Nelze vybrat více než 25 témat Téma musí začínat písmenem nebo číslem, může obsahovat pomlčky („-“) a může být dlouhé až 35 znaků.

RFC2812.txt 123KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529
  1. Network Working Group C. Kalt
  2. Request for Comments: 2812 April 2000
  3. Updates: 1459
  4. Category: Informational
  5. Internet Relay Chat: Client Protocol
  6. Status of this Memo
  7. This memo provides information for the Internet community. It does
  8. not specify an Internet standard of any kind. Distribution of this
  9. memo is unlimited.
  10. Copyright Notice
  11. Copyright (C) The Internet Society (2000). All Rights Reserved.
  12. IESG NOTE:
  13. The IRC protocol itself enables several possibilities of transferring
  14. data between clients, and just like with other transfer mechanisms
  15. like email, the receiver of the data has to be careful about how the
  16. data is handled. For more information on security issues with the IRC
  17. protocol, see for example http://www.irchelp.org/irchelp/security/.
  18. Abstract
  19. The IRC (Internet Relay Chat) protocol is for use with text based
  20. conferencing; the simplest client being any socket program capable of
  21. connecting to the server.
  22. This document defines the Client Protocol, and assumes that the
  23. reader is familiar with the IRC Architecture [IRC-ARCH].
  24. Table of Contents
  25. 1. Labels ..................................................... 3
  26. 1.1 Servers ................................................ 3
  27. 1.2 Clients ................................................ 3
  28. 1.2.1 Users ............................................. 4
  29. 1.2.1.1 Operators .................................... 4
  30. 1.2.2 Services .......................................... 4
  31. 1.3 Channels ............................................... 4
  32. 2. The IRC Client Specification ............................... 5
  33. 2.1 Overview ............................................... 5
  34. 2.2 Character codes ........................................ 5
  35. 2.3 Messages ............................................... 5
  36. Kalt Informational [Page 1]
  37. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  38. 2.3.1 Message format in Augmented BNF ................... 6
  39. 2.4 Numeric replies ........................................ 8
  40. 2.5 Wildcard expressions ................................... 9
  41. 3. Message Details ............................................ 9
  42. 3.1 Connection Registration ................................ 10
  43. 3.1.1 Password message .................................. 10
  44. 3.1.2 Nick message ...................................... 10
  45. 3.1.3 User message ...................................... 11
  46. 3.1.4 Oper message ...................................... 12
  47. 3.1.5 User mode message ................................. 12
  48. 3.1.6 Service message ................................... 13
  49. 3.1.7 Quit .............................................. 14
  50. 3.1.8 Squit ............................................. 15
  51. 3.2 Channel operations ..................................... 15
  52. 3.2.1 Join message ...................................... 16
  53. 3.2.2 Part message ...................................... 17
  54. 3.2.3 Channel mode message .............................. 18
  55. 3.2.4 Topic message ..................................... 19
  56. 3.2.5 Names message ..................................... 20
  57. 3.2.6 List message ...................................... 21
  58. 3.2.7 Invite message .................................... 21
  59. 3.2.8 Kick command ...................................... 22
  60. 3.3 Sending messages ....................................... 23
  61. 3.3.1 Private messages .................................. 23
  62. 3.3.2 Notice ............................................ 24
  63. 3.4 Server queries and commands ............................ 25
  64. 3.4.1 Motd message ...................................... 25
  65. 3.4.2 Lusers message .................................... 25
  66. 3.4.3 Version message ................................... 26
  67. 3.4.4 Stats message ..................................... 26
  68. 3.4.5 Links message ..................................... 27
  69. 3.4.6 Time message ...................................... 28
  70. 3.4.7 Connect message ................................... 28
  71. 3.4.8 Trace message ..................................... 29
  72. 3.4.9 Admin command ..................................... 30
  73. 3.4.10 Info command ...................................... 31
  74. 3.5 Service Query and Commands ............................. 31
  75. 3.5.1 Servlist message .................................. 31
  76. 3.5.2 Squery ............................................ 32
  77. 3.6 User based queries ..................................... 32
  78. 3.6.1 Who query ......................................... 32
  79. 3.6.2 Whois query ....................................... 33
  80. 3.6.3 Whowas ............................................ 34
  81. 3.7 Miscellaneous messages ................................. 34
