]> jfr.im git - irc/atheme/atheme.git/log
irc/atheme/atheme.git
5 years agoAtheme v7.2.10-r2 v7.2.10-r2
Aaron Jones [Thu, 5 Jul 2018 14:11:29 +0000 (14:11 +0000)] 
Atheme v7.2.10-r2

5 years agomodules/crypto/pbkdf2v2: fix regression from v7.2.9
Aaron Jones [Thu, 5 Jul 2018 14:06:06 +0000 (14:06 +0000)] 
modules/crypto/pbkdf2v2: fix regression from v7.2.9

Interoperability tests were performed between 7.2.9 and master,
and 7.2.10 and master, but not 7.2.9 and 7.2.10. 7.2.10 and
master use base64-encoded salts for new hashes, and master has
a verify function which doesn't require string-equal output.

However, 7.2 doesn't have that feature, so crypt() must output
a string-equal hash to all of the previous outputs over all
versions. What I failed to notice was that crypt() was assuming
the salt was base64-encoded, so if it wasn't, password
verification would fail; the hash is the same byte-wise, but it
is encoded as a string differently.

While we're at it, make sure the parameter upgrade system takes
account of various salt lengths, allow the user to configure a
different salt length (as if on master), and make sure we erase
the password from the stack after we're done with it.

Reported-by: xerox123
5 years agoAtheme 7.2.10
Aaron Jones [Fri, 29 Jun 2018 13:01:18 +0000 (13:01 +0000)] 
Atheme 7.2.10

5 years agomodules/misc/httpd: mod_deinit: close listener & children immediately
Aaron Jones [Sun, 10 Jun 2018 02:08:56 +0000 (02:08 +0000)] 
modules/misc/httpd: mod_deinit: close listener & children immediately

Closes #628

5 years agolibathemecore/connection: add func to close listener & children immediately
Aaron Jones [Sun, 10 Jun 2018 02:08:15 +0000 (02:08 +0000)] 
libathemecore/connection: add func to close listener & children immediately

5 years agomodules/chanserv/{access,flags}: use flags setter information if available
Aaron Jones [Tue, 5 Jun 2018 13:48:00 +0000 (13:48 +0000)] 
modules/chanserv/{access,flags}: use flags setter information if available

6 years agomodules/crypto/argon2d.c: argon2d_hash_raw(): fix uninitialised data path
Aaron Jones [Wed, 28 Feb 2018 11:50:04 +0000 (11:50 +0000)] 
modules/crypto/argon2d.c: argon2d_hash_raw(): fix uninitialised data path

If the first blake2b_long() call in argon2d_hash_raw() fails, it would pass
uninitialised data in bhash_bytes[] to argon2d_load_block(). Similarly if
the second call fails, same thing. Lastly, the return value should depend on
whether the final call succeeds.

Fix this by testing if it fails, and add a function attribute to all boolean
functions that will result in a diagnostic if their return value is not
tested (or under Clang, explicitly discarded). Adjust other callers of those
functions to also test for failure.

This issue was found by the Clang static analyzer.

6 years agomodules/crypto/pbkdf2v2: use SASL mechanism name for SCRAM digests
Aaron Jones [Mon, 12 Feb 2018 07:50:42 +0000 (07:50 +0000)] 
modules/crypto/pbkdf2v2: use SASL mechanism name for SCRAM digests

[ci skip]

6 years agoinclude/common.h: bump e-mail max length to 254 characters
Aaron Jones [Mon, 12 Feb 2018 07:14:20 +0000 (07:14 +0000)] 
include/common.h: bump e-mail max length to 254 characters

<http://www.rfc-editor.org/errata_search.php?rfc=3696&eid=1690>

[ci skip]

6 years agomodules/contrib/: bump to latest HEAD
Aaron Jones [Sun, 11 Feb 2018 14:44:59 +0000 (14:44 +0000)] 
modules/contrib/: bump to latest HEAD

6 years agoinclude/common.h: add internal error fault code from master (needed for new contrib)
Aaron Jones [Sun, 11 Feb 2018 14:44:44 +0000 (14:44 +0000)] 
include/common.h: add internal error fault code from master (needed for new contrib)

6 years agolibathemecore, modules: some spelling fixes
Unit 193 [Wed, 7 Feb 2018 12:47:04 +0000 (13:47 +0100)] 
libathemecore, modules: some spelling fixes

6 years agogroupserv/main: use correct database backend functions
Aaron M. D. Jones [Sun, 4 Feb 2018 15:14:09 +0000 (15:14 +0000)] 
groupserv/main: use correct database backend functions

These 2 functions behave identically in opensex in this scenario but
that is an implementation detail that should not be relied upon.

