8 |
|
|
9 |
|
/* |
10 |
|
* ######################################################################## |
11 |
< |
* IMPORTANT NOTES: |
11 |
> |
* IMPORTANT NOTE: |
12 |
|
* |
13 |
|
* auth {} blocks MUST be specified in order of precedence. The first one |
14 |
|
* that matches a user will be used. So place spoofs first, then specials, |
76 |
|
# vhost = "192.169.0.1"; |
77 |
|
|
78 |
|
/* |
79 |
< |
* vhost6: the IP to bind to when we connect outward to ipv6 servers. |
80 |
< |
* This should be an ipv6 IP only, or "*" for INADDR_ANY. |
79 |
> |
* vhost6: the address to bind to when we make outgoing connections |
80 |
> |
* to IPv6 servers. This should be an IPv6 address, or "*" for INADDR_ANY. |
81 |
|
*/ |
82 |
|
# vhost6 = "3ffe:80e8:546::2"; |
83 |
|
|
98 |
|
max_topic_length = 160; |
99 |
|
|
100 |
|
/* |
101 |
< |
* rsa_private_key_file: the path to the file containing our |
102 |
< |
* rsa key for cryptlink. |
101 |
> |
* rsa_private_key_file: the path to the file containing the |
102 |
> |
* RSA key for cryptlink. |
103 |
|
* |
104 |
< |
* Example command to store a 2048 bit RSA keypair in |
104 |
> |
* Example commands to store a 2048 bit RSA keypair in |
105 |
|
* rsa.key, and the public key in rsa.pub: |
106 |
|
* |
107 |
|
* openssl genrsa -out rsa.key 2048 |
114 |
|
|
115 |
|
/* |
116 |
|
* ssl_certificate_file: the path to the file containing our |
117 |
< |
* ssl certificate for encrypted client connection. |
117 |
> |
* SSL certificate for encrypted client connection. |
118 |
|
* |
119 |
|
* This assumes your private RSA key is stored in rsa.key. You |
120 |
|
* MUST have an RSA key in order to generate the certificate. |
138 |
|
* ssl_dh_param_file: |
139 |
|
* |
140 |
|
* Path to the PEM encoded Diffie-Hellman parameter file. |
141 |
< |
* DH parameters are strictly required when using ciphers |
142 |
< |
* with EDH (ephemeral Diffie-Hellman) key exchange. |
141 |
> |
* DH parameters are required when using ciphers with EDH |
142 |
> |
* (ephemeral Diffie-Hellman) key exchange. |
143 |
|
* |
144 |
|
* A DH parameter file can be created by running: |
145 |
|
* |
154 |
|
/* |
155 |
|
* ssl_cipher_list: |
156 |
|
* |
157 |
< |
* List of ciphers that are supported by _this_ server. Can be used to |
157 |
> |
* List of ciphers to support on _this_ server. Can be used to |
158 |
|
* enforce specific ciphers for incoming SSL/TLS connections. |
159 |
< |
* If a client (which also includes incoming server connections) isn't |
160 |
< |
* capable of any cipher listed below, the connection will simply be |
161 |
< |
* rejected. |
159 |
> |
* If a client (which also includes incoming server connections) is not |
160 |
> |
* capable of using any of the ciphers listed here, the connection will |
161 |
> |
* simply be rejected. |
162 |
|
* |
163 |
< |
* A list of supported ciphers can be obtained by running: |
163 |
> |
* A list of supported ciphers by OpenSSL can be obtained by running: |
164 |
|
* |
165 |
|
* openssl ciphers -ssl3 -tls1 -v |
166 |
|
* |
205 |
|
|
206 |
|
/* |
207 |
|
* number_per_ip: how many local users are allowed to connect |
208 |
< |
* from one IP (optional) |
208 |
> |
* from a single IP address (optional) |
209 |
|
*/ |
210 |
|
number_per_ip = 2; |
211 |
|
|
212 |
|
/* |
213 |
|
* max_local: how many local users are allowed to connect |
214 |
< |
* from one ident@host (optional) |
214 |
> |
