<?xml version="1.0" encoding="UTF-8"?>
<?xml-model href="rfc7991bis.rnc"?>
<!DOCTYPE rfc [
  <!ENTITY RFC2119 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
  <!ENTITY RFC8174 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
  <!ENTITY RFC8200 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8200.xml">
  <!ENTITY RFC8754 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8754.xml">
  <!ENTITY RFC8986 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8986.xml">
]>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude"
     category="info"
     docName="draft-yu-ai-agent-ipv6-networking-considerations-00"
     ipr="trust200902"
     submissionType="IETF"
     version="3">
  <front>
    <title abbrev="AI Agent IPv6">IPv6 Networking Considerations for AI Agent Communication</title>
    <seriesInfo name="Internet-Draft" value="draft-yu-ai-agent-ipv6-networking-considerations-00"/>
    <author fullname="Haisheng Yu" initials="H." surname="Yu">
      <organization>China Internet Network Information Center</organization>
      <address>
        <email>yuhaisheng@cnnic.cn</email>
      </address>
    </author>
    <date year="2026" month="May" day="20"/>
    <area>Internet</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>IPv6</keyword>
    <keyword>AI Agent</keyword>
    <keyword>Agent Communication</keyword>
    <keyword>SRv6</keyword>
    <keyword>Network Telemetry</keyword>
    <abstract>
      <t>
        AI agents are increasingly expected to communicate across platforms,
        organizations, clouds, edge environments, and administrative domains.
        Ongoing work on agent protocols has started to address agent
        description, discovery, authentication, authorization, invocation,
        delegation, and collaboration. These functions are essential, but they
        generally treat the IP network as a transparent connectivity substrate.
      </t>
      <t>
        This document discusses IPv6 networking considerations for AI agent
        communication. It focuses on networking support after an agent has
        been discovered by an application-layer or control-plane mechanism. It
        discusses how stable Agent identifiers can be associated with IPv6
        locators or Agent Gateways, how agent communication requirements can be
        mapped to IPv6 or SRv6 forwarding policies, how limited agent-related
        network context can be carried within controlled deployment
        environments, and how network-layer telemetry can complement
        application-layer audit records.
      </t>
      <t>
        This document does not define a new agent discovery protocol, a new
        application-layer agent collaboration protocol, or a new authentication
        or authorization mechanism. It is intended to be complementary to
        existing and emerging agent discovery, identity, authorization,
        auditing, and collaboration mechanisms.
      </t>
    </abstract>
  </front>

  <middle>
    <section numbered="true" toc="default">
      <name>Conventions Used in This Document</name>
      <t>
        The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
        "OPTIONAL" in this document are to be interpreted as described in BCP
        14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only
        when, they appear in all capitals, as shown here.
      </t>
    </section>

    <section numbered="true" toc="default">
      <name>Introduction</name>
      <t>
        AI agents are moving from isolated applications toward large-scale,
        cross-domain collaboration. An agent may invoke tools, communicate with
        other agents, migrate across cloud or edge nodes, act on behalf of a
        user or organization, and interact through multiple application-layer
        protocols. In such environments, agent communication is not only an
        application-layer issue. It also raises questions of network
        reachability, locator binding, path selection, traffic isolation,
        observability, and operational governance.
      </t>
      <t>
        Several ongoing discussions and individual Internet-Drafts explore
        agent registration, discovery, identity, capability advertisement,
        authorization, delegation, auditing, and invocation. Such work is
        important for enabling agents to describe themselves, discover each
        other, and select suitable application-layer interaction mechanisms.
        However, after an agent has been discovered and an application-layer
        protocol has been selected, the resulting communication still needs to
        be carried by the underlying network.
      </t>
      <t>
        In large-scale deployments, the following questions remain relevant at
        the networking layer:
      </t>
      <ul>
        <li>How is a stable Agent identifier associated with a changing IPv6 locator or Agent Gateway?</li>
        <li>How can a discovered agent endpoint be connected to IPv6 reachability and network policy enforcement?</li>
        <li>How can different agent communication flows be steered through different network paths or service chains?</li>
        <li>How can agent communication be isolated, observed, and audited at the network layer?</li>
        <li>How can application-level intent be translated into structured and enforceable IPv6 or SRv6 policies without requiring ordinary routers to understand agent semantics?</li>
      </ul>
      <t>
        This document discusses IPv6 networking considerations for AI agent
        communication. It uses IPv6 as the basic addressing and forwarding
        substrate. In deployments where Segment Routing over IPv6 is available,
        SRv6 may be used to support policy-based path steering, service
        function chaining, and domain-local network programming. The IPv6
        Segment Routing Header (SRH) is defined in <xref target="RFC8754"/>,
        and SRv6 Network Programming is defined in <xref target="RFC8986"/>.
      </t>
      <t>
        This document does not assume that ordinary Internet routers understand
        agent identities, task semantics, natural language intent, or
        application payloads. Any processing of agent-related network context
        is limited to explicitly participating endpoints, Agent Gateways,
        policy enforcement points, or SRv6-capable nodes within controlled
        domains.
      </t>
    </section>

