| mlsh
GitHub

Getting Started

  • Overview
  • Installation
  • First Connection
  • Concepts

CLI Reference

  • Overview
  • Command Reference
  • Configuration File

Signal Server

  • Overview
  • Deployment
  • Configuration
  • Operations

Security

  • Overview
  • Cryptography
  • Trust Model

Networking

  • Overview
  • QUIC Tunnels
  • NAT Traversal
  • DNS

Troubleshooting

  • Overview
  • Connectivity
  • Reading Logs

Security

Cryptographic primitives, the trust model, and threat considerations.

MLSH is designed around a few concrete choices: post-quantum key exchange by default, no certificate authorities, and cryptographically verifiable cluster membership.

Cryptography

TLS 1.3, X25519Kyber768 hybrid post-quantum KEM, Ed25519 identities.

Trust Model

How MLSH establishes and verifies cluster membership without a shared secret.

Edit this page on GitHub

MLSH Documentation — Source on GitHub · v0.0.12