<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-eckert-catalist-acip-framework-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="acip-framework">Framework for Agent Communications Internet Protocol (ACIP) based Agent Aware Networks</title>

    <author initials="T." surname="Eckert" fullname="Toerless Eckert" role="editor">
      <organization>Futurewei Technologies USA</organization>
      <address>
        <postal>
          <street>2220 Central Expressway</street>
          <city>Santa Clara</city>
          <code>CA 95050</code>
          <country>USA</country>
        </postal>
        <email>tte@cs.fau.de</email>
      </address>
    </author>

    <date year="2026" month="March" day="12"/>

    
    <workgroup>CATALIST</workgroup>
    

    <abstract>


<?line 52?>

<t>This document outlines the use case scenario, problems with existing
solutions and framework for a proposed new protocol solution for
(AI) Agent to (AI) Agent based communications infrastructure using
a new protocol tentatively called "Agent Communications Internet Protocol" (ACIP).</t>



    </abstract>



  </front>

  <middle>


<?line 59?>

<section anchor="internal-review-considerations-to-be-removed"><name>Internal review considerations (to be removed)</name>

<t>This document tries to highlight aspects that hopefully will make the solution sound
better to the IETF community. We want to be able for the solutions network forwarding
nodes to have as much insightinto agent to agent traffic as today only done with
IETF blessing in a variety of</t>

</section>
<section anchor="reference-scenario"><name>Reference scenario</name>

<t>This document discusses the framework for ACIP based on the reference scenario outlined
in this section. Further details on requirement can be found in <xref target="I-D.liu-rtgwg-agent-gateway-requirements"/>.</t>

<t>A set of fintech enterprises wants to move to Agent to Agent communications for their
next generation of fintech services, such as (for example) payment services
involving credit/debit cards.</t>

<section anchor="functional"><name>Today</name>

<t>Today (pre AtA), communication for similar services, such as HTTP based service,
may be based on a hodge-podge of one-off B2B protocols with lots of operational
and security challenges, running often over (a hodgepodge) or "secure" controlled networks,
such as L2VPN or L3VPN.</t>

<t>Nevertheless, even with agents replacing such protocols, the fundamental complexities
of setting up, managing and securing the AtA communications remains challenging, unless they are
enhanced and simplified. In some respects they even increasing in complexity, because
AtA communication can be intrinsically much less constrained to only approved/desired
transactions (with typical HTTP B2B protocols being very well specified and hence
easily parseable for security devices), making compliance with regulatory constraints and
 observability much more complex.</t>

<t><xref target="fig-internet-scenario"/> outlines the abstract architecture used today for
HTTP B2B communications across the Internet, replacing just HTTP with "Agent".
Enterprises "simply" connect to the Internet, but they need to ensure
at their enterprise edge some degree of security embodied via enterprise
edge HTTP proxy servers in A1 and A2 as well as Firewalls in the edge routers
"FW-A1", "FW-A2".</t>

<t>With all those components running in the enterprises, it still requires 
several cloud service with various degrees of trust/security challenges
all the way from Certificate Authorities, Naming services, coordination
servers and so on. And then it is still extremely difficult to avoid
data leakage because there is no trusted third party in the data plane
guaranteeing an isolate communication domain. This too would need to
be managed as a self-maintained overlay network.</t>

<t>Therefore, and while this "Internet model" for Agent to Agent communication
is important, this memo proposes a complementary model which reflects
an evolution of the concepts of private underlay/overlay network designs
as well as that of HTTP intermediaries.</t>

