{"id":30921,"date":"2025-09-03T06:02:45","date_gmt":"2025-09-03T10:02:45","guid":{"rendered":"https:\/\/www.lpi.org\/articles\/\/"},"modified":"2025-09-03T06:13:18","modified_gmt":"2025-09-03T10:13:18","slug":"tls-post-quantum-and-everything-in-between-at-lfnw25","status":"publish","type":"post","link":"https:\/\/www.lpi.org\/zh-hant\/blog\/2025\/09\/03\/tls-post-quantum-and-everything-in-between-at-lfnw25\/","title":{"rendered":"TLS, Post-Quantum, and Everything In Between at LFNW25"},"content":{"rendered":"<p>Some talks start as slides. Others start as hallway conversations, scan results, certificate errors, and someone in the team asking: \u201cHey Ted, do we really need TLS 1.3?\u201d By the time I finished preparing this talk for LinuxFest Northwest 2025 \u2014 in what was also the 25th anniversary of both LFNW and LPI \u2014 it was clear we needed a post on security in the quantum computing age that would reach beyond the room.<\/p>\n<p>My quest isn\u2019t just about standards. It\u2019s about making sure that the web we build \u2014 especially in FOSS \u2014 is one step ahead of what\u2019s coming. Even when what\u2019s coming is\u2026 quantum.<\/p>\n<p>As I was at LFNW (see full report here), I was happy and proud to give the talk \u201cSecuring Your Web Server with Post-Quantum Cryptography.\u201d This blog post is a rethinking of that session, adapted to this medium, and maybe a bit easier to search and share.<br \/>\nLet\u2019s dig in.<\/p>\n<h2>SSL, TLS, and That Whole Mess<\/h2>\n<p>Yes, we still call them SSL certs. But SSL has been deprecated for almost 30 years.<br \/>\nToday, if your setup isn\u2019t using <a href=\"https:\/\/www.rfc-editor.org\/rfc\/rfc5246\">TLS 1.2<\/a> at a minimum (or hopefully <a href=\"https:\/\/datatracker.ietf.org\/doc\/rfc8446\/\">TLS 1.3<\/a>) you\u2019re already in trouble.<\/p>\n<p>TLS 1.3 isn\u2019t just cleaner \u2014 it removes old baggage (like RSA key exchanges, which lack the forward secrecy in Diffie-Hellman), enforces better cipher suites, and lays the groundwork for <em>post-quantum support<\/em>. TLS 1.3 introduces a more efficient handshake between the clients and servers, as shown in Figure 1 (courtesy Cloudflare site):<\/p>\n<div id=\"attachment_30932\" style=\"width: 1450px\" class=\"wp-caption aligncenter\"><img fetchpriority=\"high\" decoding=\"async\" aria-describedby=\"caption-attachment-30932\" class=\"img-fluid wp-image-30932 size-full\" src=\"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/difference-between-opening-handshake-in-TLS-12-and-TLS-13.png\" alt=\"Figure 1 Difference between opening handshake in TLS 1.2 and TLS 1.3.\" width=\"1440\" height=\"808\" srcset=\"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/difference-between-opening-handshake-in-TLS-12-and-TLS-13.png 1440w, https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/difference-between-opening-handshake-in-TLS-12-and-TLS-13-300x168.png 300w, https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/difference-between-opening-handshake-in-TLS-12-and-TLS-13-1024x575.png 1024w, https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/difference-between-opening-handshake-in-TLS-12-and-TLS-13-768x431.png 768w\" sizes=\"(max-width: 1440px) 100vw, 1440px\" \/><p id=\"caption-attachment-30932\" class=\"wp-caption-text\">Figure 1 Difference between opening handshake in TLS 1.2 and TLS 1.3.<\/p><\/div>\n<p>Because that\u2019s where we\u2019re going. Fast. Every time I read about a new breakthrough against RSA with quantum computers, the attacks are against larger and larger numbers. And the actual situation may be even worse than the reports, because the published reports and studies we get don\u2019t include state actors or those wishing to not publicly disclose their achievements.<\/p>\n<p>I certainly don\u2019t know on what date our widely used RSA 2048-bit will be broken. But many feel that NIST\u2019s recommendation to deprecate RSA and ECDSA by 2030, and disallowing them after 2035, is reasonable, given the release of open source tools such as OpenSSL 3.5 that allow sites to migrate off of many of today\u2019s quantum-vulnerable ciphers.