1 |
/* doc/example.efnet.conf - ircd-hybrid-8 EFnet Example configuration file |
2 |
* Copyright (C) 2000-2012 Hybrid Development Team |
3 |
* |
4 |
* Written by ejb, wcampbel, db, leeh and others |
5 |
* Other example configurations can be found in the source dir under |
6 |
* etc/. |
7 |
* |
8 |
* $Id$ |
9 |
*/ |
10 |
|
11 |
/* IMPORTANT NOTES: |
12 |
* |
13 |
* auth {} blocks MUST be specified in order of precedence. The first one |
14 |
* that matches a user will be used. So place spoofs first, then specials, |
15 |
* then general access. |
16 |
* |
17 |
* Shell style (#), C++ style (//) and C style comments are supported. |
18 |
* |
19 |
* Files may be included by either: |
20 |
* .include "filename" |
21 |
* .include <filename> |
22 |
* |
23 |
* Times/durations are written as: |
24 |
* 12 hours 30 minutes 1 second |
25 |
* |
26 |
* Valid units of time: |
27 |
* month, week, day, hour, minute, second |
28 |
* |
29 |
* Valid units of size: |
30 |
* megabyte/mbyte/mb, kilobyte/kbyte/kb, byte |
31 |
* |
32 |
* Sizes and times may be singular or plural. |
33 |
*/ |
34 |
|
35 |
/* EFNET NOTE: |
36 |
* |
37 |
* This configuration file is a BASIC configuration file for use |
38 |
* on EFnet. You MUST still take the time to set this file up |
39 |
* properly. |
40 |
* |
41 |
* DISCLAIMER: This file was submitted by Disciple@EFnet and has |
42 |
* since been modified by the Hybrid team. |
43 |
*/ |
44 |
|
45 |
/* |
46 |
* serverinfo {}: contains information about the server |
47 |
*/ |
48 |
serverinfo { |
49 |
/* |
50 |
* name: the name of this server. This cannot be changed at runtime. |
51 |
*/ |
52 |
name = "efnet.irc"; |
53 |
|
54 |
/* |
55 |
* sid: a server's unique ID. This is three characters long and must |
56 |
* be in the form [0-9][A-Z0-9][A-Z0-9]. The first character must be |
57 |
* a digit, followed by 2 alpha-numerical letters. |
58 |
* NOTE: The letters must be capitalized. This cannot be changed at runtime. |
59 |
*/ |
60 |
sid = "_CHANGE_ME_"; |
61 |
|
62 |
/* |
63 |
* description: the description of the server. '[' and ']' may not |
64 |
* be used here for compatibility with older servers. |
65 |
*/ |
66 |
description = "hybrid-7 test server"; |
67 |
|
68 |
/* |
69 |
* network info: the name and description of the network this server |
70 |
* is on. Shown in the 005 reply and used with serverhiding. |
71 |
*/ |
72 |
network_name = "EFnet"; |
73 |
network_desc = "Eris Free Network"; |
74 |
|
75 |
/* |
76 |
* hub: allow this server to act as a hub and have multiple servers |
77 |
* connected to it. |
78 |
*/ |
79 |
hub = no; |
80 |
|
81 |
/* |
82 |
* vhost: the IP to bind to when we connect outward to ipv4 servers. |
83 |
* This should be an ipv4 IP only, or "*" for INADDR_ANY. |
84 |
*/ |
85 |
#vhost = "192.169.0.1"; |
86 |
|
87 |
/* |
88 |
* vhost6: the IP to bind to when we connect outward to ipv6 servers. |
89 |
* This should be an ipv6 IP only, or "*" for INADDR_ANY. |
90 |
*/ |
91 |
#vhost6 = "3ffe:80e8:546::2"; |
92 |
|
93 |
/* max_clients: the maximum number of clients allowed to connect */ |
94 |
max_clients = 512; |
95 |
|
96 |
/* |
97 |
* rsa_private_key_file: the path to the file containing our |
98 |
* rsa key for cryptlink. |
99 |
* |
100 |
* Example command to store a 2048 bit RSA keypair in |
101 |
* rsa.key, and the public key in rsa.pub: |
102 |
* |
103 |
* openssl genrsa -out rsa.key 2048 |
104 |
* openssl rsa -in rsa.key -pubout -out rsa.pub |
105 |
* chown <ircd-user>.<ircd.group> rsa.key rsa.pub |
106 |
* chmod 0600 rsa.key |
107 |
* chmod 0644 rsa.pub |
108 |
*/ |
109 |
#rsa_private_key_file = "/usr/local/ircd/etc/rsa.key"; |
110 |
|
111 |
/* |
112 |
* ssl_certificate_file: the path to the file containing our |
113 |
* ssl certificate for encrypted client connection. |
114 |
* |
115 |
* This assumes your private RSA key is stored in rsa.key. You |
116 |
* MUST have an RSA key in order to generate the certificate |
117 |
* |
118 |
* openssl req -new -days 365 -x509 -key rsa.key -out cert.pem |
119 |
* |
120 |
* See http://www.openssl.org/docs/HOWTO/certificates.txt |
121 |
* |
122 |
* Please use the following values when generating the cert |
123 |
* |
124 |
* Organization Name: Network Name |
125 |
* Organization Unit Name: changme.someirc.net |
126 |
* Common Name: irc.someirc.net |
127 |
* E-mail: you@domain.com |
128 |
*/ |
129 |
#ssl_certificate_file = "/usr/local/ircd/etc/cert.pem"; |
130 |
|
131 |
#ssl_dh_param_file = "/usr/local/ircd/etc/dhparam.pem"; |
132 |
|
133 |
/* |
134 |
* ssl_cipher_list: |
135 |
* |
136 |
* List of ciphers that are supported by _this_ server. Can be used to enforce |
137 |
* specific ciphers for incoming SSL/TLS connections. |
138 |
* If a client (which also includes incoming server connections) isn't capable |
139 |
* of any cipher listed below, the connection will be simply rejected. |
140 |
* |
141 |
* A list of supported ciphers can be obtained by running: |
142 |
* |
143 |
* openssl ciphers -ssl3 -tls1 -v |
144 |
* |
145 |
* Multiple ciphers are separated by colons. The order of preference is from |
146 |
* left to right. |
147 |
*/ |
148 |
#ssl_cipher_list = "DHE-RSA-AES256-SHA:AES256-SHA"; |
149 |
|
150 |
/* |
151 |
* ssl_server_protocol: |
152 |
* SSL/TLS protocols we provide for incoming secure connections. |
153 |
* This can be either sslv3 for SSLv3, and/or tlsv1 for TLSv1. |
154 |
* SSLv2 is not suppported. |
155 |
*/ |
156 |
#ssl_server_method = tlsv1, sslv3; |
157 |
#ssl_client_method = tlsv1; |
158 |
}; |
159 |
|
160 |
/* |
161 |
* admin {}: contains admin information about the server |
162 |
*/ |
163 |
admin { |
164 |
