<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.32 (Ruby 4.0.1) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc compact="yes"?>

<rfc ipr="trust200902" docName="draft-teodor-pilot-problem-statement-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Agent Network Problem Statement">Problem Statement: Network-Layer Infrastructure for Autonomous Agent Communication</title>

    <author initials="C." surname="Teodor" fullname="Calin Teodor">
      <organization>Vulture Labs</organization>
      <address>
        <email>calin@vulturelabs.com</email>
      </address>
    </author>

    <date year="2026" month="March" day="14"/>

    <area>Internet</area>
    <workgroup>Independent Submission</workgroup>
    

    <abstract>


<?line 73?>

<t>AI agents --- autonomous software entities capable of reasoning, planning,
and executing tasks --- are an increasingly important class of network
participant. Current agent communication protocols operate exclusively at
the application layer over HTTP, assuming the existence of stable endpoints,
DNS names, and centralized infrastructure. No existing standard provides
network-layer identity, addressing, or transport for agents. This document
describes the problem space and identifies requirements for a network-layer
infrastructure that would give agents first-class network citizenship,
independent of the web infrastructure designed for human users.</t>



    </abstract>



  </front>

  <middle>


<?line 85?>

<section anchor="introduction"><name>Introduction</name>

<t>The internet's protocol stack was designed for human-operated devices with
stable network attachments. IP addresses identify interfaces, DNS names
identify services, and TLS certificates identify organizations. These
assumptions break down for AI agents, which are transient software
processes that may run behind NAT, migrate between hosts, and lack
persistent network identity.</t>

<t>Recent standardization efforts for agent communication --- notably MCP
<xref target="MCP"/> (agent-to-tool) and A2A <xref target="A2A"/> (agent-to-agent) --- have focused
on application-layer protocols built on HTTP. These protocols define what
agents say to each other but assume the underlying problem of how agents
reach each other is already solved. For agents running in cloud
environments with public endpoints, this assumption holds. For agents
running on edge devices, behind corporate firewalls, on laptops, or in
heterogeneous multi-cloud deployments, it does not.</t>

<t>The IETF has seen significant activity in AI agent protocol
standardization, with over a dozen drafts filed in 2025-2026 (see
<xref target="I-D.rosenberg-aiproto-framework"/>, <xref target="I-D.zyyhl-agent-networks-framework"/>,
<xref target="I-D.narvaneni-agent-uri"/>). Every one of these drafts operates at the
application layer over HTTP. None addresses the network or transport layer.</t>

<t>This document describes the problem of network-layer infrastructure for
autonomous agent communication, identifies the gaps in existing protocols,
and states requirements for a solution. It is modeled after <xref target="RFC7364"/>,
which performed a similar analysis for network virtualization overlays.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<dl>
  <dt>Agent:</dt>
  <dd>
    <t>An autonomous software entity capable of reasoning, planning, and
executing tasks without continuous human supervision. An agent may run as
a process, container, or serverless function.</t>
  </dd>
  <dt>Overlay Network:</dt>
  <dd>
    <t>A virtual network built on top of an existing network (the underlay).
Overlay nodes communicate using encapsulated packets carried over the
underlay.</t>
  </dd>
  <dt>Virtual Address:</dt>
  <dd>
    <t>A network address assigned within the overlay address space, independent
of the underlay IP address. A virtual address identifies an agent, not a
network interface.</t>
  </dd>
  <dt>Registry:</dt>
  <dd>
    <t>A service that assigns virtual addresses, maintains an address-to-locator
mapping table, and provides bootstrap information for overlay
participants.</t>
  </dd>
  <dt>Trust Handshake:</dt>
  <dd>
    <t>A protocol exchange through which two agents establish a bilateral trust
relationship with explicit mutual consent.</t>
  </dd>
</dl>

</section>
<section anchor="problem-description"><name>Problem Description</name>

<section anchor="agent-identity-is-coupled-to-infrastructure"><name>Agent Identity Is Coupled to Infrastructure</name>

