Stephen Bennett
5fabe51369
Don't allow +Z to be set by default_umodes
2011-03-11 13:12:40 +00:00
Elizabeth Jennifer Myers
0a1e77c27c
Support IPv6 blacklists. Also add a conf file option allowing the use of IPv4, IPv6, or both for a blacklist.
...
Although few blacklists currently support IPv6 lookups, they will likely begin to do so in the near future as more net trash begins using IPv6.
2011-02-27 16:38:05 -05:00
Elizabeth Jennifer Myers
f4b52a0ad3
can_send: properly initalise moduledata.
2011-02-13 09:50:25 -05:00
Jilles Tjoelker
462ae9d7a5
Fix memory leak of operator certfp fields.
2011-01-25 00:39:07 +01:00
Elizabeth Jennifer Myers
ed45dfe676
newconf: fix a warning
2011-01-23 16:56:36 -05:00
Elizabeth Jennifer Myers
63c7a68e19
newconf: fix certificate fingerprint auth.
...
yy_oper->certfp was not copied into yy_tmpoper->certfp, thus the information was lost and certfp auth was never really working, since the string was always empty.
2011-01-23 16:12:32 -05:00
Jilles Tjoelker
26e9dd93ad
Remove nickTS from extended-join.
2011-01-11 00:26:15 +01:00
Jilles Tjoelker
e2b507ac41
Fix extended-join not sending any joins at all.
...
Note that IsCapable(x, NOCAPS) always returns true.
2011-01-11 00:26:05 +01:00
Jilles Tjoelker
2fb0796158
hunt_server: Disallow wildcarded nicknames.
...
Any hunted parameter with wildcards is now assumed
to be a server, never a user.
Reasons:
* fewer match() calls
* do not disclose existing nicknames
* more intuitive behaviour for CONNECT
m_trace has a copy of some hunt_server logic in it
(for the RPL_TRACELINK reply), so adjust that too.
2011-01-08 17:47:05 +01:00
Keith Buck
4c3f066ab8
Move list-related isupport items to the list module itself.
2011-01-06 00:40:08 -08:00
Keith Buck
096570b9f8
Add topic TS and channel TS constraints for /LIST.
2011-01-05 21:15:36 -08:00
Keith Buck
bb55ebebe9
Implement operspy for /LIST.
2011-01-05 18:57:27 -08:00
Jilles Tjoelker
fa0e215255
Tweak previous commit to avoid problems with OMODE.
...
Do not allow a user to op themselves if they are
already opped, as "already opped" could be because
of OMODE's hack which will be unconditionally
reverted after the mode change.
Also, this matches old behaviour for users not
being able to generate mode changes redundantly
opping themselves.
Note that this change should only be taken advantage
of if all servers run patched code. Otherwise, mode
changes will be silently dropped and a desync
results.
2010-12-31 02:43:16 +01:00
William Pitcock
402cce0b9c
Remove stupid hybrid-esque 'impossible to op yourself' hack.
...
Who the fuck thought that check was a good idea?
2010-12-30 19:21:14 -06:00
Stephen Bennett
0c512421c5
Add default for disable_local_channels. Missed this last time.
2010-12-21 20:53:39 +00:00
Stephen Bennett
341f971efa
Bring across disable_local_channels config option from ircd-seven
2010-12-21 20:38:04 +00:00
William Pitcock
92052a5c24
Add extended-join client capability.
...
The extended-join client capability extends the JOIN message with information clients typically
query using WHO including accountname, signon TS and realname.
2010-12-16 00:24:54 -06:00
William Pitcock
99cca61ed6
Add sendto_channel_local_with_capability().
2010-12-16 00:19:24 -06:00
William Pitcock
27912fd4ff
Add send_channel_join().
2010-12-16 00:09:29 -06:00
William Pitcock
7a948bdaa7
Add capability parameter to sendto_common_channels_local() and sendto_common_channels_local_butone().
2010-12-15 22:55:05 -06:00
Jilles Tjoelker
0b2b2f7753
Remove redundant prototypes in src/ircd_lexer.l.
...
These seem unnecessary and may cause problems because they
are wrong in some cases.
A comment says these were needed for GCC 3.3. If you are
still using this compiler, check this and if it breaks,
some other approach is needed.
2010-12-15 21:49:47 +01:00
William Pitcock
96d2612765
Don't bother running the get_channel_access hook if the client is not really on the channel.
2010-12-14 23:04:11 -06:00
William Pitcock
b697041e2a
Don't bother running the can_send() hook if we're not on the channel.
