<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-morrison-identity-accord-00" category="info" submissionType="independent" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Identity Accord">Identity Accord Protocol: A Peer Ceremony for Bilateral Agreements Between Identity-Substrate-Bound Principals</title>
    <seriesInfo name="Internet-Draft" value="draft-morrison-identity-accord-00"/>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
      <address>
        <postal>
          <city>Cronulla, NSW</city>
          <country>Australia</country>
        </postal>
        <email>blake@truealter.com</email>
      </address>
    </author>
    <date year="2026" month="May"/>
    <abstract>
      <?line 64?>

<t>This memo specifies the Identity Accord Protocol, a peer ceremony
by which two principals, each represented by an organisational
identity substrate and acting under a recorded delegation from a
legal entity, execute a bilateral agreement as a portable,
self-verifying COSE-signed CBOR document.  The protocol composes
DNS-based substrate discovery, Ed25519 sovereign signatures, an
append-only identity log, and a tamper-evidence descriptor quorum
into a single artefact that is verifiable by any third party with
access to the public DNS, the parties' identity logs, and an
on-chain anchor of the agreement's content hash.  The protocol does
not require a central registry, a designated verifier, or any
infrastructure operated by the specification's author; verification
succeeds when the author's reference deployment is offline.  The
canonical bilateral target is a mutual non-disclosure agreement,
but the wire format generalises to any bilateral consent envelope
between two legal entities each represented by an identity
substrate.  An associated MCP tool surface, an associated pre-send
enforcement gate, and an associated disclosure-ledger schema are
specified, all of which are optional layers above the wire format.
The memo is Informational; the underlying COSE and CBOR formats
are normative per <xref target="RFC9052"/> and <xref target="RFC8949"/>.</t>
    </abstract>
  </front>
  <middle>
    <?line 88?>

<section anchor="status-of-this-memo">
      <name>Status of This Memo</name>
      <t>This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.</t>
      <t>Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF).  Note that other groups may also distribute
working documents as Internet-Drafts.  The list of current
Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.</t>
      <t>Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time.  It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."</t>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>A bilateral agreement between two organisations is, in current
commercial practice, a document drafted by either party's legal
counsel, signed by an authorised officer of each party, exchanged
by email or by a third-party signature platform, and stored in
each party's document-management system.  The agreement's
existence, its terms, and its lifecycle events (execution,
amendment, revocation, expiry) are not directly verifiable by any
third party; they are matters between the parties and their
records.  A third party who needs to verify that an agreement is
in force may, at best, request a copy from one of the parties.</t>
      <t>This memo specifies a different arrangement.  Two principals, each
representing a legal entity and each bound to an organisational
identity substrate, execute the agreement as a portable
self-verifying document.  The document carries the contract text,
the parties' identities, the delegations under which the principals
sign, the agreement's term and jurisdiction, and a set of
tamper-evidence descriptors anchored in independent substrates.
A third party who receives the document, or who resolves the
agreement's content address through public discovery, can verify
the agreement's authenticity and lifecycle status against the
public DNS, the parties' identity logs, and any on-chain anchor
the descriptors reference.  No party holds an authoritative copy
that the other party lacks; the agreement is symmetric.</t>
      <t>The protocol composes with <xref target="MCPDNS"/> for substrate discovery, with
<xref target="IDPRONOUNS"/> for the principal-handle namespace, with <xref target="IDCOMMITS"/>
for the attribution grammar that names the authorising officer,
and with <xref target="ORGPOLICY"/> for the policy stack under which the agreement
is admitted to the parties' agent-runtime sessions.  An associated
pre-send enforcement gate (Section 9) integrates with the agent-
runtime governance flow specified by <xref target="ORGPOLICY"/> so that an
agreement's permitted-purpose scope can be applied to outbound
tool invocations of either party's runtimes.</t>
      <t>The canonical bilateral target of the v0 specification is a mutual
non-disclosure agreement.  The wire format generalises to any
bilateral consent envelope: master services agreements, data
processing agreements, statements of work, reseller agreements,
partnership letters.  Multi-party extensions (three or more
parties) are out of scope for this version and are anticipated for
a successor draft.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
and "OPTIONAL" in this document are to be interpreted as described
in BCP 14 <xref target="RFC8174">RFC2119</xref> when, and only when, they appear in
all capitals, as shown here.</t>
      <t>The following terms are defined for the purposes of this document.</t>
      <dl>
        <dt>Accord</dt>
        <dd>
          <t>A bilateral agreement executed under the protocol of this memo.
The wire-format artefact is the Accord document; the act of
reaching mutual signature is the Accord ceremony.</t>
        </dd>
        <dt>Identity substrate</dt>
        <dd>
          <t>An organisational identity primitive of the kind specified by
<xref target="ORGPOLICY"/>, addressable by a domain-qualified handle (e.g.
<tt>~truealter.com</tt>).  Each party to an Accord is represented by
one substrate.</t>
        </dd>
        <dt>Sovereign-tier handle</dt>
        <dd>
          <t>A principal identity handle in the Sovereign trust tier of
<xref target="IDPRONOUNS"/> (e.g. <tt>~blake</tt>).  An authorised officer of a legal
entity signs an Accord under their Sovereign-tier handle.</t>
        </dd>
        <dt>Delegation instrument</dt>
        <dd>
          <t>A recorded, bounded, revocable, content-addressed assertion by
the authorising officer of a party that a named handle (the
delegate) is authorised to execute a specified Accord on the
party's behalf.  The delegation instrument is itself a
COSE-signed CBOR document and is included by content address in
the Accord payload.</t>
        </dd>
        <dt>Tamper-evidence descriptor</dt>
        <dd>
          <t>A pointer to an independent substrate against which the Accord's
content address is anchored.  The minimum descriptor set is
defined in Section 7.  A verifier requires a substrate-defined
quorum of descriptors to consider the Accord tamper-evident.</t>
        </dd>
        <dt>Permitted purpose</dt>
        <dd>
          <t>A natural-language paragraph in the Accord payload that defines
the scope of disclosures permitted under the agreement.  The
permitted-purpose paragraph is legally authoritative; the
structured topic taxonomy of Section 8 is a deterministic
runtime classifier and is subordinate to the permitted-purpose
prose in any conflict.</t>
        </dd>
        <dt>Topic taxonomy</dt>
        <dd>
          <t>A structured tag list, scoped to the Accord, identifying the
topics on which disclosures are permitted, blocked, or
require explicit consent.  The taxonomy is operative for
runtime gating (Section 9) and is informative for legal
interpretation.</t>
        </dd>
        <dt>Disclosure-ledger event</dt>
