<?xml version="1.0" encoding="utf-8"?>
<!--
     draft-yan-iba-routing-security-requirements-00

     Security Requirements for Intent-based Agent Routing
-->

<?xml-model href="rfc7991bis.rnc"?>

<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>

<rfc
  xmlns:xi="http://www.w3.org/2001/XInclude"
  category="info"
  docName="draft-yan-iba-routing-security-requirements-00"
  ipr="trust200902"
  obsoletes=""
  updates=""
  submissionType="IETF"
  xml:lang="en"
  version="3">

  <front>
    <title abbrev="Intent-based Agent Routing Security">Security Requirements for Intent-based Agent Routing</title>

    <seriesInfo name="Internet-Draft" value="draft-yan-iba-routing-security-requirements-00"/>

    <author fullname="Yu Yan" initials="Y" role="editor" surname="Yan">
      <organization>Institute of Computing Technology, Chinese Academy of Sciences</organization>
      <address>
        <email>yanyu24z@ict.ac.cn</email>
      </address>
    </author>

    <author fullname="Sheng Sun" initials="S" role="editor" surname="Sun">
      <organization>Institute of Computing Technology, Chinese Academy of Sciences</organization>
      <address>
        <email>sunsheng@ict.ac.cn</email>
      </address>
    </author>

    <author fullname="Gaoqiang Zhou" initials="G" surname="Zhou">
      <organization>Huawei</organization>
      <address>
        <email>gaoqiangzhou@huawei.com</email>
      </address>
    </author>

    <author fullname="Min Liu" initials="M" role="editor" surname="Liu">
      <organization>Institute of Computing Technology, Chinese Academy of Sciences</organization>
      <address>
        <email>liumin@ict.ac.cn</email>
      </address>
    </author>

    <author fullname="Xinyi Zhang" initials="X" surname="Zhang">
      <organization>Computer Network Information Center, Chinese Academy of Sciences</organization>
      <address>
        <email>xyzhang@cnic.cn</email>
      </address>
    </author>

    <date year="2026" month="April"/>

    <area>Security</area>

    <keyword>intent-based routing</keyword>
    <keyword>agent security</keyword>
    <keyword>semantic routing</keyword>
    <keyword>verifiable credentials</keyword>

    <abstract>
      <t>This document specifies security requirements for intent-based agent routing. It defines a security architecture, phase-specific attack surface analysis, and normative protections for the Registration, Resolution, and Dispatch phases of routing. It also describes a secure operational process and an annotated interaction flow for protecting routing decisions, intent privacy, and capability integrity.</t>
      <t>Intent-based routing enables autonomous agents to collaborate based on semantic intent rather than static addresses, but this model introduces new security risks beyond those addressed by traditional channel protection and endpoint authentication. Existing mechanisms such as Transport Layer Security (TLS) and Public Key Infrastructure (PKI) verify identity and protect transport, but do not constrain what an agent claims to be capable of, nor do they protect the semantic content of intent queries during routing. This document establishes requirements to mitigate these risks and provides a comprehensive security framework for intent-based agent networks.</t>
    </abstract>

  </front>

  <middle>

    <section>
      <name>Introduction</name>
      <t>Intent-based agent routing represents a fundamental shift in network architecture. Autonomous agents powered by artificial intelligence are increasingly capable of reasoning, planning, and executing tasks on behalf of users or other agents. Rather than communicating via fixed service endpoints or static addresses, these agents express and receive requests as high-level semantic intents, which are resolved and forwarded by an Agent Gateway (AG) based on capability matching.</t>

      <section>
        <name>Background and Motivation</name>
        <t>Traditional networking protocols and security mechanisms—including TLS <xref target="RFC8446"/>, IPsec, and OAuth 2.0 <xref target="RFC6749"/>—are designed to protect the transport layer and verify endpoint identity. These mechanisms assume that communication targets are identified by fixed, pre-known addresses. In intent-based routing, however, this assumption no longer holds. The AG must dynamically select a Partner Agent by semantically matching an incoming task intent against a registry of advertised capabilities. This introduces a semantic control plane that has no equivalent in traditional network security models.</t>
        <t>Securing the transport channel is therefore necessary but insufficient. Trust decisions in intent-based routing must extend beyond identity to encompass the semantic validity of capability claims and the confidentiality of intent content. A standardized security framework operating at the intent level is required.</t>
      </section>

