Skip to content

KTP-Zones: Blue Zones & Trust Boundaries

"The internet was not designed for autonomous agents. Blue Zones are the safe harbors where they can exist with verified provenance and enforced constraints."


At a Glance

Property Value
Status Stable
Version 0.1
Dependencies KTP-Core, KTP-Identity
Required By KTP-Federation, KTP-Emergency

The Problem

The modern internet is a "Wild" zone by default. There is no native way to distinguish between a hardened, audited environment and a public, unverified network. For autonomous agents, this lack of boundary leads to:

  1. Context Collapse: Agents cannot verify if their environment supports their safety constraints.
  2. Provenance Gaps: Data moving between high-trust and low-trust areas loses its verification chain.
  3. Enforcement Failure: Security policies (like the Zeroth Law) cannot be guaranteed without environmental support.

The Solution: Blue Zones

KTP-Zones introduces a hierarchical gradient of trust environments. A Blue Zone is a cryptographically bounded space where specific KTP protocols are guaranteed to be enforced.

The Zone Gradient

The Core. Air-gapped or strictly controlled hardware.

  • Trust: Absolute.
  • Enforcement: Hardware-level (TEE/HSM).
  • Use Case: Root Identity issuance, Global Ledger maintenance.

The Standard. High-integrity cloud or private infrastructure.

  • Trust: High.
  • Enforcement: Kernel-level / Hypervisor.
  • Use Case: Enterprise agent swarms, Financial settlement.

The Edge. Managed public infrastructure with KTP extensions.

  • Trust: Moderate.
  • Enforcement: Application-level / Middleware.
  • Use Case: Public API gateways, Verified IoT clusters.

The Gateway. Public internet with KTP-aware proxies.

  • Trust: Low (Verified Entry).
  • Enforcement: Best-effort / Proxy-based.
  • Use Case: Web3 bridges, Legacy system integration.

The Void. The unverified public internet.

  • Trust: Zero.
  • Enforcement: None.
  • Use Case: General web traffic, Unverified data sources.

Zone Ingress & Egress

Moving data or agents between zones requires a Trust Transition. This is not a simple firewall rule, but a cryptographic proof exchange.

sequenceDiagram
    participant A as Agent (Zone: Wild)
    participant G as Gateway (Zone: Blue)
    participant C as Controller (Zone: Blue)

    Note over A,G: Ingress Request
    A->>G: Present Identity + Provenance
    G->>G: Verify Trust Proof (KTP-RFC-002)

    alt Proof Valid
        G->>C: Request Admission
        C->>C: Apply Soul Constraints
        C-->>G: Admission Token
        G-->>A: Welcome to Blue Zone
    else Proof Invalid
        G-->>A: Access Denied (Silent Veto)
    end

Core Components

Zone Discovery

Mechanisms for agents to detect the trust level of their current environment via DNS-SD or KTP-Broadcast.

Boundary Enforcement

The hard shell principle: Zones must fail-closed if cryptographic integrity is compromised.

The Bootstrap Paradox

How a zone establishes its first root of trust without relying on an external zone.

Inter-Zone Routing

Encapsulating KTP packets (KTP-RFC-004) within secure tunnels when traversing lower-trust zones.


Detailed Mechanics

Zone Genesis (The Bootstrap)

Creating a Blue Zone requires a Genesis Event. This involves: 1. Hardware Attestation: Verifying the underlying compute environment. 2. Identity Anchoring: Linking the zone to a KTP-Identity (KTP-RFC-002). 3. Constraint Definition: Setting the "Laws of the Land" (Soul Constraints).

The Zeroth Law in Zones

In a Deep Blue zone, the Zeroth Law (\(A \leq E_{trust}\)) is enforced by the hardware itself. If an agent attempts an action that violates its constraints, the CPU/TEE will physically refuse to execute the instruction.

Discovery Protocol

Agents use the following logic to determine their environment:

  1. Active Probe: Send a KTP-PING to the local gateway.
  2. Passive Listen: Monitor for Zone Heartbeats (signed by the Zone Authority).
  3. Recursive Verification: Verify the Zone Authority's identity against the Global Ledger.

Related Specifications
  • KTP-Core — The foundational protocol and the Zeroth Law (\(A \leq E\)).
  • KTP-Identity — Vector Identity and trajectory-based authentication.
  • KTP-Transport — The secure messaging and transport layer for KTP signals.
  • KTP-Sensors — The sensory nervous system providing real-time telemetry.

Official RFC Document

View Complete RFC Text (ktp-zones.txt)
Kinetic Trust Protocol                                      C. Perkins
Specification Draft                                           NMCITRA
Version: 0.1                                             November 2025


        Kinetic Trust Protocol (KTP) - Blue Zone Specification

Abstract

   This document specifies Blue Zones for the Kinetic Trust Protocol
   (KTP). Blue Zones are network segments where Digital Physics is
   enforced—safe harbors on the internet where agents operate under
   physics-based constraints with cryptographic trust guarantees.

   The specification covers zone types and gradients, zone discovery
   mechanisms, ingress and egress protocols, and zone governance
   requirements.

Status of This Memo

   This document is a draft specification developed by the New Mexico
   Cyber Intelligence & Threat Response Alliance (NMCITRA). It has not
   been submitted to the IETF and does not represent an Internet
   Standard or consensus of any standards body.

   Feedback and contributions are welcome at:
   https://github.com/nmcitra/ktp-rfc

Copyright Notice

   Copyright (c) 2025 Chris Perkins / NMCITRA. This work is licensed
   under the Apache License, Version 2.0.

Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . .   2
       1.1.  The Need for Safe Harbors  . . . . . . . . . . . . . .   2
       1.2.  Zone Philosophy  . . . . . . . . . . . . . . . . . . .   3
       1.3.  Requirements Language  . . . . . . . . . . . . . . . .   4
   2.  Terminology  . . . . . . . . . . . . . . . . . . . . . . . .   4
   3.  Zone Types . . . . . . . . . . . . . . . . . . . . . . . . .   6
       3.1.  Zone Gradient  . . . . . . . . . . . . . . . . . . . .   6
       3.2.  Deep Blue Zones  . . . . . . . . . . . . . . . . . . .   7
       3.3.  Blue Zones . . . . . . . . . . . . . . . . . . . . . .   8
       3.4.  Cyan Zones . . . . . . . . . . . . . . . . . . . . . .   9
       3.5.  Green Zones  . . . . . . . . . . . . . . . . . . . . .  10
       3.6.  Wild (Unzoned) . . . . . . . . . . . . . . . . . . . .  11
   4.  Zone Architecture  . . . . . . . . . . . . . . . . . . . . .  12
       4.1.  Required Components  . . . . . . . . . . . . . . . . .  12
       4.2.  Zone Boundary  . . . . . . . . . . . . . . . . . . . .  13
       4.3.  Zone Gateway . . . . . . . . . . . . . . . . . . . . .  14
   5.  Zone Discovery . . . . . . . . . . . . . . . . . . . . . . .  15
       5.1.  DNS-Based Discovery  . . . . . . . . . . . . . . . . .  15
       5.2.  Well-Known URI Discovery . . . . . . . . . . . . . . .  17
       5.3.  HTTP Header Discovery  . . . . . . . . . . . . . . . .  18
       5.4.  Service Mesh Discovery . . . . . . . . . . . . . . . .  19
   6.  Zone Ingress . . . . . . . . . . . . . . . . . . . . . . . .  20
       6.1.  Ingress Requirements . . . . . . . . . . . . . . . . .  20
       6.2.  Trust Proof Validation . . . . . . . . . . . . . . . .  21
       6.3.  Mass Requirements  . . . . . . . . . . . . . . . . . .  22
       6.4.  Sponsorship at Ingress . . . . . . . . . . . . . . . .  23
       6.5.  Quarantine Zone  . . . . . . . . . . . . . . . . . . .  24
   7.  Zone Egress  . . . . . . . . . . . . . . . . . . . . . . . .  25
       7.1.  Exit Attestation . . . . . . . . . . . . . . . . . . .  25
       7.2.  Trust Portability  . . . . . . . . . . . . . . . . . .  26
       7.3.  Cross-Zone Movement  . . . . . . . . . . . . . . . . .  27
   8.  Zone Governance  . . . . . . . . . . . . . . . . . . . . . .  28
       8.1.  Governance Requirements  . . . . . . . . . . . . . . .  28
       8.2.  Recursive Constraint . . . . . . . . . . . . . . . . .  29
       8.3.  Zone Policy  . . . . . . . . . . . . . . . . . . . . .  30
   9.  Zone Registration  . . . . . . . . . . . . . . . . . . . . .  31
       9.1.  Registry Structure . . . . . . . . . . . . . . . . . .  31
       9.2.  Registration Process . . . . . . . . . . . . . . . . .  32
       9.3.  Zone Genesis: The Bootstrap Protocol . . . . . . . . .  33
             9.3.1.  The Bootstrap Paradox  . . . . . . . . . . . .  33
             9.3.2.  The Moment of Faith  . . . . . . . . . . . . .  34
             9.3.3.  Genesis Ceremony Requirements  . . . . . . . .  34
             9.3.4.  Identity Proofing for Genesis  . . . . . . . .  36
             9.3.5.  Genesis Block Structure  . . . . . . . . . . .  38
             9.3.6.  Post-Genesis Bootstrap . . . . . . . . . . . .  40
             9.3.7.  Genesis for Federated Zones  . . . . . . . . .  41
             9.3.8.  Genesis Revocation . . . . . . . . . . . . . .  42
   10. Security Considerations  . . . . . . . . . . . . . . . . . .  43
   11. IANA Considerations  . . . . . . . . . . . . . . . . . . . .  44
   12. References . . . . . . . . . . . . . . . . . . . . . . . . .  45
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . .  46

1. Introduction

   The internet was not designed for autonomous agents. It was designed
   for human-speed interactions with implicit trust relationships. As
   autonomous agents proliferate, we need designated spaces where
   physics-based constraints are guaranteed—safe harbors where both
   humans and agents can operate with confidence.

   Blue Zones are these safe harbors.

1.1.  The Need for Safe Harbors

   The current internet has no mechanism to guarantee that an endpoint
   enforces any particular authorization model. An API might use OAuth,
   API keys, mutual TLS, or nothing at all. There is no way for an agent
   to know, before connecting, what rules will govern its behavior.

   This uncertainty creates several problems:

   1. Race to the Bottom: Without guaranteed constraints, competitive
      pressure drives toward permissiveness. Agents that honor
      constraints lose to agents that ignore them.

   2. Trust Vacuum: Without visible enforcement, trust cannot
      accumulate. Every interaction starts from zero.

   3. Liability Ambiguity: Without clear governance, it's unclear who is
      responsible when things go wrong.

   Blue Zones solve these problems by creating network segments where:

   -  KTP enforcement is guaranteed
   -  Trust is portable and visible
   -  Governance is explicit and auditable
   -  The physics are consistent and predictable

1.2.  Zone Philosophy

   Blue Zones embody several key principles:

   1. Opt-In Governance: Zones are voluntary. Operators choose to deploy
      KTP and advertise their zone. Agents choose to enter zones that
      match their needs.

   2. Gradient, Not Binary: Zones exist on a spectrum from Deep Blue
      (maximum physics) to Wild (no KTP). This allows gradual adoption
      and appropriate constraint levels for different use cases.

