ViewVC Help
View File | Revision Log | Show Annotations | View Changeset | Root Listing
root/svn/ircd-hybrid/branches/8.2.x/doc/reference.conf
(Generate patch)

Comparing:
ircd-hybrid/trunk/doc/reference.conf (file contents), Revision 1825 by michael, Sun Apr 14 19:54:48 2013 UTC vs.
ircd-hybrid/branches/8.2.x/doc/reference.conf (file contents), Revision 4559 by michael, Sun Aug 24 09:44:13 2014 UTC

# Line 1 | Line 1
1 < /* ircd-hybrid reference configuration file
2 < * Copyright (C) 2000-2013 Hybrid Development Team
1 > /*
2 > * This is an example configuration file for ircd-hybrid
3   *
4 < * Written by ejb, wcampbel, db, leeh and others
4 > * Copyright (c) 2000-2014 ircd-hybrid development team
5   *
6   * $Id$
7   */
8  
9   /*
10   * ########################################################################
11 < * IMPORTANT NOTES:
11 > * IMPORTANT NOTE:
12   *
13 < * auth {} blocks MUST be specified in order of precedence.  The first one
14 < * that matches a user will be used.  So place spoofs first, then specials,
13 > * auth {} blocks MUST be specified in order of precedence. The first one
14 > * that matches a user will be used. So place spoofs first, then specials,
15   * then general access.
16   * ########################################################################
17   *
# Line 23 | Line 23
23   *
24   * Times/durations are written as:
25   *        12 hours 30 minutes 1 second
26 < *        
26 > *
27   * Valid units of time:
28   *        year, month, week, day, hour, minute, second
29   *
30   * Valid units of size:
31   *        megabyte/mbyte/mb, kilobyte/kbyte/kb, byte
32   *
33 < * Sizes and times may be singular or plural.  
34 < */
33 > * Sizes and times may be singular or plural.
34 > */
35  
36  
37   /*
# Line 39 | Line 39
39   */
40   serverinfo {
41          /*
42 <         * name: the name of this server.  This cannot be changed at runtime.
42 >         * name: the name of this server. This cannot be changed at runtime.
43           */
44          name = "hades.arpa";
45  
46          /*
47 <         * sid: a server's unique ID.  This is three characters long and must
48 <         * be in the form [0-9][A-Z0-9][A-Z0-9].  The first character must be
47 >         * sid: a server's unique ID. This is three characters long and must
48 >         * be in the form [0-9][A-Z0-9][A-Z0-9]. The first character must be
49           * a digit, followed by 2 alpha-numerical letters.
50 <         * NOTE: The letters must be capitalized.  This cannot be changed at runtime.
50 >         *
51 >         * NOTE: The letters must be capitalized. This cannot be changed at runtime.
52           */
53          sid = "0HY";
54  
# Line 58 | Line 59 | serverinfo {
59  
60          /*
61           * network info: the name and description of the network this server
62 <         * is on.  Shown in the 005 reply and used with serverhiding.
62 >         * is on. Shown in the 005 reply and used with serverhiding.
63           */
64          network_name = "MyNet";
65          network_desc = "This is My Network";
# Line 73 | Line 74 | serverinfo {
74           * vhost: the IP to bind to when we connect outward to ipv4 servers.
75           * This should be an ipv4 IP only, or "*" for INADDR_ANY.
76           */
77 <        #vhost = "192.169.0.1";
77 > #       vhost = "192.169.0.1";
78  
79          /*
80 <         * vhost6: the IP to bind to when we connect outward to ipv6 servers.
81 <         * This should be an ipv6 IP only, or "*" for INADDR_ANY.
80 >         * vhost6: the address to bind to when we make outgoing connections
81 >         * to IPv6 servers. This should be an IPv6 address, or "*" for INADDR_ANY.
82           */
83 <        #vhost6 = "3ffe:80e8:546::2";
83 > #       vhost6 = "3ffe:80e8:546::2";
84  
85 <        /* max_clients: the maximum number of clients allowed to connect */
85 >        /* max_clients: the maximum number of clients allowed to connect. */
86          max_clients = 512;
87  
88          /*
# Line 98 | Line 99 | serverinfo {
99          max_topic_length = 160;
100  
101          /*
102 <         * rsa_private_key_file: the path to the file containing our
103 <         * rsa key for cryptlink.
102 >         * rsa_private_key_file: the path to the file containing the
103 >         * RSA key.
104 >         *
105 >         * Example commands to store a 2048 bit RSA key in rsa.key:
106           *
104         * Example command to store a 2048 bit RSA keypair in
105         * rsa.key, and the public key in rsa.pub:
106         *
107           *      openssl genrsa -out rsa.key 2048
108 <         *      openssl rsa -in rsa.key -pubout -out rsa.pub
109 <         *      chown <ircd-user>.<ircd.group> rsa.key rsa.pub
108 >         *      chown <ircd-user>.<ircd.group> rsa.key
109           *      chmod 0600 rsa.key
111         *      chmod 0644 rsa.pub
110           */
111 <        #rsa_private_key_file = "/usr/local/ircd/etc/rsa.key";
111 > #       rsa_private_key_file = "etc/rsa.key";
112  
113          /*
114           * ssl_certificate_file: the path to the file containing our
115 <         * ssl certificate for encrypted client connection.
115 >         * SSL certificate for encrypted client connection.
116           *
117           * This assumes your private RSA key is stored in rsa.key. You
118 <         * MUST have an RSA key in order to generate the certificate
118 >         * MUST have an RSA key in order to generate the certificate.
119 >         *
120 >         * Example command:
121           *
122           *      openssl req -new -days 365 -x509 -key rsa.key -out cert.pem
123           *
# Line 130 | Line 130 | serverinfo {
130           *      Common Name: irc.someirc.net
131           *      E-mail: you@domain.com
132           */
133 <        #ssl_certificate_file = "/usr/local/ircd/etc/cert.pem";
133 > #       ssl_certificate_file = "etc/cert.pem";
134  
135          /*
136 <         * ssl_dh_param_file:
137 <         *
138 <         * Path to the PEM encoded Diffie-Hellman parameter file.
139 <         * DH parameters are strictly required when using ciphers
140 <         * with EDH (ephemeral Diffie-Hellman) key exchange.
136 >         * ssl_dh_param_file: path to the PEM encoded Diffie-Hellman
137 >         * parameter file. DH parameters are required when using
138 >         * ciphers with EDH (ephemeral Diffie-Hellman) key exchange.
139           *
140           * A DH parameter file can be created by running:
141           *
142 <         *      openssl dhparam -out dhparam.pem 1024
142 >         *      openssl dhparam -out dhparam.pem 2048
143           *
144           * Prime size must be at least 1024 bits. Further information
145           * regarding specific OpenSSL dhparam command-line options
146           * can be found in the OpenSSL manual.
147           */
148 <        #ssl_dh_param_file = "/usr/local/ircd/etc/dhparam.pem";
148 > #       ssl_dh_param_file = "etc/dhparam.pem";
149  
150          /*
151 <         * ssl_cipher_list:
151 >         * ssl_dh_elliptic_curve: defines the curve to use for the
152 >         * Elliptic Curve Diffie-Hellman (ECDH) algorithm.
153 >         * Default is ANSI X9.62 prime256v1/secp256r1 if nothing else is specified.
154           *
155 <         * List of ciphers that are supported by _this_ server. Can be used to
156 <         * enforce specific ciphers for incoming SSL/TLS connections.
157 <         * If a client (which also includes incoming server connections) isn't
158 <         * capable of any cipher listed below, the connection will simply be
159 <         * rejected.
155 >         * A list of supported curves by OpenSSL can be obtained by running:
156           *
157 <         * A list of supported ciphers can be obtained by running:
157 >         *      openssl ecparam -list_curves
158 >         */
159 > #       ssl_dh_elliptic_curve = "secp521r1";
160 >
161 >        /*
162 >         * ssl_cipher_list: list of ciphers to support on _this_ server.
163 >         * Can be used to enforce specific ciphers for incoming SSL/TLS
164 >         * connections. If a client (which also includes incoming server connections)
165 >         * is not capable of using any of the ciphers listed here, the connection will
166 >         * simply be rejected.