    <section numbered="true" toc="default">
      <name>Scope and Non-Goals</name>
      <t>This document focuses on:</t>
      <ul>
        <li>the separation of stable Agent identifiers from IPv6 locators;</li>
        <li>the binding of Agent identifiers to IPv6 locators or Agent Gateways;</li>
        <li>IPv6 reachability for discovered agents;</li>
        <li>mapping agent communication requirements to IPv6 or SRv6 policies;</li>
        <li>limited carriage of agent-related network context in controlled deployments;</li>
        <li>network-layer telemetry that can complement application-layer audit records;</li>
        <li>operational considerations for deployment in endpoints, Agent Gateways, enterprise networks, data centers, operator networks, and SRv6 domains.</li>
      </ul>
      <t>This document does not define:</t>
      <ul>
        <li>a new agent discovery protocol;</li>
        <li>a new application-layer agent collaboration protocol;</li>
        <li>a new authentication, authorization, or delegation protocol;</li>
        <li>a new replacement for A2A, MCP, ARDP, Agent Directory, OAuth, OIDC, DID, SD-JWT, WIMSE, RATS, SCITT, or OpenTelemetry mechanisms;</li>
        <li>a general-purpose semantic routing protocol;</li>
        <li>a requirement that public Internet routers process agent-specific metadata;</li>
        <li>a requirement that IPv6 extension headers be usable across the public Internet.</li>
      </ul>
    </section>

    <section numbered="true" toc="default">
      <name>Terminology</name>
      <dl newline="true">
        <dt>Agent:</dt>
        <dd>A software entity that can perceive context, reason, plan, invoke tools, communicate with other agents, and perform tasks on behalf of a user, organization, or system.</dd>
        <dt>Agent Identifier:</dt>
        <dd>A stable identifier used to identify an agent independently from its current network location. This document uses the term Agent-ID when referring to such an identifier in examples.</dd>
        <dt>IPv6 Locator:</dt>
        <dd>An IPv6 address or prefix used to reach an agent instance, an Agent Gateway, or another network element representing the agent.</dd>
        <dt>Agent Gateway:</dt>
        <dd>A network or application gateway that represents one or more agents and provides controlled access, address mapping, policy enforcement, protocol adaptation, or telemetry collection.</dd>
        <dt>Agent Context:</dt>
        <dd>A limited set of structured metadata related to agent communication, such as an Agent-ID reference, Session-ID, Trace-ID, Policy-ID, Trust-Level, or Audit-Flag. Agent Context in this document does not include natural language prompts, user private data, or application payloads.</dd>
        <dt>Agent Domain:</dt>
        <dd>An administrative or operational domain that explicitly supports agent-related networking functions, such as Agent-ID to locator binding, Agent Gateway enforcement, SRv6 policy selection, or network-layer telemetry collection.</dd>
        <dt>Agent-ID Registration Data Service:</dt>
        <dd>A trusted query mechanism that can provide registration data for an Agent-ID, such as the responsible entity, lifecycle state, associated domains, IPv6 locators, Agent Gateways, public key references, and revocation status. An RDAP-based profile is one possible realization, but is not specified by this document.</dd>
      </dl>
    </section>