<figure title="Internet Scenario Reference Topology" anchor="fig-internet-scenario"><artwork><![CDATA[
    +-----+                                                 +-----+
    | A1  | <..... Any Agent to Agent (AtA) protocol .....> | A2  |
    |Agent|                                                 |Agent|
    +-----+                                                 +-----+
       |                 PROBLEMS:                           |
  Corp.A1              CLOUD SERVICES: Registration,        Corp.A2
 Enterprise            discovery, naming, policies          Enterprise
(Campus/WAN)           .. how to do observation ?          (Campus/WAN)
 (Data.Cent)           .. guarantee no data leakage        (Data.Cent)
  Network              .. no transit across bad paths       Network
      |                .. service guaranteees                |
      | +---------+    .. performance, resilience            | +---------+
      | |HTTP     |    .. avoid ops complexity in agents     | |HTTP     |
      | |Proxy-Srv|    .. Security: enrolment, CA            | |Proxy-Srv|
      | +---------+                                          | +---------+
      |  |                                                   |  |
    +-----+                                                 +-----+
    |FW-A1|   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~   |FW-A2|
    | CE1 |                    Internet                     | CE2 |
    +-----+   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~   +-----+
       |          |                                 |          |
     --+----------+--                             --+----------+--
]]></artwork></figure>

</section>
<section anchor="with-acip"><name>With ACIP</name>

<t>Ideally, such group of fintech enterprises would like for the communication model to also
allow outsourcing such communication related problems to a trusted and legally for the purpose
accredited third party, such as a network service provider and allow for the actual AI
agents to require as little as possible additional complexity to support such complex
scenarios and their security, network and regulatory requirements. Nevertheless, operators
also want solutions to support self-managed/onprem equipment that supports all the necessary
communication attachment functions to protect their own agents and backends, including the
ability to apply policy, observability and security (access control, filtering) to AtA traffic.</t>

<t>A solution deployment for such a group of enterprises may include on or more providers of
credit/debit cards, Issuing Banks, Point-of-Sales Terminals of Banks and Enterprises providing
retail payment systems, Enterprises offering electronic payment systems linking to the credit/debit
cards, co-brand enterprises and compliance entities. Each single debit/credit transaction may
involve a series of AtA exchanged between two of these collaborating entities, and the
solultion context too may impact policies and services (such as a national vs. international
setup).</t>

<t>The communication aspects that such a communication infrastructure needs to support
on a per-agent basis include attachment to service, registration of capabilities that the agent
os permitted to provide / consume. Communications needs to be able to enforce desired or
compliance besed access control, routing / load-balancing to agents providing group of
agents, resilience/failover - and potentially transaction accounting or billing.</t>

<t>The following picture, <xref target="fig-scenario"/> outlines a simplified example
for the above described use-case setup. A corporation A1 running some
Agent A1 wants to have that Agent be able to discover and automatically
connect in a secure, redundant and network path service optimized
fashion to Agents from other corporations such as A2 so that those
agents together can fulfil a distributed AI task such as aforementioned
fintech services.</t>

<figure title="Scenario Reference Topology" anchor="fig-scenario"><artwork><![CDATA[
    +-----+                                                 +-----+
    | A1  | <..... Any Agent to Agent (AtA) protocol .....> | A2  |
    |Agent|                                                 |Agent|
    +-----+                                                 +-----+
       |                                                       |
  Corp.A1                                                     Corp.A2
 Enterprise     ~~~~~~~~~~~~~~~~~      ~~~~~~~~~~~~~~~      Enterprise
(Campus/WAN)  Service Provider SP1   Service Provider SP2  (Campus/WAN)
 (Data.Cent)      WAN Network            WAN Network        (Data.Cent)
  Network      ~~~~~~~~~~~~~~~~~~      ~~~~~~~~~~~~~~~       Network
      |         |           |          |          |          |
      | +---+   | +----+    | +----+   | +----+   | +----+   | +---+
      | |Sec|   | |Sec |    | |Sec |   | | Sec|   | | Sec|   | |Sec|
      | |A1 |   | |SP11|    | |SP12|   | |SP21|   | |SP22|   | |A2 |
      | +---+   | +----+    | +----+   | +----+   | +----+   | +---+
      |  |      |  |        |  |       |  |       |  |       |  |
    +-----+   +-------+   +-------+  +-------+  +-------+   +-----+
    |IntA1|   |IntSP11|   |IntSP12|  |IntSP21|  |IntSP22|   |IntA2|
    | CE1 |   |  PE1  |   | ASBR1 |  | ASBR2 |  |  PE2  |   | CE2 |
    +-----+   +-------+   +-------+  +-------+  +-------+   +-----+
       |          |           |          |          |          |
     --+----------+--       --+----------+--      --+----------+--
]]></artwork></figure>