6 years agogroupserv/main: write out group definitions before their access lists
Aaron M. D. Jones [Sun, 4 Feb 2018 14:42:03 +0000 (14:42 +0000)] 
groupserv/main: write out group definitions before their access lists

If a group '!a' includes an access list entry for group '!b' (which is
lexicographically after) then upon read-back (when restarting services)
the access list contains an entry for a (for the moment) non-existent
group which is ignored. This results in data loss.

The fix is simple: Write out all group definitions (& their flags and
metadata) and then all group access lists.

Reported-by: Samuel Hoffman <redacted> (sjh)
Reported-by: Aaron M. D. Jones <redacted> (amdj)
Reviewed-by: Janik Kleinhoff <redacted> (ilbelkyr)
6 years agoTravis CI: Use old config option for old branch
Aaron Jones [Sun, 21 Jan 2018 15:57:51 +0000 (15:57 +0000)] 
Travis CI: Use old config option for old branch

[ci skip]

6 years agoTravis CI: Backport configuration from master
Aaron Jones [Sun, 21 Jan 2018 15:46:00 +0000 (15:46 +0000)] 
Travis CI: Backport configuration from master

[ci skip]

6 years agoinclude/protocol/*.h: use better include guards
Aaron Jones [Mon, 11 Dec 2017 06:10:40 +0000 (06:10 +0000)] 
include/protocol/*.h: use better include guards

While authoring the last commit I neglected to look at the other files.

[ci skip]

6 years agoinclude/protocol/inspircd.h: rename include guard
Aaron Jones [Mon, 11 Dec 2017 05:51:30 +0000 (05:51 +0000)] 
include/protocol/inspircd.h: rename include guard

[ci skip]

6 years agomodules/saslserv/ecdsa-nist256p-challenge: use o2i_ECPublicKey properly
Aaron Jones [Sun, 10 Dec 2017 21:56:52 +0000 (21:56 +0000)] 
modules/saslserv/ecdsa-nist256p-challenge: use o2i_ECPublicKey properly

Check its return value, and fail if it does.

6 years agomodules/saslserv/ecdsa-nist256p-challenge: use arc4random_buf instead
Aaron Jones [Sun, 10 Dec 2017 21:56:04 +0000 (21:56 +0000)] 
modules/saslserv/ecdsa-nist256p-challenge: use arc4random_buf instead

RAND_pseudo_bytes() is dangerous and we already have our own RNG.

6 years agomodules/crypto/pbkdf2v2: backport from master
Aaron Jones [Thu, 7 Dec 2017 13:29:15 +0000 (13:29 +0000)] 
modules/crypto/pbkdf2v2: backport from master

See commits 68044e2a9cd2b5d3e97b...cf8e0677e90beb832665 for details.

6 years agoBuild System: backport from master
Aaron Jones [Thu, 7 Dec 2017 13:29:03 +0000 (13:29 +0000)] 
Build System: backport from master

See commits bcae7b4e445e149179b4...e2872439e4a6f4eb353e for details.

