Network Working Group A. Jurkovikj Internet-Draft 12 May 2026 Intended status: Experimental Expires: 13 November 2026 The Collaboration Content Transfer (TCT) Protocol draft-jurkovikj-collab-tunnel-02 Abstract This document specifies the Collaboration Content Transfer (TCT) Protocol, an HTTP-based method for efficient, verifiable delivery of web content to automated agents. TCT defines a JSON envelope that encapsulates resource content in negotiated text-based formats (such as Markdown or plain text) together with canonical metadata. It uses bidirectional URL discovery between human-facing and machine-facing URLs, JSON sitemaps, strong ETag validators, and conditional requests to reduce bandwidth while preserving semantic structure and canonical identity. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on 13 November 2026. Copyright Notice Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components Jurkovikj Expires 13 November 2026 [Page 1] Internet-Draft TCT May 2026 extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 3. Problem Statement . . . . . . . . . . . . . . . . . . . . . . 5 4. Goals and Non-Goals . . . . . . . . . . . . . . . . . . . . . 5 5. Architecture . . . . . . . . . . . . . . . . . . . . . . . . 6 6. Design Rationale and Relation to Existing Mechanisms . . . . 7 6.1. Related Work . . . . . . . . . . . . . . . . . . . . . . 7 6.2. TCT Design Choices . . . . . . . . . . . . . . . . . . . 8 7. Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . 9 7.1. M-Sitemap Discovery . . . . . . . . . . . . . . . . . . . 9 7.2. M-URL Discovery and Canonical Links . . . . . . . . . . . 10 7.3. Template-Invariance . . . . . . . . . . . . . . . . . . . 11 8. M-URL Representation . . . . . . . . . . . . . . . . . . . . 12 8.1. Content-Type and Encoding . . . . . . . . . . . . . . . . 12 8.2. Required JSON Fields . . . . . . . . . . . . . . . . . . 12 8.3. Payload Flexibility and Structure . . . . . . . . . . . . 13 8.4. Representation Stability . . . . . . . . . . . . . . . . 14 8.5. Operational Considerations for Large Content . . . . . . 14 9. Deterministic JSON and Strong ETags . . . . . . . . . . . . . 15 9.1. Deterministic JSON Serialization . . . . . . . . . . . . 15 9.2. Strong ETag Generation (Single Method) . . . . . . . . . 15 9.3. Content-Digest . . . . . . . . . . . . . . . . . . . . . 17 9.4. Relationship to Template-Invariance . . . . . . . . . . . 17 9.5. Canonical Text Normalization (Optional for Producers) . . 18 10. M-Sitemap Format and Semantics . . . . . . . . . . . . . . . 19 10.1. M-Sitemap JSON Structure . . . . . . . . . . . . . . . . 19 10.2. M-Sitemap Index (Optional) . . . . . . . . . . . . . . . 22 10.3. HTTP Response for M-Sitemap . . . . . . . . . . . . . . 23 10.4. Parity Semantics . . . . . . . . . . . . . . . . . . . . 23 11. Client Behavior . . . . . . . . . . . . . . . . . . . . . . . 24 11.1. Zero-Fetch Optimization . . . . . . . . . . . . . . . . 24 11.2. Conditional Requests to M-URLs . . . . . . . . . . . . . 25 11.3. Use of HEAD (Optional) . . . . . . . . . . . . . . . . . 25 11.4. Client Validation (Optional) . . . . . . . . . . . . . . 26 12. Operational Considerations (Informative) . . . . . . . . . . 26 12.1. Deployment with CDNs and Proxies . . . . . . . . . . . . 26 12.2. Large Sites and Sharding . . . . . . . . . . . . . . . . 27 12.3. Error Handling . . . . . . . . . . . . . . . . . . . . . 27 12.4. Rate Limiting and Backoff . . . . . . . . . . . . . . . 27 12.5. Backwards Compatibility . . . . . . . . . . . . . . . . 28 13. Changes Since -01 . . . . . . . . . . . . . . . . . . . . . . 28 14. Security Considerations . . . . . . . . . . . . . . . . . . . 29 Jurkovikj Expires 13 November 2026 [Page 2] Internet-Draft TCT May 2026 15. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 31 16. Normative References . . . . . . . . . . . . . . . . . . . . 31 17. Informative References . . . . . . . . . . . . . . . . . . . 32 Appendix A. Appendix A. Normalization Test Vectors . . . . . . 33 A.1. A.1. Basic ASCII . . . . . . . . . . . . . . . . . . . . 33 A.1.1. A.2. HTML Entities . . . . . . . . . . . . . . . . . 33 A.1.2. A.3. Unicode Normalization (NFKC) . . . . . . . . . 34 A.1.3. A.4. Case Folding Edge Cases . . . . . . . . . . . . 34 A.1.4. A.5. Control Characters . . . . . . . . . . . . . . 35 A.1.5. A.6. Whitespace Edge Cases . . . . . . . . . . . . . 35 A.1.6. A.7. Empty and Edge Cases . . . . . . . . . . . . . 35 A.1.7. A.8. Complex Real-World Examples . . . . . . . . . . 36 A.1.8. A.9. Implementation Notes . . . . . . . . . . . . . 36 A.2. Appendix B. Example Flows (Informative) . . . . . . . . 36 A.2.1. B.1. Initial Discovery and First Fetch . . . . . . . 36 A.2.2. B.2. Zero-Fetch Optimization (Content Unchanged) . . 37 A.2.3. B.3. Conditional Request (Content Unchanged) . . . . 38 A.2.4. B.4. Content Changed . . . . . . . . . . . . . . . . 39 A.2.5. B.5. Parity Mismatch Handling . . . . . . . . . . . 40 A.2.6. B.6. Using HEAD for Efficient Freshness Check . . . 40 A.2.7. B.7. Discovery via C-URL . . . . . . . . . . . . . . 41 A.3. Appendix C. Implementation Notes (Informative) . . . . . 41 A.3.1. C.1. Reference Implementations . . . . . . . . . . . 42 A.3.2. C.2. Deterministic JSON Libraries . . . . . . . . . 42 A.3.3. C.3. SHA-256 Computation . . . . . . . . . . . . . . 43 Appendix B. Canonical JSON . . . . . . . . . . . . . . . . . . . 43 Appendix C. Hash . . . . . . . . . . . . . . . . . . . . . . . . 43 C.1. C.4. Unicode Normalization . . . . . . . . . . . . . . . 44 Appendix D. NFKC normalization . . . . . . . . . . . . . . . . . 44 Appendix E. Case folding . . . . . . . . . . . . . . . . . . . . 44 E.1. C.5. HTTP Response Headers . . . . . . . . . . . . . . . 44 Appendix F. Response if unchanged . . . . . . . . . . . . . . . 45 Appendix G. Response if changed . . . . . . . . . . . . . . . . 45 G.1. C.6. Production Deployment Data . . . . . . . . . . . . 45 G.1.1. C.7. Common Implementation Pitfalls . . . . . . . . 45 G.1.2. C.8. Testing and Validation . . . . . . . . . . . . 46 G.1.3. C.9. Performance Considerations . . . . . . . . . . 47 G.1.4. C.10. Security Best Practices . . . . . . . . . . . 47 Appendix H. Acknowledgments . . . . . . . . . . . . . . . . . . 47 Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 48 1. Introduction Automated agents (search engines, AI crawlers, archives, monitoring tools, aggregators) increasingly consume web content at scale. Fetching and parsing full HTML pages for machine consumption is often inefficient: Jurkovikj Expires 13 November 2026 [Page 3] Internet-Draft TCT May 2026 * Page weight is dominated by templates, navigation, ads, and scripts. * Machine consumers typically need a stable textual representation of the core content. * Many pages do not change frequently, but are re-fetched in full. Various sites already expose JSON APIs or feeds, but: * formats differ across sites, and * use of HTTP validators is inconsistent. The Collaboration Content Transfer (TCT) Protocol (commonly abbreviated as "TCT" or referred to as "Collaboration Tunnel" in earlier experimental deployments) defines a simple, interoperable profile on top of HTTP that: * exposes a canonical JSON representation (M-URL) for selected resources; * advertises C-URL/M-URL mappings and validators in a JSON sitemap (M-Sitemap); * uses a single, well-defined strong ETag method for M-URLs; and * enables "zero-fetch" behavior when content is unchanged. Note: The term "tunnel" in earlier references does not imply network- layer tunneling; rather, it refers to providing a direct content channel optimized for automated consumption alongside the traditional human-facing web interface. TCT is intentionally conservative: it uses only existing HTTP mechanisms, is backward compatible with the Web, and does not define policy or licensing semantics. 2. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals. * C-URL: Jurkovikj Expires 13 November 2026 [Page 4] Internet-Draft TCT May 2026 - The canonical, human-facing URL of a resource, typically an HTML document. * M-URL: - The machine-facing URL providing the TCT JSON representation of that resource. * M-Sitemap: - The JSON sitemap enumerating C-URL/M-URL pairs and associated validators. * Representation: - As defined in [RFC9110]: the information in a payload, including representation metadata, that is subject to content negotiation. Unless stated otherwise, "client" refers to an automated agent that is aware of TCT. 3. Problem Statement Key inefficiencies in current automated consumption of web content include: * repeated transfer of large HTML documents whose core content has not changed; * lack of a standard, compact, semantics-focused representation for page-like resources; * ad hoc usage or absence of validators (ETag, Last-Modified), hindering efficient revalidation; * difficulty for agents to reason about change detection at scale using only HTML and XML sitemaps. 