<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.34 (Ruby 3.4.9) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc strict="yes"?>
<?rfc compact="yes"?>

<rfc ipr="trust200902" docName="draft-hood-independent-agtp-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="AGTP">Agent Transfer Protocol (AGTP)</title>

    <author fullname="Chris Hood">
      <organization>Nomotic, Inc.</organization>
      <address>
        <email>chris@nomotic.ai</email>
        <uri>https://nomotic.ai</uri>
      </address>
    </author>

    <date year="2026" month="March" day="19"/>

    <area>Applications and Real-Time</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>AI agents</keyword> <keyword>agentic systems</keyword> <keyword>protocol</keyword> <keyword>agent traffic</keyword> <keyword>agent transfer</keyword>

    <abstract>


<?line 81?>

<t>AI agents and agentic systems generate a growing volume of intent-driven,
unstructured, and undifferentiated traffic that flows through HTTP
indistinguishably from human-initiated requests. HTTP lacks the semantic
vocabulary, observability primitives, and identity mechanisms required by
agent systems operating at scale. Existing protocols described as "agent
protocols" including MCP, ACP, A2A, and ANP, are messaging-layer
constructs that presuppose HTTP as their transport. They do not address
the underlying transport problem.</t>

<t>This document defines the Agent Transfer Protocol (AGTP): a dedicated
application-layer protocol for AI agent traffic. AGTP provides agent-native
intent methods (QUERY, SUMMARIZE, BOOK, SCHEDULE, LEARN, DELEGATE,
COLLABORATE, CONFIRM, ESCALATE, NOTIFY), protocol-level agent identity
and authority headers, and a status code vocabulary designed for the
conditions AI agent systems encounter. AGTP SHOULD prefer QUIC for new
implementations and MUST support TCP/TLS for compatibility and fallback.
It is designed to be composable with existing agent frameworks, not to
replace them.</t>



    </abstract>



  </front>

  <middle>


<?line 102?>

<section anchor="introduction"><name>Introduction</name>

<t><strong>Note Regarding Intellectual Property:</strong>  Implementers should be
aware that certain extensions to this specification -- specifically the
Agent Certificate extension (Section 7.2) and the ACTIVATE method --
may be subject to pending patent applications by the author.  The core
AGTP specification is intended for open implementation without royalty
obligation.  The licensor is prepared to grant a royalty-free license
to implementers consistent with <xref target="RFC8179"/>.  IPR disclosures:
https://datatracker.ietf.org/ipr/ -- see also Section 7.7.</t>

<section anchor="background"><name>Background</name>

<t>The deployment of AI agents and multi-agent systems is accelerating
across enterprise, research, and consumer contexts. These systems execute
complex, multi-step workflows, querying data sources, booking resources,
delegating subtasks to peer agents, and escalating decisions to human
principals, with minimal or no human supervision per transaction.</t>

<t>Unlike human-initiated web traffic, agent-generated traffic is dynamic,
high-frequency, intent-driven, and often stateful across sequences of
related requests. The infrastructure carrying this traffic was not
designed with these properties in mind.</t>

</section>
<section anchor="limitations-of-http-for-agent-traffic"><name>Limitations of HTTP for Agent Traffic</name>

<t>HTTP has served as the internet's primary application-layer transport for
over three decades. Its evolution through HTTP/2 <xref target="RFC7540"/> and HTTP/3
<xref target="RFC9114"/> has improved performance, multiplexing, and latency. However,
the fundamental model of HTTP being stateless, resource-oriented,
human-initiated request/response, creates specific failures when applied
to agentic systems at scale:</t>

<t><list style="symbols">
  <t>Traffic indistinguishability: Agent-generated requests are structurally
identical to human-initiated requests at the transport layer. Operators
cannot identify, route, or govern agent traffic without application-layer
instrumentation.</t>
  <t>Method vocabulary mismatch: HTTP's method set (GET, POST, PUT, DELETE,
PATCH) describes resource operations. Agent traffic expresses purposeful
intent, summarize, book, delegate, escalate. The mismatch forces intent
into request bodies, invisible to protocol-level handlers.</t>
  <t>Identity and attribution absence: HTTP carries no native mechanism for
asserting agent identity, declared authority scope, or the principal
accountable for an agent's actions.</t>
  <t>Session semantics mismatch: HTTP's stateless model is optimized for
isolated request/response cycles. Agent workflows are inherently stateful
sequences.</t>
</list></t>

</section>
<section anchor="why-not-evolve-http"><name>Why Not Evolve HTTP?</name>

<t>A natural question is whether these limitations could be addressed by
extending HTTP rather than defining a new protocol. There are three
specific reasons why HTTP extension is not the preferred path.</t>

<t>First, the HTTP method registry is effectively frozen for new semantics.
<xref target="RFC9110"/> defines the HTTP method registry with IETF Review as the
registration procedure, meaning new methods require a full IETF consensus
process and must be backward-compatible with existing HTTP implementations.
Adding intent-based verbs (SUMMARIZE, DELEGATE, ESCALATE) to HTTP would
require every HTTP client, server, proxy, and middleware component to ignore
or handle unknown methods gracefully, a compatibility constraint that limits
how agent-specific semantics can be expressed at the protocol level.</t>

<t>Second, HTTP carries decades of backward-compatibility constraints. Features
such as persistent agent identity headers, authority scope declarations, and
session-level governance semantics would require HTTP extensions that interact
unpredictably with existing caching, proxy, and CDN behavior designed for
human-generated traffic patterns.</t>

<t>Third, the observability goal making agent traffic distinguishable from
human traffic at the infrastructure layer cannot be achieved by adding
fields to HTTP. Infrastructure components route and filter HTTP traffic
based on methods and headers that are identical across agent and human
requests. A protocol-level separation is necessary to give infrastructure
the signal it needs.</t>

<t>AGTP is therefore designed as a dedicated protocol rather than an HTTP
extension. HTTP and AGTP coexist: human traffic continues to flow over
HTTP; agent traffic flows over AGTP. The two protocols serve different
classes of network participant.</t>

<t>Note: The abbreviation AGTP is used in this document to distinguish 
the Agent Transfer Protocol from the Authenticated Transfer Protocol 
(ATP) working group currently proposed within the IETF. The URI 
scheme agtp:// is proposed for IANA registration as a distinct and 
unregistered scheme.</t>

</section>
<section anchor="motivation-for-a-dedicated-protocol"><name>Motivation for a Dedicated Protocol</name>

<t>These limitations are architectural, not implementational. They cannot be
resolved by better middleware or application code layered on HTTP. They
require a protocol designed from first principles for AI agent systems.</t>

<t>AGTP is that protocol. It provides a dedicated transport environment for
agent traffic with: native intent-based methods, mandatory agent identity
headers, protocol-level authority scope declaration, and a status code
vocabulary for the conditions autonomous systems encounter.</t>

</section>
<section anchor="scope-and-target-audience"><name>Scope and Target Audience</name>

<t>This document covers AGTP architecture, design principles, stack position,
request and response header format, agent-native method definitions and
semantics, status code vocabulary, security considerations, and IANA
considerations.</t>

<t>The Agent Certificate extension for cryptographic binding of agent
identity to AGTP header fields is described at a high level in Section 7.2.
Full specification is provided in a separate companion document:
<xref target="AGTP-CERT"/>. That extension may be subject to pending intellectual
property claims; see Section 7.7 and the IPR Notice preceding the Abstract.</t>

<t>Target audience: AI agent developers, protocol designers, cloud and network
infrastructure providers, enterprise security and compliance architects, and
standards community participants.</t>

</section>
</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "<strong>MUST</strong>", "<strong>MUST NOT</strong>", "<strong>REQUIRED</strong>", "<strong>SHALL</strong>",
"<strong>SHALL NOT</strong>", "<strong>SHOULD</strong>", "<strong>SHOULD NOT</strong>", "<strong>RECOMMENDED</strong>",
"<strong>NOT RECOMMENDED</strong>", "<strong>MAY</strong>", and "<strong>OPTIONAL</strong>" in this document
are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when,
and only when, they appear in all capitals.</t>

<dl>
  <dt>Agent:</dt>
  <dd>
    <t>An AI software system that executes tasks, makes decisions, and takes
actions without continuous human supervision per transaction.</t>
  </dd>
  <dt>Principal:</dt>
  <dd>
    <t>The human, organization, or system that authorized an agent to act and
is accountable for its actions.</t>
  </dd>
  <dt>Agent-ID:</dt>
  <dd>
    <t>A unique identifier for a specific agent instance, present in all AGTP
request headers.</t>
  </dd>
  <dt>Principal-ID:</dt>
  <dd>
    <t>The identifier of the principal on whose behalf an agent operates.</t>
  </dd>
  <dt>Authority-Scope:</dt>
  <dd>
    <t>A declared set of permissions defining what actions an agent is
authorized to take, in the format domain:action or domain:*.</t>
  </dd>
  <dt>Intent Method:</dt>
  <dd>
    <t>An AGTP method name expressing the agent's purpose, as distinguished from
HTTP resource-operation verbs.</t>
  </dd>
  <dt>Delegation Chain:</dt>
  <dd>
    <t>An ordered record of Agent-IDs representing the sequence of delegations
that produced the current request.</t>
  </dd>
  <dt>Escalation:</dt>
  <dd>
    <t>An agent's intentional deferral of a decision or action to a human
principal or higher-authority agent.</t>
  </dd>
  <dt>Attribution Record:</dt>
  <dd>
    <t>A logged record of an agent action sufficient for audit and compliance
purposes.</t>
  </dd>
  <dt>Session:</dt>
  <dd>
    <t>An AGTP persistent connection context shared across multiple method
invocations within a single agent workflow.</t>
  </dd>
  <dt>SEP (Scope-Enforcement Point):</dt>
  <dd>
    <t>An AGTP-aware infrastructure component, load balancer, gateway, and proxy,
that enforces Authority-Scope compliance without application-layer access.
Requires the Agent Certificate extension (<xref target="AGTP-CERT"/>).</t>
  </dd>
</dl>

</section>
<section anchor="problem-statement"><name>Problem Statement</name>

<t>AGTP is motivated by three distinct, compounding failures in how current
internet infrastructure handles AI agent traffic.</t>

<section anchor="problem-1-undifferentiated-agent-traffic-on-http"><name>Problem 1: Undifferentiated Agent Traffic on HTTP</name>

<t>AI agents generate intent-driven, structured traffic that is functionally
invisible to the infrastructure it traverses. This traffic flows through
HTTP alongside human traffic with no protocol-level differentiation.
Observability failure, routing inefficiency, and security blindness result, 
operators cannot determine what fraction of traffic is agent-generated
without application-layer instrumentation that is expensive, inconsistent,
and easy to circumvent.</t>

<t>AGTP response: a dedicated protocol environment for agent traffic.
Infrastructure can distinguish, route, monitor, and govern agent traffic
natively.</t>

