PQConnect – Automated Post-Quantum End-to-End Tunnels from DJB, Lange, ohters.
PQConnect is a new Internet security layer that protects against quantum attacks, offering automatic end-to-end encryption, installation guidance, and support from international funding bodies, with a dedicated chat for user feedback.
Read original articlePQConnect is a newly developed layer of Internet security designed to protect against quantum attacks. It allows users to implement post-quantum cryptography on their computers without needing to wait for updates to their existing applications. PQConnect provides end-to-end encryption between computers that support it, enhancing the security of unencrypted applications and working alongside pre-quantum applications. Unlike traditional VPNs, which only secure traffic between a user's computer and the VPN server, PQConnect automatically detects compatible servers and encrypts traffic to them transparently. Installation instructions are available for both system administrators and regular users, depending on whether they are setting up a server or client. The PQConnect team includes experts from various institutions, and the project has received funding from multiple organizations, including the U.S. National Science Foundation and the European Commission. Users are encouraged to join the newly established Zulip chat server to share their experiences and feedback on PQConnect.
- PQConnect offers a new layer of security against quantum attacks.
- It provides automatic end-to-end encryption for compatible servers.
- Installation guidance is available for both users and system administrators.
- The project is supported by various international funding bodies.
- Users can join a dedicated chat server to discuss their experiences with PQConnect.
Related
Quantum is unimportant to post-quantum
Post-quantum cryptography gains attention for its enhanced safety and flexibility over classical methods. Transitioning to PQ standards addresses risks from potential quantum advancements, aiming to improve cryptographic security proactively.
Quantum Cryptography Has Everyone Scrambling
Countries are advancing in quantum cryptography, with China leading in quantum key distribution (QKD). A hybrid approach combining QKD and post-quantum cryptography (PQC) is considered most effective for secure communications.
Quantum Cryptography Has Everyone Scrambling
Global efforts are advancing quantum key distribution (QKD) systems alongside post-quantum cryptography (PQC), with China leading research, while a hybrid approach may enhance future secure communications and a quantum internet.
What Is Post-Quantum Cryptography? – NIST
Post-quantum cryptography aims to secure data against quantum computer threats. NIST is developing standards for algorithms resistant to quantum attacks, ensuring protection for sensitive information in the future.
Show HN: PQC.club – Post-Quantum Cryptography Tools and Alternatives
PQC Club offers tools for transitioning to post-quantum cryptography, featuring applications like Tuta and Signal, browser support from Chromium and Firefox, and hybrid key exchange options from Cloudflare and AWS KMS.
I mainly take issue with this claim of "automatically" detecting servers and magically doing post-quantum magic to your connections, magically.
It seems to do so by noticing that DNS records for names are CNAMEs that match a format ("pq1" and then a 52-char b32-encoded hash), which it does by creating a netfilter rule for "udp sport 53" [0].
So, I guess if you don't have adversaries racing your DNS response packets, and you're not using dns-over-tls or dns-over-https, then the magic can work.
One glaring problem with this kind of automatic, magic setup is that if you do have attackers, or if your system does dns in some newfangled way that wasn't thought up in the 1980s, then it doesn't secure your connection, but it also doesn't tell you that it failed to do so.
So many clients (imap, ldap, anything) that use StartTLS don't default to "fail if TLS doesn't work" and don't tell the user anything about it, and it makes me hate StartTLS even though the fault isn't directly with StartTLS.
[0] https://github.com/jedisct1/pqconnect/blob/6d093005ed164ff31...
There is also VPN software that incorporates PQC (also referenced): <https://rosenpass.eu>
What this project attempts to do is to establish a transparent PQC stream between client and server.
