Commit graph

  • 4dc5324e57
    Travis-CI: cleanup / new dir structure Bram Matthys 2017-10-23 11:13:05 +0200
  • 77234b2b8d
    API change for HOOKTYPE_PRE_INVITE and fix #5023: * API change for HOOKTYPE_PRE_INVITE: (aClient *sptr, aClient *target, aChannel *chptr, int *override) Modules must now send the error message instead of only returning HOOK_DENY. Also check for operoverride and set *override=1. Bram Matthys 2017-10-23 10:07:33 +0200
  • d11484c2cf
    Add build status badge for Windows (AppVeyor) Bram Matthys 2017-10-23 09:00:14 +0200
  • 8981b87c72
    Update libressl paths for VS2017 (or actually current unreal w/o rollback for vs2012) Bram Matthys 2017-10-22 18:11:24 +0200
  • 8a17f5aad2
    I've stopped trying to understand this. Apparently there's a difference between sed 3.x and sed 4.x Bram Matthys 2017-10-22 17:11:45 +0200
  • a55aa2a39a
    1) From double escaping to single escaping, such joy. 2) Use 'iscc' rather than 'compil32' since the latter pops up a dialog box which blocks the entire build process. 3) Apparently the VS2017 image has a broken VS2012 since it bails on winsock.h. So try to use different images for both builds. Bram Matthys 2017-10-22 16:41:23 +0200
  • a9a94652ec
    Be consistent when setting WINVER. This fixes a compile issue with Visual Studio 2017. Bram Matthys 2017-10-22 16:23:52 +0200
  • 7527de3820
    Silence rar extraction stuff - way too noisy Bram Matthys 2017-10-22 16:18:50 +0200
  • 81e8ef3b49
    Tell AppVeyor to use VS2017 image, apparently not the default. Bram Matthys 2017-10-22 16:17:40 +0200
  • 1a434963b7
    Duh 3 Bram Matthys 2017-10-22 16:11:24 +0200
  • b3480c3b42
    Duh 2 Bram Matthys 2017-10-22 16:07:32 +0200
  • a6049add32
    Duh. Bram Matthys 2017-10-22 16:06:54 +0200
  • 99f9d1aa7c
    AppVeyor: restructuring, add vs2017 target, .. Bram Matthys 2017-10-22 16:02:48 +0200
  • b941b184f0
    Let's try an environment (build config) Bram Matthys 2017-10-22 14:47:38 +0200
  • e505a4b99c
    Something tells me error checking won't work in batch files without this.. Bram Matthys 2017-10-22 14:41:54 +0200
  • 5510f6dc0d
    Ah no. Bram Matthys 2017-10-22 14:38:19 +0200
  • 25864b9cb6
    Nevermind, use external batch file. Bram Matthys 2017-10-22 14:34:41 +0200
  • 5ec84b1629
    Try 5001 Bram Matthys 2017-10-22 14:31:54 +0200
  • 593cacbc90
    Hm CRLF shit? Bram Matthys 2017-10-22 14:28:23 +0200
  • 40d8fe9376
    Initial appveyor file for automated Windows build. Bram Matthys 2017-10-22 14:25:54 +0200
  • 6ab81ab7b4
    Fix bug caused by 5124e60b7c a few days ago: channel MODE without parameters being sent when force-rejoin is in use. Bram Matthys 2017-10-18 17:39:54 +0200
  • d67de82786
    Add extra 6 second fake lag penalty on /INVITE. Bram Matthys 2017-10-18 15:56:06 +0200
  • 5bedeaa9bf
    Set cptr->name after EAUTH. Fixes bug #4915 reported by Eman: missing server name in link rejection message (clock mismatch). Bram Matthys 2017-10-18 15:43:13 +0200
  • f8cab0d093
    isupport does not update maxbans. Reported by dyfrgi (#4882). Bram Matthys 2017-10-18 15:22:33 +0200
  • a716e3ccaa
    The default oper snomask now includes 'S' (spamfilter notices). Bram Matthys 2017-10-18 15:11:12 +0200
  • 70b64c2ad8
    If you have any blacklist { } block then UnrealIRCd will set an set::handshake-delay of 2 seconds by default. This will allow (most) DNSBL checking to be finished before the user comes online, while still allowing a smooth user experience. If your DNS(BL) is slow then you could raise this setting slightly. Bram Matthys 2017-10-18 15:03:12 +0200