</section>
<section anchor="problem-2-semantic-mismatch-between-agent-intent-and-available-methods"><name>Problem 2: Semantic Mismatch Between Agent Intent and Available Methods</name>

<t>AI agents operate on intent. HTTP's method vocabulary was designed to
describe operations on resources, not purposeful action. When an agent
intends to SUMMARIZE a document, BOOK a resource, and SCHEDULE a sequence, 
all three arrive as POST requests. The server receives identical verbs
with meaningfully different intent buried in request bodies, invisible to
any protocol-level handler.</t>

<t>AGTP response: a vocabulary of agent-native methods that express intent at
the protocol level.</t>

</section>
<section anchor="problem-3-no-protocol-level-identity-authority-or-attribution-for-agents"><name>Problem 3: No Protocol-Level Identity, Authority, or Attribution for Agents</name>

<t>When an AI agent takes an action, there is currently no protocol-level
mechanism to verify who authorized this agent, what scope of authority it
holds, which principal is accountable for its actions, or whether it is
the agent it claims to be. Accountability gaps, authority laundering,
auditability failure, and multi-agent trust collapse result.</t>

<t>AGTP response: agent identity and authority scope embedded in protocol
headers on every request, with an optional Agent Certificate extension for
cryptographic verification.</t>

</section>
<section anchor="problem-summary"><name>Problem Summary</name>

<texttable title="Summary of Problems Addressed by AGTP">
      <ttcol align='left'>#</ttcol>
      <ttcol align='left'>Problem</ttcol>
      <ttcol align='left'>Current Failure</ttcol>
      <ttcol align='left'>AGTP Response</ttcol>
      <c>1</c>
      <c>Undifferentiated traffic</c>
      <c>HTTP cannot separate agent traffic</c>
      <c>Dedicated protocol environment</c>
      <c>2</c>
      <c>Semantic mismatch</c>
      <c>HTTP verbs obscure agent intent</c>
      <c>Native intent-based method vocabulary</c>
      <c>3</c>
      <c>No protocol-level identity</c>
      <c>Attribution is untraceable</c>
      <c>Agent identity and scope in headers</c>
</texttable>

</section>
</section>
<section anchor="related-work-and-existing-approaches"><name>Related Work and Existing Approaches</name>

<section anchor="httprest-as-the-de-facto-standard"><name>HTTP/REST as the De Facto Standard</name>

<t>HTTP remains the universal transport for all agent traffic currently
deployed. REST conventions layered on HTTP provide a degree of semantic
structure, but REST remains a resource-manipulation paradigm. As described
in Section 1.3, evolving HTTP to address agent-specific needs is
constrained by the frozen method registry, backward-compatibility
requirements, and the impossibility of achieving infrastructure-level
traffic differentiation through HTTP extensions alone.</t>

</section>
<section anchor="existing-agent-protocols"><name>Existing Agent Protocols</name>

<dl>
  <dt>MCP <xref target="MCP"/> (Model Context Protocol, Anthropic):</dt>
  <dd>
    <t>Defines structured communication between AI models and tools/resources.
Runs over HTTP. Addresses tool-calling semantics, not agent traffic
transport.</t>
  </dd>
  <dt>ACP <xref target="ACP"/> (Agent Communication Protocol, IBM):</dt>
  <dd>
    <t>Defines messaging semantics for agent-to-agent communication. Runs over
HTTP.</t>
  </dd>
  <dt>A2A <xref target="A2A"/> (Agent-to-Agent Protocol, Linux Foundation):</dt>
  <dd>
    <t>Defines inter-agent communication and task delegation semantics. Runs
over HTTP.</t>
  </dd>
  <dt>ANP <xref target="ANP"/> (Agent Network Protocol):</dt>
  <dd>
    <t>Defines discovery and communication for networked agents. Runs over HTTP.</t>
  </dd>
</dl>

<t>All of these are messaging protocols. They define what agents say to each
other. They do not define how agent traffic moves across a network. Each
presupposes HTTP as its transport and inherits all of HTTP's limitations
for agentic systems.</t>

</section>
<section anchor="transport-layer-alternatives"><name>Transport-Layer Alternatives</name>

<dl>
  <dt>gRPC:</dt>
  <dd>
    <t>High-performance RPC over HTTP/2. Strong typing and efficient
serialization. Does not address agent-specific semantics, identity, or
authority.</t>
  </dd>
  <dt>WebSockets:</dt>
  <dd>
    <t>Persistent bidirectional connections over HTTP. Useful for real-time
communication but does not address method semantics or identity.</t>
  </dd>
  <dt>QUIC <xref target="RFC9000"/>:</dt>
  <dd>
    <t>Modern multiplexed transport with reduced connection overhead. AGTP
<strong>SHOULD</strong> prefer QUIC for new implementations. QUIC is a transport
primitive; AGTP is the application-layer protocol above it.</t>
  </dd>
</dl>

</section>
<section anchor="the-critical-distinction-messaging-vs-transport"><name>The Critical Distinction: Messaging vs. Transport</name>

<t>The most important positioning principle for AGTP is the distinction between
messaging protocols and transport protocols. MCP, ACP, A2A, and ANP are
messaging protocols, they define what agents say. AGTP defines how agent
traffic moves.</t>

<t>An analogy: SMTP is a messaging protocol that runs over TCP. SMTP does not
replace TCP. Saying "TCP is unnecessary because SMTP exists" is a category
error. The same logic applies here. MCP and its peers define agent messaging
semantics. AGTP defines the transport environment those messages move through.</t>

</section>
<section anchor="agtp-positioning-the-proposed-stack"><name>AGTP Positioning: The Proposed Stack</name>

<figure title="AGTP in the Protocol Stack" anchor="protocol-stack"><artwork><![CDATA[
+-----------------------------------------------------+
|            Agent Application Logic                  |
+-----------------------------------------------------+
|  Messaging Layer  (MCP / ACP / A2A)  [optional]     |
+-----------------------------------------------------+
|   AGTP - Agent Transfer Protocol      [this spec]    |
+-----------------------------------------------------+
|            TLS 1.3+                  [mandatory]    |
+-----------------------------------------------------+
|         TCP / QUIC / UDP                            |
+-----------------------------------------------------+
]]></artwork></figure>

<t>AGTP is not a replacement for messaging protocols. Agents using MCP or A2A
route those messages over AGTP and gain transport-level observability and
identity without modifying the messaging layer. AGTP-native agents that do
not use a separate messaging protocol interact with AGTP methods directly.</t>

</section>
</section>
<section anchor="protocol-overview"><name>Protocol Overview</name>

<section anchor="stack-position"><name>Stack Position</name>

<t>AGTP is an application-layer protocol. It operates above the transport
layer (TCP, UDP, or QUIC) and is wrapped by TLS. It sits below any agent
messaging protocol in deployments that use one.</t>

<t><list style="symbols">
  <t><strong>SHOULD</strong> prefer QUIC <xref target="RFC9000"/> <xref target="RFC9001"/> for new deployments (lower latency,
multiplexing without head-of-line blocking, 0-RTT connection
establishment).</t>
  <t><strong>MUST</strong> support TCP/TLS as a fallback for compatibility with existing
infrastructure.</t>
  <t><strong>MAY</strong> run over UDP where QUIC is not available, subject to
implementor-defined reliability guarantees.</t>
</list></t>

<t>Suggested port assignment (subject to IANA assignment. See Section 8):</t>

<t><list style="symbols">
  <t>AGTP/QUIC: port 8443 (proposed)</t>
  <t>AGTP/TCP+TLS: port 8080 (proposed)</t>
</list></t>

</section>
<section anchor="design-principles"><name>Design Principles</name>

<dl>
  <dt>Minimalist core:</dt>
  <dd>
    <t>The base spec defines only what is necessary for agent traffic
differentiation, method semantics, and identity headers. Extensions
belong in companion specifications.</t>
  </dd>
  <dt>Extensible by design:</dt>
  <dd>
    <t>New methods are registered through an IANA-managed Method Registry.
New header fields follow a defined extension convention. Additive
changes do not require a version increment.</t>
  </dd>
  <dt>Agent-native:</dt>
  <dd>
    <t>Every design decision assumes the initiating party is an AI system,
not a human.</t>
  </dd>
  <dt>Secure by default:</dt>
  <dd>
    <t>TLS 1.3 or higher is mandatory. Unencrypted AGTP connections <strong>MUST</strong>
be rejected. Agent identity headers are present on every request.</t>
  </dd>
  <dt>Observable by design:</dt>
  <dd>
    <t>Native metadata in every AGTP header provides the minimum information
needed for routing, monitoring, and audit without application-layer
instrumentation.</t>
  </dd>
  <dt>Composable:</dt>
  <dd>
    <t>AGTP works alongside existing agent messaging protocols without requiring
modification to those protocols.</t>
  </dd>
</dl>

</section>
<section anchor="connection-model"><name>Connection Model</name>

<t>AGTP uses a persistent session model by default, reflecting the reality that
agents typically execute multi-step workflows rather than isolated single
requests. An AGTP session is established with a single TLS handshake
including agent identity assertion, persists across multiple method
exchanges, carries a Session-ID header identifying the agent's task
context, and terminates on explicit session close or inactivity timeout
(RECOMMENDED minimum: 60 seconds).</t>

<t>Per-request (stateless) mode is supported for constrained environments.
In stateless mode, agent identity headers <strong>MUST</strong> be present on every
individual request.</t>

</section>
<section anchor="header-format"><name>Header Format</name>

<section anchor="request-headers"><name>Request Headers</name>

<texttable title="AGTP Request Header Fields">
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>AGTP-Version</c>
      <c><strong>MUST</strong></c>
      <c>Protocol version. Current: AGTP/1.0</c>
      <c>AGTP-Method</c>
      <c><strong>MUST</strong></c>
      <c>The agent intent method (see Section 6)</c>
      <c>Agent-ID</c>
      <c><strong>MUST</strong></c>
      <c>Opaque identifier for the requesting agent instance</c>
      <c>Principal-ID</c>
      <c><strong>MUST</strong></c>
      <c>Identifier of the human or system that authorized this agent</c>
      <c>Authority-Scope</c>
      <c><strong>MUST</strong></c>
      <c>Declared scope of actions this agent is authorized to take</c>
      <c>Session-ID</c>
      <c><strong>SHOULD</strong></c>
      <c>Identifies the current task/workflow context</c>
      <c>Task-ID</c>
      <c><strong>SHOULD</strong></c>
      <c>Unique identifier for this specific method invocation</c>
      <c>Delegation-Chain</c>
      <c><strong>MAY</strong></c>
      <c>Ordered list of Agent-IDs if this request was delegated</c>
      <c>Priority</c>
      <c><strong>MAY</strong></c>
      <c>Request priority hint: critical, normal, background</c>
      <c>TTL</c>
      <c><strong>MAY</strong></c>
      <c>Maximum acceptable response latency in milliseconds</c>
</texttable>

