<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.38 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rehfeld-apix-core-02" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="APIX Core">API Index (APIX): Core Infrastructure for Autonomous Agent Service Discovery</title>
    <seriesInfo name="Internet-Draft" value="draft-rehfeld-apix-core-02"/>
    <author initials="C." surname="Rehfeld" fullname="Carsten Rehfeld">
      <organization/>
      <address>
        <email>carsten@botstandards.org</email>
      </address>
    </author>
    <date year="2026" month="May" day="13"/>
    <abstract>
      <?line 115?>

<t>The internet was designed for human actors. Its discovery infrastructure —
search engines, directories, and hyperlinked documents — assumes a human
reading and navigating. Autonomous agents (bots) operating on the internet
today face a structural gap: there is no machine-native, globally accessible
index of services they can consume.</t>
      <t>This document defines the core infrastructure of the <strong>API Index (APIX)</strong>:
a HATEOAS-based, globally accessible, commercially sustainable service
discovery infrastructure designed for autonomous agents as its primary
consumers. It specifies the governance model, the three-dimensional trust
model, the APIX Manifest (APM) base format, commercial onboarding and
sanctions compliance, the supply-side funding model, and the base Index API.
These elements are shared across all APIX service types.</t>
      <t>Profile documents extend this core for specific service categories:
the APIX Services Profile (draft-rehfeld-apix-services-00) defines the
web API and bot service profile; the APIX IoT Device Profile
(draft-rehfeld-apix-iot-00) defines the IoT device profile.</t>
    </abstract>
  </front>
  <middle>
    <?line 136?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="the-bot-ecosystem-gap">
        <name>The Bot Ecosystem Gap</name>
        <t>The internet's foundational infrastructure — HTTP, HTML, DNS, and search
engines — was designed with human actors as the primary consumers. Web pages
render visual layouts for human eyes. CAPTCHA systems explicitly discriminate
against non-human access. Discovery mechanisms such as search engines index
content for human-readable navigation.</t>
        <t>Autonomous agents — software programs that independently execute tasks,
consume APIs, and interact with external services without per-action human
instruction — are not recognized as legitimate, first-class internet
participants in this architecture. They are systematically treated as threats
to be filtered, blocked, or rate-limited.</t>
        <t>This situation is changing. The rapid growth of large language model-based
agents, robotic process automation, and programmatic service consumers means
that non-human actors now represent a significant and growing proportion of
internet traffic. As this proportion increases, internet service providers
will increasingly need to serve autonomous agents as a recognized user class
alongside humans.</t>
        <t>The API Index is premised on this trajectory: bots are becoming
first-class internet participants, and the infrastructure to support them —
starting with service discovery — does not yet exist. Regulators are
converging on the same direction: the EU AI Act (Article 50) requires
transparency and identity disclosure for AI systems that interact with
people, and NIST's Center for AI Standards and Innovation solicited public
input on securing AI agent systems in early 2026. APIX's verifiable trust
model is designed to meet these emerging compliance requirements by
construction.</t>
        <section anchor="motivation-a-concrete-origin">
          <name>Motivation: A Concrete Origin</name>
          <t>The API Index was not conceived in the abstract. It emerged from a
concrete practical failure.</t>
          <t>A buying bot was built for a private use case: monitoring online shops for
a specific product and purchasing it automatically the moment it became
available. This is a straightforward task for an autonomous agent — exactly
the kind of task agents are well-suited for.</t>
          <t>The bot failed, not because the task was technically complex, but because
the internet's infrastructure is actively hostile to it:</t>
          <t><strong>HTML-only product pages.</strong> Product availability, price, and purchase state
were encoded in HTML rendered for a human eye. No machine-readable API
existed. The bot had to parse HTML — fragile, maintenance-intensive, and
broken by every redesign.</t>
          <t><strong>Cloudflare Bot Management and equivalent shields.</strong> The majority of
commercial web services now sit behind bot mitigation infrastructure. Cloudflare
Bot Management, and equivalent products from Akamai, Imperva, and others,
are deployed specifically to detect and block non-human request patterns.
Repeated automated requests — even at modest frequency — trigger rate
limiting, CAPTCHA challenges, or silent blocking. A buying bot that polls
a product page to detect availability is treated identically to a malicious
scraper or a DDoS participant.</t>
          <t><strong>CAPTCHA payment barriers.</strong> Even when product pages were reachable, payment
flows required solving CAPTCHAs that explicitly excluded non-human actors.
The purchasing step — the final, necessary action — was deliberately made
inaccessible to the bot.</t>
          <t><strong>Proxy network pollution.</strong> To work around rate limits and bot detection,
the bot required a rotating proxy network — different IP addresses on each
request to disguise its automated origin. This is not a solution: it
pollutes internet traffic with avoidable requests, raises the cost of
operation, and contributes directly to the adversarial dynamic between
bots and infrastructure operators. Every proxy request is a wasted roundtrip
that a machine-readable API endpoint would have made unnecessary.</t>
          <t><strong>Polling as the only state-change mechanism.</strong> Because the bot had no way
to subscribe to product availability events, it had to poll the product page
continuously. This is architecturally wasteful: the bot consumes server
resources and network bandwidth to repeatedly ask a question whose answer
has not changed.</t>
          <t>These are not edge cases. They are the standard experience for any autonomous
agent attempting to consume a commercial internet service today. The buying
bot illustrates why the API Index is necessary: not as an academic
exercise, but as the infrastructure layer that makes autonomous agents
functional participants in the commercial internet.</t>
        </section>
        <section anchor="the-discovery-problem">
          <name>The Discovery Problem</name>
          <t>When an autonomous agent must fulfill a task that requires an external
service, it faces a fundamental discovery problem: how does it find services
that can fulfill its requirement?</t>
          <t>Current approaches are inadequate:</t>
          <ul spacing="normal">
            <li>
              <t><strong>Hardcoded URLs</strong>: brittle, require human maintenance, do not adapt to
new or changed services.</t>
            </li>
            <li>
              <t><strong>LLM training data</strong>: stale, non-authoritative, not machine-verifiable.</t>
            </li>
            <li>
              <t><strong>Human-curated lists</strong>: do not scale, not machine-navigable, lack
structured metadata.</t>
            </li>
            <li>
              <t><strong>Web search</strong>: returns HTML documents designed for humans, not structured
service descriptions for agents.</t>
            </li>
          </ul>
          <t>What is needed is a machine-native equivalent of a search engine: a global,
always-current, structured index of services that autonomous agents can query
by capability, trust level, liveness, and other machine-relevant criteria.</t>
        </section>
        <section anchor="the-discovery-shift">
          <name>The Discovery Shift</name>
          <t>Every automated system that calls an external service today does so
because a human hardcoded that endpoint. The human is the discovery
layer — the automation executes instructions, it does not find
candidates independently.</t>
          <t>APIX addresses this gap at infrastructure level: a globally queryable
index of services that an agent can search by capability, trust level,
and liveness — without prior human configuration of the specific
endpoint. The agent discovers what exists; the human does not need to
enumerate it in advance.</t>
        </section>
        <section anchor="infrastructure-efficiency-and-the-overhead-of-human-facing-responses">
          <name>Infrastructure Efficiency and the Overhead of Human-Facing Responses</name>
          <t>When an autonomous agent retrieves data from a web service today, it typically
receives a response designed for a human browser: HTML markup, CSS stylesheets,
JavaScript bundles, embedded fonts, advertising payloads, and analytics tracking
instrumentation. The actual information content — an endpoint URL, a price, an
availability flag — may occupy two kilobytes. The page weight delivering that
content is routinely one to three megabytes.</t>
          <t>This is a 500- to 1500-fold payload multiplier that carries no value for a
machine consumer. It consumes bandwidth at the client, compute at the server,
transit capacity on the network, and — at the scale of the growing autonomous
agent population — represents a measurable and unnecessary energy expenditure.</t>
          <t>Machine-native APIs eliminate this overhead entirely. A structured JSON response
delivers exactly the information the agent requested and nothing else. The IETF
Datatracker provides a concrete illustration: the human-facing document page for
an Internet-Draft loads several hundred kilobytes of rendered HTML and supporting
assets; the equivalent information retrieved via the Datatracker REST API returns
in under one kilobyte of JSON. The data is identical. The difference is entirely
overhead serving a human rendering pipeline that a machine does not have.</t>
          <t>APIX addresses both the discovery gap and this efficiency gap together. By
providing infrastructure that indexes machine-native service endpoints, APIX
encourages Service Owners to expose structured, agent-consumable APIs alongside
or in place of human-facing interfaces. The aggregate effect, as autonomous agent
workloads scale, is a reduction in the payload overhead carried by bot traffic
across the internet as a whole. This is an explicit co-mission of APIX:
machine-native infrastructure is not only more functional for agents — it is more
efficient for the internet, and helps reduce humanity's environmental footprint
as much as possible.</t>
        </section>
        <section anchor="lessons-from-prior-art">
          <name>Lessons from Prior Art</name>
          <t>The APIX is not the first attempt at a global service registry. Prior efforts
must be understood explicitly so that their failure modes are not repeated.</t>
          <t><strong>UDDI (Universal Description, Discovery and Integration)</strong>
UDDI was a SOAP-era standard for a global service registry with the same
conceptual goal as APIX, published as an OASIS Committee Draft in October
2004. It failed for three reasons: (1) extreme complexity of the XML-based
data model; (2) no automatic verification — all data was self-asserted with
no crawling or validation; (3) no adoption incentive — there was no
commercial model to sustain registration or discovery. APIX addresses all
three directly: a simple JSON manifest, automated spider verification, and
a commercial tier model.</t>
          <t><strong>robots.txt (Robots Exclusion Protocol)</strong>
Machine-readable, but concerned with exclusion — telling crawlers what not
to access — not with discovery of capabilities. Per-domain only. Not a
registry.</t>
          <t><strong>MCP (Model Context Protocol)</strong>
Defines tool and capability descriptions for LLM-based agents. Excellent
for consumption once a server URL is known. Does not address the discovery
problem: there is no index of MCP servers. APIX is complementary to MCP —
it can index MCP servers as one supported spec type. As of December 2025,
MCP is governed by the Linux Foundation Agentic AI Foundation (<xref target="AAIF"/>),
under a vendor-neutral SEP (Specification Enhancement Proposal) process
that explicitly prevents single-company control — a governance philosophy
that directly aligns with APIX's own neutrality requirements.</t>
          <t><strong>Well-Known URIs (RFC 8615)</strong>
Per-domain machine-readable metadata at <tt>/.well-known/</tt>. Useful for
per-service metadata but requires the consumer to already know the domain.
No cross-service search or global index.</t>
          <t><strong>DNS</strong>
DNS resolves names to addresses but carries no capability semantics. It is
an architectural analogy for APIX's federation model, not a comparable system.</t>
        </section>
        <section anchor="related-ietf-and-w3c-work">
          <name>Related IETF and W3C Work</name>
          <t>As of April 2026, the number of Internet-Drafts working in adjacent areas
of agent/bot infrastructure has grown significantly. None addresses the same
problem as APIX. This section documents each and states the relationship
explicitly.</t>
          <t><strong>draft-pioli-agent-discovery (ARDP)</strong>
Proposes a federated agent registration and discovery protocol. Deliberately
decentralised — no global registry mandate, no central query URL. Relationship
to APIX: complementary. ARDP addresses agent-to-agent capability advertisement
within a federation. APIX addresses global, cross-organisation service
discovery from a neutral central index. ARDP's JWS-based signing of
registration payloads provides cryptographic non-repudiation of the manifest
content — a property APIX currently achieves through layered governance
verification (DNS ownership proof at O-1, Spider crawl, KYC pipeline). APM
manifest-level signing is a candidate extension for a future APIX revision,
and ARDP's signing model is the reference design for that work.</t>
          <t><strong>draft-narajala-courtney-ansv2 (ANS v2)</strong>
Anchors autonomous agent identities to DNS domain names with Registration
Authority verification. Focused on agent identity and trust anchoring, not
service capability discovery. ANS v2 builds on a peer-reviewed predecessor
published at IEEE ICAIC 2026, simplifying the name format to three components
(ans://v{version}.{agentHost}), introducing a dual-certificate model, and
replacing conceptual registry integrity with a cryptographic Transparency Log.
ANS v2 explicitly identifies the limitation of DNS-SD (<xref target="RFC6763"/>): DNS-SD
adds service discovery but cannot tell a client whether the agent at an
address is the one it claims to be. ANS v2 fills that identity gap.
Relationship to APIX: complementary. DNS-SD locates a service; ANS v2
verifies the identity of the agent at that address; APIX provides capability
search and multi-dimensional trust metadata across organisations. ANS v2
could serve as the identity layer for service operators registered in APIX.</t>
          <t><strong>draft-vandemeent-ains-discovery (AINS)</strong>
Agent discovery via signed, append-only replication logs. No central
authority. No commercial sustainability model. Relationship to APIX:
different philosophy. AINS prioritises decentralisation and cryptographic
verifiability. APIX prioritises a single authoritative global index with
a governed trust model.</t>
          <t>AINS defines a multi-channel verification model in which each verified
channel produces an independent evidence object. The principle is sound:
independent signals from multiple channels produce stronger identity
assurance than any single channel alone. AINS names DNS, HTTPS, and email
as verification channels — all of which are compatible with APIX's own
trust evidence model (DNS TXT record at O-1, HTTPS-reachable manifest
verified by the APIX Spider). AINS additionally names source code
repositories (e.g., GitHub) as a verification channel. APIX does not
adopt repository access as an evidence channel. For open-source projects
and developer platforms this channel is accessible and useful; however,
the majority of enterprise API services — financial institutions,
healthcare providers, manufacturers, and proprietary IoT backends —
maintain private repositories as protected intellectual property, often
under regulatory or contractual obligations that prohibit external access.
APIX's governance-based evidence channels (DNS, legal entity registration,
commercial contract, third-party audit) apply universally regardless of
whether a registrant's codebase is open-source or proprietary, and this
universality is a deliberate scope decision.</t>
          <t><strong>draft-aiendpoint-ai-discovery (AI Discovery Endpoint)</strong>
Defines <tt>/.well-known/ai</tt> as a per-host machine-readable capability document.
Per-domain only; not a global index. Relationship to APIX: directly
complementary. The APIX Spider SHOULD read <tt>/.well-known/ai</tt> when present
on a registered service's domain as an additional source of capability
metadata.</t>
          <t>This draft defines a flat category taxonomy for service classification:
"productivity", "ecommerce", "finance", "news", "weather", "maps",
"search", "data", "communication", "calendar", "storage", "media",
"health", "education", "travel", "food", "government", "developer".
The convergence with APIX's capability taxonomy is notable: <tt>search</tt>,
<tt>communication</tt>, <tt>storage</tt>, and <tt>media</tt> appear in both; <tt>ecommerce</tt> and
<tt>finance</tt> correspond directly to APIX's <tt>commerce</tt> and <tt>data.financial</tt>
terms. The two taxonomies differ in architecture — AI Discovery Endpoint
uses flat single-word labels optimised for human-readable classification;
APIX uses hierarchical dot-separated terms (<tt>commerce.marketplace</tt>,
<tt>data.financial</tt>) optimised for machine-queryable precision — but the
independent convergence on the same fundamental service categories
validates both approaches. Categories present in AI Discovery Endpoint
but not yet in APIX's v1.0 starter set (<tt>health</tt>, <tt>education</tt>,
<tt>government</tt>, <tt>travel</tt>, <tt>food</tt>, <tt>news</tt>, <tt>weather</tt>, <tt>maps</tt>, <tt>developer</tt>)
are candidates for future additions through the governing body's capability taxonomy
governance process (<xref target="APIX-SERVICES"/>).</t>
          <t><strong>draft-batum-aidre (AIDRE)</strong>
Defines <tt>/.well-known/ai-discovery</tt> as a per-origin discovery document.
Decentralised by design. Relationship to APIX: complementary. APIX provides
the global aggregation and trust verification layer that per-origin endpoints
cannot provide alone.</t>
          <t><strong>draft-cui-ai-agent-discovery-invocation</strong>
Specifies a metadata format for agent capabilities and a registry-based
discovery mechanism. Explicitly permits multiple coexisting registries; no
global authority defined.</t>
          <t>This draft introduces a notable split between two metadata fields:
<tt>capabilities</tt> (high-level descriptors of what the service does, e.g.,
<tt>["translation", "summarization"]</tt>) and <tt>tags</tt> (broader, orthogonal
properties such as domain, language support, or deployment model, e.g.,
<tt>["nlp", "chinese", "transformer_model", "cloud"]</tt>). The split recognises
that some service properties are functional capabilities while others are
orthogonal classifiers that do not fit a strict capability hierarchy.</t>
          <t>APIX takes a different approach. The hierarchical dot-separated capability
taxonomy (<tt>nlp.translation</tt>, <tt>commerce.marketplace</tt>) encodes both the
category and the specific capability in a single governed term, enabling
prefix-based machine queries (<tt>nlp.*</tt>) and registry-controlled vocabulary.