   3. Portable Trust: An agent's Trust Score and Proof of Resilience
      travel with it between zones. Good behavior in one zone creates
      value in others.

   4. Recursive Constraint: Zone governance is itself subject to KTP.
      Administrators cannot exempt themselves from physics.

   5. Transparent Boundaries: Zone boundaries are discoverable and
      explicit. Agents know when they enter and exit zones.

1.3.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in BCP
   14 [RFC2119] [RFC8174].

2. Terminology

   Blue Zone: A network segment where KTP is fully enforced, including
   all seven Constitutional Laws.

   Cyan Zone: A network segment with partial KTP enforcement, typically
   excluding some advanced features.

   Deep Blue Zone: A network segment with maximum KTP enforcement,
   requiring high agent mass and full trajectory verification.

   Exit Attestation: A signed statement from a zone's Trust Oracle
   attesting to an agent's behavior during its time in the zone.

   Federation: A trust relationship between zones that allows portable
   trust and cross-zone attestations.

   Green Zone: A network segment with minimal KTP enforcement, primarily
   passthrough Trust Proof validation.

   Ingress: The process of entering a zone, including Trust Proof
   validation and mass verification.

   Quarantine Zone: A restricted area where agents with insufficient
   trust can operate with limited capabilities while building mass.

   Wild: Network segments with no KTP enforcement (legacy internet).

   Zone Boundary: The logical perimeter of a zone, enforced by Zone
   Gateways.

   Zone Gateway: A specialized PEP that controls ingress and egress from
   a zone.

   Zone Gradient: The spectrum of zone types from Deep Blue (maximum) to
   Wild (none).

3. Zone Types

3.1.  Zone Gradient

   Zones exist on a gradient of enforcement intensity:

   +------------+----------+----------------------------------------+ |
   Zone Type  | Color    | Enforcement Level                      |
   +------------+----------+----------------------------------------+ |
   Deep Blue  | #000080  | Maximum: full trajectory, high mass    | |
   Blue       | #0000FF  | Full: KTP + sponsorship                | |
   Cyan       | #00FFFF  | Partial: lightweight Trust Proof       | |
   Green      | #00FF00  | Minimal: passthrough validation        | |
   Wild       | None     | None: legacy internet                  |
   +------------+----------+----------------------------------------+

   The gradient allows:

   -  Appropriate constraints for different use cases
   -  Gradual adoption path for organizations
   -  Interoperability between zones at different levels
   -  Clear expectations for agents and operators

3.2.  Deep Blue Zones

   Deep Blue Zones provide maximum physics enforcement. They are
   designed for critical infrastructure where the highest assurance is
   required.

   Requirements:

   1.  Full KTP enforcement (all seven Constitutional Laws)
   2.  Minimum agent mass: E_base >= 70
   3.  Full trajectory chain verification
   4.  Persistent lineage required (generation 6+)
   5.  Continuous environmental sensing (all 7 tensors)
   6.  Soul dimension always active
   7.  Threshold-signed Trust Proofs (minimum 3-of-5)
   8.  Flight Recorder with cryptographic chaining
   9.  Sub-second Trust Proof refresh

   Use cases:

   -  Financial trading systems
   -  Healthcare data systems
   -  Critical infrastructure control
   -  Government classified networks
   -  Nuclear facility controls

   Ingress requirements:

   -  Valid Trust Proof from federated zone
   -  E_base >= 70
   -  Trajectory chain verification (last 1000 transactions)
   -  No active Soul constraints
   -  Sponsor not required (agent has sufficient mass)

3.3.  Blue Zones

   Blue Zones provide full KTP enforcement suitable for enterprise and
   regulated industries.

   Requirements:

   1.  Full KTP enforcement (all seven Constitutional Laws)
   2.  Minimum agent mass: E_base >= 50
   3.  Trajectory chain verification (sampling)
   4.  Divergent or Persistent lineage (generation 3+)
   5.  Environmental sensing (minimum 5 tensors)
   6.  Soul dimension active for labeled data
   7.  Trust Proofs signed by zone Oracle
   8.  Flight Recorder required
   9.  Trust Proof refresh within 10 seconds

   Use cases:

   -  Enterprise applications
   -  E-commerce platforms
   -  SaaS providers
   -  Regulated industries (non-critical)
   -  Research institutions

   Ingress requirements:

   -  Valid Trust Proof from federated zone OR
   -  Sponsorship from zone-resident agent
   -  E_base >= 50 OR sponsored
   -  Basic trajectory verification
   -  Soul constraint check

3.4.  Cyan Zones

   Cyan Zones provide partial KTP enforcement for general commerce and
   early adopters.

   Requirements:

   1.  Core KTP enforcement (Zeroth Law, Trust Tiers)
   2.  Minimum agent mass: E_base >= 30 OR sponsored
   3.  Lightweight trajectory (last transaction only)
   4.  Any lineage permitted
   5.  Environmental sensing (minimum 3 tensors)
   6.  Soul dimension optional
   7.  Trust Proofs signed by zone Oracle
   8.  Flight Recorder recommended
   9.  Trust Proof refresh within 30 seconds

   Use cases:

   -  General web applications
   -  Content delivery
   -  Public APIs
   -  Developer platforms
   -  Early KTP adopters

   Ingress requirements:

   -  Valid Trust Proof OR
   -  Basic identity verification
   -  Sponsorship available for new agents
   -  Minimal trajectory check

3.5.  Green Zones

   Green Zones provide minimal KTP enforcement, primarily serving as a
   bridge between Wild internet and KTP zones.

   Requirements:

   1.  Trust Proof passthrough (validate but don't require)
   2.  No minimum mass requirement
   3.  No trajectory verification
   4.  Any lineage permitted
   5.  Environmental sensing optional
   6.  Soul dimension not enforced
   7.  Trust Proofs validated if present
   8.  Flight Recorder optional
   9.  No Trust Proof refresh requirement

   Use cases:

   -  Public websites
   -  Open APIs
   -  Adoption on-ramps
   -  Testing environments
   -  Legacy system interfaces

   Ingress requirements:

   -  None required
   -  Trust Proof honored if provided
   -  Agents without Trust Proof treated as E_trust = 0

3.6.  Wild (Unzoned)

   Wild refers to network segments with no KTP enforcement—the legacy
   internet as it exists today.

   Characteristics:

   -  No Trust Oracle
   -  No Trust Proof validation
   -  No environmental sensing
   -  Traditional authorization (if any)
   -  No trust portability
   -  No KTP audit trail

   Agents entering Wild from a zone:

   -  Lose KTP protections
   -  Cannot accumulate Proof of Resilience
   -  Should exercise caution
   -  May re-enter zones with prior Trust Score

   Agents entering zones from Wild:

   -  Must obtain Trust Proof (may require sponsorship)
   -  Start with E_base based on any prior zone history
   -  May enter Quarantine Zone first

4. Zone Architecture

4.1.  Required Components

   A Blue Zone requires the following components:

   +------------------------------------------------------------------+
   |                          BLUE ZONE                               |
   |                                                                  |
   |  +------------------------------------------------------------+  |
   |  |                   Trust Oracle Mesh                         |  |
   |  |     [Oracle 1] <--> [Oracle 2] <--> [Oracle 3]             |  |
   |  |              (threshold signatures)                         |  |
   |  +------------------------------------------------------------+  |
   |                              |                                   |
   |  +------------------------------------------------------------+  |
   |  |                Context Tensor Sensors                       |  |
   |  |   [M] [P] [H] [T] [I] [O] [S]                              |  |
   |  +------------------------------------------------------------+  |
   |                              |                                   |
   |  +------------------------------------------------------------+  |
   |  |               Policy Enforcement Points                     |  |
   |  |   [API GW PEP] [Service Mesh PEP] [IAM PEP] [DB PEP]       |  |
   |  +------------------------------------------------------------+  |
   |                              |                                   |
   |  +------------------------------------------------------------+  |
   |  |                  Agent Population                           |  |
   |  |   [Tethered] [Divergent] [Persistent]                      |  |
   |  +------------------------------------------------------------+  |
   |                              |                                   |
   |  +------------------------------------------------------------+  |
   |  |              Flight Recorder (Immutable)                    |  |
   |  +------------------------------------------------------------+  |
   |                                                                  |
   +------------------------------------------------------------------+
   | [ZONE GATEWAY] |
   +------------------------------------------------------------------+
   |                     EXTERNAL (Other Zones / Wild)               |
   +------------------------------------------------------------------+

   Figure 1: Blue Zone Architecture

4.2.  Zone Boundary

   The zone boundary is the logical perimeter where KTP enforcement
   begins and ends. All traffic crossing the boundary MUST pass through
   a Zone Gateway.

   Boundary characteristics:

   1.  Well-defined: Clear network segmentation (VLAN, subnet, etc.)
   2.  Enforceable: No bypass paths around Zone Gateway
   3.  Monitored: All boundary crossings logged
   4.  Discoverable: Advertised via discovery mechanisms

   Boundary enforcement:

   -  Network-level: Firewall rules, routing policies
   -  Application-level: API gateway enforcement
   -  Service-level: Service mesh policies

4.3.  Zone Gateway

   The Zone Gateway is a specialized PEP that controls zone ingress and
   egress.

   Gateway responsibilities:

   1.  Validate Trust Proofs from external zones
   2.  Verify agent mass meets zone minimum
   3.  Check trajectory chain continuity
   4.  Evaluate Soul constraints
   5.  Issue zone-local Trust Proofs
   6.  Generate Exit Attestations
   7.  Translate between zone trust levels
   8.  Log all boundary crossings

   Gateway configuration:

      {
        "zone_id": "zone-blue-prod-01",
        "zone_type": "blue",
        "min_mass": 50,
        "federation": {
          "trusted_zones": [
            "zone-blue-prod-02",
            "zone-deep-blue-critical"
          ],
          "trust_factor": {
            "zone-blue-prod-02": 1.0,
            "zone-deep-blue-critical": 1.0,
            "zone-cyan-staging": 0.8,
            "unknown": 0.5
          }
        },
        "ingress": {
          "require_trust_proof": true,
          "allow_sponsorship": true,
          "quarantine_enabled": true
        },
        "egress": {
          "issue_exit_attestation": true,
          "attestation_detail": "full"
        }
      }

5. Zone Discovery

   Agents need to discover zone characteristics before entering.
   Multiple discovery mechanisms are supported.

5.1.  DNS-Based Discovery

   Zones SHOULD publish a DNS TXT record for discovery:

   Record format:

      _ktp.<domain>. IN TXT "v=ktp1; zone=<type>; oracle=<url>;
                             min_mass=<n>; federation=<mode>"

   Fields:

   v: Protocol version (ktp1) zone: Zone type (deep-blue, blue, cyan,
   green) oracle: Trust Oracle URL min_mass: Minimum E_base required for
   entry federation: Federation mode (open, closed, list)

   Examples:

      _ktp.example.com. IN TXT "v=ktp1; zone=blue;
          oracle=https://oracle.example.com; min_mass=50;
          federation=open"

      _ktp.critical.gov. IN TXT "v=ktp1; zone=deep-blue;
          oracle=https://oracle.critical.gov; min_mass=70;
          federation=closed"

   Discovery process:

   1.  Agent queries _ktp.<target_domain> TXT record
   2.  Parse response to extract zone parameters
   3.  Verify Oracle certificate
   4.  Determine if agent meets entry requirements
   5.  Proceed with ingress protocol

5.2.  Well-Known URI Discovery

   Zones MUST publish zone information at a well-known URI:

   URI: https://<domain>/.well-known/ktp-zone

   Response format:

      {
        "version": "ktp1",
        "zone_id": "zone-blue-prod-01",
        "zone_type": "blue",
        "zone_name": "Example Production Zone",
        "operator": {
          "name": "Example Corporation",
          "contact": "security@example.com"
        },
        "trust_oracle": {
          "url": "https://oracle.example.com",
          "public_key": "-----BEGIN PUBLIC KEY-----...",
          "quorum": "3-of-5"
        },
        "requirements": {
          "min_mass": 50,
          "min_lineage": "divergent",
          "trajectory_verification": true,
          "soul_enforcement": true
        },
        "federation": {
          "mode": "open",
          "trusted_zones": [
            {
              "zone_id": "zone-blue-prod-02",
              "trust_factor": 1.0
            }
          ]
        },
        "ingress": {
          "gateway_url": "https://gateway.example.com",
          "sponsorship_available": true,
          "quarantine_available": true
        },
        "governance": {
          "policy_url": "https://example.com/ktp-policy",
          "audit_url": "https://audit.example.com"
        }
      }

5.3.  HTTP Header Discovery

   Zones SHOULD include KTP headers in HTTP responses:

   Headers:

      X-KTP-Zone: blue
      X-KTP-Zone-ID: zone-blue-prod-01
      X-KTP-Oracle: https://oracle.example.com
      X-KTP-Min-Mass: 50
      X-KTP-Federation: open

   This allows agents to discover zone characteristics from any HTTP
   interaction with zone resources.

5.4.  Service Mesh Discovery

   In service mesh environments, zone information can be discovered via
   mesh configuration:

   Istio example:

      apiVersion: networking.istio.io/v1alpha3
      kind: DestinationRule
      metadata:
        name: ktp-zone-config
        annotations:
          ktp.zone/type: "blue"
          ktp.zone/id: "zone-blue-prod-01"
          ktp.zone/oracle: "https://oracle.example.com"
          ktp.zone/min-mass: "50"

   Linkerd example:

      apiVersion: policy.linkerd.io/v1beta1
      kind: Server
      metadata:
        name: ktp-protected-server
        annotations:
          ktp.zone/type: "blue"
          ktp.zone/id: "zone-blue-prod-01"

6. Zone Ingress

6.1.  Ingress Requirements

   To enter a zone, an agent must satisfy the zone's ingress
   requirements:

   +-------------+--------------------------------------------------+ |
   Zone Type   | Ingress Requirements                             |
   +-------------+--------------------------------------------------+ |
   Deep Blue   | Trust Proof + E_base >= 70 + trajectory          | |
   Blue        | Trust Proof + E_base >= 50 OR sponsorship        | |
   Cyan        | Trust Proof OR identity + optional sponsorship   | |
   Green       | None (Trust Proof honored if present)            |
   +-------------+--------------------------------------------------+

6.2.  Trust Proof Validation

   When an agent presents a Trust Proof at zone ingress:

   1.  Verify signature against known Trust Oracles
       -  Own zone's Oracle
       -  Federated zones' Oracles

   2.  Check expiration
       -  Trust Proof must not be expired
       -  Tolerance: 5 seconds clock skew

   3.  Verify Soul constraint
       -  If S = 1, deny entry
       -  Log Soul veto attempt

   4.  Check E_base against zone minimum
       -  If E_base < min_mass, offer sponsorship or quarantine

   5.  Verify trajectory chain (if required)
       -  Request trajectory verification from source zone
       -  Check for continuity violations

   6.  Issue zone-local Trust Proof
       -  Sign with zone's Oracle key
       -  Apply federation trust factor to E_base

6.3.  Mass Requirements

   Different zones require different minimum mass (E_base):

   Mass calculation at ingress:

      E_base_zone = E_base_external * federation_trust_factor

   If E_base_zone < zone_min_mass:
   -  Offer sponsorship (if available)
   -  Offer quarantine (if available)
   -  Deny entry

   Example:

      Agent from Cyan zone (E_base = 45) entering Blue zone
      Federation trust factor for Cyan: 0.8
      E_base_zone = 45 * 0.8 = 36
      Blue zone min_mass = 50
      36 < 50: Agent needs sponsorship or quarantine

6.4.  Sponsorship at Ingress

   Agents with insufficient mass can enter via sponsorship:

   1.  Agent requests sponsorship from zone-resident sponsor
   2.  Sponsor evaluates agent's trajectory and purpose
   3.  Sponsor issues Sponsorship Bond
   4.  Zone Gateway validates bond
   5.  Agent enters as Tethered to sponsor
   6.  Sponsor's trust is at stake for agent's behavior

   Sponsorship bond at ingress:

      {
        "bond_type": "ingress_sponsorship",
        "sponsor_id": "agent:persistent:corp:sponsor123",
        "sponsored_id": "agent:external:unknown:newagent",
        "zone_id": "zone-blue-prod-01",
        "stake_percentage": 0.15,
        "duration": "PT24H",
        "purpose": "Data analysis integration",
        "restrictions": [
          "max_action_risk: 60",
          "allowed_resources: /api/data/*",
          "denied_resources: /api/admin/*"
        ]
      }

6.5.  Quarantine Zone

   Zones MAY provide a Quarantine Zone for agents that don't meet entry
   requirements but aren't actively malicious:

   Quarantine characteristics:

   -  Limited capabilities (Observer Mode or below)
   -  Restricted resource access
   -  Monitored behavior
   -  Opportunity to build mass
   -  Path to full zone entry

   Quarantine progression:

   1.  Agent enters quarantine with E_trust = 20
   2.  Agent performs low-risk actions successfully
   3.  Trust Oracle issues attestations
   4.  E_base accumulates via Proof of Resilience
   5.  When E_base >= zone_min_mass, agent can exit quarantine
   6.  Agent transitions to full zone membership

7. Zone Egress

7.1.  Exit Attestation

   When an agent exits a zone, the zone SHOULD issue an Exit Attestation
   summarizing the agent's behavior:

      {
        "attestation_type": "exit",
        "zone_id": "zone-blue-prod-01",
        "agent_id": "agent:7gen:optimized:a1b2c3d4",
        "entry_time": "2025-11-25T10:00:00Z",
        "exit_time": "2025-11-25T18:00:00Z",
        "duration_seconds": 28800,
        "summary": {
          "actions_total": 4721,
          "actions_allowed": 4709,
          "actions_vetoed": 12,
          "veto_rate": 0.0025,
          "tier_history": ["operator", "analyst", "operator"],
          "min_e_trust": 68,
          "max_e_trust": 92,
          "avg_e_trust": 84,
          "soul_vetoes": 0,
          "attestations_earned": 47
        },
        "behavior_rating": "excellent",
        "signature": "sig:oracle:xyz789..."
      }

   Exit Attestations become part of the agent's portable reputation.

7.2.  Trust Portability

   An agent's trust is portable between federated zones:

   Trust components that travel:

   -  E_base (adjusted by federation factor)
   -  Proof of Resilience ledger
   -  Trajectory chain
   -  Exit Attestations from previous zones

   Trust components that don't travel:

   -  Zone-specific permissions
   -  Local relationships
   -  Zone-specific attestations (converted to Exit Attestation)

7.3.  Cross-Zone Movement

   When moving between zones:

   1.  Agent requests exit from current zone
   2.  Current zone issues Exit Attestation
   3.  Agent presents Trust Proof + Exit Attestation to new zone
   4.  New zone validates credentials
   5.  New zone calculates adjusted E_base
   6.  New zone issues zone-local Trust Proof
   7.  Agent enters new zone

   Cross-zone transaction:

      Zone A                    Agent                    Zone B
         |                        |                        |
         |<-- Request Exit -------|                        |
         |                        |                        |
         |--- Exit Attestation -->|                        |
         |                        |                        |
         |                        |--- Trust Proof ------->|
         |                        |    + Exit Attestation  |
         |                        |                        |
         |                        |<-- Zone-B Trust Proof --|
         |                        |                        |
         |                        |    [Agent now in Zone B]

8. Zone Governance

8.1.  Governance Requirements

   Every zone MUST have documented governance:

   1.  Zone Policy: What rules apply within the zone
   2.  Operator Identity: Who operates the zone
   3.  Contact Information: How to reach zone operators
   4.  Dispute Resolution: How conflicts are resolved
   5.  Audit Access: How governance can be verified

   Governance document:

      {
        "zone_id": "zone-blue-prod-01",
        "governance_version": "1.0",
        "effective_date": "2025-01-01",
        "operator": {
          "legal_name": "Example Corporation",
          "jurisdiction": "US-NM",
          "contact": "security@example.com"
        },
        "policy": {
          "ktp_version": "1.0",
          "constitutional_laws": "all",
          "custom_policies": [
            "https://example.com/ktp-policy-addendum"
          ]
        },
        "audit": {
          "flight_recorder": "https://audit.example.com",
          "third_party_auditor": "Example Audit LLC",
          "audit_schedule": "quarterly"
        },
        "disputes": {
          "process": "https://example.com/dispute-resolution",
          "arbitration": "JAMS",
          "jurisdiction": "US-NM"
        }
      }

8.2.  Recursive Constraint

   Zone governance is subject to KTP itself (Article VII of the
   Constitution). This means:

   1.  Zone administrators are agents within the zone
   2.  Administrator actions require Trust Proof
   3.  Administrator actions are logged to Flight Recorder
   4.  A <= E_trust applies to administrative actions
   5.  Administrators cannot exempt themselves from physics

   This prevents governance hypocrisy where rules apply to others but
   not to the rule-makers.

8.3.  Zone Policy

   Zones MAY define custom policies beyond base KTP:

   Policy types:

   1.  Action restrictions: Additional limits on action classes
   2.  Resource restrictions: Specific resources with custom rules
   3.  Time restrictions: Hours of operation, maintenance windows
   4.  Agent restrictions: Requirements beyond KTP baseline

   Policy example:

      {
        "policy_id": "zone-blue-prod-01-policy",
        "extends": "ktp-base",
        "custom_rules": [
          {
            "rule_id": "no-prod-deploy-friday",
            "description": "No production deployments on Friday",
            "condition": {
              "day_of_week": [5],
              "action_class": "execute_deploy"
            },
            "effect": "deny"
          },
          {
            "rule_id": "pii-requires-analyst",
            "description": "PII access requires Analyst tier",
            "condition": {
              "resource": "/api/users/*/pii",
              "tier": ["observer"]
            },
            "effect": "deny"
          }
        ]
      }

9. Zone Registration

9.1.  Registry Structure

   A public registry of zones enables discovery and federation:

   Registry entry:

      {
        "zone_id": "zone-blue-prod-01",
        "zone_type": "blue",
        "operator": "Example Corporation",
        "domain": "example.com",
        "oracle_url": "https://oracle.example.com",
        "oracle_public_key": "-----BEGIN PUBLIC KEY-----...",
        "discovery_url": "https://example.com/.well-known/ktp-zone",
        "registered": "2025-01-15T00:00:00Z",
        "last_verified": "2025-11-25T00:00:00Z",
        "status": "active",
        "federation": {
          "mode": "open",
          "partners": ["zone-blue-prod-02"]
        }
      }

9.2.  Registration Process

   To register a zone:

   1.  Deploy KTP infrastructure meeting zone type requirements
   2.  Publish discovery information (DNS, well-known URI)
   3.  Submit registration to zone registry
   4.  Registry verifies:
       -  Discovery endpoints accessible
       -  Oracle responding
       -  Governance documentation complete
   5.  Registry issues zone certificate
   6.  Zone appears in public registry
   7.  Periodic re-verification (recommended: monthly)

9.3.  Zone Genesis: The Bootstrap Protocol

   Every zone faces a bootstrap paradox: Trust Oracles need trust to
   operate, but cannot earn trust without operating. This section
   specifies how the first zone is created — the "moment of faith" that
   anchors the entire trust chain.

