<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-yao-catalist-problem-space-analysis-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="AI Agent Protocol, A2A, MCP ">Problem Space Analysis of AI Agent Protocols in IETF</title>
    <seriesInfo name="Internet-Draft" value="draft-yao-catalist-problem-space-analysis-00"/>
    <author initials="K." surname="Yao" fullname="Kehan Yao">
      <organization>China Mobile</organization>
      <address>
        <email>yaokehan@chinamobile.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="15"/>
    <abstract>
      <?line 29?>

<t>This document aims to align with CATALIST BoF's goal for identifying IETF-relevant problem space and potential areas and working groups, exploring internal and external coordination for AI Agent protocols by analyzing open source efforts. It may serve as a target for CATALIST BoF discussions.</t>
    </abstract>
  </front>
  <middle>
    <?line 33?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>With the rapid development of AI technology, AI Agents have become key Internet interaction entities, driving growing demand for Agent-to-Agent (A2A) and Agent-to-Tool (A2T) interworking. Open source communities like A2A, Model Context Protocol (MCP) are actively advancing related protocols. While these efforts lay a preliminary foundation, there are still some missing pieces and potential protocol design space that could be handled by standardization body like IETF.</t>
      <t>IETF has held multiple side meetings on AI agent protocol during IETF 123 and 124, bringing discussions over AI agent identity and identifier, discovery, interaction, authorization, and multi-modal transport. These meetings clarified key directions and highlighted standardization urgency.</t>
      <t>Coordinating A2A list of efforts (CATALIST) BoF meeting is approved to facilitate consensus on the actual scope that IETF should work on, figure out potential area(s) and working group(s) to proceed the work, and explore coordination activities in and out IETF.</t>
      <t>This document does not propose any detailed solution or protocol, but tries to propose the problem space that IETF may care about by analyzing open source projects efforts. This document may serve as a target document for CATALIST BoF meeting discussion.</t>
    </section>
    <section anchor="definition-of-terms">
      <name>Definition of Terms</name>
      <t>** AI Agent: An autonomous, adaptive intelligent entity that perceives the environment, makes decisions, executes actions, and interacts with other Agents, tools, or humans to complete tasks.</t>
      <t>** A2A: Agent-to-Agent, Interconnection and interaction between AI Agents (data transmission, context sharing, collaboration) standardized by dedicated protocols for cross-vendor interoperability.</t>
      <t>** A2T: Agent-to-Tool, Interaction between AI Agents and external tools (APIs, databases, etc.), focusing on standardizing tool invocation to leverage external resources efficiently.</t>
    </section>
    <section anchor="inter-domain-discovery">
      <name>Problem Space Issue 1: Inter-domain Discovery</name>
      <section anchor="a2a-coverage">
        <name>A2A Coverage</name>
        <t>Existing A2A protocol (as analyzed from available open source schema definitions <xref target="A2A-spec"/>) provides a foundational discovery mechanism centered on the "Agent Card" construct, which encapsulates critical metadata foragent identification and interaction:</t>
        <t>** Core Metadata: Agents advertise identity (name, version, provider), capabilities, skills, authentication requirements, input/output modes, and communication interfaces (URLs, protocol bindings) via the Agent Card.</t>
        <t>** Static Retrieval: Protocols support direct retrieval of Agent Card metadata via dedicated requests (e.g., Get Agent Card Request), enabling clients to obtain necessary information to initiate communication.</t>
        <t>** Tenant Differentiation: A "tenant" field supports basic multi-tenancy, allowing agents to serve multiple isolated groups within a single administrative domain.</t>
        <t>** Extension Points: Agent Extension allows agents to declare custom protocol extensions, enabling domain-specific discovery metadata.</t>
      </section>
      <section anchor="mcp-coverage">
        <name>MCP Coverage</name>
        <t>MCP is a typical A2T protocol. Existing MCP protocol (as analyzed from available open source schema definitions <xref target="MCP-spec"/>).</t>
        <t>TBD.</t>
      </section>
      <section anchor="gaps-and-potential-work-space-in-open-internet">
        <name>Gaps and Potential Work Space in Open Internet</name>
