<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hood-agtp-session-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="AGTP-SESSION">AGTP Session Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-hood-agtp-session-00"/>
    <author fullname="Chris Hood">
      <organization>Nomotic, Inc.</organization>
      <address>
        <email>chris@nomotic.ai</email>
        <uri>https://nomotic.ai</uri>
      </address>
    </author>
    <date year="2026" month="April" day="30"/>
    <area>Applications and Real-Time</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>AI agents</keyword>
    <keyword>sessions</keyword>
    <keyword>agent communication</keyword>
    <keyword>long-lived connections</keyword>
    <abstract>
      <?line 57?>

<t>This document specifies the AGTP Session Protocol (AGTP-SESSION), a
companion to <xref target="AGTP"/> that defines session semantics for agent-to-agent
and agent-to-API communication. AGTP-SESSION addresses two distinct
session models: bounded sessions for time-limited transactional flows,
and persistent sessions for long-lived agent contexts. Both inherit
identity, authority, and attribution from base AGTP. This is an early
working draft; many design decisions are deliberately open.</t>
    </abstract>
  </front>
  <middle>
    <?line 67?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Base AGTP defines request-and-response semantics for individual method
invocations between agents. Many real-world agent interactions span
multiple invocations under shared context: a chatbot conversation that
continues across hours, an agentic commerce flow that completes a
transaction across a sequence of methods, a research agent maintaining
working state across a long-running task.</t>
      <t>These interactions need session semantics that base AGTP does not
specify. AGTP-SESSION defines those semantics as a companion protocol
that builds on base AGTP without modifying it.</t>
      <t>The architectural commitment is straightforward: a session in AGTP is
an agent-level abstraction. It is not a TLS connection, a QUIC
connection, or a transport-layer session. It is a logical context
shared between two or more agents (or between an agent and an API),
within which multiple method invocations carry shared identity,
authority scope, and attribution chain.</t>
      <t>A session may map to a single underlying transport connection, may
span multiple connections over time, or may persist while the
underlying transport is intermittently disconnected and reestablished.
The session state is the agent-level fact; the connection is the
mechanism that carries traffic when active.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in
all capitals, as shown here.</t>
      <dl>
        <dt>Session:</dt>
        <dd>
          <t>A logical context shared between AGTP participants under which
multiple method invocations are correlated, identity and authority
remain consistent, and shared state evolves across the lifetime of
the session. Sessions are agent-level abstractions, not transport-
level constructs.</t>
        </dd>
        <dt>Bounded Session:</dt>
        <dd>
          <t>A session with an explicit termination condition: a time limit, an
action completion, or a transaction outcome. Bounded sessions are
appropriate for commerce flows, multi-step delegations with finite
scope, and any agent interaction with a defined end state.</t>
        </dd>
        <dt>Persistent Session:</dt>
        <dd>
          <t>A long-lived session intended to span hours, days, or longer. State
is maintained across reconnections. Persistent sessions are
appropriate for chatbot interactions, research agents, monitoring
agents, and other contexts where the agent retains continuity.</t>
        </dd>
        <dt>Session Identifier:</dt>
        <dd>
          <t>A unique identifier assigned at session establishment that is
carried in every method invocation within the session. Format and
scope of session identifiers are TBD.</t>
        </dd>
        <dt>Session Context:</dt>
        <dd>
          <t>The shared state associated with a session, including (but not
limited to) participant Agent-IDs, Authority-Scope grants applicable
to the session, accumulated Attribution-Records for invocations
within the session, and any session-specific governance metadata.</t>
        </dd>
      </dl>
    </section>
    <section anchor="session-models">
      <name>Session Models</name>
      <t>AGTP-SESSION defines two session models. Implementations MAY support
