ViewVC Help
View File | Revision Log | Show Annotations | View Changeset | Root Listing
root/svn/ircd-hybrid-8/doc/example.efnet.conf
Revision: 330
Committed: Sun Dec 25 11:01:22 2005 UTC (18 years, 3 months ago) by michael
Original Path: ircd-hybrid-7.2/etc/example.efnet.conf
File size: 37290 byte(s)
Log Message:
- Somehow we had a 7.2 release without mentioning the topicburst directive
  in connect{} blocks -> updated example confs
- Updated RELNOTES

File Contents

# Content
1 /* doc/example.efnet.conf - ircd-hybrid-7 EFnet Example configuration file
2 * Copyright (C) 2000-2005 Hybrid Development Team
3 *
4 * Written by ejb, wcampbel, db, leeh and others
5 * Other example configurations can be found in the source dir under
6 * etc/.
7 *
8 * $Id$
9 */
10
11 /* IMPORTANT NOTES:
12 *
13 * auth {} blocks MUST be specified in order of precedence. The first one
14 * that matches a user will be used. So place spoofs first, then specials,
15 * then general access.
16 *
17 * Shell style (#), C++ style (//) and C style comments are supported.
18 *
19 * Files may be included by either:
20 * .include "filename"
21 * .include <filename>
22 *
23 * Times/durations are written as:
24 * 12 hours 30 minutes 1 second
25 *
26 * Valid units of time:
27 * month, week, day, hour, minute, second
28 *
29 * Valid units of size:
30 * megabyte/mbyte/mb, kilobyte/kbyte/kb, byte
31 *
32 * Sizes and times may be singular or plural.
33 */
34
35 /* EFNET NOTE:
36 *
37 * This configuration file is a BASIC configuration file for use
38 * on EFnet. You MUST still take the time to set this file up
39 * properly.
40 *
41 * DISCLAIMER: This file was submitted by Disciple@EFnet and has
42 * since been modified by the Hybrid team.
43 */
44
45 /* serverinfo {}: Contains information about the server. (OLD M:) */
46 serverinfo {
47 /* name: the name of our server */
48 name = "efnet.irc";
49
50 /*
51 * A server's unique ID. This is three characters long and must be in
52 * the form [0-9][A-Z0-9][A-Z0-9]. The first character must be a
53 * digit, followed by 2 alpha-numerical letters.
54 * Note: The letters must be capitalized.
55 */
56 sid = "_CHANGE_ME_";
57
58 /*
59 * description: the description of the server. '[' and ']' may not
60 * be used here for compatibility with older servers.
61 */
62 description = "hybrid-7 test server";
63
64 /*
65 * network info: the name and description of the network this server
66 * is on. Shown in the 005 reply and used with serverhiding.
67 */
68 network_name = "EFnet";
69 network_desc = "Eris Free Network";
70
71 /*
72 * hub: allow this server to act as a hub and have multiple servers
73 * connected to it. This may not be changed if there are active
74 * LazyLink servers.
75 */
76 hub = no;
77
78 /*
79 * vhost: the IP to bind to when we connect outward to ipv4 servers.
80 * This should be an ipv4 IP only, or "* for INADDR_ANY.
81 */
82 #vhost = "192.169.0.1";
83
84 /*
85 * vhost6: the IP to bind to when we connect outward to ipv6 servers.
86 * This should be an ipv6 IP only, or "* for INADDR_ANY.
87 */
88 #vhost6 = "3ffe:80e8:546::2";
89
90 /* max_clients: the maximum number of clients allowed to connect */
91 max_clients = 512;
92
93 /*
94 * rsa key: the path to the file containing our rsa key for cryptlink.
95 *
96 * Example command to store a 2048 bit RSA keypair in
97 * rsa.key, and the public key in rsa.pub:
98 *
99 * openssl genrsa -out rsa.key 2048
100 * openssl rsa -in rsa.key -pubout -out rsa.pub
101 * chown <ircd-user>.<ircd.group> rsa.key rsa.pub
102 * chmod 0600 rsa.key
103 * chmod 0644 rsa.pub
104 */
105 #rsa_private_key_file = "/usr/local/ircd/etc/rsa.key";
106 };
107
108 /* admin {}: contains admin information about the server. (OLD A:) */
109 admin {
110 name = "EFnet Admin";
111 description = "Main Server Administrator";
112 email = "<irc-admin@efnet.irc>";
113 };
114
115 /* logging {}: contains information about logfiles. */
116 logging {
117 /* Do you want to enable logging to ircd.log? */
118 use_logging = yes;
119
120 /*
121 * logfiles: the logfiles to use for user connects, /oper uses,
122 * and failed /oper. These files must exist for logging to be used.
123 */
124 fuserlog = "logs/userlog";
125 foperlog = "logs/operlog";
126 ffailed_operlog = "logs/foperlog";
127
128 /*
129 * log level: the amount of detail to log in ircd.log. The
130 * higher, the more information is logged. May be changed
131 * once the server is running via /quote SET LOG. Either:
132 * L_CRIT, L_ERROR, L_WARN, L_NOTICE, L_TRACE, L_INFO or L_DEBUG
133 */
134 log_level = L_INFO;
135 };
136
137 /* class {}: contain information about classes for users (OLD Y:) */
138 class {
139 /* name: the name of the class. classes are text now */
140 name = "users";
141
142 /*
143 * ping_time: how often a client must reply to a PING from the
144 * server before they are dropped.
