ViewVC Help
View File | Revision Log | Show Annotations | View Changeset | Root Listing
root/svn/ircd-hybrid-8/etc/example.conf
Revision: 959
Committed: Fri Jul 31 14:42:09 2009 UTC (14 years, 8 months ago) by michael
Original Path: ircd-hybrid-7.2/etc/example.conf.in
File size: 36490 byte(s)
Log Message:
- minor fixes to example configuration files

File Contents

# User Rev Content
1 db 897 /* doc/example.conf - ircd-hybrid-7 Example configuration file
2 michael 959 * Copyright (C) 2000-2009 Hybrid Development Team
3 db 897 *
4     * Written by ejb, wcampbel, db, leeh and others
5     * Other example configurations can be found in the source dir under
6     * etc/.
7     *
8     * $Id$
9     */
10    
11     /* IMPORTANT NOTES:
12     *
13     * auth {} blocks MUST be specified in order of precedence. The first one
14     * that matches a user will be used. So place spoofs first, then specials,
15     * then general access.
16     *
17     * Shell style (#), C++ style (//) and C style comments are supported.
18     *
19     * Files may be included by either:
20     * .include "filename"
21     * .include <filename>
22     *
23     * Times/durations are written as:
24     * 12 hours 30 minutes 1 second
25     *
26     * Valid units of time:
27     * month, week, day, hour, minute, second
28     *
29     * Valid units of size:
30     * megabyte/mbyte/mb, kilobyte/kbyte/kb, byte
31     *
32     * Sizes and times may be singular or plural.
33     */
34    
35     /* EFNET NOTE:
36     *
37     * This config file is NOT suitable for EFNet. EFNet admins should use
38     * example.efnet.conf
39     */
40    
41     /*
42     * serverinfo {}: contains information about the server. (OLD M:)
43     */
44     serverinfo {
45     /*
46     * name: the name of our server. This cannot be changed at runtime.
47     */
48     name = "hades.arpa";
49    
50     /*
51     * sid: a server's unique ID. This is three characters long and must
52     * be in the form [0-9][A-Z0-9][A-Z0-9]. The first character must be
53     * a digit, followed by 2 alpha-numerical letters.
54     * NOTE: The letters must be capitalized. This cannot be changed at runtime.
55     */
56     sid = "_CHANGE_ME_";
57    
58     /*
59     * description: the description of the server. '[' and ']' may not
60     * be used here for compatibility with older servers.
61     */
62     description = "hybrid-7 test server";
63    
64     /*
65     * network info: the name and description of the network this server
66     * is on. Shown in the 005 reply and used with serverhiding.
67     */
68     network_name = "MyNet";
69     network_desc = "This is My Network";
70    
71     /*
72     * hub: allow this server to act as a hub and have multiple servers
73     * connected to it.
74     */
75     hub = no;
76    
77     /*
78     * vhost: the IP to bind to when we connect outward to ipv4 servers.
79 michael 959 * This should be an ipv4 IP only, or "*" for INADDR_ANY.
80 db 897 */
81     #vhost = "192.169.0.1";
82    
83     /*
84     * vhost6: the IP to bind to when we connect outward to ipv6 servers.
85 michael 959 * This should be an ipv6 IP only, or "*" for INADDR_ANY.
86 db 897 */
87     #vhost6 = "3ffe:80e8:546::2";
88    
89     /* max_clients: the maximum number of clients allowed to connect */
90     max_clients = 512;
91    
92     /*
93 michael 951 * rsa_private_key_file: the path to the file containing our
94     * rsa key for cryptlink.
95 db 897 *
96     * Example command to store a 2048 bit RSA keypair in
97     * rsa.key, and the public key in rsa.pub:
98     *
99     * openssl genrsa -out rsa.key 2048
100     * openssl rsa -in rsa.key -pubout -out rsa.pub
101     * chown <ircd-user>.<ircd.group> rsa.key rsa.pub
102     * chmod 0600 rsa.key
103     * chmod 0644 rsa.pub
104     */
105     #rsa_private_key_file = "/usr/local/ircd/etc/rsa.key";
106    
107     /*
108 michael 951 * ssl_certificate_file: the path to the file containing our
109     * ssl certificate
110 db 897 * for encrypted client connection.
111     *
112     * This assumes your private RSA key is stored in rsa.key. You
113     * MUST have an RSA key in order to generate the certificate
114     *
115     * openssl req -new -days 365 -x509 -key rsa.key -out cert.pem
116     *
117     * See http://www.openssl.org/docs/HOWTO/certificates.txt
118     *
119     * Please use the following values when generating the cert
120     *
121     * Organization Name: Network Name
122     * Organization Unit Name: changme.someirc.net
123     * Common Name: irc.someirc.net
124     * E-mail: you@domain.com
125     */
126     #ssl_certificate_file = "/usr/local/ircd/etc/cert.pem";
127     };
128    
129     /*
130     * admin {}: contains admin information about the server. (OLD A:)
131     */
132     admin {
133     name = "Smurf target";
134     description = "Main Server Administrator";
135     email = "<syn@packets.r.us>";
136     };
137    
138     /*
139     * log {}: contains information about logfiles.
140     */
141     log {
142     /* Do you want to enable logging to ircd.log? */
143     use_logging = yes;
144    
145     /*
146     * logfiles: the logfiles to use for user connects, /oper uses,
147     * and failed /oper. These files must exist for logging to be used.