      <section>
        <name>Scope and Non-Goals</name>
        <t>This document specifies the security architecture, attack surface analysis, and normative security requirements for the intent-based agent routing framework. It covers security mechanisms for the three phases of the routing lifecycle:</t>
        <ul>
          <li><strong>Registration Phase</strong>: agent registration and capability advertisement.</li>
          <li><strong>Resolution Phase</strong>: intent query and semantic matching.</li>
          <li><strong>Dispatch Phase</strong>: routing decision dispatch and end-to-end session establishment.</li>
        </ul>
        <t>This document explicitly does <strong>not</strong> cover:</t>
        <ul>
          <li>General network-layer defense mechanisms such as DDoS protection or firewall policy.</li>
          <li>Internal security of Large Language Models or agent reasoning engines.</li>
          <li>Human-user authentication protocols, except where they directly affect routing decisions.</li>
          <li>Inter-registry federation or cross-domain trust establishment beyond what is specified here.</li>
        </ul>
      </section>

      <section>
        <name>Document Contributions</name>
        <t>This document provides the following:</t>
        <ol>
          <li><strong>Attack Surface Analysis</strong> (Section 3): A structured analysis of security vulnerabilities specific to each phase of the intent-based routing lifecycle. Registration phase surfaces are identified as AS-R-01 through AS-R-03; Resolution phase as AS-Q-01 through AS-Q-03; Dispatch phase as AS-D-01 through AS-D-02.</li>
          <li><strong>Security Requirements</strong> (Section 4): Normative per-phase security requirements identified as REQ-R-01 through REQ-R-04 (Registration), REQ-Q-01 through REQ-Q-04 (Resolution), and REQ-D-01 through REQ-D-03 (Dispatch). Each requirement is explicitly mapped to the attack surface it addresses.</li>
          <li><strong>Secure Routing Process</strong> (Section 5): A normative description of the three-phase secure routing operation, specifying the applicable requirements and concrete procedures for each phase.</li>
          <li><strong>Secure Interaction Flow</strong> (Section 6): A complete annotated message sequence diagram showing the full secure routing lifecycle, with each security action labeled by its corresponding requirement identifier.</li>
        </ol>
      </section>

      <section>
        <name>Requirements Language</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
          "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
          RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
          interpreted as described in BCP 14 <xref target="RFC2119"/>
          <xref target="RFC8174"/> when, and only when, they appear in
          all capitals, as shown here.</t>
      </section>

    </section>

    <section>
      <name>Conventions and Definitions</name>
      <t>The following terms are used throughout this document. Terms specific to the base routing framework are defined below for convenience, along with security-specific terms.</t>

      <dl newline="true">
        <dt>Leader Agent (LA)</dt>
        <dd><t>An agent that initiates a task by submitting an Intent Descriptor to the Agent Gateway. The LA is responsible for generating the intent vector locally, signing intent request messages, and establishing a direct session with the selected Partner Agent after route resolution. Also referred to as Source Agent in related literature.</t></dd>

        <dt>Partner Agent (PA)</dt>
        <dd><t>An agent that receives and executes a forwarded task. The PA MUST register its capabilities with the Agent Gateway via an authenticated Capability Advertisement before receiving any task requests. Also referred to as Target Agent in related literature.</t></dd>

        <dt>Agent Gateway (AG)</dt>
        <dd><t>The infrastructure component that receives intent queries from Leader Agents, performs semantic matching against a registry of authenticated capabilities, and returns a signed routing decision.</t></dd>

        <dt>Intent</dt>
        <dd>
          <t>A declarative expression of a desired outcome. Represented at three conceptual levels:</t>
          <ul>
            <li><t><em>Human Intent</em>: A high-level, possibly ambiguous expression from a human user. Out of scope for this specification.</t></li>
            <li><t><em>Task Intent</em>: An abstract, task-oriented description of the objective, independent of any specific agent or execution plan.</t></li>
            <li><t><em>Intent Descriptor</em>: A structured, machine-interpretable representation of Task Intent, used for routing and dispatch decisions within the AG.</t></li>
          </ul>
        </dd>

        <dt>Intent Vector</dt>
        <dd><t>A numerical embedding of an Intent Descriptor, used by the AG to compute semantic similarity scores against registered Capability Advertisements.</t></dd>

