<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.34 (Ruby 3.4.9) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc strict="yes"?>
<?rfc compact="yes"?>

<rfc ipr="trust200902" docName="draft-hood-agtp-web3-bridge-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="AGTP-WEB3">AGTP Web3 Bridge Specification</title>

    <author fullname="Chris Hood">
      <organization>Nomotic, Inc.</organization>
      <address>
        <email>chris@nomotic.ai</email>
        <uri>https://nomotic.ai</uri>
      </address>
    </author>

    <date year="2026" month="March" day="23"/>

    <area>Applications and Real-Time</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>AI agents</keyword> <keyword>Web3</keyword> <keyword>blockchain</keyword> <keyword>agent identity</keyword> <keyword>decentralized identity</keyword>

    <abstract>


<?line 63?>

<t>The Agent Transfer Protocol (AGTP) uses a PKI-based trust model: agent
identity is anchored to DNS-verified domain ownership and CA-issued
X.509 certificates. Web3 systems offer an alternative identity model
based on blockchain address ownership, smart contract verification, and
decentralized naming systems including the Ethereum Name Service (ENS)
and Unstoppable Domains. This document specifies the AGTP Web3 Bridge:
a framework for mapping Web3 identity anchors to AGTP trust tiers,
resolving Web3 names to canonical AGTP Agent-IDs, and operating AGTP
sessions with agents whose identity is anchored to blockchain rather
than DNS. Web3-anchored agents are treated as Trust Tier 2 (Org-Asserted)
in the absence of additional verification. This document also defines
the conditions under which a Web3 identity MAY be elevated to Trust
Tier 1 through a hybrid verification procedure.</t>



    </abstract>



  </front>

  <middle>


<?line 79?>

<section anchor="introduction"><name>Introduction</name>

<section anchor="two-identity-models"><name>Two Identity Models</name>

<t>AGTP's default trust model is PKI-based. An agent's identity is anchored
to a real-world domain (e.g., <spanx style="verb">acme.tld</spanx>), verified through DNS ownership
challenge per, and bound to a CA-signed certificate chain.
This model inherits decades of web PKI infrastructure and integrates
cleanly with enterprise certificate management systems.</t>

<t>Web3 systems provide a different identity model. In Web3, identity is
anchored to a blockchain address: a cryptographic key pair whose public
address is a first-class identifier. Ownership of a blockchain address
is proven by signing a challenge with the corresponding private key.
Web3 naming systems (ENS, Unstoppable Domains) map human-readable names
to blockchain addresses, analogous to DNS mapping names to IP addresses.</t>

<t>These models are not mutually exclusive. An organization may hold both
a verified DNS domain and blockchain-anchored assets. An agent may
legitimately derive its identity from either model. AGTP must
interoperate with both.</t>

</section>
<section anchor="scope-and-status"><name>Scope and Status</name>

<t>This document is informational. The Web3 ecosystem is evolving rapidly,
and a fully normative specification would risk premature standardization
of mechanisms that have not stabilized. This document defines:</t>

<t><list style="symbols">
  <t>The <spanx style="verb">resolution_layer</spanx> field values for Web3 identity anchors
(already defined in <xref target="AGTP"/> Section 6.6)</t>
  <t>Mapping rules from Web3 identity to AGTP Trust Tiers</t>
  <t>Name resolution procedures for ENS and Unstoppable Domains</t>
  <t>A hybrid verification procedure for Trust Tier 1 elevation</t>
  <t>Security considerations specific to Web3-anchored agents</t>
</list></t>

<t>Implementers <strong>MAY</strong> use this document as guidance. A future normative
revision will be issued as the Web3 identity landscape stabilizes.</t>

</section>
</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "<strong>MUST</strong>", "<strong>MUST NOT</strong>", "<strong>REQUIRED</strong>", "<strong>SHALL</strong>",
"<strong>SHALL NOT</strong>", "<strong>SHOULD</strong>", "<strong>SHOULD NOT</strong>", "<strong>RECOMMENDED</strong>",
"<strong>NOT RECOMMENDED</strong>", "<strong>MAY</strong>", and "<strong>OPTIONAL</strong>" in this document
are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when,
and only when, they appear in all capitals.</t>