</section>
<section anchor="response-headers"><name>Response Headers</name>

<texttable title="AGTP Response Header Fields">
      <ttcol align='left'>Field</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>AGTP-Version</c>
      <c><strong>MUST</strong></c>
      <c>Protocol version</c>
      <c>AGTP-Status</c>
      <c><strong>MUST</strong></c>
      <c>Numeric status code (see Section 5.5)</c>
      <c>Task-ID</c>
      <c><strong>MUST</strong></c>
      <c>Echo of request Task-ID for correlation</c>
      <c>Server-Agent-ID</c>
      <c><strong>SHOULD</strong></c>
      <c>Identity of the responding server or agent</c>
      <c>Attribution-Record</c>
      <c><strong>SHOULD</strong></c>
      <c>Signed record of the action taken, for audit</c>
      <c>Continuation-Token</c>
      <c><strong>MAY</strong></c>
      <c>Token for retrieving additional results in streaming contexts</c>
      <c>Supported-Methods</c>
      <c><strong>SHOULD</strong> (on session open)</c>
      <c>List of AGTP methods supported by this server</c>
</texttable>

</section>
</section>
<section anchor="status-codes"><name>Status Codes</name>

<t>AGTP defines its own status code space. Codes 451, 550, and 551 are
AGTP-specific with no HTTP equivalent and are registered in the IANA AGTP
Status Code Registry (see Section 8.3).</t>

<texttable title="AGTP Status Codes">
      <ttcol align='left'>Code</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Meaning</ttcol>
      <c>200</c>
      <c>OK</c>
      <c>Method executed successfully</c>
      <c>202</c>
      <c>Accepted</c>
      <c>Method accepted; execution is asynchronous</c>
      <c>204</c>
      <c>No Content</c>
      <c>Method executed; no response body</c>
      <c>400</c>
      <c>Bad Request</c>
      <c>Malformed AGTP request</c>
      <c>401</c>
      <c>Unauthorized</c>
      <c>Agent-ID not recognized or not authenticated</c>
      <c>403</c>
      <c>Forbidden</c>
      <c>Agent lacks authority for requested action per Authority-Scope</c>
      <c>404</c>
      <c>Not Found</c>
      <c>Target resource or agent not found</c>
      <c>408</c>
      <c>Timeout</c>
      <c>TTL exceeded before method could execute</c>
      <c>409</c>
      <c>Conflict</c>
      <c>Method conflicts with current state (e.g., BOOK on unavailable resource)</c>
      <c>422</c>
      <c>Unprocessable</c>
      <c>Request well-formed but semantically invalid</c>
      <c>429</c>
      <c>Rate Limited</c>
      <c>Agent is exceeding permitted request frequency</c>
      <c>451</c>
      <c>Scope Violation</c>
      <c>Requested action is outside declared Authority-Scope. AGTP-specific</c>
      <c>500</c>
      <c>Server Error</c>
      <c>Internal failure in the responding system</c>
      <c>503</c>
      <c>Unavailable</c>
      <c>Responding agent or system temporarily unavailable</c>
      <c>550</c>
      <c>Delegation Failure</c>
      <c>A delegated sub-agent failed to complete the requested action. AGTP-specific</c>
      <c>551</c>
      <c>Authority Chain Broken</c>
      <c>Delegation chain contains an unverifiable or broken identity link. AGTP-specific</c>
</texttable>

<t>Status code 451 (Scope Violation) is a governance signal: the agent
attempted an action outside its declared Authority-Scope, caught at the
protocol level. Status code 551 (Authority Chain Broken) indicates that
one or more Agent-ID entries in the Delegation-Chain header cannot be
verified as part of a valid delegation sequence. Both are operational
signals, not protocol errors, and <strong>MUST</strong> be logged for audit purposes.</t>

</section>
<section anchor="wire-format-and-content-type"><name>Wire Format and Content-Type</name>

<t>AGTP request and response bodies are encoded as JSON. The registered
Content-Type for AGTP message bodies is:</t>

<figure><artwork><![CDATA[
Content-Type: application/agtp+json
]]></artwork></figure>

<t>Implementations <strong>MUST</strong> include this Content-Type on all AGTP requests and
responses that carry a message body. Responses with no body (e.g., 204 No
Content) <strong>MUST NOT</strong> include a Content-Type header. Binary or streaming
extensions <strong>MAY</strong> define additional Content-Type values as part of their
companion specifications.</t>

<t>The common structure for all AGTP request bodies:</t>

<figure><sourcecode type="json"><![CDATA[
{
  "method": "QUERY",
  "task_id": "task-0042",
  "session_id": "sess-a1b2c3d4",
  "parameters": { },
  "context": { }
}
]]></sourcecode></figure>

<t>And for all AGTP response bodies:</t>

<figure><sourcecode type="json"><![CDATA[
{
  "status": 200,
  "task_id": "task-0042",
  "result": { },
  "attribution": { }
}
]]></sourcecode></figure>

</section>
<section anchor="early-implementations"><name>Early Implementations</name>

<t>AGTP is a proposed specification. No production implementations exist at
the time of this writing. The author encourages early prototype
implementations to validate the protocol design, identify gaps, and
generate feedback prior to IETF working group submission.</t>

<ul empty="true"><li>
  <t>If you are building an AGTP prototype or reference implementation,
please share your findings via the feedback channel listed on the cover
of this document. A reference implementation in Python and/or Go is
planned as open-source software concurrent with or shortly after IETF
I-D submission. Implementation reports are welcome and will be
incorporated into subsequent draft revisions.</t>
</li></ul>

<t>Implementers wishing to experiment before the formal IANA port assignment
may use port 8443 (AGTP/QUIC) and port 8080 (AGTP/TCP+TLS) as working
values. These values are subject to change upon final IANA assignment.</t>

<t>The ACTIVATE method extension, which binds .nomo governed agent packages
to AGTP as a first-class activation operation, is described in a companion
document and is implemented as an optional extension. Core AGTP
implementations need not support ACTIVATE to be compliant with this
specification.</t>

</section>
<section anchor="agent-identification-and-naming"><name>Agent Identification and Naming</name>

<section anchor="the-canonical-agent-identifier"><name>The Canonical Agent Identifier</name>

<t>Every AGTP agent is identified by a canonical Agent-ID: a 256-bit
cryptographic identifier derived from the agent's governance-layer Birth
Certificate at activation time. This identifier is globally unique,
fixed-length, and, when the Agent Certificate extension is deployed,
cryptographically verifiable at the transport layer.</t>

<t>The URI form of a canonical Agent-ID uses the agtp:// scheme:</t>

<figure><artwork><![CDATA[
agtp://3a9f2c1d8b7e4a6f0c2d5e9b1a3f7c0d4e8b2a5f9c3d7e1b0a4f8c2d6e0b
]]></artwork></figure>

<t>URI length is not a practical constraint for agtp:// identifiers.
256-character URIs are handled without issue by all modern protocol stacks
and do not require abbreviation or truncation.</t>

<t>The agtp:// URI scheme is proposed for IANA registration per <xref target="RFC7595"/>
as an open, unencumbered scheme. This registration is distinct from and
independent of any intellectual property claims on AGTP extensions.</t>

<t>The canonical Agent-ID is the authoritative identifier in all AGTP protocol
operations: it appears in the Agent-ID header of every request, is the key
in the certificate registry, and is the cross-layer reference linking the
AGTP Agent Certificate to the governance-layer Birth Certificate. All other
identification forms described in this section are aliases that resolve to
a canonical Agent-ID.</t>

</section>
<section anchor="human-friendly-agent-names-optional-layer"><name>Human-Friendly Agent Names (Optional Layer)</name>

<t>For deployments with large numbers of agents, particularly enterprise
environments with hundreds or thousands of agents per organization, the
canonical Agent-ID alone is insufficient for human-readable observability,
audit navigation, and operational management. AGTP supports an optional
hierarchical naming layer as a convenience alias system on top of canonical
identifiers.</t>

<t>Human-friendly names follow a structured DNS-style format using the
.agent or .nomo top-level labels:</t>

<figure><artwork><![CDATA[
agtp://marketing-01.acme.agent
agtp://sales-bot-v2.engineering.acme.agent
agtp://customer-experience.acme.nomo
]]></artwork></figure>

<t>The structure is: [agent-label].[department].[organization].[tld]</t>

<t>where tld is .agent for general-purpose agents or .nomo for agents
activated under the governed .nomo package format. Organization-level
namespaces (e.g., acme.agent) are scoped per governance zone and enforced
at registration time (see Section 5.8.3).</t>

<t>Attribute-based pattern matching is supported for multi-agent operations.
The wildcard form acme.agent:sales-* matches all agents whose friendly
name begins with sales- within the acme.agent namespace.</t>

<t>Human-friendly names <strong>MUST NOT</strong> be used as Agent-ID header values in
AGTP protocol messages. The Agent-ID header always carries the canonical
256-bit identifier. Friendly names are a resolution and management layer;
they are not transport-layer identifiers.</t>

</section>
<section anchor="governed-name-registration"><name>Governed Name Registration</name>

<t>Human-friendly name registration is tied to the governed activation flow
and AGTP Agent Certificate issuance process. An agent may only claim a
friendly name after successfully completing the atomic activation protocol
and receiving an Active lifecycle state in the certificate registry.</t>

<t>The registration process:</t>

<t><list style="numbers" type="1">
  <t>The activating operator submits a proposed friendly name alongside the
.nomo package during the ACTIVATE transaction.</t>
  <t>The activation endpoint verifies uniqueness within the organization's
governance zone namespace.</t>
  <t>On successful activation, the friendly name is recorded in the
governance platform's name registry, mapped to the activated agent's
canonical certificate_id.</t>
  <t>The name binding is included in the genesis audit record as the
friendly_name field.</t>
  <t>Revocation of the agent's certificate automatically releases the
friendly name, making it available for re-registration.</t>
</list></t>

<t>Uniqueness is enforced at the governance-zone level. Different organizations
operating separate governance zones may register the same friendly name
label without conflict.</t>

</section>
<section anchor="name-resolution"><name>Name Resolution</name>

<t>Two resolution mechanisms are supported:</t>

<dl>
  <dt>DNS-based resolution:</dt>
  <dd>
    <t>The organization publishes DNS TXT records under the _agent subdomain of
its governance zone domain:</t>
  </dd>
</dl>

<figure><artwork><![CDATA[
_agent.acme.agent. IN TXT "agtp-id=3a9f2c1d8b7e4a6f..."
]]></artwork></figure>

<dl>
  <dt>AGTP-native resolution:</dt>
  <dd>
    <t>An AGTP QUERY request to the governance platform's resolution endpoint
resolves a friendly name to a canonical Agent-ID along with the agent's
current lifecycle state, governance zone, trust tier, and AGTP Agent
Certificate status. Resolution responses carry Content-Type:
application/agtp+json:</t>
  </dd>
</dl>