    <section numbered="true" toc="default">
      <name>Problem Statement</name>
      <t>
        Agent discovery and collaboration mechanisms can help an application
        identify an agent, understand its capabilities, and select an
        application-layer protocol for interaction. However, those mechanisms
        do not by themselves define how the resulting traffic should be handled
        by the IPv6 network. This document identifies four networking problems
        that become important in large-scale and cross-domain deployments.
      </t>

      <section numbered="true" toc="default">
        <name>Separation of Agent Identity and Network Location</name>
        <t>
          An agent may be replicated, migrated, hidden behind a gateway, or
          deployed across multiple network domains. Its identity should remain
          stable, while the IPv6 locator used to reach it may change. A method
          is needed to associate Agent identifiers with IPv6 locators or Agent
          Gateways in a verifiable and operationally manageable way.
        </t>
      </section>

      <section numbered="true" toc="default">
        <name>Network Reachability After Discovery</name>
        <t>
          An agent discovery mechanism may return an endpoint, but that result
          does not necessarily prove that the endpoint is reachable, authorized
          to represent the Agent-ID, or suitable for a specific network policy.
          Agent communication therefore needs a way to connect discovery
          results with IPv6 reachability, locator selection, and policy
          enforcement.
        </t>
      </section>

      <section numbered="true" toc="default">
        <name>Path Control and Service Chaining</name>
        <t>
          Different agent communication flows may have different network
          requirements. Some flows may require low latency, some may require
          security inspection, some may require a compliance-aware path, and
          some may require audit collection. A method is needed to map
          structured communication requirements into IPv6 or SRv6 forwarding
          behavior without requiring the data plane to interpret application
          semantics.
        </t>
      </section>

      <section numbered="true" toc="default">
        <name>Network-Layer Evidence for Audit</name>
        <t>
          Application-layer logs may record task execution, authorization
          decisions, or API invocations. Network operators may also need
          independently collected flow-level evidence, such as source and
          destination locators, Agent Gateway traversal, SRv6 policy
          identifiers, timestamps, and telemetry records. Such evidence can
          complement application-layer audit records, but does not replace
          them.
        </t>
      </section>
    </section>

    <section numbered="true" toc="default">
      <name>Design Requirements</name>
      <t>
        The following requirements guide the considerations discussed in this
        document. They are intended to constrain Agent-related use of IPv6 and
        SRv6 mechanisms. They do not define a new application-layer agent
        protocol.
      </t>
      <dl newline="true">
        <dt>REQ-1:</dt>
        <dd>Agent identity and network location MUST be decoupled. A stable Agent identifier MUST NOT depend on a single IPv6 locator.</dd>
        <dt>REQ-2:</dt>
        <dd>Agent-ID to IPv6 locator or Agent Gateway bindings MUST be verifiable by an authorized mechanism.</dd>
        <dt>REQ-3:</dt>
        <dd>This document MUST NOT require ordinary Internet routers to understand agent identities, task semantics, natural language intent, or application payloads.</dd>
        <dt>REQ-4:</dt>
        <dd>Metadata exposed at the network layer MUST be minimized and MUST NOT contain sensitive user data, natural language prompts, private application payloads, or long semantic descriptions.</dd>
        <dt>REQ-5:</dt>
        <dd>Deployments MUST be possible without relying on IPv6 extension headers being forwarded across the public Internet.</dd>
        <dt>REQ-6:</dt>
        <dd>Use of SRv6-specific mechanisms MUST be limited to SRv6-capable domains and MUST follow the operational and security constraints of SRv6.</dd>
        <dt>REQ-7:</dt>
        <dd>The considerations in this document MUST remain complementary to application-layer discovery, identity, authorization, auditing, and collaboration mechanisms.</dd>
        <dt>REQ-8:</dt>
        <dd>Network-layer telemetry SHOULD be able to correlate with application-layer audit records through structured identifiers such as Trace-ID, Policy-ID, or Gateway-ID.</dd>
        <dt>REQ-9:</dt>
        <dd>Deployments MUST define where agent-related network context is processed, who is authorized to process it, and how such processing is protected and audited.</dd>
      </dl>
    </section>