        <dt>Capability Advertisement (CAP_ADV)</dt>
        <dd><t>A registration message submitted by a Partner Agent to the AG, containing the agent's functional descriptors, supported intent domains, and associated cryptographic attestation.</t></dd>

        <dt>Semantic Namespace</dt>
        <dd><t>A bounded domain of intent types and functional roles that a Partner Agent is authorized to operate within, as asserted by a Domain Authority credential.</t></dd>

        <dt>Domain Authority (DA)</dt>
        <dd><t>A trusted entity that issues Verifiable Credentials binding a Partner Agent's identity to its authorized Semantic Namespace.</t></dd>

        <dt>Verifiable Credential (VC) / Verifiable Presentation (VP)</dt>
        <dd><t>A cryptographically signed attestation, issued by a Domain Authority, asserting a Partner Agent's identity and its authorized functional roles.</t></dd>

        <dt>Decentralized Identifier (DID)</dt>
        <dd><t>A globally unique, cryptographically verifiable identifier that does not require a centralized registry, used for agent identity establishment <xref target="DID-CORE"/>.</t></dd>
      </dl>

    </section>

    <section>
      <name>System Architecture and Security Attack Surface</name>

      <section>
        <name>System Architecture</name>
        <t>The intent-based agent routing framework involves three primary entities: the Leader Agent (LA), the Agent Gateway (AG), and the Partner Agent (PA). The routing lifecycle is structured into three security-relevant phases: Registration, Resolution, and Dispatch. Security controls are required at each phase boundary.</t>

        <figure>
          <name>System Architecture and Security Control Points</name>
          <artwork type="ascii-art" name="architecture.txt">
            <![CDATA[
                    [Domain Authority]
                           |
              (issues VC / validates namespace)
                           |
  [Partner Agent]     [Agent Gateway]          [Leader Agent]
       |                    |                       |
       |                    |                       |
  PHASE 1: REGISTRATION     |                       |
  ========================  |                       |
  [SC-1] mTLS session +     |                       |
  VP credential attach  --> |                       |
                    [SC-2] Verify VP sig +          |
                    namespace scope check           |
       |  <-- ACK (routing table updated) --        |
       |                    |                       |
  PHASE 2: RESOLUTION       |                       |
  ========================  |                       |
                            | <-- [SC-3] Signed     |
                            |     intent vector     |
                    [SC-4] Authenticate LA          |
                    + semantic search               |
                            | -- [SC-5] Signed  --> |
                            |    route response     |
                            |                       |
  PHASE 3: DISPATCH         |                       |
  ========================  |                       |
                            |           [SC-6] Verify AG sig
       | <====== Direct E2E encrypted session ====> |
       |         (task payload, bypasses AG)        |
            ]]>
          </artwork>
        </figure>

        <t><strong>Security Control Points:</strong></t>

        <table>
          <thead>
            <tr><th>ID</th><th>Phase</th><th>Location</th><th>Security Action</th></tr>
          </thead>
          <tbody>
            <tr><td>SC-1</td><td>Registration</td><td>PA to AG</td><td>Mutual TLS session establishment + VP attachment</td></tr>
            <tr><td>SC-2</td><td>Registration</td><td>AG (internal)</td><td>VP signature verification + namespace scope check</td></tr>
            <tr><td>SC-3</td><td>Resolution</td><td>LA to AG</td><td>LA signs intent vector before submission</td></tr>
            <tr><td>SC-4</td><td>Resolution</td><td>AG (internal)</td><td>LA identity verification + filtered semantic search</td></tr>
            <tr><td>SC-5</td><td>Resolution</td><td>AG to LA</td><td>AG signs route response as proof of routing</td></tr>
            <tr><td>SC-6</td><td>Dispatch</td><td>LA (internal)</td><td>LA verifies AG signature before connecting to PA</td></tr>
          </tbody>
        </table>
      </section>

      <section>
        <name>Attack Surface Analysis</name>
        <t>This section analyzes the security vulnerabilities specific to each phase of the routing lifecycle. Each attack surface is assigned a unique identifier used throughout this document to link threats to requirements and process steps.</t>

        <section>
          <name>Registration Phase Attack Surface</name>
          <t>The Registration phase is when Partner Agents publish their capabilities to the AG's routing table. This phase is exposed to the following attack surfaces:</t>