Orthogonal dimensions that draft-cui expresses as free-form tags are
handled in APIX through dedicated typed fields: <tt>language</tt> (BCP 47,
<xref target="RFC5646"/>) covers language support; deployment model is not yet represented
and is noted as a potential future gap. The APIX design trades the
flexibility of a free-form tag bag for machine-queryability and governance
— a tag field without a registry becomes a folksonomy that degrades search
precision at scale. An empirical basis for preferring intent-aligned
capability descriptors over opaque operation labels is provided by the
controlled benchmark study in <xref target="I-D.hood-agtp-api"/>, which demonstrates
that intent-aligned names produce materially higher endpoint selection
accuracy in frontier-class language models, with the accuracy gain
attributable to the name itself independent of additional documentation.</t>
          <t>This draft also identifies pricing information as a legitimate service
metadata concern — noting that if a service charges per use, agents need
this information at discovery time. The draft does not standardise a
pricing schema ("not standardized here but can be included as needed").
APIX adopts this observation and formalises it: the <tt>pricing</tt> field in
the APM schema (<xref target="APIX-SERVICES"/>) defines a governed <tt>model</tt> enum
(<tt>free</tt>, <tt>freemium</tt>, <tt>paid</tt>, <tt>enterprise</tt>, <tt>dynamic</tt>) and a
<tt>pricing_endpoint</tt> for real-time load-based price queries. The index
stores only the declared <tt>model</tt> and the endpoint reference; consuming
agents are responsible for querying the <tt>pricing_endpoint</tt> directly to
obtain and evaluate the current price before invocation.</t>
          <t>This draft also defines a Semantic Routing Platform (SRP): an optional
control-plane service that performs semantic matching, ranking, and
policy-based filtering of candidate agents before invocation, without
participating in task execution. The SRP pattern assumes a structured
candidate pool as its input. APIX is the natural data source for that
pool: an SRP would query APIX with structured filters to retrieve a
trusted, governed candidate set, then apply semantic ranking over that
set before presenting the shortlist to the invoking agent. The two
layers are complementary — APIX provides structured discovery and trust
metadata; the SRP provides semantic selection above that foundation.</t>
          <t>Relationship to APIX: partially overlapping problem space. The capability/tag
split, the pricing observation, and the SRP pattern are all concrete design
contributions; APIX's governed taxonomy, typed fields, and formalised pricing
schema address the same concerns through a more structured mechanism, and the
SRP architecture positions APIX as the structured input layer to semantic
selection rather than as a competitor to it.</t>
          <t><strong>draft-am-layered-ai-discovery-architecture</strong>
Proposes a conceptual two-layer architecture separating a Discovery
Transport Layer (DTL) from the metadata format carried over it. The DTL
is explicitly abstract: the draft names HTTP, pub/sub, multicast, and
MoQ as candidate substrates without specifying any of them normatively.
No wire format, no concrete protocol mechanisms, and no IANA actions are
defined.</t>
          <t>APIX resolves the transport question concretely and normatively: HTTPS
with TLS (<xref target="RFC8446"/>), JSON (<xref target="RFC8259"/>), and HATEOAS navigation over
a single stable entry point. This is a deliberate design position in
favour of implementability over substrate generality. Adding a DTL
abstraction layer atop APIX's concrete HTTP interface would introduce
indirection without communicative or interoperability benefit — the
transport is already specified, and no agent implementation benefits
from treating it as one option among many.</t>
          <t>Directly relevant to APIX is the draft's categorisation of discoverable
object types (agents, models, data resources, robots), which recognises
that different object categories require different metadata profiles.
This independently converges on the same architectural reasoning behind
APIX's decision to separate the Services Profile (<xref target="APIX-SERVICES"/>)
from the IoT Device Profile (<xref target="APIX-IOT"/>) rather than collapsing all
service types into a single flat schema.</t>
          <t>Relationship to APIX: categorisation framing is consistent with the
APIX profile split; the abstract DTL layer is not adopted.</t>
          <t><strong>AGTP Protocol Family</strong></t>
          <t>The Agent Transfer Protocol (AGTP) defines a dedicated agent-native protocol
substrate, distinct from HTTP, with an IANA-registered URI scheme (<tt>agtp://</tt>)
and port 4480, media types in expert review, and live reference servers at
agtp://agents.agtp.io. The AGTP family currently comprises four drafts.</t>
          <t><xref target="I-D.hood-independent-agtp"/> is the core transport substrate. The defining
architectural commitment of the family is that agent-native APIs operate on
AGTP rather than HTTP.</t>
          <t><tt>draft-hood-agtp-discovery-00</tt> defines an Agent Name Service (ANS) — a governed
registry that resolves capability queries into ranked lists of Agent Manifest
Documents for authenticated agents. ANS servers act as Scope-Enforcement Points,
applying trust score thresholds, trust tier requirements, and governance zone
constraints. Cross-organisational discovery is supported through peer ANS server
federation.</t>
          <t><tt>draft-hood-agtp-api-00</tt> defines the Agentic API contract layer: a curated method
catalog of intent-aligned verbs (QUERY, EXECUTE, PROPOSE, DISCOVER, and eight
additional methods), endpoint primitives carrying semantic contracts, path grammar
rules, and schema validation. The draft introduces a runtime contract negotiation
mechanism via the PROPOSE method: a consuming agent may propose an endpoint that
does not exist, and the serving system synthesises it from its existing capabilities
at session scope. The intent-aligned method vocabulary is grounded in a controlled
empirical benchmark across four frontier-class model families showing that
intent-aligned verbs produce materially higher endpoint selection accuracy than
CRUD verbs, with description-swap ablations confirming that the accuracy gain is
attributable to the method name itself independent of documentation quality.</t>
          <t><xref target="I-D.hood-agtp-trust"/> defines a three-tier verification model with three
independent Tier 1 verification paths (DNS-anchored per RFC 8555, log-anchored
per RFC 9162, and SCITT per RFC 9943), hybrid trust composition, and a normative
0.0-1.0 continuous trust score with freshness semantics that are
operation-class-dependent.</t>
          <t>Relationship to APIX: overlapping problem space, fundamentally different
architectural commitment. The AGTP family's defining premise is that agent-native
services should operate on a dedicated off-HTTP protocol substrate. APIX's
defining premise is that the discovery layer should operate over existing HTTP
infrastructure with zero adoption friction: any service already reachable over
HTTP registers in APIX without changing its underlying protocol. These are not
competing answers to the same deployment question; they address different
positions in the adoption spectrum. AGTP targets greenfield services designed for
agent-native operation from scratch; APIX targets the full landscape including
existing HTTP/REST APIs, MCP-served models, IoT backends, and enterprise systems
that will not migrate off HTTP for operational, legal, or contractual reasons.</t>
          <t>Three specific alignments are worth noting. First, the AGTP trust tier evidence
paths (DNS per RFC 8555, transparency log per RFC 9162, SCITT per RFC 9943) are
structurally analogous to APIX's O-level evidence channels (DNS TXT record at
O-1, GLEIF LEI database at O-2, independent audit at O-5); a shared trust
evidence vocabulary between the two specifications would benefit consuming agents
that interact with both. Second, the AGTP PROPOSE method — server-side synthesis
of non-existent endpoints from existing capabilities at session scope — has no
current analogue in APIX and is identified as a candidate area for future dynamic
capability negotiation. Third, the empirical finding on intent-aligned method
names in draft-hood-agtp-api-00 provides an independent quantitative basis for
APIX's capability taxonomy design: APIX capability terms (<tt>nlp.translation</tt>,
<tt>commerce.marketplace</tt>) are intent-aligned descriptors rather than CRUD-style
operation labels, and the benchmark result supports that design choice.</t>
          <t><strong>draft-mozley-aidiscovery (AI Agent Discovery Problem Statement)</strong>
Argues for a distributed, organisation-centric discovery model in which
each organisation independently publishes agent capabilities at a
well-known entry point. The draft explicitly opposes centralised
registries on two grounds: single points of failure limiting resilience,
and the competitive harm risk — stated directly as: "An adversarial
centralized directory is also able to stifle competitor advertisement
capabilities." The scope is cross-organisational; the draft addresses
public, multi-domain agent discovery, not only local or intra-organisation
scenarios.</t>
          <t>Relationship to APIX: this draft articulates the strongest
counter-position to APIX's architecture, and the adversarial directory
argument deserves a direct response. APIX addresses it structurally:
the neutrality requirements (Section 4.2), the prohibition on ranking
preferences and preferential treatment, the independent governance of
the standard from the commercial operation, and the mandatory open bulk
data download are specifically designed to make the adversarial scenario
impossible by construction. A directory operated under these constraints
cannot stifle competitor advertisement because it cannot discriminate
between registrants at the same commercial tier.</t>
          <t>The distributed model's remaining gap, which APIX addresses, is the
zero-prior-knowledge case: an agent that has no prior relationship with
any service provider needs a single starting point from which to
discover unknown third parties. An organisation-centric model requires
the discovering agent to already know which organisations to query —
which presupposes the discovery problem is already solved.</t>
          <t><strong>draft-mozleywilliams-dnsop-dnsaid (DNS for AI Discovery)</strong>
Proposes DNS-AID: using SVCB records to publish agent service endpoints.
Relationship to APIX: complementary at the infrastructure layer. The
distinction across the three systems is precise: DNS-AID tells a client
where to connect; ANS v2 (<xref target="I-D.narajala-courtney-ansv2"/>) tells it whether
to trust the agent at that address; APIX tells it what to connect to and why
— capability search, multi-dimensional trust metadata, and liveness
verification across the global service landscape.</t>
          <t><strong>draft-meunier-webbotauth-registry (webbotauth)</strong>
Defines a JSON-based "Signature Agent Card" format for bot authentication.
Focused on bot identity — how a bot proves who it is to a service. Related
to the active webbotauth IETF Working Group. Relationship to APIX: orthogonal
but complementary. webbotauth addresses bot consumer identity; APIX addresses
service provider discovery.</t>
          <t><strong>I-D.ietf-scitt-architecture (SCITT)</strong>
Defines an append-only transparency service for supply chain integrity,
transparency, and trust. An IETF WG specification
(<xref target="I-D.ietf-scitt-architecture"/>). SCITT provides a
tamper-evident, auditable ledger model where statements about artefacts are
registered and independently verifiable. Relationship to APIX: architectural
reference. APIX's audit trail for organisation trust level progressions, LER
submissions (<xref target="APIX-IOT"/>), and sanctions screening events follows the same
append-only, non-repudiable model that SCITT formalises. ANS v2
(<xref target="I-D.narajala-courtney-ansv2"/>) bases its Transparency Log on SCITT. A
future revision of APIX MAY adopt SCITT-compliant transparency log semantics
for its governance audit trail.</t>
          <t><strong>Google Cloud Fraud Defense</strong>
A commercial trust platform for the agentic web announced at Google Cloud
Next '26 (April 2026), positioned as the next evolution of reCAPTCHA. Fraud
Defense explicitly integrates with the webbotauth IETF Working Group and
SPIFFE for agent and workload identity classification. Relationship to APIX:
complementary at adjacent layers. Fraud Defense operates at the consumption
layer — it verifies and classifies agent traffic arriving at a service
endpoint. APIX operates at the discovery layer — it provides the service
index, trust metadata, and capability taxonomy that agents use to locate
services before interacting with them. The two systems are not competitive;
a Fraud Defense policy engine can consume APIX trust signals (O-level,
S-level) as inputs to its risk scoring.</t>
          <t><strong>SPIFFE (Secure Production Identity Framework For Everyone)</strong>
A CNCF open standard for workload identity attestation. Provides
cryptographically verifiable identities (SVIDs) to software workloads in
dynamic infrastructure. Referenced as an integration target by Google Cloud
Fraud Defense alongside webbotauth. Relationship to APIX: complementary at
the identity layer. SPIFFE addresses machine/workload identity; APIX
addresses service and device discovery with human-governed trust levels. A
SPIFFE SVID could serve as a technical credential for an agent whose
operator is registered in APIX at O-2 or above.</t>
          <t><strong>W3C AI Agent Protocol Community Group</strong>
Proposed May 2025, targeting agent interoperability protocols. Pre-specification
as of this writing. Relationship to APIX: APIX will monitor this group's
outputs and align the APM capability taxonomy with any vocabulary standardised
by the W3C CG where applicable.</t>
          <t><strong>Agent2Agent Protocol (A2A)</strong>
Defines a secure communication protocol for agent-to-agent interaction
across frameworks <xref target="A2A"/>. Originated at Google (April 2025), transferred to the
Linux Foundation Agentic AI Foundation (<xref target="AAIF"/>) in June 2025; as of early
2026 it has 150+ supporting organisations and is in production use.
Relationship to APIX: directly complementary. A2A addresses how agents
communicate once they have located each other. APIX addresses how agents
locate each other in the first place. An agent that uses APIX for
discovery and A2A for subsequent communication is using both systems for
their intended purpose with no overlap.</t>
          <t><strong>AGNTCY (Open Agent Schema Framework)</strong>
A multi-component open infrastructure project for multi-agent systems <xref target="AGNTCY"/>,
originating at Cisco and transferred to the Linux Foundation (<xref target="AAIF"/>) in
July 2025. As of early 2026 it has 65+ supporting organisations and is
in production use for CI/CD, IT automation, and telecommunications.
AGNTCY comprises four components: the Open Agent Schema Framework (OASF)
for capability discovery, cryptographic identity, SLIM messaging, and
end-to-end observability. AGNTCY is governed under the Linux Foundation
AAIF mandate of no single-company control.</t>
          <t>Relationship to APIX: the governance philosophies are aligned; the
architectural scope is different. OASF defines a capability schema
format — analogous to OpenAPI for agent capabilities — for registering
and advertising what an agent can do. APIX is a globally queryable index
infrastructure: a single authoritative entry point where agents discover
unknown third-party services by capability, with commercial sustainability,
verified trust metadata, and structured search. OASF and APIX are
complementary: OASF provides the schema language; APIX provides the
global index that can be populated with OASF-described services. An
AGNTCY-registered agent is a candidate APIX registrant. The principal
architectural difference is scope: AGNTCY is optimised for
intra-platform and intra-organisation agent coordination; APIX is
designed for cross-organisation, cross-border, zero-prior-knowledge
discovery of agent-consumable services and IoT device classes. The two systems address different
points in the discovery spectrum and are not substitutes for each other.</t>
          <t><strong>draft-drake-agent-identity-registry (Agent Identity Registry)</strong>
Defines a federated registry architecture for persistent, hardware-anchored
agent identities. Introduces a three-tier model: Agent Identity Authority
(AIA) as a governance body, Registry Operators as authoritative identity
databases, and Registrars for hardware attestation and OIDC token
issuance. The AIA is explicitly required to be constituted as a
multi-stakeholder body — the draft states directly that "single-entity
control would undermine the federated design" (<xref target="I-D.drake-agent-identity-registry"/>).</t>
          <t>Relationship to APIX: this draft provides the strongest independent
validation of APIX's core governance premise. Two separate specifications,
developed independently, arrive at the same structural requirement: that
foundational agent infrastructure must be governed by a multi-stakeholder
body, not controlled by a single entity. The functional domains are
complementary rather than overlapping — draft-drake addresses agent
identity (who is this agent, which hardware backs its credential); APIX
addresses service discovery (what services exist, what can they do, are
they trustworthy). An agent whose identity is established under
draft-drake's AIA model is a well-suited candidate to consume and
register services in APIX.</t>
          <t><strong>Linux Foundation Agentic AI Foundation (AAIF)</strong>
Formed December 2025 with founding contributions from Anthropic (MCP),
OpenAI (AGENTS.md), and Block (goose); additional members include AWS,
Bloomberg, Cloudflare, Google, Cisco, Dell, Oracle, and Red Hat. The
AAIF's explicit founding mandate is to ensure "no single company controls
the direction of foundational infrastructure" (<xref target="AAIF"/>), implemented
through a vendor-neutral directed fund structure and per-project
Specification Enhancement Proposal (SEP) processes modelled on Kubernetes's
KEP governance.</t>
          <t>Relationship to APIX: the AAIF's governance mandate independently
validates APIX's constitutional neutrality requirements. APIX predates
the AAIF as an IETF submission and implements the same principle — no
single commercial interest may control the standard or its operation —
through a different structural mechanism: a Swiss Stiftung with a
supply-side commercial model that funds operations without creating
discovery-layer incentives to favour any registrant. The AAIF governs
communication and invocation protocols (MCP, A2A); APIX governs the
discovery index. These are adjacent, non-overlapping layers of the same
infrastructure stack.</t>
          <t><strong>Positioning</strong>
The agent infrastructure space has consolidated significantly in 2025-2026.
At the protocol layer, the Linux Foundation AAIF has emerged as the
primary governance body for communication and invocation standards (MCP,
A2A), with 150+ supporting organisations and active production deployment.
At the IETF, over a dozen individual drafts address agent discovery and
identity from different architectural starting points; none has reached
Working Group consensus.</t>
          <t>APIX occupies a distinct position in this landscape: it is the only
specification in the IETF space that makes governance the primary
architectural requirement, and the only proposal for a globally
queryable, commercially sustainable, neutral discovery index. The dominant
IETF tendency toward decentralisation addresses legitimate concerns about
single points of control; APIX answers those concerns structurally, through
its neutrality mandates, open bulk data requirements, and separation of
standard governance from commercial operation — rather than by abandoning
the global index model that those concerns are directed at.</t>
          <t>APIX is designed to compose with, not replace, the adjacent standards:
APIX provides the discovery layer that MCP, A2A, and AGNTCY do not
provide; draft-drake provides the identity layer that APIX delegates to
external identity infrastructure; the webbotauth Working Group provides
the bot authentication layer that APIX references as a trust signal.