167 >         *
168 >         * A list of supported ciphers by OpenSSL can be obtained by running:
169           *
170           *      openssl ciphers -ssl3 -tls1 -v
171           *
172           * Multiple ciphers are separated by colons. The order of preference is
173           * from left to right.
174           */
175 <        #ssl_cipher_list = "DHE-RSA-AES256-SHA:AES256-SHA";
175 > #       ssl_cipher_list = "ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-SHA:AES256-SHA";
176  
177          /*
178 <         * ssl_server_method:
179 <         * ssl_client_method:
178 >         * ssl_message_digest_algorithm: defines what cryptographic hash function
179 >         * to use for generating fingerprint hashes of X.509 certificates.
180 >         * Default is SHA-256 if nothing else is specified.
181 >         *
182 >         * A list of supported message digest algorithms by OpenSSL can be obtained by running:
183           *
184 <         * SSL/TLS methods we provide for incoming (server method) and
175 <         * outgoing (client method) SSL/TLS connections.
176 <         * This can be either sslv3 for SSLv3, and/or tlsv1 for TLSv1.
184 >         *      openssl list-message-digest-algorithms
185           */
186 <        #ssl_server_method = tlsv1, sslv3;
179 <        #ssl_client_method = tlsv1;
186 > #       ssl_message_digest_algorithm = "sha256";
187   };
188  
189   /*
190 < * admin {}:  contains admin information about the server
190 > * admin {}:  contains administrative information about the server
191   */
192   admin {
193          name = "Smurf target";
# Line 192 | Line 199 | admin {
199   * class {}:  contains information about classes for users
200   */
201   class {
202 <        /* name: the name of the class */
202 >        /* name: the name of the class. */
203          name = "users";
204  
205          /*
# Line 203 | Line 210 | class {
210  
211          /*
212           * number_per_ip: how many local users are allowed to connect
213 <         * from one IP  (optional)
213 >         * from a single IP address (optional)
214           */
215          number_per_ip = 2;
216  
217          /*
218           * max_local: how many local users are allowed to connect
219 <         * from one ident@host  (optional)
219 >         * from a single ident@host (optional)
220           */
221          max_local = 2;
222  
223          /*
224 <         * max_global: network-wide limit of users per ident@host  (optional)
224 >         * max_global: network-wide limit of users per ident@host (optional)
225           */
226          max_global = 10;
227  
# Line 224 | Line 231 | class {
231          max_number = 100;
232  
233          /*
234 <         * the following lines are optional and allow you to define
235 <         * how many users can connect from one /NN subnet
234 >         * The following lines are optional and allow you to define
235 >         * how many users can connect from one /NN subnet.
236           */
237          cidr_bitlen_ipv4 = 24;
238          cidr_bitlen_ipv6 = 120;
239          number_per_cidr = 16;
240  
241          /*
242 <         * sendq: the amount of data allowed in a clients send queue before
242 >         * sendq: the amount of data allowed in a client's send queue before
243           * they are dropped.
244           */
245          sendq = 100 kbytes;
246  
247          /*
248 <         * recvq: maximum amount of data in a clients receive queue before
249 <         * they are dropped for flooding. Defaults to 2560 if the chosen
250 <         * value isn't within the range of 512 to 8000.
248 >         * recvq: the amount of data allowed in a client's receive queue before
249 >         * they are dropped for flooding. Defaults to 2560 if the chosen value
250 >         * isn't within the range of 512 to 8000.
251           */
252          recvq = 2560 bytes;
253   };
# Line 253 | Line 260 | class {
260          sendq = 100 kbytes;
261  
262          /*
263 <         * min_idle: minimum idle time that is shown in /whois
263 >         * max_channels: maximum number of channels users in this class can join.
264 >         */
265 >        max_channels = 60;
266 >
267 >        /*
268 >         * min_idle: minimum idle time that is shown in /whois.
269           */
270          min_idle = 3 hours;
271  
272          /*
273 <         * max_idle: maximum idle time that is shown in /whois
273 >         * max_idle: maximum idle time that is shown in /whois.
274           */
275          max_idle = 8 hours;
276  
277          /*
278           * flags:
279           *
280 <         * random_idle          - idle time is randomly selected within the
281 <         *                        range of min_idle to max_idle
282 <         * hide_idle_from_opers - fake idle time will be shown to operators, too
280 >         * random_idle          - a fake idle time is set randomly between
281 >         *                        min_idle and max_idle
282 >         * hide_idle_from_opers - the fake idle time will also be shown to operators
283           */
284          flags = random_idle, hide_idle_from_opers;
285   };
# Line 277 | Line 289 | class {
289          ping_time = 90 seconds;
290  
291          /*
292 <         * connectfreq: only used in server classes.  Specifies the delay
292 >         * connectfreq: only used in server classes. Specifies the delay
293           * between autoconnecting to servers.
294           */
295          connectfreq = 5 minutes;
296  
297 <        /* max number: the amount of servers to autoconnect to */
297 >        /* max number: the number of servers to autoconnect to. */
298          max_number = 1;
299  
300 <        /* sendq: servers need a higher sendq as they send more data */
300 >        /* sendq: servers need a higher sendq as they send more data. */
301          sendq = 2 megabytes;
302   };
303  
304   /*
305 + * motd {}: Allows the display of a different MOTD to a client
306 + * depending on its origin. Applies to local users only.
307 + */
308 + motd {
309 +        /*
310 +         * mask: multiple mask entries are permitted. Mask can either be
311 +         * a class name or a hostname. CIDR is supported.
312 +         */
313 +        mask = "*.at";
314 +        mask = "*.de";
315 +        mask = "*.ch";
316 +
317 +        /*
318 +         * file: path to the actual motd file.
319 +         */
320 +        file = "etc/german.motd";
321 + };
322 +
323 + /*
324   * listen {}:  contains information about the ports ircd listens on
325   */
326   listen {
327          /*
328 <         * port: the specific port to listen on.  If no host is specified
329 <         * before, it will listen on all available IPs.
328 >         * port: the port to listen on. If no host is specified earlier
329 >         * in the listen {} block, it will listen on all available IPs.
330           *
331 <         * Ports are separated via a comma, a range may be specified using ".."
331 >         * Ports are separated by commas; a range may be specified using ".."
332           */
333 <        
334 <        /* port: listen on all available IPs, ports 6665 to 6669 */
333 >
334 >        /* port: listen on all available IP addresses, ports 6665 to 6669. */
335          port = 6665 .. 6669;
336  
337          /*
338 <         * Listen on 192.168.0.1/6697 with ssl enabled and hidden from STATS P
338 >         * Listen on 192.168.0.1/6697 with SSL enabled and hidden from STATS P
339           * unless you are an administrator.
340           *
341 <         * NOTE: The "flags" directive has to come before "port".  Always!
341 >         * NOTE: The "flags" directive always has to come before "port".
342           *
343           * Currently available flags are:
344           *
# Line 320 | Line 351 | listen {
351          port = 6697;
352  
353          /*
354 <         * host: set a specific IP/host the ports after the line will listen
355 <         * on.  This may be ipv4 or ipv6.
354 >         * host: set a specific IP address/host to listen on using the
355 >         * subsequent port definitions. This may be IPv4 or IPv6.
356           */
357          host = "1.2.3.4";
358          port = 7000, 7001;
# Line 336 | Line 367 | listen {
367   auth {
368          /*
369           * user: the user@host allowed to connect. Multiple user
370 <         * lines are permitted per auth block.
370 >         * lines are permitted within each auth {} block.