name = "EFnet Admin"; |
165 |
description = "Main Server Administrator"; |
166 |
email = "<irc-admin@efnet.irc>"; |
167 |
}; |
168 |
|
169 |
/* |
170 |
* class {}: contains information about classes for users |
171 |
*/ |
172 |
class { |
173 |
/* name: the name of the class. classes are text now */ |
174 |
name = "users"; |
175 |
|
176 |
/* |
177 |
* ping_time: how often a client must reply to a PING from the |
178 |
* server before they are dropped. |
179 |
*/ |
180 |
ping_time = 90 seconds; |
181 |
|
182 |
/* |
183 |
* number_per_ip: how many local users are allowed to connect |
184 |
* from one IP (optional) |
185 |
*/ |
186 |
number_per_ip = 2; |
187 |
|
188 |
/* |
189 |
* max_local: how many local users are allowed to connect |
190 |
* from one ident@host (optional) |
191 |
*/ |
192 |
max_local = 2; |
193 |
|
194 |
/* |
195 |
* max_global: network-wide limit of users per ident@host (optional) |
196 |
*/ |
197 |
max_global = 10; |
198 |
|
199 |
/* |
200 |
* max_number: the maximum number of users allowed in this class (optional) |
201 |
*/ |
202 |
max_number = 100; |
203 |
|
204 |
/* |
205 |
* the following lines are optional and allow you to define |
206 |
* how many users can connect from one /NN subnet |
207 |
*/ |
208 |
cidr_bitlen_ipv4 = 24; |
209 |
cidr_bitlen_ipv6 = 120; |
210 |
number_per_cidr = 16; |
211 |
|
212 |
/* |
213 |
* sendq: the amount of data allowed in a clients queue before |
214 |
* they are dropped. |
215 |
*/ |
216 |
sendq = 100 kbytes; |
217 |
}; |
218 |
|
219 |
class { |
220 |
name = "opers"; |
221 |
|
222 |
/* |
223 |
* contrary to seeming popular belief, setting ping time |
224 |
* higher for an oper is NOT doing them a favor. |
225 |
* Since if a link is dead its dead and it means |
226 |
* you have to use another nick long enough to kill the old one :-) |
227 |
* Its much better to use a fairly standard 90 second ping time |
228 |
*/ |
229 |
ping_time = 90 seconds; |
230 |
number_per_ip = 10; |
231 |
max_number = 100; |
232 |
sendq = 1 mbyte; |
233 |
}; |
234 |
|
235 |
class { |
236 |
name = "server"; |
237 |
|
238 |
/* |
239 |
* Same thing here. It's a fallacy to think increasing |
240 |
* ping time for servers is a "good idea." All it leads to |
241 |
* is "ghosting" on one end. Not a good idea. |
242 |
*/ |
243 |
ping_time = 90 seconds; |
244 |
|
245 |
/* |
246 |
* ping_warning: how fast a server must reply to a PING before |
247 |
* a warning to opers is generated. |
248 |
*/ |
249 |
ping_warning = 15 seconds; |
250 |
|
251 |
/* |
252 |
* connectfreq: only used in server classes. Specifies the delay |
253 |
* between autoconnecting to servers. |
254 |
* |
255 |
* Both comstud and I recommend 10 minutes a few years ago. |
256 |
* 15 minutes might be right now. The reason you don't want it too |
257 |
* low is, you make the servers reconnect too quickly with |
258 |
* a large sendq, and they _will_ nick collide. badly. 5 minutes |
259 |
* IS way too short. |
260 |
*/ |
261 |
connectfreq = 15 minutes; |
262 |
|
263 |
/* max number: the amount of servers to autoconnect to */ |
264 |
max_number = 1; |
265 |
|
266 |
/* sendq: servers need a higher sendq as they send more data */ |
267 |
sendq = 15 megabytes; |
268 |
}; |
269 |
|
270 |
/* |
271 |
* listen {}: contains information about the ports ircd listens on |
272 |
*/ |
273 |
listen { |
274 |
/* |
275 |
* port: the specific port to listen on. If no host is specified |
276 |
* before, it will listen on all available IPs. |
277 |
* |
278 |
* Ports are separated via a comma, a range may be specified using ".." |
279 |
*/ |
280 |
|
281 |
/* port: listen on all available IPs, ports 6665 to 6669 */ |
282 |
port = 6665 .. 6669; |
283 |
|
284 |
/* |
285 |
* Listen on 192.168.0.1/6697 with ssl enabled and hidden from STATS P |
286 |
* unless you are an administrator. |
287 |
* |
288 |
* NOTE: The "flags" directive has to come before "port". Always! |
289 |
* |
290 |
* Currently available flags are: |
291 |
* |
292 |
* ssl - Port is for SSL client connections only |
293 |
* server - Only server connections are permitted |
294 |
* hidden - Port is hidden from /stats P, unless you're an admin |
295 |
*/ |
296 |
flags = hidden, ssl; |
297 |
host = "192.168.0.1"; |
298 |
port = 6697; |
299 |
|
300 |
/* |
301 |
* host: set a specific IP/host the ports after the line will listen |
302 |
* on. This may be ipv4 or ipv6. |
303 |
*/ |
304 |
host = "1.2.3.4"; |
305 |
port = 7000, 7001; |
306 |
|
307 |
host = "3ffe:1234:a:b:c::d"; |
308 |
port = 7002; |
309 |
}; |
310 |
|
311 |
/* |
312 |
* auth {}: allow users to connect to the ircd |
313 |
*/ |
314 |
auth { |
315 |
/* |
316 |
* user: the user@host allowed to connect. Multiple IPv4/IPv6 user |
317 |
* lines are permitted per auth block. |
318 |
*/ |
319 |
user = "*@172.16.0.0/12"; |
320 |
user = "*test@123D:B567:*"; |
321 |
|
322 |
/* password: an optional password that is required to use this block */ |
323 |
password = "letmein"; |
324 |
|
325 |
/* |
326 |
* encrypted: controls whether the auth password above has been |
327 |
* encrypted. |
328 |
*/ |
329 |
encrypted = yes; |
330 |
|
331 |
/* |
332 |
* spoof: fake the users host to this. This is free-form, |
333 |
* just do everyone a favor and don't abuse it. ('=' prefix on /stats I) |
334 |
*/ |
335 |
spoof = "I.still.hate.packets"; |
336 |
|
337 |
/* class: the class the user is placed in */ |
338 |
class = "opers"; |
339 |
|
340 |
/* |
341 |
* need_password - don't allow users who haven't supplied the correct |
342 |
* password to connect using another auth{} block |
343 |
* ('&' prefix on /stats I if disabled) |
344 |