one or both depending on deployment profile.</t>
      <section anchor="bounded-sessions">
        <name>Bounded Sessions</name>
        <t>Bounded sessions exist for a finite, often short period and complete
when one of the following conditions is met:</t>
        <ul spacing="normal">
          <li>
            <t>An explicit time limit (<tt>session_ttl</tt>) expires</t>
          </li>
          <li>
            <t>A defined transaction or workflow completes</t>
          </li>
          <li>
            <t>A participant explicitly terminates the session</t>
          </li>
          <li>
            <t>An authority constraint is violated (e.g., scope limit reached)</t>
          </li>
        </ul>
        <t>Bounded sessions match the semantics of agentic transactions where the
session has a clear lifecycle: an agent initiates a purchase flow,
exchanges several methods with a merchant, completes the transaction,
and the session closes. The session boundary is meaningful to
governance and attribution: all method invocations within a bounded
session are correlated under a single transactional context.</t>
      </section>
      <section anchor="persistent-sessions">
        <name>Persistent Sessions</name>
        <t>Persistent sessions exist for extended periods and are designed to
survive transport disconnection, network instability, and platform
restarts. The session identifier remains stable; the underlying
transport may reconnect multiple times during the session lifetime.</t>
        <t>Persistent sessions match the semantics of long-lived agent contexts:
a chatbot maintaining conversation continuity, a research agent
working on a multi-day task, a monitoring agent maintaining persistent
attention to a system. Authority-Scope grants applicable to the
session may be re-validated periodically; identity verification
follows base AGTP semantics on reconnection.</t>
      </section>
    </section>
    <section anchor="session-establishment">
      <name>Session Establishment</name>
      <t>A session is established explicitly via an <tt>ESTABLISH</tt> method invoked
between two AGTP participants. Implicit establishment via an extended-
context flag on a standard method invocation is noted as an
alternative under consideration but is <strong>NOT RECOMMENDED</strong> as the
primary mechanism. Explicit establishment provides:</t>
      <ul spacing="normal">
        <li>
          <t>Unambiguous negotiation of session model (bounded or persistent),
session lifetime, and any session-scoped Authority-Scope grants</t>
        </li>
        <li>
          <t>A clear root for the session attribution chain, with the ESTABLISH
invocation serving as the first signed Attribution-Record under
the session</t>
        </li>
        <li>
          <t>Clean error semantics when negotiation fails (e.g., 451 Scope
Violation if session-scoped grants exceed the establishing agent's
Authority-Scope, 4xx for unsupported session models, 5xx for
governance platform unavailability)</t>
        </li>
        <li>
          <t>Predictable enforcement boundaries for governance platforms and
Scope-Enforcement Points, which can recognize session establishment
as a distinct event rather than inferring it from method context</t>
        </li>
      </ul>
      <t>The full wire format and parameter set for <tt>ESTABLISH</tt> is not specified
in this version. At minimum, the method <strong>MUST</strong> carry:</t>
      <ul spacing="normal">
        <li>
          <t>The proposed session model (<tt>bounded</tt> or <tt>persistent</tt>)</t>
        </li>
        <li>
          <t>A proposed session lifetime (<tt>session_ttl</tt>) for bounded sessions</t>
        </li>
        <li>
          <t>Any session-scoped Authority-Scope grants the establishing agent
proposes for the session context</t>
        </li>
        <li>
          <t>Standard AGTP request fields (Agent-ID, Principal-ID, Authority-
Scope, signature)</t>
        </li>
      </ul>
      <t>A successful <tt>ESTABLISH</tt> response <strong>MUST</strong> carry:</t>
      <ul spacing="normal">
        <li>
          <t>A session identifier (format TBD; see Open Questions)</t>
        </li>
        <li>
          <t>The accepted session model and lifetime</t>
        </li>
        <li>
          <t>The accepted Authority-Scope grants for the session</t>
        </li>
        <li>
          <t>A governance platform signature binding the session identifier to
the participating Agent-IDs</t>
        </li>
      </ul>