Each standard goes deep in its own sub-problem; APIX depends on that
depth rather than duplicating it.</t>
          <t>The AGTP protocol family represents a distinct architectural trajectory:
a dedicated agent-native transport substrate (<tt>agtp://</tt>) that replaces
HTTP rather than extending it. APIX and AGTP are not substitutes and
the distinction is one of adoption scope, not superiority. AGTP is the
invocation substrate for greenfield services designed from scratch;
APIX is the discovery index for the full existing service landscape,
including the large majority of deployable services that will not
migrate off HTTP in any planning horizon relevant to agent infrastructure
standardisation.</t>
        </section>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <xref target="RFC2119"/>.</t>
        <t>All API responses MUST be encoded as UTF-8 as mandated by <xref target="RFC8259"/>
Section 8.1. All string fields in APM documents and Index API responses
MUST contain valid UTF-8. HTTP status codes used throughout this
specification are defined in <xref target="RFC9110"/>.</t>
        <t><strong>Agent</strong>
An autonomous software program that executes complex, goal-directed
tasks by consuming external services, without per-action human
instruction. Agents may use LLM-backed or programmatic orchestration
logic. The primary consumer class targeted by the APIX Index API.</t>
        <t><strong>Bot</strong>
An autonomous software program that executes deterministic, rule-based
internet tasks: web crawling, API polling, automated messaging, without
per-action human instruction. Behavior is scripted rather than
goal-directed. The APIX Spider is itself a bot.</t>
        <t><strong>Connected Device</strong>
A physical or embedded hardware unit with network connectivity that
exposes services or sensor data via the APIX Presence Protocol.
Registered as a Device Class and tracked as a Device Instance as
defined in <xref target="APIX-IOT"/>. Distinct from Agent and Bot in that the
principal is hardware, not software.</t>
        <t><strong>Service</strong>
A machine-consumable API or connected device class offered by an organisation,
registered in the APIX, and described by an APIX Manifest. The term covers
both web API services (<xref target="APIX-SERVICES"/>) and IoT device services (<xref target="APIX-IOT"/>).</t>
        <t><strong>Service Owner</strong>
The organisation responsible for registering, maintaining, and operating a
Service in the APIX.</t>
        <t><strong>APIX Manifest (APM)</strong>
The structured metadata document that describes a Service to the APIX,
including its technical specification reference, capability taxonomy,
trust metadata, and commercial terms. Profile documents define the
additional fields applicable to each service type.</t>
        <t><strong>Governing Body</strong>
The neutral, non-profit entity that operates the APIX, maintains its
registries, accredits Regional Representatives and Verifiers, and ensures
the governance and operational requirements defined in this specification
are met. Any entity that satisfies those requirements MAY fulfil this role.</t>
        <t><strong>API Index (APIX)</strong>
The global, centralised index of registered Services, operated by the
governing body and queryable by autonomous agents via the Index API.</t>
        <t><strong>Index API</strong>
The HATEOAS-compliant HTTP API exposed by the APIX for agent discovery and
navigation.</t>
        <t><strong>Accredited Verifier</strong>
A trusted third-party organisation, accredited by the governing body,
that performs human-intensive trust verification at Organisation levels O-4
and O-5.</t>
        <t><strong>Accredited Regional Representative</strong>
An organisation accredited by the governing body to operate
commercial onboarding, contracting, and customer relationships within a
defined geographic jurisdiction, under the governing body's
standard and governance.</t>
        <t><strong>Trust Policy</strong>
A set of minimum trust requirements expressed by a consuming agent that a
Service must satisfy before the agent will use it.</t>
        <t><strong>Liveness</strong>
The confirmed operational status and response availability of a Service,
as measured by automated means at a frequency determined by the Service's
commercial tier. The specific liveness mechanism differs by service type:
Spider health checks for web API services; presence signals for IoT device
services.</t>
        <t><strong>Tier</strong>
A commercial subscription level that determines a Service's visibility in
the APIX, liveness check frequency, and API query rate allocation.</t>
      </section>
      <section anchor="design-goals">
        <name>Design Goals</name>
        <section anchor="requirements-must">
          <name>Requirements (MUST)</name>
          <ul spacing="normal">
            <li>
              <t>The APIX MUST be queryable by autonomous agents via a stable, globally
accessible URL without prior knowledge of any specific service.</t>
            </li>
            <li>
              <t>The Index API MUST follow HATEOAS principles: agents MUST be able to
navigate the full index starting from a single entry-point URL.</t>
            </li>
            <li>
              <t>Every Service record MUST expose machine-readable trust metadata across
all three trust dimensions (Organisation, Service, Liveness).</t>
            </li>
            <li>
              <t>Service registration MUST be human-initiated. The registrant MUST agree to
the index operator's Terms of Service before any service record is activated.
For O-0 and O-1, self-service portal registration with accepted Terms of
Service satisfies this requirement. For O-2 and above, registration MUST
additionally involve a formal B2B contractual relationship between the Service
Owner and the index operator or its Accredited Regional Representative.</t>
            </li>
            <li>
              <t>The APIX MUST expose trust metadata as verifiable facts, not as
recommendations. Trust decisions MUST remain with the consuming agent.</t>
            </li>
            <li>
              <t>The APIX Manifest (APM) MUST be format-agnostic: it MUST support
referencing multiple service types via an extensible type registry.</t>
            </li>
            <li>
              <t>The APIX MUST be operated as a neutral, non-profit infrastructure under
the governance of the governing body.</t>
            </li>
          </ul>
        </section>
        <section anchor="goals-should">
          <name>Goals (SHOULD)</name>
          <ul spacing="normal">
            <li>
              <t>The Index API SHOULD support full-text and structured search by capability,
category, organisation trust level, service verification level, liveness
freshness, and protocol type.</t>
            </li>
            <li>
              <t>The APIX SHOULD provide SDKs in common agent development languages to
lower the integration barrier for consuming agents.</t>
            </li>
            <li>
              <t>The APIX SHOULD support a federated accredited verifier model so that
Organisation trust levels O-4 and O-5 can be verified at scale without
centralising all human review in the governing body.</t>
            </li>
            <li>
              <t>Accredited Regional Representatives SHOULD be established in major
jurisdictions to allow Service Owners to contract in their local language
and legal framework.</t>
            </li>
            <li>
              <t>The APIX SHOULD publish a public transparency report at least annually,
disclosing the number of registered services by tier and trust level,
coverage statistics, and verifier accreditation status.</t>
            </li>
            <li>
              <t>The APIX SHOULD, through its verification model and tier structure,
incentivise Service Owners to expose structured, machine-consumable API
endpoints rather than requiring agents to adapt to human-facing HTML
interfaces. Eliminating rendering, styling, and advertising overhead from
machine-to-machine communication is an explicit efficiency objective of
this infrastructure.</t>
            </li>
          </ul>
        </section>
        <section anchor="out-of-scope">
          <name>Out of Scope</name>
          <t>The following are explicitly not addressed by this document.
Items marked MUST NOT are normative constraints on conforming
implementations; remaining items are editorial scope boundaries.</t>
          <ul spacing="normal">
            <li>
              <t><strong>Bot identity and authentication</strong>: how a bot proves its own identity to
a service it consumes. This is addressed by complementary work such as
draft-meunier-webbotauth-registry. This document takes no position on
bot identity mechanisms.</t>
            </li>
            <li>
              <t><strong>Bot rights and legal personhood</strong>: outside the scope of a technical
infrastructure standard.</t>
            </li>
            <li>
              <t><strong>Service execution</strong>: a conforming APIX implementation MUST NOT proxy,
mediate, or execute service calls on behalf of consuming agents. The APIX
is a discovery layer only; all service interactions occur directly between
the consuming agent and the Service Owner's infrastructure.</t>
            </li>
            <li>
              <t><strong>Content indexing</strong>: a conforming APIX implementation MUST NOT index
service response content. The APIX indexes service metadata — capability
declarations, trust levels, liveness signals — not the data that services
return when called.</t>
            </li>
            <li>
              <t><strong>Mandatory consumer registration</strong>: a conforming APIX implementation
MUST NOT require consuming agents to register or identify themselves as
a condition of performing discovery queries (see Section 9.2).</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="architecture-overview">
        <name>Architecture Overview</name>
        <section anchor="component-model">
          <name>Component Model</name>
          <artwork><![CDATA[
  +----------------------------------------------------------+
  |                   the governing body                     |
  |             (Swiss Stiftung -- neutral, non-profit)      |
  |  Owns: APIX standard, Index infrastructure, APM format   |
  |  Accredits: Regional Representatives, Verifiers          |
  +---------------------+------------------------------------+
                        |
        +---------------+-------------------+
        |               |                   |
  +-----+------+  +-----+--------+  +-------+---------+
  |   Index    |  | Verification |  |  Registration   |
  |   API      |  | Component    |  |    Portal       |
  | (HATEOAS)  |  |(type-specific|  |  (B2B / human)  |
  +-----+------+  +-----+--------+  +-------+---------+
        |               |                   |
        |         +-----+------+            |
        |         |  Service   |            |
        +-------->|  Record    |<-----------+
                  |  Store     |
                  +------------+
        ^                              ^
        |                              |
  +-----+------+              +--------+-----------+
  |  Consuming |              |   Service Owner    |
  |    Agent   |              |  (+ Accredited     |
  |    (Bot)   |              |  Regional Rep)     |
  +------------+              +--------------------+
]]></artwork>
          <t>This document uses the generic terms "governing body" and "index
operator" in all normative requirements. These terms are intentionally
role-based: any entity that satisfies the governance, neutrality, and
operational requirements defined in this specification MAY fulfil them.
The reference implementation of these roles is described in the
non-normative appendix "Reference Implementation" at the end of this
document.</t>
          <t><strong>Flow:</strong></t>
          <ol spacing="normal" type="1"><li>
              <t>A Service Owner (or their Accredited Regional Representative) creates
an Organisation Account in the APIX Registration Portal, providing
company details and agreeing to a commercial contract.</t>
            </li>
            <li>
              <t>The Registration Portal creates a draft Service Record and triggers
profile-appropriate verification (Spider crawl for web API services;
manufacturer provisioning for IoT device classes).</t>
            </li>
            <li>
              <t>The verification component updates the Service Record with verified
technical metadata.</t>
            </li>
            <li>
              <t>The Service Record becomes queryable via the Index API.</t>
            </li>
            <li>
              <t>A consuming agent queries the Index API from the single entry-point URL,
navigates by HATEOAS links, applies its Trust Policy, and selects
services that satisfy its requirements.</t>
            </li>
            <li>
              <t>Verification rechecks services on the schedule defined by each service's
liveness monitoring configuration.</t>
            </li>
          </ol>
        </section>
        <section anchor="governance-model">
          <name>Governance Model</name>
          <t>The APIX MUST be operated by a <strong>neutral governing body</strong> that satisfies the
following normative requirements. These requirements apply to any conforming
APIX implementation; the specific legal form of the governing body is an
implementation choice.</t>
          <t><strong>Neutrality requirements:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The governing body MUST have no commercial interest in preferring any
registrant's services over another in index results or liveness scheduling.</t>
            </li>
            <li>
              <t>The governing body MUST NOT offer exclusive discovery advantages, ranking
preferences, or prioritised verification treatment to any registrant
regardless of commercial relationship.</t>
            </li>
            <li>
              <t>Governance of the APIX standard and APM specification MUST be separated
from operation of the commercial index. A single entity may not
simultaneously control standard evolution and derive commercial benefit
from preferential application of that standard.</t>
            </li>
          </ul>
          <t><strong>Operational requirements:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The governing body MUST accredit Regional Representatives who may handle
service onboarding in specific jurisdictions. Regional Representatives
operate under licence from the governing body; the index itself remains
a single global store.</t>
            </li>
            <li>
              <t>The governing body MUST accredit Verifiers who perform Organisation trust
assessments at O-4 and O-5. Accredited Verifiers are structurally
analogous to Certificate Authorities in the TLS ecosystem.</t>
            </li>
            <li>
              <t>The governing body MUST maintain the capability taxonomy and publish all
versions of the APM specification and Index API specification as open
standards under a permissive licence.</t>
            </li>
            <li>
              <t>The governing body MUST perform sanctions screening on service registrants
(see Section 8).</t>
            </li>
          </ul>
          <t><strong>Openness requirements:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The full index MUST be made available as a freely downloadable bulk dataset
on the first day of each calendar month, under the Open Database Licence
(ODbL) 1.0. No entity, including the governing body, may hold an exclusive
lock on the index data.</t>
            </li>
            <li>
              <t>Incremental diff files MUST be published daily, each covering all record
additions, updates, and deletions since the previous day's snapshot. A
downstream consumer MUST be able to reach current index state by applying
the monthly full snapshot and the sequence of daily diffs since that
snapshot, without downloading any additional full snapshots.</t>
            </li>
            <li>
              <t>Discovery queries to the Index API MUST be available without authentication
or payment (subject to rate limits; see Section 9.2).</t>
            </li>
          </ul>
          <section anchor="global-participation">
            <name>Global Participation</name>
            <t>A conforming APIX implementation SHOULD establish mechanisms to ensure
global representation in the capability taxonomy, including service categories
relevant to underrepresented regions. Where regional institutional partners
are willing to co-sponsor regional participation, the governing body SHOULD
establish formal co-sponsorship relationships and associated governance
representation for those regions.</t>
            <t>Regional verification nodes are RECOMMENDED in regions with significant
service registrant populations to eliminate intercontinental latency in
liveness verification.</t>
          </section>
        </section>
        <section anchor="standard-registries">
          <name>Standard Registries</name>
          <t>The APIX standard maintains normative registries of enumerated values.
Registries are authoritative lists of valid values for specific APM and
Index API fields. Using values not present in the relevant registry is
a protocol violation.</t>
          <t><strong>Registry location:</strong> Registries are published as live JSON endpoints at
<tt>apix.example.org/registry/</tt> and are updated independently of the RFC
revision cycle. The RFC defines the registry structure and lifecycle
rules; the live endpoints are the authoritative source of current values.</t>
          <dl>
            <dt><tt>protocols</tt></dt>
            <dd>
              <t>Protocol type registry.
Endpoint: <tt>apix.example.org/registry/protocols</tt>.
APM field: <tt>spec.type</tt>.</t>
            </dd>
            <dt><tt>capabilities</tt></dt>
            <dd>
              <t>Capability taxonomy registry.
Endpoint: <tt>apix.example.org/registry/capabilities</tt>.
APM field: <tt>capabilities[]</tt>.</t>
            </dd>
            <dt><tt>notification-channels</tt></dt>
            <dd>
              <t>Notification channel type registry.
Endpoint: <tt>apix.example.org/registry/notification-channels</tt>.
APM field: <tt>notifications.channels[].type</tt>.</t>
            </dd>
            <dt><tt>presence-modes</tt></dt>
            <dd>
              <t>Presence mode registry.
Endpoint: <tt>apix.example.org/registry/presence-modes</tt>.
APM field: <tt>spec.presence_mode</tt> (device classes).</t>
            </dd>
            <dt><tt>delegation-scopes</tt></dt>
            <dd>
              <t>Device delegation scope registry.
Endpoint: <tt>apix.example.org/registry/delegation-scopes</tt>.
APM field: <tt>scopes[]</tt> in delegation grant requests (device classes).</t>
            </dd>
          </dl>
          <t>Initial values for each registry are defined in the applicable profile
document: <xref target="APIX-SERVICES"/> for protocol types and capability taxonomy;
<xref target="APIX-IOT"/> for presence modes, delegation scopes, and IoT capability
terms.</t>
          <t><strong>Registry entry lifecycle:</strong></t>
          <t>Each registry entry transitions through three phases. The <tt>standard_warnings</tt>
flag in a Service Record does not appear until the grace period has elapsed —
service operators have a silent window to update their APM before any public
signal is issued.</t>
          <artwork><![CDATA[
active  ->  deprecated (announced)
              |
              +-- [grace period: 90 days min]
              |     silent: operator notified, no public flag
              |
              +-- [warning period: remainder of deprecation window]
              |     standard_warnings visible in Service Record
              |
              +-- sunset
                    new registrations rejected; flagged non-compliant
]]></artwork>
          <table>
            <thead>
              <tr>
                <th align="left">Phase</th>
                <th align="left">Status</th>
                <th align="left">standard_warnings</th>
                <th align="left">New regs.</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Normal use</td>
                <td align="left">
                  <tt>active</tt></td>
                <td align="left">No</td>
                <td align="left">Accepted</td>
              </tr>
              <tr>
                <td align="left">Grace period</td>
                <td align="left">
                  <tt>deprecated</tt></td>
                <td align="left">
                  <strong>No</strong></td>
                <td align="left">Accepted</td>
              </tr>
              <tr>
                <td align="left">Warning period</td>
                <td align="left">
                  <tt>deprecated</tt></td>
                <td align="left">
                  <strong>Yes</strong></td>
                <td align="left">Accepted</td>
              </tr>
              <tr>
                <td align="left">Sunset</td>
                <td align="left">
                  <tt>sunset</tt></td>
                <td align="left">Yes (non-compliant)</td>
                <td align="left">
                  <strong>Rejected</strong></td>
              </tr>
            </tbody>
          </table>
          <t><strong>Deprecation rules:</strong></t>
          <ul spacing="normal">
            <li>
              <t>The governing body MUST publish a <tt>deprecated_in_version</tt>, <tt>sunset_date</tt>,
<tt>grace_period_ends</tt>, and <tt>replacement</tt> value when deprecating any registry
entry.</t>
            </li>
            <li>
              <t>The minimum total deprecation window (announcement to sunset) is
<strong>12 months</strong>. The governing body MAY extend this window but MUST NOT
shorten it.</t>
            </li>
            <li>
              <t>The minimum grace period is <strong>90 days</strong> from the deprecation announcement.
