Skip to main content

Messaging flow

Endpoints versions

Silent Network has two versions of the endpoints v1 and v2.

The v1 endpoints follows challenge-response protocol, preventing replay attack, however extending request execution.

The v2 endpoints do not utilize chal-resp mechanism. Hence it's important to ensure request replay attack is not a concern.

Some functionality might be present in v1 but not in v2, like Passkey registration.

The v1 endpoints are enabled when User Authentication is done by the Network Nodes.

Request flow using V1 endpoint

The Frontend prepares the request, that gets forwarded to the Initiator:

The Initiator collects challenges from other Nodes, and forwards them back to the Frontend. The User is asked to sign the final_challenge that is a hash of the request, and Network challenges:

The signature over final_challenge arrives to the nodes, the request gets validated and executed. The response goes back all way down to the User.

Request flow using v2 endpoint

If request replay attack is not a concern, the v2 endpoints can be used. The Frontend prepares the request and prompts User to sign. The request, with signatures goes to the Network.

Register WPBE in the Network

There might be multiple applications using the same Silent Network. We allow to register WPBE signing keys to the Network by the Actor called Network Admin.