<\/p>\n<p>These tables show the timelines for migrating away from vulnerable standards:<\/p>\n<div id=\"attachment_30942\" style=\"width: 1450px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-30942\" class=\"size-full wp-image-30942 img-fluid\" src=\"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/current-known-quantum-vulnerable-algorithms.png\" alt=\"Current known Quantum-vulnerable algorithms\" width=\"1440\" height=\"801\" srcset=\"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/current-known-quantum-vulnerable-algorithms.png 1440w, https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/current-known-quantum-vulnerable-algorithms-300x167.png 300w, https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/current-known-quantum-vulnerable-algorithms-1024x570.png 1024w, https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/current-known-quantum-vulnerable-algorithms-768x427.png 768w\" sizes=\"(max-width: 1440px) 100vw, 1440px\" \/><p id=\"caption-attachment-30942\" class=\"wp-caption-text\">Current known Quantum-vulnerable algorithms<\/p><\/div>\n<div id=\"attachment_30952\" style=\"width: 1450px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-30952\" class=\"size-full wp-image-30952 img-fluid\" src=\"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/current-known-quantum-vulnerable-key-est-schemes.png\" alt=\"Current known Quantum-vulnerable key-est. schemes\" width=\"1440\" height=\"810\" srcset=\"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/current-known-quantum-vulnerable-key-est-schemes.png 1440w, https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/current-known-quantum-vulnerable-key-est-schemes-300x169.png 300w, https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/current-known-quantum-vulnerable-key-est-schemes-1024x576.png 1024w, https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/current-known-quantum-vulnerable-key-est-schemes-768x432.png 768w\" sizes=\"(max-width: 1440px) 100vw, 1440px\" \/><p id=\"caption-attachment-30952\" class=\"wp-caption-text\">Current known Quantum-vulnerable key-est. schemes<\/p><\/div>\n<p>NIST has been working with cryptographic researchers around the globe for almost 10 years to finalize drafts for new quantum-resistant ciphers, and in many cases backups, in case unnoticed vulnerabilities turn up in the initial choices.<\/p>\n<h2>What We Mean by &#8220;Post-Quantum&#8221;<\/h2>\n<p>Post-quantum cryptography (PQC) isn\u2019t a buzzword. It\u2019s a practical response to a looming issue: what happens to our encrypted traffic when quantum computers hit scale?<br \/>\nYou don\u2019t need to guess. Attackers are going to <em>harvest now, decrypt later<\/em>.<\/p>\n<p>Which is why I focused the second half of my session on <a href=\"https:\/\/csrc.nist.gov\/pubs\/fips\/203\/final\">Module Lattice-based Key Encapsulation Mechanism (ML-KEM)<\/a>, <a href=\"https:\/\/csrc.nist.gov\/pubs\/fips\/204\/ipd\">Module-Lattice-Based Digital Signature Algorithm (ML-DSA),<\/a> and <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2025\/03\/nist-selects-hqc-fifth-algorithm-post-quantum-encryption\">HQC<\/a>: algorithms vetted by NIST and already partially deployed in hybrid mode by Cloudflare, Google, and other cloud vendors.<\/p>\n<p>If your current server setups support <a href=\"https:\/\/openssl-library.org\/post\/2025-04-08-openssl-35-final-release\/\">OpenSSL 3.5<\/a>, you\u2019re already in a good place. If not, you have work to do, and should begin planning and testing now.<\/p>\n<p>Figure 2 shows the trajectory for OpenSSL.