<section anchor="network-topology"><name>Network topology</name>

<t>Corp.A connects via a CE router to a Service Provider SP1 via that
service providers PE1 router. Likewise, Corp.A2 has logically the same setup,
connecting its Agent A2 to Service Provider SP2 via C2 -&gt; PE2. SP1
and SP2 interconnect via ASBR1/ASBR2. The overall network setup
should considered to be primarily a private network setup, which may
in some places pass across the Internet and/or have agents explicity
integrated even though they are only reachable across the public
Internet, but foremost, any reachability of agents to each other
is meant to be explicitly created/allowed.</t>

</section>
<section anchor="cryptographic-overlay"><name>Cryptographic overlay</name>

<t>When, as often is the case, cryptographic security is required,
the type of networks do include elements able to support cryptographic
traffic processing. Because of historic limitations and/or
inflexibility of traditional network devices such as CE1, CE2, PE1, PE2,
cryptographically secure network paths are often created by co-placing
software/CPU-only based processing, and routing is accordingly set
up to pass the desired data plane traffic through those security
devices. In the picture, the 'Sec' devices provide exactly this role,
and their co-location with each of the 'edge' routers of one of the
interconnecting organizations (Corporation or Service Provider) shows
a typical setup of currently evolving solutions such as <xref target="SCION"/>.
Intermediate nodes are part of such a secure cryptographic interdomain
network design so that there can be trusted policy paths for example
(such as forcing traffic inside specific countries for regulatory
purposes).</t>

</section>
<section anchor="acip-inband-processing"><name>ACIP inband processing</name>

<t>Finally, the novel ACIP networking technology proposed by this document
is indicated via the IntA1, IntSP11, .. IntA2 modules. It is indicated as a new
layer or service of forwarding functionality inside the pre-existing routers
because the ability to support that option is of specific interest
to maximize performance, lower cost (capex and opex) and to also
increase security (device not being on-path do always have the problem
of ensuring that they will not be bypassed.</t>

<t>In one example from past experiences, dedicated add-on firewalls
in (high speed trading) fintech deployments where not able to keep up
with the performance required from them whereas the actual network equipment
was able to cope with the necessary speeds, but the application protocols where
not designed such that the network equipment was able to perform the
desired policy filtering.</t>

<t>While the technology proposed by this document is intended to be designed
that it is able to as much as possible run inside the actual routers,
adding this functionality via additional devices such as those 'Sec'
shown is also very important to support, especially for initial
service agility. Also hybrid methods are of interest, where the</t>

</section>
</section>
</section>
<section anchor="acip-architecture"><name>ACIP Architecture</name>

<t>This chapter summarizes proposed ACIP terminology and functionality,
condensed from the reference scenario described above and explains it in
contrast to existing technologies.</t>

<t>The following picture outlines the reference scenario again with focus
on more details of layering and functionality. The focus still on
data-plane components. Components carrying the actual data traffic
of an AtA protocol connection.  Management and Control plane components or
protocols (if not co-located to data plane elements) are not shown but referred
to by example, when needed.</t>

<section anchor="architecture-layers"><name>Architecture layers</name>

<figure title="Logical Reference Topology" anchor="fig-logical"><artwork><![CDATA[
   A1                                                                          A2
 Agent <.....X.....Any Agent to Agent (AtA) protocol connection........X..>   Agent
    |        |                                                         |         |
    |<..Cs1.>|<..Cs2..>|<...Cs3...>|<....Cs4...>|<..Cs5...>|<....Cs6..>|<..Cs7..>|
    |        |         |           |            |          |           |         |
  --+- ... IntA1 ... IntSP11 .R. IntSP12 ... IntSP21 .R. IntSP22 ... IntA2 ... --+-

Sec:|<.Sec1.>|<..Sec2.>|<...Sec3..>|<....Sec4..>|<..Sec5..>|<...Sec6..>|<..Sec7.>|

Net |  IPv6  |   IPv6  |    SRv6   | IPv6(SRv6) |  SRv6    | IPv6(SRv6)|   IPv6  |

    |< Ent   A1  >|<  Service Provider 1  >|< Service Provider 2 >|< Ent A2     >|
       domain           domain                domain                 domain

Agenda:

   AtA   - end-to-end Agent to Agent protocol
           Google A2A and ANP are example instances of an AtA

   Cs    - Communication segment
           AtATP connections run across a communication segment

   ... .R. Network path of a communication segment ... could be
           a direct link. .R. means that there will be one or more
           network routers in the path. Typically between an ingress
           IntSP and egress IntSP (.R. represents all SP 'P' nodes).

