2016-04-13 00:55:37 +02:00
|
|
|
# oragono IRCd config
|
2016-04-12 07:44:00 +02:00
|
|
|
|
|
|
|
# network configuration
|
|
|
|
network:
|
|
|
|
# name of the network
|
|
|
|
name: OragonoTest
|
|
|
|
|
|
|
|
# server configuration
|
2016-04-12 15:00:09 +02:00
|
|
|
server:
|
|
|
|
# server name
|
2016-04-13 00:55:37 +02:00
|
|
|
name: oragono.test
|
2016-04-12 15:00:09 +02:00
|
|
|
|
|
|
|
# addresses to listen on
|
2019-06-28 16:45:34 +02:00
|
|
|
listeners:
|
2019-07-12 15:53:58 +02:00
|
|
|
# The standard plaintext port for IRC is 6667. This will listen on all interfaces:
|
|
|
|
":6667":
|
|
|
|
|
2019-08-27 06:51:09 +02:00
|
|
|
# Allowing plaintext over the public Internet poses security and privacy issues,
|
|
|
|
# so if possible, we recommend that you comment out the above line and replace
|
|
|
|
# it with these two, which listen only on local interfaces:
|
|
|
|
# "127.0.0.1:6667": # (loopback ipv4, localhost-only)
|
|
|
|
# "[::1]:6667": # (loopback ipv6, localhost-only)
|
|
|
|
# Alternately, if you have a TLS certificate issued by a recognized CA,
|
|
|
|
# you can configure port 6667 as an STS-only listener that only serves
|
|
|
|
# "redirects" to the TLS port, but doesn't allow chat. See the manual
|
|
|
|
# for details.
|
|
|
|
|
2019-06-28 20:48:54 +02:00
|
|
|
# The standard SSL/TLS port for IRC is 6697. This will listen on all interfaces:
|
2019-06-28 16:45:34 +02:00
|
|
|
":6697":
|
|
|
|
tls:
|
|
|
|
key: tls.key
|
|
|
|
cert: tls.crt
|
2019-11-20 23:14:42 +01:00
|
|
|
# 'proxy' should typically be false. It's only for Kubernetes-style load
|
|
|
|
# balancing that does not terminate TLS, but sends an initial PROXY line
|
|
|
|
# in plaintext.
|
|
|
|
proxy: false
|
2019-06-28 16:45:34 +02:00
|
|
|
|
|
|
|
# Example of a Unix domain socket for proxying:
|
|
|
|
# "/tmp/oragono_sock":
|
|
|
|
|
|
|
|
# Example of a Tor listener: any connection that comes in on this listener will
|
|
|
|
# be considered a Tor connection. It is strongly recommended that this listener
|
|
|
|
# *not* be on a public interface --- it should be on 127.0.0.0/8 or unix domain:
|
2019-11-07 20:05:35 +01:00
|
|
|
# "/hidden_service_sockets/oragono_tor_sock":
|
2019-06-28 16:45:34 +02:00
|
|
|
# tor: true
|
2016-04-12 15:00:09 +02:00
|
|
|
|
2018-08-29 03:10:54 +02:00
|
|
|
# sets the permissions for Unix listen sockets. on a typical Linux system,
|
|
|
|
# the default is 0775 or 0755, which prevents other users/groups from connecting
|
|
|
|
# to the socket. With 0777, it behaves like a normal TCP socket
|
|
|
|
# where anyone can connect.
|
|
|
|
unix-bind-mode: 0777
|
2018-08-28 19:34:43 +02:00
|
|
|
|
2019-06-28 16:45:34 +02:00
|
|
|
# configure the behavior of Tor listeners (ignored if you didn't enable any):
|
2019-02-26 03:50:43 +01:00
|
|
|
tor-listeners:
|
|
|
|
# if this is true, connections from Tor must authenticate with SASL
|
|
|
|
require-sasl: false
|
|
|
|
|
|
|
|
# what hostname should be displayed for Tor connections?
|
|
|
|
vhost: "tor-network.onion"
|
|
|
|
|
|
|
|
# allow at most this many connections at once (0 for no limit):
|
|
|
|
max-connections: 64
|
|
|
|
|
|
|
|
# connection throttling (limit how many connection attempts are allowed at once):
|
|
|
|
throttle-duration: 10m
|
|
|
|
# set to 0 to disable throttling:
|
|
|
|
max-connections-per-duration: 64
|
|
|
|
|
2017-03-09 10:07:35 +01:00
|
|
|
# strict transport security, to get clients to automagically use TLS
|
|
|
|
sts:
|
|
|
|
# whether to advertise STS
|
|
|
|
#
|
|
|
|
# to stop advertising STS, leave this enabled and set 'duration' below to "0". this will
|
|
|
|
# advertise to connecting users that the STS policy they have saved is no longer valid
|
2017-03-09 10:12:53 +01:00
|
|
|
enabled: false
|
2017-03-09 10:07:35 +01:00
|
|
|
|
|
|
|
# how long clients should be forced to use TLS for.
|
2017-03-09 10:15:32 +01:00
|
|
|
# setting this to a too-long time will mean bad things if you later remove your TLS.
|
|
|
|
# the default duration below is 1 month, 2 days and 5 minutes.
|
|
|
|
duration: 1mo2d5m
|
2017-03-09 10:07:35 +01:00
|
|
|
|
|
|
|
# tls port - you should be listening on this port above
|
|
|
|
port: 6697
|
|
|
|
|
|
|
|
# should clients include this STS policy when they ship their inbuilt preload lists?
|
|
|
|
preload: false
|
2016-04-12 15:00:09 +02:00
|
|
|
|
2019-12-18 13:06:04 +01:00
|
|
|
# casemapping controls what kinds of strings are permitted as identifiers (nicknames,
|
|
|
|
# channel names, account names, etc.), and how they are normalized for case.
|
|
|
|
# with the recommended default of 'precis', utf-8 identifiers that are "sane"
|
|
|
|
# (according to RFC 8265) are allowed, and the server additionally tries to protect
|
|
|
|
# against confusable characters ("homoglyph attacks").
|
|
|
|
# the other options are 'ascii' (traditional ASCII-only identifiers), and 'permissive',
|
|
|
|
# which allows identifiers to contain unusual characters like emoji, but makes users
|
|
|
|
# vulnerable to homoglyph attacks. unless you're really confident in your decision,
|
|
|
|
# we recommend leaving this value at its default (changing it once the network is
|
|
|
|
# already up and running is problematic).
|
2019-12-18 18:29:57 +01:00
|
|
|
casemapping: "precis"
|
2019-12-18 13:06:04 +01:00
|
|
|
|
2019-12-17 21:10:23 +01:00
|
|
|
# whether to look up user hostnames with reverse DNS
|
|
|
|
# (to suppress this for privacy purposes, use the ip-cloaking options below)
|
|
|
|
lookup-hostnames: true
|
|
|
|
# whether to confirm hostname lookups using "forward-confirmed reverse DNS", i.e., for
|
|
|
|
# any hostname returned from reverse DNS, resolve it back to an IP address and reject it
|
|
|
|
# unless it matches the connecting IP
|
|
|
|
forward-confirm-hostnames: true
|
|
|
|
|
2016-06-30 11:28:34 +02:00
|
|
|
# use ident protocol to get usernames
|
2019-02-26 22:27:14 +01:00
|
|
|
check-ident: false
|
2016-06-30 11:28:34 +02:00
|
|
|
|
2016-04-12 15:00:09 +02:00
|
|
|
# password to login to the server
|
2016-04-13 00:55:37 +02:00
|
|
|
# generated using "oragono genpasswd"
|
2016-04-12 15:00:09 +02:00
|
|
|
#password: ""
|
|
|
|
|
|
|
|
# motd filename
|
2016-04-12 08:34:47 +02:00
|
|
|
# if you change the motd, you should move it to ircd.motd
|
|
|
|
motd: oragono.motd
|
2016-04-12 15:00:09 +02:00
|
|
|
|
2017-10-08 12:17:49 +02:00
|
|
|
# motd formatting codes
|
|
|
|
# if this is true, the motd is escaped using formatting codes like $c, $b, and $i
|
2018-04-11 01:26:42 +02:00
|
|
|
motd-formatting: true
|
2017-10-08 12:17:49 +02:00
|
|
|
|
2019-02-05 06:19:03 +01:00
|
|
|
# addresses/CIDRs the PROXY command can be used from
|
|
|
|
# this should be restricted to 127.0.0.1/8 and ::1/128 (unless you have a good reason)
|
2017-09-11 08:50:41 +02:00
|
|
|
# you should also add these addresses to the connection limits and throttling exemption lists
|
|
|
|
proxy-allowed-from:
|
|
|
|
# - localhost
|
2019-06-07 11:40:10 +02:00
|
|
|
# - "192.168.1.1"
|
|
|
|
# - "192.168.10.1/24"
|
2017-09-11 07:04:08 +02:00
|
|
|
|
2017-10-15 08:18:14 +02:00
|
|
|
# controls the use of the WEBIRC command (by IRC<->web interfaces, bouncers and similar)
|
|
|
|
webirc:
|
|
|
|
# one webirc block -- should correspond to one set of gateways
|
|
|
|
-
|
2019-12-18 23:53:12 +01:00
|
|
|
# SHA-256 fingerprint of the TLS certificate the gateway must use to connect
|
|
|
|
# (comment this out to use passwords only)
|
2019-12-18 21:44:06 +01:00
|
|
|
fingerprint: "abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789"
|
2017-10-16 00:47:49 +02:00
|
|
|
|
2019-12-18 23:53:12 +01:00
|
|
|
# password the gateway uses to connect, made with oragono genpasswd
|
2018-08-06 04:51:39 +02:00
|
|
|
password: "$2a$04$sLEFDpIOyUp55e6gTMKbOeroT6tMXTjPFvA0eGvwvImVR9pkwv7ee"
|
2017-10-15 08:18:14 +02:00
|
|
|
|
2019-02-05 06:19:03 +01:00
|
|
|
# addresses/CIDRs that can use this webirc command
|
2018-02-25 11:18:54 +01:00
|
|
|
# you should also add these addresses to the connection limits and throttling exemption lists
|
2017-10-15 08:18:14 +02:00
|
|
|
hosts:
|
|
|
|
# - localhost
|
2019-06-07 11:40:10 +02:00
|
|
|
# - "192.168.1.1"
|
|
|
|
# - "192.168.10.1/24"
|
2017-10-15 08:18:14 +02:00
|
|
|
|
2018-11-26 11:23:27 +01:00
|
|
|
# allow use of the RESUME extension over plaintext connections:
|
|
|
|
# do not enable this unless the ircd is only accessible over internal networks
|
|
|
|
allow-plaintext-resume: false
|
|
|
|
|
2017-03-13 23:12:39 +01:00
|
|
|
# maximum length of clients' sendQ in bytes
|
2019-02-06 00:22:00 +01:00
|
|
|
# this should be big enough to hold bursts of channel/direct messages
|
2017-03-13 23:12:39 +01:00
|
|
|
max-sendq: 16k
|
|
|
|
|
2019-05-09 20:18:30 +02:00
|
|
|
# compatibility with legacy clients
|
|
|
|
compatibility:
|
|
|
|
# many clients require that the final parameter of certain messages be an
|
|
|
|
# RFC1459 trailing parameter, i.e., prefixed with :, whether or not this is
|
|
|
|
# actually required. this forces Oragono to send those parameters
|
|
|
|
# as trailings. this is recommended unless you're testing clients for conformance;
|
|
|
|
# defaults to true when unset for that reason.
|
|
|
|
force-trailing: true
|
|
|
|
|
2019-05-19 10:27:44 +02:00
|
|
|
# some clients (ZNC 1.6.x and lower, Pidgin 2.12 and lower) do not
|
2019-05-09 20:18:30 +02:00
|
|
|
# respond correctly to SASL messages with the server name as a prefix:
|
|
|
|
# https://github.com/znc/znc/issues/1212
|
|
|
|
# this works around that bug, allowing them to use SASL.
|
|
|
|
send-unprefixed-sasl: true
|
|
|
|
|
2019-11-18 07:42:48 +01:00
|
|
|
# IP-based DoS protection
|
|
|
|
ip-limits:
|
2019-11-24 04:06:51 +01:00
|
|
|
# whether to limit the total number of concurrent connections per IP/CIDR
|
2019-11-24 03:09:31 +01:00
|
|
|
count: true
|
2019-11-24 03:07:45 +01:00
|
|
|
# maximum concurrent connections per IP/CIDR
|
2019-11-18 07:42:48 +01:00
|
|
|
max-concurrent-connections: 16
|
|
|
|
|
2019-11-24 03:07:45 +01:00
|
|
|
# whether to restrict the rate of new connections per IP/CIDR
|
2019-11-18 07:42:48 +01:00
|
|
|
throttle: true
|
|
|
|
# how long to keep track of connections for
|
|
|
|
window: 10m
|
2019-11-24 03:07:45 +01:00
|
|
|
# maximum number of new connections per IP/CIDR within the given duration
|
2019-11-18 07:42:48 +01:00
|
|
|
max-connections-per-window: 32
|
2019-11-24 03:07:45 +01:00
|
|
|
# how long to ban offenders for. after banning them, the number of connections is
|
|
|
|
# reset, which lets you use /UNDLINE to unban people
|
2019-11-18 07:42:48 +01:00
|
|
|
throttle-ban-duration: 10m
|
2017-01-12 08:40:01 +01:00
|
|
|
|
2019-11-18 07:42:48 +01:00
|
|
|
# how wide the CIDR should be for IPv4 (a /32 is a fully specified IPv4 address)
|
2017-10-02 05:59:02 +02:00
|
|
|
cidr-len-ipv4: 32
|
2019-11-24 03:07:45 +01:00
|
|
|
# how wide the CIDR should be for IPv6 (a /64 is the typical prefix assigned
|
2019-11-18 07:42:48 +01:00
|
|
|
# by an ISP to an individual customer for their LAN)
|
2017-10-02 05:59:02 +02:00
|
|
|
cidr-len-ipv6: 64
|
2016-10-23 15:05:00 +02:00
|
|
|
|
|
|
|
# IPs/networks which are exempted from connection limits
|
|
|
|
exempted:
|
2019-02-05 06:19:03 +01:00
|
|
|
- "localhost"
|
|
|
|
# - "192.168.1.1"
|
|
|
|
# - "2001:0db8::/32"
|
2016-10-23 15:05:00 +02:00
|
|
|
|
2019-11-24 03:07:45 +01:00
|
|
|
# custom connection limits for certain IPs/networks. note that CIDR
|
2019-11-18 07:42:48 +01:00
|
|
|
# widths defined here override the default CIDR width --- the limit
|
|
|
|
# will apply to the entire CIDR no matter how large or small it is
|
|
|
|
custom-limits:
|
|
|
|
# "8.8.0.0/16":
|
|
|
|
# max-concurrent-connections: 128
|
|
|
|
# max-connections-per-window: 1024
|
2017-01-12 08:40:01 +01:00
|
|
|
|
2019-05-12 08:17:57 +02:00
|
|
|
# IP cloaking hides users' IP addresses from other users and from channel admins
|
|
|
|
# (but not from server admins), while still allowing channel admins to ban
|
|
|
|
# offending IP addresses or networks. In place of hostnames derived from reverse
|
|
|
|
# DNS, users see fake domain names like pwbs2ui4377257x8.oragono. These names are
|
|
|
|
# generated deterministically from the underlying IP address, but if the underlying
|
|
|
|
# IP is not already known, it is infeasible to recover it from the cloaked name.
|
|
|
|
ip-cloaking:
|
|
|
|
# whether to enable IP cloaking
|
|
|
|
enabled: false
|
|
|
|
|
|
|
|
# fake TLD at the end of the hostname, e.g., pwbs2ui4377257x8.oragono
|
|
|
|
netname: "oragono"
|
|
|
|
|
|
|
|
# secret key to prevent dictionary attacks against cloaked IPs
|
|
|
|
# any high-entropy secret is valid for this purpose:
|
|
|
|
# you MUST generate a new one for your installation.
|
2019-05-12 22:26:23 +02:00
|
|
|
# suggestion: use the output of `oragono mksecret`
|
2019-05-12 08:17:57 +02:00
|
|
|
# note that rotating this key will invalidate all existing ban masks.
|
|
|
|
secret: "siaELnk6Kaeo65K3RCrwJjlWaZ-Bt3WuZ2L8MXLbNb4"
|
|
|
|
|
|
|
|
# the cloaked hostname is derived only from the CIDR (most significant bits
|
|
|
|
# of the IP address), up to a configurable number of bits. this is the
|
2019-11-18 07:42:48 +01:00
|
|
|
# granularity at which bans will take effect for IPv4. Note that changing
|
|
|
|
# this value will invalidate any stored bans.
|
2019-05-12 08:17:57 +02:00
|
|
|
cidr-len-ipv4: 32
|
|
|
|
|
2019-11-18 07:42:48 +01:00
|
|
|
# analogous granularity for IPv6
|
2019-05-12 08:17:57 +02:00
|
|
|
cidr-len-ipv6: 64
|
|
|
|
|
|
|
|
# number of bits of hash output to include in the cloaked hostname.
|
|
|
|
# more bits means less likelihood of distinct IPs colliding,
|
|
|
|
# at the cost of a longer cloaked hostname. if this value is set to 0,
|
|
|
|
# all users will receive simply `netname` as their cloaked hostname.
|
|
|
|
num-bits: 80
|
|
|
|
|
|
|
|
|
2017-03-06 00:43:52 +01:00
|
|
|
# account options
|
|
|
|
accounts:
|
2019-12-29 17:59:49 +01:00
|
|
|
# is account authentication enabled, i.e., can users log into existing accounts?
|
|
|
|
authentication-enabled: true
|
|
|
|
|
2016-09-05 15:01:40 +02:00
|
|
|
# account registration
|
2017-03-06 00:43:52 +01:00
|
|
|
registration:
|
2019-12-09 02:58:53 +01:00
|
|
|
# can users register new accounts for themselves? if this is false, operators with
|
|
|
|
# the `accreg` capability can still create accounts with `/NICKSERV SAREGISTER`
|
2016-09-05 15:01:40 +02:00
|
|
|
enabled: true
|
|
|
|
|
2018-08-06 04:51:39 +02:00
|
|
|
# this is the bcrypt cost we'll use for account passwords
|
|
|
|
bcrypt-cost: 12
|
|
|
|
|
2016-09-05 15:01:40 +02:00
|
|
|
# length of time a user has to verify their account before it can be re-registered
|
2018-02-28 23:31:56 +01:00
|
|
|
verify-timeout: "32h"
|
2016-09-05 15:01:40 +02:00
|
|
|
|
|
|
|
# callbacks to allow
|
|
|
|
enabled-callbacks:
|
|
|
|
- none # no verification needed, will instantly register successfully
|
2018-02-20 10:20:30 +01:00
|
|
|
|
|
|
|
# example configuration for sending verification emails via a local mail relay
|
|
|
|
# callbacks:
|
|
|
|
# mailto:
|
|
|
|
# server: localhost
|
|
|
|
# port: 25
|
|
|
|
# tls:
|
|
|
|
# enabled: false
|
|
|
|
# username: ""
|
|
|
|
# password: ""
|
|
|
|
# sender: "admin@my.network"
|
|
|
|
|
2019-01-01 22:45:37 +01:00
|
|
|
# throttle account login attempts (to prevent either password guessing, or DoS
|
|
|
|
# attacks on the server aimed at forcing repeated expensive bcrypt computations)
|
|
|
|
login-throttling:
|
|
|
|
enabled: true
|
|
|
|
|
|
|
|
# window
|
|
|
|
duration: 1m
|
|
|
|
|
|
|
|
# number of attempts allowed within the window
|
|
|
|
max-attempts: 3
|
|
|
|
|
2018-02-27 03:44:03 +01:00
|
|
|
# some clients (notably Pidgin and Hexchat) offer only a single password field,
|
|
|
|
# which makes it impossible to specify a separate server password (for the PASS
|
|
|
|
# command) and SASL password. if this option is set to true, a client that
|
|
|
|
# successfully authenticates with SASL will not be required to send
|
|
|
|
# PASS as well, so it can be configured to authenticate with SASL only.
|
|
|
|
skip-server-password: false
|
|
|
|
|
2019-02-05 09:42:08 +01:00
|
|
|
# require-sasl controls whether clients are required to have accounts
|
|
|
|
# (and sign into them using SASL) to connect to the server
|
2019-02-05 06:19:03 +01:00
|
|
|
require-sasl:
|
2019-02-05 09:42:08 +01:00
|
|
|
# if this is enabled, all clients must authenticate with SASL while connecting
|
2019-02-05 06:19:03 +01:00
|
|
|
enabled: false
|
2019-02-05 09:42:08 +01:00
|
|
|
|
|
|
|
# IPs/CIDRs which are exempted from the account requirement
|
2019-02-05 06:19:03 +01:00
|
|
|
exempted:
|
|
|
|
- "localhost"
|
|
|
|
# - '10.10.0.0/16'
|
|
|
|
|
2018-02-18 10:46:14 +01:00
|
|
|
# nick-reservation controls how, and whether, nicknames are linked to accounts
|
|
|
|
nick-reservation:
|
|
|
|
# is there any enforcement of reserved nicknames?
|
|
|
|
enabled: false
|
|
|
|
|
2018-03-02 23:04:24 +01:00
|
|
|
# how many nicknames, in addition to the account name, can be reserved?
|
|
|
|
additional-nick-limit: 2
|
|
|
|
|
2018-02-18 10:46:14 +01:00
|
|
|
# method describes how nickname reservation is handled
|
2019-01-02 16:08:44 +01:00
|
|
|
# already logged-in using SASL or NickServ
|
|
|
|
# timeout: let the user change to the registered nickname, give them X seconds
|
|
|
|
# to login and then rename them if they haven't done so
|
|
|
|
# strict: don't let the user change to the registered nickname unless they're
|
|
|
|
# already logged-in using SASL or NickServ
|
|
|
|
# optional: no enforcement by default, but allow users to opt in to
|
|
|
|
# the enforcement level of their choice
|
2019-05-21 08:43:11 +02:00
|
|
|
method: strict
|
2018-02-18 10:46:14 +01:00
|
|
|
|
2019-01-02 16:08:44 +01:00
|
|
|
# allow users to set their own nickname enforcement status, e.g.,
|
|
|
|
# to opt in to strict enforcement
|
|
|
|
allow-custom-enforcement: true
|
|
|
|
|
2018-02-18 10:46:14 +01:00
|
|
|
# rename-timeout - this is how long users have 'til they're renamed
|
|
|
|
rename-timeout: 30s
|
|
|
|
|
|
|
|
# rename-prefix - this is the prefix to use when renaming clients (e.g. Guest-AB54U31)
|
|
|
|
rename-prefix: Guest-
|
2018-02-11 11:30:40 +01:00
|
|
|
|
2019-04-12 06:08:46 +02:00
|
|
|
# bouncer controls whether oragono can act as a bouncer, i.e., allowing
|
|
|
|
# multiple connections to attach to the same client/nickname identity
|
|
|
|
bouncer:
|
|
|
|
# when disabled, each connection must use a separate nickname (as is the
|
|
|
|
# typical behavior of IRC servers). when enabled, a new connection that
|
|
|
|
# has authenticated with SASL can associate itself with an existing
|
|
|
|
# client
|
|
|
|
enabled: true
|
|
|
|
|
|
|
|
# clients can opt in to bouncer functionality using the cap system, or
|
|
|
|
# via nickserv. if this is enabled, then they have to opt out instead
|
|
|
|
allowed-by-default: false
|
|
|
|
|
2018-04-23 08:38:35 +02:00
|
|
|
# vhosts controls the assignment of vhosts (strings displayed in place of the user's
|
|
|
|
# hostname/IP) by the HostServ service
|
|
|
|
vhosts:
|
|
|
|
# are vhosts enabled at all?
|
2018-04-19 08:48:19 +02:00
|
|
|
enabled: true
|
2018-04-23 08:38:35 +02:00
|
|
|
|
2018-04-19 08:48:19 +02:00
|
|
|
# maximum length of a vhost
|
2018-04-23 08:38:35 +02:00
|
|
|
max-length: 64
|
|
|
|
|
2018-04-19 08:48:19 +02:00
|
|
|
# regexp for testing the validity of a vhost
|
|
|
|
# (make sure any changes you make here are RFC-compliant)
|
|
|
|
valid-regexp: '^[0-9A-Za-z.\-_/]+$'
|
|
|
|
|
2018-04-23 08:38:35 +02:00
|
|
|
# options controlling users requesting vhosts:
|
|
|
|
user-requests:
|
|
|
|
# can users request vhosts at all? if this is false, operators with the
|
|
|
|
# 'vhosts' capability can still assign vhosts manually
|
|
|
|
enabled: false
|
|
|
|
|
|
|
|
# if uncommented, all new vhost requests will be dumped into the given
|
|
|
|
# channel, so opers can review them as they are sent in. ensure that you
|
|
|
|
# have registered and restricted the channel appropriately before you
|
|
|
|
# uncomment this.
|
|
|
|
#channel: "#vhosts"
|
|
|
|
|
|
|
|
# after a user's vhost has been approved or rejected, they need to wait
|
|
|
|
# this long (starting from the time of their original request)
|
|
|
|
# before they can request a new one.
|
|
|
|
cooldown: 168h
|
|
|
|
|
2017-03-24 03:52:38 +01:00
|
|
|
# channel options
|
|
|
|
channels:
|
2017-09-06 23:34:38 +02:00
|
|
|
# modes that are set when new channels are created
|
|
|
|
# +n is no-external-messages and +t is op-only-topic
|
|
|
|
# see /QUOTE HELP cmodes for more channel modes
|
|
|
|
default-modes: +nt
|
|
|
|
|
2019-02-06 10:55:05 +01:00
|
|
|
# how many channels can a client be in at once?
|
|
|
|
max-channels-per-client: 100
|
|
|
|
|
2019-05-30 11:33:59 +02:00
|
|
|
# if this is true, new channels can only be created by operators with the
|
|
|
|
# `chanreg` operator capability
|
|
|
|
operator-only-creation: false
|
|
|
|
|
2017-03-24 03:52:38 +01:00
|
|
|
# channel registration - requires an account
|
|
|
|
registration:
|
|
|
|
# can users register new channels?
|
|
|
|
enabled: true
|
|
|
|
|
2019-02-06 10:32:04 +01:00
|
|
|
# how many channels can each account register?
|
2019-02-06 21:47:20 +01:00
|
|
|
max-channels-per-account: 15
|
2019-02-06 10:32:04 +01:00
|
|
|
|
2016-10-23 02:47:11 +02:00
|
|
|
# operator classes
|
|
|
|
oper-classes:
|
|
|
|
# local operator
|
|
|
|
"local-oper":
|
|
|
|
# title shown in WHOIS
|
|
|
|
title: Local Operator
|
|
|
|
|
|
|
|
# capability names
|
|
|
|
capabilities:
|
|
|
|
- "oper:local_kill"
|
|
|
|
- "oper:local_ban"
|
|
|
|
- "oper:local_unban"
|
2018-03-22 16:04:21 +01:00
|
|
|
- "nofakelag"
|
2016-10-23 02:47:11 +02:00
|
|
|
|
|
|
|
# network operator
|
|
|
|
"network-oper":
|
|
|
|
# title shown in WHOIS
|
|
|
|
title: Network Operator
|
|
|
|
|
|
|
|
# oper class this extends from
|
|
|
|
extends: "local-oper"
|
|
|
|
|
|
|
|
# capability names
|
|
|
|
capabilities:
|
|
|
|
- "oper:remote_kill"
|
|
|
|
- "oper:remote_ban"
|
|
|
|
- "oper:remote_unban"
|
|
|
|
|
|
|
|
# server admin
|
|
|
|
"server-admin":
|
|
|
|
# title shown in WHOIS
|
|
|
|
title: Server Admin
|
|
|
|
|
|
|
|
# oper class this extends from
|
|
|
|
extends: "local-oper"
|
|
|
|
|
|
|
|
# capability names
|
|
|
|
capabilities:
|
|
|
|
- "oper:rehash"
|
|
|
|
- "oper:die"
|
2018-06-19 10:03:40 +02:00
|
|
|
- "accreg"
|
2018-05-25 08:46:36 +02:00
|
|
|
- "sajoin"
|
2017-01-23 00:36:13 +01:00
|
|
|
- "samode"
|
2018-04-23 08:38:35 +02:00
|
|
|
- "vhosts"
|
2018-05-25 06:38:20 +02:00
|
|
|
- "chanreg"
|
2016-10-23 02:47:11 +02:00
|
|
|
|
2016-04-12 15:00:09 +02:00
|
|
|
# ircd operators
|
2016-10-23 02:47:11 +02:00
|
|
|
opers:
|
2016-04-12 15:00:09 +02:00
|
|
|
# operator named 'dan'
|
|
|
|
dan:
|
2016-10-23 02:47:11 +02:00
|
|
|
# which capabilities this oper has access to
|
|
|
|
class: "server-admin"
|
|
|
|
|
2016-10-23 03:01:05 +02:00
|
|
|
# custom whois line
|
|
|
|
whois-line: is a cool dude
|
|
|
|
|
2016-10-23 02:47:11 +02:00
|
|
|
# custom hostname
|
|
|
|
vhost: "n"
|
|
|
|
|
2017-05-08 01:15:16 +02:00
|
|
|
# modes are the modes to auto-set upon opering-up
|
|
|
|
modes: +is acjknoqtux
|
|
|
|
|
2019-12-19 12:33:43 +01:00
|
|
|
# operators can be authenticated either by password (with the /OPER command),
|
|
|
|
# or by certificate fingerprint, or both. if a password hash is set, then a
|
|
|
|
# password is required to oper up (e.g., /OPER dan mypassword). to generate
|
|
|
|
# the hash, use `oragono genpasswd`.
|
2018-08-06 04:51:39 +02:00
|
|
|
password: "$2a$04$LiytCxaY0lI.guDj2pBN4eLRD5cdM2OLDwqmGAgB6M2OPirbF5Jcu"
|
2016-08-12 14:20:32 +02:00
|
|
|
|
2019-12-19 12:33:43 +01:00
|
|
|
# if a SHA-256 certificate fingerprint is configured here, then it will be
|
|
|
|
# required to /OPER. if you comment out the password hash above, then you can
|
|
|
|
# /OPER without a password.
|
|
|
|
#fingerprint: "abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789"