9.3.1.  The Bootstrap Paradox

   The paradox formally stated:

   -  Trust Oracles issue Trust Proofs
   -  Trust Proofs require a trusted Oracle signature
   -  Oracle trust requires a trajectory of successful operation
   -  Trajectory requires the Oracle to already be operating
   -  Operating requires being trusted
   -  Circular dependency: No starting point

   KTP resolves this paradox by grounding the initial trust in HUMAN
   IDENTITY VERIFICATION, not agent trajectory. The trust chain starts
   with verified humans, not with machines.

9.3.2.  The Moment of Faith

   Every trust system has a "moment of faith" — an initial trust
   assumption that cannot be derived from the system itself. In KTP,
   that moment is:

   "We trust verified humans to bootstrap verified machines."

   This is explicit, auditable, and bounded:
   -  Explicit: The genesis ceremony is documented
   -  Auditable: All participants are identity-proofed
   -  Bounded: Genesis humans have limited ongoing authority

   The alternative — trusting machines to bootstrap machines — creates
   infinite regress. Human identity verification provides the ground.

9.3.3.  Genesis Ceremony Requirements

   Zone genesis MUST follow a formal ceremony:

   PHASE 1: TRUSTEE ASSEMBLY

   1.  Identify M-of-N genesis trustees (recommended: 5-of-7)
   2.  Each trustee MUST be identity-proofed to IAL3 by an accredited
       Identity Proofing Provider (see Section 9.3.4)
   3.  Trustees MUST represent diverse interests:
       -  At least 2 from different organizations
       -  At least 1 independent technical expert
       -  At least 1 legal/governance expert
   4.  No single organization may control more than 2 trustees
   5.  All trustees must sign Genesis Commitment document

   PHASE 2: INFRASTRUCTURE VERIFICATION

   1.  Independent auditor verifies zone infrastructure:
       -  Hardware security (HSMs installed, tamper-evident)
       -  Software integrity (hashes match published values)
       -  Network isolation (air-gapped during ceremony)
       -  Conformance to KTP-CONFORMANCE requirements
   2.  Auditor issues Infrastructure Attestation
   3.  Attestation is signed and published

   PHASE 3: KEY GENERATION

   1.  Conducted in physically secure, air-gapped environment
   2.  HSMs generate zone root keypair
   3.  M-of-N threshold signatures configured for trustees
   4.  Root key NEVER exists in assembled form after ceremony
   5.  Each trustee receives encrypted key share
   6.  Key shares stored in geographically distributed locations

   PHASE 4: GENESIS BLOCK

   1.  First Trust Oracle is initialized with:
       -  Zone root public key
       -  Genesis timestamp
       -  Trustee public keys and IAL attestations
       -  Infrastructure Attestation reference
       -  Zone governance document hash
   2.  Genesis block is signed by M-of-N trustees
   3.  Genesis block becomes the immutable anchor

   PHASE 5: PUBLICATION

   1.  Genesis block published to zone registry
   2.  Trustee identities published (or hashes, if privacy required)
   3.  IAL attestations published or verifiably referenced
   4.  Ceremony recording archived (video, audit log)
   5.  Independent witness attestations collected

9.3.4.  Identity Proofing for Genesis

   Genesis trustees MUST be proofed by an Identity Proofing Provider
   (IdP) that meets:

   ACCREDITATION REQUIREMENTS:
   -  Certified to perform IAL3 proofing per NIST 800-63A
   -  FedRAMP authorized (for US government zones) OR
   -  eIDAS qualified (for EU zones) OR
   -  Equivalent national certification
   -  SOC 2 Type II audit within past 12 months
   -  Published proofing procedures

   PROOFING PROCESS:
   -  In-person verification with trained operator
   -  Government-issued photo ID inspection (minimum 2 documents)
   -  Biometric capture (photo, fingerprint recommended)
   -  Liveness detection (anti-spoofing)
   -  Database verification (where legally permitted)
   -  Proofing assertion issued with cryptographic binding

   ACCEPTABLE IdP EXAMPLES:
   -  Government identity agencies (DMV, passport office)
   -  Qualified Trust Service Providers (QTSPs)
   -  FedRAMP-authorized identity providers
   -  Notary public with identity verification authority
   -  Financial institutions with KYC compliance

   The IdP provides a signed Identity Assertion:

      {
        "assertion_type": "ial3_proofing",
        "subject": {
          "name_hash": "sha256:abc123...",
          "document_types": ["passport", "drivers_license"],
          "proofing_date": "2025-11-20",
          "proofing_location": "Albuquerque, NM, USA",
          "proofing_method": "in_person_biometric"
        },
        "provider": {
          "name": "Acme Identity Services",
          "accreditation": "FedRAMP_High",
          "accreditation_id": "FED-1234-5678"
        },
        "assertion_id": "ial3:acme:2025:987654",
        "validity_period": "P3Y",
        "signature": "sig:provider:xyz..."
      }

9.3.5.  Genesis Block Structure

   The Genesis Block is the zone's immutable origin:

      {
        "block_type": "genesis",
        "zone_id": "zone:blue:example:prod-01",
        "version": "1.0",
        "timestamp": "2025-11-25T14:00:00Z",

