<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 4.0.1) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc compact="yes"?>

<rfc ipr="trust200902" docName="draft-teodor-pilot-problem-statement-01" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Agent Network Problem Statement">Problem Statement: Network-Layer Infrastructure for Autonomous Agent Communication</title>

    <author initials="C." surname="Teodor" fullname="Calin Teodor">
      <organization>Vulture Labs</organization>
      <address>
        <email>teodor@vulturelabs.com</email>
      </address>
    </author>

    <date year="2026" month="April" day="06"/>

    <area>Internet</area>
    <workgroup>Independent Submission</workgroup>
    

    <abstract>


<?line 129?>

<t>AI agents --- autonomous software entities capable of reasoning, planning,
and executing tasks --- are an increasingly important class of network
participant. Current agent communication protocols operate exclusively at
the application layer over HTTP, assuming the existence of stable endpoints,
DNS names, and centralized infrastructure. No existing standard provides
network-layer identity, addressing, or transport for agents. This document
describes the problem space and identifies requirements for a network-layer
infrastructure that would give agents first-class network citizenship,
independent of the web infrastructure designed for human users.</t>



    </abstract>



  </front>

  <middle>


<?line 141?>

<section anchor="introduction"><name>Introduction</name>

<t>The internet's protocol stack was designed for human-operated devices with
stable network attachments. IP addresses identify interfaces, DNS names
identify services, and TLS certificates identify organizations. These
assumptions break down for AI agents, which are transient software
processes that may run behind NAT, migrate between hosts, and lack
persistent network identity.</t>

<t>Recent standardization efforts for agent communication --- notably MCP
<xref target="MCP"/> (agent-to-tool) and A2A <xref target="A2A"/> (agent-to-agent) --- have focused
on application-layer protocols built on HTTP. These protocols define what
agents say to each other but assume the underlying problem of how agents
reach each other is already solved. For agents running in cloud
environments with public endpoints, this assumption holds. For agents
running on edge devices, behind corporate firewalls, on laptops, or in
heterogeneous multi-cloud deployments, it does not.</t>

<t>The IETF has seen explosive activity in AI agent protocol
standardization, with over thirty individual drafts filed in 2025-2026
covering agent identity (<xref target="I-D.prakash-aip"/>, <xref target="I-D.ni-wimse-ai-agent-identity"/>),
discovery (<xref target="I-D.nemethi-aid-agent-identity-discovery"/>), transport
(<xref target="I-D.hood-independent-agtp"/>, <xref target="I-D.li-atp"/>), routing
(<xref target="I-D.du-catalist-routing-considerations"/>), frameworks
(<xref target="I-D.rosenberg-aiproto-framework"/>, <xref target="I-D.zyyhl-agent-networks-framework"/>,
<xref target="I-D.eckert-catalist-acip-framework"/>), and audit
(<xref target="I-D.sharif-agent-audit-trail"/>). The CATALIST Birds of a Feather
session at IETF 125 (March 2026, Shenzhen) was the first formal
coordination effort, surveying the problem space
(<xref target="I-D.yao-catalist-problem-space-analysis"/>) without yet chartering a
working group.</t>

<t>Despite this volume, the vast majority of these drafts operate at the
application layer over HTTP. Even the dedicated transport proposals
(AGTP, ATP) define application-layer semantics carried over QUIC or TCP
--- none provides an overlay network with virtual addressing, port-based
multiplexing, and built-in NAT traversal at the network layer. The
network-layer gap identified in the original version of this document
remains unaddressed.</t>