371           */
372          user = "*@172.16.0.0/12";
373          user = "*test@123D:B567:*";
374  
375 <        /* password: an optional password that is required to use this block */
375 >        /* password: an optional password that is required to use this block. */
376          password = "letmein";
377  
378          /*
# Line 351 | Line 382 | auth {
382          encrypted = yes;
383  
384          /*
385 <         * spoof: fake the users host to this.  This is free-form,
386 <         * just do everyone a favor and don't abuse it. ('=' prefix on /stats I)
385 >         * spoof: fake the user's host to this. This is free-form, just do
386 >         * everyone a favor and don't abuse it. ('=' prefix on /stats I)
387           */
388          spoof = "I.still.hate.packets";
389  
390 <        /* class: the class the user is placed in */
390 >        /* class: the class the user is placed in. */
391          class = "opers";
392  
393          /*
394 <         * need_password - don't allow users who haven't supplied the correct
395 <         *                 password to connect using another auth{} block
396 <         *                 ('&' prefix on /stats I if disabled)
366 <         * need_ident    - require the user to have identd to connect ('+' prefix on /stats I)
394 >         * need_password - don't allow users who haven't supplied the correct  | ('&' prefix on /stats I if disabled)
395 >         *                 password to connect using another auth {} block
396 >         * need_ident    - require the user to have identd to connect          | ('+' prefix on /stats I)
397           * spoof_notice  - enable spoofing notification to admins
398 <         * exceed_limit  - allow a user to exceed class limits ('>' prefix on /stats I)
399 <         * kline_exempt  - exempt this user from k/glines ('^' prefix on /stats I)
400 <         * gline_exempt  - exempt this user from glines ('_' prefix on /stats I)
401 <         * resv_exempt   - exempt this user from resvs ('$' prefix on /stats I)
402 <         * no_tilde      - remove ~ from a user with no ident ('-' prefix on /stats I)
403 <         * can_flood     - allow this user to exceed flood limits ('|' prefix on /stats I)
404 <         * webirc        - enables WEBIRC authentication for web-based clients such as Mibbit
405 <         *                 ('<' prefix on /stats I)
398 >         * exceed_limit  - allow a user to exceed class limits                 | ('>' prefix on /stats I)
399 >         * kline_exempt  - exempt this user from k/glines                      | ('^' prefix on /stats I)
400 >         * gline_exempt  - exempt this user from glines                        | ('_' prefix on /stats I)
401 >         * resv_exempt   - exempt this user from resvs                         | ('$' prefix on /stats I)
402 >         * no_tilde      - remove ~ from a user with no ident                  | ('-' prefix on /stats I)
403 >         * can_flood     - allow this user to exceed flood limits              | ('|' prefix on /stats I)
404 >         * webirc        - enables WEBIRC authentication for web-based         | ('<' prefix on /stats I)
405 >         *                 clients such as Mibbit
406           */
407          flags = need_password, spoof_notice, exceed_limit, kline_exempt,
408                  gline_exempt, resv_exempt, no_tilde, can_flood;
# Line 380 | Line 410 | auth {
410  
411   auth {
412          /*
413 <         * redirect: the server and port to redirect a user to.  A user does
414 <         * not have to obey the redirection, the ircd just suggests an alternative
415 <         * server for them.
413 >         * redirserv, redirport: the server and port to redirect a user to.
414 >         * A user does not have to obey the redirection; the ircd just
415 >         * suggests an alternative server for them.
416           */
417 <        redirserv = "this.is.not.a.real.server";
417 >        redirserv = "server.tld";
418          redirport = 6667;
389        
390        user = "*.server";
419  
420 <        /* class: a class is required even though it is not used */
420 >        user = "*@*.tld";
421 >
422 >        /* class: a class is required even though it is not used. */
423          class = "users";
424   };
425  
# Line 401 | Line 431 | auth {
431  
432   /*
433   * operator {}:  defines ircd operators
404 *
405 * ircd-hybrid no longer supports local operators, privileges are
406 * controlled via flags.
434   */
435   operator {
436 <        /* name: the name of the oper */
436 >        /* name: the name of the operator */
437          name = "sheep";
438  
439          /*
440 <         * user: the user@host required for this operator. Multiple
441 <         * user="" lines are supported.
440 >         * user: the user@host required for this operator. Multiple user
441 >         * lines are permitted within each operator {} block.
442           */
443          user = "*sheep@192.168.0.0/16";
444          user = "*@127.0.0.0/8";
445  
446          /*
447 <         * password: the password required to oper.  By default this will
447 >         * password: the password required to oper. By default this will
448           * need to be encrypted by using the provided mkpasswd tool.
449           * Several password hash algorithms are available depending
450           * on your system's crypt() implementation. For example, a modern
451 <         * glibc already has support for SHA-256/512, and MD5 encryption
451 >         * glibc already has support for the SHA-256/512 and MD5 encryption
452           * algorithms.
453           */
454          password = "$5$x5zof8qe.Yc7/bPp$5zIg1Le2Lsgd4CvOjaD20pr5PmcfD7ha/9b2.TaUyG4";
455  
456          /*
457           * encrypted: controls whether the oper password above has been
458 <         * encrypted.
458 >         * encrypted. Default is 'yes' if nothing else is specified.
459           */
460          encrypted = yes;
461  
462          /*
463 <         * rsa_public_key_file: the public key for this oper when using Challenge.
464 <         * A password should not be defined when this is used, see
463 >         * rsa_public_key_file: the public key for this oper when using /challenge.
464 >         * A password should not be defined when this is used; see
465           * doc/challenge.txt for more information.
466           */
467 < #       rsa_public_key_file = "/usr/local/ircd/etc/oper.pub";
467 > #       rsa_public_key_file = "etc/oper.pub";
468 >
469 >        /*
470 >         * ssl_certificate_fingerprint: enhances security by additionally checking
471 >         * the oper's client certificate fingerprint against the specified
472 >         * fingerprint below.
473 >         *
474 >         * Hint: your users can use the following command to obtain a SHA-256 hash
475 >         * of their ssl certificate:
476 >         *
477 >         *      openssl x509 -sha256 -noout -fingerprint -in cert.pem | sed -e 's/^.*=//;s/://g'
478 >         */
479 > #       ssl_certificate_fingerprint = "4C62287BA6776A89CD4F8FF10A62FFB35E79319F51AF6C62C674984974FCCB1D";
480  
481 <        /* class: the class the oper joins when they successfully /oper */
481 >        /*
482 >         * ssl_connection_required: client must be connected over SSL/TLS
483 >         * in order to be able to use this operator {} block.
484 >         * Default is 'no' if nothing else is specified.
485 >         */
486 >        ssl_connection_required = no;
487 >
488 >        /* class: the class the oper joins when they successfully /oper or /challenge. */
489          class = "opers";
490  
491          /*
492 <         * umodes: default usermodes opers get when they /oper.  If defined,
493 <         * it will override oper_umodes settings in general {}.
492 >         * umodes: the default usermodes opers get when they /oper or /challenge.
493 >         * If defined, it will override oper_umodes settings in general {}.
494           * Available usermodes:
495           *
496           * +b - bots         - See bot and drone flooding notices
497           * +c - cconn        - Client connection/quit notices
452         * +C - cconn_full   - Client connection/quit notices full
498           * +D - deaf         - Don't receive channel messages
499           * +d - debug        - See debugging notices
500           * +e - external     - See remote server connection and split notices
501 <         * +f - full         - See auth{} block full notices
501 >         * +F - farconnect   - Remote client connection/quit notices
502 >         * +f - full         - See auth {} block full notices
503           * +G - softcallerid - Server Side Ignore for users not on your channels
504           * +g - callerid     - Server Side Ignore (for privmsgs etc)
505           * +H - hidden       - Hides operator status to other users
506 <         * +i - invisible    - Not shown in NAMES or WHO unless you share a
461 <         *                     a channel
506 >         * +i - invisible    - Not shown in NAMES or WHO unless you share a channel
507           * +j - rej          - See rejected client notices
508           * +k - skill        - See server generated KILL messages
509           * +l - locops       - See LOCOPS messages
510           * +n - nchange      - See client nick changes
511 +         * +p - hidechans    - Hides channel list in WHOIS
512 +         * +q - hideidle     - Hides idle and signon time in WHOIS
513 +         * +R - nononreg     - Only receive private messages from registered clients
514           * +s - servnotice   - See general server notices
515           * +u - unauth       - See unauthorized client notices
516           * +w - wallop       - See server generated WALLOPS
517           * +y - spy          - See LINKS, STATS, TRACE notices etc.
470         * +z - operwall     - See oper generated WALLOPS
518           */
519 < #       umodes = locops, servnotice, operwall, wallop;
519 >        umodes = locops, servnotice, wallop;
520  
521          /*
522 <         * privileges: controls the activities and commands an oper is
523 <         * allowed to do on the server. All options default to no.