6 years agolibathemecore: backport base64 codec from master
Aaron Jones [Wed, 6 Dec 2017 21:47:41 +0000 (21:47 +0000)] 
libathemecore: backport base64 codec from master

6 years agoGitHub: We don't use C++, stop labelling our headers as so
Aaron Jones [Thu, 30 Nov 2017 06:34:35 +0000 (06:34 +0000)] 
GitHub: We don't use C++, stop labelling our headers as so

6 years agolibathemecore/crypto.c: crypt_string(): generate salt if not given one
Aaron Jones [Sun, 5 Nov 2017 16:48:16 +0000 (16:48 +0000)] 
libathemecore/crypto.c: crypt_string(): generate salt if not given one

6 years agoremove unnecessary space
equinox [Thu, 2 Nov 2017 19:38:30 +0000 (08:38 +1300)] 
remove unnecessary space

6 years agomodules/crypto/pbkdf2v2: return NULL instead of false
Aaron Jones [Mon, 30 Oct 2017 05:51:24 +0000 (05:51 +0000)] 
modules/crypto/pbkdf2v2: return NULL instead of false

clang trunk missed this.

6 years agomodules/crypto/pbkdf2v2: backport e3b0d7bdb831db694272 from master
Aaron Jones [Mon, 30 Oct 2017 05:48:06 +0000 (05:48 +0000)] 
modules/crypto/pbkdf2v2: backport e3b0d7bdb831db694272 from master

modules/crypto/pbkdf2v2: add debugging log messages

6 years agomodules/crypto/pbkdf2v2: backport 376472c9ac22e1832cd2 from master
Aaron Jones [Mon, 30 Oct 2017 05:46:49 +0000 (05:46 +0000)] 
modules/crypto/pbkdf2v2: backport 376472c9ac22e1832cd2 from master

modules/crypto/pbkdf2v2: add SCRAM-SHA support

6 years agomodules/crypto/pbkdf2v2: backport b3a33071d4e9d5dbca16 from master
Aaron Jones [Mon, 30 Oct 2017 05:43:01 +0000 (05:43 +0000)] 
modules/crypto/pbkdf2v2: backport b3a33071d4e9d5dbca16 from master

modules/crypto/pbkdf2v2: don't ask OpenSSL for digest length

We know it's only ever going to be SHA1 (20 bytes), SHA2-256 (32 bytes)
or SHA2-512 (64 bytes), and we're already in a switch() statement
converting a PRF ID into a digest algorithm, so we may as well set the
digest length in there too.

6 years agomodules/crypto/pbkdf2v2: reduce size of sscanf(3) buffers
Aaron Jones [Sun, 22 Oct 2017 02:24:39 +0000 (02:24 +0000)] 
modules/crypto/pbkdf2v2: reduce size of sscanf(3) buffers

0x2000 (8 KiB) is definitely sufficient to mitigate any potential
inadvertant overflow, and an attacker with a crafted malicious
database would have been able to overflow the old 0x8000 (32 KiB)
buffers anyway.

6 years agomodules/crypto/argon2d: reduce size of sscanf(3) buffers
Aaron Jones [Sun, 22 Oct 2017 02:24:18 +0000 (02:24 +0000)] 
modules/crypto/argon2d: reduce size of sscanf(3) buffers

0x2000 (8 KiB) is definitely sufficient to mitigate any potential
inadvertant overflow, and an attacker with a crafted malicious
database would have been able to overflow the old 0x8000 (32 KiB)
buffers anyway.

6 years agomodules/crypto/pbkdf2v2: offload most computation to dedicated function
Aaron Jones [Sat, 21 Oct 2017 18:19:10 +0000 (18:19 +0000)] 
modules/crypto/pbkdf2v2: offload most computation to dedicated function

6 years agomodules/crypto/pbkdf2v2: rename variables consistent with master
Aaron Jones [Sat, 21 Oct 2017 17:55:27 +0000 (17:55 +0000)] 
modules/crypto/pbkdf2v2: rename variables consistent with master

6 years agomodules/crypto/pbkdf2v2: allow variable salt length for possible migrations
Aaron Jones [Sat, 21 Oct 2017 17:49:44 +0000 (17:49 +0000)] 
modules/crypto/pbkdf2v2: allow variable salt length for possible migrations

6 years agomodules/crypto/pbkdf2v2: use PRF macro for default variable
Aaron Jones [Sat, 21 Oct 2017 17:36:58 +0000 (17:36 +0000)] 
modules/crypto/pbkdf2v2: use PRF macro for default variable

