Security overview

Understand Velocity's cryptographic posture, threat model, and incident response expectations.

Last updated October 8, 2025View on GitHub

"Security overview" description: "Understand Velocity’s cryptographic posture, threat model, and incident response expectations." category: "Security" updated: "2025-10-08" order: 200

Security essentials

This page distils the full security design document into the highlights you need for risk reviews and incident prep.

Cryptography in production

  • Hybrid key agreement pairs X25519 with Kyber so secrecy survives either classical or post-quantum attacks.
  • Certificates contain both Dilithium and ECDSA signatures. Legacy clients verify with ECDSA today while PQ-ready clients lean on Dilithium.
  • Session tickets are encrypted with AEAD, scoped to a replay window, and embed issuer metadata to detect misuse.

Threat model snapshot

ThreatBuilt-in defence
Passive nation-state interceptionHybrid key exchange + forward secrecy; optional 0‑RTT disablement for sensitive workloads.
Downgrade attemptsPolicy decisions are signed into the transcript and logged with explicit downgrade_reason fields.
Metadata leakageConnection IDs are padded, optional ECH hides SNI, and telemetry avoids sensitive payloads.
Replay attacksTicket windows and method allowlists protect early data; repeated attempts trigger alerts.

Operator guardrails

  • Enforce hybrid certificates everywhere Velocity terminates traffic.
  • Rotate ticket secrets at least daily and store them in an HSM or managed secrets platform.
  • Require client authentication (tls.client_auth) on admin APIs and privileged automation.
  • Monitor velocity_pq_validation_failures_total—anything above 0 is a page.

Incident checklist

  1. Capture diagnostics: velocity-cli admin diagnostics --dump, logs, and current metrics.
  2. Revoke compromised certificates, rotate ticket keys, and tighten policy if abuse is suspected.
  3. Notify the Velocity security team via the signed channel in SECURITY.md for coordinated disclosure.
  4. Document the timeline using your post-incident template and feed learnings back into Exploit hardening.