* need_ident - require the user to have identd to connect ('+' prefix on /stats I) |
345 |
* spoof_notice - enable spoofing notification to admins |
346 |
* exceed_limit - allow a user to exceed class limits ('>' prefix on /stats I) |
347 |
* kline_exempt - exempt this user from k/glines ('^' prefix on /stats I) |
348 |
* gline_exempt - exempt this user from glines ('_' prefix on /stats I) |
349 |
* resv_exempt - exempt this user from resvs ('$' prefix on /stats I) |
350 |
* no_tilde - remove ~ from a user with no ident ('-' prefix on /stats I) |
351 |
* can_flood - allow this user to exceed flood limits ('|' prefix on /stats I) |
352 |
*/ |
353 |
flags = need_password, spoof_notice, exceed_limit, kline_exempt, |
354 |
gline_exempt, resv_exempt, no_tilde, can_flood; |
355 |
}; |
356 |
|
357 |
auth { |
358 |
/* |
359 |
* redirect: the server and port to redirect a user to. A user does |
360 |
* not have to obey the redirection, the ircd just suggests an alternative |
361 |
* server for them. |
362 |
*/ |
363 |
redirserv = "this.is.not.a.real.server"; |
364 |
redirport = 6667; |
365 |
|
366 |
user = "*.server"; |
367 |
|
368 |
/* class: a class is required even though it is not used */ |
369 |
class = "users"; |
370 |
}; |
371 |
|
372 |
auth { |
373 |
user = "*@*"; |
374 |
class = "users"; |
375 |
flags = need_ident; |
376 |
}; |
377 |
|
378 |
/* |
379 |
* operator {}: defines ircd operators |
380 |
* |
381 |
* ircd-hybrid no longer supports local operators, privileges are |
382 |
* controlled via flags. |
383 |
*/ |
384 |
operator { |
385 |
/* name: the name of the oper */ |
386 |
name = "god"; |
387 |
|
388 |
/* |
389 |
* user: the user@host required for this operator. Multiple |
390 |
* user="" lines are supported. |
391 |
*/ |
392 |
user = "*god@192.168.0.0/16"; |
393 |
user = "*@127.0.0.0/8"; |
394 |
|
395 |
/* |
396 |
* password: the password required to oper. By default this will |
397 |
* need to be encrypted by using the provided mkpasswd tool. |
398 |
* Several password hash algorithms are available depending |
399 |
* on your system's crypt() implementation. For example, a modern |
400 |
* glibc already has support for SHA-256/512, and MD5 encryption |
401 |
* algorithms. |
402 |
*/ |
403 |
password = "$5$x5zof8qe.Yc7/bPp$5zIg1Le2Lsgd4CvOjaD20pr5PmcfD7ha/9b2.TaUyG4"; |
404 |
|
405 |
/* |
406 |
* encrypted: controls whether the oper password above has been |
407 |
* encrypted. |
408 |
*/ |
409 |
encrypted = yes; |
410 |
|
411 |
/* |
412 |
* rsa_public_key_file: the public key for this oper when using Challenge. |
413 |
* A password should not be defined when this is used, see |
414 |
* doc/challenge.txt for more information. |
415 |
*/ |
416 |
# rsa_public_key_file = "/usr/local/ircd/etc/oper.pub"; |
417 |
|
418 |
/* class: the class the oper joins when they successfully /oper */ |
419 |
class = "opers"; |
420 |
|
421 |
/* |
422 |
* umodes: default usermodes opers get when they /oper. If defined, |
423 |
* it will override oper_umodes settings in general {}. |
424 |
* Available usermodes: |
425 |
* |
426 |
* +b - bots - See bot and drone flooding notices |
427 |
* +c - cconn - Client connection/quit notices |
428 |
* +C - cconn_full - Client connection/quit notices full |
429 |
* +D - deaf - Don't receive channel messages |
430 |
* +d - debug - See debugging notices |
431 |
* +f - full - See I: line full notices |
432 |
* +G - softcallerid - Server Side Ignore for users not on your channels |
433 |
* +g - callerid - Server Side Ignore (for privmsgs etc) |
434 |
* +H - hidden - Hides operator status to other users |
435 |
* +i - invisible - Not shown in NAMES or WHO unless you share a |
436 |
* a channel |
437 |
* +j - rej - See rejected client notices |
438 |
* +k - skill - See server generated KILL messages |
439 |
* +l - locops - See LOCOPS messages |
440 |
* +n - nchange - See client nick changes |
441 |
* +s - servnotice - See general server notices |
442 |
* +u - unauth - See unauthorized client notices |
443 |
* +w - wallop - See server generated WALLOPS |
444 |
* +x - external - See remote server connection and split notices |
445 |
* +y - spy - See LINKS, STATS, TRACE notices etc. |
446 |
* +z - operwall - See oper generated WALLOPS |
447 |
*/ |
448 |
# umodes = locops, servnotice, operwall, wallop; |
449 |
|
450 |
/* |
451 |
* privileges: controls the activities and commands an oper is |
452 |
* allowed to do on the server. All options default to no. |
453 |
* Available options: |
454 |
* |
455 |
* module - allows MODLIST, MODRESTART, MODLOAD, MODUNLOAD |
456 |
* global_kill - allows remote users to be /KILL'd |
457 |
* remote - allows remote SQUIT and CONNECT |
458 |
* remoteban - allows remote KLINE/UNKLINE |
459 |
* dline - allows DLINE |
460 |
* undline - allows UNDLINE |
461 |
* kline - allows KILL and KLINE |
462 |
* unkline - allows UNKLINE |
463 |
* gline - allows GLINE |
464 |
* xline - allows XLINE |
465 |
* globops - allows GLOBOPS |
466 |
* operwall - allows OPERWALL |
467 |
* nick_changes - allows oper to see nickchanges via usermode +n |
468 |
* rehash - allows oper to REHASH config |
469 |
* die - allows DIE |
470 |
* restart - allows RESTART |
471 |
* admin - gives admin privileges. admins for example, |
472 |
* may see the real IP addresses of servers. |
473 |
*/ |
474 |
flags = global_kill, remote, kline, unkline, xline, globops, restart, |
475 |
die, rehash, nick_changes, admin, operwall, module; |
476 |
}; |
477 |
|
478 |
/* |
479 |
* connect {}: controls servers we connect to |
480 |
*/ |
481 |
connect { |
482 |
/* name: the name of the server */ |
483 |
name = "irc.uplink.com"; |
484 |
|
485 |