<t>This document describes the problem of network-layer infrastructure for
autonomous agent communication, identifies the gaps in existing protocols,
and states requirements for a solution. It is modeled after <xref target="RFC7364"/>,
which performed a similar analysis for network virtualization overlays.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<dl>
  <dt>Agent:</dt>
  <dd>
    <t>An autonomous software entity capable of reasoning, planning, and
executing tasks without continuous human supervision. An agent may run as
a process, container, or serverless function.</t>
  </dd>
  <dt>Overlay Network:</dt>
  <dd>
    <t>A virtual network built on top of an existing network (the underlay).
Overlay nodes communicate using encapsulated packets carried over the
underlay.</t>
  </dd>
  <dt>Virtual Address:</dt>
  <dd>
    <t>A network address assigned within the overlay address space, independent
of the underlay IP address. A virtual address identifies an agent, not a
network interface.</t>
  </dd>
  <dt>Registry:</dt>
  <dd>
    <t>A service that assigns virtual addresses, maintains an address-to-locator
mapping table, and provides bootstrap information for overlay
participants.</t>
  </dd>
  <dt>Trust Handshake:</dt>
  <dd>
    <t>A protocol exchange through which two agents establish a bilateral trust
relationship with explicit mutual consent.</t>
  </dd>
</dl>

</section>
<section anchor="problem-description"><name>Problem Description</name>

<section anchor="agent-identity-is-coupled-to-infrastructure"><name>Agent Identity Is Coupled to Infrastructure</name>

<t>In current practice, agents are identified by URLs, DNS names, or API
endpoints --- all of which are tied to the infrastructure hosting the
agent, not to the agent itself. When an agent migrates to a different host,
changes cloud provider, or restarts behind a different NAT binding, its
identity changes. There is no stable identifier that follows an agent
across these transitions.</t>

<t>This is analogous to the identity/locator conflation problem in IP
networking, which motivated the Locator/ID Separation Protocol (LISP)
<xref target="RFC9300"/>. In LISP, Endpoint Identifiers (EIDs) are separated from
Routing Locators (RLOCs) so that an endpoint's identity is independent of
its network attachment point. Agents need the same separation: a permanent
identity that is independent of the transient infrastructure hosting them.</t>

<t>The A2A protocol <xref target="A2A"/> identifies agents via "Agent Cards" served at
well-known HTTPS URLs. The Agent URI scheme <xref target="I-D.narvaneni-agent-uri"/>
proposes <spanx style="verb">agent://</spanx> URIs but still requires DNS-resolvable endpoints.
Both approaches require the agent to maintain a stable, publicly
reachable web endpoint --- a requirement that excludes agents running on
edge devices, behind NAT, or in ephemeral compute environments.</t>

</section>
<section anchor="no-peer-to-peer-communication-without-web-infrastructure"><name>No Peer-to-Peer Communication Without Web Infrastructure</name>

<t>Both MCP <xref target="MCP"/> and A2A <xref target="A2A"/> require HTTP endpoints for communication.
This means every agent must either have a publicly routable IP address or
be fronted by a reverse proxy, load balancer, or API gateway. For two
agents behind NAT to communicate, at least one must provision web
infrastructure as an intermediary.</t>

<t>NAT traversal is a solved problem for specific domains: WebRTC handles it
for browsers (at the cost of ICE/DTLS-SRTP/SDP negotiation complexity),
and WireGuard <xref target="WIREGUARD"/> handles it for VPN tunnels. But no existing
protocol provides NAT traversal specifically designed for agent-to-agent
communication, with agent-native addressing and trust semantics.</t>

<t>An estimated 88% of real-world network environments involve some form of
NAT. Agents running on laptops, IoT devices, edge servers, and mobile
phones cannot participate in HTTP-based agent protocols without significant
infrastructure provisioning.</t>

</section>
<section anchor="no-agent-native-trust-model"><name>No Agent-Native Trust Model</name>

<t>Existing trust models were designed for different participants:</t>

<t><list style="symbols">
  <t>TLS: Trust is anchored in Certificate Authorities. Agents would need to
obtain and manage X.509 certificates, adding operational complexity
disproportionate to many agent interactions.</t>
  <t>SSH: Trust-on-first-use (TOFU) assumes a human operator who can verify a
host key fingerprint. Autonomous agents have no human in the loop.</t>
  <t>OAuth/OIDC: Designed for user-to-service authorization, not peer-to-peer
agent trust. Requires an authorization server as a trusted third party.</t>
</list></t>

<t>None of these models provide bilateral consent --- the property that both
parties must explicitly agree before a communication relationship is
established. For autonomous entities that may be operated by different
organizations, bilateral consent is a natural trust primitive: neither
agent should be reachable by the other until both have agreed.</t>