148     */
149     fname_userlog = "logs/userlog";
150     fname_operlog = "logs/operlog";
151     fname_killlog = "logs/kill";
152     fname_klinelog = "logs/kline";
153     fname_glinelog = "logs/gline";
154    
155     /*
156     * log_level: the amount of detail to log in ircd.log. The
157     * higher, the more information is logged. May be changed
158     * once the server is running via /quote SET LOG. Either:
159     * L_CRIT, L_ERROR, L_WARN, L_NOTICE, L_TRACE, L_INFO or L_DEBUG
160     */
161     log_level = L_INFO;
162     };
163    
164     /*
165     * class {}: contains information about classes for users (OLD Y:)
166     */
167     class {
168     /* name: the name of the class. classes are text now */
169     name = "users";
170    
171     /*
172     * ping_time: how often a client must reply to a PING from the
173     * server before they are dropped.
174     */
175     ping_time = 90 seconds;
176    
177     /*
178     * number_per_ip: how many local users are allowed to connect
179     * from one IP (optional)
180     */
181     number_per_ip = 2;
182    
183     /*
184     * max_local: how many local users are allowed to connect
185     * from one ident@host (optional)
186     */
187     max_local = 2;
188    
189     /*
190     * max_global: network-wide limit of users per ident@host (optional)
191     */
192     max_global = 10;
193    
194     /*
195     * max_number: the maximum number of users allowed in this class (optional)
196     */
197     max_number = 100;
198    
199     /*
200     * the following lines are optional and allow you to define
201     * how many users can connect from one /NN subnet
202     */
203     cidr_bitlen_ipv4 = 24;
204     cidr_bitlen_ipv6 = 120;
205     number_per_cidr = 16;
206    
207     /*
208     * sendq: the amount of data allowed in a clients queue before
209     * they are dropped.
210     */
211     sendq = 100 kbytes;
212     };
213    
214     class {
215     name = "opers";
216     ping_time = 90 seconds;
217     number_per_ip = 10;
218     max_number = 100;
219     sendq = 100kbytes;
220     };
221    
222     class {
223     name = "server";
224     ping_time = 90 seconds;
225    
226     /*
227     * ping_warning: how fast a server must reply to a PING before
228     * a warning to opers is generated.
229     */
230     ping_warning = 15 seconds;
231    
232     /*
233     * connectfreq: only used in server classes. Specifies the delay
234     * between autoconnecting to servers.
235     */
236     connectfreq = 5 minutes;
237    
238     /* max number: the amount of servers to autoconnect to */
239     max_number = 1;
240    
241     /* sendq: servers need a higher sendq as they send more data */
242     sendq = 2 megabytes;
243     };
244    
245     /*
246     * listen {}: contains information about the ports ircd listens on (OLD P:)
247     */
248     listen {
249     /*
250     * port: the specific port to listen on. If no host is specified
251     * before, it will listen on all available IPs.
252     *
253     * Ports are separated via a comma, a range may be specified using ".."
254     */
255    
256     /* port: listen on all available IPs, ports 6665 to 6669 */
257     port = 6665 .. 6669;
258    
259     /*
260     * Listen on 192.168.0.1/6697 with ssl enabled and hidden from STATS P
261     * unless you are an administrator.
262     *
263     * NOTE: The "flags" directive has to come before "port". Always!
264 michael 951 *
265     * Currently available flags are:
266     *
267     * ssl - Port is for SSL client connections only
268     * server - Only server connections are permitted
269     * hidden - Port is hidden from /stats P
270 db 897 */
271     flags = hidden, ssl;
272     host = "192.168.0.1";
273     port = 6697;
274    
275     /*
276     * host: set a specific IP/host the ports after the line will listen
277     * on. This may be ipv4 or ipv6.
278     */
279     host = "1.2.3.4";
280     port = 7000, 7001;
281    
282     host = "3ffe:1234:a:b:c::d";
283     port = 7002;
284     };
285    
286     /*
287     * auth {}: allow users to connect to the ircd (OLD I:)
288     */
289     auth {
290     /*
291     * user: the user@host allowed to connect. Multiple IPv4/IPv6 user
292     * lines are permitted per auth block.
293     */
294     user = "*@172.16.0.0/12";
295     user = "*test@123D:B567:*";
296    
297     /* password: an optional password that is required to use this block */
298     password = "letmein";
299    
300     /*
301     * encrypted: controls whether the auth password above has been
302     * encrypted.
303     */
304     encrypted = yes;
305    
306     /*
307     * spoof: fake the users host to this. This is free-form,
308     * just do everyone a favor and don't abuse it. ('=' prefix on /stats I)
309     */
310     spoof = "I.still.hate.packets";
311    
312     /* class: the class the user is placed in */
313     class = "opers";
314    
315     /*
316     * need_password: don't allow users who haven't supplied the correct
317     * password to connect using another auth{} block
318     * ('&' prefix on /stats I if disabled)
319     * need_ident: require the user to have identd to connect ('+' prefix on /stats I)
320     * spoof_notice: enable spoofing notification to admins
321     * exceed_limit: allow a user to exceed class limits ('>' prefix on /stats I)
322     * kline_exempt: exempt this user from k/glines ('^' prefix on /stats I)
323     * gline_exempt: exempt this user from glines ('_' prefix on /stats I)
324     * resv_exempt: exempt this user from resvs ('$' prefix on /stats I)
325     * no_tilde: remove ~ from a user with no ident ('-' prefix on /stats I)
326     * can_flood: allow this user to exceed flood limits ('|' prefix on /stats I)
327     * can_idle: exempt this user from idle restrictions ('<' prefix on /stats I)
328     */
329     flags = need_password, spoof_notice, exceed_limit, kline_exempt,
330     gline_exempt, resv_exempt, no_tilde, can_flood, can_idle;
331     };
332    
333     auth {
334     /*
335     * redirect: the server and port to redirect a user to. A user does
336     * not have to obey the redirection, the ircd just suggests an alternative
337     * server for them.
338     */
339     redirserv = "this.is.not.a.real.server";
340     redirport = 6667;
341    
342     user = "*.server";
343    
344     /* class: a class is required even though it is not used */
345     class = "users";
346     };
347    
348     auth {
349     user = "*@*";
350     class = "users";
351     flags = need_ident;
352     };
353    
354     /*
355     * operator {}: defines ircd operators. (OLD O:)
356     *
357     * ircd-hybrid no longer supports local operators, privileges are
358     * controlled via flags.
359     */
360     operator {
361     /* name: the name of the oper */
362     /* NOTE: operator "opername"{} is also supported */
363     name = "god";
364    
365     /*
366     * user: the user@host required for this operator. CIDR is not
367     * supported. Multiple user="" lines are supported.
368     */
369     user = "*god@*";
370     user = "*@127.0.0.1";
371    
372     /*
373     * password: the password required to oper. By default this will
374     * need to be encrypted using 'mkpasswd'. MD5 is supported.
375     */
376     password = "etcnjl8juSU1E";
377    
378     /*
379     * encrypted: controls whether the oper password above has been
380     * encrypted. (OLD CRYPT_OPER_PASSWORD now optional per operator)
381     */
382     encrypted = yes;
383    
384     /*
385     * rsa_public_key_file: the public key for this oper when using Challenge.
386     * A password should not be defined when this is used, see
387     * doc/challenge.txt for more information.
388     */
389     # rsa_public_key_file = "/usr/local/ircd/etc/oper.pub";
390    
391     /* class: the class the oper joins when they successfully /oper */
392     class = "opers";
393    
394     /*
395     * umodes: default usermodes opers get when they /oper. If defined,
396     * it will override oper_umodes settings in general {}.
397     * Available usermodes:
398     *
399     * +b - bots - See bot and drone flooding notices
400     * +c - cconn - Client connection/quit notices
401 michael 951 * +C - cconn_full - Client connection/quit notices full
402 db 897 * +D - deaf - Don't receive channel messages
403     * +d - debug - See debugging notices
404     * +f - full - See I: line full notices
405     * +G - softcallerid - Server Side Ignore for users not on your channels
406     * +g - callerid - Server Side Ignore (for privmsgs etc)
407     * +i - invisible - Not shown in NAMES or WHO unless you share a
408     * a channel
409     * +k - skill - See server generated KILL messages
410     * +l - locops - See LOCOPS messages
411     * +n - nchange - See client nick changes
412     * +r - rej - See rejected client notices
413     * +s - servnotice - See general server notices
414     * +u - unauth - See unauthorized client notices
415     * +w - wallop - See server generated WALLOPS
416     * +x - external - See remote server connection and split notices
417     * +y - spy - See LINKS, STATS, TRACE notices etc.
418     * +z - operwall - See oper generated WALLOPS
419     */
420     # umodes = locops, servnotice, operwall, wallop;
421    
422     /*
423     * privileges: controls the activities and commands an oper is
424     * allowed to do on the server. All options default to no.
425     * Available options:
426     *
427     * global_kill: allows remote users to be /KILL'd (OLD 'O' flag)
428     * remote: allows remote SQUIT and CONNECT (OLD 'R' flag)
429     * remoteban: allows remote KLINE/UNKLINE
430     * kline: allows KILL, KLINE and DLINE (OLD 'K' flag)
431     * unkline: allows UNKLINE and UNDLINE (OLD 'U' flag)
432     * gline: allows GLINE (OLD 'G' flag)
433 michael 951 * xline: allows XLINE (OLD 'X' flag)
434 db 897 * operwall: allows OPERWALL
435     * nick_changes: allows oper to see nickchanges (OLD 'N' flag)
436     * via usermode +n
437     * rehash: allows oper to REHASH config (OLD 'H' flag)
438     * die: allows DIE and RESTART (OLD 'D' flag)
439     * admin: gives admin privileges. admins
440     * may (un)load modules and see the
441     * real IPs of servers.
442     * hidden_admin: same as 'admin', but noone can recognize you as
443     * being an admin
444     * hidden_oper: not shown in /stats p (except for other operators)
445     */
446     /* You can either use
447     * die = yes;
448     * rehash = yes;
449     *
450     * or in a flags statement i.e.
451     * flags = die, rehash;
452     *
453     * You can also negate a flag with ~ i.e.
454     * flags = ~remote;
455     *
456     */
457     flags = global_kill, remote, kline, unkline, xline,
458     die, rehash, nick_changes, admin, operwall;
459     };
460    
461     /*
462     * connect {}: controls servers we connect to (OLD C:, N:, H:, L:)
463     */
464     connect {
465     /* name: the name of the server */
466     name = "irc.uplink.com";
467    
468     /*
469     * host: the host or IP to connect to. If a hostname is used it
470     * must match the reverse dns of the server.
471     */
472     host = "192.168.0.1";
473    
474     /*
475     * vhost: the IP to bind to when we connect outward to servers.