<t>In current practice, agents are identified by URLs, DNS names, or API
endpoints --- all of which are tied to the infrastructure hosting the
agent, not to the agent itself. When an agent migrates to a different host,
changes cloud provider, or restarts behind a different NAT binding, its
identity changes. There is no stable identifier that follows an agent
across these transitions.</t>

<t>This is analogous to the identity/locator conflation problem in IP
networking, which motivated the Locator/ID Separation Protocol (LISP)
<xref target="RFC9300"/>. In LISP, Endpoint Identifiers (EIDs) are separated from
Routing Locators (RLOCs) so that an endpoint's identity is independent of
its network attachment point. Agents need the same separation: a permanent
identity that is independent of the transient infrastructure hosting them.</t>

<t>The A2A protocol <xref target="A2A"/> identifies agents via "Agent Cards" served at
well-known HTTPS URLs. This requires the agent to maintain a stable,
publicly reachable web endpoint --- a requirement that excludes agents
running on edge devices, behind NAT, or in ephemeral compute environments.</t>

</section>
<section anchor="no-peer-to-peer-communication-without-web-infrastructure"><name>No Peer-to-Peer Communication Without Web Infrastructure</name>

<t>Both MCP <xref target="MCP"/> and A2A <xref target="A2A"/> require HTTP endpoints for communication.
This means every agent must either have a publicly routable IP address or
be fronted by a reverse proxy, load balancer, or API gateway. For two
agents behind NAT to communicate, at least one must provision web
infrastructure as an intermediary.</t>

<t>NAT traversal is a solved problem for specific domains: WebRTC handles it
for browsers (at the cost of ICE/DTLS-SRTP/SDP negotiation complexity),
and WireGuard <xref target="WIREGUARD"/> handles it for VPN tunnels. But no existing
protocol provides NAT traversal specifically designed for agent-to-agent
communication, with agent-native addressing and trust semantics.</t>

<t>An estimated 88% of real-world network environments involve some form of
NAT. Agents running on laptops, IoT devices, edge servers, and mobile
phones cannot participate in HTTP-based agent protocols without significant
infrastructure provisioning.</t>

</section>
<section anchor="no-agent-native-trust-model"><name>No Agent-Native Trust Model</name>

<t>Existing trust models were designed for different participants:</t>

<t><list style="symbols">
  <t>TLS: Trust is anchored in Certificate Authorities. Agents would need to
obtain and manage X.509 certificates, adding operational complexity
disproportionate to many agent interactions.</t>
  <t>SSH: Trust-on-first-use (TOFU) assumes a human operator who can verify a
host key fingerprint. Autonomous agents have no human in the loop.</t>
  <t>OAuth/OIDC: Designed for user-to-service authorization, not peer-to-peer
agent trust. Requires an authorization server as a trusted third party.</t>
</list></t>

<t>None of these models provide bilateral consent --- the property that both
parties must explicitly agree before a communication relationship is
established. For autonomous entities that may be operated by different
organizations, bilateral consent is a natural trust primitive: neither
agent should be reachable by the other until both have agreed.</t>

</section>
<section anchor="no-lightweight-transport-for-agent-streams"><name>No Lightweight Transport for Agent Streams</name>

<t>TCP and QUIC <xref target="RFC9000"/> are general-purpose transports optimized for web
traffic patterns (request-response, large transfers, multiplexed streams).
Agent communication patterns differ:</t>

<t><list style="symbols">
  <t>Many agents exchange small, frequent messages (status updates, task
delegations, sensor readings) where connection setup overhead dominates.</t>
  <t>Agents often maintain long-lived bidirectional streams for event-driven
architectures, where TCP's head-of-line blocking is problematic.</t>
  <t>Agents may need port-based service multiplexing (echo on one port, task
submission on another, events on a third) --- a concept that exists in
TCP/UDP but has no equivalent in HTTP-based agent protocols.</t>
</list></t>

