Which kicks off a client-client connection. However, the previous two specification sections are a BNF message syntax and list of message types, both 'passive', descriptive lists not directly connected to client behavior at all. The two sections following describe client identification types and filelist structure, again, sort of passive aspects of the protocol from the perspective of the state machine.When a client first connects, it offers a set of hash functions as SUP features.
This one, critical part of the C-C connection of who actually initiates the commands is just buried far from section 5, which describes every other state transition (and, indeed, defines the states). This is simply badly organized and needs fixing.