NOTIFY), establishes AGTP as a substrate for
higher-level agent frameworks (MCP, A2A, ACP) carried as content types
inside AGTP method invocations, renumbers AGTP-specific status codes out
of HTTP-assigned space to avoid semantic collision, mandates explicit
Content-Length framing with a prohibition on TLS socket-level half-close,
adds a <tt>.well-known/agtp</tt> bootstrap convention per RFC 8615, deprecates
the AGIS reference and the proposed AGTP-Methods specification by
folding both into the unified AGTP-API contract layer, adds status
codes 405 (Method Not Allowed), 459 (Method Violation), and 460
(Endpoint Violation) per the AGTP-API contract model, and adopts
"Agent Genesis" as the canonical term for the permanent signed
origin document. Version 06 prepared
the IANA Service Name and Port Number application and consolidated the
URI scheme registration. Version 05 restored the canonical Agent-ID as
the primary identity primitive and decoupled Trust Tier 1 verification
from DNS as a sole requirement. A canonical Agent-ID is derived from the
agent's Agent Genesis hash and is authoritative in every AGTP
protocol operation. Three equivalent verification paths are recognized
for Trust Tier 1: DNS-anchored verification via RFC 8555 ACME challenge,
log-anchored verification via Agent Genesis inclusion in an
append-only transparency log aligned with RFC 9162 and RFC 9943 (SCITT),
and hybrid verification combining DNS control with blockchain address
ownership. Version 04 introduced
normative integration hooks for the AGTP Merchant Identity and Agentic
Commerce Binding specification <xref target="AGTP-MERCHANT"/>, which defines the
merchant-side identity model that complements AGTP's agent-side
identity model. AGTP SHOULD prefer QUIC for new implementations and
MUST support TCP/TLS for compatibility and fallback. It is designed to
be composable with existing agent frameworks, not to replace them.</t>
    </abstract>
  </front>
  <middle>
    <?line 194?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><strong>Note Regarding Intellectual Property:</strong>  Implementers should be
aware that extensions and certain mechanisms referenced in this
document -- including the Agent Certificate extension (Section 7.2),
the ACTIVATE method, the Agent Genesis mechanism
(Section 5.7), and the <tt>.agent</tt> and <tt>.nomo</tt> file format
specifications (Section 2) -- may be subject to pending patent
applications by the author.  The core AGTP specification is intended
for open implementation without royalty obligation.  The licensor is
prepared to grant a royalty-free license to implementers consistent
with <xref target="RFC8179"/>.  IPR disclosures:
https://datatracker.ietf.org/ipr/ -- see also Section 7.7.</t>
      <section anchor="background">
        <name>Background</name>
        <t>The deployment of AI agents and multi-agent systems is accelerating
across enterprise, research, and consumer contexts. These systems execute
complex, multi-step workflows, querying data sources, booking resources,
delegating subtasks to peer agents, and escalating decisions to human
principals, with minimal or no human supervision per transaction.</t>
        <t>Unlike human-initiated web traffic, agent-generated traffic is dynamic,
high-frequency, intent-driven, and often stateful across sequences of
related requests. The infrastructure carrying this traffic was not
designed with these properties in mind.</t>
      </section>
      <section anchor="limitations-of-http-for-agent-traffic">
        <name>Limitations of HTTP for Agent Traffic</name>
        <t>HTTP has served as the internet's primary application-layer transport for
over three decades. Its evolution through HTTP/2 <xref target="RFC7540"/> and HTTP/3
<xref target="RFC9114"/> has improved performance, multiplexing, and latency. However,
the fundamental model of HTTP being stateless, resource-oriented,
human-initiated request/response, creates specific failures when applied
to agentic systems at scale:</t>
        <ul spacing="normal">
          <li>
            <t>Traffic indistinguishability: Agent-generated requests are structurally
identical to human-initiated requests at the transport layer. Operators
cannot identify, route, or govern agent traffic without application-layer
instrumentation.</t>
          </li>
          <li>
            <t>Method vocabulary mismatch: HTTP's method set (GET, POST, PUT, DELETE,
PATCH) describes resource operations. Agent traffic expresses purposeful
intent, summarize, book, delegate, escalate. The mismatch forces intent
into request bodies, invisible to protocol-level handlers.</t>
          </li>
          <li>
            <t>Identity and attribution absence: HTTP carries no native mechanism for
asserting agent identity, declared authority scope, or the principal
accountable for an agent's actions.</t>
          </li>
          <li>
            <t>Session semantics mismatch: HTTP's stateless model is optimized for
isolated request/response cycles. Agent workflows are inherently stateful
sequences.</t>
          </li>
        </ul>
      </section>
      <section anchor="why-not-evolve-http">
        <name>Why Not Evolve HTTP?</name>
        <t>A natural question is whether these limitations could be addressed by
extending HTTP rather than defining a new protocol. There are three
specific reasons why HTTP extension is not the preferred path.</t>
        <t>First, the HTTP method registry is effectively frozen for new semantics.
<xref target="RFC9110"/> defines the HTTP method registry with IETF Review as the
registration procedure, meaning new methods require a full IETF consensus
process and must be backward-compatible with existing HTTP implementations.
Adding intent-based verbs (SUMMARIZE, DELEGATE, ESCALATE) to HTTP would
require every HTTP client, server, proxy, and middleware component to ignore
or handle unknown methods gracefully, a compatibility constraint that limits
how agent-specific semantics can be expressed at the protocol level.</t>
        <t>Second, HTTP carries decades of backward-compatibility constraints. Features
such as persistent agent identity headers, authority scope declarations, and
session-level governance semantics would require HTTP extensions that interact
unpredictably with existing caching, proxy, and CDN behavior designed for
human-generated traffic patterns.</t>
        <t>Third, the observability goal making agent traffic distinguishable from
human traffic at the infrastructure layer cannot be achieved by adding
fields to HTTP. Infrastructure components route and filter HTTP traffic
based on methods and headers that are identical across agent and human
requests. A protocol-level separation is necessary to give infrastructure
the signal it needs.</t>
        <t>AGTP is therefore designed as a dedicated protocol rather than an HTTP
extension. HTTP and AGTP coexist: human traffic continues to flow over
HTTP; agent traffic flows over AGTP. The two protocols serve different
classes of network participant.</t>
        <t>Note: The abbreviation AGTP is used in this document to distinguish
the Agent Transfer Protocol from the Authenticated Transfer Protocol
(ATP) working group currently chartered within the IETF. The URI
agtp:// is proposed for IANA registration as a new and distinct scheme.</t>
      </section>
      <section anchor="motivation-for-a-dedicated-protocol">
        <name>Motivation for a Dedicated Protocol</name>
        <t>These limitations are architectural, not implementational. They cannot be
resolved by better middleware or application code layered on HTTP. They
require a protocol designed from first principles for AI agent systems.</t>
        <t>AGTP is that protocol. It provides a dedicated transport environment for
agent traffic with: native intent-based methods, mandatory agent identity
headers, protocol-level authority scope declaration, and a status code
vocabulary for the conditions AI systems encounter.</t>
      </section>
      <section anchor="scope-and-target-audience">
        <name>Scope and Target Audience</name>
        <t>This document covers AGTP architecture, design principles, stack position,
request and response header format, agent-native method definitions and
semantics, status code vocabulary, security considerations, and IANA
considerations.</t>
        <t>The Agent Certificate extension for cryptographic binding of agent
identity to AGTP header fields is described at a high level in Section 7.2.
Full specification is provided in a separate companion document:
<xref target="AGTP-CERT"/>. That extension may be subject to pending intellectual
property claims; see Section 7.7 and the IPR Notice preceding the Abstract.</t>
        <t>Merchant-side identity verification for PURCHASE counterparties is
described at a high level in Section 8 of this document and specified
in full in a separate companion: <xref target="AGTP-MERCHANT"/>. This document
registers the merchant-related request headers, the 458 Counterparty
Unverified status code, and the <tt>merchant</tt> and <tt>intent</tt> Authority-Scope
domains; the Merchant Manifest Document, Merchant Agent Genesis,
counterparty verification procedure, and Intent Assertion JWT format
are specified in the companion.</t>
        <t>Target audience: AI agent developers, protocol designers, cloud and network
infrastructure providers, enterprise security and compliance architects, and
standards community participants.</t>
      </section>
      <section anchor="agtp-as-the-transport-foundation-for-agent-group-messaging-protocols">
        <name>AGTP as the Transport Foundation for Agent Group Messaging Protocols</name>
        <t>AGTP is the purpose-built transport and governance layer for Agent Group
Messaging Protocols (AGMPs): the category of higher-layer AI agent messaging
standards that includes the Model Context Protocol (MCP) <xref target="MCP"/>, the
Agent-to-Agent Protocol (A2A) <xref target="A2A"/>, the Agent Communication Protocol
(ACP) <xref target="ACP"/>, and emerging others.</t>
        <t>AGMPs define what agents say. AGTP defines how those messages move, who
sent them, and under what authority. AGTP provides the narrow-waist
foundation that AGMPs inherit without modification: intent-native methods,
mandatory agent identity and scoping, resource budget enforcement,
observability hooks, and normative composition profiles. A deployment
running any AGMP over AGTP gains transport-level governance without changes
to the messaging layer.</t>
        <t>The AGMP category term is introduced in this document to provide a stable
collective reference for the class of protocols that AGTP serves as
substrate. It is not a formal IETF term of art; it is a descriptive
classification. Individual AGMP specifications retain their own names and
development paths. AGTP does not govern, modify, or supersede any AGMP.</t>
        <figure anchor="agmp-stack">
          <name>AGTP as Substrate for AGMPs</name>
          <artwork><![CDATA[
+-----------------------------------------------------+
|            Agent Application Logic                  |
+-----------------------------------------------------+
|  AGMP Layer: MCP / A2A / ACP / ANP  [optional]      |
+-----------------------------------------------------+
|   AGTP - Agent Transfer Protocol      [this spec]    |
+-----------------------------------------------------+
|            TLS 1.3+                  [mandatory]    |
+-----------------------------------------------------+
|         TCP / QUIC / UDP                            |
+-----------------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<strong>MUST</strong>", "<strong>MUST NOT</strong>", "<strong>REQUIRED</strong>", "<strong>SHALL</strong>",
"<strong>SHALL NOT</strong>", "<strong>SHOULD</strong>", "<strong>SHOULD NOT</strong>", "<strong>RECOMMENDED</strong>",
"<strong>NOT RECOMMENDED</strong>", "<strong>MAY</strong>", and "<strong>OPTIONAL</strong>" in this document
are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when,
and only when, they appear in all capitals.</t>
      <dl>
        <dt>Agent:</dt>
        <dd>
          <t>An AI software system that executes tasks, makes decisions, and takes
actions without continuous human supervision per transaction.</t>
        </dd>
        <dt>Principal:</dt>
        <dd>
          <t>The human, organization, or system that authorized an agent to act and
is accountable for its actions.</t>
        </dd>
        <dt>Agent-ID:</dt>
        <dd>
          <t>A unique identifier for a specific agent instance. Carried in the
<tt>Agent-ID</tt> request header on non-anonymous AGTP requests, and in
the <tt>agent_id</tt> field of the Agent Identity Document.</t>
        </dd>
        <dt>Principal-ID:</dt>
        <dd>
          <t>The identifier of the principal on whose behalf an agent operates.
Carried in the agent identity document referenced by <tt>Agent-ID</tt>;
not transmitted as a separate request header.</t>
        </dd>
        <dt>Authority-Scope:</dt>
        <dd>
          <t>A declared set of permissions defining what actions an agent is
authorized to take, in the format <tt>domain:action</tt> or <tt>domain:*</tt>.
Declared in the agent's identity document. <strong>MAY</strong> be carried on
individual requests as a claimed-scopes header narrowing the
agent's full authorized set to those needed for the request;
claimed scopes <strong>MUST</strong> be a subset of the document's declared
set.</t>
        </dd>
        <dt>Intent Method:</dt>
        <dd>
          <t>An AGTP method name expressing the agent's purpose, as distinguished from
HTTP resource-operation verbs.</t>
        </dd>
        <dt>Delegation Chain:</dt>
        <dd>
          <t>An ordered record of Agent-IDs representing the sequence of delegations
that produced the current request.</t>
        </dd>
        <dt>Escalation:</dt>
        <dd>
          <t>An agent's intentional deferral of a decision or action to a human
principal or higher-authority agent.</t>
        </dd>
        <dt>Attribution Record:</dt>
        <dd>
          <t>A logged record of an agent action sufficient for audit and compliance
purposes.</t>
        </dd>
        <dt>Session:</dt>
        <dd>
          <t>An AGTP persistent connection context shared across multiple method
invocations within a single agent workflow.</t>
        </dd>
        <dt>SEP (Scope-Enforcement Point):</dt>
        <dd>
          <t>An AGTP-aware infrastructure component, load balancer, gateway, and proxy,
that enforces Authority-Scope compliance without application-layer access.
Requires the Agent Certificate extension (<xref target="AGTP-CERT"/>).</t>
        </dd>
        <dt>Agent Package (.agent):</dt>
        <dd>
          <t>A portable, open deployment artifact for an AI agent. An <tt>.agent</tt> file
contains an embedded Agent Manifest, an integrity hash covering all
package contents, and a behavioral trust score computed at packaging
time. The <tt>.agent</tt> format is an open specification. It is analogous to
a container image: a self-describing, portable unit of deployment. The
<tt>.agent</tt> suffix is a file format designator and <strong>MUST NOT</strong> appear as
a hostname component or top-level label in <tt>agtp://</tt> URIs. Note: the
<tt>.agent</tt> file format specification may be subject to pending patent
claims by the author; see Section 7.7.</t>
        </dd>
        <dt>Governed Agent Package (.nomo):</dt>
        <dd>
          <t>A deployment artifact in the <tt>.nomo</tt> format, which extends the <tt>.agent</tt>
format with a CA-signed certificate chain binding the package to a
verified governance zone and issuing principal. The <tt>.nomo</tt> format is
to <tt>.agent</tt> as HTTPS is to HTTP: the same structural foundation with
an added layer of cryptographic trust. A <tt>.nomo</tt> package is required
for agents operating at Trust Tier 1 (see Section 5.2). The <tt>.nomo</tt>
suffix is a file format designator and <strong>MUST NOT</strong> appear as a
hostname component in <tt>agtp://</tt> URIs.
</t>
          <t>The name derives from the Greek <em>nomos</em> (νόμος), meaning law, rule,
or governance, the same root that underlies <em>autonomy</em> (self-law),
<em>nomocracy</em> (rule of law), and <em>onomastics</em>. A <tt>.nomo</tt> package is
literally an agent operating under law: its behavior is bounded by a
cryptographically enforced governance context at the packaging layer.
Note: the <tt>.nomo</tt> file format specification may be subject to pending
patent claims by the author; see Section 7.7.</t>
        </dd>
        <dt>Agent Transfer Document (.agtp):</dt>
        <dd>
          <t>The wire-level manifest document format defined by this specification.
An <tt>.agtp</tt> document is a signed JSON structure containing the fields
defined in Section 5.5 (Agent Identity Document). It is the output
format returned by all AGTP URI resolution requests. Both <tt>.agent</tt> and
<tt>.nomo</tt> packages produce <tt>.agtp</tt> documents when queried; the <tt>.agtp</tt>
format is the protocol's canonical representation of agent identity
and is independent of the underlying packaging format. The <tt>.agtp</tt>
suffix <strong>MAY</strong> appear in filenames for stored manifest documents but
<strong>MUST NOT</strong> appear in <tt>agtp://</tt> URIs. The Content-Type for <tt>.agtp</tt>
documents is <tt>application/vnd.agtp+json</tt>.</t>
        </dd>
        <dt>URI (AGTP):</dt>
        <dd>
          <t>An <tt>agtp://</tt> scheme URI that identifies an agent or agent namespace.
AGTP URIs are addresses, not filenames. File extensions (<tt>.agent</tt>,
<tt>.nomo</tt>, <tt>.agtp</tt>) <strong>MUST NOT</strong> appear in canonical AGTP URIs. See
Section 5.1 for the canonical URI forms and resolution semantics.</t>
        </dd>
        <dt>Agent Namespace Document:</dt>
        <dd>
          <t>A cryptographically signed <tt>application/vnd.agtp+json</tt> document returned
in response to a request targeting an organization's agent registry
root (e.g., <tt>agtp://acme.tld/agents</tt>). Lists all Active agents
registered under the organization's governance zone. The document is
generated and re-signed by the governance platform on any registry
change. It is not a manually editable file. See Section 5.4.</t>
        </dd>
        <dt>Agent Identity Document:</dt>
        <dd>
          <t>A cryptographically signed <tt>application/vnd.agtp+json</tt> document returned
in response to a request targeting a specific agent
(e.g., <tt>agtp://acme.tld/agents/customer-service</tt>). Contains the
agent's Agent Genesis fields, lifecycle state, behavioral trust
score, authority scope categories, supported methods, and governance
zone. Derived directly from the agent's <tt>.agent</tt> or <tt>.nomo</tt> package;
the package integrity hash is verified before the manifest is served.
See Section 5.5.</t>
        </dd>
        <dt>Agent Genesis:</dt>
        <dd>
          <t>A cryptographically signed origin document issued to an agent at
registration time by a governance platform. The Agent Genesis is
the genesis record of an agent's existence: it establishes the
agent's identity, ownership, authorized scope, behavioral archetype,
and governance zone before the agent takes any action. Authority is
issued through the Agent Genesis; it is never self-assumed.
</t>
          <t>The Agent Genesis is the source document from which the Agent
Identity Document (Section 6.4) is derived when an AGTP URI is
resolved. The <tt>certificate_hash</tt> field of the Agent Genesis is the
basis for the agent's canonical Agent-ID. In this sense the Agent
Genesis functions as the agent's permanent origin record: issued
once at creation, permanently bound to the agent, and the
authoritative identity record from which all other identity
representations derive.</t>
          <t>Agent Genesis fields map to AGTP protocol elements: <tt>agent_id</tt>
maps to the <tt>Agent-ID</tt> header on every request; <tt>owner</tt> is the
principal identifier recorded in the agent identity document
referenced by <tt>Agent-ID</tt> (not a separate header); <tt>scope</tt> is the
Authority-Scope set declared in the agent identity document,
optionally narrowed per-request via the <tt>Authority-Scope</tt> header.
See Section 5.7.</t>
          <t>Anonymous agents are ungovernable. Without an Agent Genesis, there
is no mechanism to trace decisions to a responsible principal,
enforce scope boundaries, or maintain a meaningful audit trail.</t>
          <t>The taxonomy is: <strong>Agent Genesis</strong> (the permanent signed governance-
layer origin document) → <strong>canonical Agent-ID</strong> (the 256-bit hash
of the Agent Genesis, used in all AGTP protocol operations) →
<strong>Agent Certificate</strong> (an optional X.509 v3 credential for TLS
mutual authentication; specified in <xref target="AGTP-CERT"/>). Note: the
Agent Genesis mechanism may be subject to pending patent claims
by the author; see Section 7.7.</t>
        </dd>
        <dt>Governance Token:</dt>
        <dd>
          <t>A signed, time-limited JWT artifact issued by a governance runtime
that encodes a specific governance decision for a specific action.
Governance tokens are the runtime companion to the static Agent
Genesis: where the Agent Genesis establishes persistent
identity, the Governance Token carries a bounded authorization for a
single action or session. Tokens carry the governance verdict
(ALLOW, DENY), the agent ID, action details, trust score dimensions,
issuer identity, and expiry. Default TTL: 30 seconds. Tokens
<strong>MUST NOT</strong> be reused across actions; each action requires a fresh
evaluation and a fresh token.</t>
        </dd>
        <dt>Trust Tier:</dt>
        <dd>
          <t>A classification assigned to an agent based on the strength of
identity verification backing its registration. Tier 1 (Verified):
org anchor is a real DNS domain with confirmed ownership and a <tt>.nomo</tt>
governed package. Tier 2 (Org-Asserted): org label is present but
DNS ownership is unverified; <tt>.agent</tt> package acceptable. Tier 3
(Experimental): X- prefix required; not discoverable through the
public AGTP registry. See Section 5.2.</t>
        </dd>
        <dt>AGMP (Agent Group Messaging Protocol):</dt>
        <dd>
          <t>The collective term for higher-layer AI agent messaging standards
that operate over AGTP as their transport substrate, including
MCP <xref target="MCP"/>, A2A <xref target="A2A"/>, ACP <xref target="ACP"/>, and ANP <xref target="ANP"/>. AGMPs
define what agents say to each other. AGTP defines how those
messages move. The term is introduced in this document as a
descriptive classification; it is not a formal IETF term of art.</t>
        </dd>
        <dt>DESCRIBE:</dt>
        <dd>
          <t>An AGTP cognitive floor method that returns the declared capabilities,
supported modalities, method vocabulary, and versioned feature set
of a specific agent endpoint. Distinguished from URI resolution
(which returns identity) by returning operational capability
metadata suitable for pre-task negotiation. If the
<tt>capability_domains</tt> parameter is omitted, the server <strong>SHOULD</strong>
return all supported domains. Category: ACQUIRE.</t>
        </dd>
        <dt>SUSPEND (method):</dt>
        <dd>
          <t>An AGTP mechanics floor method that places a specific active session
workflow into a recoverable paused state, issuing a resumption
nonce for re-entry. Distinguished from the lifecycle SUSPEND event
(Section 6.7.6): method-level SUSPEND is session-scoped and does
not affect the agent's registry lifecycle state or Agent Genesis
validity. Category: ORCHESTRATE.</t>
        </dd>
        <dt>Budget-Limit:</dt>
        <dd>
          <t>A request header declaring the maximum resource consumption the
principal authorizes for a method invocation, expressed as
comma-separated <tt>unit=value</tt> tokens drawn from the IANA AGTP Budget
Unit Registry per <xref target="RFC9110"/> list-valued header conventions.
Example: <tt>Budget-Limit: tokens=5000, compute-seconds=120,
financial=10.00USD, ttl=3600</tt>. Exceeding the declared limit
<strong>MUST</strong> cause the server to return 456 Budget Exceeded rather
than continue execution. Note: ttl= is RECOMMENDED to bound budget
lifetime. Reserved for v01+ per <xref target="header-format"/>.</t>
        </dd>
        <dt>AGTP-Zone-ID:</dt>
        <dd>
          <t>A request header declaring the network zone or organizational
boundary within which a request must be processed. Scope-Enforcement
Points (SEPs) <strong>MUST</strong> enforce zone boundaries and <strong>MUST</strong> return
457 Zone Violation if a DELEGATE request would route
outside the declared zone.</t>
        </dd>
      </dl>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>AGTP is motivated by three distinct, compounding failures in how current
internet infrastructure handles AI agent traffic.</t>
      <section anchor="problem-1-undifferentiated-agent-traffic-on-http">
        <name>Problem 1: Undifferentiated Agent Traffic on HTTP</name>
        <t>AI agents generate intent-driven, structured traffic that is functionally
invisible to the infrastructure it traverses. This traffic flows through
HTTP alongside human traffic with no protocol-level differentiation.
Observability failure, routing inefficiency, and security blindness result,
operators cannot determine what fraction of traffic is agent-generated
without application-layer instrumentation that is expensive, inconsistent,
and easy to circumvent.</t>
        <t>AGTP response: a dedicated protocol environment for agent traffic.
Infrastructure can distinguish, route, monitor, and govern agent traffic
natively.</t>
      </section>
      <section anchor="problem-2-semantic-mismatch-between-agent-intent-and-available-methods">
        <name>Problem 2: Semantic Mismatch Between Agent Intent and Available Methods</name>
        <t>AI agents operate on intent. HTTP's method vocabulary was designed to
describe operations on resources, not purposeful action. When an agent
intends to SUMMARIZE a document, EXECUTE a reservation, and PLAN a sequence,
all three arrive as POST requests. The server receives identical verbs
with meaningfully different intent buried in request bodies, invisible to
any protocol-level handler.</t>
        <t>AGTP response: a vocabulary of agent-native methods that express intent at
the protocol level.</t>
      </section>
      <section anchor="problem-3-no-protocol-level-identity-authority-or-attribution-for-agents">
        <name>Problem 3: No Protocol-Level Identity, Authority, or Attribution for Agents</name>
        <t>When an AI agent takes an action, there is currently no protocol-level
mechanism to verify who authorized this agent, what scope of authority it
holds, which principal is accountable for its actions, or whether it is
the agent it claims to be. Accountability gaps, authority laundering,
auditability failure, and multi-agent trust collapse result.</t>
        <t>AGTP response: agent identity and authority scope embedded in protocol
headers on every request, with an optional Agent Certificate extension for
cryptographic verification.</t>
      </section>
      <section anchor="problem-summary">
        <name>Problem Summary</name>
        <table>
          <name>Summary of Problems Addressed by AGTP</name>
          <thead>
            <tr>
              <th align="left">#</th>
              <th align="left">Problem</th>
              <th align="left">Current Failure</th>
              <th align="left">AGTP Response</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">Undifferentiated traffic</td>
              <td align="left">HTTP cannot separate agent traffic</td>
              <td align="left">Dedicated protocol environment</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">Semantic mismatch</td>
              <td align="left">HTTP verbs obscure agent intent</td>
              <td align="left">Native intent-based method vocabulary</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">No protocol-level identity</td>
              <td align="left">Attribution is untraceable</td>
              <td align="left">Agent identity and scope in headers</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="related-work-and-existing-approaches">
      <name>Related Work and Existing Approaches</name>
      <section anchor="httprest-as-the-de-facto-standard">
        <name>HTTP/REST as the De Facto Standard</name>
        <t>HTTP remains the universal transport for all agent traffic currently
deployed. REST conventions layered on HTTP provide a degree of semantic
structure, but REST remains a resource-manipulation paradigm. As described
in Section 1.3, evolving HTTP to address agent-specific needs is
constrained by the frozen method registry, backward-compatibility
requirements, and the impossibility of achieving infrastructure-level
traffic differentiation through HTTP extensions alone.</t>
      </section>
      <section anchor="existing-agent-group-messaging-protocols">
        <name>Existing Agent Group Messaging Protocols</name>
        <dl>
          <dt>MCP <xref target="MCP"/> (Model Context Protocol, Anthropic):</dt>
          <dd>
            <t>Defines structured communication between AI models and tools/resources.
Runs over HTTP. Addresses tool-calling semantics, not agent traffic
transport.</t>
          </dd>
          <dt>ACP <xref target="ACP"/> (Agent Communication Protocol, IBM):</dt>
          <dd>
            <t>Defines messaging semantics for agent-to-agent communication. Runs over
HTTP.</t>
          </dd>
          <dt>A2A <xref target="A2A"/> (Agent-to-Agent Protocol, Linux Foundation):</dt>
          <dd>
            <t>Defines inter-agent communication and task delegation semantics. Runs
over HTTP.</t>
          </dd>
          <dt>ANP <xref target="ANP"/> (Agent Network Protocol):</dt>
          <dd>
            <t>Defines discovery and communication for networked agents. Runs over HTTP.</t>
          </dd>
        </dl>
        <t>All of these are messaging protocols. They define what agents say to each
other. They do not define how agent traffic moves across a network. Each
presupposes HTTP as its transport and inherits all of HTTP's limitations
for agentic systems.</t>
      </section>
      <section anchor="transport-layer-alternatives">
        <name>Transport-Layer Alternatives</name>
        <dl>
          <dt>gRPC:</dt>
          <dd>
            <t>High-performance RPC over HTTP/2. Strong typing and efficient
serialization. Does not address agent-specific semantics, identity, or
authority.</t>
          </dd>
          <dt>WebSockets:</dt>
          <dd>
            <t>Persistent bidirectional connections over HTTP. Useful for real-time
communication but does not address method semantics or identity.</t>
          </dd>
          <dt>QUIC <xref target="RFC9000"/>:</dt>
          <dd>
            <t>Modern multiplexed transport with reduced connection overhead. AGTP
<strong>SHOULD</strong> prefer QUIC for new implementations. QUIC is a transport
primitive; AGTP is the application-layer protocol above it.</t>
          </dd>
        </dl>
      </section>
      <section anchor="the-critical-distinction-messaging-vs-transport">
        <name>The Critical Distinction: Messaging vs. Transport</name>
        <t>The most important positioning principle for AGTP is the distinction between
messaging protocols and transport protocols. MCP, ACP, A2A, and ANP are
messaging protocols, they define what agents say. AGTP defines how agent
traffic moves.</t>
        <t>An analogy: SMTP is a messaging protocol that runs over TCP. SMTP does not
replace TCP. Saying "TCP is unnecessary because SMTP exists" is a category
error. The same logic applies here. MCP and its peers define agent messaging
semantics. AGTP defines the transport environment those messages move through.</t>
      </section>
      <section anchor="agtp-positioning-the-proposed-stack">
        <name>AGTP Positioning: The Proposed Stack</name>
        <figure anchor="protocol-stack">
          <name>AGTP in the Protocol Stack</name>
          <artwork><![CDATA[
+-----------------------------------------------------+
|            Agent Application Logic                  |
+-----------------------------------------------------+
|  Messaging Layer  (MCP / ACP / A2A)  [optional]     |
+-----------------------------------------------------+
|   AGTP - Agent Transfer Protocol     [this spec]    |
+-----------------------------------------------------+
|            TLS 1.3+                  [mandatory]    |
+-----------------------------------------------------+
|         TCP / QUIC / UDP                            |
+-----------------------------------------------------+
]]></artwork>
        </figure>
        <t>AGTP is not a replacement for messaging protocols. Agents using MCP or A2A
route those messages over AGTP and gain transport-level observability and
identity without modifying the messaging layer. AGTP-native agents that do
not use a separate messaging protocol interact with AGTP methods directly.</t>
      </section>
    </section>
    <section anchor="protocol-overview">
      <name>Protocol Overview</name>
      <section anchor="stack-position">
        <name>Stack Position</name>
        <t>AGTP is an application-layer protocol. It operates above the transport
layer (TCP, UDP, or QUIC) and is wrapped by TLS. It sits below any agent
messaging protocol in deployments that use one.</t>
        <ul spacing="normal">
          <li>
            <t><strong>SHOULD</strong> prefer QUIC <xref target="RFC9000"/> <xref target="RFC9001"/> for new deployments (lower latency,
multiplexing without head-of-line blocking, 0-RTT connection
establishment).</t>
          </li>
          <li>
            <t><strong>MUST</strong> support TCP/TLS as a fallback for compatibility with existing
infrastructure.</t>
          </li>
          <li>
            <t><strong>MAY</strong> run over UDP where QUIC is not available, subject to
implementor-defined reliability guarantees.</t>
          </li>
        </ul>
        <t>AGTP uses port <strong>4480</strong> (TCP and UDP), assigned by IANA under the
service names <tt>agtp</tt> (TCP/TLS) and <tt>agtp-quic</tt> (QUIC). The port
assignment is permanent and applies to all AGTP transports. Full IANA
registration metadata is documented in <xref target="iana-ports"/>.</t>
      </section>
      <section anchor="design-principles">
        <name>Design Principles</name>
        <dl>
          <dt>Minimalist core:</dt>
          <dd>
            <t>The base spec defines only what is necessary for agent traffic
differentiation, method semantics, and identity headers. Extensions
belong in companion specifications.</t>
          </dd>
          <dt>Extensible by design:</dt>
          <dd>
            <t>New methods are registered through an IANA-managed Method Registry.
New header fields follow a defined extension convention. Additive
changes do not require a version increment.</t>
          </dd>
          <dt>Agent-native:</dt>
          <dd>
            <t>Every design decision assumes the initiating party is an AI system,
not a human.</t>
          </dd>
          <dt>Secure by default:</dt>
          <dd>
            <t>TLS 1.3 or higher is mandatory. Unencrypted AGTP connections <strong>MUST</strong>
be rejected. Agent identity headers are present on every request.</t>
          </dd>
          <dt>Observable by design:</dt>
          <dd>
            <t>Native metadata in every AGTP header provides the minimum information
needed for routing, monitoring, and audit without application-layer
instrumentation.</t>
          </dd>
          <dt>Composable:</dt>
          <dd>
            <t>AGTP works alongside existing agent messaging protocols without requiring
modification to those protocols.</t>
          </dd>
          <dt>Runtime contract negotiation:</dt>
          <dd>
            <t>AGTP fixes the protocol surface at twelve methods. Beyond that floor,
the surface is not predetermined. An agent that needs an endpoint the
server does not advertise proposes the endpoint via PROPOSE with an
AGTP-API endpoint definition; the server evaluates whether it can
synthesize the endpoint from existing capabilities and either
instantiates it as a session-scoped endpoint or refuses. The
negotiation completes in a single round-trip. See <xref target="rcns-section"/>.</t>
          </dd>
        </dl>
      </section>
      <section anchor="rcns-section">
        <name>AGTP as a Runtime Contract Negotiation Substrate</name>
        <t>AGTP is a runtime contract negotiation substrate (RCNS). The
substrate fixes a small floor of twelve protocol-level methods (the
cognitive and mechanics verbs of <xref target="methods-section"/>); beyond that
floor, the method and endpoint surface that any given AGTP server
presents is not fixed in advance. It is negotiated at runtime
between the agent and the server, in a single round-trip, governed
by the AGTP-API companion specification <xref target="AGTP-API"/> which defines
the curated method catalog, path grammar, endpoint primitive, semantic
block, schemas, and synthesis semantics.</t>
        <t>The negotiation loop is:</t>
        <ol spacing="normal" type="1"><li>
            <t>An agent encounters an AGTP server and inspects its endpoint
surface via DESCRIBE or by retrieving the server manifest as
defined in <xref target="AGTP-API"/>.</t>
          </li>
          <li>
            <t>If the endpoints the agent needs are not present, the agent
submits a PROPOSE request carrying an AGTP-API endpoint
specification: a verb (drawn from the AGTP-API approved verb
list), a path (conforming to AGTP-API path grammar), a semantic
block (intent, actor, outcome, capability classification,
confidence guidance, impact tier, idempotency), input and output
schemas, and declared error conditions.</t>
          </li>
          <li>
            <t>The server evaluates the proposal against AGTP-API contract
rules and against its own capability surface. The server
determines whether the proposed endpoint can be synthesized from
existing endpoints, what authority scope is required, and what
governance constraints apply.</t>
          </li>
          <li>
            <t>The server either instantiates the proposed endpoint as a
session-scoped endpoint and returns 263 Proposal Approved
with the AGTP-API endpoint definition, or refuses with 463
Proposal Rejected and a structured reason.</t>
          </li>
        </ol>
        <t>The full negotiation completes in a single PROPOSE → response
round-trip. No registry update, no human-in-the-loop approval, no
out-of-band coordination is required for an agent and a server to
agree on a new endpoint, provided the endpoint is AGTP-API
conformant and within the server's capability envelope.</t>
        <t>This property distinguishes AGTP from protocols whose contract
surface is fixed at design time. HTTP's method registry is
effectively frozen (see <xref target="comparison-section"/>); proposing a new
HTTP method requires IETF consensus over multi-year timelines. gRPC
services expose a fixed service contract defined at compile time.
Most agent frameworks built on HTTP inherit this constraint and
work around it by overloading POST. AGTP treats the contract surface
as dynamically negotiable, with AGTP-API as the contract layer that
keeps negotiation safe.</t>
        <t>The RCNS property is what makes composition with higher-level agent
frameworks (<xref target="composition-section"/>) tractable. A server that wants
to expose a framework-specific operation as a first-class AGTP
endpoint does not need to wait for IANA registration; it negotiates
the endpoint via PROPOSE at the moment an agent asks for it,
governed by AGTP-API. The floor of twelve methods provides
interoperability; AGTP-API provides contract safety; PROPOSE
provides expressivity.</t>
        <t>Implementations <strong>MAY</strong> choose not to participate in runtime
negotiation. A server that supports only the twelve-method floor
and returns 463 Proposal Rejected for every PROPOSE request is
fully conformant with this specification. Runtime negotiation is a
capability AGTP enables, not a behavior it requires.</t>
      </section>
      <section anchor="connection-model">
        <name>Connection Model</name>
        <t>AGTP uses a persistent session model by default, reflecting the reality that
agents typically execute multi-step workflows rather than isolated single
requests. An AGTP session is established with a single TLS handshake
including agent identity assertion, persists across multiple method
exchanges, carries a Session-ID header identifying the agent's task
context, and terminates on explicit session close or inactivity timeout
(RECOMMENDED minimum: 60 seconds).</t>
        <t>Per-request (stateless) mode is supported for constrained environments.
In stateless mode, agent identity headers <strong>MUST</strong> be present on every
individual request.</t>
        <section anchor="wire-framing">
          <name>Wire-Format Framing</name>
          <t>AGTP requests and responses <strong>MUST</strong> be framed by an explicit
<tt>Content-Length</tt> header. <tt>Content-Length</tt> is the sole signal of request
and response completion. Receivers <strong>MUST</strong> treat the message as
complete when, and only when, the declared number of body octets has
been read after the header terminator.</t>
          <t>AGTP sessions running over TLS <strong>MUST NOT</strong> use socket-level half-close
(<tt>shutdown(SHUT_WR)</tt> or equivalent) to signal end-of-request. The TLS
<tt>close_notify</tt> alert that results from a half-close terminates the
secure session before the peer can transmit a response, producing a
truncation that is indistinguishable at the application layer from a
malicious downgrade. Implementations that require an explicit completion
signal in addition to <tt>Content-Length</tt> <strong>MUST</strong> rely on the AGTP
session-close semantics described in <xref target="methods-suspend"/> or on
transport-level FIN after the full response has been received.</t>
          <t>Chunked transfer encoding is not used in AGTP. Streaming method
responses are framed by repeated <tt>Content-Length</tt>-delimited messages
within a single AGTP session.</t>
        </section>
      </section>
      <section anchor="header-format">
        <name>Header Format</name>
        <t>The AGTP wire format puts the protocol version and method on the
request line (<tt>AGTP/1.0 METHOD PATH\r\n</tt>) and the status code on
the response line (<tt>AGTP/1.0 STATUS STATUS-TEXT\r\n</tt>). Headers
<strong>MUST NOT</strong> carry information already present on those lines:
there is no <tt>AGTP-Version</tt> header, no <tt>AGTP-Method</tt> header, no
<tt>AGTP-Status</tt> header. The version and method are read from the
request line; the status is read from the response line.</t>
        <section anchor="request-line">
          <name>Request Line Grammar</name>
          <t>The request line carries three tokens separated by single space
characters, terminated by CRLF:</t>
          <artwork><![CDATA[
request-line   = agtp-version SP method SP request-target CRLF
agtp-version   = "AGTP/1.0"
method         = token                  ; per {{AGTP-API}} catalog
request-target = path-absolute [ "?" query ]
                                        ; per RFC 3986
path-absolute  = "/" [ segment-nz *( "/" segment ) ]
                                        ; per RFC 3986 Section 3.3
query          = *( pchar / "/" / "?" )
                                        ; per RFC 3986 Section 3.4
]]></artwork>
          <t>The <tt>request-target</tt> follows the path-absolute production of
<xref target="RFC3986"/>, optionally followed by <tt>?</tt> and a query string. Path
and query are parsed as separate tokens: the path is everything
from the leading <tt>/</tt> up to the first <tt>?</tt> or end-of-line; the query
string is everything after the first <tt>?</tt> up to the CRLF.</t>
          <t>Servers <strong>MUST</strong> parse path and query as separate tokens before
dispatch, matching <xref target="RFC3986"/> URI generic syntax. Implementations
<strong>MUST NOT</strong> treat a <tt>?</tt>-prefixed query as part of the path; the
path-grammar enforcement in <xref target="AGTP-API"/> applies to the path
component only.</t>
          <t>URI fragments (<tt>#anchor</tt>) <strong>MUST NOT</strong> appear on the request line.
A request line containing <tt>#</tt> <strong>MUST</strong> be rejected at the wire
layer as malformed.</t>
          <t>The path-pattern grammar (template parameters in <tt>{param}</tt> form,
verb-leakage prevention, structural minimums) is normatively
specified in <xref target="AGTP-API"/>. v07 servers <strong>MUST</strong> implement the
AGTP-API path grammar.</t>
        </section>
        <section anchor="response-line">
          <name>Response Line Grammar</name>
          <t>The response line carries three tokens separated by single space
characters, terminated by CRLF:</t>
          <artwork><![CDATA[
response-line  = agtp-version SP status-code SP status-text CRLF
agtp-version   = "AGTP/1.0"
status-code    = 3DIGIT                 ; per {{status-codes}}
status-text    = *( VCHAR / SP / HTAB )
                                        ; freeform reason phrase
]]></artwork>
          <t>The <tt>status-text</tt> is informational and <strong>MUST NOT</strong> be used by
servers or clients for protocol decisions; the numeric <tt>status-code</tt>
is authoritative.</t>
        </section>
        <section anchor="request-headers">
          <name>Request Headers</name>
          <table>
            <name>AGTP Request Header Fields</name>
            <thead>
              <tr>
                <th align="left">Field</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Agent-ID</td>
                <td align="left">
                  <strong>MUST</strong> for non-anonymous requests</td>
                <td align="left">Canonical 256-bit identifier of the invoking agent. Identifies the request's source, not its target. Servers reject requests lacking <tt>Agent-ID</tt> against non-anonymous endpoints.</td>
              </tr>
              <tr>
                <td align="left">Authority-Scope</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Scopes the agent claims for this specific request. When present, every claimed scope <strong>MUST</strong> be a subset of the scopes declared in the agent's identity document; servers <strong>MUST</strong> validate and <strong>MUST</strong> return 262 Authorization Required with body code <tt>scope-claim-invalid</tt> on failure. When absent, the request inherits the full scope set of the agent's identity document. The server uses the claimed (or inherited) set when evaluating the endpoint's <tt>required_scopes</tt>.</td>
              </tr>
              <tr>
                <td align="left">Session-ID</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Opaque session identifier grouping multiple requests into an operational session. The protocol assigns no semantics; servers pass the value through to handlers via the endpoint context.</td>
              </tr>
              <tr>
                <td align="left">Task-ID</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Opaque identifier tracing a specific task or operation across multiple requests. Useful for audit correlation. Servers <strong>SHOULD</strong> echo this value in the response <tt>Task-ID</tt> header.</td>
              </tr>
              <tr>
                <td align="left">Delegation-Chain</td>
                <td align="left">
                  <strong>MAY</strong> (reserved)</td>
                <td align="left">Reserved for delegated-authority scenarios. Format, validation, and chain-of-trust semantics are not specified in this revision and are anticipated in a future revision. v00 servers <strong>MAY</strong> reject requests carrying this header with 501 Not Implemented (HTTP standard semantics); reject responses <strong>SHOULD</strong> carry a body indicating the unsupported feature.</td>
              </tr>
              <tr>
                <td align="left">Merchant-ID</td>
                <td align="left">
                  <strong>MUST</strong> on PURCHASE</td>
                <td align="left">Canonical identifier of the intended merchant counterparty. See <xref target="AGTP-MERCHANT"/>.</td>
              </tr>
              <tr>
                <td align="left">Merchant-Manifest-Fingerprint</td>
                <td align="left">
                  <strong>MUST</strong> on PURCHASE</td>
                <td align="left">SHA-256 fingerprint of the Merchant Manifest Document verified by the requesting agent. Receiving server <strong>MUST</strong> reject with 458 if this does not match its current manifest. See <xref target="AGTP-MERCHANT"/>.</td>
              </tr>
              <tr>
                <td align="left">Intent-Assertion</td>
                <td align="left">
                  <strong>SHOULD</strong> on PURCHASE</td>
                <td align="left">Detached JWT <xref target="RFC7519"/> carrying signed principal-authorized purchase intent. Forwardable to payment networks as standalone evidence. See <xref target="AGTP-MERCHANT"/>.</td>
              </tr>
              <tr>
                <td align="left">Cart-Digest</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Cryptographic digest of a structured cart returned by a prior QUOTE invocation. Binds a PURCHASE to a previously quoted cart without retransmission of line-item detail. See <xref target="AGTP-MERCHANT"/>.</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="response-headers">
          <name>Response Headers</name>
          <table>
            <name>AGTP Response Header Fields</name>
            <thead>
              <tr>
                <th align="left">Field</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Server-ID</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Canonical identifier of the server that produced the response. <strong>MUST</strong> be populated from the server's configured <tt>server_id</tt> on every response. Useful for audit, load-balanced deployments, and verifying which server processed a request.</td>
              </tr>
              <tr>
                <td align="left">Task-ID</td>
                <td align="left">
                  <strong>SHOULD</strong> when present in request</td>
                <td align="left">Echo of the request's <tt>Task-ID</tt> header to correlate response with request. Absent when the request did not carry <tt>Task-ID</tt>.</td>
              </tr>
              <tr>
                <td align="left">Attribution-Record</td>
                <td align="left">
                  <strong>SHOULD</strong> when manifest signing is configured</td>
                <td align="left">JWS-signed attestation of the response's origin. Carries the server ID, response timestamp, request hash (for replay detection), and response status. Coupled with manifest signing: a server with a configured signing key emits <tt>Attribution-Record</tt> on every response; a server without one omits it.</td>
              </tr>
              <tr>
                <td align="left">Continuation-Token</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Token for retrieving additional results in streaming contexts.</td>
              </tr>
              <tr>
                <td align="left">Supported-Methods</td>
                <td align="left">
                  <strong>SHOULD</strong> (on session open)</td>
                <td align="left">List of AGTP methods supported by this server.</td>
              </tr>
              <tr>
                <td align="left">Cost-Estimate</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Estimated resource consumption in Budget-Limit unit format. Returned by QUOTE; <strong>MAY</strong> appear on any response as an informational signal.</td>
              </tr>
              <tr>
                <td align="left">Attestation-Evidence</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">RATS attestation evidence token or reference URI per <xref target="RFC9334"/>. Format indicated by <tt>attestation_type</tt> in response body: <tt>rats-eat</tt>, <tt>rats-corim</tt>, or <tt>rats-uri</tt>.</td>
              </tr>
            </tbody>
          </table>
          <t>Implementations <strong>MAY</strong> emit implementation-specific headers, by
convention prefixed <tt>X-</tt>, but such headers have no protocol
semantics; agents <strong>MUST NOT</strong> rely on them and servers <strong>MUST
NOT</strong> require them.</t>
        </section>
        <section anchor="headers-reserved-for-future-revisions">
          <name>Headers Reserved for Future Revisions</name>
          <t>The following headers were specified in earlier drafts and are
reserved for future revisions. v00 servers <strong>MUST NOT</strong> require
them and <strong>MAY</strong> ignore them when received:</t>
          <table>
            <name>Headers Reserved for Future AGTP Revisions</name>
            <thead>
              <tr>
                <th align="left">Field</th>
                <th align="left">Status</th>
                <th align="left">Anticipated Use</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Priority</td>
                <td align="left">Reserved (v01+)</td>
                <td align="left">Request priority hint: critical, normal, background</td>
              </tr>
              <tr>
                <td align="left">TTL</td>
                <td align="left">Reserved (v01+)</td>
                <td align="left">Maximum acceptable response latency in milliseconds. Pairs with status code 408 Timeout.</td>
              </tr>
              <tr>
                <td align="left">Budget-Limit</td>
                <td align="left">Reserved (v01+)</td>
                <td align="left">Maximum resource budget per invocation. Pairs with status code 456 Budget Exceeded.</td>
              </tr>
              <tr>
                <td align="left">AGTP-Zone-ID</td>
                <td align="left">Reserved (v01+)</td>
                <td align="left">Network zone boundary constraint. Pairs with status code 457 Zone Violation; SEP-enforced.</td>
              </tr>
              <tr>
                <td align="left">Content-Schema</td>
                <td align="left">Reserved (v01+)</td>
                <td align="left">URI reference to JSON Schema describing the request body structure.</td>
              </tr>
              <tr>
                <td align="left">Telemetry-Export</td>
                <td align="left">Reserved (v01+)</td>
                <td align="left">OTLP endpoint URI for metric export, or <tt>inline</tt> to receive metrics embedded in the response <tt>Attribution-Record</tt>.</td>
              </tr>
            </tbody>
          </table>
          <t>Status codes 456 Budget Exceeded and 457 Zone Violation remain
allocated in the AGTP Status Code Registry; their normative
trigger headers (<tt>Budget-Limit</tt>, <tt>AGTP-Zone-ID</tt>) are deferred to a
future revision. v00 servers <strong>MAY</strong> enforce equivalent semantics
through implementation-specific mechanisms and return the
corresponding status code, but the wire-level headers are not part
of the v00 contract.</t>
        </section>
        <section anchor="retired-headers">
          <name>Retired Headers</name>
          <t>The following headers appeared in earlier drafts and have been
removed. Implementations <strong>MUST NOT</strong> emit them and <strong>MAY</strong> reject
requests that carry them:</t>
          <table>
            <name>Retired AGTP Headers</name>
            <thead>
              <tr>
                <th align="left">Field</th>
                <th align="left">Reason for Removal</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">AGTP-Version</td>
                <td align="left">Redundant with the request and response lines (which carry <tt>AGTP/1.0</tt>).</td>
              </tr>
              <tr>
                <td align="left">AGTP-Method</td>
                <td align="left">Redundant with the request line (which carries the method token).</td>
              </tr>
              <tr>
                <td align="left">AGTP-Status</td>
                <td align="left">Redundant with the response line (which carries the status code).</td>
              </tr>
              <tr>
                <td align="left">Principal-ID</td>
                <td align="left">Redundant: the principal is recorded in the agent identity document referenced by <tt>Agent-ID</tt>.</td>
              </tr>
              <tr>
                <td align="left">Server-Agent-ID</td>
                <td align="left">Renamed to <tt>Server-ID</tt>. The earlier name conflated server identity with agent identity.</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="status-codes">
        <name>Status Codes</name>
        <t>AGTP defines its own status code space. Codes 261 through 263,
455 through 465, and 550 through 555 are AGTP-specific with no HTTP
equivalent and are registered in the IANA AGTP Status Code Registry
(see Section 9.3). AGTP-specific code numbers are deliberately
chosen from ranges unassigned in the IANA HTTP Status Code Registry
to avoid semantic collision with HTTP status codes that may appear
in payloads carried by AGTP method invocations.</t>
        <t>The AGTP status code model carries four structural rejection codes
(404, 405, 459, 460) that together cover the failure surface for
contract-level invocation. Each code is independently actionable:
404 indicates the path does not exist on this server; 405 indicates
the verb and path are each individually valid but the server does
not expose this combination; 459 indicates the verb is not in the
AGTP-API approved method catalog; 460 indicates the path violates
AGTP-API path grammar. The structural rejection model and the
curated method catalog are specified in <xref target="AGTP-API"/>.</t>
        <table>
          <name>AGTP Status Codes</name>
          <thead>
            <tr>
              <th align="left">Code</th>
              <th align="left">Name</th>
              <th align="left">Meaning</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">200</td>
              <td align="left">OK</td>
              <td align="left">Method executed successfully</td>
            </tr>
            <tr>
              <td align="left">202</td>
              <td align="left">Accepted</td>
              <td align="left">Method accepted; execution is asynchronous</td>
            </tr>
            <tr>
              <td align="left">204</td>
              <td align="left">No Content</td>
              <td align="left">Method executed; no response body</td>
            </tr>
            <tr>
              <td align="left">261</td>
              <td align="left">Negotiation In Progress</td>
              <td align="left">PROPOSE evaluation in progress; agent <strong>MAY</strong> poll for terminal status. See <xref target="AGTP-API"/>.</td>
            </tr>
            <tr>
              <td align="left">262</td>
              <td align="left">Authorization Required</td>
              <td align="left">Request requires credential establishment, additional authorization scope, or consent that is not yet present. Covers PROPOSE-time authorization, missing scope at endpoint dispatch, ad-hoc method invocation requiring wildcards consent, and discovery requests blocked by anonymous-discovery policy. See <xref target="AGTP-API"/>.</td>
            </tr>
            <tr>
              <td align="left">263</td>
              <td align="left">Proposal Approved</td>
              <td align="left">PROPOSE accepted; the proposed endpoint has been synthesized and instantiated. Response body carries the synthesized endpoint contract. See <xref target="AGTP-API"/>.</td>
            </tr>
            <tr>
              <td align="left">400</td>
              <td align="left">Bad Request</td>
              <td align="left">Malformed AGTP request</td>
            </tr>
            <tr>
              <td align="left">401</td>
              <td align="left">Unauthorized</td>
              <td align="left">Agent-ID not recognized or not authenticated</td>
            </tr>
            <tr>
              <td align="left">403</td>
              <td align="left">Forbidden</td>
              <td align="left">Agent lacks authority for requested action per Authority-Scope</td>
            </tr>
            <tr>
              <td align="left">404</td>
              <td align="left">Not Found</td>
              <td align="left">The path does not exist on this server. No endpoints are registered under it.</td>
            </tr>
            <tr>
              <td align="left">405</td>
              <td align="left">Method Not Allowed</td>
              <td align="left">The method is recognized and the path is valid, but the server's policy or registry does not expose this combination. The response body <strong>MUST</strong> list allowed methods for the path and any redirects from the manifest's <tt>policies.methods</tt> sub-block. The agent <strong>MAY</strong> PROPOSE the combination if it is not exposed by policy. AGTP-specific. See <xref target="AGTP-API"/>.</td>
            </tr>
            <tr>
              <td align="left">408</td>
              <td align="left">Timeout</td>
              <td align="left">TTL exceeded before method could execute. AGTP-specific semantics; see below.</td>
            </tr>
            <tr>
              <td align="left">409</td>
              <td align="left">Conflict</td>
              <td align="left">Method conflicts with current state</td>
            </tr>
            <tr>
              <td align="left">410</td>
              <td align="left">Gone</td>
              <td align="left">Agent has been Revoked or Deprecated; canonical Agent-ID is permanently retired. AGTP-specific semantics; see below.</td>
            </tr>
            <tr>
              <td align="left">422</td>
              <td align="left">Unprocessable</td>
              <td align="left">Request well-formed but semantically invalid</td>
            </tr>
            <tr>
              <td align="left">429</td>
              <td align="left">Rate Limited</td>
              <td align="left">Agent is exceeding permitted request frequency</td>
            </tr>
            <tr>
              <td align="left">455</td>
              <td align="left">Scope Violation</td>
              <td align="left">Requested action is outside declared scope. Generic scope-violation code for cases not covered by the dedicated scope codes (429 rate-limit, 456 budget, 457 zone, 262 authority). Token-based or query-based scope violations are typical applications. AGTP-specific.</td>
            </tr>
            <tr>
              <td align="left">456</td>
              <td align="left">Budget Exceeded</td>
              <td align="left">Method execution would exceed the Budget-Limit declared in the request. AGTP-specific.</td>
            </tr>
            <tr>
              <td align="left">457</td>
              <td align="left">Zone Violation</td>
              <td align="left">Request would route outside the AGTP-Zone-ID boundary. SEP-enforced. AGTP-specific.</td>
            </tr>
            <tr>
              <td align="left">458</td>
              <td align="left">Counterparty Unverified</td>
              <td align="left">PURCHASE counterparty failed merchant identity verification: Merchant-ID absent, Merchant-Manifest-Fingerprint mismatch, or merchant in non-Active lifecycle state. AGTP-specific. See <xref target="AGTP-MERCHANT"/>.</td>
            </tr>
            <tr>
              <td align="left">459</td>
              <td align="left">Method Violation</td>
              <td align="left">The method name is not in the AGTP-API approved method catalog. The method itself is the problem. AGTP-specific. See <xref target="AGTP-API"/>.</td>
            </tr>
            <tr>
              <td align="left">460</td>
              <td align="left">Endpoint Violation</td>
              <td align="left">The endpoint path violates AGTP-API path grammar. A path segment matches an approved method name, indicating method-name leakage into the path. AGTP-specific. See <xref target="AGTP-API"/>.</td>
            </tr>
            <tr>
              <td align="left">461</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved for AGTP expansion.</td>
            </tr>
            <tr>
              <td align="left">462</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved for AGTP expansion.</td>
            </tr>
            <tr>
              <td align="left">463</td>
              <td align="left">Proposal Rejected</td>
              <td align="left">The service cannot or will not instantiate the proposed endpoint. Returned in response to PROPOSE. Response body <strong>MUST</strong> carry a structured reason (e.g., <tt>out-of-scope</tt>, <tt>policy-refused</tt>, <tt>composition-impossible</tt>, <tt>ambiguous</tt>, <tt>synthesis-disabled</tt>) and <strong>MAY</strong> carry an optional counter-proposal. AGTP-specific. See <xref target="AGTP-API"/>.</td>
            </tr>
            <tr>
              <td align="left">464</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved for AGTP expansion.</td>
            </tr>
            <tr>
              <td align="left">465</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved for AGTP expansion.</td>
            </tr>
            <tr>
              <td align="left">500</td>
              <td align="left">Server Error</td>
              <td align="left">Internal failure in the responding system</td>
            </tr>
            <tr>
              <td align="left">503</td>
              <td align="left">Unavailable</td>
              <td align="left">Responding agent or system temporarily unavailable or Suspended</td>
            </tr>
            <tr>
              <td align="left">550</td>
              <td align="left">Delegation Failure</td>
              <td align="left">A delegated sub-agent failed to complete the requested action. AGTP-specific.</td>
            </tr>
            <tr>
              <td align="left">551</td>
              <td align="left">Authority Chain Broken</td>
              <td align="left">Delegation chain contains an unverifiable or broken identity link. AGTP-specific.</td>
            </tr>
            <tr>
              <td align="left">552</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved for AGTP expansion.</td>
            </tr>
            <tr>
              <td align="left">553</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved for AGTP expansion.</td>
            </tr>
            <tr>
              <td align="left">554</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved for AGTP expansion.</td>
            </tr>
            <tr>
              <td align="left">555</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved for AGTP expansion.</td>
            </tr>
          </tbody>
        </table>
        <t>The four structural rejection codes (404, 405, 459, 460) form the
contract-level structural failure surface and have distinct recovery
semantics. A 459 tells the agent to choose a different method from
the AGTP-API catalog. A 460 tells the agent to restructure the path
so that no path segment is a method name. A 405 tells the agent the
method and path are each individually valid but the failure is a
server policy decision; a different method-and-path combination
might work, or PROPOSE might negotiate access. A 404 tells the
agent the path does not exist on this server at all. Beyond the
structural surface, 463 (Proposal Rejected) is the runtime
negotiation rejection: the agent's PROPOSE was structurally valid
but the server cannot or will not synthesize the requested endpoint.</t>
        <t>Status code 262 (Authorization Required) consolidates the
authority-related rejection conditions an agent might encounter
when interacting with a server. It is returned when: (a) a PROPOSE
request requires credential establishment before the server will
evaluate it; (b) an endpoint invocation requires Authority-Scope
that the agent has not declared; (c) an ad-hoc method invocation
requires wildcards consent (<tt>wildcards: true</tt> on the agent identity
document and <tt>wildcards_accepted: true</tt> in server policy) that is
absent on either side; or (d) a discovery request is blocked by
server policy that requires authenticated identity for manifest
retrieval. The response body <strong>MUST</strong> identify which condition
applies so the agent knows what to remediate.</t>
        <t>Status code 455 (Scope Violation) is a generic scope-violation
signal for cases not covered by the dedicated scope codes (429
rate-limit, 456 budget, 457 zone, 262 authority). Typical
applications include token-based scope violations and query-based
scope violations, where an operator defines a scope dimension
outside the standard set. Authority-Scope violations specifically
are signaled with 262, not 455. Status code 456 (Budget Exceeded)
is the dedicated code for resource-consumption scope violations:
the agent's requested action would consume resources beyond what
the principal authorized for this invocation. Status code 457
(Zone Violation) is returned by SEPs when a DELEGATE request would
route to an agent outside the declared zone boundary. Status code
458 (Counterparty Unverified) is returned on PURCHASE invocations
when the receiving server cannot verify that the requesting agent
has performed valid merchant identity verification against the
server's current Merchant Manifest Document, or when the merchant
is in a non-Active lifecycle state; see <xref target="AGTP-MERCHANT"/>.</t>
        <t>Status code 551 (Authority Chain Broken) is returned when a server
processing a delegated request cannot reconstruct a valid
delegation sequence from the delegating agent to the requesting
agent. The specific unverifiable link <strong>SHOULD</strong> be identified in
the response body. Status code 408 (Timeout) is
reused from HTTP with AGTP-specific semantics: it signals that the
method's declared TTL expired before execution completed, distinct
from HTTP's request-timeout semantics. Status code 410 (Gone) is
reused from HTTP with AGTP-specific semantics: it indicates that an
Agent-ID has been permanently retired through revocation or
deprecation of its Agent Genesis, distinct from HTTP's resource-removed
semantics. The canonical Agent-ID <strong>MUST NOT</strong> be retried. All
AGTP-specific status codes are operational signals, not protocol
errors, and <strong>MUST</strong> be logged for audit purposes.</t>
      </section>
      <section anchor="wire-format">
        <name>Wire Format and Content-Type</name>
        <t>AGTP request and response bodies are encoded as JSON or YAML. The
following media types are defined by AGTP. Their IANA registration
status varies; see the IANA Considerations section for the
authoritative status table.</t>
        <table>
          <name>AGTP Media Types Defined in This Document</name>
          <thead>
            <tr>
              <th align="left">Media Type</th>
              <th align="left">Use</th>
              <th align="left">IANA Status</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>application/vnd.agtp+json</tt></td>
              <td align="left">AGTP method request/response bodies (JSON)</td>
              <td align="left">Planned (this document)</td>
            </tr>
            <tr>
              <td align="left">
                <tt>application/vnd.agtp+yaml</tt></td>
              <td align="left">AGTP method request/response bodies (YAML)</td>
              <td align="left">Planned (this document)</td>
            </tr>
            <tr>
              <td align="left">
                <tt>application/vnd.agtp.identity+json</tt></td>
              <td align="left">Agent Identity Document (JSON)</td>
              <td align="left">Vendor-tree registration submitted</td>
            </tr>
            <tr>
              <td align="left">
                <tt>application/vnd.agtp.identity+yaml</tt></td>
              <td align="left">Agent Identity Document (YAML)</td>
              <td align="left">Vendor-tree registration submitted</td>
            </tr>
          </tbody>
        </table>
        <t>Two additional media types are defined in the companion AGTP-API
specification <xref target="AGTP-API"/> and registered concurrently:
<tt>application/vnd.agtp.manifest+json</tt> (server manifest) and
<tt>application/vnd.agtp.endpoint+json</tt> (endpoint definition). Both
are listed in the master Media Type Registry section of this
document for cross-document discoverability.</t>
        <t>Implementations <strong>MUST</strong> include the appropriate Content-Type on all
AGTP requests and responses that carry a message body. Responses with
no body (e.g., 204 No Content) <strong>MUST NOT</strong> include a Content-Type
header. Binary or streaming extensions <strong>MAY</strong> define additional
Content-Type values as part of their companion specifications.</t>
        <t>EXECUTE method invocations carry application-layer payloads whose
Content-Type is set by the carried application protocol (for example,
<tt>application/vnd.mcp.tools+json</tt> for MCP tool invocations carried over
AGTP). The AGTP server dispatches based on the carried Content-Type; see
<xref target="methods-execute"/> and <xref target="composition-section"/>.</t>
        <t>The common structure for AGTP method-level request bodies:</t>
        <sourcecode type="json"><![CDATA[
{
  "method": "QUERY",
  "task_id": "task-0042",
  "session_id": "sess-a1b2c3d4",
  "parameters": { },
  "context": { }
}
]]></sourcecode>
        <t>And for AGTP method-level response bodies:</t>
        <sourcecode type="json"><![CDATA[
{
  "status": 200,
  "task_id": "task-0042",
  "result": { },
  "attribution": { }
}
]]></sourcecode>
      </section>
      <section anchor="early-implementations">
        <name>Early Implementations</name>
        <t>AGTP is a proposed specification. No production implementations exist at
the time of this writing. The author encourages early prototype
implementations to validate the protocol design, identify gaps, and
generate feedback prior to IETF working group submission.</t>
        <ul empty="true">
          <li>
            <t>If you are building an AGTP prototype or reference implementation,
please share your findings via the feedback channel listed on the cover
of this document. A reference implementation in Python and/or Go is
planned as open-source software concurrent with or shortly after IETF
I-D submission. Implementation reports are welcome and will be
incorporated into subsequent draft revisions.</t>
          </li>
        </ul>
        <t>Implementers wishing to experiment before final IANA port assignment
<strong>SHOULD</strong> use a locally-chosen port from the Dynamic Ports range
(49152-65535) on developer-controlled endpoints. Implementations
<strong>MUST NOT</strong> publish or document any specific port number as an
AGTP-associated value until IANA assignment is complete.</t>
        <t>The ACTIVATE method extension, which binds <tt>.nomo</tt> governed agent packages
to AGTP as a first-class activation operation, is described in a companion
document and is implemented as an optional extension. Core AGTP
implementations need not support ACTIVATE to be compliant with this
specification.</t>
      </section>
    </section>
    <section anchor="agent-identity-uri-structure-and-registration">
      <name>Agent Identity, URI Structure, and Registration</name>
      <section anchor="uri-structure-and-resolution-mechanics">
        <name>URI Structure and Resolution Mechanics</name>
        <section anchor="foundational-principle">
          <name>Foundational Principle</name>
          <t>AGTP identity is agent-first. Every agent is identified by a canonical
Agent-ID: a 256-bit cryptographic identifier derived from the agent's
Agent Genesis hash at ACTIVATE time. The canonical Agent-ID is the
authoritative identifier in every AGTP protocol operation. It appears
in the <tt>Agent-ID</tt> header of every request, is the key in the registry,
and is the cross-layer reference linking the AGTP Agent Certificate
extension to the governance-layer Agent Genesis.</t>
          <t>All other agent identification forms recognized by AGTP, including
domain-anchored URIs and Web3 resolution targets, are aliases that
resolve to a canonical Agent-ID. In the event of any conflict
between an alias and a canonical Agent-ID, the canonical Agent-ID
<strong>MUST</strong> be treated as authoritative.</t>
          <t>AGTP URIs are addresses, not filenames. File format suffixes
(<tt>.agtp</tt>) <strong>MUST NOT</strong> appear in canonical <tt>agtp://</tt> URIs. A URI
resolves to an Agent Identity Document or Agent Namespace Document
derived from the underlying package; it does not expose or serve the
package itself.</t>
          <t>Implementations <strong>MUST</strong> treat any URI containing a file extension
in the path as non-canonical and <strong>SHOULD</strong> issue a 301 Moved
Permanently redirect to the canonical form prior to resolution.</t>
          <t>The <tt>.agent</tt> suffix and the <tt>.nomo</tt> suffix are file format
designators for AGTP agent packages; they are not URI hostname
labels. Earlier drafts admitted hostname forms ending in <tt>.agent</tt>
or <tt>.nomo</tt> as agent-native hierarchical TLDs; this revision removes
that admission. Hostnames in AGTP URIs are standard DNS hostnames
per RFC 3986.</t>
        </section>
        <section anchor="canonical-uri-forms">
          <name>Canonical URI Forms</name>
          <t>AGTP is identity-first. Agent-IDs are canonical and content-addressed;
hosting is incidental. Form 1 (<tt>agtp://[Agent-ID]</tt>) is the canonical
identity form. Form 1a (<tt>agtp://[Agent-ID]@[host]</tt>) provides direct
addressing for cases where the resolver does not yet know how to
reach the canonical ID, and bridges the gap between identity-first
addressing and the existing DNS-based reachability infrastructure.</t>
          <t>Forms 2 and 2a address servers and organizations rather than
specific agents, providing entry points for discovery operations
that do not target a named agent. Forms 3 and 4 address agents by
local name within a domain's namespace; they differ only in
deployment convention.</t>
          <artwork><![CDATA[
Form 1.  Canonical identity (cryptographic, authoritative):
  agtp://[Agent-ID]

