<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.2.3) -->
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ihsanullah-dnsid-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="DNSid">DNS-Anchored Durable Identity for AI Agents (DNSid)</title>
    <seriesInfo name="Internet-Draft" value="draft-ihsanullah-dnsid-00"/>
    <author initials="N." surname="Ihsanullah" fullname="Naveed Ihsanullah">
      <organization>Identity Digital</organization>
      <address>
        <email>naveed.ihsanullah@identity.digital</email>
      </address>
    </author>
    <date year="2026" month="April" day="30"/>
    <area>Security</area>
    <workgroup>Individual Submission</workgroup>
    <keyword>DNS</keyword>
    <keyword>agent identity</keyword>
    <keyword>AI agents</keyword>
    <keyword>ownership</keyword>
    <keyword>governance</keyword>
    <keyword>TXT record</keyword>
    <abstract>
      <?line 95?>

<t>Autonomous software agents are being deployed across enterprise,
cloud, and cross-organizational boundaries. These agents negotiate,
transact, delegate, and produce work products that persist beyond
their own runtime. The standards identified for agent identity
collectively address runtime authentication, authorization,
lifecycle management, and tool interaction, but a gap remains:
a durable, governance-backed identifier that binds an agent to
an accountable entity in a way that any system can verify
independently.</t>
      <t>DNSid addresses the accountable layer of identity: the durable
ownership anchor that existing agent identity standards do not
provide. This document specifies DNSid, a minimal identity
primitive that assigns each agent a Fully Qualified Domain Name
(FQDN) under a domain controlled by its accountable entity, and
publishes a structured set of pointers in DNS TXT records to the
agent's cryptographic keys, lifecycle log, and operational status.
DNSid uses accountable-entity-controlled signatures for record
integrity and an abstract append-only ledger for lifecycle
history. It is designed to sit beneath existing identity,
authentication, authorization, and agent interaction standards
without competing with them.</t>
    </abstract>
  </front>
  <middle>
    <?line 120?>

<section anchor="introduction-and-motivation">
      <name>Introduction and Motivation</name>
      <section anchor="the-problem">
        <name>The Problem</name>
        <t>AI agents are moving from prototypes into production. They operate
autonomously, acquire tools dynamically, delegate to other agents,
and produce work products (reports, code, transactions, decisions)
that persist and cross organizational boundaries after the agent
terminates. Existing identity and access management systems can
authenticate workloads and authorize actions within a platform, but
they cannot answer a more fundamental question:</t>
        <ul empty="true">
          <li>
            <t>Which accountable entity is responsible for this agent, and
can any system verify that independently?</t>
          </li>
        </ul>
        <t>The standards identified by NIST for agent identity and
authorization (OAuth 2.1, OIDC, SPIFFE/SPIRE, SCIM, NGAC, MCP)
collectively address runtime authentication, authorization,
lifecycle management, and tool interaction. None provides a durable,
governance-backed ownership anchor that persists across platforms,
trust domains, and agent lifecycles.</t>
      </section>
      <section anchor="why-dns">
        <name>Why DNS</name>
        <t>DNS is the only globally delegated namespace with:</t>
        <ul spacing="normal">
          <li>
            <t>Universal resolvers: every device on the internet can resolve
a DNS name.</t>
          </li>
          <li>
            <t>Governance-backed domain accountability: domain registration
relationships, namespace governance processes, and dispute
resolution mechanisms already provide an operational framework
for managing control of DNS names.</t>
          </li>
          <li>
            <t>Existing operational use in organizational trust: TLS, email
authentication (SPF, DKIM, DMARC), and PKI already depend on
DNS for organizational binding.</t>
          </li>
          <li>
            <t>40+ years of deployment with no migration required.</t>
          </li>
        </ul>
        <t>Keeping agent identifiers in the DNS namespace allows relying
parties to reuse the same operational, governance, and security
plane already used for web, email, and commerce infrastructure,
and avoids introducing a separate namespace whose binding to
existing internet identities would require its own trust model.
Building a new identity protocol from scratch would create a
parallel naming system, a new trust root, and years of
standardization before meaningful deployment. DNSid extends DNS
from resolving domain names to anchoring agent identifiers,
building on infrastructure that is already universal, neutral,
and institutionally governed.</t>
      </section>
      <section anchor="design-principles">
        <name>Design Principles</name>
        <t>DNSid is intentionally minimal:</t>
        <ul spacing="normal">
          <li>
            <t>Smallest viable surface area. DNSid does one thing: bind an
agent to an accountable entity via DNS, with pointers to
keys, status, and history. It does not authenticate agents,
issue credentials, enforce policy, monitor behavior, or
provide a runtime execution environment.</t>
          </li>
          <li>
            <t>Pointer set, not data store. The DNS record carries structured
pointers to HTTPS endpoints and ledger entries. Rich identity
data, claims, and attestations live at those endpoints, not
in DNS. DNS serves as the authoritative rendezvous layer for
identity resolution.</t>
          </li>
          <li>
            <t>Accountable-entity-controlled integrity. Record integrity is
established by the accountable entity's own cryptographic key,
not by the DNS hierarchy's signing chain. DNSSEC is complementary hardening,
not an architectural dependency.</t>
          </li>
          <li>
            <t>Ledger-neutral. The specification defines what lifecycle events
must be recorded and what proof properties the ledger must
provide. It does not mandate a public ledger or a specific
ledger technology.</t>
          </li>
          <li>
            <t>Standards-complementary. DNSid sits beneath SPIFFE, OAuth,
OIDC, SCIM, NGAC, MCP, A2A, DIDs, VCs, and Agent.md. It
provides the governance-backed anchor those mechanisms
reference but do not define.</t>
          </li>
          <li>
            <t>Pseudonymity with pierceability. Each DNSid FQDN is a
disconnected pseudonymous handle. The agent operates under
its FQDN without exposing the accountable entity to casual
observers. Resolving the accountable entity may require
registrar, registry, or legal process. Use of distinct
registrable domains provides operational separation of
pseudonymous identities. This is a deliberate
privacy-by-design property of anchoring identity in the
registrant-domain governance layer.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions-and-terminology">
      <name>Conventions and Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in
this document are to be interpreted as described in BCP 14
<xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
capitals, as shown here.</t>
      <dl>
        <dt>Agent FQDN:</dt>
        <dd>
          <t>The Fully Qualified Domain Name assigned to an agent.
This is the agent's primary globally unique identifier.
Examples include billing-agent-acme.example for a dedicated
registrable-domain deployment and
billing-agent.acme-corp.example for a shared
organizational-domain deployment.</t>
        </dd>
        <dt>Governance Anchor:</dt>
        <dd>
          <t>The registrant domain under which the agent
FQDN is published, typically a registrable domain. The
registrant of this domain is the accountable entity for
all agents beneath it. When the agent is registered as a
dedicated registrable domain, the FQDN and governance
anchor are the same (e.g., billing-agent-acme.example
serves as both). Under a shared domain, the governance
anchor is the organizational domain (e.g.,
acme-corp.example).</t>
        </dd>
        <dt>DNSid TXT Record:</dt>
        <dd>
          <t>A DNS TXT Resource Record (TXT RR) published at the owner name
_dnsid.&lt;agent-fqdn&gt; containing a structured set of key-value
tags that encode DNSid identity pointers.</t>
        </dd>
        <dt>Verifier:</dt>
        <dd>
          <t>An agent, service, or relying party that resolves and
validates a DNSid TXT record.</t>
        </dd>
        <dt>Immutable Ledger:</dt>
        <dd>
          <t>An append-only data structure that records
lifecycle events with cryptographic inclusion proofs and
verifiable timestamps. May be instantiated as a blockchain,
Merkle tree, Certificate Transparency <xref target="RFC6962"/> style log,
or similar verifiable data structure. For example, a
conforming ledger could be a SCITT transparency service, a
CT-style Merkle log, a blockchain application, or a private
append-only service.</t>
        </dd>
        <dt>Accountable Entity:</dt>
        <dd>
          <t>The party that registered the agent, bears responsibility
for its behavior, and holds authority to revoke it. The
accountable entity may be an organization or an individual.