   Intxx - Intermediate node - forwarder of the AtATP.
           HTTP proxy, Slim Node and ACIP router are examples of Intxx

   AtATP - Agent to Agent Transport Protocol, across individ
           HTTP, Slim and ACIP are example instances of AtATP

]]></artwork></figure>

<t>Two (of the multiple) agents, A1 and A2 are using some AtA (agent to agent)
communication protocol.</t>

<t>In the network, A1 belongs to some Enterprise A1 and A2 belongs to some Enterprise
A2. The network domain of A1 (EntA1) connects to the network domain of a
Service Provider 1 (SP1), the network domain of A2 (EntA2) to the network domain of a
Service Provider 2 (SP2). SP1 and SP2 also connect to each other.</t>

<t>EntA1 and EntA2 use IPv6, SP1 and SP2 use IPv6/SRv6. EntA1 and EntA2 may
connect into L3VPN services in SP1 and SP2 as one example of private network
functionality leveraged.</t>

<t>The traffic for AtA connection is carried across a series of intermediaries
for ACIP shown as Intermediary A1 (IntA1), Intermediary SP1 1 (IntSP11) ... IntA2.</t>

<t>The path between each adjacent intermediaries and between an agent and an
intermediary is called a Communication Segment (Cs1, ... Cs7). For each
Cs, a specific protocol is used to encapsulate/carry the AtA protocol traffic,
this protocol is called the "AtA transport protocol" (AtATP).</t>

<t>For simplicity, we consider that all Cs use the same AtATP. The
reference for existing AtATP is HTTP. The name for the AtATP
proposed by this framework document is tentatively "Agent Communication
Internet Protocol" (ACIP).</t>

</section>
<section anchor="http-proxies-as-precursors"><name>HTTP proxies as precursors</name>

<t>To better understand the idea of ACIP forwarders in the solution, we refer
to the most widely deployed existing technology that served as the inspiration,
HTTP 'proxies'.</t>

<t>For HTTP, all intermediaries are HTTP "proxies". A1 opens an HTTP connection to
IntA using an HTTP POST where the URL indicates A2. This causes a sequence
of HTTP connections to be established from IntA1-&gt;IntSP11 up to IntA2-&gt;A2.
Determining for each Cs the destination of the HTTP connection us subject
to the control plane used.</t>

</section>
<section anchor="acip-layer-functionality"><name>ACIP layer functionality</name>

<t>On each intermediary, the desirable operations are performed: routing the
call to the next appropriate intermediary, access control (filtering, policing),
accounting. Routing may include complex policies such as assigning specific
path resources including using only a subset of possible routes. For example,
in fintech, connections may need to stay within specific permissible areas
(such as within country). If HTTP is used, desired path and resource policies
can be indicated through appropriate HTTP headers. Enabling the policies
can be achieved by creating appropriate SRv6 policies for the connection
traffic.</t>

<t>Routing information for the URLs is derived from appropriate routing information
including controller based configuration, (private) DNS, or routing protocols
such as BGP with a new address family the URLs used.</t>

<t>Authentication, confidentiality and integrity for AtATP traffic can be provided by either
per-segment connection security, such as TLS and hence HTTPs or underlying network
security such as IPsec - or a combination of both.</t>

<t>Authentication, confidentiality and integrity for the actual AtA payload is typically
separate from that for AtATP confidentiality meaning that in the case of HTTP as
AtATP, that the HTTP transaction payload is encrypted as well.</t>