6 years agomodules/crypto/pbkdf2v2: adjust macro names for iter count
Aaron Jones [Sat, 21 Oct 2017 17:35:56 +0000 (17:35 +0000)] 
modules/crypto/pbkdf2v2: adjust macro names for iter count

6 years agomodules/crypto/pbkdf2v2: add macros for PRF algorithms
Aaron Jones [Sat, 21 Oct 2017 17:31:35 +0000 (17:31 +0000)] 
modules/crypto/pbkdf2v2: add macros for PRF algorithms

6 years agomodules/crypto/pbkdf2v2: fix up some format strings
Aaron Jones [Sat, 21 Oct 2017 17:28:04 +0000 (17:28 +0000)] 
modules/crypto/pbkdf2v2: fix up some format strings

6 years agomodules/crypto/pbkdf2v2: add support for HMAC-SHA1
Aaron Jones [Sun, 15 Oct 2017 14:31:46 +0000 (14:31 +0000)] 
modules/crypto/pbkdf2v2: add support for HMAC-SHA1

The master branch (what will become 7.3) got this too, but it was
added there for future possibility of implementing SASL SCRAM support.

We will not be implementing support for SCRAM in version 7.2, but
people who used the pbkdf2v2 module with SHA1 in version 7.3 might
want to downgrade to version 7.2, so we need support for verifying
those hashes too.

6 years agoFix '--docdir' configuration option.
Wade Cline [Fri, 14 Jul 2017 00:11:24 +0000 (17:11 -0700)] 
Fix '--docdir' configuration option.

Documentation should now be installed according to the '--docdir'
argument passed to configure.

6 years agomodules/crypto/argon2d: don't mix format strings for scanning & printing
Aaron Jones [Sun, 15 Oct 2017 11:01:45 +0000 (11:01 +0000)] 
modules/crypto/argon2d: don't mix format strings for scanning & printing

The inttypes.h header provides format specifier macros for scanning, so
use those for parsing instead of the printing ones, just incase we're
building on a machine where they are different.

6 years agoNEWS.md: Document new crypto module
Aaron Jones [Fri, 13 Oct 2017 08:25:11 +0000 (08:25 +0000)] 
NEWS.md: Document new crypto module

6 years agomodules/crypto/argon2d: backport module+documentation from master
Aaron Jones [Fri, 13 Oct 2017 02:34:04 +0000 (02:34 +0000)] 
modules/crypto/argon2d: backport module+documentation from master

6 years agomodules/crypto/pbkdf2v2: reuse previous idiom for length of salt array
Aaron Jones [Sat, 7 Oct 2017 22:55:21 +0000 (22:55 +0000)] 
modules/crypto/pbkdf2v2: reuse previous idiom for length of salt array

This is equivalent but more robust.

6 years agomodules/crypto/pbkdf2v2: reorder variables by usage
Aaron Jones [Sat, 7 Oct 2017 19:05:14 +0000 (19:05 +0000)] 
modules/crypto/pbkdf2v2: reorder variables by usage

6 years agomodules/crypto/pbkdf2v2: use correct variable types to function calls
Aaron Jones [Sat, 7 Oct 2017 19:00:49 +0000 (19:00 +0000)] 
modules/crypto/pbkdf2v2: use correct variable types to function calls

PKCS5_PBKDF2_HMAC() and base64_encode()

6 years agomodules/crypto/pbkdf2v2: replace switch() with if-elseif-else
Aaron Jones [Sat, 7 Oct 2017 18:59:12 +0000 (18:59 +0000)] 
modules/crypto/pbkdf2v2: replace switch() with if-elseif-else

It's so short anyway...

6 years agomodules/crypto/pbkdf2v2: move variables to where they are needed
Aaron Jones [Sat, 7 Oct 2017 18:56:59 +0000 (18:56 +0000)] 
modules/crypto/pbkdf2v2: move variables to where they are needed

6 years agomodules/crypto/pbkdf2v2: realign macros with spaces not tabs
Aaron Jones [Sat, 7 Oct 2017 18:42:33 +0000 (18:42 +0000)] 
modules/crypto/pbkdf2v2: realign macros with spaces not tabs

6 years agomodules/crypto/pbkdf2v2: make mod(de)init static and prefix their name(s)
Aaron Jones [Sat, 7 Oct 2017 18:39:32 +0000 (18:39 +0000)] 
modules/crypto/pbkdf2v2: make mod(de)init static and prefix their name(s)

Calls to these functions should be made through the pointers in the MAPI
header anyway.