I'm not sure I like the way they are doing this, with a lot of magic (PQConnect inserts itself into the network stack to inspect incoming DNS responses) and with Python of all things.[1][2][3]
I think the best way to do this is to graft it on top of QUIC and not mess with linux network plumbing. Perhaps integrate it with something like <https://github.com/n0-computer/iroh>
[1] <https://www.pqconnect.net/pqconnect-20241206.pdf>
[2] <https://www.pqconnect.net/20241227.pdf>
[3] <https://github.com/jedisct1/pqconnect/tree/main/src/pqconnec...>
“The initial PQConnect software release is for Linux. The software installation relies on packages supplied by Linux distributions. Package names are not synchronized across Linux distributions. The installation currently understands the names for Debian; Debian derivatives such as Ubuntu and Raspbian; Arch; and Gentoo. Adding further distributions should be easy. [The installation also requires root access.]
“Support for non-Linux operating systems is planned, handling the different mechanisms that different operating systems provide for reading and writing IP-layer packets. The PQConnect system as a whole is designed to be compatible with any operating system. The PQConnect software is written in Python. The underlying C libraries for cryptography have already been ported to MacOS.
“Accessing the IP layer is not the only way to implement the PQConnect protocol. Existing user-level applications access the kernel's network stack via system calls, normally via libc. It is possible to modify those network packets by modifying the kernel, by modifying libc, or by pre-loading a PQConnect dynamic library, still without touching the individual applications. […]”
I would have expected information about OS support, and on which application/OS layer PQConnect operates, on the Intro page.
"PQConnect team (alphabetical order):
Daniel J. Bernstein, University of Illinois at Chicago, USA, and Academia Sinica, Taiwan
Tanja Lange, Eindhoven University of Technology, The Netherlands, and Academia Sinica, Taiwan
Jonathan Levin, Academia Sinica, Taiwan, and Eindhoven University of Technology, The Netherlands
Bo-Yin Yang, Academia Sinica, Taiwan
The PQConnect software is from Jonathan Levin."I think a short explanation of how this actually works (not the post-quantum crypto part, but rather the plumbing into the networking stack of your box) would be very helpful.
[EDIT]: an a very quick first glance at the python source code and the install scripts reveals that a PQconnect install performs rather intrusive changes to your system:
- installs lots of packages
- installs a daemon running under systemd
- creates a new user
- creates a new tunnel network device
I'm going to take a wild initial guess and assume that there's some dynamic manipulation of low-level networking state (routing tables, iptables, etc...), which makes me rather queasy to install this on a production and/or work system because I have no idea if it is going to wreck my existing setup.Also, the server is written in python ... I most certainly hope the python code is not in any way processing / redirecting network traffic itself in userland, or performance is going to be awful.
All of this points to the fact that an overview of how pqconnect grafts itself into your Linux system would be most welcome.
This looks like basically a McEliece/SNTRUP version of Colin Percival's spiped.
Related
Quantum is unimportant to post-quantum
Post-quantum cryptography gains attention for its enhanced safety and flexibility over classical methods. Transitioning to PQ standards addresses risks from potential quantum advancements, aiming to improve cryptographic security proactively.
Quantum Cryptography Has Everyone Scrambling
Countries are advancing in quantum cryptography, with China leading in quantum key distribution (QKD). A hybrid approach combining QKD and post-quantum cryptography (PQC) is considered most effective for secure communications.
Quantum Cryptography Has Everyone Scrambling
Global efforts are advancing quantum key distribution (QKD) systems alongside post-quantum cryptography (PQC), with China leading research, while a hybrid approach may enhance future secure communications and a quantum internet.
What Is Post-Quantum Cryptography? – NIST
Post-quantum cryptography aims to secure data against quantum computer threats. NIST is developing standards for algorithms resistant to quantum attacks, ensuring protection for sensitive information in the future.
Show HN: PQC.club – Post-Quantum Cryptography Tools and Alternatives
PQC Club offers tools for transitioning to post-quantum cryptography, featuring applications like Tuta and Signal, browser support from Chromium and Firefox, and hybrid key exchange options from Cloudflare and AWS KMS.