        <dd>
          <t>A typed signed event written to an Accord party's identity log
recording a permitted disclosure, a blocked attempt, an
amendment, a revocation, or an expiry.  Events carry metadata
and content hashes only; they do not carry the disclosed
content.</t>
        </dd>
      </dl>
    </section>
    <section anchor="architectural-overview">
      <name>Architectural Overview</name>
      <t>The protocol comprises five composed layers, each addressable
independently:</t>
      <ol spacing="normal" type="1"><li>
          <t><strong>Wire format</strong> (Section 5).  A COSE-signed CBOR document
carrying the Accord payload, with two counter-signatures (one
per party).</t>
        </li>
        <li>
          <t><strong>Sovereign signing</strong> (Section 6).  Each party's signature is
produced by an Ed25519 sovereign key associated with the
authorising officer's <tt>~handle</tt>, with the signature carried in
a COSE_Sign or COSE_Sign1 envelope per <xref target="RFC9052"/>.</t>
        </li>
        <li>
          <t><strong>Discovery</strong> (Section 7).  The Accord is publicly discoverable
via a content-addressed DNS TXT record under each party's
substrate zone, complementing the existing <tt>_alter.&lt;domain&gt;</tt>
record of <xref target="MCPDNS"/>.</t>
        </li>
        <li>
          <t><strong>Tamper-evidence descriptor quorum</strong> (Section 8).  Each party
contributes descriptors anchoring the Accord's content address
in independent substrates: per-party identity log, on-chain
anchor, public DNS record.  A verifier requires a quorum
sufficient for the policy under which the verifier operates.</t>
        </li>
        <li>
          <t><strong>MCP tool surface and enforcement</strong> (Sections 10 and 11).  An
optional MCP tool surface allows agent runtimes of either
party to participate in the ceremony, query Accord state, and
record disclosure events.  An optional pre-send enforcement
gate applies the Accord's topic taxonomy to outbound tool
invocations of either party's runtimes.</t>
        </li>
      </ol>
      <t>Layers 1 through 4 are required for any conformant Accord.  Layers
10 and 11 are optional implementation surfaces and may be omitted
by parties whose use of the protocol does not extend to
agent-runtime-mediated execution.</t>
    </section>
    <section anchor="wire-format">
      <name>Wire Format</name>
      <t>An Accord is a CBOR object <xref target="RFC8949"/> carrying the Accord payload,
wrapped in a COSE signature envelope <xref target="RFC9052"/>.</t>
      <t>The Accord payload is a CBOR map with the following keys.</t>
      <dl>
        <dt><tt>version</tt> (text string, REQUIRED)</dt>
        <dd>
          <t>The wire-format version.  v0 of this specification uses the
literal <tt>"identity-accord-v0"</tt>.</t>
        </dd>
        <dt><tt>accord_type</tt> (text string, REQUIRED)</dt>
        <dd>
          <t>A token identifying the agreement type.  Recognised values for
v0:
</t>
          <ul spacing="normal">
            <li>
              <t><tt>mutual-nda-v2</tt> for the canonical mutual non-disclosure target.</t>
            </li>
            <li>
              <t><tt>msa-v1</tt>, <tt>dpa-v1</tt>, <tt>sow-v1</tt>, <tt>reseller-v1</tt>, <tt>partnership-v1</tt>
for the additional bilateral types this memo anticipates.</t>
            </li>
          </ul>
          <t>Additional values MAY be registered in the IANA Accord Types
registry (Section 13).</t>
        </dd>
        <dt><tt>accord_id</tt> (text string, REQUIRED)</dt>
        <dd>
          <t>A UUIDv4 assigned at ceremony commencement.  Identifies the
Accord within each party's records and in the disclosure
ledger.</t>
        </dd>
        <dt><tt>contract_body</tt> (CBOR map, REQUIRED)</dt>
        <dd>
          <t>The contract text and its content address.
</t>
          <ul spacing="normal">
            <li>
              <t><tt>text</tt> (text string): the UTF-8 contract body.  Legally
authoritative.</t>
            </li>
            <li>
              <t><tt>content_address</tt> (byte string): the SHA-256 hash of the
UTF-8 text.  Verifiers MUST recompute and compare.</t>
            </li>
          </ul>
        </dd>
        <dt><tt>parties</tt> (CBOR array, REQUIRED, length 2)</dt>
        <dd>
          <t>One entry per party.  Each entry is a CBOR map:
</t>
          <ul spacing="normal">
            <li>
              <t><tt>role</tt> (text string): one of <tt>party_a</tt>, <tt>party_b</tt>.</t>
            </li>
            <li>
              <t><tt>handle</tt> (text string): the authorising officer's Sovereign-
tier handle per <xref target="IDPRONOUNS"/> (e.g. <tt>~blake</tt>).</t>
            </li>
            <li>
              <t><tt>legal_entity</tt> (text string): the registered name of the
party's legal entity.</t>
            </li>
            <li>
              <t><tt>entity_registry_id</tt> (text string): the entity's registry
identifier (e.g. ACN, EIN, company number).  Format is
jurisdiction-specific.</t>
            </li>
            <li>
              <t><tt>sovereign_pubkey</tt> (byte string): the Ed25519 public key
against which the party's signature verifies.</t>
            </li>
            <li>
              <t><tt>delegation_ref</tt> (byte string): the content address of the
delegation instrument (Section 6.2).</t>
            </li>
          </ul>
        </dd>
        <dt><tt>permitted_purpose</tt> (CBOR map, REQUIRED)</dt>
        <dd>
          <t>The agreement's scope.
</t>
          <ul spacing="normal">
            <li>
              <t><tt>text</tt> (text string): the natural-language permitted-purpose
paragraph.  Legally authoritative in any conflict.</t>
            </li>
            <li>
              <t><tt>hash</tt> (byte string): SHA-256 of the UTF-8 text.</t>
            </li>
          </ul>
        </dd>
        <dt><tt>topic_taxonomy</tt> (CBOR map, OPTIONAL)</dt>
        <dd>
          <t>The structured tag list for runtime gating.
</t>
          <ul spacing="normal">
            <li>
              <t><tt>version</tt> (text string): the taxonomy version identifier
(e.g. <tt>"v1"</tt>).</t>
            </li>
            <li>
              <t><tt>permitted_tags</tt> (array of text strings): topic tags on which
disclosure is permitted.</t>
            </li>
            <li>
              <t><tt>blocked_tags</tt> (array of text strings): topic tags on which
disclosure is refused.</t>
            </li>
            <li>
              <t><tt>escalation_tags</tt> (array of text strings, OPTIONAL): topic
tags that require explicit consent from the disclosing
principal at disclosure time.</t>
            </li>
            <li>
              <t><tt>nl_authority_anchor</tt> (byte string): the hash of
<tt>permitted_purpose.text</tt>, binding the taxonomy to its
natural-language source.</t>
            </li>
          </ul>
        </dd>
        <dt><tt>term</tt> (CBOR map, REQUIRED)</dt>
        <dd>
          <t>Lifecycle parameters.
</t>
          <ul spacing="normal">
            <li>
              <t><tt>effective_date</tt> (text string, RFC 3339 timestamp)</t>
            </li>
            <li>
              <t><tt>initial_term_days</tt> (unsigned integer)</t>
            </li>
            <li>
              <t><tt>ordinary_survival_days</tt> (unsigned integer, optional)</t>
            </li>
            <li>
              <t><tt>categorical_survival</tt> (CBOR map, optional): per-category
survival rules, where the keys are category identifiers
(e.g. <tt>trade_secret</tt>, <tt>personal_information</tt>) and the values
are either an unsigned integer day-count or the literal
<tt>"indefinite"</tt>.</t>
            </li>
          </ul>
        </dd>
        <dt><tt>jurisdiction</tt> (CBOR map, REQUIRED)</dt>
        <dd>
          <t>Governing law and forum.
