Remove Noise protocol references from wiki docs and tests
Delete 8 Noise-specific documentation pages (noise-xx.md,
transport-keys.md, adr-001/003/006, framing-codec.md) and update
~30 remaining wiki pages to reflect QUIC+TLS as the sole transport.
Remove obsolete Noise-based integration tests (auth_service.rs,
mls_group.rs). Code-side Noise removal was done in f334ed3.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
This commit is contained in:
@@ -163,7 +163,7 @@ hybrid KEM for HPKE init key exchange:
|
||||
via the MLS group context extensions. Classical-only clients can still
|
||||
participate in groups that do not require PQ protection.
|
||||
|
||||
## The PQ Gap (ADR-006)
|
||||
## The PQ Gap
|
||||
|
||||
There is an important asymmetry in quicnprotochat's post-quantum protection:
|
||||
|
||||
@@ -171,7 +171,6 @@ There is an important asymmetry in quicnprotochat's post-quantum protection:
|
||||
Layer Classical Protection Post-Quantum Protection
|
||||
---------------------------------------------------------------------
|
||||
QUIC/TLS 1.3 Yes (ECDHE) No
|
||||
Noise_XX Yes (X25519) No
|
||||
MLS content (M5+) Yes (X25519 DHKEM) Yes (hybrid KEM)
|
||||
```
|
||||
|
||||
@@ -182,8 +181,8 @@ MLS content (M5+) Yes (X25519 DHKEM) Yes (hybrid KEM)
|
||||
the message payload.
|
||||
|
||||
- **Transport metadata** (who connects to the server, when, message sizes) is
|
||||
protected only by classical cryptography. A quantum attacker who recorded the
|
||||
TLS/Noise handshake transcripts could, in theory, recover the transport session
|
||||
protected only by classical ECDHE. A quantum attacker who recorded the
|
||||
TLS handshake transcripts could, in theory, recover the transport session
|
||||
keys and observe the metadata.
|
||||
|
||||
This is the **PQ gap**: content is safe, but metadata is not.
|
||||
@@ -195,10 +194,6 @@ the IETF and is supported by some TLS libraries, but `rustls` does not yet
|
||||
support it in a stable release. When `rustls` adds ML-KEM support, quicnprotochat
|
||||
will adopt it to close the PQ gap at the transport layer.
|
||||
|
||||
Similarly, post-quantum Noise patterns are an active research area but are not
|
||||
yet standardized. The `snow` crate does not currently support post-quantum DH
|
||||
primitives.
|
||||
|
||||
## Harvest-Now, Decrypt-Later Risk
|
||||
|
||||
The "harvest-now, decrypt-later" (HNDL) threat model assumes an adversary who:
|
||||
@@ -213,7 +208,7 @@ In quicnprotochat's case:
|
||||
ML-KEM-768, which resists quantum attacks. Even if the recorded traffic is
|
||||
decrypted at the transport layer, the MLS ciphertext inside is still protected.
|
||||
|
||||
- **Transport metadata is at risk.** An HNDL attacker who records TLS/Noise
|
||||
- **Transport metadata is at risk.** An HNDL attacker who records TLS
|
||||
handshakes today could, with a future quantum computer, recover the transport
|
||||
session keys and observe:
|
||||
- Which clients connected to the server and when.
|
||||
|
||||
Reference in New Issue
Block a user