<figure><sourcecode type="json"><![CDATA[
{
  "friendly_name": "sales-bot-v2.engineering.acme.agent",
  "canonical_id":  "3a9f2c1d8b7e4a6f...",
  "lifecycle_state": "Active",
  "governance_zone": "zone:internal",
  "trust_tier": 2,
  "cert_status": "Active",
  "inclusion_proof_hash": "b2c4d6e8..."
}
]]></sourcecode></figure>

<t>Implementations <strong>MUST</strong> treat the canonical Agent-ID as authoritative
in the event of a conflict between DNS-based and AGTP-native resolution
results.</t>

</section>
<section anchor="scaling-considerations"><name>Scaling Considerations</name>

<t>The hierarchical naming scheme scales to organizations with millions of
agents without structural modification. Unlike sequential numeric suffixes,
hierarchical sub-labels enable departmental grouping, role-based cohorts,
version tracking, and delegation visibility. The governance platform's
name registry is a lightweight key-value store indexed on
(governance_zone, friendly_name) with a pointer to certificate_id,
adding O(1) per-resolution overhead.</t>

</section>
<section anchor="iana-considerations-for-the-agtp-uri-scheme"><name>IANA Considerations for the agtp:// URI Scheme</name>

<t>This document proposes registration of the agtp:// URI scheme with IANA
per <xref target="RFC7595"/>. Registration template:</t>

<dl>
  <dt>URI scheme name:</dt>
  <dd>
    <t>agtp</t>
  </dd>
  <dt>Status:</dt>
  <dd>
    <t>Permanent</t>
  </dd>
  <dt>URI scheme syntax:</dt>
  <dd>
    <t>agtp://[canonical-agent-id] or agtp://[friendly-name]</t>
  </dd>
  <dt>URI scheme semantics:</dt>
  <dd>
    <t>Identifies an AI agent operating over the Agent Transfer Protocol.
The canonical form uses a 256-bit hex-encoded cryptographic identifier.
The friendly-name form uses a hierarchical DNS-style label resolvable
to a canonical identifier via DNS TXT records or AGTP-native lookup.</t>
  </dd>
  <dt>Applications/protocols that use this URI scheme:</dt>
  <dd>
    <t>Agent Transfer Protocol (this document)</t>
  </dd>
  <dt>Interoperability considerations:</dt>
  <dd>
    <t>Friendly names are optional aliases; implementations <strong>MUST</strong> accept
canonical identifiers and <strong>SHOULD</strong> support friendly-name resolution.</t>
  </dd>
  <dt>Contact:</dt>
  <dd>
    <t>Chris Hood, chris@nomotic.ai</t>
  </dd>
  <dt>References:</dt>
  <dd>
    <t>This document</t>
  </dd>
</dl>

<t>The agtp:// URI scheme registration is open and unencumbered. No
intellectual property claims apply to the URI scheme itself.</t>

</section>
</section>
</section>
<section anchor="method-definitions"><name>Method Definitions</name>

<section anchor="design-philosophy"><name>Design Philosophy</name>

<t>AGTP methods are intent verbs, not resource operations. Each method
expresses what an agent is trying to accomplish. Method names are
uppercase ASCII strings. Methods that modify state are NOT idempotent
by default unless explicitly marked. All methods accept a context
parameter carrying agent session state. Requirement language follows
<xref target="RFC2119"/>.</t>

</section>
<section anchor="core-methods"><name>Core Methods</name>

<section anchor="query"><name>QUERY</name>

<t>Purpose: Semantic data retrieval. The agent specifies what it needs to
know, not where to find it. Distinguished from HTTP GET by expressing an
information need rather than retrieving a known resource at a known
location.</t>

<texttable title="QUERY Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>intent</c>
      <c><strong>MUST</strong></c>
      <c>Natural language or structured expression of the information need</c>
      <c>scope</c>
      <c><strong>SHOULD</strong></c>
      <c>Data domains or sources to include or exclude</c>
      <c>format</c>
      <c><strong>MAY</strong></c>
      <c>Desired response format: structured, natural, raw</c>
      <c>confidence_threshold</c>
      <c><strong>MAY</strong></c>
      <c>Minimum confidence score for included results (0.0-1.0)</c>
      <c>context</c>
      <c><strong>MAY</strong></c>
      <c>Session context for disambiguation</c>
</texttable>

<t>Response: Result set with confidence scores per item. Server <strong>SHOULD</strong>
indicate provenance of each result. Idempotent: Yes.</t>

</section>
<section anchor="summarize"><name>SUMMARIZE</name>

<t>Purpose: Request a concise synthesis of provided content or a referenced
resource. The agent is requesting a cognitive operation on data, not
retrieving data.</t>

<texttable title="SUMMARIZE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>source</c>
      <c><strong>MUST</strong></c>
      <c>Content inline (up to implementation limit) or URI reference</c>
      <c>length</c>
      <c><strong>SHOULD</strong></c>
      <c>Target summary length: brief, standard, detailed</c>
      <c>focus</c>
      <c><strong>MAY</strong></c>
      <c>Aspect to emphasize in the summary</c>
      <c>format</c>
      <c><strong>MAY</strong></c>
      <c>Output format: bullets, prose, structured</c>
      <c>audience</c>
      <c><strong>MAY</strong></c>
      <c>Intended reader context, for calibrating complexity</c>
</texttable>

<t>Response: Summary content with a source_hash and a confidence score.
Idempotent: Yes.</t>

</section>
<section anchor="book"><name>BOOK</name>

<t>Purpose: Reserve a resource, time slot, seat, or allocation on behalf of
the agent's principal. State-modifying. Notable error codes: 409 Conflict
(resource unavailable), 451 Scope Violation (principal not authorized for
this resource type).</t>

<texttable title="BOOK Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>resource_id</c>
      <c><strong>MUST</strong></c>
      <c>Identifier of the resource to reserve</c>
      <c>principal_id</c>
      <c><strong>MUST</strong></c>
      <c>The human or system on whose behalf the booking is made</c>
      <c>time_slot</c>
      <c><strong>MUST</strong> (if time-based)</c>
      <c>ISO 8601 datetime or range</c>
      <c>quantity</c>
      <c><strong>MAY</strong></c>
      <c>Number of units to reserve</c>
      <c>options</c>
      <c><strong>MAY</strong></c>
      <c>Resource-specific booking parameters</c>
      <c>confirm_immediately</c>
      <c><strong>MAY</strong></c>
      <c>Boolean; if false, creates a hold pending confirmation</c>
</texttable>

<t>Response: Booking confirmation with booking_id, status (confirmed / held),
and expiry timestamp if a hold. Idempotent: No.</t>

</section>
<section anchor="schedule"><name>SCHEDULE</name>

<t>Purpose: Define a sequence of actions, method calls, or events to be
executed at specified times or in response to specified triggers. Creates
a durable plan, not an immediate execution.</t>

<texttable title="SCHEDULE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>steps</c>
      <c><strong>MUST</strong></c>
      <c>Ordered list of AGTP method calls with parameters</c>
      <c>trigger</c>
      <c><strong>MUST</strong></c>
      <c>immediate, datetime, event, or condition</c>
      <c>trigger_value</c>
      <c><strong>MUST</strong> (if not immediate)</c>
      <c>Datetime, event name, or condition expression</c>
      <c>on_failure</c>
      <c><strong>SHOULD</strong></c>
      <c>Behavior on step failure: abort, skip, retry, escalate</c>
      <c>notify</c>
      <c><strong>MAY</strong></c>
      <c>Notification targets on completion or failure</c>
</texttable>

<t>Response: Schedule record with schedule_id, confirmed steps, and next
execution timestamp. Idempotent: No.</t>

</section>
<section anchor="learn"><name>LEARN</name>

<t>Purpose: Update the agent's session context, knowledge state, or persistent
memory. An explicit context write where the agent asserts that something should
be retained.</t>

<texttable title="LEARN Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>content</c>
      <c><strong>MUST</strong></c>
      <c>Information to be learned (structured or unstructured)</c>
      <c>scope</c>
      <c><strong>MUST</strong></c>
      <c>session (ephemeral), principal (persists for principal), global (shared)</c>
      <c>category</c>
      <c><strong>SHOULD</strong></c>
      <c>Semantic category for retrieval optimization</c>
      <c>confidence</c>
      <c><strong>MAY</strong></c>
      <c>Agent's confidence in the content (0.0-1.0)</c>
      <c>source</c>
      <c><strong>MAY</strong></c>
      <c>Provenance of the learned content</c>
      <c>ttl</c>
      <c><strong>MAY</strong></c>
      <c>Expiry for the learned content</c>
</texttable>

<t>Response: Confirmation with learn_id and effective scope. Idempotent: No.</t>

</section>
<section anchor="delegate"><name>DELEGATE</name>

<t>Purpose: Transfer execution of a task or method to a sub-agent or
downstream system. Initiates a new AGTP session on behalf of the delegating
agent, carrying forward authority lineage.</t>

<texttable title="DELEGATE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>target_agent_id</c>
      <c><strong>MUST</strong></c>
      <c>Identifier of the agent to delegate to</c>
      <c>task</c>
      <c><strong>MUST</strong></c>
      <c>AGTP method call (or sequence) to execute</c>
      <c>authority_scope</c>
      <c><strong>MUST</strong></c>
      <c>Scope granted to sub-agent <strong>MUST</strong> be a strict subset of delegating agent's scope</c>
      <c>delegation_token</c>
      <c><strong>MUST</strong></c>
      <c>Signed token proving delegation authority</c>
      <c>callback</c>
      <c><strong>SHOULD</strong></c>
      <c>AGTP endpoint for result delivery</c>
      <c>deadline</c>
      <c><strong>MAY</strong></c>
      <c>Maximum time for task completion</c>
</texttable>

<t>Security note: the authority_scope in a DELEGATE request <strong>MUST NOT</strong>
exceed the delegating agent's own Authority-Scope. Servers <strong>MUST</strong> enforce
this and <strong>MUST</strong> return 451 Scope Violation if violated. This is the
protocol-level defense against authority laundering. Idempotent: No.</t>

</section>
<section anchor="collaborate"><name>COLLABORATE</name>

<t>Purpose: Initiate a multi-agent coordinated task where two or more agents
work in parallel or in defined roles toward a shared goal. Unlike DELEGATE
(hierarchical), COLLABORATE is peer-to-peer.</t>

<texttable title="COLLABORATE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>collaborators</c>
      <c><strong>MUST</strong></c>
      <c>List of Agent-IDs invited to collaborate</c>
      <c>objective</c>
      <c><strong>MUST</strong></c>
      <c>Shared goal expressed as a task description or structured specification</c>
      <c>role_assignments</c>
      <c><strong>SHOULD</strong></c>
      <c>Map of Agent-IDs to roles within the collaboration</c>
      <c>coordination_model</c>
      <c><strong>SHOULD</strong></c>
      <c>parallel, sequential, or consensus</c>
      <c>result_aggregation</c>
      <c><strong>MAY</strong></c>
      <c>How results from collaborators are combined</c>
</texttable>