524 <         * Available options:
525 <         *
526 <         * module       - allows MODULE
527 <         * global_kill  - allows remote users to be /KILL'd
528 <         * remote       - allows remote SQUIT and CONNECT
529 <         * remoteban    - allows remote KLINE/UNKLINE
530 <         * dline        - allows DLINE
531 <         * undline      - allows UNDLINE
532 <         * kline        - allows KILL and KLINE
533 <         * unkline      - allows UNKLINE
534 <         * gline        - allows GLINE
535 <         * xline        - allows XLINE
536 <         * globops      - allows GLOBOPS
537 <         * operwall     - allows OPERWALL
538 <         * nick_changes - allows oper to see nickchanges via usermode +n
539 <         * rehash       - allows oper to REHASH config
540 <         * die          - allows DIE
541 <         * restart      - allows RESTART
542 <         * set          - allows SET
543 <         * admin        - gives admin privileges. admins for example,
544 <         *                may see the real IP addresses of servers.
522 >         * privileges: controls the activities and commands an oper is
523 >         * allowed to do on the server. All flags default to 'no'.
524 >         * Available flags:
525 >         *
526 >         * admin          - gives administrator privileges    | ('A' flag)
527 >         * connect        - allows local CONNECT              | ('P' flag)
528 >         * connect:remote - allows remote CONNECT             | ('Q' flag)
529 >         * die            - allows DIE                        | ('D' flag)
530 >         * dline          - allows DLINE                      |
531 >         * gline          - allows GLINE                      | ('G' flag)
532 >         * globops        - allows GLOBOPS                    |
533 >         * kill           - allows to KILL local clients      | ('N' flag)
534 >         * kill:remote    - allows remote users to be /KILL'd | ('O' flag)
535 >         * kline          - allows KLINE                      | ('K' flag)
536 >         * locops         - allows LOCOPS                     |
537 >         * module         - allows MODULE                     |
538 >         * rehash         - allows oper to REHASH config      | ('H' flag)
539 >         * remoteban      - allows remote KLINE/UNKLINE       | ('B' flag)
540 >         * restart        - allows RESTART                    |
541 >         * set            - allows SET                        |
542 >         * squit          - allows local SQUIT                | ('R' flag)
543 >         * squit:remote   - allows remote SQUIT               | ('S' flag)
544 >         * undline        - allows UNDLINE                    |
545 >         * unkline        - allows UNKLINE                    | ('U' flag)
546 >         * unxline        - allows UNXLINE                    |
547 >         * wallops        - allows WALLOPS                    |
548 >         * xline          - allows XLINE                      | ('X' flag)
549           */
550 <        flags = global_kill, remote, kline, unkline, xline, globops, restart,
551 <                die, rehash, nick_changes, admin, operwall, module;
550 >        flags = admin, connect, connect:remote, die, globops, kill, kill:remote,
551 >                kline, module, rehash, restart, set, unkline, unxline, xline;
552   };
553  
554   /*
555 < * service {}: specifies what server may act as a network service
555 > * service {}: specifies a server which may act as a network service
556   *
557 < * NOTE: it is absolutely important that every single server on the network
558 < *       has the same service{} block.
557 > * NOTE: it is very important that every server on the network
558 > *       has the same service {} block.
559   */
560   service {
561          name = "service.someserver";
# Line 512 | Line 563 | service {
563   };
564  
565   /*
566 < * connect {}:  controls servers we connect to
566 > * connect {}: define a server to connect to
567   */
568   connect {
569 <        /* name: the name of the server */
569 >        /* name: the name of the server. */
570          name = "irc.uplink.com";
571  
572          /*
573 <         * host: the host or IP to connect to.  If a hostname is used it
574 <         * must match the reverse dns of the server.
573 >         * host: the host or IP address to connect to. If a hostname is used it
574 >         * must match the reverse DNS of the server.
575           */
576          host = "192.168.0.1";
577  
578          /*
579 <         * vhost: the IP to bind to when we connect outward to servers.
579 >         * vhost: the IP address to bind to when making outgoing connections to
580 >         * servers.
581           * serverinfo::vhost and serverinfo::vhost6 will be overridden
582           * by this directive.
583           */
584          vhost = "192.168.0.2";
585  
586          /*
587 <         * passwords: the passwords we send (OLD C:) and accept (OLD N:).
588 <         * The remote server will have these passwords reversed.
587 >         * send_password, accept_password: the passwords to send and accept.
588 >         * The remote server will have these passwords swapped.
589           */
590          send_password = "password";
591          accept_password = "anotherpassword";
# Line 544 | Line 596 | connect {
596           */
597          encrypted = no;
598  
599 <        /* port: the port to connect to this server on */
599 >        /* port: the port to connect to this server on. */
600          port = 6666;
601  
602          /*
603 <         * hub_mask: the mask of servers that this server may hub.  Multiple
604 <         * entries are permitted
603 >         * hub_mask: the mask of servers that this server may hub. Multiple
604 >         * entries are permitted.
605           */
606          hub_mask = "*";
607  
608          /*
609 <         * leaf_mask: the mask of servers this server may not hub.  Multiple
610 <         * entries are permitted.  Useful for forbidding EU -> US -> EU routes.
609 >         * leaf_mask: the mask of servers this server may not hub. Multiple
610 >         * entries are permitted. Useful for forbidding EU -> US -> EU routes.
611           */
612   #       leaf_mask = "*.uk";
613  
614 <        /* class: the class this server is in */
614 >        /* class: the class this server is in. */
615          class = "server";
616  
617          /*
618 <         * ssl_cipher_list:
619 <         *
620 <         * List of ciphers that the server we are connecting to must support.
569 <         * If the server isn't capable of any cipher listed below, the
570 <         * connection will simply be rejected.
618 >         * ssl_cipher_list: list of ciphers that the server we are connecting to
619 >         * must support. If the server is not capable of using any of the ciphers
620 >         * listed below, the connection will simply be rejected.
621           * Can be used to enforce stronger ciphers, even though this option
622           * is not necessarily required to establish a SSL/TLS connection.
623           *
624           * Multiple ciphers are separated by colons. The order of preference
625           * is from left to right.
626           */
627 <        #ssl_cipher_list = "DHE-RSA-AES256-SHA:AES256-SHA";
627 > #       ssl_cipher_list = "ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-SHA:AES256-SHA";
628 >
629 >        /*
630 >         * ssl_certificate_fingerprint: enhances security by additionally checking
631 >         * the server's client certificate fingerprint against the specified
632 >         * fingerprint below.
633 >         */
634 > #       ssl_certificate_fingerprint = "4C62287BA6776A89CD4F8FF10A62FFB35E79319F51AF6C62C674984974FCCB1D";
635  
636          /*
637           * autoconn   - controls whether we autoconnect to this server or not,
# Line 605 | Line 662 | connect {
662   */
663   cluster {
664          /*
665 <         * name: the server to share with, this can take wildcards
665 >         * name: the server to share with; this can take wildcards
666           *
667 <         * NOTE: only local actions will be clustered, meaning if
667 >         * NOTE: only local actions will be clustered, meaning that if
668           *       the server receives a shared kline/unkline/etc, it
669           *       will not be propagated to clustered servers.
670           *
671           *       Remote servers are not necessarily required to accept
672 <         *       clustered lines, they need a shared{} for *THIS* server
673 <         *       in order to accept them.
672 >         *       clustered lines, they need a shared {} block for *THIS*
673 >         *       server in order to accept them.
674           */
675          name = "*.arpa";
676  
677          /*
678 <         * type: list of what to share, options are as follows:
678 >         * type: list of what to share; options are as follows:
679           *      dline   - share dlines
680           *      undline - share undlines
681           *      kline   - share klines
# Line 636 | Line 693 | cluster {
693   /*
694   * shared {}: users that are allowed to remote kline
695   *
696 < * NOTE: This can be effectively used for remote klines.
696 > * NOTE: This can effectively be used for remote klines.
697   *       Please note that there is no password authentication
698 < *       for users setting remote klines.  You must also be
698 > *       for users setting remote klines. You must also be
699   *       /oper'd in order to issue a remote kline.
700   */
701   shared {
702          /*
703 <         * name: the server the user must be on to set klines.  If this is not
704 <         * specified, the user will be allowed to kline from all servers.
703 >         * name: the server the user must be connected to in order to set klines.
704 >         * If this is not specified, the user will be allowed to kline from all
705 >         * servers.