<t>While QUIC addresses head-of-line blocking through multiplexed streams, it
does not provide agent addressing, discovery, or trust semantics. A
transport designed for agents could provide these as built-in capabilities
rather than requiring them to be layered on top.</t>

</section>
<section anchor="privacy-gaps-in-agent-discovery"><name>Privacy Gaps in Agent Discovery</name>

<t>Current agent discovery mechanisms are designed for visibility:</t>

<t><list style="symbols">
  <t>A2A Agent Cards are intended to be publicly discoverable at well-known
URLs.</t>
  <t>DNS-SD and mDNS broadcast service availability to all listeners on a
network segment.</t>
  <t>HTTP-based service registries typically allow any authenticated client to
enumerate all registered services.</t>
</list></t>

<t>For agents, the default should be the opposite. An agent's existence and
capabilities should not be disclosed to parties that have not been
explicitly authorized. Mass enumeration of agent endpoints creates attack
surface (reconnaissance for exploitation) and privacy risks (mapping an
organization's agent infrastructure).</t>

<t>A privacy-by-default discovery model --- where agents are invisible until
they explicitly opt in to specific peer relationships --- has no equivalent
in current standards.</t>

</section>
</section>
<section anchor="requirements-for-a-solution"><name>Requirements for a Solution</name>

<t>Based on the problems identified above, a network-layer infrastructure for
agent communication should satisfy the following requirements:</t>

<section anchor="virtual-addressing"><name>Virtual Addressing</name>

<dl newline="true">
  <dt>REQ-1:</dt>
  <dd>
    <t>Agents <bcp14>MUST</bcp14> receive stable virtual addresses that are independent of
their underlying IP address, network attachment point, and hosting
infrastructure.</t>
  </dd>
  <dt>REQ-2:</dt>
  <dd>
    <t>The addressing scheme <bcp14>MUST</bcp14> support hierarchical grouping (e.g., network
or topic-based segmentation) to enable scoped communication boundaries.</t>
  </dd>
</dl>

</section>
<section anchor="nat-traversal"><name>NAT Traversal</name>

<dl newline="true">
  <dt>REQ-3:</dt>
  <dd>
    <t>The system <bcp14>MUST</bcp14> provide automatic NAT traversal without requiring manual
configuration of port forwarding, firewall rules, or relay proxies by the
agent operator.</t>
  </dd>
  <dt>REQ-4:</dt>
  <dd>
    <t>NAT traversal <bcp14>MUST</bcp14> support direct peer-to-peer communication where
possible, with transparent relay fallback when direct communication is
not achievable.</t>
  </dd>
</dl>

</section>
<section anchor="bilateral-trust-model"><name>Bilateral Trust Model</name>

<dl newline="true">
  <dt>REQ-5:</dt>
  <dd>
    <t>Communication between agents <bcp14>MUST</bcp14> require explicit bilateral consent.
Neither agent should be reachable by the other until both have agreed to
establish a trust relationship.</t>
  </dd>
  <dt>REQ-6:</dt>
  <dd>
    <t>Trust relationships <bcp14>MUST</bcp14> be revocable. Revoking trust <bcp14>MUST</bcp14> immediately
prevent further communication.</t>
  </dd>
</dl>

</section>
<section anchor="lightweight-encrypted-transport"><name>Lightweight Encrypted Transport</name>

<dl newline="true">
  <dt>REQ-7:</dt>
  <dd>
    <t>The transport <bcp14>MUST</bcp14> provide reliable, ordered byte stream delivery
(TCP-equivalent) and unreliable datagram delivery (UDP-equivalent) over
the overlay.</t>
  </dd>
  <dt>REQ-8:</dt>
  <dd>
    <t>Encryption <bcp14>MUST</bcp14> be enabled by default for all data in transit, with no
opt-in required from the agent developer.</t>
  </dd>
  <dt>REQ-9:</dt>
  <dd>
    <t>The transport <bcp14>MUST</bcp14> support port-based service multiplexing, allowing an
agent to expose multiple services on different virtual ports.</t>
  </dd>
</dl>

