/* Extensions */
#loadmodule "extensions/chm_nonotice";
-#loadmodule "extensions/chm_operonly_compat";
-#loadmodule "extensions/chm_quietunreg_compat";
-#loadmodule "extensions/chm_sslonly_compat";
#loadmodule "extensions/chm_operpeace";
#loadmodule "extensions/createauthonly";
#loadmodule "extensions/extb_account";
#loadmodule "extensions/m_locops";
#loadmodule "extensions/no_oper_invis";
#loadmodule "extensions/sno_farconnect";
-#loadmodule "extensions/sno_globalkline";
#loadmodule "extensions/sno_globalnickchange";
#loadmodule "extensions/sno_globaloper";
-#loadmodule "extensions/sno_whois";
#loadmodule "extensions/override";
#loadmodule "extensions/no_kill_services";
serverinfo {
name = "hades.arpa";
sid = "42X";
- description = "charybdis test server";
+ description = "solanum test server";
network_name = "StaticBox";
/* On multi-homed hosts you may need the following. These define
* means they must be defined before operator {}.
*/
privset "local_op" {
- privs = oper:local_kill, oper:operwall;
+ privs = oper:general, oper:privs, oper:testline, oper:kill, oper:operwall, oper:message,
+ usermode:servnotice, auspex:oper, auspex:hostname, auspex:umodes, auspex:cmodes;
};
privset "server_bot" {
privset "global_op" {
extends = "local_op";
- privs = oper:global_kill, oper:routing, oper:kline, oper:unkline, oper:xline,
- oper:resv, oper:mass_notice, oper:remoteban;
+ privs = oper:routing, oper:kline, oper:unkline, oper:xline,
+ oper:resv, oper:cmodes, oper:mass_notice, oper:wallops,
+ oper:remoteban;
};
privset "admin" {
privset = "admin";
};
+// See connecting-servers.rst for an introduction to using these files.
+
connect "irc.uplink.com" {
host = "203.0.113.3";
send_password = "password";
accept_password = "anotherpassword";
port = 6666;
- hub_mask = "*";
class = "server";
- flags = compressed, topicburst;
+ flags = topicburst;
#fingerprint = "c77106576abf7f9f90cca0f63874a60f2e40a64b";
};
send_password = "password";
accept_password = "anotherpassword";
port = 9999;
- hub_mask = "*";
class = "server";
flags = ssl, topicburst;
};
flags = kline, tkline, unkline, xline, txline, unxline, resv, tresv, unresv;
};
-shared {
- oper = "*@*", "*";
- flags = all, rehash;
+secure {
+ ip = "127.0.0.1";
};
/* exempt {}: IPs that are exempt from Dlines and rejectcache. (OLD d:) */
autochanmodes = "+nt";
displayed_usercount = 3;
strip_topic_colors = no;
+ opmod_send_statusmsg = no;
};
serverhide {
disable_hidden = no;
};
-/* These are the blacklist settings.
+/* These are the DNSBL settings.
* You can have multiple combinations of host and rejection reasons.
* They are used in pairs of one host/rejection reason.
*
- * These settings should be adequate for most networks.
+ * The default settings should be adequate for most networks.
*
- * Word to the wise: Do not use blacklists like SPEWS for blocking IRC
- * connections.
+ * It is not recommended to use DNSBL services designed for e-mail spam
+ * prevention, such as SPEWS for blocking IRC connections.
*
* As of charybdis 2.2, you can do some keyword substitution on the rejection
* reason. The available keyword substitutions are:
* is considered a match. If included, a comma-separated list of *quoted*
* strings is allowed to match queries. They may be of the format "0" to "255"
* to match the final octet (e.g. 127.0.0.1) or "127.x.y.z" to explicitly match
- * an A record. The blacklist is only applied if it matches anything in the
+ * an A record. The DNSBL match is only applied if it matches anything in the
* list. You may freely mix full IP's and final octets.
*
- * Consult your blacklist provider for the meaning of these parameters; they
- * are usually used to denote different ban types.
+ * Consult your DNSBL provider for the meaning of these parameters; they
+ * are usually used to denote different block reasons.
*/
-blacklist {
+dnsbl {
host = "rbl.efnetrbl.org";
type = ipv4;
reject_reason = "${nick}, your IP (${ip}) is listed in EFnet's RBL. For assistance, see http://efnetrbl.org/?i=${ip}";
kline_with_reason = yes;
hide_tkdline_duration = no;
kline_reason = "K-Lined";
+ sasl_only_client_message = "You need to identify via SASL to use this server.";
+ identd_only_client_message = "You need to install identd to use this server.";
+ sctp_forbidden_client_message = "You are not allowed to use SCTP on this server.";
+ ssltls_only_client_message = "You need to use SSL/TLS to use this server.";
+ not_authorised_client_message = "You are not authorised to access this server.";
+ illegal_hostname_client_message = "You have an illegal character in your hostname.";
+ server_full_client_message = "Sorry, server is full - try later";
+ illegal_name_long_client_message = "Your username is invalid. Please make sure that your username contains "
+ "only alphanumeric characters.";
+ illegal_name_short_client_message = "Invalid username";
identify_service = "NickServ@services.int";
identify_command = "IDENTIFY";
non_redundant_klines = yes;
use_propagated_bans = yes;
stats_e_disabled = no;
stats_c_oper_only = no;
- stats_h_oper_only = no;
stats_y_oper_only = no;
stats_o_oper_only = yes;
stats_P_oper_only = no;
no_oper_flood = yes;
max_targets = 4;
client_flood_max_lines = 20;
+ post_registration_delay = 0 seconds;
use_whois_actually = no;
oper_only_umodes = operwall, locops, servnotice;
oper_umodes = locops, servnotice, operwall, wallop;
away_interval = 30;
certfp_method = spki_sha256;
hide_opers_in_whois = no;
+ tls_ciphers_oper_only = no;
};
modules {