706           */
707          name = "irc2.some.server";
708  
709          /*
710 <         * user: the user@host mask that is allowed to set klines.  If this is
710 >         * user: the user@host mask that is allowed to set klines. If this is
711           * not specified, all users on the server above will be allowed to set
712           * a remote kline.
713           */
# Line 673 | Line 731 | shared {
731  
732   /*
733   * kill {}:  users that are not allowed to connect
734 < * Oper issued klines will be added to the specified kline config
734 > * Oper issued klines will be added to the specified kline database
735   */
736   kill {
737          user = "bad@*.hacked.edu";
738          reason = "Obviously hacked account";
739   };
740  
683 kill {
684        user = "^O[[:alpha:]]?[[:digit:]]+(x\.o|\.xo)$@^[[:alnum:]]{4}\.evilnet.tld$";
685
686        /*
687         * NOTE: You have to set type=regex; when using a regular expression
688         * based user entry
689         */
690        type = regex;
691 };
692
741   /*
742 < * deny {}:  IPs that are not allowed to connect (before DNS/ident lookup)
743 < * Oper issued dlines will be added to the specified dline config
742 > * deny {}:  IP addresses that are not allowed to connect
743 > * (before DNS/ident lookup)
744 > * Oper issued dlines will be added to the specified dline database
745   */
746   deny {
747          ip = "10.0.1.0/24";
# Line 700 | Line 749 | deny {
749   };
750  
751   /*
752 < * exempt {}: IPs that are exempt from deny {} and Dlines
752 > * exempt {}:  IP addresses that are exempt from deny {} and Dlines
753   */
754   exempt {
755          ip = "192.168.0.0/16";
# Line 709 | Line 758 | exempt {
758   /*
759   * resv {}:  nicks and channels users may not use/join
760   */
761 < resv { nick = "clone*"; reason = "Clone bots"; };
762 < resv { nick = "NickServ"; reason = "Reserved for services"; };
763 < resv { nick = "OperServ"; reason = "Reserved for services"; };
764 < resv { nick = "MemoServ"; reason = "Reserved for services"; };
765 < resv { nick = "BotServ"; reason = "Reserved for services"; };
766 < resv { nick = "HelpServ"; reason = "Reserved for services"; };
767 < resv { nick = "HostServ"; reason = "Reserved for services"; };
768 < resv { nick = "StatServ"; reason = "Reserved for services"; };
769 < resv { channel = "#*services*"; reason = "Reserved for services"; };
761 > resv { mask = "clone*"; reason = "Clone bots"; };
762 > resv { mask = "Global"; reason = "Reserved for services"; };
763 > resv { mask = "ChanServ"; reason = "Reserved for services"; };
764 > resv { mask = "NickServ"; reason = "Reserved for services"; };
765 > resv { mask = "OperServ"; reason = "Reserved for services"; };
766 > resv { mask = "MemoServ"; reason = "Reserved for services"; };
767 > resv { mask = "BotServ"; reason = "Reserved for services"; };
768 > resv { mask = "HelpServ"; reason = "Reserved for services"; };
769 > resv { mask = "HostServ"; reason = "Reserved for services"; };
770 > resv { mask = "StatServ"; reason = "Reserved for services"; };
771 > resv { mask = "#*services*"; reason = "Reserved for services"; };
772 >
773 > resv {
774 >        /*
775 >         * mask: masks starting with a '#' are automatically considered
776 >         * as channel name masks.
777 >         */
778 >        mask = "#helsinki";
779 >        reason = "Channel is reserved for Finnish inhabitants";
780 >
781 >        /*
782 >         * exempt: can be either a ISO 3166 alpha-2 two letter country
783 >         * code, or a nick!user@host mask. CIDR is supported. Exempt
784 >         * entries can be stacked.
785 >         */
786 >        exempt = "FI";
787 > };
788  
789   /*
790 < * gecos {}:  The X: replacement, used for banning users based on
724 < * their "realname".
790 > * gecos {}:  used for banning users based on their "realname".
791   */
792   gecos {
793          name = "*sex*";
# Line 733 | Line 799 | gecos {
799          reason = "Trojan drone";
800   };
801  
802 < gecos {
803 <        name = "^\[J[0o]hn Do[3e]\]-[0-9]{2,5}$";
802 > /*
803 > * pseudo {}: adds pseudo/custom commands also known as service aliases
804 > */
805 > pseudo {
806 >        /* command: the actual command/alias */
807 >        command = "IDENTIFY";
808  
809 <        /*
810 <         * NOTE: You have to set type=regex; when using a regular expression
811 <         * based name entry
812 <         */
813 <        type = regex;
809 >        /* prepend: optional text that can be prepended before the user's message */
810 >        prepend = "IDENTIFY ";
811 >
812 >        /* name: the service name, used for error messages */
813 >        name = "NickServ";
814 >
815 >        /* target: the actual target where this message should be sent to */
816 >        target = "NickServ@service.someserver";
817 > };
818 >
819 > pseudo {
820 >        command = "CHANSERV";
821 >        name = "ChanServ";
822 >        target = "ChanServ@service.someserver";
823 > };
824 >
825 > pseudo {
826 >        command = "CS";
827 >        name = "ChanServ";
828 >        target = "ChanServ@service.someserver";
829 > };
830 >
831 > pseudo {
832 >        command = "NICKSERV";
833 >        name = "NickServ";
834 >        target = "NickServ@service.someserver";
835 > };
836 >
837 > pseudo {
838 >        command = "NS";
839 >        name = "NickServ";
840 >        target = "NickServ@service.someserver";
841 > };
842 >
843 > pseudo {
844 >        command = "MEMOSERV";
845 >        name = "MemoServ";
846 >        target = "MemoServ@service.someserver";
847 > };
848 >
849 > pseudo {
850 >        command = "MS";
851 >        name = "MemoServ";
852 >        target = "MemoServ@service.someserver";
853 > };
854 >
855 > pseudo {
856 >        command = "OPERSERV";
857 >        name = "OperServ";
858 >        target = "OperServ@service.someserver";
859 > };
860 >
861 > pseudo {
862 >        command = "OS";
863 >        name = "OperServ";
864 >        target = "OperServ@service.someserver";
865 > };
866 >
867 > pseudo {
868 >        command = "HOSTSERV";
869 >        name = "HostServ";
870 >        target = "HostServ@service.someserver";
871 > };
872 >
873 > pseudo {
874 >        command = "HS";
875 >        name = "HostServ";
876 >        target = "HostServ@service.someserver";
877 > };
878 >
879 > pseudo {
880 >        command = "BOTSERV";
881 >        name = "BotServ";
882 >        target = "BotServ@service.someserver";
883 > };
884 >
885 > pseudo {
886 >        command = "BS";
887 >        name = "BotServ";
888 >        target = "BotServ@service.someserver";
889   };
890  
891   /*
892 < * channel {}:  The channel block contains options pertaining to channels
892 > * channel {}:  the channel block contains options pertaining to channels
893   */
894   channel {
895          /*
896           * disable_fake_channels: this option, if set to 'yes', will
897 <         * disallow clients to create or join channels that have one
897 >         * disallow clients from creating or joining channels that have one
898           * of the following ASCII characters in their name:
899           *
900           *   2 | bold
# Line 763 | Line 908 | channel {
908          disable_fake_channels = yes;
909  
910          /*
911 <         * restrict_channels: reverse channel RESVs logic, only reserved
912 <         * channels are allowed
911 >         * invite_client_count, invite_client_time: how many INVITE commands
912 >         * are permitted per client per invite_client_time.
913           */
914 <        restrict_channels = no;
914 >        invite_client_count = 10;
915 >        invite_client_time = 5 minutes;
916  
917          /*
918 <         * knock_delay: The amount of time a user must wait between issuing
919 <         * the knock command.
918 >         * knock_client_count, knock_client_time: how many KNOCK commands
919 >         * are permitted per client per knock_client_time.
920           */
921 <        knock_delay = 5 minutes;
921 >        knock_client_count = 1;
922 >        knock_client_time = 5 minutes;
923  
924          /*
925 <         * knock_delay_channel: How often a knock to any specific channel
926 <         * is permitted, regardless of the user sending the knock.