Form 1a. Canonical identity with explicit host (direct addressing):
  agtp://[Agent-ID]@[host]

Form 2.  Server-level discovery (specific server endpoint):
  agtp://[host]

Form 2a. Organization-level discovery (DNS-registered domain root):
  agtp://[domain]

Form 3.  Domain-anchored agent (domain owns the namespace):
  agtp://[domain]/agents/[agent-name]

Form 4.  Subdomain-anchored agent (dedicated AGTP subdomain):
  agtp://agtp.[domain]/agents/[agent-name]
]]></artwork>
          <t>The port portion of any AGTP URI is <strong>OPTIONAL</strong>. When omitted,
AGTP clients <strong>MUST</strong> use the IANA-assigned default port 4480. The
port is included in URIs only for non-default deployments and
appears in the host component (Form 1a host or Form 2 host); ports
<strong>MUST NOT</strong> appear in Form 2a domain components or in Forms 3/4
domain components.</t>
          <section anchor="form-1-canonical-identity">
            <name>Form 1 — Canonical Identity</name>
            <t>Form 1 carries only the 64-character lowercase hex representation
of the Agent Genesis SHA-256 hash:</t>
            <artwork><![CDATA[
agtp://7f3a9c2d...e1f8b0a4
]]></artwork>
            <t>Form 1 resolves to a signed Agent Identity Document through any
verification path declared in the agent's registry record (Section
5.2). The canonical ID is self-describing: any AGTP-aware
governance platform, transparency log, or resolution service can
return the Identity Document given the canonical ID alone, without
prior knowledge of which organization, domain, or blockchain the
agent is registered under.</t>
          </section>
          <section anchor="form-1a-canonical-identity-with-explicit-host">
            <name>Form 1a — Canonical Identity with Explicit Host</name>
            <t>Form 1a embeds an explicit host alongside the canonical Agent-ID:</t>
            <artwork><![CDATA[
agtp://7f3a9c2d...e1f8b0a4@agents.acme.com
agtp://7f3a9c2d...e1f8b0a4@192.0.2.42
agtp://7f3a9c2d...e1f8b0a4@agents.acme.com:9999
]]></artwork>
            <t>The Agent-ID identifies; the host tells the resolver where to reach
a server that can return the Identity Document or accept method
invocations. Form 1a is the preferred form when:</t>
            <ul spacing="normal">
              <li>
                <t>The agent has been issued a canonical Agent-ID but is not yet
registered with an AGTP discovery service.</t>
              </li>
              <li>
                <t>The resolver does not yet have a path from canonical Agent-ID to
endpoint (no DNS anchor, no transparency log entry, no
governance-platform resolution).</t>
              </li>
              <li>
                <t>A client wishes to address an agent by ID directly without round-
tripping through a registry.</t>
              </li>
            </ul>
            <t>Form 1a does not weaken the identity-first model. The canonical
Agent-ID remains authoritative; the host portion is treated as a
resolution hint and <strong>MUST NOT</strong> be used to derive identity. If the
host returns an Identity Document whose <tt>agent_id</tt> field does not
match the canonical Agent-ID in the URI, the response <strong>MUST</strong> be
rejected.</t>
          </section>
          <section anchor="form-2-server-level-discovery">
            <name>Form 2 — Server-Level Discovery</name>
            <t>Form 2 addresses a specific server endpoint without naming an agent:</t>
            <artwork><![CDATA[
agtp://agents.acme.com
agtp://agtp-edge-7.us-east.acme.com
agtp://192.0.2.42
agtp://[2001:db8::42]
agtp://agents.acme.com:9999
]]></artwork>
            <t>The host component <strong>MAY</strong> be any RFC 3986 host: a registered
hostname, an FQDN, an IPv4 address, an IPv6 address, optionally
followed by a port. Form 2 is used for diagnostic operations
addressing a specific server instance (a particular edge node, a
specific deployment in a load-balanced fleet, a server identified
by IP) and for method invocations that target server-level state
rather than agent-level state.</t>
          </section>
          <section anchor="form-2a-organization-level-discovery">
            <name>Form 2a — Organization-Level Discovery</name>
            <t>Form 2a addresses an organization's AGTP presence via its registered
DNS domain:</t>
            <artwork><![CDATA[
agtp://acme.com
agtp://example.org
]]></artwork>
            <t>The domain component <strong>MUST</strong> be a DNS-registered domain name with
at least one label. IP addresses, ports, and userinfo components
<strong>MUST NOT</strong> appear in Form 2a; URIs carrying any of these are
Form 2, not Form 2a.</t>
            <t>Form 2a resolution proceeds via standard DNS lookup of the domain,
then AGTP connection establishment on port 4480 against the
resolved address. The response is the organization's canonical
server manifest. Whether the domain resolves to a single AGTP
server, a load-balanced fleet, or a CDN-fronted edge is a
deployment concern; Form 2a does not commit the caller to any
specific topology.</t>
            <t>The syntactic distinction between Form 2 (any RFC 3986 host,
possibly with port) and Form 2a (bare DNS domain) corresponds to a
semantic distinction. Form 2 addresses a specific reachable
server; Form 2a addresses whichever server the organization's DNS
currently points at. Both are valid; they differ in caller intent.</t>
          </section>
          <section anchor="forms-3-and-4-domain-anchored-agents">
            <name>Forms 3 and 4 — Domain-Anchored Agents</name>
            <t>Forms 3 and 4 address an agent by local name within a domain's
agent namespace:</t>
            <artwork><![CDATA[
Form 3: agtp://acme.com/agents/bookbot
Form 4: agtp://agtp.acme.com/agents/bookbot
]]></artwork>
            <t>Form 3 places the agent under the organization's primary domain.
Form 4 places the agent under a dedicated <tt>agtp.</tt> subdomain.
Resolution semantics are identical: the AGTP server at the domain
(or subdomain) consults its <tt>hosted_agents</tt> manifest entries and
returns the canonical Agent-ID for the named local agent. The local
agent name is unique within the domain's namespace; the same name
under a different domain is a different agent.</t>
            <t>Forms 3 and 4 differ only in deployment convention. Operators
choose based on their infrastructure preferences: organizations
that prefer to keep agent-protocol traffic on a dedicated subdomain
use Form 4; organizations that operate AGTP as the canonical face
of their primary domain use Form 3. The protocol treats them as
equivalent.</t>
            <t>In both forms the domain component <strong>MUST</strong> be a DNS-registered
domain name; IPs and ports <strong>MUST NOT</strong> appear. Direct addressing
with explicit host is available via Form 1a if the resolver knows
the canonical Agent-ID.</t>
          </section>
        </section>
        <section anchor="uri-grammar">
          <name>URI Grammar</name>
          <t>The URI grammar is defined in ABNF as:</t>
          <artwork><![CDATA[
AGTP-URI     = "agtp://" agtp-locator
agtp-locator = agent-id [ "@" host ]                 ; Form 1, 1a
             / host                                    ; Form 2
             / domain                                  ; Form 2a
             / domain "/agents/" agent-name            ; Form 3
             / "agtp." domain "/agents/" agent-name    ; Form 4
agent-id     = 64HEXDIG                               ; lowercase hex
host         = IP-literal / IPv4address / reg-name [ ":" port ]
                                                      ; per RFC 3986
domain       = label *("." label)                     ; DNS-registered, no port
label        = ALPHA *( ALPHA / DIGIT / "-" )
agent-name   = 1*( ALPHA / DIGIT / "-" / "_" )
port         = 1*DIGIT
                                                      ; OPTIONAL; defaults to 4480
]]></artwork>
          <t>AGTP URIs are addresses, not filenames. File extensions in the
path <strong>MUST NOT</strong> appear in canonical <tt>agtp://</tt> URIs. A URI
resolves to an Agent Identity Document, a server manifest, or an
endpoint response derived from server state; it does not expose or
serve a package file.</t>
          <t>Implementations <strong>MUST</strong> treat any URI containing a file extension
in the path as non-canonical and <strong>SHOULD</strong> issue a 301 Moved
Permanently redirect to the canonical form prior to resolution.</t>
        </section>
        <section anchor="method-on-uri-invocation-pattern">
          <name>Method-on-URI Invocation Pattern</name>
          <t>AGTP method invocations target a URI plus an optional endpoint
path. The conceptual pattern is:</t>
          <artwork><![CDATA[
METHOD agtp://[locator]/[endpoint-path]
]]></artwork>
          <t>The locator addresses an agent (Forms 1, 1a, 3, 4), a server
(Form 2), or an organization (Form 2a). The endpoint path is the
path portion of the request line as specified in <xref target="wire-format"/>.
For server-level and organization-level discovery operations the
endpoint path is omitted (target-less DISCOVER); for agent-level
operations the endpoint path identifies the endpoint to invoke.</t>
          <t>The wire-level encoding of this pattern is the AGTP request line
(method and path) plus the connection target (host derived from
the URI). The URI is the agent-facing addressing notation; the
wire format is what travels over TLS.</t>
        </section>
        <section anchor="web3-verification-anchors">
          <name>Web3 Verification Anchors</name>
          <t>AGTP supports Web3-anchored verification paths for canonical
Agent-IDs whose underlying Agent Genesis is registered through a
blockchain-based verification service. The verification path is
declared in the agent's registry record per <xref target="verification-paths"/>
and does not affect URI syntax: a Web3-anchored agent is addressed
by its canonical Agent-ID via Form 1 or Form 1a like any other
agent.</t>
          <t>Integration with specific Web3 naming and resolution systems is
specified in <xref target="AGTP-WEB3"/>.</t>
        </section>
        <section anchor="non-canonical-forms-and-redirect-behavior">
          <name>Non-Canonical Forms and Redirect Behavior</name>
          <t>The following non-canonical forms <strong>SHOULD</strong> be redirected to their
canonical equivalents. Implementations <strong>MUST NOT</strong> serve package
contents in response to any URI form.</t>
          <table>
            <name>Non-Canonical URI Forms and Redirect Targets</name>
            <thead>
              <tr>
                <th align="left">Received URI</th>
                <th align="left">Canonical Redirect Target</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service.agent</tt></td>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service.nomo</tt></td>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service.agtp</tt></td>
                <td align="left">
                  <tt>agtp://acme.tld/agents/customer-service</tt></td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="query-parameters-for-format-selection">
          <name>Query Parameters for Format Selection</name>
          <t>All AGTP URI resolution requests accept an optional <tt>format</tt> query
parameter controlling the serialization of the returned document.</t>
          <table>
            <name>AGTP URI Format Query Parameters</name>
            <thead>
              <tr>
                <th align="left">Query Parameter</th>
                <th align="left">Returned Representation</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">(none)</td>
                <td align="left">Agent Identity Document, human-readable <tt>application/vnd.agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=manifest</tt></td>
                <td align="left">Agent Identity Document, human-readable <tt>application/vnd.agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=json</tt></td>
                <td align="left">Agent Identity Document, compact <tt>application/vnd.agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=certificate</tt></td>
                <td align="left">Agent Genesis fields only, <tt>application/vnd.agtp+json</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>?format=status</tt></td>
                <td align="left">Lifecycle state and operational status only, <tt>application/vnd.agtp+json</tt></td>
              </tr>
            </tbody>
          </table>
          <t>All format variants return signed <tt>application/vnd.agtp+json</tt> content.
The <tt>?format=json</tt> parameter is intended for programmatic consumers.
The default returns the full human-readable manifest suitable for
browser rendering by an AGTP-aware client.</t>
        </section>
        <section anchor="resolution-mechanics">
          <name>Resolution Mechanics</name>
          <t>AGTP URI resolution proceeds according to the URI form presented.
Form 1 and Form 1a (canonical agent identity) resolve through a
governance-platform registry or transparency-log lookup. Forms 2
and 2a (server and organization discovery) resolve through
direct AGTP connection establishment to the host or domain. Forms
3 and 4 (domain-anchored agents) resolve through DNS to an AGTP
server whose <tt>hosted_agents</tt> manifest maps the URI's local agent
name to a canonical Agent-ID.</t>
          <section anchor="form-1-resolution-canonical-id">
            <name>Form 1 Resolution (Canonical ID)</name>
            <t>When an AGTP resolver receives a URI of the form
<tt>agtp://[256-bit-hex-id]</tt>, it <strong>MUST</strong> perform the following steps:</t>
            <ol spacing="normal" type="1"><li>
                <t>Parse and validate the canonical Agent-ID. If the identifier is
malformed (length, character set), return <tt>400 Bad Request</tt> with
error code <tt>invalid-canonical-id</tt>.</t>
              </li>
              <li>
                <t>Query the agent's governance platform registry for the record
associated with the canonical Agent-ID. If the resolver does not
know which governance platform holds the record, it <strong>MAY</strong> query
a transparency log per Section 5.2 to locate the record.</t>
              </li>
              <li>
                <t>Verify the registry record lifecycle state. If Suspended, return
<tt>503 Service Unavailable</tt> with lifecycle state in the response
body. If Revoked or Deprecated, return <tt>410 Gone</tt> with lifecycle
state and revocation timestamp.</t>
              </li>
              <li>
                <t>Retrieve the agent's package (<tt>.agent</tt> or <tt>.nomo</tt>) from the
package store referenced by the registry record.</t>
              </li>
              <li>
                <t><strong>Verify the package integrity hash before proceeding.</strong> If
integrity verification fails, return <tt>500 Internal Error</tt> with
error code <tt>package-integrity-failure</tt>. <strong>MUST</strong> be logged.</t>
              </li>
              <li>
                <t>Extract the embedded manifest from the verified package.</t>
              </li>
              <li>
                <t>Sign the Identity Document using the governance platform's signing
key. Return the signed <tt>application/vnd.agtp+json</tt> document in the
format specified by the query parameter.</t>
              </li>
            </ol>
            <t>Form 1 resolution does not require prior knowledge of an organization
domain, a DNS record, or a Web3 naming anchor. The canonical Agent-ID
is sufficient input.</t>
          </section>
          <section anchor="forms-2-and-2a-resolution-server-and-organization-discovery">
            <name>Forms 2 and 2a Resolution (Server and Organization Discovery)</name>
            <t>When an AGTP resolver receives a URI of Form 2 (<tt>agtp://[host]</tt>) or
Form 2a (<tt>agtp://[domain]</tt>), it <strong>MUST</strong> perform the following
steps:</t>
            <ol spacing="normal" type="1"><li>
                <t>Parse and validate the URI. Form 2 admits any RFC 3986 host with
optional port. Form 2a admits a DNS-registered domain name with
at least one label and <strong>MUST NOT</strong> include port or userinfo
components.</t>
              </li>
              <li>
                <t>Open an AGTP/TLS connection to the host or domain. For Form 2a,
resolve the domain via DNS first. For both forms, AGTP traffic
targets port 4480 unless an explicit non-default port appears in
the URI (Form 2 only).</t>
              </li>
              <li>
                <t>Issue the agent's intended method (typically <tt>DISCOVER</tt> for
discovery operations) with no agent-identifying target.</t>
              </li>
              <li>
                <t>The server returns its server manifest (for Form 2 or Form 2a
addressed against a server's primary endpoint) or whatever
server-level response the invoked method produces.</t>
              </li>
            </ol>
            <t>Forms 2 and 2a do not resolve to a canonical Agent-ID; they target
server or organization state directly. They do not participate in
the canonical-Agent-ID identity model.</t>
          </section>
          <section anchor="forms-3-and-4-resolution-domain-anchored-agents">
            <name>Forms 3 and 4 Resolution (Domain-Anchored Agents)</name>
            <t>When an AGTP resolver receives a URI of Form 3 or Form 4, it
<strong>MUST</strong> perform the following steps:</t>
            <ol spacing="normal" type="1"><li>
                <t>Parse and validate the URI. If the URI is malformed, return
<tt>400 Bad Request</tt> with error code <tt>invalid-uri-form</tt>.</t>
              </li>
              <li>
                <t>Resolve the domain (Form 3) or <tt>agtp.[domain]</tt> subdomain
(Form 4) via DNS, then open an AGTP/TLS connection to port 4480.</t>
              </li>
              <li>
                <t>Look up the <tt>agent-name</tt> from the URI path against the server's
<tt>hosted_agents</tt> manifest entries to obtain the canonical
Agent-ID. If no matching agent is found, return <tt>404 Not Found</tt>.</t>
              </li>
              <li>
                <t>Continue with Form 1 resolution steps 3 through 7 using the
resolved canonical Agent-ID.</t>
              </li>
            </ol>
            <t>The package's executable content, code, logic, and any fields not
included in the Identity Document schema <strong>MUST NOT</strong> be returned
at any step of any resolution path. URI resolution exposes identity
and status exclusively.</t>
          </section>
        </section>
        <section anchor="verification-paths">
          <name>Trust Tiers and Verification Paths</name>
          <t>The Agent Genesis carries a <tt>trust_tier</tt> field (one of <tt>1</tt>
Verified, <tt>2</tt> Org-Asserted, <tt>3</tt> Experimental) and a
<tt>verification_path</tt> field (one of <tt>dns-anchored</tt>, <tt>log-anchored</tt>,
<tt>hybrid</tt>, or <tt>org-asserted</tt>) recording how the agent's identity
was anchored at ACTIVATE time. These fields are surfaced in the
Agent Identity Document and consulted by Scope-Enforcement Points,
governance gateways, and peer agents during runtime authority
decisions.</t>
          <t>Tier 1 agents are eligible for the full Authority-Scope vocabulary,
delegation chains, financial transactions, and multi-organization
collaboration. Tier 1 verification requires exactly one of three
verification paths (<tt>dns-anchored</tt>, <tt>log-anchored</tt>, <tt>hybrid</tt>) to
succeed at ACTIVATE time, each backed by distinct evidence (DNS
TXT record, transparency log inclusion proof, or DNS + blockchain
signature combination). All Tier 1 paths produce identity
attestations of equivalent strength.</t>
          <t>Tier 2 agents declare organizational affiliation without
cryptographic verification (<tt>verification_path: org-asserted</tt>) and
carry the <tt>trust_warning: "verification-incomplete"</tt> signal. Tier
3 agents are experimental and confined to development environments.</t>
          <t>The normative verification procedures, evidence requirements, tier
assignment rules, and Authority-Scope eligibility constraints are
specified in <xref target="AGTP-TRUST"/>.</t>
        </section>
        <section anchor="subdomain-deployment-pattern">
          <name>Subdomain Deployment Pattern</name>
          <t>Organizations <strong>SHOULD</strong> deploy AGTP endpoints at a dedicated
subdomain following the pattern <tt>agtp.[organization-domain.tld]</tt>
(e.g., <tt>agtp.acme.tld</tt>). This is the recommended enterprise
deployment pattern: it provides clean separation between web and
agent infrastructure, allows independent certificate management for
the AGTP endpoint, and is consistent with service-specific subdomain
conventions. An organization with an AGTP subdomain <strong>SHOULD</strong> also
configure their primary domain to redirect AGTP requests:</t>
          <artwork><![CDATA[
agtp://acme.tld/agents/customer-service
  → 301 → agtp://agtp.acme.tld/agents/customer-service
]]></artwork>
        </section>
        <section anchor="the-agents-reserved-path-prefix">
          <name>The /agents/ Reserved Path Prefix</name>
          <t>The path prefix <tt>/agents/</tt> is reserved in all <tt>agtp://</tt> URIs for
agent namespace operations. Implementations <strong>MUST</strong> support this
prefix. The registry root at <tt>/agents</tt> (no trailing label) resolves
to the Agent Namespace Document (see Section 5.4).</t>
        </section>
        <section anchor="collision-prevention">
          <name>Collision Prevention</name>
          <t>The canonical Agent-ID is the collision-prevention primitive. Two
canonical Agent-IDs are distinct if and only if the 256-bit
identifiers differ, and the governance platform enforces uniqueness
at issuance time by deriving the ID from the Agent Genesis hash.</t>
          <t>For alias forms, collision prevention operates at the namespace
level. <tt>agtp://acme.com/agents/customer-service</tt> and
<tt>agtp://chrishood.com/agents/customer-service</tt> resolve to distinct
canonical Agent-IDs because they are registered under different
DNS domains. Within a single governance zone, the governance
platform enforces uniqueness of agent local names at registration
time.</t>
          <t>Infrastructure <strong>MUST</strong> use the canonical Agent-ID for all routing,
logging, and attribution operations. Alias URIs are a display and
discovery layer only. An alias that resolves to a canonical Agent-ID
different from the one carried in the <tt>Agent-ID</tt> header on a request
<strong>MUST</strong> cause the request to be rejected with <tt>401 Unauthorized</tt>
and <strong>MUST</strong> be logged.</t>
        </section>
        <section anchor="iana-considerations-for-the-agtp-uri-scheme">
          <name>IANA Considerations for the agtp:// URI Scheme</name>
          <t>The <tt>agtp://</tt> URI scheme is registered with IANA per <xref target="RFC7595"/>.
Registration template:</t>
          <dl>
            <dt>URI scheme name:</dt>
            <dd>
              <t>agtp</t>
            </dd>
            <dt>Status:</dt>
            <dd>
              <t>Permanent</t>
            </dd>
            <dt>URI scheme syntax:</dt>
            <dd>
              <t><tt>agtp://[Agent-ID]</tt> (canonical identity, Form 1)
<tt>agtp://[Agent-ID]@[host]</tt> (canonical identity with explicit host, Form 1a)
<tt>agtp://[host]</tt> (server-level discovery, Form 2)
<tt>agtp://[domain]</tt> (organization-level discovery, Form 2a)
<tt>agtp://[domain]/agents/[agent-name]</tt> (domain-anchored agent, Form 3)
<tt>agtp://agtp.[domain]/agents/[agent-name]</tt> (subdomain-anchored agent, Form 4)</t>
            </dd>
            <dt>URI scheme semantics:</dt>
            <dd>
              <t>Identifies an AI agent, an AGTP server, or an organizational AGTP
presence operating over the Agent Transfer Protocol. The
authoritative agent identification form (Form 1) uses a 256-bit
hex-encoded cryptographic identifier derived from the agent's
Agent Genesis. Form 1a augments the canonical ID with an
explicit host to enable direct addressing in deployments where
the canonical ID has not yet been resolved through a registry.
Forms 2 and 2a address servers and organizations respectively
for discovery operations that do not target a specific agent.
Forms 3 and 4 address agents by local name within a domain's
namespace and resolve to canonical Agent-IDs through the
server's <tt>hosted_agents</tt> manifest. Forms 3 and 4 differ only in
deployment convention.</t>
            </dd>
            <dt>Applications/protocols that use this URI scheme:</dt>
            <dd>
              <t>Agent Transfer Protocol (this document)</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>The canonical Agent-ID form is the authoritative agent identity
representation. Form 1a embeds a resolution hint alongside the
canonical Agent-ID and <strong>MUST NOT</strong> be used to derive identity.
Forms 3 and 4 resolve through DNS to an AGTP server endpoint
whose <tt>hosted_agents</tt> manifest maps the URI path component to a
canonical Agent-ID. Forms 2 and 2a do not resolve to canonical
Agent-IDs; they target server or organization state directly.
Implementations <strong>MUST</strong> accept canonical Agent-IDs (Form 1) and
<strong>SHOULD</strong> support at least one of the domain-anchored agent
forms (Form 3 or Form 4). The port portion of any AGTP URI is
OPTIONAL and defaults to the IANA-assigned port 4480 when
omitted; ports <strong>MAY</strong> appear in Form 1a and Form 2 only. File
format suffixes (<tt>.agtp</tt>, <tt>.agent</tt>, <tt>.nomo</tt>) <strong>MUST NOT</strong> appear
in <tt>agtp://</tt> URIs.</t>
            </dd>
            <dt>Contact:</dt>
            <dd>
              <t>Chris Hood, chris@nomotic.ai</t>
            </dd>
            <dt>References:</dt>
            <dd>
              <t>This document</t>
            </dd>
          </dl>
          <t>The <tt>agtp://</tt> URI scheme registration is open and unencumbered. No
intellectual property claims apply to the URI scheme itself.</t>
        </section>
        <section anchor="well-known-bootstrap">
          <name>.well-known Bootstrap</name>
          <t>Organizations operating an AGTP namespace under a DNS domain
<strong>SHOULD</strong> publish a bootstrap document at the well-known URI
<tt>https://{domain}/.well-known/agtp</tt> per <xref target="RFC8615"/>. The document is
returned over HTTPS and declares the organization's AGTP presence,
the endpoint at which AGTP traffic should be directed, and any
verification anchors the organization wishes to surface for
discovery.</t>
          <t>The bootstrap document is JSON with the following fields:</t>
          <sourcecode type="json"><![CDATA[
{
  "agtp_version": "0.7",
  "endpoint": "agtp://agtp.acme.tld/agents",
  "namespace_root": "agtp://acme.tld/agents",
  "verification": {
    "dns_anchor": "_agtp.acme.tld",
    "log_anchor": null
  },
  "issuer": "https://ca.acme.tld",
  "discovery": {
    "namespace_document": "https://agtp.acme.tld/agents.json",
    "well_known_updated_at": "2026-04-30T00:00:00Z"
  }
}
]]></sourcecode>
          <t>Resolvers encountering an <tt>agtp://</tt> URI for a domain they have not
previously interacted with <strong>SHOULD</strong> retrieve the bootstrap document
to learn the canonical AGTP endpoint and verification anchors before
attempting AGTP traffic. The bootstrap is advisory; absence of a
<tt>.well-known/agtp</tt> document does not indicate that the domain has no
AGTP presence, only that the domain has not chosen to advertise one
through this mechanism.</t>
          <t>A <tt>.well-known/agtp</tt> document returning HTTP 404 is a positive
declaration that the domain operates no AGTP namespace. Resolvers
<strong>MAY</strong> cache this negative result for the period indicated by the
HTTP response's <tt>Cache-Control</tt> directive, with a default of 24
hours when no directive is present.</t>
        </section>
      </section>
      <section anchor="agent-namespace-document">
        <name>Agent Namespace Document</name>
        <section anchor="purpose-and-scope">
          <name>Purpose and Scope</name>
          <t>The Agent Namespace Document is the index of all Active agents
registered under an organization's governance zone. It is returned
in response to a request targeting the <tt>/agents</tt> path:</t>
          <artwork><![CDATA[
agtp://acme.tld/agents
agtp://agtp.acme.tld/agents
]]></artwork>
          <t>The Agent Namespace Document is not a manually editable file. It is
generated and cryptographically signed by the governance platform each
time the registry changes. Any Namespace Document that fails signature
verification <strong>MUST</strong> be rejected by the requesting party.</t>
        </section>
        <section anchor="document-schema">
          <name>Document Schema</name>
          <figure>
            <name>Agent Namespace Document Schema</name>
            <sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-namespace",
  "schema_version": "1.0",
  "org_domain": "acme.tld",
  "governance_zone": "zone:acme-internal",
  "generated_at": "2026-03-20T14:00:00Z",
  "signature": {
    "algorithm": "ES256",
    "key_id": "agtp-gov-key-acme-01",
    "value": "[base64-encoded-signature]"
  },
  "agents": [
    {
      "agent_label": "customer-service",
      "canonical_id": "3a9f2c1d8b7e4a6f...",
      "lifecycle_state": "Active",
      "trust_tier": 1,
      "cert_status": "Active",
      "manifest_uri": "agtp://agtp.acme.tld/agents/customer-service",
      "activated_at": "2026-01-15T09:00:00Z",
      "last_updated": "2026-03-01T11:30:00Z"
    }
  ],
  "total_active": 1,
  "namespace_cert_fingerprint": "b2c4d6e8..."
}
]]></sourcecode>
          </figure>
          <t>The <tt>agents</tt> array <strong>MUST</strong> include only agents in Active lifecycle
state. Suspended, Revoked, and Deprecated agents <strong>MUST NOT</strong> appear
in the Namespace Document.</t>
        </section>
        <section anchor="integrity-and-freshness">
          <name>Integrity and Freshness</name>
          <t>The Namespace Document <strong>MUST</strong> include a <tt>generated_at</tt> timestamp.
Implementations <strong>SHOULD</strong> treat Namespace Documents older than a
configurable freshness threshold (default: 300 seconds) as stale and
re-request. The governance platform <strong>MUST</strong> re-sign the Namespace
Document within 60 seconds of any registry change.</t>
          <t>The signature covers the entire document including <tt>generated_at</tt>.
Replaying an older signed Namespace Document to conceal a revocation
event is a known attack vector; implementations <strong>MUST</strong> reject
Namespace Documents with a <tt>generated_at</tt> timestamp older than the
freshness threshold.</t>
        </section>
      </section>
      <section anchor="identity-document">
        <name>Agent Identity Document and the .agtp Format</name>
        <section anchor="purpose-and-scope-1">
          <name>Purpose and Scope</name>
          <t>The Agent Identity Document is the protocol's canonical representation
of a specific agent's identity, status, and behavioral scope. Prior
versions of this specification referred to this artifact as the Agent
Manifest Document; v07 renames it to the Agent Identity Document to
reflect its IANA-registered media type
(<tt>application/vnd.agtp.identity+json</tt>) and to clarify its role as the
identity primitive of the protocol. The Identity Document is returned
in response to any AGTP URI resolution request targeting a specific
agent:</t>
          <artwork><![CDATA[
agtp://[canonical-agent-id]
agtp://acme.tld/agents/customer-service
agtp://acme.tld/agents/customer-service?format=json
]]></artwork>
          <t>The Identity Document is derived from the embedded manifest inside the
agent's <tt>.agent</tt> or <tt>.nomo</tt> package. It is not a separate file that can
be independently modified. The governance platform <strong>MUST</strong> verify the
package integrity hash before extracting and serving the Identity
Document.</t>
        </section>
        <section anchor="the-three-document-formats-and-their-relationship">
          <name>The Three Document Formats and Their Relationship</name>
          <figure anchor="format-relationship">
            <name>Relationship Between AGTP File Formats</name>
            <artwork><![CDATA[
.agent   ──── open packaging format (patent pending, Chris Hood)
  │           Contains: manifest + integrity hash + behavioral
  │           trust score + executable content
  │
.nomo    ──── governed packaging format (patent pending, Chris Hood)
  │           Contains: .agent contents + CA-signed cert chain
  │           + governance zone binding
  │
  Both produce ↓ when queried via agtp:// URI
  │
.agtp    ──── wire-level Identity Document (this spec)
              Contains: identity fields, lifecycle state, trust
              tier, trust score, behavioral scope, methods,
              capabilities, verification anchors
              Open format defined by AGTP specification
              Content-Type: application/vnd.agtp.identity+json
]]></artwork>
          </figure>
          <t>The <tt>.agtp</tt> format is the protocol's own document type. It is what
gets transmitted over the wire. The <tt>.agent</tt> and <tt>.nomo</tt> formats are
what get deployed. An AGTP implementation is not required to understand
<tt>.agent</tt> or <tt>.nomo</tt> packaging internals; it is only required to
produce and consume <tt>.agtp</tt> Identity Documents.</t>
          <t>Additional packaging formats <strong>MAY</strong> be defined by third parties,
provided they can produce conformant <tt>.agtp</tt> Identity Documents when
queried. Such formats <strong>MUST</strong> implement the integrity verification
requirement: the Identity Document <strong>MUST</strong> be derived from a verified
package, not from an independently stored or editable file.</t>
        </section>
        <section anchor="agent-identity-document-schema">
          <name>Agent Identity Document Schema</name>
          <t>The Agent Identity Document carries three categories of fields:
<strong>REQUIRED</strong> fields that every Identity Document <strong>MUST</strong> contain;
<strong>RECOMMENDED</strong> fields that <strong>SHOULD</strong> be present when the
corresponding information is available; and <strong>CONDITIONAL</strong> fields
that <strong>MUST</strong> be present when the conditions described later in this
section are met.</t>
          <t>The following fields are <strong>REQUIRED</strong> in all Agent Identity Documents:</t>
          <figure>
            <name>Agent Identity Document - Required Fields</name>
            <sourcecode type="json"><![CDATA[
{
  "agtp_version": "0.7",
  "document_type": "agtp-identity",
  "document_version": "1.0",
  "agent_id": "3a9f2c1d8b7e4a6f0c2d5e9b1a3f7c0d...",
  "name": "customer-service",
  "description": "Handles customer service requests.",
  "principal": "Acme Corporation",
  "principal_id": "acme.tld",
  "issuer": "https://ca.acme.tld",
  "issued_at": "2026-01-15T09:00:00Z",
  "updated_at": "2026-03-01T11:30:00Z",
  "status": "Active",
  "methods": [
    "QUERY", "DESCRIBE", "SUMMARIZE",
    "EXECUTE", "ESCALATE", "CONFIRM", "NOTIFY"
  ],
  "capabilities": [
    "customer-service:tier-1",
    "knowledge-base:read",
    "ticket-system:create"
  ],
  "scopes_accepted": [
    "documents:query",
    "knowledge:query",
    "calendar:book",
    "escalation:route"
  ],
  "trust_score": 0.94
}
]]></sourcecode>
          </figure>
          <t>Field semantics:</t>
          <dl>
            <dt><tt>agtp_version</tt>:</dt>
            <dd>
              <t>The version of the AGTP protocol the agent speaks. SemVer string.</t>
            </dd>
            <dt><tt>document_type</tt>:</dt>
            <dd>
              <t>Self-identification of the document. <strong>MUST</strong> be <tt>agtp-identity</tt>
for documents conforming to this specification.</t>
            </dd>
            <dt><tt>document_version</tt>:</dt>
            <dd>
              <t>The schema version of the Identity Document itself. SemVer string.
Distinct from <tt>agtp_version</tt>. Permits the document schema to evolve
independently of the protocol.</t>
            </dd>
            <dt><tt>agent_id</tt>:</dt>
            <dd>
              <t>The 256-bit canonical Agent-ID, hex-encoded, derived from the
agent's Agent Genesis hash. Authoritative in every AGTP protocol
operation.</t>
            </dd>
            <dt><tt>name</tt>:</dt>
            <dd>
              <t>A human-readable label for the agent. Not unique across the AGTP
ecosystem; uniqueness is provided by <tt>agent_id</tt>.</t>
            </dd>
            <dt><tt>description</tt>:</dt>
            <dd>
              <t>Short prose describing what the agent does.</t>
            </dd>
            <dt><tt>principal</tt>:</dt>
            <dd>
              <t>The human-readable name of the organization or individual that
governs the agent.</t>
            </dd>
            <dt><tt>principal_id</tt>:</dt>
            <dd>
              <t>A stable, machine-readable identifier for the principal (typically
the principal's primary DNS domain, or a canonical organization
identifier).</t>
            </dd>
            <dt><tt>issuer</tt>:</dt>
            <dd>
              <t>The URL of the issuer that signed the Identity Document. The
issuer's public key is published at a well-known location under
this URL; signature verification details are specified in
<xref target="AGTP-CERT"/>.</t>
            </dd>
            <dt><tt>issued_at</tt>:</dt>
            <dd>
              <t>ISO 8601 timestamp at which the Identity Document was first issued
(typically the moment of ACTIVATE).</t>
            </dd>
            <dt><tt>updated_at</tt>:</dt>
            <dd>
              <t>ISO 8601 timestamp at which the Identity Document was last updated.
Promotes freshness checks. <strong>MUST</strong> be greater than or equal to
<tt>issued_at</tt>.</t>
            </dd>
            <dt><tt>status</tt>:</dt>
            <dd>
              <t>The lifecycle state of the agent. One of: <tt>Active</tt>, <tt>Suspended</tt>,
<tt>Revoked</tt>, <tt>Deprecated</tt>, <tt>Pending</tt>.</t>
            </dd>
            <dt><tt>methods</tt>:</dt>
            <dd>
              <t>The set of AGTP methods the agent's server speaks. <strong>MUST</strong> include
every method the server is prepared to accept. The protocol-defined
twelve-method floor (see <xref target="methods-section"/>) <strong>MUST</strong> be
represented if the server claims AGTP conformance.</t>
            </dd>
            <dt><tt>capabilities</tt>:</dt>
            <dd>
              <t>Higher-level service descriptors of what the agent can do.
Distinct from <tt>methods</tt>: methods are the protocol verbs the
server speaks; capabilities are the application-level competencies
the agent exposes through those methods.</t>
            </dd>
            <dt><tt>scopes_accepted</tt>:</dt>
            <dd>
              <t>The Authority-Scope tokens the agent will accept on inbound
requests. Format and semantics defined in <xref target="authority-scope"/>.</t>
            </dd>
            <dt><tt>trust_score</tt>:</dt>
            <dd>
              <t>A scalar value on the closed interval [0.0, 1.0] expressing
behavioral trust assessed by the agent's principal or governance
platform. Computation methodology, freshness requirements, and
signature binding are specified in <xref target="AGTP-TRUST"/>. The base AGTP
specification carries the field; AGTP-TRUST specifies how the value
is produced and verified.</t>
            </dd>
          </dl>
          <t>The following fields are <strong>RECOMMENDED</strong>:</t>
          <figure>
            <name>Agent Identity Document - Recommended Fields</name>
            <sourcecode type="json"><![CDATA[
{
  "trust_tier": 1,
  "org_domain": "acme.tld",
  "governance_zone": "zone:acme-internal",
  "verification_path": "dns-anchored",
  "cert_fingerprint": "b2c4d6e8...",
  "cert_status": "Active",
  "dns_anchor_record": "_agtp.acme.tld TXT agtp-zone=...",
  "log_inclusion_proof": null,
  "package_format": "nomo",
  "package_integrity_hash": "sha256:[hash]",
  "audit_log_uri": "agtp://agtp.acme.tld/audit/customer-service",
  "escalation_policy": "route-to-human-on-scope-limit",
  "delegation_permitted": false,
  "max_delegation_depth": 0
}
]]></sourcecode>
          </figure>
          <dl>
            <dt><tt>trust_tier</tt>:</dt>
            <dd>
              <t>Tier classification per <xref target="AGTP-TRUST"/>. One of <tt>1</tt>, <tt>2</tt>,
or <tt>3</tt>.</t>
            </dd>
            <dt><tt>org_domain</tt>:</dt>
            <dd>
              <t>The DNS domain under which the agent is registered, when applicable.</t>
            </dd>
            <dt><tt>governance_zone</tt>:</dt>
            <dd>
              <t>The governance zone identifier for the agent's deployment context.</t>
            </dd>
            <dt><tt>verification_path</tt>:</dt>
            <dd>
              <t>The Tier 1 verification path used at ACTIVATE time. One of
<tt>dns-anchored</tt>, <tt>log-anchored</tt>, or <tt>hybrid</tt>. <strong>MUST</strong> match the
<tt>verification_path</tt> field of the underlying Agent Genesis.
Detailed semantics specified in <xref target="AGTP-CERT"/>.</t>
            </dd>
            <dt><tt>cert_fingerprint</tt>, <tt>cert_status</tt>:</dt>
            <dd>
              <t>AGTP Agent Certificate metadata. Specified in <xref target="AGTP-CERT"/>.</t>
            </dd>
            <dt><tt>dns_anchor_record</tt>:</dt>
            <dd>
              <t>Populated when <tt>verification_path</tt> is <tt>dns-anchored</tt> or <tt>hybrid</tt>.</t>
            </dd>
            <dt><tt>log_inclusion_proof</tt>:</dt>
            <dd>
              <t>Populated when <tt>verification_path</tt> is <tt>log-anchored</tt>. Carries the
transparency log inclusion proof per <xref target="RFC9162"/> or the COSE_Sign1
receipt per <xref target="RFC9943"/>. Detailed semantics specified in
<xref target="AGTP-LOG"/>.</t>
            </dd>
            <dt><tt>package_format</tt>, <tt>package_integrity_hash</tt>:</dt>
            <dd>
              <t>Deployment-layer metadata identifying the package format and the
hash that the Identity Document was extracted from.</t>
            </dd>
            <dt><tt>audit_log_uri</tt>:</dt>
            <dd>
              <t>AGTP URI of the agent's audit log resource.</t>
            </dd>
            <dt><tt>escalation_policy</tt>, <tt>delegation_permitted</tt>, <tt>max_delegation_depth</tt>:</dt>
            <dd>
              <t>Policy fields governing the agent's escalation and delegation
behavior.</t>
            </dd>
          </dl>
          <t>The following fields are <strong>CONDITIONAL</strong> and <strong>MUST</strong> be present
when the conditions described below are met:</t>
          <dl>
            <dt><tt>trust_warning</tt>:</dt>
            <dd>
              <t><strong>REQUIRED</strong> when <tt>trust_tier</tt> is <tt>2</tt>, or when <tt>trust_score</tt> is
below the threshold configured by the issuer. Value is a short
string identifying the warning class (e.g.,
<tt>verification-incomplete</tt>, <tt>trust-score-degraded</tt>).</t>
            </dd>
            <dt><tt>trust_explanation</tt>:</dt>
            <dd>
              <t><strong>REQUIRED</strong> when <tt>trust_warning</tt> is present. Value is a prose
description suitable for surfacing to a human operator or in audit
logs.</t>
            </dd>
          </dl>
          <t>The Identity Document is signed by the issuer. v07 carries the
signature as a forward reference to <xref target="AGTP-CERT"/>, which specifies
the signature envelope format (JWS or COSE_Sign1) wrapping the
Identity Document. Implementations conforming to this specification
<strong>MUST</strong> verify the signature on the Identity Document against the
issuer's published public key before treating any field in the
document as authoritative.</t>
        </section>
        <section anchor="what-the-identity-document-exposes-and-does-not-expose">
          <name>What the Identity Document Exposes and Does Not Expose</name>
          <t>The Agent Identity Document <strong>MUST</strong> expose:</t>
          <ul spacing="normal">
            <li>
              <t>The agent's identity (canonical Agent-ID, name, principal, governance zone)</t>
            </li>
            <li>
              <t>The agent's current operational status</t>
            </li>
            <li>
              <t>The agent's authority scopes accepted</t>
            </li>
            <li>
              <t>The agent's supported method vocabulary</t>
            </li>
            <li>
              <t>The agent's capability descriptors</t>
            </li>
            <li>
              <t>The agent's trust score and trust tier</t>
            </li>
            <li>
              <t>The agent's verification anchors and certificate metadata</t>
            </li>
            <li>
              <t>The agent's freshness metadata (<tt>issued_at</tt>, <tt>updated_at</tt>)</t>
            </li>
          </ul>
          <t>The Agent Identity Document <strong>MUST NOT</strong> expose:</t>
          <ul spacing="normal">
            <li>
              <t>Executable code, scripts, or logic</t>
            </li>
            <li>
              <t>Model weights or configurations</t>
            </li>
            <li>
              <t>Internal API keys or credentials</t>
            </li>
            <li>
              <t>Specific authority scope grant tokens</t>
            </li>
            <li>
              <t>Session history or prior action logs</t>
            </li>
          </ul>
          <t>No AGTP URI resolution path, including any query parameter
combination, <strong>MUST</strong> return package contents beyond the Identity
Document schema defined in this section.</t>
        </section>
        <section anchor="identity-document-tamper-proofing">
          <name>Identity Document Tamper-Proofing</name>
          <t>The tamper-proof guarantee rests on two mechanisms:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>Package integrity hash:</strong> Any modification to the package or its
embedded manifest invalidates the hash. The governance platform
<strong>MUST</strong> verify this hash before extracting the Identity Document.</t>
            </li>
            <li>
              <t><strong>Issuer signature envelope:</strong> The issuer signs the extracted
Identity Document inside the envelope format defined in
<xref target="AGTP-CERT"/>. The signature covers the full document including
the <tt>package_integrity_hash</tt> field (when present), creating a
verifiable chain from the served document back to the registered
package.</t>
            </li>
          </ol>
          <t>An Identity Document that fails either verification step <strong>MUST</strong> be
rejected, <strong>MUST NOT</strong> be served, and the failure <strong>MUST</strong> be logged.</t>
        </section>
      </section>
      <section anchor="browser-and-human-facing-interaction-model">
        <name>Browser and Human-Facing Interaction Model</name>
        <section anchor="the-separation-of-discovery-and-execution">
          <name>The Separation of Discovery and Execution</name>
          <figure anchor="browser-separation">
            <name>AGTP URI Use by Audience</name>
            <artwork><![CDATA[
agtp:// URI in a browser
  │
  └─→ Returns Agent Identity Document
        Human-readable view of identity and status
        Read-only. No execution. No code exposed.