<\/p>\n<div id=\"attachment_30962\" style=\"width: 1450px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-30962\" class=\"size-full wp-image-30962 img-fluid\" src=\"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/openssl-lts-versions-that-will-be-supported-for-5-years.png\" alt=\"Figure 2. OpenSSL LTS versions (longer bars, light blue), will be supported for 5 years\" width=\"1440\" height=\"803\" srcset=\"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/openssl-lts-versions-that-will-be-supported-for-5-years.png 1440w, https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/openssl-lts-versions-that-will-be-supported-for-5-years-300x167.png 300w, https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/openssl-lts-versions-that-will-be-supported-for-5-years-1024x571.png 1024w, https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/openssl-lts-versions-that-will-be-supported-for-5-years-768x428.png 768w\" sizes=\"(max-width: 1440px) 100vw, 1440px\" \/><p id=\"caption-attachment-30962\" class=\"wp-caption-text\">Figure 2. OpenSSL LTS versions (longer bars, light blue), will be supported for 5 years<\/p><\/div>\n<p>If your work doesn\u2019t involve configuration or securing of web servers or API endpoints using TLS, you may not need to implement OpenSSL 3.5 to benefit from post-quantum security. The latest versions of Firefox, Chrome, and likely other widely used browsers currently have built in support for the ML-KEM PQC algorithm when connecting to a server or TLS endpoint using ML-KEM.<\/p>\n<p>Several browsers are already utilizing PQC in a hybrid fashion, meaning that the Certificate will still be validated with tools designed before the quantum threat, yet are still known to be quantum-resistant and utilize the PQC encryption if both server and browser clients support it. Cloudflare estimates that currently 2% of their traffic is PQC-resistant on their network. Major computing centers such as Google have been utilizing PQC on their internal networks since 2022.<\/p>\n<p>The new set of post-quantum algorithms have been designated FIPS ID numbers for tracking in compliance audits where data requires use of these new algorithms. These numbers are listed in Table 3.<\/p>\n<div id=\"attachment_30972\" style=\"width: 1450px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-30972\" class=\"size-full wp-image-30972 img-fluid\" src=\"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/key-open-ssl-35-pq-supported-algorithms.png\" alt=\"Key OpenSSL 3.5 PQ supported algorithms\" width=\"1440\" height=\"650\" srcset=\"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/key-open-ssl-35-pq-supported-algorithms.png 1440w, https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/key-open-ssl-35-pq-supported-algorithms-300x135.png 300w, https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/key-open-ssl-35-pq-supported-algorithms-1024x462.png 1024w, https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/key-open-ssl-35-pq-supported-algorithms-768x347.png 768w\" sizes=\"(max-width: 1440px) 100vw, 1440px\" \/><p id=\"caption-attachment-30972\" class=\"wp-caption-text\">Key OpenSSL 3.5 PQ supported algorithms<\/p><\/div>\n<p>IANA and the OpenSSL organization are setting the naming conventions of new PQ algorithms similar to the naming conventions for cipher suites used in the past.<\/p>\n<h2>Certificates: DV, OV, EV \u2014 and Expiry Math<\/h2>\n<p>Trust and Privacy on the internet involves not just technical methods, but social trust methods. SSL Certificates used for websites, TLS endpoints, and code signing use two methods, and Certificate Authorities (CAs) provide for 3 different levels of Certificates.<\/p>\n<p>A lot of us use <a href=\"https:\/\/letsencrypt.org\/\">Let\u2019s Encrypt<\/a>, and that\u2019s perfectly fine for most sites. But it\u2019s worth knowing that the <a href=\"https:\/\/letsencrypt.org\/docs\/faq\/\">Domain Validation (DV)<\/a> certificates offered by Let&#8217;s Encrypt are basic \u2014 good just for personal projects and internal tools. Organizational Validation (OV) and Extended Validation (EV) certificates are recommended for banks, public services, and anywhere with identity needs beyond DNS.