1 <b>SILC Documentation</b>
4 Currently working on the SILC documentation is in progress and the software
5 does not have extensive documentation at all.
7 README file from packages: <a href="docs/README">README</a>
9 Coding Style in SILC source tree: <a href="docs/CodingStyle">CodingStyle</a>
11 <i>Coming later: Software manual, SILC Library Reference manual</i>
16 <b>SILC Protocol Internet Drafts</b>
19 SILC Protocol is documented and four Internet Drafts exist. These
20 Internet Drafts are also available from
21 <a href="http://www.ietf.org">IETF</a>.
22 <br><b>Updated on Sun Jul 22 22:01:38 EEST 2001</b>: These new
23 updated drafts will be submitted to the IETF after the August 14th 2001.
26 <b>Secure Internet Live Conferencing (SILC), Protocol Specification</b>
30 This memo describes a Secure Internet Live Conferencing (SILC)
31 protocol which provides secure conferencing services over insecure
32 network channel. SILC is IRC [IRC] like protocol, however, it is
33 not equivalent to IRC and does not support IRC. Strong cryptographic
34 methods are used to protect SILC packets inside the SILC network.
35 Three other Internet Drafts relates very closely to this memo;
36 SILC Packet Protocol [SILC2], SILC Key Exchange and Authentication
37 Protocols [SILC3] and SILC Commands [SILC4].
39 <a href="docs/draft-riikonen-silc-spec-03.txt">
40 draft-riikonen-silc-spec-03.txt</a>
43 <b>SILC Packet Protocol</b>
47 This memo describes a Packet Protocol used in the Secure Internet Live
48 Conferencing (SILC) protocol, specified in the Secure Internet Live
49 Conferencing, Protocol Specification Internet Draft [SILC1]. This
50 protocol describes the packet types and packet payloads which defines
51 the contents of the packets. It provides secure binary packet protocol
52 that assures that the content of the packets is secured and authenticated.
54 <a href="docs/draft-riikonen-silc-pp-03.txt">
55 draft-riikonen-silc-pp-03.txt</a>
58 <b>SILC Key Exchange and Authentication Protocols</b>
62 This memo describes two protocols used in the Secure Internet Live
63 Conferencing (SILC) protocol, specified in the Secure Internet Live
64 Conferencing, Protocol Specification internet-draft [SILC1]. The
65 SILC Key Exchange (SKE) protocol provides secure key exchange between
66 two parties resulting into shared secret key material. The protocol
67 is based on Diffie-Hellman key exchange algorithm and its functionality
68 is derived from several key exchange protocols. SKE uses best parts
69 of the SSH2 Key Exchange protocol, Station-To-Station (STS) protocol
70 and the OAKLEY Key Determination protocol [OAKLEY].
72 The SILC Connection Authentication protocol provides user level
73 authentication used when creating connections in SILC network. The
74 protocol is transparent to the authentication data which means that it
75 can be used to authenticate the user with, for example, passphrase
76 (pre-shared-secret) or public key (and certificate).
78 <a href="docs/draft-riikonen-silc-ke-auth-03.txt">
79 draft-riikonen-silc-ke-auth-03.txt</a>
86 This memo describes the commands used in the Secure Internet Live
87 Conferencing (SILC) protocol, specified in the Secure Internet Live
88 Conferencing, Protocol Specification Internet Draft [SILC1]. The
89 SILC Commands are very important part of the SILC protocol. Usually
90 the commands are used by SILC clients to manage the SILC session, but
91 also SILC servers may use the commands. This memo specifies detailed
92 command messages and command reply messages.
94 <a href="docs/draft-riikonen-silc-commands-01.txt">
95 draft-riikonen-silc-commands-01.txt</a>