<t>In some cases, intermediaries must be enabled to inspect the AtA payload to observe
and potentially filter or account it. This is typically a core purpose of intermediaries
belonging to the Enterprises operating either Agent (IntA1, IntA2). This is shown
in the picture as an "X" in the AtA protocol connection and needs to be achieved
by an appropriate protocol mechanism to share the AtA encryption key with
the intermediary. Intermediaries representing regulatory mandatory observation
points (often required for fintech transactions) may introduce the same requirement
(not shown).</t>

</section>
<section anchor="acip-packetization"><name>ACIP packetization</name>

<t>This section proposes just some core high-level concept ideas without presuming
that any specific details are set in stone.</t>

<t>Consider that ACIP is fundamentally an internet protocol similar to IPv6 in that
it is meant to allow forwariding and policy routing of datagrams across ACIP routers/forwarders.
Nevertheless, by using application specific addressing via 'skills', but allowing a
more policy rich decision making and by supporting datagram and connection oriented
transmissions, it is clearly targeted as an interworking layer on top of IPv6 or
other existing network layers.</t>

<figure title="ACIP Header" anchor="acip-header"><artwork><![CDATA[
      +-------+-------------------------+
      | Type  | Session ID              |
      +-------+-------------------------+
      | opt: Responder skill            |
      +---------------------------------+
      | opt: Initiator identity / skill |
      +---------------------------------+
      ~ opt: policy metadata            ~
      +---------------------------------+
      ~ AEAD payload                    ~
      +---------------------------------+
]]></artwork></figure>

<t>The goal of ACIP is to allow the direct use of a 'skill' based addressing
space in which the functionality of the responder agent can directly be expressed,
in the same way as e.g.: HTTP proxies would route on the URL.</t>

<t>The responder skill would in most cases be a logical address instead of an
individual node identity (which it typically is in IPv6).</t>

<t>To enable rich policy based routing, a flexible metadata field is included,
which could for example be a a set of TLV.</t>

<t>A Type field allows to distinguish different packet types.</t>

<t>ACIP can support datagram forwarding. This is indicated through an appropriate
type. When datagram forwarding is used, the Session ID serves as a guaranteed
hash to ensure that the ACIP packets with the same combination of Session-ID,
Responder Skill and Initiator identity will always be delivered to the same
responder. This ensures that datagram service can be lossy but that initiating
agent and responder can perform retransmission or other forms of multi-packet
exchange interactions to allow for a reliable end-to-end connection.</t>

<t>ACIP can support connection oriented transmissions. Initial connection setup
would rely on specific ACIP packet types and would establish a session ID
hop-by-hop from ACIP forwarder to the next ACIP forwarder.  Connection setup
may be complex at it involves routing decision which may take policy metadata
into account and likely more complex cryptographic authentication. Therefore
it may happen at control plane level of the ACIP forwarders.</t>

<t>Once an ACIP sesseion (connection) is established, the optional header fields
may be left out. Instead, ACIP packets are forwarded by the Session-ID,
which may be swapped ACIP-hop by ACIP-hop to avoid the need of coordinated end-to-end
session-IDs. This is one example option how to allow fast hardware forwarding after
session setup.</t>

<t>The payload is cryptographically authenticated, for example by AEAD, which
may also include the necessary parts of the header.</t>

</section>
<section anchor="control-plane"><name>Control Plane</name>

<t>Candidate new protocols for control plane operations are currently described in the following
two draft.</t>

<t>The protocol which is tentatively called "Agent Attachment Protocol" <xref target="AAP"/> describes
the control plane aspects between Agents and "first-hop" ACIP routers.</t>

<t><list style="symbols">
  <t>The protocol operating across the first communication segment (Agent &lt;-&gt; IntA)</t>
  <t>Responsible for authentication, authorization, and skill registration</t>
  <t>Establishing the trust anchor for policy metadata used within ACIP</t>
  <t>Providing the attachment context from which ACIP session establishment proceeds</t>
</list></t>

<t>The protocol to support exchange and management of information between ACIP routers
that can not better be supported by extending existing protocols is called
tentatively "Agent Metadata Synchronization Protocol" <xref target="AMSP"/>.</t>