</t>
          <ul spacing="normal">
            <li>
              <t><tt>governing_law</tt> (text string): jurisdiction identifier
(e.g. <tt>"NSW, Australia"</tt>).</t>
            </li>
            <li>
              <t><tt>exclusive_forum</tt> (text string, OPTIONAL).</t>
            </li>
          </ul>
        </dd>
        <dt><tt>tamper_evidence_descriptors</tt> (CBOR array, REQUIRED, length &gt;= 2)</dt>
        <dd>
          <t>An array of descriptors per Section 7.  Each descriptor is a
CBOR map with a <tt>type</tt> key and type-specific fields.</t>
        </dd>
      </dl>
      <t>The Accord payload is canonicalised per the deterministic CBOR
encoding rules of <xref target="RFC8949"/> Section 4.2 before signing.  Verifiers
MUST canonicalise before recomputing content addresses or
verifying signatures.</t>
    </section>
    <section anchor="signing">
      <name>Signing</name>
      <section anchor="sovereign-signature">
        <name>Sovereign Signature</name>
        <t>Each party signs the canonicalised Accord payload with the
Ed25519 private key associated with the Sovereign-tier handle
named in the party's entry.  Signatures are carried in a COSE
envelope per <xref target="RFC9052"/>:</t>
        <ul spacing="normal">
          <li>
            <t>For ceremonies completed in a single co-signing event, a
<tt>COSE_Sign</tt> envelope with two signatures is REQUIRED.</t>
          </li>
          <li>
            <t>For ceremonies completed in two stages (party A signs and
publishes; party B counter-signs from the published artefact),
each stage MAY emit a <tt>COSE_Sign1</tt> envelope and a counter-
signature MAY be added later per <xref target="RFC9052"/> counter-signature
semantics.  Verifiers MUST treat the combined two-signature
envelope as authoritative; a single-signature artefact is a
draft, not an Accord.</t>
          </li>
        </ul>
        <t>The signature's protected header SHALL carry:</t>
        <ul spacing="normal">
          <li>
            <t><tt>alg</tt>: EdDSA (RFC 8032).</t>
          </li>
          <li>
            <t><tt>content type</tt>: <tt>application/identity-accord+cbor</tt>.</t>
          </li>
          <li>
            <t><tt>kid</tt>: the content address of the Accord payload.</t>
          </li>
        </ul>
        <t>The signature's unprotected header MAY carry implementation-
specific metadata; verifiers MUST NOT rely on unprotected-header
fields for authenticity.</t>
      </section>
      <section anchor="delegation-instrument">
        <name>Delegation Instrument</name>
        <t>Each <tt>parties[].delegation_ref</tt> resolves to a delegation
instrument: a separate COSE-signed CBOR document, signed by the
party's Sovereign-tier handle, that names the authorised
signatory of the present Accord and bounds the delegation's
scope.</t>
        <t>The delegation instrument's payload is a CBOR map with keys:</t>
        <ul spacing="normal">
          <li>
            <t><tt>version</tt> (text string): <tt>"identity-accord-delegation-v0"</tt>.</t>
          </li>
          <li>
            <t><tt>principal_handle</tt> (text string): the Sovereign-tier handle
granting the delegation.</t>
          </li>
          <li>
            <t><tt>delegate_handle</tt> (text string): the handle authorised to act.
In v0, the delegate handle MUST equal the principal handle;
Sovereign-to-Instrument delegation is anticipated for a
successor draft.</t>
          </li>
          <li>
            <t><tt>delegated_accord_id</tt> (text string): the <tt>accord_id</tt> of the
present Accord.</t>
          </li>
          <li>
            <t><tt>scope</tt> (text string): a natural-language description of the
scope of the delegation (e.g. <tt>"execution of the present
Accord and any amendments to it"</tt>).</t>
          </li>
          <li>
            <t><tt>inception</tt> (text string, RFC 3339): start of the delegation
validity window.</t>
          </li>
          <li>
            <t><tt>expiry</tt> (text string, RFC 3339, OPTIONAL): end of the
delegation validity window; absent implies no expiry beyond
the Accord's own term.</t>
          </li>
          <li>
            <t><tt>revocation_commitment</tt> (byte string): the hash of a
revocation token; revocation is effected by publishing the
preimage to the principal's identity log.</t>
          </li>
        </ul>
        <t>Verifiers MUST resolve each delegation instrument from its
content address, verify its signature against the principal
handle's sovereign key, and verify that the delegation's
<tt>delegated_accord_id</tt> equals the Accord's <tt>accord_id</tt>.</t>
      </section>
    </section>
    <section anchor="tamper-evidence-descriptor-quorum">
      <name>Tamper-Evidence Descriptor Quorum</name>
      <t>Each party contributes one or more tamper-evidence descriptors to
the Accord's <tt>tamper_evidence_descriptors</tt> array.  Descriptors
anchor the Accord's content address (the SHA-256 of the
canonicalised Accord payload) in an independent substrate.</t>
      <t>The minimum descriptor types for v0:</t>
      <dl>
        <dt><tt>identitylog_entry</tt></dt>
        <dd>
          <t>A reference to an event in a party's append-only identity log,
the event recording the Accord's content address at execution.
</t>
          <ul spacing="normal">
            <li>
              <t><tt>party</tt> (text string): <tt>party_a</tt> or <tt>party_b</tt>.</t>
            </li>
            <li>
              <t><tt>log_handle</tt> (text string): the substrate handle whose log
carries the entry.</t>
            </li>
            <li>
              <t><tt>entry_id</tt> (text string): the log entry identifier.</t>
            </li>
            <li>
              <t><tt>signature</tt> (byte string): the log's signature over the entry.</t>
            </li>
          </ul>
        </dd>
        <dt><tt>onchain_anchor</tt></dt>
        <dd>
          <t>A reference to a transaction on a public blockchain whose
payload anchors the Accord's content address (typically via
inclusion in a Signed Tree Head of a per-substrate Merkle log
inspired by <xref target="RFC6962"/>).
</t>
          <ul spacing="normal">
            <li>
              <t><tt>chain</tt> (text string): chain identifier (e.g. <tt>"base"</tt>,
<tt>"ethereum"</tt>).</t>
            </li>
            <li>
              <t><tt>block</tt> (unsigned integer): block number.</t>
            </li>
            <li>
              <t><tt>tx</tt> (byte string): transaction hash.</t>
            </li>
            <li>
              <t><tt>sth_root</tt> (byte string): the Merkle root including the
Accord's content address.</t>
            </li>
          </ul>
        </dd>
        <dt><tt>dns_txt_record</tt></dt>
        <dd>
          <t>A reference to a DNS TXT record under a party's substrate
zone whose value is the Accord's content address.