<\/p>\n<p>Also: even a 10-year cert purchase needs to be reissued every 13 months. That\u2019s the way the ecosystem handles expiry and trust. Our Internet trust is based on both technical standards and social trusts, and Certificates that are OV and EV, whether used for websites or code signing purposes, go through more stringent auditing than DV certificates.<\/p>\n<p>If you don\u2019t know what your certs are doing, I highly recommend <a href=\"https:\/\/www.ssllabs.com\/\">SSL Labs<\/a>, <a href=\"https:\/\/github.com\/rbsec\/sslscan\">SSLScan<\/a>, and similar command-line tools.<\/p>\n<h2>Compliance: PCI, HIPAA, FIPS \u2014 and the Real Costs<\/h2>\n<p>If you\u2019re working in healthcare, fintech, or gov contracts, compliance isn\u2019t optional.<\/p>\n<p>I broke down in the talk how <a href=\"https:\/\/csrc.nist.gov\/pubs\/fips\/140-2\/upd2\/final\">FIPS 140-2<\/a> \/ <a href=\"https:\/\/csrc.nist.gov\/projects\/fips-140-3-development\">140-3<\/a>, <a href=\"https:\/\/www.fedramp.gov\/\">FedRAMP<\/a>, and other standard frameworks define cryptographic validity \u2014 and how much it can cost to certify a distro or product.<\/p>\n<p>Here\u2019s the short version: <em>millions<\/em>. Over time, but still.<\/p>\n<p>That\u2019s why most people opt for validated modules from Red Hat, Rocky, SUSE, Alma, Ubuntu, etc. You still get enterprise support, and someone else takes care of the certification treadmill (and extensive fees).<\/p>\n<h2>Backward Compatibility (and Grandma\u2019s Browser)<\/h2>\n<p>Why not just move to TLS 1.3 and forget 1.2?<\/p>\n<p>Because real users don\u2019t all run the latest OS. Maybe it\u2019s an Android 5 phone. Maybe it\u2019s a kiosk on Windows 7. Maybe it\u2019s your grandma\u2019s iMac that still works.<\/p>\n<p>Supporting both TLS 1.2 and 1.3, with smart cipher selection, keeps things secure and usable.<\/p>\n<p>Elliptic Curve cryptography (ECC) helps here too \u2014 it\u2019s lighter on CPU and faster on mobile devices than the classic RSA algorithm, especially when extending RSA to 4096 bits. Over half of the traffic on the internet is from mobile devices, so algorithms\u2019 CPU loads are of great concern for both global energy usage and the battery life of portable devices.<\/p>\n<h2>Ready to Upgrade?<\/h2>\n<p>I shared this checklist live. It\u2019s a good summary:<\/p>\n<ul>\n<li>Upgrade to OpenSSL 3.5 if possible, on servers that you manage.<\/li>\n<li>Use TLS 1.3, falling back to 1.2 when necessary.<\/li>\n<li>Know your cert type (DV\/OV\/EV).<\/li>\n<li>Scan your site using a command-line tool such as SSLScan or a web-based tool.<\/li>\n<li>Don\u2019t leave port 80 open (for unencrypted web traffic) unless you really know why.<\/li>\n<li>Watch NIST PQC standards (ML-KEM, HQC, etc.).<\/li>\n<li>Expect hybrid deployment to be the norm during 2025\u20132030.<\/li>\n<\/ul>\n<h2>Beyond the Talk<\/h2>\n<p>I\u2019ve been working in security, DevSecOps, and networking since the \u201890s. And I\u2019ll be honest: post-quantum crypto is the first thing in quite a while that feels like it\u2019s rewriting the rulebook.<\/p>\n<p>We\u2019re lucky in FOSS: we can test, share, and adapt ahead of the curve. But we\u2019ve got to show up. And we\u2019ve got to prepare \u2014 not just patch.<\/p>\n<p>Thanks go to LinuxFest Northwest, to everyone who came to the session, and to LPI for the space and support. Let\u2019s build a future-proof web.<\/p>\n<p>Slides &amp; Tools available: <a href=\"https:\/\/slatey.org\/LFNW_2025_Securing_Your_Web_Server.pdf\">https:\/\/slatey.org\/LFNW_2025_Securing_Your_Web_Server.pdf<\/a>, with link to LFNW 2025 Youtube video here: <a href=\"https:\/\/www.youtube.com\/watch?v=N4v4eM_tK4E\">https:\/\/www.youtube.com\/watch?v=N4v4eM_tK4E<\/a>.<\/p>\n<p>LPI <a href=\"https:\/\/www.lpi.org\/articles\/lfnw25\/\">proudly supported<\/a> LFNW25. Read Ted\u2019s full report HERE. LPI is already working with the LFNW team to support Linux and Open Source in the area towards the 2026 edition.