|
|
|
|
# if 'auto' is set (and no password hash is set), operator permissions will be
|
|
|
|
# granted automatically as soon as you connect with the right fingerprint.
|
|
|
|
#auto: true
|
2019-12-18 21:44:06 +01:00
|
|
|
|
2017-03-06 04:08:46 +01:00
|
|
|
# logging, takes inspiration from Insp
|
|
|
|
logging:
|
|
|
|
-
|
|
|
|
# how to log these messages
|
|
|
|
#
|
|
|
|
# file log to given target filename
|
2017-05-01 10:51:37 +02:00
|
|
|
# stdout log to stdout
|
2017-03-06 04:08:46 +01:00
|
|
|
# stderr log to stderr
|
2019-02-06 00:22:00 +01:00
|
|
|
# (you can specify multiple methods, e.g., to log to both stderr and a file)
|
|
|
|
method: stderr
|
2017-03-06 04:08:46 +01:00
|
|
|
|
|
|
|
# filename to log to, if file method is selected
|
2019-02-06 00:22:00 +01:00
|
|
|
# filename: ircd.log
|
2017-03-06 04:08:46 +01:00
|
|
|
|
|
|
|
# type(s) of logs to keep here. you can use - to exclude those types
|
|
|
|
#
|
|
|
|
# exclusions take precedent over inclusions, so if you exclude a type it will NEVER
|
|
|
|
# be logged, even if you explicitly include it
|
|
|
|
#
|
|
|
|
# useful types include:
|
|
|
|
# * everything (usually used with exclusing some types below)
|
2019-02-03 03:12:17 +01:00
|
|
|
# server server startup, rehash, and shutdown events
|
2017-03-06 04:08:46 +01:00
|
|
|
# accounts account registration and authentication
|
|
|
|
# channels channel creation and operations
|
|
|
|
# commands command calling and operations
|
|
|
|
# opers oper actions, authentication, etc
|
2019-02-13 08:42:35 +01:00
|
|
|
# services actions related to NickServ, ChanServ, etc.
|
|
|
|
# internal unexpected runtime behavior, including potential bugs
|
2017-03-06 04:08:46 +01:00
|
|
|
# userinput raw lines sent by users
|
|
|
|
# useroutput raw lines sent to users
|
2019-02-06 00:22:00 +01:00
|
|
|
type: "* -userinput -useroutput"
|
2017-03-06 04:08:46 +01:00
|
|
|
|
|
|
|
# one of: debug info warn error
|
2017-03-06 13:11:10 +01:00
|
|
|
level: info
|
2019-02-06 00:22:00 +01:00
|
|
|
#-
|
|
|
|
# # example of a file log that avoids logging IP addresses
|
|
|
|
# method: file
|
|
|
|
# filename: ircd.log
|
|
|
|
# type: "* -userinput -useroutput -localconnect -localconnect-ip"
|
|
|
|
# level: debug
|
2017-03-06 04:08:46 +01:00
|
|
|
|
2017-04-30 04:35:07 +02:00
|
|
|
# debug options
|
|
|
|
debug:
|
2017-10-26 10:19:01 +02:00
|
|
|
# when enabled, oragono will attempt to recover from certain kinds of
|
|
|
|
# client-triggered runtime errors that would normally crash the server.
|
|
|
|
# this makes the server more resilient to DoS, but could result in incorrect
|
|
|
|
# behavior. deployments that would prefer to "start from scratch", e.g., by
|
|
|
|
# letting the process crash and auto-restarting it with systemd, can set
|
|
|
|
# this to false.
|
|
|
|
recover-from-errors: true
|
|
|
|
|
2018-03-13 19:46:39 +01:00
|
|
|
# optionally expose a pprof http endpoint: https://golang.org/pkg/net/http/pprof/
|
|
|
|
# it is strongly recommended that you don't expose this on a public interface;
|
|
|
|
# if you need to access it remotely, you can use an SSH tunnel.
|
|
|
|
# set to `null`, "", leave blank, or omit to disable
|
2018-03-13 23:04:15 +01:00
|
|
|
# pprof-listener: "localhost:6060"
|
2018-03-13 19:46:39 +01:00
|
|
|
|
2016-09-04 11:25:33 +02:00
|
|
|
# datastore configuration
|
|
|
|
datastore:
|
|
|
|
# path to the datastore
|
|
|
|
path: ircd.db
|
|
|
|
|
2018-04-20 09:57:48 +02:00
|
|
|
# if the database schema requires an upgrade, `autoupgrade` will attempt to
|
|
|
|
# perform it automatically on startup. the database will be backed
|
2018-04-16 22:28:31 +02:00
|
|
|
# up, and if the upgrade fails, the original database will be restored.
|
|
|
|
autoupgrade: true
|
2016-09-04 11:25:33 +02:00
|
|
|
|
2018-01-22 08:30:31 +01:00
|
|
|
# languages config
|
|
|
|
languages:
|
|
|
|
# whether to load languages
|
2018-04-11 01:26:42 +02:00
|
|
|
enabled: true
|
2018-01-22 08:30:31 +01:00
|
|
|
|
|
|
|
# default language to use for new clients
|
|
|
|
# 'en' is the default English language in the code
|
|
|
|
default: en
|
|
|
|
|
|
|
|
# which directory contains our language files
|
|
|
|
path: languages
|
|
|
|
|
2016-08-12 14:20:32 +02:00
|
|
|
# limits - these need to be the same across the network
|
|
|
|
limits:
|
|
|
|
# nicklen is the max nick length allowed
|
|
|
|
nicklen: 32
|
|
|
|
|
2019-02-03 10:24:59 +01:00
|
|
|
# identlen is the max ident length allowed
|
2019-02-03 20:01:46 +01:00
|
|
|
identlen: 20
|
2019-02-03 10:24:59 +01:00
|
|
|
|
2016-08-12 14:20:32 +02:00
|
|
|
# channellen is the max channel length allowed
|
|
|
|
channellen: 64
|
2016-08-14 06:07:50 +02:00
|
|
|
|
2016-09-12 04:40:09 +02:00
|
|
|
# awaylen is the maximum length of an away message
|
2016-11-29 09:38:04 +01:00
|
|
|
awaylen: 500
|
2016-09-12 04:40:09 +02:00
|
|
|
|
2016-09-12 04:22:50 +02:00
|
|
|
# kicklen is the maximum length of a kick message
|
2016-11-29 09:38:04 +01:00
|
|
|
kicklen: 1000
|
2016-09-12 04:22:50 +02:00
|
|
|
|
|
|
|
# topiclen is the maximum length of a channel topic
|
2016-11-29 09:38:04 +01:00
|
|
|
topiclen: 1000
|
2016-09-12 04:22:50 +02:00
|
|
|
|
2016-10-16 12:14:56 +02:00
|
|
|
# maximum number of monitor entries a client can have
|
|
|
|
monitor-entries: 100
|
|
|
|
|
2016-08-14 06:07:50 +02:00
|
|
|
# whowas entries to store
|
|
|
|
whowas-entries: 100
|
2016-10-23 16:50:18 +02:00
|
|
|
|
|
|
|
# maximum length of channel lists (beI modes)
|
|
|
|
chan-list-modes: 60
|
2016-11-29 09:38:04 +01:00
|
|
|
|
|
|
|
# maximum length of IRC lines
|
2017-01-18 00:46:30 +01:00
|
|
|
# this should generally be 1024-2048, and will only apply when negotiated by clients
|
2017-01-13 15:22:42 +01:00
|
|
|
linelen:
|
2019-03-07 08:31:46 +01:00
|
|
|
# ratified version of the message-tags cap fixes the max tag length at 8191 bytes
|
|
|
|
# configurable length for the rest of the message:
|
2017-01-13 15:22:42 +01:00
|
|
|
rest: 2048
|
2018-03-22 16:04:21 +01:00
|
|
|
|
2019-05-22 22:15:59 +02:00
|
|
|
# maximum number of messages to accept during registration (prevents
|
|
|
|
# DoS / resource exhaustion attacks):
|
|
|
|
registration-messages: 1024
|
|
|
|
|
2019-12-23 21:26:37 +01:00
|
|
|
# message length limits for the new multiline cap
|
|
|
|
multiline:
|
|
|
|
max-bytes: 4096 # 0 means disabled
|
|
|
|
max-lines: 24 # 0 means no limit
|
|
|
|
|
2018-03-22 16:04:21 +01:00
|
|
|
# fakelag: prevents clients from spamming commands too rapidly
|
|
|
|
fakelag:
|
|
|
|
# whether to enforce fakelag
|
2019-06-12 09:40:14 +02:00
|
|
|
enabled: true
|
2018-03-22 16:04:21 +01:00
|
|
|
|
|
|
|
# time unit for counting command rates
|
|
|
|
window: 1s
|
|
|
|
|
|
|
|
# clients can send this many commands without fakelag being imposed
|
|
|
|
burst-limit: 5
|
|
|
|
|
|
|
|
# once clients have exceeded their burst allowance, they can send only
|
|
|
|
# this many commands per `window`:
|
|
|
|
messages-per-window: 2
|
2018-03-28 19:18:08 +02:00
|
|
|
|
|
|
|
# client status resets to the default state if they go this long without
|
|
|
|
# sending any commands:
|
2018-04-01 01:43:55 +02:00
|
|
|
cooldown: 2s
|
2018-11-26 11:23:27 +01:00
|
|
|
|
|
|
|
# message history tracking, for the RESUME extension and possibly other uses in future
|
|
|
|
history:
|
|
|
|
# should we store messages for later playback?
|
2019-02-05 10:29:32 +01:00
|
|
|
# the current implementation stores messages in RAM only; they do not persist
|
2019-02-10 12:06:11 +01:00
|
|
|
# across server restarts. however, you should not enable this unless you understand
|
2019-02-05 10:29:32 +01:00
|
|
|
# how it interacts with the GDPR and/or any data privacy laws that apply
|
|
|
|
# in your country and the countries of your users.
|
2019-02-10 12:06:11 +01:00
|
|
|
enabled: false
|
2018-11-26 11:23:27 +01:00
|
|
|
|
|
|
|
# how many channel-specific events (messages, joins, parts) should be tracked per channel?
|
2019-05-19 22:34:52 +02:00
|
|
|
channel-length: 1024
|
2018-11-26 11:23:27 +01:00
|
|
|
|
|
|
|
# how many direct messages and notices should be tracked per user?
|
2019-05-19 22:34:52 +02:00
|
|
|
client-length: 256
|
|
|
|
|
|
|
|
# how long should we try to preserve messages?
|
|
|
|
# if `autoresize-window` is 0, the in-memory message buffers are preallocated to
|
|
|
|
# their maximum length. if it is nonzero, the buffers are initially small and
|
|
|
|
# are dynamically expanded up to the maximum length. if the buffer is full
|
|
|
|
# and the oldest message is older than `autoresize-window`, then it will overwrite
|
|
|
|
# the oldest message rather than resize; otherwise, it will expand if possible.
|
|
|
|
autoresize-window: 1h
|
2018-12-28 19:45:55 +01:00
|
|
|
|
|
|
|
# number of messages to automatically play back on channel join (0 to disable):
|
|
|
|
autoreplay-on-join: 0
|
2019-02-04 18:16:28 +01:00
|
|
|
|
|
|
|
# maximum number of CHATHISTORY messages that can be
|
|
|
|
# requested at once (0 disables support for CHATHISTORY)
|
|
|
|
chathistory-maxmessages: 100
|