<t>Response: Collaboration session receipt with collaboration_id. Each
collaborator receives an AGTP NOTIFY to join. Idempotent: No.</t>

</section>
<section anchor="confirm"><name>CONFIRM</name>

<t>Purpose: Explicit acknowledgment of a prior action, state, or data item.
Creates a signed attestation record.</t>

<texttable title="CONFIRM Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>target_id</c>
      <c><strong>MUST</strong></c>
      <c>ID of the action, booking, schedule, or item being confirmed</c>
      <c>status</c>
      <c><strong>MUST</strong></c>
      <c>accepted, rejected, or deferred</c>
      <c>reason</c>
      <c><strong>SHOULD</strong> (if rejected/deferred)</c>
      <c>Explanation of the decision</c>
      <c>attestation</c>
      <c><strong>MAY</strong></c>
      <c>Agent-signed confirmation payload for audit</c>
</texttable>

<t>Response: Confirmation receipt with timestamp and attestation_id.
Idempotent: Yes.</t>

</section>
<section anchor="escalate"><name>ESCALATE</name>

<t>Purpose: Route a task, decision, or exception to a human principal or
higher-authority agent when the current agent cannot or should not proceed.
ESCALATE is the protocol-level expression of meaningful friction in AI
systems as a first-class method.</t>

<texttable title="ESCALATE Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>task_id</c>
      <c><strong>MUST</strong></c>
      <c>The task or method invocation triggering escalation</c>
      <c>reason</c>
      <c><strong>MUST</strong></c>
      <c>Structured reason: confidence_threshold, scope_limit, ethical_flag, ambiguous_instruction, resource_unavailable</c>
      <c>context</c>
      <c><strong>MUST</strong></c>
      <c>Full context needed for the escalation recipient to act</c>
      <c>priority</c>
      <c><strong>SHOULD</strong></c>
      <c>urgent, normal, or low</c>
      <c>recipient</c>
      <c><strong>MAY</strong></c>
      <c>Specific human or agent to escalate to; if absent, routes to default handler</c>
      <c>deadline</c>
      <c><strong>MAY</strong></c>
      <c>Time by which a response is needed</c>
</texttable>

<t>Response: Escalation receipt with escalation_id and routing confirmation.
The escalated task is paused until resolved via CONFIRM. Idempotent: Yes.
An agent that escalates appropriately is functioning correctly. Governance
frameworks built on AGTP can use escalation frequency and reason codes as
observability signals for systemic issues.</t>

</section>
<section anchor="notify"><name>NOTIFY</name>

<t>Purpose: Asynchronous push of information from an agent to a recipient.
Does not expect a response. Fire-and-forget. Delivery confirmation (if
required) returned via a subsequent CONFIRM from the recipient.</t>

<texttable title="NOTIFY Parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Required</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>recipient</c>
      <c><strong>MUST</strong></c>
      <c>Target Agent-ID, human endpoint, or broadcast group</c>
      <c>content</c>
      <c><strong>MUST</strong></c>
      <c>Notification payload</c>
      <c>urgency</c>
      <c><strong>SHOULD</strong></c>
      <c>critical, informational, or background</c>
      <c>delivery_guarantee</c>
      <c><strong>MAY</strong></c>
      <c>at_most_once, at_least_once, or exactly_once</c>
      <c>expiry</c>
      <c><strong>MAY</strong></c>
      <c>Timestamp after which the notification should not be delivered</c>
</texttable>

<t>Response: Delivery receipt with notification_id. Idempotent: No.</t>

</section>
</section>
<section anchor="method-summary-table"><name>Method Summary Table</name>

<texttable title="AGTP Core Method Summary">
      <ttcol align='left'>Method</ttcol>
      <ttcol align='left'>Intent</ttcol>
      <ttcol align='left'>State-Modifying</ttcol>
      <ttcol align='left'>Idempotent</ttcol>
      <ttcol align='left'>Primary Error Codes</ttcol>
      <c>QUERY</c>
      <c>Retrieve information</c>
      <c>No</c>
      <c>Yes</c>
      <c>404, 422</c>
      <c>SUMMARIZE</c>
      <c>Synthesize content</c>
      <c>No</c>
      <c>Yes</c>
      <c>400, 422</c>
      <c>BOOK</c>
      <c>Reserve a resource</c>
      <c>Yes</c>
      <c>No</c>
      <c>409, 451</c>
      <c>SCHEDULE</c>
      <c>Plan future actions</c>
      <c>Yes</c>
      <c>No</c>
      <c>400, 409</c>
      <c>LEARN</c>
      <c>Update agent context</c>
      <c>Yes</c>
      <c>No</c>
      <c>400, 403</c>
      <c>DELEGATE</c>
      <c>Transfer task to sub-agent</c>
      <c>Yes</c>
      <c>No</c>
      <c>403, 451, 551</c>
      <c>COLLABORATE</c>
      <c>Coordinate peer agents</c>
      <c>Yes</c>
      <c>No</c>
      <c>404, 403</c>
      <c>CONFIRM</c>
      <c>Attest to a prior action</c>
      <c>Yes</c>
      <c>Yes</c>
      <c>404, 400</c>
      <c>ESCALATE</c>
      <c>Defer to human/authority</c>
      <c>Yes</c>
      <c>Yes</c>
      <c>404</c>
      <c>NOTIFY</c>
      <c>Push information</c>
      <c>No</c>
      <c>No</c>
      <c>400, 404</c>
</texttable>

</section>
<section anchor="method-registry-and-extensibility"><name>Method Registry and Extensibility</name>

<t>AGTP defines a formal Method Registry maintained by IANA (see Section 8.2).
Any party may submit a new method for registration. The registration
procedure is Expert Review, and registration <strong>MUST</strong> be accompanied by a
published specification, at minimum an IETF Internet-Draft or equivalent
publicly available document. Registered methods <strong>MUST</strong>:</t>

<t><list style="numbers" type="1">
  <t>Have a unique uppercase ASCII name</t>
  <t>Define required and optional parameters</t>
  <t>Define expected response structure</t>
  <t>Specify idempotency behavior</t>
  <t>Specify applicable error codes</t>
  <t>Include a security considerations section</t>
  <t>Be accompanied by a published reference specification (Internet-Draft or RFC)</t>
</list></t>

<t>Experimental methods <strong>MAY</strong> be used prior to registration using the X-
prefix convention (e.g., X-NEGOTIATE). Experimental methods <strong>MUST NOT</strong>
be used in production deployments without registration.</t>

<t>Capability negotiation occurs during session establishment. The server
returns a Supported-Methods header listing the methods it implements.
Clients <strong>SHOULD</strong> check this list before invoking non-core methods.</t>

</section>
<section anchor="extended-method-vocabulary-and-industry-profiles"><name>Extended Method Vocabulary and Industry Profiles</name>

<section anchor="three-tier-method-architecture"><name>Three-Tier Method Architecture</name>

<t>The AGTP method vocabulary is organized into three tiers reflecting
different levels of universality, specificity, and domain relevance.</t>

<dl>
  <dt>Tier 1. Core Methods (defined in Section 6.2):</dt>
  <dd>
    <t>The baseline vocabulary required for AGTP compliance. Every conformant
AGTP implementation <strong>MUST</strong> support all Tier 1 methods.</t>
  </dd>
  <dt>Tier 2. Standard Extended Methods:</dt>
  <dd>
    <t>Registered in the IANA AGTP Method Registry and available for use in any
AGTP implementation. Not required for baseline compliance but <strong>SHOULD</strong>
be implemented where their semantics apply. Defined in <xref target="AGTP-METHODS"/>.</t>
  </dd>
  <dt>Tier 3. Industry Profile Methods:</dt>
  <dd>
    <t>Domain-specific method sets defined and registered by industry
communities as named AGTP profiles. Valid within deployments that declare
support for the relevant profile. Not required in general-purpose
implementations.</t>
  </dd>
</dl>

</section>
<section anchor="method-category-taxonomy"><name>Method Category Taxonomy</name>

<t>All AGTP methods are organized into five categories:</t>

<dl>
  <dt>ACQUIRE:</dt>
  <dd>
    <t>Retrieve data, resources, or state without modifying it. Typically
idempotent; no state modification.</t>
  </dd>
  <dt>COMPUTE:</dt>
  <dd>
    <t>Process, transform, or analyze information and produce a derived result.
Typically idempotent given the same input.</t>
  </dd>
  <dt>TRANSACT:</dt>
  <dd>
    <t>Perform state-changing operations with external systems, resources, or
records. Not idempotent by default; subject to reversibility
classification.</t>
  </dd>
  <dt>COMMUNICATE:</dt>
  <dd>
    <t>Send information, notifications, or signals to recipients. Fire-and-
forget or confirm-receipt delivery models.</t>
  </dd>
  <dt>ORCHESTRATE:</dt>
  <dd>
    <t>Coordinate, sequence, or manage multiple agents, tasks, or workflows.
May spawn sub-agents or sessions; delegation chain semantics apply.</t>
  </dd>
</dl>

<texttable title="Core Method Category Mapping">
      <ttcol align='left'>Core Method</ttcol>
      <ttcol align='left'>Category</ttcol>
      <c>QUERY</c>
      <c>Acquire</c>
      <c>SUMMARIZE</c>
      <c>Compute</c>
      <c>BOOK</c>
      <c>Transact</c>
      <c>SCHEDULE</c>
      <c>Orchestrate</c>
      <c>LEARN</c>
      <c>Compute</c>
      <c>DELEGATE</c>
      <c>Orchestrate</c>
      <c>COLLABORATE</c>
      <c>Orchestrate</c>
      <c>CONFIRM</c>
      <c>Transact</c>
      <c>ESCALATE</c>
      <c>Orchestrate</c>
      <c>NOTIFY</c>
      <c>Communicate</c>
</texttable>

</section>
<section anchor="standard-extended-methods-tier-2"><name>Standard Extended Methods (Tier 2)</name>

<t>The following methods constitute the initial Tier 2 registration set,
defined in <xref target="AGTP-METHODS"/>. Listed here by category with brief semantic
definitions; full parameter specifications are in the companion document.</t>