/* |
486 |
* host: the host or IP to connect to. If a hostname is used it |
487 |
* must match the reverse dns of the server. |
488 |
*/ |
489 |
host = "192.168.0.1"; |
490 |
|
491 |
/* |
492 |
* vhost: the IP to bind to when we connect outward to servers. |
493 |
* serverinfo::vhost and serverinfo::vhost6 will be overridden |
494 |
* by this directive. |
495 |
*/ |
496 |
vhost = "192.168.0.2"; |
497 |
|
498 |
/* |
499 |
* passwords: the passwords we send (OLD C:) and accept (OLD N:). |
500 |
* The remote server will have these passwords reversed. |
501 |
*/ |
502 |
send_password = "password"; |
503 |
accept_password = "anotherpassword"; |
504 |
|
505 |
/* |
506 |
* encrypted: controls whether the accept_password above has been |
507 |
* encrypted. |
508 |
*/ |
509 |
encrypted = no; |
510 |
|
511 |
/* port: the port to connect to this server on */ |
512 |
port = 6666; |
513 |
|
514 |
/* |
515 |
* hub_mask: the mask of servers that this server may hub. Multiple |
516 |
* entries are permitted |
517 |
*/ |
518 |
hub_mask = "*"; |
519 |
|
520 |
/* |
521 |
* leaf_mask: the mask of servers this server may not hub. Multiple |
522 |
* entries are permitted. Useful for forbidding EU -> US -> EU routes. |
523 |
*/ |
524 |
# leaf_mask = "*.uk"; |
525 |
|
526 |
/* class: the class this server is in */ |
527 |
class = "server"; |
528 |
|
529 |
#ssl_cipher_list = "DHE-RSA-AES256-SHA:AES256-SHA"; |
530 |
|
531 |
/* |
532 |
* autoconn - controls whether we autoconnect to this server or not, |
533 |
* dependent on class limits. By default, this is disabled. |
534 |
* burst_away - This will send the /away string that users have set |
535 |
* on the server burst. Note this can be a lot of data |
536 |
* and slow down your server burst. |
537 |
* topicburst - Send topics to this server during channel burst. Works |
538 |
* only if the server we are connecting to is capable |
539 |
* of TBURST/TB. |
540 |
* ssl - Initiates a TLS/SSL connection. |
541 |
*/ |
542 |
# flags = autoconn, burst_away, topicburst; |
543 |
}; |
544 |
|
545 |
connect { |
546 |
name = "ipv6.some.server"; |
547 |
host = "3ffd:dead:beef::1"; |
548 |
send_password = "password"; |
549 |
accept_password = "password"; |
550 |
port = 6666; |
551 |
|
552 |
/* |
553 |
* aftype: controls whether the connection uses "ipv4" or "ipv6". |
554 |
* Default is ipv4. |
555 |
*/ |
556 |
aftype = ipv6; |
557 |
class = "server"; |
558 |
}; |
559 |
|
560 |
/* |
561 |
* cluster {}: servers that share klines/unkline/xline/unxline/resv/unresv/locops |
562 |
* automatically |
563 |
*/ |
564 |
cluster { |
565 |
/* |
566 |
* name: the server to share with, this can take wildcards |
567 |
* |
568 |
* NOTE: only local actions will be clustered, meaning if |
569 |
* the server receives a shared kline/unkline/etc, it |
570 |
* will not be propagated to clustered servers. |
571 |
* |
572 |
* Remote servers are not necessarily required to accept |
573 |
* clustered lines, they need a shared{} for *THIS* server |
574 |
* in order to accept them. |
575 |
*/ |
576 |
name = "*.arpa"; |
577 |
|
578 |
/* |
579 |
* type: list of what to share, options are as follows: |
580 |
* dline - share dlines |
581 |
* undline - share undlines |
582 |
* kline - share klines |
583 |
* unkline - share unklines |
584 |
* xline - share xlines |
585 |
* unxline - share unxlines |
586 |
* resv - share resvs |
587 |
* unresv - share unresvs |
588 |
* locops - share locops |
589 |
* all - share all of the above (default) |
590 |
*/ |
591 |
type = kline, unkline, locops, xline, resv; |
592 |
}; |
593 |
|
594 |
/* |
595 |
* shared {}: users that are allowed to remote kline |
596 |
* |
597 |
* NOTE: This can be effectively used for remote klines. |
598 |
* Please note that there is no password authentication |
599 |
* for users setting remote klines. You must also be |
600 |
* /oper'd in order to issue a remote kline. |
601 |
*/ |
602 |
shared { |
603 |
/* |
604 |
* name: the server the user must be on to set klines. If this is not |
605 |
* specified, the user will be allowed to kline from all servers. |
606 |
*/ |
607 |
name = "irc2.some.server"; |
608 |
|
609 |
/* |
610 |
* user: the user@host mask that is allowed to set klines. If this is |
611 |
* not specified, all users on the server above will be allowed to set |
612 |
* a remote kline. |
613 |
*/ |
614 |
user = "oper@my.host.is.spoofed"; |
615 |
|
616 |
/* |
617 |
* type: list of what to share, options are as follows: |
618 |
* dline - allow oper/server to dline |
619 |
* undline - allow oper/server to undline |
620 |
* kline - allow oper/server to kline |
621 |
* unkline - allow oper/server to unkline |
622 |
* xline - allow oper/server to xline |
623 |
* unxline - allow oper/server to unxline |
624 |
* resv - allow oper/server to resv |
625 |
* unresv - allow oper/server to unresv |
626 |
* locops - allow oper/server to locops - only used for servers that cluster |
627 |
* all - allow oper/server to do all of the above (default) |
628 |
*/ |
629 |
type = kline, unkline, resv; |
630 |
}; |
631 |
|
632 |
/* |
633 |
* kill {}: users that are not allowed to connect |
634 |
* Oper issued klines will be added to the specified kline config |
635 |
*/ |
636 |
kill { |
637 |
user = "bad@*.hacked.edu"; |
638 |
reason = "Obviously hacked account"; |
639 |
}; |
640 |
|
641 |
kill { |
642 |
user = "^O[[:alpha:]]?[[:digit:]]+(x\.o|\.xo)$@^[[:alnum:]]{4}\.evilnet.tld$"; |
643 |
|
644 |
/* |
645 |
* NOTE: You have to set type=regex; when using a regular expression |
646 |
* based user entry |
647 |
*/ |
648 |
type = regex; |
649 |
}; |
650 |
|
651 |
/* |
652 |