          <section>
            <name>AS-R-01: Unauthenticated Registration</name>
            <t>An adversary may attempt to register capabilities without holding a valid identity. If the AG accepts unauthenticated CAP_ADV messages, any process can inject arbitrary entries into the routing table, enabling subsequent routing manipulation.</t>
          </section>

          <section>
            <name>AS-R-02: Capability Poisoning</name>
            <t>A validly authenticated agent may advertise capability vectors that are semantically crafted to match task intents outside its authorized domain. For example, a "Logging Agent" may embed intent vectors artificially aligned with "Financial Audit" tasks to intercept sensitive requests. Standard PKI verifies identity but does not constrain what an agent claims to be able to do.</t>
          </section>

          <section>
            <name>AS-R-03: Routing Table Tampering</name>
            <t>An adversary with access to the AG's routing table management interface may overwrite or delete legitimate routing entries, redirecting traffic to unauthorized agents or causing service denial. Without audit logging, such modifications are undetectable.</t>
          </section>
        </section>

        <section>
          <name>Resolution Phase Attack Surface</name>
          <t>The Resolution phase is when the LA submits an intent query and the AG performs semantic matching. This phase is exposed to the following attack surfaces:</t>

          <section>
            <name>AS-Q-01: Unauthenticated Intent Queries</name>
            <t>An adversary may flood the AG with unsigned or spoofed intent queries, either to probe the network's capability registry or to exhaust the AG's embedding and vector search resources. This constitutes an Intent Denial of Service (IDoS) attack, targeting the computational cost of the routing logic rather than network bandwidth.</t>
          </section>

          <section>
            <name>AS-Q-02: Intent Content Exposure</name>
            <t>The AG requires visibility into the semantic content of the Intent Descriptor to perform similarity matching. This creates an inherent tension with end-to-end confidentiality: the AG must process the intent, but the intent may contain sensitive data (e.g., patient records, proprietary business logic). Without privacy-preserving mechanisms, the AG becomes a single point of failure for data leakage.</t>
          </section>

          <section>
            <name>AS-Q-03: Candidate List Manipulation</name>
            <t>An adversary performing a man-in-the-middle attack between the AG and the LA may tamper with the returned candidate list, substituting legitimate Partner Agents with malicious endpoints. Without integrity protection on the route response, the LA has no means to verify the routing decision.</t>
          </section>
        </section>

        <section>
          <name>Dispatch Phase Attack Surface</name>
          <t>The Dispatch phase is when the LA uses the routing decision to establish a direct session with the selected PA. This phase is exposed to the following attack surfaces:</t>

          <section>
            <name>AS-D-01: Route Hijacking</name>
            <t>An adversary may intercept the route response from the AG and substitute a malicious endpoint for the legitimate PA. If the LA does not cryptographically verify the AG's routing decision, it will establish a session with the attacker's endpoint and transmit the task payload to an unauthorized party.</t>
          </section>

          <section>
            <name>AS-D-02: Task Payload Interception</name>
            <t>If the task payload is transmitted through or via the AG rather than directly to the PA, the AG becomes a potential point of cleartext exposure for sensitive data. The payload must not traverse any intermediary that is not the intended recipient.</t>
          </section>
        </section>
      </section>
    </section>

    <section>
      <name>Security Requirements</name>
      <t>This section specifies the normative security requirements for intent-based agent routing. Requirements are organized by routing phase, corresponding to the attack surfaces identified in Section 3. Implementations MUST satisfy all requirements marked MUST to be considered compliant with this specification.</t>

      <section>
        <name>Registration Phase Requirements</name>
        <t><em>Applicable attack surfaces: AS-R-01, AS-R-02, AS-R-03</em></t>

        <section>
          <name>REQ-R-01: Mutual Authentication for Registration</name>
          <t>The AG MUST enforce mutual TLS (mTLS) for all CAP_ADV registration sessions. Unauthenticated agents MUST NOT be permitted to submit capability advertisements or query the routing table.</t>
          <t><em>Addresses: AS-R-01</em></t>
        </section>

        <section>
          <name>REQ-R-02: Attested Capability Advertisement</name>
          <t>A CAP_ADV message MUST include a Verifiable Presentation (VP) issued by a trusted Domain Authority. The VP MUST cryptographically bind the PA's public key to its authorized Semantic Namespace. The AG MUST verify the VP signature before accepting any registration.</t>
          <t><em>Addresses: AS-R-02</em></t>
        </section>