  • e4f4336f15
    Add set::handshake-delay https://www.unrealircd.org/docs/Set_block#set::handshake-delay Bram Matthys 2017-10-18 14:57:35 +0200
  • b56c5b985f
    This check is already present in parse_client_queued() Bram Matthys 2017-10-18 14:31:35 +0200
  • 3aa6adcbfc
    Rename 'draft/sts' to 'sts'. Bram Matthys 2017-10-17 18:12:13 +0200
  • 98b4832b27
    clarify Bram Matthys 2017-10-12 20:18:24 +0200
  • c2d80028b3
    Update release notes to reflect latest changes. Bram Matthys 2017-10-12 20:16:42 +0200
  • 307243ff7a
    Show (previously hidden) umode -r to user on nickchange. Reported by Mewsito (#4949). Bram Matthys 2017-10-11 18:25:58 +0200
  • 1d659296c2
    Fix Windows compile problem Bram Matthys 2017-10-11 17:33:39 +0200
  • b7b8e41ac4
    CAP chghost: also send CHGHOST message to "self" (impacted user) https://github.com/ircv3/ircv3-specifications/issues/324 Bram Matthys 2017-10-11 10:29:00 +0200
  • df5ed0884e
    Use spkifp instead of sslclientcertfp in example conf. Add example link block for services (but reject if user does not change the default password) Bram Matthys 2017-10-09 15:10:37 +0200
  • 9e1160b74f
    Add './unrealircd spkifp' which will output the SPKI fingerprint along with the exact password section to use in the link block on the other side of the link. Also used in tutorial now at https://www.unrealircd.org/docs/Tutorial:_Linking_servers Bram Matthys 2017-10-09 14:59:19 +0200
  • 55e4c8ea03
    Tell admins to verify the SSL/TLS certificates of their server links. https://www.unrealircd.org/docs/Link_verification This is only outputted if both sides are 4.0.16+ so we can use spkifp and use the same instruction on both sides of the link. (If we would do it for previous versions then we would only give half of the instructions to the users, which makes no sense) Bram Matthys 2017-10-09 14:17:35 +0200
  • 16faccb777
    Add support for 'spki' authtype. Example: password "AHMYBevUxXKU/S3pdBSjXP4zi4VOetYQQVJXoNYiBR0=" { spkifp; }; This value will stay the same even for new SSL/TLS certificates, as long as the key stays the same. This can be useful in case of Let's Encrypt (if you use a tool that keeps the same key, that is, certbot does not at the moment). Suggested by grawity (#5014). Bram Matthys 2017-10-09 12:28:08 +0200
  • 75ab9a766c
    Dumdeedum Bram Matthys 2017-10-08 18:21:43 +0200
  • f2603cdc49
    When booting the IRCd and the log is full (log::maxfilesize), the IRCd would not write the appropriate 'Max file size reached' message to the old log file. Reported by NoMiaus (#4919). Bram Matthys 2017-10-08 18:19:16 +0200
  • abd7354bbb
    A common complaint is that spamfilters are hard to remove. Well, no more! There is now '/spamfilter del' which will output all spamfilter along with the appropriate command to delete each spamfilter (by unique ID). This way it should be easy for anyone to delete an existing spamfilter. Bram Matthys 2017-10-08 17:09:28 +0200
  • 16f71e8360
    Add option: set { ban-include-username yes; }; which will make bans places by spamfilters (and some other systems) to be placed not on *@ip but rather on user@ip. Note that this won't work for ZLINE/GZLINE since no ident/username lookups are done in such cases. Bit of a niche feature but okay.. Bram Matthys 2017-10-08 15:44:42 +0200
