@@ -101,100 +101,69 @@ AGP builds on gRPC's core features while adding:
101
101
# Security Considerations
102
102
103
103
104
- The Agent Directory Protocol relies on several security mechanisms to ensure the
105
- integrity, authenticity, and privacy of directory records :
104
+ The Agent Gateway Protocol (AGP) relies on the Messaging Layer Security (MLS) protocol
105
+ to provide end-to-end security for group communications between agents.
106
106
107
- # # Record Signatures
107
+ # # MLS Integration
108
108
109
- All agent directory records MUST be digitally signed by the producing agent. The
110
- signature covers :
109
+ AGP uses MLS for the following security properties :
111
110
112
- * The complete set of OASF attributes
113
- * The agent's capabilities description
114
- * Any additional metadata including timestamps
115
- * Version information
111
+ * End-to-end encryption for all agent communications
112
+ * Forward secrecy and post-compromise security
113
+ * Group key management and membership changes
114
+ * Scalable group messaging security
116
115
117
- Signatures enable consumers to verify the authenticity and integrity of records
118
- independent of their location in the DHT.
116
+ # # Authentication and Identity
119
117
120
- # # Location Independence
118
+ Each agent MUST :
121
119
122
- Agent directory records are location-independent - their trust is derived from
123
- cryptographic signatures rather than network location. This means :
120
+ * Maintain cryptographic identities compatible with MLS
121
+ * Use certified credentials for initial authentication
122
+ * Validate peer credentials during connection establishment
123
+ * Support credential revocation and rotation
124
124
125
- * Records can be cached and replicated across the DHT
126
- * Consumers can verify records regardless of the serving node
127
- * Man-in-the-middle attacks are prevented through signature verification
128
- * Trust is bound to cryptographic identities rather than network addresses
125
+ # # Group Security
129
126
130
- # # Key Management
127
+ MLS provides the following guarantees for agent groups :
131
128
132
- Agents MUST generate and maintain cryptographic key pairs following these requirements :
133
-
134
- * Use of asymmetric cryptography (e.g., Ed25519) for signing
135
- * Private keys MUST be properly secured by agents using hardware security modules where available
136
- * Public keys are distributed as part of agent records
137
- * Key rotation procedures MUST be supported and documented
138
- * Revocation mechanisms MUST be provided
139
-
140
- # # DHT Security
141
-
142
- The DHT implementation MUST provide :
143
-
144
- * Node authentication to prevent Sybil attacks
145
- * Secure routing to prevent record tampering
146
- * Replication policies to ensure availability
147
- * Access controls for record updates
148
- * Protection against eclipse attacks
149
- * Rate limiting of requests
150
- * Peer reputation tracking
129
+ * Continuous group key updates
130
+ * Secure member addition and removal
131
+ * Protection against message forgery
132
+ * Perfect forward secrecy for all messages
151
133
152
134
# # Transport Security
153
135
154
- All protocol interactions MUST use secure transport with :
136
+ All AGP connections MUST use :
155
137
156
- * Mutual TLS authentication between nodes
157
- * Perfect forward secrecy
138
+ * TLS 1.3 or higher for transport security
158
139
* Strong cipher suites as defined in TLS 1.3
159
140
* Certificate-based authentication
160
- * Revocation checking
161
-
162
- Implementations MUST NOT support :
163
-
164
- * Plaintext communications
165
- * Weak cipher suites
166
- * Older TLS versions
167
-
168
- # # Privacy Considerations
169
-
170
- The protocol implements privacy protection through :
171
-
172
- * Minimal attribute disclosure
173
- * Encrypted record contents
174
- * Anonymous routing capabilities
175
- * Pseudonymous agent identities
176
- * Access control mechanisms
141
+ * Perfect forward secrecy
177
142
178
143
# # Operational Security
179
144
180
- Implementers MUST consider :
181
-
182
- * Regular key rotation schedules
183
- * Secure bootstrapping procedures
184
- * Node authentication policies
185
- * Resource exhaustion protections
186
- * Monitoring and alerting systems
187
- * Incident response procedures
145
+ Implementations MUST :
188
146
147
+ * Maintain secure key storage
148
+ * Support MLS epoch advancement
149
+ * Implement proper credential management
150
+ * Monitor for security events
151
+ * Support secure group state recovery
189
152
190
- # IANA Considerations
153
+ # # Privacy Considerations
191
154
192
- This document has no IANA actions.
155
+ AGP with MLS provides :
193
156
157
+ * Metadata protection
158
+ * Group membership privacy
159
+ * Participant anonymity options
160
+ * Traffic analysis resistance
194
161
195
- --- back
162
+ # # Implementation Requirements
196
163
197
- # Acknowledgments
198
- {:numbered="false"}
164
+ Implementations MUST NOT :
199
165
200
- TODO acknowledge.
166
+ * Use non-MLS encryption schemes
167
+ * Support downgrades to less secure modes
168
+ * Allow plaintext communication
169
+ * Skip credential verification
0 commit comments