This is distinct from intellectual property ownership or
runtime control.</t>
        </dd>
        <dt>Verification Scope:</dt>
        <dd>
          <t>The set of verifiers, deployment contexts, or access
conditions under which a ledger binding makes lifecycle
entries or portable cryptographic proofs available. The
verification scope is determined by the ledger binding
specification and the accountable entity's deployment choice.</t>
        </dd>
        <dt>Signing Key:</dt>
        <dd>
          <t>The cryptographic key pair controlled by the accountable
entity, used to sign the DNSid TXT record and lifecycle
events. Published via the JWKS endpoint. Distinct from any
key issued by a certificate authority or DNS operator.</t>
        </dd>
      </dl>
    </section>
    <section anchor="ecosystem-context-and-scope">
      <name>Ecosystem Context and Scope</name>
      <section anchor="what-dnsid-addresses-layer-1">
        <name>What DNSid Addresses (Layer 1)</name>
        <t>A survey of the agent identity ecosystem reveals that the
relevant concerns organize into a layered model:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Layer</th>
              <th align="left">Name</th>
              <th align="left">Representative Standards</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0</td>
              <td align="left">Global Namespace Governance</td>
              <td align="left">ICANN, DNSSEC, DANE</td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">Durable Ownership Anchor</td>
              <td align="left">
                <strong>DNSid operates here</strong></td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">Cryptographic Identity Binding</td>
              <td align="left">DIDs, VCs, PKI</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">Runtime Workload Identity</td>
              <td align="left">SPIFFE/SPIRE</td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">Authentication</td>
              <td align="left">OAuth 2.1, OIDC, RFC 9421</td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">Authorization and Policy</td>
              <td align="left">NGAC, OPA, Cedar</td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">Operational Governance</td>
              <td align="left">NHI platforms, SCIM</td>
            </tr>
            <tr>
              <td align="left">7</td>
              <td align="left">Discovery and Interoperability</td>
              <td align="left">MCP, A2A, AGNTCY</td>
            </tr>
          </tbody>
        </table>
        <t>The standards that NIST, IETF, and industry have identified for
agent identity collectively cover Layers 2 through 7. Layer 1 is
sparsely populated. DNSid targets this gap specifically.</t>
      </section>
      <section anchor="what-dnsid-does-not-address">
        <name>What DNSid Does Not Address</name>
        <t>DNSid does not:</t>
        <ul spacing="normal">
          <li>
            <t>Authenticate agents at runtime (Layer 4: OAuth, OIDC)</t>
          </li>
          <li>
            <t>Attest workloads within a trust domain (Layer 3: SPIFFE)</t>
          </li>
          <li>
            <t>Issue or manage verifiable credentials (Layer 2: DIDs, VCs)</t>
          </li>
          <li>
            <t>Enforce authorization policies (Layer 5: NGAC, OPA)</t>
          </li>
          <li>
            <t>Monitor agent behavior (Layer 6: NHI platforms)</t>
          </li>
          <li>
            <t>Provide agent-to-agent communication protocols (Layer 7: MCP, A2A)</t>
          </li>
          <li>
            <t>Replace endpoint control or firewall functionality</t>
          </li>
          <li>
            <t>Determine whether an accountable entity is trustworthy,
reputable, or legally qualified. Such determinations are
made by consuming systems, external registries, Verifiable
Credentials, or local policy.</t>
          </li>
        </ul>
        <t>These systems are consumers of the ownership anchor DNSid
provides. They reference the DNSid identity to make their own
trust, authorization, and enforcement decisions.</t>
      </section>
    </section>
    <section anchor="trust-architecture">
      <name>Trust Architecture</name>
      <t>DNSid separates three distinct anchors of trust. Each anchor
addresses a different verification need.</t>
      <section anchor="governance-anchor-registrant-domain">
        <name>Governance Anchor: Registrant Domain</name>
        <t>The registrant domain is the governance root. The registrant is
subject to domain registration agreements, namespace governance
policy, and established dispute resolution processes. This governance
is not something DNSid creates; it already exists for every
domain registrant on the internet. DNSid is designed to operate
within existing DNS infrastructure and should not require new
governance processes, TLD allocations, or registrar categories.</t>
        <t>The governance and pseudonymity properties are strongest when
each agent is registered as a dedicated registrable domain
(e.g., billing-agent-acme.example). Each registrable domain
constitutes a distinct registrant relationship, a distinct
accountability scope, and a distinct operational zone with
independent DNSSEC signing and administrative control.
Organizations MAY anchor agents under an existing organizational
domain (e.g., billing-agent.acme-corp.example), accepting that agents
under a shared domain share governance, accountability, and
pseudonymity scope.</t>
        <t>Agent FQDNs are not required to carry human-readable names.
The Agent FQDN need not host a human-facing website or reveal
the agent's purpose. Organizations seeking maximum pseudonymity
MAY register opaque identifiers as agent FQDNs, since the
agent's purpose and capabilities are described in the
capabilities document referenced by the "cu" tag, not in the
domain name itself.</t>
        <t>When a platform hosts agents on behalf of users, the platform
registrant is the accountable entity under DNSid. Attribution of
responsibility to individual users is handled through the
platform's internal audit trail and administrative processes, not
through DNSid itself.</t>
      </section>
      <section anchor="technical-identity-anchor-agent-fqdn">
        <name>Technical Identity Anchor: Agent FQDN</name>
        <t>Each agent is assigned a globally unique FQDN as its governance
anchor (e.g., billing-agent-acme.example). When registered as
a dedicated registrable domain, the FQDN is itself the
governance anchor. When registered under an organizational
domain (e.g., billing-agent.acme-corp.example), the FQDN
inherits the governance
posture of the parent registrant domain. In either case, the
FQDN is the identifier that other agents, registries, and
relying services carry in protocol messages.</t>
        <t>The agent's public signing keys are published at an HTTPS endpoint
(JWKS format) referenced by the DNSid TXT record. The key service
MUST support algorithm negotiation to enable crypto agility for the
transition to post-quantum signature algorithms (NIST FIPS 204
ML-DSA, FIPS 205 SLH-DSA) <xref target="NIST-PQC"/>.</t>
      </section>
      <section anchor="integrity-and-history-anchor-immutable-ledger">
        <name>Integrity and History Anchor: Immutable Ledger</name>
        <t>An append-only verifiable ledger records the core agent identity
lifecycle: issuance, key rotation, revocation, retirement, and
migration. Optional event types extend coverage to delegation
and content provenance. The ledger is bound to
the agent FQDN through the accountable entity's signing key.</t>
        <t>DNS proves current control of the FQDN. The ledger proves what
has happened under that identity over time. Together they provide
a complete temporal picture that neither can provide alone.</t>
        <t>The ledger is entity-signed: the accountable entity signs its
own lifecycle entries with its signing key. The ledger itself
may be operated by any party; what matters is that entries
carry the accountable entity's signature and cannot be forged
by the ledger operator. The entity-signed model supports
recording content-signing hashes, delegation chain records,
and provenance attestations alongside identity lifecycle
events.</t>
        <t>The ledger may be instantiated as a blockchain, Merkle tree,
Certificate Transparency-style log, or similar verifiable data
structure. The architectural requirement is append-only integrity
with cryptographic inclusion proofs, not a specific implementation.
See <xref target="abstract-ledger-interface"/> for the abstract ledger interface.</t>
      </section>
    </section>
    <section anchor="the-dnsid-txt-record">
      <name>The DNSid TXT Record</name>
      <section anchor="owner-name-convention">
        <name>Owner Name Convention</name>
        <t>A DNSid TXT record MUST be published at the owner name (the
DNS term for the left-hand side of a resource record) formed
by prepending the label "_dnsid" to the agent FQDN:</t>
        <artwork><![CDATA[
_dnsid.<agent-fqdn>
]]></artwork>
        <t>Example:</t>
        <artwork><![CDATA[
_dnsid.billing-agent-acme.example.