4. Goals and Non-Goals TCT is designed to: * reuse HTTP semantics ([RFC9110], [RFC9111]) rather than introduce new ones; Jurkovikj Expires 13 November 2026 [Page 5] Internet-Draft TCT May 2026 * provide a simple, deterministic JSON representation appropriate for machine learning systems, automated agents, and programmatic content consumption, including: - search indexing, - content analysis and classification, - retrieval-augmented generation (RAG) and similar ML workflows, - archival and monitoring; * define discovery and validation clearly enough for interoperable clients and servers. TCT explicitly does NOT: * define how content may or may not be used (policy, licensing, AI usage); * change the semantics of resources at C-URLs; * require new HTTP methods or status codes. 5. Architecture TCT introduces three main elements per participating origin: * C-URL: - The canonical resource URL for humans, often serving HTML. * M-URL: - A URL providing a canonical JSON representation of the same logical resource (TCT JSON). * M-Sitemap: - A JSON document listing C-URLs, M-URLs, and strong validators (etag values). High-level flow (informative): 1. Client performs GET / at https://example.com/. 2. The origin root response includes: Jurkovikj Expires 13 November 2026 [Page 6] Internet-Draft TCT May 2026 * Link: ; rel="index"; type="application/json". 3. Client fetches /llm-pages.json (M-Sitemap). 4. For each item: * learns (cUrl, mUrl, etag). 5. Client fetches mUrl as needed: * GET mUrl, with If-None-Match on subsequent checks. 6. Server responds with: * 200 OK + JSON when changed; * 304 Not Modified when unchanged. TCT is additive and optional: * Non-TCT clients ignore TCT artifacts. * Servers can deploy TCT gradually alongside existing content and sitemaps. 6. Design Rationale and Relation to Existing Mechanisms TCT is grounded in existing mechanisms and complements several related efforts: 6.1. Related Work *XML Sitemaps:* - Widely deployed for URL discovery (search engines, crawlers). - Provide timestamps but do not define normative bindings between sitemap entries and HTTP validators (ETags) for endpoint representations. - TCT builds on this model by adding structured JSON representations and strong validator integration. *ResourceSync:* - Developed by the Open Archives Initiative and collaborators for resource synchronization in digital libraries. - Provides resource lists, change lists, and capability documents. - Focus is synchronization and preservation; does not define a single, tightly integrated pattern combining: - per-resource JSON representation, - sitemap listing with validators, and - ETag-based zero-fetch semantics. - TCT addresses the specific use case of efficient web content delivery to automated agents. Jurkovikj Expires 13 November 2026 [Page 7] Internet-Draft TCT May 2026 *AMP (Accelerated Mobile Pages):* - Defines an HTML subset optimized for fast rendering on mobile devices. - Provides alternate representations via . - TCT provides JSON (not HTML) for machine consumption, targeting crawlers and content analysis rather than human browsing. *Custom JSON APIs:* - Many sites expose custom JSON endpoints for content access. - Structures, field names, and validator usage vary widely across implementations. - TCT aims to standardize a minimal, interoperable profile suitable for broad adoption. *robots.txt:* - Defines crawl directives and access policies. - TCT does not replace robots.txt; publishers MAY use both mechanisms: - robots.txt for crawl permissions and rate guidance, and - TCT for efficient content delivery. *RSS/Atom Feeds:* - Provide syndication of updates and content excerpts. - Typically lack HTTP caching integration (per-item ETags, conditional requests). - TCT can be viewed as "RSS with disciplined HTTP caching semantics." 6.2. TCT Design Choices Key design choices in TCT: * Use only existing HTTP semantics: - GET, HEAD, 200, 304, ETag, Cache-Control, Link. * Use JSON as the machine representation: - Simple, widely supported, easy to parse. - TCT is complementary to existing HTTP compression mechanisms when normal HTTP validator rules for content-coded representations are respected. * Define one strong ETag method: - Based on canonical JSON bytes of the M-URL payload. - Avoid ambiguous or dual hash methods. * Keep policy and energy considerations out of the core: - Those can be specified separately as informational work. The intent is to offer an interoperable profile that is: Jurkovikj Expires 13 November 2026 [Page 8] Internet-Draft TCT May 2026 * easy to implement, * friendly to existing caches/CDNs, and * precise enough for standardization. 7. Discovery 7.1. M-Sitemap Discovery A publisher implementing TCT MUST expose an M-Sitemap and advertise it from the origin root resource. When a client performs: * GET / with Host: example.com and receives a successful (2xx) response (either directly or after following redirects per [RFC9110]), that response: * MUST include a Link header with: - rel="index" - type="application/json" - a target that is the M-Sitemap URL for this origin. Example: * Link: ; rel="index"; type="application/json" In addition to HTTP Link headers, publishers MAY advertise an M-Sitemap from HTML C-URL responses. If the C-URL response body is HTML, and the element contains a element with: * rel="index", and * type="application/json", then clients MAY treat the referenced URL as an M-Sitemap URL, subject to content-type and profile checks. Example: Jurkovikj Expires 13 November 2026 [Page 9] Internet-Draft TCT May 2026 This mechanism is particularly useful for deployments where adding HTTP response headers is difficult but HTML templates are easily editable. In this specification, a Link header field with rel="index", type="application/json", and a target whose content matches Section 7 identifies the TCT M-Sitemap for that origin. Other uses of rel="index" remain valid and are outside the scope of this document. Notes: * /llm-sitemap.json is an example; any stable path MAY be used. * If / redirects (e.g., 301 or 302 to /en/ or /index.html), the Link header MUST appear on the final redirect target. * Clients: - SHOULD follow redirects per [RFC9110] before checking for TCT support. - MUST discover the M-Sitemap via the Link header on the final response. - If no such Link is present, SHOULD assume TCT is not deployed and MUST NOT guess paths. * If multiple Link headers with rel="index" and type="application/ json" are present, clients MAY load all of them. Publishers MAY also provide an M-Sitemap Index as defined in Section 7.2 to list multiple M-Sitemaps for an origin. This specification does not define or require any /.well-known/ URI. 7.2. M-URL Discovery and Canonical Links For each resource where an M-URL is provided: * The C-URL response (typically HTML) SHOULD advertise the M-URL as an alternate JSON representation: Either via HTML: - Or HTTP: Jurkovikj Expires 13 November 2026 [Page 10] Internet-Draft TCT May 2026 - Link: ; rel="alternate"; type="application/json" * The M-URL response for that resource MUST include a corresponding canonical link ([RFC6596]): - Link: ; rel="canonical" *Note on M-URL paths:* The choice of M-URL path (e.g., /post/ llm.json, /post/llm/, /post.json, etc.) is not specified by this document. Publishers MAY choose any stable URL scheme that suits their architecture. Clients MUST discover M-URLs via advertised links (as shown above) and MUST NOT assume a fixed path pattern. Examples of valid M-URL patterns: - https://example.com/post/llm.json (used in this document) - https://example.com/post/llm/ (directory- style) - https://example.com/post.json (extension-based) This bidirectional linkage allows clients to: * verify that an M-URL is an alternate for the expected C-URL; * detect misconfigurations when links are inconsistent; and * ensure the canonical_url field in the M-URL JSON matches (or is consistent with) the URL advertised via rel="canonical" for the corresponding C-URL. 7.3. Template-Invariance TCT's template-invariance property: * Changes to HTML templates, CSS, or JavaScript at the C-URL SHOULD NOT require changes to the M-URL JSON, so long as the underlying resource content has not changed. This is achieved by: * treating M-URLs as distinct, canonical JSON representations of content; and * computing strong ETags over the M-URL JSON only. Template-invariance is NOT achieved by relaxing strong ETag semantics; for any given M-URL, identical strong ETags MUST imply byte-identical JSON bodies. Jurkovikj Expires 13 November 2026 [Page 11] Internet-Draft TCT May 2026 8. M-URL Representation An M-URL is an HTTP resource that serves a JSON representation of a content resource suitable for machine consumption. This specification defines the observable JSON representation at M-URLs; it does not constrain how servers derive these representations from their internal data models, templates, or storage. TCT does not define cross-representation concurrency control. Origins that also support Semantic Validators for HTTP can include Semantic-ETag on C-URL responses to help capable clients correlate human-facing and machine-facing representations without first fetching the M-URL. 8.1. Content-Type and Encoding M-URL responses: * MUST use Content-Type: application/json. * MUST be valid JSON as per [RFC8259]. * MUST be encoded in UTF-8 without BOM. * Producers SHOULD include charset=utf-8 in the Content-Type header, but clients MUST NOT rely on the charset parameter being present. 