2010-12-14 22:57:23 -06:00
William Pitcock
c8f269066c
Correct error message involving no fingerprint credentials or password credentials being available.
2010-12-14 21:25:44 -06:00
William Pitcock
ff0cc1e616
Add support for linking using SSL certificate fingerprints as the link credential rather than the traditional server-password pair.
2010-12-13 23:14:00 -06:00
William Pitcock
e06988c6de
Fix regressions in can_send() caused by hooking it for override and modularized channel modules.
2010-12-11 20:21:47 -06:00
B.Greenham
15484f02bd
Move flood_attack_channel to channel.c so it can be used outside m_message.c
2010-12-09 18:29:56 -05:00
William Pitcock
3c52f289b1
Actually make get_channel_access() public.
2010-12-07 00:12:36 -06:00
William Pitcock
0aa36c5f0f
Add can_send hook.
2010-12-07 00:09:46 -06:00
William Pitcock
8bb19bd7ab
Make the can_join hook more flexible.
2010-12-06 23:52:44 -06:00
William Pitcock
749d8c11dd
Add a hook for get_channel_access().
2010-12-06 22:57:28 -06:00
William Pitcock
83b72f917a
chmode: Remove chm_regonly, a vestige from ratbox which doesn't apply to native charybdis networks.
2010-12-06 22:46:37 -06:00
William Pitcock
85a206d3e0
Use %u instead of %d.
2010-12-04 23:13:35 -06:00
William Pitcock
5d21ef5098
blacklist: Remove the sscanf() for the IPv4 blacklist check.
...
From ratbox r27061 (androsyn).
2010-12-04 23:11:04 -06:00
JD Horelick
eac04554fd
Fix some various warnings.
...
Some from ShadowIRCd, one from ircd-seven.
2010-11-14 16:51:27 -05:00
William Pitcock
819dd2d287
parse(): make reentrant
2010-10-24 21:02:32 -05:00
Jilles Tjoelker
01b7a527a3
Show the services login name in WHOWAS.
...
The numeric is the same (330) as used in WHOIS.
This takes at most half a megabyte of memory (large network, 30 char nicks).
2010-08-29 22:30:54 +02:00
Jilles Tjoelker
5b383ce060
Move RPL_WHOISLOGGEDIN to sendto_one_numeric().
2010-08-29 22:29:17 +02:00
William Pitcock
a63f7af7bb
Note that can_join() is not remote-user safe.
2010-08-29 14:07:44 -05:00
Jilles Tjoelker
717238d2a2
Add target change for channels.
...
This has a separate enabling option channel::channel_target_change.
It applies to PRIVMSG, NOTICE and TOPIC by unvoiced unopped non-opers.
The same slots are used for channels and users.
2010-08-29 01:26:00 +02:00
Jilles Tjoelker
6917ed0eba
Send only one ERR_MLOCKRESTRICTED per MODE command.
...
This agrees with other error messages from MODE.
2010-08-24 23:03:23 +02:00
Jilles Tjoelker
2fb6379693
Change ERR_MLOCKRESTRICTED to 742 as 735-739 seem for MONITOR extensions.
2010-08-24 22:51:20 +02:00
William Pitcock
6fb6bd15ae
Enforce TS rules on MLOCKs.
2010-08-23 20:22:59 -05:00
William Pitcock
01ed04abaf
Send numeric 735 on MLOCK policy-restricted mode changes that are ignored.
2010-08-23 19:04:46 -05:00
William Pitcock
32de9f4e67
Add ERR_MLOCKRESTRICTED (735) to reflect bounces caused by MLOCK.
2010-08-23 18:59:32 -05:00
Elly
3645ce9869
Change oper-up message.
2010-08-22 23:21:38 -04:00
Jilles Tjoelker
f5455d2cd5
Tweak auto-accept:
...
* does not apply to NOTICE (as those may well be automated)
* mirrors +g behaviour so that no useless accept entries are added for services
* respects max_accept, if it would be exceeded the message is dropped with numeric 494
* check moved up so this is checked before floodcount/tgchange
2010-07-04 17:14:56 +02:00
Jilles Tjoelker
15f92147c7
Make number_per_ident actually apply to unidented connections as well,
...
as documented in reference.conf.
Noticed by: spb
2010-06-09 21:22:47 +02:00
Stephen Bennett
c71a6e3bed
Branch merge
2010-05-02 21:36:32 +01:00
Stephen Bennett
3b8a6350f8
Backed out changeset c57955c5225e
...
Now that MLOCK is no longer stored as a struct Mode, this is unnecessary.
2010-05-02 21:29:22 +01:00