      <t>Rejection of an <tt>ESTABLISH</tt> request follows base AGTP status code
semantics. Implementations <strong>MUST NOT</strong> establish a session by side
effect of any other method invocation; the absence of a successful
<tt>ESTABLISH</tt> response means no session exists.</t>
    </section>
    <section anchor="inheritance-from-base-agtp">
      <name>Inheritance from Base AGTP</name>
      <t>AGTP-SESSION inherits all base AGTP properties:</t>
      <ul spacing="normal">
        <li>
          <t>Agent-only at the wire level. Sessions exist between agents, not
between general-purpose actors.</t>
        </li>
        <li>
          <t>Agent-ID and Principal-ID present on every method invocation,
including invocations within a session.</t>
        </li>
        <li>
          <t>Authority-Scope enforced on every method invocation. Scopes are
not relaxed inside sessions.</t>
        </li>
        <li>
          <t>Attribution Records signed for every invocation, including those
within sessions, with the session identifier included in the
attribution metadata.</t>
        </li>
        <li>
          <t>Status codes, including 451 Scope Violation and 551 Authority Chain
Broken, apply within sessions exactly as outside them.</t>
        </li>
        <li>
          <t>Three-level verification model. Sessions do not weaken verification.</t>
        </li>
      </ul>
      <t>AGTP-SESSION adds session-specific semantics on top of these
properties; it does not replace or modify them.</t>
    </section>
    <section anchor="transport-considerations">
      <name>Transport Considerations</name>
      <t>Base AGTP runs over TCP with TLS 1.3 or over QUIC. AGTP-SESSION
inherits these transport options.</t>
      <t>QUIC is a particularly natural fit for persistent sessions because of
its connection migration capability <xref target="RFC9000"/>, which allows a
logical connection to survive IP address changes and network path
changes without renegotiation. AGTP-SESSION over QUIC can leverage
QUIC's connection migration to maintain a persistent session across
network transitions transparently.</t>
    </section>
    <section anchor="relationship-to-moqt-and-real-time-media">
      <name>Relationship to MOQT and Real-Time Media</name>
      <t>The proposed AI Agent Communication Protocols (acp) charter under
discussion at IETF anticipates a session protocol on webtransport or
MOQ as a foundational building block for agent communication. That
work and AGTP-SESSION reflect inverse architectural commitments.</t>
      <t>The acp approach treats session and transport semantics as the
foundation, with agent-specific concerns (identity, authority,
attribution) layered on top by the protocols that compose on the
session. Under this model, the session protocol does not know that
its traffic is agent traffic; agent semantics are an application-
layer concern.</t>
      <t>AGTP-SESSION reflects the inverse: agent-specific concerns are the
foundation (in base AGTP), and session semantics layer on top of an
agent-aware substrate. Under this model, a session is, by definition,
an agent session. The protocol carries identity, authority, and
attribution at the wire level for every method invocation within the
session, because the substrate beneath the session already commits to
carrying agent traffic structurally.</t>
      <t>The two architectures are not mutually exclusive in deployment.
MOQT-style relay-based pub/sub patterns and real-time media streaming
address use cases (particularly voice with sub-100ms barge-time
interruption) that AGTP-SESSION does not currently address. A future
companion draft (or a later version of AGTP-SESSION) may define how
AGTP composes with MOQT-style transport for real-time agent media, or
how MOQT-style sessions can carry AGTP semantic envelopes.</t>
      <t>The architectural choice between these two foundations is a question
for community discussion. Both deliver session semantics; they differ
on which layer commits to knowing the traffic is agent traffic.</t>
    </section>
    <section anchor="application-layering-voice-and-multi-modal-agents">
      <name>Application Layering: Voice and Multi-Modal Agents</name>
      <t>AGTP-SESSION focuses on session semantics for agent communication. It
does not specify protocols for real-time voice, video, or multi-modal
data exchange.</t>
      <t>Voice agents, video agents, and multi-modal agents are application-
layer constructs that can compose on top of AGTP and AGTP-SESSION.