8.2. Required JSON Fields The M-URL JSON object acts as an envelope containing the resource's data and metadata. It MUST contain: * profile (string, REQUIRED) - A TCT profile identifier, for example tct-1. This field signals that the representation follows this specification. * canonical_url (string, REQUIRED) - The canonical human-facing URL (C-URL) for the resource. * title (string, REQUIRED) - A human-readable title for the resource. * content_media_type (string, OPTIONAL) Jurkovikj Expires 13 November 2026 [Page 12] Internet-Draft TCT May 2026 - The IANA media type of the data contained in the content field. - If omitted, the default value is text/plain; charset=utf-8. - Typical values include text/plain; charset=utf-8, text/ markdown; charset=utf-8, and text/html; charset=utf-8. - This specification is primarily intended for text-based media types (text/*). Producers SHOULD NOT use binary media types in content_media_type unless the payload is safely representable as a UTF-8 string. * content (string, REQUIRED) - The main payload of the resource, encoded as a JSON string. - The structure of this string MUST conform to the format specified in content_media_type. For example: o If content_media_type is text/plain; charset=utf-8, content contains plain text. o If content_media_type is text/markdown; charset=utf-8, content contains markdown text (including headings, emphasis, lists, etc.). - Content SHOULD exclude purely template/boilerplate text (navigation menus, footers, etc.). Note on earlier drafts: Previous experimental versions of this protocol included a hash field inside the JSON body. That field has been removed. In this specification, the HTTP ETag header is computed strictly over the final canonical JSON representation (Section 6.2); there is no hash field inside the JSON body itself. Example (non-normative): json { "profile": "tct-1", "canonical_url": "https://example.com/ post/", "title": "Article Title", "content_media_type": "text/plain; charset=utf-8", "content": "Core article content..." } 8.3. Payload Flexibility and Structure TCT treats the JSON representation as a strict envelope, while the content field is a flexible payload. This allows different deployments to choose a representation that balances token efficiency with semantic fidelity for their agents. Jurkovikj Expires 13 November 2026 [Page 13] Internet-Draft TCT May 2026 Some common patterns: * *Plain text (text/plain; charset=utf-8)* - Suitable for simple data mining, basic full-text search, or scenarios where minimizing tokens or representation size is more important than preserving layout or hierarchy. * *Markdown (text/markdown; charset=utf-8)* - Recommended for many machine-learning and LLM scenarios. Markdown preserves headings, lists, emphasis, and other structural cues that can significantly improve machine comprehension and answer quality compared to unstructured text. * *Other text-based formats (for example, text/html; charset=utf-8)* - In some cases, producers MAY choose other text-based media types when both producers and consumers agree on how to interpret them. TCT does not define the semantics of these media types; it only transports them. Producers SHOULD choose a content_media_type that meets their agents' needs while avoiding unnecessary overhead. Semantic structure that is critical for downstream use SHOULD be either: - encoded in the chosen text format (for example, Markdown headings), and/or - expressed in additional structured JSON fields, rather than relying solely on implicit formatting. 8.4. Representation Stability For an M-URL implementing this specification: * For a given resource state, the JSON body MUST be deterministic. * Any change to the JSON body bytes (including required or optional fields) MUST result in a different strong ETag (Section 6.2). * Servers MUST NOT include per-request randomness (e.g., varying timestamps) in the TCT JSON representation. 8.5. Operational Considerations for Large Content Many TCT consumers are large language models or similar systems with bounded context windows. Publishers SHOULD avoid placing arbitrarily large documents into a single content field. Non-normative guidance: Jurkovikj Expires 13 November 2026 [Page 14] Internet-Draft TCT May 2026 * Prefer segmenting very large resources into multiple logical items when feasible (for example, per section, chapter, or article). * Keeping individual content payloads below a few hundred kilobytes is often sufficient for typical LLM context limits, but deployments may use stricter limits. * Clients MAY enforce their own maximum payload size and skip, truncate, or defer items that exceed their limits. 9. Deterministic JSON and Strong ETags 9.1. Deterministic JSON Serialization M-URL responses MUST use deterministic JSON serialization sufficient to support strong ETag semantics. Producers of M-URLs MUST use the JSON Canonicalization Scheme (JCS) as specified in [RFC8785] to canonicalize the JSON representation into a UTF-8 octet sequence. The same canonicalization algorithm MUST be used both: * when computing the strong ETag value, and * when generating the response body. In particular, canonicalization: * produces a single, unique octet sequence for each abstract JSON value; * applies stable ordering of object members at all levels; * uses deterministic formatting of numbers; and * does not introduce insignificant whitespace beyond what is necessary to delimit JSON tokens. 9.2. Strong ETag Generation (Single Method) TCT defines one mandatory method for computing strong ETags for M-URLs. For an M-URL representation: 1. Construct the full JSON object representing the resource, including all required and optional fields. Jurkovikj Expires 13 November 2026 [Page 15] Internet-Draft TCT May 2026 2. Canonicalize this JSON object to a UTF-8 octet sequence using JSON Canonicalization Scheme (JCS) as defined in Section 6.1. 3. Compute the SHA-256 digest of these canonical bytes. 4. Let F be the 64-character lowercase hexadecimal encoding of this digest. 5. Set the HTTP ETag header field to: * "sha256-F" 6. Send the canonical JCS octet sequence from step 2 as the response body, with no Content-Encoding, when using this ETag value as the strong validator for the selected representation. Requirements: * ETags for M-URLs: - MUST be strong (no W/ prefix). - MUST be quoted-strings as in [RFC9110]. * Two successful M-URL responses with the same strong ETag MUST have identical response body bytes. * Any change in the response body bytes MUST cause the strong ETag to change. From the perspective of HTTP semantics, clients MUST treat ETag values as opaque validators. TCT specifies a reproducible form (SHA-256 over canonical JSON) to support efficient comparison, but HTTP intermediaries are not required to understand this structure. Important: The strong ETag is computed over the entire canonical JSON representation described above. There is no hash field inside the JSON body itself. This ensures that the ETag is a true validator for the representation bytes, consistent with [RFC9110] and common HTTP caching practice. Jurkovikj Expires 13 November 2026 [Page 16] Internet-Draft TCT May 2026 If a deployment serves content-coded variants of an M-URL response, it MUST follow HTTP validator rules for those selected representations. In particular, a strong ETag for a content-coded representation MUST NOT be reused as the strong ETag for the identity-coded canonical JSON representation unless the selected representation bytes are identical. The simplest conformant deployment is to serve M-URLs without Content-Encoding and use transport-level security and ordinary cache revalidation to reduce transfer cost. 9.3. Content-Digest For M-URL responses served without Content-Encoding, servers SHOULD include a Content-Digest header field computed over the same canonical octet sequence used for ETag generation, using the sha-256 algorithm as defined in [RFC9530]. For example: Content-Digest: sha-256=:: This provides end-to-end integrity protection in addition to the change-detection semantics of strong ETags. When present on an identity-coded M-URL response, the Content-Digest value SHOULD be consistent with the ETag and the canonical JSON representation described in this document. If a deployment serves content-coded M-URL responses and also needs to expose a digest of the unencoded canonical JSON representation, it MAY use Unencoded-Digest [I-D.ietf-httpbis-unencoded-digest] when supported by the sender and recipient. Otherwise, deployments using Content-Digest on content-coded responses need to follow the content- coding rules defined by [RFC9530]. 9.4. Relationship to Template-Invariance Strong ETags in TCT are validators for the M-URL JSON representation only. Template-invariance is achieved structurally: * M-URLs do not include HTML templates or layout. * Changes to C-URL HTML that do not affect the M-URL JSON do not affect the strong ETag. Jurkovikj Expires 13 November 2026 [Page 17] Internet-Draft TCT May 2026 * For TCT-conformant M-URLs, strong ETags MUST be representation- based and MUST NOT vary per request in the absence of a change to the underlying JSON representation. 