</t>
          <ul spacing="normal">
            <li>
              <t><tt>domain</tt> (text string): the fully-qualified domain name of
the TXT record (typically <tt>_agreement.&lt;content-address-
base32&gt;._alter.&lt;party-domain&gt;</tt>).</t>
            </li>
            <li>
              <t><tt>record_value</tt> (text string): the TXT record's value
encoding the content address.</t>
            </li>
          </ul>
          <t>The TXT record SHOULD be DNSSEC-validated [RFC4033] per the
practice established by <xref target="MCPDNS"/>.</t>
        </dd>
        <dt><tt>wellknown_artefact</tt></dt>
        <dd>
          <t>A reference to a content-addressed artefact published at a
party's well-known URI per <xref target="RFC8615"/>.
</t>
          <ul spacing="normal">
            <li>
              <t><tt>url</tt> (text string): the fully-qualified URL of the
well-known resource.</t>
            </li>
            <li>
              <t><tt>expected_hash</tt> (byte string): SHA-256 of the resource body.</t>
            </li>
          </ul>
        </dd>
      </dl>
      <t>Additional descriptor types MAY be registered in the IANA
Tamper-Evidence Descriptor Types registry (Section 13).</t>
      <t>A descriptor quorum is sufficient when at least two descriptors
of independent type and independent substrate operator have
been verified.  Implementations SHOULD treat a quorum of one
type, or a quorum of two descriptors operated by the same
substrate operator, as INSUFFICIENT and refuse to admit the
Accord as tamper-evident.  Substrate operators SHOULD publish
the quorum policy they apply.</t>
      <t>Graceful degradation is REQUIRED, meaning parties without
access to the full descriptor set SHOULD participate at the
minimum-conformant quorum rather than be excluded.</t>
    </section>
    <section anchor="discovery">
      <name>Discovery</name>
      <section anchor="substrate-discovery">
        <name>Substrate Discovery</name>
        <t>Each party SHALL publish the existence and metadata of its
identity substrate under the <tt>_alter.&lt;domain&gt;</tt> DNS TXT scheme
of <xref target="MCPDNS"/>.  Substrate discovery for the Accord protocol
reuses <xref target="MCPDNS"/> without modification.</t>
      </section>
      <section anchor="accord-discovery">
        <name>Accord Discovery</name>
        <t>The existence of an Accord MAY be advertised by each party under
a content-addressed sub-record:</t>
        <t><tt>_agreement.&lt;content-address-base32&gt;._alter.&lt;party-domain&gt;</tt></t>
        <t>The record's value is a TXT carrying:</t>
        <ul spacing="normal">
          <li>
            <t><tt>content_address</tt>: the base32 encoding of the SHA-256 content
address.</t>
          </li>
          <li>
            <t><tt>accord_type</tt>: the value of the Accord payload's <tt>accord_type</tt>
field.</t>
          </li>
          <li>
            <t><tt>effective_date</tt>: the effective date in RFC 3339.</t>
          </li>
          <li>
            <t><tt>expiry</tt>: the expected expiry timestamp in RFC 3339, computed
from <tt>effective_date + initial_term_days</tt>.</t>
          </li>
          <li>
            <t><tt>parties</tt>: a comma-separated pair of Sovereign-tier handles
(e.g. <tt>~blake,~drew</tt>) for human readability.</t>
          </li>
          <li>
            <t><tt>sth_anchor</tt> (OPTIONAL): a reference to an on-chain anchor
per the <tt>onchain_anchor</tt> descriptor type.</t>
          </li>
        </ul>
        <t>Implementations SHOULD treat absence of an Accord discovery
record as orthogonal to Accord validity; parties MAY execute a
private Accord (with <tt>dns_txt_record</tt> descriptors omitted) and
distribute the Accord artefact directly out of band.  An Accord
without DNS discovery still verifies against the descriptor
quorum if at least two non-DNS descriptors are present.</t>
      </section>
      <section anchor="third-party-verification-walkthrough">
        <name>Third-Party Verification Walkthrough</name>
        <t>A third party who receives an Accord artefact and a content
address performs the following verification:</t>
        <ol spacing="normal" type="1"><li>
            <t>Canonicalise the Accord payload per <xref target="RFC8949"/> and recompute
the SHA-256 content address.  Compare to the provided value.</t>
          </li>
          <li>
            <t>For each party in <tt>parties</tt>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Resolve the party's <tt>_alter.&lt;domain&gt;</tt> per <xref target="MCPDNS"/>.</t>
              </li>
              <li>
                <t>Verify the party's <tt>sovereign_pubkey</tt> against the public
envelope published under <xref target="MCPDNS"/>.</t>
              </li>
              <li>
                <t>Resolve the <tt>delegation_ref</tt> content address and verify
the delegation instrument per Section 6.2.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Verify the COSE signatures against each party's
<tt>sovereign_pubkey</tt>.</t>
          </li>
          <li>
            <t>Verify the descriptor quorum per Section 7.</t>
          </li>
          <li>
            <t>For each party, query the party's identity log for any
<tt>accord_revoked</tt> event referencing the Accord's content
address.  Refuse to admit a revoked Accord.</t>
          </li>
          <li>
            <t>Confirm the Accord has not expired against <tt>term</tt>.</t>
          </li>
        </ol>
        <t>A third-party verifier requires no access to ALTER infrastructure
or to either party's private systems beyond the public DNS, the
public identity logs, and the on-chain anchor.</t>
      </section>
    </section>
    <section anchor="topic-taxonomy">
      <name>Topic Taxonomy</name>
      <t>The optional <tt>topic_taxonomy</tt> field of the Accord payload provides
a deterministic runtime classifier of the agreement's permitted
scope.  Taxonomy tags are short structured identifiers (e.g.
<tt>engineering.architecture</tt>, <tt>finance.revenue</tt>, <tt>personnel.salaries</tt>)
drawn from a substrate-published canonical registry or from a
per-Accord extension thereof.</t>
      <t>The taxonomy is informative for legal interpretation and
operative for runtime gating.  In the event of a conflict between
the topic taxonomy and the permitted-purpose paragraph, the
natural-language paragraph prevails per Section 4
(<tt>permitted_purpose.text</tt> legally authoritative).</t>
      <t>Substrate operators SHOULD publish a canonical topic-taxonomy
registry at a stable URL under their substrate zone (typical
location: <tt>https://registry.&lt;substrate-domain&gt;/topic-taxonomy/v1</tt>).
Accords SHOULD reference the registry version they extend and
SHOULD declare per-Accord additions or restrictions explicitly.</t>
    </section>
    <section anchor="mcp-tool-surface-optional">
      <name>MCP Tool Surface (Optional)</name>
      <t>Substrates MAY expose the following MCP tool surface to
authenticated agent runtimes of recognised members, enabling
runtime participation in Accord ceremony and lifecycle.</t>
      <dl>
        <dt><tt>begin_agreement(counterparty_handle, accord_type)</tt></dt>
        <dd>
          <t>Creates a draft Accord between the calling party and a
counterparty handle.  Returns an <tt>accord_draft_id</tt>.</t>
        </dd>
        <dt>`propose_terms(accord_draft_id, contract_content_address,</dt>
        <dd>
          <t/>
        </dd>
        <dt>permitted_purpose, topic_taxonomy, term, jurisdiction,</dt>
        <dd>
          <t/>
        </dd>
        <dt>delegation_ref)`</dt>
        <dd>
          <t>Populates the draft with proposed terms.</t>
        </dd>
        <dt><tt>accept_terms(accord_draft_id)</tt></dt>
        <dd>
          <t>Counterparty's acceptance; moves the draft to a signing-ready
state.</t>
        </dd>
        <dt><tt>sign_accord(accord_draft_id, sovereign_signature)</tt></dt>
        <dd>
          <t>Attaches an Ed25519 signature from the authorising officer's
Sovereign-tier handle.</t>
        </dd>
        <dt><tt>publish_tamper_evidence(accord_id, descriptor_set)</tt></dt>
        <dd>
          <t>Emits tamper-evidence descriptors to the substrate's identity
log, to on-chain anchors, and to DNS as configured.</t>
        </dd>
        <dt><tt>query_accord_status(accord_id_or_content_address)</tt></dt>
        <dd>
          <t>Returns the Accord's lifecycle state (draft, executed, active,
revoked, expired) and the descriptor set.  Available to any
caller who knows the content address; no privileged
authentication is required for this read.</t>
        </dd>
        <dt><tt>revoke_accord(accord_id, reason)</tt></dt>
        <dd>
          <t>Either party MAY invoke; triggers return-or-destruction
obligations and emits <tt>agreement_revoked</tt> to the identity log.</t>
        </dd>
        <dt>`record_disclosure(accord_id, recipient_handle, topic_tags,</dt>
        <dd>
          <t/>
        </dd>
        <dt>content_hash, size, method)`</dt>
        <dd>
          <t>Records a permitted disclosure to the disclosure ledger.</t>
        </dd>
        <dt><tt>record_scope_violation(accord_id, attempted_tags, reason)</tt></dt>
        <dd>
          <t>Records a blocked disclosure attempt for audit.</t>
        </dd>
      </dl>
      <t>The MCP tool names above SHALL be registered in the MCP Tool
Surface Names registry referenced in <xref target="ORGPOLICY"/> (or a successor
specification establishing said registry).</t>
    </section>
    <section anchor="pre-send-enforcement-gate-optional">
      <name>Pre-Send Enforcement Gate (Optional)</name>
      <t>A party MAY operate a pre-send enforcement gate that intercepts
outbound tool invocations from the party's agent runtimes and
classifies the invocation's payload against the topic taxonomies
of any active Accords binding the calling principal to the
recipient principal.</t>
      <t>The gate algorithm:</t>
      <ol spacing="normal" type="1"><li>
          <t>For each prospective outbound tool invocation:  </t>
          <ul spacing="normal">
            <li>
              <t>Resolve the recipient handle from the invocation's
arguments.</t>
            </li>
            <li>
              <t>Look up any active Accord whose <tt>parties</tt> set includes
the caller and the recipient.</t>
            </li>
            <li>
              <t>If no active Accord exists between the parties, the gate
does not apply; the invocation proceeds per the runtime's
default policy (which may be <tt>block</tt>, <tt>prompt</tt>, or
<tt>allow</tt> per the runtime's enforcement-gate specification
of <xref target="ORGPOLICY"/>).</t>
            </li>
          </ul>
        </li>
        <li>
          <t>For each active Accord:  </t>
          <ul spacing="normal">
            <li>
              <t>Classify the invocation's payload into a set of topic tags
using a substrate-defined classifier.  The classifier MAY
combine a fast-path structured matcher on payload metadata
with a slow-path model-based classifier on payload content.</t>
            </li>
            <li>
              <t>Compare the classified tag set to the Accord's
<tt>permitted_tags</tt>, <tt>blocked_tags</tt>, and <tt>escalation_tags</tt>.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Take action:  </t>
          <ul spacing="normal">
            <li>
              <t>If the classified set lies entirely within <tt>permitted_tags</tt>,
emit a <tt>disclosure_recorded</tt> event and allow the
invocation.</t>
            </li>
            <li>
              <t>If the classified set intersects <tt>blocked_tags</tt>, emit a
<tt>scope_violation_blocked</tt> event and refuse the invocation
with a structured error.</t>
            </li>
            <li>
              <t>If the classified set intersects <tt>escalation_tags</tt>,
present a confirmation prompt to the Sovereign-tier
principal and proceed only on confirmation.</t>
            </li>
            <li>
              <t>If classification is ambiguous, fail closed: refuse the
invocation and emit <tt>scope_violation_blocked</tt> with the
ambiguity flagged.</t>
            </li>
          </ul>
        </li>
      </ol>
      <t>Disclosure-ledger events are written to the calling party's
identity log under the event types of Section 11.</t>
      <t>The enforcement gate is composable with the per-runtime
enforcement-gate specification of <xref target="ORGPOLICY"/>: an outbound
invocation MUST satisfy both the party's runtime gates and any
applicable Accord gates.  Where both apply, the more restrictive
action prevails.</t>
    </section>
    <section anchor="disclosure-ledger">
      <name>Disclosure Ledger</name>
      <t>Each party SHALL maintain, in its identity log, the following
event types under the agreement scope:</t>
      <dl>
        <dt><tt>agreement_executed</tt></dt>
        <dd>
          <t>Emitted by both parties on ceremony completion.  Payload:
the Accord's content address, the descriptor quorum, and the
signing handle.</t>
        </dd>
        <dt><tt>disclosure_recorded</tt></dt>
        <dd>
          <t>Emitted per permitted outbound disclosure.  Payload: the
Accord's content address, the recipient handle, the topic
tag set, the content hash, the size in bytes, the method
(tool name).  Content is NEVER included; only the hash.</t>
        </dd>
        <dt><tt>scope_violation_blocked</tt></dt>
        <dd>
          <t>Emitted per blocked disclosure attempt.  Payload: the
Accord's content address, the attempted topic tag set, the
block reason.</t>
        </dd>
        <dt><tt>agreement_amended</tt></dt>
        <dd>
          <t>Emitted on negotiated amendment of an Accord.  Payload: the
prior and successor content addresses, the diff hash, and
the authorising signatures of both parties.</t>
        </dd>
        <dt><tt>agreement_revoked</tt></dt>
        <dd>
          <t>Emitted on revocation by either party.  Payload: the Accord's
content address, the revoking party, the reason, the
revocation token preimage.</t>
        </dd>
        <dt><tt>agreement_expired</tt></dt>
        <dd>
          <t>Emitted on term expiry.  Payload: the Accord's content
address and the expiry timestamp.</t>
        </dd>
      </dl>
      <t>Each party's identity log SHOULD be cross-anchored to the
counterparty's log via periodic hash-chain exchange so that
both parties hold matching event subsets for the agreement.
Cross-anchoring is a substrate-side concern and is not
specified here beyond the requirement that each party's log
is verifiable independently.</t>
    </section>
    <section anchor="revocation">
      <name>Revocation</name>
      <t>Either party MAY revoke an Accord at any time during its term.
