2 <style TYPE="text/css"><!-- A:link {text-decoration: none}A:visited{text-decoration:none}A:active{text-decoration:none}--></style>
3 <body bgcolor="#ffffff">
5 <a href="index.html"><img src="silc2.jpg" border=0></a>
6 <table width="70%" border="0" cellspacing="0" cellpadding="1"
10 <font face="Arial,Helvetica,Sans-serif">
12 <h2>SILC Documentation</h2>
15 Currently the SILC documentation is under work and the software does not
16 have that much of a documentation.
18 README file from the software: <a href="docs/README">README</a>
20 Coding Style in SILC source tree: <a href="docs/CodingStyle">CodingStyle</a>
22 [Coming later: Software manual, SILC Library Reference manual]
26 <h2>SILC Protocol Internet Drafts</h2>
29 SILC Protocol is documented and four Internet Drafts exists. These
30 Internet Drafts are also available from
31 <a href="http://www.ietf.org">IETF</a>.
33 <li>Secure Internet Live Conferencing (SILC), Protocol Specification
37 This memo describes a Secure Internet Live Conferencing (SILC)
38 protocol which provides secure conferencing services over insecure
39 network channel. SILC is IRC [IRC] like protocol, however, it is
40 not equivalent to IRC and does not support IRC. Strong cryptographic
41 methods are used to protect SILC packets inside the SILC network.
42 Three other Internet Drafts relates very closely to this memo;
43 SILC Packet Protocol [SILC2], SILC Key Exchange and Authentication
44 Protocols [SILC3] and SILC Commands [SILC4].
46 <a href="docs/draft-riikonen-silc-spec-02.txt">
47 draft-riikonen-silc-spec-02.txt</a>
50 <li>SILC Packet Protocol
54 This memo describes a Packet Protocol used in the Secure Internet Live
55 Conferencing (SILC) protocol, specified in the Secure Internet Live
56 Conferencing, Protocol Specification Internet Draft [SILC1]. This
57 protocol describes the packet types and packet payloads which defines
58 the contents of the packets. The protocol provides secure binary packet
59 protocol that assures that the contents of the packets are secured and
62 <a href="docs/draft-riikonen-silc-pp-02.txt">
63 draft-riikonen-silc-pp-02.txt</a>
66 <li>SILC Key Exchange and Authentication Protocols
70 This memo describes two protocols used in the Secure Internet Live
71 Conferencing (SILC) protocol, specified in the Secure Internet Live
72 Conferencing, Protocol Specification internet-draft [SILC1]. The
73 SILC Key Exchange (SKE) protocol provides secure key exchange between
74 two parties resulting into shared secret key material. The protocol
75 is based on Diffie-Hellman key exchange algorithm and its functionality
76 is derived from several key exchange protocols. SKE uses best parts
77 of the SSH2 Key Exchange protocol, Station-To-Station (STS) protocol
78 and the OAKLEY Key Determination protocol [OAKLEY].
80 The SILC Connection Authentication protocol provides user level
81 authentication used when creating connections in SILC network. The
82 protocol is transparent to the authentication data which means that it
83 can be used to authenticate the user with, for example, passphrase
84 (pre-shared-secret) or public key (and certificate).
86 <a href="docs/draft-riikonen-silc-ke-auth-02.txt">
87 draft-riikonen-silc-ke-auth-02.txt</a>
94 This memo describes the commands used in the Secure Internet Live
95 Conferencing (SILC) protocol, specified in the Secure Internet Live
96 Conferencing, Protocol Specification Internet Draft [SILC1]. The
97 SILC Commands are very important part of the SILC protocol. Usually
98 the commands are used by SILC clients to manage the SILC session, but
99 also SILC servers may use the commands. This memo specifies detailed
100 command messages and command reply messages.
102 <a href="docs/draft-riikonen-silc-commands-00.txt">
103 draft-riikonen-silc-commands-00.txt</a>