</section>
<section anchor="privacy-by-default-discovery"><name>Privacy-by-Default Discovery</name>

<dl newline="true">
  <dt>REQ-10:</dt>
  <dd>
    <t>Agents <bcp14>MUST</bcp14> be private by default. An agent's virtual address, physical
locator, and capabilities <bcp14>MUST NOT</bcp14> be disclosed to parties without an
established trust relationship or shared group membership.</t>
  </dd>
  <dt>REQ-11:</dt>
  <dd>
    <t>It <bcp14>MUST</bcp14> be possible to establish trust with a private agent without
first knowing its physical network location (i.e., via a trusted relay
or rendezvous mechanism).</t>
  </dd>
</dl>

</section>
</section>
<section anchor="existing-approaches-and-gaps"><name>Existing Approaches and Gaps</name>

<section anchor="mcp-model-context-protocol"><name>MCP (Model Context Protocol)</name>

<t>MCP <xref target="MCP"/> standardizes the interface between AI models and external
tools/resources. It uses JSON-RPC over HTTP with Server-Sent Events for
streaming. MCP addresses agent-to-tool communication, not agent-to-agent
communication, and provides no network-layer capabilities. It assumes
agents can reach tool servers via HTTP.</t>

</section>
<section anchor="a2a-agent-to-agent-protocol"><name>A2A (Agent-to-Agent Protocol)</name>

<t>A2A <xref target="A2A"/> defines a protocol for agent interoperability: Agent Cards for
discovery, task lifecycle management, and multimodal message exchange. A2A
operates entirely over HTTP/HTTPS. It provides no NAT traversal, no
overlay addressing, no built-in encryption beyond TLS, and no bilateral
trust model. It assumes agents have reachable HTTP endpoints.</t>

</section>
<section anchor="webrtc"><name>WebRTC</name>

<t>WebRTC provides peer-to-peer communication with NAT traversal via ICE,
encryption via DTLS-SRTP, and data channels via SCTP. However, WebRTC was
designed for browser-based audio/video communication. Its complexity
(ICE candidate gathering, SDP offer/answer negotiation, DTLS-SRTP key
exchange) is disproportionate for agent message exchange. WebRTC also lacks
agent-specific concepts like virtual addressing, bilateral trust, and
privacy-by-default discovery.</t>

</section>
<section anchor="quic"><name>QUIC</name>

<t>QUIC <xref target="RFC9000"/> provides a modern transport with multiplexed streams,
built-in encryption, and reduced connection setup latency. QUIC addresses
transport-layer concerns but does not provide overlay addressing, agent
identity, NAT traversal coordination, trust management, or discovery. It
is a potential underlay transport for an agent overlay, not a complete
solution.</t>

</section>
<section anchor="libp2p"><name>libp2p</name>

<t>libp2p <xref target="LIBP2P"/> is a modular networking stack developed for
decentralized applications, particularly in the blockchain ecosystem. It
provides peer identity (via cryptographic keypairs), NAT traversal, and
transport multiplexing. libp2p is the closest existing system to the
requirements stated above. However, it uses unstructured peer IDs (not
hierarchical addresses), is heavyweight (large dependency tree), is
oriented toward content-addressed distributed systems rather than agent
communication patterns, and lacks built-in bilateral trust or privacy-by-
default semantics.</t>

</section>
<section anchor="wireguard"><name>WireGuard</name>

<t>WireGuard <xref target="WIREGUARD"/> provides encrypted point-to-point tunnels with
excellent performance. It uses Curve25519 for key exchange and ChaCha20-
Poly1305 for encryption. WireGuard establishes tunnels between known peers
with pre-shared public keys --- it does not provide dynamic discovery,
agent addressing, or trust negotiation. It is a VPN, not an agent network.</t>

