JD Horelick
bd73ea56ba
commit 90509b2e2a364471f2461367fd02c11c8ab3c72d
...
Author: Stephen Bennett <spb@exherbo.org>
Date: Fri Dec 31 17:11:50 2010 +0000
Don't allow opers without the override privilege to get +p via the oper_umodes config setting
2011-01-19 15:15:50 -05:00
B.Greenham
0258787d5d
Fix small bug in the VERSION/RPL_MYINFO stuff, as pointed out by init.
2011-01-19 11:28:16 -05:00
JD Horelick
af1a78b7c6
extensions/m_roleplay: Channelmode +E is no longer used to allow roleplay commands. It is now +N. Fix the check for it.
2011-01-02 19:26:09 -05:00
B.Greenham
002ca0f963
extensions/roleplay: Fix NPCA/FACTION not showing up properly on some clients.
2010-12-15 15:43:35 -05:00
JD Horelick
4b631c0586
Send ERR_TOOMANYCHANNELS for each channel join that fails due to channel limits.
...
The reason why we do this is because some clients are dependent on receiving a numeric
for every channel join failure, even due to this limit where it can be assumed that
subsequent joins failed.
2010-12-15 00:02:47 -05:00
William Pitcock
77306edd39
ssld: Request fingerprint when connecting to the server, not just on inbound connections.
2010-12-14 21:28:35 -06:00
William Pitcock
dc34aae05e
Correct error message involving no fingerprint credentials or password credentials being available.
2010-12-14 21:25:44 -06:00
JD Horelick
255130dde8
Add mr_flea (and Taros) to the list of Charybdis contributors.
2010-12-14 00:33:42 -05:00
William Pitcock
5ac470475d
Add support for linking using SSL certificate fingerprints as the link credential rather than the traditional server-password pair.
2010-12-13 23:14:00 -06:00
William Pitcock
6ec1ddabff
libratbox: Use the server SSL certificate on outgoing connections.
2010-12-13 22:58:09 -06:00
B.Greenham
f0bbc013a2
Correct an error in help roleplay.
2010-12-11 16:35:29 -05:00
JD Horelick
0284952c9f
Move cmode +N to cmode +d, so that extensions/m_roleplay can retain cmode +N and maintain a consistent interface with charybdis.
2011-01-19 23:40:21 -05:00
B.Greenham
a26bd77404
Bring up updated roleplay module from charybdis.
2010-12-11 16:28:40 -05:00
B.Greenham
5323ec7352
Move flood_attack_channel to channel.c so it can be used outside m_message.c
2010-12-11 16:11:54 -05:00
B.Greenham
ee41c3c6cf
Add HELP ROLEPLAY.
2010-12-08 00:06:44 -05:00
B.Greenham
a4d2230fbc
Add extensions/m_roleplay, a module that provides various roleplaying commands.
2010-12-07 23:32:46 -05:00
JD Horelick
6f368776ea
Update CREDITS. spb is now a charybdis core developer and i'm a charybdis contributor. YAY!
2010-12-06 23:52:42 -05:00
William Pitcock
359d4d5b20
chmode: Remove chm_regonly, a vestige from ratbox which doesn't apply to native charybdis (or shadowircd) networks.
2010-12-06 23:51:14 -05:00
Jilles Tjoelker
2606c73c6f
Change max_bans in reference.conf from 25 to 100, like example.conf.
2010-12-05 16:51:48 +01:00
William Pitcock
fa9fb0d66b
Use %u instead of %d.
2010-12-04 23:13:35 -06:00
William Pitcock
b67bc679f3
blacklist: Remove the sscanf() for the IPv4 blacklist check.
...
From ratbox r27061 (androsyn).
2010-12-04 23:11:04 -06:00
JD Horelick
b0e752b0f9
Do not install ban .conf files (like kline.conf, rsv.conf, etc) as they aren't used anymore.
2010-12-04 17:29:01 -05:00
JD Horelick
3e742e4d22
Remove all the DEFINE's and the random places they were used for the .conf-based ban stuff.