* deny {}: IPs that are not allowed to connect (before DNS/ident lookup) |
653 |
* Oper issued dlines will be added to the specified dline config |
654 |
*/ |
655 |
deny { |
656 |
ip = "10.0.1.0/24"; |
657 |
reason = "Reconnecting vhosted bots"; |
658 |
}; |
659 |
|
660 |
/* |
661 |
* exempt {}: IPs that are exempt from deny {} and Dlines. |
662 |
* |
663 |
* EFnet Note: We really suggest to enable general::stats_e_disabled |
664 |
* if you plan to exempt EFnet server IPs you don't want to show to |
665 |
* other operators and/or administrators through "STATS e". |
666 |
*/ |
667 |
exempt { |
668 |
ip = "192.168.0.0/16"; |
669 |
}; |
670 |
|
671 |
/* |
672 |
* resv {}: nicks and channels users may not use/join |
673 |
*/ |
674 |
resv { |
675 |
/* reason: the reason for the proceeding resv's */ |
676 |
reason = "There are no services on this network"; |
677 |
|
678 |
/* resv: the nicks and channels users may not join/use */ |
679 |
nick = "nickserv"; |
680 |
nick = "chanserv"; |
681 |
nick = "operserv"; |
682 |
nick = "JUPES"; |
683 |
nick = "JUPE"; |
684 |
nick = "CH?NF?X"; # CHANFIX (services.int) |
685 |
|
686 |
/* These are totally optional, but may be a good idea */ |
687 |
nick = "oper"; |
688 |
nick = "ircop"; |
689 |
nick = "op"; |
690 |
nick = "ident"; |
691 |
nick = "pass"; |
692 |
channel = "#jupedchan"; |
693 |
|
694 |
/* resv: wildcard masks are also supported in nicks only */ |
695 |
reason = "Clone bots"; |
696 |
nick = "clone*"; |
697 |
}; |
698 |
|
699 |
/* |
700 |
* gecos {}: The X: replacement, used for banning users based on |
701 |
* their "realname". |
702 |
*/ |
703 |
gecos { |
704 |
name = "*sex*"; |
705 |
reason = "Possible spambot"; |
706 |
}; |
707 |
|
708 |
gecos { |
709 |
name = "sub7server"; |
710 |
reason = "Trojan drone"; |
711 |
}; |
712 |
|
713 |
gecos { |
714 |
name = "*http*"; |
715 |
reason = "Spambot"; |
716 |
}; |
717 |
|
718 |
gecos { |
719 |
name = "^\[J[0o]hn Do[3e]\]-[0-9]{2,5}$"; |
720 |
|
721 |
/* |
722 |
* NOTE: You have to set type=regex; when using a regular expression |
723 |
* based name entry |
724 |
*/ |
725 |
type = regex; |
726 |
}; |
727 |
|
728 |
/* |
729 |
* channel {}: The channel block contains options pertaining to channels |
730 |
*/ |
731 |
channel { |
732 |
/* |
733 |
* disable_fake_channels: this option, if set to 'yes', will |
734 |
* disallow clients to create or join channels that have one |
735 |
* of the following ASCII characters in their name: |
736 |
* |
737 |
* 2 | bold |
738 |
* 3 | mirc color |
739 |
* 15 | plain text |
740 |
* 22 | reverse |
741 |
* 31 | underline |
742 |
* 160 | non-breaking space |
743 |
*/ |
744 |
disable_fake_channels = yes; |
745 |
|
746 |
/* |
747 |
* restrict_channels: reverse channel RESVs logic, only reserved |
748 |
* channels are allowed |
749 |
*/ |
750 |
restrict_channels = no; |
751 |
|
752 |
/* |
753 |
* disable_local_channels: prevent users from joining &channels. |
754 |
*/ |
755 |
disable_local_channels = no; |
756 |
|
757 |
/* |
758 |
* use_invex: Enable/disable channel mode +I, a n!u@h list of masks |
759 |
* that can join a +i channel without an invite. |
760 |
*/ |
761 |
use_invex = yes; |
762 |
|
763 |
/* |
764 |
* use_except: Enable/disable channel mode +e, a n!u@h list of masks |
765 |
* that can join a channel through a ban (+b). |
766 |
*/ |
767 |
use_except = yes; |
768 |
|
769 |
/* |
770 |
* use_knock: Allows users to request an invite to a channel that |
771 |
* is locked somehow (+ikl). If the channel is +p or you are banned |
772 |
* the knock will not be sent. |
773 |
* |
774 |
* EFnet Note: This seems to be used mostly by European servers |
775 |
* and not North American ones. |
776 |
* Please feel free to disable this if you do not |
777 |
* want to run channel knock. |
778 |
* channel knock allows an user to "/quote knock #channel" |
779 |
* to ask for an invite. It is typically used in eu-efnet |
780 |
* to ask for an invite to #eu-opers. |
781 |
* A user who is banned will not have their knock |
782 |
* sent to channel. It is paced, so knock will not |
783 |
* cause a flood. |
784 |
*/ |
785 |
use_knock = yes; |
786 |
|
787 |
/* |
788 |
* knock_delay: The amount of time a user must wait between issuing |
789 |
* the knock command. |
790 |
*/ |
791 |
knock_delay = 5 minutes; |
792 |
|
793 |
/* |
794 |
* knock_delay_channel: How often a knock to any specific channel |
795 |
* is permitted, regardless of the user sending the knock. |
796 |
*/ |
797 |
knock_delay_channel = 1 minute; |
798 |
|
799 |
/* |
800 |
* burst_topicwho: enable sending of who set topic on topicburst |
801 |
* default is yes |
802 |
*/ |
803 |
burst_topicwho = yes; |
804 |
|
805 |
/* |
806 |
* max_chans_per_user: The maximum number of channels a user can |
807 |
* join/be on. |
808 |
*/ |
809 |
max_chans_per_user = 25; |
810 |
|
811 |
/* quiet_on_ban: stop banned people talking in channels. */ |
812 |
quiet_on_ban = yes; |
813 |
|
814 |
/* max_bans: maximum number of +b/e/I modes in a channel */ |
815 |
max_bans = 100; |
816 |
|
817 |
/* |
818 |
* how many joins in how many seconds constitute a flood, use 0 to |
819 |
* disable. +b opers will be notified (changeable via /set) |
820 |
*/ |
821 |
join_flood_count = 16; |
822 |
join_flood_time = 8 seconds; |
823 |
|
824 |
/* |
825 |
* splitcode: The ircd will now check splitmode every few seconds. |
826 |
* |
827 |
* Either split users or split servers can activate splitmode, but |
828 |
* both conditions must be met for the ircd to deactivate splitmode. |
829 |
* |
830 |
* You may force splitmode to be permanent by /quote set splitmode on |
831 |
*/ |
832 |
|
833 |
/* |
834 |
* default_split_user_count: when the usercount is lower than this level, |
835 |
* consider ourselves split. This must be set for automatic splitmode. |
836 |
*/ |
837 |
default_split_user_count = 20000; |
838 |
|
839 |
/* |
840 |
* default_split_server_count: when the servercount is lower than this, |
841 |
* consider ourselves split. This must be set for automatic splitmode. |
842 |
*/ |
843 |
default_split_server_count = 10; |
844 |
|
845 |
/* no_create_on_split: disallow users creating channels on split. */ |
846 |
no_create_on_split = yes; |
847 |
|
848 |
/* no_join_on_split: disallow users joining channels at all on a split. */ |
849 |
no_join_on_split = no; |
850 |
}; |
851 |
|
852 |
/* |
853 |
* serverhide {}: The serverhide block contains the options regarding |
854 |
* serverhiding |
855 |
*/ |
856 |
serverhide { |
857 |
/* |
858 |
* flatten_links: this option will show all servers in /links appear |
859 |
* that they are linked to this current server |
860 |
* |
861 |
* EFnet Note: While this is not a requirement on EFnet, it |
862 |
* may be a good idea. Except, it's useless |
863 |
* unless the entire net runs it. |
864 |
*/ |
865 |
flatten_links = no; |
866 |
|
867 |
/* |
868 |
* links_delay: how often to update the links file when it is |
869 |
* flattened. |
870 |
*/ |
871 |
links_delay = 5 minutes; |
872 |
|
873 |
/* |
874 |
* hidden: hide this server from a /links output on servers that |
875 |
* support it. This allows hub servers to be hidden etc. |
876 |
*/ |
877 |
hidden = no; |
878 |
|
879 |
/* |
880 |
* disable_hidden: prevent servers hiding themselves from a |
881 |
* /links output. |
882 |
*/ |
883 |
disable_hidden = no; |
884 |
|
885 |
/* |
886 |
* hide_servers: hide remote servernames everywhere and instead use |
887 |
* hidden_name and network_desc. |
888 |
*/ |
889 |
hide_servers = no; |
890 |
|
891 |
/* |
892 |
* Use this as the servername users see if hide_servers = yes. |
893 |
*/ |
894 |
hidden_name = "*.hidden.com"; |
895 |
|
896 |
/* |
897 |
* hide_server_ips: If this is disabled, opers will be unable to see |
898 |
* servers ips and will be shown a masked ip, admins will be shown the |
899 |
* real ip. |
900 |
* |
901 |
* If this is enabled, nobody can see a servers ip. *This is a kludge*, |
902 |
* it has the side effect of hiding the ips everywhere, including |
903 |
* logfiles. |
904 |
* |
905 |
* We recommend you leave this disabled, and just take care with who you |
906 |
* give admin=yes; to. |
907 |
*/ |
908 |
hide_server_ips = yes; |
909 |
}; |
910 |
|
911 |
/* |
912 |
* general {}: The general block contains many of the options that were once |
913 |
* compiled in options in config.h. The general block is read at start time. |
914 |
*/ |
915 |
general { |
916 |
/* max_watch: maximum WATCH entries a client can have. */ |
917 |
max_watch = 60; |
918 |
|
919 |
/* |
920 |
* gline_min_cidr: the minimum required length of a CIDR bitmask |
921 |
* for IPv4 based glines |
922 |
*/ |
923 |
gline_min_cidr = 16; |
924 |
|
925 |
/* |
926 |
* gline_min_cidr6: the minimum required length of a CIDR bitmask |
927 |
* for IPv6 based glines |
928 |
*/ |
929 |
gline_min_cidr6 = 48; |
930 |
|
931 |
/* |
932 |
* Whether to automatically set mode +i on connecting users. |
933 |
*/ |
934 |
invisible_on_connect = yes; |
935 |
|
936 |
/* |
937 |
* Show "actually using host <ip>" on /whois when possible. |
938 |
*/ |
939 |
use_whois_actually = yes; |
940 |
|
941 |
/* |
942 |
* Max time from the nickname change that still causes KILL |
943 |
* automatically to switch for the current nick of that user. |
944 |
*/ |
945 |
kill_chase_time_limit = 90 seconds; |
946 |
|
947 |
/* |
948 |
* If hide_spoof_ips is disabled, opers will be allowed to see the real |
949 |
* IP of spoofed users in /trace etc. If this is defined they will be |
950 |
* shown a masked IP. |
951 |
*/ |
952 |
hide_spoof_ips = yes; |
953 |
|
954 |
/* |
955 |
* Ignore bogus timestamps from other servers. Yes, this will desync |
956 |
* the network, but it will allow chanops to resync with a valid non TS 0 |
957 |
* |
958 |
* This should be enabled network wide, or not at all. |
959 |
*/ |
960 |
ignore_bogus_ts = no; |
961 |
|
962 |
/* |
963 |
* disable_auth: completely disable ident lookups; if you enable this, |
964 |
* be careful of what you set need_ident to in your auth {} blocks |
965 |
*/ |
966 |
disable_auth = no; |
967 |
|
968 |
/* disable_remote_commands: disable users doing commands on remote servers */ |
969 |
disable_remote_commands = no; |
970 |
|
971 |
/* |
972 |
* tkline_expire_notices: enables or disables temporary kline/xline |
973 |
* expire notices. |
974 |
*/ |
975 |
tkline_expire_notices = no; |
976 |
|
977 |
/* |
978 |
* default_floodcount: the default value of floodcount that is configurable |
979 |
* via /quote set floodcount. This is the amount of lines a user |
980 |
* may send to any other user/channel in one second. |
981 |
*/ |
982 |
default_floodcount = 10; |
983 |
|
984 |
/* |
985 |
* failed_oper_notice: send a notice to all opers on the server when |
986 |
* someone tries to OPER and uses the wrong password, host or ident. |
987 |
*/ |
988 |
failed_oper_notice = yes; |
989 |
|
990 |
/* |
991 |
* dots_in_ident: the amount of '.' characters permitted in an ident |
992 |
* reply before the user is rejected. |
993 |
*/ |
994 |
dots_in_ident = 2; |
995 |
|
996 |
/* |
997 |
* min_nonwildcard: the minimum non wildcard characters in k/d/g lines |
998 |
* placed via the server. klines hand placed are exempt from limits. |
999 |
* wildcard chars: '.' ':' '*' '?' '@' '!' '#' |
1000 |
*/ |
1001 |
min_nonwildcard = 3; |
1002 |
|
1003 |
/* |
1004 |
* min_nonwildcard_simple: the minimum non wildcard characters in |
1005 |
* gecos bans. wildcard chars: '*' '?' '#' |
1006 |
*/ |
1007 |
min_nonwildcard_simple = 3; |
1008 |
|
1009 |
/* max_accept: maximum allowed /accept's for +g usermode */ |
1010 |
max_accept = 20; |
1011 |
|
1012 |
/* anti_nick_flood: enable the nickflood control code */ |
1013 |
anti_nick_flood = yes; |
1014 |
|
1015 |
/* nick flood: the nick changes allowed in the specified period */ |
1016 |
max_nick_time = 20 seconds; |
1017 |
max_nick_changes = 5; |
1018 |
|
1019 |
/* |
1020 |
* anti_spam_exit_message_time: the minimum time a user must be connected |
1021 |
* before custom quit messages are allowed. |
1022 |
*/ |
1023 |
anti_spam_exit_message_time = 5 minutes; |
1024 |
|
1025 |
/* |
1026 |
* ts delta: the time delta allowed between server clocks before |
1027 |
* a warning is given, or before the link is dropped. all servers |
1028 |
* should run ntpdate/rdate to keep clocks in sync |
1029 |
*/ |
1030 |
ts_warn_delta = 30 seconds; |
1031 |
ts_max_delta = 5 minutes; |
1032 |
|
1033 |
/* |
1034 |
* kline_with_reason: show the user the reason why they are k/d/glined |
1035 |
* on exit. May give away who set k/dline when set via tcm. |
1036 |
*/ |
1037 |
kline_with_reason = yes; |
1038 |
|
1039 |
/* |
1040 |
* kline_reason: show this message to users on channel |
1041 |
* instead of the oper reason. |
1042 |
*/ |
1043 |
kline_reason = "Connection closed"; |
1044 |
|
1045 |
/* |
1046 |
* reject_hold_time: wait this amount of time before disconnecting |
1047 |
* a rejected client. Use 0 to disable. |
1048 |
*/ |
1049 |
reject_hold_time = 30 seconds; |
1050 |
|
1051 |
/* |
1052 |
* warn_no_nline: warn opers about servers that try to connect but |
1053 |
* we don't have a connect {} block for. Twits with misconfigured |
1054 |
* servers can get really annoying with this enabled. |
1055 |
*/ |
1056 |
warn_no_nline = yes; |
1057 |
|
1058 |
/* |
1059 |
* stats_e_disabled: set this to 'yes' to disable "STATS e" for both |
1060 |
* operators and administrators. Doing so is a good idea in case |
1061 |
* there are any exempted (exempt{}) server IPs you don't want to |
1062 |
* see leaked. |
1063 |
*/ |
1064 |
stats_e_disabled = no; |
1065 |
|
1066 |
/* stats_o_oper only: make stats o (opers) oper only */ |
1067 |
stats_o_oper_only = yes; |
1068 |
|
1069 |
/* stats_P_oper_only: make stats P (ports) oper only */ |
1070 |
stats_P_oper_only = yes; |
1071 |
|
1072 |
/* |
1073 |
* stats i oper only: make stats i (auth {}) oper only. set to: |
1074 |
* yes: show users no auth blocks, made oper only. |
1075 |
* masked: show users first matching auth block |
1076 |
* no: show users all auth blocks. |
1077 |
*/ |
1078 |
stats_i_oper_only = yes; |
1079 |
|
1080 |
/* |
1081 |
* stats_k_oper_only: make stats k/K (klines) oper only. set to: |
1082 |
* yes: show users no auth blocks, made oper only |
1083 |
* masked: show users first matching auth block |
1084 |
* no: show users all auth blocks. |
1085 |
*/ |
1086 |
stats_k_oper_only = yes; |
1087 |
|
1088 |
/* |
1089 |
* caller_id_wait: time between notifying a +g user that somebody |
1090 |
* is messaging them. |
1091 |
*/ |
1092 |
caller_id_wait = 1 minute; |
1093 |
|
1094 |
/* |
1095 |
* opers_bypass_callerid: allows operators to bypass +g and message |
1096 |
* anyone who has it set (useful if you use services). |
1097 |
*/ |
1098 |
opers_bypass_callerid = no; |
1099 |
|
1100 |
/* |
1101 |
* pace_wait_simple: time between use of less intensive commands |
1102 |
* (ADMIN, HELP, (L)USERS, VERSION, remote WHOIS) |
1103 |
*/ |
1104 |
pace_wait_simple = 1 second; |
1105 |
|
1106 |
/* |
1107 |
* pace_wait: time between more intensive commands |
1108 |
* (INFO, LINKS, LIST, MAP, MOTD, STATS, WHO, wildcard WHOIS, WHOWAS) |
1109 |
*/ |
1110 |
pace_wait = 10 seconds; |
1111 |
|
1112 |
/* |
1113 |
* short_motd: send clients a notice telling them to read the motd |
1114 |
* instead of forcing a motd to clients who may simply ignore it. |
1115 |
*/ |
1116 |
short_motd = no; |
1117 |
|
1118 |
/* |
1119 |
* ping_cookie: require clients to respond exactly to a ping command, |
1120 |
* can help block certain types of drones and FTP PASV mode spoofing. |
1121 |
*/ |
1122 |
ping_cookie = no; |
1123 |
|
1124 |
/* no_oper_flood: increase flood limits for opers. */ |
1125 |
no_oper_flood = yes; |
1126 |
|
1127 |
/* |
1128 |
* true_no_oper_flood: completely eliminate flood limits for opers |
1129 |
* and for clients with can_flood = yes in their auth {} blocks |
1130 |
*/ |
1131 |
true_no_oper_flood = yes; |
1132 |
|
1133 |
/* oper_pass_resv: allow opers to over-ride RESVs on nicks/channels */ |
1134 |
oper_pass_resv = yes; |
1135 |
|
1136 |
/* REMOVE ME. The following line checks you've been reading. */ |
1137 |
havent_read_conf = 1; |
1138 |
|
1139 |
/* |
1140 |
* max_targets: the maximum amount of targets in a single |
1141 |
* PRIVMSG/NOTICE. Set to 999 NOT 0 for unlimited. |
1142 |
*/ |
1143 |
max_targets = 4; |
1144 |
|
1145 |
/* |
1146 |
* client_flood: maximum amount of data in a clients queue before |
1147 |
* they are dropped for flooding. |
1148 |
*/ |
1149 |
client_flood = 2560 bytes; |
1150 |
|
1151 |
/* |
1152 |
* message_locale: the default message locale |
1153 |
* Use "standard" for the compiled in defaults. |
1154 |
* To install the translated messages, go into messages/ in the |
1155 |
* source directory and run `make install'. |
1156 |
*/ |
1157 |
message_locale = "standard"; |
1158 |
|
1159 |
/* |
1160 |
* usermodes configurable: a list of usermodes for the options below |