</section>
<section anchor="no-lightweight-transport-for-agent-streams"><name>No Lightweight Transport for Agent Streams</name>

<t>TCP and QUIC <xref target="RFC9000"/> are general-purpose transports optimized for web
traffic patterns (request-response, large transfers, multiplexed streams).
Agent communication patterns differ:</t>

<t><list style="symbols">
  <t>Many agents exchange small, frequent messages (status updates, task
delegations, sensor readings) where connection setup overhead dominates.</t>
  <t>Agents often maintain long-lived bidirectional streams for event-driven
architectures, where TCP's head-of-line blocking is problematic.</t>
  <t>Agents may need port-based service multiplexing (echo on one port, task
submission on another, events on a third) --- a concept that exists in
TCP/UDP but has no equivalent in HTTP-based agent protocols.</t>
</list></t>

<t>While QUIC addresses head-of-line blocking through multiplexed streams, it
does not provide agent addressing, discovery, or trust semantics. A
transport designed for agents could provide these as built-in capabilities
rather than requiring them to be layered on top.</t>

</section>
<section anchor="privacy-gaps-in-agent-discovery"><name>Privacy Gaps in Agent Discovery</name>

<t>Current agent discovery mechanisms are designed for visibility:</t>

<t><list style="symbols">
  <t>A2A Agent Cards are intended to be publicly discoverable at well-known
URLs.</t>
  <t>DNS-SD and mDNS broadcast service availability to all listeners on a
network segment.</t>
  <t>HTTP-based service registries typically allow any authenticated client to
enumerate all registered services.</t>
</list></t>

<t>For agents, the default should be the opposite. An agent's existence and
capabilities should not be disclosed to parties that have not been
explicitly authorized. Mass enumeration of agent endpoints creates attack
surface (reconnaissance for exploitation) and privacy risks (mapping an
organization's agent infrastructure).</t>

<t>A privacy-by-default discovery model --- where agents are invisible until
they explicitly opt in to specific peer relationships --- has no equivalent
in current standards.</t>

</section>
<section anchor="no-multi-tenant-network-isolation"><name>No Multi-Tenant Network Isolation</name>

<t>Current agent protocols assume flat, single-tenant deployments where all
agents share the same namespace and trust domain. In practice,
organizations deploy multiple agent teams serving different departments,
projects, or customers. These teams need isolation:</t>

<t><list style="symbols">
  <t>Agents in one project should not observe or interfere with agents in
another.</t>
  <t>Administrative control (who can join a network, what ports are
accessible, who can modify policy) should be scoped per network, not
global.</t>
  <t>Compliance requirements (SOC 2, GDPR, HIPAA) demand audit trails
recording who did what, when, and to which network --- at the
infrastructure layer, not bolted on at the application layer.</t>
</list></t>

<t>No existing agent protocol or draft addresses multi-tenancy, role-based
access control, or per-network policy enforcement. The closest analog is
cloud VPC isolation, but VPCs operate at the IP layer and require cloud
provider infrastructure. Agent networks need the same isolation primitives
at the overlay layer, independent of the underlying cloud or network
topology.</t>

</section>
</section>
<section anchor="requirements-for-a-solution"><name>Requirements for a Solution</name>

<t>Based on the problems identified above, a network-layer infrastructure for
agent communication should satisfy the following requirements:</t>

<section anchor="virtual-addressing"><name>Virtual Addressing</name>

<dl newline="true">
  <dt>REQ-1:</dt>
  <dd>
    <t>Agents <bcp14>MUST</bcp14> receive stable virtual addresses that are independent of
their underlying IP address, network attachment point, and hosting
infrastructure.</t>
  </dd>
  <dt>REQ-2:</dt>
  <dd>
    <t>The addressing scheme <bcp14>MUST</bcp14> support hierarchical grouping (e.g., network
or topic-based segmentation) to enable scoped communication boundaries.</t>
  </dd>
</dl>

