This page explains how Uqda Network operates from the moment you install it until data is transmitted between nodes. We'll cover key generation, node identification, encryption, routing, and packet forwarding.
When you install Uqda, the system performs the following:
uqda (main daemon) and uqdactl (control utility)When Uqda starts for the first time:
Uqda generates a cryptographic key pair using Ed25519:
Your permanent IPv6 address is derived from your public key:
If using config file mode:
When you run uqda:
The TUN interface appears in your system:
Nodes connect to each other through peerings:
On local networks, nodes can discover each other automatically:
Once connected, nodes exchange routing information:
Nodes exchange bloom filters describing reachable keys:
All traffic is encrypted end-to-end:
How packets travel through the network:
If a link fails:
The Complete Flow:
Key Security Features: