You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/advanced/ecdsa.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -94,23 +94,23 @@ server sends an `CAP ACK`, authentication can begin.
94
94
The mechanism makes use of the NIST P-256 curve (`NID_X9_62_prime256v1` in OpenSSL) which
95
95
(per the name) is defined over a 256 bit prime finite field. The parameters for this curve
96
96
are available [from the NSA](https://www.nsa.gov/ia/_files/nist-routines.pdf) in section 4.3.
97
-
The curve itself doesn't fit the [SafeCurves requirements](http://safecurves.cr.yp.to/).
97
+
The curve itself doesn't fit the [SafeCurves requirements](https://safecurves.cr.yp.to/).
98
98
99
99
Atheme is the only IRC services software that appears to implement this authentication method.
100
100
Atheme's implementation requires that:
101
101
102
102
* Users make use of the `/msg NickServ SET PUBKEY <pubkey>` command to tell the services
103
103
package their public key
104
104
* `<pubkey>` in this case is the **point compressed** X9.62 representation of the public
105
-
key which is then base64 encoded. Please see section 2.3.3 of the [SEC1](http://www.secg.org/sec1-v2.pdf)
105
+
key which is then base64 encoded. Please see section 2.3.3 of the [SEC1](https://www.secg.org/sec1-v2.pdf)
106
106
spec for more information. Public keys making use of the uncompressed or hybrid forms will
107
107
**not work**. Java users may wish to implement their own method for applying point compression
108
108
since it is unavailable in the standard library. See the implementation in [KICL](https://github.com/KittehOrg/KittehIRCClientLib/commit/448ae6bf18956b5a38e0da8f87486c5db85db880).
109
109
110
110
#### Step 1 - Begin authentication
111
111
112
112
The client sends `AUTHENTICATE ECDSA-NIST256P-CHALLENGE` to request that the authentication
113
-
process be started. See the [SASL documentation](http://ircv3.net/specs/extensions/sasl-3.1.html)
113
+
process be started. See the [SASL documentation](https://ircv3.net/specs/extensions/sasl-3.1.html)
Copy file name to clipboardExpand all lines: docs/advanced/sasl.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
KICL supports using SASL to authenticate with an IRC server. As described in the
2
-
[IRCv3.1 spec](http://ircv3.net/specs/extensions/sasl-3.1.html), SASL allows the client to authenticate using a SASL
2
+
[IRCv3.1 spec](https://ircv3.net/specs/extensions/sasl-3.1.html), SASL allows the client to authenticate using a SASL
3
3
mechanism and the `AUTHENTICATE` command. The client must have requested the `sasl` capability to be able to use the
4
4
AUTHENTICATE command.
5
5
6
6
KICL's SASL support can be configured by calling the `Client#getAuthManager` method which returns an
7
-
[AuthManager](http://kittehorg.github.io/KittehIRCClientLib/org/kitteh/irc/client/library/auth/AuthManager.html). The
7
+
[AuthManager](https://kittehorg.github.io/KittehIRCClientLib/org/kitteh/irc/client/library/auth/AuthManager.html). The
8
8
manager can be used to manage authentication protocols. For SASL, there are currently three available authentication
9
-
protocols which [extend](http://kittehorg.github.io/KittehIRCClientLib/org/kitteh/irc/client/library/auth/protocol/class-use/AbstractSaslProtocol.html)
9
+
protocols which [extend](https://kittehorg.github.io/KittehIRCClientLib/org/kitteh/irc/client/library/auth/protocol/class-use/AbstractSaslProtocol.html)
10
10
the `AbstractSaslProtocol` class. It's also possible to add [non-SASL](alt_auth.md) authentication protocols.
11
11
12
12
Protocols can be added by calling the `AuthManager#addProtocol` method, for example:
0 commit comments