<\/p>\n<p>Want to talk or add your experiences here? Do you want to know more about how you can help the LFNW community? Leave a comment or email me at <a href=\"mailto:tmatsumura@lpi.org\">tmatsumura@lpi.org<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Some talks start as slides. Others start &#8230; <a href=\"https:\/\/www.lpi.org\/zh-hant\/blog\/2025\/09\/03\/tls-post-quantum-and-everything-in-between-at-lfnw25\/\" class=\"button-link\">Read more<\/a><\/p>\n","protected":false},"author":105,"featured_media":30922,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[48],"country":[277],"language":[304],"ppma_author":[567],"class_list":["post-30921","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-north-america","country-united-states-of-america","language-english"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>TLS, Post-Quantum, and Everything In Between at LFNW25 - Linux Professional Institute (LPI)<\/title>\n<meta name=\"description\" content=\"Explore Ted Matsumura&#039;s talk at LFNW 2025 on TLS, post-quantum security, and the future of open source networking.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lpi.org\/zh-hant\/blog\/2025\/09\/03\/tls-post-quantum-and-everything-in-between-at-lfnw25\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TLS, Post-Quantum, and Everything In Between at LFNW25\" \/>\n<meta property=\"og:description\" content=\"Explore Ted Matsumura&#039;s talk at LFNW 2025 on TLS, post-quantum security, and the future of open source networking.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lpi.org\/zh-hant\/blog\/2025\/09\/03\/tls-post-quantum-and-everything-in-between-at-lfnw25\/\" \/>\n<meta property=\"og:site_name\" content=\"Linux Professional Institute (LPI)\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LPIConnect\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-03T10:02:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-03T10:13:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/article-teds-talk-at-LFNW.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"994\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ted Matsumura\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lpiconnect\" \/>\n<meta name=\"twitter:site\" content=\"@lpiconnect\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ted Matsumura\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u4f30\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/blog\\\/2025\\\/09\\\/03\\\/tls-post-quantum-and-everything-in-between-at-lfnw25\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/blog\\\/2025\\\/09\\\/03\\\/tls-post-quantum-and-everything-in-between-at-lfnw25\\\/\"},\"author\":{\"name\":\"Ted Matsumura\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/#\\\/schema\\\/person\\\/b8718541d5e6b68e1df6f727a3f708f6\"},\"headline\":\"TLS, Post-Quantum, and Everything In Between at LFNW25\",\"datePublished\":\"2025-09-03T10:02:45+00:00\",\"dateModified\":\"2025-09-03T10:13:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/blog\\\/2025\\\/09\\\/03\\\/tls-post-quantum-and-everything-in-between-at-lfnw25\\\/\"},\"wordCount\":1472,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/blog\\\/2025\\\/09\\\/03\\\/tls-post-quantum-and-everything-in-between-at-lfnw25\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/article-teds-talk-at-LFNW.jpg\",\"articleSection\":[\"North America\"],\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/blog\\\/2025\\\/09\\\/03\\\/tls-post-quantum-and-everything-in-between-at-lfnw25\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/blog\\\/2025\\\/09\\\/03\\\/tls-post-quantum-and-everything-in-between-at-lfnw25\\\/\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/blog\\\/2025\\\/09\\\/03\\\/tls-post-quantum-and-everything-in-between-at-lfnw25\\\/\",\"name\":\"TLS, Post-Quantum, and Everything In Between at LFNW25 - Linux Professional Institute (LPI)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/blog\\\/2025\\\/09\\\/03\\\/tls-post-quantum-and-everything-in-between-at-lfnw25\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/blog\\\/2025\\\/09\\\/03\\\/tls-post-quantum-and-everything-in-between-at-lfnw25\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/article-teds-talk-at-LFNW.jpg\",\"datePublished\":\"2025-09-03T10:02:45+00:00\",\"dateModified\":\"2025-09-03T10:13:18+00:00\",\"description\":\"Explore Ted Matsumura's talk at LFNW 2025 on TLS, post-quantum security, and the future of open source networking.