* from a single ident@host (optional) |
215 |
|
*/ |
216 |
|
max_local = 2; |
217 |
|
|
234 |
|
number_per_cidr = 16; |
235 |
|
|
236 |
|
/* |
237 |
< |
* sendq: the amount of data allowed in a clients send queue before |
237 |
> |
* sendq: the amount of data allowed in a client's send queue before |
238 |
|
* they are dropped. |
239 |
|
*/ |
240 |
|
sendq = 100 kbytes; |
241 |
|
|
242 |
|
/* |
243 |
< |
* recvq: maximum amount of data in a clients receive queue before |
243 |
> |
* recvq: the amount of data allowed in a client's receive queue before |
244 |
|
* they are dropped for flooding. Defaults to 2560 if the chosen |
245 |
|
* value isn't within the range of 512 to 8000. |
246 |
|
*/ |
267 |
|
/* |
268 |
|
* flags: |
269 |
|
* |
270 |
< |
* random_idle - idle time is randomly selected within the |
271 |
< |
* range of min_idle to max_idle |
272 |
< |
* hide_idle_from_opers - fake idle time will be shown to operators, too |
270 |
> |
* random_idle - a fake idle time is set randomly between |
271 |
> |
* min_idle and max_idle |
272 |
> |
* hide_idle_from_opers - the fake idle time will also be shown to operators |
273 |
|
*/ |
274 |
|
flags = random_idle, hide_idle_from_opers; |
275 |
|
}; |
284 |
|
*/ |
285 |
|
connectfreq = 5 minutes; |
286 |
|
|
287 |
< |
/* max number: the amount of servers to autoconnect to. */ |
287 |
> |
/* max number: the number of servers to autoconnect to. */ |
288 |
|
max_number = 1; |
289 |
|
|
290 |
|
/* sendq: servers need a higher sendq as they send more data. */ |
292 |
|
}; |
293 |
|
|
294 |
|
/* |
295 |
< |
* motd {}: Allows to show a different MOTD to a client |
295 |
> |
* motd {}: Allows the display of a different MOTD to a client |
296 |
|
* depending on its origin. Applies to local users only. |
297 |
|
*/ |
298 |
|
motd { |
315 |
|
*/ |
316 |
|
listen { |
317 |
|
/* |
318 |
< |
* port: the specific port to listen on. If no host is specified |
319 |
< |
* before, it will listen on all available IPs. |
318 |
> |
* port: the port to listen on. If no host is specified |
319 |
> |
* earlier in the listen {} block, it will listen on all available IPs. |
320 |
|
* |
321 |
< |
* Ports are separated via a comma, a range may be specified using ".." |
321 |
> |
* Ports are separated by commsa; a range may be specified using ".." |
322 |
|
*/ |
323 |
|
|
324 |
< |
/* port: listen on all available IPs, ports 6665 to 6669 */ |
324 |
> |
/* port: listen on all available IP addresses, ports 6665 to 6669 */ |
325 |
|
port = 6665 .. 6669; |
326 |
|
|
327 |
|
/* |
328 |
< |
* Listen on 192.168.0.1/6697 with ssl enabled and hidden from STATS P |
328 |
> |
* Listen on 192.168.0.1/6697 with SSL enabled and hidden from STATS P |
329 |
|
* unless you are an administrator. |
330 |
|
* |
331 |
< |
* NOTE: The "flags" directive has to come before "port". Always! |
331 |
> |
* NOTE: The "flags" directive always has to come before "port". |
332 |
|
* |
333 |
|
* Currently available flags are: |
334 |
|
* |
341 |
|
port = 6697; |
342 |
|
|
343 |
|
/* |
344 |
< |
* host: set a specific IP/host the ports after the line will listen |
345 |
< |
* on. This may be ipv4 or ipv6. |
344 |
> |
* host: set a specific IP address/host to listen on using the |
345 |
> |
* subsequent port definitions. This may be IPv4 or IPv6. |
346 |
|
*/ |
347 |
|
host = "1.2.3.4"; |
348 |
|
port = 7000, 7001; |
357 |
|
auth { |
358 |