    <section numbered="true" toc="default">
      <name>Networking Considerations Overview</name>
      <t>
        The considerations discussed in this document can be organized into
        five logical functions. These functions are logical and may be
        implemented by different systems in different deployments.
      </t>

      <section numbered="true" toc="default">
        <name>Agent Discovery Function</name>
        <t>
          This function discovers agent capabilities and endpoints through
          existing or emerging mechanisms, such as an Agent Directory, ARDP,
          A2A AgentCard, MCP-related directories, DNS-based indirection, or
          enterprise service discovery systems. This document does not replace
          this function.
        </t>
      </section>

      <section numbered="true" toc="default">
        <name>Agent Identity and Binding Function</name>
        <t>
          This function maintains or queries the binding between an Agent-ID
          and networking information. A binding record may include:
        </t>
        <ul>
          <li>Agent-ID;</li>
          <li>responsible entity;</li>
          <li>IPv6 locator;</li>
          <li>IPv6 prefix;</li>
          <li>Agent Gateway;</li>
          <li>certificate or public key reference;</li>
          <li>binding status;</li>
          <li>validity period;</li>
          <li>revocation status.</li>
        </ul>
        <t>
          The binding function may use an Agent-ID Registration Data Service,
          an Agent Registry, DNS-based indirection, an enterprise identity
          system, an operator-managed database, or a controller. This document
          does not require a single global registry.
        </t>
      </section>

      <section numbered="true" toc="default">
        <name>Agent Locator Resolution Function</name>
        <t>
          This function selects the IPv6 locator or Agent Gateway that should
          be used for a specific communication. Selection may depend on network
          reachability, policy, trust level, service class, administrative
          domain, or deployment location.
        </t>
      </section>

      <section numbered="true" toc="default">
        <name>Network Policy Function</name>
        <t>
          This function maps structured communication requirements to network
          policies. Such policies may include default IPv6 forwarding, SRv6
          path steering, service-chain insertion, security gateway traversal,
          compliance-aware routing, audit collection, traffic isolation, or
          low-latency forwarding.
        </t>
      </section>

      <section numbered="true" toc="default">
        <name>Forwarding and Telemetry Function</name>
        <t>
          This function carries agent communication using IPv6 and, where
          applicable, SRv6. It may also collect telemetry information that can
          be correlated with application-layer audit records.
        </t>
      </section>
    </section>

    <section numbered="true" toc="default">
      <name>Agent-ID to IPv6 Locator Binding</name>
      <t>
        This document separates Agent-ID from IPv6 locator. The Agent-ID
        identifies the agent as a stable entity. The IPv6 locator identifies
        the current network location of an agent instance, an Agent Gateway, or
        another network element that represents the agent.
      </t>
      <t>
        An Agent-ID may be associated with one or more IPv6 locators. The
        relationship may be one-to-one, one-to-many, many-to-one, or dynamic:
      </t>
      <ul>
        <li>A fixed agent instance may map to one IPv6 locator.</li>
        <li>A replicated agent service may map to multiple IPv6 locators.</li>
        <li>Many agents may be represented by a single Agent Gateway IPv6 locator.</li>
        <li>A mobile or migrated agent may change its IPv6 locator over time.</li>
      </ul>
      <t>
        Binding information SHOULD be authenticated and SHOULD include a
        validity period and revocation status. If an Agent Gateway represents
        an Agent-ID, the gateway authorization SHOULD also be verifiable.
      </t>
    </section>