  • 1b6d49a9dc
    Add set { cloak-method ip; }; which will make cloaking only be done on the IP and thus result in an XX.YY.ZZ.IP cloaked host. This so you can have "IP cloaking" without disabling DNS lookups. GLINES on hosts still work and IRCOps (and yourself) can still see the host in /WHOIS. Requested in 4957 by Gottem and The_Myth. Bram Matthys 2017-10-08 15:14:57 +0200
  • 66143927e0
    In /STATS S display throttling as anti-flood::connect-flood, as that is the new name (since about 2 years). Bram Matthys 2017-10-08 09:12:46 +0200
  • b52b82f8a5
    Tweaks Bram Matthys 2017-10-07 21:42:41 +0200
  • ee2435689c
    Some initial work on release notes for 4.0.16. Bram Matthys 2017-10-07 21:36:22 +0200
  • 87815ad397
    Automatically discover SASL server if saslmechlist is sent by services and set::sasl-server is not set by the administrator. Looks like this: *** Services server 'services.test.net' provides SASL authentication, good! I'm setting set::sasl-server to 'services.test.net' internally. Hopefully this will increase SASL availability significantly. That is, once anope and atheme start sending the saslmechlist to us, of course ;) (see commit d6e26d59e5) Bram Matthys 2017-10-07 21:05:49 +0200
  • 7801dc888d
    Move CAP NEW "sasl" sending to after EOS (End Of Synch) This so saslmechs are properly sent in case of services (re)connect, otherwise the CAP NEW is sent too early when the saslmechs are not known yet. NOTE: This makes sending "EOS" mandatory for any SASL servers. You should be doing this since 14 years ago (it was added in 3.2beta18 in August 2003) so hopefully that is the case. Anope is good anyway :) Bram Matthys 2017-10-07 19:40:39 +0200
  • d6e26d59e5
    Allow services to set the saslmechlist so it can be used by sasl v3.2. Note to services coders: send something like this: MD client your.services.server saslmechlist :EXTERNAL,PLAIN Bram Matthys 2017-10-07 19:20:06 +0200
  • 5bd9878413
    Only send CAP parameters (token=aaaaaa) to clients with CAP proto 302 or higher, as per CAP specification. (So use "CAP LS 302" to see them) Bram Matthys 2017-10-07 19:18:21 +0200
  • 5c7d89a642
    Add support for "CAP extended-join". Bram Matthys 2017-10-07 18:33:25 +0200
  • 2248699c60
    Fix crash due to previous enhancements. Bram Matthys 2017-10-07 17:25:37 +0200
  • 5124e60b7c
    Add "CAP chghost" support. Internal recode of userhost changes. Fix force-rejoin not working if doing SVSMODE -x/+x (Koragg, #5015). Bram Matthys 2017-10-07 13:31:30 +0200
  • 0fd265349a
    Remove HOSTILENAME config.h option since running without it is and has never been supported. Bram Matthys 2017-10-07 09:33:48 +0200
  • 23ce2eaabe
    It helps if you also update the *.h files to reflect those changes. Duh. Bram Matthys 2017-10-07 09:32:09 +0200
  • 3d38adff4f
    Rename config.h setting CLIENT_FLOOD to DEFAULT_RECVQ since that is what it is. You should simply set a class::recvq instead of changing this in config.h. Bram Matthys 2017-10-07 09:29:47 +0200
  • 885e474211
    Removed option in config.h to disable NO_FLOOD_AWAY. You can already tweak or disable this via set::anti-flood::away-flood. Bram Matthys 2017-10-07 09:25:45 +0200
  • 1a80309314
    Remove strange include/config.h option called CMDLINE_CONFIG which would allow you to use -f even if the IRCd is suid or sgid. This is not anything we or you ever want to permit since this is a major security problem. This setting is now gone. I doubt anyone used it. Bram Matthys 2017-10-07 09:22:32 +0200
