Skip to content

HARP-GOVERNANCE Specification

Version: 0.2 Draft (Standards-Grade) Status: Draft Specification (Governance & Evolution)


HARP-GOVERNANCE defines the formal governance structure, versioning model, registry system, and extension lifecycle rules for the Human Authorization & Review Protocol (HARP) suite.

This document specifies:

  • Specification versioning rules
  • Backward and forward compatibility requirements
  • Registry management (artifact types, error codes, algorithms, extensions)
  • Change control process
  • Deprecation policy
  • Extension proposal process
  • Reference implementation policy
  • Compliance evolution rules

This document ensures that HARP evolves predictably, securely, and without fragmentation.


HARP specifications use Semantic Versioning:

MAJOR.MINOR.PATCH

Incremented when:

  • Backward compatibility is broken
  • Canonicalization rules change
  • Signature format changes
  • Hash algorithm requirements change

Implementations MUST reject unsupported MAJOR versions.

Incremented when:

  • New optional fields are added
  • New artifact types are added
  • New error codes are added
  • New algorithms are registered

Backward compatibility MUST be preserved.

Incremented when:

  • Editorial clarifications are made
  • Non-normative improvements are added
  • Typographical corrections are made

PATCH changes MUST NOT affect interoperability.


A MINOR version update MUST:

  • Not remove required fields
  • Not change canonicalization rules
  • Not change required algorithms

Implementations SHOULD:

  • Ignore unknown optional fields
  • Ignore unknown extension namespaces
  • Reject unknown required enum values

HARP defines the following registries.

Maintains valid artifactType values.

Initial entries:

  • plan.review
  • task.review
  • patch.review
  • command.review
  • checkpoint.review
  • prompt.send
  • session.start
  • session.status
  • session.snapshot
  • session.end

New entries require governance approval.


Maintains standardized error codes.

Core entries include:

  • HARP_ERR_CANONICALIZATION
  • HARP_ERR_HASH_MISMATCH
  • HARP_ERR_SIGNATURE_INVALID
  • HARP_ERR_EXPIRED
  • HARP_ERR_REPLAY
  • HARP_ERR_SCOPE
  • HARP_ERR_POLICY_DENY
  • HARP_ERR_TRANSPORT
  • HARP_ERR_UNSUPPORTED

Extensions may register prefixed codes:

HARP_PROMPT_ERR_* HARP_SESSION_ERR_*


Defines allowed cryptographic algorithms.

Initial allowed algorithms:

Signatures:

  • Ed25519

Hash:

  • SHA-256

Key Exchange (optional):

  • X25519

Future algorithms MUST be registered before normative use.


Extensions MUST use namespaced keys:

extensions..

Vendor namespaces MUST be globally unique.

Reserved namespace:

extensions.harp.*


Changes follow:

  1. Draft proposal
  2. Public review period
  3. Security review
  4. Revision
  5. Approval
  6. Version increment
  7. Publication

Security-impacting changes MUST undergo formal review.


When deprecating:

  • Mark feature as deprecated in MINOR release
  • Provide migration guidance
  • Remove only in next MAJOR version

Deprecated features MUST remain interoperable until MAJOR bump.


At least one open reference implementation SHOULD exist for:

  • HARP-CORE
  • HARP-KEYMGMT
  • HARP-TRANSPORT

Reference implementation SHOULD:

  • Pass official compliance tests
  • Publish supported version
  • Be security-reviewed

To prevent fragmentation:

  • Implementations MUST publish supported version
  • Implementations MUST publish supported algorithms
  • Implementations SHOULD test cross-vendor compatibility
  • Changes MUST maintain canonicalization determinism

When using HARP-TRANSPORT:

Clients SHOULD send:

X-HARP-Version: 0.2

Servers SHOULD respond with:

X-HARP-Version: 0.2

If unsupported version:

  • Server MUST return 426 Upgrade Required
  • Response MUST include supported version range

To register a new extension:

Submission MUST include:

  • Problem statement
  • Threat analysis
  • Canonicalization impact assessment
  • Hash/signature impact assessment
  • Backward compatibility analysis
  • Compliance test additions

Extensions MUST NOT:

  • Modify canonicalization rules
  • Weaken signature requirements
  • Remove mandatory replay protections

All normative cryptographic changes MUST:

  • Include updated threat model
  • Include updated compliance tests
  • Include migration plan
  • Include interoperability validation

10. Specification Publication Requirements

Section titled “10. Specification Publication Requirements”

Each release MUST publish:

  • Updated RFC draft
  • Updated JSON schemas
  • Updated test vectors
  • Updated compliance test requirements
  • Change log

11. Governance Structure (Suggested Model)

Section titled “11. Governance Structure (Suggested Model)”

HARP MAY adopt:

  • Steering committee
  • Security review board
  • Registry maintainer role
  • Community contribution process

Governance MUST prioritize:

  • Security stability
  • Backward compatibility
  • Deterministic behavior
  • Vendor neutrality

An implementation is governance-compliant if:

  • It declares supported version
  • It follows versioning rules
  • It does not introduce undocumented changes
  • It respects registry definitions
  • It adheres to deprecation policy

Improper governance can:

  • Fragment ecosystem
  • Break interoperability
  • Introduce silent security regressions

Strict change control is REQUIRED for security-sensitive protocol components.