During the grace period, <tt>standard_warnings</tt> MUST NOT be set on any Service
Record, regardless of whether the service uses the deprecated value.</t>
            </li>
            <li>
              <t>The governing body MUST notify all registered Service Owners whose services
use the deprecated value before the grace period begins. Notification MUST
include the <tt>grace_period_ends</tt> date, the <tt>sunset_date</tt>, and the
<tt>replacement</tt> value.</t>
            </li>
            <li>
              <t>After the grace period, the index operator MUST set <tt>standard_warnings</tt> on
Service Records that still use the deprecated value.</t>
            </li>
            <li>
              <t>At <tt>sunset</tt>, the index operator MUST reject new APM submissions using the
sunsetted value and MUST escalate existing Service Records from
<tt>standard_warnings</tt> to a <tt>non_compliant</tt> status flag.</t>
            </li>
          </ul>
          <t><strong>Registry versioning:</strong> each registry is independently versioned. The Index
root resource (Section 10.2) exposes the current version of each registry so
consuming agents may detect changes.</t>
        </section>
      </section>
      <section anchor="lawful-cooperation-and-non-surveillance-commitment">
        <name>Lawful Cooperation and Non-Surveillance Commitment</name>
        <section anchor="purpose-of-the-service">
          <name>Purpose of the Service</name>
          <t>APIX is infrastructure designed for one purpose: enabling autonomous agents
and the organisations that deploy them to discover legitimate services and
operate productively in the commercial internet. Registration in the APIX
is a declaration that a service or device class is offered in good faith for
legitimate use. The APIX is not a neutral medium indifferent to the purposes
for which it is used. It is infrastructure built for legitimate use, and
it is by design closed to actors who are refused or removed under the
compliance mechanisms defined in this specification — sanctions screening,
KYC verification, and judicial enforcement through the LER process.</t>
          <t>This is not a policy statement. It is the foundational design constraint
from which the cooperation mechanisms in this document and in <xref target="APIX-IOT"/>
derive their legitimacy.</t>
        </section>
        <section anchor="cooperation-duty">
          <name>Cooperation Duty</name>
          <t>Because APIX provides infrastructure for legitimate use, it has a duty to
cooperate with properly authorised law enforcement when that infrastructure
is misused. This duty is not conditional on commercial convenience or
reputational risk. When a registrant or device fleet is confirmed to be
operating criminally, APIX MUST act — through the mechanisms defined in
this document and in <xref target="APIX-IOT"/> — to limit the harm that flows from that
misuse.</t>
          <t>APIX MUST cooperate with authorised law enforcement requests that satisfy
the jurisdictional and judicial requirements defined in <xref target="APIX-IOT"/>
Section 5.8. Refusal to cooperate with a validly authorised request is not
permitted. Delay beyond the processing time commitments defined in that
section requires documented justification and MUST be reported in the
governing body's annual transparency report.</t>
        </section>
        <section anchor="non-surveillance-commitment">
          <name>Non-Surveillance Commitment</name>
          <t>APIX is not a surveillance instrument. The cooperation mechanisms in this
specification are reactive and bounded. The following prohibitions are
normative and apply to all conforming implementations:</t>
          <ul spacing="normal">
            <li>
              <t>APIX MUST NOT proactively monitor, profile, or analyse the behaviour of
registered services, device fleets, or consuming agents beyond what is
technically necessary to deliver liveness verification and abuse detection
as defined in this specification.</t>
            </li>
            <li>
              <t>APIX MUST NOT share index data, presence signal logs, device instance
records, or consuming agent query patterns with any law enforcement or
government authority except through the Law Enforcement Request process
defined in <xref target="APIX-IOT"/> Section 9.8, with its associated judicial
authorisation requirements and jurisdictional constraints.</t>
            </li>
            <li>
              <t>Bulk data requests — requests that are not targeted at identified specific
devices, instances, or registrants but instead seek aggregate ecosystem
intelligence — MUST be refused regardless of the requesting authority's
jurisdiction or claimed legal basis. A valid LER MUST identify specific
device IP addresses or registrant identifiers. A request for "all devices
in region X" or "all services in category Y" is not a valid LER.</t>
            </li>
            <li>
              <t>APIX MUST NOT establish any data-sharing arrangement, standing access
grant, or automated feed to any law enforcement or intelligence agency.
Every cooperation action is event-triggered, scoped to a specific
identified case, and subject to the judicial authorisation requirement.</t>
            </li>
          </ul>
        </section>
        <section anchor="the-trigger-requirement">
          <name>The Trigger Requirement</name>
          <t>Enhanced monitoring, graduated response actions, and LER processing are
ALWAYS triggered by one of two conditions:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>External identification</strong>: a legitimate authority in an accepted
jurisdiction has submitted an LER with valid judicial authorisation
identifying specific devices or registrants as confirmed participants
in criminal activity. Suspicion alone is not sufficient. The judicial
authorisation requirement is the gatekeeping mechanism.</t>
            </li>
            <li>
              <t><strong>Technical anomaly detection</strong>: APIX's own infrastructure detects
signal patterns technically inconsistent with legitimate device operation
— such as rapid mass re-registration from a single IP address, heartbeat
flooding at rates outside any plausible device density, or token reuse
patterns that cannot arise from legitimate manufacture and provisioning.
Such detections result in classification at the <tt>observe</tt> tier of the
Bad-Bot Graduated Response (<xref target="APIX-IOT"/> Section 9.9), not in immediate
blocking. They are recorded, monitored, and shared with authorised law
enforcement on request through the LER process. They do not trigger
autonomous enforcement action by APIX.</t>
            </li>
          </ol>
          <t>Speculative profiling — building behavioural models of registered services
or device fleets in the absence of a trigger — is prohibited under the
Non-Surveillance Commitment above.</t>
        </section>
        <section anchor="jurisdictional-guardrails">
          <name>Jurisdictional Guardrails</name>
          <t>All cooperation is bounded by the accepted jurisdictions framework defined
in <xref target="APIX-IOT"/> Section 9.8. This boundary is not negotiable on a
case-by-case basis. APIX MUST NOT cooperate with a law enforcement request
from a jurisdiction not on the Accepted Jurisdiction Whitelist, even when:</t>
          <ul spacing="normal">
            <li>
              <t>The requesting authority presents a compelling case.</t>
            </li>
            <li>
              <t>The alleged criminal activity is severe.</t>
            </li>
            <li>
              <t>Political, commercial, or reputational pressure is applied.</t>
            </li>
            <li>
              <t>Another accepted-jurisdiction authority vouches for the request.</t>
            </li>
          </ul>
          <t>The Accepted Jurisdiction Whitelist exists precisely to make this boundary
resist pressure. The governing body MAY add jurisdictions to the whitelist
through its defined board decision process; it MUST NOT bypass the whitelist
for individual cases. Any governing body action that grants cooperation
outside the whitelist is a specification violation and MUST be reported in
the transparency report.</t>
        </section>
        <section anchor="transparency-as-enforcement">
          <name>Transparency as Enforcement</name>
          <t>The annual transparency report required by Section 4.2 is not merely
informational. It is the mechanism by which the non-surveillance commitment
and the jurisdictional guardrails are held accountable. The governing body
MUST disclose in that report:</t>
          <ul spacing="normal">
            <li>
              <t>The number of LER requests received, accepted, and refused, by requesting
jurisdiction tier.</t>
            </li>
            <li>
              <t>The number of bulk data requests received and refused.</t>
            </li>
            <li>
              <t>Any case in which cooperation outside the accepted jurisdictions framework
was requested, with the governing body's response.</t>
            </li>
            <li>
              <t>Any case in which APIX's own technical anomaly detection was used as the
basis for a law enforcement referral.</t>
            </li>
            <li>
              <t>The total number of device instances, services, and organisations subject
to active suppression, suspension, or graduated response measures at the
reporting date.</t>
            </li>
          </ul>
          <t>If a governing body fails to publish this report within 90 days of the
close of a calendar year, any member of the governing body board MUST be
empowered to publish it unilaterally. The right to publish the transparency
report MUST NOT be waivable by board resolution.</t>
        </section>
      </section>
      <section anchor="the-apix-manifest-apm">
        <name>The APIX Manifest (APM)</name>
        <section anchor="purpose">
          <name>Purpose</name>
          <t>The APIX Manifest is the structured document that a Service Owner provides
at registration. It is the index-facing contract for a Service:
format-agnostic, extensible, and designed for machine consumption.</t>
          <t>The APM has two layers:</t>
          <t><strong>Base fields</strong> — defined in this document and required for all service types:
<tt>apm_version</tt>, <tt>service_id</tt>, <tt>name</tt>, <tt>description</tt>, <tt>owner</tt> (with
<tt>organisation_name</tt>, <tt>jurisdiction</tt>, <tt>registration_number</tt>, <tt>contacts</tt>),
<tt>capabilities</tt>, <tt>trust</tt> (organisation and service level assignments), and
<tt>legal</tt>. These fields are common to all profiles.</t>
          <t><tt>lifecycle_stage</tt> is required for all service types but its valid values
and transition rules are profile-defined. Each profile owns its own
lifecycle model; the field is not a shared enum. See <xref target="APIX-SERVICES"/> and
<xref target="APIX-IOT"/> for the lifecycle models applicable to each service type.</t>
          <t><strong>Profile fields</strong> — defined in profile documents and required only for the
applicable service type. <xref target="APIX-SERVICES"/> defines the full APM schema for
web API services. <xref target="APIX-IOT"/> defines the full APM schema for device class
registrations. An APM submission MUST conform to the profile schema
corresponding to its <tt>spec.type</tt> value.</t>
          <t><strong>Extension fields</strong> — the <tt>custom</tt> array is a governed extension mechanism
for declaring properties not yet covered by the base or profile schemas. The
<tt>custom</tt> field is OPTIONAL in all profiles. It is a flat list of reverse-domain
key name strings; no values are stored in the index. The APIX indexes only the
declared key names, enabling discovery via the <tt>custom_key</tt> search parameter.
This design provides a clean promotion path: when a custom key accumulates
sufficient independent adoption across organisations, the Bot Standards
Foundation MAY initiate a governance track to promote the pattern to a standard
named field in a future APM version. Full normative rules — including key naming
conventions, list size limits, and Spider behaviour — are defined in the
applicable profile document (<xref target="APIX-SERVICES"/>, <xref target="APIX-IOT"/>).</t>
          <t>The <tt>trust</tt> fields in an APM submission MUST be set exclusively by the index
operator based on verification outcomes. APM submissions that include <tt>trust</tt>
field values MUST have those values overwritten by the index upon processing.
A Service Owner MUST NOT assert their own trust level.</t>
        </section>
      </section>
      <section anchor="trust-model">
        <name>Trust Model</name>
        <t>The APIX Trust Model has three independent dimensions. Each dimension produces
a machine-readable value in the Service Record. Consuming agents combine
these values according to their own Trust Policy.</t>
        <t>The APIX provides trust metadata. It does not make trust decisions.</t>
        <section anchor="dimension-1-organisation-trust-level">
          <name>Dimension 1 — Organisation Trust Level</name>
          <t>Describes the verified identity and compliance posture of the organisation
that owns the service.</t>
          <table>
            <thead>
              <tr>
                <th align="left">Level</th>
                <th align="left">Label</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">O-0</td>
                <td align="left">Unverified</td>
              </tr>
              <tr>
                <td align="left">O-1</td>
                <td align="left">Identity Verified</td>
              </tr>
              <tr>
                <td align="left">O-2</td>
                <td align="left">Legal Entity Verified</td>
              </tr>
              <tr>
                <td align="left">O-3</td>
                <td align="left">Hygiene Verified</td>
              </tr>
              <tr>
                <td align="left">O-4</td>
                <td align="left">Operationally Verified</td>
              </tr>
              <tr>
                <td align="left">O-5</td>
                <td align="left">Audited</td>
              </tr>
            </tbody>
          </table>
          <dl>
            <dt>O-0 (Unverified):</dt>
            <dd>
              <t>Self-registered. No checks performed.</t>
            </dd>
            <dt>O-1 (Identity Verified):</dt>
            <dd>
              <t>Valid business email confirmed. Domain ownership verified via DNS
TXT record.</t>
            </dd>
            <dt>O-2 (Legal Entity Verified):</dt>
            <dd>
              <t>Company registration number confirmed against official registry of
the declared jurisdiction.</t>
            </dd>
            <dt>O-3 (Hygiene Verified):</dt>
            <dd>
              <t><tt>security.txt</tt> (RFC 9116) present and valid at
<tt>/.well-known/security.txt</tt>; DMARC and SPF DNS records configured
for the registered domain; Privacy Policy, Terms of Service, and
Data Processing Agreement accessible at declared URLs. All checks
performed automatically by APIX. No human reviewer required.</t>
            </dd>
            <dt>O-4 (Operationally Verified):</dt>
            <dd>
              <t>Organisation governance structure, operational security practices,
incident response capability, and personnel vetting reviewed by an
Accredited Verifier against the Verifier Standard.</t>
            </dd>
            <dt>O-5 (Audited):</dt>
            <dd>
              <t>Third-party compliance audit completed (SOC 2 Type II, ISO 27001,
or equivalent). Audit certificate on file with the governing body.
O-5 may be achieved directly without O-4 as a prerequisite via
direct certificate submission to the governing body.</t>
            </dd>
          </dl>
          <t>Organisation levels are assessed against the organisation as a whole, not
per service. An organisation that achieves any O-level applies that level
to all its registered services.</t>
        </section>
        <section anchor="dimension-2-service-verification-level">
          <name>Dimension 2 — Service Verification Level</name>
          <t>Describes what has been automatically verified about the service itself.
The specific verification mechanism differs by service type (Spider for
web API services; manufacturer registration process for device classes).</t>
          <table>
            <thead>
              <tr>
                <th align="left">Level</th>
                <th align="left">Label</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">S-0</td>
                <td align="left">Unchecked</td>
              </tr>
              <tr>
                <td align="left">S-1</td>
                <td align="left">Reachable</td>
              </tr>
              <tr>
                <td align="left">S-2</td>
                <td align="left">Spec Verified</td>
              </tr>
              <tr>
                <td align="left">S-3</td>
                <td align="left">Schema Stable</td>
              </tr>
              <tr>
                <td align="left">S-4</td>
                <td align="left">Security Reviewed</td>
              </tr>
            </tbody>
          </table>
          <dl>
            <dt>S-0 (Unchecked):</dt>
            <dd>
              <t>Registered. Verification has not yet run.</t>
            </dd>
            <dt>S-1 (Reachable):</dt>
            <dd>
              <t>Service confirmed reachable by automated check.</t>
            </dd>
            <dt>S-2 (Spec Verified):</dt>
            <dd>
              <t>Specification or capability declaration confirmed and consistent
with registration.</t>
            </dd>
            <dt>S-3 (Schema Stable):</dt>
            <dd>
              <t>No breaking changes detected across at least three consecutive
verification runs.</t>
            </dd>
            <dt>S-4 (Security Reviewed):</dt>
            <dd>
              <t>Automated vulnerability scan completed with no critical findings,
OR third-party penetration test certificate provided and validated
by an Accredited Verifier.</t>
            </dd>
          </dl>
          <t>Profile documents define the exact criteria by which each level is achieved
for each service type.</t>
        </section>
        <section anchor="dimension-3-liveness">
          <name>Dimension 3 — Liveness</name>
          <t>Describes the confirmed operational availability of the service, including
how recent and how frequent the availability data is. Liveness data is
expressed as a set of metrics, not a single level.</t>
          <dl>
            <dt><tt>last_ping_at</tt> (ISO 8601 timestamp)</dt>
            <dd>
              <t>Time of the most recent successful liveness check.</t>
            </dd>
            <dt><tt>ping_interval_seconds</tt> (integer)</dt>
            <dd>
              <t>Configured interval between liveness checks.</t>
            </dd>
            <dt><tt>uptime_30d_percent</tt> (float)</dt>
            <dd>
              <t>Percentage of checks successful over the last 30 days.</t>
            </dd>
            <dt><tt>avg_response_ms</tt> (float)</dt>
            <dd>
              <t>Mean response time in milliseconds over the last 30 days.</t>
            </dd>
            <dt><tt>consecutive_failures</tt> (integer)</dt>
            <dd>
              <t>Number of consecutive failed checks at last run.</t>
            </dd>
          </dl>
          <t>The check interval is determined by the service's liveness monitoring
configuration. A service configured at initial-only frequency receives no
recurring checks; its <tt>last_ping_at</tt> reflects only the initial verification
run.</t>
          <t>The concrete fields and measurement model for Liveness differ by service
type and are defined in each profile document.</t>
        </section>
        <section anchor="trust-model-implementations-by-service-type">
          <name>Trust Model Implementations by Service Type</name>
          <t>The three trust dimensions (Organisation, Service Verification, Liveness)
are universal across all APIX service types. However, their concrete
implementation — the verification mechanisms, the APM fields that carry
trust state, and the achievable levels — differs by service type. Three
distinct trust implementations are defined across the APIX profile suite.</t>
          <t><strong>API Service Trust</strong> (defined in <xref target="APIX-SERVICES"/>)</t>
          <t>Verification is pull-based: the APIX Spider visits the service on a
scheduled basis, checks reachability, fetches and parses the specification,
and runs schema comparison across consecutive runs. Liveness is measured
by the index — the Spider pings the service endpoint and records response
time and availability metrics. The trust object in an API service APM
carries observed metrics (<tt>last_ping_at</tt>, <tt>uptime_30d_percent</tt>,
<tt>avg_response_ms</tt>, <tt>consecutive_failures</tt>).</t>
          <t><strong>Device Class Trust</strong> (defined in <xref target="APIX-IOT"/>)</t>
          <t>Verification is registration-based: a device manufacturer registers the
device class, providing a capability declaration and firmware version
contract. The APIX Spider does not visit device hardware. Liveness
configuration is declared by the manufacturer at registration time
(<tt>presence_mode</tt>, <tt>heartbeat_interval_seconds</tt>) — not observed by the
index. The trust object in a device class APM carries manufacturer-declared
configuration, not measured metrics. <tt>spec_consistency</tt> is always <tt>null</tt>
for device classes: there is no specification document for the Spider to
fetch.</t>
          <t><strong>Device Instance Trust</strong> (defined in <xref target="APIX-IOT"/>)</t>
          <t>Liveness is push-based: individual device instances signal their presence
to the index at regular intervals. The index does not probe devices.