6 years agomodules/crypto/pbkdf2v2: silence unused parameter warnings
Aaron Jones [Sat, 7 Oct 2017 18:36:20 +0000 (18:36 +0000)] 
modules/crypto/pbkdf2v2: silence unused parameter warnings

6 years agomodules/crypto/pbkdf2v2: rename conf_pbkdf2v2_table to pbkdf2v2_conf_table
Aaron Jones [Sat, 7 Oct 2017 18:33:45 +0000 (18:33 +0000)] 
modules/crypto/pbkdf2v2: rename conf_pbkdf2v2_table to pbkdf2v2_conf_table

This is consistent with the prefix on the other symbols.

6 years agomodules/crypto/pbkdf2v2: rename another function
Aaron Jones [Sat, 7 Oct 2017 18:31:22 +0000 (18:31 +0000)] 
modules/crypto/pbkdf2v2: rename another function

6 years agomodules/crypto/pbkdf2v2: fix wrong variable name
Aaron Jones [Sat, 7 Oct 2017 18:30:59 +0000 (18:30 +0000)] 
modules/crypto/pbkdf2v2: fix wrong variable name

6 years agomodules/crypto/pbkdf2v2: rename function
Aaron Jones [Sat, 7 Oct 2017 18:29:42 +0000 (18:29 +0000)] 
modules/crypto/pbkdf2v2: rename function

6 years agomodules/crypto/pbkdf2v2: align member assignment in crypt_impl_t
Aaron Jones [Sat, 7 Oct 2017 18:28:59 +0000 (18:28 +0000)] 
modules/crypto/pbkdf2v2: align member assignment in crypt_impl_t

6 years agomodules/crypto/pbkdf2v2: use 0/1 instead of false/true in bool function
Aaron Jones [Sat, 7 Oct 2017 18:27:01 +0000 (18:27 +0000)] 
modules/crypto/pbkdf2v2: use 0/1 instead of false/true in bool function

6 years agomodules/crypto/pbkdf2v2: rename a function argument for consistency
Aaron Jones [Sat, 7 Oct 2017 18:26:13 +0000 (18:26 +0000)] 
modules/crypto/pbkdf2v2: rename a function argument for consistency

6 years agomodules/crypto/pbkdf2v2: test for exact required return value of sscanf(3)
Aaron Jones [Sat, 7 Oct 2017 18:25:28 +0000 (18:25 +0000)] 
modules/crypto/pbkdf2v2: test for exact required return value of sscanf(3)

6 years agomodules/crypto/pbkdf2v2: add appropriate qualifiers to function arguments
Aaron Jones [Sat, 7 Oct 2017 18:24:38 +0000 (18:24 +0000)] 
modules/crypto/pbkdf2v2: add appropriate qualifiers to function arguments

6 years agomodules/crypto/pbkdf2v2: put function names on their own line
Aaron Jones [Sat, 7 Oct 2017 18:22:19 +0000 (18:22 +0000)] 
modules/crypto/pbkdf2v2: put function names on their own line

Makes grepping for '^name' easy.

6 years agomodules/crypto/pbkdf2v2: return error if hash generation would overflow
Aaron Jones [Sat, 7 Oct 2017 18:21:27 +0000 (18:21 +0000)] 
modules/crypto/pbkdf2v2: return error if hash generation would overflow

6 years agomodules/crypto/pbkdf2v2: return error if salt generation would overflow
Aaron Jones [Sat, 7 Oct 2017 14:48:41 +0000 (14:48 +0000)] 
modules/crypto/pbkdf2v2: return error if salt generation would overflow

6 years agomodules/crypto/pbkdf2v2: use arc4random_buf() to generate salt
Aaron Jones [Sat, 7 Oct 2017 14:43:57 +0000 (14:43 +0000)] 
modules/crypto/pbkdf2v2: use arc4random_buf() to generate salt

This is slightly more efficient and less ugly than calling arc4random()
multiple times.

