Remove Noise protocol references from wiki docs and tests
Delete 8 Noise-specific documentation pages (noise-xx.md,
transport-keys.md, adr-001/003/006, framing-codec.md) and update
~30 remaining wiki pages to reflect QUIC+TLS as the sole transport.
Remove obsolete Noise-based integration tests (auth_service.rs,
mls_group.rs). Code-side Noise removal was done in f334ed3.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
This commit is contained in:
@@ -10,10 +10,8 @@ the security margin it provides.
|
||||
| Algorithm | Purpose | Crate | Security Level |
|
||||
|-----------|---------|-------|----------------|
|
||||
| Ed25519 | Identity signing, MLS credentials | `ed25519-dalek 2` | 128-bit classical |
|
||||
| X25519 | Noise DH, MLS HPKE key exchange | `x25519-dalek 2` | 128-bit classical |
|
||||
| ChaCha20-Poly1305 | Noise AEAD | `chacha20poly1305 0.10` | 256-bit key |
|
||||
| X25519 | MLS HPKE key exchange, Hybrid KEM | `x25519-dalek 2` | 128-bit classical |
|
||||
| AES-128-GCM | MLS AEAD | `openmls` (via RustCrypto) | 128-bit |
|
||||
| BLAKE2s | Noise hash function | `snow 0.9` (built-in) | 128-bit |
|
||||
| SHA-256 | Key fingerprints, HKDF | `sha2 0.10` | 128-bit collision resistance |
|
||||
| ML-KEM-768 | Post-quantum KEM | `ml-kem 0.2` | NIST Level 3 (~192-bit PQ) |
|
||||
| HKDF-SHA256 | Key derivation | `hkdf 0.12` | Depends on input entropy |
|
||||
@@ -26,19 +24,11 @@ the security margin it provides.
|
||||
|
||||
### Transport Layer
|
||||
|
||||
The transport layer uses two independent encryption substrates:
|
||||
|
||||
1. **QUIC/TLS 1.3** (via `quinn 0.11` + `rustls 0.23`): Provides the
|
||||
outermost encrypted tunnel. The TLS 1.3 handshake negotiates an ephemeral
|
||||
ECDHE key exchange (X25519 or P-256, depending on the peer) and an AEAD
|
||||
cipher (AES-128-GCM or ChaCha20-Poly1305). This layer protects connection
|
||||
metadata from passive network observers.
|
||||
|
||||
2. **Noise\_XX** (via `snow 0.9`): Runs inside the QUIC stream. The Noise
|
||||
pattern `Noise_XX_25519_ChaChaPoly_BLAKE2s` provides mutual authentication
|
||||
using static X25519 keys, with ChaCha20-Poly1305 as the AEAD and BLAKE2s
|
||||
as the hash function. See [X25519 Transport Keys](transport-keys.md) for
|
||||
details on the keypair.
|
||||
**QUIC/TLS 1.3** (via `quinn 0.11` + `rustls 0.23`): Provides the encrypted
|
||||
transport tunnel. The TLS 1.3 handshake negotiates an ephemeral ECDHE key
|
||||
exchange (X25519 or P-256, depending on the peer) and an AEAD cipher
|
||||
(AES-128-GCM or ChaCha20-Poly1305). This layer protects connection metadata
|
||||
from passive network observers.
|
||||
|
||||
### Application Layer
|
||||
|
||||
@@ -81,7 +71,6 @@ and is considered adequate for the foreseeable future.
|
||||
Layer Classical Security Post-Quantum Security
|
||||
--------------------------------------------------------------------
|
||||
QUIC/TLS 1.3 128-bit (ECDHE) None (classical only)
|
||||
Noise_XX 128-bit (X25519) None (classical only)
|
||||
MLS (content) 128-bit (AES-128-GCM) None (classical only)
|
||||
Hybrid KEM (M5+) 128-bit (X25519) ~192-bit (ML-KEM-768)
|
||||
```
|
||||
@@ -94,7 +83,6 @@ security properties these algorithms enable.
|
||||
## Related Pages
|
||||
|
||||
- [Ed25519 Identity Keys](identity-keys.md) -- long-term signing keypair
|
||||
- [X25519 Transport Keys](transport-keys.md) -- Noise handshake keypair
|
||||
- [Key Lifecycle and Zeroization](key-lifecycle.md) -- creation through destruction
|
||||
- [Forward Secrecy](forward-secrecy.md) -- past message protection
|
||||
- [Post-Compromise Security](post-compromise-security.md) -- future message recovery
|
||||
|
||||
Reference in New Issue
Block a user