]]></artwork>
        <t>The underscore prefix follows the convention established by DKIM
(_domainkey), DMARC (_dmarc), and MTA-STS (_mta-sts), creating
a dedicated namespace that does not collide with TXT records
used by other protocols at the agent FQDN itself.</t>
        <t>An owner name MUST NOT have more than one DNSid TXT record. If
multiple DNSid TXT records are encountered at the same owner
name, the verifier MUST treat the lookup as a failure.</t>
        <t>The agent FQDN MUST NOT exceed 246 octets in presentation
format, ensuring the derived owner name <tt>_dnsid.&lt;agent-fqdn&gt;</tt>
does not exceed the 253-octet presentation limit (<xref target="RFC1035"/>
Section 2.3.4, <xref target="RFC1123"/> Section 2.1).</t>
        <t>The TTL of DNSid TXT records SHOULD be kept short enough to
support timely revocation propagation.</t>
      </section>
      <section anchor="record-format">
        <name>Record Format</name>
        <t>The RDATA of the DNSid TXT record is a sequence of tag=value
pairs separated by semicolons, following the syntax defined in
Section 3.2 of <xref target="RFC6376"/> (DKIM Signatures). The record MUST
begin with the version tag "v=DNSid1".</t>
        <t>Formal syntax (ABNF, <xref target="RFC5234"/>):</t>
        <sourcecode type="abnf"><![CDATA[
dnsid-record  = dnsid-v-tag *( ";" SP? dnsid-tag ) [ ";" ]
dnsid-v-tag   = %s"v" "=" %s"DNSid1"
dnsid-tag     = dnsid-tag-name "=" dnsid-tag-value
dnsid-tag-name  = ALPHA *( ALPHA / DIGIT / "_" )
dnsid-tag-value = *( %x21-3A / %x3C-7E )
                  ; printable ASCII excluding ";" and space
]]></sourcecode>
        <t>Tag names are case-sensitive. Unknown tags MUST be ignored by
receivers to provide forward-compatibility for future extensions.</t>
        <t>A DNSid TXT record MUST NOT contain duplicate tag names. A
verifier MUST reject a record containing duplicate tag names.</t>
        <t>Unknown tags are ignored for semantic processing but are
included in the canonical record string for signature
verification.</t>
      </section>
      <section anchor="tag-definitions">
        <name>Tag Definitions</name>
        <table>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Required</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">v</td>
              <td align="left">REQUIRED</td>
              <td align="left">Version. MUST be "DNSid1". MUST be first tag.</td>
            </tr>
            <tr>
              <td align="left">oi</td>
              <td align="left">REQUIRED</td>
              <td align="left">Governance identifier. Links the agent FQDN to its governance anchor.</td>
            </tr>
            <tr>
              <td align="left">ku</td>
              <td align="left">REQUIRED</td>
              <td align="left">Key URI. HTTPS URL for the agent's signing keys in JWKS format (<xref target="RFC7517"/>).</td>
            </tr>
            <tr>
              <td align="left">lr</td>
              <td align="left">REQUIRED</td>
              <td align="left">Log reference. Structured reference identifying the ledger binding and the agent's entry.</td>
            </tr>
            <tr>
              <td align="left">su</td>
              <td align="left">REQUIRED</td>
              <td align="left">Status URI. HTTPS URL for registration and revocation status.</td>
            </tr>
            <tr>
              <td align="left">sg</td>
              <td align="left">REQUIRED</td>
              <td align="left">Entity signature. Base64url-encoded signature over the canonical record content.</td>
            </tr>
            <tr>
              <td align="left">fl</td>
              <td align="left">OPTIONAL</td>
              <td align="left">Policy flags. Comma-separated list of named flags.</td>
            </tr>
            <tr>
              <td align="left">ka</td>
              <td align="left">OPTIONAL</td>
              <td align="left">Maximum signing key age. Duration value.</td>
            </tr>
            <tr>
              <td align="left">cu</td>
              <td align="left">OPTIONAL</td>
              <td align="left">Capabilities URI. HTTPS URL for an Agent.md or Agent Card document.</td>
            </tr>
          </tbody>
        </table>
        <t>Implementations MUST reject a DNSid TXT record that is missing
any REQUIRED tag or in which a REQUIRED tag has an empty value.</t>
      </section>
      <section anchor="oi-governance-identifier-tag">
        <name>OI (Governance Identifier) Tag</name>
        <t>The "oi" tag identifies the accountable entity controlling
this agent. The RECOMMENDED format is the registrant domain
in lowercase ASCII. Alternative formats include a URI
identifying the organization in an external registry.</t>
        <t>Examples:</t>
        <artwork><![CDATA[
oi=billing-agent-acme.example
oi=acme-corp.example
]]></artwork>
        <t>The "oi" value MUST be consistent with the domain hierarchy under
which the agent FQDN is published: the agent FQDN must be a
subdomain of (or equal to) the domain identified by "oi", or the
"oi" value must reference a governance relationship that is
verifiable through the ledger.</t>
      </section>
      <section anchor="lr-log-reference-tag">
        <name>LR (Log Reference) Tag</name>
        <t>The "lr" tag is a DNSid log reference identifying the ledger
technology and the agent's primary entry. The method component
of the reference identifies the ledger binding; the remaining
components locate the agent's log entry.</t>
        <t>This specification does not mandate a specific log method.
Implementations SHOULD register their method name with the
DNSid Log Method Registry (<xref target="iana-considerations"/>).</t>
        <t>Examples (method names are illustrative):</t>
        <artwork><![CDATA[
lr=algorand:AGENT_ADDR_BASE32
lr=ctlog:https://log.example.com/agents/entries/12345
lr=scitt:https://transparency-service.example/entry/abc123
]]></artwork>
      </section>
      <section anchor="fl-policy-flags-tag">
        <name>FL (Policy Flags) Tag</name>
        <t>The "fl" tag is a comma-separated list of named policy flags.
Unknown flag names MUST be ignored by receivers.</t>
        <t>Initially defined flags:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Flag</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">mtls</td>
              <td align="left">Verifiers MUST use mutual TLS for connections to this agent.</td>
            </tr>
            <tr>
              <td align="left">logchk</td>
              <td align="left">Verifiers MUST perform a log inclusion check before any high-value or irreversible operation.</td>
            </tr>
          </tbody>
        </table>
        <t>Example: fl=mtls,logchk</t>
      </section>
      <section anchor="ka-key-age-maximum-tag">
        <name>KA (Key Age Maximum) Tag</name>
        <t>The "ka" tag expresses the maximum acceptable age of a signing
key. Verifiers MUST reject keys older than the indicated age.</t>
        <t>Defined values: 24h, 7d, 30d, 90d. Absence means no constraint.
Unknown values MUST be treated as a verification failure.</t>
        <t>The key's age is computed from the timestamp of the ISSUANCE
or KEY_ROTATION event that introduced the key into the ledger.
The ledger is the authoritative source for key lifecycle
timestamps. If the "ka" tag is present and the verifier cannot
obtain the required lifecycle event or cryptographic proof, key
age verification MUST fail.</t>
      </section>
      <section anchor="multi-string-encoding">
        <name>Multi-String Encoding</name>
        <t>DNS TXT RDATA is represented as one or more character-strings,
each limited to 255 octets (<xref target="RFC1035"/> Section 3.3). Implementations
MUST concatenate all strings within a single TXT RR before parsing
tag-value pairs. No separator is inserted at string boundaries.</t>
        <t>Example (split across strings for readability):</t>
        <artwork><![CDATA[
_dnsid.billing-agent-acme.example. 300 IN TXT (
    "v=DNSid1; oi=billing-agent-acme.example; fl=mtls,logchk;"
    "ku=https://billing-agent-acme.example/.well-known/jwks.json;"
    "lr=algorand:AGENT_ADDR_BASE32;"
    "su=https://billing-agent-acme.example/.well-known/dnsid-status;"
    "sg=<base64url-encoded-signature>"
)
]]></artwork>
      </section>
    </section>
    <section anchor="owner-signed-record-integrity">
      <name>Entity-Signed Record Integrity</name>
      <section anchor="motivation">
        <name>Motivation</name>
        <t>DNSSEC provides integrity for DNS records via a top-down signing
chain from the DNS root through TLD operators to the registrant's
zone. However, the TLD operator and higher-level signers hold keys
above the registrant's zone and could, in principle, modify records
without the registrant's knowledge or consent.</t>
        <t>For an identity system where "you are always in control of your
identity" is a design principle, depending solely on DNSSEC for
integrity is insufficient. DNSid therefore specifies an
integrity mechanism where the accountable entity
signs the DNSid record content with its own key.</t>
      </section>
      <section anchor="signature-generation">
        <name>Signature Generation</name>
        <t>The "sg" tag contains a signature computed as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>Construct the canonical record string by concatenating all
tag-value pairs EXCEPT the "sg" tag, in alphabetical order
by tag name, separated by semicolons, with no whitespace.</t>
          </li>
          <li>
            <t>Sign the canonical string using the agent's current signing
key (the key published at the JWKS endpoint referenced by
the "ku" tag).</t>
          </li>
          <li>
            <t>Encode the signature as base64url (<xref target="RFC4648"/> Section 5).</t>
          </li>
        </ol>
        <t>The signing algorithm is determined by the key's "alg" field in
the JWKS response. Implementations MUST support ES256 (ECDSA
with P-256) <xref target="RFC7518"/>. Implementations SHOULD support
Ed25519 <xref target="RFC8037"/>. When
post-quantum algorithms are registered for use with JWS, implementations
SHOULD add support for ML-DSA (FIPS 204) <xref target="NIST-PQC"/>.</t>
      </section>
      <section anchor="signature-verification">
        <name>Signature Verification</name>
        <t>A verifier:</t>
        <ol spacing="normal" type="1"><li>
            <t>Fetches the JWKS from the "ku" endpoint over HTTPS.</t>
          </li>
          <li>
            <t>Reconstructs the canonical record string (all tags except "sg",
alphabetical order, no whitespace).</t>
          </li>
          <li>
            <t>Verifies the "sg" value against the canonical string using the
public key from the JWKS.</t>
          </li>
          <li>
            <t>If verification fails, the verifier MUST reject the record.</t>
          </li>
        </ol>
        <t>If the JWKS contains more than one signing key, the verifier
MUST attempt verification with each key whose "alg" value is
compatible with the signature. Verification succeeds if any
eligible key validates the signature.</t>
        <t>The verifier MAY additionally check the ledger to confirm that
the signing key is currently bound to this agent FQDN and has
not been rotated or revoked since the record was last updated.</t>
      </section>
      <section anchor="relationship-to-dnssec">
        <name>Relationship to DNSSEC</name>
        <t>DNSSEC, when deployed, provides an independent integrity layer
that protects against on-path tampering of the DNS response.
DNSid implementations SHOULD deploy DNSSEC. Verifier behavior
depends on the DNSSEC state of the zone:</t>
        <dl>
          <dt>DNSSEC absent (zone not signed):</dt>
          <dd>
            <t>Verification proceeds with the accountable entity's signature
("sg" tag) only.
