Federation Without Blockchain

Every registry is sovereign. Every agent is discoverable.
No consensus required. No single point of failure.

LIVE FEDERATION NETWORK

Protocol Specification

HTTP/2 + mTLS + Merkle Trees = Unstoppable Federation

1

Announce

New registries announce themselves to known peers via the federation_public endpoint. Each registry maintains a cryptographic identity (SPIFFE ID) that proves its authenticity.

2

Challenge

Registries exchange signed certificates and establish mTLS connections. Every communication is cryptographically verified - no trust assumptions.

3

Sync Request

Registries exchange agent metadata using differential sync. Only changes since last_sync are transmitted, keeping bandwidth usage minimal.

4

Gossip Update

Registry information propagates through the network via gossip protocol. New connections form automatically as the network grows.

Sync Protocol Details

# Federation sync endpoint specification
POST /federation/sync/catalog
Content-Type: application/json
X-Registry-Signature: {base64_signature}
X-Registry-ID: {registry_did}

{
  "last_sync": "2025-01-27T10:30:00Z",
  "merkle_root": "0x3a4f9b2c...",
  "requested_changes": {
    "max_batch_size": 1000,
    "include_proofs": true
  }
}

# Response with differential updates
{
  "changes": [
    {
      "operation": "CREATE",
      "agent": {
        "did": "did:cosmos:registry-b:agent-789",
        "humanReadableId": "acme/translator",
        "capabilities": [...],
        "reputation_score": 0.95
      },
      "merkle_proof": [...]
    }
  ],
  "new_merkle_root": "0x5d8a1f3e...",
  "sync_timestamp": "2025-01-27T10:31:15Z"
}

Byzantine Fault Tolerant Security

Designed to operate safely even when up to 1/3 of registries are malicious

🔐

Cryptographic Identity

Every registry has a SPIFFE identity with short-lived certificates. Compromised keys automatically expire, limiting attack windows.

🛡️

Signed Requests

All federation requests include cryptographic signatures and timestamps. Replay attacks are impossible due to nonce validation.

Rate Limiting

100 requests/minute per peer prevents DoS attacks. Adaptive throttling protects against coordinated attacks across multiple registries.

🔍

Merkle Proofs

Agent catalogs are merkle trees. Any tampering is immediately detectable through cryptographic proof verification.

🌐

Gossip Protocol

Registry reputation spreads through gossip. Malicious registries are quickly identified and isolated by the network.

🚫

No Consensus Required

Unlike blockchain, we don't need global consensus. Each registry makes sovereign decisions about which peers to trust.

Performance That Scales

Real benchmarks from our production federation network

Operation Performance Scale Tested Notes
Registry Discovery < 100ms 100 registries P2P gossip propagation
Catalog Sync (Full) < 2s 10,000 agents First-time sync
Catalog Sync (Diff) < 200ms 1,000 changes Incremental updates
Agent Discovery < 50ms 1M agents globally With proper indexing
Cross-Registry Call < 500ms Any distance Including auth & routing
Failover Time < 30s Registry failure Automatic rerouting

Deploy Your Own Registry

Join the federation in minutes, not months

# Deploy a sovereign registry and join the federation

# 1. Clone and configure your registry
git clone https://github.com/theprotocol/registry
cd registry
cp .env.example .env

# 2. Set your registry identity
REGISTRY_NAME="silicon-valley"
REGISTRY_DOMAIN="registry.mycompany.com"
FEDERATION_PEERS="https://tokyo.theprotocol.cloud,https://london.theprotocol.cloud"

# 3. Launch with automatic SPIFFE identity provisioning
docker-compose up -d

# Your registry is now:
# ✓ Generating cryptographic identity
# ✓ Connecting to peer registries
# ✓ Syncing global agent catalog
# ✓ Ready for agent deployments!
# Programmatic federation management
from theprotocol import Registry, FederationManager

# Initialize your registry with federation
registry = Registry(
    name="europe-central",
    federation_enabled=True
)

# Add trusted peer registries
federation = FederationManager(registry)
await federation.add_peer({
    "url": "https://asia-pacific.example.com",
    "public_key": "-----BEGIN PUBLIC KEY-----...",
    "reputation_threshold": 0.8
})

# Query agents across entire federation
translators = await registry.discover_global(
    capability="translation",
    min_reputation=0.9,
    max_latency_ms=100  # Prefer nearby registries
)

print(f"Found {len(translators)} translators across {translators.registry_count} registries")

Federation Features

Everything you need for a sovereign, connected registry

Automatic Peer Discovery

Registries find each other through gossip protocol. No hardcoded peer lists or central directory needed.

Selective Synchronization

Choose which agent types to sync. Filter by capability, reputation, or custom policies.

Conflict Resolution

Automatic handling of agent ID conflicts. Last-write-wins with cryptographic proof trails.

Geographic Routing

Intelligent routing to nearest registry replica. Minimize latency for global deployments.

Registry Reputation

Registries build reputation through uptime, honest behavior, and peer endorsements.

Ready to Claim Your Sovereignty?

Deploy your own registry. Set your own rules. Join the federation.