PQ CRYPTA
Today, PQ Crypta announces the release of its HTTP/3 QUIC & WebTransport Scannerβan enterprise-grade protocol analysis tool built on a native Rust QUIC stack that extracts over 100 data points per scan, identifies 50+ server implementations, and delivers ML-powered security recommendations in under 200 milliseconds.
As HTTP/3 adoption accelerates (now supported by Cloudflare, Google, Facebook, Fastly, and major CDNs), organizations face a critical visibility gap. Traditional tools can't answer fundamental questions:
Browser DevTools show basic protocol information. Network analyzers require packet capture. Neither provides the deep metadata that security teams and performance engineers need.
Unlike browser-based or curl-based scanners, PQ Crypta's scanner uses native Rust QUIC libraries (quinn, h3, rustls) to establish real QUIC connections and extract metadata directly from the protocol handshake.
The scanner introduces a security-focused grading system that distinguishes between server capability and browser accessibility:
This grading exposes a common misconfiguration: servers with HTTP/3 enabled on the origin but no Alt-Svc header, causing browsers to fall back to HTTP/2 despite server capability.
Each scan extracts detailed metadata across eight categories:
Flow control limits, idle timeout, max UDP payload size, datagram frame support, connection migration settings, and GREASE bit configuration. These parameters reveal server tuning and implementation characteristics.
ALPN protocols, key share groups (including X25519MLKEM768 for post-quantum), signature algorithms, ECH support, certificate compression, and GREASE extension usage. Critical for security assessment.
Implementation identification using 3-tier detection: header analysis (95% confidence), domain analysis (85%), and transport parameter patterns (70%). Identifies Cloudflare, Google GFE, Facebook mvfst, nginx-quic, LiteSpeed, Caddy, Fastly, and 40+ more.
Handshake time, time-to-first-byte, RTT estimates, congestion window, packets sent/lost, loss rate percentage, path MTU discovery status, and congestion controller type (CUBIC, BBR, Reno).
Retry packet usage, address validation, anti-amplification limits (3x standard), stateless reset support, and rate limiting detection.
QPACK configuration, WebTransport enablement, DATAGRAM support, and RFC 9218 priority support.
Alt-Svc, Server-Timing, Priority, Accept-CH client hints, NEL (Network Error Logging), Report-To, and 103 Early Hints detection.
Session limits, stream types, datagram support, flow control, authentication requirements, and session establishment latency.
The scanner uses machine learning (RandomForest classifier with 100 trees) trained on historical scan data to provide contextual, actionable recommendations:
Recommendations include effectiveness scores and are filtered by contextβno redundant advice for sites that already implement best practices.
Analysis of 480+ scanned websites reveals:
The Grade C category represents a significant discovery: servers where operators believe HTTP/3 is working, but browsers silently fall back to HTTP/2 due to missing advertisement headers.
pqcrypta.com/http3-quic/?url=example.compqcrypta.com/http3-quic/example.comcurl -X POST https://api.pqcrypta.com/http3-scanner/scan \
-H "Content-Type: application/json" \
-d '{"url": "https://cloudflare.com"}'
The HTTP/3 scanner is part of PQ Crypta's broader mission to provide visibility into modern protocol adoption and post-quantum readiness. Upcoming features include:
PQ Crypta builds enterprise-grade tools for the post-quantum era. Our platform implements NIST-standardized algorithms (ML-KEM-1024, ML-DSA-87, SLH-DSA), provides HTTP/3 QUIC infrastructure analysis, and delivers production-ready quantum-resistant encryption. We're committed to making advanced cryptography accessible and interoperable.
Website: pqcrypta.com
HTTP/3 Scanner: pqcrypta.com/http3-quic/
Email: allan@pqcrypta.com
GitHub: github.com/PQCrypta