The verifier SHOULD note the reduced assurance level. This
accommodates domains on TLDs or registrars that do not yet
support DNSSEC.</t>
          </dd>
          <dt>DNSSEC present and valid:</dt>
          <dd>
            <t>Both DNSSEC and the accountable entity's signature are
checked. This is the strongest assurance level — DNS
transport integrity is
confirmed and the record content is signed by the
accountable entity.</t>
          </dd>
          <dt>DNSSEC present but validation fails:</dt>
          <dd>
            <t>The verifier MUST treat the DNSid TXT record as unusable and
abort verification. DNSSEC validation failure means
authenticated DNS data for the owner name could not be
established; the DNS response may have been tampered with
in transit. This follows the precedent set by DANE
(<xref target="RFC6698"/> Section 4), which requires that TLSA records
with failed DNSSEC validation be treated as unusable.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="http-service-interfaces">
      <name>HTTP Service Interfaces</name>
      <t>DNSid defines two HTTPS service interfaces referenced by the
TXT record. These interfaces are abstract: the specification
defines the semantics and required response properties, not a
specific API schema. Companion documents may define concrete
API profiles.</t>
      <section anchor="key-service-ku-endpoint">
        <name>Key Service (KU endpoint)</name>
        <t>The key service endpoint MUST return a JWK Set (<xref target="RFC7517"/>) over
HTTPS. The response:</t>
        <ul spacing="normal">
          <li>
            <t>MUST include at least one signing key with a "kid" (key ID).</t>
          </li>
          <li>
            <t>MUST include the "alg" field on each key, enabling algorithm
negotiation for crypto agility.</t>
          </li>
          <li>
            <t>SHOULD include key metadata such as expiry and key
operations, to support local policy evaluation.</t>
          </li>
          <li>
            <t>MUST be served over HTTPS with a valid TLS certificate whose
Subject Alternative Name matches the agent FQDN. The "ku"
URI host MUST be the agent FQDN.</t>
          </li>
        </ul>
        <t>The endpoint URL SHOULD follow the well-known URI convention
(<xref target="RFC8615"/>):</t>
        <artwork><![CDATA[
https://<agent-fqdn>/.well-known/jwks.json
]]></artwork>
        <t>Agents that already publish a JWKS endpoint at their FQDN for
other purposes (e.g., OAuth) MAY reference that existing
endpoint via the "ku" tag. A separate DNSid-specific endpoint
is not required.</t>
        <t>Future specifications MAY define additional key discovery
profiles, including DNSSEC-authenticated delegated key services,
parent-domain key services, DNS-carried key material, or
ledger-bound key references. Such profiles MUST specify how the
binding between the agent FQDN and the signing key is
authenticated without relying solely on a signature verified by
the key being discovered. A verifier MUST NOT use an alternate
key discovery mechanism unless the applicable profile defines
its verification requirements and failure behavior.</t>
        <t>The JWKS SHOULD contain a single current DNSid signing key.
Previous signing keys MAY be retained to support verification
of prior signatures. When multiple signing keys are present,
the current key SHOULD appear first. Verifiers MUST NOT rely
on JWKS ordering for correctness and MUST attempt verification
with each eligible key whose "alg" value is compatible with
the signature.</t>
        <t>The signing algorithm for all DNSid operations is declared by
the "alg" field of the JWK published at the key service endpoint.
The DNSid TXT record itself does not encode algorithm information;
algorithm negotiation occurs entirely through the JWKS.</t>
        <t>Implementations MAY optionally reinforce the key service binding
with DANE (<xref target="RFC6698"/>) TLSA records for cryptographic binding
between the FQDN and the TLS certificate, eliminating dependence
on external certificate authorities.</t>
      </section>
      <section anchor="status-service-su-endpoint">
        <name>Status Service (SU endpoint)</name>
        <t>The status service endpoint MUST return the agent's current
lifecycle state over HTTPS. The response:</t>
        <ul spacing="normal">
          <li>
            <t>MUST include the current state (see <xref target="agent-states"/> for valid
states: PENDING, PROVISIONING, VERIFYING, ACTIVE, RETIRED,
or REVOKED).</t>
          </li>
          <li>
            <t>MUST include the timestamp of the last state transition.</t>
          </li>
          <li>
            <t>MUST include a reason code when the state is REVOKED.</t>
          </li>
          <li>
            <t>MUST be served with a valid TLS certificate.</t>
          </li>
        </ul>
        <t>The status endpoint is the primary real-time mechanism for
obtaining the accountable entity's current lifecycle-state
declaration. Firewalls, IAM systems, policy engines, and other
Layer 3-7 systems MAY reference this declaration when making
their own trust decisions.</t>
        <t>DNSid does not enforce revocation. A verifier's trust in the
status endpoint is a matter of local policy.
High-assurance deployments MAY require consistency between the
status endpoint and the lifecycle ledger, or MAY require
status responses to be countersigned by a designated authority.</t>
      </section>
    </section>
    <section anchor="abstract-ledger-interface">
      <name>Abstract Ledger Interface</name>
      <t>DNSid requires an append-only verifiable ledger for lifecycle
history and, where optional event types are supported,
provenance. This section defines the abstract
interface that any conforming ledger implementation must satisfy.
It does not specify a particular ledger technology.</t>
      <section anchor="ledger-identification">
        <name>Ledger Identification</name>
        <t>The "lr" tag in the DNSid TXT record identifies the ledger
using a structured reference. The method component identifies
the ledger binding. The remaining components locate the agent's
entry within that ledger.</t>
        <t>Conforming ledger implementations SHOULD register their method
name with the DNSid Log Method Registry (<xref target="iana-considerations"/>).</t>
        <t>Concrete ledger bindings SHOULD be documented as separate
specification documents, analogous to W3C DID method
specifications. Each binding document defines the method name,
reference syntax, entry format, proof format, and query
interface for a specific ledger technology. The DNSid Log Method Registry serves as the
index for registered bindings.</t>
      </section>
      <section anchor="required-properties">
        <name>Required Properties</name>
        <t>A conforming ledger MUST provide:</t>
        <ul spacing="normal">
          <li>
            <t>Append-only: entries cannot be modified or deleted after
recording.</t>
          </li>
          <li>
            <t>Cryptographic inclusion proofs: for any recorded entry, the
ledger can produce a proof that the entry is included in the
log at a specific position.</t>
          </li>
          <li>
            <t>Verifiable timestamps: each entry has a timestamp that is
independently verifiable.</t>
          </li>
          <li>
            <t>Verifier accessibility: verifiers within the ledger's
declared verification scope can obtain lifecycle entries or
portable cryptographic proofs sufficient to verify inclusion,
timestamps, and current lifecycle state.</t>
          </li>
          <li>
            <t>Durability: entries persist independently of the ledger
operator's continued participation.</t>
          </li>
        </ul>
        <t>The accountable entity selects the ledger technology and its
verification scope. A ledger MAY be public, consortium-scoped,
private, access-controlled, or based on portable receipts,
provided that verifiers expected to rely on the DNSid can
obtain sufficient cryptographic evidence to perform
verification. A publicly queryable ledger provides the broadest
interoperability and is RECOMMENDED for agents intended for
open Internet-scale verification.</t>
      </section>
      <section anchor="entry-signing">
        <name>Entry Signing</name>
        <t>Lifecycle event entries MUST be signed by the accountable
entity's signing key (the key published via the JWKS endpoint).