  • 08496ec47b
    Remove various #define's from config.h that don't actually do anything (or are incorrectly documented). Bram Matthys 2017-10-07 09:19:14 +0200
  • 7a33a2c019
    Move CONNECTTIMEOUT to set::handshake-timeout and clarify the setting at https://www.unrealircd.org/docs/Set_block#set::handshake-timeout Requested by marco500 in #5011. Bram Matthys 2017-10-07 08:45:48 +0200
  • d6acbf63b0
    Move MAXUNKNOWNCONNECTIONSPERIP to set::max-unknown-connections-per-ip. Rarely tweaked setting, but for those who need it it's easier in the conf. Requested by marco500 (#5011). For documentation of this setting see: https://www.unrealircd.org/docs/Set_block#set::max-unknown-connections-per-ip Bram Matthys 2017-10-07 08:15:52 +0200
  • 37dbdfeee3
    Bump version to 4.0.16-devel. This version is under development. You should always use https://www.unrealircd.org/ for stable releases. In case you wondered what happened with 4.0.15: that version consists of cherry-picked / backports of the two crash fixes from this 'unreal40' development branch. The current code simply wasn't ready yet for a rushed security release. Bram Matthys 2017-10-01 19:37:29 +0200
  • 6dd147b941
    Fix 2nd crash bug. Found when searching for related crash issues. Bram Matthys 2017-10-01 13:19:12 +0200
  • 47eebad53d
    Fix crash bug, reported by Joseph Bisch. Bram Matthys 2017-10-01 13:18:45 +0200
  • 5399e060fa
    Send CAP DEL sasl if set::sasl-server squits and CAP NEW when it returns. (Only to cap-notify and v3.2 clients, of course) Also fix a "bug" where sts parameters were not shown in CAP NEW tls. Bram Matthys 2017-09-30 15:19:29 +0200
  • ac65e32a26
    Add CAP v3.2 support. Add 'cap-notify' support. Delete CAP CLEAR as it's use is discouraged (too much trouble). Delete CAP ACK (from client2server) as this is only for CAP's with ack modifiers. This is something we don't use, and which has been deprecated in v3.2 of the spec. Bram Matthys 2017-09-30 14:34:06 +0200
  • 461fa9a48a
    Store CAP version in use in sptr->local->cap_protocol. Bram Matthys 2017-09-30 12:50:36 +0200
  • 7d381086ad
    Remove CLICAP_FLAGS_CLIACK. Never understood this idea. Unused and deprecated it seems. Bram Matthys 2017-09-30 12:35:56 +0200
  • 44052b86c0
    Remove CLICAP_FLAGS_STICKY. We don't use this anyway. Bram Matthys 2017-09-30 12:33:57 +0200
  • fbd4e74663
    You can now have multiple webirc { } blocks with the same mask. This permits multiple blocks like.. webirc { mask *; password "....." { sslclientcertfp; }; }; ..should you need it. In other words: we don't stop matching upon an authentication failure. Bram Matthys 2017-09-30 09:53:04 +0200
  • 638b189804
    Users connecting to the IRC server from the same machine could be seen as "localhost", even though they were using an IP other than 127.0.0.1. So, they were local but not using loopback. Reported by The_Myth (#5013). Bram Matthys 2017-09-20 15:51:41 +0200
  • 838354f155
    UnrealIRCd 4.0.14 Bram Matthys 2017-09-15 10:23:49 +0200
  • de9216a339
    * Please do not use UmodeDel, CmdoverrideDel and any other *Del() functions from MOD_UNLOAD. [..] Bram Matthys 2017-09-15 10:19:55 +0200
  • 217ea69fe8
    Use ircs:// link instead of irc:// Bram Matthys 2017-09-15 08:24:30 +0200
  • 3de335ea0c