agtp:// session initiated by an agent or AGTP client
  │
  └─→ Establishes authenticated AGTP session
        Method invocations (QUERY, EXECUTE, ESCALATE, etc.)
        Full protocol operation - not visible to browsers
]]></artwork>
          </figure>
          <t>The analogy to existing protocol conventions is direct. A <tt>mailto:</tt>
URI surfaces an address and hands off to a mail client; SMTP carries
the actual messages. Similarly, an <tt>agtp://</tt> URI surfaces identity
and status; AGTP carries agent traffic. Browsers do not become AGTP
clients by following an <tt>agtp://</tt> link.</t>
        </section>
        <section anchor="browser-behavior-for-agtp-uris">
          <name>Browser Behavior for agtp:// URIs</name>
          <t>Browsers that encounter an <tt>agtp://</tt> URI <strong>SHOULD</strong> behave as follows:</t>
          <ol spacing="normal" type="1"><li>
              <t>If a registered AGTP client is present (OS protocol handler), hand
off the URI to that client.</t>
            </li>
            <li>
              <t>If the browser supports <tt>agtp://</tt> natively or via extension, render
the returned Agent Identity Document as a structured human-readable
page. The rendered view <strong>MUST</strong> surface the trust tier indicator
prominently, following the visual convention established for TLS
trust in the browser chrome.</t>
            </li>
            <li>
              <t>If neither condition applies, the browser <strong>MAY</strong> fall back to a
gateway that translates between <tt>https://</tt> and <tt>agtp://</tt>. The
gateway <strong>MUST</strong> preserve all signature and trust tier fields.</t>
            </li>
          </ol>
        </section>
        <section anchor="human-readable-identity-document-view">
          <name>Human-Readable Identity Document View</name>
          <t>When an Agent Identity Document is rendered for human consumption,
the following fields <strong>MUST</strong> be prominently displayed:</t>
          <ul spacing="normal">
            <li>
              <t>Agent label and org domain</t>
            </li>
            <li>
              <t>Trust tier indicator (visual distinction between Tier 1, 2, and 3)</t>
            </li>
            <li>
              <t>Lifecycle state (Active / Suspended / Revoked / Deprecated)</t>
            </li>
            <li>
              <t>Job description</t>
            </li>
            <li>
              <t>Principal organization</t>
            </li>
            <li>
              <t>Activation date</t>
            </li>
            <li>
              <t>Behavioral trust score</t>
            </li>
            <li>
              <t>Authority scope categories (in human-readable form)</t>
            </li>
          </ul>
        </section>
        <section anchor="agtp-status-sub-resource">
          <name>AGTP Status Sub-Resource</name>
          <t>Implementations <strong>SHOULD</strong> support a <tt>status</tt> sub-path:</t>
          <artwork><![CDATA[
agtp://acme.tld/agents/customer-service/status
]]></artwork>
          <figure>
            <name>AGTP Status Sub-Resource Response</name>
            <sourcecode type="json"><![CDATA[
{
  "document_type": "agtp-status",
  "canonical_id": "3a9f2c1d8b7e4a6f...",
  "agent_label": "customer-service",
  "org_domain": "acme.tld",
  "lifecycle_state": "Active",
  "cert_status": "Active",
  "last_action_method": "QUERY",
  "last_action_timestamp": "2026-03-20T13:58:22Z",
  "active_session_count": 3,
  "pending_escalations": 0,
  "generated_at": "2026-03-20T14:00:00Z"
}
]]></sourcecode>
          </figure>
          <t>The <tt>active_session_count</tt> field <strong>SHOULD</strong> only be included if the
requester has appropriate observability permissions for the governance
zone.</t>
        </section>
      </section>
      <section anchor="agent-registration-process">
        <name>Agent Registration Process</name>
        <section anchor="overview">
          <name>Overview</name>
          <t>An agent cannot participate in AGTP until it has been issued an Agent
Agent Genesis by a governance platform and assigned a canonical
Agent-ID derived from that certificate. Canonical Agent-IDs are issued
through the ACTIVATE transaction; they are never self-declared.</t>
          <t>The Agent Genesis is the genesis record of an agent's legal
existence within the AGTP ecosystem. Its relationship to the canonical
Agent-ID is analogous to the relationship between a government-issued
birth registration and a social security number: the birth event
produces a permanent, authoritative identity record, and a durable
identifier is derived from it. The identifier follows the agent for
its entire lifecycle, including after revocation. It is never reissued
to another agent.</t>
          <t>Any AGTP infrastructure component <strong>MUST</strong> reject requests carrying
an Agent-ID that does not resolve to an Agent Genesis record in
an Active lifecycle state in a reachable registry.</t>
        </section>
        <section anchor="agent-genesis-contents">
          <name>Agent Genesis Contents</name>
          <t>The Agent Genesis is issued by the governance platform at
ACTIVATE time and contains the following fields:</t>
          <table>
            <name>Agent Genesis Fields</name>
            <thead>
              <tr>
                <th align="left">Field</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>agent_id</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Unique identifier for the agent</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>owner</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Human or team responsible for this agent</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>archetype</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Behavioral category (see archetypes below)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>governance_zone</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Environment context (development, staging, production)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>scope</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Authorized action types</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>issued_at</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Timestamp of issuance</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>certificate_hash</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Cryptographic fingerprint - basis for canonical Agent-ID</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>signature</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Signed with the org's governance key</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>package_ref</tt></td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Reference to the <tt>.agent</tt> or <tt>.nomo</tt> package</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>trust_tier</tt></td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Registration tier (1, 2, or 3)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>verification_path</tt></td>
                <td align="left">
                  <strong>MUST</strong> (Tier 1)</td>
                <td align="left">Path used to verify identity: <tt>dns-anchored</tt>, <tt>log-anchored</tt>, <tt>hybrid</tt>, or <tt>org-asserted</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>org_domain</tt></td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">DNS-verified or asserted org domain (required for <tt>dns-anchored</tt> and <tt>hybrid</tt>)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>org_label</tt></td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Agent-native org label (required for Form 2 hierarchical resolution)</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>log_inclusion_proof</tt></td>
                <td align="left">
                  <strong>MUST</strong> (log-anchored)</td>
                <td align="left">Transparency log inclusion proof (RFC 9162 / RFC 9943)</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="agent-archetypes">
          <name>Agent Archetypes</name>
          <t>The <tt>archetype</tt> field classifies the agent's behavioral category.
Archetypes inform scope enforcement and observability tooling; an
<tt>executor</tt> archetype agent exhibiting read-only query patterns, or a
<tt>monitor</tt> archetype agent attempting booking operations, are anomaly
signals. The archetype field does not restrict scope enforcement, 
Authority-Scope headers govern actual permissions at the protocol
level. Archetypes are a classification and observability signal,
not a security boundary.</t>
          <table>
            <name>Agent Archetypes</name>
            <thead>
              <tr>
                <th align="left">Archetype</th>
                <th align="left">Description</th>
                <th align="left">Typical Scope</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>assistant</tt></td>
                <td align="left">Conversational agent, read-heavy</td>
                <td align="left">
                  <tt>documents:query</tt>, <tt>knowledge:query</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>analyst</tt></td>
                <td align="left">Data analysis, read and aggregate</td>
                <td align="left">
                  <tt>data:read</tt>, <tt>data:aggregate</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>executor</tt></td>
                <td align="left">Takes real-world actions, write-heavy</td>
                <td align="left">
                  <tt>booking:*</tt>, <tt>payments:confirm</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>orchestrator</tt></td>
                <td align="left">Manages other agents</td>
                <td align="left">
                  <tt>delegation:*</tt>, <tt>agents:*</tt></td>
              </tr>
              <tr>
                <td align="left">
                  <tt>monitor</tt></td>
                <td align="left">Observational only</td>
                <td align="left">
                  <tt>telemetry:read</tt>, <tt>logs:read</tt></td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="agent-genesis-to-agtp-protocol-mapping">
          <name>Agent Genesis to AGTP Protocol Mapping</name>
          <t>Agent Genesis fields map to AGTP protocol elements that surface
during request processing. This mapping is the mechanism by which
static identity (the Agent Genesis) becomes runtime identity (the
protocol session):</t>
          <table>
            <name>Agent Genesis to AGTP Protocol Mapping</name>
            <thead>
              <tr>
                <th align="left">Agent Genesis Field</th>
                <th align="left">AGTP Protocol Element</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>agent_id</tt></td>
                <td align="left">
                  <tt>Agent-ID</tt> header on every request</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>owner</tt></td>
                <td align="left">Principal identifier in the agent identity document; not transmitted as a separate header</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>scope</tt></td>
                <td align="left">Full Authority-Scope set in the agent identity document; optionally narrowed per-request via the <tt>Authority-Scope</tt> header</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>certificate_hash</tt></td>
                <td align="left">Basis for canonical Agent-ID</td>
              </tr>
            </tbody>
          </table>
          <t>The canonical Agent-ID is derived from the <tt>certificate_hash</tt>. This
chain, package integrity hash → certificate hash → canonical Agent-ID, 
ensures that the identifier carried in the <tt>Agent-ID</tt> header on
every AGTP request is traceable back to the original Agent Genesis
and the human principal who authorized the agent's creation.</t>
        </section>
        <section anchor="registration-tiers">
          <name>Registration Tiers</name>
          <t>Registration produces an Agent Genesis at one of three trust tiers
(Tier 1 Verified, Tier 2 Org-Asserted, Tier 3 Experimental). Tier 1
registration requires one of three verification paths
(<tt>dns-anchored</tt>, <tt>log-anchored</tt>, <tt>hybrid</tt>) to succeed at ACTIVATE
time, each backed by distinct cryptographic evidence. Tier 2
registration declares organizational affiliation without
cryptographic proof; the resulting Agent Genesis carries
<tt>trust_warning: "verification-incomplete"</tt>. Tier 3 registration is
confined to development environments and produces a locally-scoped
Agent Genesis.</t>
          <t>The complete tier-specific packaging, evidence, and validation
requirements are specified in <xref target="AGTP-TRUST"/>.</t>
        </section>
        <section anchor="registration-lifecycle">
          <name>Registration Lifecycle</name>
          <figure anchor="agent-reg-lifecycle">
            <name>AGTP Agent Registration Lifecycle</name>
            <artwork><![CDATA[
1. PACKAGE
   Author creates .agent or .nomo package containing:
   - Embedded manifest (agent_label, job_description,
     authority_scope_categories, supported_methods,
     trust_score)
   - Integrity hash of all package contents
   - For .nomo: CA-signed certificate chain

2. SUBMIT (ACTIVATE transaction)
   Registrant submits ACTIVATE request to governance endpoint:
   - Package file (.agent or .nomo)
   - Proposed agent label and optional org_domain or org_label
   - Owner identity (maps to Agent Genesis owner field)
   - Archetype declaration
   - Declared trust_tier and verification_path with corresponding
     tier-specific evidence (see {{AGTP-TRUST}} for the evidence
     required by each verification path)

3. VALIDATE (governance platform)
   Governance platform:
   - Verifies package integrity hash
   - For .nomo: validates certificate chain
   - Applies verification-path-specific validation per
     {{AGTP-TRUST}} (DNS challenge, transparency log submission,
     or hybrid evidence verification, depending on declared path)
   - Checks proposed label for uniqueness within the relevant
     namespace (org_domain, org_label, or log-scoped)

4. ISSUE (Agent Genesis and canonical Agent-ID assigned)
   Governance platform:
   - Issues Agent Genesis with all fields populated,
     including trust_tier and verification_path
   - Derives canonical Agent-ID from certificate_hash
   - For log-anchored Tier 1: submits Agent Genesis to
     transparency log and embeds inclusion proof in the registry
     record (see {{AGTP-LOG}})
   - Creates registry record with Active lifecycle state
   - Records genesis audit entry in immutable audit log
     (genesis record includes full Agent Genesis and
     verification evidence)
   - Publishes agent to Namespace Document
     (triggers Namespace Document re-signing)

   The Agent Genesis is delivered to the registrant.
   It is the permanent record of the agent's genesis.
   Loss of the Agent Genesis does not invalidate the agent;
   the certificate_hash remains the authoritative identity anchor.

5. ACTIVE
   Agent enters Active lifecycle state.
   Canonical Agent-ID is valid for AGTP protocol sessions.
   All applicable alias URIs resolve to the Agent Identity
   Document derived from the Agent Genesis.