2010-12-04 17:26:14 -05:00
JD Horelick
e9bd45dd8c
Remove auth_user support from m_pass.c. It's pointless here and it breaks the functionality of having it in m_sasl which is actually useful....
2010-11-25 03:22:02 -05:00
JD Horelick
2e6fddcccf
Force a password if auth_user is sent in PASS.
...
Not doing this (and not having a password on the auth block) makes it really
easy for anyone to get access to that auth block.
2010-11-24 04:46:36 -05:00
William Pitcock
ad06ad5710
libratbox: Clean up uses of strcpy().
2010-11-23 08:52:18 -06:00
JD Horelick
ab72b3e800
Wallops (and log) upon setting/unsetting of +M or any hidden chmode.
...
(+M is currently the only hidden chmode)
2010-11-22 13:14:02 -05:00
B.Greenham
be293b018b
Don't segfault if someone tries to OACCEPT a server for some inane reason.
2010-11-22 11:14:44 -05:00
JD Horelick
f5ed1007ba
Make auth_user work with SASL and add it to the example configs.
2010-11-21 15:03:17 -05:00
JD Horelick
48e9e037f4
Fix up grammar in ShadowIRCd MOTD for great good!
2010-11-16 20:46:26 -05:00
JD Horelick
8071ad5acf
Fix a small warning.
2010-11-13 20:37:41 -05:00
B.Greenham
44ee1bb6b9
Update TODO.
2010-11-09 23:32:26 -05:00
JD Horelick
ac10b333c7
Change the filenames of the generated SSL key/cert to ssl.* instead of test.* so that they're a bit more descriptive.
2010-11-13 16:07:54 -05:00
William Pitcock
585e477be8
Filter bogus CTCP ACTION messages.
2010-11-05 01:16:03 -05:00
William Pitcock
78ab5aa473
parse(): make reentrant
2010-10-24 21:02:32 -05:00
JD Horelick
10f11ca3b5
Fix a minor spelling error in m_kick.
...
Thanks to Elizabeth for pointing this out.
2010-11-17 19:08:47 -05:00
JD Horelick
d89870fdfb
Added tag shadowircd-6.2.0 for changeset e44527fbbaaa
2010-11-09 22:31:06 -05:00
JD Horelick
154ae8cf1f
ShadowIRCd 6.2.0
2010-11-09 22:30:49 -05:00
JD Horelick
f3cf5d429e
Added tag shadowircd-6.2.0-RC1 for changeset 5fe83d338728
2010-11-06 16:11:39 -04:00
JD Horelick
2793290bcd
ShadowIRCd 6.2.0-RC1
2010-11-06 16:11:11 -04:00
JD Horelick
64be6183f8
Fix a bug I caused. Whoops.
2010-10-25 20:11:10 -04:00
JD Horelick
fe04020ffc
re-order the chary-3.3 news
2010-10-24 00:00:58 -04:00
JD Horelick
bc5e943f66
Added tag shadowircd-6.2.0-beta1 for changeset d14667a87aee
2010-10-23 23:34:35 -04:00
JD Horelick
b540af17eb
ShadowIRCd 6.2.0-beta1
2010-10-23 23:34:13 -04:00
JD Horelick
561ee87a2e
Update the shadowircd NEWS and TODO.
2010-10-23 23:32:52 -04:00
JD Horelick
0d3be78fc3
Update makerelease.sh to use standard filenames for archives.
2010-10-23 23:22:39 -04:00
JD Horelick
44e51771d5
Add the charybdis 3.3 NEWS to our NEWS file.
2010-10-23 23:20:10 -04:00
William Pitcock
f4db473ce8
Example configuration: Set the default TLS port to 6697.
2010-09-17 10:48:56 -05:00
Jilles Tjoelker
62a2743ab7
mkpasswd: Default to MD5-based crypt instead of SHA-based.
...
We have own code for MD5-based crypt and can therefore
support this even if the OS does not. The SHA-based crypts
are not ubiquitous yet.
2010-09-16 01:39:06 +02:00
JD Horelick
0a2e2a35c8
A few more fixes. Part 3 of 2 I suppose.
2010-10-23 22:46:50 -04:00