Abstract
While MCP has standardized agent-to-tool connectivity (97M+ monthly SDK downloads) and A2A has consolidated agent-to-agent communication (150+ organizations), every major analysis of the agentic AI landscape identifies the same vacancy: there is no unified, vendor-neutral discovery layer spanning protocols, frameworks, and platforms. This paper examines DUADP's technical architecture — combining DNS TXT records, WebFinger-style resolution, federated gossip propagation, and a novel GAID URI scheme — against centralized registries (MCP Registry, Salesforce AgentExchange), competing decentralized approaches (AGNTCY's P2P DHT, ANS's DNS hierarchy), and emerging standards (IETF agent:// draft, did:wba, AID). We analyze the 12-18 month competitive window and the strategic implications of NIST CAISI's AI Agent Standards Initiative.
1. Introduction: The Last Unsolved Problem
The agentic AI protocol landscape underwent remarkable consolidation in 2025, crystallizing into a complementary multi-protocol stack under Linux Foundation governance:
| Protocol | Function | Scale | Governance |
|---|---|---|---|
| MCP | Agent-to-tool connectivity | 5,800+ servers, 97M+ monthly SDK downloads | AAIF / Linux Foundation |
| A2A | Agent-to-agent communication | 150+ organizations (Adobe, Cisco, SAP) | Google-led, AAIF |
| AGENTS.md | Coding agent context | 60,000+ repositories | OpenAI-originated, AAIF |
| AGNTCY | Infrastructure plumbing | 75+ companies (Cisco, Dell, Oracle, Red Hat) | Linux Foundation |
Yet none answers the fundamental question: how does an agent — or a human — discover the right agent for a task across the entire ecosystem?
The fragmentation math is stark:
- 10+ major agent marketplaces exist, each with different listing requirements
- The MCP Registry indexes only MCP servers
- A2A's
.well-known/agent.jsonis per-domain with no global search - Google Agentspace is a proprietary walled garden
- Salesforce AgentExchange serves only the Salesforce ecosystem
- The OpenAI GPT Store contains 3M+ custom GPTs but is OpenAI-locked
- Fetch.ai's Almanac requires blockchain transactions for registration
BCG calculates that without standards, integration complexity rises quadratically. The AI agent market is projected to reach $50 billion by 2030 with 10,000+ custom agents published weekly. Universal discovery infrastructure is not just useful — it is essential.
2. Competing Agent URI Schemes
The agent identifier landscape contains at least six competing approaches, none yet dominant.
2.1 IETF draft-narvaneni-agent-uri
Defines agent:// with a five-layer architecture: URI scheme, transport binding, agent descriptor, resolution framework, and application semantics. At IETF 123, Ted Hardie stated the draft would need "significant refactoring" for adoption.
2.2 did:wba (Web-Based Agent DID)
Extends W3C's did:web for agent-to-agent authentication. Format: did:wba:example.com:user:alice resolves to https://example.com/user/alice/did.json. Authentication uses DID + cryptographic signature in HTTP headers.
2.3 AID (Agent Identity & Discovery)
DNS-first approach using a single _agent TXT record per domain. Single-letter field keys (v, u, p, k, i) maximize byte efficiency within DNS's 255-byte-per-string limit. Identity verification uses Ed25519 HTTP signatures.
2.4 JSON Agents / PAM (Portable Agent Manifest)
Defines ajson:// URI scheme with JSON Schema 2020-12 validation, seven standard capabilities, modular profiles (core, exec, gov, graph), and explicit framework mappings for LangChain, OpenAI, AutoGen, and MCP.
2.5 BANDAID IETF Draft
Proposes SVCB records under _agents.example.com subdomains, secured with DNSSEC + DANE — a modern DNS foundation for agent discovery.
2.6 GAID (DUADP)
duadp://namespace/path offers three differentiators:
- Unified discovery and identity —
duadp://skills.sh/tools/web-searchsimultaneously identifies the resource and implies its discovery mechanism - Multi-mechanism resolution — designed for DNS TXT, WebFinger, registry API, and gossip network with graceful fallback
- Hierarchical namespace — agents, tools, skills, and workflows under a unified addressing scheme
The closest analog is WebFinger (RFC 7033), which ActivityPub/Mastodon uses for federated actor discovery. No formal proposal yet combines WebFinger specifically with AI agent discovery, but the pattern is natural: a WebFinger query for a GAID returns links to the agent's A2A Agent Card, MCP server manifest, and OSSA contract simultaneously.
3. Agent Description Formats: The Index Card Gap
Current formats occupy distinct layers:
| Format | Layer | Scope | Limitation |
|---|---|---|---|
| A2A Agent Cards | Protocol discovery | A2A-compatible agents only | No governance, trust, or cost info |
| MCP server.json | Tool invocation | MCP servers only | No agent identity or capability negotiation |
| OSSA manifest | Full governance contract | All agent types | Not optimized for lightweight indexing |
| AGENTS.md | Human-readable guidance | Coding agents | Not machine-parseable |
The gap: no format is optimized for universal discovery indexing across all layers.
DUADP's .ajson format targets this gap as a universal index record — rich enough for discovery decisions but pointing to full specifications elsewhere. An .ajson record contains: GAID URI, description, capability tags from a standardized taxonomy, endpoint URLs for each supported protocol, trust tier indicators, and provenance signatures.
This "index card" approach avoids competing with existing formats while providing the universal indexing layer none of them offer.
4. Federated Gossip: Why It Beats Both Alternatives
DUADP's three-tier architecture — DNS TXT bootstrap, WebFinger-style resolution, gossip-based federation — occupies a pragmatic middle ground.