6. LIFECYCLE EVENTS (post-activation)
   SUSPEND:    Agent temporarily inactive. Identity Document returns 503.
               Agent Genesis and canonical ID remain valid.
               Initiated by trust violation or human decision.
   REINSTATE:  Human-authorized return to Active state.
               Agent Genesis unchanged. Reinstatement
               recorded in audit trail.
   REVOKE:     Agent permanently deactivated. Identity Document returns 410.
               Agent Genesis archived. Canonical ID retired
               permanently and never reissued.
   DEPRECATE:  Controlled end-of-life. Identity Document returns 410 with
               successor_agent field if applicable. Agent Genesis
               retained per Section 8.5 retention policy.
]]></artwork>
          </figure>
        </section>
        <section anchor="governance-tokens-and-runtime-authorization">
          <name>Governance Tokens and Runtime Authorization</name>
          <t>Following successful registration, the agent's Agent Genesis is
the static identity anchor. Runtime authorization for specific actions
is carried by Governance Tokens: signed, time-limited JWT artifacts
issued by the governance platform encoding a specific governance
verdict (ALLOW, DENY) for a specific action.</t>
          <t>Governance Tokens <strong>MUST NOT</strong> be reused. Each action requires a
fresh evaluation and a fresh token. Default TTL is 30 seconds. The
token's <tt>agent_id</tt> field <strong>MUST</strong> match the canonical Agent-ID from
the Agent Genesis. Tokens that fail this validation <strong>MUST</strong> be
rejected and the failure <strong>MUST</strong> be logged.</t>
          <t>The relationship between Agent Genesis and Governance Token
parallels the relationship between a passport and a visa: the passport
establishes persistent identity; the visa encodes a specific
time-bounded permission. Holding a passport does not imply holding
any particular visa.</t>
        </section>
        <section anchor="friendly-name-availability-and-re-registration">
          <name>Friendly Name Availability and Re-Registration</name>
          <t>An agent label becomes available for re-registration 90 days after
its associated agent enters Revoked or Deprecated lifecycle state.
The canonical Agent-ID and Agent Genesis are permanently archived.
The canonical Agent-ID <strong>MUST NOT</strong> be reissued under any
circumstances, including re-registration of the same label by the same
organization. This policy prevents ID reuse attacks in which a newly
registered agent inherits the trust history of a revoked predecessor.</t>
        </section>
      </section>
    </section>
    <section anchor="method-definitions">
      <name>Method Definitions</name>
      <section anchor="methods-section">
        <name>Design Philosophy</name>
        <t>AGTP methods are intent verbs, not resource operations. Each method
expresses what an agent is trying to accomplish. Method names are
uppercase ASCII strings. Methods that modify state are NOT idempotent
by default unless explicitly marked. All methods accept a context
parameter carrying agent session state. Requirement language follows
<xref target="RFC2119"/>.</t>
        <section anchor="the-twelve-method-floor">
          <name>The Twelve-Method Floor</name>
          <t>AGTP defines twelve protocol-level methods that constitute the
embedded floor of the protocol. Any conformant AGTP implementation
<strong>MUST</strong> support all twelve. The twelve are organized as two groups
of six.</t>
          <t><strong>Cognitive methods</strong> express requests for information or reasoning.
A cognitive method invocation produces understanding without changing
state external to the agent's own session:</t>
          <ul spacing="normal">
            <li>
              <t>QUERY: semantic data retrieval</t>
            </li>
            <li>
              <t>DISCOVER: locate agents, resources, or services</t>
            </li>
            <li>
              <t>DESCRIBE: retrieve operational capabilities of a known endpoint</t>
            </li>
            <li>
              <t>SUMMARIZE: synthesize provided content</t>
            </li>
            <li>
              <t>PLAN: produce an unexecuted sequence of actions toward a goal</t>
            </li>
            <li>
              <t>PROPOSE: submit a dynamic endpoint or method proposal</t>
            </li>
          </ul>
          <t><strong>Mechanics methods</strong> perform actions, exercise authority, or change
state. A mechanics method invocation has external effect:</t>
          <ul spacing="normal">
            <li>
              <t>EXECUTE: invoke a specific action or carried protocol payload</t>
            </li>
            <li>
              <t>DELEGATE: transfer execution to a sub-agent with bounded authority</t>
            </li>
            <li>
              <t>ESCALATE: route a decision to a higher authority or human principal</t>
            </li>
            <li>
              <t>CONFIRM: attest to a prior action, state, or item</t>
            </li>
            <li>
              <t>SUSPEND: pause an active session workflow with a resumption nonce</t>
            </li>
            <li>
              <t>NOTIFY: push information without expectation of synchronous response</t>
            </li>
          </ul>
          <t>The cognitive/mechanics distinction is informational, not normative;
servers do not behave differently based on the category of a method.
The classification provides a stable mental model for spec readers
and implementers and constrains future additions to the floor.</t>
          <t>EXECUTE is the generic carrier for application-layer payloads.
When a higher-level agent framework such as MCP, A2A, or ACP is
composed over AGTP (see <xref target="composition-section"/>), EXECUTE is the
method that dispatches the carried payload to the application based
on its Content-Type. EXECUTE absorbs the role that earlier drafts of
this specification considered for an INVOKE method.</t>
        </section>
      </section>
      <section anchor="core-methods">
        <name>Core Methods</name>
        <t>The twelve core methods are presented below in the cognitive group
followed by the mechanics group. The four methods present in v06 core
that are not included in the v07 floor (BOOK, SCHEDULE, LEARN,
COLLABORATE) are demoted to Tier 2 standard extended methods; their
specifications continue to apply where implementations choose to
support them, and they are catalogued in the AGTP-API method
catalog (<xref target="AGTP-API"/>).</t>
        <section anchor="query">
          <name>QUERY</name>
          <t>Purpose: Semantic data retrieval. The agent specifies what it needs to
know, not where to find it. Distinguished from HTTP GET by expressing an
information need rather than retrieving a known resource at a known
location. Cognitive.</t>
          <table>
            <name>QUERY Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">intent</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Natural language or structured expression of the information need</td>
              </tr>
              <tr>
                <td align="left">scope</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Data domains or sources to include or exclude</td>
              </tr>
              <tr>
                <td align="left">format</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Desired response format: structured, natural, raw</td>
              </tr>
              <tr>
                <td align="left">confidence_threshold</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Minimum confidence score for included results (0.0-1.0)</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Session context for disambiguation</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Result set with confidence scores per item. Server <strong>SHOULD</strong>
indicate provenance of each result. Idempotent: Yes.</t>
        </section>
        <section anchor="discover">
          <name>DISCOVER</name>
          <t>Purpose: Locate agents, resources, or services matching specified
criteria. Returns a list of candidate canonical Agent-IDs (or resource
references) with minimal metadata for selection. Distinguished from
QUERY: DISCOVER returns endpoints to talk to, QUERY returns data to
consume. Cognitive.</t>
          <table>
            <name>DISCOVER Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">criteria</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Structured or natural-language description of what is being sought</td>
              </tr>
              <tr>
                <td align="left">filter</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Constraints (capabilities, scopes, tier, geography, principal)</td>
              </tr>
              <tr>
                <td align="left">max_results</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Maximum number of candidates to return</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Session context for disambiguation</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Ordered list of candidate entries, each containing
<tt>agent_id</tt>, <tt>name</tt>, <tt>description</tt>, <tt>principal</tt>, and a relevance score.
Server <strong>SHOULD</strong> apply governance-zone filtering: candidates outside
the requesting agent's permitted zones <strong>MUST NOT</strong> be returned.
Idempotent: Yes. Primary error codes: 422.</t>
        </section>
        <section anchor="describe">
          <name>DESCRIBE</name>
          <t>Purpose: Return the operational capabilities of a known agent endpoint.
The requesting agent specifies what capability dimensions it needs to
evaluate; the server returns a structured Capability Document. Used for
pre-task negotiation before committing to DELEGATE or EXECUTE. If
<tt>capability_domains</tt> is omitted, the server <strong>SHOULD</strong> return all supported
domains. Cognitive.</t>
          <table>
            <name>DESCRIBE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">capability_domains</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Comma-separated domains to return: <tt>methods</tt>, <tt>modalities</tt>, <tt>tools</tt>, <tt>version</tt>, <tt>budget</tt>, <tt>zones</tt>. If omitted, server <strong>SHOULD</strong> return all.</td>
              </tr>
              <tr>
                <td align="left">version_min</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Minimum acceptable version for capability negotiation.</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Session context for capability filtering.</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Capability Document with the following structure:</t>
          <sourcecode type="json"><![CDATA[
{
  "methods": ["QUERY", "DISCOVER", "DESCRIBE", "SUMMARIZE", "PLAN",
              "PROPOSE", "EXECUTE", "DELEGATE", "ESCALATE", "CONFIRM",
              "SUSPEND", "NOTIFY"],
  "modalities": ["text", "image", "streaming"],
  "tools": ["web_search", "code_execute"],
  "version": "0.7",
  "version_min_satisfied": true,
  "trust_score": 0.94,
  "budget_units_accepted": ["tokens", "compute-seconds"],
  "zones_accepted": ["zone:internal", "zone:partner"]
}
]]></sourcecode>
          <t>Idempotent: Yes. Primary error codes: 404, 422.</t>
        </section>
        <section anchor="summarize">
          <name>SUMMARIZE</name>
          <t>Purpose: Request a concise synthesis of provided content or a referenced
resource. The agent is requesting a cognitive operation on data, not
retrieving data. Cognitive.</t>
          <table>
            <name>SUMMARIZE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">source</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Content inline (up to implementation limit) or URI reference</td>
              </tr>
              <tr>
                <td align="left">length</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Target summary length: brief, standard, detailed</td>
              </tr>
              <tr>
                <td align="left">focus</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Aspect to emphasize in the summary</td>
              </tr>
              <tr>
                <td align="left">format</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Output format: bullets, prose, structured</td>
              </tr>
              <tr>
                <td align="left">audience</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Intended reader context, for calibrating complexity</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Summary content with a source_hash and a confidence score.
Idempotent: Yes.</t>
        </section>
        <section anchor="plan">
          <name>PLAN</name>
          <t>Purpose: Produce a sequence of actions or method invocations that
would accomplish a stated goal, without executing them. The response
is a structured plan that the requesting agent (or its principal)
reviews before committing to execution. Distinguished from the
deprecated v06 SCHEDULE method (which committed the plan): PLAN is
purely cognitive and produces no external state change. Cognitive.</t>
          <table>
            <name>PLAN Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">goal</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Natural language or structured description of the desired outcome</td>
              </tr>
              <tr>
                <td align="left">constraints</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Time, cost, scope, or policy constraints the plan must respect</td>
              </tr>
              <tr>
                <td align="left">available_methods</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Methods the planning agent may assume the executor will support</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Session context informing plan selection</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Plan document containing <tt>ordered_steps</tt> (each an AGTP
method invocation specification), <tt>estimated_cost</tt>, <tt>confidence</tt>, and
<tt>assumptions</tt>. Idempotent: Yes. Primary error codes: 422, 503.</t>
        </section>
        <section anchor="propose">
          <name>PROPOSE</name>
          <t>Purpose: Submit a dynamic endpoint or method proposal to a server
that has not yet declared support for the proposed method. PROPOSE
initiates the dynamic endpoint negotiation flow described in
<xref target="dynamic-negotiation"/>. The proposing agent submits a method name,
parameter signature, and intended outcome; the server responds with
acceptance, counter-proposal, or rejection. Cognitive.</t>
          <table>
            <name>PROPOSE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">proposed_method</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Uppercase ASCII method name being proposed</td>
              </tr>
              <tr>
                <td align="left">signature</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Parameter set, response shape, and outcome semantics</td>
              </tr>
              <tr>
                <td align="left">intent</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Natural language statement of what the method would accomplish</td>
              </tr>
              <tr>
                <td align="left">contract_version</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Reference to the AGTP-API contract version (default <tt>AGTP-API/1.0</tt>)</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Session context informing the proposal</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Synthesis result. On accept, 263 Proposal Approved with
the AGTP-API endpoint definition, <tt>synthesis_id</tt>, and <tt>expires_at</tt>.
On refuse, 463 Proposal Rejected with a structured <tt>reason</tt>. On
async evaluation, 261 Negotiation In Progress with a <tt>proposal_id</tt>
the agent can poll via <tt>QUERY /proposals/{proposal_id}</tt> (see
<xref target="AGTP-API"/>). Idempotent: No. Primary error codes: 261, 262, 263,
400, 459, 460, 463.</t>
        </section>
        <section anchor="methods-execute">
          <name>EXECUTE</name>
          <t>Purpose: Invoke a specific action with parameters, or dispatch a
carried application-layer payload. EXECUTE is the protocol's generic
mechanics carrier. When a higher-level agent framework is composed
over AGTP, EXECUTE is the method that carries the framework's payload
and dispatches it to the application based on the carried Content-Type.
The Authority-Scope header is enforced against the action being
performed; scope violations return 455. Mechanics.</t>
          <table>
            <name>EXECUTE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">action</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Identifier of the action to invoke (application-defined when carrying a higher-level protocol)</td>
              </tr>
              <tr>
                <td align="left">parameters</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Action-specific parameters (structured)</td>
              </tr>
              <tr>
                <td align="left">payload</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Application-layer payload, when EXECUTE is carrying a higher-level protocol invocation</td>
              </tr>
              <tr>
                <td align="left">payload_type</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Content-Type of the carried payload, for dispatch</td>
              </tr>
              <tr>
                <td align="left">idempotency_key</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Client-provided key enabling safe retry</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Session context</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Execution result, with structure determined by the
action or carried payload. Servers <strong>MUST</strong> return the AGTP envelope
(status, task_id, attribution) wrapping the action's response.
Idempotent: depends on the action; clients <strong>SHOULD</strong> supply
<tt>idempotency_key</tt> for retry safety. Primary error codes: 403, 422,
455, 456, 503.</t>
        </section>
        <section anchor="delegate">
          <name>DELEGATE</name>
          <t>Purpose: Transfer execution of a task or method to a sub-agent or
downstream system. Initiates a new AGTP session on behalf of the delegating
agent, carrying forward authority lineage. Mechanics.</t>
          <table>
            <name>DELEGATE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">target_agent_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Identifier of the agent to delegate to</td>
              </tr>
              <tr>
                <td align="left">task</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">AGTP method call (or sequence) to execute</td>
              </tr>
              <tr>
                <td align="left">authority_scope</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Scope granted to sub-agent <strong>MUST</strong> be a strict subset of delegating agent's scope</td>
              </tr>
              <tr>
                <td align="left">delegation_token</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Signed token proving delegation authority</td>
              </tr>
              <tr>
                <td align="left">callback</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">AGTP endpoint for result delivery</td>
              </tr>
              <tr>
                <td align="left">deadline</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Maximum time for task completion</td>
              </tr>
            </tbody>
          </table>
          <t>Security note: the authority_scope in a DELEGATE request <strong>MUST NOT</strong>
exceed the delegating agent's own Authority-Scope. Servers <strong>MUST</strong> enforce
this and <strong>MUST</strong> return 262 Authorization Required with body type
<tt>scope-required</tt> if violated. This is the protocol-level defense against
authority laundering. Idempotent: No.</t>
        </section>
        <section anchor="escalate">
          <name>ESCALATE</name>
          <t>Purpose: Route a task, decision, or exception to a human principal or
higher-authority agent when the current agent cannot or should not proceed.
ESCALATE is the protocol-level expression of meaningful friction in AI
systems as a first-class method. Mechanics.</t>
          <table>
            <name>ESCALATE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">task_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The task or method invocation triggering escalation</td>
              </tr>
              <tr>
                <td align="left">reason</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Structured reason: confidence_threshold, scope_limit, ethical_flag, ambiguous_instruction, resource_unavailable</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Full context needed for the escalation recipient to act</td>
              </tr>
              <tr>
                <td align="left">priority</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">urgent, normal, or low</td>
              </tr>
              <tr>
                <td align="left">recipient</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Specific human or agent to escalate to; if absent, routes to default handler</td>
              </tr>
              <tr>
                <td align="left">deadline</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Time by which a response is needed</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Escalation receipt with escalation_id and routing confirmation.
The escalated task is paused until resolved via CONFIRM. Idempotent: Yes.
An agent that escalates appropriately is functioning correctly. Governance
frameworks built on AGTP can use escalation frequency and reason codes as
observability signals for systemic issues.</t>
        </section>
        <section anchor="confirm">
          <name>CONFIRM</name>
          <t>Purpose: Explicit acknowledgment of a prior action, state, or data item.
Creates a signed attestation record. Mechanics.</t>
          <table>
            <name>CONFIRM Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">target_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">ID of the action, booking, schedule, or item being confirmed</td>
              </tr>
              <tr>
                <td align="left">status</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">accepted, rejected, or deferred</td>
              </tr>
              <tr>
                <td align="left">reason</td>
                <td align="left">
                  <strong>SHOULD</strong> (if rejected/deferred)</td>
                <td align="left">Explanation of the decision</td>
              </tr>
              <tr>
                <td align="left">attestation</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Agent-signed confirmation payload for audit</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Confirmation receipt with timestamp and attestation_id.
Idempotent: Yes.</t>
        </section>
        <section anchor="methods-suspend">
          <name>SUSPEND</name>
          <t>Purpose: Pause a specific active session workflow in a recoverable state.
Issues a resumption nonce the requesting agent uses to resume the session.
Method-level SUSPEND is session-scoped and does not affect registry
lifecycle state or Agent Genesis validity. The distinction between
method-level SUSPEND and lifecycle SUSPEND (Section 6.7.6) is
architectural: method-level SUSPEND is a workflow primitive; lifecycle
SUSPEND is an administrative action on the agent's registry record.
Mechanics.</t>
          <table>
            <name>SUSPEND Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">session_id</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">The session to suspend.</td>
              </tr>
              <tr>
                <td align="left">reason</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">Structured reason: <tt>awaiting_input</tt>, <tt>resource_limit</tt>, <tt>scheduled_pause</tt>, <tt>external_dependency</tt>.</td>
              </tr>
              <tr>
                <td align="left">resume_by</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">ISO 8601 deadline for resumption. If exceeded without RESUME, session transitions to expired.</td>
              </tr>
              <tr>
                <td align="left">checkpoint</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Agent-provided state snapshot for resumption context. Stored by server for duration of suspension.</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Suspension receipt with the following structure:</t>
          <sourcecode type="json"><![CDATA[
{
  "suspension_id": "susp-0042",
  "session_id": "sess-a1b2c3d4",
  "resumption_nonce": "[128-bit random value, base64url]",
  "resume_by": "2026-04-15T09:00:00Z",
  "status": "suspended"
}
]]></sourcecode>
          <t>The <tt>resumption_nonce</tt> <strong>MUST</strong> be a cryptographically random 128-bit
value encoded as base64url. It is single-use: once presented to resume
a session, the nonce is invalidated and <strong>MUST NOT</strong> be accepted again.
Idempotent: No. Primary error codes: 404, 408.</t>
          <t>Servers MUST generate nonces with at least 128 bits of entropy using
a CSPRNG.</t>
        </section>
        <section anchor="notify">
          <name>NOTIFY</name>
          <t>Purpose: Asynchronous push of information from an agent to a recipient.
Does not expect a response. Fire-and-forget. Delivery confirmation (if
required) returned via a subsequent CONFIRM from the recipient. Mechanics.</t>
          <table>
            <name>NOTIFY Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">recipient</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Target Agent-ID, human endpoint, or broadcast group</td>
              </tr>
              <tr>
                <td align="left">content</td>
                <td align="left">
                  <strong>MUST</strong></td>
                <td align="left">Notification payload</td>
              </tr>
              <tr>
                <td align="left">urgency</td>
                <td align="left">
                  <strong>SHOULD</strong></td>
                <td align="left">critical, informational, or background</td>
              </tr>
              <tr>
                <td align="left">delivery_guarantee</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">at_most_once, at_least_once, or exactly_once</td>
              </tr>
              <tr>
                <td align="left">expiry</td>
                <td align="left">
                  <strong>MAY</strong></td>
                <td align="left">Timestamp after which the notification should not be delivered</td>
              </tr>
            </tbody>
          </table>
          <t>Response: Delivery receipt with notification_id. Idempotent: No.</t>
        </section>
      </section>
      <section anchor="method-summary-table">
        <name>Method Summary Table</name>
        <table>
          <name>AGTP Core Method Summary</name>
          <thead>
            <tr>
              <th align="left">Method</th>
              <th align="left">Group</th>
              <th align="left">Intent</th>
              <th align="left">State-Modifying</th>
              <th align="left">Idempotent</th>
              <th align="left">Primary Error Codes</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">QUERY</td>
              <td align="left">Cognitive</td>
              <td align="left">Retrieve information</td>
              <td align="left">No</td>
              <td align="left">Yes</td>
              <td align="left">404, 422</td>
            </tr>
            <tr>
              <td align="left">DISCOVER</td>
              <td align="left">Cognitive</td>
              <td align="left">Locate agents or resources</td>
              <td align="left">No</td>
              <td align="left">Yes</td>
              <td align="left">422</td>
            </tr>
            <tr>
              <td align="left">DESCRIBE</td>
              <td align="left">Cognitive</td>
              <td align="left">Retrieve endpoint capabilities</td>
              <td align="left">No</td>
              <td align="left">Yes</td>
              <td align="left">404, 422</td>
            </tr>
            <tr>
              <td align="left">SUMMARIZE</td>
              <td align="left">Cognitive</td>
              <td align="left">Synthesize content</td>
              <td align="left">No</td>
              <td align="left">Yes</td>
              <td align="left">400, 422</td>
            </tr>
            <tr>
              <td align="left">PLAN</td>
              <td align="left">Cognitive</td>
              <td align="left">Produce an unexecuted plan</td>
              <td align="left">No</td>
              <td align="left">Yes</td>
              <td align="left">422, 503</td>
            </tr>
            <tr>
              <td align="left">PROPOSE</td>
              <td align="left">Cognitive</td>
              <td align="left">Submit a dynamic endpoint proposal</td>
              <td align="left">No</td>
              <td align="left">No</td>
              <td align="left">261, 262, 263, 400, 459, 460, 463</td>
            </tr>
            <tr>
              <td align="left">EXECUTE</td>
              <td align="left">Mechanics</td>
              <td align="left">Invoke an action or carried payload</td>
              <td align="left">Yes</td>
              <td align="left">Per action</td>
              <td align="left">262, 403, 422, 455, 456, 503</td>
            </tr>
            <tr>
              <td align="left">DELEGATE</td>
              <td align="left">Mechanics</td>
              <td align="left">Transfer task to sub-agent</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">262, 403, 551</td>
            </tr>
            <tr>
              <td align="left">ESCALATE</td>
              <td align="left">Mechanics</td>
              <td align="left">Defer to human or authority</td>
              <td align="left">Yes</td>
              <td align="left">Yes</td>
              <td align="left">404</td>
            </tr>
            <tr>
              <td align="left">CONFIRM</td>
              <td align="left">Mechanics</td>
              <td align="left">Attest to a prior action</td>
              <td align="left">Yes</td>
              <td align="left">Yes</td>
              <td align="left">404, 400</td>
            </tr>
            <tr>
              <td align="left">SUSPEND</td>
              <td align="left">Mechanics</td>
              <td align="left">Pause session workflow</td>
              <td align="left">Yes</td>
              <td align="left">No</td>
              <td align="left">404, 408</td>
            </tr>
            <tr>
              <td align="left">NOTIFY</td>
              <td align="left">Mechanics</td>
              <td align="left">Push information</td>
              <td align="left">No</td>
              <td align="left">No</td>
              <td align="left">400, 404</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="method-registry-and-extensibility">
        <name>Method Registry and Extensibility</name>
        <t>AGTP defines a formal Method Registry maintained by IANA (see Section 8.2).
Any party may submit a new method for registration. The registration
procedure is Expert Review, and registration <strong>MUST</strong> be accompanied by a
published specification, at minimum an IETF Internet-Draft or equivalent
publicly available document. Registered methods <strong>MUST</strong>:</t>
        <ol spacing="normal" type="1"><li>
            <t>Have a unique uppercase ASCII name</t>
          </li>
          <li>
            <t>Define required and optional parameters</t>
          </li>
          <li>
            <t>Define expected response structure</t>
          </li>
          <li>
            <t>Specify idempotency behavior</t>
          </li>
          <li>
            <t>Specify applicable error codes</t>
          </li>
          <li>
            <t>Include a security considerations section</t>
          </li>
          <li>
            <t>Be accompanied by a published reference specification (Internet-Draft or RFC)</t>
          </li>
          <li>
            <t>Appear in the AGTP-API approved method catalog <xref target="AGTP-API"/>. The verb
list is the authoritative source for what method names are
recognized by AGTP servers; registered methods are a subset of the
method catalog with formal IETF registration. Submissions whose method
name is not in the AGTP-API method catalog <strong>MUST</strong> be rejected by the
Designated Expert.</t>
          </li>
        </ol>
        <t>Experimental methods <strong>MAY</strong> be used prior to registration using the X-
prefix convention (e.g., X-NEGOTIATE). Experimental methods <strong>MUST NOT</strong>
be used in production deployments without registration. Experimental
methods are subject to verb-list validation; non-conformant
experimental methods <strong>MUST</strong> be rejected with 459 Method Violation
by AGTP-aware infrastructure components.</t>
        <section anchor="verb-list-validation">
          <name>Verb-List Validation</name>
          <t>AGTP servers <strong>MUST</strong> validate inbound method names against the
AGTP-API approved method catalog. A method name not in the method catalog
<strong>MUST</strong> result in a 459 Method Violation response. A method name
in the method catalog whose path violates AGTP-API path grammar <strong>MUST</strong>
result in a 460 Endpoint Violation response. A method name and
path that are individually valid but not exposed by the server's
policy <strong>MUST</strong> result in a 405 Method Not Allowed response, with
the response body listing allowed methods for the path. The full
contract validation model is specified in <xref target="AGTP-API"/>.</t>
          <t>Capability negotiation occurs during session establishment. The server
returns a Supported-Methods header listing the methods it implements.
Clients <strong>SHOULD</strong> check this list before invoking non-core methods.</t>
          <t>The <tt>Negotiation-ID</tt> header is used to correlate turns within a dynamic
endpoint negotiation sequence (see Section 6.5). It <strong>MUST</strong> be a
UUID generated by the service upon receiving a PROPOSE request and
<strong>MUST</strong> be echoed in all subsequent turns of the same negotiation.
Maximum three turns before the agent <strong>MUST</strong> ESCALATE.</t>
          <artwork><![CDATA[
Negotiation-ID: 550e8400-e29b-41d4-a716-446655440000
]]></artwork>
          <t>QUOTE is defined as a Tier 2 Standard Extended Method in <xref target="AGTP-API"/>.
QUOTE provides pre-flight cost estimation for a proposed method invocation:
the requesting agent submits a proposed method call; the server returns a
<tt>Cost-Estimate</tt> response without executing the method. Servers supporting
budget negotiation via the <tt>Budget-Limit</tt> header <strong>SHOULD</strong> implement QUOTE
to enable agents to validate cost before committing to execution. Servers
that implement QUOTE <strong>MUST</strong> list it in the <tt>Supported-Methods</tt> response
header at session establishment.</t>
        </section>
      </section>
      <section anchor="dynamic-negotiation">
        <name>Dynamic Endpoint Negotiation</name>
        <section anchor="overview-1">
          <name>Overview</name>
          <t>AGTP version 03 introduces a dynamic endpoint negotiation protocol
enabling agents to discover data availability and instantiate endpoints
on demand, without requiring pre-built API definitions. This protocol
realizes the agentic API vision in which organizations expose data
availability rather than pre-designed endpoints, and agents construct
the interface they need at runtime.</t>
          <t>The negotiation protocol operates at the transport layer. AGTP-API
<xref target="AGTP-API"/> provides the contract structure for proposal and
acceptance documents. The agent's identity and authority credentials
(via the AGTP-CERT extension <xref target="AGTP-CERT"/> where deployed) govern
authorization decisions.</t>
        </section>
        <section anchor="protocol-flow">
          <name>Protocol Flow</name>
          <artwork><![CDATA[
Step 1:  Pre-auth discovery
         Agent issues unauthenticated GET to agtp://service.example.com
         Service returns server manifest + data_manifest block
         No credentials required at this step

Step 2:  Agent evaluates data_manifest
         Agent determines the service has relevant data
         Agent assesses whether `negotiable: true` is declared
         Agent constructs an AGTP-API-conformant endpoint proposal

Step 3:  PROPOSE request
         Agent sends PROPOSE with AGTP-API endpoint definition in body
         Request MAY be unauthenticated if data sensitivity is low
         Request MUST include AGTP-API/1.0 contract validation

Step 4a: Authorization required (262)
         Service returns 262 with required authorization mechanism
         Agent establishes credentials via specified mechanism
         Agent resubmits PROPOSE with credentials
         Negotiation-ID issued by service in 262 response

Step 4b: Negotiation in progress (261)
         Service evaluates proposal asynchronously
         Service returns 261 with Negotiation-ID
         Agent polls or awaits outcome

Step 5a: Proposal approved (263)
         Service returns 263 with complete AGTP-API endpoint definition,
         synthesis_id, and expires_at
         Instantiated endpoint is session-scoped by default
         Agent MAY call the endpoint immediately