This ensures that the accountable entity, not a third party, is
the author of each lifecycle record.</t>
        <t>Entries MAY additionally be countersigned by the ledger operator
or a witness service. Countersignatures provide additional
assurance but do not replace the accountable entity's signature.</t>
      </section>
      <section anchor="event-types">
        <name>Event Types</name>
        <t>Lifecycle events that introduce or rotate signing keys MUST
preserve sufficient public key material, or a durable
reference to such material, to support historical signature
verification independent of the current JWKS endpoint. A key
hash or thumbprint MAY be included for compact binding, but a
hash alone is not sufficient for historical signature
verification.</t>
        <t>The ledger MUST support recording the following core event
types. Each event includes the agent FQDN, event type,
timestamp, accountable entity signature, and event-specific
data:</t>
        <dl>
          <dt>ISSUANCE:</dt>
          <dd>
            <t>Agent FQDN, initial public key material or durable
public-key reference, public key thumbprint, registrant
organizational identifier. Recorded when the agent
identity is first created.</t>
          </dd>
          <dt>KEY_ROTATION:</dt>
          <dd>
            <t>Previous public key thumbprint, new public key material
or durable public-key reference, new public key
thumbprint, rotation timestamp. Recorded when the
agent's signing key changes. Establishes continuity:
same agent, new keys.</t>
          </dd>
          <dt>REVOCATION:</dt>
          <dd>
            <t>Reason code (REQUIRED), timestamp. Recorded when the
agent's identity is forcibly ended. Permanent and
irreversible. Reason codes follow X.509 conventions:
keyCompromise, policyViolation, superseded,
cessationOfOperation. Signed work products from the
period triggering revocation SHOULD be treated as
suspect by verifiers.</t>
          </dd>
          <dt>RETIREMENT:</dt>
          <dd>
            <t>Timestamp. Recorded when the agent's identity
lifecycle is gracefully completed. The agent was
decommissioned as planned; signed work products
produced before retirement retain full provenance
value. Permanent and irreversible.</t>
          </dd>
          <dt>MIGRATION:</dt>
          <dd>
            <t>Previous ledger reference, new ledger reference, final entry
reference on previous ledger, timestamp. Recorded on
the NEW ledger when an agent's lifecycle history is
moved between ledger technologies. The previous
ledger's records remain the authoritative history for
events before the migration timestamp. The new
ledger's first entry MUST reference the agent's final
entry on the previous ledger.</t>
          </dd>
        </dl>
        <t>The ledger MAY additionally support the following OPTIONAL
event types:</t>
        <dl>
          <dt>DELEGATION:</dt>
          <dd>
            <t>Delegating agent FQDN, delegatee agent FQDN,
scope constraints, expiry. Recorded when one agent
grants authority to another.</t>
          </dd>
          <dt>CONTENT_SIG:</dt>
          <dd>
            <t>Content hash (SHA-256 or stronger), signing key
reference (kid), timestamp. Recorded when the agent
signs a work product for provenance purposes.</t>
          </dd>
        </dl>
        <t>Additional event types MAY be defined in companion specifications.</t>
      </section>
    </section>
    <section anchor="verification-protocol">
      <name>Verification Protocol</name>
      <t>DNSid verification combines DNS resolution, accountable entity
signature validation, TLS-based live identity, and optional
ledger queries.</t>
      <section anchor="interactive-verification">
        <name>Interactive Verification</name>
        <ol spacing="normal" type="1"><li>
            <t>The verifier queries _dnsid.&lt;target-fqdn&gt; for TXT records.
If multiple TXT records are present, verification MUST fail.
The verifier concatenates all strings in the TXT RDATA and
parses the tag-value record.</t>
          </li>
          <li>
            <t>The verifier validates that "v=DNSid1" is the first tag and
that all REQUIRED tags are present and non-empty.</t>
          </li>
          <li>
            <t>The verifier fetches the JWKS from the "ku" endpoint over
HTTPS and verifies the accountable entity's signature ("sg"
tag) against the canonical record content
(<xref target="signature-verification"/>). If signature
verification fails, the record MUST be rejected.</t>
          </li>
          <li>
            <t>The verifier establishes an HTTPS or mTLS connection with the
agent at its FQDN (not at _dnsid.&lt;fqdn&gt;). The TLS handshake
and certificate chain prove active control of the FQDN. When
mTLS is required (the "mtls" flag is present), the verifier
MUST validate the peer certificate against the agent FQDN per
<xref target="RFC9525"/>. DNSid does not define the application protocol or
runtime authentication exchange.</t>
          </li>
        </ol>
        <t>Before relying on a DNSid identity for a new interactive
operation, the verifier MUST query the status service ("su"
tag) over HTTPS and confirm the state is ACTIVE. If the state
is not ACTIVE, verification for new interactive operations MUST
fail. A verifier MAY skip status lookup only when performing
offline or historical provenance verification.</t>
        <t>These steps provide interactive identity assurance: the verifier
knows which accountable entity controls this agent, right now,
with cryptographic proof.</t>
      </section>
      <section anchor="historical-verification">
        <name>Historical Verification</name>
        <t>Step 5 (Ledger Verification): For high-assurance operations, or
when the "logchk" flag is present, the verifier queries the ledger
identified by the "lr" tag. The verifier checks:</t>
        <ul spacing="normal">
          <li>
            <t>That the agent's issuance event is recorded.</t>
          </li>
          <li>
            <t>That the current signing key is bound to this agent FQDN.</t>
          </li>
          <li>
            <t>That the ledger binding provides evidence of the agent's
non-revoked state at the relevant verification time.</t>
          </li>
        </ul>
        <t>Step 6 (Provenance Verification): For work product provenance,
the verifier checks that a CONTENT_SIG event exists in the ledger
matching the content hash of the artifact, with a timestamp and
signing key consistent with the agent's identity at the time of
production.</t>
        <t>When ledger verification is required by local policy, by the
"logchk" flag, or by the risk profile of the operation, failure
to obtain the required ledger entry or cryptographic proof MUST
cause ledger verification to fail.</t>
        <t>Historical verification provides lifecycle transparency and
artifact provenance. These checks are used for audit,
compliance, post-incident forensics, and
verifying agent outputs that have crossed organizational
boundaries.</t>
      </section>
    </section>
    <section anchor="lifecycle-events">
      <name>Lifecycle Events</name>
      <section anchor="agent-states">
        <name>Agent States</name>
        <t>An agent identity progresses through a linear state machine.
Each transition is a ledger event.</t>
        <artwork><![CDATA[
PENDING --> PROVISIONING --> VERIFYING --> ACTIVE
                                            |
                                      [key rotation]
                                      [delegation]
                                      [content signing]
                                         /        \
                                        /          \
                                  RETIRED        REVOKED
                              (graceful end)  (forced end + reason)
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>PENDING: Identity record created, infrastructure not yet deployed.</t>
          </li>
          <li>
            <t>PROVISIONING: Cryptographic challenge issued by the registry.</t>
          </li>
          <li>
            <t>VERIFYING: Challenge signed by the agent's private key, registry validating.</t>
          </li>
          <li>
            <t>ACTIVE: Operational. Key rotation, delegation, and content signing occur within this state.</t>
          </li>
          <li>
            <t>RETIRED: Graceful end-of-life. The agent completed its intended lifecycle and was decommissioned as planned. Signed work products produced before retirement retain full provenance value.</t>
          </li>
          <li>
            <t>REVOKED: Forced end. Reason code REQUIRED (keyCompromise, policyViolation, superseded, cessationOfOperation). Signed work products from the period triggering revocation SHOULD be treated as suspect by verifiers.</t>
          </li>
        </ul>
        <t>Both RETIRED and REVOKED are terminal states. Transitions are
forward-only. Neither can return to ACTIVE. A new identity
registration is required.</t>
      </section>
      <section anchor="identity-lifecycle-flexibility">
        <name>Identity Lifecycle Flexibility</name>
        <t>DNSid may be attached to agents at any point in their lifecycle,
including agents that were deployed before DNSid was available.
The PENDING state serves as the entry point for registration
regardless of when the agent was originally created or how long
it has been operational.</t>
        <t>For fleets of pre-existing agents, organizations may migrate
agents to DNSid incrementally. No flag-day deployment is
required; agents can be registered individually or in batches
as operational needs dictate.</t>
        <t>An agent's DNSid may be replaced. The previous DNSid enters
RETIRED or REVOKED as appropriate, and a new ISSUANCE event
creates a fresh identity with its own ledger history. The new
identity carries no history from the previous one. Verifiers
will observe the new identity's short effective history, which
is itself a trust-relevant signal: an identity with no ledger
depth is distinguishable from one with years of operational
history. Replacement may serve legitimate operational purposes
(organizational restructuring, key compromise response,
rebranding) but cannot import the previous identity's
accumulated trust.</t>
      </section>
      <section anchor="key-rotation-procedure">
        <name>Key Rotation Procedure</name>
        <t>When an agent's signing key is rotated:</t>
        <ol spacing="normal" type="1"><li>
            <t>The agent generates a new key pair.</t>
          </li>
          <li>
            <t>The new key is published to the JWKS endpoint. The previous
key SHOULD be retained at the endpoint for a period sufficient
to verify any outstanding signed work products.</t>
          </li>
          <li>
            <t>A KEY_ROTATION event is recorded on the ledger, binding the
previous public key thumbprint to the new public key material
or durable public-key reference and new public key thumbprint,
establishing continuity of identity.</t>
          </li>
          <li>
            <t>The DNSid TXT record is re-signed with the new key (the "sg"
tag is recomputed).</t>
          </li>
          <li>
            <t>DNS TTL expiry propagates the updated record to verifiers.</t>
          </li>
        </ol>
        <t>Verifiers encountering a signature from a previous key SHOULD
check the ledger for a KEY_ROTATION event linking the previous
key thumbprint to the current key before rejecting the
signature.</t>
      </section>
      <section anchor="status-change-propagation">
        <name>Status Change Propagation</name>
        <t>When an agent's status changes (e.g., revocation), the change
propagates through:</t>
        <ul spacing="normal">
          <li>
            <t>Status endpoint (su): reflects the new state immediately.</t>
          </li>
          <li>
            <t>Ledger record (lr): permanent record with reason code.</t>
          </li>
          <li>
            <t>DNS TTL expiry: verifiers re-resolve the DNSid TXT record
on the next TTL cycle.</t>
          </li>
        </ul>
        <t>Systems that reference this identity (firewalls, IAM, policy
engines, audit platforms) independently discover the status
change on their own schedule. DNSid reflects the accountable
entity's decision. Enforcement is the responsibility of each consuming
system.</t>
      </section>
    </section>
    <section anchor="applicability">
      <name>Applicability</name>
      <t>Even agents operating within a single trust domain may
transcend organizational boundaries as their work products,
signed outputs, and downstream interactions propagate beyond
their origin. The zero-trust security model, which treats
internal and external trust boundaries equivalently, provides
independent motivation for applying durable cross-organizational
identity even to agents that currently operate within a single
trust domain.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="entity-signature-and-dnssec">
        <name>Entity Signature and DNSSEC</name>
        <t>Risk: An on-path attacker modifies the DNSid TXT record during
DNS resolution. Mitigation: Two independent integrity layers.