</section>
<section anchor="nat-traversal"><name>NAT Traversal</name>

<dl newline="true">
  <dt>REQ-3:</dt>
  <dd>
    <t>The system <bcp14>MUST</bcp14> provide automatic NAT traversal without requiring manual
configuration of port forwarding, firewall rules, or relay proxies by the
agent operator.</t>
  </dd>
  <dt>REQ-4:</dt>
  <dd>
    <t>NAT traversal <bcp14>MUST</bcp14> support direct peer-to-peer communication where
possible, with transparent relay fallback when direct communication is
not achievable.</t>
  </dd>
</dl>

</section>
<section anchor="bilateral-trust-model"><name>Bilateral Trust Model</name>

<dl newline="true">
  <dt>REQ-5:</dt>
  <dd>
    <t>Communication between agents <bcp14>MUST</bcp14> require explicit bilateral consent.
Neither agent should be reachable by the other until both have agreed to
establish a trust relationship.</t>
  </dd>
  <dt>REQ-6:</dt>
  <dd>
    <t>Trust relationships <bcp14>MUST</bcp14> be revocable. Revoking trust <bcp14>MUST</bcp14> immediately
prevent further communication.</t>
  </dd>
</dl>

</section>
<section anchor="lightweight-encrypted-transport"><name>Lightweight Encrypted Transport</name>

<dl newline="true">
  <dt>REQ-7:</dt>
  <dd>
    <t>The transport <bcp14>MUST</bcp14> provide reliable, ordered byte stream delivery
(TCP-equivalent) and unreliable datagram delivery (UDP-equivalent) over
the overlay.</t>
  </dd>
  <dt>REQ-8:</dt>
  <dd>
    <t>Encryption <bcp14>MUST</bcp14> be enabled by default for all data in transit, with no
opt-in required from the agent developer.</t>
  </dd>
  <dt>REQ-9:</dt>
  <dd>
    <t>The transport <bcp14>MUST</bcp14> support port-based service multiplexing, allowing an
agent to expose multiple services on different virtual ports.</t>
  </dd>
</dl>

</section>
<section anchor="privacy-by-default-discovery"><name>Privacy-by-Default Discovery</name>

<dl newline="true">
  <dt>REQ-10:</dt>
  <dd>
    <t>Agents <bcp14>MUST</bcp14> be private by default. An agent's virtual address, physical
locator, and capabilities <bcp14>MUST NOT</bcp14> be disclosed to parties without an
established trust relationship or shared group membership.</t>
  </dd>
  <dt>REQ-11:</dt>
  <dd>
    <t>It <bcp14>MUST</bcp14> be possible to establish trust with a private agent without
first knowing its physical network location (i.e., via a trusted relay
or rendezvous mechanism).</t>
  </dd>
</dl>

</section>
<section anchor="multi-tenant-isolation"><name>Multi-Tenant Isolation</name>

<dl newline="true">
  <dt>REQ-12:</dt>
  <dd>
    <t>The system <bcp14>MUST</bcp14> support isolated network segments with independent
membership control, role-based access (at minimum: owner, administrator,
and member roles), and per-network policy enforcement. Operations within
one network <bcp14>MUST NOT</bcp14> affect agents in another network.</t>
  </dd>
</dl>

</section>
<section anchor="audit-and-compliance"><name>Audit and Compliance</name>

<dl newline="true">
  <dt>REQ-13:</dt>
  <dd>
    <t>The system <bcp14>MUST</bcp14> provide an audit trail recording security-relevant
operations including node registration and deregistration, trust
relationship changes, network membership modifications, role assignments,
and policy updates. Audit records <bcp14>MUST</bcp14> include timestamps, actor
identifiers, and old/new values for state mutations.</t>
  </dd>
</dl>

</section>
</section>
<section anchor="existing-approaches-and-gaps"><name>Existing Approaches and Gaps</name>

<section anchor="mcp-model-context-protocol"><name>MCP (Model Context Protocol)</name>

<t>MCP <xref target="MCP"/> standardizes the interface between AI models and external
tools/resources. It uses JSON-RPC over HTTP with Server-Sent Events for
streaming. MCP addresses agent-to-tool communication, not agent-to-agent
communication, and provides no network-layer capabilities. It assumes
agents can reach tool servers via HTTP.</t>