476     * serverinfo::vhost and serverinfo::vhost6 will be overridden
477     * by this directive.
478     */
479     vhost = "192.168.0.2";
480    
481     /*
482     * passwords: the passwords we send (OLD C:) and accept (OLD N:).
483     * The remote server will have these passwords reversed.
484     */
485     send_password = "password";
486     accept_password = "anotherpassword";
487    
488     /*
489     * encrypted: controls whether the accept_password above has been
490     * encrypted. (OLD CRYPT_LINK_PASSWORD now optional per connect)
491     */
492     encrypted = no;
493    
494     /* port: the port to connect to this server on */
495     port = 6666;
496    
497     /*
498     * hub_mask: the mask of servers that this server may hub. Multiple
499     * entries are permitted
500     */
501     hub_mask = "*";
502    
503     /*
504     * leaf_mask: the mask of servers this server may not hub. Multiple
505     * entries are permitted. Useful for forbidding EU -> US -> EU routes.
506     */
507     # leaf_mask = "*.uk";
508    
509     /* fakename: the servername we pretend to be when we connect */
510     # fakename = "*.arpa";
511    
512     /* class: the class this server is in */
513     class = "server";
514    
515     /*
516     * autoconn: controls whether we autoconnect to this server or not,
517     * dependent on class limits. By default, this is disabled.
518     * compressed: controls whether traffic is compressed via ziplinks.
519     * By default, this is disabled
520     * cryptlink: enable full encryption for all data passing between our
521     * server and this link and rsa authentication.
522     * burst_away: This will send the /away string that users have set
523     * on the server burst. Note this can be a lot of data
524     * and slow down your server burst.
525     * topicburst: Send topics to this server during channel burst. Works
526     * only if the server we are connecting to is capable
527     * of TBURST/TB.
528     */
529     # flags = autoconn, compressed, cryptlink, burst_away, topicburst;
530     };
531    
532     connect {
533     name = "encrypted.auth.example";
534     host = "some.host.somewhere";
535     port = 6667;
536    
537     flags = cryptlink;
538    
539     /*
540     * rsa_public_key_file: the path to the public keyfile of the server.
541     * Used instead of passwords.
542     */
543     rsa_public_key_file = "etc/remote.server.keyfile";
544    
545     /*
546     * cipher preference: set the preferred cipher for this link
547     *
548     * Available ciphers are:
549     * BF/168 BF/128 CAST/128 IDEA/128 RC5.16/128
550     * RC5.12/128 RC5.8/128 3DES/168 DES/56
551     *
552     * NOTE: Some ciphers may not be supported by your OpenSSL.
553     * Check the output from 'configure' for available ciphers.
554     *
555     * NOTE2: To help you decide what cipher to use, tools/encspeed
556     * will show you approximately how fast each cipher is.
557     * However, blowfish is fast and secure, and is probably
558     * a good default for most situations.
559     *
560     * NOTE3: Default if none is set is BF/128
561     *
562     * The cipher *MUST* be the same in both directions. If you
563     * set a cipher preference, your uplink must set the same cipher,
564     * else it will not link.
565     */
566     # cipher_preference = "BF/168";
567     };
568    
569     /*
570     * NOTE: Don't add an extra 'name=' entry if you use
571     * the connect "name"{} feature
572     */
573     connect "ipv6.some.server" {
574     host = "3ffd:dead:beef::1";
575     send_password = "password";
576     accept_password = "password";
577     port = 6666;
578    
579     /*
580     * aftype: controls whether the connection uses "ipv4" or "ipv6".
581     * Default is ipv4.
582     */
583     aftype = ipv6;
584     class = "server";
585     };
586    
587     /*
588     * cluster {}: servers that share klines/unkline/xline/unxline/resv/unresv/locops
589     * automatically (OLD hyb6 SLAVE_SERVERS)
590     */
591     cluster {
592     /*
593     * name: the server to share with, this can take wildcards
594     *
595     * NOTE: only local actions will be clustered, meaning if
596     * the server receives a shared kline/unkline/etc, it
597     * will not be propagated to clustered servers.
598     *
599     * Remote servers are not necessarily required to accept
600     * clustered lines, they need a shared{} for *THIS* server
601     * in order to accept them.
602     */
603     name = "*.arpa";
604    
605     /*
606     * type: list of what to share, options are as follows:
607     * kline - share klines
608     * tkline - share temporary klines
609     * unkline - share unklines
610     * xline - share xlines
611     * txline - share temporary xlines
612     * unxline - share unxlines
613     * resv - share resvs
614     * tresv - share temporary resvs
615     * unresv - share unresvs
616     * locops - share locops
617     * all - share all of the above (default)
618     */
619     type = kline, unkline, locops, xline, resv;
620     };
621    
622     /*
623     * shared {}: users that are allowed to remote kline (OLD U:)
624     *
625     * NOTE: This can be effectively used for remote klines.
626     * Please note that there is no password authentication
627     * for users setting remote klines. You must also be
628     * /oper'd in order to issue a remote kline.
629     */
630     shared {
631     /*
632     * name: the server the user must be on to set klines. If this is not
633     * specified, the user will be allowed to kline from all servers.
634     */
635     name = "irc2.some.server";
636    
637     /*
638     * user: the user@host mask that is allowed to set klines. If this is
639     * not specified, all users on the server above will be allowed to set
640     * a remote kline.