145 */
146 ping_time = 90 seconds;
147
148 /* how many local users are allowed to connect from one IP */
149 number_per_ip = 2;
150
151 /* how many local users are allowed to connect from one ident@host */
152 max_local = 2;
153
154 /* network-wide limit of users per ident@host */
155 max_global = 10;
156
157 /* max_number: the maximum number of users allowed in this class */
158 max_number = 100;
159
160 /*
161 * the following lines are optional and allow you to define
162 * how many users can connect from one /NN subnet
163 */
164 cidr_bitlen_ipv4 = 24;
165 cidr_bitlen_ipv6 = 120;
166 number_per_cidr = 16;
167
168 /*
169 * sendq: the amount of data allowed in a clients queue before
170 * they are dropped.
171 */
172 sendq = 100 kbytes;
173 };
174
175 class {
176 name = "opers";
177
178 /*
179 * contrary to seeming popular belief, setting ping time
180 * higher for an oper is NOT doing them a favor.
181 * Since if a link is dead its dead and it means
182 * you have to use another nick long enough to kill the old one :-)
183 * Its much better to use a fairly standard 90 second ping time
184 */
185 ping_time = 90 seconds;
186 number_per_ip = 10;
187 max_number = 100;
188 sendq = 1 mbyte;
189 };
190
191 class {
192 name = "server";
193
194 /*
195 * Same thing here. Its a fallacy to think increasing
196 * ping time for servers is a "good idea." All it leads to
197 * is "ghosting" on one end. Not a good idea.
198 */
199 ping_time = 90 seconds;
200
201 /*
202 * ping_warning: how fast a server must reply to a PING before
203 * a warning to opers is generated.
204 */
205 ping_warning = 5 seconds;
206
207 /*
208 * connectfreq: only used in server classes. Specifies the delay
209 * between autoconnecting to servers.
210 *
211 * Both comstud and I recommend 10 minutes a few years ago.
212 * 15 minutes might be right now. The reason you don't want it too
213 * low is, you make the servers reconnect too quickly with
214 * a large sendq, and they _will_ nick collide. badly. 5 minutes
215 * IS way too short.
216 */
217 connectfreq = 15 minutes;
218
219 /* max number: the amount of servers to autoconnect to */
220 max_number = 1;
221
222 /* sendq: On big nets this needs to be a reasonably large value */
223 sendq = 15 megabytes;
224 };
225
226 /* listen {}: contain information about the ports ircd listens on (OLD P:) */
227 listen {
228 /*
229 * port: the specific port to listen on. If no host is specified
230 * before, it will listen on all available IPs.
231 *
232 * Ports are separated via a comma, a range may be specified using ".."
233 */
234
235 /* port: listen on all available IPs, ports 6665 to 6669 */
236 port = 6665 .. 6669;
237
238 /*
239 * Listen on 192.168.0.1/7023 and hidden from STATS P
240 * unless you are an administrator.
241 *
242 * NOTE: The "flags" directive has to come before "port". Always!
243 */
244 flags = hidden;
245 host = "192.168.0.1";
246 port = 7023;
247
248 /*
249 * host: set a specific IP/host the ports after the line will listen
250 * on. This may be ipv4 or ipv6.
251 */
252 host = "1.2.3.4";
253 port = 7000, 7001;
254
255 host = "3ffe:1234:a:b:c::d";
256 port = 7002;
257 };
258
259 /* auth {}: allow users to connect to the ircd (OLD I:) */
260 auth {
261 /*
262 * user: the user@host allowed to connect. Multiple IPv4/IPv6 user
263 * lines are permitted per auth block.
264 */
265 user = "*@172.16.0.0/12";
266 user = "*test@123D:B567:*";
267
268 /* password: an optional password that is required to use this block */
269 password = "letmein";
270
271 /*
272 * encrypted: controls whether the auth password above has been
273 * encrypted.
274 */
275 encrypted = yes;
276
277 /*
278 * spoof: fake the users host to this. This is free-form,
279 * just do everyone a favor and don't abuse it. ('=' prefix on /stats I)
280 */
281 spoof = "I.still.hate.packets";
282
283 /* class: the class the user is placed in */
284 class = "opers";
285
286 /*
287 * need_password: don't allow users who haven't supplied the correct
288 * password to connect using another auth{} block
289 * ('&' prefix on /stats I if disabled)
290 * need_ident: require the user to have identd to connect ('+' prefix on /stats I)
291 * spoof_notice: enable spoofing notification to admins
292 * exceed_limit: allow a user to exceed class limits ('>' prefix on /stats I)
293 * kline_exempt: exempt this user from k/glines ('^' prefix on /stats I)
294 * gline_exempt: exempt this user from glines ('_' prefix on /stats I)
295 * resv_exempt: exempt this user from resvs ('$' prefix on /stats I)
296 * no_tilde: remove ~ from a user with no ident ('-' prefix on /stats I)
297 * can_flood: allow this user to exceed flood limits ('|' prefix on /stats I)
298 * can_idle: exempt this use from idle restrictions ('<' prefix on /stats I)
299 */
300 flags = need_password, spoof_notice, exceed_limit, kline_exempt,
301 gline_exempt, resv_exempt, no_tilde, can_flood, can_idle;
302 };
303
304 auth {
305 /*
306 * redirect: the server and port to redirect a user to. A user does
307 * not have to obey the redirection, the ircd just suggests an alternative
308 * server for them.
