Alexander Hansen Færøy<p>Trying out the Post-Quantum TLS feature (called ML-KEM) in <a href="https://mastodon.social/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSL</span></a> 3.5-beta1 and <a href="https://mastodon.social/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> was a success! 🥳</p><p>The experiment is using the same setup as we did with <a href="https://mastodon.social/tags/BoringSSL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BoringSSL</span></a> back when they enabled the Kyber768/x25519 TLS 1.3 group: we use a Tor binary, compiled against a PQC-enabled lib(ssl|crypto), to run a Bridge Server locally and connect a local Bridge Client to the server.</p><p>The branch used for this experiment is available from <a href="https://gitlab.torproject.org/ahf/tor/-/commits/ahf/openssl-3.5-pqc-experiments" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gitlab.torproject.org/ahf/tor/</span><span class="invisible">-/commits/ahf/openssl-3.5-pqc-experiments</span></a></p>