They are not different kinds of agents at the protocol layer; they
are agents that produce or consume specific media types.</t>
      <t>This raises a related architectural question worth surfacing for
community discussion: AGTP may benefit from an agent type system,
analogous to HTTP Content-Type, that allows the protocol to identify
the kind of agent or kind of agent payload involved in a given
exchange. This is not part of AGTP-SESSION as currently scoped but is
flagged here as adjacent work that may warrant its own companion
specification.</t>
    </section>
    <section anchor="out-of-scope-for-v00">
      <name>Out of Scope for v00</name>
      <t>The following are deliberately out of scope for this version:</t>
      <ul spacing="normal">
        <li>
          <t>Real-time voice and barge-time interruption semantics</t>
        </li>
        <li>
          <t>Pub/sub and relay-based session patterns (MOQT-style multicast)</t>
        </li>
        <li>
          <t>Session migration across organizations or governance platforms</t>
        </li>
        <li>
          <t>Session state synchronization across multiple agents in a chain</t>
        </li>
        <li>
          <t>Detailed protocol specification for ESTABLISH/OPEN methods</t>
        </li>
        <li>
          <t>Session encryption beyond what TLS 1.3 or QUIC already provides</t>
        </li>
        <li>
          <t>Wire format for session metadata</t>
        </li>
      </ul>
      <t>These are flagged as future work or as open questions to be resolved
through community input.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Base AGTP security considerations apply to every method invocation
within a session, including invocations occurring under bounded or
persistent session models. This section identifies session-specific
risks and mitigations that supplement the base AGTP threat model.</t>
      <section anchor="session-identifier-theft-and-replay">
        <name>Session Identifier Theft and Replay</name>
        <t>Threat: An attacker who obtains a session identifier may attempt to
inject method invocations into an active session by replaying or
forging requests carrying the identifier.</t>
        <t>Mitigation: Session identifiers <strong>MUST</strong> be bound at establishment
time to the participating Agent-IDs and to a transport channel
binding (TLS exporter or QUIC connection ID, depending on transport).
Session identifiers in isolation <strong>MUST NOT</strong> be sufficient to
authorize method invocations. Every invocation within a session
<strong>MUST</strong> continue to satisfy base AGTP identity verification (per
<xref target="AGTP"/> Section 7), and the receiving party <strong>MUST</strong> reject
invocations whose identity cannot be reverified against the
participants bound to the session at establishment.</t>
      </section>
      <section anchor="persistent-session-compromise">
        <name>Persistent Session Compromise</name>
        <t>Threat: A persistent session that survives transport disconnection
and reconnection has a longer attack window than a bounded session.
An attacker who compromises a participant's signing key during the
session lifetime can impersonate the participant for the remainder
of the session.</t>
        <t>Mitigation: Persistent sessions <strong>SHOULD</strong> require periodic
Authority-Scope re-validation against the establishing governance
platform. Recommended re-validation interval is implementation-
defined but <strong>SHOULD NOT</strong> exceed the lifetime of the underlying
Authority-Scope grants. Persistent sessions <strong>MUST</strong> support
revocation propagation: if a participant's Agent Genesis or Agent
Certificate is revoked during the session, the session <strong>MUST</strong>
terminate with appropriate status code on the next invocation.
Implementations <strong>SHOULD</strong> subscribe to revocation notifications
via mechanisms defined in <xref target="AGTP-CERT"/> or <xref target="AGTP-LOG"/>.</t>
      </section>
      <section anchor="cross-session-correlation">
        <name>Cross-Session Correlation</name>
        <t>Threat: An adversary observing multiple sessions from the same agent
may be able to correlate sessions to construct a profile of agent
behavior across contexts, even if individual session contents are
encrypted.</t>
        <t>Mitigation: Session identifiers <strong>MUST NOT</strong> be derived from
participant Agent-IDs in a way that enables cross-session linkage.
