Messaging flow
Endpoints versions
Silent Network has two versions of the endpoints v1 and v2.
The v1 endpoints follows challenge-response protocol, preventing replay attack, however extending request execution.
The v2 endpoints do not utilize chal-resp mechanism. Hence it's important to ensure request replay attack is not a concern.
Some functionality might be present in
v1but not inv2, like Passkey registration.The
v1endpoints are enabled when User Authentication is done by the Network Nodes.
Request flow using V1 endpoint
The Frontend prepares the request, that gets forwarded to the Initiator:
The Initiator collects challenges from other Nodes, and forwards them back to the Frontend. The User is asked to sign the final_challenge that is a hash of the request, and Network challenges:
The signature over final_challenge arrives to the nodes, the request gets validated and executed. The response goes back all way down to the User.
Request flow using v2 endpoint
If request replay attack is not a concern, the v2 endpoints can be used. The Frontend prepares the request and prompts User to sign.
The request, with signatures goes to the Network.
Register WPBE in the Network
There might be multiple applications using the same Silent Network. We allow to register WPBE signing keys to the Network by the Actor called Network Admin.