2 <b><big>SILC Documentation</big></b>
5 README file from packages: <a href="docs/README" class="normal">README</a>
7 Coding Style in SILC source tree: <a href="docs/CodingStyle" class="normal">CodingStyle</a>
9 Software manual: <i>Coming later</i>
11 <br /> <br /> <br />
13 <b>Installation Instructions</b>
15 General installation instructions are available in all SILC distributions
18 <a href="?page=install" class="normal">Installation instructions</a>
20 <br /> <br /> <br />
22 <b><big>Technical Documentation</big></b>
25 <b>SILC Toolkit Reference Manual</b>
27 SILC Toolkit Reference Manual includes documentation for the SILC Toolkit
28 package. It includes interface references to all interfaces found in
29 various SILC libraries. The reference manual is automatically generated
30 from the source code. Note that this version is preliminary and does not
31 include references to all interfaces.
33 <a href="docs/toolkit/" class="normal">HTML version</a>,
34 <a href="docs/toolkit.html.tar.gz" class="normal">html.tar.gz</a>
36 <br /> <br /> <br />
38 <b><big>SILC Protocol Documentation</big></b>
41 <b>SILC Protocol White Paper</b>
43 SILC Protocol White Paper gives short but deep enough introduction to the
44 SILC Protocol. Note that this is for those who would like to know how the
45 protocol works. For more detailed description of the protocol we suggest
46 reading the protocol specifications.
49 <a href="?page=whitepaper" class="normal">HTML version</a>,
50 <a href="docs/silc_protocol.pdf.gz" class="normal">gzipped PDF</a>,
51 <a href="docs/silc_protocol.ps.gz" class="normal">gzipped PostScript</a>
53 <br /> <br /> <br />
55 <b>SILC Protocol Internet Drafts</b>
57 SILC Protocol is documented and four Internet Drafts exist. These
58 Internet Drafts are also available from
59 <a href="http://www.ietf.org/" class="normal">IETF</a>.
62 <b>Secure Internet Live Conferencing (SILC), Protocol Specification</b>
66 This memo describes a Secure Internet Live Conferencing (SILC)
67 protocol which provides secure conferencing services over insecure
68 network channel. SILC is IRC [IRC] like protocol, however, it is
69 not equivalent to IRC and does not support IRC. Strong cryptographic
70 methods are used to protect SILC packets inside the SILC network.
71 Three other Internet Drafts relates very closely to this memo;
72 SILC Packet Protocol [SILC2], SILC Key Exchange and Authentication
73 Protocols [SILC3] and SILC Commands [SILC4].
75 <a href="docs/draft-riikonen-silc-spec-04.txt" class="normal">
76 draft-riikonen-silc-spec-04.txt</a>
77 <br /> <br /> <br />
79 <b>SILC Packet Protocol</b>
83 This memo describes a Packet Protocol used in the Secure Internet Live
84 Conferencing (SILC) protocol, specified in the Secure Internet Live
85 Conferencing, Protocol Specification Internet Draft [SILC1]. This
86 protocol describes the packet types and packet payloads which defines
87 the contents of the packets. It provides secure binary packet protocol
88 that assures that the content of the packets is secured and authenticated.
90 <a href="docs/draft-riikonen-silc-pp-04.txt" class="normal">
91 draft-riikonen-silc-pp-04.txt</a>
92 <br /> <br /> <br />
94 <b>SILC Key Exchange and Authentication Protocols</b>
98 This memo describes two protocols used in the Secure Internet Live
99 Conferencing (SILC) protocol, specified in the Secure Internet Live
100 Conferencing, Protocol Specification internet-draft [SILC1]. The
101 SILC Key Exchange (SKE) protocol provides secure key exchange between
102 two parties resulting into shared secret key material. The protocol
103 is based on Diffie-Hellman key exchange algorithm and its functionality
104 is derived from several key exchange protocols. SKE uses best parts
105 of the SSH2 Key Exchange protocol, Station-To-Station (STS) protocol
106 and the OAKLEY Key Determination protocol [OAKLEY].
108 The SILC Connection Authentication protocol provides user level
109 authentication used when creating connections in SILC network. The
110 protocol is transparent to the authentication data which means that it
111 can be used to authenticate the user with, for example, passphrase
112 (pre-shared-secret) or public key (and certificate).
114 <a href="docs/draft-riikonen-silc-ke-auth-04.txt" class="normal">
115 draft-riikonen-silc-ke-auth-04.txt</a>
116 <br /> <br /> <br />
122 This memo describes the commands used in the Secure Internet Live
123 Conferencing (SILC) protocol, specified in the Secure Internet Live
124 Conferencing, Protocol Specification Internet Draft [SILC1]. The
125 SILC Commands are very important part of the SILC protocol. Usually
126 the commands are used by SILC clients to manage the SILC session, but
127 also SILC servers may use the commands. This memo specifies detailed
128 command messages and command reply messages.
130 <a href="docs/draft-riikonen-silc-commands-02.txt" class="normal">
131 draft-riikonen-silc-commands-02.txt</a>