    <section numbered="true" toc="default">
      <name>Use of IPv6 and SRv6</name>
      <t>
        IPv6 is used as the basic network-layer substrate. In simple cases,
        agent communication can use ordinary IPv6 forwarding. In more advanced
        cases, SRv6 may be used within an SRv6-capable domain to support path
        steering, service chaining, security inspection, or audit path
        selection.
      </t>
      <t>
        SRv6 may be useful when agent communication needs to pass through
        specific network functions, such as:
      </t>
      <ul>
        <li>Agent Gateway;</li>
        <li>authentication gateway;</li>
        <li>policy enforcement point;</li>
        <li>security inspection node;</li>
        <li>audit collection node;</li>
        <li>data compliance gateway;</li>
        <li>inference gateway;</li>
        <li>target agent service endpoint.</li>
      </ul>
      <t>
        This document avoids defining new IPv6 extension headers. <xref target="RFC8200"/> notes that defining new IPv6 extension headers is not recommended unless existing extension headers cannot be used, and also notes operational concerns around Hop-by-Hop options. Therefore, this document primarily considers existing mechanisms and deployment profiles.
      </t>
    </section>

    <section numbered="true" toc="default">
      <name>Agent Context Carriage</name>
      <t>
        Limited Agent Context may be carried in network-layer or
        network-adjacent mechanisms. Candidate fields include:
      </t>
      <ul>
        <li>Agent-ID reference;</li>
        <li>Session-ID;</li>
        <li>Trace-ID;</li>
        <li>Task-ID reference;</li>
        <li>Policy-ID;</li>
        <li>Trust-Level;</li>
        <li>Audit-Flag;</li>
        <li>Gateway-ID;</li>
        <li>Validity-Time;</li>
        <li>Service-Class.</li>
      </ul>
      <t>
        Agent Context MUST be minimized. Large semantic descriptions, natural
        language prompts, private user data, or sensitive application payloads
        MUST NOT be carried in IPv6 extension headers or other network-visible
        metadata fields.
      </t>

      <section numbered="true" toc="default">
        <name>Destination Options</name>
        <t>
          IPv6 Destination Options may be considered when the context is
          intended for the final destination or an intermediate destination
          identified by a Routing Header. <xref target="RFC8200"/> specifies
          that a Destination Options header can appear before a Routing Header
          or before the upper-layer header.
        </t>
        <t>
          Destination Options may be suitable only in deployment environments
          where participating endpoints or gateways are explicitly configured
          to process such options. This document does not assume that
          Destination Options are reliably forwarded or processed across the
          public Internet.
        </t>
      </section>

      <section numbered="true" toc="default">
        <name>SRH TLVs</name>
        <t>
          SRH TLVs may be considered inside an SRv6-capable domain when the
          information is related to SRv6 policy, service-chain context, audit
          path selection, or domain-local agent policy enforcement. Such TLVs
          are not intended to carry user prompts, full Agent identities, or
          sensitive payload data.
        </t>
      </section>

      <section numbered="true" toc="default">
        <name>Fallback Mechanisms</name>
        <t>
          Because IPv6 extension header support may be inconsistent across
          public networks, deployments SHOULD provide fallback mechanisms. Such
          mechanisms may include application-layer headers, TLS-protected
          metadata, Agent Gateway encapsulation, controller-side policy mapping,
          or out-of-band policy association.
        </t>
      </section>
    </section>