|
/* |
359 |
|
* user: the user@host allowed to connect. Multiple user |
360 |
< |
* lines are permitted per auth block. |
360 |
> |
* lines are permitted within each auth block. |
361 |
|
*/ |
362 |
|
user = "*@172.16.0.0/12"; |
363 |
|
user = "*test@123D:B567:*"; |
372 |
|
encrypted = yes; |
373 |
|
|
374 |
|
/* |
375 |
< |
* spoof: fake the users host to this. This is free-form, just do |
375 |
> |
* spoof: fake the user's host to this. This is free-form, just do |
376 |
|
* everyone a favor and don't abuse it. ('=' prefix on /stats I) |
377 |
|
*/ |
378 |
|
spoof = "I.still.hate.packets"; |
402 |
|
auth { |
403 |
|
/* |
404 |
|
* redirect: the server and port to redirect a user to. A user does not |
405 |
< |
* have to obey the redirection, the ircd just suggests an alternative |
405 |
> |
* have to obey the redirection; the ircd just suggests an alternative |
406 |
|
* server for them. |
407 |
|
*/ |
408 |
|
redirserv = "this.is.not.a.real.server"; |
439 |
|
* need to be encrypted by using the provided mkpasswd tool. |
440 |
|
* Several password hash algorithms are available depending |
441 |
|
* on your system's crypt() implementation. For example, a modern |
442 |
< |
* glibc already has support for SHA-256/512, and MD5 encryption |
442 |
> |
* glibc already has support for the SHA-256/512 and MD5 encryption |
443 |
|
* algorithms. |
444 |
|
*/ |
445 |
|
password = "$5$x5zof8qe.Yc7/bPp$5zIg1Le2Lsgd4CvOjaD20pr5PmcfD7ha/9b2.TaUyG4"; |
452 |
|
|
453 |
|
/* |
454 |
|
* rsa_public_key_file: the public key for this oper when using Challenge. |
455 |
< |
* A password should not be defined when this is used, see |
455 |
> |
* A password should not be defined when this is used; see |
456 |
|
* doc/challenge.txt for more information. |
457 |
|
*/ |
458 |
|
# rsa_public_key_file = "/usr/local/ircd/etc/oper.pub"; |
480 |
|
class = "opers"; |
481 |
|
|
482 |
|
/* |
483 |
< |
* umodes: default usermodes opers get when they /oper. If defined, |
483 |
> |
* umodes: the default usermodes opers get when they /oper. If defined, |
484 |
|
* it will override oper_umodes settings in general {}. |
485 |
|
* Available usermodes: |
486 |
|
* |
542 |
|
}; |
543 |
|
|
544 |
|
/* |
545 |
< |
* service {}: specifies what server may act as a network service |
545 |
> |
* service {}: specifies a server which may act as a network service |
546 |
|
* |
547 |
< |
* NOTE: it is absolutely important that every single server on the network |
547 |
> |
* NOTE: it is very important that every server on the network |
548 |
|
* has the same service{} block. |
549 |
|
*/ |
550 |
|
service { |
553 |
|
}; |
554 |
|
|
555 |
|
/* |
556 |
< |
* connect {}: controls servers we connect to |
556 |
> |
* connect {}: define a server to connect to |
557 |
|
*/ |
558 |
|
connect { |
559 |
|
/* name: the name of the server */ |
560 |
|
name = "irc.uplink.com"; |
561 |
|
|
562 |
|
/* |
563 |
< |
* host: the host or IP to connect to. If a hostname is used it |
564 |
< |
* must match the reverse dns of the server. |
563 |
> |
* host: the host or IP address to connect to. If a hostname is used it |
564 |
> |
* must match the reverse DNS of the server. |
565 |
|
*/ |
566 |
|
host = "192.168.0.1"; |
567 |
|
|
568 |
|
/* |
569 |
< |
* vhost: the IP to bind to when we connect outward to servers. |
569 |
> |
* vhost: the IP address to bind to when making outgoing connections to |