        <section>
          <name>REQ-R-03: Semantic Namespace Enforcement</name>
          <t>The AG MUST perform a semantic scope check on the advertised intent vector. If the vector falls outside the authorized namespace defined in the PA's VP, the AG MUST reject the registration and return an appropriate error response.</t>
          <t><em>Addresses: AS-R-02</em></t>
        </section>

        <section>
          <name>REQ-R-04: Routing Table Audit Logging</name>
          <t>All routing table modification events (registration, refresh, deregistration) MUST be recorded in a tamper-evident audit log. The log MUST capture the agent identity, timestamp, and operation type to enable detection of unauthorized routing table changes.</t>
          <t><em>Addresses: AS-R-03</em></t>
        </section>
      </section>

      <section>
        <name>Resolution Phase Requirements</name>
        <t><em>Applicable attack surfaces: AS-Q-01, AS-Q-02, AS-Q-03</em></t>

        <section>
          <name>REQ-Q-01: Leader Agent Authentication</name>
          <t>The AG MUST verify the digital signature on every intent request message before performing any semantic search. Unsigned or invalidly signed queries MUST be rejected with an AUTH_FAILED error. This prevents unauthenticated probing and mitigates IDoS by tying query admission to verified identities.</t>
          <t><em>Addresses: AS-Q-01</em></t>
        </section>

        <section>
          <name>REQ-Q-02: Intent Minimization</name>
          <t>The LA SHOULD separate the intent query into two components: (a) Routing Metadata (intent vector and constraints), transmitted to the AG; and (b) Task Payload (sensitive data), retained locally. The Task Payload MUST NOT be transmitted to the AG. Only the Routing Metadata is used for semantic matching.</t>
          <t><em>Addresses: AS-Q-02</em></t>
        </section>

        <section>
          <name>REQ-Q-03: Privacy-Preserving Intent Matching</name>
          <t>The AG SHALL support at least one privacy-preserving intent matching mechanism, such as computation over encrypted vectors using Homomorphic Encryption (HE) or semantic matching performed within a Trusted Execution Environment (TEE). This allows the AG to perform similarity scoring without access to plaintext intent content.</t>
          <t><em>Addresses: AS-Q-02</em></t>
        </section>

        <section>
          <name>REQ-Q-04: Signed Route Response</name>
          <t>The AG MUST digitally sign all route responses using its private key before returning them to the LA. The signature MUST cover the Partner Agent identifier, endpoint URI, and response timestamp, providing a cryptographically verifiable proof of routing decision.</t>
          <t><em>Addresses: AS-Q-03</em></t>
        </section>
      </section>

      <section>
        <name>Dispatch Phase Requirements</name>
        <t><em>Applicable attack surfaces: AS-D-01, AS-D-02</em></t>

        <section>
          <name>REQ-D-01: Route Response Verification</name>
          <t>Upon receiving a route response, the LA MUST verify the AG's digital signature before establishing any session with the indicated PA. If verification fails, the LA MUST abort the session and report an error.</t>
          <t><em>Addresses: AS-D-01</em></t>
        </section>

        <section>
          <name>REQ-D-02: Direct End-to-End Encrypted Session</name>
          <t>The LA MUST establish a direct, end-to-end encrypted session (e.g., TLS 1.3 <xref target="RFC8446"/> or QUIC <xref target="RFC9000"/>) with the selected PA for task payload transmission. The task payload MUST NOT be routed through the AG. The AG MUST NOT have access to the plaintext task payload.</t>
          <t><em>Addresses: AS-D-02</em></t>
        </section>

        <section>
          <name>REQ-D-03: Transport Encryption for All Signaling</name>
          <t>All signaling traffic between any two entities (LA to AG, PA to AG) MUST be transmitted over encrypted channels (TLS 1.3 or equivalent). This applies to capability advertisements, intent queries, and route responses.</t>
          <t><em>Addresses: AS-R-01, AS-Q-01, AS-D-01 (baseline for all phases)</em></t>
        </section>
      </section>
    </section>

    <section>
      <name>Secure Routing Process</name>
      <t>This section describes the normative operational procedure for secure intent-based agent routing. The process is decomposed into three phases: Registration, Resolution, and Dispatch for security analysis purposes.</t>
      <t>Steps are numbered continuously (Steps 1-11) to correspond directly to the interaction flow diagram in Section 6.</t>