<dl>
  <dt>Blockchain Address:</dt>
  <dd>
    <t>A cryptographic public key hash serving as a first-class identifier
on a blockchain network (e.g., an Ethereum address of the form
0x... or a Solana address in base58 encoding).</t>
  </dd>
  <dt>ENS (Ethereum Name Service):</dt>
  <dd>
    <t>A distributed naming system built on the Ethereum blockchain that
maps human-readable names (e.g., <spanx style="verb">acme.eth</spanx>) to Ethereum addresses
and other records. Defined in <xref target="EIP-137"/>.</t>
  </dd>
  <dt>Unstoppable Domains:</dt>
  <dd>
    <t>A blockchain-based naming system providing human-readable domain names
(e.g., <spanx style="verb">acme.crypto</spanx>, <spanx style="verb">acme.nft</spanx>) anchored to blockchain addresses.</t>
  </dd>
  <dt>DID (Decentralized Identifier):</dt>
  <dd>
    <t>A globally unique identifier defined by <xref target="W3C-DID"/> that enables
verifiable, decentralized digital identity without dependence on a
centralized registry.</t>
  </dd>
  <dt>Web3 Trust Anchor:</dt>
  <dd>
    <t>A blockchain address, ENS name, Unstoppable Domain name, or DID that
serves as the primary identity anchor for a Web3-registered agent.</t>
  </dd>
</dl>

</section>
<section anchor="web3-identity-anchors-and-agtp-trust-tiers"><name>Web3 Identity Anchors and AGTP Trust Tiers</name>

<section anchor="default-trust-tier-assignment"><name>Default Trust Tier Assignment</name>

<t><xref target="AGTP"/> Section 6.6 defines the <spanx style="verb">resolution_layer</spanx> field in the Agent
Manifest Document and specifies that Web3-anchored agents <strong>MUST</strong> be
treated as Trust Tier 2 (Org-Asserted) in the absence of additional
verification:</t>

<texttable title="resolution_layer Values and Default Trust Tiers">
      <ttcol align='left'>resolution_layer Value</ttcol>
      <ttcol align='left'>Default Trust Tier</ttcol>
      <ttcol align='left'>Notes</ttcol>
      <c><spanx style="verb">dns</spanx></c>
      <c>Tier 1 (if DNS challenge passed)</c>
      <c>Standard AGTP default</c>
      <c><spanx style="verb">pki</spanx></c>
      <c>Tier 2</c>
      <c>PKI without DNS challenge</c>
      <c><spanx style="verb">web3-ens</spanx></c>
      <c>Tier 2</c>
      <c>ENS name ownership verified</c>
      <c><spanx style="verb">web3-unstoppable</spanx></c>
      <c>Tier 2</c>
      <c>Unstoppable Domains ownership verified</c>
      <c><spanx style="verb">web3-did</spanx></c>
      <c>Tier 2</c>
      <c>DID method-specific verification</c>
      <c><spanx style="verb">agtp-registry</spanx></c>
      <c>Tier 2</c>
      <c>Direct registry registration, no domain anchor</c>
</texttable>

<t>Trust Tier 2 means the agent's identity is asserted and verifiable
(ownership of the blockchain address is provable) but the agent has
not been verified as representing a specific real-world organization
through DNS. The <spanx style="verb">trust_warning: "org-label-unverified"</spanx> field
<strong>MUST</strong> appear in the Agent Manifest Document for all Web3-anchored
agents at default Trust Tier 2.</t>

</section>
<section anchor="trust-tier-1-elevation-for-web3-agents"><name>Trust Tier 1 Elevation for Web3 Agents</name>

<t>A Web3-anchored agent <strong>MAY</strong> be elevated to Trust Tier 1 through a
hybrid verification procedure that combines blockchain address ownership
proof with DNS ownership verification:</t>

<t><list style="numbers" type="1">
  <t>The agent operator proves ownership of the blockchain address by
signing an AGTP-issued challenge with the corresponding private key.</t>
  <t>The agent operator publishes a DNS TXT record at <spanx style="verb">_agtp.[domain.tld]</spanx>
containing the blockchain address:</t>
</list></t>

<figure><artwork><![CDATA[
_agtp.acme.tld. IN TXT "agtp-web3=0x1a2b3c...; chain=ethereum"
]]></artwork></figure>

<t><list style="numbers" type="1">
  <t>The AGTP governance platform verifies both the blockchain signature
and the DNS TXT record.</t>
  <t>On successful dual verification, the agent is registered at Trust
Tier 1 with <spanx style="verb">resolution_layer: web3-ens</spanx> (or equivalent) and the
DNS anchor recorded in the Agent Manifest Document.</t>
</list></t>

<t>This hybrid procedure establishes that the same entity controls both
the blockchain address and the DNS domain, providing a trust level
equivalent to standard DNS-anchored verification.</t>

</section>
</section>
<section anchor="name-resolution"><name>Name Resolution</name>

<section anchor="ens-resolution"><name>ENS Resolution</name>

<t>ENS names (e.g., <spanx style="verb">acme.eth</spanx>) resolve to Ethereum addresses through
the ENS registry smart contract. AGTP implementations that support
ENS resolution <strong>MUST</strong>:</t>