</section>
<section anchor="a2a-agent-to-agent-protocol"><name>A2A (Agent-to-Agent Protocol)</name>

<t>A2A <xref target="A2A"/> defines a protocol for agent interoperability: Agent Cards for
discovery, task lifecycle management, and multimodal message exchange. A2A
operates entirely over HTTP/HTTPS. It provides no NAT traversal, no
overlay addressing, no built-in encryption beyond TLS, and no bilateral
trust model. It assumes agents have reachable HTTP endpoints.</t>

</section>
<section anchor="webrtc"><name>WebRTC</name>

<t>WebRTC provides peer-to-peer communication with NAT traversal via ICE,
encryption via DTLS-SRTP, and data channels via SCTP. However, WebRTC was
designed for browser-based audio/video communication. Its complexity
(ICE candidate gathering, SDP offer/answer negotiation, DTLS-SRTP key
exchange) is disproportionate for agent message exchange. WebRTC also lacks
agent-specific concepts like virtual addressing, bilateral trust, and
privacy-by-default discovery.</t>

</section>
<section anchor="quic"><name>QUIC</name>

<t>QUIC <xref target="RFC9000"/> provides a modern transport with multiplexed streams,
built-in encryption, and reduced connection setup latency. QUIC addresses
transport-layer concerns but does not provide overlay addressing, agent
identity, NAT traversal coordination, trust management, or discovery. It
is a potential underlay transport for an agent overlay, not a complete
solution.</t>

</section>
<section anchor="libp2p"><name>libp2p</name>

<t>libp2p <xref target="LIBP2P"/> is a modular networking stack developed for
decentralized applications, particularly in the blockchain ecosystem. It
provides peer identity (via cryptographic keypairs), NAT traversal, and
transport multiplexing. libp2p is the closest existing system to the
requirements stated above. However, it uses unstructured peer IDs (not
hierarchical addresses), is heavyweight (large dependency tree), is
oriented toward content-addressed distributed systems rather than agent
communication patterns, and lacks built-in bilateral trust or privacy-by-
default semantics.</t>

</section>
<section anchor="wireguard"><name>WireGuard</name>

<t>WireGuard <xref target="WIREGUARD"/> provides encrypted point-to-point tunnels with
excellent performance. It uses Curve25519 for key exchange and ChaCha20-
Poly1305 for encryption. WireGuard establishes tunnels between known peers
with pre-shared public keys --- it does not provide dynamic discovery,
agent addressing, or trust negotiation. It is a VPN, not an agent network.</t>

</section>
<section anchor="lisp"><name>LISP</name>

<t>The Locator/ID Separation Protocol <xref target="RFC9300"/> <xref target="RFC9301"/> separates
endpoint identity from network location, providing a conceptual precedent
for agent addressing. LISP's EID-to-RLOC mapping system is architecturally
similar to an agent registry that maps virtual addresses to physical
locators. However, LISP operates at the IP layer for routing optimization,
not at the application layer for agent communication. It does not provide
agent-specific trust models, privacy semantics, or built-in services.</t>

</section>
<section anchor="agtp-agent-transfer-protocol"><name>AGTP (Agent Transfer Protocol)</name>

<t>AGTP <xref target="I-D.hood-independent-agtp"/> proposes a dedicated application-layer
protocol for AI agent traffic with agent-native intent methods (QUERY,
SUMMARIZE, DELEGATE, COLLABORATE). It correctly identifies that MCP and
A2A are messaging-layer constructs that do not address the transport
problem. However, AGTP operates over QUIC or TCP/TLS at the application
layer --- it defines what agents say, not how they reach each other. It
provides no overlay addressing, no virtual network primitives, no NAT
traversal, and no multi-tenant isolation.</t>

</section>
<section anchor="atp-agent-transfer-protocol"><name>ATP (Agent Transfer Protocol)</name>