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/blog\\\/2025\\\/09\\\/03\\\/tls-post-quantum-and-everything-in-between-at-lfnw25\\\/#breadcrumb\"},\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/blog\\\/2025\\\/09\\\/03\\\/tls-post-quantum-and-everything-in-between-at-lfnw25\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/blog\\\/2025\\\/09\\\/03\\\/tls-post-quantum-and-everything-in-between-at-lfnw25\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/article-teds-talk-at-LFNW.jpg\",\"contentUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/article-teds-talk-at-LFNW.jpg\",\"width\":1440,\"height\":994,\"caption\":\"TLS, Post-Quantum, and Everything In Between at LFNW25\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/blog\\\/2025\\\/09\\\/03\\\/tls-post-quantum-and-everything-in-between-at-lfnw25\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TLS, Post-Quantum, and Everything In Between at LFNW25\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/#website\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/\",\"name\":\"Linux Professional Institute (LPI)\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/#organization\",\"name\":\"Linux Professional Institute (LPI)\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/logo.png\",\"width\":496,\"height\":175,\"caption\":\"Linux Professional Institute (LPI)\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/LPIConnect\",\"https:\\\/\\\/x.com\\\/lpiconnect\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/35136\",\"https:\\\/\\\/www.instagram.com\\\/lpi_org\\\/\",\"https:\\\/\\\/fosstodon.org\\\/@LPI\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/zh-hant\\\/#\\\/schema\\\/person\\\/b8718541d5e6b68e1df6f727a3f708f6\",\"name\":\"Ted Matsumura\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/cropped-ted_matsumura_355x360px-1-96x96.jpg9d17da15411efeacb856724b62cbff9c\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/cropped-ted_matsumura_355x360px-1-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/cropped-ted_matsumura_355x360px-1-96x96.jpg\",\"caption\":\"Ted Matsumura\"},\"description\":\"Ted Matsumura has been working in tech since graduating from UCLA in 1984, building a career that spans software development, product management, finance, startups, and teaching. He attended his first Linux User Group (LUG) meeting in 1995 and has been a strong advocate for open architectures and cross-platform development ever since. Most recently, Ted worked in R&amp;D at Verint, focusing on secure, cloud-based Kubernetes applications with an emphasis on automation, data sovereignty, and security. Before that, he taught Linux, security, and networking as a college adjunct professor. With decades of hands-on experience and a passion for open source, Ted continues to share his knowledge through writing, mentoring, and exploring new technologies.\",\"sameAs\":[\"http:\\\/\\\/lpi.org\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"TLS, Post-Quantum, and Everything In Between at LFNW25 - Linux Professional Institute (LPI)","description":"Explore Ted Matsumura's talk at LFNW 2025 on TLS, post-quantum security, and the future of open source networking.