  82. 3.7.1 Kill message ...................................... 35
  83. 3.7.2 Ping message ...................................... 36
  84. 3.7.3 Pong message ...................................... 37
  85. 3.7.4 Error ............................................. 37
  86. Kalt Informational [Page 2]
  87. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  88. 4. Optional features .......................................... 38
  89. 4.1 Away ................................................... 38
  90. 4.2 Rehash message ......................................... 39
  91. 4.3 Die message ............................................ 39
  92. 4.4 Restart message ........................................ 40
  93. 4.5 Summon message ......................................... 40
  94. 4.6 Users .................................................. 41
  95. 4.7 Operwall message ....................................... 41
  96. 4.8 Userhost message ....................................... 42
  97. 4.9 Ison message ........................................... 42
  98. 5. Replies .................................................... 43
  99. 5.1 Command responses ...................................... 43
  100. 5.2 Error Replies .......................................... 53
  101. 5.3 Reserved numerics ...................................... 59
  102. 6. Current implementations .................................... 60
  103. 7. Current problems ........................................... 60
  104. 7.1 Nicknames .............................................. 60
  105. 7.2 Limitation of wildcards ................................ 61
  106. 7.3 Security considerations ................................ 61
  107. 8. Current support and availability ........................... 61
  108. 9. Acknowledgements ........................................... 61
  109. 10. References ................................................ 62
  110. 11. Author's Address .......................................... 62
  111. 12. Full Copyright Statement .................................. 63
  112. 1. Labels
  113. This section defines the identifiers used for the various components
  114. of the IRC protocol.
  115. 1.1 Servers
  116. Servers are uniquely identified by their name, which has a maximum
  117. length of sixty three (63) characters. See the protocol grammar
  118. rules (section 2.3.1) for what may and may not be used in a server
  119. name.
  120. 1.2 Clients
  121. For each client all servers MUST have the following information: a
  122. netwide unique identifier (whose format depends on the type of
  123. client) and the server which introduced the client.
  124. Kalt Informational [Page 3]
  125. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  126. 1.2.1 Users
  127. Each user is distinguished from other users by a unique nickname
  128. having a maximum length of nine (9) characters. See the protocol
  129. grammar rules (section 2.3.1) for what may and may not be used in a
  130. nickname.
  131. While the maximum length is limited to nine characters, clients
  132. SHOULD accept longer strings as they may become used in future
  133. evolutions of the protocol.
  134. 1.2.1.1 Operators
  135. To allow a reasonable amount of order to be kept within the IRC
  136. network, a special class of users (operators) is allowed to perform
  137. general maintenance functions on the network. Although the powers
  138. granted to an operator can be considered as 'dangerous', they are
  139. nonetheless often necessary. Operators SHOULD be able to perform
  140. basic network tasks such as disconnecting and reconnecting servers as
  141. needed. In recognition of this need, the protocol discussed herein
  142. provides for operators only to be able to perform such functions.
  143. See sections 3.1.8 (SQUIT) and 3.4.7 (CONNECT).
  144. A more controversial power of operators is the ability to remove a
  145. user from the connected network by 'force', i.e., operators are able
  146. to close the connection between any client and server. The
  147. justification for this is very delicate since its abuse is both
  148. destructive and annoying, and its benefits close to inexistent. For
  149. further details on this type of action, see section 3.7.1 (KILL).
  150. 1.2.2 Services
  151. Each service is distinguished from other services by a service name
  152. composed of a nickname and a server name. As for users, the nickname
  153. has a maximum length of nine (9) characters. See the protocol
  154. grammar rules (section 2.3.1) for what may and may not be used in a
  155. nickname.
  156. 1.3 Channels
  157. Channels names are strings (beginning with a '&', '#', '+' or '!'
  158. character) of length up to fifty (50) characters. Apart from the
  159. requirement that the first character is either '&', '#', '+' or '!',
  160. the only restriction on a channel name is that it SHALL NOT contain
  161. any spaces (' '), a control G (^G or ASCII 7), a comma (','). Space
  162. is used as parameter separator and command is used as a list item
  163. separator by the protocol). A colon (':') can also be used as a
  164. delimiter for the channel mask. Channel names are case insensitive.