        <t>The current discovery mechanisms are insufficient for open Internet deployments, where agents and clients operate across administrative domains, lack pre-configured knowledge of each other, and require dynamic, secure discovery. Current A2A protocol allow three types of extension on discovery mechanisms. A Well-known URI labelled by server domain, registry or catalog based approach, and direct configuration. Based on this, in open Internet, the following should be considered:</t>
        <t>** Dynamic Directory Services: Open Internet scenarios require agents to be discoverable via standardized directory services or registries. The current model relies on clients having prior knowledge of an agent's URL to retrieve its Agent Card, preventing "directory-based discovery" of unknown agents.</t>
        <t>** Cross-Domain Addressing: There is no standardized mechanism for resolving agent identifiers to network locations across domains.</t>
        <t>** Domain Identification and Trust: Protocols lack standardized "domain" identifiers (e.g., Fully Qualified Domain Name (FQDN) of the network domain) and mechanisms to express cross-domain trust relationships. Clients cannot easily determine an agent's domain or whether their local domain trusts it.</t>
        <t>** Dynamic Metadata Synchronization: Agent Card updates (e.g.,capability changes, endpoint updates) are not propagated across domains. Cross-domain clients may rely on stale metadata, leading to failed interactions.</t>
      </section>
    </section>
    <section anchor="session-state-management">
      <name>Problem Space Issue 2: End-to-End Session State Management</name>
      <section anchor="a2a-coverage-1">
        <name>A2A Coverage</name>
        <t>Existing A2A protocol creates a "TASK" object struct, which serves as the core unit of session management, providing a robust foundation for tracking interaction lifecycles between AI agents:</t>
        <t>** Task Object: A Task aggregates all session-related state, including a unique id (task_ID), status (the current status of a Task, including state and a message), history (message log), artifacts (task outputs),and contextId (Unique identifier for the contextual collection of interactions).</t>
        <t>** Interaction State Machine: A comprehensive state machine(SUBMITTED, WORKING, COMPLETED, FAILED, CANCELED,INPUT_REQUIRED, AUTH_REQUIRED, REJECTED) covers key interaction scenarios, including user input prompts and authentication interruptions.</t>
        <t>** Synchronous/Asynchronous/Streaming Modes: Protocol supports synchronous requests, asynchronous requests (via "pushNotifications"), and streaming responses for incremental results.</t>
      </section>
      <section anchor="gaps-and-potential-work-space-in-open-internet-1">
        <name>Gaps and Potential Work Space in Open Internet</name>
        <t>While the core session model is relatively robust, open Internet deployments impose additional requirements for reliability, and interoperability across heterogeneous implementations:</t>
        <t>** Session Timeout and Expiration: A2A Protocol lacks standardized session timeout, idle timeout, and expiration mechanisms. Servers cannot automatically clean up stale sessions, leading to resource leaks, and clients cannot reliably determine if a session is still valid.</t>
        <t>** Context Propagation Rules: While contextId supports cross-task context, A2A protocol does not standardize how context is inherited (e.g., which fields are carried over to new tasks), truncated (e.g., handling long message histories), or merged (e.g., combining contexts from multiple agents). This leads to inconsistent behavior across implementations.</t>
        <t>** Session Recovery and Reconnection: The protocol lacks detailed mechanisms to recover sessions after network disconnections. Clients cannot resume streaming responses, confirm the last received message, or continue partial task execution.</t>
        <t>** User-Session Binding: Protocols only support tenant isolation but lack standardized user identity fields. This prevents user-level session isolation, cross-device session synchronization, and user-specific session management.</t>
        <t>** Extended State Semantics: The state machine lacks semantics for long-running interactions, such as SUSPENDED (temporarily paused), or PENDING_EXTERNAL (e.g., waiting for a response from an external system). This forces long-running tasks to remain in WORKING state, leading to ambiguous semantics.</t>
      </section>
    </section>
    <section anchor="fine-grained-authorization">
      <name>Problem Space Issue 3: Fine-Grained Authorization</name>
      <section anchor="a2a-coverage-2">
        <name>A2A Coverage</name>
