-3 SILC Specification ............................................ 10
- 3.1 Client .................................................... 10
- 3.1.1 Client ID ........................................... 10
- 3.2 Server .................................................... 11
- 3.2.1 Server's Local ID List .............................. 12
- 3.2.2 Server ID ........................................... 13
- 3.2.3 SILC Server Ports ................................... 14
- 3.3 Router .................................................... 14
- 3.3.1 Router's Local ID List .............................. 14
- 3.3.2 Router's Global ID List ............................. 15
- 3.3.3 Router's Server ID .................................. 15
- 3.4 Channels .................................................. 16
- 3.4.1 Channel ID .......................................... 17
- 3.5 Operators ................................................. 17
- 3.6 SILC Commands ............................................. 18
- 3.7 SILC Packets .............................................. 18
- 3.8 Packet Encryption ......................................... 19
- 3.8.1 Determination of the Source and the Destination ..... 19
- 3.8.2 Client To Client .................................... 20
- 3.8.3 Client To Channel ................................... 21
- 3.8.4 Server To Server .................................... 22
- 3.9 Key Exchange And Authentication ........................... 22
- 3.9.1 Authentication Payload .............................. 22
- 3.10 Algorithms ............................................... 24
- 3.10.1 Ciphers ............................................ 24
- 3.10.2 Public Key Algorithms .............................. 25
- 3.10.3 Hash Functions ..................................... 26
- 3.10.4 MAC Algorithms ..................................... 26
- 3.10.5 Compression Algorithms ............................. 26
- 3.11 SILC Public Key .......................................... 27
- 3.12 SILC Version Detection ................................... 29
- 3.13 Backup Routers ........................................... 8
- 3.13.1 Switching to Backup Router ......................... 8
- 3.13.2 Resuming Primary Router ............................ 8
- 3.13.3 Discussion on Backup Router Scheme ................. 8
-4 SILC Procedures ............................................... 30
- 4.1 Creating Client Connection ................................ 30
- 4.2 Creating Server Connection ................................ 31
- 4.2.1 Announcing Clients, Channels and Servers ............ 32
- 4.3 Joining to a Channel ...................................... 33
- 4.4 Channel Key Generation .................................... 34
- 4.5 Private Message Sending and Reception ..................... 34
- 4.6 Private Message Key Generation ............................ 35
- 4.7 Channel Message Sending and Reception ..................... 35
- 4.8 Session Key Regeneration .................................. 36
- 4.9 Command Sending and Reception ............................. 37
- 4.10 Closing Connection ....................................... 37
-5 Security Considerations ....................................... 38
-6 References .................................................... 38
-7 Author's Address .............................................. 40
+3 SILC Specification ............................................ 8
+ 3.1 Client .................................................... 8
+ 3.1.1 Client ID ........................................... 9
+ 3.2 Server .................................................... 10
+ 3.2.1 Server's Local ID List .............................. 10
+ 3.2.2 Server ID ........................................... 11
+ 3.2.3 SILC Server Ports ................................... 12
+ 3.3 Router .................................................... 12
+ 3.3.1 Router's Local ID List .............................. 12
+ 3.3.2 Router's Global ID List ............................. 13
+ 3.3.3 Router's Server ID .................................. 14
+ 3.4 Channels .................................................. 14
+ 3.4.1 Channel ID .......................................... 16
+ 3.5 Operators ................................................. 16
+ 3.6 SILC Commands ............................................. 16
+ 3.7 SILC Packets .............................................. 17
+ 3.8 Packet Encryption ......................................... 17
+ 3.8.1 Determination of the Source and the Destination ..... 17
+ 3.8.2 Client To Client .................................... 18
+ 3.8.3 Client To Channel ................................... 19
+ 3.8.4 Server To Server .................................... 20
+ 3.9 Key Exchange And Authentication ........................... 20
+ 3.9.1 Authentication Payload .............................. 20
+ 3.10 Algorithms ............................................... 22
+ 3.10.1 Ciphers ............................................ 22
+ 3.10.2 Public Key Algorithms .............................. 23
+ 3.10.3 Hash Functions ..................................... 24
+ 3.10.4 MAC Algorithms ..................................... 24
+ 3.10.5 Compression Algorithms ............................. 25
+ 3.11 SILC Public Key .......................................... 25
+ 3.12 SILC Version Detection ................................... 27
+ 3.13 Backup Routers ........................................... 28
+ 3.13.1 Switching to Backup Router ......................... 29
+ 3.13.2 Resuming Primary Router ............................ 30
+ 3.13.3 Discussion on Backup Router Scheme ................. 32
+4 SILC Procedures ............................................... 33
+ 4.1 Creating Client Connection ................................ 33
+ 4.2 Creating Server Connection ................................ 34
+ 4.2.1 Announcing Clients, Channels and Servers ............ 35
+ 4.3 Joining to a Channel ...................................... 36
+ 4.4 Channel Key Generation .................................... 37
+ 4.5 Private Message Sending and Reception ..................... 38
+ 4.6 Private Message Key Generation ............................ 38
+ 4.7 Channel Message Sending and Reception ..................... 39
+ 4.8 Session Key Regeneration .................................. 39
+ 4.9 Command Sending and Reception ............................. 40
+ 4.10 Closing Connection ....................................... 41
+5 Security Considerations ....................................... 41
+6 References .................................................... 42
+7 Author's Address .............................................. 44