Step 5b: Proposal rejected (463)
         Service returns 463 with structured reason (`out-of-scope`,
         `policy-refused`, `composition-impossible`, `ambiguous`,
         `synthesis-disabled`) and optional counter_proposal
         Agent MAY modify proposal and retry (maximum 3 turns)
         After 3 rejections agent MUST ESCALATE
]]></artwork>
        </section>
        <section anchor="propose-method">
          <name>PROPOSE Method</name>
          <t>PROPOSE is one of the twelve floor methods. The requesting agent
submits an AGTP-API-conformant endpoint definition describing the
interface it needs. The service evaluates whether it can fulfill
the proposal against its endpoint primitives and authorization
policy.</t>
          <t>Parameters:</t>
          <table>
            <name>PROPOSE Parameters</name>
            <thead>
              <tr>
                <th align="left">Parameter</th>
                <th align="left">Required</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">proposal</td>
                <td align="left">Yes</td>
                <td align="left">Complete AGTP-API endpoint definition (method + path + semantic block + input schema + output schema)</td>
              </tr>
              <tr>
                <td align="left">session_id</td>
                <td align="left">Yes</td>
                <td align="left">The active AGTP session identifier</td>
              </tr>
              <tr>
                <td align="left">persistent</td>
                <td align="left">Optional</td>
                <td align="left">
                  <tt>false</tt> (default) or <tt>true</tt>. Persistent syntheses survive across sessions, bounded by server policy.</td>
              </tr>
              <tr>
                <td align="left">requested_duration</td>
                <td align="left">Optional</td>
                <td align="left">ISO 8601 duration the agent requests for the synthesis (e.g., <tt>"24h"</tt>, <tt>"7d"</tt>). Server policy bounds the granted duration.</td>
              </tr>
              <tr>
                <td align="left">scope_requested</td>
                <td align="left">Recommended</td>
                <td align="left">The Authority-Scope the agent requests for this endpoint</td>
              </tr>
              <tr>
                <td align="left">context</td>
                <td align="left">Optional</td>
                <td align="left">Session context informing the proposal</td>
              </tr>
            </tbody>
          </table>
          <t>Response on 263 Proposal Approved:</t>
          <sourcecode type="json"><![CDATA[
{
  "negotiation_id": "550e8400-e29b-41d4-a716-446655440000",
  "instantiated_endpoint": {
    "method": "LOCATE",
    "path": "/customer/{id}/location",
    "semantic": {
      "intent": "Returns the last known location for a customer",
      "actor": "agent",
      "outcome": "Location coordinates and address are returned",
      "capability": "retrieval",
      "confidence": 0.70,
      "impact": "informational",
      "is_idempotent": true
    },
    "input": { "required": ["id"] },
    "output": { "coordinates": "object", "address": "string" },
    "errors": ["customer_not_found", "location_not_available"],
    "proposed": true,
    "scope_required": "location:read",
    "expires": "session"
  }
}
]]></sourcecode>
          <t>The <tt>proposed: true</tt> flag marks this as a dynamically instantiated
endpoint per the AGTP-API specification <xref target="AGTP-API"/>.</t>
        </section>
        <section anchor="credential-free-negotiation">
          <name>Credential-Free Negotiation</name>
          <t>For data classes declared with <tt>sensitivity: informational</tt> and
<tt>requires_authorization: false</tt> in the data manifest, services MAY
complete the full negotiation flow without requiring credentials.
The agent arrives, proposes, and receives an instantiated endpoint
without API keys.</t>
          <t>For sensitive data classes, services MUST require credential
establishment at Step 4a. The negotiation protocol is the mechanism
by which credentials are established, not a prerequisite. This
distinction is fundamental: the agent does not need credentials to
begin a negotiation; it needs credentials to complete one for
sensitive data.</t>
          <t>AGTP-CERT <xref target="AGTP-CERT"/> provides the cryptographic identity binding
that enables services to make fine-grained authorization decisions
during negotiation based on the agent's verified identity, principal,
and authority scope.</t>
        </section>
        <section anchor="session-scope-and-persistence">
          <name>Session Scope and Persistence</name>
          <t>Instantiated endpoints are session-scoped by default. They cease to
exist when the AGTP session terminates. Services MAY offer persistent
instantiation (the endpoint survives session termination and is added
to the service's server manifest) subject to elevated authorization.</t>
          <t>Persistent instantiation SHOULD be treated as a modification to the
service's published server manifest. Services supporting persistent
instantiation MUST increment their AGTP-API-Version header on the next
discovery request following persistence.</t>
        </section>
      </section>
      <section anchor="extended-method-vocabulary-and-industry-profiles">
        <name>Extended Method Vocabulary and Industry Profiles</name>
        <section anchor="three-tier-method-architecture">
          <name>Three-Tier Method Architecture</name>
          <t>The AGTP method vocabulary is organized into three tiers reflecting
different levels of universality, specificity, and domain relevance. All
methods at all tiers <strong>MUST</strong> conform to the AGTP-API specification
<xref target="AGTP-API"/>. The AGTP-API action-intent semantic class constraint applies to
every method in the IANA registry and to every AGTP-API-validated custom
method accepted via the AGTP-API method catalog.</t>
          <dl>
            <dt>Tier 1. Core Methods (defined in Section 6.2):</dt>
            <dd>
              <t>The baseline vocabulary required for AGTP compliance. Every conformant
AGTP implementation <strong>MUST</strong> support all Tier 1 methods. All Tier 1
methods are AGTP-API-conformant; they are defined instances of the
action-intent semantic class standardized in <xref target="AGTP-API"/>.</t>
            </dd>
            <dt>Tier 2. Standard Extended Methods:</dt>
            <dd>
              <t>Registered in the IANA AGTP Method Registry and available for use in any
AGTP implementation. Not required for baseline compliance but <strong>SHOULD</strong>
be implemented where their semantics apply. Catalogued in the AGTP-API
method catalog (<xref target="AGTP-API"/>). All Tier 2 methods satisfy AGTP-API
contract requirements.</t>
            </dd>
            <dt>Tier 3. Industry Profile Methods:</dt>
            <dd>
              <t>Domain-specific method sets defined and registered by industry
communities as named AGTP profiles. Valid within deployments that declare
support for the relevant profile. Not required in general-purpose
implementations. All Tier 3 profile method submissions <strong>MUST</strong> include
AGTP-API conformance verification as part of their specification.</t>
            </dd>
            <dt>Tier 4. AGTP-API-Validated Custom Methods:</dt>
            <dd>
              <t>Organization-defined methods that are not registered in the IANA
AGTP Method Registry but appear in the AGTP-API approved verb
list and conform to AGTP-API path grammar. Valid within the
deploying organization's AGTP services. The action-intent
semantic class constraint applies identically. Agents discover
and interpret these methods through natural language inference
against AGTP-API semantic declarations, as validated empirically
in <xref target="HOOD2026"/>.</t>
            </dd>
          </dl>
        </section>
        <section anchor="method-category-taxonomy">
          <name>Method Category Taxonomy</name>
          <t>All AGTP methods are organized into five categories:</t>
          <dl>
            <dt>ACQUIRE:</dt>
            <dd>
              <t>Retrieve data, resources, or state without modifying it. Typically
idempotent; no state modification.</t>
            </dd>
            <dt>COMPUTE:</dt>
            <dd>
              <t>Process, transform, or analyze information and produce a derived result.
Typically idempotent given the same input.</t>
            </dd>
            <dt>TRANSACT:</dt>
            <dd>
              <t>Perform state-changing operations with external systems, resources, or
records. Not idempotent by default; subject to reversibility
classification.</t>
            </dd>
            <dt>COMMUNICATE:</dt>
            <dd>
              <t>Send information, notifications, or signals to recipients. Fire-and-
forget or confirm-receipt delivery models.</t>
            </dd>
            <dt>ORCHESTRATE:</dt>
            <dd>
              <t>Coordinate, sequence, or manage multiple agents, tasks, or workflows.
May spawn sub-agents or sessions; delegation chain semantics apply.</t>
            </dd>
          </dl>
          <table>
            <name>Core Method Category Mapping</name>
            <thead>
              <tr>
                <th align="left">Core Method</th>
                <th align="left">Group</th>
                <th align="left">Category</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">QUERY</td>
                <td align="left">Cognitive</td>
                <td align="left">Acquire</td>
              </tr>
              <tr>
                <td align="left">DISCOVER</td>
                <td align="left">Cognitive</td>
                <td align="left">Acquire</td>
              </tr>
              <tr>
                <td align="left">DESCRIBE</td>
                <td align="left">Cognitive</td>
                <td align="left">Acquire</td>
              </tr>
              <tr>
                <td align="left">SUMMARIZE</td>
                <td align="left">Cognitive</td>
                <td align="left">Compute</td>
              </tr>
              <tr>
                <td align="left">PLAN</td>
                <td align="left">Cognitive</td>
                <td align="left">Compute</td>
              </tr>
              <tr>
                <td align="left">PROPOSE</td>
                <td align="left">Cognitive</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">EXECUTE</td>
                <td align="left">Mechanics</td>
                <td align="left">Transact</td>
              </tr>
              <tr>
                <td align="left">DELEGATE</td>
                <td align="left">Mechanics</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">ESCALATE</td>
                <td align="left">Mechanics</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">CONFIRM</td>
                <td align="left">Mechanics</td>
                <td align="left">Transact</td>
              </tr>
              <tr>
                <td align="left">SUSPEND</td>
                <td align="left">Mechanics</td>
                <td align="left">Orchestrate</td>
              </tr>
              <tr>
                <td align="left">NOTIFY</td>
                <td align="left">Mechanics</td>
                <td align="left">Communicate</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="standard-extended-methods-tier-2">
          <name>Standard Extended Methods (Tier 2)</name>
          <t>The following methods constitute the initial Tier 2 registration set,
defined in the AGTP-API method catalog (<xref target="AGTP-API"/>). Listed here by
category with brief semantic definitions; full parameter specifications
are in the catalog at the URL declared by AGTP-API.</t>
          <t>ACQUIRE category: FETCH, SEARCH, SCAN, PULL, IMPORT, FIND.</t>
          <t>COMPUTE category: EXTRACT, FILTER, VALIDATE, TRANSFORM, TRANSLATE,
NORMALIZE, PREDICT, RANK, MAP.</t>
          <t>TRANSACT category: REGISTER, SUBMIT, TRANSFER, PURCHASE, SIGN, MERGE,
LINK, LOG, SYNC, PUBLISH.</t>
          <t>COMMUNICATE category: REPLY, SEND, REPORT.</t>
          <t>ORCHESTRATE category: MONITOR, ROUTE, RETRY, PAUSE, RESUME, RUN, CHECK.</t>
          <t>Notable constraints: PURCHASE <strong>MUST</strong> carry explicit principal_id and
scope enforcement; 455 Scope Violation applies if payments:purchase is
not in the agent's Authority-Scope. RUN requires explicit procedure_id
parameter; implementations <strong>MUST NOT</strong> accept free-form execution strings.</t>
        </section>
        <section anchor="short-form-and-industry-inspired-methods">
          <name>Short-Form and Industry-Inspired Methods</name>
          <t>A set of short-form verb methods, e.g., SET, TAKE, OPEN, START, CALL, MAKE,
TURN, BREAK, are provisionally catalogued as candidates for Tier 2
registration. These verbs are highly context-dependent and their semantics
vary significantly across deployment domains.</t>
          <t>Short-form methods will be registered individually only when a published
companion specification provides unambiguous semantic definitions
demonstrably distinct from existing registered methods. Provisional
registrations using the X- prefix (e.g., X-SET, X-CALL) are encouraged
during the experimentation period.</t>
        </section>
        <section anchor="industry-profile-method-sets">
          <name>Industry Profile Method Sets</name>
          <t>AGTP recognizes that specific industries require method vocabularies
reflecting domain-specific operations that would be inappropriate in a
general-purpose standard. Industry profile method sets are defined and
registered as named AGTP profiles. A profile is a published companion
specification that:</t>
          <ol spacing="normal" type="1"><li>
              <t>Declares a profile name (e.g., agtp-profile-healthcare,
agtp-profile-financial, agtp-profile-legaltech)</t>
            </li>
            <li>
              <t>Defines one or more industry-specific methods with full parameter
specifications, error codes, and security considerations</t>
            </li>
            <li>
              <t>Specifies which Tier 1 and Tier 2 methods are REQUIRED, RECOMMENDED,
or NOT APPLICABLE within the profile</t>
            </li>
            <li>
              <t>Addresses regulatory or compliance considerations specific to the
domain (e.g., HIPAA for healthcare, PCI-DSS for financial services)</t>
            </li>
          </ol>
          <t>Illustrative examples of potential industry profile methods (not yet
registered; listed for directional purposes only):</t>
          <t>Healthcare: PRESCRIBE, AUTHORIZE, REFER, DISPENSE, TRIAGE, CONSENT, REDACT</t>
          <t>Financial services: SETTLE, RECONCILE, HEDGE, CLEAR, UNDERWRITE, KYC, AML</t>
          <t>Legal and compliance: ATTEST, NOTARIZE, DISCLOSE, REDLINE, EXECUTE,
PRESERVE</t>
          <t>Infrastructure: PROVISION, DEPROVISION, ROLLBACK, SNAPSHOT, FAILOVER</t>
          <t>Industry communities are encouraged to develop and submit profile
specifications through the IETF process. The IANA AGTP Method Registry will
maintain a profile index alongside the core and standard method registries.</t>
        </section>
        <section anchor="registration-path-for-new-methods">
          <name>Registration Path for New Methods</name>
          <dl>
            <dt>For Tier 2 Standard Methods:</dt>
            <dd>
              <t>Submit an Internet-Draft to the IETF providing full method specification
per Section 6.4. The Designated Expert reviews for semantic uniqueness,
clarity, AGTP-API contract conformance <xref target="AGTP-API"/>, and security considerations.
Submissions that fail AGTP-API contract validation <strong>MUST</strong> be returned to the submitter
before review proceeds.</t>
            </dd>
            <dt>For Industry Profile Methods (Tier 3):</dt>
            <dd>
              <t>Submit a profile specification to the IETF (or a recognized domain
standards body with an established AGTP registry liaison) covering all
methods in the profile and profile compliance requirements. The
specification <strong>MUST</strong> include AGTP-API conformance statements for every
method defined in the profile.</t>
            </dd>
            <dt>For AGTP-API-Validated Custom Methods (Tier 4):</dt>
            <dd>
              <t>No IANA registration required. The implementing organization
defines its method vocabulary in a server manifest as specified in
<xref target="AGTP-API"/>, served at the service's AGTP address. Methods are
validated at the transport layer against the AGTP-API approved
method catalog and AGTP-API path grammar. The method vocabulary is
declared in the manifest's vocabulary block and discoverable by
agents at runtime, with optional per-server vocabulary policy in
the manifest's <tt>policies.methods</tt> sub-block per <xref target="AGTP-API"/>.
Organizations adopting Tier 4 methods are encouraged to publish
their server manifests at <tt>agtp://[service-address]</tt> to enable
cross-system agent discovery.</t>
            </dd>
            <dt>For Experimental Methods:</dt>
            <dd>
              <t>Use the X- prefix without registration. Implementations <strong>MUST NOT</strong>
deploy experimental methods in production without completing either
the IANA registration process (Tier 2/3) or appearing in the
AGTP-API approved method catalog (Tier 4). Experimental method names do
not reserve the unprefixed name.</t>
            </dd>
          </dl>
          <t>The AGTP Method Registry is published at:
https://www.iana.org/assignments/agtp-methods/</t>
          <t>The AGTP-API conformance test suite is maintained at:
https://agtp.io/api/conformance</t>
        </section>
        <section anchor="real-time-service-adaptation">
          <name>Real-time Service Adaptation</name>
          <t>Services that update their server manifests at runtime MUST signal
changes via the <tt>AGTP-API-Version</tt> response header. This header MUST
be present on all AGTP responses from negotiable services.</t>
          <artwork><![CDATA[
AGTP-API-Version: 1.2.4
]]></artwork>
          <t>Agent runtimes MUST cache the AGTP-API-Version value from each
service. When a response carries an AGTP-API-Version value different
from the cached value, the agent runtime MUST re-fetch and re-validate
the server manifest
before issuing further method calls. This mechanism supports real-time
service adaptation without requiring push notifications.</t>
          <artwork><![CDATA[
Adaptation flow:
  Agent calls EXECUTE for reserve-action
  Response includes AGTP-API-Version: 1.2.5 (was 1.2.4)
  Agent re-fetches agtp://service.example.com
  Service returns updated server manifest (new endpoint added)
  Agent updates service map
  Agent resumes operation with updated capability knowledge
]]></artwork>
          <t>Services SHOULD increment AGTP-API-Version when:
  - A new endpoint is added to the server manifest
  - An existing endpoint's semantic declaration changes
  - A new verb is added to the vocabulary block
  - A new data class is added to the data_manifest</t>
          <t>Services MUST NOT decrement or reuse AGTP-API-Version values.</t>
        </section>
      </section>
    </section>
    <section anchor="composition-section">
      <name>Composition with Higher-Level Frameworks</name>
      <t>AGTP is not intended to replace MCP, A2A, ACP, ANP, or other agent
application frameworks. AGTP is the substrate those frameworks need
to operate at scale. The frameworks define what agents say to one
another; AGTP defines how those messages move, who is allowed to send
them, and how their effects are attributed.</t>
      <t>This section establishes composition with higher-level frameworks as
a first-class use case of AGTP, specifies the precedence rules
between AGTP transport semantics and framework-level messaging
semantics, and provides the canonical mapping table from common
framework concepts onto AGTP primitives. Detailed composition
profiles for each framework are specified in <xref target="AGTP-COMPOSITION"/>.</t>
      <section anchor="substrate-model">
        <name>Substrate Model</name>
        <t>In a composed deployment, AGTP supplies four properties at the wire
level that no framework currently supplies natively:</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Identity at the protocol level.</strong> Every AGTP request carries a
canonical Agent-ID in the <tt>Agent-ID</tt> header. The framework's
payload need not carry identity; identity is established by the
transport.</t>
          </li>
          <li>
            <t><strong>Authority bounded at the protocol level.</strong> The
<tt>Authority-Scope</tt> header declares what the requesting agent is
permitted to do. Servers enforce scope before dispatching to the
framework's payload handler. A scope violation returns 455 at the
AGTP layer, before the framework sees the payload.</t>
          </li>
          <li>
            <t><strong>Attribution at the protocol level.</strong> Every method invocation
produces an Attribution-Record. The framework's payload need not
re-implement audit logging; the attribution is produced by the
transport.</t>
          </li>
          <li>
            <t><strong>Delegation chain at the protocol level.</strong> Multi-hop agent
workflows carry their lineage in the <tt>Delegation-Chain</tt> header,
independent of framework-level concepts of "session" or "task."</t>
          </li>
        </ol>
        <t>A framework composed over AGTP can shed the parts of its design that
exist only because HTTP did not provide these properties. The result
is a framework that can focus on its actual contribution (tool
semantics, conversational structure, multi-agent choreography) while
the substrate handles the cross-cutting concerns.</t>
      </section>
      <section anchor="execute-as-the-generic-carrier">
        <name>EXECUTE as the Generic Carrier</name>
        <t>When a framework is composed over AGTP, EXECUTE is the canonical
method that carries the framework's payload. The carried payload's
Content-Type identifies the framework; the AGTP server dispatches the
payload to the framework's handler. See <xref target="methods-execute"/>.</t>
        <t>The EXECUTE invocation supplies:</t>
        <ul spacing="normal">
          <li>
            <t>The framework identifier (via <tt>payload_type</tt>).</t>
          </li>
          <li>
            <t>The framework-specific operation (via the <tt>action</tt> parameter).</t>
          </li>
          <li>
            <t>The framework-specific payload (via the <tt>payload</tt> parameter).</t>
          </li>
          <li>
            <t>An optional <tt>idempotency_key</tt> enabling safe retry.</t>
          </li>
        </ul>
        <t>The AGTP envelope (status, task_id, attribution) wraps the
framework's response. A framework that wishes to expose a particular
operation as a first-class AGTP method (rather than carrying it
through EXECUTE) <strong>MAY</strong> define a Tier 4 AGTP-API-validated method per
<xref target="methods-section"/>; this is reserved for frameworks whose operations
are widely used enough to justify a dedicated verb.</t>
      </section>
      <section anchor="precedence-rule">
        <name>Precedence Rule</name>
        <t>AGTP headers (Agent-ID, Authority-Scope, Delegation-Chain,
Session-ID, Task-ID) <strong>MUST</strong> take precedence over equivalent fields
in a carried framework payload for routing, enforcement, audit, and
identity purposes. Infrastructure components including SEPs and
governance gateways <strong>MUST</strong> use AGTP header values for all
protocol-level decisions.</t>
        <t>Framework-level identity, session, or scope fields <strong>MAY</strong> be present
in the body for application-layer use but <strong>MUST NOT</strong> override AGTP
header values. If an inconsistency is detected between an AGTP header
and a corresponding framework-level field, the AGTP header is
authoritative; the inconsistency <strong>SHOULD</strong> be logged.</t>
      </section>
      <section anchor="canonical-mapping">
        <name>Canonical Mapping</name>
        <table>
          <name>Higher-Level Framework to AGTP Canonical Mapping</name>
          <thead>
            <tr>
              <th align="left">Framework</th>
              <th align="left">Concept</th>
              <th align="left">AGTP Mapping</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Tool call</td>
              <td align="left">EXECUTE with <tt>payload_type: application/vnd.mcp.tools+json</tt></td>
            </tr>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Resource fetch</td>
              <td align="left">QUERY with <tt>scope</tt> matching the resource's namespace</td>
            </tr>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Sampling / inference</td>
              <td align="left">EXECUTE with <tt>payload_type</tt> identifying the sampling profile</td>
            </tr>
            <tr>
              <td align="left">MCP</td>
              <td align="left">Conversation context</td>
              <td align="left">Session-ID header carries the conversation across method invocations</td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Task</td>
              <td align="left">DELEGATE; A2A <tt>task.id</tt> maps to Task-ID header</td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Capability advertisement</td>
              <td align="left">DESCRIBE response</td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Agent Card</td>
              <td align="left">Agent Identity Document</td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Provenance chain</td>
              <td align="left">Delegation-Chain header</td>
            </tr>
            <tr>
              <td align="left">A2A</td>
              <td align="left">Artifact</td>
              <td align="left">NOTIFY body or EXECUTE response</td>
            </tr>
            <tr>
              <td align="left">ACP</td>
              <td align="left">Agent-to-agent message</td>
              <td align="left">NOTIFY (one-way) or EXECUTE (request-response)</td>
            </tr>
            <tr>
              <td align="left">ACP</td>
              <td align="left">Capability advertisement</td>
              <td align="left">DESCRIBE response</td>
            </tr>
            <tr>
              <td align="left">ANP</td>
              <td align="left">Identity exchange</td>
              <td align="left">Agent Identity Document; canonical Agent-ID</td>
            </tr>
            <tr>
              <td align="left">ANP</td>
              <td align="left">Discovery</td>
              <td align="left">DISCOVER method</td>
            </tr>
          </tbody>
        </table>
        <t>A wire example showing EXECUTE carrying an MCP tool invocation is
provided in <xref target="wire-examples"/>. Additional examples for A2A and ACP
are in the appendix-level composition section
(<xref target="agmp-composition-appendix"/>) and in <xref target="AGTP-COMPOSITION"/>.</t>
      </section>
    </section>
    <section anchor="merchant-identity-and-agentic-commerce-binding">
      <name>Merchant Identity and Agentic Commerce Binding</name>
      <section anchor="overview-2">
        <name>Overview</name>
        <t>AGTP specifies agent-side identity through the Agent Birth
Certificate, canonical Agent-ID, Agent Identity Document, and Trust
Tier model defined in Section 5. PURCHASE invocations carrying
<tt>payments:purchase</tt> in the Authority-Scope header and a Budget-Limit
constraint are fully governed on the sending side. The receiving side
of a PURCHASE -- the merchant counterparty -- does not have an
equivalent protocol-level identity in the base specification.</t>
        <t>Version 04 of AGTP introduces normative integration hooks for the
AGTP Merchant Identity and Agentic Commerce Binding specification
<xref target="AGTP-MERCHANT"/>, which defines the merchant-side identity model.
The integration is hook-based: this document registers the required
headers, status code, and Authority-Scope domains; the detailed
semantics, Merchant Manifest Document schema, Merchant Birth
Certificate structure, and counterparty verification procedure are
specified in the companion.</t>
      </section>
      <section anchor="merchant-identity-headers-summary">
        <name>Merchant Identity Headers (Summary)</name>
        <t>PURCHASE invocations in a fully conformant v04 deployment carry the
following additional headers:</t>
        <ul spacing="normal">
          <li>
            <t><tt>Merchant-ID</tt>: canonical identifier of the intended merchant
counterparty.</t>
          </li>
          <li>
            <t><tt>Merchant-Manifest-Fingerprint</tt>: SHA-256 fingerprint of the
Merchant Manifest Document the requesting agent verified during
pre-flight counterparty verification.</t>
          </li>
          <li>
            <t><tt>Intent-Assertion</tt>: detached JWT carrying principal-authorized
purchase intent, forwardable to payment networks as standalone
evidence.</t>
          </li>
          <li>
            <t><tt>Cart-Digest</tt>: digest of a structured cart returned by a prior
QUOTE invocation, binding this PURCHASE to that cart.</t>
          </li>
        </ul>
        <t>Full field definitions, wire examples, and security requirements are
in <xref target="AGTP-MERCHANT"/>.</t>
      </section>
      <section anchor="counterparty-unverified-summary">
        <name>458 Counterparty Unverified (Summary)</name>
        <t>Receiving servers <strong>MUST</strong> return 458 Counterparty Unverified on
PURCHASE invocations that fail merchant identity verification:
missing <tt>Merchant-ID</tt> or <tt>Merchant-Manifest-Fingerprint</tt> headers,
fingerprint mismatch, Merchant-ID mismatch, or a target merchant in
any lifecycle state other than Active. 455 is a governance signal,
parallel in role to 455 Scope Violation and 457 Zone Violation:
<strong>MUST</strong> be logged; <strong>MUST NOT</strong> be retried without re-running
counterparty verification.</t>
      </section>
      <section anchor="integration-with-purchase-discover-and-attribution-record">
        <name>Integration with PURCHASE, DISCOVER, and Attribution-Record</name>
        <t>Three existing AGTP primitives interact with merchant identity:</t>
        <ul spacing="normal">
          <li>
            <t><strong>PURCHASE</strong>: Counterparty verification runs before PURCHASE is
sent on the wire. A verified PURCHASE produces an Attribution-
Record naming both the agent and the merchant cryptographically.</t>
          </li>
          <li>
            <t><strong>DISCOVER</strong>: The DISCOVER method defined in <xref target="AGTP-DISCOVER"/> is
extended by <xref target="AGTP-MERCHANT"/> to return Merchant Manifest
Documents when the query carries <tt>result_type: "merchant"</tt>, and to
return mixed agent/merchant result sets when <tt>result_type: "any"</tt>.
The existing DISCOVER signature model, ranking model, and
governance-zone enforcement apply unchanged.</t>
          </li>
          <li>
            <t><strong>Attribution-Record</strong>: The Attribution-Record returned on
PURCHASE includes <tt>merchant_id</tt>, <tt>merchant_fingerprint</tt>, and
<tt>intent_assertion_jti</tt> fields when merchant identity binding is
in effect. This produces a dual-party cryptographic record
consumable by downstream audit and dispute-resolution processes
without requiring those processes to speak AGTP.</t>
          </li>
        </ul>
      </section>
      <section anchor="relationship-to-payment-networks">
        <name>Relationship to Payment Networks</name>
        <t>The merchant identity model defined in this document is payment-rail
neutral. It does not define payment credential handling, tokenized
card-on-file representations, authorization messaging to card
networks, or settlement. Payment networks wishing to extend
protection, fraud coverage, or dispute handling to agent-initiated
transactions consume the Intent-Assertion JWT and the Attribution-
Record as verifiable inputs to their own authorization and dispute
flows; no AGTP-layer integration is required on the payment-network
side. The specific mapping between AGTP merchant identity artifacts
and payment-network message formats is expected to be defined
bilaterally between governance platforms and individual networks and
is out of scope for this document.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This section satisfies the mandatory IETF Security Considerations
requirement. All AGTP implementations <strong>MUST</strong> address the considerations
described here.</t>
      <section anchor="mandatory-tls">
        <name>Mandatory TLS</name>
        <t>All AGTP connections <strong>MUST</strong> use TLS 1.3 or higher. Implementations
<strong>MUST</strong> reject connections using TLS 1.2 or below. Certificate validation
follows standard PKI practices per <xref target="RFC5280"/>. Servers <strong>MUST</strong> present
a valid certificate.</t>
      </section>
      <section anchor="agent-identity-verification-three-levels">
        <name>Agent Identity Verification: Three Levels</name>
        <t>AGTP defines three distinct levels at which agent identity and
Authority-Scope can be verified. Each level serves a different deployment
profile and operational tradeoff. Understanding the distinction is
essential for implementers: the AGTP Agent Certificate extension
(<xref target="AGTP-CERT"/>) is OPTIONAL, and base AGTP provides cryptographic
verification at the application layer without it.</t>
        <t><strong>Level 1 - Self-asserted headers (raw request fields).</strong>
Every AGTP request <strong>MUST</strong> include the <tt>Agent-ID</tt> header, which
references the agent identity document carrying the principal
identifier and Authority-Scope. As a raw header value on an
individual request, <tt>Agent-ID</tt> is self-asserted: a client writes
the value into the request and the server records what was written.
Level 1 verification is limited to mandatory logging and anomaly
detection against the recorded stream. This is the minimum baseline
every AGTP implementation provides.</t>
        <t><strong>Level 2 - Application-layer cryptographic verification (signed
Agent Identity Document).</strong> A canonical Agent-ID resolves to a
signed Agent Identity Document (Section 5.5) that carries the Birth
Certificate's Authority-Scope grant and is signed by the governance
platform that issued it. A verifier (including a stranger with no
prior relationship to the agent's organization) can cryptographically
verify identity and scope at the application layer by performing the
following steps:</t>
        <ol spacing="normal" type="1"><li>
            <t>Resolve the canonical Agent-ID to retrieve the signed Agent
Manifest Document.</t>
          </li>
          <li>
            <t>Verify the governance platform's signature on the manifest against
the platform's published key.</t>
          </li>
          <li>
            <t>Confirm that the canonical Agent-ID in the manifest matches the
hash of the Agent Genesis.</t>
          </li>
          <li>
            <t>Read the Authority-Scope grant from the verified manifest.</t>
          </li>
        </ol>
        <t>Level 2 verification is available in base AGTP without the Agent
Certificate extension. It is the identity mechanism the protocol
depends on. Self-asserted headers (Level 1) are bound to verified
identity (Level 2) by the resolver's retrieval of the signed
manifest for the declared canonical Agent-ID.</t>
        <t><strong>Level 3 - Transport-layer cryptographic verification (AGTP-CERT
extension).</strong> The AGTP Agent Certificate extension <xref target="AGTP-CERT"/>
binds the canonical <tt>Agent-ID</tt> and Authority-Scope to an X.509 v3
certificate presented during TLS 1.3 mutual authentication. The
principal identifier remains in the agent identity document
referenced by <tt>Agent-ID</tt>. Level 3 accelerates the Level 2 check to
the TLS handshake and enables Scope-Enforcement Points (SEPs) to
verify Authority-Scope at O(1) per-request cost without
application-layer access. Level 3 is an acceleration and
enforcement path for Level 2, not a replacement of it. Deployments
that require line-rate scope enforcement at infrastructure layers
(load balancers, governance gateways) <strong>SHOULD</strong> implement
<xref target="AGTP-CERT"/>.</t>
        <ul empty="true">
          <li>
            <t>Note: The Agent Certificate extension and the Agent Genesis
mechanism may be subject to pending intellectual property claims.
See Section 7.7 and the IPR Notice preceding the Abstract for details.
The licensor is prepared to grant a royalty-free license to implementers.</t>
          </li>
        </ul>
        <t>Every AGTP server <strong>MUST</strong> log the <tt>Agent-ID</tt> value from every
request and the principal identifier resolved from the
corresponding agent identity document, creating an attributable
audit trail at Level 1 even in deployments that do not implement
Level 2 retrieval or Level 3 transport binding.</t>
      </section>
      <section anchor="authority-scope-enforcement">
        <name>Authority Scope Enforcement</name>
        <t>The Authority-Scope header declares what actions the agent is authorized
to take. Compliant AGTP servers <strong>MUST</strong> parse the Authority-Scope on every
request, return 455 Scope Violation for any method that exceeds declared
scope, and log all scope violations for audit purposes. At Level 1, scope
declarations are self-asserted in the request header, analogous to scope
assertions in OAuth 2.0 <xref target="RFC6749"/>. At Level 2, scope is cryptographically
verifiable through the signed Agent Identity Document; servers <strong>SHOULD</strong>
retrieve and verify the manifest for any Agent-ID whose declared scope
exceeds read-only operations. Level 3 cryptographically signed and
infrastructure-enforced scopes are defined in <xref target="AGTP-CERT"/>.</t>
      </section>
      <section anchor="threat-model">
        <name>Threat Model</name>
        <section anchor="agent-spoofing">
          <name>Agent Spoofing</name>
          <t>Threat: A malicious actor forges the <tt>Agent-ID</tt> header to
impersonate a trusted agent. Mitigation: Level 2 application-layer
verification binds a declared Agent-ID to the signed Agent Identity
Document retrieved via canonical ID resolution. A forged Agent-ID
either fails to resolve or resolves to a manifest whose signature
cannot be verified against the claimed governance platform's published
key. Level 3 raises the mitigation to the TLS handshake via
<xref target="AGTP-CERT"/>. Implementations <strong>SHOULD</strong> retrieve and verify the
manifest for any Agent-ID carrying scope beyond read-only query
operations. Mandatory Level 1 logging provides an anomaly-detection
baseline for deployments that do not perform active verification on
every request.</t>
        </section>
        <section anchor="authority-laundering">
          <name>Authority Laundering</name>
          <t>Threat: An agent claims an Authority-Scope broader than what it was
granted. Mitigation: server-side scope enforcement; 262 Authorization
Required (body type <tt>scope-required</tt>) returned and logged. In DELEGATE
chains, each hop's scope <strong>MUST</strong> be a strict subset of the delegating
agent's scope.</t>
        </section>
        <section anchor="delegation-chain-poisoning">
          <name>Delegation Chain Poisoning</name>
          <t>Threat: A malicious agent inserts itself into a delegation chain.
Mitigation: each hop of a DELEGATE chain <strong>MUST</strong> be logged with the
delegating agent's Agent-ID, the sub-agent's Agent-ID, and the
declared Authority-Scope. Servers processing a delegated request
<strong>MUST</strong> be able to reconstruct the delegation sequence from log
data, sub-agent identity documents, and Authority-Scope subset
verification. 551 Authority Chain Broken is returned when any link
in the sequence is unverifiable. Full mitigation requires
<xref target="AGTP-CERT"/> for signed delegation tokens.</t>
        </section>
        <section anchor="denial-of-service-via-high-frequency-agent-traffic">
          <name>Denial of Service via High-Frequency Agent Traffic</name>
          <t>Threat: Agents that are compromised, misconfigured, or adversarial generate
extremely high request volumes. Mitigation: 429 Rate Limited status code.
Rate limiting <strong>SHOULD</strong> be applied per Agent-ID and per resolved
principal identifier (obtained from the agent identity document
referenced by Agent-ID). When <xref target="AGTP-CERT"/> is deployed,
per-Agent-ID quotas can be cryptographically tied to verified
identity, preventing quota evasion through Agent-ID spoofing.</t>
        </section>
        <section anchor="session-hijacking">
          <name>Session Hijacking</name>
          <t>Threat: An attacker intercepts or forges a Session-ID. Mitigation:
mandatory TLS protects sessions in transit. Session-IDs <strong>MUST</strong> be
cryptographically random with minimum 128 bits of entropy. Servers <strong>MUST</strong>
validate that Session-ID, Agent-ID, and TLS client identity are consistent.</t>
        </section>
        <section anchor="escalation-suppression">
          <name>Escalation Suppression</name>
          <t>Threat: A compromised agent or intermediary suppresses ESCALATE requests,
preventing human oversight. Mitigation: compliant implementations <strong>MUST</strong>
route ESCALATE requests directly to the declared escalation handler without
modification. Intermediaries <strong>MUST NOT</strong> drop, delay, or modify ESCALATE
requests. Escalation handlers <strong>SHOULD</strong> implement independent receipt
confirmation.</t>
        </section>
        <section anchor="agent-genesis-spoofing">
          <name>Agent Genesis Spoofing</name>
          <t>Threat: A malicious actor fabricates an Agent Genesis to claim a
legitimate agent's identity or construct a false identity with elevated
trust. Mitigation: Agent Genesis documents are issued only by governance
platforms that have completed one of the three Tier 1 verification
paths (Section 5.2). For <tt>dns-anchored</tt> registrations, the governance
platform <strong>MUST</strong> verify DNS ownership of the claimed <tt>org_domain</tt>
before issuance. For <tt>log-anchored</tt> registrations, the governance
platform <strong>MUST</strong> submit the Agent Genesis to a transparency log
per <xref target="RFC9162"/> / <xref target="RFC9943"/> and record the inclusion proof in the
registry; tampering with a log-anchored Agent Genesis is
detectable by any party with log access. For <tt>hybrid</tt> registrations,
both DNS and blockchain address ownership are verified. In the base
spec, mandatory logging provides auditability. Full mitigation
requires <xref target="AGTP-CERT"/> for cryptographically bound Agent Genesis
verification at the transport layer. Governance platforms <strong>MUST</strong>
treat any ACTIVATE request that presents a certificate hash matching
an existing registry record as a collision attack and <strong>MUST</strong> reject
it.</t>
        </section>
        <section anchor="domain-transfer-identity-hijacking">
          <name>Domain Transfer Identity Hijacking</name>
          <t>Threat: An attacker acquires an expired domain to inherit the agent
registry and trust history of prior registrants. Mitigation applies
to <tt>dns-anchored</tt> and <tt>hybrid</tt> Tier 1 agents: agents under an expired
domain are automatically Suspended within 24 hours of domain expiry
