Jilles Tjoelker
fdd0b6ccf1
Do not penalize for spambot checks if creating a new channel.
2010-02-21 01:45:51 +01:00
Jilles Tjoelker
b6698246ba
spambot checks: Fix excessive expiry in some cases.
2010-02-21 01:29:41 +01:00
Jilles Tjoelker
896e8e51b7
JOIN 0: Make spambot check equivalent to PART's.
2010-02-21 01:12:04 +01:00
Jilles Tjoelker
8cf4cea3da
Remove dead code: last_join_time is already updated by check_spambot_warning().
2010-02-21 01:10:04 +01:00
Jilles Tjoelker
d5e959f179
Do not check for spambot if the user is not allowed to join the channel.
2010-02-21 01:07:32 +01:00
Jilles Tjoelker
6af7e4faa6
Fix a memory leak with client certificates.
2010-02-19 16:55:15 +01:00
William Pitcock
ba29286a4a
Do not try to free the alias dict if it does not exist.
2010-02-18 18:38:26 -06:00
William Pitcock
552379f2ab
Automated merge with ssh://hg.atheme.org//hg/charybdis
2010-02-18 18:11:32 -06:00
William Pitcock
b3fa6c9dc6
Fix libtool build issue.
2010-02-18 18:11:23 -06:00
Jilles Tjoelker
8a64e49e4c
challenge: Fix build.
2010-02-18 23:42:07 +01:00
William Pitcock
ad5a342de8
Added tag proposed-charybdis-3.2.0 for changeset 7450d2086b3a
2010-02-18 07:35:05 -06:00
William Pitcock
4a92cf0d61
Removed tag proposed-charybdis-3.2.0
2010-02-18 07:35:01 -06:00
William Pitcock
790bfe43cb
Documentation updates for the ip_cloaking_4.0 transition.
2010-02-18 07:34:40 -06:00
William Pitcock
a58d052d02
Add ip_cloaking_4.0 module, which is the same cloaking as 3.2, but moves the usermode from +h to +x,
...
which allows us to start transitioning this usermode change.
2010-02-18 07:30:26 -06:00
William Pitcock
11272f5480
Added tag proposed-charybdis-3.2.0 for changeset 99d6cacd4454
2010-02-17 23:13:42 -06:00
William Pitcock
1800d9737b
Run autoreconf.
2010-02-17 23:12:45 -06:00
William Pitcock
ad03121116
Set autoconf version to 3.2.0.
2010-02-17 23:12:17 -06:00
William Pitcock
08178b13dd
BUGS is no longer relevant, as the build system installs files in a way where this is no longer a problem.
2010-02-17 23:11:33 -06:00
William Pitcock
6d194359ab
Change license version in version.c.SH (GPLv1 -> GPLv2) so that it agrees with the other documentation.
2010-02-17 23:05:47 -06:00
William Pitcock
8afd32ce07
s/o:lines/operator blocks/
2010-02-17 23:01:58 -06:00
William Pitcock
1c19179d64
Add certfp check to challenge too.
2010-02-17 23:01:25 -06:00
William Pitcock
e4c72f7919
Clarify ERR_NOOPERHOST and convert it to use sendto_one_numeric().
2010-02-17 06:51:41 -06:00
William Pitcock
eb2d2b8d76
hurt: unbreak compile
2010-02-17 06:44:42 -06:00
William Pitcock
d8a023eddd
Add support for client certificate fingerprints in o:lines.
2010-02-17 06:41:41 -06:00
Jilles Tjoelker
04a611e26e
Update target change documentation.
2010-02-17 00:38:08 +01:00
Jilles Tjoelker
c9013e0d8b
Update NEWS.
2010-02-17 00:24:12 +01:00
Jilles Tjoelker
625a2b1f99
Subject /invite to umodes +g and +R.
...
The behaviour is the same as /msg except that where
/msg would send RPL_UMODEGMSG to the user, the /invite
is instead let through. This counts as a notification
for caller_id_wait like RPL_UMODEGMSG.
Checks are on the target user's server, which means an
error message will appear after RPL_INVITING.
This must be because the accept list is not globally
known.
2010-02-15 23:07:14 +01:00
Jilles Tjoelker
0f18c084bb
Add missing return value.
2010-02-15 22:18:00 +01:00
Jilles Tjoelker
3f76eb8a8c
Subject /invite to target change.
...
Similar to /msg, inviting a user that is not in a channel
you have op or voice in requires a free target; opers always
have a free target.
Being invited adds the source as a reply target.