925 >         * knock_delay_channel: how often a KNOCK to any specific channel
926 >         * is permitted, regardless of the user sending the KNOCK.
927           */
928          knock_delay_channel = 1 minute;
929  
930          /*
931 <         * max_chans_per_user: The maximum number of channels a user can
932 <         * join/be on.
931 >         * max_channels: the maximum number of channels a user can join/be on.
932 >         * This is a default value which can be overriden with class {} blocks.
933           */
934 <        max_chans_per_user = 25;
788 <
789 <        /*
790 <         * max_chans_per_oper: The maximum number of channels an oper can
791 <         * join/be on.
792 <         */
793 <        max_chans_per_oper = 50;
794 <
795 <        /* quiet_on_ban: stop banned people talking in channels. */
796 <        quiet_on_ban = yes;
934 >        max_channels = 25;
935  
936          /* max_bans: maximum number of +b/e/I modes in a channel */
937          max_bans = 100;
938  
939          /*
940 <         * how many joins in how many seconds constitute a flood, use 0 to
940 >         * how many joins in how many seconds constitute a flood. Use 0 to
941           * disable. +b opers will be notified (changeable via /set)
942           */
943          join_flood_count = 16;
944          join_flood_time = 8 seconds;
945  
946          /*
947 <         * splitcode: The ircd will now check splitmode every few seconds.
947 >         * The ircd will now check splitmode (whether a server is split from
948 >         * the network) every few seconds; this functionality is known as
949 >         * splitcode and is influenced by the options below.
950           *
951           * Either split users or split servers can activate splitmode, but
952           * both conditions must be met for the ircd to deactivate splitmode.
953 <         *
953 >         *
954           * You may force splitmode to be permanent by /quote set splitmode on
955           */
956  
957          /*
958           * default_split_user_count: when the usercount is lower than this level,
959 <         * consider ourselves split.  This must be set for automatic splitmode.
959 >         * consider ourselves split. This must be set for automatic splitmode.
960           */
961          default_split_user_count = 0;
962  
963          /*
964           * default_split_server_count: when the servercount is lower than this,
965 <         * consider ourselves split.  This must be set for automatic splitmode.
965 >         * consider ourselves split. This must be set for automatic splitmode.
966           */
967          default_split_server_count = 0;
968  
969 <        /* no_create_on_split: disallow users creating channels on split. */
969 >        /* no_create_on_split: do not allow users to create channels on split. */
970          no_create_on_split = yes;
971  
972 <        /* no_join_on_split: disallow users joining channels at all on a split. */
972 >        /* no_join_on_split: do not allow users to join channels on a split. */
973          no_join_on_split = no;
974   };
975  
976   /*
977 < * serverhide {}:  The serverhide block contains the options regarding
978 < * serverhiding
977 > * serverhide {}:  the serverhide block contains the options regarding
978 > * to server hiding. For more information regarding server hiding,
979 > * please see doc/serverhide.txt
980   */
981   serverhide {
982          /*
983 +         * disable_remote_commands: disable users issuing commands
984 +         * on remote servers.
985 +         */
986 +        disable_remote_commands = no;
987 +
988 +        /*
989           * flatten_links: this option will show all servers in /links appear
990 <         * that they are linked to this current server
990 >         * as though they are linked to this current server.
991           */
992          flatten_links = no;
993  
# Line 852 | Line 999 | serverhide {
999  
1000          /*
1001           * hidden: hide this server from a /links output on servers that
1002 <         * support it.  This allows hub servers to be hidden etc.
1002 >         * support it. This allows hub servers to be hidden etc.
1003           */
1004          hidden = no;
1005  
# Line 863 | Line 1010 | serverhide {
1010          hide_servers = no;
1011  
1012          /*
1013 <         * Use this as the servername users see if hide_servers = yes.
1013 >         * hide_services: define this if you want to hide the location of
1014 >         * services servers that are specified in the service {} block.
1015 >         */
1016 >        hide_services = no;
1017 >
1018 >        /*
1019 >         * hidden_name: use this as the servername users see if hide_servers = yes.
1020           */
1021          hidden_name = "*.hidden.com";
1022  
1023          /*
1024 <         * hide_server_ips: If this is disabled, opers will be unable to see
1025 <         * servers ips and will be shown a masked ip, admins will be shown the
1026 <         * real ip.
1027 <         *
1028 <         * If this is enabled, nobody can see a servers ip. *This is a kludge*,
1029 <         * it has the side effect of hiding the ips everywhere, including
1030 <         * logfiles.
1024 >         * hide_server_ips: if this is disabled, opers will be unable to see
1025 >         * servers' IP addresses and will be shown a masked IP address; admins
1026 >         * will be shown the real IP address.
1027 >         *
1028 >         * If this is enabled, nobody can see a server's IP address.
1029 >         * *This is a kludge*: it has the side effect of hiding the IP addresses
1030 >         * everywhere, including logfiles.
1031           *
1032           * We recommend you leave this disabled, and just take care with who you
1033           * give administrator privileges to.
# Line 883 | Line 1036 | serverhide {
1036   };
1037  
1038   /*
1039 < * general {}:  The general block contains many of the options that were once
1039 > * general {}:  the general block contains many of the options that were once
1040   * compiled in options in config.h
1041   */
1042   general {
1043 <        /* services_name: servername of nick/channel services */
1044 <        services_name = "service.someserver";
1043 >        /*
1044 >         * cycle_on_host_change: sends a fake QUIT/JOIN combination
1045 >         * when services change the hostname of a specific client.
1046 >         */
1047 >        cycle_on_host_change = yes;
1048  
1049          /* max_watch: maximum WATCH entries a client can have. */
1050 <        max_watch = 60;
1050 >        max_watch = 30;
1051 >
1052 >        /* max_accept: maximum allowed /accept's for +g usermode. */
1053 >        max_accept = 30;
1054  
1055 <        /* gline_enable: enable glines, network wide temp klines */
1055 >        /* gline_enable: enable glines (network-wide temporary klines). */
1056          gline_enable = yes;
1057  
1058          /*
1059 <         * gline_duration: the amount of time a gline will remain on your
1060 <         * server before expiring
1059 >         * gline_duration: the amount of time a G-line will remain on your
1060 >         * server before expiring.
1061           */
1062          gline_duration = 1 day;
1063  
1064          /*
1065 <         * gline_request_duration:  how long a pending G-line can be around.
1066 <         * 10 minutes should be plenty
1065 >         * gline_request_duration: how long a pending G-line can be around.
1066 >         * 10 minutes should be plenty.
1067           */
1068          gline_request_duration = 10 minutes;
1069  
1070          /*
1071           * gline_min_cidr: the minimum required length of a CIDR bitmask
1072 <         * for IPv4 based glines
1072 >         * for IPv4 based G-lines.
1073           */
1074          gline_min_cidr = 16;
1075  
1076          /*
1077           * gline_min_cidr6: the minimum required length of a CIDR bitmask
1078 <         * for IPv6 based glines
1078 >         * for IPv6 based G-lines.
1079           */
1080          gline_min_cidr6 = 48;
1081  
1082          /*
1083 <         * Whether to automatically set mode +i on connecting users.
1083 >         * invisible_on_connect: whether to automatically set mode +i on
1084 >         * connecting users.
1085           */
1086          invisible_on_connect = yes;
1087  
1088          /*
1089 <         * Max time from the nickname change that still causes KILL
1090 <         * automatically to switch for the current nick of that user.
1089 >         * kill_chase_time_limit: KILL chasing is a feature whereby a KILL
1090 >         * issued for a user who has recently changed nickname will be applied
1091 >         * automatically to the new nick. kill_chase_time_limit is the maximum
1092 >         * time following a nickname change that this chasing will apply.
1093           */
1094 <        kill_chase_time_limit = 90 seconds;
1094 >        kill_chase_time_limit = 30 seconds;
1095  
1096          /*
1097 <         * If hide_spoof_ips is disabled, opers will be allowed to see the real
1098 <         * IP of spoofed users in /trace etc. If this is defined they will be
1099 <         * shown a masked IP.
1097 >         * hide_spoof_ips: if disabled, opers will be allowed to see the real
1098 >         * IP address of spoofed users in /trace etc. If this is defined they
1099 >         * will be shown a masked IP.
