UQDA NETWORK

TECHNICAL WHITEPAPER

Uqda Network – Technical Whitepaper

Version 1.0
January 2026


Executive Summary

Uqda Network is a decentralized routing protocol designed for building resilient, self-organizing multi-hop mesh networks with end-to-end encryption, minimal configuration, and independence from centralized infrastructure.

Built upon proven cryptographic primitives and innovative routing algorithms, Uqda enables direct peer-to-peer connectivity across dynamic network topologies while maintaining stable, location-independent addressing through IPv6.

This whitepaper presents the technical architecture, design principles, and practical optimizations that distinguish Uqda as a pragmatic solution for modern decentralized networking challenges.


1. Introduction

1.1 Motivation

Contemporary network infrastructure faces fundamental challenges:

Emerging use cases demand different properties:

Uqda addresses these requirements through a fundamentally different approach to network routing and organization.

1.2 Design Philosophy

Uqda is built on three core principles:

  1. Decentralization by default: No central authorities, coordinators, or single points of failure
  2. Simplicity of operation: Networks should form automatically with minimal human intervention
  3. Practical performance: Theoretical elegance must yield to real-world usability

1.3 Relationship to Yggdrasil Network

Uqda Core is a derivative work of the Yggdrasil Network protocol (v0.5), maintained as an independent project with focus on:

Protocol Compatibility: Uqda nodes are protocol-compatible with Yggdrasil v0.5 nodes and can peer with them seamlessly.

Governance: Uqda operates as an independent project with its own release cycle, prioritization, and development roadmap.

Full attribution and licensing information: ATTRIBUTION.md


2. Architecture Overview

2.1 Network Model

Uqda operates as an overlay network running atop existing IP infrastructure, though the protocol design does not inherently require overlay operation.

Each network node consists of:

2.2 Node Equality

All nodes are functionally equivalent. There are no designated:

Each node can simultaneously:


3. Identity and Addressing

3.1 Cryptographic Identity

Each node possesses a public/private key pair (Ed25519):

3.2 IPv6 Address Generation

A stable IPv6 address is deterministically derived from the public key:

IPv6 address = truncate(hash(public_key))

This provides:

3.3 Application Compatibility

Most IPv6-capable applications work over Uqda without modification, as the network presents standard IPv6 addresses to the host operating system.


4. Routing Protocol

4.1 Design Objectives

The routing system must satisfy:

4.2 Routing Approach

Uqda employs a hybrid routing scheme:

  1. Spanning tree construction for coordination and bootstrap messaging
  2. Greedy routing in keyspace using distributed hash table principles
  3. Source routing for optimized paths when available

Spanning Tree

Keyspace Routing

Path Optimization

4.3 Protocol Security

All routing messages are cryptographically signed to prevent:


5. Peering and Connectivity

5.1 Peering Establishment

Nodes establish peerings through two mechanisms:

Static Peering

Multicast Discovery

5.2 Transport

Peering connections support:

5.3 NAT Traversal

Uqda handles NAT environments gracefully:


6. Security Model

6.1 Threat Model

Uqda assumes:

Uqda does not attempt to hide:

6.2 Cryptographic Protection

All traffic is end-to-end encrypted:

6.3 What Uqda Is Not

Uqda is not an anonymity network. It does not provide:

Direct peers can observe IP addresses and may infer location or identity.

6.4 Security Audit Status

Current status: Uqda has not undergone independent security audit.

The codebase inherits cryptographic implementations from:

Recommendations:

Planned: Community-funded audit scheduled for Q2 2026.


7. Performance Optimizations

Uqda incorporates practical optimizations based on real-world deployment experience:

7.1 Connection Establishment

7.2 DNS Caching

7.3 Protocol Timeouts

7.4 Performance Comparison

Metric Baseline (Yggdrasil 0.5.12) Uqda 0.1.1 Improvement
Handshake timeout 6s 5s -16.7%
TCP dial timeout 5s 3s -40%
First reconnect delay 1s 100ms -90%
Connection establishment 50-100ms 20-40ms ~60% faster
DNS overhead (uncached) 30-50ms <10ms ~75% reduction
Reconnection time 1-1.5s 500-900ms ~50% faster

Real-world impact: In a 10-hop network with 3 temporary link failures per hour, these optimizations reduce average end-to-end latency by 35-55ms and improve user-perceived responsiveness significantly.


8. Operational Characteristics

8.1 Bandwidth Consumption

Nodes with multiple peerings will route traffic for others:

8.2 MTU Handling

Uqda uses high MTU values (up to 65535) on TUN interfaces:

8.3 Firewall Recommendations

As a public network, Uqda nodes are globally reachable by default.

Strongly recommended: Deploy IPv6 firewall rules to:

8.4 Deployment Best Practices

Firewall Configuration

Minimum security posture (all platforms):

Peer Selection

For stable networks:

For mobile/dynamic scenarios:

Monitoring

Essential metrics to track:


9. Use Cases

9.1 Community Mesh Networks

9.2 Edge Computing

9.3 Emergency Networks

9.4 Research and Development

9.5 Decentralized Applications


10. Limitations and Non-Goals

10.1 Not a VPN Replacement

While Uqda can be used for private networks, it is not designed as a traditional VPN:

10.2 Not an Anonymity System

Uqda does not provide anonymity:

10.3 Current Routing Metric Limitations

Why hop-count only?

The protocol prioritizes verifiable, non-gameable metrics. Interactive link quality measurements (RTT, bandwidth probes) can be:

Practical impact:

Future work: Research into secure, verifiable quality metrics is ongoing.


11. Project Status and Roadmap

11.1 Current Status

11.2 Future Development

Planned enhancements include:


12. Technical Specifications

12.1 Protocol Version

12.2 Cryptography

12.3 Address Space

12.4 Supported Platforms


13. Comparative Analysis

Feature Uqda Yggdrasil Tailscale Nebula I2P/Tor
Decentralized ❌ (coordinator) ❌ (lighthouse)
Zero-config mesh ⚠️ (managed) ⚠️ (manual PKI)
Protocol-level encryption
Anonymity
NAT traversal ✅ (bidirectional) ✅ (STUN/relay) ⚠️ (limited)
Performance focus ⚠️ ❌ (latency high)
Works without Internet ⚠️
Production ready ⚠️ (non-critical) ⚠️ (alpha)

Legend: ✅ Full support | ⚠️ Partial/Limited | ❌ Not supported


14. Conclusion

Uqda represents a production-focused evolution of proven decentralized routing principles, optimized for:

Not a Silver Bullet

Uqda does not solve all networking problems. It is:

What Uqda Enables

Get Involved

Uqda returns control of network infrastructure to its users.
Build the network you need. Own the network you build.


References


Attribution

Uqda Core is based on the Yggdrasil Network protocol, with significant implementation optimizations and operational improvements. See ATTRIBUTION.md for full credits.


Document Version: 1.0
Last Updated: January 2026
Contact: uqda@proton.me
License: See LICENSE file in repository

Download as Markdown | Back to Home