The forum’s TLS connection is now (hopefully) slightly more secure against HNDL (harvest now, decrypt later) attacks for a future where quantum computers can break the current RSA or ECC keys using in most in-transit network comms.
This was more an exercise in PQC playing with existing infrastructure more than anything else. After all, the content on this forum is open to the public so there’s not much safety at risk here
Technically what I did was upgrade the server’s OpenSSL to include Lib OQS supported providers and use a NIST candidate hybrid algorithm approach for the initial key exchange between browser and visiting this forum, configured in the Apache web server.
The hybrid algo in question is X25519MLKEM768. X25519 is a standard ECC one, and MLKEM768 is also known as a Kyber768.