Machine Protocol Screening Language (MPSL)
Policy & Technical Spec
National Security Framework of Antarctica (NSF-A)
1) Purpose & Scope
MPSL is a Python-assisted, supervisor-enforced protocol language for pre-boot screening and OS compatibility attestation of AI agents across next-generation full-stack online operating systems. It governs Robotic Process Automation (RPA) orchestration, coordinates Machine Intelligence Automation (MIA) at the hardware layer, and bridges IoT/offline preservation with cloud services.
This policy defines design goals, trust architecture, runtime model, compliance requirements, and licensing for implementers, OEMs, device operators, and auditors.
2) Design Goals
- Pre-Boot Trust: Act before cloud start-up to identify, authenticate, authorise, verify, account, and validate (IAAVAV) the OS, agent stack, and device posture.
- Low-Code Control: Declarative syntax with Python assist modules for complex flows, crypto, and device introspection.
- Hardware–Cloud Continuity: Continuous attestation from firmware → hypervisor → OS → agent and onward to state rails in the cloud.
- Determinism & Auditability: Signed policies, deterministic evaluation, append-only logs.
- Resource Safety: Rate limits, timeouts, capability sandboxes for RPA/MIA actions.
- Offline Preservation: Graceful degradation and offline enforcement when cloud is unavailable.
3) Trust & Attestation Architecture
Chain of Trust (CO T):
ROM/BootROM → Secure Bootloader → Trustlet (MPSL Supervisor) → Hardware Attestation (TPM/TEE/PCRs) → MPSL Policy (signed) → Drivers/OS Images (hash allowlist) → AI Agents/RPA Manifests → Cloud State (post-boot).
Artifacts & Keys
- Device Identity Key (DIK): Burned or provisioned at manufacture; non-exportable.
- Platform Attestation Key (PAK): Used by trustlet to sign posture reports.
- Policy Signing Key (PSK): NSF-A root → intermediate → vendor/tenant keys.
- Audit Log Key (ALK): Rotating, for tamper-evident local logs.
Reports
- Pre-Boot Posture (PBP): PCRs, firmware hashes, driver set, OS image digest, agent manifests.
- Compatibility Vector (CV): Declared features (GPU class, ISA, sensors, radios), safety gates, export flags.
- Decision Token (DT): Permit/deny/degraded with reason codes; bound to boot epoch.
4) Runtime Model
- Phase 0 (Provision): Enrol device, install trustlet, bind keys, fetch baseline policy.
- Phase 1 (Screen): Evaluate hardware/firmware/OS/agent against MPSL policy; emit DT.
- Phase 2 (Enforce): Gate drivers, kernel modules, radios, and agent load based on DT.
- Phase 3 (Account): Produce signed audit records, counters, and usage billing hooks.
- Phase 4 (Sustain): Live policy updates with staged rollouts and rollback guarantees.
5) Language Overview (Declarative Core + Python Assist)
Core MPSL is declarative: capabilities, matches, gates, and actions. Python Assist offers safe, deterministic helpers (cryptography, parsing, attestation math), executed inside a supervisor sandbox.
Primitive Concepts
capability
: named feature the OS/agent requests (e.g.,gpu.tensor
,radio.satcom
).evidence
: measured value (hash, PCR, SPDM, ACPI, SMBIOS, firmware id).gate
: boolean rule; can call a whitelisted Python helper.action
:permit
,deny
,degrade
,quarantine
,rotate_keys
,wipe_sensitive
.profile
: bundle of gates + actions for a class of devices/sites.bind
: attach profiles to device classes, tenants, or geofences.
Minimal Example (illustrative)
Python Assist (safe helper, concept)
6) Security Controls
- Supervisor Isolation: Trustlet runs in TEE/secure world; separate address space from OS.
- Deterministic Evaluation: No unbounded loops, no network I/O during decision; helpers are pure or use signed caches.