9.5. Canonical Text Normalization (Optional for Producers) TCT does not require clients to normalize text or recompute hashes. Use of this normalization algorithm is OPTIONAL and is not required for TCT conformance by either servers or clients. It defines an additional 'TCT text normalization' profile for implementations that choose to adopt it. However, producers or validators that derive text fields (such as content) from upstream formats MAY implement the normalization algorithm defined here to ensure stable input before JSON canonicalization. Normalization can change the surface form of text; publishers SHOULD only enable the TCT normalization profile when these transformations are acceptable for their application and do not undermine the semantics of the content. If an implementation claims conformance to this normalization, it: * MUST follow the algorithm in this section; and * MUST pass the test vectors in Appendix A. Algorithm (summary): Given input string S: 1. (Optional) HTML entity decoding: * If starting from HTML source, deterministically decode character references. 2. Unicode normalization: * Apply NFKC as defined in Unicode Standard Annex #15 (UAX15). 3. Case folding: * Apply Unicode case folding as defined in Unicode-CaseFolding. * Locale-dependent mappings MUST NOT be used. Jurkovikj Expires 13 November 2026 [Page 18] Internet-Draft TCT May 2026 4. Control characters: * Remove all Cc characters except: - U+0009 (TAB), U+000A (LF), U+000D (CR). 5. Whitespace collapsing: * Define set W: - U+0020, U+0009, U+000A, U+000D. * Optionally treat U+00A0 as whitespace, if done consistently. * Replace each maximal run of W (and optional NBSP) with a single U+0020 SPACE. 6. Trim: * Remove leading and trailing SPACE (U+0020). The result is the normalized string N(S). Note on structured text formats: When content_media_type is text/ markdown or another structured text-based format, normalization applies to the string value of the content field. Normalization MUST NOT strip or rewrite syntax characters that are semantically meaningful for that media type (for example, #, *, or | in Markdown). Normalization is limited to Unicode composition, case-folding (where configured), and whitespace handling as defined in this specification. Details, examples, and conformance language are in Appendix A. 10. M-Sitemap Format and Semantics 10.1. M-Sitemap JSON Structure The M-Sitemap is a JSON object that lists TCT-enabled resources. Fields: * version (integer, REQUIRED) - M-Sitemap format version. This specification defines version 2. Jurkovikj Expires 13 November 2026 [Page 19] Internet-Draft TCT May 2026 - Earlier experimental deployments used version 1 with different representation details (including a hash field in M-URL JSON). Those deployments are not specified here. * profile (string, RECOMMENDED) - Profile identifier for the sitemap, e.g., tct-1. - Note: The profile string identifies the TCT profile used by representations (both M-URLs and M-Sitemaps), independently of the numeric version field used in the M-Sitemap format. M-URLs also include a profile field (Section 5.2) which SHOULD match the M-Sitemap's profile value. The version field on M-Sitemaps and M-Sitemap Indexes is intended to track the JSON format used for those catalog documents. The profile string identifies the higher-level TCT profile. Future revisions may introduce new sitemap version values while keeping the same profile, or vice versa, so implementations MUST treat these two fields as independent dimensions. The version and profile fields serve different purposes: +=========+=============+=========================+ | Field | Scope | Changes when... | +=========+=============+=========================+ | version | JSON format | Field names, structure, | | | | or wire format change. | +---------+-------------+-------------------------+ | profile | TCT | Processing semantics or | | | semantics | algorithms change. | +---------+-------------+-------------------------+ Table 1 Implementations MUST treat these two fields as independent dimensions: a future document could define a new M-Sitemap format version while keeping the same profile, or vice versa. * items (array of objects, REQUIRED) - Each item: o cUrl (string, REQUIRED) + The canonical URL (C-URL) of the resource. o mUrl (string, REQUIRED) Jurkovikj Expires 13 November 2026 [Page 20] Internet-Draft TCT May 2026 + The corresponding M-URL for the resource. o etag (string, RECOMMENDED) + A strong ETag hint for the current representation at mUrl. + The value SHOULD be equal to the current HTTP ETag value used in M-URL responses (excluding HTTP quoting), but sitemap etag values are advisory. Clients MUST treat ETags used in M-URL responses as the authoritative HTTP validators. o lastModified (string, OPTIONAL) + An RFC 3339 timestamp indicating when the underlying resource content at the C-URL was last modified, as known to the publisher. + This value is advisory only and MUST NOT be treated as an HTTP validator. ETag remains authoritative for change detection and revalidation. Clients MAY use lastModified as a hint for scheduling or prioritizing fetches, but they MUST still treat ETag values as the authoritative indicator of representation changes. Example (non-normative): json { "version": 2, "profile": "tct-1", "items": [ { "cUrl": "https://example.com/post/", "mUrl": "https://example.com/post/ llm.json", "etag": "sha256-2c26b46b68ffc68ff99b453c1d30413413422d706483bfa0f98a5e886266e7", "lastModified": "2025-11-27T14:00:00Z" } ] } Clients can distinguish an M-Sitemap from an M-Sitemap Index by inspecting the top-level object. An M-Sitemap: * has version equal to 2, * MUST contain an items array, and * MUST NOT contain a top-level sitemaps array. Jurkovikj Expires 13 November 2026 [Page 21] Internet-Draft TCT May 2026 10.2. M-Sitemap Index (Optional) For large sites, a single M-Sitemap JSON document may be impractical. Publishers MAY provide an M-Sitemap Index that lists multiple M-Sitemaps. An M-Sitemap Index is a JSON object with the following fields: * version (integer, REQUIRED) - Index format version. This specification defines version 1. Note: M-Sitemaps and M-Sitemap Indexes use independent version numbers. This specification defines M-Sitemap format version 2 and M-Sitemap Index format version 1. A change to one format does not imply a change to the other. * profile (string, RECOMMENDED) - Profile identifier for the sitemap index, e.g., tct-sitemap- index-1. * sitemaps (array of objects, REQUIRED) - Each entry: o url (string, REQUIRED) + The URL of an M-Sitemap JSON document as defined above. Example (non-normative): json { "version": 1, "profile": "tct-sitemap-index-1", "sitemaps": [ { "url": "https://example.com/sitemaps/part-1.json" }, { "url": "https://example.com/sitemaps/part-2.json" } ] } Similarly, an M-Sitemap Index: * has version equal to 1, * MUST contain a sitemaps array, and * MUST NOT contain a top-level items array. Clients can use these structural differences to reliably distinguish between M-Sitemaps and M-Sitemap Indexes even when both are served with Content-Type: application/json. Jurkovikj Expires 13 November 2026 [Page 22] Internet-Draft TCT May 2026 Clients that support M-Sitemap Indexes: * MUST treat the sitemaps list as the complete set of M-Sitemaps for that origin. * MUST NOT assume that an index will itself reference other indexes. Publishers SHOULD avoid chaining indexes (for example, index -> index -> sitemap) to keep discovery logic simple. Implementations MAY detect and ignore recursive or cyclic references. 10.3. HTTP Response for M-Sitemap The M-Sitemap: * MUST use Content-Type: application/json. The M-Sitemap MUST be encoded in UTF-8. Producers SHOULD include charset=utf-8 in the Content-Type header, but clients MUST NOT rely on the charset parameter being present. * SHOULD use cache directives that encourage timely revalidation, for example: - Cache-Control: max-age=0, must-revalidate, or - a short max-age value appropriate to the site's update frequency. * SHOULD include: - Vary: Accept-Encoding 10.4. Parity Semantics Design intent: * M-Sitemap etag values SHOULD match the current strong ETag values of their corresponding M-URLs. Requirements: * Publishers MUST compute etag values using the same algorithm as Section 6.2. * Publishers SHOULD keep M-Sitemap etag values in sync with M-URL ETags. * Transient mismatches (due to non-atomic updates, caches, or propagation delays) MAY occur. Jurkovikj Expires 13 November 2026 [Page 23] Internet-Draft TCT May 2026 Client behavior: * Clients SHOULD treat M-Sitemap etag as a hint for change detection. * Clients MAY compare etag with the M-URL ETag. * Clients MUST NOT treat mismatches alone as protocol errors. * In case of mismatch, clients SHOULD fall back to standard conditional requests on the M-URL and treat the M-Sitemap etag as an advisory signal only. Strong ETag values for M-URLs and etag values in the M-Sitemap are scoped to the origin that serves them. Clients MUST NOT assume that identical validator values observed on different origins imply identical content. 