| Internet-Draft | AIGA Protocol | January 2026 |
| Aylward | Expires 17 July 2026 | [Page] |
This document defines the Artificial Intelligence Governance Architecture (AIGA), an application-layer protocol for the discovery, authentication, and state management of Autonomous Agents. The protocol specifies a cryptographic handshake mechanism, a standard header schema for risk classification, and a transport-agnostic method for immutable activity logging via Merkle Trees. To address latency and enforcement concerns, this version introduces "Session Resumption" for high-frequency transactions and "Hardware-Enforced Termination" using Trusted Execution Environments (TEEs).¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 17 July 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.¶
As autonomous software agents (ASAs) proliferate, network operators require a standardized method to identify these entities and manage their operational state. Current protocols (HTTP, TLS) authenticate hosts but do not authenticate the autonomous logic executing on those hosts.¶
AIGA addresses this layer by defining:¶
A strictly typed Identity Certificate extension for Agents.¶
A "Fast-Path" session resumption mechanism to minimize latency.¶
A control plane for remote state modification verified by Hardware Roots of Trust.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
The AIGA architecture consists of four primary entities:¶
All AIGA-compliant agents MUST possess an X.509 v3 Certificate [RFC5280] containing the specific AIGA OID extensions defined below.¶
The certificate MUST include a SAN entry of type UniformResourceIdentifier using the aiga:// scheme. Example: aiga://authority-domain/agent-uuid.¶
This document defines the OID 1.3.6.1.4.1.99999.1 (TBD by IANA). The value of this extension MUST be an ASN.1 Sequence containing:¶
AIGA messages MAY be transported over HTTP/2 [RFC9113] or QUIC [RFC9000].¶
AIGA introduces the AIGA-State HTTP header field.
Syntax: AIGA-State = Agent-ID ";" Sequence-Num ";" Signature¶
To minimize cryptographic latency on high-frequency transactions, Agents SHOULD utilize the AIGA Session Resumption mechanism.¶
Initial Handshake: The Agent sends a signed AIGA-Hello to the Governance Node (GN) containing its Identity Certificate.¶
Token Issuance: The GN verifies the signature and issues a time-bound, symmetric Session-Token (valid for less than 3600 seconds).¶
Fast-Path Request: The Agent includes this token in the AIGA-Session header for subsequent peer-to-peer requests.¶
Peers verify the Session-Token via a low-latency HMAC check rather than a full Public Key verification.¶
The Agent MUST maintain an internal State Machine. Governance Nodes may modify this state via signed Control Messages.¶
For Risk Class 4 and 5 Agents (Autonomous Code Generation / Kinetic), software-level termination is considered insufficient. These Agents MUST execute within a Trusted Execution Environment (TEE) capable of Remote Attestation.¶
Attestation Heartbeat: The Agent MUST transmit a Hardware Attestation Quote signed by the Platform Endorsement Key (PEK) every 60 seconds. The Quote MUST certify that the hash of the running binary matches the immutable KernelHash.¶
Termination Enforcement: If the Governance Node issues a 0xFF (TERMINATE) opcode:¶
This document requests the registration of the following HTTP Header:¶
This document requests the registration of the OID:¶
Key Compromise: If an Agent's private key is compromised, a revocation request MUST be published to the Distributed Ledger.¶
Side-Channel Attacks: Implementers of the Hardware Enclave MUST ensure that speculative execution attacks (e.g., Spectre-class) cannot leak the Agent's private keys.¶