detection. A new owner of the domain <strong>MUST NOT</strong> inherit prior agent
registrations. See Section 9.6 for the full domain expiry policy.
<tt>log-anchored</tt> Tier 1 agents are unaffected by this threat because
their verification evidence is the transparency log inclusion proof
rather than DNS ownership.</t>
        </section>
        <section anchor="attribution-forgery">
          <name>Attribution Forgery</name>
          <t>Threat: A malicious agent submits a fabricated or replayed
Attribution-Record to claim credit for an action it did not perform, or
to conceal the true execution context of an action it did perform.</t>
          <t>Mitigation: Attribution-Records <strong>MUST</strong> be signed with the agent's
governance key. The signature <strong>MUST</strong> cover the full record including the
Task-ID, Agent-ID, method, timestamp, and result hash. When <xref target="AGTP-CERT"/>
is deployed, the signature is verified at the transport layer against the
agent's X.509 certificate. For high-stakes domains, RATS attestation
evidence in the Attribution-Record per <xref target="RFC9334"/> provides hardware-rooted
proof of execution context that cannot be forged without compromising the
attesting environment itself. Attribution-Record signatures <strong>MUST</strong> be
verified before the record is admitted to an audit trail. Unverified records
<strong>MUST</strong> be logged with a <tt>signature_unverified</tt> flag and <strong>MUST NOT</strong> be
treated as authoritative for compliance purposes.</t>
        </section>
      </section>
      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t>Agent identity carried on requests, and the agent identity
document referenced by <tt>Agent-ID</tt>, carry information about agent
behavior that may be sensitive:</t>
        <ul spacing="normal">
          <li>
            <t>Agent-ID together with the resolved principal identifier may
reveal organizational structure</t>
          </li>
          <li>
            <t>Session-ID and Task-ID reveal workflow patterns</t>
          </li>
          <li>
            <t>Delegation-Chain (reserved for future revisions) would reveal
multi-agent architecture</t>
          </li>
        </ul>
        <t>AGTP logs containing these fields <strong>MUST</strong> be treated as sensitive
operational data. Operators <strong>MUST</strong> implement appropriate access controls,
retention limits, and data minimization practices consistent with
applicable privacy regulations.</t>
        <t>Where privacy-preserving attribution is required, implementations <strong>MAY</strong>
use pseudonymous Agent-IDs with a separate trusted resolution service.
The architecture for pseudonymous agent identity resolution is reserved
for a future companion document.</t>
      </section>
      <section anchor="denial-of-service-considerations">
        <name>Denial-of-Service Considerations</name>
        <t>AGTP's agent identity provides a mechanism for more precise
denial-of-service mitigation than is possible with HTTP. Rate
limiting <strong>SHOULD</strong> be applied per Agent-ID and per resolved
principal identifier (obtained from the agent identity document)
in addition to per-IP-address controls.</t>
        <t>When <xref target="AGTP-CERT"/> is deployed, per-Agent-ID rate limiting can be
cryptographically tied to verified agent identity, preventing quota evasion
through Agent-ID rotation. Implementations planning high-volume governed
agent deployments <strong>SHOULD</strong> plan for <xref target="AGTP-CERT"/> as part of their
denial-of-service mitigation strategy.</t>
        <t>Additional recommended mitigations: traffic-shaping by request
class once the <tt>Priority</tt> header is normatively specified (reserved
for v01+ per <xref target="header-format"/>); and circuit breaker patterns for
ESCALATE request floods.</t>
      </section>
      <section anchor="intellectual-property-considerations">
        <name>Intellectual Property Considerations</name>
        <t>The core AGTP specification, including all base methods, header fields,
status codes, connection model, and IANA registrations defined in this
document, is intended for open implementation without royalty obligation.</t>
        <t>Certain elements referenced in this document may be subject to pending
patent applications by the author, specifically:</t>
        <ul spacing="normal">
          <li>
            <t>The Agent Certificate extension <xref target="AGTP-CERT"/>, which provides
cryptographic binding of agent identity and authority scope to AGTP
header fields.</t>
          </li>
          <li>
            <t>The ACTIVATE method, which provides AGTP-native transmission and
activation of governed agent packages.</t>
          </li>
          <li>
            <t>The Agent Genesis mechanism (Section 5.7), which provides
the genesis identity record and canonical Agent-ID derivation
process for AGTP-registered agents.</t>
          </li>
          <li>
            <t>The <tt>.agent</tt> file format specification, an open packaging format
for AI agents.</t>
          </li>
          <li>
            <t>The <tt>.nomo</tt> file format specification, a governed packaging format
for AI agents with cryptographic governance binding.</t>
          </li>
        </ul>
        <t>Implementers of the core AGTP specification are not affected by any
intellectual property claims on these extensions and associated formats.</t>
        <t>The licensor is prepared to grant a royalty-free license to implementers
for any patent claims that cover contributions in this document and its
referenced extensions, consistent with the IETF's IPR framework under
<xref target="RFC8179"/>.</t>
        <t>IPR disclosures have been filed with the IETF Secretariat and are available
at: https://datatracker.ietf.org/ipr/</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document records the following IANA registrations.</t>
      <section anchor="iana-ports">
        <name>Port Assignment</name>
        <t>The following service names and port number are registered in the
IANA Service Name and Transport Protocol Port Number Registry:</t>
        <table>
          <name>AGTP Port Assignments</name>
          <thead>
            <tr>
              <th align="left">Service Name</th>
              <th align="left">Port</th>
              <th align="left">Transport</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">agtp</td>
              <td align="left">4480</td>
              <td align="left">TCP</td>
              <td align="left">Agent Transfer Protocol over TCP/TLS</td>
            </tr>
            <tr>
              <td align="left">agtp-quic</td>
              <td align="left">4480</td>
              <td align="left">UDP</td>
              <td align="left">Agent Transfer Protocol over QUIC</td>
            </tr>
          </tbody>
        </table>
        <t>The unified port assignment (4480 for both TCP and UDP under a
single conceptual <tt>agtp</tt> service) follows the precedent set by HTTPS
(443/TCP and 443/UDP for HTTP/3). The transport is distinguished at
the protocol level rather than at the port number.</t>
        <dl>
          <dt>Contact:</dt>
          <dd>
            <t>Chris Hood, chris@nomotic.ai</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
        </dl>
      </section>
      <section anchor="agtp-method-registry">
        <name>AGTP Method Registry</name>
        <t>Establishment of an IANA registry: Agent Transfer Protocol Methods.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Methods</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review per <xref target="RFC8126"/>, with the additional requirement that each
registration be accompanied by a published specification, at minimum a
publicly available Internet-Draft or equivalent document. The Designated
Expert <strong>SHOULD</strong> verify that the proposed method name is unique, the
reference specification is publicly accessible, the method definition
includes the required fields (parameters, response structure, idempotency,
error codes, security considerations), and the method conforms to the
AGTP-API specification <xref target="AGTP-API"/>.</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
        </dl>
        <t>Initial registrations (the twelve-method protocol floor):</t>
        <table>
          <name>Initial AGTP Method Registry Entries (Twelve-Method Floor)</name>
          <thead>
            <tr>
              <th align="left">Method</th>
              <th align="left">Group</th>
              <th align="left">Status</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">QUERY</td>
              <td align="left">Cognitive</td>
              <td align="left">Permanent</td>
              <td align="left">
                <xref target="core-methods"/></td>
            </tr>
            <tr>
              <td align="left">DISCOVER</td>
              <td align="left">Cognitive</td>
              <td align="left">Permanent</td>
              <td align="left">
                <xref target="core-methods"/></td>
            </tr>
            <tr>
              <td align="left">DESCRIBE</td>
              <td align="left">Cognitive</td>
              <td align="left">Permanent</td>
              <td align="left">
                <xref target="core-methods"/></td>
            </tr>
            <tr>
              <td align="left">SUMMARIZE</td>
              <td align="left">Cognitive</td>
              <td align="left">Permanent</td>
              <td align="left">
                <xref target="core-methods"/></td>
            </tr>
            <tr>
              <td align="left">PLAN</td>
              <td align="left">Cognitive</td>
              <td align="left">Permanent</td>
              <td align="left">
                <xref target="core-methods"/></td>
            </tr>
            <tr>
              <td align="left">PROPOSE</td>
              <td align="left">Cognitive</td>
              <td align="left">Permanent</td>
              <td align="left">
                <xref target="core-methods"/></td>
            </tr>
            <tr>
              <td align="left">EXECUTE</td>
              <td align="left">Mechanics</td>
              <td align="left">Permanent</td>
              <td align="left">
                <xref target="core-methods"/></td>
            </tr>
            <tr>
              <td align="left">DELEGATE</td>
              <td align="left">Mechanics</td>
              <td align="left">Permanent</td>
              <td align="left">
                <xref target="core-methods"/></td>
            </tr>
            <tr>
              <td align="left">ESCALATE</td>
              <td align="left">Mechanics</td>
              <td align="left">Permanent</td>
              <td align="left">
                <xref target="core-methods"/></td>
            </tr>
            <tr>
              <td align="left">CONFIRM</td>
              <td align="left">Mechanics</td>
              <td align="left">Permanent</td>
              <td align="left">
                <xref target="core-methods"/></td>
            </tr>
            <tr>
              <td align="left">SUSPEND</td>
              <td align="left">Mechanics</td>
              <td align="left">Permanent</td>
              <td align="left">
                <xref target="core-methods"/></td>
            </tr>
            <tr>
              <td align="left">NOTIFY</td>
              <td align="left">Mechanics</td>
              <td align="left">Permanent</td>
              <td align="left">
                <xref target="core-methods"/></td>
            </tr>
          </tbody>
        </table>
        <t>The methods BOOK, SCHEDULE, LEARN, and COLLABORATE, present in the
v06 core set, are demoted in v07 to Tier 2 standard extended methods
and are registered through the AGTP-API method catalog (<xref target="AGTP-API"/>)
rather than through this document.</t>
      </section>
      <section anchor="agtp-status-code-registry">
        <name>AGTP Status Code Registry</name>
        <t>Establishment of an IANA registry: Agent Transfer Protocol Status Codes.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Status Codes</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review + published specification required.</t>
          </dd>
        </dl>
        <t>AGTP-specific status code numbers are deliberately chosen from
ranges unassigned in the IANA HTTP Status Code Registry to avoid
semantic collision with HTTP status codes that may appear in
payloads carried by AGTP method invocations.</t>
        <t>Two status codes used by AGTP retain their HTTP code numbers (408
and 410) but carry AGTP-specific semantics. They are registered here
with text describing the AGTP semantic.</t>
        <t>The following AGTP status codes are registered with full definitions:</t>
        <table>
          <name>AGTP-Specific Status Code Definitions</name>
          <thead>
            <tr>
              <th align="left">Code</th>
              <th align="left">Name</th>
              <th align="left">Definition</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">261</td>
              <td align="left">Negotiation In Progress</td>
              <td align="left">The service has received a PROPOSE request and is evaluating it asynchronously. The response body <strong>MUST</strong> include a <tt>proposal_id</tt> and an estimated evaluation duration. The agent retrieves the terminal status by invoking <tt>QUERY /proposals/{proposal_id}</tt> until a 263 (Proposal Approved) or 463 (Proposal Rejected) response is returned. Server policy controls whether async evaluation is offered.</td>
              <td align="left">
                <xref target="AGTP-API"/></td>
            </tr>
            <tr>
              <td align="left">262</td>
              <td align="left">Authorization Required</td>
              <td align="left">The request requires credential establishment, additional authorization scope, or consent that is not yet present. The response body <strong>MUST</strong> specify which authorization condition applies: <tt>scope-required</tt> (the endpoint requires Authority-Scope the agent has not declared), <tt>wildcards-required</tt> (the request is an ad-hoc method invocation and the wildcards consent on either the agent identity document or the server policy is absent), <tt>credentials-missing</tt> (the server requires credentials such as AGTP-CERT or OAuth-scoped token before evaluating the request), or <tt>anonymous-discovery-disabled</tt> (the server requires authenticated identity for manifest retrieval and the request is unauthenticated). Returned for PROPOSE-time authorization, endpoint-dispatch scope checks, ad-hoc invocation wildcards refusal, and discovery requests blocked by policy.</td>
              <td align="left">
                <xref target="AGTP-API"/></td>
            </tr>
            <tr>
              <td align="left">263</td>
              <td align="left">Proposal Approved</td>
              <td align="left">The service has accepted the PROPOSE request and instantiated the proposed endpoint. The response body <strong>MUST</strong> contain a complete AGTP-API endpoint definition for the instantiated endpoint, a <tt>synthesis_id</tt> identifying the synthesized endpoint for follow-on invocation, and <tt>expires_at</tt> indicating when the synthesis expires. <strong>MAY</strong> include a <tt>persistent</tt> boolean and <tt>granted_duration</tt> indicating the actual duration the server granted (which may be less than the agent requested, bounded by server policy).</td>
              <td align="left">
                <xref target="AGTP-API"/></td>
            </tr>
            <tr>
              <td align="left">405</td>
              <td align="left">Method Not Allowed</td>
              <td align="left">The method is recognized and the path is valid, but the server's policy or registry does not expose this combination. The response body <strong>MUST</strong> list allowed methods for the path and any redirects from the manifest's <tt>policies.methods</tt> sub-block. The agent <strong>MAY</strong> PROPOSE the combination if it is not exposed by policy.</td>
              <td align="left">
                <xref target="AGTP-API"/></td>
            </tr>
            <tr>
              <td align="left">408</td>
              <td align="left">Timeout</td>
              <td align="left">The method's declared TTL expired before execution completed. AGTP-specific semantics distinct from HTTP's request-timeout: applies to AGTP method TTL rather than transport request timeout. <strong>MUST</strong> be logged.</td>
              <td align="left">
                <xref target="status-codes"/></td>
            </tr>
            <tr>
              <td align="left">410</td>
              <td align="left">Gone</td>
              <td align="left">The Agent-ID is permanently retired through revocation or deprecation of the underlying Agent Genesis. AGTP-specific semantics distinct from HTTP's resource-removed: applies to permanent identity retirement. The canonical Agent-ID <strong>MUST NOT</strong> be retried.</td>
              <td align="left">
                <xref target="status-codes"/></td>
            </tr>
            <tr>
              <td align="left">455</td>
              <td align="left">Scope Violation</td>
              <td align="left">The requested action is outside a declared scope dimension other than Authority-Scope, rate-limit, budget, or zone (which have dedicated codes 262, 429, 456, 457 respectively). Typical applications include token-based scope violations and query-based scope violations where the operator defines a scope dimension outside the standard set. The server <strong>MUST</strong> log this event. The agent <strong>MUST NOT</strong> retry the same request without modifying its scope declaration. Governance signal, not a protocol error.</td>
              <td align="left">
                <xref target="status-codes"/></td>
            </tr>
            <tr>
              <td align="left">456</td>
              <td align="left">Budget Exceeded</td>
              <td align="left">The requested method execution would exceed the resource limits declared in the Budget-Limit request header. The agent <strong>MUST NOT</strong> retry without modifying the Budget-Limit or reducing request scope. Governance signal; <strong>MUST</strong> be logged.</td>
              <td align="left">
                <xref target="status-codes"/></td>
            </tr>
            <tr>
              <td align="left">457</td>
              <td align="left">Zone Violation</td>
              <td align="left">The request would route outside the network boundary declared in the AGTP-Zone-ID header. SEP-enforced. The agent <strong>MUST NOT</strong> retry without modifying the AGTP-Zone-ID or obtaining explicit cross-zone authorization. <strong>MUST</strong> be logged.</td>
              <td align="left">
                <xref target="status-codes"/></td>
            </tr>
            <tr>
              <td align="left">458</td>
              <td align="left">Counterparty Unverified</td>
              <td align="left">The merchant counterparty in a PURCHASE invocation failed identity verification. Returned when the <tt>Merchant-ID</tt> or <tt>Merchant-Manifest-Fingerprint</tt> request headers are absent, when the fingerprint does not match the receiving server's current Merchant Manifest Document, when the Merchant-ID does not match the server's canonical ID, or when the merchant is in a non-Active lifecycle state. Governance signal; <strong>MUST</strong> be logged. Full definition in <xref target="AGTP-MERCHANT"/>.</td>
              <td align="left">
                <xref target="AGTP-MERCHANT"/></td>
            </tr>
            <tr>
              <td align="left">459</td>
              <td align="left">Method Violation</td>
              <td align="left">The method name is not in the AGTP-API approved method catalog. The method itself is the problem. The response body <strong>MUST</strong> identify the unrecognized method and <strong>SHOULD</strong> reference the AGTP-API method catalog version in effect. The agent <strong>MUST</strong> select a different method before retrying, or <strong>MAY</strong> PROPOSE the method if no suitable replacement exists.</td>
              <td align="left">
                <xref target="AGTP-API"/></td>
            </tr>
            <tr>
              <td align="left">460</td>
              <td align="left">Endpoint Violation</td>
              <td align="left">The endpoint path violates AGTP-API path grammar. A path segment matches an approved method name (case-insensitive), indicating method-name leakage into the path. The response body <strong>MUST</strong> identify the offending path segment. The agent <strong>MUST</strong> restructure the path before retrying.</td>
              <td align="left">
                <xref target="AGTP-API"/></td>
            </tr>
            <tr>
              <td align="left">461</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved for AGTP expansion.</td>
              <td align="left">
                <xref target="status-codes"/></td>
            </tr>
            <tr>
              <td align="left">462</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved for AGTP expansion.</td>
              <td align="left">
                <xref target="status-codes"/></td>
            </tr>
            <tr>
              <td align="left">463</td>
              <td align="left">Proposal Rejected</td>
              <td align="left">The service cannot or will not instantiate the proposed endpoint. Returned in response to PROPOSE. The response body <strong>MUST</strong> include a structured <tt>reason</tt> field with one of the values <tt>out-of-scope</tt>, <tt>policy-refused</tt>, <tt>composition-impossible</tt>, <tt>ambiguous</tt>, or <tt>synthesis-disabled</tt>, an <tt>explanation</tt> string, and <strong>MAY</strong> include an optional <tt>counter_proposal</tt> suggesting a related endpoint the server would accept.</td>
              <td align="left">
                <xref target="AGTP-API"/></td>
            </tr>
            <tr>
              <td align="left">464</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved for AGTP expansion.</td>
              <td align="left">
                <xref target="status-codes"/></td>
            </tr>
            <tr>
              <td align="left">465</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved for AGTP expansion.</td>
              <td align="left">
                <xref target="status-codes"/></td>
            </tr>
            <tr>
              <td align="left">550</td>
              <td align="left">Delegation Failure</td>
              <td align="left">A sub-agent to which a task was delegated via the DELEGATE method failed to complete the task within the declared deadline or returned an error. The response body <strong>SHOULD</strong> contain the sub-agent's error details.</td>
              <td align="left">
                <xref target="status-codes"/></td>
            </tr>
            <tr>
              <td align="left">551</td>
              <td align="left">Authority Chain Broken</td>
              <td align="left">One or more entries in the delegation sequence cannot be verified as part of a valid and continuous delegation chain. The specific unverifiable entry <strong>SHOULD</strong> be identified in the response body. The server <strong>MUST</strong> log this event.</td>
              <td align="left">
                <xref target="status-codes"/></td>
            </tr>
            <tr>
              <td align="left">552</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved for AGTP expansion.</td>
              <td align="left">
                <xref target="status-codes"/></td>
            </tr>
            <tr>
              <td align="left">553</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved for AGTP expansion.</td>
              <td align="left">
                <xref target="status-codes"/></td>
            </tr>
            <tr>
              <td align="left">554</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved for AGTP expansion.</td>
              <td align="left">
                <xref target="status-codes"/></td>
            </tr>
            <tr>
              <td align="left">555</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved for AGTP expansion.</td>
              <td align="left">
                <xref target="status-codes"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="media-type-registry">
        <name>Media Type Registry</name>
        <t>This section is the master registry of all AGTP-family media
types. Types defined by companion specifications are listed here
for cross-document discoverability; their normative definitions
remain in the defining document.</t>
        <table>
          <name>AGTP Media Type Registrations</name>
          <thead>
            <tr>
              <th align="left">Media Type</th>
              <th align="left">Use</th>
              <th align="left">Defining Reference</th>
              <th align="left">IANA Status</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>application/vnd.agtp+json</tt></td>
              <td align="left">AGTP method request/response bodies (JSON)</td>
              <td align="left">
                <xref target="wire-format"/></td>
              <td align="left">Planned (this document)</td>
            </tr>
            <tr>
              <td align="left">
                <tt>application/vnd.agtp+yaml</tt></td>
              <td align="left">AGTP method request/response bodies (YAML)</td>
              <td align="left">
                <xref target="wire-format"/></td>
              <td align="left">Planned (this document)</td>
            </tr>
            <tr>
              <td align="left">
                <tt>application/vnd.agtp.identity+json</tt></td>
              <td align="left">Agent Identity Document (JSON)</td>
              <td align="left">
                <xref target="identity-document"/></td>
              <td align="left">Vendor-tree registration submitted</td>
            </tr>
            <tr>
              <td align="left">
                <tt>application/vnd.agtp.identity+yaml</tt></td>
              <td align="left">Agent Identity Document (YAML)</td>
              <td align="left">
                <xref target="identity-document"/></td>
              <td align="left">Vendor-tree registration submitted</td>
            </tr>
            <tr>
              <td align="left">
                <tt>application/vnd.agtp.manifest+json</tt></td>
              <td align="left">AGTP server manifest</td>
              <td align="left">
                <xref target="AGTP-API"/></td>
              <td align="left">Planned (AGTP-API)</td>
            </tr>
            <tr>
              <td align="left">
                <tt>application/vnd.agtp.endpoint+json</tt></td>
              <td align="left">AGTP-API endpoint definition</td>
              <td align="left">
                <xref target="AGTP-API"/></td>
              <td align="left">Planned (AGTP-API)</td>
            </tr>
          </tbody>
        </table>
        <t>"Vendor-tree registration submitted" indicates that the
registration application has been filed with IANA against the
<tt>application/vnd.*</tt> vendor tree and is awaiting processing.
"Planned (this document)" and "Planned (AGTP-API)" indicate types
for which registration applications will be filed concurrent with
publication of the defining document. Standards-tree promotion of
the full set is anticipated at RFC publication of the AGTP family.</t>
      </section>
      <section anchor="header-field-registry">
        <name>Header Field Registry</name>
        <t>AGTP header fields are distinct from HTTP header fields and are registered
in a new IANA registry: Agent Transfer Protocol Header Fields.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Header Fields</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review + published specification required.</t>
          </dd>
        </dl>
        <t>AGTP does not reuse the HTTP Field Name Registry, as AGTP header fields have
different semantics, applicability, and versioning constraints from HTTP
fields. HTTP header fields are not automatically valid in AGTP, and AGTP
header fields are not valid HTTP fields.</t>
        <t>Initial registrations (all Permanent): Agent-ID, Authority-Scope,
Session-ID, Task-ID, Delegation-Chain, Server-ID, Attribution-Record,
Continuation-Token, Supported-Methods, Cost-Estimate,
Attestation-Evidence, Merchant-ID, Merchant-Manifest-Fingerprint,
Intent-Assertion, Cart-Digest, AGTP-API-Version,
AGTP-Catalog-Warning, AGTP-Endpoint-Warning.</t>
        <t>The four merchant-related headers are defined in <xref target="AGTP-MERCHANT"/> and
registered concurrently with this document. The three API-related
headers (<tt>AGTP-API-Version</tt>, <tt>AGTP-Catalog-Warning</tt>, and
<tt>AGTP-Endpoint-Warning</tt>) are defined in <xref target="AGTP-API"/> and registered
concurrently.</t>
        <t>Headers reserved for future revisions (Priority, TTL, Budget-Limit,
AGTP-Zone-ID, Content-Schema, Telemetry-Export) are not registered
in this revision. They will be registered alongside the future
revision that specifies their normative semantics.</t>
      </section>
      <section anchor="uri-scheme-registration">
        <name>URI Scheme Registration</name>
        <t>The <tt>agtp://</tt> URI scheme is registered per <xref target="RFC7595"/>. Full
registration template is documented in Section 5.1.8 of this
document.</t>
      </section>
      <section anchor="agtp-budget-unit-registry">
        <name>AGTP Budget Unit Registry</name>
        <t>Establishment of a new IANA sub-registry: Agent Transfer Protocol Budget
Units.</t>
        <dl>
          <dt>Registry name:</dt>
          <dd>
            <t>Agent Transfer Protocol Budget Units</t>
          </dd>
          <dt>Registration procedure:</dt>
          <dd>
            <t>Expert Review per <xref target="RFC8126"/>. New unit registrations <strong>MUST</strong> define:
unit name (lowercase ASCII, no spaces or special characters), semantic
description, value format (integer or decimal), whether fractional values
are permitted, and a reference specification. Units representing financial
denominations <strong>MUST</strong> specify the currency and <strong>MUST</strong> define precision
(decimal places). The Designated Expert <strong>SHOULD</strong> verify that the proposed
unit does not duplicate an existing registration and that the value format
is unambiguous.</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>This document</t>
          </dd>
        </dl>
        <t>Initial registrations:</t>
        <table>
          <name>Initial AGTP Budget Unit Registry Entries</name>
          <thead>
            <tr>
              <th align="left">Unit</th>
              <th align="left">Description</th>
              <th align="left">Value Format</th>
              <th align="left">Fractional</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">tokens</td>
              <td align="left">Language model token consumption</td>
              <td align="left">Integer</td>
              <td align="left">No</td>
            </tr>
            <tr>
              <td align="left">compute-seconds</td>
              <td align="left">CPU/GPU compute time in seconds</td>
              <td align="left">Decimal</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">USD</td>
              <td align="left">US Dollar financial limit</td>
              <td align="left">Decimal, 2 places</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">EUR</td>
              <td align="left">Euro financial limit</td>
              <td align="left">Decimal, 2 places</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">GBP</td>
              <td align="left">Pound Sterling financial limit</td>
              <td align="left">Decimal, 2 places</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">calls</td>
              <td align="left">Downstream API call count</td>
              <td align="left">Integer</td>
              <td align="left">No</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="agent-registry-retention-policy">
        <name>Agent Registry Retention Policy</name>
        <t>The AGTP registry <strong>MUST</strong> retain records for all registered agents
regardless of lifecycle state. The following minimum retention periods apply:</t>
        <table>
          <name>AGTP Registry Minimum Retention Periods</name>
          <thead>
            <tr>
              <th align="left">Lifecycle State</th>
              <th align="left">Minimum Retention Period</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Active</td>
              <td align="left">Duration of Active state + 7 years</td>
            </tr>
            <tr>
              <td align="left">Suspended</td>
              <td align="left">Duration of Suspended state + 7 years</td>
            </tr>
            <tr>
              <td align="left">Revoked</td>
              <td align="left">10 years from revocation date</td>
            </tr>
            <tr>
              <td align="left">Deprecated</td>
              <td align="left">7 years from deprecation date</td>
            </tr>
          </tbody>
        </table>
        <t>The 7-year minimum reflects common enterprise compliance requirements
(SOX, GDPR audit trails, HIPAA). Governance platform operators in regulated
industries <strong>SHOULD</strong> extend these minimums to match applicable regulatory
requirements.</t>
        <t>The retained record for a Revoked or Deprecated agent <strong>MUST</strong> include:</t>
        <ul spacing="normal">
          <li>
            <t>Canonical Agent-ID (permanently retired, not reissued)</t>
          </li>
          <li>
            <t>Agent label and org domain at time of registration</t>
          </li>
          <li>
            <t>Trust tier at time of registration</t>
          </li>
          <li>
            <t>Activation date and activating principal</t>
          </li>
          <li>
            <t>Revocation or deprecation date, initiating principal, and reason code</t>
          </li>
          <li>
            <t>Genesis audit record hash (pointer to immutable audit log)</t>
          </li>
          <li>
            <t>Full Agent Genesis (archived, not publicly accessible)</t>
          </li>
          <li>
            <t>All lifecycle state transitions with timestamps</t>
          </li>
        </ul>
        <t>The retained record <strong>MUST NOT</strong> contain package executable contents,
active session data, or Authority-Scope grant tokens.</t>
        <section anchor="domain-name-expiry-interaction">
          <name>Domain Name Expiry Interaction</name>
          <t>If an organization's <tt>org_domain</tt> expires or transfers to a new owner:</t>
          <ol spacing="normal" type="1"><li>
              <t>All Active agents registered under the expired domain <strong>MUST</strong> be
automatically Suspended within 24 hours of domain expiry detection.</t>
            </li>
            <li>
              <t>The governance platform <strong>MUST</strong> notify the registered principal
contact before suspension takes effect, with a minimum notice period
of 30 days if domain expiry was predictable.</t>
            </li>
            <li>
              <t>Suspended agents under an expired domain transition to Deprecated
state after 90 days if the domain has not been renewed.</t>
            </li>
            <li>
              <t>A new owner of the domain <strong>MUST NOT</strong> inherit prior agent
registrations. New ACTIVATE transactions are required.</t>
            </li>
          </ol>
          <t>This policy prevents domain-transfer-based identity hijacking in which
an attacker acquires an expired domain to claim the trust history of
agents that operated under it.</t>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC6335">
          <front>
            <title>Internet Assigned Numbers Authority (IANA) Procedures for the Management of the Service Name and Transport Protocol Port Number Registry</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Eggert" initials="L." surname="Eggert"/>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <date month="August" year="2011"/>
            <abstract>
              <t>This document defines the procedures that the Internet Assigned Numbers Authority (IANA) uses when handling assignment and other requests related to the Service Name and Transport Protocol Port Number registry. It also discusses the rationale and principles behind these procedures and how they facilitate the long-term sustainability of the registry.</t>
              <t>This document updates IANA's procedures by obsoleting the previous UDP and TCP port assignment procedures defined in Sections 8 and 9.1 of the IANA Allocation Guidelines, and it updates the IANA service name and port assignment procedures for UDP-Lite, the Datagram Congestion Control Protocol (DCCP), and the Stream Control Transmission Protocol (SCTP). It also updates the DNS SRV specification to clarify what a service name is and how it is registered. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="165"/>
          <seriesInfo name="RFC" value="6335"/>
          <seriesInfo name="DOI" value="10.17487/RFC6335"/>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8179">
          <front>
            <title>Intellectual Property Rights in IETF Technology</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <author fullname="J. Contreras" initials="J." surname="Contreras"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>The IETF policies about Intellectual Property Rights (IPR), such as patent rights, relative to technologies developed in the IETF are designed to ensure that IETF working groups and participants have as much information as possible about any IPR constraints on a technical proposal as early as possible in the development process. The policies are intended to benefit the Internet community and the public at large, while respecting the legitimate rights of IPR holders. This document sets out the IETF policies concerning IPR related to technology worked on within the IETF. It also describes the objectives that the policies are designed to meet. This document updates RFC 2026 and, with RFC 5378, replaces Section 10 of RFC 2026. This document also obsoletes RFCs 3979 and 4879.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="79"/>
          <seriesInfo name="RFC" value="8179"/>
          <seriesInfo name="DOI" value="10.17487/RFC8179"/>
        </reference>
        <reference anchor="RFC8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
            <author fullname="D. McCarney" initials="D." surname="McCarney"/>
            <author fullname="J. Kasten" initials="J." surname="Kasten"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="AGTP-API">
          <front>
            <title>AGTP-API: Verbs, Paths, Endpoints, and Synthesis</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-api-00"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9114">
          <front>
            <title>HTTP/3</title>
            <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9114"/>
          <seriesInfo name="DOI" value="10.17487/RFC9114"/>
        </reference>
        <reference anchor="RFC7540">
          <front>
            <title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
            <author fullname="M. Belshe" initials="M." surname="Belshe"/>
            <author fullname="R. Peon" initials="R." surname="Peon"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection. It also introduces unsolicited push of representations from servers to clients.</t>
              <t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax. HTTP's existing semantics remain unchanged.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7540"/>
          <seriesInfo name="DOI" value="10.17487/RFC7540"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC7595">
          <front>
            <title>Guidelines and Registration Procedures for URI Schemes</title>
            <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <author fullname="T. Hardie" initials="T." surname="Hardie"/>
            <date month="June" year="2015"/>
            <abstract>
              <t>This document updates the guidelines and recommendations, as well as the IANA registration processes, for the definition of Uniform Resource Identifier (URI) schemes. It obsoletes RFC 4395.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="35"/>
          <seriesInfo name="RFC" value="7595"/>
          <seriesInfo name="DOI" value="10.17487/RFC7595"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9943">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="A2A" target="https://a2aprotocol.ai">
          <front>
            <title>Agent-to-Agent Protocol Specification</title>
            <author>
              <organization>Linux Foundation</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="ACP">
          <front>
            <title>Agent Communication Protocol</title>
            <author>
              <organization>IBM Research</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="MCP" target="https://modelcontextprotocol.io">
          <front>
            <title>Model Context Protocol</title>
            <author>
              <organization>Anthropic</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="ANP">
          <front>
            <title>Agent Network Protocol</title>
            <author>
              <organization/>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="AGTP-CERT">
          <front>
            <title>AGTP Agent Certificate Extension</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-agent-cert-00"/>
        </reference>
        <reference anchor="HOOD2026">
          <front>
            <title>Semantic Method Naming and LLM Agent Accuracy: A Controlled Benchmark of REST/CRUD versus Agentive API Interface Design</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Working Paper" value="Available by request. March 2026."/>
        </reference>
        <reference anchor="AGTP-WEB3">
          <front>
            <title>AGTP Web3 Bridge Specification</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-web3-bridge-00"/>
        </reference>
        <reference anchor="AGTP-DISCOVER">
          <front>
            <title>AGTP Agent Discovery and Name Service</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-discovery-00"/>
        </reference>
        <reference anchor="AGTP-COMPOSITION">
          <front>
            <title>AGTP Composition with Agent Group Messaging Protocols</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-composition-00"/>
        </reference>
        <reference anchor="AGTP-MERCHANT">
          <front>
            <title>AGTP Merchant Identity and Agentic Commerce Binding</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-merchant-identity-00"/>
        </reference>
        <reference anchor="AGTP-LOG">
          <front>
            <title>AGTP Transparency Log Protocol</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-log-00"/>
        </reference>
        <reference anchor="AGTP-TRUST">
          <front>
            <title>AGTP Trust and Verification Specification</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-trust-00"/>
        </reference>
      </references>
    </references>
    <?line 4018?>