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lpi.org\/zh-hant\/blog\/2025\/09\/03\/tls-post-quantum-and-everything-in-between-at-lfnw25\/","og_locale":"zh_TW","og_type":"article","og_title":"TLS, Post-Quantum, and Everything In Between at LFNW25","og_description":"Explore Ted Matsumura's talk at LFNW 2025 on TLS, post-quantum security, and the future of open source networking.","og_url":"https:\/\/www.lpi.org\/zh-hant\/blog\/2025\/09\/03\/tls-post-quantum-and-everything-in-between-at-lfnw25\/","og_site_name":"Linux Professional Institute (LPI)","article_publisher":"https:\/\/www.facebook.com\/LPIConnect","article_published_time":"2025-09-03T10:02:45+00:00","article_modified_time":"2025-09-03T10:13:18+00:00","og_image":[{"width":1440,"height":994,"url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/article-teds-talk-at-LFNW.jpg","type":"image\/jpeg"}],"author":"Ted Matsumura","twitter_card":"summary_large_image","twitter_creator":"@lpiconnect","twitter_site":"@lpiconnect","twitter_misc":{"\u4f5c\u8005:":"Ted Matsumura","\u9810\u4f30\u95b1\u8b80\u6642\u9593":"8 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lpi.org\/zh-hant\/blog\/2025\/09\/03\/tls-post-quantum-and-everything-in-between-at-lfnw25\/#article","isPartOf":{"@id":"https:\/\/www.lpi.org\/zh-hant\/blog\/2025\/09\/03\/tls-post-quantum-and-everything-in-between-at-lfnw25\/"},"author":{"name":"Ted Matsumura","@id":"https:\/\/www.lpi.org\/zh-hant\/#\/schema\/person\/b8718541d5e6b68e1df6f727a3f708f6"},"headline":"TLS, Post-Quantum, and Everything In Between at LFNW25","datePublished":"2025-09-03T10:02:45+00:00","dateModified":"2025-09-03T10:13:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lpi.org\/zh-hant\/blog\/2025\/09\/03\/tls-post-quantum-and-everything-in-between-at-lfnw25\/"},"wordCount":1472,"commentCount":0,"publisher":{"@id":"https:\/\/www.lpi.org\/zh-hant\/#organization"},"image":{"@id":"https:\/\/www.lpi.org\/zh-hant\/blog\/2025\/09\/03\/tls-post-quantum-and-everything-in-between-at-lfnw25\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/article-teds-talk-at-LFNW.jpg","articleSection":["North America"],"inLanguage":"zh-TW","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.lpi.org\/zh-hant\/blog\/2025\/09\/03\/tls-post-quantum-and-everything-in-between-at-lfnw25\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.lpi.org\/zh-hant\/blog\/2025\/09\/03\/tls-post-quantum-and-everything-in-between-at-lfnw25\/","url":"https:\/\/www.lpi.org\/zh-hant\/blog\/2025\/09\/03\/tls-post-quantum-and-everything-in-between-at-lfnw25\/","name":"TLS, Post-Quantum, and Everything In Between at LFNW25 - Linux Professional Institute (LPI)","isPartOf":{"@id":"https:\/\/www.lpi.org\/zh-hant\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lpi.org\/zh-hant\/blog\/2025\/09\/03\/tls-post-quantum-and-everything-in-between-at-lfnw25\/#primaryimage"},"image":{"@id":"https:\/\/www.lpi.org\/zh-hant\/blog\/2025\/09\/03\/tls-post-quantum-and-everything-in-between-at-lfnw25\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/article-teds-talk-at-LFNW.jpg","datePublished":"2025-09-03T10:02:45+00:00","dateModified":"2025-09-03T10:13:18+00:00","description":"Explore Ted Matsumura's talk at LFNW 2025 on TLS, post-quantum security, and the future of open source networking.","breadcrumb":{"@id":"https:\/\/www.lpi.org\/zh-hant\/blog\/2025\/09\/03\/tls-post-quantum-and-everything-in-between-at-lfnw25\/#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lpi.org\/zh-hant\/blog\/2025\/09\/03\/tls-post-quantum-and-everything-in-between-at-lfnw25\/"]}]},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/www.lpi.org\/zh-hant\/blog\/2025\/09\/03\/tls-post-quantum-and-everything-in-between-at-lfnw25\/#primaryimage","url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/article-teds-talk-at-LFNW.jpg","contentUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2025\/09\/article-teds-talk-at-LFNW.jpg","width":1440,"height":994,"caption":"TLS, Post-Quantum, and Everything In Between at LFNW25"},{"@type":"BreadcrumbList","@id":"https:\/\/www.lpi.org\/zh-hant\/blog\/2025\/09\/03\/tls-post-quantum-and-everything-in-between-at-lfnw25\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lpi.org\/zh-hant\/"},{"@type":"ListItem","position":2,"name":"TLS, Post-Quantum, and Everything In Between at LFNW25"}]},{"@type":"WebSite","@id":"https:\/\/www.lpi.org\/zh-hant\/#website","url":"https:\/\/www.lpi.org\/zh-hant\/","name":"Linux Professional Institute (LPI)","description":"","publisher":{"@id":"https:\/\/www.lpi.org\/zh-hant\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lpi.org\/zh-hant\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":"Organization","@id":"https:\/\/www.lpi.org\/zh-hant\/#organization","name":"Linux Professional Institute (LPI)","url":"https:\/\/www.lpi.org\/zh-hant\/","logo":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/www.lpi.org\/zh-hant\/#\/schema\/logo\/image\/","url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/04\/logo.png","contentUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/04\/logo.png","width":496,"height":175,"caption":"Linux Professional Institute (LPI)"},"image":{"@id":"https:\/\/www.lpi.org\/zh-hant\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LPIConnect","https:\/\/x.com\/lpiconnect","https:\/\/www.linkedin.com\/company\/35136","https:\/\/www.instagram.com\/lpi_org\/","https:\/\/fosstodon.org\/@LPI"]},{"@type":"Person","@id":"https:\/\/www.lpi.org\/zh-hant\/#\/schema\/person\/b8718541d5e6b68e1df6f727a3f708f6","name":"Ted Matsumura","image":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/www.lpi.org\/wp-content\/uploads\/2024\/07\/cropped-ted_matsumura_355x360px-1-96x96.jpg9d17da15411efeacb856724b62cbff9c","url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2024\/07\/cropped-ted_matsumura_355x360px-1-96x96.jpg","contentUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2024\/07\/cropped-ted_matsumura_355x360px-1-96x96.jpg","caption":"Ted Matsumura"},"description":"Ted Matsumura has been working in tech since graduating from UCLA in 1984, building a career that spans software development, product management, finance, startups, and teaching. He attended his first Linux User Group (LUG) meeting in 1995 and has been a strong advocate for open architectures and cross-platform development ever since. Most recently, Ted worked in R&amp;D at Verint, focusing on secure, cloud-based Kubernetes applications with an emphasis on automation, data sovereignty, and security. Before that, he taught Linux, security, and networking as a college adjunct professor. With decades of hands-on experience and a passion for open source, Ted continues to share his knowledge through writing, mentoring, and exploring new technologies.","sameAs":["http:\/\/lpi.org"]}]}},"views":670,"authors":[{"term_id":567,"user_id":105,"is_guest":0,"slug":"ted-matsumura","display_name":"Ted Matsumura","avatar_url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2024\/07\/cropped-ted_matsumura_355x360px-1-96x96.jpg","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.lpi.org\/zh-hant\/wp-json\/wp\/v2\/posts\/30921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lpi.org\/zh-hant\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lpi.org\/zh-hant\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lpi.org\/zh-hant\/wp-json\/wp\/v2\/users\/105"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lpi.org\/zh-hant\/wp-json\/wp\/v2\/comments?post=30921"}],"version-history":[{"count":1,"href":"https:\/\/www.lpi.org\/zh-hant\/wp-json\/wp\/v2\/posts\/30921\/revisions"}],"predecessor-version":[{"id":30982,"href":"https:\/\/www.lpi.org\/zh-hant\/wp-json\/wp\/v2\/posts\/30921\/revisions\/30982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lpi.org\/zh-hant\/wp-json\/wp\/v2\/media\/30922"}],"wp:attachment":[{"href":"https:\/\/www.lpi.org\/zh-hant\/wp-json\/wp\/v2\/media?parent=30921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lpi.org\/zh-hant\/wp-json\/wp\/v2\/categories?post=30921"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/www.lpi.org\/zh-hant\/wp-json\/wp\/v2\/country?post=30921"},{"taxonomy":"language","embeddable":true,"href":"https:\/\/www.lpi.org\/zh-hant\/wp-json\/wp\/v2\/language?post=30921"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.lpi.org\/zh-hant\/wp-json\/wp\/v2\/ppma_author?post=30921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}