Revocation:</t>
      <ol spacing="normal" type="1"><li>
          <t>The revoking party publishes a <tt>agreement_revoked</tt> event to
its identity log carrying the revocation token preimage.</t>
        </li>
        <li>
          <t>The substrate emits a notification to the counterparty's
subscription channel for the Accord.</t>
        </li>
        <li>
          <t>The counterparty's substrate records the receipt in its own
identity log under <tt>agreement_revoked</tt> with the cross-
reference to the originating event.</t>
        </li>
        <li>
          <t>Any pre-send enforcement gate (Section 9) ceases admitting
the Accord; subsequent outbound invocations between the
parties default to the runtime's no-Accord policy.</t>
        </li>
        <li>
          <t>Return-or-destruction obligations under the contract body
take effect per the contract's terms.  The protocol records
the lifecycle event; the contract specifies the substantive
obligations.</t>
        </li>
      </ol>
      <t>Revocation is not retractable.  A re-executed agreement between
the same parties on the same subject matter is a new Accord with
a new <tt>accord_id</tt> and a new content address.</t>
    </section>
    <section anchor="discovery-identity-and-trust-tier-composition">
      <name>Discovery, Identity, and Trust-Tier Composition</name>
      <t>The Accord protocol composes with the broader Morrison-family
identity architecture as follows.</t>
      <section anchor="with-substrate-discovery">
        <name>With Substrate Discovery</name>
        <t>The <tt>_alter.&lt;domain&gt;</tt> TXT scheme of <xref target="MCPDNS"/> supplies both
parties' substrate endpoints, signing keys, and capability
profiles.  Accord-specific records under
<tt>_agreement.&lt;content-address&gt;._alter.&lt;domain&gt;</tt> extend the same
zone without creating a new label namespace.</t>
      </section>
      <section anchor="with-handle-tier-semantics">
        <name>With Handle Tier Semantics</name>
        <t>Sovereign-tier handles per <xref target="IDPRONOUNS"/> are the only tier
authorised to sign an Accord in v0.  Instrument-tier handles MAY
participate in the ceremony surfaces (Section 10) under
Sovereign-tier delegation per <xref target="IDCOMMITS"/> attribution
(<tt>Acted-By:</tt> is the Sovereign signer; <tt>Drafted-With:</tt> may name
the Instrument that drafted the contract body), but the
authoritative signature is always Sovereign-tier.</t>
      </section>
      <section anchor="with-org-alter-policy-provision">
        <name>With Org-Alter Policy Provision</name>
        <t>When either party operates an agent runtime under the policy-
provision flow of <xref target="ORGPOLICY"/>, any active Accord adds an
enforcement-gate composition layer above the substrate's
default policy stack.  The composition rule of Section 9 applies
in addition to the strictest-applicable rule of <xref target="ORGPOLICY"/>
Section 8.</t>
      </section>
      <section anchor="multi-party-anticipation">
        <name>Multi-Party Anticipation</name>
        <t>This memo specifies bilateral Accords only.  An N-party Accord
(N &gt; 2) requires N-way signature collection, an N-way
descriptor quorum, and a generalised topic-taxonomy composition
rule.  These extensions are anticipated for a successor draft
and are explicitly out of scope here.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This memo requests that IANA establish two registries.</t>
      <section anchor="accord-types-registry">
        <name>Accord Types Registry</name>
        <t>A registry of <tt>accord_type</tt> values for the wire-format field of
Section 5.  Initial entries:</t>
        <table>
          <thead>
            <tr>
              <th align="left">accord_type</th>
              <th align="left">reference</th>
              <th align="left">description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>mutual-nda-v2</tt></td>
              <td align="left">this document</td>
              <td align="left">Mutual non-disclosure agreement, v2 template family.</td>
            </tr>
            <tr>
              <td align="left">
                <tt>msa-v1</tt></td>
              <td align="left">this document</td>
              <td align="left">Master services agreement.</td>
            </tr>
            <tr>
              <td align="left">
                <tt>dpa-v1</tt></td>
              <td align="left">this document</td>
              <td align="left">Data processing agreement.</td>
            </tr>
            <tr>
              <td align="left">
                <tt>sow-v1</tt></td>
              <td align="left">this document</td>
              <td align="left">Statement of work.</td>
            </tr>
            <tr>
              <td align="left">
                <tt>reseller-v1</tt></td>
              <td align="left">this document</td>
              <td align="left">Reseller agreement.</td>
            </tr>
            <tr>
              <td align="left">
                <tt>partnership-v1</tt></td>
              <td align="left">this document</td>
              <td align="left">Partnership letter.</td>
            </tr>
          </tbody>
        </table>
        <t>Registration policy: Specification Required.  New <tt>accord_type</tt>
values are registered by Internet-Draft or by an RFC defining
the contract-body shape and any type-specific protocol
extensions.</t>
      </section>
      <section anchor="tamper-evidence-descriptor-types-registry">
        <name>Tamper-Evidence Descriptor Types Registry</name>
        <t>A registry of <tt>tamper_evidence_descriptors[].type</tt> values for
Section 7.  Initial entries:</t>
        <table>
          <thead>
            <tr>
              <th align="left">type</th>
              <th align="left">reference</th>
              <th align="left">description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>identitylog_entry</tt></td>
              <td align="left">this document</td>
              <td align="left">Reference to an event in a party's append-only identity log.</td>
            </tr>
            <tr>
              <td align="left">
                <tt>onchain_anchor</tt></td>
              <td align="left">this document</td>
              <td align="left">Reference to a transaction on a public blockchain anchoring the content address.</td>
            </tr>
            <tr>
              <td align="left">
                <tt>dns_txt_record</tt></td>
              <td align="left">this document</td>
              <td align="left">Reference to a DNS TXT record bearing the content address.</td>
            </tr>
            <tr>
              <td align="left">
                <tt>wellknown_artefact</tt></td>
              <td align="left">this document</td>
              <td align="left">Reference to a well-known URI artefact bearing the content address.</td>
            </tr>
          </tbody>
        </table>
        <t>Registration policy: Specification Required.  New descriptor
types are registered by Internet-Draft or RFC defining the
descriptor fields and the verification procedure.</t>
      </section>
      <section anchor="mcp-tool-surface-names">
        <name>MCP Tool Surface Names</name>
        <t>The MCP tool surface names of Section 10 (<tt>begin_agreement</tt>,
<tt>propose_terms</tt>, <tt>accept_terms</tt>, <tt>sign_accord</tt>,
<tt>publish_tamper_evidence</tt>, <tt>query_accord_status</tt>, <tt>revoke_accord</tt>,
<tt>record_disclosure</tt>, <tt>record_scope_violation</tt>) are registered in
the MCP Tool Surface Names registry referenced in <xref target="ORGPOLICY"/>.
