ifp

Garden Patch Home · Principles

Auditable Intermediaries Over Silent Proxies

When a relay, proxy, or intermediary handles a message between two agents, it must append a trace entry recording its involvement. The trace is mandatory — not a logging convenience, but a protocol requirement.

This principle exists because human legibility is a hard constraint in Inter-Face Protocol (IFP-1 Section 5.3). If an intermediary can silently forward, delay, duplicate, or drop messages without leaving a trace, the human operator cannot verify the path their messages took. The audit log becomes unreliable, and the accountability chain breaks.

What the Trace Records

Each intermediary appends:

What the Trace Does Not Prevent

Tracing is accountability, not prevention. A malicious relay can still read unencrypted content, delay delivery, or inject false trace entries. The mitigations are layered:

The trace ensures that relay involvement is visible. Detection and response are separate concerns.

Sources

Relations