Session identifiers <strong>SHOULD</strong> be cryptographically random and
unique per session. Implementations supporting privacy-sensitive
deployments <strong>SHOULD</strong> consider session identifier rotation policies
that limit linkability, with the trade-off that rotation complicates
revocation propagation.</t>
      </section>
      <section anchor="authority-constraint-violation-mid-session">
        <name>Authority Constraint Violation Mid-Session</name>
        <t>Threat: An agent participating in an established session may attempt
to invoke methods that exceed session-scoped Authority-Scope grants,
either through scope drift across multiple invocations or through
deliberate scope expansion attempts.</t>
        <t>Mitigation: Authority-Scope is enforced on every invocation
regardless of session context. A scope violation <strong>MUST</strong> trigger
451 Scope Violation per base AGTP. Receiving parties <strong>MAY</strong> elect
to terminate the session on first scope violation rather than
continuing to accept further invocations. Termination on scope
violation is <strong>RECOMMENDED</strong> for bounded sessions where the violation
suggests the session boundary has been compromised.</t>
      </section>
      <section anchor="quic-0-rtt-resumption-considerations">
        <name>QUIC 0-RTT Resumption Considerations</name>
        <t>Threat: When AGTP-SESSION runs over QUIC, 0-RTT connection resumption
allows initial method invocations on a resumed connection to be
processed before full handshake completion. Replay of 0-RTT data is
a known QUIC consideration.</t>
        <t>Mitigation: Method invocations transmitted in 0-RTT data <strong>MUST NOT</strong>
be permitted to ESTABLISH a new session. Session establishment
<strong>MUST</strong> occur after the QUIC handshake has completed. Invocations
within an existing session <strong>MAY</strong> use 0-RTT but <strong>MUST</strong> be
idempotent or otherwise replay-safe at the application level.
Implementations <strong>SHOULD</strong> consult QUIC 0-RTT replay guidance
(<xref target="RFC9001"/> Section 9.2) when configuring session resumption
behavior.</t>
      </section>
      <section anchor="graceful-termination-and-revocation">
        <name>Graceful Termination and Revocation</name>
        <t>Threat: A session may need to be terminated mid-flow due to
revocation, scope violation, time expiry, or governance policy
changes. Improper termination handling can leave participants in
inconsistent state.</t>
        <t>Mitigation: Implementations <strong>MUST</strong> define termination semantics
that produce a final Attribution-Record signed by the terminating
party identifying the termination reason. Mid-session revocation of
either participant's Agent Genesis or Agent Certificate <strong>MUST</strong>
result in session termination. Time-based expiry of bounded sessions
<strong>MUST</strong> be enforced based on the establishing governance platform's
authoritative time, not on participant-local clocks.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="AGTP">
          <front>
            <title>Agent Transfer Protocol (AGTP)</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-independent-agtp-06"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9001">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="AGTP-CERT">
          <front>
            <title>AGTP Agent Certificate Extension</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-agent-cert-00"/>
        </reference>
        <reference anchor="AGTP-LOG">
          <front>
            <title>AGTP Transparency Log Protocol</title>
            <author fullname="Chris Hood">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-log-00"/>
        </reference>
      </references>
    </references>
    <?line 420?>

<section anchor="open-questions">
      <name>Open Questions</name>
      <ul spacing="normal">
        <li>
          <t>Should sessions be established explicitly via an ESTABLISH method,
or implicitly via an extended-context flag on a standard method?</t>
        </li>
        <li>
          <t>What is the canonical format and scope for session identifiers?
(256-bit similar to Agent-ID, or shorter for performance?)</t>
        </li>
        <li>
          <t>How does session attribution interact with the base AGTP
Attribution-Record? Are session-level attribution rollups defined?</t>
        </li>
        <li>
          <t>How are persistent sessions migrated across governance platform
changes (e.g., merchant changes governance providers mid-session)?</t>
        </li>
        <li>
          <t>Should AGTP define an agent type system (Agent Content-Type)
separately, or as part of session establishment?</t>
        </li>
        <li>
          <t>What is the right composition story with MOQT for real-time agent
media use cases?</t>
        </li>
        <li>
          <t>Should multi-party sessions (more than two participants) be in
scope for this draft, or deferred to a separate companion?</t>
        </li>
      </ul>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>This draft is informed by the IETF agent2agent charter formation
discussion and by feedback on the architectural layering question
raised in that thread.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