- Policy Integrity: Versioned, signed; break-glass key paths require quorum and are fully logged.
- Secrets Hygiene: No raw secret exposure; use sealed storage and session handles.
- RPA/MIA Sandboxing: Capability scoping; hardware and API call budgets; time-boxed tasks; mandatory idempotency where applicable.
- Anti-Rollback: Monotonic counters for firmware and policy epochs.
7) Compatibility Screening & OS Validation
MPSL validates:
- Firmware: Boot chain measurements, secure boot flags, revocation lists.
- Kernel/Drivers: Hash allowlists; forbidden modules; DMA/IO-MMU posture.
- AI Agents: Signatures, manifests, model cards, dataset provenance tags.
- Peripherals/IoT: Sensor/radio whitelists, serial and ECC checks, SELinux/AppArmor intent.
- Export/Zone Flags: Disables features by geofence (e.g., E1–E3 environmental zones).
- Offline Mode: If cloud is down, degraded permit with local fences and escrowed logs.
8) RPA Orchestration & Machine Intelligence Automation (MIA)
- RPA Intents: Declarative tasks mapped to capabilities; human-in-the-loop where marked.
- MIA Bridge: Safe driver calls for motion, power, sensors; physics & safety interlocks evaluated in supervisor space.
- Change Control: New intents require policy update and staged rollout.
9) Logging, Accounting, and Evidence
- Local Ledger: Append-only, signed with ALK; export on schedule or upon reconnect.
- Cloud Mirrors: Post-boot, DT and posture replicate to state rails; privacy-preserving aggregation for fleet health.
- Forensics: Golden image rehydrate, evidence replay, and hash-timeline verification.
10) Compliance & Licensing (NSF-A DCF)
- Domestic Compliance Only: MPSL implementations must comply with NSF-A Domestic Compliance Framework; foreign/international certificates are not substitutes.
- Licences:
- Digital Infrastructure Licence (DIL) for trustlets, attestation services.
- Commercial Science Licence (CSL) for negotiations (L3 baseline; Bachelor for >£75k; Advanced for >£3m).
- CPD/CPE: Roles maintaining MPSL must log ≥18 hours/month of competence development.
- Audits: Code escrow, reproducible builds, red-team attestations, supply-chain SBOMs.
11) Governance & Lifecycle
- Semantic Versioning:
MPSL x.y.z
with backwards-compatible guardrails. - LTS Channels: Security-only backports for LTS; feature in current channel.
- Deprecation Windows: Minimum 18 months for opcode/gate removals.
- Emergency Revocation: PSK/allowlist revocation with tenant-safe drains and auto-rollback.
12) Example Profiles (Conceptual)
Edge-HPC with GPU Inference
Cold-Zone IoT Sensor Hub (Offline-First)
13) Implementation Guidance
- Reference Trustlet: TEE-targeted (ARM TrustZone/TDX/SEV-SNP variants); reproducible build toolchain.
- Policy Tooling: Signed policy packs; CI validating determinism and helper purity; fuzzing for gate combinations.
- OEM Integration: Secure element binding; SPDM/DT attestation paths; driver gating hooks.
- Developer Kits: Emulators, virtual TPM, synthetic evidence generators, and red-team harnesses.
14) Prohibited Practices
- Network-dependent decisions during pre-boot screening.
- Unsandboxed Python or dynamic code import in helpers.
- Bypassing supervisor through unsigned kernels or debug fuses in production.
- Substituting foreign certifications for DCF licences.
15) Contacts
- Standards & Reference Implementations: mpsl@nsf-antarctica.org
- Licensing (DIL/CSL): licensing@nsf-antarctica.org
- Compliance & Audits: compliance@nsf-antarctica.org
- Security Incidents: cert@nsf-antarctica.org
MPSL is a policy-controlled specification. This document is informational and non-exhaustive; implementation requires the appropriate NSF-A licences, audits, and adherence to the DCF.
Version 1.0 • Effective 26 September 2025