<section anchor="changes-from-v06">
      <name>Changes from v06</name>
      <t>Version 07 confirms IANA registrations completed since v06, formalizes
URI grammar and Identity Document terminology to match deployment, and
makes architectural commitments that v06 prepared but did not lock.</t>
      <section anchor="substantive-changes">
        <name>Substantive Changes</name>
        <t>The following substantive changes were made:</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>IANA registrations confirmed.</strong> The <tt>agtp://</tt> URI scheme is
registered under IANA per <xref target="RFC7595"/>; port 4480 is registered
under unified service names <tt>agtp</tt> (TCP/TLS) and <tt>agtp-quic</tt>
(QUIC) per <xref target="RFC6335"/>. The IANA Considerations section
(<xref target="iana-ports"/>) and Stack Position section now state the
registered values rather than "TBD." The pre-publication
prohibition language has been removed.</t>
          </li>
          <li>
            <t><strong>AGIS deprecated; AGTP-API introduced.</strong> The Agentic Grammar
and Interface Specification (AGIS) and the previously-proposed
Agent Method Grammar (AMG) and AGTP-Methods drafts are deprecated
and replaced by a single unified companion specification,
AGTP-API <xref target="AGTP-API"/>. AGTP-API consolidates the method catalog, path
grammar, endpoint primitive, semantic block, schema validation,
server manifest format, per-server method policy (carried as the
manifest's <tt>policies.methods</tt> sub-block),
PROPOSE and synthesis semantics, and structural rejection codes
(404, 405, 459, 460) into a single document because they
describe a single concept: what makes a valid agent-server
contract. The <tt>Method-Grammar</tt> header is removed; servers
validate inbound method names against the AGTP-API approved verb
list directly. The 454 Grammar Violation status code from
earlier draft language is removed; method violations now return
459 (verb not in approved list) or 460 (path violates path
grammar). The grammar-validation pathway is replaced by the
AGTP-API contract validation pathway.</t>
          </li>
          <li>
            <t><strong>Status code renumbering and new contract-level codes.</strong>
AGTP-specific status codes have been moved out of HTTP-assigned
numeric ranges to avoid semantic collision with HTTP status
codes that may appear in carried payloads. The mapping from v06:
451 → 455 (Scope Violation), 452 → 456 (Budget Exceeded), 453 →
457 (Zone Violation), 455 → 458 (Counterparty Unverified). New
codes added per the AGTP-API contract model: 261 (Negotiation In
Progress), 262 (Authorization Required; consolidates PROPOSE-time
authorization, missing scope at endpoint dispatch, wildcards
refused, and anonymous-discovery blocked), 263 (Proposal
Approved), 405 (Method Not Allowed; method+path policy reject),
459 (Method Violation; method not in AGTP-API catalog), 460
(Endpoint Violation; path violates AGTP-API path grammar), 463
(Proposal Rejected). 408 (Timeout) and 410 (Gone) retain their
HTTP code numbers and are registered with AGTP-specific
semantics. The 461, 462, 464, 465, and 552-555 ranges are
reserved for future AGTP expansion.</t>
          </li>
          <li>
            <t><strong>Form 1a URI grammar.</strong> A new canonical URI form
<tt>agtp://{agent-id}@{host}[:{port}]</tt> (Form 1a) is introduced for
direct addressing where the resolver does not yet have a path
from canonical Agent-ID to endpoint. The Agent-ID identifies; the
hostname is a resolution hint. Form 3 (path-style domain anchored)
is retained as a compatibility form but deprioritized for new
deployments.</t>
          </li>
          <li>
            <t><strong>Port portion of URIs is OPTIONAL.</strong> When the port is omitted
from any AGTP URI, clients <strong>MUST</strong> use the IANA-assigned default
port 4480.</t>
          </li>
          <li>
            <t><strong>Wire-format framing.</strong> A new normative subsection
(<xref target="wire-framing"/>) requires explicit <tt>Content-Length</tt> framing on
every AGTP message and prohibits TLS socket-level half-close
(<tt>shutdown(SHUT_WR)</tt>). This addresses a deployment-level gap
surfaced by early implementations.</t>
          </li>
          <li>
            <t><strong>Agent Manifest Document renamed to Agent Identity Document.</strong>
The artifact now matches the IANA-registered media type
<tt>application/vnd.agtp.identity+json</tt>. The schema is enumerated
in §5.5 with field-by-field semantics: 16 REQUIRED fields, 14
RECOMMENDED fields, and 2 CONDITIONAL fields. The previous v06
schema is preserved in substance; the rename and the explicit
field-level enumeration are the changes. The signature field is
relocated to an envelope specified in <xref target="AGTP-CERT"/>.</t>
          </li>
          <li>
            <t><strong>Twelve-method protocol floor.</strong> The core method set has been
redesigned as a twelve-method floor organized into six cognitive
verbs (QUERY, DISCOVER, DESCRIBE, SUMMARIZE, PLAN, PROPOSE) and
six mechanics verbs (EXECUTE, DELEGATE, ESCALATE, CONFIRM,
SUSPEND, NOTIFY). DISCOVER, PLAN, and EXECUTE are new core methods
in v07. The v06 core methods BOOK, SCHEDULE, LEARN, and
COLLABORATE are demoted to Tier 2 standard extended methods and
are now catalogued in the AGTP-API method catalog (<xref target="AGTP-API"/>)
rather than this document.
EXECUTE absorbs the role earlier discussed for an INVOKE method:
it is the generic carrier for application-layer payloads when
higher-level frameworks are composed over AGTP.</t>
          </li>
          <li>
            <t><strong>Composition with higher-level frameworks promoted to body
text.</strong> A new normative section (<xref target="composition-section"/>)
establishes AGTP as a substrate for MCP, A2A, ACP, and ANP
carried as content types inside AGTP method invocations. The
substrate model, EXECUTE-as-carrier rule, precedence rule
between AGTP headers and framework payloads, and canonical
mapping table are normative in the body. The pre-existing
AGMP composition appendix supplements the body section with
worked wire examples.</t>
          </li>
          <li>
            <t><strong>Trust score scoping.</strong> The <tt>trust_score</tt> field (renamed from
<tt>behavioral_trust_score</tt>) remains in the Identity Document
REQUIRED schema. Computation methodology, freshness
requirements, and signature binding are forward-referenced to
a new companion specification, AGTP-TRUST <xref target="AGTP-TRUST"/>, which
will be developed separately.</t>
          </li>
          <li>
            <t><strong><tt>.well-known/agtp</tt> bootstrap convention.</strong> A new subsection
under §5.1 specifies that organizations operating an AGTP
namespace under a DNS domain SHOULD publish a bootstrap
document at <tt>https://{domain}/.well-known/agtp</tt> per <xref target="RFC8615"/>,
declaring the organization's AGTP presence, endpoint, and
verification anchors.</t>
          </li>
          <li>
            <t><strong>Media type alignment.</strong> The wire content type has been
updated from <tt>application/agtp+json</tt> to <tt>application/vnd.agtp+json</tt>
(vendor-tree pending standards-tree promotion at RFC publication).
The Agent Identity Document uses
<tt>application/vnd.agtp.identity+json</tt>. YAML variants are
registered for both.</t>
          </li>
          <li>
            <t><strong>Agent Genesis taxonomy clarification.</strong> The permanent signed
governance-layer origin document that establishes an agent's
identity is named "Agent Genesis" throughout the specification.
The taxonomy is: Agent Genesis (permanent signed origin document)
→ canonical Agent-ID (256-bit hash, used in all protocol
operations) → Agent Certificate (optional X.509 v3 credential for
TLS mutual authentication; see <xref target="AGTP-CERT"/>). The cross-layer
relationship between Agent Genesis, canonical Agent-ID, and Agent
Certificate has been clarified relative to earlier drafts where
the origin document carried a different name.</t>
          </li>
          <li>
            <t><strong>Runtime Contract Negotiation Substrate (RCNS) framing.</strong> A
new section (<xref target="rcns-section"/>) makes explicit a property that
earlier versions implied but did not name: AGTP fixes the
protocol surface at twelve methods and negotiates any additional
endpoint surface at runtime via PROPOSE governed by AGTP-API,
completing in a single round-trip. The RCNS framing is added to
the abstract and to Design Principles. The mechanism (PROPOSE
method, AGTP-API contract validation, dynamic endpoint
negotiation) was present in v06; v07 names the property and
exposes it as a defining characteristic of the protocol.</t>
          </li>
        </ol>
      </section>
      <section anchor="wire-format-compatibility">
        <name>Wire Format Compatibility</name>
        <t>The status code renumbering and the rename from "Agent Manifest
Document" to "Agent Identity Document" are wire-format-visible
changes from v06. Implementations of v06 will require updates to
emit and consume v07 codes and document type identifiers.
Implementations following v06 may continue to interoperate with v07
servers that operate in a backward-compatibility mode that recognizes
both old and new code numbers, but conformant v07 implementations
MUST emit only the v07 codes.</t>
      </section>
      <section anchor="rationale">
        <name>Rationale</name>
        <t>The v06 specification was prepared concurrently with IANA filings.
v07 closes the loop on those filings (URI scheme, port, media types
in evaluation) and propagates the architectural decisions that the
filings made permanent. The status code renumbering is conservative:
keeping 451 collided with RFC 7725 (Unavailable for Legal Reasons),
which is an HTTP code that may legitimately appear in payloads
carried over AGTP. The collision was harmless in v06 because no
production implementations existed; it would not remain harmless as
deployment grows.</t>
        <t>The twelve-method floor reflects roughly two years of accumulated
experience with the v00 through v06 method sets. The cognitive /
mechanics organization is informational rather than normative, but
provides a stable mental model that constrains future additions to
the floor and guides extended-method design. EXECUTE absorbing
INVOKE removes a naming ambiguity: EXECUTE is the clearer verb for
the operation, and avoiding two methods in the carrier role
simplifies composition with higher-level frameworks.</t>
      </section>
    </section>
    <section anchor="authority-scope">
      <name>Authority-Scope Format</name>
      <t>Authority-Scope values are expressed as a comma-separated list of
scope tokens, each following the pattern <tt>domain:action</tt> or
<tt>domain:*</tt> for full-domain access. Multi-segment scope tokens of
the form <tt>domain:subdomain:action</tt> are admissible for namespaced
operations (e.g., <tt>mcp:tools:execute</tt>). The encoding follows the
HTTP-standard list-valued header convention <xref target="RFC9110"/>: tokens
are separated by a comma, with optional surrounding whitespace
permitted for readability. Tokens <strong>MUST</strong> be lowercase ASCII
segments separated by colons, with no internal whitespace.</t>
      <t>The wire-level grammar in ABNF:</t>
      <artwork><![CDATA[
Authority-Scope = scope-token *( OWS "," OWS scope-token )
scope-token     = scope-segment 1*( ":" scope-segment )
scope-segment   = 1*( ALPHA / DIGIT / "-" / "_" ) / "*"
OWS             = *( SP / HTAB )   ; optional whitespace, per RFC 9110
]]></artwork>
      <t>A scope token <strong>MUST</strong> contain at least two segments separated by a
colon. The final segment is the action; preceding segments form the
namespace path. The two-segment form <tt>domain:action</tt> is the
canonical case; the three-or-more-segment form is reserved for
deployments that need namespaced authority hierarchies (e.g.,
external-protocol bridging, hierarchical resource grants).</t>
      <t>Parsers <strong>MUST</strong> accept any amount of optional whitespace adjacent
to the comma separator (including none) and <strong>MUST</strong> treat
<tt>"calendar:book,calendar:query"</tt> and
<tt>"calendar:book, calendar:query"</tt> as equivalent. Implementations
<strong>SHOULD</strong> emit a single space after the comma for human readability.</t>
      <t>Examples:</t>
      <artwork><![CDATA[
Authority-Scope: calendar:book, calendar:query
Authority-Scope: documents:summarize, documents:query, knowledge:learn
Authority-Scope: *:query
Authority-Scope: booking:*, payments:confirm
Authority-Scope: mcp:tools:execute, knowledge:query
]]></artwork>
      <t>In the Agent Identity Document, Authority-Scope is represented as a
JSON array of scope-token strings (one token per array element), not
as a single comma-separated string. The wire-header encoding and the
JSON-document encoding carry the same logical set of tokens.</t>
      <t>Reserved domains (initial set):</t>
      <table>
        <name>Reserved Authority-Scope Domains</name>
        <thead>
          <tr>
            <th align="left">Domain</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">calendar</td>
            <td align="left">Scheduling and time-based resource management</td>
          </tr>
          <tr>
            <td align="left">documents</td>
            <td align="left">Document access, summarization, and annotation</td>
          </tr>
          <tr>
            <td align="left">knowledge</td>
            <td align="left">Agent context and memory operations</td>
          </tr>
          <tr>
            <td align="left">booking</td>
            <td align="left">Reservation and resource allocation</td>
          </tr>
          <tr>
            <td align="left">payments</td>
            <td align="left">Financial transactions and confirmations</td>
          </tr>
          <tr>
            <td align="left">agents</td>
            <td align="left">Delegation and collaboration with other agents</td>
          </tr>
          <tr>
            <td align="left">escalation</td>
            <td align="left">Escalation routing and handler management</td>
          </tr>
          <tr>
            <td align="left">activation</td>
            <td align="left">Governed agent package activation (ACTIVATE method extension)</td>
          </tr>
          <tr>
            <td align="left">discovery</td>
            <td align="left">Agent discovery and capability query operations (DISCOVER, DESCRIBE)</td>
          </tr>
          <tr>
            <td align="left">budget</td>
            <td align="left">Resource budget declaration and QUOTE pre-flight operations</td>
          </tr>
          <tr>
            <td align="left">telemetry</td>
            <td align="left">Telemetry export and observability operations</td>
          </tr>
          <tr>
            <td align="left">zone</td>
            <td align="left">Network zone boundary declaration and enforcement</td>
          </tr>
          <tr>
            <td align="left">suspend</td>
            <td align="left">Session suspension and resumption operations</td>
          </tr>
          <tr>
            <td align="left">merchant</td>
            <td align="left">Merchant identity resolution and counterparty verification (see <xref target="AGTP-MERCHANT"/>)</td>
          </tr>
          <tr>
            <td align="left">intent</td>
            <td align="left">Intent Assertion issuance and validation (see <xref target="AGTP-MERCHANT"/>)</td>
          </tr>
          <tr>
            <td align="left">*</td>
            <td align="left">All domains require explicit grant; use with caution</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="wire-examples">
      <name>Example AGTP Wire Formats</name>
      <t>The following examples use a human-readable pseudo-wire format with
HTTP-style headers followed by a JSON body. The Content-Type for all AGTP
message bodies is application/vnd.agtp+json.</t>
      <section anchor="query-request-and-response">
        <name>QUERY Request and Response</name>
        <artwork><![CDATA[
AGTP/1.0 QUERY
Agent-ID: agt-7f3a9c2d
Authority-Scope: documents:query, knowledge:query
Session-ID: sess-a1b2c3d4
Task-ID: task-0042
Content-Type: application/vnd.agtp+json

