Internet-Draft Agent Problem Statement March 2026
Nennemann Expires 7 September 2026 [Page]
Workgroup:
NMOP
Internet-Draft:
draft-nennemann-agent-problem-statement-00
Published:
Intended Status:
Informational
Expires:
Author:
C. Nennemann
Independent Researcher

Problem Statement for Autonomous Agent Protocol Gaps

Abstract

The IETF autonomous agent landscape spans over 260 drafts touching agent communication, identity, safety, and operations, yet critical gaps remain where standardization is absent or insufficient. This document provides a condensed problem statement identifying eleven protocol gaps, classifies them by severity, and maps them to a suite of companion drafts that form a coherent solution framework. It is intended as an actionable reference for working group chairs, area directors, and protocol designers evaluating where autonomous-agent standardization efforts should focus.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 7 September 2026.

Table of Contents

1. Introduction

Autonomous software agents are moving from research prototypes to production deployments in network management, cloud orchestration, supply-chain logistics, and AI-driven workflows. A survey of IETF work reveals over 260 drafts relevant to agent capabilities, yet no single reference architecture ties them together. Several critical capabilities -- runtime behavioral verification, failure cascade prevention, cross-vendor human override -- lack any standardization at all.

This document distills the findings of a comprehensive gap analysis [ARXIV-GAP] into an actionable problem statement. It identifies eleven gaps, groups them by severity, and presents a solution roadmap of nine companion drafts. The full analysis, including a survey of existing IETF work across WIMSE, RATS, OAuth/GNAP, SCITT, and NMOP, is available in [I-D.nennemann-agent-dag-hitl-safety] and the companion arXiv paper [ARXIV-GAP].

The intended audience is working group chairs, area directors, and protocol designers who need a concise summary of what is missing and what to build next.

2. Terminology

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

The following terms are used throughout this document:

Agent:

A software component that acts on behalf of a principal (human or organizational) to perform tasks autonomously.

ECT (Execution Context Token):

A cryptographically signed token carrying execution context for an agent action. See [I-D.nennemann-wimse-ect].

ACP (Agent Context Policy):

A policy specifying permitted behaviors, resource limits, and escalation rules for an agent. See [I-D.nennemann-agent-dag-hitl-safety].

HITL (Human-in-the-Loop):

A control pattern requiring human approval before an agent action takes effect.

Cascade Failure:

A failure mode where an error in one agent propagates through a multi-agent workflow, causing successive agents to fail.

Override Signal:

A message from a human operator instructing an agent to halt, modify, or roll back its current action.

3. Problem Landscape

The autonomous agent ecosystem can be organized into four layers, each with distinct standardization gaps. The following diagram presents this reference architecture:

+-------------------------------------------------------------+
|                    HUMAN OPERATORS                           |
|             [Override & HITL Layer -- GAP 7]                 |
+-------------------------------------------------------------+
|                  AGENT INTERACTION LAYER                     |
|  +---------+  +---------+  +---------+  +---------+         |
|  | Agent A |<>| Agent B |<>| Agent C |<>| Agent D |         |
|  +----+----+  +----+----+  +----+----+  +----+----+         |
|       |  GAP 3:    |  GAP 10:   |  GAP 1:    |              |
|       |  Consensus |  Cap.Neg.  |  Behav.    |              |
|       |            |            |  Verif.    |              |
+-------+------------+------------+------------+--------------+
|                  EXECUTION LAYER (ECT)                       |
|  DAG Execution | Checkpoints | Rollback | Circuit Breakers  |
|  [GAP 2: Cascade Prevention]  [GAP 4: Rollback]             |
+-------------------------------------------------------------+
|                  POLICY & GOVERNANCE LAYER                   |
|  ACP-DAG-HITL | Trust Scoring | Assurance Profiles          |
|  [GAP 5: Federated Privacy]  [GAP 6: Cross-Domain Audit]    |
+-------------------------------------------------------------+
|                  INFRASTRUCTURE LAYER                        |
|  Identity | Discovery | Registration | Protocol Bridges     |
|  [GAP 8: Cross-Protocol]  [GAP 9: Resource Accounting]      |
|  [GAP 11: Performance Benchmarking]                          |
+-------------------------------------------------------------+
Figure 1: Agent Ecosystem Reference Architecture
Human Operators Layer:

Provides override and human-in-the-loop controls. Gap 7 addresses the absence of a cross-vendor override protocol.

Agent Interaction Layer:

Where agents communicate, negotiate capabilities (Gap 10), reach consensus (Gap 3), and undergo behavioral verification (Gap 1).

Execution Layer:

Manages DAG-based workflows with cascade prevention (Gap 2) and rollback (Gap 4), built on Execution Context Tokens [I-D.nennemann-wimse-ect].

Policy and Governance Layer:

Enforces privacy in federated learning (Gap 5) and cross-domain audit trails (Gap 6).

Infrastructure Layer:

Handles identity, discovery, cross-protocol migration (Gap 8), resource accounting (Gap 9), and performance benchmarking (Gap 11).