<t>ACQUIRE category: FETCH, SEARCH, SCAN, PULL, IMPORT, FIND.</t>

<t>COMPUTE category: EXTRACT, FILTER, VALIDATE, TRANSFORM, TRANSLATE,
NORMALIZE, PREDICT, RANK, MAP.</t>

<t>TRANSACT category: REGISTER, SUBMIT, TRANSFER, PURCHASE, SIGN, MERGE,
LINK, LOG, SYNC, PUBLISH.</t>

<t>COMMUNICATE category: REPLY, SEND, REPORT.</t>

<t>ORCHESTRATE category: MONITOR, ROUTE, RETRY, PAUSE, RESUME, RUN, CHECK.</t>

<t>Notable constraints: PURCHASE <strong>MUST</strong> carry explicit principal_id and
scope enforcement; 451 Scope Violation applies if payments:purchase is
not in the agent's Authority-Scope. RUN requires explicit procedure_id
parameter; implementations <strong>MUST NOT</strong> accept free-form execution strings.</t>

</section>
<section anchor="short-form-and-industry-inspired-methods"><name>Short-Form and Industry-Inspired Methods</name>

<t>A set of short-form verb methods, e.g., SET, TAKE, OPEN, START, CALL, MAKE,
TURN, BREAK, are provisionally catalogued as candidates for Tier 2
registration. These verbs are highly context-dependent and their semantics
vary significantly across deployment domains.</t>

<t>Short-form methods will be registered individually only when a published
companion specification provides unambiguous semantic definitions
demonstrably distinct from existing registered methods. Provisional
registrations using the X- prefix (e.g., X-SET, X-CALL) are encouraged
during the experimentation period.</t>

</section>
<section anchor="industry-profile-method-sets"><name>Industry Profile Method Sets</name>

<t>AGTP recognizes that specific industries require method vocabularies
reflecting domain-specific operations that would be inappropriate in a
general-purpose standard. Industry profile method sets are defined and
registered as named AGTP profiles. A profile is a published companion
specification that:</t>

<t><list style="numbers" type="1">
  <t>Declares a profile name (e.g., agtp-profile-healthcare,
agtp-profile-financial, agtp-profile-legaltech)</t>
  <t>Defines one or more industry-specific methods with full parameter
specifications, error codes, and security considerations</t>
  <t>Specifies which Tier 1 and Tier 2 methods are REQUIRED, RECOMMENDED,
or NOT APPLICABLE within the profile</t>
  <t>Addresses regulatory or compliance considerations specific to the
domain (e.g., HIPAA for healthcare, PCI-DSS for financial services)</t>
</list></t>

<t>Illustrative examples of potential industry profile methods (not yet
registered; listed for directional purposes only):</t>

<t>Healthcare: PRESCRIBE, AUTHORIZE, REFER, DISPENSE, TRIAGE, CONSENT, REDACT</t>

<t>Financial services: SETTLE, RECONCILE, HEDGE, CLEAR, UNDERWRITE, KYC, AML</t>

<t>Legal and compliance: ATTEST, NOTARIZE, DISCLOSE, REDLINE, EXECUTE,
PRESERVE</t>

<t>Infrastructure: PROVISION, DEPROVISION, ROLLBACK, SNAPSHOT, FAILOVER</t>

<t>Industry communities are encouraged to develop and submit profile
specifications through the IETF process. The IANA AGTP Method Registry will
maintain a profile index alongside the core and standard method registries.</t>

</section>
<section anchor="registration-path-for-new-methods"><name>Registration Path for New Methods</name>

<dl>
  <dt>For Tier 2 Standard Methods:</dt>
  <dd>
    <t>Submit an Internet-Draft to the IETF providing full method specification
per Section 6.4. The Designated Expert reviews for semantic uniqueness,
clarity, and security considerations.</t>
  </dd>
  <dt>For Industry Profile Methods:</dt>
  <dd>
    <t>Submit a profile specification to the IETF (or a recognized domain
standards body with an established AGTP registry liaison) covering all
methods in the profile and profile compliance requirements.</t>
  </dd>
  <dt>For Experimental Methods:</dt>
  <dd>
    <t>Use the X- prefix without registration. Implementations <strong>MUST NOT</strong>
deploy experimental methods in production without completing the
registration process. Experimental method names do not reserve the
unprefixed name.</t>
  </dd>
</dl>

<t>The AGTP Method Registry is published at:
https://www.iana.org/assignments/agtp-methods/</t>

</section>
</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This section satisfies the mandatory IETF Security Considerations
requirement. All AGTP implementations <strong>MUST</strong> address the considerations
described here.</t>

<section anchor="mandatory-tls"><name>Mandatory TLS</name>

<t>All AGTP connections <strong>MUST</strong> use TLS 1.3 or higher. Implementations
<strong>MUST</strong> reject connections using TLS 1.2 or below. Certificate validation
follows standard PKI practices per <xref target="RFC5280"/>. Servers <strong>MUST</strong> present
a valid certificate.</t>

</section>
<section anchor="agent-identity-headers-and-agent-certificate-extension"><name>Agent Identity Headers and Agent Certificate Extension</name>

<t>Every AGTP request <strong>MUST</strong> include Agent-ID and Principal-ID header fields.
In the base specification, these fields are not cryptographically
authenticated. They are self-asserted but logged mandatorily for
auditability. Implementations <strong>SHOULD</strong> use logging and anomaly detection
to identify inconsistencies.</t>

<t>Full cryptographic verification of agent identity and Authority-Scope is
provided by the AGTP Agent Certificate extension <xref target="AGTP-CERT"/>. That
extension binds Agent-ID, Principal-ID, and Authority-Scope to an X.509
v3 certificate presented during TLS mutual authentication, enabling
infrastructure-layer identity and scope verification without
application-layer access. Implementers planning deployments that require
verified agent identity <strong>SHOULD</strong> plan for the Agent Certificate
extension.</t>

<ul empty="true"><li>
  <t>Note: The Agent Certificate extension may be subject to pending
intellectual property claims. See Section 7.7 and the IPR Notice
preceding the Abstract for details. The licensor is prepared to grant
a royalty-free license to implementers.</t>
</li></ul>

<t>Every AGTP server <strong>MUST</strong> log Agent-ID and Principal-ID fields for every
request, creating an attributable audit trail even in deployments without
the Certificate extension.</t>

</section>
<section anchor="authority-scope-enforcement"><name>Authority Scope Enforcement</name>

<t>The Authority-Scope header declares what actions the agent is authorized
to take. Compliant AGTP servers <strong>MUST</strong> parse the Authority-Scope on every
request, return 451 Scope Violation for any method that exceeds declared
scope, and log all scope violations for audit purposes. Scope declarations
are self-asserted in the base spec, analogous to scope assertions in
OAuth 2.0 <xref target="RFC6749"/>. Cryptographically signed and infrastructure-enforced
scopes are defined in <xref target="AGTP-CERT"/>.</t>

</section>
<section anchor="threat-model"><name>Threat Model</name>

<section anchor="agent-spoofing"><name>Agent Spoofing</name>

<t>Threat: A malicious actor forges Agent-ID and Principal-ID headers to
impersonate a trusted agent. Base spec mitigation: mandatory logging and
anomaly detection. Full mitigation requires <xref target="AGTP-CERT"/>.</t>

</section>
<section anchor="authority-laundering"><name>Authority Laundering</name>

<t>Threat: An agent claims an Authority-Scope broader than what it was
granted. Mitigation: server-side scope enforcement; 451 Scope Violation
returned and logged. In DELEGATE chains, each hop's scope <strong>MUST</strong> be a
strict subset of the delegating agent's scope.</t>

</section>
<section anchor="delegation-chain-poisoning"><name>Delegation Chain Poisoning</name>

<t>Threat: A malicious agent inserts itself into a DELEGATE chain. Mitigation:
Delegation-Chain headers are logged at each hop. 551 Authority Chain Broken
is returned if any chain entry is unverifiable. Full mitigation requires
<xref target="AGTP-CERT"/> for signed delegation tokens.</t>

</section>
<section anchor="denial-of-service-via-high-frequency-agent-traffic"><name>Denial of Service via High-Frequency Agent Traffic</name>

<t>Threat: Agents that are compromised, misconfigured, or adversarial, generate
extremely high request volumes. Mitigation: 429 Rate Limited status code.
Rate limiting <strong>SHOULD</strong> be applied per Agent-ID and per Principal-ID.
When <xref target="AGTP-CERT"/> is deployed, per-Agent-ID quotas can be cryptographically
tied to verified identity, preventing quota evasion through Agent-ID
spoofing.</t>

</section>
<section anchor="session-hijacking"><name>Session Hijacking</name>

<t>Threat: An attacker intercepts or forges a Session-ID. Mitigation:
mandatory TLS protects sessions in transit. Session-IDs <strong>MUST</strong> be
cryptographically random with minimum 128 bits of entropy. Servers <strong>MUST</strong>
validate that Session-ID, Agent-ID, and TLS client identity are consistent.</t>

</section>
<section anchor="escalation-suppression"><name>Escalation Suppression</name>

<t>Threat: A compromised agent or intermediary suppresses ESCALATE requests,
preventing human oversight. Mitigation: compliant implementations <strong>MUST</strong>
route ESCALATE requests directly to the declared escalation handler without
modification. Intermediaries <strong>MUST NOT</strong> drop, delay, or modify ESCALATE
requests. Escalation handlers <strong>SHOULD</strong> implement independent receipt
confirmation.</t>

</section>
</section>
<section anchor="privacy-considerations"><name>Privacy Considerations</name>

<t>Agent identity headers carry information about agent behavior that may be
sensitive:</t>

<t><list style="symbols">
  <t>Agent-ID and Principal-ID together may reveal organizational structure</t>
  <t>Session-ID and Task-ID reveal workflow patterns</t>
  <t>Delegation-Chain reveals multi-agent architecture</t>
</list></t>

<t>AGTP logs containing these fields <strong>MUST</strong> be treated as sensitive
operational data. Operators <strong>MUST</strong> implement appropriate access controls,
retention limits, and data minimization practices consistent with
applicable privacy regulations.</t>

<t>Where privacy-preserving attribution is required, implementations <strong>MAY</strong>
use pseudonymous Agent-IDs with a separate trusted resolution service.
Under this model, the Agent-ID transmitted in AGTP headers is an opaque,
unlinkable identifier; a trusted resolution service, accessible only to
authorized parties, maps the opaque identifier to the true agent identity
for audit and accountability purposes. The architecture for pseudonymous
agent identity resolution is reserved for a future companion document.</t>

</section>
<section anchor="denial-of-service-considerations"><name>Denial-of-Service Considerations</name>

<t>AGTP's agent identity headers provide a mechanism for more precise
denial-of-service mitigation than is possible with HTTP. Rate limiting
<strong>SHOULD</strong> be applied per Agent-ID and per Principal-ID in addition to
per-IP-address controls.</t>

<t>When <xref target="AGTP-CERT"/> is deployed, per-Agent-ID rate limiting can be
cryptographically tied to verified agent identity, preventing quota evasion
through Agent-ID rotation. Implementations planning high-volume governed
agent deployments <strong>SHOULD</strong> plan for <xref target="AGTP-CERT"/> as part of their
denial-of-service mitigation strategy.</t>