<t><list style="numbers" type="1">
  <t>Query the ENS registry contract for the address record associated
with the ENS name.</t>
  <t>Verify that the resolved address matches the <spanx style="verb">blockchain_address</spanx>
field in the agent's registration record.</t>
  <t>Verify that the agent's canonical Agent-ID is recorded in the ENS
name's text records under the key <spanx style="verb">agtp-agent-id</spanx>.</t>
</list></t>

<t>ENS text record format:</t>

<figure><artwork><![CDATA[
Key: agtp-agent-id
Value: 3a9f2c1d8b7e4a6f...
]]></artwork></figure>

<t>AGTP resolution <strong>MUST</strong> treat the ENS text record as informational
only. The canonical Agent-ID in the AGTP registry is authoritative.
If the ENS text record conflicts with the AGTP registry, the AGTP
registry value <strong>MUST</strong> be used.</t>

</section>
<section anchor="unstoppable-domains-resolution"><name>Unstoppable Domains Resolution</name>

<t>Unstoppable Domains names resolve through a blockchain registry
contract specific to each domain extension (<spanx style="verb">.crypto</spanx>, <spanx style="verb">.nft</spanx>, <spanx style="verb">.x</spanx>,
etc.). AGTP implementations that support Unstoppable Domains resolution
<strong>MUST</strong> follow the same verification procedure as ENS, adapted for
the specific registry contract of the domain extension.</t>

<t>Unstoppable Domains record format:</t>

<figure><artwork><![CDATA[
Key: agent.agtp.id
Value: 3a9f2c1d8b7e4a6f...
]]></artwork></figure>

</section>
<section anchor="did-resolution"><name>DID Resolution</name>

<t>W3C Decentralized Identifiers <xref target="W3C-DID"/> provide a method-agnostic
framework for decentralized identity. AGTP implementations that support
DID resolution <strong>MUST</strong>:</t>

<t><list style="numbers" type="1">
  <t>Resolve the DID Document using the DID method-specific resolver.</t>
  <t>Extract the AGTP-specific service endpoint from the DID Document:</t>
</list></t>

<figure><sourcecode type="json"><![CDATA[
{
  "service": [
    {
      "id": "#agtp",
      "type": "AgentTransferProtocol",
      "serviceEndpoint": "agtp://agtp.acme.tld/agents/my-agent",
      "agtp_agent_id": "3a9f2c1d8b7e4a6f..."
    }
  ]
}
]]></sourcecode></figure>

<t><list style="numbers" type="1">
  <t>Resolve the <spanx style="verb">serviceEndpoint</spanx> URI to the agent's canonical AGTP
Agent Manifest Document.</t>
  <t>Verify that the <spanx style="verb">agtp_agent_id</spanx> in the DID Document matches the
<spanx style="verb">canonical_id</spanx> in the Agent Manifest Document.</t>
</list></t>

</section>
</section>
<section anchor="operating-agtp-sessions-with-web3-anchored-agents"><name>Operating AGTP Sessions with Web3-Anchored Agents</name>

<section anchor="session-establishment"><name>Session Establishment</name>

<t>AGTP sessions with Web3-anchored agents follow the standard AGTP
session model defined in <xref target="AGTP"/>. The <spanx style="verb">resolution_layer</spanx> field in
the Agent Manifest Document declares the trust anchor type; the
requesting agent <strong>MUST</strong> retrieve and verify the manifest before
establishing a session.</t>

<t>If the requesting agent requires Trust Tier 1 (e.g., for financial
transactions or cross-organization delegation), it <strong>MUST</strong> reject
connection attempts from Tier 2 Web3-anchored agents unless the hybrid
verification described in Section 3.2 has been completed and is
reflected in the agent's Trust Tier.</t>

</section>
<section anchor="authority-scope-constraints"><name>Authority-Scope Constraints</name>

<t>Web3-anchored agents at Trust Tier 2 <strong>MUST NOT</strong> be granted authority
scopes above <spanx style="verb">documents:query</spanx> and <spanx style="verb">knowledge:query</spanx> without AGTP-CERT
cryptographic identity binding per <xref target="AGTP-CERT"/>, as specified in
<xref target="AGTP"/> Section 6.1.6.</t>

<t>AGTP-CERT binding for Web3-anchored agents follows the same certificate
issuance process as for DNS-anchored agents, with the blockchain address
ownership proof substituted for or supplemented by the DNS challenge.</t>

</section>
<section anchor="governance-token-compatibility"><name>Governance Token Compatibility</name>

<t>Governance Tokens issued for Web3-anchored agents follow the standard
Governance Token format defined in <xref target="AGTP"/> Section 6.7.7. The
<spanx style="verb">agent_id</spanx> field in the Governance Token <strong>MUST</strong> match the agent's
canonical AGTP Agent-ID (the 256-bit hash form), not the blockchain
address or Web3 name.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<section anchor="blockchain-reorganization"><name>Blockchain Reorganization</name>