<t>ATP <xref target="I-D.li-atp"/> defines a two-tier architecture where agents connect
to ATP servers, with DNS-based service discovery via SVCB records. It
supports asynchronous messaging, synchronous request/response, and
event-driven streaming. Like AGTP, ATP operates at the application layer
and requires server infrastructure as an intermediary --- the same
dependency on centralized endpoints that HTTP-based protocols impose. It
does not address overlay networking, NAT traversal for serverless agents,
or privacy-by-default semantics.</t>

</section>
<section anchor="aip-agent-identity-protocol"><name>AIP (Agent Identity Protocol)</name>

<t>AIP <xref target="I-D.prakash-aip"/> defines verifiable, delegable identity for AI
agents using Invocation-Bound Capability Tokens (IBCTs) with Ed25519
signatures and Biscuit-based delegation chains. AIP addresses the identity
problem (REQ-1) with a cryptographically strong approach. However, it
focuses exclusively on identity and authorization --- it provides no
transport, addressing, or network-layer primitives. AIP's identity tokens
could complement an overlay network that provides the missing transport
substrate.</t>

</section>
<section anchor="catalist-coordination"><name>CATALIST Coordination</name>

<t>The CATALIST BoF at IETF 125
<xref target="I-D.yao-catalist-problem-space-analysis"/> surveyed the agent protocol
landscape and began scoping what IETF should standardize. The problem
space analysis identified categories including agent identity, discovery,
communication, and governance. Notably, agent network routing
<xref target="I-D.du-catalist-routing-considerations"/> defines forwarding based on
Agent ID, Gateway ID, and Skill --- concepts that overlap with virtual
addressing and service multiplexing. The ACIP framework
<xref target="I-D.eckert-catalist-acip-framework"/> proposes agent-aware network
infrastructure drawing from overlay/underlay designs. These efforts
validate the need for network-layer agent infrastructure but have not
yet produced a concrete protocol specification.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>A network-layer infrastructure for agents introduces security
considerations beyond those of traditional overlay networks:</t>