1100           */
1101          hide_spoof_ips = yes;
1102  
1103          /*
1104 <         * Ignore bogus timestamps from other servers.  Yes, this will desync
1105 <         * the network, but it will allow chanops to resync with a valid non TS 0
1104 >         * ignore_bogus_ts: ignore bogus timestamps from other servers.
1105 >         * Yes, this will desync the network, but it will allow chanops
1106 >         * to resync with a valid non TS 0.
1107           *
1108           * This should be enabled network wide, or not at all.
1109           */
# Line 952 | Line 1115 | general {
1115           */
1116          disable_auth = no;
1117  
955        /* disable_remote_commands: disable users doing commands on remote servers */
956        disable_remote_commands = no;
957
1118          /*
1119           * tkline_expire_notices: enables or disables temporary kline/xline
1120           * expire notices.
# Line 963 | Line 1123 | general {
1123  
1124          /*
1125           * default_floodcount: the default value of floodcount that is configurable
1126 <         * via /quote set floodcount.  This is the amount of lines a user
1127 <         * may send to any other user/channel in one second.
1126 >         * via /quote set floodcount. This is the number of lines a user may send
1127 >         * to any other user/channel in one second.
1128           */
1129          default_floodcount = 10;
1130  
1131          /*
1132 <         * failed_oper_notice: send a notice to all opers on the server when
1132 >         * failed_oper_notice: send a notice to all opers on the server when
1133           * someone tries to OPER and uses the wrong password, host or ident.
1134           */
1135          failed_oper_notice = yes;
1136  
1137          /*
1138 <         * dots_in_ident: the amount of '.' characters permitted in an ident
1138 >         * dots_in_ident: the number of '.' characters permitted in an ident
1139           * reply before the user is rejected.
1140           */
1141          dots_in_ident = 2;
1142  
1143          /*
1144 <         * min_nonwildcard: the minimum non wildcard characters in k/d/g lines
1145 <         * placed via the server.  klines hand placed are exempt from limits.
1146 <         * wildcard chars: '.' ':' '*' '?' '@' '!' '#'
1144 >         * min_nonwildcard: the minimum number of non-wildcard characters in
1145 >         * k/d/g lines placed via the server. K-lines hand-placed are exempt from
1146 >         * this limit.
1147 >         * Wildcard characters: '.', ':', '*', '?', '@', '!'
1148           */
1149          min_nonwildcard = 4;
1150  
1151          /*
1152 <         * min_nonwildcard_simple: the minimum non wildcard characters in
1153 <         * gecos bans.  wildcard chars: '*' '?' '#'
1152 >         * min_nonwildcard_simple: the minimum number of non-wildcard characters
1153 >         * in gecos bans. Wildcard characters: '*', '?'
1154           */
1155          min_nonwildcard_simple = 3;
1156  
1157 <        /* max_accept: maximum allowed /accept's for +g usermode */
997 <        max_accept = 20;
998 <
999 <        /* anti_nick_flood: enable the nickflood control code */
1157 >        /* anti_nick_flood: enable the nickflood control code. */
1158          anti_nick_flood = yes;
1159  
1160 <        /* nick flood: the nick changes allowed in the specified period */
1160 >        /* nick flood: the number of nick changes allowed in the specified period. */
1161          max_nick_time = 20 seconds;
1162          max_nick_changes = 5;
1163  
1164          /*
1165 +         * away_count, away_time: how many AWAY command are permitted per
1166 +         * client per away_time.
1167 +         */
1168 +        away_count = 2;
1169 +        away_time = 10 seconds;
1170 +
1171 +        /*
1172           * anti_spam_exit_message_time: the minimum time a user must be connected
1173           * before custom quit messages are allowed.
1174           */
1175          anti_spam_exit_message_time = 5 minutes;
1176  
1177          /*
1178 <         * ts delta: the time delta allowed between server clocks before
1179 <         * a warning is given, or before the link is dropped.  all servers
1180 <         * should run ntpdate/rdate to keep clocks in sync
1178 >         * ts_warn_delta, ts_max_delta: the time delta allowed between server
1179 >         * clocks before a warning is given, or before the link is dropped.
1180 >         * All servers should run ntpdate/rdate to keep clocks in sync.
1181           */
1182 <        ts_warn_delta = 30 seconds;
1183 <        ts_max_delta = 5 minutes;
1182 >        ts_warn_delta = 3 seconds;
1183 >        ts_max_delta = 15 seconds;
1184  
1185          /*
1186 <         * warn_no_nline: warn opers about servers that try to connect but
1187 <         * we don't have a connect {} block for.  Twits with misconfigured
1188 <         * servers can get really annoying with this enabled.
1186 >         * warn_no_connect_block: warn opers about servers that try to connect
1187 >         * but for which we don't have a connect {} block. Twits with
1188 >         * misconfigured servers can become really annoying with this enabled.
1189           */
1190 <        warn_no_nline = yes;
1190 >        warn_no_connect_block = yes;
1191  
1192          /*
1193           * stats_e_disabled: set this to 'yes' to disable "STATS e" for both
1194 <         * operators and administrators.  Doing so is a good idea in case
1195 <         * there are any exempted (exempt{}) server IPs you don't want to
1194 >         * operators and administrators. Doing so is a good idea in case
1195 >         * there are any exempted (exempt {}) server IPs you don't want to
1196           * see leaked.
1197           */
1198          stats_e_disabled = no;
1199  
1200 <        /* stats_o_oper only: make stats o (opers) oper only */
1200 >        /* stats_o_oper_only: make stats o (opers) oper only. */
1201          stats_o_oper_only = yes;
1202  
1203 <        /* stats_P_oper_only: make stats P (ports) oper only */
1203 >        /* stats_P_oper_only: make stats P (ports) oper only. */
1204          stats_P_oper_only = yes;
1205  
1206 +        /* stats_u_oper_only: make stats u (uptime) oper only. */
1207 +        stats_u_oper_only = no;
1208 +
1209          /*
1210 <         * stats i oper only: make stats i (auth {}) oper only. set to:
1211 <         *     yes:    show users no auth blocks, made oper only.
1212 <         *     masked: show users first matching auth block
1213 <         *     no:     show users all auth blocks.
1210 >         * stats_i_oper_only: make stats i (auth {}) oper only. Set to:
1211 >         *     yes    - show users no auth {} blocks, made oper only
1212 >         *     masked - show users the first matching auth {} block
1213 >         *     no     - show users all auth {} blocks
1214           */
1215          stats_i_oper_only = yes;
1216  
1217          /*
1218 <         * stats_k_oper_only: make stats k/K (klines) oper only.  set to:
1219 <         *     yes:    show users no auth blocks, made oper only
1220 <         *     masked: show users first matching auth block
1221 <         *     no:     show users all auth blocks.
1218 >         * stats_k_oper_only: make stats k/K (klines) oper only. Set to:
1219 >         *     yes    - show users no auth {} blocks, made oper only
1220 >         *     masked - show users the first matching auth {} block
1221 >         *     no     - show users all auth {} blocks
1222           */
1223          stats_k_oper_only = yes;
1224  
# Line 1067 | Line 1235 | general {
1235          opers_bypass_callerid = no;
1236  
1237          /*
1238 <         * pace_wait_simple: time between use of less intensive commands
1239 <         * (ADMIN, HELP, (L)USERS, VERSION, remote WHOIS)
1238 >         * pace_wait_simple: minimum time required between use of less
1239 >         * intensive commands
1240 >         * (ADMIN, HELP, LUSERS, VERSION, remote WHOIS)
1241           */
1242          pace_wait_simple = 1 second;
1243  
1244          /*
1245 <         * pace_wait: time between more intensive commands
1246 <         * (AWAY, INFO, LINKS, MAP, MOTD, STATS, WHO, wildcard WHOIS, WHOWAS)
1245 >         * pace_wait: minimum time required between use of more intensive commands
1246 >         * (INFO, LINKS, MAP, MOTD, STATS, WHO, WHOWAS)
1247           */
1248          pace_wait = 10 seconds;
1249  
1250          /*
1251 <         * short_motd: send clients a notice telling them to read the motd
1252 <         * instead of forcing a motd to clients who may simply ignore it.
1251 >         * short_motd: send clients a notice telling them to read the MOTD
1252 >         * instead of forcing an MOTD to clients who may simply ignore it.