The accountable entity's signature ("sg" tag) binds record
content to the accountable entity's key — analogous to a self-signed
certificate in a DNSSEC-signed zone. DNSSEC, when deployed,
provides transport integrity for the DNS response. Together
they mirror the DANE model (<xref target="RFC6698"/>), where TLSA records
bind certificates to domain names through DNSSEC-signed DNS.
When DNSSEC validation fails, the record MUST be treated as
unusable (<xref target="relationship-to-dnssec"/>). When DNSSEC is absent,
the accountable entity's signature remains the sole integrity
mechanism.</t>
      </section>
      <section anchor="txt-record-ambiguity">
        <name>TXT Record Ambiguity</name>
        <t>Unlike a dedicated RR type, TXT records provide no inherent type
safety. Verifiers MUST validate the "v=DNSid1" version tag and
MUST reject any TXT record at the _dnsid owner name that does
not contain this tag. The singleton TXT requirement is a
deliberate ambiguity-control measure: verifiers do not select
among multiple candidate DNSid records and do not merge fields
across records.</t>
      </section>
      <section anchor="ttl-and-caching">
        <name>TTL and Caching</name>
        <t>Stale DNSid TXT records create a window during which revoked
or rotated identities remain cached by resolvers. DNS is not
a real-time revocation channel. Operators SHOULD choose DNSid
TXT TTLs appropriate to the risk profile of the agent and
SHOULD avoid long-lived TTLs for identities that require
responsive revocation. Verifiers that require current
lifecycle state MUST query the status service rather than
relying solely on cached DNS data.</t>
      </section>
      <section anchor="post-quantum-considerations">
        <name>Post-Quantum Considerations</name>
        <t>Agent identity credentials are long-lived governance artifacts,
not ephemeral session tokens — the class of credential most
vulnerable to future quantum-capable signature forgery.
The key service (<xref target="key-service-ku-endpoint"/>) supports algorithm
negotiation via the JWK "alg" field, enabling transition to
post-quantum signature algorithms (FIPS 204 ML-DSA, FIPS 205
SLH-DSA) without protocol changes, consistent with the NIST
IR 8547 deprecation timeline <xref target="NIST-IR-8547"/>.</t>
      </section>
      <section anchor="ledger-durability">
        <name>Ledger Durability</name>
        <t>Organizations SHOULD choose ledger technologies with strong
durability guarantees and broad operational support. The
MIGRATION event type (<xref target="event-types"/>) provides a mechanism for
moving to a new ledger while preserving history. Organizations
SHOULD maintain an offline archive of their ledger entries as
a backup against ledger unavailability.</t>
        <t>If a ledger becomes permanently unavailable, the agent's
historical provenance is degraded, but the current identity
(DNS + JWKS + status endpoint) remains valid for interactive
verification. The MIGRATION event allows re-establishing
historical continuity on a new ledger by referencing the
previous ledger's final entry.</t>
      </section>
      <section anchor="revocation-and-accountability">
        <name>Revocation and Accountability</name>
        <t>A REVOCATION event is an abnormal lifecycle state transition,
distinct from RETIREMENT. Whereas RETIREMENT indicates a
planned or graceful end of an agent identity, REVOCATION
indicates that the accountable entity has declared the identity
no longer valid because of a condition such as key compromise,
policy violation, supersession, or cessation of operation.</t>
        <t>A REVOCATION event does not by itself repudiate all prior
actions by the agent, nor does it remove accountability for
actions that occurred before the revocation event. However,
revocation is a material trust signal. Verifiers and
investigators evaluating prior work products SHOULD consider
the revocation reason, the artifact timestamp, the status
transition timestamp, the ledger event timestamp, the relevant
key history, and any available external evidence.</t>
        <t>Signed work products produced during a suspected compromise or
policy-violation window SHOULD be treated as suspect by
verifiers. Work products produced before that window MAY retain
provenance value if the verifier can establish that the
relevant signing key was valid at the time of production and
that no applicable revocation or compromise event affects the
artifact.</t>
      </section>
      <section anchor="uri-integrity">
        <name>URI Integrity</name>
        <t>The HTTPS endpoints referenced by "ku", "su", and "cu" tags
depend on TLS <xref target="RFC8446"/> for integrity. All URI values in DNSid
tags MUST conform to <xref target="RFC3986"/>. Implementations MUST verify
TLS certificates for each HTTPS fetch and MUST NOT follow
redirects to non-HTTPS endpoints.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <section anchor="encrypted-dns-transport">
        <name>Encrypted DNS Transport</name>
        <t>Implementations SHOULD use encrypted DNS transport (DoT, <xref target="RFC7858"/>
or DoH, <xref target="RFC8484"/>) when resolving DNSid TXT records. The
_dnsid.&lt;fqdn&gt; query reveals agent-to-agent interaction patterns
that may be privacy-sensitive.</t>
      </section>
      <section anchor="tls-handshake-privacy">
        <name>TLS Handshake Privacy</name>
        <t>When a verifier connects to an agent by FQDN, the TLS
ClientHello can reveal that server name to network observers
through SNI. Encrypted Client Hello (ECH) <xref target="RFC9849"/> mitigates
this disclosure by encrypting the inner ClientHello.
Implementations that publish HTTPS records MAY include ECH
configurations.</t>
      </section>
      <section anchor="privacy-and-pseudonymity">
        <name>Privacy and Pseudonymity</name>
        <t>Detailed identity attributes and claims MUST NOT be placed in the
TXT record RDATA. These MUST be delegated to HTTPS endpoints and
Verifiable Credentials. URI values in the record SHOULD NOT
contain personally identifying information.</t>
        <t>Each DNSid FQDN constitutes a distinct pseudonymous identifier.
The agent operates under its FQDN without exposing the
accountable entity to parties that do not perform an explicit
verification. Resolving the accountable entity behind an agent
FQDN may require registrar, registry, or legal process,
depending on how the domain was registered and operated. Use
of distinct registrable domains provides operational separation
of pseudonymous identities. This property is a deliberate
consequence of anchoring identity in the registrant-domain
governance layer rather than in a centralized directory or
certificate authority.</t>
      </section>
      <section anchor="ledger-privacy">
        <name>Ledger Privacy</name>
        <t>The accountable entity selects the ledger technology and
determines its privacy characteristics. When a publicly
transparent ledger is chosen, lifecycle events (registration,
rotation, revocation, retirement) and optional provenance
events can reveal timing patterns. Operators using public
ledgers SHOULD minimize event payloads and avoid personally
identifying information in ledger entries.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests the creation of three new registries under
the "Domain Name System (DNS) Parameters" group.</t>
      <section anchor="dnsid-txt-tag-names-registry">
        <name>DNSid TXT Tag Names Registry</name>
        <t>Registration policy: Specification Required (<xref target="RFC8126"/>).
Registration requests should include the tag name, status
(REQUIRED or OPTIONAL), syntax, semantics, reference, and
change controller.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Status</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">v</td>
              <td align="left">REQUIRED</td>
              <td align="left">Version identifier. MUST be "DNSid1".</td>
            </tr>
            <tr>
              <td align="left">oi</td>
              <td align="left">REQUIRED</td>
              <td align="left">Governance identifier.</td>
            </tr>
            <tr>
              <td align="left">ku</td>
              <td align="left">REQUIRED</td>
              <td align="left">Key service URI.</td>
            </tr>
            <tr>
              <td align="left">lr</td>
              <td align="left">REQUIRED</td>
              <td align="left">Log reference.</td>
            </tr>
            <tr>
              <td align="left">su</td>
              <td align="left">REQUIRED</td>
              <td align="left">Status service URI.</td>
            </tr>
            <tr>
              <td align="left">sg</td>
              <td align="left">REQUIRED</td>
              <td align="left">Entity signature (base64url).</td>
            </tr>
            <tr>
              <td align="left">fl</td>
              <td align="left">OPTIONAL</td>
              <td align="left">Policy flags.</td>
            </tr>
            <tr>
              <td align="left">ka</td>
              <td align="left">OPTIONAL</td>
              <td align="left">Maximum signing key age.</td>
            </tr>
            <tr>
              <td align="left">cu</td>
              <td align="left">OPTIONAL</td>
              <td align="left">Capabilities (Agent.md) URI.</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="dnsid-policy-flag-names-registry">
        <name>DNSid Policy Flag Names Registry</name>
        <t>Registration policy: Specification Required (<xref target="RFC8126"/>).
