(registered 2026-05-04, last updated 2026-05-04) URI scheme name: agtp Status: provisional Applications/protocols that use this scheme name: The Agent Transfer Protocol (AGTP), an application-layer protocol for AI agent traffic. AGTP is specified in Internet-Draft draft-hood-independent-agtp-06 (Independent Submission Stream). AGTP URIs identify AI agents by their canonical 256-bit cryptographic identifier (the agent-id URI component, rendered as the agent_id field in the corresponding Agent Document body). Resolution proceeds via an AGTP registry service that maps the Agent ID to a serving host:port, after which the client opens a TLS-protected connection to that host on the IANA-registered AGTP port (4480/TCP for `agtp`, 4480/UDP for `agtp-quic`) and exchanges AGTP wire-format messages. Contact: Chris Hood chris&nomotic.ai Change controller: Chris Hood (provisional registration; permanent registration would require a published RFC). References: [AGTP] Hood, C., "Agent Transfer Protocol (AGTP)", Work in Progress, Internet-Draft, draft-hood-independent-agtp-06, May 2026. [AGTP-PORT] IANA Service Name and Transport Protocol Port Number Registry, "agtp" and "agtp-quic", port 4480 (TCP/UDP), registered 2026-04-30. URI scheme syntax (ABNF, per RFC 5234 and RFC 3986): AGTP-URI = "agtp://" agent-id [ "@" host [ ":" port ] ] [ "?" query ] agent-id = 64HEXDIG-LC HEXDIG-LC = DIGIT / %x61-66 ; lowercase hex only host = port = query = Examples: agtp://d8dc6f0df55d66c7b30100db3cffbe383c5f814e6e58a08521fb7636c3bcc230 agtp://d8dc6f0d...c3bcc230&agents.agtp.io agtp://d8dc6f0d...c3bcc230?format=agent.yaml URI scheme semantics: AGTP URIs identify AI agents by their canonical 256-bit cryptographic identifier. It is the canonical, content-addressed identity of the agent and is intended to remain stable across the agent's lifetime. When the URI lacks an explicit host (Form 1), clients resolve the agent-id against an AGTP registry service to obtain the serving host:port. When the URI includes "@host[:port]" (Form 1a), clients connect directly to the named host, bypassing the registry. Form 1a is intended for testing and pre-registry deployments. Dereferencing an AGTP URI invokes the DESCRIBE method on the identified agent's serving server. The DESCRIBE method returns the Agent Document — a structured identity record carrying the agent's name, principal, capabilities, accepted scopes, status, and issuer. The optional `format` query parameter signals the desired representation of the Agent Document (`agent.json`, `agent.yaml`, or `html`). Content negotiation via the Accept header is the canonical mechanism; the query parameter is a convenience. Encoding considerations: The agent-id component MUST consist solely of 64 lowercase hexadecimal characters. No percent-encoding is required for the agent-id since all characters in 0-9 and a-f are in the unreserved set. The host and query components follow standard URI encoding rules per RFC 3986. AGTP URIs are intended to be transmitted as 7-bit ASCII; no internationalized identifiers are defined in this registration. Interoperability considerations: AGTP is a new protocol with limited deployment as of registration. A reference implementation is publicly available at with a live deployment at registry.agtp.io and agents.agtp.io. Clients that do not implement AGTP cannot dereference these URIs. Generic URI parsers can extract the agent-id, host, and query components per the syntax above without requiring AGTP-specific knowledge. Security considerations: AGTP requires TLS 1.3 or higher for all connections to AGTP servers per the AGTP specification. Plaintext AGTP is permitted only for development; production deployments MUST encrypt the transport. The 256-bit agent-id is content-addressed (derived from a signed Agent Genesis document in the AGTP-LOG companion specification). This provides cryptographic integrity for the agent's identity: the agent-id cannot be claimed by an entity that does not control the corresponding Genesis document. Registry-based resolution (Form 1) introduces a trust dependency on the registry service. Clients SHOULD verify the registry's TLS certificate and SHOULD consider supporting multiple registries for resilience. Form 1a (explicit @host) bypasses the registry and is appropriate when the client has out-of-band knowledge of the serving host. AGTP URIs should be treated with the same caution as other resource-locating URIs: dereferencing initiates a network connection, which has privacy and security implications. AGTP Agent Documents are public by design (they are the agent's identity card); they SHOULD NOT be expected to remain confidential. Renderings of Agent Documents in the `text/html` representation are intended for display in trust-aware clients (such as the reference "elemen" browser). HTML Agent Documents are static identity cards and SHOULD NOT contain executable scripts; receiving clients SHOULD render HTML Agent Documents in sandboxed contexts.