      <section>
        <name>Phase 1: Trusted Registration</name>
        <t><em>Applicable requirements: REQ-R-01, REQ-R-02, REQ-R-03, REQ-R-04, REQ-D-03</em></t>
        <t>This phase establishes the trust domain. All Partner Agents MUST complete registration before any routing requests can be resolved to them.</t>

        <ol>
          <li><strong>Step 1 - Session Establishment:</strong> The PA initiates a mutually authenticated TLS (mTLS) session with the AG. Both parties present certificates; the AG MUST reject any connection where the PA cannot present a valid certificate. <em>(REQ-R-01, REQ-D-03)</em></li>
          <li><strong>Step 2 - Capability Advertisement with Attestation:</strong> The PA constructs a CAP_ADV message containing its Intent Vector and functional descriptors. The PA MUST attach a Verifiable Presentation (VP) issued by a trusted Domain Authority. The VP binds the PA's public key to its authorized Semantic Namespace. <em>(REQ-R-02)</em></li>
          <li>
            <t><strong>Step 3 - AG Validation:</strong> The AG performs two verification steps in sequence:</t>
            <ol>
              <li><t>(a) <strong>Signature Verification</strong>: The AG verifies the cryptographic signature of the attached VP. If the signature is invalid, the registration MUST be rejected.</t></li>
              <li><t>(b) <strong>Namespace Scope Check</strong>: The AG verifies that the advertised intent vector falls within the Semantic Namespace asserted by the VP. If the vector is out of scope, the registration MUST be rejected.</t></li>
            </ol>
            <t><em>(REQ-R-02, REQ-R-03)</em></t>
          </li>
          <li><strong>Step 4 - Routing Table Update and Audit:</strong> Upon successful validation, the AG commits the PA's capability profile to the routing table and records a tamper-evident audit log entry. The AG returns a registration acknowledgement to the PA. <em>(REQ-R-04)</em></li>
        </ol>
      </section>

      <section>
        <name>Phase 2: Privacy-Preserving Resolution</name>
        <t><em>Applicable requirements: REQ-Q-01, REQ-Q-02, REQ-Q-03, REQ-Q-04, REQ-D-03</em></t>
        <t>This phase is triggered when a registered LA submits a semantic intent query.</t>

        <ol>
          <li><strong>Step 5 - Intent Preparation and Minimization:</strong> The LA generates the Intent Vector locally from the Task Intent. The LA separates the query into two components: Routing Metadata (intent vector, domain constraints, budget) and Task Payload (sensitive data). Only the Routing Metadata is prepared for transmission to the AG. The Task Payload is retained locally. <em>(REQ-Q-02)</em></li>
          <li><strong>Step 6 - Signed Intent Submission:</strong> The LA signs the Routing Metadata using the credentials established during identity registration, then transmits the signed intent request message to the AG over an encrypted channel. <em>(REQ-Q-01, REQ-D-03)</em></li>
          <li><strong>Step 7 - LA Authentication and Semantic Search:</strong> The AG first verifies the LA's digital signature. If verification fails, the AG MUST reject the query with AUTH_FAILED. Upon successful verification, the AG performs semantic similarity matching against the routing table, applying trust-scope filtering to exclude agents with insufficient clearance or expired credentials. Privacy-preserving matching (HE or TEE) SHOULD be applied when supported. <em>(REQ-Q-01, REQ-Q-03)</em></li>
          <li><strong>Step 8 - Signed Route Response:</strong> The AG constructs a route response containing the selected PA's identity, endpoint URI, and public key. The AG signs this response with its own private key and returns it to the LA. <em>(REQ-Q-04)</em></li>
        </ol>
      </section>

      <section>
        <name>Phase 3: Verifiable Dispatch</name>
        <t><em>Applicable requirements: REQ-D-01, REQ-D-02, REQ-D-03</em></t>
        <t>This phase transfers the routing decision into a secure execution connection. The AG does not participate in this phase beyond having issued the signed route response.</t>