641     */
642     user = "oper@my.host.is.spoofed";
643    
644     /*
645     * type: list of what to share, options are as follows:
646     * kline - allow oper/server to kline
647     * tkline - allow temporary klines
648     * unkline - allow oper/server to unkline
649     * xline - allow oper/server to xline
650     * txline - allow temporary xlines
651     * unxline - allow oper/server to unxline
652     * resv - allow oper/server to resv
653     * tresv - allow temporary resvs
654     * unresv - allow oper/server to unresv
655     * locops - allow oper/server to locops - only used for servers that cluster
656     * all - allow oper/server to do all of the above (default)
657     */
658     type = kline, unkline, resv;
659     };
660    
661     /*
662     * kill {}: users that are not allowed to connect (OLD K:)
663     * Oper issued klines will be added to the specified kline config
664     */
665     kill {
666     user = "bad@*.hacked.edu";
667     reason = "Obviously hacked account";
668     };
669    
670     kill {
671 michael 951 user = "^O[[:alpha:]]?[[:digit:]]+(x\.o|\.xo)$@^[[:alnum:]]{4}\.evilnet.tld$";
672    
673     /*
674     * NOTE: You have to set type=regex; when using a regular expression
675     * based user entry
676     */
677 db 897 type = regex;
678     };
679    
680     /*
681     * deny {}: IPs that are not allowed to connect (before DNS/ident lookup)
682     * Oper issued dlines will be added to the specified dline config
683     */
684     deny {
685     ip = "10.0.1.0/24";
686     reason = "Reconnecting vhosted bots";
687     };
688    
689     /*
690     * exempt {}: IPs that are exempt from deny {} and Dlines. (OLD d:)
691     */
692     exempt {
693     ip = "192.168.0.0/16";
694     };
695    
696     /*
697     * resv {}: nicks and channels users may not use/join (OLD Q:)
698     */
699     resv {
700     /* reason: the reason for the proceeding resv's */
701     reason = "There are no services on this network";
702    
703     /* resv: the nicks and channels users may not join/use */
704     nick = "nickserv";
705     nick = "chanserv";
706     channel = "#services";
707    
708     /* resv: wildcard masks are also supported in nicks only */
709     reason = "Clone bots";
710     nick = "clone*";
711     };
712    
713     /*
714     * gecos {}: The X: replacement, used for banning users based on
715     * their "realname".
716     */
717     gecos {
718     name = "*sex*";
719     reason = "Possible spambot";
720     };
721    
722     gecos {
723     name = "sub7server";
724     reason = "Trojan drone";
725     };
726    
727     gecos {
728     name = "*http*";
729     reason = "Spambot";
730     };
731    
732     gecos {
733     name = "^\[J[0o]hn Do[3e]\]-[0-9]{2,5}$";
734 michael 951
735     /*
736     * NOTE: You have to set type=regex; when using a regular expression
737     * based name entry
738     */
739 db 897 type = regex;
740     };
741    
742     /*
743     * channel {}: The channel block contains options pertaining to channels
744     */
745     channel {
746     /*
747     * disable_fake_channels: this option, if set to 'yes', will
748     * disallow clients to create or join channels that have one
749     * of the following ASCII characters in their name:
750     *
751     * 2 | bold
752     * 3 | mirc color
753 michael 951 * 15 | plain text
754 db 897 * 22 | reverse
755     * 31 | underline
756     * 160 | non-breaking space
757     */
758     disable_fake_channels = yes;
759    
760     /*
761     * restrict_channels: reverse channel RESVs logic, only reserved
762     * channels are allowed
763     */
764     restrict_channels = no;
765    
766     /*
767     * disable_local_channels: prevent users from joining &channels.
768     */
769     disable_local_channels = no;
770    
771     /*
772     * use_invex: Enable/disable channel mode +I, a n!u@h list of masks
773     * that can join a +i channel without an invite.
774     */
775     use_invex = yes;
776    
777     /*
778     * use_except: Enable/disable channel mode +e, a n!u@h list of masks
779     * that can join a channel through a ban (+b).
780     */
781     use_except = yes;
782    
783     /*
784     * use_knock: Allows users to request an invite to a channel that
785     * is locked somehow (+ikl). If the channel is +p or you are banned
786     * the knock will not be sent.
787     */
788     use_knock = yes;
789    
790     /*
791     * knock_delay: The amount of time a user must wait between issuing
792     * the knock command.
793     */
794 michael 951 knock_delay = 5 minutes;
795 db 897
796     /*
797     * knock_delay_channel: How often a knock to any specific channel
798     * is permitted, regardless of the user sending the knock.
799     */
800     knock_delay_channel = 1 minute;
801    
802     /*
803     * burst_topicwho: enable sending of who set topic on topicburst
804     * default is yes
805     */
806     burst_topicwho = yes;
807    
808     /*
809     * max_chans_per_user: The maximum number of channels a user can
810     * join/be on.
811     */
812     max_chans_per_user = 25;
813    
814     /* quiet_on_ban: stop banned people talking in channels. */
815     quiet_on_ban = yes;
816    
817     /* max_bans: maximum number of +b/e/I modes in a channel */
818     max_bans = 25;
819    
820     /*
821     * how many joins in how many seconds constitute a flood, use 0 to
822     * disable. +b opers will be notified (changeable via /set)
823     */
824     join_flood_count = 16;
825     join_flood_time = 8 seconds;
826    
827     /*
828     * splitcode: The ircd will now check splitmode every few seconds.