309 */
310 redirserv = "irc.fi";
311 redirport = 6667;
312
313 user = "*.fi";
314
315 /* class: a class is required even though it is not used */
316 class = "users";
317 };
318
319 auth {
320 user = "*@*";
321 class = "users";
322 flags = need_ident;
323 };
324
325 /* operator {}: defines ircd operators. (OLD O:)
326 * ircd-hybrid no longer supports local operators, privileges are
327 * controlled via flags.
328 */
329 operator {
330 /* name: the name of the oper */
331 /* Note: operator "opername"{} is also supported */
332 name = "god";
333
334 /*
335 * user: the user@host required for this operator. CIDR is not
336 * supported. Multiple user="" lines are supported.
337 */
338 user = "*god@*";
339 user = "*@127.0.0.1";
340
341 /*
342 * password: the password required to oper. By default this will
343 * need to be encrypted using 'mkpasswd'. MD5 is supported.
344 */
345 password = "etcnjl8juSU1E";
346
347 /*
348 * encrypted: controls whether the oper password above has been
349 * encrypted. (OLD CRYPT_OPER_PASSWORD now optional per operator)
350 */
351 encrypted = yes;
352
353 /*
354 * rsa_public_key_file: the public key for this oper when using Challenge.
355 * A password should not be defined when this is used, see
356 * doc/challenge.txt for more information.
357 */
358 # rsa_public_key_file = "/usr/local/ircd/etc/oper.pub";
359
360 /* class: the class the oper joins when they successfully /oper */
361 class = "opers";
362
363 /*
364 * umodes: default usermodes opers get when they /oper. If defined,
365 * it will override oper_umodes settings in general {}.
366 * Available usermodes:
367 *
368 * +b - bots - See bot and drone flooding notices
369 * +c - cconn - Client connection/quit notices
370 * +D - deaf - Don't receive channel messages
371 * +d - debug - See debugging notices
372 * +f - full - See I: line full notices
373 * +G - softcallerid - Server Side Ignore for users not on your channels
374 * +g - callerid - Server Side Ignore (for privmsgs etc)
375 * +i - invisible - Not shown in NAMES or WHO unless you share a
376 * a channel
377 * +k - skill - See server generated KILL messages
378 * +l - locops - See LOCOPS messages
379 * +n - nchange - See client nick changes
380 * +r - rej - See rejected client notices
381 * +s - servnotice - See general server notices
382 * +u - unauth - See unauthorized client notices
383 * +w - wallop - See server generated WALLOPS
384 * +x - external - See remote server connection and split notices
385 * +y - spy - See LINKS, STATS, TRACE notices etc.
386 * +z - operwall - See oper generated WALLOPS
387 */
388 # umodes = locops, servnotice, operwall, wallop;
389
390 /*
391 * privileges: controls the activities and commands an oper is
392 * allowed to do on the server. All options default to no.
393 * Available options:
394 *
395 * global_kill: allows remote users to be /KILL'd (OLD 'O' flag)
396 * remote: allows remote SQUIT and CONNECT (OLD 'R' flag)
397 * remoteban: allows remote KLINE/UNKLINE
398 * kline: allows KILL, KLINE and DLINE (OLD 'K' flag)
399 * unkline: allows UNKLINE and UNDLINE (OLD 'U' flag)
400 * gline: allows GLINE (OLD 'G' flag)
401 * xline: allows XLINE (OLD 'X' flag)
402 * operwall: allows OPERWALL
403 * nick_changes: allows oper to see nickchanges (OLD 'N' flag)
404 * via usermode +n
405 * rehash: allows oper to REHASH config (OLD 'H' flag)
406 * die: allows DIE and RESTART (OLD 'D' flag)
407 * admin: gives admin privileges. admins
408 * may (un)load modules and see the
409 * real IPs of servers.
410 * hidden_admin: same as 'admin', but noone can recognize you as
411 * being an admin
412 * hidden_oper: not shown in /stats p (except for other operators)
413 */
414 /* You can either use
415 * die = yes;
416 * rehash = yes;
417 *
418 * or in a flags statement i.e.
419 * flags = die, rehash;
420 *
421 * You can also negate a flag with ~ i.e.
422 * flags = ~remote;
423 *
424 */
425 flags = global_kill, remote, kline, unkline, xline,
426 die, rehash, nick_changes, admin, operwall;
427 };
428
429 /* connect {}: controls servers we connect to (OLD C:, N:, H:, L:) */
430 connect {
431 /* name: the name of the server */
432 name = "irc.uplink.com";
433
434 /*
435 * host: the host or IP to connect to. If a hostname is used it
436 * must match the reverse dns of the server.
437 */
438 host = "192.168.0.1";
439
440 /*
441 * passwords: the passwords we send (OLD C:) and accept (OLD N:).
442 * The remote server will have these passwords reversed.
