2 <b><big>SILC Documentation</big></b>
5 README file from packages: <a href="docs/README" class="normal">README</a>
7 Coding Style in SILC source tree: <a href="docs/CodingStyle" class="normal">CodingStyle</a>
9 Software manual: <i>Coming later</i>
11 <br /> <br /> <br />
13 <b>Installation Instructions</b>
15 General installation instructions are available in all SILC distributions
18 <a href="?page=install" class="normal">Installation instructions</a>
20 <br /> <br /> <br />
22 <b><big>Technical Documentation</big></b>
25 <b>SILC Toolkit Reference Manual</b>
27 SILC Toolkit Reference Manual includes documentation for the SILC Toolkit
28 package. It includes interface references to all interfaces found in
29 various SILC libraries. The reference manual is automatically generated
30 from the source code. Note that this version is preliminary and does not
31 include references to all interfaces.
33 <a href="docs/toolkit/" class="normal">HTML version</a>,
34 <a href="docs/toolkit.html.tar.gz" class="normal">html.tar.gz</a>
36 <br /> <br /> <br />
38 <b><big>SILC Protocol Documentation</big></b>
41 <b>SILC Protocol White Paper</b>
43 SILC Protocol White Paper gives short but deep enough introduction to the
44 SILC Protocol. Note that this is for those who would like to know how the
45 protocol works. For more detailed description of the protocol we suggest
46 reading the protocol specifications.
49 <a href="?page=whitepaper" class="normal">HTML version</a>,
50 <a href="docs/silc_protocol.pdf.gz" class="normal">gzipped PDF</a>,
51 <a href="docs/silc_protocol.ps.gz" class="normal">gzipped PostScript</a>
53 <br /> <br /> <br />
55 <b>SILC Protocol Internet Drafts</b>
57 SILC Protocol is documented and four Internet Drafts exist. These
58 Internet Drafts are also available from
59 <a href="http://www.ietf.org/" class="normal">IETF</a>.
61 <b>NOTE Mon Nov 5 18:53:56 EET 2001:</b> New versions of the protocol
62 specifications are almost ready for submission to the IETF. You can
63 preview the upcoming versions <a href="docs/drafts/">here</a>.
66 <b>Secure Internet Live Conferencing (SILC), Protocol Specification</b>
70 This memo describes a Secure Internet Live Conferencing (SILC)
71 protocol which provides secure conferencing services over insecure
72 network channel. SILC is IRC [IRC] like protocol, however, it is
73 not equivalent to IRC and does not support IRC. Strong cryptographic
74 methods are used to protect SILC packets inside the SILC network.
75 Three other Internet Drafts relates very closely to this memo;
76 SILC Packet Protocol [SILC2], SILC Key Exchange and Authentication
77 Protocols [SILC3] and SILC Commands [SILC4].
79 <a href="docs/draft-riikonen-silc-spec-03.txt" class="normal">
80 draft-riikonen-silc-spec-03.txt</a>
81 <br /> <br /> <br />
83 <b>SILC Packet Protocol</b>
87 This memo describes a Packet Protocol used in the Secure Internet Live
88 Conferencing (SILC) protocol, specified in the Secure Internet Live
89 Conferencing, Protocol Specification Internet Draft [SILC1]. This
90 protocol describes the packet types and packet payloads which defines
91 the contents of the packets. It provides secure binary packet protocol
92 that assures that the content of the packets is secured and authenticated.
94 <a href="docs/draft-riikonen-silc-pp-03.txt" class="normal">
95 draft-riikonen-silc-pp-03.txt</a>
96 <br /> <br /> <br />
98 <b>SILC Key Exchange and Authentication Protocols</b>
102 This memo describes two protocols used in the Secure Internet Live
103 Conferencing (SILC) protocol, specified in the Secure Internet Live
104 Conferencing, Protocol Specification internet-draft [SILC1]. The
105 SILC Key Exchange (SKE) protocol provides secure key exchange between
106 two parties resulting into shared secret key material. The protocol
107 is based on Diffie-Hellman key exchange algorithm and its functionality
108 is derived from several key exchange protocols. SKE uses best parts
109 of the SSH2 Key Exchange protocol, Station-To-Station (STS) protocol
110 and the OAKLEY Key Determination protocol [OAKLEY].
112 The SILC Connection Authentication protocol provides user level
113 authentication used when creating connections in SILC network. The
114 protocol is transparent to the authentication data which means that it
115 can be used to authenticate the user with, for example, passphrase
116 (pre-shared-secret) or public key (and certificate).
118 <a href="docs/draft-riikonen-silc-ke-auth-03.txt" class="normal">
119 draft-riikonen-silc-ke-auth-03.txt</a>
120 <br /> <br /> <br />
126 This memo describes the commands used in the Secure Internet Live
127 Conferencing (SILC) protocol, specified in the Secure Internet Live
128 Conferencing, Protocol Specification Internet Draft [SILC1]. The
129 SILC Commands are very important part of the SILC protocol. Usually
130 the commands are used by SILC clients to manage the SILC session, but
131 also SILC servers may use the commands. This memo specifies detailed
132 command messages and command reply messages.
134 <a href="docs/draft-riikonen-silc-commands-01.txt" class="normal">
135 draft-riikonen-silc-commands-01.txt</a>