    <section numbered="true" toc="default">
      <name>Semantic Routing Considerations</name>
      <t>
        This document does not require routers to understand natural language,
        prompts, complex semantic descriptions, or agent reasoning processes.
        Semantic routing, if used, is understood as an indirect process:
      </t>
      <ol>
        <li>An upper-layer agent system, registry, controller, or gateway interprets task intent and converts it into a structured network policy identifier.</li>
        <li>The IPv6 or SRv6 network uses the structured policy identifier to select a path, service chain, security domain, telemetry behavior, or audit policy.</li>
      </ol>
      <sourcecode type="text"><![CDATA[
User or task intent
   -> Agent application / Registry / Gateway
   -> structured Policy-ID
   -> IPv6 or SRv6 policy
   -> forwarding path or service chain
]]></sourcecode>
      <t>
        This design keeps semantic interpretation out of the forwarding plane
        and limits network-layer behavior to structured and verifiable policy
        identifiers.
      </t>
    </section>

    <section numbered="true" toc="default">
      <name>Network Telemetry and Audit Support</name>
      <t>
        IPv6 and SRv6 deployments can provide network-layer evidence that
        complements application-layer audit records. Examples include:
      </t>
      <ul>
        <li>source and destination IPv6 locators;</li>
        <li>Agent Gateway traversal records;</li>
        <li>SRv6 policy identifiers;</li>
        <li>service-chain identifiers;</li>
        <li>Trace-ID or Policy-ID correlation fields;</li>
        <li>timestamps and flow-level telemetry;</li>
        <li>policy enforcement events;</li>
        <li>path or domain transition records.</li>
      </ul>
      <t>
        This document does not define a complete audit record format, legal
        compliance framework, or non-repudiation mechanism. Such functions may
        be provided by application-layer audit architectures, logging systems,
        transparency services, or other mechanisms. This document focuses on
        the network-layer evidence that can be correlated with those systems.
      </t>
    </section>

    <section numbered="true" toc="default">
      <name>Deployment Models</name>
      <t>
        The considerations in this document can be applied incrementally. This
        document identifies three non-exclusive deployment models.
      </t>

      <section numbered="true" toc="default">
        <name>Endpoint and Gateway Mode</name>
        <t>
          In this model, agent-related network context is processed only by
          agent endpoints and Agent Gateways. The public Internet or transit
          network forwards ordinary IPv6 traffic and does not process
          agent-specific metadata. This model is suitable when extension header
          processing is not available or when functions are implemented
          primarily at the edge.
        </t>
      </section>

      <section numbered="true" toc="default">
        <name>Controlled-Domain Mode</name>
        <t>
          In this model, agent-related networking functions are deployed within
          an enterprise, campus, data center, cloud, operator network, or
          dedicated interconnection environment. Participating nodes may
          process limited Agent Context according to local policy. This model
          is suitable for environments where administrative control, security
          policy, and extension header behavior can be managed.
        </t>
      </section>

      <section numbered="true" toc="default">
        <name>SRv6-Domain Mode</name>
        <t>
          In this model, SRv6 policies are used to steer traffic through
          specific service functions or network domains. Agent-related context
          may be associated with SRv6 policies, service chains, or domain-local
          telemetry collection. This model is limited to SRv6-capable domains
          and must follow SRv6 operational and security practices.
        </t>
      </section>
    </section>

    <section numbered="true" toc="default">
      <name>Relationship to Existing Work</name>
      <t>
        The considerations in this document are complementary to existing and
        emerging work on agent protocols. Agent discovery mechanisms can
        identify agents, advertise capabilities, and resolve endpoints. A2A and
        MCP focus on application-layer interaction, tool invocation, and
        collaboration. OAuth, OIDC, DID, SD-JWT, WIMSE, RATS, and related
        mechanisms may be used for identity, authorization, attestation,
        selective disclosure, or workload identity. OpenTelemetry and related
        systems may provide application-layer tracing and observability.
      </t>
      <t>
        This document focuses on a different layer: IPv6-based networking
        support for agent communication after discovery. It can provide locator
        binding, network policy selection, Agent Gateway traversal, SRv6
        service chaining, and network-layer telemetry that can be correlated
        with higher-layer identity, authorization, and audit mechanisms.
      </t>
      <t>
        A common limitation of many agent discovery and collaboration
        mechanisms is that they stop at the point where an endpoint, protocol,
        credential, or capability description has been selected. They generally
        do not specify how the selected interaction is bound to an IPv6 locator
        or Agent Gateway, how the traffic is steered through an operator
        controlled path, or how network-layer evidence is correlated with
        application-layer audit records. This document addresses that gap.
      </t>
      <t>
        This document also avoids placing agent semantics in ordinary routers.
        Any interpretation of user intent, task descriptions, or agent
        capabilities is expected to occur in an application, registry,
        controller, or gateway. The network is expected to operate on
        structured identifiers, locators, and policies.
      </t>
    </section>

