The Gap

Agents need to authenticate across organizational boundaries, at machine speed, without human intervention. Traditional identity infrastructure assumes someone is clicking through consent dialogs. DNTLS fills the gap.

THE INFRASTRUCTURE GAP THE TOOL ERA humans use software Human present Consent dialogs Single trust domain Synchronous flow One user, one session OAuth, OIDC, SAML... ? THE AGENT ERA software acts autonomously Autonomous operation Machine-speed decisions Cross-organizational Async, parallel Sub-agents spawning sub-agents what agents actually need The organizations that built today's standards openly acknowledge this gap is unsolved.

The Two-Layer Architecture

DNTLS separates what must be immutable (identity anchors) from what must be mutable (operational data). The Spine blockchain stores cryptographic roots. Service Records store everything else—endpoints, delegations, session keys—off-chain but cryptographically bound.

OFF-CHAIN: Service Records mutable · fast DHT + Content-Addressed Storage bound by signature ON-CHAIN: The Spine immutable · anchors trust Name registrations, keys, treasury, governance

Registering an Identity

Unlike all pre-existing systems, names are stored as salted hashes—you can't trivially enumerate the namespace. Four separate keys split authority: custody is separate from operations, operations from governance, governance from service updates. Each name acts as its own Certificate Authority.

NAME REGISTRATION Name H(label, salt) privacy-preserving hash Keys PKowner custody & recovery PKpayment operational spending PKgovernance voting & proposals PKrecord signs service record updates separation of authority Metadata tier pricing band expiration renewal deadline Each name is its own certificate authority

Service Records

Service Records are mutable—you can rotate keys, change endpoints, update delegations—without touching the blockchain. They're stored by content hash (CID) in distributed storage, and bound to the on-chain identity through the Record Key signature.

SERVICE RECORD stored in CAS by content hash Reachability endpoints, IPs, protocols, load balancing Delegation authorized sub-agents, scoped constraints Session Material advertised keys, validity windows, rotation schedules Policy Links capability documents, audit references signed by PKrecord → DHT[PKr] = (cid, σ)

The Three-Part Verification

A claim is accepted only if all three conditions pass: the on-chain key exists for that identity, the signature verifies against that key, and the fetched object's hash equals the declared CID. No CA. No certificate chain. Just cryptographic proof.

VERIFIER SPINE PKrecord on-chain DHT (cid, σ) off-chain CAS Service Record off-chain Key exists on-chain anchor Signature valid cryptographic proof Hash matches content integrity ALL THREE PASS? ACCEPT REJECT No CA. No certificate chain. Just cryptographic proof.

Complete Resolution Flow

Resolution is deterministic: name → on-chain record → DHT lookup → content fetch → three-part verification → connection. Agent A now knows exactly which keys to expect from Agent B. No middleman. No CA. Just protocol.

Agent A Agent B 1 1 SPINE "agent-b.dntls" "agent-a.dntls" Registration (PKr, ...) 2 2 DHT DHT[PKr] DHT[PKr] (cid, σ) 3 3 CAS CAS[cid] CAS[cid] Service Record 4 4 A verifies B key · sig · hash PKr ∧ σ ∧ H(SR)=cid B verifies A key · sig · hash PKr ∧ σ ∧ H(SR)=cid 5 5 Mutual Authentication using SR-declared keys name → on-chain record → DHT lookup → content fetch → verify → connect Symmetric verification. No middleman. No CA.

Governance & Economics

All income flows to Treasury first, then disburses on a fixed monthly cadence. Validators are rewarded by reliability metrics, not stake accumulation. Names are non-tradable—identity sticks to cryptographic continuity, not market speculation.

TREASURY-FIRST ECONOMICS Income Registrations Renewals Fees TREASURY all income flows here first on-chain · transparent monthly cadence Disbursement fixed monthly release governance-approved ratios Validators SLI-weighted rewards Development protocol improvements Foundation stewardship & ops Validators rewarded by reliability, not stake. Names are non-transferable. Identity sticks to cryptographic continuity, not market speculation.