6 years agomodules/crypto/pbkdf2v2: remove unnecessary memset(3) calls
Aaron Jones [Sat, 7 Oct 2017 14:35:45 +0000 (14:35 +0000)] 
modules/crypto/pbkdf2v2: remove unnecessary memset(3) calls

These are left over from module development where they made
debugging easier.

6 years agomodules/crypto/posix: fix potential NULL deref on password verify
Aaron Jones [Thu, 5 Oct 2017 22:56:41 +0000 (22:56 +0000)] 
modules/crypto/posix: fix potential NULL deref on password verify

If we have an encrypted password from the database that does not
contain a '$' in it (as is the case for the original deprecated
pbkdf2 module) then when posix tries to verify the hash it will
segfault because we assume a '$' is present.

6 years agoverify_password(): more error checking, better logic, fix minor bug
Aaron Jones [Wed, 4 Oct 2017 23:44:03 +0000 (23:44 +0000)] 
verify_password(): more error checking, better logic, fix minor bug

* ci->crypt() and ci->salt() can return NULL in rare circumstances
* don't duplicate logic for generating a new password hash
* when the user's password is encrypted but a crypto module is not
  loaded, don't complain if the /encrypted password/ is '*', not
  if the /user-supplied password/ is '*'.
* remove extra line at end of file

7 years agoAtheme 7.2.9 v7.2.9
Max Teufel [Sun, 12 Feb 2017 14:58:54 +0000 (15:58 +0100)] 
Atheme 7.2.9

7 years agoMerge pull request #541 from mniip/free
Austin Ellis [Mon, 6 Feb 2017 02:24:31 +0000 (20:24 -0600)] 
Merge pull request #541 from mniip/free

saslserv/main: Fix use after free during impersonation

7 years agosaslserv/main: Fix use after free during impersonation
mniip [Sun, 5 Feb 2017 22:40:25 +0000 (01:40 +0300)] 
saslserv/main: Fix use after free during impersonation

7 years agoAtheme 7.2.8 v7.2.8
Janik Kleinhoff [Sat, 4 Feb 2017 07:05:57 +0000 (07:05 +0000)] 
Atheme 7.2.8

This is a security release. Release 7.2.7 is affected.

7 years agosaslserv/main: free sasl_sourceinfo_t after use
mniip [Fri, 3 Feb 2017 23:50:53 +0000 (02:50 +0300)] 
saslserv/main: free sasl_sourceinfo_t after use

7 years agomemoserv: unregister hooks when unloading
Aaron Jones [Fri, 23 Dec 2016 15:28:14 +0000 (15:28 +0000)] 
memoserv: unregister hooks when unloading

This will avoid a crash discovered by Xenthys in issue #531

7 years agomemoserv: let user know (on identify and /away) when their inbox is full
Aaron Jones [Fri, 23 Dec 2016 13:06:23 +0000 (13:06 +0000)] 
memoserv: let user know (on identify and /away) when their inbox is full

c.f. issue #531

7 years agoMerge pull request #530 from aaronmdjones/pbkdf2v2-improv
William Pitcock [Sun, 4 Dec 2016 22:03:49 +0000 (16:03 -0600)] 
Merge pull request #530 from aaronmdjones/pbkdf2v2-improv

Improve the PBKDF2v2 module

7 years agopbkdf2v2: make digest and rounds configurable at runtime
Aaron Jones [Sat, 3 Dec 2016 06:37:28 +0000 (06:37 +0000)] 
pbkdf2v2: make digest and rounds configurable at runtime

7 years agoatheme.conf.example: better highlight the pbkdf2v2 crypto module
Aaron Jones [Sat, 3 Dec 2016 06:34:23 +0000 (06:34 +0000)] 
atheme.conf.example: better highlight the pbkdf2v2 crypto module

7 years agopbkdf2v2: remove obsolete compatibility function
Aaron Jones [Wed, 16 Nov 2016 14:31:16 +0000 (14:31 +0000)] 
pbkdf2v2: remove obsolete compatibility function