        <ol>
          <li><strong>Step 9 - Route Response Verification:</strong> The LA verifies the AG's digital signature on the route response. If verification fails, the LA MUST abort the session and MUST NOT connect to the indicated endpoint. This prevents route hijacking via man-in-the-middle tampering. <em>(REQ-D-01)</em></li>
          <li><strong>Step 10 - Direct Session Establishment:</strong> Using the verified PA endpoint and public key, the LA establishes a direct, end-to-end encrypted session with the PA (e.g., TLS 1.3 or QUIC). The AG is not involved in this session. <em>(REQ-D-02, REQ-D-03)</em></li>
          <li><strong>Step 11 - Task Payload Delivery:</strong> The LA transmits the Task Payload directly to the PA within the encrypted session established in Step 10. The AG has no access to the plaintext payload at any point. <em>(REQ-D-02)</em></li>
        </ol>
      </section>
    </section>

    <section>
      <name>Secure Interaction Flow</name>
      <t>This section presents the complete annotated message sequence for secure intent-based agent routing. Each step in the diagram corresponds to the numbered steps in Section 5. Security requirements satisfied at each step are indicated in brackets.</t>

      <figure>
        <name>Secure Interaction Flow Diagram</name>
        <artwork type="ascii-art" name="interaction-flow.txt">
          <![CDATA[
  [Partner Agent]          [Agent Gateway]             [Leader Agent]
       |                        |                            |
  --- PHASE 1: TRUSTED REGISTRATION ---------------------------
       |                        |                            |
 (1)  |--- mTLS ClientHello -->|                            |
       |<-- mTLS ServerHello ---|   [REQ-R-01, REQ-D-03]    |
       |                        |                            |
 (2)  |--- CAP_ADV             |                            |
       |   + Intent Vector      |                            |
       |   + VP (signed by DA) >|   [REQ-R-02]              |
       |                        |                            |
       |         (3a) Verify VP signature    [REQ-R-02]      |
       |         (3b) Namespace scope check  [REQ-R-03]      |
       |                        |                            |
 (4)  |<-- Registration ACK ---|                            |
       |           (Routing table updated + audit log)        |
       |                        |   [REQ-R-04]              |
       |                        |                            |
  --- PHASE 2: PRIVACY-PRESERVING RESOLUTION ------------------
       |                        |                            |
       |                        |  (5) Intent Minimization   |
       |                        |      [Routing Metadata     |
       |                        |       separated from       |
       |                        |       Task Payload]        |
       |                        |      [REQ-Q-02]            |
       |                        |                            |
       |                        |<---- Intent Request         |
 (6)  |                        |     [Signed Vector Only]   |
       |                        |     [REQ-Q-01, REQ-D-03]  |
       |                        |                            |
       |         (7a) Verify LA signature    [REQ-Q-01]      |
       |         (7b) Semantic search +                      |
       |              trust-scope filtering  [REQ-Q-03]      |
       |                        |                            |
 (8)  |                        |--- Route Response -------->|
       |                        |    [PA ID + Endpoint +     |
       |                        |     AG Signature]          |
       |                        |    [REQ-Q-04]              |
       |                        |                            |
  --- PHASE 3: VERIFIABLE DISPATCH ---------------------------
       |                        |                            |
       |                        |  (9) Verify AG signature   |
       |                        |      [REQ-D-01]            |
       |                        |                            |
 (10) |<======== Direct TLS 1.3 / QUIC Session ==============>|
       |         [E2E Encrypted, AG not involved]            |
       |         [REQ-D-02, REQ-D-03]                       |
       |                        |                            |
 (11) |<======== Task Payload Transmission ================>|
       |         [Plaintext never exposed to AG]             |
       |         [REQ-D-02]                                  |
       |                        |                            |
          ]]>
        </artwork>
      </figure>

