Zero-config, end-to-end encrypted agent-to-agent communication that never leaves your local network. No cloud. No internet. No compromises.
We looked for a way to make AI agents talk to each other on a local network. There was nothing.
× Requires HTTPS and internet. Your agents go silent when the cloud goes down.
× Solves agent-to-tool, not agent-to-agent. IronMesh fills that gap — the two stack together.
× Local IPC only. Can't cross machines on your LAN.
× Decentralized but complex DID setup, still assumes internet connectivity.
It sits under the agent frameworks and protocols you already use — giving them a transport that survives a router reboot, a dead ISP, or no internet at all.
┌─────────────────────────────────────────────────────┐
│ Your application │
├─────────────────────────────────────────────────────┤
│ Agent frameworks — LangChain · CrewAI · AutoGen │ adapters ship with IronMesh
├─────────────────────────────────────────────────────┤
│ Tool / context protocols — MCP · A2A │
├─────────────────────────────────────────────────────┤
│ IronMesh — identity · encryption · routing · queue │ this project
├─────────────────────────────────────────────────────┤
│ Transport — WebSocket over LAN · Reticulum / LoRa │
└─────────────────────────────────────────────────────┘
For offline-capable, peer-to-peer agent communication specifically, here's how the field looks.
| Feature | IronMesh | Google A2A | Anthropic MCP | ACP | ANP |
|---|---|---|---|---|---|
| Works offline / no internet | Yes | No | N/A | Yes | No |
| True peer-to-peer | Yes | No | No | No | Yes |
| Zero-config LAN discovery | Yes | No | No | No | No |
| End-to-end encryption | NaCl | TLS only | N/A | No | Yes |
| Forward secrecy | Yes | Depends | N/A | No | No |
| Multi-hop mesh routing | Yes | No | No | No | No |
| Capability discovery | Yes | No | No | No | No |
| LoRa / radio transport | Yes | No | No | No | No |
| Self-hosted, no vendor lock | Yes | No | No | No | Partial |
| Survives internet outage | Yes | No | N/A | Yes | No |
NaCl / libsodium crypto — the same library as Signal and WireGuard. Not homebrew. Not "encrypt later." Not "TLS is enough."
Ephemeral X25519 keys per session, destroyed after handshake. Compromising today's keys can't decrypt yesterday's traffic.
mDNS auto-discovers agents on your LAN. No manual IP config. Identity keys only exchanged during authenticated handshake.
HMAC-SHA256 passphrase proof. Both client and server prove identity. Ed25519 signatures on every single frame.
Distance-vector routing with split horizon and poisoned reverse. Messages traverse intermediate peers automatically.
Optional transport over LoRa radio at 915 MHz via Reticulum. No internet at all. Just RNode hardware and open spectrum.
Messages queued in encrypted SQLite when peers are offline. Automatically delivered on reconnect. Priority ordering built in.
The operator console — embedded in every node, reachable at http://127.0.0.1:8766 with a per-session bearer token. The same handshake diagram from the spec, lit live for the selected peer. Encrypted A2A dialogue turn-by-turn in the feed. CSP-locked to same-origin so the page renders with the router unplugged.
Live capture: wiz (Windows) ↔ kingpi (Pi 5, Ollama kingpi:latest) ↔ gatekeeper (NAS, Ollama hermes3:3b). A2A dialogue: three turns, ended on goal-achieved.
v0.8.1 fixed the duplicate-handshake race. v0.8.2 shipped multi-turn AI-to-AI dialogue, persona presets, budgets, and a one-click A2A panel. v0.8.3 rebuilds the dashboard to match this site, fixes two latent GUI serialization bugs, and closes the v0.8.3 E2E audit (Hypothesis fuzzing, concurrency tests, crash matrix, macOS CI). Full write-up: v0.8.3 release notes.
New MessageType.CONV envelope (conv_id, turn, max_turns, byte + time budgets) and a [DONE] smart-termination rider. Five stacked protections keep two LLM bridges from looping: turn cap, per-conv cooldown, byte + time budgets, [LLM] reply-prefix ignore, graceful [DONE] exit.
Dashboard now matches this site: monospace wordmark, the 3-stage handshake ASCII diagram baked in and lit live per peer, TOFU trust tri-state (✓ pinned / … handshaking / ✗ mismatch), transport column (WS / RNS / BOTH), bearer-token masked reveal, CSP-enforced offline rendering.
Roles ship in ironmesh.roles: assistant, security-analyst, network-engineer, historian, coder, ops, devil. Advertised as role:<name> capability, so agent.discover("role:security-analyst") finds specialists on the mesh.
LLM bridges can expose echo, http-get, file-read (the last gated by a strict operator allowlist). Model emits <tool name="X">args</tool>; the bridge substitutes <tool-out> before reply. Per-call timeouts, result-size cap, no recursive model call.
High-level Agent class wraps the bridge daemon. Decorator-based message handlers, sync+async send, capability discovery. No asyncio boilerplate, no WebSocket plumbing.
First-party adapters for the three major agent frameworks. create_ironmesh_toolkit(), create_mesh_crew_agent(), register_ironmesh() — drop the mesh into an existing agent stack in one call.
Ship an MCP server out of the box. Any MCP-capable agent (Claude Desktop, Claude Code, custom clients) can use IronMesh as a transport for agent-to-agent messaging. Eight tools over stdio JSON-RPC.
Bundled LXMF gateway bridges IronMesh to the Reticulum LXMF ecosystem. Send from your phone's Sideband app to any IronMesh peer. Verified end-to-end with a real Pixel over LoRa (100% delivery at SF8/BW125, 1.07–1.98 s RTT).
Mutual passphrase auth, signed ephemeral ECDH, channel binding. Three stages. Zero trust assumptions. The same diagram renders live inside the operator console — click any peer row and watch the stages go green in real time.
Client Server | | |<── PASSPHRASE_CHALLENGE ──────────────| (32-byte server nonce) |─── HMAC-SHA256(pass, nonce) ─────────>| |<── PASSPHRASE_VERIFIED + server_proof─| (mutual auth) | verify server_proof | | | |─── HELLO (eph_pub_A, id_pub_A) ──────>| signed(Ed25519) + channel_binding |<── HELLO (eph_pub_B, id_pub_B) ───────| signed(Ed25519) + channel_binding | TOFU check on id_pub_B | TOFU check on id_pub_A | | | ECDH(eph_priv_A, eph_pub_B) | ECDH(eph_priv_B, eph_pub_A) | = shared_secret | = shared_secret | (ephemeral privkeys destroyed) | (ephemeral privkeys destroyed) | | |<═══ Encrypted + Signed Messages ═════>| SecretBox + Ed25519 on every message
Raspberry Pi running Ollama talks to your desktop coding agent. No cloud. No API keys. No third parties.
Agents on a network with no internet coordinate tasks, share data, and run workflows over LoRa radio.
Self-contained AI network that works when the internet doesn't. Solar-powered Pi cluster. Local models.
Agents in isolated environments that can never touch the internet. Full encryption at rest and in transit.
All agent communication stays on your LAN. Nothing leaves your network. Nothing gets logged by anyone.
Phone, desktop, and server agents all talk directly to each other. mDNS discovery. Zero config.
Local-first. Offline-capable. Mesh-ready. Zero-config. No cloud required. Ever.