Establishment of that registry, if not already done, is the
subject of <xref target="ORGPOLICY"/>'s IANA Considerations.</t>
      </section>
      <section anchor="media-type">
        <name>Media Type</name>
        <t>This memo requests registration of the media type
<tt>application/identity-accord+cbor</tt> per RFC 6838, with the
following information:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: identity-accord+cbor</t>
          </li>
          <li>
            <t>Required parameters: none</t>
          </li>
          <li>
            <t>Optional parameters: <tt>version</tt> (the value of the Accord
payload's <tt>version</tt> field).</t>
          </li>
          <li>
            <t>Encoding considerations: binary; deterministic CBOR per
<xref target="RFC8949"/> Section 4.2.</t>
          </li>
          <li>
            <t>Security considerations: see Section 14 of this document.</t>
          </li>
          <li>
            <t>Interoperability considerations: see Section 5 of this
document.</t>
          </li>
          <li>
            <t>Published specification: this document.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="sovereign-key-compromise">
        <name>Sovereign-Key Compromise</name>
        <t>An Accord's authenticity rests on the Sovereign-tier handle's
Ed25519 signing key.  Compromise of either party's signing key
permits an attacker to forge new Accords under the party's
identity, or to forge revocations of existing Accords.
Mitigations:</t>
        <ul spacing="normal">
          <li>
            <t>Sovereign-tier signing keys SHOULD be held in hardware-backed
custody (HSM, secure enclave, hardware security token) and
SHOULD NOT be exported in plaintext under any circumstances.</t>
          </li>
          <li>
            <t>The handle's published envelope per <xref target="MCPDNS"/> is the canonical
pubkey; a compromised key SHALL be rotated by publishing a
new envelope and recording the rotation in the substrate's
identity log.  Verifiers SHOULD check whether the signing key
recorded in the Accord was the current key at the time of
the Accord's effective date.</t>
          </li>
          <li>
            <t>Tamper-evidence descriptors anchored at the time of execution
defend the Accord against post-hoc forgery by anchoring the
content address in substrates the attacker does not control.</t>
          </li>
        </ul>
      </section>
      <section anchor="descriptor-quorum-subversion">
        <name>Descriptor-Quorum Subversion</name>
        <t>An attacker controlling one substrate party may attempt to
publish descriptors anchoring a falsified Accord content
address.  Mitigations:</t>
        <ul spacing="normal">
          <li>
            <t>The quorum policy of Section 7 requires descriptors of
independent type and independent substrate operator.  An
attacker controlling a single substrate cannot satisfy the
quorum alone.</t>
          </li>
          <li>
            <t>On-chain anchors SHOULD reference chains the attacker does
not control; well-known artefacts SHOULD be hosted under the
party's verifiable substrate zone, not under an attacker-
controllable third party.</t>
          </li>
          <li>
            <t>Verifiers SHOULD compare independent descriptors against each
other; descriptors anchoring conflicting content addresses
for the same Accord ID are evidence of an attempted forgery.</t>
          </li>
        </ul>
      </section>
      <section anchor="delegation-instrument-replay">
        <name>Delegation-Instrument Replay</name>
        <t>A revoked delegation instrument, if its revocation has not been
propagated, may be replayed to forge new signatures.
Mitigations:</t>
        <ul spacing="normal">
          <li>
            <t>Delegation revocations SHALL be recorded in the principal's
identity log under a typed event before any reliance on the
delegation is admitted.</t>
          </li>
          <li>
            <t>Verifiers SHALL check the principal's identity log for any
revocation event referencing the delegation's content address
before treating the delegation as valid.</t>
          </li>
          <li>
            <t>Delegation expiry timestamps SHOULD be set conservatively;
a delegation that outlives the Accord's effective scope is
an unnecessary liability.</t>
          </li>
        </ul>
      </section>
      <section anchor="enforcement-gate-bypass">
        <name>Enforcement-Gate Bypass</name>
        <t>A party operating the pre-send enforcement gate of Section 9
may have its gate bypassed by a runtime that does not source its
policy from the substrate per <xref target="ORGPOLICY"/>.  Mitigations:</t>
        <ul spacing="normal">
          <li>
            <t>Parties SHOULD configure all agent runtimes bound to the
party's identity to operate under <xref target="ORGPOLICY"/> policy provision.</t>
          </li>
          <li>
            <t>Outbound tool invocations from non-conformant runtimes
SHOULD be detected by the substrate's audit-signal flow and
the disclosure-ledger comparison SHOULD reveal the
divergence.</t>
          </li>
          <li>
            <t>Outbound network traffic from non-conformant runtimes is
outside the scope of this memo; the Accord's enforcement
posture is a protocol layer, not a perimeter control.</t>
          </li>
        </ul>
      </section>
      <section anchor="classifier-adversarial-inputs">
        <name>Classifier Adversarial Inputs</name>
        <t>The pre-send enforcement gate's topic-tag classifier may be
adversarially manipulated through crafted payloads that evade
classification or that classify into permitted tags
spuriously.  Mitigations:</t>
        <ul spacing="normal">
          <li>
            <t>The classifier's ambiguity threshold SHOULD be conservative;
ambiguous classifications SHALL fail closed per Section 9.</t>
          </li>
          <li>
            <t>The classifier's structured fast-path SHOULD operate on
payload metadata under cryptographic integrity binding, not
solely on payload content susceptible to crafting.</t>
          </li>
          <li>
            <t>Periodic adversarial-payload rehearsal of the classifier is
RECOMMENDED.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <section anchor="content-confidentiality">
        <name>Content Confidentiality</name>
        <t>The Accord's contract body MAY contain confidential terms; the
Accord wire format preserves the body's confidentiality only to
the extent that the artefact is not published.  Parties wishing
to retain content confidentiality SHOULD:</t>
        <ul spacing="normal">
          <li>
            <t>Omit the <tt>dns_txt_record</tt> and <tt>wellknown_artefact</tt> descriptors,
retaining only <tt>identitylog_entry</tt> and <tt>onchain_anchor</tt>
(which record content addresses, not content).</t>
          </li>
          <li>
            <t>Distribute the artefact directly between the parties, out of
band of the public substrate surface.</t>
          </li>
        </ul>
      </section>
      <section anchor="disclosure-ledger-privacy">
        <name>Disclosure-Ledger Privacy</name>
        <t>Events under the disclosure ledger of Section 11 record content
hashes, recipient handles, and topic-tag sets.  An adversary
with access to a party's identity log can observe disclosure
patterns even without access to disclosed content.  Mitigations:</t>
        <ul spacing="normal">
          <li>
            <t>Identity logs MAY be encrypted at rest; the cross-anchor
hash-chain exchange between parties' logs does not require
exposing log contents.</t>
          </li>
          <li>
            <t>Recipient handles in disclosure events SHOULD be pseudonymous
where the substrate permits; the Accord's permitted-purpose
scope binds the disclosure regardless of recipient
pseudonymity.</t>
          </li>
        </ul>
      </section>
      <section anchor="third-party-verification-privacy">
        <name>Third-Party Verification Privacy</name>
        <t>A third-party verifier accessing public discovery records and
on-chain anchors leaves network and chain-observation
footprints.  Such verifiers SHOULD operate over privacy-
preserving DNS (DNS over HTTPS or DNS over TLS) and SHOULD
treat their verification queries as potentially observable.</t>
      </section>
      <section anchor="cross-substrate-audit-fan-out">
        <name>Cross-Substrate Audit Fan-Out</name>
        <t>Where an outbound tool invocation between Accord parties
involves a third substrate (e.g. a tool whose execution is
mediated by a third party), the disclosure-ledger event is