<t>Note that these two drafts use the term "gateway" instead of ACIP router because
they where trying to not finalize a specific terminoloy for the forwarding
plane. The reason for doing such a tentative name for the forwarding plane
in this memo with ACIP is that the term "gateway" is highly overloaded between
many solutions and hence difficult to use when trying to distinguish different
proposals. ACIP (routers) was tentatively choosen to empasize on the forwarding
plane aspect between subnets.</t>

<t>Note that these two control plane protocols are not meant to capture the
totality of necessary or beneficial control plane options to be used in
conjunction with ACIP: Existing control plane protocols can equally be used and
should be preferred for all aspects where especially operational well working practices make them
preferrable.</t>

<t>For example, Skills could easily be a new address family in BGP to allow using the well established
operational practices of routing services in Service Provider with BGP.</t>

</section>
<section anchor="scope-extensions"><name>Scope extensions</name>

<t>ACIP is not meant to only be used to carry Agent 2 Agent protocols, but equally the
traffic of any other protocol where be policy benefits of ACIP are beneficial - and
where the naming of payload with ACIP "skills" is appropriate.</t>

<t>On easily very well applicable set of communications are those between an Agent and
an "Model Context Protocol" (MCP) Gateway. One simply needs to define an appropriate
set of Skill names and then ACIP can be used to route, manage/filter, load-balance
traffic between Agents and MCP-Gateways - and forego the need for Agents to individually
discovery and select MCP-gateway instances when instead a fitting instance can simply
be directly reached by using the right "skill" name as the address of the MCP-gateway in
ACIP.</t>

<t>Likewise, the topologies of interest for ACIP are not only those where enterprise hosted
agents connect to other enterprise hosted Agents (or MCP-gateways). The following
example "topology" options are possibly of interest too.</t>

<t>In Data Centers, simple default routing for agent to agent traffic may not be ideal.
In these cases using ACIP for Skill based routing (foregoing discovery) may be beneficial.
In one simple instance, Top-of-Rack (ToR) switch may be set up as ACIP routers performing
this action. This may specifically be interesting case of multiple paths also in
inter-DC connections available.</t>

<t>Internet/Cloud-hosted Agents will be very likely candidates to be brought into an ACIP
solution through a "first-hop" ACIP router connecting to such Agents via the Internet.
In this case, the Agent itself may not want or can-not speak ACIP itself, but the
first-hop ACIP-router itself will "proxy-encapsulate" traffic from/to that Agent into
ACIP. As well as mapping the control-plane mechanism used with ACIP to those used
with "Internet Agent-to-Agent" communications.</t>

</section>
</section>
<section anchor="problems-with-current-approaches"><name>Problems with current approaches</name>

<t>Today, the type of communication scenarios that ACIP attempts to improve use variety of
B2B protocols, often HTTP based.  HTTP intermediaries are used to solve communication scenario requirements such as access control/ filtering or routing (to an origin server or next intermediary/proxy).</t>

<section anchor="pki-issues"><name>PKI issues</name>

<t>Making all the necessary intermediaries trusted to pass on HTTP transaction and being ablde to inspect
them at least on the HTTP level is one of the main complexities, often involving varieties
of private PKI. Or when using WebPKI having to be extremely cautious with the minimum
necessary subset of trusted Root CA. A solution wide unified and well managed PKI with
participant permission management (such as intermediaries having only ability to be part
of the HTTP communication but not the encrypted payloads) for example is already a
significant enhancement whereever possible.</t>

</section>
<section anchor="filtering-for-extranet-private-l3vpn-networks"><name>Filtering for "extranet" private (L3VPN) networks</name>

<t>As mentioned in the reference scenario chapter, the network layer setup for such scenarios
often involves private networks such as L2VPN or L3VPN, but these area already very difficult
to manage in multi-enterprise scenarios because typically connectivity between the collaborating
enterprises is typically intended to not be completely open at the network layer. Therefore,
the network services may already need to provide strict filtering for known TCP server/ports.
In other industries, this problem has already been recognized to be so error prone that automations
such as MUD have been developed. These are not well applicable for ACIP target scenarios because
the communication requirements are per-scenario and not per-device (such as required for MUD).
Therefore, often HTTP intermediaries are used as URL "name" based access control enforcment
nodes.</t>

</section>
<section anchor="naming-on-the-dns-layer"><name>Naming on the DNS layer</name>