4. Critical Gaps

4.1. CRITICAL Severity

4.1.1. Gap 1: Agent Behavioral Verification

No standardized mechanism exists for runtime verification of agent policy compliance. RATS [RFC9334] covers platform attestation but not behavioral conformance. Without this, operators cannot detect drifted, compromised, or out-of-bounds agents -- especially dangerous in multi-agent workflows where one misbehaving agent corrupts downstream results. Addressed by [I-D.nennemann-agent-behavioral-verification].

4.1.2. Gap 2: Agent Failure Cascade Prevention

Multi-agent dependency chains lack standardized circuit breakers, failure isolation, or cascade containment. Current ad-hoc timeout and retry logic is neither interoperable nor sufficient for DAG-structured workflows. A single agent failure can cascade through an entire deployment with no automated containment. Addressed by [I-D.nennemann-agent-cascade-prevention].

4.2. HIGH Severity

4.2.1. Gap 3: Multi-Agent Consensus Protocols

No standardized consensus protocol exists for heterogeneous agents with different capabilities, trust levels, and policy constraints. Distributed systems consensus (Raft, Paxos) does not address agent-specific semantics like weighted voting and capability-based participation. Multi-vendor coordination remains impossible without proprietary mechanisms. Addressed by [I-D.nennemann-agent-consensus].

4.2.2. Gap 4: Real-Time Agent Rollback

No generalized rollback mechanism exists for autonomous agent actions. Protocol-specific approaches (e.g., NETCONF confirmed-commit) do not extend to arbitrary agent actions or coordinated multi-agent rollbacks. Operators cannot safely deploy agents for critical operations without manual intervention for every action. Addressed by [I-D.nennemann-agent-cascade-prevention].

4.2.3. Gap 5: Federated Agent Learning Privacy

Agents sharing operational data across domains need privacy guarantees beyond transport encryption: differential privacy parameters, data minimization for shared telemetry, and consent management. Without these, organizations face unacceptable privacy risks in federated agent ecosystems. Addressed by [I-D.nennemann-agent-federation-privacy].

4.2.4. Gap 6: Cross-Domain Agent Audit Trails

No standardized format exists for cross-domain audit trails that preserve causal ordering and provide tamper-evident logging. Execution Audit Tokens [I-D.nennemann-exec-audit] provide per-action records, but aggregation and correlation across domains remain undefined. Compliance requirements for automated decision-making make this urgent. Addressed by [I-D.nennemann-agent-cross-domain-audit].

4.2.5. Gap 7: Human Override Standardization

No cross-vendor protocol exists for sending override signals (emergency stop, graceful pause, forced rollback) to running agents. ACP-DAG-HITL [I-D.nennemann-agent-dag-hitl-safety] defines when human approval is required but not how to deliver override signals. This is a fundamental safety gap. Addressed by [I-D.nennemann-agent-override-protocol].

4.3. MEDIUM Severity

4.3.1. Gap 8: Cross-Protocol Agent Migration

Agents migrating between protocol environments (e.g., A2A to MCP) have no standard for preserving execution context, identity, and state across protocol boundaries. ECT [I-D.nennemann-wimse-ect] provides a protocol-neutral token but not migration procedures. Addressed by [I-D.nennemann-agent-federation-privacy].

4.3.2. Gap 9: Agent Resource Accounting and Billing

No mechanism exists for tracking and reconciling agent resource consumption across administrative domains. This is a prerequisite for sustainable multi-domain agent ecosystems with cost attribution. Addressed by [I-D.nennemann-agent-cross-domain-audit].

4.3.3. Gap 10: Agent Capability Negotiation

Agents lack a standardized protocol to dynamically advertise functions, agree on interaction protocols, and establish compatible parameters. HTTP content negotiation [RFC9110] provides basic discovery but not agent-specific capability semantics. Addressed by [I-D.nennemann-agent-consensus].

4.3.4. Gap 11: Agent Performance Benchmarking

No standardized metrics or methodology exists for evaluating agent performance across dimensions of accuracy, latency, resource efficiency, safety compliance, and behavioral consistency. Addressed by [I-D.nennemann-agent-behavioral-verification].

5. Solution Roadmap

5.1. Companion Draft Mapping

The following table maps each companion draft to the gaps it addresses:

5.2. Companion Draft Summaries

ECT ([I-D.nennemann-wimse-ect]):

Defines Execution Context Tokens that carry task identity, delegated authority, and constraints across agent boundaries. Foundational for all other drafts.

ACP-DAG-HITL ([I-D.nennemann-agent-dag-hitl-safety]):

Specifies Agent Context Policy tokens for DAG-based delegation with human-in-the-loop safety gates. Foundational for policy enforcement across all gaps.

Execution Audit ([I-D.nennemann-exec-audit]):

Defines per-action audit tokens for tamper-evident recording of agent actions. Foundation for cross-domain audit trails.

Behavioral Verification ([I-D.nennemann-agent-behavioral-verification]):

Defines behavioral profiles, verification evidence formats, and appraisal procedures for runtime agent compliance. Addresses Gaps 1 and 11.