All modern supported versions of OpenSSL provide this function

c.f. issue #528

7 years agopbkdf2: remove obsolete compatibility function
Aaron Jones [Wed, 16 Nov 2016 08:21:32 +0000 (08:21 +0000)] 
pbkdf2: remove obsolete compatibility function

All modern supported versions of OpenSSL provide this function

Fixes #528

7 years agoemail templates: Fix leading whitespace
Jos Ahrens [Sun, 9 Oct 2016 20:04:21 +0000 (20:04 +0000)] 
email templates: Fix leading whitespace

The leading whitespace is barely visible in many email clients
and was often cause for sending the message directly to the channel
for clients that do not interpret " /command" as a command. This
was most notable for qwebirc.

(cherry picked from commit 72821fa6eea3e7a20c0e3286f709fe6cc0e214f5)

7 years agoatheme 7.2.7 v7.2.7
Max Teufel [Sat, 8 Oct 2016 14:58:00 +0000 (16:58 +0200)] 
atheme 7.2.7

7 years agoNEWS: update for 7.2.7
Max Teufel [Sat, 8 Oct 2016 08:54:24 +0000 (10:54 +0200)] 
NEWS: update for 7.2.7

[ci skip]

(cherry picked from commit bec88cb93d546b8783167c4a6613da59dc5a9311)

7 years agoi18n: update po/POTFILES.in
Max Teufel [Mon, 3 Oct 2016 18:05:07 +0000 (20:05 +0200)] 
i18n: update po/POTFILES.in

(cherry picked from commit 13ae2f56ef829a07649e7e1e7af0e1b6ebdfcdd2)

7 years agonickserv/{setpass,sendpass_user}: fix a typo breaking the build
Max Teufel [Sat, 24 Sep 2016 14:03:43 +0000 (16:03 +0200)] 
nickserv/{setpass,sendpass_user}: fix a typo breaking the build

(cherry picked from commit e5ce76c8e6c20f12445b35e23e0ae54eb97eb1e0)

7 years agochanserv/help: include INFO in short help instead of RECOVER
Janik Kleinhoff [Tue, 9 Dec 2014 13:48:49 +0000 (13:48 +0000)] 
chanserv/help: include INFO in short help instead of RECOVER

The RECOVER command should rarely be needed unless handing out channel
access like popcorn is the norm in some channel, in which case we can't
really help them anyway; as such there's little point in listing it by
default. INFO on the other hand is widely used as *the* way to ask
services for basic information on a channel, so it makes sense to be in
the short help (which nickserv/help does as well).

(In fact, on freenode, the most common use of RECOVER seems to be by
people who use it as the primary way to get opped, given that network's
recommendation to avoid auto-op and their default flag set reflecting
this. I suppose some people misinterpret this as having lost control of
their channel. Presumably it's debatable who's to blame here, but maybe
removing RECOVER from the default short help listing will help avoid
that sort of problem. Either way, it shouldn't hurt.)

(cherry picked from commit 4396f465e9f7fd993432d84e275a38703d215aea)

7 years agonickserv/{setpass,sendpass_user}: more helpful message for logged-in users
Janik Kleinhoff [Mon, 17 Nov 2014 13:48:46 +0000 (13:48 +0000)] 
nickserv/{setpass,sendpass_user}: more helpful message for logged-in users

Sometimes, people try SETPASS or SENDPASS when all they actually need is
SET PASSWORD, so point them there if applicable.

(cherry picked from commit 1565bfa466b8bb4e643f111981f0feb93d24a902)

7 years agohelpserv/ticket: better integration of close reason
Janik Kleinhoff [Sat, 27 Sep 2014 19:22:10 +0000 (21:22 +0200)] 
helpserv/ticket: better integration of close reason

(cherry picked from commit 9ebde9161004143f5852eca5ca4528beec65bf05)

7 years agonickserv/info: also show "Channels" line if mu == si->smu
Janik Kleinhoff [Fri, 3 Oct 2014 11:46:57 +0000 (13:46 +0200)] 
nickserv/info: also show "Channels" line if mu == si->smu

(cherry picked from commit 09e3d0f4e957b822e4ba32e0b63c91b2ffe4e930)

7 years agoatheme.conf.example: fix case in previous commit
Austin Ellis [Sun, 11 Sep 2016 16:19:31 +0000 (11:19 -0500)] 
atheme.conf.example: fix case in previous commit

7 years agoproxyscan/dnsbl: use kline_add and correct db
Austin Ellis [Sun, 11 Sep 2016 16:05:50 +0000 (11:05 -0500)] 
proxyscan/dnsbl: use kline_add and correct db

entries.  also add modules and example to conf.example.