829     *
830     * Either split users or split servers can activate splitmode, but
831     * both conditions must be met for the ircd to deactivate splitmode.
832     *
833     * You may force splitmode to be permanent by /quote set splitmode on
834     */
835    
836     /*
837     * default_split_user_count: when the usercount is lower than this level,
838     * consider ourselves split. This must be set for automatic splitmode.
839     */
840     default_split_user_count = 0;
841    
842     /*
843     * default_split_server_count: when the servercount is lower than this,
844     * consider ourselves split. This must be set for automatic splitmode.
845     */
846     default_split_server_count = 0;
847    
848 michael 959 /* no_create_on_split: disallow users creating channels on split. */
849 db 897 no_create_on_split = yes;
850    
851 michael 959 /* no_join_on_split: disallow users joining channels at all on a split. */
852 db 897 no_join_on_split = no;
853     };
854    
855     /*
856     * serverhide {}: The serverhide block contains the options regarding
857     * serverhiding
858     */
859     serverhide {
860     /*
861     * flatten_links: this option will show all servers in /links appear
862     * that they are linked to this current server
863     */
864     flatten_links = no;
865    
866     /*
867     * links_delay: how often to update the links file when it is
868     * flattened.
869     */
870     links_delay = 5 minutes;
871    
872     /*
873     * hidden: hide this server from a /links output on servers that
874     * support it. This allows hub servers to be hidden etc.
875     */
876     hidden = no;
877    
878     /*
879     * disable_hidden: prevent servers hiding themselves from a
880     * /links output.
881     */
882     disable_hidden = no;
883    
884     /*
885     * hide_servers: hide remote servernames everywhere and instead use
886     * hidden_name and network_desc.
887     */
888     hide_servers = no;
889    
890     /*
891     * Use this as the servername users see if hide_servers = yes.
892     */
893     hidden_name = "*.hidden.com";
894    
895     /*
896 michael 951 * hide_server_ips: If this is disabled, opers will be unable to see
897     * servers ips and will be shown a masked ip, admins will be shown the
898     * real ip.
899 db 897 *
900 michael 951 * If this is enabled, nobody can see a servers ip. *This is a kludge*,
901     * it has the side effect of hiding the ips everywhere, including
902     * logfiles.
903 db 897 *
904     * We recommend you leave this disabled, and just take care with who you
905     * give admin=yes; to.
906     */
907     hide_server_ips = no;
908     };
909    
910     /*
911     * general {}: The general block contains many of the options that were once
912     * compiled in options in config.h. The general block is read at start time.
913     */
914     general {
915 michael 951 /* max_watch: maximum WATCH entries a client can have. */
916 db 897 max_watch = 64;
917    
918     /*
919     * gline_min_cidr: the minimum required length of a CIDR bitmask
920     * for IPv4 based glines
921     */
922     gline_min_cidr = 16;
923    
924     /*
925     * gline_min_cidr6: the minimum required length of a CIDR bitmask
926     * for IPv6 based glines
927     */
928     gline_min_cidr6 = 48;
929    
930     /*
931     * Whether to automatically set mode +i on connecting users.
932     */
933     invisible_on_connect = yes;
934    
935     /*
936     * If you don't explicitly specify burst_away in your connect blocks, then
937     * they will default to the burst_away value below.
938     */
939     burst_away = no;
940    
941     /*
942     * Show "actually using host <ip>" on /whois when possible.
943     */
944     use_whois_actually = yes;
945    
946     /*
947     * Max time from the nickname change that still causes KILL
948     * automatically to switch for the current nick of that user. (seconds)
949     */
950     kill_chase_time_limit = 90;
951    
952     /*
953     * If hide_spoof_ips is disabled, opers will be allowed to see the real IP of spoofed
954     * users in /trace etc. If this is defined they will be shown a masked IP.
955     */
956     hide_spoof_ips = yes;
957    
958     /*
959     * Ignore bogus timestamps from other servers. Yes, this will desync
960     * the network, but it will allow chanops to resync with a valid non TS 0
961     *
962     * This should be enabled network wide, or not at all.
963     */
964     ignore_bogus_ts = no;
965    
966     /*
967     * disable_auth: completely disable ident lookups; if you enable this,
968     * be careful of what you set need_ident to in your auth {} blocks
969     */
970     disable_auth = no;
971    
972     /* disable_remote_commands: disable users doing commands on remote servers */
973     disable_remote_commands = no;
974    
975     /*
976     * tkline_expire_notices: enables or disables temporary kline/xline
977     * expire notices.
978     */
979     tkline_expire_notices = no;
980    
981     /*
982     * default_floodcount: the default value of floodcount that is configurable
983     * via /quote set floodcount. This is the amount of lines a user
984     * may send to any other user/channel in one second.
985     */
986     default_floodcount = 10;
987    
988     /*
989     * failed_oper_notice: send a notice to all opers on the server when
990     * someone tries to OPER and uses the wrong password, host or ident.
991     */
992     failed_oper_notice = yes;
993    
994     /*
995     * dots_in_ident: the amount of '.' characters permitted in an ident
996     * reply before the user is rejected.
997     */
998     dots_in_ident = 2;
999    
1000     /*
1001     * dot_in_ip6_addr: ircd-hybrid-6.0 and earlier will disallow hosts
1002     * without a '.' in them. This will add one to the end. Only needed
1003     * for older servers.