Cascade Prevention ([I-D.nennemann-agent-cascade-prevention]):

Specifies circuit breakers, failure isolation, checkpointing, and rollback mechanisms for multi-agent workflows. Addresses Gaps 2 and 4.

Consensus ([I-D.nennemann-agent-consensus]):

Defines protocols for multi-agent agreement with weighted voting, capability negotiation, and policy-constrained proposals. Addresses Gaps 3 and 10.

Cross-Domain Audit ([I-D.nennemann-agent-cross-domain-audit]):

Specifies audit trail aggregation, correlation, and query across administrative domains, plus resource accounting. Addresses Gaps 6 and 9.

Override Protocol ([I-D.nennemann-agent-override-protocol]):

Defines a cross-vendor protocol for emergency stop, graceful pause, parameter modification, and forced rollback signals. Addresses Gap 7.

Federation Privacy ([I-D.nennemann-agent-federation-privacy]):

Specifies privacy-preserving mechanisms for federated agent learning and cross-protocol migration procedures. Addresses Gaps 5 and 8.

5.3. Dependencies

The companion drafts have the following dependency structure:

  behavioral-verification ---+
          |                   |
          v                   |
  cascade-prevention          |
          |                   |
          v                   v
  override-protocol    cross-domain-audit
          |                   |
          v                   v
      consensus        federation-privacy
Figure 2: Companion Draft Dependencies

Behavioral verification is foundational: its attestation format is consumed by cascade prevention and cross-domain audit. Cascade prevention defines failure containment that override protocol builds upon. Consensus extends behavioral verification with multi-agent agreement. Cross-domain audit provides the infrastructure that federation privacy adds privacy controls to.

7. Security Considerations

The gaps identified in this document have cross-cutting security implications:

Implementers of autonomous agent systems SHOULD treat the CRITICAL and HIGH severity gaps as security requirements and prioritize their resolution. The companion drafts each contain detailed security considerations specific to their scope.

8. IANA Considerations

This document has no IANA actions.

9. References

9.1. Normative References

[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/rfc/rfc2119>.
[RFC8174]
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, , <https://www.rfc-editor.org/rfc/rfc8174>.

9.2. Informative References

[ARXIV-GAP]
Nennemann, C., "Gap Analysis for Autonomous Agent Protocols in the IETF Landscape", , <https://arxiv.org/abs/2507.02492>.
[I-D.nennemann-agent-behavioral-verification]
"Agent Behavioral Verification and Performance Benchmarking", n.d., <https://datatracker.ietf.org/doc/draft-nennemann-agent-behavioral-verification/>.
[I-D.nennemann-agent-cascade-prevention]
"Agent Failure Cascade Prevention and Rollback", n.d., <https://datatracker.ietf.org/doc/draft-nennemann-agent-cascade-prevention/>.
[I-D.nennemann-agent-consensus]
"Multi-Agent Consensus and Capability Negotiation Protocols", n.d., <https://datatracker.ietf.org/doc/draft-nennemann-agent-consensus/>.
[I-D.nennemann-agent-cross-domain-audit]
"Cross-Domain Agent Audit Trails and Resource Accounting", n.d., <https://datatracker.ietf.org/doc/draft-nennemann-agent-cross-domain-audit/>.
[I-D.nennemann-agent-dag-hitl-safety]
"Agent Context Policy Token: DAG Delegation with Human Override", n.d., <https://datatracker.ietf.org/doc/draft-nennemann-agent-dag-hitl-safety/>.
[I-D.nennemann-agent-federation-privacy]
"Federated Agent Learning Privacy and Cross-Protocol Migration", n.d., <https://datatracker.ietf.org/doc/draft-nennemann-agent-federation-privacy/>.
[I-D.nennemann-agent-override-protocol]
"Standardized Human Override Protocol for Autonomous Agents", n.d., <https://datatracker.ietf.org/doc/draft-nennemann-agent-override-protocol/>.
[I-D.nennemann-exec-audit]
"Cross-Domain Execution Audit Tokens", n.d., <https://datatracker.ietf.org/doc/draft-nennemann-exec-audit/>.
[I-D.nennemann-wimse-ect]
"Execution Context Tokens for Distributed Agentic Workflows", n.d., <https://datatracker.ietf.org/doc/draft-nennemann-wimse-ect/>.
[RFC9110]
Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke, Ed., "HTTP Semantics", STD 97, RFC 9110, DOI 10.17487/RFC9110, , <https://www.rfc-editor.org/rfc/rfc9110>.
[RFC9334]
Birkholz, H., Thaler, D., Richardson, M., Smith, N., and W. Pan, "Remote ATtestation procedureS (RATS) Architecture", RFC 9334, DOI 10.17487/RFC9334, , <https://www.rfc-editor.org/rfc/rfc9334>.

Appendix A. Acknowledgments

The author thanks the participants of the WIMSE, RATS, and NMOP working groups for discussions that informed this analysis. The full gap analysis is available as [ARXIV-GAP].

Author's Address

Christian Nennemann
Independent Researcher