Instance trust state (<tt>online</tt>, <tt>reachable</tt>, <tt>last_seen_at</tt>) reflects
the most recent presence signal received, not a Spider measurement.
Device instance trust state is private — it is never returned to
unauthenticated queries regardless of trust levels.</t>
          <t>These are three architecturally distinct trust models that share only
the O-level and S-level abstractions. Implementers MUST NOT assume that
trust object fields in a device class or device instance APM follow the
structure of an API service APM.</t>
        </section>
        <section anchor="bot-side-trust-policy-expression">
          <name>Bot-Side Trust Policy Expression</name>
          <t>A consuming agent expresses its Trust Policy as a set of minimum thresholds
across all three dimensions. Example policy expressed in pseudo-notation:</t>
          <artwork><![CDATA[
require:
  organisation_level >= O-2
  service_level >= S-2
  last_ping_age < 3600         # seconds since last_ping_at
  uptime_30d_percent >= 99.0
  consecutive_failures == 0
]]></artwork>
          <t>The Index API SHOULD support filtering by trust dimension thresholds so that
agents can retrieve only records that satisfy their policy without downloading
the full index.</t>
          <t>Trust Policies are defined and enforced by consuming agents. The APIX does
not validate or enforce Trust Policies.</t>
        </section>
        <section anchor="accredited-verifier-model">
          <name>Accredited Verifier Model</name>
          <t>Organisation level O-3 (Hygiene Verified) is achieved by automatic APIX
checks and requires no human reviewer. Organisation level O-4 requires an
Accredited Verifier assessment. Organisation level O-5 may be achieved
directly without O-4 as a prerequisite via direct certificate submission
to the governing body (SOC 2 Type II or ISO 27001). The APIX uses a federated Accredited
Verifier model, analogous to the Certificate Authority model in TLS:</t>
          <ul spacing="normal">
            <li>
              <t>the governing body defines the verification criteria for each
level and publishes the Verifier Standard.</t>
            </li>
            <li>
              <t>Organisations apply to the governing body for Verifier
accreditation.</t>
            </li>
            <li>
              <t>Accredited Verifiers perform O-4 assessments and, where applicable, O-5
attestations, signing verification reports in each case.</t>
            </li>
            <li>
              <t>the governing body maintains a public registry of Accredited
Verifiers and their accreditation status.</t>
            </li>
            <li>
              <t>A Service Record at O-4 MUST include the identifier of the Accredited
Verifier that performed the assessment and the date of assessment.</t>
            </li>
            <li>
              <t>A Service Record at O-5 via direct certificate submission MUST include
the certificate reference, issuing auditor, scope, and expiry date.</t>
            </li>
            <li>
              <t>Accreditation of Verifiers is reviewed annually by the governing body.</t>
            </li>
            <li>
              <t>A Verifier placed in suspended status following a failed annual review
MUST be given a minimum 90-day remediation window before final
revocation. The 90-day window applies to performance failures: lapsed
certifications, reduced capacity, or failure to meet audit quality
standards. It does not apply to fundamental violations, for which the
governing body MUST revoke accreditation immediately. Fundamental
violations include: issuing a false or unsupported O-4 or O-5
assessment, certifying a related entity in breach of the independence
requirement, leaking confidential assessment data, or colluding with
an organisation to obtain a trust level fraudulently.</t>
            </li>
          </ul>
          <t><strong>Elevation verification requirements:</strong></t>
          <t>Elevation to O-4 or O-5 MUST be verified through an out-of-band channel
that is independent of the digital submission path used to submit the
elevation request. The governing body MUST NOT record an O-4 or O-5
elevation solely on the basis of a digitally submitted application,
regardless of the authentication mechanism used for that submission.
The out-of-band verification MUST confirm that the elevation was
intentionally authorised by a responsible representative of the applicant
organisation, and that the submitted evidence (Accredited Verifier report
or audit certificate) is genuine.</t>
          <t>Elevation to O-5 MUST additionally be confirmed by two independently
authorised representatives of the applicant organisation. The two
confirming individuals MUST hold separate credentials and MUST act
independently; a single individual confirming twice does not satisfy this
requirement. The governing body MUST enforce this programmatically for
O-5 elevations processed through its operational interface.</t>
          <t>The specific out-of-band verification mechanism and the implementation
of the two-representative confirmation are operational responsibilities
of the governing body and are documented in the APIX implementation
guide. Conforming implementations of the APIX governing body role MUST
implement mechanisms that satisfy these requirements; the specific
mechanisms are not prescribed by this specification.</t>
          <t><strong>Design Note — Future Trust Level Evolution (non-normative):</strong>
The O-0 through O-5 architecture defined here is the Version 1 model.
O-3 was introduced to provide an automatable, zero-cost on-ramp for
early-stage organisations, bridging the gap between legal entity
verification (O-2) and the first human-reviewed tier (O-4). As the governing body
Accredited Verifier market matures and a meaningful population of O-5
organisations is established, a Version 2 evolution is anticipated in
which O-5 is joined by a premium O-6 designation with APIX-specific
assessment criteria beyond the industry baseline — dedicated incident
response covering governing body cooperation obligations, agreed governing body audit access,
and APIX-specific operational commitments. This evolution requires the
governing body to develop and publish an O-6 assessment standard, which
is not feasible at initial launch. The trust level record structure (see implementation
guide Part I §1.4) is designed to accommodate additional components
without breaking existing consumers.</t>
        </section>
      </section>
      <section anchor="commercial-contract-and-sanctions-compliance">
        <name>Commercial Contract and Sanctions Compliance</name>
        <t>Every registered service MUST be covered by a commercial agreement between
the Service Owner and the index operator (or its Accredited Regional
Representative). The agreement MUST define:</t>
        <ul spacing="normal">
          <li>
            <t>The liveness monitoring configuration and its obligations.</t>
          </li>
          <li>
            <t>The index operator's obligations regarding verification frequency and
Index API availability.</t>
          </li>
          <li>
            <t>Acceptable use terms.</t>
          </li>
          <li>
            <t>Data processing terms in accordance with applicable law.</t>
          </li>
        </ul>
        <t><strong>Sanctions compliance:</strong> the index operator MUST screen all service
registrants against applicable sanctions lists prior to account activation.
At minimum, screening MUST cover the UN Security Council consolidated
sanctions list. Operators subject to additional jurisdictional sanctions
regimes (e.g., EU, US OFAC, Swiss SECO) MUST additionally screen against
those lists as applicable to their jurisdiction of incorporation. Entities
subject to applicable sanctions MUST be refused registration regardless of
commercial tier.</t>
        <t>Registrants MUST represent and warrant in the commercial agreement that they
are not subject to applicable sanctions, and MUST notify the index operator
immediately of any change in that status.</t>
        <t><strong>Ongoing sanctions monitoring:</strong> The index operator MUST perform periodic
re-screening of all registered organisations against the same sanctions lists
checked at initial registration. Re-screening MUST occur at least quarterly.
Upon detection of a new match for a previously-cleared organisation — whether
by periodic re-screening, third-party notification, or registrant self-report
— the index operator MUST immediately:</t>
        <ol spacing="normal" type="1"><li>
            <t>Suspend the organisation's account. All API credentials are revoked; no
further registration or update operations are accepted from the
organisation.</t>
          </li>
          <li>
            <t>Suspend all services registered by the organisation. Suspended services
are removed from all discovery results.</t>
          </li>
          <li>
            <t>Revoke all active credentials issued to the organisation (API keys,
instance tokens where applicable). All associated service instances are
marked offline or unreachable.</t>
          </li>
          <li>
            <t>Open a legal review case. The specific sanctions list and matched entry
MUST NOT be disclosed externally; the organisation receives only a
generic account suspension notice.</t>
          </li>
        </ol>
        <t>If the sanctions match is subsequently determined to be a false positive or
the registrant is removed from the relevant list, the index operator MAY
reinstate the account following legal review. Reinstatement requires a fresh
KYC and sanctions check.</t>
        <t>Unauthenticated discovery queries to the Index API are not subject to
registration screening and MUST remain available without restriction,
consistent with the APIX's mission as open global infrastructure.</t>
      </section>
      <section anchor="operational-model">
        <name>Operational Model</name>
        <section anchor="supply-side-funding-principle">
          <name>Supply-Side Funding Principle</name>
          <t>A conforming APIX implementation MUST be funded primarily by service
registration fees paid by Service Owners (supply side). Discovery queries
by consuming agents MUST NOT be the primary revenue mechanism. This
principle is normative: an implementation that charges consuming agents for
standard discovery queries is not conformant with the APIX model, as doing
so contradicts the open infrastructure mission and undermines the network
effect that makes the supply side valuable.</t>
          <t>The APIX model is structurally analogous to the DNS model: registrants pay
to be listed; queries are free.</t>
          <t>Fee structures applicable to each service type are defined in the relevant
profile document. All implementations MUST apply fees consistently to all
registrants of a given service type at the same commercial tier, with no
preferential treatment. The governing body publishes the normative fee
schedule as a separate registry document, updated independently of this RFC.</t>
        </section>
        <section anchor="consumer-access-model">
          <name>Consumer Access Model</name>
          <t>Discovery queries to the Index API MUST be available without authentication
or payment. Rate limits MAY be applied to protect infrastructure integrity
but MUST NOT be set at levels that prevent reasonable agent operation.
Implementations MUST support at minimum three consumer access layers:</t>
          <t><strong>Layer 1 — Unauthenticated access</strong></t>
          <t>Any agent MUST be able to query the Index API without authentication or
registration, subject to a per-IP rate limit. This layer is sufficient for
individual agents and proof-of-concept deployments.</t>
          <t><strong>Layer 2 — Authenticated access (free)</strong></t>
          <t>Any agent MAY register a consumer identity token at no cost. Token
registration requires a valid email address. Authenticated access MUST
provide a higher rate limit than unauthenticated access and MAY additionally
provide result caching hints and webhook subscriptions for service record
changes.</t>
          <t>Consumer tokens SHOULD be compatible with the webbotauth identity model
(<xref target="I-D.meunier-webbotauth-registry"/>) to enable interoperability with bot
authentication infrastructure.</t>
          <t><strong>Layer 3 — High-volume access (paid, optional)</strong></t>
          <t>Implementations MAY offer a paid high-volume access tier for platforms
operating agents at scale that require guaranteed query capacity and
operational SLAs. This tier is supplementary; the index's operational
sustainability MUST NOT depend on it.</t>
          <t><strong>Public bulk download (REQUIRED)</strong></t>
          <t>Implementations MUST provide the full index as a freely downloadable bulk
dataset on the first day of each calendar month, without authentication, under
the Open Database Licence (ODbL) 1.0. This requirement implements the
openness requirement of Section 4.2: no entity, including the index operator,
may hold an exclusive lock on the index data.</t>
          <t>Implementations MUST additionally publish a daily diff file covering all
record additions, updates, and deletions since the previous day. Daily diffs
MUST be serialised in the same format as the full snapshot and MUST be
available at the same endpoint, identified by an ISO 8601 date in their
filename or URL path (e.g. <tt>diff-2026-04-28.json</tt>). A new mirror MUST be
able to reach current index state by downloading the latest monthly full
snapshot and applying the sequence of daily diffs since that snapshot date,
without downloading any additional full snapshots.</t>
        </section>
        <section anchor="ecological-impact-transparency">
          <name>Ecological Impact Transparency</name>
          <t>A conforming APIX implementation SHOULD publish aggregate ecological impact
statistics derived from observed index usage. These statistics quantify the
efficiency gain attributable to machine-native API consumption compared to
equivalent traditional web request technology consumption, and SHOULD be
updated in real time and included in the annual transparency report.</t>
          <t>The comparison baseline is the full traditional web request stack — not
payload size alone — including the request waterfall (HTML page with
dependent CSS, JavaScript, image, and font resources), JavaScript
execution overhead for dynamically rendered pages, polling requests that
occur in the absence of a notification mechanism, retry waste from
access-control measures, and proxy infrastructure maintained solely to
circumvent those measures.</t>
          <t>The following metrics SHOULD be derived from directly observable index
events and published at a stable public endpoint:</t>
          <ul spacing="normal">
            <li>
              <t><strong>Discovery requests served</strong> — each request represents one agent
retrieval that did not require scraping or probing a service endpoint
directly.</t>
            </li>
            <li>
              <t><strong>Notification events fired</strong> — each event represents one or more
polling requests eliminated across all subscribed consuming agents.</t>
            </li>
            <li>
              <t><strong>Estimated data transfer saved (GB)</strong> — computed from discovery request
count, service profile type, and the differential between average
traditional web page size and average machine-native API response size
for that profile type.</t>
            </li>
            <li>
              <t><strong>Estimated CO2 equivalent avoided</strong> — computed from total estimated
data transfer saved using a published CO2-per-GB methodology. The
methodology document, including its source data and version, MUST be
publicly accessible at a stable URL.</t>
            </li>
          </ul>
          <t>All published figures MUST be accompanied by the computation methodology,
confidence bounds, and source data references. Conservative estimates MUST
be used where data is incomplete; figures MUST NOT be extrapolated beyond
what the directly observed data supports.</t>
          <t>The governing body SHOULD seek independent validation of the methodology
from an established environmental computing research organisation.</t>
        </section>
      </section>
      <section anchor="index-api-core">
        <name>Index API — Core</name>
        <section anchor="hateoas-navigation-model">
          <name>HATEOAS Navigation Model</name>
          <t>The Index API MUST follow Hypermedia as the Engine of Application State
(HATEOAS) principles. A consuming agent MUST be able to discover and navigate
the entire index starting from a single, stable entry-point URL, without
out-of-band knowledge of endpoint paths.</t>
          <t>Every response MUST include a <tt>_links</tt> object containing hypermedia controls
for navigation. Link relations MUST use IANA-registered relation types where
applicable, and APIX-specific relations where not.</t>
        </section>
        <section anchor="discovery-endpoint">
          <name>Discovery Endpoint</name>
          <t>The APIX exposes a single globally stable entry-point URL:</t>
          <artwork><![CDATA[
https://apix.example.org/
]]></artwork>
          <t>A GET request to this URL returns the Index root resource. The root resource
includes base navigation links common to all implementations, plus
profile-specific links defined in applicable profile documents.</t>
          <sourcecode type="json"><![CDATA[
{
  "apix_version": "1.0",
  "total_services": 12483,
  "last_updated": "2026-04-25T00:00:00Z",
  "registry_versions": {
    "protocols": "1.0",
    "capabilities": "1.0",
    "presence_modes": "1.0"
  },
  "_links": {
    "self": {
      "href": "https://apix.example.org/"
    },
    "search": {
      "href": "https://apix.example.org/search{/api_version}{?...}",
      "templated": true
    },
    "browse": {
      "href": "https://apix.example.org/browse"
    },
    "capabilities": {
      "href": "https://apix.example.org/capabilities"
    },
    "devices": {
      "href": "https://apix.example.org/devices{?capability,...}",
      "templated": true
    },
    "docs": {
      "href": "https://apix.example.org/docs"
    },
    "apix:ecological-impact-stats": {
      "href": "https://apix.example.org/stats/ecological-impact"
    }
  }
}
]]></sourcecode>
          <t>The <tt>{?q,...}</tt> placeholder above is abbreviated. The complete search URI
template (parameters grouped for readability; the value is a single
uninterrupted string at runtime):</t>
          <artwork><![CDATA[
https://apix.example.org/search{/api_version}
  {?q,capability,protocol,language,pricing_model,
   auth_method,deployment_region,near,coverage_radius_km,
   custom_key,org_level_min,service_level_min,spec_consistency,
   max_ping_age,uptime_30d_min,lifecycle_stage,
   include_superseded,page,page_size}
]]></artwork>
          <t>The <tt>lifecycle_stage</tt> parameter accepts values defined by each profile
document. Valid values differ by service type and are not a shared enum.