7 years agoproxyscan/dnsbl: mark strings for i18n; style
Janik Kleinhoff [Sun, 11 Sep 2016 14:58:17 +0000 (14:58 +0000)] 
proxyscan/dnsbl: mark strings for i18n; style

As pointed out by @maxteufel, uppercase the name of the configuration
entry (dnsbl_action) for consistency.

(cherry picked from commit 796fb830251a0dcbd1524ca1041a32be3183c2b6)

7 years agoproxyscan/dnsbl: fix crash on scanning users without IPv4 address
Janik Kleinhoff [Sun, 6 Dec 2015 16:38:06 +0000 (16:38 +0000)] 
proxyscan/dnsbl: fix crash on scanning users without IPv4 address

"not too concerned right now", they said.
"A sscanf worked fine for chary for many years, it'll be fine here",
they said.

(cherry picked from commit 407fb1cfcac1898ea97c6b77f9b82fe6a5f322b3)

7 years agoproxyscan/dnsbl: log /os set dnsblaction
Janik Kleinhoff [Sun, 6 Dec 2015 16:44:33 +0000 (16:44 +0000)] 
proxyscan/dnsbl: log /os set dnsblaction

(cherry picked from commit db3b37b409e189e96cd58c5d95c9d77631104454)

7 years agoproxyscan/dnsbl: use enums where appropriate
Janik Kleinhoff [Sun, 6 Dec 2015 16:34:09 +0000 (16:34 +0000)] 
proxyscan/dnsbl: use enums where appropriate

(cherry picked from commit b2566f40fc5c347bdd6b97af030a1e07e8fa9bfb)

7 years agoproxyscan/dnsbl: properly abort DNS queries
Janik Kleinhoff [Tue, 3 Nov 2015 23:12:36 +0000 (23:12 +0000)] 
proxyscan/dnsbl: properly abort DNS queries

Fixes shalture/shalture#49.

(cherry picked from commit f653a85ff90dae6313c5a70b2aa85adb97ba0dc0)

7 years agoproxyscan/dnsbl: fix module header
Janik Kleinhoff [Tue, 3 Nov 2015 23:10:06 +0000 (23:10 +0000)] 
proxyscan/dnsbl: fix module header

(cherry picked from commit 4a0347ae3ff3327bb2d759bf504e2a29b6732f02)

7 years agohelp/default/nickserv/cert: more clarification about fingerprints
Max Teufel [Sat, 10 Sep 2016 17:53:38 +0000 (19:53 +0200)] 
help/default/nickserv/cert: more clarification about fingerprints

Clarify the it is even entirely agnostic of the fingerprint format.
Furthermore, add a note about the usage of CERT ADD without any
arguments.

(cherry picked from commit 322ebac90d614fa7fd88a2b93d5ea15b874b4ede)

7 years agohelp/default/nickserv/cert: clarification about fingerprints
Max Teufel [Sat, 10 Sep 2016 14:25:28 +0000 (16:25 +0200)] 
help/default/nickserv/cert: clarification about fingerprints

Add a note about the fact that the CertFP implementation is agnostic
with regards to the fingerprint algorithm used by the IRCd. Otherwise,
users could be confused due to the examples.

(cherry picked from commit 9304ca9006c893298a2033f9cb5a6781f180bc6b)

7 years agoInspIRCd: Fix atoi logic error preventing maximum rejoindelay value
Aaron Jones [Thu, 8 Sep 2016 22:41:36 +0000 (22:41 +0000)] 
InspIRCd: Fix atoi logic error preventing maximum rejoindelay value

c.f. issue #509