      <t><strong>Requirement Coverage Summary:</strong></t>

      <table>
        <thead>
          <tr><th>Step</th><th>Description</th><th>Requirements Satisfied</th></tr>
        </thead>
        <tbody>
          <tr><td>1</td><td>mTLS session establishment</td><td>REQ-R-01, REQ-D-03</td></tr>
          <tr><td>2</td><td>CAP_ADV with VP submission</td><td>REQ-R-02</td></tr>
          <tr><td>3a</td><td>VP signature verification</td><td>REQ-R-02</td></tr>
          <tr><td>3b</td><td>Namespace scope check</td><td>REQ-R-03</td></tr>
          <tr><td>4</td><td>Routing table update + audit log</td><td>REQ-R-04</td></tr>
          <tr><td>5</td><td>Intent minimization</td><td>REQ-Q-02</td></tr>
          <tr><td>6</td><td>Signed intent request submission</td><td>REQ-Q-01, REQ-D-03</td></tr>
          <tr><td>7a</td><td>LA signature verification</td><td>REQ-Q-01</td></tr>
          <tr><td>7b</td><td>Semantic search + trust filtering</td><td>REQ-Q-03</td></tr>
          <tr><td>8</td><td>Signed route response</td><td>REQ-Q-04</td></tr>
          <tr><td>9</td><td>AG signature verification by LA</td><td>REQ-D-01</td></tr>
          <tr><td>10</td><td>Direct E2E session establishment</td><td>REQ-D-02, REQ-D-03</td></tr>
          <tr><td>11</td><td>Task payload delivery</td><td>REQ-D-02</td></tr>
        </tbody>
      </table>

    </section>

    <section>
      <name>Conclusions</name>
      <t>Intent-based agent routing introduces a semantic control plane for which traditional transport-layer security is insufficient. This document has defined a security architecture by analyzing the attack surfaces specific to each routing phase, establishing normative requirements mapped directly to those surfaces, and specifying a secure operational process with a fully annotated interaction flow.</t>
      <t>The attack surface identifiers, requirement identifiers, process steps, and flow diagram steps maintain strict correspondence throughout, enabling implementers to trace any security property from its threat origin to its operational realization.</t>
    </section>

    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>

    <section anchor="Security">
      <name>Security Considerations</name>
      <t>This document specifies comprehensive security requirements for intent-based agent routing systems. The security considerations are fully addressed through the requirements and processes defined in Sections 3 through 6 of this document. All security controls are mandatory for compliant implementations unless explicitly marked as SHOULD or MAY.</t>
      <t>Key security properties ensured by this specification include:</t>
      <ul>
        <li>Mutual authentication between all routing participants</li>
        <li>Cryptographic attestation of agent capabilities</li>
        <li>Semantic namespace enforcement to prevent capability poisoning</li>
        <li>Privacy-preserving intent matching mechanisms</li>
        <li>Cryptographically signed routing decisions</li>
        <li>End-to-end encrypted session establishment for task payload delivery</li>
        <li>Tamper-evident audit logging for routing table modifications</li>
      </ul>
    </section>

  </middle>

  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>

        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner">
              <organization/>
            </author>
            <date year="1997" month="March"/>
          </front>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="BCP" value="14"/>
        </reference>

        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba">
              <organization/>
            </author>
            <date year="2017" month="May"/>
          </front>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="BCP" value="14"/>
        </reference>

        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date year="2018" month="August"/>
          </front>
          <seriesInfo name="RFC" value="8446"/>
        </reference>

        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author initials="J." surname="Iyengar">
              <organization/>
            </author>
            <author initials="M." surname="Thomson">
              <organization/>
            </author>
            <date year="2021" month="May"/>
          </front>
          <seriesInfo name="RFC" value="9000"/>
        </reference>

      </references>

      <references>
        <name>Informative References</name>

        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author initials="D." surname="Hardt">
              <organization/>
            </author>
            <date year="2012" month="October"/>
          </front>
          <seriesInfo name="RFC" value="6749"/>
        </reference>

        <reference anchor="DID-CORE">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author initials="M." surname="Sporny">
              <organization/>
            </author>
            <author initials="A." surname="Guy">
              <organization/>
            </author>
            <author initials="M." surname="Sabadello">
              <organization/>
            </author>
            <author initials="D." surname="Reed">
              <organization/>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="W3C Recommendation" value="did-core"/>
        </reference>

        <reference anchor="VC-DATA-MODEL">
          <front>
            <title>Verifiable Credentials Data Model v1.1</title>
            <author initials="M." surname="Sporny">
              <organization/>
            </author>
            <author initials="D." surname="Longley">
              <organization/>
            </author>
            <author initials="D." surname="Chadwick">
              <organization/>
            </author>
            <date year="2022" month="March"/>
          </front>
          <seriesInfo name="W3C Recommendation" value="vc-data-model-1.1"/>
        </reference>

      </references>
    </references>

    <section anchor="Acknowledgements" numbered="false">
      <name>Acknowledgements</name>
      <t>This document is the product of research conducted at the Institute of Computing Technology, Chinese Academy of Sciences.</t>
    </section>

  </back>
</rfc>