11. Client Behavior 11.1. Zero-Fetch Optimization A typical TCT-aware client: 1. Fetches / and discovers the M-Sitemap via Link. 2. Fetches the M-Sitemap. 3. For each item (cUrl, mUrl, etag): * If it has a cached ETag for mUrl: - If cached ETag equals sitemap etag: o MAY skip fetching mUrl (zero-fetch). - Otherwise: o SHOULD issue conditional GET: + GET mUrl + If-None-Match: "sha256-...". * If no cached ETag: - SHOULD fetch mUrl with GET. Jurkovikj Expires 13 November 2026 [Page 24] Internet-Draft TCT May 2026 - MAY include If-None-Match using sitemap etag as hint. This enables large reductions in redundant fetches. This optimization is OPTIONAL. Clients that prefer strict HTTP cache validation MAY always perform a conditional GET with If-None-Match on M-URLs instead of relying solely on M-Sitemap etag hints. When using etag values from an M-Sitemap as hints in If-None-Match conditional requests: * If the client sends If-None-Match based on a sitemap etag and receives a 200 OK response with a different strong ETag, the client *MUST* update its local cache with the new ETag and representation. * Clients *MUST NOT* treat a mismatch between sitemap etag and the authoritative ETag in an M-URL response as a protocol error. Sitemap etag values are advisory and may be temporarily stale. 11.2. Conditional Requests to M-URLs M-URLs implementing TCT: * MUST support If-None-Match as defined in [RFC9110]. Specifically: * If If-None-Match matches the current strong ETag: - Respond with 304 Not Modified, no body. * Otherwise: - Respond with 200 OK and the JSON representation. If both If-None-Match and If-Modified-Since are present: * If-None-Match MUST take precedence (per [RFC9110]). Servers SHOULD send appropriate Cache-Control directives to encourage revalidation and safe caching. 11.3. Use of HEAD (Optional) Clients MAY use HEAD on M-URLs as an optimization: Jurkovikj Expires 13 November 2026 [Page 25] Internet-Draft TCT May 2026 * If a HEAD response includes an ETag equal to the cached one, a GET may be skipped. * If HEAD is unreliable, clients SHOULD fall back to conditional GET. Conditional GET with If-None-Match SHOULD be considered the primary mechanism. 11.4. Client Validation (Optional) For protocol correctness: * Clients are not required to implement the text normalization algorithm or to recompute validators. * Clients MAY treat ETags and sitemap etag values as opaque. Clients MAY perform additional checks as desired, such as: * verifying that an M-URL includes rel="canonical" pointing at the expected C-URL; * checking M-Sitemap etag vs M-URL ETag parity; * recomputing hashes using the published algorithms. Such additional checks are implementation choices and are out of scope for TCT compliance. 12. Operational Considerations (Informative) 12.1. Deployment with CDNs and Proxies * M-URLs and M-Sitemaps are ordinary cacheable JSON resources. * CDNs and reverse proxies: - MAY cache them; - SHOULD honor strong ETags and 304 responses. * If CDNs or reverse proxies apply content-coding: - they MUST preserve correct HTTP validator semantics for each selected representation; and Jurkovikj Expires 13 November 2026 [Page 26] Internet-Draft TCT May 2026 - they MUST NOT reuse one strong ETag across non-identical coded and identity representations. 12.2. Large Sites and Sharding For very large sites, operators MAY create multiple M-Sitemaps (for example, per section or per date) and list them from an M-Sitemap Index (Section 7.2). More advanced sharding conventions (for example, per-language or per-tenant indexes) are out of scope for this document. 12.3. Error Handling Recommended behavior: * If the M-Sitemap is unavailable or invalid: - Treat TCT as temporarily unavailable. * If an M-URL returns 4xx/5xx: - Follow normal HTTP semantics for retries/backoff. * If the M-URL is persistently broken: - Clients MAY ignore it and rely on the C-URL HTML, if appropriate. 12.4. Rate Limiting and Backoff TCT clients SHOULD respect HTTP rate limiting and overload signals. In particular: * When a client receives a 429 Too Many Requests or 503 Service Unavailable response, it SHOULD implement exponential backoff or a similar retry-suppression strategy. * Clients SHOULD NOT re-fetch the same M-Sitemap or M-Sitemap Index more frequently than once per minute, unless explicitly directed otherwise by HTTP caching headers (for example, a Cache-Control: max-age=... directive). These requirements are intended to complement, not replace, origin- specific guidance such as robots.txt rules, authentication policies, or out-of-band API documentation. Jurkovikj Expires 13 November 2026 [Page 27] Internet-Draft TCT May 2026 12.5. Backwards Compatibility * TCT is purely additive: - It does not alter C-URL semantics. - Non-participating clients see no change. * Operators can deploy TCT incrementally on selected resources. 13. Changes Since -01 This section summarizes the main changes between draft-jurkovikj- collab-tunnel-01 and this version (-02): * *Envelope and validators* - Removed the hash field from the M-URL JSON envelope. - The HTTP ETag header is now the sole authoritative validator for M-URL representations. - The JSON body and the ETag are both derived from the same canonical octet sequence (Section 6.2). * *M-URL JSON structure* - Added a REQUIRED profile field to the M-URL envelope so that clients can identify the TCT profile in use. - Added an OPTIONAL content_media_type field to describe the media type of content. The default is text/plain; charset=utf- 8. - Clarified that content is a payload field and may carry Markdown or other text-based formats. * *Canonicalization* - Strengthened the canonicalization requirement: implementations MUST use RFC 8785 JSON Canonicalization Scheme (JCS) for both the HTTP response body and ETag computation. * *M-Sitemap and M-Sitemap Index* - Defined M-Sitemap format version 2 and clarified the relationship between version and profile. Jurkovikj Expires 13 November 2026 [Page 28] Internet-Draft TCT May 2026 - Introduced an M-Sitemap Index format with its own version field, intended for large deployments that shard their M-Sitemaps. - Added an OPTIONAL lastModified field to M-Sitemap items for advisory timestamp hints. * *Discovery* - Added HTML-based discovery for the M-Sitemap using in HTML sections, in addition to HTTP Link headers. * *Normalization profile* - Defined an optional TCT text normalization profile and provided test vectors for normalization behavior. * *Operational and security guidance* - Added guidance on rate limiting and exponential backoff for clients. - Added text on scraping, permission boundaries, and content divergence (cloaking) between C-URLs and M-URLs. - Recommended the use of Content-Digest for stronger integrity protection. - Added operational considerations for large content and LLM context window limits. 14. Security Considerations TCT builds directly on HTTP; most security considerations are inherited from [RFC9110] and [RFC9111]. Key points: * HTTPS: - Publishers SHOULD serve M-URLs and M-Sitemaps over HTTPS. - Clients SHOULD validate TLS as usual. * Integrity: Jurkovikj Expires 13 November 2026 [Page 29] Internet-Draft TCT May 2026 - Strong ETags identify specific representations but do not authenticate servers. - For stronger guarantees, publishers MAY use: o Content-Digest headers ([RFC9530]); and/or o HTTP Message Signatures ([RFC9421]). * Access control: - If a C-URL requires authentication, its corresponding M-URL SHOULD be similarly protected. - M-Sitemaps MUST NOT leak sensitive M-URLs or validators. * Cache poisoning: - Correct use of ETag and Cache-Control mitigates stale or mixed content. - Clients MUST treat JSON as untrusted data and validate/sanitize as appropriate. * Privacy: - As with any sitemap, listing URLs in an M-Sitemap can reveal site structure. - Publishers concerned about this SHOULD limit entries or restrict access. * Scraping and automated access: - TCT lowers technical friction for automated content retrieval by providing a machine-optimized representation and discovery mechanism. - TCT does not change existing permission boundaries: publishers retain the same control mechanisms available for traditional web content (robots.txt, authentication, rate limiting, etc.). - Clients SHOULD respect robots.txt directives and other access control policies as they would for any HTTP resource. * Content divergence (cloaking): Jurkovikj Expires 13 November 2026 [Page 30] Internet-Draft TCT May 2026 - Publishers SHOULD ensure that M-URL content accurately reflects the substantive content of the corresponding C-URL. - Clients MAY occasionally fetch and compare both C-URL and M-URL representations to detect extreme divergence or cloaking behavior. - Persistent or deceptive divergence between C-URL and M-URL content may be treated as a trust signal by clients. * Origin trust: - Clients that consume M-Sitemaps and M-URLs inherently trust the origin in the same way they trust HTML pages or XML Sitemaps from that origin. A compromised or misconfigured origin can advertise incorrect mappings; this is not a new class of attack introduced by TCT. * Intermediaries: - Deployments SHOULD ensure that CDNs and other intermediaries do not strip or rewrite strong ETags on M-URLs or M-Sitemaps, as doing so can interfere with correct validation and zero-fetch behavior. 