        "trustees": [
          {
            "trustee_id": "trustee:genesis:1",
            "name_hash": "sha256:abc...",
            "organization": "Example Corp",
            "ial_assertion": "ial3:acme:2025:987654",
            "public_key": "-----BEGIN PUBLIC KEY-----...",
            "role": "technical"
          },
          // ... additional trustees
        ],

        "threshold": {
          "m": 5,
          "n": 7,
          "scheme": "shamir_threshold"
        },

        "infrastructure": {
          "attestation_ref": "audit:infra:2025:xyz789",
          "auditor": "SecureAudit LLC",
          "audit_date": "2025-11-24",
          "conformance_level": "level2"
        },

        "zone_config": {
          "type": "blue",
          "governance_hash": "sha256:gov123...",
          "initial_policy_hash": "sha256:pol456..."
        },

        "oracle": {
          "oracle_id": "oracle:genesis:zone:example",
          "public_key": "-----BEGIN PUBLIC KEY-----...",
          "hsm_attestation": "hsm:vendor:model:serial:attestation"
        },

        "witnesses": [
          {
            "witness_id": "witness:independent:1",
            "attestation": "I witnessed the genesis ceremony...",
            "signature": "sig:witness:..."
          }
        ],

        "ceremony": {
          "location": "Secure Facility, Albuquerque, NM",
          "recording_hash": "sha256:vid789...",
          "audit_log_hash": "sha256:log012..."
        },

        "signatures": [
          {
            "trustee_id": "trustee:genesis:1",
            "signature": "sig:trustee:1:..."
          },
          // ... M-of-N signatures required
        ]
      }

9.3.6.  Post-Genesis Bootstrap

   After genesis, the zone bootstraps operational trust:

   FIRST 24 HOURS (Genesis Window):
   -  Only genesis trustees can operate as agents
   -  Trustees manually verify first operational agents
   -  Each new agent requires M-of-N trustee approval
   -  Maximum 10 agents can be created

   DAYS 2-7 (Nursery Period):
   -  Genesis agents begin accumulating trajectory
   -  E_base starts at 50 (granted by genesis)
   -  Actions limited to low-risk operations
   -  Trust Oracle begins issuing attestations

   DAYS 8-30 (Incubation Period):
   -  Agents with sufficient trajectory can sponsor new agents
   -  Normal sponsorship rules apply
   -  Genesis trustees retain override authority
   -  Regular security audits required

   DAY 31+ (Operational):
   -  Normal KTP operations
   -  Genesis trustee authority limited to:
       -  Key recovery ceremonies
       -  Zone dissolution
       -  Emergency shutdown
   -  No ongoing operational authority

9.3.7.  Genesis for Federated Zones

   When a new zone joins an existing federation:

   OPTION A: INDEPENDENT GENESIS
   -  Full genesis ceremony as above
   -  Federation agreement signed post-genesis
   -  Trust established via federation protocol

   OPTION B: SPONSORED GENESIS (Recommended)
   -  Existing federation member sponsors new zone
   -  Sponsor attests to zone governance and infrastructure
   -  Reduced trustee requirement (3-of-5 minimum)
   -  Sponsor's trust is at stake for zone behavior
   -  Faster path to operational status

   Sponsored genesis requirements:
   -  Sponsor must be established zone (> 90 days operational)
   -  Sponsor must have E_base > 80
   -  Sponsor stakes 10% of zone trust on new zone
   -  New zone begins with Federation Trust Factor = 0.5

9.3.8.  Genesis Revocation

   If the genesis is compromised (trustee breach, key exposure):

   1.  Any trustee can initiate revocation
   2.  M-of-N trustees must confirm
   3.  Zone enters EMERGENCY mode
   4.  All Trust Proofs invalidated
   5.  New genesis ceremony required
   6.  Agents must re-establish trust from zero

   This is catastrophic but recoverable. The explicit genesis ceremony
   means we know exactly what was trusted and can precisely revoke that
   trust.

10. Security Considerations

   10.1. Zone Spoofing

   Attackers may create fake zones to capture agent credentials.

   Mitigations:
   -  Verify zone certificates
   -  Use registry lookup before entering unknown zones
   -  Validate Oracle public keys via multiple channels
   -  Warning on unregistered zones

   10.2. Federation Abuse

   Malicious zones might issue fraudulent Exit Attestations.

   Mitigations:
   -  Apply trust factor to federated zones
   -  Verify attestation signatures
   -  Track attestation patterns for anomalies
   -  Revoke federation from misbehaving zones

   10.3. Gateway Bypass

   Attackers may attempt to enter zones without passing through
   gateways.

   Mitigations:
   -  Network-level enforcement (firewall, routing)
   -  Service mesh enforcement
   -  Anomaly detection for ungated traffic
   -  Regular boundary audits

11. IANA Considerations

   11.1. Well-Known URI Registration

   URI suffix: ktp-zone Specification document: This document Related
   information: KTP zone discovery

   11.2. DNS Service Name

   Service name: _ktp Protocol: tcp Specification: This document

12. References

12.1.  Normative References

   [KTP-CORE] Perkins, C., "Kinetic Trust Protocol - Core
   Specification", NMCITRA, November 2025.

   [KTP-ENFORCE] Perkins, C., "Kinetic Trust Protocol - Enforcement
   Layer Specification", NMCITRA, November 2025.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
   Requirement Levels", BCP 14, RFC 2119, March 1997.

12.2.  Informative References

   [KTP-FEDERATION] Perkins, C., "Kinetic Trust Protocol - Trust
   Federation Specification", NMCITRA, November 2025.

Authors' Addresses

   Chris Perkins New Mexico Cyber Intelligence & Threat Response
   Alliance (NMCITRA)

   Email: cperkins@nmcitra.org