<t>Likewise, DNS based naming of entities is complex when setting up private scenarios because
it requires private DNS trees, that should not leak to the Internet. With those scenarios
evolving over time, multiple roots of such private DNS domains may need to be stitched together,
which further increases complexity/insecurity.</t>

</section>
<section anchor="policy-at-the-ipv6-layer"><name>Policy at the IPv6 layer</name>

<t>Attempting to provide routing/load-sharing/resource-allocation and access-control policy for
application layer granularity directly on the layer of IPv6 addresses has often been attempted
and is actually used in large scale, but complexity limited scenarios such as single-operator
data-centers or constrained ISP sources. For example encoding allication context into some
bits of the interface identifier. And then assigning to hosts (agents) a large number of
IPv6 addresses, each one representing a specific application layer semantic. These approaches
typically fall apart when the application layer purpose can be a combination of few
independent aspects.</t>

</section>
<section anchor="http-issues"><name>HTTP issues</name>

<t>Can not well be hardware forwarded - too complex to parse. No good separation control / data-plane,
therefore not well suited to have CPU based control plane vs. hardware-forwarding based
data-plane connctions..</t>

<t>Details TBD</t>

</section>
</section>


  </middle>

  <back>



    <references title='Informative References' anchor="sec-informative-references">




<reference anchor="AAP">
   <front>
      <title>Agent Attachment Protocol</title>
      <author fullname="Linda Dunbar" initials="L." surname="Dunbar">
         <organization>Futurewei</organization>
      </author>
      <author fullname="Kausik Majumdar" initials="K." surname="Majumdar">
         <organization>Oracle</organization>
      </author>
      <date day="2" month="March" year="2026"/>
      <abstract>
	 <t>   This document describes the Agent Attachment Protocol (AAP),
   a network-centric mechanism that enables autonomous agents to
   securely attach to an overlay network infrastructure. The
   protocol defines procedures for agent attachment, identity
   validation, capability exchange, and secure session
   establishment between an agent and its local network edge
   node. Once attached, agents can communicate with remote
   agents through the overlay formed by interconnected edge
   nodes, without exposing the underlying network topology.


	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-dunbar-agent-attachment-00"/>
   
</reference>


<reference anchor="AMSP" >
  <front>
    <title>Agent Metadata Synchronization Protocol (AMSP)</title>
    <author initials="B." surname="Liu" fullname="Bing Liu">
      <organization>Huawei Technologies</organization>
    </author>
    <date year="2016"/>
  </front>
<annotation>draft-liu-agent-metadata-sync-protocol-00</annotation></reference>



<reference anchor="I-D.liu-rtgwg-agent-gateway-requirements">
   <front>
      <title>Requirements for Agent Gateway</title>
      <author fullname="Bing Liu" initials="B." surname="Liu">
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname="Nan Geng" initials="N." surname="Geng">
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname="Xiaotong Shang" initials="X." surname="Shang">
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname="Qiangzhou Gao" initials="Q." surname="Gao">
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname="Zhenbin Li" initials="Z." surname="Li">
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname="Jing Gao" initials="J." surname="Gao">
         <organization>CAICT</organization>
      </author>
      <date day="27" month="November" year="2025"/>
      <abstract>
	 <t>   This document discusses the requirements for introducing Agent
   Gateways into Agent-to-Agent communications for better scalability,
   communication efficiency, and security etc.  This document also
   discusses the gaps of current hardware/software gateways that could
   not fulfil the task, so that a new kind of entity, e.g. Agent
   Gateway, is needed.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-liu-rtgwg-agent-gateway-requirements-01"/>
   
</reference>


<reference anchor="AgentCard" target="https://github.com/a2aproject/A2A/blob/main/docs/specification.md#5-agent-discovery-the-agent-card">
  <front>
    <title>Agent2Agent (A2A) Protocol Specification (Release Candidate v1.0)</title>
    <author >
      <organization></organization>
    </author>
    <date year="2026" month="March" day="05"/>
  </front>
</reference>