15. IANA Considerations This document has no IANA actions. Future documents may define: * a well-known URI for discovering M-Sitemaps, and * a media type parameter or profile URI for identifying TCT JSON representations. Those registrations are intentionally out of scope for this Experimental specification. 16. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . Jurkovikj Expires 13 November 2026 [Page 31] Internet-Draft TCT May 2026 [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, . [RFC8259] Bray, T., Ed., "The JavaScript Object Notation (JSON) Data Interchange Format", STD 90, RFC 8259, DOI 10.17487/RFC8259, December 2017, . [RFC8785] Rundgren, A., Jordan, B., and S. Erdtman, "JSON Canonicalization Scheme (JCS)", RFC 8785, DOI 10.17487/RFC8785, June 2020, . [RFC9110] Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke, Ed., "HTTP Semantics", STD 97, RFC 9110, DOI 10.17487/RFC9110, June 2022, . [RFC9111] Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke, Ed., "HTTP Caching", STD 98, RFC 9111, DOI 10.17487/RFC9111, June 2022, . 17. Informative References [RFC6596] Ohye, M. and J. Kupke, "The Canonical Link Relation", RFC 6596, DOI 10.17487/RFC6596, April 2012, . [RFC9421] Backman, A., Ed., Richer, J., Ed., and M. Sporny, "HTTP Message Signatures", RFC 9421, DOI 10.17487/RFC9421, February 2024, . [RFC9530] Polli, R. and L. Pardue, "Digest Fields", RFC 9530, DOI 10.17487/RFC9530, February 2024, . [I-D.ietf-httpbis-unencoded-digest] Pardue, L. and M. West, "HTTP Unencoded Digest", Work in Progress, Internet-Draft, draft-ietf-httpbis-unencoded- digest-04, 2 March 2026, . Jurkovikj Expires 13 November 2026 [Page 32] Internet-Draft TCT May 2026 Appendix A. Appendix A. Normalization Test Vectors This appendix provides test vectors for implementations that claim conformance to the normalization algorithm (Section 6.4). *Conformance Requirement:* Implementations claiming normalization support MUST produce the outputs specified below for all test inputs. *Test Format:* Each test shows: - Input string - Output after each normalization step - Final SHA-256 hash (computed over UTF-8 bytes of final output) A.1. A.1. Basic ASCII *Test 1: Simple ASCII text* - Input: "Hello World" - After step 1 (HTML decode): "Hello World" - After step 2 (NFKC): "Hello World" - After step 3 (casefold): "hello world" - After step 4 (control chars): "hello world" - After step 5 (whitespace): "hello world" - After step 6 (trim): "hello world" - SHA-256: b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9 *Test 2: Leading/trailing whitespace* - Input: " Hello World " - After step 1: " Hello World " - After step 2: " Hello World " - After step 3: " hello world " - After step 4: " hello world " - After step 5: " hello world " - After step 6: "hello world" - SHA-256: b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9 *Test 3: Multiple spaces* - Input: "Hello World" - After step 1: "Hello World" - After step 2: "Hello World" - After step 3: "hello world" - After step 4: "hello world" - After step 5: "hello world" - After step 6: "hello world" - SHA-256: b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9 A.1.1. A.2. HTML Entities *Test 4: Common HTML entities* - Input: "Hello & goodbye" - After step 1: "Hello & goodbye" - After step 2: "Hello & goodbye" - After step 3: "hello & goodbye" - After step 4: "hello & goodbye" - After step 5: "hello & goodbye" - After step 6: "hello & goodbye" - SHA- 256: da73536eaa9c427f3189de5b6371d798193e98f3c31df8bef710bba835e8c621 *Test 5: Angle brackets* - Input: "<tag>" - After step 1: "" - After step 2: "" - After step 3: "" - After step 4: "" - After step 5: "" - After step 6: "" - SHA-256: c81ef880af0fcfef49e1b45c3690a1666c47d9e064b7eaead2af09bb78884dcd Jurkovikj Expires 13 November 2026 [Page 33] Internet-Draft TCT May 2026 *Test 6: Quotes* - Input: ""quoted"" - After step 1: "\"quoted\"" - After step 2: "\"quoted\"" - After step 3: "\"quoted\"" - After step 4: "\"quoted\"" - After step 5: "\"quoted\"" - After step 6: "\"quoted\"" - SHA-256: 272fca25899893eeb27b89583d5c81b8a4ac5af4d1e37e3909d879947303c1c5 A.1.2. A.3. Unicode Normalization (NFKC) *Test 7: Composed vs decomposed U+00E9* - Input (composed): "Caf\u00E9" (U+00E9) - After step 1: "Caf\u00E9" - After step 2 (NFKC): "Caf\u00E9" (normalized to composed form) - After step 3: "caf\u00E9" - After step 4: "caf\u00E9" - After step 5: "caf\u00E9" - After step 6: "caf\u00E9" - SHA-256: 850f7dc43910ff890f8879c0ed26fe697c93a067ad93a7d50f466a7028a9bf4e *Test 7b: Decomposed form (should produce same result)* - Input (decomposed): "Cafe\u0301" (e + combining acute) - After step 2 (NFKC): "Caf\u00E9" (normalized to composed) - Final result: Same as Test 7 - SHA-256: 850f7dc43910ff890f8879c0ed26fe697c93a067ad93a7d50f466a7028a9bf4e (same as Test 7) *Test 8: Full-width characters* - Input: "\uFF28\uFF25\uFF2C\uFF2C\uFF2F" (full-width Latin) - After step 1: "\uFF28\uFF25\uFF2C\uFF2C\uFF2F" - After step 2 (NFKC): "HELLO" (converted to half-width) - After step 3: "hello" - After step 4: "hello" - After step 5: "hello" - After step 6: "hello" - SHA-256: 2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824 A.1.3. A.4. Case Folding Edge Cases *Test 9: German sharp S* - Input: "Stra\u00DFe" - After step 1: "Stra\u00DFe" - After step 2: "Stra\u00DFe" - After step 3 (casefold): "strasse" (U+00DF -> ss) - After step 4: "strasse" - After step 5: "strasse" - After step 6: "strasse" - SHA-256: 16d96952087774fee069b7585d3991b24d90c181c09b2129b4908c35baa7f0c0 *Test 10: Turkish U+0130 (dotted capital I)* - Input: "\u0130stanbul" - After step 1: "\u0130stanbul" - After step 2: "\u0130stanbul" - After step 3 (casefold): "i\u0307stanbul" (locale-independent) - After step 4: "i\u0307stanbul" - After step 5: "i\u0307stanbul" - After step 6: "i\u0307stanbul" - SHA-256: 4a4df120f7d1f3c286f58651abfcec2aade892ace635f96f02b946c96e6e1f86 Jurkovikj Expires 13 November 2026 [Page 34] Internet-Draft TCT May 2026 A.1.4. A.5. Control Characters *Test 11: Embedded tab* - Input: "Hello\tWorld" - After step 1: "Hello\tWorld" - After step 2: "Hello\tWorld" - After step 3: "hello\tworld" - After step 4: "hello\tworld" (tab preserved) - After step 5: "hello world" (tab -> space) - After step 6: "hello world" - SHA-256: b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9 *Test 12: Embedded newline* - Input: "Hello\nWorld" - After step 1: "Hello\nWorld" - After step 2: "Hello\nWorld" - After step 3: "hello\nworld" - After step 4: "hello\nworld" (newline preserved) - After step 5: "hello world" (newline -> space) - After step 6: "hello world" - SHA-256: b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9 *Test 13: Control character (BEL)* - Input: "Hello\u0007World" (U+0007 = BEL) - After step 1: "Hello\u0007World" - After step 2: "Hello\u0007World" - After step 3: "hello\u0007world" - After step 4: "helloworld" (control char removed) - After step 5: "helloworld" - After step 6: "helloworld" - SHA-256: 936a185caaa266bb9cbe981e9e05cb78cd732b0b3280eb944412bb6f8f8f07af A.1.5. A.6. Whitespace Edge Cases *Test 14: Non-breaking space (NBSP)* - Input: "Hello\u00A0World" (U+00A0 = NBSP) - After step 1: "Hello\u00A0World" - After step 2: "Hello\u00A0World" - After step 3: "hello\u00A0world" - After step 4: "hello\u00A0world" - After step 5: "hello world" (NBSP -> space, if treating NBSP as whitespace) - After step 6: "hello world" - SHA-256: b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9 *Note:* Step 5 behavior for NBSP is implementation-defined per Section 6.4 ("Optionally treat U+00A0 as whitespace, if done consistently"). This test assumes NBSP is treated as whitespace. *Test 15: Mixed whitespace* - Input: "Hello \t\n World" - After step 1: "Hello \t\n World" - After step 2: "Hello \t\n World" - After step 3: "hello \t\n world" - After step 4: "hello \t\n world" - After step 5: "hello world" - After step 6: "hello world" - SHA-256: b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9 A.1.6. A.7. Empty and Edge Cases *Test 16: Empty string* - Input: "" - After all steps: "" - SHA-256: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 Jurkovikj Expires 13 November 2026 [Page 35] Internet-Draft TCT May 2026 *Test 17: Whitespace only* - Input: " " - After step 1: " " - After step 2: " " - After step 3: " " - After step 4: " " - After step 5: " " - After step 6: "" (trimmed) - SHA-256: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 *Test 18: Single character* - Input: "A" - After step 1: "A" - After step 2: "A" - After step 3: "a" - After step 4: "a" - After step 5: "a" - After step 6: "a" - SHA-256: ca978112ca1bbdcafac231b39a23dc4da786eff8147c4e72b9807785afee48bb A.1.7. A.8. Complex Real-World Examples *Test 19: Article excerpt* - Input: "The caf\u00E9's "special" offer: 50% off!" (Note: uses straight ASCII quotes ' and ", not curly quotes) - Expected output after normalization: the caf\u00E9's "special" offer: 50% off! - SHA-256: 25cdbe2315674d38ddaf1df6fe7ccd494ce89efebe8a3b5285742e57e7367545 *Test 20: Unicode mixed with entities* - Input: "Clich\u00E9 & r\u00E9sum\u00E9" - Expected output after normalization: clich\u00E9 & r\u00E9sum\u00E9 - SHA-256: 7d56f360edd22f7be0bc0f126d45481df83e8afc68b83788cf37544c4ee6ce21 A.1.8. A.9. Implementation Notes *Computing SHA-256:* - Encode the final normalized string as UTF-8 bytes - Compute SHA-256 over those bytes - Express result as 64 lowercase hex characters *Test Vector Validation:* - Implementations claiming normalization support MUST produce the SHA-256 hashes specified above - The seven "hello world" variants (Tests 1, 2, 3, 11, 12, 14, 15) all normalize to identical output ("hello world"), demonstrating whitespace normalization equivalence - Tests 7 and 7b demonstrate NFKC combining character handling (both produce identical hashes) A.2. Appendix B. Example Flows (Informative) This appendix illustrates TCT discovery and fetch patterns. A.2.1. B.1. Initial Discovery and First Fetch *Scenario:* Client visits origin for the first time. ``` 1. Client -> Server: GET / HTTP/1.1 Host: example.com 1. Server -> Client: HTTP/1.1 200 OK Link: ; rel="index"; type="application/json" Content-Type: text/html Jurkovikj Expires 13 November 2026 [Page 36] Internet-Draft TCT May 2026 [HTML body...] 2. Client -> Server: GET /llm-pages.json HTTP/1.1 Host: example.com 3. Server -> Client: HTTP/1.1 200 OK Content-Type: application/json; charset=utf-8 Cache-Control: max-age=0, must-revalidate { "version": 2, "profile": "tct-1", "items": [ { "cUrl": "https://example.com/article/", "mUrl": "https://example.com/article/llm.json", "etag": "sha256-abc123..." } ] } (M-Sitemap version 2 as defined in Section 7.1) 4. Client -> Server: GET /article/llm.json HTTP/1.1 Host: example.com 5. Server -> Client: HTTP/1.1 200 OK Content-Type: application/json; charset=utf-8 ETag: "sha256-abc123..." Link: https://example.com/ article/ (https://example.com/article/); rel="canonical" { "profile": "tct-1", "canonical_url": "https://example.com/article/", "title": "The Golden Ball Rule", "content_media_type": "text/markdown; charset=utf-8", "content": "## Overview\n\nThe Golden Ball rule allows for a **147** maximum break..." } ``` *Client actions after step 6:* - Stores M-URL content locally - Caches ETag "sha256-abc123..." for future revalidation A.2.2. B.2. Zero-Fetch Optimization (Content Unchanged) *Scenario:* Client returns after some time; content hasn't changed. ``` 1. Client -> Server: GET /llm-pages.json HTTP/1.1 Host: example.com 1. Server -> Client: HTTP/1.1 200 OK Content-Type: application/json; charset=utf-8 Jurkovikj Expires 13 November 2026 [Page 37] Internet-Draft TCT May 2026 { "version": 2, "profile": "tct-1", "items": [ { "cUrl": "https://example.com/article/", "mUrl": "https://example.com/article/llm.json", "etag": "sha256-abc123..." } ] } 2. Client local comparison: * Sitemap etag: "sha256-abc123..." * Cached ETag: "sha256-abc123..." * Match! -> Skip fetch entirely (zero-fetch) 3. Client uses locally cached content for /article/ ``` *Result:* Zero bytes transferred for M-URL; content known to be current. A.2.3. B.3. Conditional Request (Content Unchanged) *Scenario:* Sitemap etag differs from cache, but actual content hasn't changed. ``` 1. Client -> Server: GET /llm-pages.json HTTP/1.1 1. Server -> Client: [Sitemap shows etag: "sha256-def456..."] 2. Client comparison: * Sitemap etag: "sha256-def456..." (different!) * Cached ETag: "sha256-abc123..." * Mismatch -> Must fetch, but use conditional request 3. Client -> Server: GET /article/llm.json HTTP/1.1 If-None-Match: "sha256-abc123..." 4. Server -> Client: HTTP/1.1 304 Not Modified ETag: "sha256-abc123..." Jurkovikj Expires 13 November 2026 [Page 38] Internet-Draft TCT May 2026 5. Client actions: * Content unchanged; uses cached copy * Notes: sitemap was stale/inconsistent; no protocol violation ``` *Result:* Small 304 response instead of full payload. A.2.4. B.4. Content Changed *Scenario:* Content has been updated. ``` 1. Client -> Server: GET /llm-pages.json HTTP/1.1 1. Server -> Client: [Sitemap shows etag: "sha256-xyz789..."] 2. Client comparison: * Sitemap etag: "sha256-xyz789..." (different) * Cached ETag: "sha256-abc123..." * Mismatch -> Fetch with If-None-Match 3. Client -> Server: GET /article/llm.json HTTP/1.1 If-None-Match: "sha256-abc123..." 4. Server -> Client: HTTP/1.1 200 OK Content-Type: application/json; charset=utf-8 ETag: "sha256-xyz789..." { "profile": "tct-1", "canonical_url": "https://example.com/article/", "title": "Updated Title", "content_media_type": "text/markdown; charset=utf-8", "content": "## Overview\n\nUpdated content with new information..." } 5. Client actions: * Replaces cached content * Updates cached ETag to "sha256-xyz789..." ``` *Result:* Full new representation received. Jurkovikj Expires 13 November 2026 [Page 39] Internet-Draft TCT May 2026 A.2.5. B.5. Parity Mismatch Handling *Scenario:* Sitemap etag doesn't match actual M-URL ETag (transient inconsistency). ``` 1. Client -> Server: GET /llm-pages.json HTTP/1.1 1. Server -> Client: [Sitemap shows etag: "sha256-old999..."] 2. Client -> Server: GET /article/llm.json HTTP/1.1 If-None-Match: "sha256-old999..." 3. Server -> Client: HTTP/1.1 200 OK ETag: "sha256-new000..." <- Different from sitemap! [Full M-URL JSON...] 4. Client actions: * Accepts M-URL response (valid per HTTP) * Uses ETag from M-URL response ("sha256-new000...") for future revalidation * Notes: sitemap inconsistency tolerated; no error ``` *Result:* Client falls back to standard HTTP caching; no protocol failure. A.2.6. B.6. Using HEAD for Efficient Freshness Check *Scenario:* Client wants to check freshness before fetching. ``` 1. Client -> Server: HEAD /article/llm.json HTTP/1.1 If-None- Match: "sha256-abc123..." 1. Server -> Client: HTTP/1.1 304 Not Modified ETag: "sha256-abc123..." 2. Client actions: * Content unchanged; uses cached copy * Avoided transferring full body OR (if content changed): Jurkovikj Expires 13 November 2026 [Page 40] Internet-Draft TCT May 2026 1. Server -> Client: HTTP/1.1 200 OK ETag: "sha256-xyz789..." Content-Length: 4567 2. Client -> Server: GET /article/llm.json HTTP/1.1 If-None-Match: "sha256-abc123..." 3. Server -> Client: HTTP/1.1 200 OK ETag: "sha256-xyz789..." [Full M-URL JSON...] ``` *Note:* HEAD support is optional; conditional GET is the primary mechanism. A.2.7. B.7. Discovery via C-URL *Scenario:* Client discovers M-URL directly from HTML page. ``` 1. Client -> Server: GET /article/ HTTP/1.1 1. Server -> Client: HTTP/1.1 200 OK Link: ; rel="alternate"; type="application/json" Content-Type: text/html ... 2. Client -> Server: GET /article/llm.json HTTP/1.1 3. Server -> Client: HTTP/1.1 200 OK ETag: "sha256-abc123..." Link: https://example.com/article/ (https://example.com/article/); rel="canonical" [M-URL JSON...] 4. Client verifies: * Canonical link points back to /article/ -> Consistent OK ``` *Result:* M-URL discovered and validated without sitemap. A.3. Appendix C. Implementation Notes (Informative) This appendix provides guidance for implementers. Jurkovikj Expires 13 November 2026 [Page 41] Internet-Draft TCT May 2026 A.3.1. C.1. Reference Implementations *Note:* The following implementations are provided as informative examples. Repository URLs, package names, and deployment details may change over time and are not normative. The following implementations demonstrate TCT in production environments: *WordPress Plugin (PHP):* - Repository: https://github.com/ antunjurkovic-collab/tct-wp-plugin - Version: 1.0.0 - Deployment: 3 production sites (970 URLs total) - Features: - Automatic M-URL generation for posts/pages - M-Sitemap generation and caching - Strong ETag computation using canonical JSON - Normalization algorithm implementation - Dependencies: WordPress 6.0+, PHP 7.4+ - JSON serialization: json_encode() with JSON_UNESCAPED_SLASHES | JSON_UNESCAPED_UNICODE *Python Validator:* - PyPI package: collab-tunnel (https://pypi.org/project/collab-tunnel/1.0.2/) - Version: 1.0.2 - Purpose: Protocol compliance testing - Features: - Validates M-URL and M-Sitemap structure - Tests ETag parity - Verifies canonical link bidirectionality - Runs normalization test vectors - Usage: python from collab_tunnel import validate_origin results = validate_origin("https://example.com") *Cloudflare Worker (Edge Proxy):* - Repository: https://github.com/ antunjurkovic-collab/tct-worker - Purpose: Demonstrates CDN integration - Features: - Proxies M-URLs with proper ETag handling - Implements 304 Not Modified caching - Handles conditional requests correctly - Deployment: Cloudflare Workers platform A.3.2. C.2. Deterministic JSON Libraries For RFC 8785 (JSON Canonicalization Scheme) compliance: *Python:* python import canonicaljson canonical_bytes = canonicaljson.encode_canonical_json(obj) - Library: pip install canonicaljson - Docs: https://github.com/matrix-org/python- canonicaljson *JavaScript:* javascript const canonicalize = require('canonicalize'); const canonical_string = canonicalize(obj); - Library: npm install canonicalize - Docs: https://github.com/cyberphone/json-canonicalization *Go:* go import "github.com/cyberphone/json-canonicalization/go/json" canonical, _ := json.CanonicalizeJSON(input) Jurkovikj Expires 