<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-yao-catalist-problem-space-analysis-01" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="AI Agent Protocol, A2A, MCP ">Problem Space Analysis of AI Agent Protocols in IETF</title>
    <seriesInfo name="Internet-Draft" value="draft-yao-catalist-problem-space-analysis-01"/>
    <author initials="K." surname="Yao" fullname="Kehan Yao">
      <organization>China Mobile</organization>
      <address>
        <email>yaokehan@chinamobile.com</email>
      </address>
    </author>
    <author initials="Z." surname="Sarker" fullname="Zaheduzzamam Sarker">
      <organization>Nokia</organization>
      <address>
        <email>zaheduzzaman.sarker@nokia.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <abstract>
      <?line 33?>

<t>This document aims to identify IETF-relevant problem space and potential areas and working groups, exploring internal and external coordination for AI Agent protocols by analyzing open source efforts. It may serve as a target for CATALIST BoF discussions.</t>
    </abstract>
  </front>
  <middle>
    <?line 37?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>With the rapid development of AI technology, AI Agents are becoming key Internet interaction entities, driving growing demand for Agent-to-Agent (A2A) and Agent-to-Tool (A2T) interworking. Open source projects like A2A, Model Context Protocol (MCP) are actively advancing related protocols with focused use cases. While these efforts lay a preliminary foundation, there are still some missing pieces and potential protocol design aspects that should be handled by open standardization body like IETF to ensure global interoperability.</t>
      <t>IETF has held multiple side meetings on AI agent protocol during IETF 123 and IETF 124 meetings, bringing discussions over AI agent identity and identifier, discovery, interaction, authorization, and multi-modal transport. These meetings clarified key directions and highlighted standardization urgency.</t>
      <t>Coordinating A2A list of efforts (CATALIST) BoF meeting is planned in IETF125 meeting to facilitate consensus on the actual scope that IETF should work on, figure out potential area(s) and working group(s) to proceed the work, and explore coordination activities in and out IETF.</t>
      <t>This document does not propose any detailed solution or protocol, but tries to propose the problem space that IETF should care about by analyzing existing open source projects efforts. This document may serve as a target document for CATALIST BoF meeting discussion.</t>
    </section>
    <section anchor="definition-of-terms">
      <name>Definition of Terms</name>
      <t>** AI Agent: An autonomous, adaptive intelligent software system that uses AI to complete a specific task. While doing so it makes decisions, executes actions, and interacts with other Agents, tools, or humans.</t>
      <t>** A2A: Agent-to-Agent, Interconnection and interaction between AI Agents (data transmission, context sharing, collaboration) standardized by dedicated protocols for cross-vendor interoperability.</t>
      <t>** A2T: Agent-to-Tool, Interaction between AI Agents and external tools (APIs, databases, etc.), focusing on standardizing tool invocation to leverage external resources efficiently.</t>
    </section>
    <section anchor="inter-domain-discovery">
      <name>Problem Space Issue 1: Inter-domain Discovery</name>
      <section anchor="a2a-coverage">
        <name>A2A Coverage</name>
        <t>Existing A2A protocol (as analyzed from available open source schema definitions <xref target="A2A-spec"/>) provides a foundational discovery mechanism centered on the "Agent Card" construct, which encapsulates critical metadata foragent identification and interaction:</t>
        <t>** Core Metadata: Agents advertise identity (name, version, provider), capabilities, skills, authentication requirements, input/output modes, and communication interfaces (URLs, protocol bindings) via the Agent Card.</t>
        <t>** Static Retrieval: Protocols support direct retrieval of Agent Card metadata via dedicated requests (e.g., Get Agent Card Request), enabling clients to obtain necessary information to initiate communication.</t>
        <t>** Tenant Differentiation: A "tenant" field supports basic multi-tenancy, allowing agents to serve multiple isolated groups within a single administrative domain.</t>
        <t>** Extension Points: Agent Extension allows agents to declare custom protocol extensions, enabling domain-specific discovery metadata.</t>
      </section>
      <section anchor="mcp-coverage">
        <name>MCP Coverage</name>
        <t>MCP is a typical A2T protocol. Since MCP connects tools to the agent, the developer will have to know beforehand the tools urls and thus it is done in a manual local configs manner. The usual approch is to provide resource links as a primary application entry point. Existing MCP protocol (as analyzed from available open source schema definitions <xref target="MCP-spec"/>).</t>
      </section>
      <section anchor="gaps-and-potential-work-space-in-open-internet">
        <name>Gaps and Potential Work Space in Open Internet</name>
        <t>The current discovery mechanisms are insufficient for open Internet deployments, where agents and clients operate across administrative domains, lack pre-configured knowledge of each other, and require dynamic, secure discovery. Current A2A protocol allow three types of extension on discovery mechanisms. A Well-known URI labelled by server domain, registry or catalog based approach, and direct configuration. Based on this, in open Internet, the following should be considered:</t>