<t>Blockchain networks are subject to reorganization events in which
recently confirmed transactions may be reversed. In AGTP context, a
blockchain reorganization could theoretically reverse the publication
of an ENS text record or Unstoppable Domains record used in agent
verification.</t>

<t>Mitigation: AGTP implementations <strong>SHOULD</strong> require a minimum
confirmation depth before treating blockchain-based verification as
complete. The recommended minimum is 12 blocks for Ethereum mainnet.
Implementations operating on proof-of-stake networks with finality
guarantees <strong>MAY</strong> use the finality checkpoint instead of a block
depth threshold.</t>

</section>
<section anchor="ens-name-expiry"><name>ENS Name Expiry</name>

<t>ENS names require periodic renewal. If an ENS name expires and is
acquired by a different party, the new owner could publish an AGTP
agent ID that points to an agent the original owner registered.</t>

<t>Mitigation: AGTP governance platforms <strong>MUST</strong> monitor ENS name
expiry for all registered Web3-anchored agents and treat an expired
ENS name as equivalent to an expired DNS domain per <xref target="AGTP"/> Section 9.6.
Agents under an expired ENS name <strong>MUST</strong> be automatically Suspended.</t>

</section>
<section anchor="private-key-compromise"><name>Private Key Compromise</name>

<t>A blockchain address is only as secure as its private key. Private key
compromise grants an attacker the ability to prove ownership of the
address and potentially re-register agents or modify ENS records.</t>

<t>Mitigation: Web3-anchored agent operators <strong>SHOULD</strong> use hardware
wallets or multi-signature schemes for blockchain addresses used in
AGTP registration. Private key rotation <strong>MUST</strong> trigger immediate
agent re-registration with the new address and <strong>MUST</strong> be logged in
the governance audit trail.</t>

</section>
<section anchor="smart-contract-vulnerabilities"><name>Smart Contract Vulnerabilities</name>

<t>ENS and Unstoppable Domains registry contracts are smart contracts.
Smart contract vulnerabilities could allow attackers to modify name
resolution records without controlling the associated private key.</t>

<t>Mitigation: AGTP implementations <strong>SHOULD</strong> monitor the security status
of registry contracts they rely on and be prepared to treat affected
resolutions as untrusted pending contract remediation. This document
does not specify a normative procedure for contract vulnerability
response; that is governed by the respective naming system's security
policies.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document defines no new IANA registrations. The <spanx style="verb">resolution_layer</spanx>
field values <spanx style="verb">web3-ens</spanx>, <spanx style="verb">web3-unstoppable</spanx>, and <spanx style="verb">web3-did</spanx> are defined
in <xref target="AGTP"/> Section 6.6.2 and do not require separate registration.</t>

<t>The DNS TXT record key <spanx style="verb">agtp-web3</spanx> used in hybrid verification is a
conventional identifier within the <spanx style="verb">_agtp</spanx> subdomain established by
<xref target="AGTP"/> Section 6.1.6. No formal IANA registration is required for
this key.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="AGTP" >
  <front>
    <title>Agent Transfer Protocol (AGTP)</title>
    <author fullname="Chris Hood">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-hood-independent-agtp-02"/>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="AGTP-CERT" >
  <front>
    <title>AGTP Agent Certificate Extension</title>
    <author fullname="Chris Hood">
      <organization></organization>
    </author>
    <date year="2026"/>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-hood-agtp-agent-cert-00"/>
</reference>
<reference anchor="W3C-DID" target="https://www.w3.org/TR/did-core/">
  <front>
    <title>Decentralized Identifiers (DIDs) v1.0</title>
    <author >
      <organization>W3C</organization>
    </author>
    <date year="2022"/>
  </front>
</reference>
<reference anchor="EIP-137" target="https://eips.ethereum.org/EIPS/eip-137">
  <front>
    <title>Ethereum Name Service</title>
    <author >
      <organization>Ethereum Foundation</organization>
    </author>
    <date year="2016"/>
  </front>
</reference>


    </references>

</references>


<?line 375?>

<section anchor="web3-ecosystem-status-note"><name>Web3 Ecosystem Status Note</name>

<t>The Web3 identity landscape is evolving rapidly. ENS and Unstoppable
Domains are the most widely deployed blockchain naming systems at the
time of this writing, but the field is not settled. W3C DIDs provide
a method-agnostic framework that may become the preferred abstraction
layer for decentralized identity in agent systems.</t>

<t>This document is intentionally informational to avoid premature
normative commitment. Implementers should treat the procedures in this
document as best-current-practice guidance subject to revision as the
Web3 ecosystem stabilizes.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