570 |
> |
* servers. |
571 |
|
* serverinfo::vhost and serverinfo::vhost6 will be overridden |
572 |
|
* by this directive. |
573 |
|
*/ |
574 |
|
vhost = "192.168.0.2"; |
575 |
|
|
576 |
|
/* |
577 |
< |
* passwords: the passwords we send (OLD C:) and accept (OLD N:). |
578 |
< |
* The remote server will have these passwords reversed. |
577 |
> |
* passwords: the passwords to send (OLD C:) and accept (OLD N:). |
578 |
> |
* The remote server will have these passwords swapped. |
579 |
|
*/ |
580 |
|
send_password = "password"; |
581 |
|
accept_password = "anotherpassword"; |
608 |
|
* ssl_cipher_list: |
609 |
|
* |
610 |
|
* List of ciphers that the server we are connecting to must support. |
611 |
< |
* If the server isn't capable of any cipher listed below, the |
612 |
< |
* connection will simply be rejected. |
611 |
> |
* If the server is not capable of using any of the ciphers listed below, |
612 |
> |
* the connection will simply be rejected. |
613 |
|
* Can be used to enforce stronger ciphers, even though this option |
614 |
|
* is not necessarily required to establish a SSL/TLS connection. |
615 |
|
* |
654 |
|
*/ |
655 |
|
cluster { |
656 |
|
/* |
657 |
< |
* name: the server to share with, this can take wildcards |
657 |
> |
* name: the server to share with; this can take wildcards |
658 |
|
* |
659 |
< |
* NOTE: only local actions will be clustered, meaning if |
659 |
> |
* NOTE: only local actions will be clustered, meaning that if |
660 |
|
* the server receives a shared kline/unkline/etc, it |
661 |
|
* will not be propagated to clustered servers. |
662 |
|
* |
667 |
|
name = "*.arpa"; |
668 |
|
|
669 |
|
/* |
670 |
< |
* type: list of what to share, options are as follows: |
670 |
> |
* type: list of what to share; options are as follows: |
671 |
|
* dline - share dlines |
672 |
|
* undline - share undlines |
673 |
|
* kline - share klines |
685 |
|
/* |
686 |
|
* shared {}: users that are allowed to remote kline |
687 |
|
* |
688 |
< |
* NOTE: This can be effectively used for remote klines. |
688 |
> |
* NOTE: This can effectively be used for remote klines. |
689 |
|
* Please note that there is no password authentication |
690 |
|
* for users setting remote klines. You must also be |
691 |
|
* /oper'd in order to issue a remote kline. |
692 |
|
*/ |
693 |
|
shared { |
694 |
|
/* |
695 |
< |
* name: the server the user must be on to set klines. If this is not |
696 |
< |
* specified, the user will be allowed to kline from all servers. |
695 |
> |
* name: the server the user must be connected to in order to set klines. |
696 |
> |
* If this is not specified, the user will be allowed to kline from all |
697 |
> |
* servers. |
698 |
|
*/ |
699 |
|
name = "irc2.some.server"; |
700 |
|
|
731 |
|
}; |
732 |
|
|
733 |
|
/* |
734 |
< |
* deny {}: IPs that are not allowed to connect (before DNS/ident lookup) |
734 |
> |
* deny {}: IP addresses that are not allowed to connect |
735 |
> |
* (before DNS/ident lookup) |
736 |
|
* Oper issued dlines will be added to the specified dline config |
737 |
|
*/ |
738 |
|
deny { |
741 |
|
}; |
742 |
|
|
743 |
|
/* |
744 |
< |
* exempt {}: IPs that are exempt from deny {} and Dlines |
744 |
> |
* exempt {}: IP addresses that are exempt from deny {} and Dlines |
745 |
|
*/ |
746 |
|
exempt { |
747 |
|
ip = "192.168.0.0/16"; |
764 |
|
resv { |
765 |
|
/* |
766 |
|