1253           */
1254          short_motd = no;
1255  
1256          /*
1257 <         * ping_cookie: require clients to respond exactly to a ping command,
1257 >         * ping_cookie: require clients to respond exactly to a PING command,
1258           * can help block certain types of drones and FTP PASV mode spoofing.
1259           */
1260          ping_cookie = no;
# Line 1095 | Line 1264 | general {
1264  
1265          /*
1266           * true_no_oper_flood: completely eliminate flood limits for opers
1267 <         * and for clients with can_flood = yes in their auth {} blocks
1267 >         * and for clients with 'can_flood' in their auth {} blocks.
1268           */
1269          true_no_oper_flood = yes;
1270  
1271 <        /* oper_pass_resv: allow opers to over-ride RESVs on nicks/channels */
1271 >        /* oper_pass_resv: allow opers to over-ride RESVs on nicks/channels. */
1272          oper_pass_resv = yes;
1273  
1274 <        /* REMOVE ME.  The following line checks you've been reading. */
1274 >        /* REMOVE ME. The following line checks that you have been reading. */
1275          havent_read_conf = 1;
1276  
1277          /*
1278 <         * max_targets: the maximum amount of targets in a single
1279 <         * PRIVMSG/NOTICE.  Set to 999 NOT 0 for unlimited.
1278 >         * max_targets: the maximum number of targets in a single
1279 >         * PRIVMSG/NOTICE. Set to 999 NOT 0 for unlimited.
1280           */
1281          max_targets = 4;
1282  
1283          /*
1115         * message_locale: the default message locale
1116         * Use "standard" for the compiled in defaults.
1117         * To install the translated messages, go into messages/ in the
1118         * source directory and run `make install'.
1119         */
1120        message_locale = "standard";
1121
1122        /*
1284           * usermodes configurable: a list of usermodes for the options below
1285           *
1286           * +b - bots         - See bot and drone flooding notices
1287           * +c - cconn        - Client connection/quit notices
1127         * +C - cconn_full   - Client connection/quit notices full
1288           * +D - deaf         - Don't receive channel messages
1289           * +d - debug        - See debugging notices
1290           * +e - external     - See remote server connection and split notices
1291 <         * +f - full         - See auth{} block full notices
1291 >         * +F - farconnect   - Remote client connection/quit notices
1292 >         * +f - full         - See auth {} block full notices
1293           * +G - softcallerid - Server Side Ignore for users not on your channels
1294           * +g - callerid     - Server Side Ignore (for privmsgs etc)
1295           * +H - hidden       - Hides operator status to other users
1296 <         * +i - invisible    - Not shown in NAMES or WHO unless you share a
1136 <         *                     a channel
1296 >         * +i - invisible    - Not shown in NAMES or WHO unless you share a channel
1297           * +j - rej          - See rejected client notices
1298           * +k - skill        - See server generated KILL messages
1299           * +l - locops       - See LOCOPS messages
1300           * +n - nchange      - See client nick changes
1301 +         * +p - hidechans    - Hides channel list in WHOIS
1302 +         * +q - hideidle     - Hides idle and signon time in WHOIS
1303 +         * +R - nononreg     - Only receive private messages from registered clients
1304           * +s - servnotice   - See general server notices
1305           * +u - unauth       - See unauthorized client notices
1306           * +w - wallop       - See server generated WALLOPS
1307           * +y - spy          - See LINKS, STATS, TRACE notices etc.
1145         * +z - operwall     - See oper generated WALLOPS
1308           */
1309  
1310 <        /* oper_only_umodes: usermodes only opers may set */
1311 <        oper_only_umodes = bots, cconn, cconn_full, debug, full, hidden, skill,
1312 <                           nchange, rej, spy, external, operwall,
1151 <                           locops, unauth;
1310 >        /* oper_only_umodes: usermodes only operators may set. */
1311 >        oper_only_umodes = bots, cconn, debug, external, farconnect, full, hidden, locops,
1312 >                        nchange, rej, skill, spy, unauth;
1313  
1314 <        /* oper_umodes: default usermodes opers get when they /oper */
1315 <        oper_umodes = bots, locops, servnotice, operwall, wallop;
1314 >        /* oper_umodes: default usermodes operators get when they /oper or /challenge. */
1315 >        oper_umodes = bots, locops, servnotice, wallop;
1316  
1317          /*
1318 <         * use_egd: if your system does not have *random devices yet you
1319 <         * want to use OpenSSL and encrypted links, enable this.  Beware -
1159 <         * EGD is *very* CPU intensive when gathering data for its pool
1318 >         * throttle_count: the maximum number of connections from the same
1319 >         * IP address allowed in throttle_time duration.
1320           */
1321 < #       use_egd = yes;
1321 >        throttle_count = 1;
1322  
1323          /*
1324 <         * egdpool_path: path to EGD pool. Not necessary for OpenSSL >= 0.9.7
1325 <         * which automatically finds the path.
1326 <         */
1327 < #       egdpool_path = "/var/run/egd-pool";
1168 <
1169 <        /*
1170 <         * throttle_time: the minimum amount of time between connections from
1171 <         * the same ip.  exempt {} blocks are excluded from this throttling.
1172 <         * Offers protection against flooders who reconnect quickly.  
1324 >         * throttle_time: the minimum amount of time required between
1325 >         * connections from the same IP address. exempt {} blocks are
1326 >         * excluded from this throttling.
1327 >         * Offers protection against flooders who reconnect quickly.
1328           * Set to 0 to disable.
1329           */
1330 <        throttle_time = 10;
1330 >        throttle_time = 2 seconds;
1331   };
1332  
1333   modules {
# Line 1180 | Line 1335 | modules {
1335           * path: other paths to search for modules specified below
1336           * and in "/module load".
1337           */
1338 <        path = "/usr/local/ircd/lib/ircd-hybrid/modules";
1339 <        path = "/usr/local/ircd/lib/ircd-hybrid/modules/autoload";
1338 >        path = "lib/ircd-hybrid/modules";
1339 >        path = "lib/ircd-hybrid/modules/autoload";
1340  
1341 <        /* module: the name of a module to load on startup/rehash */
1342 <        #module = "some_module.la";
1341 >        /* module: the name of a module to load on startup/rehash. */
1342 > #       module = "some_module.la";
1343   };
1344  
1345   /*
# Line 1196 | Line 1351 | log {
1351  
1352          file {
1353                  type = oper;
1354 <                name = "/home/ircd/var/log/oper.log";
1354 >                name = "var/log/oper.log";
1355                  size = unlimited;
1356          };
1357  
1358          file {
1359                  type = user;
1360 <                name = "/home/ircd/var/log/user.log";
1360 >                name = "var/log/user.log";
1361                  size = 50 megabytes;
1362          };
1363  
1364          file {
1365                  type = kill;
1366 <                name = "/home/ircd/var/log/kill.log";
1366 >                name = "var/log/kill.log";
1367                  size = 50 megabytes;
1368          };
1369  
1370          file {
1371                  type = kline;
1372 <                name = "/home/ircd/var/log/kline.log";
1372 >                name = "var/log/kline.log";
1373                  size = 50 megabytes;
1374          };
1375  
1376          file {
1377                  type = dline;
1378 <                name = "/home/ircd/var/log/dline.log";
1378 >                name = "var/log/dline.log";
1379                  size = 50 megabytes;
1380          };
1381  
1382          file {
1383                  type = gline;
1384 <                name = "/home/ircd/var/log/gline.log";
1384 >                name = "var/log/gline.log";
1385 >                size = 50 megabytes;
1386 >        };
1387 >
1388 >        file {
1389 >                type = xline;
1390 >                name = "var/log/xline.log";
1391 >                size = 50 megabytes;
1392 >        };
1393 >
1394 >        file {
1395 >                type = resv;
1396 >                name = "var/log/resv.log";
1397                  size = 50 megabytes;
1398          };
1399  
1400          file {
1401                  type = debug;
1402 <                name = "/home/ircd/var/log/debug.log";
1402 >                name = "var/log/debug.log";
1403                  size = 50 megabytes;
1404          };
1405   };

Diff Legend

Removed lines
+ Added lines
< Changed lines (old)
> Changed lines (new)