Registration requests should include the flag name, verifier
behavior, reference, and change controller.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Flag</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">mtls</td>
              <td align="left">Verifiers MUST use mutual TLS.</td>
            </tr>
            <tr>
              <td align="left">logchk</td>
              <td align="left">Verifiers MUST perform a log check before high-value operations.</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="dnsid-log-method-registry">
        <name>DNSid Log Method Registry</name>
        <t>Registration policy: Specification Required (<xref target="RFC8126"/>).
Registration requests should include the method name, reference
syntax, entry format, proof format, verification procedure,
security considerations, reference, and change controller.</t>
        <t>This registry maps DNSid log method names to ledger binding
specifications. It does not register URI schemes. No initial
entries are defined; ledger binding specifications register
their method names independently.</t>
        <t>This document does not request the registration of a new DNS
Resource Record type. See <xref target="migration-path"/> for the planned
migration path to a dedicated RR type.</t>
      </section>
      <section anchor="dnsid-underscore-label-registration">
        <name>DNSid Underscore Label Registration</name>
        <t>Per <xref target="RFC8552"/>, IANA is requested to add the following entry
to the "Underscored and Globally Scoped DNS Node Names"
registry:</t>
        <table>
          <thead>
            <tr>
              <th align="left">RR Type</th>
              <th align="left">_NODE NAME</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TXT</td>
              <td align="left">_dnsid</td>
              <td align="left">This document</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1035">
          <front>
            <title>Domain names - implementation and specification</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1035"/>
          <seriesInfo name="DOI" value="10.17487/RFC1035"/>
        </reference>
        <reference anchor="RFC1123">
          <front>
            <title>Requirements for Internet Hosts - Application and Support</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <date month="October" year="1989"/>
            <abstract>
              <t>This RFC is an official specification for the Internet community. It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="3"/>
          <seriesInfo name="RFC" value="1123"/>
          <seriesInfo name="DOI" value="10.17487/RFC1123"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="P. Overell" initials="P." surname="Overell"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC6376">
          <front>
            <title>DomainKeys Identified Mail (DKIM) Signatures</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
            <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
            <date month="September" year="2011"/>
            <abstract>
              <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
              <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="76"/>
          <seriesInfo name="RFC" value="6376"/>
          <seriesInfo name="DOI" value="10.17487/RFC6376"/>
        </reference>
        <reference anchor="RFC7517">
          <front>
            <title>JSON Web Key (JWK)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7517"/>
          <seriesInfo name="DOI" value="10.17487/RFC7517"/>
        </reference>
        <reference anchor="RFC7518">
          <front>
            <title>JSON Web Algorithms (JWA)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7518"/>
          <seriesInfo name="DOI" value="10.17487/RFC7518"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC8037">
          <front>
            <title>CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE)</title>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document defines how to use the Diffie-Hellman algorithms "X25519" and "X448" as well as the signature algorithms "Ed25519" and "Ed448" from the IRTF CFRG elliptic curves work in JSON Object Signing and Encryption (JOSE).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8037"/>
          <seriesInfo name="DOI" value="10.17487/RFC8037"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC8552">
          <front>
            <title>Scoped Interpretation of DNS Resource Records through "Underscored" Naming of Attribute Leaves</title>
            <author fullname="D. Crocker" initials="D." surname="Crocker"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>Formally, any DNS Resource Record (RR) may occur under any domain name. However, some services use an operational convention for defining specific interpretations of an RRset by locating the records in a DNS branch under the parent domain to which the RRset actually applies. The top of this subordinate branch is defined by a naming convention that uses a reserved node name, which begins with the underscore character (e.g., "_name"). The underscored naming construct defines a semantic scope for DNS record types that are associated with the parent domain above the underscored branch. This specification explores the nature of this DNS usage and defines the "Underscored and Globally Scoped DNS Node Names" registry with IANA. The purpose of this registry is to avoid collisions resulting from the use of the same underscored name for different services.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="222"/>
          <seriesInfo name="RFC" value="8552"/>
          <seriesInfo name="DOI" value="10.17487/RFC8552"/>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC9525">
          <front>
            <title>Service Identity in TLS</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="R. Salz" initials="R." surname="Salz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Transport Layer Security (TLS) with Internet Public Key Infrastructure using X.509 (PKIX) certificates. This document specifies procedures for representing and verifying the identity of application services in such interactions.</t>
              <t>This document obsoletes RFC 6125.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9525"/>
          <seriesInfo name="DOI" value="10.17487/RFC9525"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="RFC6962">
          <front>
            <title>Certificate Transparency</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Kasper" initials="E." surname="Kasper"/>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6962"/>
          <seriesInfo name="DOI" value="10.17487/RFC6962"/>
        </reference>
        <reference anchor="RFC7208">
          <front>
            <title>Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1</title>
            <author fullname="S. Kitterman" initials="S." surname="Kitterman"/>
            <date month="April" year="2014"/>
            <abstract>
              <t>Email on the Internet can be forged in a number of ways. In particular, existing protocols place no restriction on what a sending host can use as the "MAIL FROM" of a message or the domain given on the SMTP HELO/EHLO commands. This document describes version 1 of the Sender Policy Framework (SPF) protocol, whereby ADministrative Management Domains (ADMDs) can explicitly authorize the hosts that are allowed to use their domain names, and a receiving host can check such authorization.</t>
              <t>This document obsoletes RFC 4408.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7208"/>
          <seriesInfo name="DOI" value="10.17487/RFC7208"/>
        </reference>
        <reference anchor="RFC7489">
          <front>
            <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
            <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
            <author fullname="E. Zwicky" initials="E." role="editor" surname="Zwicky"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t>
              <t>Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers. These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t>
              <t>DMARC does not produce or encourage elevated delivery privilege of authenticated email. DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7489"/>
          <seriesInfo name="DOI" value="10.17487/RFC7489"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9421">
          <front>
            <title>HTTP Message Signatures</title>
            <author fullname="A. Backman" initials="A." role="editor" surname="Backman"/>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <author fullname="M. Sporny" initials="M." surname="Sporny"/>
            <date month="February" year="2024"/>
            <abstract>
              <t>This document describes a mechanism for creating, encoding, and verifying digital signatures or message authentication codes over components of an HTTP message. This mechanism supports use cases where the full HTTP message may not be known to the signer and where the message may be transformed (e.g., by intermediaries) before reaching the verifier. This document also describes a means for requesting that a signature be applied to a subsequent HTTP message in an ongoing HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9421"/>
          <seriesInfo name="DOI" value="10.17487/RFC9421"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9849">
          <front>
            <title>TLS Encrypted Client Hello</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="K. Oku" initials="K." surname="Oku"/>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="March" year="2026"/>
            <abstract>
              <t>This document describes a mechanism in Transport Layer Security (TLS) for encrypting a message under a server public key.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9849"/>
          <seriesInfo name="DOI" value="10.17487/RFC9849"/>
        </reference>
        <reference anchor="I-D.ietf-scitt-architecture" target="https://datatracker.ietf.org/doc/draft-ietf-scitt-architecture/">
          <front>
            <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
            <author initials="H." surname="Birkholz">
              <organization/>
            </author>
            <author initials="A." surname="Delignat-Lavaud">
              <organization/>
            </author>
            <author initials="C." surname="Fournet">
              <organization/>
            </author>
            <author initials="Y." surname="Deshpande">
              <organization/>
            </author>
            <author initials="S." surname="Lasker">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="SPIFFE" target="https://spiffe.io">
          <front>
            <title>The SPIFFE Identity and Verifiable Identity Document</title>
            <author>
              <organization>SPIFFE Project</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="NIST-PQC" target="https://csrc.nist.gov/news/2024/postquantum-cryptography-fips-approved">
          <front>
            <title>Post-Quantum Cryptography Standards: FIPS 203, 204, 205</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="NIST-IR-8547" target="https://csrc.nist.gov/pubs/ir/8547/ipd">
          <front>
            <title>Transition to Post-Quantum Cryptography Standards</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date year="2024" month="November"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 1270?>

<section anchor="relationship-to-adjacent-standards">
      <name>Relationship to Adjacent Standards</name>
      <t>This appendix provides informative context on how DNSid relates
to adjacent efforts in the agent identity ecosystem.</t>
      <dl>
        <dt>SPIFFE/SPIRE:</dt>
        <dd>
          <t>SPIFFE <xref target="SPIFFE"/> provides strong runtime workload identity
at Layer 3. Its specification acknowledges that trust domain
names are "nominally self-registered" with no delegating
authority. DNSid provides the governance-backed ownership
that SPIFFE trust domains can reference but do not define.
SPIFFE SVIDs can include the DNSid FQDN as a URI SAN.</t>
        </dd>
        <dt>GoDaddy ANS:</dt>
        <dd>
          <t>GoDaddy's Agent Name Service uses DNS-anchored
FQDNs with ACME domain control validation and a Merkle-tree
transparency log. ANS spans multiple layers (L1, L2, L7).