<dl>
  <dt>Centralized Registry:</dt>
  <dd>
    <t>A registry that assigns addresses and maintains locator mappings is a
trusted third party. Compromise of the registry could allow address
hijacking, locator spoofing, or metadata harvesting. The registry
should support authentication, access control, and replication for high
availability.</t>
  </dd>
  <dt>Overlay Header Metadata:</dt>
  <dd>
    <t>Even with payload encryption, overlay packet headers may expose source
and destination virtual addresses, port numbers, and packet sizes. Traffic
analysis on the overlay is possible even when the underlay is encrypted.</t>
  </dd>
  <dt>Trust Model Assumptions:</dt>
  <dd>
    <t>A bilateral trust model assumes that agents can make informed consent
decisions. If an agent's trust logic is compromised (e.g., by adversarial
prompt injection), it may approve trust relationships it should reject.
The trust model provides a mechanism, not a policy --- the security of
trust decisions depends on the agent's reasoning capability.</t>
  </dd>
  <dt>Key Management:</dt>
  <dd>
    <t>Overlay encryption requires key exchange between peers. Anonymous key
exchange (without identity binding) is vulnerable to man-in-the-middle
attacks. Authenticated key exchange requires a mechanism to distribute
and verify public keys, which depends on the registry's integrity.</t>
  </dd>
  <dt>Multi-Tenant Control Plane:</dt>
  <dd>
    <t>A multi-tenant registry introduces additional attack surface. Per-network
role-based access control must be enforced consistently to prevent
privilege escalation (e.g., a member modifying network policy). Admin
token authentication for privileged operations must use constant-time
comparison to prevent timing attacks. Audit trails must be tamper-evident
and persist across service restarts to support forensic analysis
(see also <xref target="I-D.sharif-agent-audit-trail"/>).</t>
  </dd>
</dl>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC7364">
  <front>
    <title>Problem Statement: Overlays for Network Virtualization</title>
    <author fullname="T. Narten" initials="T." role="editor" surname="Narten"/>
    <author fullname="E. Gray" initials="E." role="editor" surname="Gray"/>
    <author fullname="D. Black" initials="D." surname="Black"/>
    <author fullname="L. Fang" initials="L." surname="Fang"/>
    <author fullname="L. Kreeger" initials="L." surname="Kreeger"/>
    <author fullname="M. Napierala" initials="M." surname="Napierala"/>
    <date month="October" year="2014"/>
    <abstract>
      <t>This document describes issues associated with providing multi-tenancy in large data center networks and how these issues may be addressed using an overlay-based network virtualization approach. A key multi-tenancy requirement is traffic isolation so that one tenant's traffic is not visible to any other tenant. Another requirement is address space isolation so that different tenants can use the same address space within different virtual networks. Traffic and address space isolation is achieved by assigning one or more virtual networks to each tenant, where traffic within a virtual network can only cross into another virtual network in a controlled fashion (e.g., via a configured router and/or a security gateway). Additional functionality is required to provision virtual networks, associating a virtual machine's network interface(s) with the appropriate virtual network and maintaining that association as the virtual machine is activated, migrated, and/or deactivated. Use of an overlay-based approach enables scalable deployment on large network infrastructures.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7364"/>
  <seriesInfo name="DOI" value="10.17487/RFC7364"/>
</reference>
<reference anchor="RFC9000">
  <front>
    <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
    <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9000"/>
  <seriesInfo name="DOI" value="10.17487/RFC9000"/>
</reference>
<reference anchor="RFC9300">
  <front>
    <title>The Locator/ID Separation Protocol (LISP)</title>
    <author fullname="D. Farinacci" initials="D." surname="Farinacci"/>
    <author fullname="V. Fuller" initials="V." surname="Fuller"/>
    <author fullname="D. Meyer" initials="D." surname="Meyer"/>
    <author fullname="D. Lewis" initials="D." surname="Lewis"/>
    <author fullname="A. Cabellos" initials="A." role="editor" surname="Cabellos"/>
    <date month="October" year="2022"/>
    <abstract>
      <t>This document describes the data plane protocol for the Locator/ID Separation Protocol (LISP). LISP defines two namespaces: Endpoint Identifiers (EIDs), which identify end hosts; and Routing Locators (RLOCs), which identify network attachment points. With this, LISP effectively separates control from data and allows routers to create overlay networks. LISP-capable routers exchange encapsulated packets according to EID-to-RLOC mappings stored in a local Map-Cache.</t>
      <t>LISP requires no change to either host protocol stacks or underlay routers and offers Traffic Engineering (TE), multihoming, and mobility, among other features.</t>
      <t>This document obsoletes RFC 6830.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9300"/>
  <seriesInfo name="DOI" value="10.17487/RFC9300"/>
</reference>
<reference anchor="RFC9301">
  <front>
    <title>Locator/ID Separation Protocol (LISP) Control Plane</title>
    <author fullname="D. Farinacci" initials="D." surname="Farinacci"/>
    <author fullname="F. Maino" initials="F." surname="Maino"/>
    <author fullname="V. Fuller" initials="V." surname="Fuller"/>
    <author fullname="A. Cabellos" initials="A." role="editor" surname="Cabellos"/>
    <date month="October" year="2022"/>
    <abstract>
      <t>This document describes the control plane and Mapping Service for the Locator/ID Separation Protocol (LISP), implemented by two types of LISP-speaking devices -- the LISP Map-Resolver and LISP Map-Server -- that provide a simplified "front end" for one or more Endpoint IDs (EIDs) to Routing Locator mapping databases.</t>
      <t>By using this control plane service interface and communicating with Map-Resolvers and Map-Servers, LISP Ingress Tunnel Routers (ITRs) and Egress Tunnel Routers (ETRs) are not dependent on the details of mapping database systems; this behavior facilitates modularity with different database designs. Since these devices implement the "edge" of the LISP control plane infrastructure, connecting EID addressable nodes of a LISP site, the implementation and operational complexity of the overall cost and effort of deploying LISP is reduced.</t>
      <t>This document obsoletes RFCs 6830 and 6833.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9301"/>
  <seriesInfo name="DOI" value="10.17487/RFC9301"/>
</reference>