443 */
444 send_password = "password";
445 accept_password = "anotherpassword";
446
447 /*
448 * encrypted: controls whether the accept_password above has been
449 * encrypted. (OLD CRYPT_LINK_PASSWORD now optional per connect)
450 */
451 encrypted = no;
452
453 /* port: the port to connect to this server on */
454 port = 6666;
455
456 /*
457 * hub_mask: the mask of servers that this server may hub. Multiple
458 * entries are permitted
459 */
460 hub_mask = "*";
461
462 /*
463 * leaf_mask: the mask of servers this server may not hub. Multiple
464 * entries are permitted. Useful for forbidding EU -> US -> EU routes.
465 */
466 # leaf_mask = "*.uk";
467
468 /* masking: the servername we pretend to be when we connect */
469 # fakename = "*.arpa";
470
471 /* class: the class this server is in */
472 class = "server";
473
474 /*
475 * autoconn: controls whether we autoconnect to this server or not,
476 * dependent on class limits. By default, this is disabled.
477 * compressed: controls whether traffic is compressed via ziplinks.
478 * By default, this is disabled
479 * lazylink: controls whether this server is a LazyLink. LazyLink
480 * servers may NOT hub. See doc/LazyLinks.txt
481 *
482 * EFnet Note: With this enabled, you download a connect burst
483 * as it is needed, instead of all at once. This
484 * could allow servers on much smaller lines (T1s)
485 * to link a server. It also could allow a server
486 * on a DoS'ed link to stay connected.
487 * This makes client servers
488 * cheaper to run. EFnet needs more client servers.
489 *
490 * cryptlink: enable full encryption for all data passing between our
491 * server and this link and rsa authentication.
492 * burst_away: This will send the /away string that users have set
493 * on the server burst. Note this can be a lot of data
494 * and slow down your server burst.
495 * topicburst: Send topics to this server during channel burst. Works
496 * only if the server we are connecting to is capable
497 * of TBURST/TB.
498 */
499 # flags = autoconn, lazylink, compressed, cryptlink, burst_away, topicburst;
500 };
501
502 connect {
503 name = "encrypted.auth.example";
504 host = "some.host.somewhere";
505 port = 6667;
506
507 flags = cryptlink;
508
509 /*
510 * rsa_public_key_file: the path to the public keyfile of the server.
511 * Used instead of passwords.
512 */
513 rsa_public_key_file = "etc/remote.server.keyfile";
514
515 /*
516 * cipher preference: set the preferred cipher for this link
517 *
518 * Available ciphers are:
519 * BF/168 BF/128 CAST/128 IDEA/128 RC5.16/128
520 * RC5.12/128 RC5.8/128 3DES/168 DES/56
521 *
522 * NOTE: Some ciphers may not be supported by your OpenSSL.
523 * Check the output from 'configure' for available ciphers.
524 *
525 * NOTE2: To help you decide what cipher to use, tools/encspeed
526 * will show you approximately how fast each cipher is.
527 * However, blowfish is fast and secure, and is probably
528 * a good default for most situations.
529 *
530 * NOTE3: Default if none is set is BF/128
531 *
532 * The cipher *MUST* be the same in both directions. If you
533 * set a cipher preference, your uplink must set the same cipher,
534 * else it will not link.
535 */
536 # cipher_preference = "BF/168";
537 };
538
539 /*
540 * Note: Don't add an extra 'name=' entry if you use
541 * the connect "name"{} feature
542 */
543 connect "ipv6.some.server" {
544 host = "3ffd:dead:beef::1";
545 send_password = "password";
546 accept_password = "password";
547 port = 6666;
548
549 /*
550 * aftype: controls whether the connection uses "ipv4" or "ipv6".
551 * Default is ipv4.
552 */
553 aftype = ipv6;
554 class = "server";
555 };
556
557 /* cluster{}: servers that share klines/unkline/xline/unxline/resv/unresv/locops
558 * automatically (OLD hyb6 SLAVE_SERVERS)
559 */
560 cluster {
561 /* name: the server to share with, this can take wildcards */
562 /* NOTE: only local actions will be clustered, meaning if
563 * the server receives a shared kline/unkline/etc, it
564 * will not be propagated to clustered servers.
565 *
566 * Remote servers are not necessarily required to accept
567 * clustered lines, they need a shared{} for *THIS* server
568 * in order to accept them.
569 */
570 name = "*.arpa";
571
572 /*
573 * type: list of what to share, options are as follows:
574 * kline - share klines
575 * tkline - share temporary klines
576 * unkline - share unklines
577 * xline - share xlines
578 * txline - share temporary xlines
579 * unxline - share unxlines
580 * resv - share resvs
581 * tresv - share temporary resvs
582 * unresv - share unresvs
583 * locops - share locops
584 * all - share all of the above (default)
585 */
586 type = kline, unkline, locops, xline, resv;
587 };
588
589 /* shared {}: users that are allowed to remote kline (OLD U:)
590 *
591 * EFnet Note: This can be effectively used for remote klines.
592 * Please note that there is no password authentication
593 * for users setting remote klines. You must also be
594 * /oper'd in order to issue a remote kline.
595 */
596 shared {
597 /*
598 * name: the server the user must be on to set klines. If this is not
599 * specified, the user will be allowed to kline from all servers.
600 */
601 name = "irc2.some.server";
602
603 /*
604 * user: the user@host mask that is allowed to set klines. If this is
605 * not specified, all users on the server above will be allowed to set
606 * a remote kline.
