/* vhost6: the IP to bind to when we connect outward to ipv6 servers.
* This should be an ipv6 IP only.
*/
- #vhost6 = "2001:db7:2::6";
+ #vhost6 = "2001:db8:2::6";
/* ssl_cert: certificate (and optionally key) for our ssl server */
ssl_cert = "etc/ssl.pem";
/* port: listen on all available IPs, ports 5000 and 6665 to 6669 */
port = 5000, 6665 .. 6669;
- /* sslport: listen for ssl connections on all available IPs, port 9999 */
- sslport = 9999;
+ /* sslport: listen for ssl connections on all available IPs, port 6697 */
+ sslport = 6697;
/* host: set a specific IP/host the ports after the line will listen
* on. This may be ipv4 or ipv6.
host = "2001:db8:2::6";
port = 7002;
sslport = 9002;
+
+ /* wsock: listeners defined with this option enabled will be websocket listeners,
+ * and will not accept normal clients.
+ */
+ wsock = yes;
+ sslport = 9999;
};
/* auth {}: allow users to connect to the ircd (OLD I:) */
send_password = "password";
accept_password = "anotherpassword";
- /* fingerprint: if specified, the server's client certificate
- * fingerprint will be checked against the specified fingerprint
- * below.
+ /* fingerprint: if flags = ssl is specified, the server's
+ * certificate fingerprint will be checked against the fingerprint
+ * specified below. required if using flags = ssl.
*/
#fingerprint = "c77106576abf7f9f90cca0f63874a60f2e40a64b";
* compressed - compress traffic via ziplinks
* topicburst - burst topics between servers
* ssl - ssl/tls encrypted server connections
+ * no-export - marks the link as a no-export link (not exported to other links)
*/
flags = compressed, topicburst;
};
* WARNING:
* These settings are considered experimental. Only the most common proxy types
* are checked for (Charybdis is immune from POST and GET proxies). If you are
- * not comfortable with experimental code, remove or comment out the *entire*
- * block below to disable the proxy scanner.
+ * not comfortable with experimental code, do not use this feature.
*/
-opm {
+#opm {
/* IPv4 address to listen on. This must be a publicly facing IP address
* to be effective.
* If omitted, it defaults to serverinfo::vhost.
/* IPv4 port to listen on.
* This should not be the same as any existing listeners.
*/
- #port_ipv4 = 32000;
+ #port_v4 = 32000;
/* IPv6 address to listen on. This must be a publicly facing IP address
* to be effective.
/* IPv6 port to listen on.
* This should not be the same as any existing listeners.
*/
- #port_ipv6 = 32000;
+ #port_v6 = 32000;
/* You can also set the listen_port directive which will set both the
* IPv4 and IPv6 ports at once.
*/
- listen_port = 32000;
+ #listen_port = 32000;
/* This sets the timeout in seconds before ending open proxy scans.
* Values less than 1 or greater than 60 are ignored.
* It is advisable to keep it as short as feasible, so clients do not
* get held up by excessively long scan times.
*/
- timeout = 5;
+ #timeout = 5;
/* These are the ports to scan for SOCKS4 proxies on. They may overlap
* with other scan types. Sensible defaults are given below.
*/
- socks4_ports = 80, 443, 1080, 8000, 8080, 10800;
+ #socks4_ports = 80, 443, 1080, 8000, 8080, 10800;
/* These are the ports to scan for SOCKS5 proxies on. They may overlap
* with other scan types. Sensible defaults are given below.
*/
- socks5_ports = 80, 443, 1080, 8000, 8080, 10800;
+ #socks5_ports = 80, 443, 1080, 8000, 8080, 10800;
/* These are the ports to scan for HTTP CONNECT proxies on (plaintext).
* They may overlap with other scan types. Sensible defaults are given
* below.
*/
- httpconnect_ports = 80, 8080, 8000;
+ #httpconnect_ports = 80, 8080, 8000;
/* These are the ports to scan for HTTPS CONNECT proxies on (SSL).
* They may overlap with other scan types. Sensible defaults are given
* below.
*/
- httpsconnect_ports = 443, 4443;
-};
+ #httpsconnect_ports = 443, 4443;
+#};
/*
* Alias blocks allow you to define custom commands. (Old m_sshortcut.c)
*/
dline_with_reason = yes;
- /* kline delay: delay the checking of klines until a specified time.
- * Useful if large kline lists are applied often to prevent the
- * server eating CPU.
- */
- kline_delay = 0 seconds;
-
/* kline reason: show the user the reason why they are k/dlined
* on exit. may give away who set k/dline when set via tcm.
*/
* The spki_* variants operate on the SubjectPublicKeyInfo of the certificate, which does
* not change unless the private key is changed. This allows the fingerprint to stay
* constant even if the certificate is reissued. These fingerprints will be prefixed with
- * "SPKI:SHA2-256:" or "SPKI:SHA2-512:" depending on the hash type.
+ * "SPKI:SHA2-256:" or "SPKI:SHA2-512:" depending on the hash type. These fingerprints
+ * are not supported on servers running charybdis 3.5.3 or earlier.
+ *
+ * To generate a fingerprint from a certificate file, please use the mkfingerprint utility
+ * program located in the bin/ subdirectory of your IRCd installation. Running it with no
+ * arguments will give you a brief usage message; it takes method and filename arguments.
*/
certfp_method = spki_sha256;