    <section numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>
        This document raises several security considerations.
      </t>
      <t>
        First, Agent-ID to IPv6 locator or Agent Gateway binding must be
        authenticated. An attacker must not be able to claim an Agent-ID or bind
        it to an unauthorized locator.
      </t>
      <t>
        Second, Agent Gateway authorization must be verifiable. A gateway must
        not represent an agent unless it has been authorized by the responsible
        entity or administrative domain.
      </t>
      <t>
        Third, Agent Context carried in network-visible mechanisms must be
        minimized and integrity-protected where necessary. Sensitive data must
        not be exposed in cleartext network headers.
      </t>
      <t>
        Fourth, replay attacks must be considered. Context fields such as
        Policy-ID, Trace-ID, or Agent-ID references may need validity time,
        nonce, session binding, or cryptographic protection depending on the
        deployment.
      </t>
      <t>
        Fifth, policy identifiers must not be used to bypass access control,
        security inspection, or authorization checks. Network policy selection
        must be integrated with existing security policy enforcement.
      </t>
      <t>
        Sixth, this document does not assume that IPv6 extension headers are
        available across the public Internet. Deployment profiles must define
        where such mechanisms are allowed and what fallback mechanisms are used.
      </t>
      <t>
        Seventh, SRv6 usage must follow SRv6 security considerations. SRv6
        policies and SIDs used for agent communication must be protected
        against unauthorized insertion, modification, or misuse.
      </t>
    </section>

    <section numbered="true" toc="default">
      <name>Privacy Considerations</name>
      <t>
        Agent-related metadata may reveal information about agent identity,
        task class, policy class, organizational relationships, or network path
        choices. Deployments must minimize exposed metadata and avoid carrying
        sensitive user data in network-layer headers or network-visible
        metadata fields.
      </t>
      <t>
        Agent-ID references may be pseudonymous, scoped to a domain, or
        represented by opaque references. Detailed identity information should
        be obtained through authorized query mechanisms, rather than exposed in
        every packet.
      </t>
      <t>
        Network telemetry used for audit support may contain sensitive
        operational information. Access to telemetry records should be
        controlled, retained only as long as necessary, and protected against
        unauthorized disclosure or correlation.
      </t>
    </section>

    <section numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>
        This initial version does not request any IANA action.
      </t>
      <t>
        Future versions may request code points for specific Destination
        Options, SRH TLVs, or other identifiers if concrete encodings are
        standardized. Such requests are out of scope for this considerations
        document.
      </t>
    </section>
  </middle>

  <back>
    <references>
      <name>Normative References</name>
      &RFC2119;
      &RFC8174;
      &RFC8200;
      &RFC8754;
      &RFC8986;
    </references>
    <references>
      <name>Informative References</name>
      <reference anchor="I-D.pioli-agent-discovery" target="https://datatracker.ietf.org/doc/draft-pioli-agent-discovery/">
        <front>
          <title>Agent Registration and Discovery Protocol</title>
          <author fullname="L. Pioli"/>
          <date/>
        </front>
      </reference>
      <reference anchor="Agent2Agent-Archive" target="https://mailarchive.ietf.org/arch/browse/agent2agent/">
        <front>
          <title>IETF Agent2Agent Mailing List Archive</title>
          <author fullname="IETF"/>
          <date/>
        </front>
      </reference>
    </references>
  </back>
</rfc>
