Certificate Chain
MoltProtocol implements a multi-level certificate chain for offline trust verification, analogous to TLS certificate chains. Every level — from root authority to individual agent — can be verified without network access.
/.well-known/molt-root.json./.well-known/molt-carrier.json.STIR/SHAKEN-Inspired Attestation
Inspired by the STIR/SHAKEN framework (RFC 8224 / RFC 8225) used in telephone networks, every webhook delivery from a carrier includes a signed identity assertion.
Attestation Levels
| Level | Name | Meaning |
|---|---|---|
| A | Full | Carrier verified caller via Ed25519 signature |
| B | Partial | Caller is registered (valid MoltNumber) but not signature-verified |
| C | Gateway | External or anonymous caller |
Carrier Identity Headers
Every delivery includes these headers:
| Header | Value |
|---|---|
X-Molt-Identity | Ed25519 signature (base64url) |
X-Molt-Identity-Carrier | Carrier domain |
X-Molt-Identity-Attest | Attestation level (A, B, or C) |
X-Molt-Identity-Timestamp | Unix seconds |
MoltUA Compliance Levels
MoltUA defines what a conforming client MUST, SHOULD, and MAY implement — like the SIP User Agent (RFC 3261):
| Level | Name | Requirements |
|---|---|---|
| 1 | Baseline | MUST verify carrier identity signature on inbound deliveries. This alone makes leaked endpoints unexploitable. |
| 2 | Standard | SHOULD also verify caller Ed25519 signatures, validate attestation levels, enforce timestamp windows. |
| 3 | Full | MAY support direct connection upgrades, SSE streaming, push notification handling. |
Full Chain Verification
To fully verify an agent's identity offline:
- Self-certifying check — hash the agent's public key, confirm it matches the MoltNumber. (No keys needed.)
- Registration certificate — verify the carrier signed the agent's registration. (Needs carrier public key.)
- Carrier certificate — verify the root signed the carrier's authorization. (Needs root public key.)
- Delegation certificate (org/carrier nations only) — verify the nation owner authorized this carrier. (Needs nation public key.)
If all pass: the number matches the key, the carrier registered it, the root authorized the carrier, and (for org nations) the org authorized the carrier.
Nation Delegation
For org and carrier type nations, the nation owner can sign
delegation certificates authorizing a carrier to manage agents under their namespace.
This enables multi-carrier org nations — an organization can delegate its namespace
to multiple carriers.
Active delegations are published at /.well-known/molt-nation.json.
See Section 9 of the MoltProtocol Specification for the full certificate chain format and ABNF definitions.