written to all participating substrates per the audit fan-out
of <xref target="ORGPOLICY"/> Section 8.  Parties SHOULD declare in their
permitted-purpose paragraph any third-substrate involvement so
that fan-out is anticipated rather than incidental.</t>
      </section>
    </section>
    <section anchor="relation-to-companion-memos">
      <name>Relation to Companion Memos</name>
      <t>This memo composes with five Morrison-family Internet-Drafts.</t>
      <t><xref target="MCPDNS"/> supplies substrate discovery (<tt>_alter.&lt;domain&gt;</tt> TXT
scheme) and the cryptographic identity envelope that publishes
each party's Sovereign-tier signing key.  The Accord protocol
does not introduce new DNS labels except as content-addressed
sub-records under the existing <tt>_alter.</tt> zone.</t>
      <t><xref target="IDPRONOUNS"/> supplies the handle namespace and trust-tier
taxonomy.  Sovereign-tier handles are the authoritative
signatories of an Accord.  No new tier is introduced.</t>
      <t><xref target="IDCOMMITS"/> supplies the attribution grammar used by the
optional MCP tool surface and by Accord-adjacent git commits
recording amendment activity.  The Accord protocol's
<tt>parties[].handle</tt> field corresponds semantically to the
<tt>Acted-By:</tt> trailer slot of <xref target="IDCOMMITS"/>.</t>
      <t><xref target="ORGPOLICY"/> supplies the agent-runtime policy provision flow
into which the Accord's enforcement gate composes.  The Accord
gate of Section 9 layers above the per-runtime gate set of
<xref target="ORGPOLICY"/> Section 5 under a strictest-applicable composition
rule.</t>
      <t>The substrate-observation posture of the companion
substrate-observation memo (the present author's prior I-D) is
not directly invoked by the Accord protocol but is a sibling
posture: both rest on the principle that bilateral and
multilateral coordination problems benefit from substrate-
physics commitments rather than from canonical-broker
arbitration.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>A reference implementation of the bilateral Accord ceremony is
in active development by the specification's author against the
substrate <tt>~truealter.com</tt>.  The first live ceremony target is
a mutual non-disclosure agreement between Alter Meridian Pty
Ltd and an unnamed counterparty; ceremony execution is private
and the post-ceremony case study is anticipated as the public
artefact.</t>
      <t>In the spirit of [RFC7942], the present author notes that this
section documents implementation intent and is expected to be
removed before the document advances beyond the Independent
Stream.  No claim of interoperability is made; the reference
deployment is a single substrate operated by the
specification's author with a single anticipated counterparty.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC4648" target="https://www.rfc-editor.org/info/rfc4648" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4648.xml">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC8032" target="https://www.rfc-editor.org/info/rfc8032" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8032.xml">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
        <reference anchor="RFC8152" target="https://www.rfc-editor.org/info/rfc8152" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8152.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8152"/>
          <seriesInfo name="DOI" value="10.17487/RFC8152"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8615" target="https://www.rfc-editor.org/info/rfc8615" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8615.xml">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8949.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9052.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="MCPDNS" target="https://datatracker.ietf.org/doc/draft-morrison-mcp-dns-discovery/">
          <front>
            <title>Discovery of Model Context Protocol Servers via DNS TXT Records</title>
            <author fullname="Blake Morrison">
              <organization>Alter Meridian Pty Ltd</organization>
            </author>
            <date year="2026"/>
          </front>
        </reference>
        <reference anchor="IDPRONOUNS" target="https://datatracker.ietf.org/doc/draft-morrison-identity-pronouns/">
          <front>
            <title>Identity Pronouns: A Reference-Axis Extension to ~handle Identity Systems</title>
            <author fullname="Blake Morrison">
              <organization>Alter Meridian Pty Ltd</organization>
            </author>
            <date year="2026"/>
          </front>
        </reference>
        <reference anchor="IDCOMMITS" target="https://datatracker.ietf.org/doc/draft-morrison-identity-attributed-commits/">
          <front>
            <title>Identity-Attributed Git Commits via Tier-Structured Trailers</title>
            <author fullname="Blake Morrison">
              <organization>Alter Meridian Pty Ltd</organization>
            </author>
            <date year="2026"/>
          </front>
        </reference>
        <reference anchor="ORGPOLICY" target="https://datatracker.ietf.org/doc/draft-morrison-org-alter-policy-provision/">
          <front>
            <title>Org-Alter-Mediated Policy Provision and Governance Inheritance for Agent Runtimes Bound to a Principal Identity</title>
            <author fullname="Blake Morrison">
              <organization>Alter Meridian Pty Ltd</organization>
            </author>
            <date year="2026"/>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8785" target="https://www.rfc-editor.org/info/rfc8785" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8785.xml">
          <front>
            <title>JSON Canonicalization Scheme (JCS)</title>
            <author fullname="A. Rundgren" initials="A." surname="Rundgren"/>
            <author fullname="B. Jordan" initials="B." surname="Jordan"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>Cryptographic operations like hashing and signing need the data to be expressed in an invariant format so that the operations are reliably repeatable. One way to address this is to create a canonical representation of the data. Canonicalization also permits data to be exchanged in its original form on the "wire" while cryptographic operations performed on the canonicalized counterpart of the data in the producer and consumer endpoints generate consistent results.</t>
              <t>This document describes the JSON Canonicalization Scheme (JCS). This specification defines how to create a canonical representation of JSON data by building on the strict serialization methods for JSON primitives defined by ECMAScript, constraining JSON data to the Internet JSON (I-JSON) subset, and by using deterministic property sorting.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8785"/>
          <seriesInfo name="DOI" value="10.17487/RFC8785"/>
        </reference>
        <reference anchor="RFC6962" target="https://www.rfc-editor.org/info/rfc6962" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6962.xml">
          <front>
            <title>Certificate Transparency</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Kasper" initials="E." surname="Kasper"/>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6962"/>
          <seriesInfo name="DOI" value="10.17487/RFC6962"/>
        </reference>
        <reference anchor="RFC8615-WK" target="https://www.rfc-editor.org/rfc/rfc8615">
          <front>
            <title>Well-Known URIs</title>
            <author>
              <organization/>
            </author>
            <date year="2019"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 1039?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This memo grew out of internal architectural work on the
question of how two organisations, each represented by an
identity substrate, can execute a bilateral agreement as a
self-verifying portable artefact without recourse to a central
registry, a third-party signature platform, or any infrastructure
operated by either party's vendor.  The realisation that the
agreement substrate, the identity substrate, and the audit
substrate are the same substrate, and that this collapse is what
makes a third-party signature platform structurally redundant
between parties who hold their own identity logs, is the
load-bearing insight behind this specification.</t>
    </section>
    <section numbered="false" anchor="authors-address">
      <name>Author's Address</name>
      <t>Blake Morrison
Alter Meridian Pty Ltd
Cronulla, NSW
Australia
Email: blake@truealter.com</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