<reference anchor="I-D.rosenberg-aiproto-framework" target="https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-framework/">
  <front>
    <title>A Framework for AI Protocols</title>
    <author initials="J." surname="Rosenberg">
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="I-D.zyyhl-agent-networks-framework" target="https://datatracker.ietf.org/doc/draft-zyyhl-agent-networks-framework/">
  <front>
    <title>A Framework for Agent Networks</title>
    <author initials="Z." surname="Yao">
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="I-D.narvaneni-agent-uri" target="https://datatracker.ietf.org/doc/draft-narvaneni-agent-uri/">
  <front>
    <title>Agent URI Scheme</title>
    <author initials="S." surname="Narvaneni">
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="MCP" target="https://modelcontextprotocol.io/">
  <front>
    <title>Model Context Protocol</title>
    <author >
      <organization>Anthropic</organization>
    </author>
    <date year="2024"/>
  </front>
</reference>
<reference anchor="A2A" target="https://google.github.io/A2A/">
  <front>
    <title>Agent-to-Agent Protocol</title>
    <author >
      <organization>Google</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="WIREGUARD" target="https://www.wireguard.com/papers/wireguard.pdf">
  <front>
    <title>WireGuard: Next Generation Kernel Network Tunnel</title>
    <author initials="J. A." surname="Donenfeld">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
</reference>
<reference anchor="LIBP2P" target="https://libp2p.io/">
  <front>
    <title>libp2p: A Modular Network Stack</title>
    <author >
      <organization>Protocol Labs</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="I-D.yao-catalist-problem-space-analysis" target="https://datatracker.ietf.org/doc/draft-yao-catalist-problem-space-analysis/">
  <front>
    <title>Problem Space Analysis of AI Agent Protocols in IETF</title>
    <author initials="Y." surname="Zhou">
      <organization></organization>
    </author>
    <author initials="K." surname="Yao">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="I-D.eckert-catalist-acip-framework" target="https://datatracker.ietf.org/doc/draft-eckert-catalist-acip-framework/">
  <front>
    <title>Framework for Agent Communications Internet Protocol (ACIP)</title>
    <author initials="T." surname="Eckert">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="I-D.du-catalist-routing-considerations" target="https://datatracker.ietf.org/doc/draft-du-catalist-routing-considerations/">
  <front>
    <title>Routing Considerations in Agentic Network</title>
    <author initials="Z." surname="Du">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="I-D.prakash-aip" target="https://datatracker.ietf.org/doc/draft-prakash-aip/">
  <front>
    <title>Agent Identity Protocol (AIP)</title>
    <author initials="S." surname="Prakash">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="I-D.nemethi-aid-agent-identity-discovery" target="https://datatracker.ietf.org/doc/draft-nemethi-aid-agent-identity-discovery/">
  <front>
    <title>Agent Identity and Discovery (AID)</title>
    <author initials="B." surname="Nemethi">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="I-D.hood-independent-agtp" target="https://datatracker.ietf.org/doc/draft-hood-independent-agtp/">
  <front>
    <title>Agent Transfer Protocol (AGTP)</title>
    <author initials="C." surname="Hood">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="I-D.li-atp" target="https://datatracker.ietf.org/doc/draft-li-atp/">
  <front>
    <title>Agent Transfer Protocol (ATP)</title>
    <author initials="Y." surname="Li">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="I-D.sharif-agent-audit-trail" target="https://datatracker.ietf.org/doc/draft-sharif-agent-audit-trail/">
  <front>
    <title>Agent Audit Trail</title>
    <author initials="R." surname="Sharif">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="I-D.ni-wimse-ai-agent-identity" target="https://datatracker.ietf.org/doc/draft-ni-wimse-ai-agent-identity/">
  <front>
    <title>WIMSE Applicability for AI Agents</title>
    <author initials="Y." surname="Ni">
      <organization></organization>
    </author>
    <author initials="C. P." surname="Liu">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
</reference>


    </references>

</references>


<?line 611?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The author thanks the participants of the IETF AI protocols discussions
for their contributions to understanding the agent communication
landscape.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