2010-02-15 22:08:55 +01:00
Jilles Tjoelker
878733fd68
Move target change code to src/tgchange.c,
...
so we can use it for /invite as well.
2010-02-15 21:58:34 +01:00
Jilles Tjoelker
7eb9307794
target change: Allow free replies.
...
When a user receives a private message, notice or RPL_UMODEGMSG,
add the source to a special set of 5 target slots.
These slots are checked in the normal way when sending messages,
allowing a reply without using up a free target.
This feature will not be very useful if a user is being messaged
by many different users; to help this, messages blocked entirely
by +g or +R do not affect the targets. CTCP replies also remain
free in terms of targets.
2010-02-15 01:07:07 +01:00
Jilles Tjoelker
3002877654
target change: Overwrite the least recently used target with a new one.
2010-02-15 00:31:17 +01:00
Jilles Tjoelker
d29b1834c3
Make the number of targets tracked for target change a #define.
2010-02-13 15:18:17 +01:00
JD Horelick
957ee03b56
English fix to fix the fix i made about 80 minutes ago.
...
I suck at a/an cometimes. Also, fix.
2010-02-08 18:04:54 -05:00
JD Horelick
b17999e11b
One or 2 English language cleanups. Less than I thought there were.
2010-02-08 16:28:08 -05:00
Jilles Tjoelker
360a73dc94
Add new function rb_get_ssl_certfp() to export-syms.txt.
2010-02-07 20:38:37 +01:00
Jilles Tjoelker
0e0c4508f1
testline/testgecos: Send "not an oper" message if appropriate.
2010-02-07 17:57:36 +01:00
Jilles Tjoelker
54656d7650
Pass certfp to other servers and show it in whois. Do not show it on connect.
...
The server protocol for this is
:<uid> ENCAP * CERTFP :<40 hex chars>
both in new user introductions and in burst.
As in oftc-hybrid, only the user themselves and opers can see the certfp.
Displaying the certfp on connect seems unnecessary to me,
the user can whois themselves if needed.
2010-02-06 00:18:27 +01:00
Jilles Tjoelker
8329f99cf9
Fix serno.h for compiles from Mercurial.
2010-02-03 00:46:14 +01:00
Jilles Tjoelker
f7b5446177
Apply ratbox3 workaround for too permissive inet_pton6():
...
Any kline (or various other things) containing * or ? is
a mask kline and not an IP kline. Ideally, rb_inet_pton_sock()
would return failure for those, but in practice this is not
always the case for IPv6.
Such a kline that is erroneously treated as an IP line
likely matches way fewer IPs than expected.
2010-02-03 00:44:51 +01:00
William Pitcock
09fb2d185d
Clarify CertFP message.
2010-01-31 17:35:15 -06:00
Jilles Tjoelker
a099270d45
Add certfp support to libratbox and ssld.
...
This lets a user connect with a client certificate, and
passes the certificate's fingerprint to ircd, which
currently just notices it to the user.
A new ssld->ircd message 'F' is used to pass on the
fingerprint.
This is only for OpenSSL for now, not GNUTLS.
2010-01-31 19:04:20 +01:00
William Pitcock
436cf01700
Automated merge with ssh://hg.atheme.org//hg/charybdis
2010-01-30 19:21:28 -06:00
William Pitcock
4b253d3bd7
modreload: Causing an entire 50,000 user network to crash due to user-error is a bad idea, don't let it happen again by not allowing paths in /modreload.
2010-01-30 19:21:17 -06:00
Jilles Tjoelker
cfc8334833
Slightly tighten auth{} duplicate check:
...
If the existing auth{} block has no auth_user, it will
trump any auth{} block for the same u@h.
2010-01-31 01:40:43 +01:00
Jilles Tjoelker
67cc1f0c96
Take auth_user into account when detecting redundant/duplicate auth{}.
...
from ircd-seven (spb)
2010-01-31 01:36:37 +01:00
Jilles Tjoelker
66a1809526
No need to be paranoid about clearing auth_user.
...
It is a username, not a password.
2010-01-31 01:30:25 +01:00
Jilles Tjoelker
e37a8398ce
Fix memory leak with auth_user.
...
from ircd-seven (spb)
2010-01-31 01:29:08 +01:00
Jilles Tjoelker
6d70eae633
Remove remnants of <foo>_t typedefs.
2010-01-30 15:57:10 +01:00
Jilles Tjoelker
306274351b
Fix /links buffer overflow.
2010-01-27 21:05:10 +01:00