* mask: masks starting with a '#' are automatically considered |
767 |
< |
* as channel name mask. |
767 |
> |
* as channel name masks. |
768 |
|
*/ |
769 |
|
mask = "#helsinki"; |
770 |
|
reason = "Channel is reserved for finnish inhabitants"; |
796 |
|
channel { |
797 |
|
/* |
798 |
|
* disable_fake_channels: this option, if set to 'yes', will |
799 |
< |
* disallow clients to create or join channels that have one |
799 |
> |
* disallow clients from creating or joining channels that have one |
800 |
|
* of the following ASCII characters in their name: |
801 |
|
* |
802 |
|
* 2 | bold |
837 |
|
max_bans = 100; |
838 |
|
|
839 |
|
/* |
840 |
< |
* how many joins in how many seconds constitute a flood, use 0 to |
840 |
> |
* how many joins in how many seconds constitute a flood. Use 0 to |
841 |
|
* disable. +b opers will be notified (changeable via /set) |
842 |
|
*/ |
843 |
|
join_flood_count = 16; |
844 |
|
join_flood_time = 8 seconds; |
845 |
|
|
846 |
|
/* |
847 |
< |
* splitcode: The ircd will now check splitmode every few seconds. |
847 |
> |
* The ircd will now check splitmode (whether a server is split from |
848 |
> |
* the network) every few seconds; this functionality is known as |
849 |
> |
* splitcode and is influenced by the options below. |
850 |
|
* |
851 |
|
* Either split users or split servers can activate splitmode, but |
852 |
|
* both conditions must be met for the ircd to deactivate splitmode. |
866 |
|
*/ |
867 |
|
default_split_server_count = 0; |
868 |
|
|
869 |
< |
/* no_create_on_split: disallow users creating channels on split. */ |
869 |
> |
/* no_create_on_split: do not allow users to create channels on split. */ |
870 |
|
no_create_on_split = yes; |
871 |
|
|
872 |
< |
/* no_join_on_split: disallow users joining channels at all on a split. */ |
872 |
> |
/* no_join_on_split: do not allow users to join channels on a split. */ |
873 |
|
no_join_on_split = no; |
874 |
|
}; |
875 |
|
|
876 |
|
/* |
877 |
|
* serverhide {}: The serverhide block contains the options regarding |
878 |
< |
* serverhiding |
878 |
> |
* to server hiding |
879 |
|
*/ |
880 |
|
serverhide { |
881 |
|
/* |
882 |
< |
* disable_remote_commands: disable users doing commands |
882 |
> |
* disable_remote_commands: disable users issuing commands |
883 |
|
* on remote servers. |
884 |
|
*/ |
885 |
|
disable_remote_commands = no; |
886 |
|
|
887 |
|
/* |
888 |
|
* flatten_links: this option will show all servers in /links appear |
889 |
< |
* that they are linked to this current server. |
889 |
> |
* as though they are linked to this current server. |
890 |
|
*/ |
891 |
|
flatten_links = no; |
892 |
|
|
921 |
|
|
922 |
|
/* |
923 |
|
* hide_server_ips: If this is disabled, opers will be unable to see |
924 |
< |
* servers ips and will be shown a masked ip, admins will be shown the |
925 |
< |
* real ip. |
924 |
> |
* servers' IP addresses and will be shown a masked IP address; admins |
925 |
> |
* will be shown the real IP address. |
926 |
|
* |
927 |
< |
* If this is enabled, nobody can see a servers ip. *This is a kludge*, |
928 |
< |
* it has the side effect of hiding the ips everywhere, including |
929 |
< |
* logfiles. |
927 |
> |
* If this is enabled, nobody can see a server's IP address. |
928 |
> |
* *This is a kludge*: it has the side effect of hiding the IP addresses |
929 |
> |
* everywhere, including logfiles. |
930 |
|
* |