607 */
608 user = "oper@my.host.is.spoofed";
609
610 /*
611 * type: list of what to share, options are as follows:
612 * kline - allow oper/server to kline
613 * tkline - allow temporary klines
614 * unkline - allow oper/server to unkline
615 * xline - allow oper/server to xline
616 * txline - allow temporary xlines
617 * unxline - allow oper/server to unxline
618 * resv - allow oper/server to resv
619 * tresv - allow temporary resvs
620 * unresv - allow oper/server to unresv
621 * locops - allow oper/server to locops - only used for servers that cluster
622 * all - allow oper/server to do all of the above (default)
623 */
624 type = kline, unkline, resv;
625 };
626
627 /* kill {}: users that are not allowed to connect (OLD K:)
628 * Oper issued klines will be added to the specified kline config
629 */
630 kill {
631 user = "bad@*.hacked.edu";
632 reason = "Obviously hacked account";
633 };
634
635 kill {
636 user = "^O[[:alpha:]]?[[:digit:]]+(x\.o|\.xo)$@^[[:alnum:]]{4}\.evilnet.org$";
637 type = regex;
638 };
639
640 /* deny {}: IPs that are not allowed to connect (before DNS/ident lookup)
641 * Oper issued dlines will be added to the specified dline config
642 */
643 deny {
644 ip = "10.0.1.0/24";
645 reason = "Reconnecting vhosted bots";
646 };
647
648 /* exempt {}: IPs that are exempt from deny {} and Dlines. (OLD d:)
649 *
650 * EFnet Note: exempt {} blocks are NOT hidden, so do NOT exempt
651 * EFnet server IP's.
652 */
653 exempt {
654 ip = "192.168.0.0/16";
655 };
656
657 /* resv {}: nicks and channels users may not use/join (OLD Q:) */
658 resv {
659 /* reason: the reason for the proceeding resv's */
660 reason = "There are no services on this network";
661
662 /* resv: the nicks and channels users may not join/use */
663 nick = "nickserv";
664 nick = "chanserv";
665 nick = "operserv";
666
667 nick = "JUPES";
668 nick = "JUPE";
669 nick = "CH?NF?X"; # CHANFIX (services.int)
670
671 /* These are totally optional, but may be a good idea */
672 nick = "oper";
673 nick = "ircop";
674 nick = "op";
675 nick = "ident";
676 nick = "pass";
677 channel = "#jupedchan";
678
679 /* resv: wildcard masks are also supported in nicks only */
680 reason = "Clone bots";
681 nick = "clone*";
682 };
683
684 /* gecos {}: The X: replacement, used for banning users based on their
685 * "realname".
686 */
687 gecos {
688 name = "*sex*";
689 reason = "Possible spambot";
690 };
691
692 gecos {
693 name = "sub7server";
694 reason = "Trojan drone";
695 };
696
697 gecos {
698 name = "*http*";
699 reason = "Spambot";
700 };
701
702 gecos {
703 name = "^\[J[0o]hn Do[3e]\]-[0-9]{2,5}$";
704 type = regex;
705 };
706
707 /*
708 * channel {}
709 *
710 * The channel block contains options pertaining to channels
711 */
712 channel {
713 /*
714 * restrict_channels: reverse channel RESVs logic, only reserved
715 * channels are allowed
716 */
717 restrict_channels = no;
718
719 /*
720 * disable_local_channels: prevent users from joining &channels.
721 */
722 disable_local_channels = no;
723
724 /*
725 * use_invex: Enable/disable channel mode +I, a n!u@h list of masks
726 * that can join a +i channel without an invite.
727 */
728 use_invex = yes;
729
730 /*
731 * use_except: Enable/disable channel mode +e, a n!u@h list of masks
732 * that can join a channel through a ban (+b).
733 */
734 use_except = yes;
735
736 /*
737 * use_knock: Allows users to request an invite to a channel that
738 * is locked somehow (+ikl). If the channel is +p or you are banned
739 * the knock will not be sent.
740 *
741 * EFnet Note: This seems to be used mostly by European servers
742 * and not North American ones.
743 * Please feel free to disable this
744 * if you do not want to run channel knock.
745 * channel knock allows an user to "/quote knock #channel"
746 * to ask for an invite. It is typically used in eu-efnet
747 * to ask for an invite to #eu-opers.
748 * A user who is banned will not have their knock
749 * sent to channel. It is paced, so knock will not
750 * cause a flood.
751 */
752 use_knock = yes;
753
754 /*
755 * knock_delay: The amount of time a user must wait between issuing
756 * the knock command.
757 */
758 knock_delay = 1 minutes;
759
760 /*
761 * knock_delay_channel: How often a knock to any specific channel
762 * is permitted, regardless of the user sending the knock.
763 */
764 knock_delay_channel = 1 minute;
765
766 /* burst topicwho: enable sending of who set topic on topicburst */
767 /* default is yes */
768 burst_topicwho = yes;
769
770 /* max chans: The maximum number of channels a user can join/be on. */
771 max_chans_per_user = 25;
772
773 /* quiet_on_ban: stop banned people talking in channels. */
774 quiet_on_ban = yes;
775
776 /* max_bans: maximum number of +b/e/I modes in a channel */
777 max_bans = 100;
778
779 /*
780 * how many joins in how many seconds constitute a flood, use 0 to
781 * disable. +b opers will be notified (changeable via /set)
782 */
783 join_flood_count = 16;
784 join_flood_time = 8 seconds;
785
786 /*
787 * splitcode: The ircd will now check splitmode every few seconds.