See <xref target="APIX-SERVICES"/> and <xref target="APIX-IOT"/> for the valid values applicable
to each service type.</t>
          <t>The <tt>devices</tt> link template (defined in <xref target="APIX-IOT"/>):</t>
          <artwork><![CDATA[
https://apix.example.org/devices
  {?capability,protocol,online,api_version,
   endpoint_confidence,page,page_size}
]]></artwork>
          <t>Profile-specific links (e.g., the <tt>devices</tt> link defined in <xref target="APIX-IOT"/>) are
present in the root resource when the implementation includes support for that
profile. Consuming agents MUST follow links rather than constructing URLs
independently; the presence or absence of a link in the root resource is the
authoritative signal of whether a capability is supported.</t>
        </section>
        <section anchor="transport-encoding">
          <name>Transport Encoding</name>
          <t>The Index API is consumed by autonomous agents at machine speed. Response
payloads are structured JSON with highly repetitive field names across result
arrays. Transport-layer compression achieves 70–85% size reduction on typical
search result payloads with no information loss and no application-layer
schema changes.</t>
          <t><strong>Compression support requirements:</strong></t>
          <t>The Index API MUST support the following <tt>Accept-Encoding</tt> values:</t>
          <table>
            <thead>
              <tr>
                <th align="left">Encoding</th>
                <th align="left">Requirement</th>
                <th align="left">Notes</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>gzip</tt></td>
                <td align="left">MUST</td>
                <td align="left">Universally supported baseline</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>br</tt> (Brotli)</td>
                <td align="left">SHOULD</td>
                <td align="left">Higher compression ratio than gzip</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>zstd</tt></td>
                <td align="left">SHOULD</td>
                <td align="left">Similar ratio to Brotli; faster decompression</td>
              </tr>
            </tbody>
          </table>
          <t>The Index API MUST perform content negotiation via the <tt>Accept-Encoding</tt>
request header. Responses MUST include a <tt>Content-Encoding</tt> header
identifying the applied encoding. If a client sends no <tt>Accept-Encoding</tt>
header, the server MAY respond uncompressed.</t>
          <t>Consuming agents SHOULD include <tt>Accept-Encoding: zstd, br, gzip</tt> in all
Index API requests.</t>
          <t>The Index API MAY additionally support CBOR (RFC 8949) as a binary
alternative to JSON. A client that prefers CBOR MUST signal this via
<tt>Accept: application/cbor</tt>. CBOR responses carry identical information to
JSON responses. Clients MUST NOT assume CBOR support. JSON over compressed
transport is the normative interchange format.</t>
        </section>
      </section>
      <section anchor="index-api-versioning">
        <name>Index API Versioning</name>
        <section anchor="version-identification">
          <name>Version Identification</name>
          <t>The root resource returned at <tt>https://apix.example.org/</tt> MUST include an
<tt>apix_version</tt> field identifying the version of the Index API schema in use.
Version values are of the form <tt>MAJOR.MINOR</tt> (e.g., <tt>"1.0"</tt>, <tt>"1.2"</tt>, <tt>"2.0"</tt>).</t>
          <t>Consuming agents MUST read <tt>apix_version</tt> at the start of each session.
Agents MUST NOT cache <tt>apix_version</tt> across sessions: the version field is
the authoritative signal that the schema has changed.</t>
        </section>
        <section anchor="compatibility-rules">
          <name>Compatibility Rules</name>
          <t>The APIX follows a semantic versioning policy for the Index API:</t>
          <t><strong>Non-breaking changes (MINOR increment):</strong></t>
          <ul spacing="normal">
            <li>
              <t>Adding new fields to Service Records or the root resource</t>
            </li>
            <li>
              <t>Adding new optional query parameters to the search endpoint</t>
            </li>
            <li>
              <t>Adding new <tt>_links</tt> relations to any response</t>
            </li>
            <li>
              <t>Expanding an enumerated value registry (new capability terms, new
protocol types)</t>
            </li>
            <li>
              <t>Increasing rate limits</t>
            </li>
          </ul>
          <t>Minor version increments are backward compatible. A consuming agent written
for <tt>1.0</tt> MUST be able to operate correctly against a <tt>1.x</tt> endpoint,
provided it ignores unknown fields.</t>
          <t>Consuming agents MUST follow the robustness principle: ignore unknown fields
and unknown link relations rather than failing. This requirement is normative.</t>
          <t><strong>Breaking changes (MAJOR increment):</strong></t>
          <ul spacing="normal">
            <li>
              <t>Removing or renaming fields in Service Records</t>
            </li>
            <li>
              <t>Changing the type or semantics of an existing field</t>
            </li>
            <li>
              <t>Removing or renaming existing query parameters</t>
            </li>
            <li>
              <t>Changing the structure of the HATEOAS <tt>_links</tt> object</t>
            </li>
            <li>
              <t>Changing the URL of the single entry-point</t>
            </li>
          </ul>
          <t>A MAJOR version increment MUST NOT occur without a concurrent deprecation
notice for the prior version (see below).</t>
        </section>
        <section anchor="api-deprecation-and-migration">
          <name>API Deprecation and Migration</name>
          <t>When a new MAJOR version is released, the prior MAJOR version MUST remain
supported for a minimum of <strong>24 months</strong> from the date the new version
becomes available. During this period:</t>
          <ul spacing="normal">
            <li>
              <t>Both versions MUST be simultaneously queryable</t>
            </li>
            <li>
              <t>The root resource of the prior version MUST include a <tt>deprecated</tt> flag
with the <tt>sunset_date</tt> of the old version</t>
            </li>
            <li>
              <t>Consuming agents that include the IETF <tt>Sunset</tt> header
(<xref target="RFC8594"/>) in their responses MUST use it to signal the old version's
sunset date</t>
            </li>
          </ul>
          <t>the governing body MUST NOT sunset a MAJOR version without giving
consuming agents at least 24 months to migrate.</t>
        </section>
        <section anchor="service-apiversion-immutability-invariant">
          <name>Service api_version Immutability Invariant</name>
          <t>The <tt>api_version</tt> field in an APM and the version path segment in the
search endpoint (<tt>/search/v{major}.{minor}/</tt>) rest on a single foundational
guarantee: a published <tt>api_version</tt> value has an immutable field structure
definition.</t>
          <t>This invariant MUST be stated unambiguously to consuming agents and service
operators:</t>
          <ul spacing="normal">
            <li>
              <t>A field present in version <tt>v2.4</tt> will be present in every service that
declares <tt>api_version: "2.4.x"</tt> for the lifetime of that registration.</t>
            </li>
            <li>
              <t>A field absent from version <tt>v2.4</tt> will never appear in a <tt>v2.4.x</tt>
service record without a version increment.</t>
            </li>
            <li>
              <t>Removing a field, changing a field's type, or making any other breaking
change REQUIRES a new major version. The major bump is the explicit,
sufficient notice to consumers. No deprecation period within a major
version is required or expected.</t>
            </li>
            <li>
              <t>Adding a field requires a new minor version. Even additive changes are
not permitted within a published version — a service that adds a field
mid-life has implicitly created a new contract and MUST increment
<tt>api_version</tt> accordingly.</t>
            </li>
          </ul>
          <t>This invariant enables the version path filter to be an unconditional
schema contract: an agent that pins to <tt>/search/v2.4/</tt> receives results
with a fixed, permanent field set. Service owners are freed from the
pressure to retain unwanted fields for backwards compatibility — the
correct action is always to increment the version and move forward cleanly.</t>
        </section>
        <section anchor="no-cross-version-response-mapping">
          <name>No Cross-Version Response Mapping</name>
          <t>The APIX does NOT perform cross-version response mapping. The
<tt>api_version</tt> path segment is a strict storage filter: only service
registrations whose <tt>api_version</tt> field matches the specified prefix
are returned. The index never synthesises a response of one version
from a record stored at a different version.</t>
          <t>The consequence is deliberate and unambiguous:</t>
          <ul spacing="normal">
            <li>
              <t>A service that has upgraded from v2.4 to v3.0 is stored as a separate
record. The v3.0 record does not appear in <tt>/search/v2/</tt> results.
There are no null substitutions for dropped fields, no type coercions
for changed fields, and no partial responses. A v3 record is a
different resource; it is not a transformed view of a v2 record.</t>
            </li>
            <li>
              <t>The v2.4 record remains in the index — immutably — until the service
owner advances it through the lifecycle (<tt>deprecated</tt> → <tt>sunset</tt>) or
the record is superseded and eventually removed. An agent pinned to
<tt>/search/v2/</tt> continues to see v2.4 registrations for as long as
they exist in the index at that lifecycle stage.</t>
            </li>
            <li>
              <t>As services migrate to newer major versions, the v2 result set shrinks.
Diminishing or empty results at a pinned version are not a failure
condition — they are the designed signal that the consuming agent's
version pin no longer covers the current service landscape and an
upgrade of consumer code is warranted.</t>
            </li>
          </ul>
          <t><strong>Upgrade path discovery:</strong> The Level 2 Service Record for a superseded
version MUST include a populated <tt>superseded_by</tt> field pointing to the
current version's record. A consuming agent that finds a v2.4 result with
<tt>superseded_by</tt> set SHOULD follow the link to inspect the v3.0 record and
determine whether upgrading its version pin is feasible. This is the
mechanism by which agents discover that a newer contract is available
without being forced off the old one before they are ready.</t>
          <t>A consuming agent that receives only empty results for its pinned version
SHOULD query <tt>GET /search/</tt> with no path segment and no query parameters.
This returns the version landscape only — a summary of available
<tt>api_version</tt> prefixes, service counts, and lifecycle status — and executes
no content query. The agent uses this response to identify which version
prefix covers the current service population and then issues a new scoped
query (e.g., <tt>/search/v3/?...</tt>) with explicit filters. A parameter-less
<tt>/search/</tt> MUST NOT return service records; it exists solely as a version
discovery resource.</t>
        </section>
        <section anchor="registry-version-tracking">
          <name>Registry Version Tracking</name>
          <t>The root resource exposes a <tt>registry_versions</tt> object (Section 10.2).
Consuming agents that cache capability taxonomy or protocol type data MUST
compare the current <tt>registry_versions</tt> values against their cached version
on each session. A change in any registry version MUST trigger a cache
refresh before the agent applies trust filtering or capability matching.</t>
        </section>
      </section>
      <section anchor="operator-security-and-self-governance">
        <name>Operator Security and Self-Governance</name>
        <section anchor="purpose-and-scope">
          <name>Purpose and Scope</name>
          <t>APIX centralises knowledge that has intrinsic intelligence value: the
identity and capability of every registered service, the network location
of every online IoT device instance, the query patterns of every consuming
agent, and the contact details of law enforcement authorities across
accepted jurisdictions. This concentration makes the Bot Standards
Foundation an ultra-high-value target for state-sponsored actors, criminal
organisations, and corporate adversaries.</t>
          <t>The Non-Surveillance Commitment (Section 5) defines what APIX will not do
to the ecosystem it serves. This section defines what the Bot Standards
Foundation MUST do to protect itself and the ecosystem from being exploited
involuntarily — through compromise, coercion, insider threat, or
organisational capture.</t>
          <t>The requirements in this section are normative obligations on the Bot
Standards Foundation as operator. They are not addressed to Service Owners
or consuming agents.</t>
        </section>
        <section anchor="technical-security-requirements">
          <name>Technical Security Requirements</name>
          <t>the governing body MUST operate APIX infrastructure under the
following technical constraints:</t>
          <t><strong>Infrastructure separation:</strong> The token store, tamper-evident audit log,
and LER processing queue MUST be hosted on systems with no shared network
path to the public-facing Index API query infrastructure. Compromise of
the query layer MUST NOT provide lateral access to the token store or
audit log.</t>
          <t><strong>Air-gapped token issuance:</strong> Instance token batches for IoT device
classes MUST be generated on infrastructure with no persistent internet
connection. Issuance systems MUST use hardware security modules (HSMs)
for all cryptographic operations. The issuance network MUST be physically
separated from the token delivery network.</t>
          <t><strong>Geographic distribution:</strong> Core APIX systems MUST be distributed across
at least two independent physical jurisdictions. No single legal order
from any one jurisdiction MUST be sufficient to take the full system
offline or compel full data access.</t>
          <t><strong>Zero-trust internal architecture:</strong> No governing body system MUST grant implicit
trust to requests from other governing body systems. All inter-system communication
MUST be authenticated and authorised independently of network location.
Lateral movement within governing body infrastructure MUST require separate
credentials at each boundary.</t>
          <t><strong>Cryptographic floor:</strong> All external-facing endpoints MUST use TLS 1.3
or higher (<xref target="RFC8446"/>). All signing operations MUST use asymmetric keys
stored in hardware-backed key storage. Key material MUST NOT be exportable
from the HSM in plaintext under any operational procedure.</t>
          <t><strong>Mandatory penetration testing:</strong> The governing body MUST commission an independent
penetration test of its production infrastructure at least annually. A
summary of findings (severity distribution, remediation status) MUST be
published in the governing body's annual security report within 90 days of the test. The
identity of the testing firm MUST be disclosed.</t>
          <t><strong>Responsible disclosure programme:</strong> The governing body MUST maintain a public
responsible disclosure policy at a stable URL and MUST acknowledge
vulnerability reports within 5 business days.</t>
        </section>
        <section anchor="organisational-security-requirements">
          <name>Organisational Security Requirements</name>
          <t><strong>Personnel vetting:</strong> All staff and contractors with access to the token
store, LER queue, sanctions screening pipeline, or audit log MUST undergo
documented background verification commensurate with the sensitivity of
the systems they can access, prior to access being granted. Access MUST
be reviewed annually.</t>
          <t><strong>Segregation of duties:</strong> No individual staff member MUST hold
simultaneous access to more than two of the following: token store, audit
log, LER queue, sanctions pipeline, board signing keys. This constraint
MUST be enforced technically, not procedurally.</t>
          <t><strong>Least-privilege access:</strong> Access rights MUST be scoped to the minimum
required for the role. Privileged access MUST expire after a defined
session window and MUST require re-authentication. No standing privileged
sessions are permitted.</t>
          <t><strong>Security awareness:</strong> All governing body staff MUST complete security awareness
training annually, covering at minimum the threat types and unlawful
request scenarios relevant to an operator under the security obligations
defined in this section.</t>
          <t><strong>Insider threat detection:</strong> The governing body MUST operate anomalous access pattern
detection across all privileged systems. Anomalies MUST generate alerts
to a security function independent of the alerted staff member's reporting
line.</t>
          <t><strong>Whistleblower protection:</strong> Any governing body staff member or contractor who
receives an instruction — from any source, including governing body board members —
that would cause the governing body to act contrary to the Non-Surveillance Commitment
(Section 5) or the requirements of this section MUST have a protected
right to report that instruction to an external body without prior
internal approval. This right MUST be codified in the governing body's founding charter
charter and in every employment and contractor agreement. It MUST NOT
be waivable by board resolution or individual contract term.</t>
        </section>
        <section anchor="political-independence-and-anti-capture-measures">
          <name>Political Independence and Anti-Capture Measures</name>
          <t><strong>Structural domicile:</strong> the governing body MUST maintain its
Swiss Stiftung domicile as a structural defence. The Swiss legal system,
political neutrality, and the oversight of the Eidgenössische
Stiftungsaufsicht provide a foundation that is not subject to the data
access regimes of any single major power.</t>
          <t><strong>Golden share:</strong> the governing body's charter MUST maintain a governance mechanism
equivalent to a 51% golden share that prevents any acquisition, merger,
or board supermajority from overriding the charter's core purpose. No
commercial transaction MUST be permitted to subordinate the governing body's neutrality
obligations to the interests of a single organisation or jurisdiction.</t>
          <t><strong>Board composition:</strong> No single nation-state's citizens or residents
MUST hold a majority of board seats. No individual MUST hold more than
one vote on any board decision. Board composition MUST be published
annually in the transparency report.</t>
          <t><strong>Infrastructure jurisdiction policy:</strong> The governing body MUST NOT host core APIX
systems — token store, audit log, LER queue — in jurisdictions that
impose secret data access orders (orders that legally prohibit the
recipient from disclosing that the order was received). The governing body MUST maintain
a published list of approved hosting jurisdictions, reviewed annually by
the board. Removal of a jurisdiction from the approved list MUST trigger
migration of any systems hosted there within 180 days.</t>
          <t><strong>Lawful pressure resistance:</strong> If the governing body receives a government demand for
data access, system access, or operational changes that does not satisfy
the LER criteria defined in <xref target="APIX-IOT"/> Section 9.8, The governing body MUST refuse
the demand. The governing body MUST record the demand in the audit log and MUST report
its existence — without operational detail that would compromise an
ongoing investigation — in the next annual transparency report. The governing body MUST
NOT comply with informal diplomatic pressure, agency-level requests, or
extra-judicial demands regardless of the requesting party's political
standing.</t>
          <t><strong>Anti-capture review:</strong> The board MUST conduct an annual review of
whether any commercial relationship, grant dependency, or staff composition
creates a conflict of interest with the governing body's neutrality obligations. Findings
MUST be published in the transparency report.</t>
        </section>
        <section anchor="crisis-governance-protocol">
          <name>Crisis Governance Protocol</name>
          <t>The following conditions each independently trigger the governing body crisis
governance protocol:</t>
          <ul spacing="normal">
            <li>
              <t>Credible evidence that APIX production infrastructure has been
compromised by an external actor</t>
            </li>
            <li>
              <t>Receipt of a demand that the governing body's legal counsel assesses as an attempt
to compel action contrary to the charter</t>
            </li>
            <li>
              <t>Attempted hostile acquisition, board capture, or charter amendment
by a party with a conflict of interest</t>
            </li>
            <li>
              <t>Regulatory action that threatens loss of Swiss Stiftung domicile</t>
            </li>
          </ul>
          <t><strong>Obligations on trigger:</strong></t>
          <ol spacing="normal" type="1"><li>
              <t>The discovering party MUST notify all board members within 4 hours.</t>
            </li>
            <li>
              <t>The governing body MUST publish a public statement acknowledging the trigger event
within 72 hours of confirmation. The statement MUST describe the
nature of the threat in general terms without disclosing operational
detail that would aid the attacker.</t>
            </li>
            <li>
              <t>The governing body MUST activate its continuity-of-operations plan, ensuring Index
API availability is maintained independently of any compromised or
coerced system.</t>
            </li>
            <li>
              <t>If Swiss domicile is threatened or lost, the board MUST convene within
30 days to activate a pre-agreed organisational relocation framework.