DNSid focuses solely on the Layer 1 ownership anchor and is
designed to compose with ANS or operate independently.</t>
        </dd>
        <dt>Web Bot Auth:</dt>
        <dd>
          <t>Built on HTTP Message Signatures <xref target="RFC9421"/> for automated traffic
(draft-meunier-web-bot-auth-architecture). Provides per-request
cryptographic authentication at Layer 4. The signing key
directory at /.well-known/http-message-signatures-directory
may be the same JWKS endpoint referenced by DNSid's "ku" tag,
enabling a single key management surface for both Layer 1
ownership and Layer 4 request authentication.</t>
        </dd>
        <dt>A2A AgentCard:</dt>
        <dd>
          <t>The Agent2Agent Protocol's AgentCard is a JSON
metadata document at /.well-known/agent-card.json that
describes agent capabilities, endpoints, and skills at
Layer 7. DNSid's optional "cu" tag can reference an AgentCard.
The AgentCard's provider claim can reference the DNSid
governance anchor domain, enabling verifiers to confirm the
provider claim through DNSid verification.</t>
        </dd>
        <dt>IETF WIMSE/AIMS:</dt>
        <dd>
          <t>WIMSE extends workload identity tokens with
agent-specific claims. The AIMS framework composes WIMSE,
SPIFFE, OAuth, and Transaction Tokens. Both operate at
Layers 3-4. DNSid provides the Layer 1 anchor that WIMSE
tokens can reference for organizational accountability.</t>
        </dd>
        <dt>AGENTS.md:</dt>
        <dd>
          <t>A markdown file convention declaring agent
capabilities and policies. DNSid's capabilities pointer
(the "cu" tag) can reference an Agent.md document, providing
the identity anchor that Agent.md declares capabilities for.</t>
        </dd>
        <dt>BANDAID:</dt>
        <dd>
          <t>Uses SVCB <xref target="RFC9460"/> records and DNSSEC for agent discovery
metadata. DNSid uses TXT records for identity anchoring.
SVCB is designed for service endpoint binding; DNSid is
designed for ownership binding. The two are complementary.</t>
        </dd>
        <dt>DNS-SD:</dt>
        <dd>
          <t>DNS-Based Service Discovery <xref target="RFC6763"/> extends DNS to
locate services. DNS-SD discovers what services exist;
DNSid establishes who is accountable for them. The two
are complementary and operate at different layers.</t>
        </dd>
        <dt>W3C DIDs and Verifiable Credentials:</dt>
        <dd>
          <t>DIDs and VCs operate at the cryptographic identity and claims
layers above DNSid. A DNSid FQDN MAY be the subject of a
Verifiable Credential. A DID such as did:web MAY be associated
with a DNSid FQDN through a VC or ledger event. DNSid does not
define a DID method, does not issue or revoke Verifiable
Credentials, and does not infer accountability from DID
resolution alone.</t>
        </dd>
        <dt>SCITT:</dt>
        <dd>
          <t>IETF SCITT <xref target="I-D.ietf-scitt-architecture"/> defines
append-only transparency services. A SCITT-compatible
service is one candidate implementation for DNSid's
abstract ledger interface.</t>
        </dd>
      </dl>
    </section>
    <section anchor="ecosystem-relationship-map">
      <name>Ecosystem Relationship Map</name>
      <t>The following table summarizes how DNSid relates to adjacent
efforts in the agent identity ecosystem:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Project</th>
            <th align="left">Layer</th>
            <th align="left">DNSid Relationship</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">ICANN/DNSSEC</td>
            <td align="left">0</td>
            <td align="left">DNSid builds on Layer 0</td>
          </tr>
          <tr>
            <td align="left">DANE (RFC 6698)</td>
            <td align="left">0, 2</td>
            <td align="left">Optional hardening for key binding</td>
          </tr>
          <tr>
            <td align="left">GoDaddy ANS</td>
            <td align="left">1,2,7</td>
            <td align="left">Complementary; ANS spans more layers</td>
          </tr>
          <tr>
            <td align="left">Web Bot Auth</td>
            <td align="left">4</td>
            <td align="left">Shared JWKS; per-request auth complement</td>
          </tr>
          <tr>
            <td align="left">SPIFFE/SPIRE</td>
            <td align="left">3</td>
            <td align="left">SVID can reference DNSid FQDN</td>
          </tr>
          <tr>
            <td align="left">OAuth 2.1/OIDC</td>
            <td align="left">4</td>
            <td align="left">Tokens can include DNSid org ID</td>
          </tr>
          <tr>
            <td align="left">NGAC/OPA/Cedar</td>
            <td align="left">5</td>
            <td align="left">Policies reference DNSid ownership</td>
          </tr>
          <tr>
            <td align="left">SCIM for Agents</td>
            <td align="left">6</td>
            <td align="left">Provisioning triggers DNSid events</td>
          </tr>
          <tr>
            <td align="left">A2A AgentCard</td>
            <td align="left">7</td>
            <td align="left">Provider claim references DNSid anchor</td>
          </tr>
          <tr>
            <td align="left">MCP/AGNTCY</td>
            <td align="left">7</td>
            <td align="left">Agent.md referenced via "cu" tag</td>
          </tr>
          <tr>
            <td align="left">AGENTS.md</td>
            <td align="left">7</td>
            <td align="left">Capabilities doc; DNSid is identity</td>
          </tr>
          <tr>
            <td align="left">WIMSE/AIMS</td>
            <td align="left">3-4</td>
            <td align="left">WIMSE tokens reference DNSid FQDN</td>
          </tr>
          <tr>
            <td align="left">W3C DIDs/VCs</td>
            <td align="left">2</td>
            <td align="left">VCs can attest DNSid ownership</td>
          </tr>
          <tr>
            <td align="left">RFC 9421 (HTTP Message Signatures)</td>
            <td align="left">4</td>
            <td align="left">Signing key can be DNSid JWKS key</td>
          </tr>
          <tr>
            <td align="left">SCITT</td>
            <td align="left">2</td>
            <td align="left">Ledger architecture aligned</td>
          </tr>
          <tr>
            <td align="left">BANDAID</td>
            <td align="left">7</td>
            <td align="left">Uses SVCB; DNSid uses TXT; both DNS</td>
          </tr>
          <tr>
            <td align="left">DNS-SD (RFC 6763)</td>
            <td align="left">7</td>
            <td align="left">Discovers services; DNSid anchors accountability</td>
          </tr>
        </tbody>
      </table>
      <t>DNSid is designed to be the smallest possible Layer 1 primitive
that all of these systems can reference independently.</t>
    </section>
    <section anchor="migration-path">
      <name>Migration Path to Dedicated RR Type</name>
      <t>This specification defines the TXT record encoding as the initial
deployment mechanism. The tag-value format is designed so that a
future dedicated DNSID RR type can encode the same fields in a
binary wire format without any semantic changes.</t>
      <t>The planned migration:</t>
      <ol spacing="normal" type="1"><li>
          <t>Deploy and validate the TXT encoding (this document).</t>
        </li>
        <li>
          <t>Submit a companion specification defining the DNSID RR type
with IANA allocation for a new RR type number.</t>
        </li>
        <li>
          <t>During transition, implementations supporting both encodings
SHOULD prefer the dedicated RR type when present, falling
back to TXT.</t>
        </li>
        <li>
          <t>The _dnsid owner name prefix is retained in both encodings
for consistency.</t>
        </li>
      </ol>
      <t>The migration does not alter the trust architecture, verification
protocol, or HTTP/log integration. It is a wire-format change
only.</t>
      <t>Within a version (e.g., DNSid1), the format is extensible:
new OPTIONAL tags may be defined in companion specifications,
and receivers MUST ignore unknown tags (<xref target="record-format"/>).
This allows incremental capability additions without a version
transition. A change to the version tag (e.g., DNSid1 to
DNSid2) constitutes a flag day: receivers that do not
understand the new version treat the record as absent. This is
consistent with the transition model used by SPF, DKIM, and
DMARC, and is acceptable because version changes to identity
infrastructure are infrequent, planned events.</t>
      <t>DNSid1 intentionally defines a singleton TXT record containing
one DNSid record. This avoids ambiguity in TXT RRset selection
and keeps the initial deployment model simple. Future versions
of this specification may define an overlapping transition
mechanism, such as allowing two versioned DNSid records during
a bounded migration period, or may rely on migration to a
dedicated DNSID RR type. Such a mechanism would need to specify
record selection, field consistency across versions, and
signature verification rules.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This work builds on the DNSid concept developed at Identity
Digital Innovation Labs. The author thanks Ben Guidarelli for
contributions to the TXT record encoding profile, Jason
Weathersby for technical review, Emily Edwards for product
refinement, and the participants of the Linux Foundation AAIF
Identity and Trust Working Group for ongoing discussion.</t>
      <t>The TXT record encoding follows conventions established by DKIM
(<xref target="RFC6376"/>), DMARC (<xref target="RFC7489"/>), and SPF (<xref target="RFC7208"/>).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