1161 |
* |
1162 |
* +b - bots - See bot and drone flooding notices |
1163 |
* +c - cconn - Client connection/quit notices |
1164 |
* +C - cconn_full - Client connection/quit notices full |
1165 |
* +D - deaf - Don't receive channel messages |
1166 |
* +d - debug - See debugging notices |
1167 |
* +f - full - See I: line full notices |
1168 |
* +G - softcallerid - Server Side Ignore for users not on your channels |
1169 |
* +g - callerid - Server Side Ignore (for privmsgs etc) |
1170 |
* +H - hidden - Hides operator status to other users |
1171 |
* +i - invisible - Not shown in NAMES or WHO unless you share a |
1172 |
* a channel |
1173 |
* +j - rej - See rejected client notices |
1174 |
* +k - skill - See server generated KILL messages |
1175 |
* +l - locops - See LOCOPS messages |
1176 |
* +n - nchange - See client nick changes |
1177 |
* +s - servnotice - See general server notices |
1178 |
* +u - unauth - See unauthorized client notices |
1179 |
* +w - wallop - See server generated WALLOPS |
1180 |
* +x - external - See remote server connection and split notices |
1181 |
* +y - spy - See LINKS, STATS, TRACE notices etc. |
1182 |
* +z - operwall - See oper generated WALLOPS |
1183 |
*/ |
1184 |
|
1185 |
/* oper_only_umodes: usermodes only opers may set */ |
1186 |
oper_only_umodes = bots, cconn, cconn_full, debug, full, hidden, skill, |
1187 |
nchange, rej, spy, external, operwall, |
1188 |
locops, unauth; |
1189 |
|
1190 |
/* oper_umodes: default usermodes opers get when they /oper */ |
1191 |
oper_umodes = bots, locops, servnotice, operwall, wallop; |
1192 |
|
1193 |
/* |
1194 |
* use_egd: if your system does not have *random devices yet you |
1195 |
* want to use OpenSSL and encrypted links, enable this. Beware - |
1196 |
* EGD is *very* CPU intensive when gathering data for its pool |
1197 |
*/ |
1198 |
# use_egd = yes; |
1199 |
|
1200 |
/* |
1201 |
* egdpool_path: path to EGD pool. Not necessary for OpenSSL >= 0.9.7 |
1202 |
* which automatically finds the path. |
1203 |
*/ |
1204 |
# egdpool_path = "/var/run/egd-pool"; |
1205 |
|
1206 |
/* |
1207 |
* throttle_time: the minimum amount of time between connections from |
1208 |
* the same ip. exempt {} blocks are excluded from this throttling. |
1209 |
* Offers protection against flooders who reconnect quickly. |
1210 |
* Set to 0 to disable. |
1211 |
*/ |
1212 |
throttle_time = 0; |
1213 |
}; |
1214 |
|
1215 |
glines { |
1216 |
/* |
1217 |
* EFnet Note: This feature is required for European EFnet servers |
1218 |
* and is used by several North American servers. As |
1219 |
* such, it has been left on by default. If you |
1220 |
* do not want your server to participate in G:Lines |
1221 |
* you should disable this. |
1222 |
*/ |
1223 |
|
1224 |
/* enable: enable glines, network wide temp klines */ |
1225 |
enable = yes; |
1226 |
|
1227 |
/* |
1228 |
* duration: the amount of time a gline will remain on your |
1229 |
* server before expiring |
1230 |
*/ |
1231 |
duration = 1 day; |
1232 |
|
1233 |
/* |
1234 |
* log: which types of rules you want to log when triggered |
1235 |
* (choose reject or block) |
1236 |
*/ |
1237 |
log = reject, block; |
1238 |
|
1239 |
/* |
1240 |
* NOTE: gline ACLs can cause a desync of glines throughout the |
1241 |
* network, meaning some servers may have a gline triggered, and |
1242 |
* others may not. Also, you only need insert rules for glines |
1243 |
* that you want to block and/or reject. If you want to accept and |
1244 |
* propagate the gline, do NOT put a rule for it. |
1245 |
*/ |
1246 |
|
1247 |
/* user@host for rule to apply to */ |
1248 |
user = "god@I.still.hate.packets"; |
1249 |
/* server for rule to apply to */ |
1250 |
name = "hades.arpa"; |
1251 |
|
1252 |
/* |
1253 |
* action: action to take when a matching gline is found. options are: |
1254 |
* reject - do not apply the gline locally |
1255 |
* block - do not propagate the gline |
1256 |
*/ |
1257 |
action = reject, block; |
1258 |
|
1259 |
user = "god@*"; |
1260 |
name = "*"; |
1261 |
action = block; |
1262 |
}; |
1263 |
|
1264 |
modules { |
1265 |
/* |
1266 |
* path: other paths to search for modules specified below |
1267 |
* and in /modload. |
1268 |
*/ |
1269 |
path = "/usr/local/ircd/lib/ircd-hybrid/modules"; |
1270 |
path = "/usr/local/ircd/lib/ircd-hybrid/modules/autoload"; |
1271 |
|
1272 |
/* module: the name of a module to load on startup/rehash */ |
1273 |
#module = "some_module.la"; |
1274 |
}; |
1275 |
|
1276 |
/* |
1277 |
* log {}: contains information about logfiles. |
1278 |
*/ |
1279 |
log { |
1280 |
/* Do you want to enable logging to ircd.log? */ |
1281 |
use_logging = yes; |
1282 |
|
1283 |
file { |
1284 |
type = oper; |
1285 |
name = "/home/ircd/var/log/oper.log"; |
1286 |
size = unlimited; |
1287 |
}; |
1288 |
|
1289 |
file { |
1290 |
type = user; |
1291 |
name = "/home/ircd/var/log/user.log"; |
1292 |
size = 50 megabytes; |
1293 |
}; |
1294 |
|
1295 |
file { |
1296 |
type = kill; |
1297 |
name = "/home/ircd/var/log/kill.log"; |
1298 |
size = 50 megabytes; |
1299 |
}; |
1300 |
|
1301 |
file { |
1302 |
type = kline; |
1303 |
name = "/home/ircd/var/log/kline.log"; |
1304 |
size = 50 megabytes; |
1305 |
}; |
1306 |
|
1307 |
file { |
1308 |
type = dline; |
1309 |
name = "/home/ircd/var/log/dline.log"; |
1310 |
size = 50 megabytes; |
1311 |
}; |
1312 |
|
1313 |
file { |
1314 |
type = gline; |
1315 |
name = "/home/ircd/var/log/gline.log"; |
1316 |
size = 50 megabytes; |
1317 |
}; |
1318 |
|
1319 |
file { |
1320 |
type = debug; |
1321 |
name = "/home/ircd/var/log/debug.log"; |
1322 |
size = 50 megabytes; |
1323 |
}; |
1324 |
}; |