        <t>** Dynamic Directory Services: Open Internet scenarios require agents to be discoverable via standardized directory services or registries. The current model relies on clients having prior knowledge of an agent's URL to retrieve its Agent Card, preventing "directory-based discovery" of unknown agents.</t>
        <t>** Cross-Domain Addressing: There is no standardized mechanism for resolving agent identifiers to network locations across domains.</t>
        <t>** Domain Identification and Trust: Protocols lack standardized "domain" identifiers (e.g., organizational ID, network domain) and mechanisms to express cross-domain trust relationships. Clients cannot easily determine an agent's domain or whether their local domain trusts it.</t>
        <t>** Dynamic Metadata Synchronization: Agent Card updates (e.g.,capability changes, endpoint updates) are not propagated across domains. Cross-domain clients may rely on stale metadata, leading to failed interactions.</t>
      </section>
    </section>
    <section anchor="session-state-management">
      <name>Problem Space Issue 2: End-to-End Session State Management</name>
      <section anchor="a2a-coverage-1">
        <name>A2A Coverage</name>
        <t>Existing A2A protocol creates a "TASK" object struct, which serves as the core unit of session management, providing a robust foundation for tracking interaction lifecycles between AI agents:</t>
        <t>** Task Object: A Task aggregates all session-related state, including a unique id (task_ID), status (the current status of a Task, including state and a message), history (message log), artifacts (task outputs),and contextId (Unique identifier for the contextual collection of interactions).</t>
        <t>** Interaction State Machine: A comprehensive state machine(SUBMITTED, WORKING, COMPLETED, FAILED, CANCELED,INPUT_REQUIRED, AUTH_REQUIRED, REJECTED) covers key interaction scenarios, including user input prompts and authentication interruptions.</t>
        <t>** Synchronous/Asynchronous/Streaming Modes: Protocol supports synchronous requests, asynchronous requests (via "pushNotifications"), and streaming responses for incremental results.</t>
      </section>
      <section anchor="mcp-coverage-1">
        <name>MCP Coverage</name>
        <t>MCP is stateful per connection and stateless across connections. It does not support session resumption and native session timeouts, applicaitons can retry and that it implementaiton specific.</t>
      </section>
      <section anchor="gaps-and-potential-work-space-in-open-internet-1">
        <name>Gaps and Potential Work Space in Open Internet</name>
        <t>While the core session model is relatively robust, open Internet deployments impose additional requirements for reliability, and interoperability across heterogeneous implementations:</t>
        <t>** Session Timeout and Expiration: A2A Protocol lacks standardized session timeout, idle timeout, and expiration mechanisms. Servers cannot automatically clean up stale sessions, leading to resource leaks, and clients cannot reliably determine if a session is still valid.</t>
        <t>** Context Propagation Rules: While contextId supports cross-task context, A2A protocol does not standardize how context is inherited (e.g., which fields are carried over to new tasks), truncated (e.g., handling long message histories), or merged (e.g., combining contexts from multiple agents). This leads to inconsistent behavior across implementations.</t>
        <t>** Session Recovery and Reconnection: The protocol lacks detailed mechanisms to recover sessions after network disconnections. Clients cannot resume streaming responses, confirm the last received message, or continue partial task execution. Current designs assume best-effort reconnection semantics and do not specify maximum recovery windows or reconnection deadlines. This gap is particularly critical for long-running or mission-critical agent workflows that rely on uninterrupted session continuity.</t>
        <t>** User-Session Binding: Protocols only support tenant isolation but lack standardized user identity fields. This prevents user-level session isolation, cross-device session synchronization, and user-specific session management.</t>
        <t>** Extended State Semantics: The state machine lacks semantics for long-running interactions, such as SUSPENDED (temporarily paused), or PENDING_EXTERNAL (e.g., waiting for a response from an external system). This forces long-running tasks to remain in WORKING state, leading to ambiguous semantics.</t>
        <t>** Session level constrains: While A2A allows message metadata to provid a deadline, it does not have any scheduling gurantee or univarsal deadline. Session-level Quality-of-Service (QoS) attributes, such as maximum task-completion deadlines, bounded execution times, or task priority levels attached to session operations left unclear or to the application implementaiton.</t>
      </section>
    </section>
    <section anchor="fine-grained-authorization">
      <name>Problem Space Issue 3: Fine-Grained Authorization</name>
      <section anchor="a2a-coverage-2">
        <name>A2A Coverage</name>
        <t>Existing A2A protocol provides a foundational authorization framework covering high-level access control requirements:</t>
        <t>** OAuth Scope Support: OAuth 2.0 flows support coarse-grained permission grants.</t>
      </section>
      <section anchor="mcp-coverage-2">
        <name>MCP Coverage</name>
        <t>MCP incorporate transport level authorization using OAuth 2.1 and OAuth 2.0 protocol. However, it implements a subset of protocol features for simplicity.</t>
      </section>
      <section anchor="gaps-and-potential-work-space-in-open-internet-2">
        <name>Gaps and Potential Work Space in Open Internet</name>
        <t>The current authorization framework is insufficient for open Internet deployments, where cross-domain access, fine-grained resource control,and dynamic trust relationships are required:</t>
        <t>** Resource-Level Authorization: Protocols only support agent-level authorization. There is no mechanism to enforce permissions at the resource level (e.g., Task, Artifact, or Message), preventing use cases such as "allow read access to this task but not that one".</t>
        <t>** Delegation Authorization: Cross-domain and multi-agent scenarios require delegation (e.g., Agent A acting on behalf of a user to access Agent B). Protocols lack standardized delegation mechanisms, including delegation scope, time limits,and revocation.</t>
        <t>** Cross-Domain Permission Propagation: When an agent delegates a task to a cross-domain agent, there is no mechanism to propagate permissions in a controlled manner (e.g., "Agent A can access Agent B's read skill on behalf of the user, but not write"). This leads to either over-privileged delegation or failed cross-domain interactions.</t>
        <t>** Authorization Auditing: There is no standardized mechanism to log authorization events (e.g., who accessed what resource, when, with what permission). This hinders compliance with regulatory requirements and security incident investigation.</t>
      </section>
    </section>
    <section anchor="multi-modal-transport">
      <name>Problem Space Issue 4: Multi-Modal Transport</name>
      <section anchor="a2a-coverage-3">
        <name>A2A Coverage</name>
        <t>Existing A2A protocols provide a foundational multi-modal transmission framework centered on the "part" construct, enabling exchange of diverse data types:</t>
        <t>** Unified Multi-Modal Carrier: The "part" construct supports multiple data types, including text, binary data, etc., with "mediaType" to indicate the data format(e.g., text/plain, application/json, image/png).</t>
        <t>** Streaming Multi-Modal Transmission: The protocol supports incremental transmission of multi-modal data, including (e.g.,streaming video frames, incremental text + images).</t>
      </section>
      <section anchor="mcp-coverage-3">
        <name>MCP Coverage</name>
        <t>MCP is desinged primarity for text based JSON-RPC communication.</t>
      </section>
      <section anchor="gaps-and-potential-work-space-in-open-internet-3">
        <name>Gaps and Potential Work Space in Open Internet</name>
        <t>While the core multi-modal framework is functional, open Internet deployments require additional support for large data, dynamic adaptation, and interactive use cases:</t>
        <t>** Large File and Chunked Transmission: There is no support for chunked upload/download of large multi-modal data (e.g., videos, high-resolution images). The raw field uses base64 encoding for binary data, which is inefficient for large files, and there is no mechanism for hash verification.
** latency bounded transmission: The protocols lack mechanism for predictable/controlled ordering and loss handling of task for critical agent message. As a result, timing-sensitive agent behaviors (e.g., cooperative planning loops ) cannot rely on predictable inter-agent message timing.</t>
        <t>** Ordering, and loss-handling of messages : MCP and A2A both lack mechanisms for conveying message ordering requirements across multi-modal data transmission. Similarly, no mechanisms exists to distinguish between messages that e.g. must be reliably delivered, those that may be dropped or superseded.</t>
        <t>** Message importance/scheduling support : While MCP has non-interperable way to annotate priority as a tool argument, both MCP and A2A left prioritization and scheduling of message and task completion to the host of the application or agent orchastrator, not in the protocol. This would be a potential feature required in cross domain functioning of agents.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Beyond identity authentication and authorization, Agent interconnection faces additional security challenges that require IETF attention to ensure ecosystem security and trustworthiness.</t>
      <t>** Data Encryption: All Agents interaction data (context, task requests, results) must be encrypted in transit  and at rest to prevent tampering. The IETF should enforce encryption requirements for multi-modal data and ensure compatibility with existing TLS standards.</t>
      <t>** Anonymity and Privacy: Agent interactions may involve sensitive user/Agent data. The IETF should investigate privacy-preserving mechanisms to protect data while enabling effective interconnection.</t>
      <t>** Malicious Agent Mitigation: Malicious Agents may launch prompt injection, or spoofing attacks. The IETF should investigate attack detection and mitigation mechanisms.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="MCP-spec" target="https://modelcontextprotocol.io/specification/2025-11-25/basic/authorization">
        <front>
          <title>MCP Specification</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="A2A-spec" target="https://a2a-protocol.org/latest/definitions/">
        <front>
          <title>A2A Specification</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
    </references>
    <?line 187?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