788 *
789 * Either split users or split servers can activate splitmode, but
790 * both conditions must be met for the ircd to deactivate splitmode.
791 *
792 * You may force splitmode to be permanent by /quote set splitmode on
793 */
794
795 /*
796 * default_split_user_count: when the usercount is lower than this level,
797 * consider ourselves split. This must be set for automatic splitmode.
798 */
799 default_split_user_count = 40000;
800
801 /*
802 * default_split_server_count: when the servercount is lower than this,
803 * consider ourselves split. This must be set for automatic splitmode.
804 */
805 default_split_server_count = 10;
806
807 /* split no create: disallow users creating channels on split. */
808 no_create_on_split = yes;
809
810 /* split: no join: disallow users joining channels at all on a split */
811 no_join_on_split = no;
812 };
813
814 /*
815 * serverhide {}
816 *
817 * The serverhide block contains the options regarding serverhiding
818 */
819 serverhide {
820 /*
821 * flatten_links: this option will show all servers in /links appear
822 * that they are linked to this current server
823 *
824 * EFnet Note: While this is not a requirement on EFnet, it
825 * may be a good idea. Except, it's useless
826 * unless the entire net runs it.
827 */
828 flatten_links = yes;
829
830 /*
831 * links_delay: how often to update the links file when it is
832 * flattened.
833 */
834 links_delay = 5 minutes;
835
836 /*
837 * hidden: hide this server from a /links output on servers that
838 * support it. this allows hub servers to be hidden etc.
839 */
840 hidden = no;
841
842 /*
843 * disable_hidden: prevent servers hiding themselves from a
844 * /links output.
845 */
846 disable_hidden = no;
847
848 /*
849 * hide_servers: hide remote servernames everywhere and instead use
850 * hidden_name and network_desc.
851 */
852 hide_servers = no;
853
854 /*
855 * Use this as the servername users see if hide_servers = yes.
856 */
857 hidden_name = "*.hidden.com";
858
859 /*
860 * hide_server_ips: If this is disabled, opers will be unable to see servers
861 * ips and will be shown a masked ip, admins will be shown the real ip.
862 *
863 * If this is enabled, nobody can see a servers ip. *This is a kludge*, it
864 * has the side effect of hiding the ips everywhere, including logfiles.
865 *
866 * We recommend you leave this disabled, and just take care with who you
867 * give admin=yes; to.
868 */
869 hide_server_ips = yes;
870 };
871
872 /*
873 * general {}
874 *
875 * The general block contains many of the options that were once compiled
876 * in options in config.h. The general block is read at start time.
877 */
878 general {
879 /*
880 * gline_min_cidr: the minimum required length of a CIDR bitmask
881 * for IPv4 based glines
882 */
883 gline_min_cidr = 16;
884
885 /*
886 * gline_min_cidr6: the minimum required length of a CIDR bitmask
887 * for IPv6 based glines
888 */
889 gline_min_cidr6 = 48;
890
891 /*
892 * Whether to automatically set mode +i on connecting users.
893 */
894 invisible_on_connect = yes;
895
896 /*
897 * If you don't explicitly specify burst_away in your connect blocks, then
898 * they will default to the burst_away value below.
899 */
900 burst_away = no;
901
902 /*
903 * Show "actually using host <ip>" on /whois when possible.
904 */
905 use_whois_actually = yes;
906
907 /*
908 * Max time from the nickname change that still causes KILL
909 * automatically to switch for the current nick of that user. (seconds)
910 */
911 kill_chase_time_limit = 90;
912
913 /*
914 * If hide_spoof_ips is disabled, opers will be allowed to see the real IP of spoofed
915 * users in /trace etc. If this is defined they will be shown a masked IP.
916 */
917 hide_spoof_ips = yes;
918
919 /*
920 * Ignore bogus timestamps from other servers. Yes, this will desync
921 * the network, but it will allow chanops to resync with a valid non TS 0
922 *
923 * This should be enabled network wide, or not at all.
924 */
925 ignore_bogus_ts = no;
926
927 /*
928 * disable_auth: completely disable ident lookups; if you enable this,
929 * be careful of what you set need_ident to in your auth {} blocks
930 */
931 disable_auth = no;
932
933 /* disable_remote_commands: disable users doing commands on remote servers */
934 disable_remote_commands = no;
935
936 /*
937 * Disable temporary kline/xline expire notices yes/no
938 */
939 tkline_expire_notices = no;
940
941 /*
942 * default_floodcount: the default value of floodcount that is configurable
943 * via /quote set floodcount. This is the amount of lines a user
944 * may send to any other user/channel in one second.
945 */
946 default_floodcount = 10;
947
948 /*
949 * failed_oper_notice: send a notice to all opers on the server when
950 * someone tries to OPER and uses the wrong password, host or ident.
951 */
952 failed_oper_notice = yes;
953
954 /*
955 * dots_in_ident: the amount of '.' characters permitted in an ident
956 * reply before the user is rejected.
957 */
958 dots_in_ident = 0;
959
960 /*
961 * dot_in_ip6_addr: ircd-hybrid-6.0 and earlier will disallow hosts
962 * without a '.' in them. this will add one to the end. only needed
963 * for older servers.