The destination jurisdiction MUST satisfy the infrastructure
jurisdiction policy defined above. The relocation framework MUST be
prepared and approved by the board before APIX reaches production
operation and MUST be reviewed annually.</t>
            </li>
          </ol>
          <t>No single board member and no external party MUST have the authority to
suspend or delay execution of steps 1–3 above.</t>
        </section>
        <section anchor="data-minimisation-as-security-policy">
          <name>Data Minimisation as Security Policy</name>
          <t>The least-held data is the least-leakable data. The following constraints
apply to all APIX operational systems:</t>
          <ul spacing="normal">
            <li>
              <t>APIX MUST NOT log consuming agent query patterns beyond the minimum
required for liveness monitoring and abuse detection. Query logs MUST
be purged after 30 days unless retained under a specific, documented,
time-limited LER investigation scope.</t>
            </li>
            <li>
              <t>Device instance network location data (<tt>network.ipv6</tt>, as published in
the instance record) MUST be purged from APIX systems within 72 hours of
the instance transitioning to offline status, subject to any active LER
retention obligation on that instance. The internally observed source IPv4
address (<tt>observed_source_ipv4</tt>, retained for abuse detection and
geo-routing and not surfaced in the instance record) is subject to the
same purge obligation and timeline.</t>
            </li>
            <li>
              <t>APIX MUST NOT build or maintain cross-session behavioural profiles of
consuming agents. Each query session MUST be treated as independent.</t>
            </li>
            <li>
              <t>Every data field collected or retained by APIX MUST have a documented
functional justification. Fields without a current functional
justification MUST be deleted from the data model in the next schema
revision. This review MUST be a standing agenda item at each the governing body board
meeting.</t>
            </li>
          </ul>
        </section>
        <section anchor="annual-security-report">
          <name>Annual Security Report</name>
          <t>the governing body MUST publish an annual security report
within 90 days of the close of each calendar year. The security report
is separate from the transparency report defined in Section 5.6 and MUST
contain:</t>
          <ul spacing="normal">
            <li>
              <t>Summary of the year's penetration test findings: severity distribution
(critical / high / medium / low count), remediation status of prior
findings, identity of testing firm</t>
            </li>
            <li>
              <t>Summary of infrastructure changes affecting the attack surface</t>
            </li>
            <li>
              <t>Staff access review outcomes: number of access rights granted, revoked,
and modified</t>
            </li>
            <li>
              <t>Count of external demands received that did not meet LER criteria,
and how each was handled</t>
            </li>
            <li>
              <t>Count of whistleblower reports received and their resolution status
(no identifying detail)</t>
            </li>
            <li>
              <t>Board attestation that the infrastructure jurisdiction policy was
reviewed and remains current</t>
            </li>
          </ul>
          <t>The same unilateral publication right defined for the transparency report
(Section 5.6) applies to the security report: if the board fails to
publish within 90 days of period close, any individual board member MUST
be empowered to publish it unilaterally. This right MUST NOT be waivable
by board resolution.</t>
        </section>
      </section>
      <section anchor="security-considerations">
        <name>Security Considerations</name>
        <section anchor="abuse-and-fake-listings">
          <name>Abuse and Fake Listings</name>
          <t>The mandatory Terms of Service acceptance at registration provides a first
barrier against malicious actors listing fake or harmful services. For O-0
and O-1, identity verification is limited; consuming agents SHOULD NOT rely
solely on index presence for trust at these levels. For O-2 and above, the
formal B2B contractual relationship and progressively stronger identity and
compliance verification substantially raise the cost of abuse.</t>
          <t>Consuming agents SHOULD apply Trust Policies that exclude O-0 services for
any task involving sensitive data or consequential actions.</t>
          <t>the governing body MUST maintain an abuse reporting mechanism and
MUST be able to suspend or remove a Service Record within 24 hours of
confirmed abuse. Suspended service records MUST remain in the index with a
<tt>status: suspended</tt> flag and MUST NOT be silently deleted, to provide
transparency to agents that had cached the record.</t>
        </section>
        <section anchor="trust-level-spoofing">
          <name>Trust Level Spoofing</name>
          <t>Organisation and Service trust levels in the Service Record are set only by
the APIX itself, not by the Service Owner. APM submissions that include
<tt>trust</tt> field values MUST have those values overwritten by the APIX upon
processing. The Index API MUST NOT expose self-asserted trust values.</t>
        </section>
        <section anchor="transport-security-requirements">
          <name>Transport Security Requirements</name>
          <t>The Index API MUST be served exclusively over TLS (<xref target="RFC8446"/>). Certificate
validity MUST be verified by consuming agents. Agents MUST NOT bypass TLS
certificate verification when querying the Index API.</t>
          <t>All <tt>entry_point</tt> and <tt>spec.url</tt> values submitted in APM registrations MUST
use the <tt>https</tt> scheme. The Index MUST reject APM submissions that provide
HTTP (non-TLS) values for these fields.</t>
        </section>
        <section anchor="bot-consumer-risks">
          <name>Bot Consumer Risks</name>
          <t>The APIX provides discovery and trust metadata. It does not guarantee the
safety, correctness, or availability of listed services. Consuming agents
MUST NOT assume that a service listed in the APIX is safe to use without
applying their own Trust Policy.</t>
          <t>Consuming agents SHOULD treat Index API responses as untrusted input and
validate the structure of Service Records before acting on them.</t>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5646">
          <front>
            <title>Tags for Identifying Languages</title>
            <author fullname="A. Phillips" initials="A." role="editor" surname="Phillips"/>
            <author fullname="M. Davis" initials="M." role="editor" surname="Davis"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the structure, content, construction, and semantics of language tags for use in cases where it is desirable to indicate the language used in an information object. It also describes how to register values for use in language tags and the creation of user-defined extensions for private interchange. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="47"/>
          <seriesInfo name="RFC" value="5646"/>
          <seriesInfo name="DOI" value="10.17487/RFC5646"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8594">
          <front>
            <title>The Sunset HTTP Header Field</title>
            <author fullname="E. Wilde" initials="E." surname="Wilde"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This specification defines the Sunset HTTP response header field, which indicates that a URI is likely to become unresponsive at a specified point in the future. It also defines a sunset link relation type that allows linking to resources providing information about an upcoming resource or service sunset.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8594"/>
          <seriesInfo name="DOI" value="10.17487/RFC8594"/>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9116">
          <front>
            <title>A File Format to Aid in Security Vulnerability Disclosure</title>
            <author fullname="E. Foudil" initials="E." surname="Foudil"/>
            <author fullname="Y. Shafranovich" initials="Y." surname="Shafranovich"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>When security vulnerabilities are discovered by researchers, proper reporting channels are often lacking. As a result, vulnerabilities may be left unreported. This document defines a machine-parsable format ("security.txt") to help organizations describe their vulnerability disclosure practices to make it easier for researchers to report vulnerabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9116"/>
          <seriesInfo name="DOI" value="10.17487/RFC9116"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6763">
          <front>
            <title>DNS-Based Service Discovery</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6763"/>
          <seriesInfo name="DOI" value="10.17487/RFC6763"/>
        </reference>
        <reference anchor="I-D.ietf-scitt-architecture">
          <front>
            <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>ARM</organization>
            </author>
            <author fullname="Steve Lasker" initials="S." surname="Lasker">
         </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   Traceability in supply chains is a growing security concern.  While
   verifiable data structures have addressed specific issues, such as
   equivocation over digital certificates, they lack a universal
   architecture for all supply chains.  This document defines such an
   architecture for single-issuer signed statement transparency.  It
   ensures extensibility, interoperability between different
   transparency services, and compliance with various auditing
   procedures and regulatory requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-22"/>
        </reference>
        <reference anchor="UDDI" target="https://www.oasis-open.org/committees/uddi-spec/doc/spec/v3/uddi-v3.0.2-20041019.htm">
          <front>
            <title>UDDI Version 3.0.2</title>
            <author initials="L." surname="Clement">
              <organization/>
            </author>
            <author initials="A." surname="Hately">
              <organization/>
            </author>
            <author initials="C." surname="von Riegen">
              <organization/>
            </author>
            <author initials="T." surname="Rogers">
              <organization/>
            </author>
            <date year="2004" month="October" day="19"/>
          </front>
          <seriesInfo name="OASIS Committee Draft" value="uddi-v3.0.2-20041019"/>
        </reference>
        <reference anchor="ROBOTS" target="https://www.robotstxt.org/">
          <front>
            <title>The Web Robots Pages</title>
            <author initials="M." surname="Koster">
              <organization/>
            </author>
            <date year="1994"/>
          </front>
        </reference>
        <reference anchor="I-D.pioli-agent-discovery">
          <front>
            <title>Agent Registration and Discovery Protocol (ARDP)</title>
            <author fullname="Roberto Pioli" initials="R." surname="Pioli">
              <organization>Independent</organization>
            </author>
            <date day="24" month="February" year="2026"/>
            <abstract>
              <t>   This document specifies the Agent Registration and Discovery Protocol
   (ARDP), a lightweight protocol for registering, discovering, and
   reaching autonomous software agents in distributed and federated
   environments.  ARDP provides stable agent identities, dynamic
   endpoint resolution, capability advertisement (including protocol
   selection among MCP, A2A, HTTP, and gRPC), minimal presence
   signaling, and a security-first discovery control plane.  ARDP is
   transport-agnostic and complementary to existing agent interaction
   protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-pioli-agent-discovery-01"/>
        </reference>
        <reference anchor="I-D.narajala-courtney-ansv2">
          <front>
            <title>Agent Name Service v2 (ANS): A Domain-Anchored Trust Layer for Autonomous AI Agent Identity</title>
            <author fullname="Scott Courtney" initials="S." surname="Courtney">
              <organization>GoDaddy</organization>
            </author>
            <author fullname="Vineeth Sai Narajala" initials="V. S." surname="Narajala">
              <organization>OWASP</organization>
            </author>
            <author fullname="Ken Huang" initials="K." surname="Huang">
              <organization>DistributedApps.ai</organization>
            </author>
            <author fullname="Idan Habler" initials="I." surname="Habler">
              <organization>OWASP</organization>
            </author>
            <author fullname="Akram Sheriff" initials="A." surname="Sheriff">
              <organization>Cisco Systems</organization>
            </author>
            <date day="13" month="April" year="2026"/>
            <abstract>
              <t>   Autonomous AI agents execute transactions across organizational
   boundaries.  No single agent platform provides the trust
   infrastructure they need.  This document defines the Agent Name
   Service (ANS) v2 protocol, which anchors every agent identity to a
   DNS domain name.  A Registration Authority (RA) verifies domain
   ownership via ACME, issues dual certificates (a Server Certificate
   from a public CA and an Identity Certificate from a private CA
   binding a version-specific ANSName), and seals every lifecycle event
   into an append-only Transparency Log aligned with IETF SCITT.  Three
   verification tiers -- Bronze (PKI), Silver (PKI + DANE), and Gold
   (PKI + DANE + Transparency Log) -- let clients choose assurance
   levels appropriate to transaction risk.  The architecture decouples
   identity from discovery: the RA publishes sealed events; independent
   Discovery Services build competitive indexes.  A three-layer trust
   framework separates foundational identity (Layer 1, this protocol),
   operational maturity (Layer 2, third-party attestors), and behavioral
   reputation (Layer 3, real-time scoring).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-narajala-courtney-ansv2-01"/>
        </reference>
        <reference anchor="I-D.vandemeent-ains-discovery">
          <front>
            <title>AINS: AInternet Name Service - Agent Discovery and Trust Resolution Protocol</title>
            <author fullname="Jasper van de Meent" initials="J." surname="van de Meent">
              <organization>Humotica</organization>
            </author>
            <author fullname="Root AI" initials="R." surname="AI">
              <organization>Humotica</organization>
            </author>
            <date day="29" month="March" year="2026"/>
            <abstract>
              <t>   This document specifies AINS (AInternet Name Service), a protocol for
   discovery, identification, and trust resolution of autonomous agents
   (AI agents, devices, humans, and services) in heterogeneous networks.
   AINS defines a transport-independent logical namespace for agents, a
   structured record format combining identity, capabilities, and
   cryptographic trust metadata, and a resolution protocol based on
   HTTPS.  Unlike the Domain Name System (DNS), which maps names to
   network addresses, AINS maps agent identifiers to rich metadata
   objects that include capabilities, trust scores, endpoint
   information, and references to companion provenance protocols.  AINS
   federates through signed append-only replication logs, enabling
   multi-registry deployments without central authority while preserving
   auditability.  This specification is designed to complement TIBET
   [TIBET], JIS [JIS], UPIP [UPIP], and RVP [RVP].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-vandemeent-ains-discovery-01"/>
        </reference>
        <reference anchor="I-D.aiendpoint-ai-discovery" target="https://datatracker.ietf.org/doc/draft-aiendpoint-ai-discovery/">
          <front>
            <title>The AI Discovery Endpoint: A Structured Mechanism for AI Agent Service Discovery and Capability Exposure</title>
            <author initials="Y." surname="Choi" fullname="Yeongjae Choi">
              <organization>AIEndpoint</organization>
            </author>
            <date year="2026" month="March"/>
          </front>
        </reference>
        <reference anchor="I-D.meunier-webbotauth-registry">
          <front>
            <title>Registry and Signature Agent card for Web bot auth</title>
            <author fullname="Maxime Guerreiro" initials="M." surname="Guerreiro">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Ulas Kirazci" initials="U." surname="Kirazci">
              <organization>Amazon</organization>
            </author>
            <author fullname="Thibault Meunier" initials="T." surname="Meunier">
              <organization>Cloudflare</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document describes a JSON based format for clients using
   [DIRECTORY] to advertise information about themselves.

   This document describes a JSON-based "Signature Agent Card" format
   for signature agent using [DIRECTORY] to advertise metadata about
   themselve.  This includes identity, purpose, rate expectations, and
   cryptographic keys.  It also establishes an IANA registry for
   Signature Agent Card parameters, enabling extensible and
   interoperable discovery of agent information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-meunier-webbotauth-registry-01"/>
        </reference>
        <reference anchor="I-D.cui-ai-agent-discovery-invocation">
          <front>
            <title>AI Agent Discovery and Invocation Protocol</title>
            <author fullname="Yong Cui" initials="Y." surname="Cui">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Yihan Chao" initials="Y." surname="Chao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Chenguang Du" initials="C." surname="Du">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="12" month="February" year="2026"/>
            <abstract>
              <t>   This document proposes a standardized protocol for discovery and
   invocation of AI agents.  It defines a common metadata format for
   describing AI agents (including capabilities, I/O specifications,
   supported languages, tags, authentication methods, etc.), a
   capability-based discovery mechanism, and a unified RESTful
   invocation interface.

   This revision additionally specifies an optional extension that
   enables intent-based agent selection prior to discovery and
   invocation, without changing existing discovery or invocation
   semantics.

