Skip to content

Commit 38cb64a

Browse files
committed
docs: init
Signed-off-by: Luca Muscariello <lumuscar@cisco.com>
1 parent 3d77667 commit 38cb64a

File tree

1 file changed

+41
-72
lines changed

1 file changed

+41
-72
lines changed

draft-muscariello-agp.md

Lines changed: 41 additions & 72 deletions
Original file line numberDiff line numberDiff line change
@@ -101,100 +101,69 @@ AGP builds on gRPC's core features while adding:
101101
# Security Considerations
102102

103103

104-
The Agent Directory Protocol relies on several security mechanisms to ensure the
105-
integrity, authenticity, and privacy of directory records:
104+
The Agent Gateway Protocol (AGP) relies on the Messaging Layer Security (MLS) protocol
105+
to provide end-to-end security for group communications between agents.
106106

107-
## Record Signatures
107+
## MLS Integration
108108

109-
All agent directory records MUST be digitally signed by the producing agent. The
110-
signature covers:
109+
AGP uses MLS for the following security properties:
111110

112-
* The complete set of OASF attributes
113-
* The agent's capabilities description
114-
* Any additional metadata including timestamps
115-
* Version information
111+
* End-to-end encryption for all agent communications
112+
* Forward secrecy and post-compromise security
113+
* Group key management and membership changes
114+
* Scalable group messaging security
116115

117-
Signatures enable consumers to verify the authenticity and integrity of records
118-
independent of their location in the DHT.
116+
## Authentication and Identity
119117

120-
## Location Independence
118+
Each agent MUST:
121119

122-
Agent directory records are location-independent - their trust is derived from
123-
cryptographic signatures rather than network location. This means:
120+
* Maintain cryptographic identities compatible with MLS
121+
* Use certified credentials for initial authentication
122+
* Validate peer credentials during connection establishment
123+
* Support credential revocation and rotation
124124

125-
* Records can be cached and replicated across the DHT
126-
* Consumers can verify records regardless of the serving node
127-
* Man-in-the-middle attacks are prevented through signature verification
128-
* Trust is bound to cryptographic identities rather than network addresses
125+
## Group Security
129126

130-
## Key Management
127+
MLS provides the following guarantees for agent groups:
131128

132-
Agents MUST generate and maintain cryptographic key pairs following these requirements:
133-
134-
* Use of asymmetric cryptography (e.g., Ed25519) for signing
135-
* Private keys MUST be properly secured by agents using hardware security modules where available
136-
* Public keys are distributed as part of agent records
137-
* Key rotation procedures MUST be supported and documented
138-
* Revocation mechanisms MUST be provided
139-
140-
## DHT Security
141-
142-
The DHT implementation MUST provide:
143-
144-
* Node authentication to prevent Sybil attacks
145-
* Secure routing to prevent record tampering
146-
* Replication policies to ensure availability
147-
* Access controls for record updates
148-
* Protection against eclipse attacks
149-
* Rate limiting of requests
150-
* Peer reputation tracking
129+
* Continuous group key updates
130+
* Secure member addition and removal
131+
* Protection against message forgery
132+
* Perfect forward secrecy for all messages
151133

152134
## Transport Security
153135

154-
All protocol interactions MUST use secure transport with:
136+
All AGP connections MUST use:
155137

156-
* Mutual TLS authentication between nodes
157-
* Perfect forward secrecy
138+
* TLS 1.3 or higher for transport security
158139
* Strong cipher suites as defined in TLS 1.3
159140
* Certificate-based authentication
160-
* Revocation checking
161-
162-
Implementations MUST NOT support:
163-
164-
* Plaintext communications
165-
* Weak cipher suites
166-
* Older TLS versions
167-
168-
## Privacy Considerations
169-
170-
The protocol implements privacy protection through:
171-
172-
* Minimal attribute disclosure
173-
* Encrypted record contents
174-
* Anonymous routing capabilities
175-
* Pseudonymous agent identities
176-
* Access control mechanisms
141+
* Perfect forward secrecy
177142

178143
## Operational Security
179144

180-
Implementers MUST consider:
181-
182-
* Regular key rotation schedules
183-
* Secure bootstrapping procedures
184-
* Node authentication policies
185-
* Resource exhaustion protections
186-
* Monitoring and alerting systems
187-
* Incident response procedures
145+
Implementations MUST:
188146

147+
* Maintain secure key storage
148+
* Support MLS epoch advancement
149+
* Implement proper credential management
150+
* Monitor for security events
151+
* Support secure group state recovery
189152

190-
# IANA Considerations
153+
## Privacy Considerations
191154

192-
This document has no IANA actions.
155+
AGP with MLS provides:
193156

157+
* Metadata protection
158+
* Group membership privacy
159+
* Participant anonymity options
160+
* Traffic analysis resistance
194161

195-
--- back
162+
## Implementation Requirements
196163

197-
# Acknowledgments
198-
{:numbered="false"}
164+
Implementations MUST NOT:
199165

200-
TODO acknowledge.
166+
* Use non-MLS encryption schemes
167+
* Support downgrades to less secure modes
168+
* Allow plaintext communication
169+
* Skip credential verification

0 commit comments

Comments
 (0)