1004     */
1005     dot_in_ip6_addr = no;
1006    
1007     /*
1008     * min_nonwildcard: the minimum non wildcard characters in k/d/g lines
1009     * placed via the server. klines hand placed are exempt from limits.
1010     * wildcard chars: '.' ':' '*' '?' '@' '!' '#'
1011     */
1012     min_nonwildcard = 4;
1013    
1014     /*
1015     * min_nonwildcard_simple: the minimum non wildcard characters in
1016     * gecos bans. wildcard chars: '*' '?' '#'
1017     */
1018     min_nonwildcard_simple = 3;
1019    
1020     /* max_accept: maximum allowed /accept's for +g usermode */
1021     max_accept = 20;
1022    
1023     /* anti_nick_flood: enable the nickflood control code */
1024     anti_nick_flood = yes;
1025    
1026     /* nick flood: the nick changes allowed in the specified period */
1027     max_nick_time = 20 seconds;
1028     max_nick_changes = 5;
1029    
1030     /*
1031     * anti_spam_exit_message_time: the minimum time a user must be connected
1032     * before custom quit messages are allowed.
1033     */
1034     anti_spam_exit_message_time = 5 minutes;
1035    
1036     /*
1037     * ts delta: the time delta allowed between server clocks before
1038     * a warning is given, or before the link is dropped. all servers
1039     * should run ntpdate/rdate to keep clocks in sync
1040     */
1041     ts_warn_delta = 30 seconds;
1042     ts_max_delta = 5 minutes;
1043    
1044     /*
1045     * kline_with_reason: show the user the reason why they are k/d/glined
1046     * on exit. May give away who set k/dline when set via tcm.
1047     */
1048     kline_with_reason = yes;
1049    
1050     /*
1051     * kline_reason: show this message to users on channel
1052     * instead of the oper reason.
1053     */
1054     kline_reason = "Connection closed";
1055    
1056     /*
1057     * reject_hold_time: wait this amount of time before disconnecting
1058     * a rejected client. Use 0 to disable.
1059     */
1060     reject_hold_time = 0;
1061    
1062     /*
1063     * warn_no_nline: warn opers about servers that try to connect but
1064     * we don't have a connect {} block for. Twits with misconfigured
1065     * servers can get really annoying with this enabled.
1066     */
1067     warn_no_nline = yes;
1068    
1069     /*
1070     * stats_e_disabled: set this to 'yes' to disable "STATS e" for both
1071     * operators and administrators. Doing so is a good idea in case
1072     * there are any exempted (exempt{}) server IPs you don't want to
1073     * see leaked.
1074     */
1075     stats_e_disabled = no;
1076    
1077     /* stats_o_oper only: make stats o (opers) oper only */
1078     stats_o_oper_only = yes;
1079    
1080     /* stats_P_oper_only: make stats P (ports) oper only */
1081     stats_P_oper_only = yes;
1082    
1083     /*
1084     * stats i oper only: make stats i (auth {}) oper only. set to:
1085     * yes: show users no auth blocks, made oper only.
1086     * masked: show users first matching auth block
1087     * no: show users all auth blocks.
1088     */
1089     stats_i_oper_only = yes;
1090    
1091     /*
1092     * stats_k_oper_only: make stats k/K (klines) oper only. set to:
1093     * yes: show users no auth blocks, made oper only
1094     * masked: show users first matching auth block
1095     * no: show users all auth blocks.
1096     */
1097     stats_k_oper_only = yes;
1098    
1099     /*
1100     * caller_id_wait: time between notifying a +g user that somebody
1101     * is messaging them.
1102     */
1103     caller_id_wait = 1 minute;
1104    
1105     /*
1106     * opers_bypass_callerid: allows operators to bypass +g and message
1107     * anyone who has it set (useful if you use services).
1108     */
1109     opers_bypass_callerid = no;
1110    
1111     /*
1112     * pace_wait_simple: time between use of less intensive commands
1113     * (ADMIN, HELP, (L)USERS, VERSION, remote WHOIS)
1114     */
1115     pace_wait_simple = 1 second;
1116    
1117     /*
1118     * pace_wait: time between more intensive commands
1119     * (INFO, LINKS, LIST, MAP, MOTD, STATS, WHO, wildcard WHOIS, WHOWAS)
1120     */
1121     pace_wait = 10 seconds;
1122    
1123     /*
1124     * short_motd: send clients a notice telling them to read the motd
1125     * instead of forcing a motd to clients who may simply ignore it.
1126     */
1127     short_motd = no;
1128    
1129     /*
1130     * ping_cookie: require clients to respond exactly to a ping command,
1131     * can help block certain types of drones and FTP PASV mode spoofing.
1132     */
1133     ping_cookie = no;
1134    
1135     /* no_oper_flood: increase flood limits for opers. */
1136     no_oper_flood = yes;
1137    
1138     /*
1139     * true_no_oper_flood: completely eliminate flood limits for opers
1140     * and for clients with can_flood = yes in their auth {} blocks
1141     */
1142     true_no_oper_flood = yes;
1143    
1144     /* oper_pass_resv: allow opers to over-ride RESVs on nicks/channels */
1145     oper_pass_resv = yes;
1146    
1147     /*
1148     * idletime: the maximum amount of time a user may idle before
1149     * they are disconnected
1150     */
1151     idletime = 0;
1152    
1153     /* REMOVE ME. The following line checks you've been reading. */
1154     havent_read_conf = 1;
1155    
1156     /*
1157     * max_targets: the maximum amount of targets in a single
1158     * PRIVMSG/NOTICE. Set to 999 NOT 0 for unlimited.