964 */
965 dot_in_ip6_addr = no;
966
967 /*
968 * min_nonwildcard: the minimum non wildcard characters in k/d/g lines
969 * placed via the server. klines hand placed are exempt from limits.
970 * wildcard chars: '.' ':' '*' '?' '@' '!' '#'
971 */
972 min_nonwildcard = 3;
973
974 /*
975 * min_nonwildcard_simple: the minimum non wildcard characters in
976 * gecos bans. wildcard chars: '*' '?' '#'
977 */
978 min_nonwildcard_simple = 3;
979
980 /* max_accept: maximum allowed /accept's for +g usermode */
981 max_accept = 20;
982
983 /* anti_nick_flood: enable the nickflood control code */
984 anti_nick_flood = yes;
985
986 /* nick flood: the nick changes allowed in the specified period */
987 max_nick_time = 20 seconds;
988 max_nick_changes = 5;
989
990 /*
991 * anti_spam_exit_message_time: the minimum time a user must be connected
992 * before custom quit messages are allowed.
993 */
994 anti_spam_exit_message_time = 5 minutes;
995
996 /*
997 * ts delta: the time delta allowed between server clocks before
998 * a warning is given, or before the link is dropped. all servers
999 * should run ntpdate/rdate to keep clocks in sync
1000 */
1001 ts_warn_delta = 30 seconds;
1002 ts_max_delta = 5 minutes;
1003
1004 /*
1005 * kline_with_reason: show the user the reason why they are k/d/glined
1006 * on exit. May give away who set k/dline when set via tcm.
1007 */
1008 kline_with_reason = yes;
1009
1010 /*
1011 * kline_reason: show this message to users on channel
1012 * instead of the oper reason.
1013 */
1014 kline_reason = "Connection closed";
1015
1016 /*
1017 * reject_hold_time: wait this amount of time before disconnecting
1018 * a rejected client. Use 0 to disable.
1019 */
1020 reject_hold_time = 30 seconds;
1021
1022 /*
1023 * warn_no_nline: warn opers about servers that try to connect but
1024 * we don't have a connect {} block for. Twits with misconfigured
1025 * servers can get really annoying with this enabled.
1026 */
1027 warn_no_nline = yes;
1028
1029 /* stats_o_oper only: make stats o (opers) oper only */
1030 stats_o_oper_only = yes;
1031
1032 /* stats_P_oper_only: make stats P (ports) oper only */
1033 stats_P_oper_only = yes;
1034
1035 /*
1036 * stats i oper only: make stats i (auth {}) oper only. set to:
1037 * yes: show users no auth blocks, made oper only.
1038 * masked: show users first matching auth block
1039 * no: show users all auth blocks.
1040 */
1041 stats_i_oper_only = yes;
1042
1043 /*
1044 * stats_k_oper_only: make stats k/K (klines) oper only. set to:
1045 * yes: show users no auth blocks, made oper only
1046 * masked: show users first matching auth block
1047 * no: show users all auth blocks.
1048 */
1049 stats_k_oper_only = yes;
1050
1051 /*
1052 * caller_id_wait: time between notifying a +g user that somebody
1053 * is messaging them.
1054 */
1055 caller_id_wait = 1 minute;
1056
1057 /*
1058 * opers_bypass_callerid: allows operators to bypass +g and message
1059 * anyone who has it set (useful if you use services).
1060 */
1061 opers_bypass_callerid = no;
1062
1063 /*
1064 * pace_wait_simple: time between use of less intensive commands
1065 * (ADMIN, HELP, (L)USERS, VERSION, remote WHOIS)
1066 */
1067 pace_wait_simple = 1 second;
1068
1069 /*
1070 * pace_wait: time between more intensive commands
1071 * (INFO, LINKS, LIST, MAP, MOTD, STATS, WHO, wildcard WHOIS, WHOWAS)
1072 */
1073 pace_wait = 10 seconds;
1074
1075 /*
1076 * short_motd: send clients a notice telling them to read the motd
1077 * instead of forcing a motd to clients who may simply ignore it.
1078 */
1079 short_motd = no;
1080
1081 /*
1082 * ping_cookie: require clients to respond exactly to a ping command,
1083 * can help block certain types of drones and FTP PASV mode spoofing.
1084 */
1085 ping_cookie = no;
1086
1087 /* no_oper_flood: increase flood limits for opers. */
1088 no_oper_flood = yes;
1089
1090 /*
1091 * true_no_oper_flood: completely eliminate flood limits for opers
1092 * and for clients with can_flood = yes in their auth {} blocks
1093 */
1094 true_no_oper_flood = yes;
1095
1096 /* oper_pass_resv: allow opers to over-ride RESVs on nicks/channels */
1097 oper_pass_resv = yes;
1098
1099 /*
1100 * idletime: the maximum amount of time a user may idle before
1101 * they are disconnected
1102 */
1103 idletime = 0;
1104
1105 /* REMOVE ME. The following line checks you've been reading. */
1106 havent_read_conf = 1;
1107
1108 /*
1109 * max_targets: the maximum amount of targets in a single
1110 * PRIVMSG/NOTICE. Set to 999 NOT 0 for unlimited.
1111 */
1112 max_targets = 4;
1113
1114 /*
1115 * client_flood: maximum amount of data in a clients queue before
1116 * they are dropped for flooding.