        <t>Existing A2A protocol provides a foundational authorization framework covering high-level access control requirements:</t>
        <t>** OAuth Scope Support: OAuth 2.0 flows support coarse-grained permission grants.</t>
      </section>
      <section anchor="mcp-coverage-1">
        <name>MCP Coverage</name>
        <t>TBD.</t>
      </section>
      <section anchor="gaps-and-potential-work-space-in-open-internet-2">
        <name>Gaps and Potential Work Space in Open Internet</name>
        <t>The current authorization framework is insufficient for open Internet deployments, where cross-domain access, fine-grained resource control,and dynamic trust relationships are required:</t>
        <t>** Resource-Level Authorization: Protocols only support agent-level authorization. There is no mechanism to enforce permissions at the resource level (e.g., Task, Artifact, or Message), preventing use cases such as "allow read access to this task but not that one".</t>
        <t>** Delegation Authorization: Cross-domain and multi-agent scenarios require delegation (e.g., Agent A acting on behalf of a user to access Agent B). Protocols lack standardized delegation mechanisms, including delegation scope, time limits,and revocation.</t>
        <t>** Cross-Domain Permission Propagation: When an agent delegates a task to a cross-domain agent, there is no mechanism to propagate permissions in a controlled manner (e.g., "Agent A can access Agent B's read skill on behalf of the user, but not write"). This leads to either over-privileged delegation or failed cross-domain interactions.</t>
        <t>** Authorization Auditing: There is no standardized mechanism to log authorization events (e.g., who accessed what resource, when, with what permission). This hinders compliance with regulatory requirements and security incident investigation.</t>
      </section>
    </section>
    <section anchor="multi-modal-transport">
      <name>Problem Space Issue 4: Multi-Modal Transport</name>
      <section anchor="a2a-coverage-3">
        <name>A2A Coverage</name>
        <t>Existing A2A protocols provide a foundational multi-modal transmission framework centered on the "part" construct, enabling exchange of diverse data types:</t>
        <t>** Unified Multi-Modal Carrier: The "part" construct supports multiple data types, including text, binary data, etc., with "mediaType" to indicate the data format(e.g., text/plain, application/json, image/png).</t>
        <t>** Streaming Multi-Modal Transmission: The protocol supports incremental transmission of multi-modal data, including (e.g.,streaming video frames, incremental text + images).</t>
      </section>
      <section anchor="gaps-and-potential-work-space-in-open-internet-3">
        <name>Gaps and Potential Work Space in Open Internet</name>
        <t>While the core multi-modal framework is functional, open Internet deployments require additional support for large data, dynamic adaptation, and interactive use cases:</t>
        <t>** Large File and Chunked Transmission: There is no support for chunked upload/download of large multi-modal data (e.g., videos, high-resolution images). The raw field uses base64 encoding for binary data, which is inefficient for large files, and there is no mechanism for hash verification.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Beyond identity authentication and authorization, Agent interconnection faces additional security challenges that require IETF attention to ensure ecosystem security and trustworthiness.</t>
      <t>** Data Encryption: All Agents interaction data (context, task requests, results) must be encrypted in transit  and at rest to prevent tampering. The IETF should enforce encryption requirements for multi-modal data and ensure compatibility with existing TLS standards.</t>
      <t>** Anonymity and Privacy: Agent interactions may involve sensitive user/Agent data. The IETF should investigate privacy-preserving mechanisms to protect data while enabling effective interconnection.</t>
      <t>** Malicious Agent Mitigation: Malicious Agents may launch prompt injection, or spoofing attacks. The IETF should investigate attack detection and mitigation mechanisms.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="MCP-spec" target="https://modelcontextprotocol.io/specification/2025-11-25/basic/authorization">
        <front>
          <title>MCP Specification</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="A2A-spec" target="https://a2a-protocol.org/latest/definitions/">
        <front>
          <title>A2A Specification</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
    </references>
    <?line 171?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