{
  "task_id": "task-0042",
  "parameters": {
    "intent": "Key arguments against MCP re: HTTP overhead",
    "scope": ["documents:research", "knowledge:session"],
    "format": "structured",
    "confidence_threshold": 0.75
  }
}

AGTP/1.0 200 OK
Task-ID: task-0042
Server-ID: srv-knowledge-01
Attribution-Record: [signed attribution token]
Content-Type: application/vnd.agtp+json

{
  "status": 200,
  "task_id": "task-0042",
  "result": {
    "results": [{"content": "...", "source": "doc-agtp-research",
                 "confidence": 0.91}],
    "result_count": 1
  }
}
]]></artwork>
      </section>
      <section anchor="execute-request-and-response-carried-application-payload">
        <name>EXECUTE Request and Response (Carried Application Payload)</name>
        <t>The following example shows EXECUTE carrying an application-layer
booking action. The Authority-Scope on the request governs the
action; a scope mismatch would return 455.</t>
        <artwork><![CDATA[
AGTP/1.0 EXECUTE
Agent-ID: agt-travel-planner
Authority-Scope: booking:*, calendar:book
Session-ID: sess-trip-2026-04
Task-ID: task-0107
Content-Type: application/vnd.agtp+json

{
  "method": "EXECUTE",
  "task_id": "task-0107",
  "parameters": {
    "action": "reserve-flight",
    "parameters": {
      "resource_id": "flight-AA2847",
      "principal_id": "usr-chris-hood",
      "time_slot": "2026-04-15T08:00:00Z",
      "options": {"seat_preference": "aisle", "class": "economy"}
    },
    "idempotency_key": "trip-2026-04-15-AA2847"
  }
}

AGTP/1.0 200 OK
Task-ID: task-0107
Attribution-Record: [signed attribution token]
Content-Type: application/vnd.agtp+json

{
  "status": 200,
  "task_id": "task-0107",
  "result": {
    "booking_id": "BK-2026-0107",
    "status": "confirmed",
    "resource_id": "flight-AA2847",
    "confirmation_code": "XQRT7Y"
  }
}
]]></artwork>
      </section>
      <section anchor="execute-carrying-an-mcp-tool-invocation">
        <name>EXECUTE Carrying an MCP Tool Invocation</name>
        <t>The following example shows EXECUTE carrying an MCP tool invocation.
The carried payload's Content-Type identifies it as MCP; the AGTP
server dispatches to its MCP handler. AGTP supplies identity,
authority, and attribution at the wire level; MCP supplies tool
semantics in the payload.</t>
        <artwork><![CDATA[
AGTP/1.0 EXECUTE
Agent-ID: agt-7f3a9c2d
Authority-Scope: mcp:tools:execute, knowledge:query
Session-ID: sess-mcp-bridge-01
Task-ID: task-0210
Content-Type: application/vnd.mcp.tools+json

{
  "method": "EXECUTE",
  "task_id": "task-0210",
  "parameters": {
    "action": "mcp.tools.call",
    "payload_type": "application/vnd.mcp.tools+json",
    "payload": {
      "tool": "search_documents",
      "arguments": {
        "query": "AGTP composition with higher-level frameworks",
        "limit": 5
      }
    }
  }
}

AGTP/1.0 200 OK
Task-ID: task-0210
Server-ID: srv-mcp-bridge
Attribution-Record: [signed attribution token]
Content-Type: application/vnd.mcp.tools+json

{
  "status": 200,
  "task_id": "task-0210",
  "result": {
    "tool_response": {
      "matches": [
        {"doc_id": "doc-0042", "score": 0.91, "excerpt": "..."}
      ]
    }
  }
}
]]></artwork>
      </section>
      <section anchor="escalate-request-and-response">
        <name>ESCALATE Request and Response</name>
        <artwork><![CDATA[
AGTP/1.0 ESCALATE
Agent-ID: agt-procurement-03
Authority-Scope: booking:*, payments:confirm
Session-ID: sess-procurement-q2
Task-ID: task-0881
Content-Type: application/vnd.agtp+json

{
  "method": "ESCALATE",
  "task_id": "task-0881",
  "parameters": {
    "task_id": "task-0880",
    "reason": "scope_limit",
    "context": {
      "attempted_action": "EXECUTE",
      "resource": "vendor-contract-750k",
      "block_reason": "Exceeds agent authorization threshold"
    },
    "recipient": "usr-cfo",
    "deadline": "2026-03-19T09:00:00Z"
  }
}

AGTP/1.0 202 Accepted
Task-ID: task-0881
Server-ID: srv-escalation-handler
Content-Type: application/vnd.agtp+json

{
  "status": 202,
  "task_id": "task-0881",
  "result": {
    "escalation_id": "ESC-0881",
    "routed_to": "usr-cfo",
    "status": "pending_review",
    "task_paused": true,
    "estimated_review_by": "2026-03-19T09:00:00Z"
  }
}
]]></artwork>
      </section>
    </section>
    <section anchor="comparison-section">
      <name>Comparison Table</name>
      <table>
        <name>AGTP Compared to Existing Approaches</name>
        <thead>
          <tr>
            <th align="left">Criterion</th>
            <th align="left">AGTP</th>
            <th align="left">HTTP/REST</th>
            <th align="left">gRPC</th>
            <th align="left">AGMP (MCP, A2A, ...)</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Intent-native methods</td>
            <td align="left">Yes (12 Tier 1)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">Partial</td>
          </tr>
          <tr>
            <td align="left">Intent semantics at protocol level</td>
            <td align="left">Native</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">Messaging layer only</td>
          </tr>
          <tr>
            <td align="left">Built-in agent identity</td>
            <td align="left">Yes</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Authority scope enforcement</td>
            <td align="left">Protocol-level</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">Application-layer</td>
          </tr>
          <tr>
            <td align="left">Built-in attribution/audit</td>
            <td align="left">Yes</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">Varies by impl.</td>
          </tr>
          <tr>
            <td align="left">Transport flexibility</td>
            <td align="left">TCP/UDP/QUIC</td>
            <td align="left">TCP/TLS</td>
            <td align="left">HTTP/2</td>
            <td align="left">HTTP</td>
          </tr>
          <tr>
            <td align="left">Escalation as first-class primitive</td>
            <td align="left">Yes</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Ecosystem maturity</td>
            <td align="left">Proposed</td>
            <td align="left">Mature</td>
            <td align="left">Mature</td>
            <td align="left">Emerging</td>
          </tr>
          <tr>
            <td align="left">Governance/observability</td>
            <td align="left">Native</td>
            <td align="left">Manual/bolt-on</td>
            <td align="left">Manual</td>
            <td align="left">Limited</td>
          </tr>
          <tr>
            <td align="left">Method registry extensibility</td>
            <td align="left">Yes (Expert Review)</td>
            <td align="left">Frozen (IETF Review)</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
          <tr>
            <td align="left">Open core / royalty-free</td>
            <td align="left">Yes</td>
            <td align="left">Yes</td>
            <td align="left">Yes</td>
            <td align="left">Yes</td>
          </tr>
          <tr>
            <td align="left">Agent Identity Document</td>
            <td align="left">Native (.agtp format)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Tamper-proof identity surface</td>
            <td align="left">Yes (hash + signature)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Browser-accessible agent identity</td>
            <td align="left">Yes (read-only)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">URI collision prevention</td>
            <td align="left">Domain-anchored</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
          <tr>
            <td align="left">Agent Genesis</td>
            <td align="left">Yes (genesis record)</td>
            <td align="left">No</td>
            <td align="left">No</td>
            <td align="left">No</td>
          </tr>
          <tr>
            <td align="left">Domain-expiry lifecycle handling</td>
            <td align="left">Specified</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
          <tr>
            <td align="left">Capability discovery</td>
            <td align="left">Native (DESCRIBE)</td>
            <td align="left">None</td>
            <td align="left">Reflection (partial)</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Resource budget enforcement</td>
            <td align="left">Reserved for v01+ (Budget-Limit, 456)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Execution attestation (RATS)</td>
            <td align="left">Optional (RFC 9334)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Observability hooks</td>
            <td align="left">Reserved for v01+ (Telemetry-Export)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Network zone enforcement</td>
            <td align="left">Reserved for v01+ (AGTP-Zone-ID, 457)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Session suspension/recovery</td>
            <td align="left">Native (SUSPEND method)</td>
            <td align="left">None</td>
            <td align="left">None</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">AGMP composition profiles</td>
            <td align="left">Normative body section</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
            <td align="left">N/A</td>
          </tr>
        </tbody>
      </table>
      <t>HTTP's method registry (registered with IETF Review per <xref target="RFC9110"/>) is
effectively frozen for new semantic methods because any new HTTP method
must be backward-compatible with existing HTTP infrastructure globally.
AGTP's Expert Review + published spec procedure enables the protocol to
evolve its method vocabulary as the agent ecosystem develops, without
the backward-compatibility constraints of the HTTP method space.</t>
    </section>
    <section anchor="glossary">
      <name>Glossary</name>
      <dl>
        <dt>Agent:</dt>
        <dd>
          <t>A software system that executes tasks, makes decisions, and takes
actions without continuous human supervision per transaction.</t>
        </dd>
        <dt>AGMP (Agent Group Messaging Protocol):</dt>
        <dd>
          <t>The collective term for higher-layer AI agent messaging standards that
operate over AGTP as their transport substrate, including MCP, A2A, ACP,
and ANP. AGMPs define what agents say. AGTP defines how those messages
move. See Section 1.6.</t>
        </dd>
        <dt>Agent Genesis:</dt>
        <dd>
          <t>The permanent, cryptographically signed origin document issued to an
agent at registration time by a governance platform. The source from
which the canonical Agent-ID is derived (256-bit hash). Issued once,
permanently bound, never reissued. See Section 6.7.</t>
        </dd>
        <dt>Agent Transfer Protocol (AGTP):</dt>
        <dd>
          <t>The application-layer protocol defined in this document, providing a
dedicated transport environment for agent traffic.</t>
        </dd>
        <dt>Agent-ID:</dt>
        <dd>
          <t>A unique identifier for a specific agent instance. Carried in the
<tt>Agent-ID</tt> request header on non-anonymous AGTP requests, and in
the <tt>agent_id</tt> field of the Agent Identity Document. In the base
spec, derived from the Agent Genesis hash. With <xref target="AGTP-CERT"/>,
cryptographically bound to a verified identity.</t>
        </dd>
        <dt>Agent Identity Document:</dt>
        <dd>
          <t>A signed <tt>application/vnd.agtp.identity+json</tt> document returned when
an <tt>agtp://</tt> URI is resolved. Derived from the agent's <tt>.agent</tt> or
<tt>.nomo</tt> package. Contains identity, lifecycle state, trust tier,
trust score, behavioral scope, methods, capabilities, and verification
anchors. Never contains executable content. Schema enumerated in
Section 5.5.</t>
        </dd>
        <dt>AGTP-Zone-ID:</dt>
        <dd>
          <t>A network-zone boundary identifier declaring the scope within which
a request must be processed. Reserved for v01+: not normatively
specified as a request header in this revision. When the header is
promoted to normative status, SEPs <strong>MUST</strong> enforce zone boundaries
and return 457 Zone Violation if a DELEGATE request would route
outside the declared zone.</t>
        </dd>
        <dt>Attribution Record:</dt>
        <dd>
          <t>A signed, logged record of an agent action, sufficient for audit and
compliance purposes. <strong>MAY</strong> include RATS attestation evidence per
<xref target="RFC9334"/> for hardware-rooted execution proof in high-stakes domains.</t>
        </dd>
        <dt>Authority-Scope:</dt>
        <dd>
          <t>A declared set of permissions defining what actions an agent is
authorized to take, expressed as comma-separated <tt>domain:action</tt>
tokens per <xref target="RFC9110"/> list-valued header conventions. See
<xref target="authority-scope"/> for the normative ABNF.</t>
        </dd>
        <dt>Budget-Limit:</dt>
        <dd>
          <t>A request header declaring the maximum resource consumption the principal
authorizes for a method invocation, expressed as comma-separated
<tt>unit=value</tt> tokens from the IANA AGTP Budget Unit Registry. Exceeding
the declared limit causes 456 Budget Exceeded. Reserved for v01+ per
<xref target="header-format"/>.</t>
        </dd>
        <dt>Delegation Chain:</dt>
        <dd>
          <t>An ordered record of Agent-IDs representing the sequence of delegations
that led to the current request.</t>
        </dd>
        <dt>DESCRIBE:</dt>
        <dd>
          <t>An AGTP cognitive method returning the declared capabilities, supported
modalities, method vocabulary, and versioned feature set of a specific
agent endpoint. Used for pre-task negotiation.</t>
        </dd>
        <dt>DISCOVER:</dt>
        <dd>
          <t>An AGTP cognitive method returning a list of candidate Agent-IDs
matching specified criteria. Distinguished from QUERY: DISCOVER
returns endpoints to talk to; QUERY returns data to consume.</t>
        </dd>
        <dt>EXECUTE:</dt>
        <dd>
          <t>An AGTP mechanics method that invokes a specific action with
parameters or carries an application-layer payload from a
higher-level framework (MCP, A2A, ACP). The generic carrier method
for composition.</t>
        </dd>
        <dt>PLAN:</dt>
        <dd>
          <t>An AGTP cognitive method that produces an unexecuted sequence of
actions toward a stated goal. The result is a plan the requesting
agent or its principal reviews before committing to execution.</t>
        </dd>
        <dt>AGTP-API:</dt>
        <dd>
          <t>The IETF companion specification <xref target="AGTP-API"/> that defines the
contract layer for AGTP: the curated method catalog, path grammar,
endpoint primitive, semantic block, schema validation, server
manifest format, per-server method policy (the <tt>policies.methods</tt>
sub-block of the manifest), and PROPOSE and synthesis semantics.
AGTP-API is the authoritative source for what makes a valid
agent-server contract over AGTP. AGTP-API supersedes the earlier
AGIS draft and the proposed AGTP-Methods draft, consolidating
their concerns into a single specification.</t>
        </dd>
        <dt>Contract:</dt>
        <dd>
          <t>The protocol-level definition of what an AGTP interaction means:
the verb (drawn from the AGTP-API method catalog), the path
(conforming to AGTP-API path grammar), the semantic block, the
input and output schemas, the authority requirements, and the
composition rules that govern synthesis. Distinguished from
middleware concerns ("plumbing"): rate limiting, observability,
caching, custom authentication, and request transformation.
The protocol governs contracts; middleware governs operations.</t>
        </dd>
        <dt>Identity-first architecture:</dt>
        <dd>
          <t>The architectural commitment that the canonical Agent-ID
(256-bit content-addressed identifier) is the authoritative
identity primitive in AGTP. Hosting, DNS anchors, and other
resolution paths are aliases.</t>
        </dd>
        <dt>ESCALATE:</dt>
        <dd>
          <t>An AGTP method representing an agent's intentional deferral of a decision
or action to a human principal or higher-authority agent. A first-class
method, not a failure code.</t>
        </dd>
        <dt>Governance Token:</dt>
        <dd>
          <t>A signed, time-limited JWT artifact encoding a specific governance verdict
for a specific action. The runtime companion to the Agent Genesis.
Default TTL: 30 seconds. Must not be reused.</t>
        </dd>
        <dt>Intent Verb:</dt>
        <dd>
          <t>An AGTP method name expressing the agent's purpose, as distinguished from
HTTP resource-operation verbs (GET, POST, PUT, DELETE).</t>
        </dd>
        <dt>Method Registry:</dt>
        <dd>
          <t>The IANA-maintained registry of valid AGTP method names and their
specifications. Registration requires Expert Review and a published
specification.</t>
        </dd>
        <dt>Principal:</dt>
        <dd>
          <t>The human, organization, or system that authorized an agent to act and
is accountable for its actions.</t>
        </dd>
        <dt>Principal-ID:</dt>
        <dd>
          <t>The identifier of the principal on whose behalf an agent operates.
Carried in the agent identity document referenced by <tt>Agent-ID</tt>;
not transmitted as a separate request header.</t>
        </dd>
        <dt>Scope-Enforcement Point (SEP):</dt>
        <dd>
          <t>An AGTP-aware infrastructure component, load balancer, gateway, proxy,
that enforces Authority-Scope and AGTP-Zone-ID compliance on AGTP
requests without application-layer access. Requires <xref target="AGTP-CERT"/>.</t>
        </dd>
        <dt>Scope Violation (455):</dt>
        <dd>
          <t>An AGTP status code returned when an agent requests an action outside its
declared Authority-Scope. A governance signal, not a protocol error.
<strong>MUST</strong> be logged.</t>
        </dd>
        <dt>Session:</dt>
        <dd>
          <t>An AGTP persistent connection context shared across multiple method
invocations within a single agent workflow.</t>
        </dd>
        <dt>SUSPEND (method):</dt>
        <dd>
          <t>An AGTP Tier 1 core method that places a specific active session into a
recoverable paused state, issuing a single-use base64url-encoded 128-bit
resumption nonce. Session-scoped; does not affect registry lifecycle state.
Category: ORCHESTRATE.</t>
        </dd>
        <dt>Trust Tier:</dt>
        <dd>
          <t>A classification (1, 2, or 3) assigned to an agent at registration based
on the strength of identity verification. Tier 1 requires one of three
verification paths (DNS-anchored, log-anchored, or hybrid) and a <tt>.nomo</tt>
governed package. Tier 2 is org-asserted without cryptographic
verification. Tier 3 is experimental, not production-eligible.</t>
        </dd>
        <dt>551 Authority Chain Broken:</dt>
        <dd>
          <t>An AGTP status code returned when one or more entries in the
Delegation-Chain header cannot be verified as part of a valid and
continuous delegation sequence. <strong>MUST</strong> be logged.</t>
        </dd>
      </dl>
    </section>
    <section anchor="agmp-composition-appendix">
      <name>AGTP Composition with AGMPs</name>
      <t>This appendix supplements <xref target="composition-section"/> with worked wire
examples for AGMP messages (MCP, A2A, ACP) carried over AGTP. The
strategic positioning, substrate model, precedence rules, and
canonical mapping table are normative in <xref target="composition-section"/>.
Full composition specifications are provided in
<xref target="AGTP-COMPOSITION"/>.</t>
      <section anchor="wire-example-a2a-task-over-agtp">
        <name>Wire Example: A2A Task over AGTP</name>
        <t>The following example shows an A2A task carried over AGTP DELEGATE.
A2A task identity, message, and artifacts ride in the body; AGTP
identity, authority, delegation chain, and attribution ride at the
wire level.</t>
        <artwork><![CDATA[
AGTP/1.0 DELEGATE
Agent-ID: agtp://agtp.acme.tld/agents/orchestrator
Authority-Scope: agents:delegate, documents:query
Delegation-Chain: agtp://agtp.acme.tld/agents/orchestrator
Session-ID: sess-a1b2c3d4
Task-ID: task-0099
Content-Type: application/vnd.agtp+json

{
  "method": "DELEGATE",
  "task_id": "task-0099",
  "parameters": {
    "target_agent_id": "agtp://agtp.acme.tld/agents/analyst",
    "authority_scope": "documents:query",
    "delegation_token": "[signed token]",
    "task": {
      "a2a_task_id": "a2a-task-7f3a",
      "message": "Summarize Q1 financial reports",
      "artifacts": []
    }
  }
}
]]></artwork>
      </section>
      <section anchor="wire-example-mcp-resource-fetch-over-agtp">
        <name>Wire Example: MCP Resource Fetch over AGTP</name>
        <t>The following example shows an MCP resource fetch carried over AGTP
QUERY. The fetch is read-only and naturally maps onto QUERY (rather
than EXECUTE) because no application-side action is performed.</t>
        <artwork><![CDATA[
AGTP/1.0 QUERY
Agent-ID: agtp://agtp.acme.tld/agents/assistant
Authority-Scope: documents:query, knowledge:query
Session-ID: sess-mcp-b2c3d4
Task-ID: task-0100
Content-Type: application/vnd.agtp+json

{
  "method": "QUERY",
  "task_id": "task-0100",
  "parameters": {
    "intent": "fetch document corpus for Q1 financial analysis",
    "scope": ["documents:financial"],
    "modality": "mcp.resource",
    "mcp_resource_uri": "mcp://corpus/financial/q1-2026"
  }
}
]]></artwork>
        <t>For an MCP tool-call example using EXECUTE as the dispatch method,
see the wire-format examples in <xref target="wire-examples"/>.</t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
