Christian Nennemann 4c1e4683e3 chore: exclude p2p crate from workspace, slim tokio features
Move quicnprotochat-p2p to workspace.exclude so ~90 iroh-only
dependencies are not compiled in the default build. Narrow tokio
features from "full" to the subset actually used. The p2p crate
now pins its own dependency versions since it is outside the workspace.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-23 23:10:23 +01:00

quicnprotochat

End-to-end encrypted group messaging over QUIC + TLS 1.3 + MLS (RFC 9420), written in Rust.

Every byte on the wire is protected by a QUIC transport secured with TLS 1.3 (quinn + rustls). The inner MLS layer provides post-compromise security and ratcheted group key agreement across any number of participants. Messages are framed with Cap'n Proto, keeping serialisation zero-copy and schema-versioned.

┌─────────────────────────────────────────────┐
│          Application / MLS ciphertext        │  <- group key ratchet (RFC 9420)
├─────────────────────────────────────────────┤
│              Cap'n Proto RPC                │  <- typed, schema-versioned framing
├─────────────────────────────────────────────┤
│        QUIC + TLS 1.3 (quinn/rustls)        │  <- mutual auth + transport secrecy
└─────────────────────────────────────────────┘
Property Mechanism
Transport confidentiality TLS 1.3 over QUIC (rustls)
Transport authentication TLS 1.3 server cert (self-signed by default)
Group key agreement MLS MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519
Post-compromise security MLS epoch ratchet
Identity Ed25519 (MLS credential + leaf node signature)
Message framing Cap'n Proto (unpacked wire format)

Documentation

Full documentation is available as an mdBook wiki in docs/:

# Install mdBook (once)
cargo install mdbook

# Build and serve locally
mdbook serve docs
# Open http://localhost:3000

Highlights


Quick start

# Prerequisites: Rust 1.77+, capnp CLI
brew install capnp          # macOS
# apt-get install capnproto # Debian/Ubuntu

# GUI prerequisites (Linux only) — WebKitGTK + GTK3 for Tauri 2
# sudo apt install -y libwebkit2gtk-4.1-dev libgtk-3-dev libglib2.0-dev libssl-dev libayatana-appindicator3-dev librsvg2-dev patchelf

# Build and test
cargo build --workspace
cargo test --workspace

# Start the server (port 7000 by default)
cargo run -p quicnprotochat-server

# Or via a config file (TOML)
# Note: auth_token = "devtoken" and db_key = "" are for development only.
# Production: set QUICNPROTOCHAT_AUTH_TOKEN to a strong secret and (when store_backend = "sql")
# set QUICNPROTOCHAT_DB_KEY so the database is encrypted. Empty db_key = plaintext DB (insecure).
cat > quicnprotochat-server.toml <<'EOF'
listen = "0.0.0.0:7000"
data_dir = "data"
tls_cert = "data/server-cert.der"
tls_key = "data/server-key.der"
auth_token = "devtoken"
store_backend = "file" # or "sql"
db_path = "data/quicnprotochat.db"
db_key = ""
EOF
cargo run -p quicnprotochat-server -- --config quicnprotochat-server.toml

# Run the two-party demo
cargo run -p quicnprotochat-client -- demo-group \
  --server 127.0.0.1:7000

# Interactive 1:1 chat (after creating a group and inviting a peer)
# Terminal 1: quicnprotochat chat --peer-key <other_identity_hex>
# Terminal 2: quicnprotochat chat --peer-key <first_identity_hex>
# Type messages and press Enter; incoming messages appear as [peer] <msg>. Ctrl+D to exit.

See the full demo walkthrough for a step-by-step guide.


Milestones

# Name Status What it adds
M1 QUIC/TLS transport Done QUIC + TLS 1.3 endpoint, length-prefixed framing, Ping/Pong
M2 Authentication Service Done Ed25519 identity, KeyPackage generation, AS upload/fetch
M3 Delivery Service + MLS groups Done DS relay, GroupMember create/join/add/send/recv
M4 Group CLI subcommands Done Persistent CLI (create-group, invite, join, send, recv), OPAQUE login
M5 Multi-party groups Done N > 2 members, Commit fan-out, send --all, epoch sync
M6 Persistence Done SQLite/SQLCipher, migrations, durable server + client state
M7 Post-quantum Next PQ hybrid for MLS/HPKE (X25519 + ML-KEM-768)

Building without the GUI

To build only the server and CLI client (faster, no Tauri/WebKit):

cargo build -p quicnprotochat-server -p quicnprotochat-client

Core and proto crates are built as dependencies. Omit quicnprotochat-gui and quicnprotochat-p2p if you don't need them.


Security notes

This is a proof-of-concept research project. It has not undergone a formal third-party audit. See the threat model for what is and isn't protected, and the security audit for an internal review of authentication, crypto, transport, and authorization.

  • Dependency checks: Run cargo install cargo-audit && cargo audit to check for known vulnerabilities.
  • Certificate pinning: Use the server's certificate as --ca-cert (e.g. copy server-cert.der from the server) so the client only trusts that server; see Certificate pinning in the security audit.

Production deployment: Set QUICNPROTOCHAT_PRODUCTION=1 and provide a strong QUICNPROTOCHAT_AUTH_TOKEN (not devtoken). When using store_backend = "sql", set QUICNPROTOCHAT_DB_KEY; an empty key leaves the database unencrypted on disk.


License

MIT

Description
End-to-end encrypted messaging over QUIC + TLS 1.3 + MLS (RFC 9420), written in Rust.
Readme 6.9 MiB
Languages
Rust 86.4%
HTML 3.6%
Python 2.1%
TeX 1.9%
Shell 1.6%
Other 4.2%