<reference anchor="SCION">
   <front>
      <title>SCION Overview</title>
      <author fullname="Corine de Kater" initials="C." surname="de Kater">
         <organization>SCION Association</organization>
      </author>
      <author fullname="Nicola Rustignoli" initials="N." surname="Rustignoli">
         <organization>SCION Association</organization>
      </author>
      <author fullname="Adrian Perrig" initials="A." surname="Perrig">
         <organization>ETH Zuerich</organization>
      </author>
      <date day="7" month="May" year="2024"/>
      <abstract>
	 <t>   The Internet has been successful beyond even the most optimistic
   expectations and is intertwined with many aspects of our society.
   But although the world-wide communication system guarantees global
   reachability, the Internet has not primarily been built with security
   and high availability in mind.  The next-generation inter-network
   architecture SCION (Scalability, Control, and Isolation On Next-
   generation networks) aims to address these issues.  SCION was
   explicitly designed from the outset to offer security and
   availability by default.  The architecture provides route control,
   failure isolation, and trust information for end-to-end
   communication.  It also enables multi-path routing between hosts.

   This document discusses the motivations behind the SCION architecture
   and gives a high-level overview of its fundamental components,
   including its authentication model and the setup of the control- and
   data plane.  As SCION is already in production use today, the
   document concludes with an overview of SCION deployments.

   For detailed descriptions of SCION&#x27;s components, refer to
   [I-D.dekater-scion-pki], [I-D.dekater-scion-controlplane], and
   [I-D.dekater-scion-dataplane].  A more detailed analysis of
   relationships and dependencies between components is available in
   [I-D.rustignoli-scion-components].

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-dekater-panrg-scion-overview-06"/>
   
</reference>




    </references>


<?line 556?>

<section anchor="further-technical-considerations"><name>Further technical considerations</name>

<section anchor="connection-full-or-less-operations"><name>Connection full or less operations</name>

<t>ACIP may be designed operate either/or in a connection based or connection less model.
At this point in time it is not clear if one of the models alone is sufficient or
if both options may be desirable.</t>

<t>In a connection less model, such as (by intention, not necessary by actual use) IPv6,
each packet carries all (header) information for intermediary nodes (IPv6 routers)
to perform all intended operations such as forwarding, (re-)routing, filtering/policing
or assigning of processing resources.</t>

<t>In a connection oriented model such as HTTP/TCP binaries, a connection setup phase,
such as an initial "HTTP GET" command towards the first intermediary causes the
desired decisions, routing the connection to the next intermediary or origin server.
Such connections may persist across transactions (as in some HTTP intermediaries) or
across some "end-to-end connection".</t>

<t>As HTTP was not designed for network-device type proxies, it does not allow to
easily distinguish between connection management data (such as the GET/PUT command)
and actually transferred data. In connection oriented (internet) protocols designed
to support network type devices, there is a clear separation between the connection
management traffic (often called control plane) and the data transfer (called data plane).
In typical network devices, the data plane can be million  times faster than the
control plane, hence the need to distinguish them.</t>

<t>In the same way that HTTP was not designed for intermediaries in the first place, but
is now heavily used with them, it could equally be extended to support the establishment
of such network device compatible data paths. Whether to do this or do a clean
re-design, such as was done for constrained use cases with CoAP is an open design question.</t>

<t>Connection oriented solutions scale less well in the face of large number of connections
because of the per-connection state in intermediate nodes. There is very limited
experience with connection oriented internetwork technologies in TCP/IP networks.
The most widely and largest scaling one is likely IP Multicast with PIM (up to 100,000
connections in deployments) followed by RSVP for Traffic engineering (RSVP-TE) in ISPs
(likely up to 40,000 connections in deployments). Both are known to work fairly well
within their scalability limited but suffer from long recovery times under failures
and recovery. In contrast, connectionless operations suffers higher per-data-packet
header overhead and per-packet processing cost in network devices (based on how
complex the header is). In contrast, firewalls that provide security up to HTTP (or
higher) layers have been known to not scale up to desired amount of supportable
traffic/connections requiring often significant redesigns and reduction in actual
security, siuch as in fintech use-cases.</t>

</section>
</section>
<section anchor="changelog"><name>Changelog</name>

<t>00 - initial version</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