<t>Additional recommended mitigations: Priority header enforcement (Priority:
background requests <strong>SHOULD</strong> have lower rate limit headroom than
Priority: critical); per-governance-zone aggregate limits in multi-tenant
deployments; and circuit breaker patterns for ESCALATE request floods.</t>

</section>
<section anchor="intellectual-property-considerations"><name>Intellectual Property Considerations</name>

<t>The core AGTP specification, including all base methods, header fields,
status codes, connection model, and IANA registrations defined in this
document, is intended for open implementation without royalty obligation.</t>

<t>Certain extensions referenced in this document may be subject to pending
patent applications by the author, specifically: the Agent Certificate
extension <xref target="AGTP-CERT"/>, which provides cryptographic binding of agent
identity and authority scope to AGTP header fields; and the ACTIVATE method,
which provides AGTP-native transmission and activation of governed agent
packages. Implementers of the core AGTP specification are not affected by
any intellectual property claims on these extensions.</t>

<t>The licensor is prepared to grant a royalty-free license to implementers
for any patent claims that cover contributions in this document and its
referenced extensions, consistent with the IETF's IPR framework under
<xref target="RFC8179"/>.</t>

<t>IPR disclosures have been filed with the IETF Secretariat and are available
at: https://datatracker.ietf.org/ipr/</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document requests the following IANA actions upon advancement to
RFC status.</t>

<section anchor="port-assignment"><name>Port Assignment</name>

<t>Registration of the following service names in the IANA Service Name and
Transport Protocol Port Number Registry:</t>

<texttable title="Proposed Port Assignments">
      <ttcol align='left'>Service Name</ttcol>
      <ttcol align='left'>Port</ttcol>
      <ttcol align='left'>Transport</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>agtp</c>
      <c>TBD</c>
      <c>TCP</c>
      <c>Agent Transfer Protocol over TCP/TLS</c>
      <c>agtp-quic</c>
      <c>TBD</c>
      <c>UDP</c>
      <c>Agent Transfer Protocol over QUIC</c>
</texttable>

</section>
<section anchor="agtp-method-registry"><name>AGTP Method Registry</name>

<t>Establishment of a new IANA registry: Agent Transfer Protocol Methods.</t>

<dl>
  <dt>Registry name:</dt>
  <dd>
    <t>Agent Transfer Protocol Methods</t>
  </dd>
  <dt>Registration procedure:</dt>
  <dd>
    <t>Expert Review per <xref target="RFC8126"/>, with the additional requirement that each registration
be accompanied by a published specification, at minimum a publicly
available Internet-Draft or equivalent document. The Designated Expert
<strong>SHOULD</strong> verify that the proposed method name is unique, the reference
specification is publicly accessible, and the method definition includes
the required fields (parameters, response structure, idempotency, error
codes, security considerations).</t>
  </dd>
  <dt>Reference:</dt>
  <dd>
    <t>This document</t>
  </dd>
</dl>

<t>Initial registrations:</t>

<texttable title="Initial AGTP Method Registry Entries">
      <ttcol align='left'>Method</ttcol>
      <ttcol align='left'>Status</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>QUERY</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>SUMMARIZE</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>BOOK</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>SCHEDULE</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>LEARN</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>DELEGATE</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>COLLABORATE</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>CONFIRM</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>ESCALATE</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
      <c>NOTIFY</c>
      <c>Permanent</c>
      <c>This document, Section 6.2</c>
</texttable>

</section>
<section anchor="agtp-status-code-registry"><name>AGTP Status Code Registry</name>

<t>Establishment of a new IANA registry: Agent Transfer Protocol Status Codes.</t>

<dl>
  <dt>Registry name:</dt>
  <dd>
    <t>Agent Transfer Protocol Status Codes</t>
  </dd>
  <dt>Registration procedure:</dt>
  <dd>
    <t>Expert Review + published specification required.</t>
  </dd>
</dl>

<t>The following AGTP-specific status codes, those with no HTTP equivalent, 
are registered with full definitions:</t>

<texttable title="AGTP-Specific Status Code Definitions">
      <ttcol align='left'>Code</ttcol>
      <ttcol align='left'>Name</ttcol>
      <ttcol align='left'>Definition</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>451</c>
      <c>Scope Violation</c>
      <c>The requested action is outside the Authority-Scope declared in the request headers. The server <strong>MUST</strong> log this event. The agent <strong>MUST NOT</strong> retry the same request without modifying its Authority-Scope declaration. This is a governance signal, not a protocol error.</c>
      <c>This document, Section 5.5</c>
      <c>550</c>
      <c>Delegation Failure</c>
      <c>A sub-agent to which a task was delegated via the DELEGATE method failed to complete the task within the declared deadline or returned an error. The response body <strong>SHOULD</strong> contain the sub-agent's error details.</c>
      <c>This document, Section 5.5</c>
      <c>551</c>
      <c>Authority Chain Broken</c>
      <c>One or more entries in the Delegation-Chain header cannot be verified as part of a valid and continuous delegation sequence. The specific unverifiable entry <strong>SHOULD</strong> be identified in the response body. The server <strong>MUST</strong> log this event.</c>
      <c>This document, Section 5.5</c>
</texttable>

</section>
<section anchor="header-field-registry"><name>Header Field Registry</name>

<t>AGTP header fields are distinct from HTTP header fields and are registered
in a new IANA registry: Agent Transfer Protocol Header Fields.</t>

<dl>
  <dt>Registry name:</dt>
  <dd>
    <t>Agent Transfer Protocol Header Fields</t>
  </dd>
  <dt>Registration procedure:</dt>
  <dd>
    <t>Expert Review + published specification required.</t>
  </dd>
</dl>

<t>AGTP does not reuse the HTTP Field Name Registry, as AGTP header fields have
different semantics, applicability, and versioning constraints from HTTP
fields. HTTP header fields are not automatically valid in AGTP, and AGTP
header fields are not valid HTTP fields.</t>

<t>Initial registrations (all Permanent): AGTP-Version, AGTP-Method, AGTP-Status,
Agent-ID, Principal-ID, Authority-Scope, Session-ID, Task-ID,
Delegation-Chain, Priority, TTL, Server-Agent-ID, Attribution-Record,
Continuation-Token, Supported-Methods.</t>

</section>
<section anchor="uri-scheme-registration"><name>URI Scheme Registration</name>

<t>Registration of the agtp:// URI scheme per <xref target="RFC7595"/>, as described in
Section 5.8.6 of this document.</t>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC9000">
  <front>
    <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
    <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9000"/>
  <seriesInfo name="DOI" value="10.17487/RFC9000"/>
</reference>
<reference anchor="RFC9001">
  <front>
    <title>Using TLS to Secure QUIC</title>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9001"/>
  <seriesInfo name="DOI" value="10.17487/RFC9001"/>
</reference>
<reference anchor="RFC9110">
  <front>
    <title>HTTP Semantics</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
      <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="97"/>
  <seriesInfo name="RFC" value="9110"/>
  <seriesInfo name="DOI" value="10.17487/RFC9110"/>
</reference>
<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>
<reference anchor="RFC8126">
  <front>
    <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
    <author fullname="M. Cotton" initials="M." surname="Cotton"/>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <author fullname="T. Narten" initials="T." surname="Narten"/>
    <date month="June" year="2017"/>
    <abstract>
      <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
      <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
      <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="26"/>
  <seriesInfo name="RFC" value="8126"/>
  <seriesInfo name="DOI" value="10.17487/RFC8126"/>
</reference>
<reference anchor="RFC8179">
  <front>
    <title>Intellectual Property Rights in IETF Technology</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <author fullname="J. Contreras" initials="J." surname="Contreras"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>The IETF policies about Intellectual Property Rights (IPR), such as patent rights, relative to technologies developed in the IETF are designed to ensure that IETF working groups and participants have as much information as possible about any IPR constraints on a technical proposal as early as possible in the development process. The policies are intended to benefit the Internet community and the public at large, while respecting the legitimate rights of IPR holders. This document sets out the IETF policies concerning IPR related to technology worked on within the IETF. It also describes the objectives that the policies are designed to meet. This document updates RFC 2026 and, with RFC 5378, replaces Section 10 of RFC 2026. This document also obsoletes RFCs 3979 and 4879.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="79"/>
  <seriesInfo name="RFC" value="8179"/>
  <seriesInfo name="DOI" value="10.17487/RFC8179"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC9114">
  <front>
    <title>HTTP/3</title>
    <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9114"/>
  <seriesInfo name="DOI" value="10.17487/RFC9114"/>
</reference>
<reference anchor="RFC7540">
  <front>
    <title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
    <author fullname="M. Belshe" initials="M." surname="Belshe"/>
    <author fullname="R. Peon" initials="R." surname="Peon"/>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection. It also introduces unsolicited push of representations from servers to clients.</t>
      <t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax. HTTP's existing semantics remain unchanged.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7540"/>
  <seriesInfo name="DOI" value="10.17487/RFC7540"/>
</reference>
<reference anchor="RFC6749">
  <front>
    <title>The OAuth 2.0 Authorization Framework</title>
    <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
    <date month="October" year="2012"/>
    <abstract>
      <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6749"/>
  <seriesInfo name="DOI" value="10.17487/RFC6749"/>
</reference>
<reference anchor="RFC7595">
  <front>
    <title>Guidelines and Registration Procedures for URI Schemes</title>
    <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
    <author fullname="T. Hansen" initials="T." surname="Hansen"/>
    <author fullname="T. Hardie" initials="T." surname="Hardie"/>
    <date month="June" year="2015"/>
    <abstract>
      <t>This document updates the guidelines and recommendations, as well as the IANA registration processes, for the definition of Uniform Resource Identifier (URI) schemes. It obsoletes RFC 4395.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="35"/>
  <seriesInfo name="RFC" value="7595"/>
  <seriesInfo name="DOI" value="10.17487/RFC7595"/>
</reference>

<reference anchor="A2A" target="https://a2aprotocol.ai">
  <front>
    <title>Agent-to-Agent Protocol Specification</title>
    <author >
      <organization>Linux Foundation</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="ACP" >
  <front>
    <title>Agent Communication Protocol</title>
    <author >
      <organization>IBM Research</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="MCP" target="https://modelcontextprotocol.io">
  <front>
    <title>Model Context Protocol</title>
    <author >
      <organization>Anthropic</organization>
    </author>
    <date year="2024"/>
  </front>
</reference>
<reference anchor="ANP" >
  <front>
    <title>Agent Network Protocol</title>
    <author >
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="AGTP-CERT" >
  <front>
    <title>AGTP Agent Certificate Extension</title>
    <author fullname="Chris Hood">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-hood-agtp-agent-cert-00"/>
</reference>
<reference anchor="AGTP-METHODS" >
  <front>
    <title>AGTP Standard Extended Method Vocabulary</title>
    <author fullname="Chris Hood">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-hood-agtp-standard-methods-00"/>
</reference>