13 November 2026 [Page 42] Internet-Draft TCT May 2026 *Alternative (Stable Ordering) for Non-Conformant Experiments:* If you are experimenting without claiming full TCT conformance, you can approximate canonicalization by ensuring: - Object keys sorted lexicographically (at ALL nesting levels) - No insignificant whitespace - Consistent number formatting - UTF-8 encoding without BOM *Important:* Simple key-sorting helpers (e.g., Object.keys(obj).sort() in JavaScript) are *insufficient* for nested objects and do not guarantee conformance. For production implementations claiming TCT conformance, you MUST use RFC 8785 libraries or implement the full RFC 8785 specification. The code examples in C.3 are *illustrative only* and may not handle all edge cases correctly. A.3.3. C.3. SHA-256 Computation The examples in this section are illustrative only. By themselves they do not guarantee the deterministic JSON requirements of Section 6.1 unless combined with a complete canonicalization algorithm such as RFC8785. *Note:* The examples below are simplified for illustration. For production use, ensure proper RFC 8785 canonicalization (see C.2) before hashing. *Python:* ```python import hashlib import json Appendix B. Canonical JSON canonical_json = json.dumps(obj, ensure_ascii=False, sort_keys=True, separators=(',', ':')) canonical_bytes = canonical_json.encode('utf- 8') Appendix C. Hash sha256_hash = hashlib.sha256(canonical_bytes).hexdigest() etag_value = f'"sha256-{sha256_hash}"' ``` *JavaScript:* ```javascript const crypto = require('crypto'); // Canonical JSON // NOTE: This is illustrative only; for full conformance, use RFC 8785 or a complete canonicalization implementation. const canonical_json = JSON.stringify(obj, Object.keys(obj).sort()); const canonical_bytes = Buffer.from(canonical_json, 'utf-8'); Jurkovikj Expires 13 November 2026 [Page 43] Internet-Draft TCT May 2026 // Hash const sha256_hash = crypto.createHash('sha256').update(canonical_bytes).digest('hex'); const etag_value = "sha256-${sha256_hash}"; ``` *PHP:* ```php // Canonical JSON $canonical_json = json_encode($obj, JSON_UNESCAPED_SLASHES | JSON_UNESCAPED_UNICODE); // Hash $sha256_hash = hash('sha256', $canonical_json); $etag_value = '"sha256-' . $sha256_hash . '"'; ``` C.1. C.4. Unicode Normalization *Python:* ```python import unicodedata Appendix D. NFKC normalization normalized = unicodedata.normalize('NFKC', text) Appendix E. Case folding casefolded = normalized.casefold() ``` *JavaScript:* ```javascript // NFKC normalization const normalized = text.normalize('NFKC'); // Case folding (approximation: toLowerCase with locale-independent behavior) const casefolded = normalized.toLocaleLowerCase('en-US'); ``` *PHP:* ```php // NFKC normalization (requires intl extension) $normalized = Normalizer::normalize($text, Normalizer::NFKC); // Case folding (mb_strtolower with UTF-8) $casefolded = mb_strtolower($normalized, 'UTF-8'); ``` E.1. C.5. HTTP Response Headers *Typical headers for M-URLs:* A conformant M-URL response will include at least: Content-Type: application/json, ETag (strong, quoted), and Link: rel="canonical" (see Sections 5-6). Example: HTTP/1.1 200 OK Content-Type: application/json; charset=utf-8 ETag: "sha256-abc123..." Link: ; rel="canonical" Cache-Control: public, max-age=3600, must-revalidate, no-transform Jurkovikj Expires 13 November 2026 [Page 44] Internet-Draft TCT May 2026 *Typical headers for M-Sitemap:* HTTP/1.1 200 OK Content-Type: application/json; charset=utf-8 Cache-Control: max-age=0, must- revalidate # Example; a short max-age consistent with Section 7.2 MAY also be used *Conditional request handling:* ``` # Request with If-None-Match GET /article/llm.json HTTP/1.1 If-None-Match: "sha256-abc123..." Appendix F. Response if unchanged HTTP/1.1 304 Not Modified ETag: "sha256-abc123..." Cache-Control: public, max-age=3600, must-revalidate Appendix G. Response if changed HTTP/1.1 200 OK ETag: "sha256-xyz789..." Content-Type: application/ json; charset=utf-8 [full body...] ``` G.1. C.6. Production Deployment Data *Note:* The following deployment data represents a snapshot as of November 2025. Specific sites, URLs, and metrics are provided as informative examples and may change. As of November 2025, TCT is deployed on: *bestdemotivationalposters.com:* - 500 URLs - 100K+ pageviews/month - WordPress 6.4 + TCT plugin v1.0.0 - Average HTML size: 103 KB (gzipped) - Average M-URL size: 17.7 KB (gzipped) - Bandwidth reduction: 83% *wellbeing-support.com:* - 400 URLs - Health/wellness content - Average zero-fetch rate: 85% *omacedonii.com:* - 70 URLs - Multilingual (Polish) - Demonstrates Unicode normalization in production *Aggregate Results:* - Total URLs: 970 - Bandwidth reduction: 83% median - Zero-fetch rate: 70-90% (depends on update frequency) - Combined bandwidth elimination: ~98% in steady-state G.1.1. C.7. Common Implementation Pitfalls *Pitfall 1: Non-deterministic JSON* - Problem: Random key ordering, floating-point precision issues, timestamps - Solution: Use RFC 8785 or strict ordering; exclude per-request randomness Jurkovikj Expires 13 November 2026 [Page 45] Internet-Draft TCT May 2026 *Pitfall 2: Weak ETags* - Problem: Using W/"sha256-..." instead of "sha256-..." - Solution: Always use strong ETags for M-URLs (no W/ prefix) *Pitfall 3: Sitemap Staleness* - Problem: Sitemap regenerated asynchronously; race conditions cause mismatches - Solution: Accept transient inconsistency; clients fall back to conditional GET *Pitfall 4: Incorrect Canonical Links* - Problem: rel="canonical" points to wrong URL or is missing - Solution: Validate bidirectional linkage (C-URL <-> M-URL) *Pitfall 5: HTML in Content Field* - Problem: Including raw HTML tags in content field - Solution: Extract plain text or use deterministic markup (e.g., Markdown) *Pitfall 6: Reusing Strong ETags Across Content-Coded Variants* - Problem: CDN serves gzipped and identity-coded variants with the same strong ETag even though their selected representation bytes differ. - Solution: Either serve M-URLs without Content-Encoding, or use distinct strong ETags and appropriate Vary: Accept-Encoding handling for each coded variant. *Pitfall 7: Locale-Dependent Case Folding* - Problem: Turkish U+0130 -> i vs. I -> U+0131 (locale-specific) - Solution: Use Unicode default case folding (locale-independent) G.1.2. C.8. Testing and Validation *Automated Testing:* 1. Protocol compliance: Use collab-tunnel- validator PyPI package 2. Normalization: Run Appendix A test vectors 3. ETag parity: Compare sitemap etag vs. actual M-URL ETag 4. Conditional requests: Test If-None-Match with matching/non-matching ETags *Manual Testing:* 1. Check discovery: curl -I https://example.com/ (look for Link header) 2. Fetch sitemap: curl https://example.com/ llm-pages.json 3. Validate M-URL: curl -H "Accept: application/json" https://example.com/article/llm.json 4. Test 304: curl -H 'If-None- Match: "sha256-..."' https://example.com/article/llm.json *Integration Testing:* - Deploy to staging environment - Monitor 304 response rates (should be >70% after initial crawl) - Check CDN cache hit rates - Verify canonical link bidirectionality Jurkovikj Expires 13 November 2026 [Page 46] Internet-Draft TCT May 2026 G.1.3. C.9. Performance Considerations *Server-Side:* - Cache normalized content and ETags (don't recompute on every request) - Generate M-Sitemap asynchronously during content updates - Use HTTP/2 for parallel M-URL fetches - Implement early ETag validation (before full response generation) *Client-Side:* - Use zero-fetch optimization when possible (sitemap comparison) - Batch M-Sitemap fetches (don't fetch per-URL) - Implement exponential backoff for 429/503 responses - Cache M-URLs and ETags persistently *CDN/Proxy:* - Configure strong ETag preservation - If compression is enabled, use distinct strong ETags and Vary: Accept-Encoding for coded variants - Cache 304 responses appropriately - Don't strip ETag headers G.1.4. C.10. Security Best Practices *HTTPS:* - It is RECOMMENDED to serve M-URLs and M-Sitemap over HTTPS (see Section 10) - Validate TLS certificates properly - Use HSTS where appropriate *Access Control:* - If C-URL requires authentication, protect M-URL similarly - Don't leak sensitive URLs in public sitemaps - Implement rate limiting to prevent abuse *Content Validation:* - Treat M-URL JSON as untrusted input - Validate/sanitize before use - Don't execute code from content field *ETag Integrity:* - Use Content-Digest (RFC 9530) for additional integrity - Consider HTTP Message Signatures (RFC 9421) for authentication - Monitor for ETag collision attempts (though SHA-256 makes this infeasible) Appendix H. Acknowledgments Thanks to reviewers and implementers who provided feedback on earlier revisions, including those who highlighted: * the need for a single strong ETag method; * the importance of deterministic JSON; * the separation of protocol from policy; and * simplification of discovery and parity semantics. Jurkovikj Expires 13 November 2026 [Page 47] Internet-Draft TCT May 2026 Author's Address Antun Jurkovikj North Macedonia Email: antunjurkovic@gmail.com Jurkovikj Expires 13 November 2026 [Page 48]