1117 */
1118 client_flood = 2560 bytes;
1119
1120 /*
1121 * message_locale: the default message locale
1122 * Use "standard" for the compiled in defaults.
1123 * To install the translated messages, go into messages/ in the
1124 * source directory and run `make install'.
1125 */
1126 message_locale = "standard";
1127
1128 /*
1129 * usermodes configurable: a list of usermodes for the options below
1130 *
1131 * +b - bots - See bot and drone flooding notices
1132 * +c - cconn - Client connection/quit notices
1133 * +D - deaf - Don't receive channel messages
1134 * +d - debug - See debugging notices
1135 * +f - full - See I: line full notices
1136 * +G - softcallerid - Server Side Ignore for users not on your channels
1137 * +g - callerid - Server Side Ignore (for privmsgs etc)
1138 * +i - invisible - Not shown in NAMES or WHO unless you share a
1139 * a channel
1140 * +k - skill - See server generated KILL messages
1141 * +l - locops - See LOCOPS messages
1142 * +n - nchange - See client nick changes
1143 * +r - rej - See rejected client notices
1144 * +s - servnotice - See general server notices
1145 * +u - unauth - See unauthorized client notices
1146 * +w - wallop - See server generated WALLOPS
1147 * +x - external - See remote server connection and split notices
1148 * +y - spy - See LINKS, STATS, TRACE notices etc.
1149 * +z - operwall - See oper generated WALLOPS
1150 */
1151
1152 /* oper_only_umodes: usermodes only opers may set */
1153 oper_only_umodes = bots, cconn, debug, full, skill, nchange,
1154 rej, spy, external, operwall, locops, unauth;
1155
1156 /* oper_umodes: default usermodes opers get when they /oper */
1157 oper_umodes = bots, locops, servnotice, operwall, wallop;
1158
1159 /*
1160 * servlink_path: path to 'servlink' program used by ircd to handle
1161 * encrypted/compressed server <-> server links.
1162 *
1163 * only define if servlink is not in same directory as ircd itself.
1164 */
1165 #servlink_path = "/usr/local/ircd/bin/servlink";
1166
1167 /*
1168 * default_cipher_preference: default cipher to use for cryptlink when none is
1169 * specified in connect block.
1170 */
1171 #default_cipher_preference = "BF/168";
1172
1173 /*
1174 * use_egd: if your system does not have *random devices yet you
1175 * want to use OpenSSL and encrypted links, enable this. Beware -
1176 * EGD is *very* CPU intensive when gathering data for its pool
1177 */
1178 # use_egd = yes;
1179
1180 /*
1181 * egdpool_path: path to EGD pool. Not necessary for OpenSSL >= 0.9.7
1182 * which automatically finds the path.
1183 */
1184 # egdpool_path = "/var/run/egd-pool";
1185
1186
1187 /*
1188 * compression_level: level of compression for compressed links between
1189 * servers.
1190 *
1191 * values are between: 1 (least compression, fastest)
1192 * and: 9 (most compression, slowest).
1193 */
1194 # compression_level = 6;
1195
1196 /*
1197 * throttle_time: the minimum amount of time between connections from
1198 * the same ip. exempt {} blocks are excluded from this throttling.
1199 * Offers protection against flooders who reconnect quickly.
1200 * Set to 0 to disable.
1201 *
1202 * EFnet Note: exempt {} blocks are NOT hidden, so do NOT exempt
1203 * EFnet server IP's.
1204 */
1205 throttle_time = 0;
1206 };
1207
1208 glines {
1209 /*
1210 * EFnet Note: This feature is required for European EFnet servers
1211 * and is used by several North American servers. As
1212 * such, it has been left on by default. If you
1213 * do not want your server to participate in G:Lines
1214 * you should disable this.
1215 */
1216
1217 /* enable: enable glines, network wide temp klines */
1218 enable = yes;
1219
1220 /* duration: the amount of time a gline will remain on your server before expiring */
1221 duration = 1 day;
1222
1223 /* logging: which types of rules you want to log when triggered (choose reject or block) */
1224 logging = reject, block;
1225
1226 /*
1227 * NOTE: gline ACLs can cause a desync of glines throughout the network, meaning some servers
1228 * may have a gline triggered, and others may not. Also, you only need insert rules for glines
1229 * that you want to block and/or reject. If you want to accept and propagate the gline, do NOT
1230 * put a rule for it.
1231 */
1232
1233 /* user@host for rule to apply to */
1234 user = "god@I.still.hate.packets";
1235 /* server for rule to apply to */
1236 name = "hades.arpa";
1237
1238 /*
1239 * action: action to take when a matching gline is found. options are:
1240 * reject - do not apply the gline locally
1241 * block - do not propagate the gline
1242 */
1243 action = reject, block;
1244
1245 user = "god@*";
1246 name = "*";
1247 action = block;
1248 };
1249
1250 modules {
1251 /*
1252 * module path: other paths to search for modules specified below
1253 * and in /modload.
1254 */
1255 path = "/usr/local/ircd/modules";
1256 path = "/usr/local/ircd/modules/autoload";
1257
1258 /* module: the name of a module to load on startup/rehash */
1259 #module = "some_module.so";
1260 };

Properties

Name Value
svn:eol-style native
svn:keywords Id Revision