    </references>

</references>


<?line 1426?>

<section anchor="authority-scope-format"><name>Authority-Scope Format</name>

<t>Authority-Scope values are expressed as a space-separated list of scope
tokens following the pattern: [domain]:[action] or [domain]:* for
full domain access. Tokens <strong>MUST</strong> be lowercase ASCII with a single colon
separator.</t>

<t>Examples:</t>

<figure><artwork><![CDATA[
Authority-Scope: calendar:book calendar:query
Authority-Scope: documents:summarize documents:query knowledge:learn
Authority-Scope: *:query
Authority-Scope: booking:* payments:confirm
]]></artwork></figure>

<t>Reserved domains (initial set):</t>

<texttable title="Reserved Authority-Scope Domains">
      <ttcol align='left'>Domain</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>calendar</c>
      <c>Scheduling and time-based resource management</c>
      <c>documents</c>
      <c>Document access, summarization, and annotation</c>
      <c>knowledge</c>
      <c>Agent context and memory operations</c>
      <c>booking</c>
      <c>Reservation and resource allocation</c>
      <c>payments</c>
      <c>Financial transactions and confirmations</c>
      <c>agents</c>
      <c>Delegation and collaboration with other agents</c>
      <c>escalation</c>
      <c>Escalation routing and handler management</c>
      <c>activation</c>
      <c>Governed agent package activation (ACTIVATE method extension)</c>
      <c>*</c>
      <c>All domains require explicit grant; use with caution</c>
</texttable>

</section>
<section anchor="example-agtp-wire-formats"><name>Example AGTP Wire Formats</name>

<t>The following examples use a human-readable pseudo-wire format with
HTTP-style headers followed by a JSON body. The Content-Type for all AGTP
message bodies is application/agtp+json.</t>

<section anchor="query-request-and-response"><name>QUERY Request and Response</name>

<figure><artwork><![CDATA[
AGTP/1.0 QUERY
Agent-ID: agt-7f3a9c2d
Principal-ID: usr-chris-hood
Authority-Scope: documents:query knowledge:query
Session-ID: sess-a1b2c3d4
Task-ID: task-0042
TTL: 3000
Content-Type: application/agtp+json

{
  "task_id": "task-0042",
  "parameters": {
    "intent": "Key arguments against MCP in the context
             of HTTP overhead",
    "scope": ["documents:research", "knowledge:session"],
    "format": "structured",
    "confidence_threshold": 0.75
  }
}

AGTP/1.0 200 OK
Task-ID: task-0042
Server-Agent-ID: srv-knowledge-01
Attribution-Record: [signed attribution token]
Content-Type: application/agtp+json

{
  "status": 200,
  "task_id": "task-0042",
  "result": {
    "results": [{"content": "...", "source": "doc-agtp-research",
                 "confidence": 0.91}],
    "result_count": 1
  }
}
]]></artwork></figure>

</section>
<section anchor="book-request-and-response"><name>BOOK Request and Response</name>

<figure><artwork><![CDATA[
AGTP/1.0 BOOK
Agent-ID: agt-travel-planner
Principal-ID: usr-chris-hood
Authority-Scope: booking:* calendar:book
Session-ID: sess-trip-2026-04
Task-ID: task-0107
Priority: normal
Content-Type: application/agtp+json

{
  "method": "BOOK",
  "task_id": "task-0107",
  "parameters": {
    "resource_id": "flight-AA2847",
    "principal_id": "usr-chris-hood",
    "time_slot": "2026-04-15T08:00:00Z",
    "options": {"seat_preference": "aisle", "class": "economy"},
    "confirm_immediately": true
  }
}

AGTP/1.0 200 OK
Task-ID: task-0107
Attribution-Record: [signed attribution token]
Content-Type: application/agtp+json

{
  "status": 200,
  "task_id": "task-0107",
  "result": {
    "booking_id": "BK-2026-0107",
    "status": "confirmed",
    "resource_id": "flight-AA2847",
    "confirmation_code": "XQRT7Y"
  }
}
]]></artwork></figure>

</section>
<section anchor="escalate-request-and-response"><name>ESCALATE Request and Response</name>

<figure><artwork><![CDATA[
AGTP/1.0 ESCALATE
Agent-ID: agt-procurement-03
Principal-ID: usr-finance-dept
Authority-Scope: booking:* payments:confirm
Session-ID: sess-procurement-q2
Task-ID: task-0881
Priority: urgent
Content-Type: application/agtp+json

{
  "method": "ESCALATE",
  "task_id": "task-0881",
  "parameters": {
    "task_id": "task-0880",
    "reason": "scope_limit",
    "context": {
      "attempted_action": "BOOK",
      "resource": "vendor-contract-750k",
      "block_reason": "Contract value exceeds agent
                  authorization threshold"
    },
    "recipient": "usr-cfo",
    "deadline": "2026-03-19T09:00:00Z"
  }
}

AGTP/1.0 202 Accepted
Task-ID: task-0881
Server-Agent-ID: srv-escalation-handler
Content-Type: application/agtp+json

{
  "status": 202,
  "task_id": "task-0881",
  "result": {
    "escalation_id": "ESC-0881",
    "routed_to": "usr-cfo",
    "status": "pending_review",
    "task_paused": true,
    "estimated_review_by": "2026-03-19T09:00:00Z"
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="comparison-table"><name>Comparison Table</name>

<texttable title="AGTP Compared to Existing Approaches">
      <ttcol align='left'>Criterion</ttcol>
      <ttcol align='left'>AGTP</ttcol>
      <ttcol align='left'>HTTP/REST</ttcol>
      <ttcol align='left'>gRPC</ttcol>
      <ttcol align='left'>A2A / MCP</ttcol>
      <c>Agent-native methods</c>
      <c>Yes</c>
      <c>No</c>
      <c>No</c>
      <c>Partial</c>
      <c>Intent semantics at protocol level</c>
      <c>Native</c>
      <c>None</c>
      <c>None</c>
      <c>Messaging layer only</c>
      <c>Built-in agent identity</c>
      <c>Yes</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>Authority scope enforcement</c>
      <c>Protocol-level</c>
      <c>None</c>
      <c>None</c>
      <c>Application-layer</c>
      <c>Built-in attribution/audit</c>
      <c>Yes</c>
      <c>No</c>
      <c>No</c>
      <c>Varies by impl.</c>
      <c>Transport flexibility</c>
      <c>TCP/UDP/QUIC</c>
      <c>TCP/TLS</c>
      <c>HTTP/2</c>
      <c>HTTP</c>
      <c>Escalation as first-class primitive</c>
      <c>Yes</c>
      <c>No</c>
      <c>No</c>
      <c>No</c>
      <c>Ecosystem maturity</c>
      <c>Proposed</c>
      <c>Mature</c>
      <c>Mature</c>
      <c>Emerging</c>
      <c>Governance/observability</c>
      <c>Native</c>
      <c>Manual/bolt-on</c>
      <c>Manual</c>
      <c>Limited</c>
      <c>Method registry extensibility</c>
      <c>Yes (Expert Review)</c>
      <c>Frozen (IETF Review)</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>Open core / royalty-free</c>
      <c>Yes</c>
      <c>Yes</c>
      <c>Yes</c>
      <c>Yes</c>
</texttable>

<t>HTTP's method registry (registered with IETF Review per <xref target="RFC9110"/>) is
effectively frozen for new semantic methods because any new HTTP method
must be backward-compatible with existing HTTP infrastructure globally.
AGTP's Expert Review + published spec procedure enables the protocol to
evolve its method vocabulary as the agent ecosystem develops, without
the backward-compatibility constraints of the HTTP method space.</t>

</section>
<section anchor="glossary"><name>Glossary</name>

<dl>
  <dt>Agent:</dt>
  <dd>
    <t>A software system that executes tasks, makes decisions, and takes
actions without continuous human supervision per transaction.</t>
  </dd>
  <dt>Agent Transfer Protocol (AGTP):</dt>
  <dd>
    <t>The application-layer protocol defined in this document, providing a
dedicated transport environment for agent traffic.</t>
  </dd>
  <dt>Agent-ID:</dt>
  <dd>
    <t>A unique identifier for a specific agent instance, present in all AGTP
request headers. In the base spec, self-asserted. With <xref target="AGTP-CERT"/>,
cryptographically bound to a verified identity.</t>
  </dd>
  <dt>Attribution Record:</dt>
  <dd>
    <t>A signed, logged record of an agent action, sufficient for audit and
compliance purposes.</t>
  </dd>
  <dt>Authority-Scope:</dt>
  <dd>
    <t>A declared set of permissions defining what actions an agent is
authorized to take, expressed as space-separated domain:action tokens.</t>
  </dd>
  <dt>Delegation Chain:</dt>
  <dd>
    <t>An ordered record of Agent-IDs representing the sequence of delegations
that led to the current request.</t>
  </dd>
  <dt>ESCALATE:</dt>
  <dd>
    <t>An AGTP method representing an agent's intentional deferral of a decision
or action to a human principal or higher-authority agent. A first-class
method, not a failure code.</t>
  </dd>
  <dt>Intent Verb:</dt>
  <dd>
    <t>An AGTP method name expressing the agent's purpose, as distinguished from
HTTP resource-operation verbs (GET, POST, PUT, DELETE).</t>
  </dd>
  <dt>Method Registry:</dt>
  <dd>
    <t>The IANA-maintained registry of valid AGTP method names and their
specifications. Registration requires Expert Review and a published
specification.</t>
  </dd>
  <dt>Principal:</dt>
  <dd>
    <t>The human, organization, or system that authorized an agent to act and
is accountable for its actions.</t>
  </dd>
  <dt>Principal-ID:</dt>
  <dd>
    <t>The identifier of the principal on whose behalf an agent operates,
present in all AGTP request headers.</t>
  </dd>
  <dt>Scope-Enforcement Point (SEP):</dt>
  <dd>
    <t>An AGTP-aware infrastructure component, load balancer, gateway, proxy,
that enforces Authority-Scope compliance on AGTP requests without
application-layer access. Requires <xref target="AGTP-CERT"/>.</t>
  </dd>
  <dt>Scope Violation (451):</dt>
  <dd>
    <t>An AGTP status code returned when an agent requests an action outside its
declared Authority-Scope. A governance signal, not a protocol error.
<strong>MUST</strong> be logged.</t>
  </dd>
  <dt>Session:</dt>
  <dd>
    <t>An AGTP persistent connection context shared across multiple method
invocations within a single agent workflow.</t>
  </dd>
  <dt>551 Authority Chain Broken:</dt>
  <dd>
    <t>An AGTP status code returned when one or more entries in the
Delegation-Chain header cannot be verified as part of a valid and
continuous delegation sequence. <strong>MUST</strong> be logged.</t>
  </dd>
</dl>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