</section>
<section anchor="lisp"><name>LISP</name>

<t>The Locator/ID Separation Protocol <xref target="RFC9300"/> <xref target="RFC9301"/> separates
endpoint identity from network location, providing a conceptual precedent
for agent addressing. LISP's EID-to-RLOC mapping system is architecturally
similar to an agent registry that maps virtual addresses to physical
locators. However, LISP operates at the IP layer for routing optimization,
not at the application layer for agent communication. It does not provide
agent-specific trust models, privacy semantics, or built-in services.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>A network-layer infrastructure for agents introduces security
considerations beyond those of traditional overlay networks:</t>

<dl>
  <dt>Centralized Registry:</dt>
  <dd>
    <t>A registry that assigns addresses and maintains locator mappings is a
trusted third party. Compromise of the registry could allow address
hijacking, locator spoofing, or metadata harvesting. The registry
should support authentication, access control, and replication for high
availability.</t>
  </dd>
  <dt>Overlay Header Metadata:</dt>
  <dd>
    <t>Even with payload encryption, overlay packet headers may expose source
and destination virtual addresses, port numbers, and packet sizes. Traffic
analysis on the overlay is possible even when the underlay is encrypted.</t>
  </dd>
  <dt>Trust Model Assumptions:</dt>
  <dd>
    <t>A bilateral trust model assumes that agents can make informed consent
decisions. If an agent's trust logic is compromised (e.g., by adversarial
prompt injection), it may approve trust relationships it should reject.
The trust model provides a mechanism, not a policy --- the security of
trust decisions depends on the agent's reasoning capability.</t>
  </dd>
  <dt>Key Management:</dt>
  <dd>
    <t>Overlay encryption requires key exchange between peers. Anonymous key
exchange (without identity binding) is vulnerable to man-in-the-middle
attacks. Authenticated key exchange requires a mechanism to distribute
and verify public keys, which depends on the registry's integrity.</t>
  </dd>
</dl>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC7364">
  <front>
    <title>Problem Statement: Overlays for Network Virtualization</title>
    <author fullname="T. Narten" initials="T." role="editor" surname="Narten"/>
    <author fullname="E. Gray" initials="E." role="editor" surname="Gray"/>
    <author fullname="D. Black" initials="D." surname="Black"/>
    <author fullname="L. Fang" initials="L." surname="Fang"/>
    <author fullname="L. Kreeger" initials="L." surname="Kreeger"/>
    <author fullname="M. Napierala" initials="M." surname="Napierala"/>
    <date month="October" year="2014"/>
    <abstract>
      <t>This document describes issues associated with providing multi-tenancy in large data center networks and how these issues may be addressed using an overlay-based network virtualization approach. A key multi-tenancy requirement is traffic isolation so that one tenant's traffic is not visible to any other tenant. Another requirement is address space isolation so that different tenants can use the same address space within different virtual networks. Traffic and address space isolation is achieved by assigning one or more virtual networks to each tenant, where traffic within a virtual network can only cross into another virtual network in a controlled fashion (e.g., via a configured router and/or a security gateway). Additional functionality is required to provision virtual networks, associating a virtual machine's network interface(s) with the appropriate virtual network and maintaining that association as the virtual machine is activated, migrated, and/or deactivated. Use of an overlay-based approach enables scalable deployment on large network infrastructures.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7364"/>
  <seriesInfo name="DOI" value="10.17487/RFC7364"/>
</reference>
<reference anchor="RFC9000">
  <front>
    <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
    <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9000"/>
  <seriesInfo name="DOI" value="10.17487/RFC9000"/>
</reference>
<reference anchor="RFC9300">
  <front>
    <title>The Locator/ID Separation Protocol (LISP)</title>
    <author fullname="D. Farinacci" initials="D." surname="Farinacci"/>
    <author fullname="V. Fuller" initials="V." surname="Fuller"/>
    <author fullname="D. Meyer" initials="D." surname="Meyer"/>
    <author fullname="D. Lewis" initials="D." surname="Lewis"/>
    <author fullname="A. Cabellos" initials="A." role="editor" surname="Cabellos"/>
    <date month="October" year="2022"/>
    <abstract>
      <t>This document describes the data plane protocol for the Locator/ID Separation Protocol (LISP). LISP defines two namespaces: Endpoint Identifiers (EIDs), which identify end hosts; and Routing Locators (RLOCs), which identify network attachment points. With this, LISP effectively separates control from data and allows routers to create overlay networks. LISP-capable routers exchange encapsulated packets according to EID-to-RLOC mappings stored in a local Map-Cache.</t>
      <t>LISP requires no change to either host protocol stacks or underlay routers and offers Traffic Engineering (TE), multihoming, and mobility, among other features.</t>
      <t>This document obsoletes RFC 6830.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9300"/>
  <seriesInfo name="DOI" value="10.17487/RFC9300"/>
</reference>
<reference anchor="RFC9301">
  <front>
    <title>Locator/ID Separation Protocol (LISP) Control Plane</title>
    <author fullname="D. Farinacci" initials="D." surname="Farinacci"/>
    <author fullname="F. Maino" initials="F." surname="Maino"/>
    <author fullname="V. Fuller" initials="V." surname="Fuller"/>
    <author fullname="A. Cabellos" initials="A." role="editor" surname="Cabellos"/>
    <date month="October" year="2022"/>
    <abstract>
      <t>This document describes the control plane and Mapping Service for the Locator/ID Separation Protocol (LISP), implemented by two types of LISP-speaking devices -- the LISP Map-Resolver and LISP Map-Server -- that provide a simplified "front end" for one or more Endpoint IDs (EIDs) to Routing Locator mapping databases.</t>
      <t>By using this control plane service interface and communicating with Map-Resolvers and Map-Servers, LISP Ingress Tunnel Routers (ITRs) and Egress Tunnel Routers (ETRs) are not dependent on the details of mapping database systems; this behavior facilitates modularity with different database designs. Since these devices implement the "edge" of the LISP control plane infrastructure, connecting EID addressable nodes of a LISP site, the implementation and operational complexity of the overall cost and effort of deploying LISP is reduced.</t>
      <t>This document obsoletes RFCs 6830 and 6833.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9301"/>
  <seriesInfo name="DOI" value="10.17487/RFC9301"/>
</reference>