931 |
|
* We recommend you leave this disabled, and just take care with who you |
932 |
|
* give administrator privileges to. |
951 |
|
/* max_watch: maximum WATCH entries a client can have. */ |
952 |
|
max_watch = 60; |
953 |
|
|
954 |
< |
/* gline_enable: enable glines, network wide temp klines. */ |
954 |
> |
/* gline_enable: enable glines (network-wide temporary klines). */ |
955 |
|
gline_enable = yes; |
956 |
|
|
957 |
|
/* |
984 |
|
invisible_on_connect = yes; |
985 |
|
|
986 |
|
/* |
987 |
< |
* kill_chase_time_limit: maximum time from the nickname change that |
988 |
< |
* still causes KILL automatically to switch for the current nick of |
989 |
< |
* that user. |
987 |
> |
* kill_chase_time_limit: KILL chasing is a feature whereby a KILL |
988 |
> |
* issued for a user who has recently changed nickname will be applied |
989 |
> |
* automatically to the new nick. kill_chase_time_limit is the maximum |
990 |
> |
* time following a nickname change that this chasing will apply. |
991 |
|
*/ |
992 |
|
kill_chase_time_limit = 90 seconds; |
993 |
|
|
994 |
|
/* |
995 |
|
* hide_spoof_ips: if disabled, opers will be allowed to see the real |
996 |
< |
* IP of spoofed users in /trace etc. If this is defined they will be |
997 |
< |
* shown a masked IP. |
996 |
> |
* IP address of spoofed users in /trace etc. If this is defined they |
997 |
> |
* will be shown a masked IP. |
998 |
|
*/ |
999 |
|
hide_spoof_ips = yes; |
1000 |
|
|
1020 |
|
|
1021 |
|
/* |
1022 |
|
* default_floodcount: the default value of floodcount that is configurable |
1023 |
< |
* via /quote set floodcount. This is the amount of lines a user |
1023 |
> |
* via /quote set floodcount. This is the number of lines a user |
1024 |
|
* may send to any other user/channel in one second. |
1025 |
|
*/ |
1026 |
|
default_floodcount = 10; |
1032 |
|
failed_oper_notice = yes; |
1033 |
|
|
1034 |
|
/* |
1035 |
< |
* dots_in_ident: the amount of '.' characters permitted in an ident |
1035 |
> |
* dots_in_ident: the number of '.' characters permitted in an ident |
1036 |
|
* reply before the user is rejected. |
1037 |
|
*/ |
1038 |
|
dots_in_ident = 2; |
1039 |
|
|
1040 |
|
/* |
1041 |
< |
* min_nonwildcard: the minimum non wildcard characters in k/d/g lines |
1042 |
< |
* placed via the server. K-lines hand placed are exempt from limits. |
1041 |
> |
* min_nonwildcard: the minimum number of non-wildcard characters in |
1042 |
> |
* k/d/g lines placed via the server. K-lines hand-placed are exempt from |
1043 |
> |
* this limit. |
1044 |
|
* Wildcard chars: '.', ':', '*', '?', '@', '!' |
1045 |
|
*/ |
1046 |
|
min_nonwildcard = 4; |
1047 |
|
|
1048 |
|
/* |
1049 |
< |
* min_nonwildcard_simple: the minimum non wildcard characters in |
1050 |
< |
* gecos bans. Wildcard chars: '*', '?' |
1049 |
> |
* min_nonwildcard_simple: the minimum number of non-wildcard characters |
1050 |
> |
* in gecos bans. Wildcard chars: '*', '?' |
1051 |
|
*/ |
1052 |
|
min_nonwildcard_simple = 3; |
1053 |
|
|
1057 |
|
/* anti_nick_flood: enable the nickflood control code. */ |
1058 |
|
anti_nick_flood = yes; |
1059 |
|
|
1060 |
< |
/* nick flood: the nick changes allowed in the specified period */ |
1060 |
> |
/* nick flood: the number of nick changes allowed in the specified period */ |
1061 |
|
max_nick_time = 20 seconds; |
1062 |
|
max_nick_changes = 5; |
1063 |
|
|
1077 |
|
|
1078 |