4.1 Centralized Registries: The Gatekeeper Problem
MCP Registry, Salesforce AgentExchange, and Google AI Agent Marketplace offer curated discovery but create single points of failure and vendor lock-in. As Infoblox's DNS-AID proposal warns: "Whoever controls discovery influences an agent's attack surface."
4.2 Pure P2P: The Complexity Tax
AGNTCY's P2P DHT (using libp2p Kad-DHT) eliminates single points of failure but introduces latency, consistency challenges, and bootstrap problems. The ANS IETF draft authors acknowledge "architectural decisions about the extent of decentralization required, plus issues like latency, consistency, operational cost, and complexity."
4.3 Federated Model: Email's Architecture Applied to Agents
DUADP mirrors the architecture that made email the most successful federated system in history:
- DNS TXT records provide bootstrap — any domain advertises its DUADP node, like SPF/DMARC for email
- WebFinger-style resolution enables cross-domain discovery, like ActivityPub resolves
@user@instance - Gossip protocol federation (modeled on Consul's Serf/SWIM) propagates discovery in O(log N) rounds
The critical advantage: running a DUADP node can be as simple as hosting a static JSON file at a well-known path. A Drupal site, a Flask API, a Kubernetes operator, or a GitHub Pages deployment can participate without running DHT infrastructure.
5. Competitive Landscape
5.1 AGNTCY (Primary Threat)
The most complete competing approach: full discovery + identity + messaging + observability backed by 75+ companies. Strengths: institutional backing, production-ready code, Linux Foundation governance. Weaknesses: architectural complexity, Cisco-centric origins, infrastructure focus over contract semantics.
5.2 ANS (OWASP)
DNS-inspired with PKI identity, protocol adapter layers, and zero-knowledge proofs. IETF draft submitted (draft-narajala-ans). Conceptual only — no production deployment.
5.3 Oracle Open Agent Specification
Declarative schema positioned as "ONNX for agents." Open-sourced and integrating with AGNTCY's OASF.
5.4 DUADP's Differentiation: The OSSA Contract Layer
Neither AGNTCY's OASF nor ANS nor Oracle's Agent Spec addresses governance, compliance, or trust boundaries at the schema level. OSSA is the only specification that combines:
- Agent identity (W3C DIDs / GAID)
- Authorization (Cedar policies)
- Trust tiers (5-level model)
- Compliance frameworks (SP 800-53 mapping)
- Resource governance (token efficiency budgets)
- Cryptographic provenance
"MCP provides the hands. A2A provides the voice. OSSA provides the credentials."
6. Bridge-First Integration Strategy
DUADP's adoption path requires integration, not displacement:
- Protocol bridges — GAID resolution returns protocol-specific endpoints:
{"a2a": "...", "mcp": "...", "ossa": "..."} - Framework adapters —
duadp.discover(capability="web-search", trust_tier="verified")returns native tool objects - Registry connectors — crawl MCP Registry, A2A endpoints, AGNTCY, AgentExchange (like Google indexes websites)
- CMS integration — Drupal module (48+ AI integrations already), WordPress plugin
- Kubernetes operators — DUADP operator watches Agent CRDs, auto-registers in federation
7. What Wins: Historical Pattern Analysis
Protocol adoption follows three principles:
| Principle | Historical Example | DUADP Application |
|---|---|---|
| Simplicity | SMTP (RFC 5321): "protocols with few options tend towards ubiquity" | Static JSON file at /.well-known/duadp.json — no installation |
| Infrastructure embedding | TCP/IP: mandated by DoD 1982, shipped with BSD 1983 | Ship as Drupal module, Helm chart, GitHub Action, npm package |
| Neutral governance | HTTP: IETF + W3C | NIST CAISI submission done; AAIF/Linux Foundation contribution planned |
MCP replicated this playbook exactly, going from release to industry standard in 13 months.
8. Strategic Timeline
The window is 12-18 months:
- March 9, 2026: NIST CAISI RFI deadline (OSSA submitted March 5)
- April 2, 2026: NCCoE AI Agent Identity concept paper deadline
- 2026 H2: AAIF expected to expand scope beyond MCP/AGENTS.md/Goose
- 2027: AGNTCY or AAIF-native discovery protocol likely to consolidate
Critical next steps:
- Formalize GAID URI scheme as IETF Internet-Draft before
draft-narvaneni-agent-urigains traction - Embed DUADP participation into popular platforms (Drupal module, K8s operator, npm package)
- Secure NIST reference or AAIF membership for neutral governance credential
9. Conclusion
DUADP occupies the most strategically valuable unclaimed position in the agentic AI stack: the universal discovery layer between protocols and applications. The "any system can be a node" principle — implemented through static JSON files and CMS plugins — creates an adoption funnel that P2P DHT approaches cannot match. The combination of GAID-based universal addressing, OSSA's governance contracts, and federated gossip propagation provides a technically differentiated position that no competitor fully covers.
References
- NIST CAISI RFI on AI Agent Security. Federal Register Doc. 2026-00206, Docket NIST-2025-0035
- NCCoE: Software and AI Agent Identity and Authorization. https://www.nccoe.nist.gov/projects/software-and-ai-agent-identity-and-authorization
- IETF draft-narvaneni-agent-uri (versions -00 through -02, October 2025)
- IETF draft-mozleywilliams-dnsop-bandaid-00 (BANDAID, October 2025, Standards Track)
- WebFinger. RFC 7033. https://www.rfc-editor.org/rfc/rfc7033
- DNS-SD. RFC 6763. https://www.rfc-editor.org/rfc/rfc6763
- MCP Server Security at Scale. arXiv:2506.13538
- Agent Skill Supply Chain Security. arXiv:2603.00195
- Agent Protocol Interoperability Survey. arXiv:2505.02279
- StepShield: When to Intervene on Rogue Agents. arXiv:2601.22136