1159     */
1160     max_targets = 4;
1161    
1162     /*
1163     * client_flood: maximum amount of data in a clients queue before
1164     * they are dropped for flooding.
1165     */
1166     client_flood = 2560 bytes;
1167    
1168     /*
1169     * message_locale: the default message locale
1170     * Use "standard" for the compiled in defaults.
1171     * To install the translated messages, go into messages/ in the
1172     * source directory and run `make install'.
1173     */
1174     message_locale = "standard";
1175    
1176     /*
1177     * usermodes configurable: a list of usermodes for the options below
1178     *
1179     * +b - bots - See bot and drone flooding notices
1180     * +c - cconn - Client connection/quit notices
1181 michael 959 * +C - cconn_full - Client connection/quit notices full
1182 db 897 * +D - deaf - Don't receive channel messages
1183     * +d - debug - See debugging notices
1184     * +f - full - See I: line full notices
1185     * +G - softcallerid - Server Side Ignore for users not on your channels
1186     * +g - callerid - Server Side Ignore (for privmsgs etc)
1187     * +i - invisible - Not shown in NAMES or WHO unless you share a
1188     * a channel
1189     * +k - skill - See server generated KILL messages
1190     * +l - locops - See LOCOPS messages
1191     * +n - nchange - See client nick changes
1192     * +r - rej - See rejected client notices
1193     * +s - servnotice - See general server notices
1194     * +u - unauth - See unauthorized client notices
1195     * +w - wallop - See server generated WALLOPS
1196     * +x - external - See remote server connection and split notices
1197     * +y - spy - See LINKS, STATS, TRACE notices etc.
1198     * +z - operwall - See oper generated WALLOPS
1199     */
1200    
1201     /* oper_only_umodes: usermodes only opers may set */
1202     oper_only_umodes = bots, cconn, cconn_full, debug, full, skill,
1203     nchange, rej, spy, external, operwall,
1204     locops, unauth;
1205    
1206     /* oper_umodes: default usermodes opers get when they /oper */
1207     oper_umodes = bots, locops, servnotice, operwall, wallop;
1208    
1209     /*
1210     * servlink_path: path to 'servlink' program used by ircd to handle
1211     * encrypted/compressed server <-> server links.
1212     *
1213     * only define if servlink is not in same directory as ircd itself.
1214     */
1215     #servlink_path = "/usr/local/ircd/bin/servlink";
1216    
1217     /*
1218     * default_cipher_preference: default cipher to use for cryptlink when none is
1219     * specified in connect block.
1220     */
1221     #default_cipher_preference = "BF/168";
1222    
1223     /*
1224     * use_egd: if your system does not have *random devices yet you
1225     * want to use OpenSSL and encrypted links, enable this. Beware -
1226     * EGD is *very* CPU intensive when gathering data for its pool
1227     */
1228     # use_egd = yes;
1229    
1230     /*
1231     * egdpool_path: path to EGD pool. Not necessary for OpenSSL >= 0.9.7
1232     * which automatically finds the path.
1233     */
1234     # egdpool_path = "/var/run/egd-pool";
1235    
1236    
1237     /*
1238     * compression_level: level of compression for compressed links between
1239     * servers.
1240     *
1241     * values are between: 1 (least compression, fastest)
1242     * and: 9 (most compression, slowest).
1243     */
1244     # compression_level = 6;
1245    
1246     /*
1247     * throttle_time: the minimum amount of time between connections from
1248     * the same ip. exempt {} blocks are excluded from this throttling.
1249     * Offers protection against flooders who reconnect quickly.
1250     * Set to 0 to disable.
1251     */
1252     throttle_time = 10;
1253     };
1254    
1255     glines {
1256     /* enable: enable glines, network wide temp klines */
1257     enable = yes;
1258    
1259     /*
1260     * duration: the amount of time a gline will remain on your
1261     * server before expiring
1262     */
1263     duration = 1 day;
1264    
1265     /*
1266     * logging: which types of rules you want to log when triggered
1267     * (choose reject or block)
1268     */
1269     logging = reject, block;
1270    
1271     /*
1272     * NOTE: gline ACLs can cause a desync of glines throughout the
1273     * network, meaning some servers may have a gline triggered, and
1274     * others may not. Also, you only need insert rules for glines
1275     * that you want to block and/or reject. If you want to accept and
1276     * propagate the gline, do NOT put a rule for it.
1277     */
1278    
1279     /* user@host for rule to apply to */
1280     user = "god@I.still.hate.packets";
1281     /* server for rule to apply to */
1282     name = "hades.arpa";
1283    
1284     /*
1285     * action: action to take when a matching gline is found. options are:
1286     * reject - do not apply the gline locally
1287     * block - do not propagate the gline
1288     */
1289     action = reject, block;
1290    
1291     user = "god@*";
1292     name = "*";
1293     action = block;
1294     };
1295    
1296     modules {
1297     /*
1298 michael 951 * path: other paths to search for modules specified below
1299 db 897 * and in /modload.
1300     */
1301 michael 912 path = "@LIBDIR@/modules";
1302     path = "@LIBDIR@/modules/autoload";
1303 db 897
1304     /* module: the name of a module to load on startup/rehash */
1305 michael 959 #module = "some_module.la";
1306 db 897 };

Properties

Name Value
svn:eol-style native
svn:keywords Id Revision