|
/* |
1079 |
|
* warn_no_nline: warn opers about servers that try to connect but |
1080 |
< |
* we don't have a connect {} block for. Twits with misconfigured |
1081 |
< |
* servers can get really annoying with this enabled. |
1080 |
> |
* for which we don't have a connect {} block. Twits with misconfigured |
1081 |
> |
* servers can become really annoying with this enabled. |
1082 |
|
*/ |
1083 |
|
warn_no_nline = yes; |
1084 |
|
|
1102 |
|
/* |
1103 |
|
* stats i oper only: make stats i (auth {}) oper only. Set to: |
1104 |
|
* yes - show users no auth blocks, made oper only. |
1105 |
< |
* masked - show users first matching auth block |
1105 |
> |
* masked - show users the first matching auth block |
1106 |
|
* no - show users all auth blocks. |
1107 |
|
*/ |
1108 |
|
stats_i_oper_only = yes; |
1110 |
|
/* |
1111 |
|
* stats_k_oper_only: make stats k/K (klines) oper only. Set to: |
1112 |
|
* yes - show users no auth blocks, made oper only |
1113 |
< |
* masked - show users first matching auth block |
1113 |
> |
* masked - show users the first matching auth block |
1114 |
|
* no - show users all auth blocks. |
1115 |
|
*/ |
1116 |
|
stats_k_oper_only = yes; |
1128 |
|
opers_bypass_callerid = no; |
1129 |
|
|
1130 |
|
/* |
1131 |
< |
* pace_wait_simple: time between use of less intensive commands |
1131 |
> |
* pace_wait_simple: minimum time required between use of less |
1132 |
> |
* intensive commands |
1133 |
|
* (ADMIN, HELP, (L)USERS, VERSION, remote WHOIS) |
1134 |
|
*/ |
1135 |
|
pace_wait_simple = 1 second; |
1136 |
|
|
1137 |
|
/* |
1138 |
< |
* pace_wait: time between more intensive commands |
1138 |
> |
* pace_wait: minimum time required between use of more intensive commands |
1139 |
|
* (AWAY, INFO, LINKS, MAP, MOTD, STATS, WHO, wildcard WHOIS, WHOWAS) |
1140 |
|
*/ |
1141 |
|
pace_wait = 10 seconds; |
1142 |
|
|
1143 |
|
/* |
1144 |
< |
* short_motd: send clients a notice telling them to read the motd |
1145 |
< |
* instead of forcing a motd to clients who may simply ignore it. |
1144 |
> |
* short_motd: send clients a notice telling them to read the MOTD |
1145 |
> |
* instead of forcing an MOTD to clients who may simply ignore it. |
1146 |
|
*/ |
1147 |
|
short_motd = no; |
1148 |
|
|
1164 |
|
/* oper_pass_resv: allow opers to over-ride RESVs on nicks/channels. */ |
1165 |
|
oper_pass_resv = yes; |
1166 |
|
|
1167 |
< |
/* REMOVE ME. The following line checks you've been reading. */ |
1167 |
> |
/* REMOVE ME. The following line checks that you have been reading. */ |
1168 |
|
havent_read_conf = 1; |
1169 |
|
|
1170 |
|
/* |
1171 |
< |
* max_targets: the maximum amount of targets in a single |
1171 |
> |
* max_targets: the maximum number of targets in a single |
1172 |
|
* PRIVMSG/NOTICE. Set to 999 NOT 0 for unlimited. |
1173 |
|
*/ |
1174 |
|
max_targets = 4; |
1222 |
|
# egdpool_path = "/var/run/egd-pool"; |
1223 |
|
|
1224 |
|
/* |
1225 |
< |
* throttle_time: the minimum amount of time between connections from |
1226 |
< |
* the same ip. exempt {} blocks are excluded from this throttling. |
1225 |
> |
* throttle_time: the minimum amount of time required between |
1226 |
> |
* connections from the same IP address. exempt {} blocks are excluded |
1227 |
> |
* from this throttling. |
1228 |
|
* Offers protection against flooders who reconnect quickly. |
1229 |
|
* Set to 0 to disable. |
1230 |
|
*/ |