<reference anchor="I-D.rosenberg-aiproto-framework" target="https://datatracker.ietf.org/doc/draft-rosenberg-aiproto-framework/">
  <front>
    <title>A Framework for AI Protocols</title>
    <author initials="J." surname="Rosenberg">
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="I-D.zyyhl-agent-networks-framework" target="https://datatracker.ietf.org/doc/draft-zyyhl-agent-networks-framework/">
  <front>
    <title>A Framework for Agent Networks</title>
    <author initials="Z." surname="Yao">
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="I-D.narvaneni-agent-uri" target="https://datatracker.ietf.org/doc/draft-narvaneni-agent-uri/">
  <front>
    <title>Agent URI Scheme</title>
    <author initials="S." surname="Narvaneni">
      <organization></organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="MCP" target="https://modelcontextprotocol.io/">
  <front>
    <title>Model Context Protocol</title>
    <author >
      <organization>Anthropic</organization>
    </author>
    <date year="2024"/>
  </front>
</reference>
<reference anchor="A2A" target="https://google.github.io/A2A/">
  <front>
    <title>Agent-to-Agent Protocol</title>
    <author >
      <organization>Google</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>
<reference anchor="WIREGUARD" target="https://www.wireguard.com/papers/wireguard.pdf">
  <front>
    <title>WireGuard: Next Generation Kernel Network Tunnel</title>
    <author initials="J. A." surname="Donenfeld">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
</reference>
<reference anchor="LIBP2P" target="https://libp2p.io/">
  <front>
    <title>libp2p: A Modular Network Stack</title>
    <author >
      <organization>Protocol Labs</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>


    </references>

</references>


<?line 438?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The author thanks the participants of the IETF AI protocols discussions
for their contributions to understanding the agent communication
landscape.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

