This directory contains a Dockerfile that builds curl
using OpenSSL v3 using the OQS provider, which allows curl
to negotiate quantum-safe keys and use quantum-safe authentication in TLS 1.3. For instructions on setting up and using curl with HTTP/3 QUIC support, please refer to the cURL QUIC README.
- Be sure to have docker installed.
- Run
docker build -t oqs-curl .
to create a post quantum-enabled OpenSSL and Curl docker image - To verify all components perform quantum-safe operations, first start the container with
docker run -it oqs-curl
thus starting an OQS-enabled TLS test server. - On the command prompt in the docker container query that server using
curl --curves kyber768 https://localhost:4433
. If all works, the last command returns all TLS information documenting use of OQS-enabled TLS. The parameter to the--curves
argument is the KEM_ALG chosen when building the docker container ('kyber768' by default).
The Dockerfile
- obtains all source code required for building the quantum-safe crypto (QSC) algorithms, the QSC-enabled oqs-provider, curl, and OpenSSL
- builds all libraries and applications
- creates OQS-enabled certificate files for a mini-root certificate authority (CA)
- creates an OQS-enabled server certificate for running a
localhost
QSC-TLS server - by default starts an openssl (s_server) based test server.
The signature algorithm for the certificates is set to dilithium3
by default, but can be changed to any of the supported OQS signature algorithms with the build argumemt to docker --build-arg SIG_ALG=
name-of-oqs-sig-algorithm, e.g. as follows:
docker build -t oqs-curl --build-arg SIG_ALG=p521_falcon1024 .
Note for the interested: The build process is two-stage with the final image only retaining all executables, libraries and include-files to utilize OQS-enabled curl and openssl.
Two further, runtime configuration option exist that can both be optionally set via docker environment variables:
-
Setting the key exchange mechanism (KEM): By setting 'DEFAULT_GROUPS' to any of the supported KEM algorithms built into oqs-provider one can run TLS using a KEM other than a default algorithm like 'kyber512'. Example:
docker run -e DEFAULT_GROUPS=frodo640aes -it oqs-curl
. It is recommended to also request use of this KEM algorithm by passing it to the invocation ofcurl
with the--curves
parameter, i.e. as such in the same example:curl --curves frodo640aes https://localhost:4433
. -
Setting the signature algorithm (SIG): By setting 'SIG_ALG' to any of the supported OQS signature algorithms one can run TLS using a SIG other than the one set when building the image (see above). Example:
docker run -e SIG_ALG=dilithium3 -it oqs-curl
.
The Dockerfile also facilitates building the underlying OQS library to different specifications (by setting the --build-arg
variable LIBOQS_BUILD_DEFINES
as defined here.
For example, with this build command
docker build --build-arg LIBOQS_BUILD_DEFINES="-DOQS_OPT_TARGET=generic" -f Dockerfile -t oqs-curl-generic .
a generic system without processor-specific runtime optimizations is built, thus ensuring execution on all computers (at the cost of maximum runtime performance).
Information how to use the image is available in the separate file USAGE.md.
The Dockerfile provided allows for significant customization of the image built:
Tag of openssl
release to be used.
Tag of liboqs
release to be used.
Tag of oqsprovider
release to be used.
This permits changing the build options for the underlying library with the quantum safe algorithms. All possible options are documented here.
By default, the image is built such as to have maximum portability regardless of CPU type and optimizations available, i.e. to run on the widest possible range of cloud machines.
This defines the set of (possibly PQ) TLS 1.3 groups requested by the client.
The default value is x25519:x448:kyber512:p256_kyber512:kyber768:p384_kyber768:kyber1024:p521_kyber1024
enabling all Kyber variants as well as two classic EC algorithms. Be sure to disable the latter if no classic crypto should be used by this curl
instance. For the full list of supported PQ KEM algorithms see the oqs-provider algorithm documentation.
This defines the quantum-safe cryptographic signature algorithm for the internally generated (demonstration) CA and server certificates.
The default value is 'dilithium3' but can be set to any value documented here.
This defines the resultant location of the software installatiion.
By default this is '/opt/oqssa'. It is recommended to not change this. Also, all usage documentation assumes this path.
This defines the curl software version to be build into the image.
The default version set is known to work OK providing features required for selecting QSC algorithms (via the --curves
option). Therefore changing it is not recommended.
Allow setting parameters to make
operation, e.g., '-j nnn' where nnn defines the number of jobs run in parallel during build.
The default is conservative and known not to overload normal machines. If one has a very powerful (many cores, >64GB RAM) machine, passing larger numbers (or only '-j' for maximum parallelism) speeds up building considerably.
The version of the alpine
docker image to to be used.