    Update curlinstall link to use https. Previously this wasn't done because so many people had a broken system/wget/curl, that is: without the appropriate trusted CA certificates installed. If this is still the case, then: too bad. People who DO have a proper setup shouldn't be held back with regards to security by such users. Bram Matthys 2017-09-15 08:19:39 +0200
  • 91e108499e
    Convert remaining http:// links to https:// Bram Matthys 2017-09-15 08:19:08 +0200
  • a20dc5f8c1
    Use static buffer in cipher_check() like in verify_certificate() - duh. Bram Matthys 2017-09-10 16:41:34 +0200
  • e7c7b1daff
    Don't show draft/sts and other unREQ'able CAP's in "CAP LIST" (only in "CAP LS"). Bram Matthys 2017-09-09 12:37:50 +0200
  • 3cbf2536b2
    Clarify Bram Matthys 2017-09-08 08:26:53 +0200
  • 1f856745e5
    4.0.14-rc1 Bram Matthys 2017-09-08 08:16:21 +0200
  • 366a494c00
    Last update of release notes before -rc1? Bram Matthys 2017-09-08 08:15:54 +0200
  • 2914695681
    We can't prevent all user mistakes, but we can at least prevent some.. Bram Matthys 2017-09-08 07:53:20 +0200
  • 461ce8016a
    Some modes in set::modes-on-connect gave an error. These were old user modes such as +N and +A that were previously forbidden but may nowadays be (re-)used by 3rd party modules. Reported by marco500 (#4980). Bram Matthys 2017-09-08 07:39:56 +0200
  • ea974ed018
    Update Windows makefile (+SRC/OPENSSL_HOSTNAME_VALIDATION.OBJ) Bram Matthys 2017-09-06 16:51:18 +0200
  • 296decf648
    This code can be removed now that we have a working verify_certificate(). Also broke LibreSSL (SSL_CTX_get0_param undefined). Bram Matthys 2017-09-06 16:49:25 +0200
  • a21222a672
    Bump MODDATA_MAX_CLIENT from 8 to 12 and move MODDATA_MAX_* to include/config.h Bram Matthys 2017-09-06 16:29:48 +0200
  • 05c6dfbb35
    Update release notes Bram Matthys 2017-09-06 16:22:13 +0200
  • edb144d570
    Update cipher suite to include TLSv1.3 ciphers. This so upcoming UnrealIRCd version will work with TLSv1.3 whenever it becomes an official standard and is included in OpenSSL/LibreSSL. (Verified to work with openssl git master branch) Bram Matthys 2017-09-06 16:09:22 +0200
  • a5dbd3aa7c
    SSL/TLS: Use SNI in outgoing server link. Bram Matthys 2017-09-06 14:32:21 +0200
  • b757d2eff0
    Show set::sasl-server in '/STATS set'. Suggested by Gottem (#0004997). Bram Matthys 2017-09-06 08:44:12 +0200
  • 08bc61ec00
    We now refuse to enable SSL/TLS with weak ciphers: DES, 3DES, RC4. Bram Matthys 2017-09-06 08:21:14 +0200
  • 959195e7d7
    Update Windows makefile to match *NIX objects Bram Matthys 2017-09-03 16:27:55 +0200
  • 58ebc9c6be
    Move previous release notes (4.0.13) to doc/RELEASE-NOTES.old Bram Matthys 2017-09-03 16:23:05 +0200
  • 788f628403
    Update release notes Bram Matthys 2017-09-03 16:22:44 +0200
  • 3510a98e50
    Shorten the set::plaintext-policy text. Content was good but it was too long. Bram Matthys 2017-09-03 16:10:37 +0200
  • 8fad7c563d
    Add cap/link-security and cap/plaintext-policy modules. Bram Matthys 2017-09-03 16:06:39 +0200
  • 1faa91ed0e
    Add helper function plaintextpolicy_valtochar(). Bram Matthys 2017-09-02 15:49:02 +0200
  • 78695f3eea
    Permit attaching client moddata to servers (and synch properly, if .synch=1) Bram Matthys 2017-09-02 15:47:58 +0200
  • 0da1fdb2d2
    Fix possible crash in /STATS due to change from yesterday. Other than that, some minor style and real things. Bram Matthys 2017-09-02 08:27:55 +0200
  • 3ade6c7ecb
    :D Bram Matthys 2017-09-01 18:15:47 +0200