SILC DocumentationCurrently the SILC documentation is under work and the software does not have that much of a documentation.
README file from the software: README
[Coming later: Software manual, SILC Library Reference manual]
SILC Protocol Internet Drafts
SILC Protocol is documented and three Internet Drafts exists. These
Internet Drafts are also available from
IETF.
Note: These drafts are already pretty much outdated. If you really need
to know what is happening in the protocol designing I suggest checking out
the drafts from the CVS. They are updated constantly.
Abstract
This memo describes a Secure Internet Live Conferencing (SILC)
protocol which provides secure conferencing services over insecure
network channel. SILC is IRC [IRC] like protocol, however, it is
not equivalent to IRC and does not support IRC. Strong cryptographic
methods are used to protect SILC packets inside SILC network. Two
other Internet Drafts relates very closely to this memo; SILC Packet
Protocol [SILC2] and SILC Key Exchange and Authentication Protocols
[SILC3].
draft-riikonen-silc-spec-01.txt
Abstract
This memo describes a Packet Protocol used in the Secure Internet Live
Conferencing (SILC) protocol specified in the Secure Internet Live
Conferencing, Protocol Specification Internet Draft [SILC1]. This
protocol describes the packet types and packet payloads which defines
the contents of the packets. The protocol provides secure binary packet
protocol that assures that the contents of the packets are secured and
authenticated.
Abstract
This memo describes two protocols used in the Secure Internet Live
Conferencing (SILC) protocol specified in the Secure Internet Live
Conferencing, Protocol Specification internet-draft [SILC1]. The
SILC Key Exchange (SKE) protocol provides secure key exchange between
two parties resulting into shared secret key material. The protocol
is based on Diffie Hellman key exchange algorithm and its functionality
is derived from several key exchange protocols. SKE uses best parts
of the SSH2 Key Exchange protocol, Station-To-Station (STS) protocol
and the OAKLEY Key Determination protocol [OAKLEY].
The SILC Connection Authentication protocol provides user level
authentication used when creating connections in SILC network. The
protocol is transparent to the authentication data which means that it
can be used to authenticate the user with, for example, passphrase
(pre-shared- secret) or public key (and certificate).
draft-riikonen-silc-ke-auth-01.txt
|