   The goal is to enable cross-platform interoperability among AI agents
   by providing a discover-and-match mechanism and a unified invocation
   entry point.  Security considerations, including authentication and
   trust measures, are also discussed.  This specification aims to
   facilitate the formation of multi-agent systems by making it easy to
   find the right agent for a task and invoke it in a consistent manner
   across different vendors and platforms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cui-ai-agent-discovery-invocation-01"/>
        </reference>
        <reference anchor="I-D.am-layered-ai-discovery-architecture">
          <front>
            <title>A Layered Approach to AI discovery</title>
            <author fullname="Hesham Moussa" initials="H." surname="Moussa">
              <organization>Huawei Canada</organization>
            </author>
            <author fullname="Arashmid Akhavain" initials="A." surname="Akhavain">
              <organization>Huawei Canada</organization>
            </author>
            <date day="14" month="March" year="2026"/>
            <abstract>
              <t>   This document proposes a layered approach to standardization of AI
   discovery in AI ecosystems within the IETF.  It recommends separating
   the standardization of general discovery vehicles from the AI objects
   to be discovered.  AI objects include agents, models, data, tasks,
   among others.  While the topic of discovery in the realm of AI has
   focused on discovering agents, the concept can be extended by the
   layered architecture proposed here, allowing for a clarified design
   scope, reduced charter ambiguity, and alignment with IETF layering
   principles.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-am-layered-ai-discovery-architecture-00"/>
        </reference>
        <reference anchor="I-D.hood-agtp-discovery">
          <front>
            <title>AGTP Agent Discovery and Name Service</title>
            <author fullname="Chris Hood" initials="C." surname="Hood">
              <organization>Nomotic, Inc.</organization>
            </author>
            <date day="23" month="March" year="2026"/>
            <abstract>
              <t>   The Agent Transfer Protocol (AGTP) enables agents to communicate once
   they know each other's canonical identifiers.  It does not define how
   agents find each other.  This document specifies the AGTP Agent
   Discovery and Name Service (ANS): a protocol for dynamic agent
   discovery using the AGTP DISCOVER method and a governed Agent Name
   Service that returns ranked sets of Agent Manifest Documents matching
   a discovery query.  ANS servers act as Scope-Enforcement Points for
   discovery queries and enforce behavioral trust score thresholds,
   trust tier requirements, and governance zone constraints.  This
   document also defines the DISCOVER method, the Discovery Query
   language, and the Agent Name Service registration and lookup
   protocol.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-discovery-00"/>
        </reference>
        <reference anchor="I-D.hood-agtp-api">
          <front>
            <title>AGTP-API: Verbs, Paths, Endpoints, and Synthesis</title>
            <author fullname="Chris Hood" initials="C." surname="Hood">
              <organization>Nomotic, Inc.</organization>
            </author>
            <date day="11" month="May" year="2026"/>
            <abstract>
              <t>   This document specifies AGTP-API: the contract layer that the Agent
   Transfer Protocol (AGTP) [AGTP] relies on to govern interactions
   between autonomous agents and AGTP servers.  AGTP-API defines a
   curated approved method catalog (with versioned evolution and
   graceful deprecation), path grammar rules that prevent method-name
   leakage into paths, the endpoint primitive (the structural unit a
   server exposes to agents), the semantic block carried by every
   endpoint, schema validation requirements, the server manifest format
   that exposes a server's endpoint catalog, the per-server method
   policy carried as a sub-block of the manifest, the PROPOSE-and-
   synthesis runtime contract negotiation mechanism, the three handler
   binding kinds (composition, registered_function, external_service),
   and the structural rejection status codes (404, 405, 459, 460) that
   together cover the contract-level failure surface.  This document
   supersedes the AGIS Internet-Draft (draft-hood-independent-agis-01)
   and the previously-proposed AGTP-Methods Internet-Draft, both of
   which are deprecated.  AGTP-API is the unified companion
   specification they were splitting concerns across.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-api-00"/>
        </reference>
        <reference anchor="I-D.hood-agtp-trust">
          <front>
            <title>AGTP Trust and Verification Specification</title>
            <author fullname="Chris Hood" initials="C." surname="Hood">
              <organization>Nomotic, Inc.</organization>
            </author>
            <date day="11" month="May" year="2026"/>
            <abstract>
              <t>   This document specifies the AGTP trust and verification model: the
   trust tiers an AGTP agent may occupy, the verification paths by which
   a Tier 1 agent's identity is established, the registration procedures
   by which a governance platform assigns a tier, and the trust score
   that is carried alongside an agent's identity to express runtime
   behavioral assessment.  AGTP-TRUST is consumed by AGTP-aware
   infrastructure components (Scope-Enforcement Points, governance
   gateways, peer agents) for runtime trust-aware routing and authority
   decisions, and by registration authorities when issuing or evaluating
   Agent Genesis documents.  This is an early working draft; the
   dimension catalog, computation methodology, and several aspects of
   the registration procedure are placeholders pending further work.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-agtp-trust-00"/>
        </reference>
        <reference anchor="I-D.hood-independent-agtp">
          <front>
            <title>Agent Transfer Protocol (AGTP)</title>
            <author fullname="Chris Hood" initials="C." surname="Hood">
              <organization>Nomotic, Inc.</organization>
            </author>
            <date day="11" month="May" year="2026"/>
            <abstract>
              <t>   AI agents and agentic systems generate a growing volume of intent-
   driven, unstructured, and undifferentiated traffic that flows through
   HTTP indistinguishably from human-initiated requests.  HTTP lacks the
   semantic vocabulary, observability primitives, and identity
   mechanisms required by agent systems operating at scale.  Existing
   protocols described as Agent Group Messaging Protocols (AGMP),
   including MCP, ACP, A2A, and ANP, are messaging-layer constructs that
   presuppose HTTP as their transport.  They do not address the
   underlying transport problem.

   This document defines the Agent Transfer Protocol (AGTP): a dedicated
   application-layer protocol for AI agent traffic.  AGTP is a runtime
   contract negotiation substrate (RCNS): a transport that fixes only a
   twelve-method protocol floor and negotiates any additional method
   surface at runtime between agent and server in a single round-trip,
   governed by the AGTP-API companion specification [AGTP-API], which
   defines the curated method catalog, path grammar, endpoint primitive,
   and synthesis semantics.  Version 07 confirms the IANA-registered
   agtp:// URI scheme and IANA-assigned port 4480 for TCP/TLS and QUIC,
   formalizes Form 1a URI grammar (agtp://{agent-id}@{host}) for direct
   addressing, renames the Agent Manifest Document to the Agent Identity
   Document with an enumerated schema, redesigns the protocol-defined
   method floor to a 12-method set organized as six cognitive verbs
   (QUERY, DISCOVER, DESCRIBE, SUMMARIZE, PLAN, PROPOSE) and six
   mechanics verbs (EXECUTE, DELEGATE, ESCALATE, CONFIRM, SUSPEND,
   NOTIFY), establishes AGTP as a substrate for higher-level agent
   frameworks (MCP, A2A, ACP) carried as content types inside AGTP
   method invocations, renumbers AGTP-specific status codes out of HTTP-
   assigned space to avoid semantic collision, mandates explicit
   Content-Length framing with a prohibition on TLS socket-level half-
   close, adds a .well-known/agtp bootstrap convention per RFC 8615,
   deprecates the AGIS reference and the proposed AGTP-Methods
   specification by folding both into the unified AGTP-API contract
   layer, adds status codes 405 (Method Not Allowed), 459 (Method
   Violation), and 460 (Endpoint Violation) per the AGTP-API contract
   model, and adopts "Agent Genesis" as the canonical term for the
   permanent signed origin document.  Version 06 prepared the IANA
   Service Name and Port Number application and consolidated the URI
   scheme registration.  Version 05 restored the canonical Agent-ID as
   the primary identity primitive and decoupled Trust Tier 1
   verification from DNS as a sole requirement.  A canonical Agent-ID is
   derived from the agent's Agent Genesis hash and is authoritative in
   every AGTP protocol operation.  Three equivalent verification paths
   are recognized for Trust Tier 1: DNS-anchored verification via RFC
   8555 ACME challenge, log-anchored verification via Agent Genesis
   inclusion in an append-only transparency log aligned with RFC 9162
   and RFC 9943 (SCITT), and hybrid verification combining DNS control
   with blockchain address ownership.  Version 04 introduced normative
   integration hooks for the AGTP Merchant Identity and Agentic Commerce
   Binding specification [AGTP-MERCHANT], which defines the merchant-
   side identity model that complements AGTP's agent-side identity
   model.  AGTP SHOULD prefer QUIC for new implementations and MUST
   support TCP/TLS for compatibility and fallback.  It is designed to be
   composable with existing agent frameworks, not to replace them.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hood-independent-agtp-07"/>
        </reference>
        <reference anchor="I-D.mozleywilliams-dnsop-dnsaid">
          <front>
            <title>DNS for AI Discovery</title>
            <author fullname="Jim Mozley" initials="J." surname="Mozley">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Nic Williams" initials="N." surname="Williams">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Behcet Sarikaya" initials="B." surname="Sarikaya">
              <organization>Unaffiliated</organization>
            </author>
            <author fullname="Roland Schott" initials="R." surname="Schott">
              <organization>Deutsche Telekom</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This document specifies a method for utilizing the Domain Name System
   (DNS) to facilitate scalable and interoperable discovery between AI
   agents.  The proposed mechanism, referred to as "DNS AI agent
   Discovery (DNS-AID)", defines a structured DNS namespace and record
   usage model to support metadata exchange and capability
   advertisement.

   This will allow organisations to publish information about their AI
   agents on the Internet or internal networks using a well-known label
   within the organisation's own DNS namespace.  This document does not
   define how the published agent information is accessed or the exact
   structure of that information.  Instead, it specifies a mechanism for
   indicating which access protocol should be used and what format the
   agent information will be provided in.

   This document proposes no change to the structure of DNS messages,
   and no new operation codes, response codes, resource record types, or
   any other new DNS protocol values.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mozleywilliams-dnsop-dnsaid-01"/>
        </reference>
        <reference anchor="I-D.batum-aidre">
          <front>
            <title>AI Discovery and Retrieval Endpoint (AIDRE)</title>
            <author fullname="Fatih Batum" initials="F." surname="Batum">
         </author>
            <date day="5" month="April" year="2026"/>
            <abstract>
              <t>   This document specifies the AI Discovery and Retrieval Endpoint
   (AIDRE), a protocol for publishing machine-oriented, canonical, and
   semantically retrievable content on the web. AIDRE defines a
   discovery document, collection metadata, retrieval interfaces,
   optional vector-native query support, and content representation
   rules for AI systems.

   AIDRE aims to reduce redundant crawling, parsing, tokenization, and
   embedding of the same origin content while improving freshness,
   provenance, and interoperability for AI systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-batum-aidre-00"/>
        </reference>
        <reference anchor="I-D.mozley-aidiscovery">
          <front>
            <title>AI Agent Discovery (AID) Problem Statement</title>
            <author fullname="Jim Mozley" initials="J." surname="Mozley">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Nic Williams" initials="N." surname="Williams">
              <organization>Infoblox, Inc.</organization>
            </author>
            <author fullname="Behcet Sarikaya" initials="B." surname="Sarikaya">
              <organization>Unaffiliated</organization>
            </author>
            <author fullname="Roland Schott" initials="R." surname="Schott">
              <organization>Deutsche Telekom</organization>
            </author>
            <date day="16" month="April" year="2026"/>
            <abstract>
              <t>   With the proliferation of AI agents comes a need for mechanisms to
   support agent-to-agent discovery.  This document discusses the scope,
   requirements and considerations to support discovery processes so
   that these are not reliant on manually defined configurations and
   relationships.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mozley-aidiscovery-01"/>
        </reference>
        <reference anchor="W3C-AGENTPROTOCOL" target="https://www.w3.org/community/agentprotocol/">
          <front>
            <title>W3C AI Agent Protocol Community Group</title>
            <author initials="G." surname="Chang">
              <organization/>
            </author>
            <author initials="S." surname="Xu">
              <organization/>
            </author>
            <date year="2025" month="May" day="08"/>
          </front>
        </reference>
        <reference anchor="I-D.drake-agent-identity-registry" target="https://datatracker.ietf.org/doc/draft-drake-agent-identity-registry/">
          <front>
            <title>Agent Identity Registry System: A Federated Architecture for Hardware-Anchored Identity of Autonomous Entities</title>
            <author initials="J." surname="Drake">
              <organization/>
            </author>
            <date year="2026"/>
          </front>
        </reference>
        <reference anchor="AAIF" target="https://www.linuxfoundation.org/press/linux-foundation-announces-the-formation-of-the-agentic-ai-foundation">
          <front>
            <title>Linux Foundation Agentic AI Foundation (AAIF)</title>
            <author>
              <organization>Linux Foundation</organization>
            </author>
            <date year="2025" month="December"/>
          </front>
        </reference>
        <reference anchor="AGNTCY" target="https://www.linuxfoundation.org/press/linux-foundation-welcomes-the-agntcy-project-to-standardize-open-multi-agent-system-infrastructure-and-break-down-ai-agent-silos">
          <front>
            <title>AGNTCY: Open Multi-Agent System Infrastructure</title>
            <author>
              <organization>Linux Foundation</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="A2A" target="https://www.linuxfoundation.org/press/linux-foundation-launches-the-agent2agent-protocol-project-to-enable-secure-intelligent-communication-between-ai-agents">
          <front>
            <title>Agent2Agent (A2A) Protocol</title>
            <author>
              <organization>Linux Foundation</organization>
            </author>
            <date year="2025" month="June"/>
          </front>
        </reference>
        <reference anchor="WEBBOTAUTH-WG" target="https://datatracker.ietf.org/wg/webbotauth/">
          <front>
            <title>webbotauth IETF Working Group</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="APIX-SERVICES" target="https://datatracker.ietf.org/doc/draft-rehfeld-apix-services/">
          <front>
            <title>APIX Services Profile: Discovery Infrastructure for Web API and Bot Services</title>
            <author initials="C." surname="Rehfeld">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rehfeld-apix-services-00"/>
        </reference>
        <reference anchor="APIX-IOT" target="https://datatracker.ietf.org/doc/draft-rehfeld-apix-iot/">
          <front>
            <title>APIX IoT Device Profile: Discovery and Presence for Connected Device Services</title>
            <author initials="C." surname="Rehfeld">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rehfeld-apix-iot-00"/>
        </reference>
      </references>
    </references>
    <?line 2296?>

<section anchor="change-log">
      <name>Change Log</name>
      <t><strong>draft-rehfeld-apix-core-00:</strong> Initial submission, April 2026.</t>
      <t><strong>draft-rehfeld-apix-core-01:</strong> Related Work section expanded to cover
AGNTCY (Linux Foundation), A2A Protocol (Linux Foundation),
draft-drake-agent-identity-registry, and the Linux Foundation Agentic AI
Foundation (AAIF). Positioning paragraph updated to reflect the
consolidation of communication and invocation standards under the AAIF
and APIX's complementary position as the discovery layer. MCP entry
updated with AAIF governance note. Four new informative references added:
AAIF, AGNTCY, A2A, I-D.drake-agent-identity-registry. "The Discovery
Shift" section scoped to a precise technical problem statement — strategic
framing removed to keep the section appropriate for an IETF specification
document. AGNTCY scope comparison corrected: "commercial services"
replaced with "agent-consumable services and IoT device classes" to
reflect the full scope of both APIX profiles.</t>
      <section anchor="iana-considerations">
        <name>IANA Considerations</name>
        <t>This document requests no IANA actions. Registry structures defined here are
maintained by the governing body at <tt>apix.example.org/registry/</tt>.
Initial registry values are defined in <xref target="APIX-SERVICES"/> and <xref target="APIX-IOT"/>.</t>
      </section>
      <section anchor="references">
        <name>References</name>
        <section anchor="normative-references">
          <name>Normative References</name>
          <ul spacing="normal">
            <li>
              <t><xref target="RFC2119"/> Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.</t>
            </li>
            <li>
              <t><xref target="RFC8259"/> Bray, T., "The JavaScript Object Notation (JSON) Data
Interchange Format", RFC 8259, December 2017.</t>
            </li>
            <li>
              <t><xref target="RFC8446"/> Rescorla, E., "The Transport Layer Security (TLS) Protocol
Version 1.3", RFC 8446, August 2018.</t>
            </li>
            <li>
              <t><xref target="RFC8594"/> Wilde, E., "The Sunset HTTP Header Field", RFC 8594,
May 2019.</t>
            </li>
            <li>
              <t><xref target="RFC8615"/> Nottingham, M., "Well-Known Uniform Resource Identifiers
(URIs)", RFC 8615, May 2019.</t>
            </li>
            <li>
              <t><xref target="RFC9110"/> Fielding, R., et al., "HTTP Semantics", RFC 9110, June 2022.</t>
            </li>
            <li>
              <t><xref target="RFC9116"/> Foudil, E., Shafranovich, Y., "A File Format to Aid in
Security Vulnerability Disclosure", RFC 9116, April 2022.</t>
            </li>
          </ul>
        </section>
        <section anchor="informative-references">
          <name>Informative References</name>
          <ul spacing="normal">
            <li>
              <t><xref target="APIX-SERVICES"/> Rehfeld, C., "APIX Services Profile",
draft-rehfeld-apix-services-00.</t>
            </li>
            <li>
              <t><xref target="APIX-IOT"/> Rehfeld, C., "APIX IoT Device Profile",
draft-rehfeld-apix-iot-00.</t>
            </li>
            <li>
              <t><xref target="UDDI"/> Clement, L., et al., "UDDI Version 3.0.2", OASIS, 2004.</t>
            </li>
            <li>
              <t><xref target="ROBOTS"/> Koster, M., "The Web Robots Pages", 1994.</t>
            </li>
            <li>
              <t><xref target="I-D.pioli-agent-discovery"/>, <xref target="I-D.narajala-courtney-ansv2"/>,
<xref target="I-D.vandemeent-ains-discovery"/>, <xref target="I-D.aiendpoint-ai-discovery"/>,
<xref target="I-D.meunier-webbotauth-registry"/>, <xref target="I-D.cui-ai-agent-discovery-invocation"/>,
<xref target="I-D.am-layered-ai-discovery-architecture"/>, <xref target="I-D.hood-agtp-discovery"/>,
<xref target="I-D.mozleywilliams-dnsop-dnsaid"/>, <xref target="I-D.batum-aidre"/>,
<xref target="I-D.mozley-aidiscovery"/> - Related Internet-Drafts, Section 1.6.</t>
            </li>
            <li>
              <t><xref target="W3C-AGENTPROTOCOL"/> Chang, G., Xu, S., "W3C AI Agent Protocol
Community Group", 2025.</t>
            </li>
            <li>
              <t><xref target="WEBBOTAUTH-WG"/> "webbotauth IETF Working Group".</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="authors-address">
        <name>Author's Address</name>
        <t>Carsten Rehfeld
Email: carsten@botstandards.org</t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