  165. Kalt Informational [Page 4]
  166. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  167. See the protocol grammar rules (section 2.3.1) for the exact syntax
  168. of a channel name.
  169. Each prefix characterizes a different channel type. The definition
  170. of the channel types is not relevant to the client-server protocol
  171. and thus it is beyond the scope of this document. More details can
  172. be found in "Internet Relay Chat: Channel Management" [IRC-CHAN].
  173. 2. The IRC Client Specification
  174. 2.1 Overview
  175. The protocol as described herein is for use only with client to
  176. server connections when the client registers as a user.
  177. 2.2 Character codes
  178. No specific character set is specified. The protocol is based on a
  179. set of codes which are composed of eight (8) bits, making up an
  180. octet. Each message may be composed of any number of these octets;
  181. however, some octet values are used for control codes, which act as
  182. message delimiters.
  183. Regardless of being an 8-bit protocol, the delimiters and keywords
  184. are such that protocol is mostly usable from US-ASCII terminal and a
  185. telnet connection.
  186. Because of IRC's Scandinavian origin, the characters {}|^ are
  187. considered to be the lower case equivalents of the characters []\~,
  188. respectively. This is a critical issue when determining the
  189. equivalence of two nicknames or channel names.
  190. 2.3 Messages
  191. Servers and clients send each other messages, which may or may not
  192. generate a reply. If the message contains a valid command, as
  193. described in later sections, the client should expect a reply as
  194. specified but it is not advised to wait forever for the reply; client
  195. to server and server to server communication is essentially
  196. asynchronous by nature.
  197. Each IRC message may consist of up to three main parts: the prefix
  198. (OPTIONAL), the command, and the command parameters (maximum of
  199. fifteen (15)). The prefix, command, and all parameters are separated
  200. by one ASCII space character (0x20) each.
  201. Kalt Informational [Page 5]
  202. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  203. The presence of a prefix is indicated with a single leading ASCII
  204. colon character (':', 0x3b), which MUST be the first character of the
  205. message itself. There MUST be NO gap (whitespace) between the colon
  206. and the prefix. The prefix is used by servers to indicate the true
  207. origin of the message. If the prefix is missing from the message, it
  208. is assumed to have originated from the connection from which it was
  209. received from. Clients SHOULD NOT use a prefix when sending a
  210. message; if they use one, the only valid prefix is the registered
  211. nickname associated with the client.
  212. The command MUST either be a valid IRC command or a three (3) digit
  213. number represented in ASCII text.
  214. IRC messages are always lines of characters terminated with a CR-LF
  215. (Carriage Return - Line Feed) pair, and these messages SHALL NOT
  216. exceed 512 characters in length, counting all characters including
  217. the trailing CR-LF. Thus, there are 510 characters maximum allowed
  218. for the command and its parameters. There is no provision for
  219. continuation of message lines. See section 6 for more details about
  220. current implementations.
  221. 2.3.1 Message format in Augmented BNF
  222. The protocol messages must be extracted from the contiguous stream of
  223. octets. The current solution is to designate two characters, CR and
  224. LF, as message separators. Empty messages are silently ignored,
  225. which permits use of the sequence CR-LF between messages without
  226. extra problems.
  227. The extracted message is parsed into the components <prefix>,
  228. <command> and list of parameters (<params>).
  229. The Augmented BNF representation for this is:
  230. message = [ ":" prefix SPACE ] command [ params ] crlf
  231. prefix = servername / ( nickname [ [ "!" user ] "@" host ] )
  232. command = 1*letter / 3digit
  233. params = *14( SPACE middle ) [ SPACE ":" trailing ]
  234. =/ 14( SPACE middle ) [ SPACE [ ":" ] trailing ]
  235. nospcrlfcl = %x01-09 / %x0B-0C / %x0E-1F / %x21-39 / %x3B-FF
  236. ; any octet except NUL, CR, LF, " " and ":"
  237. middle = nospcrlfcl *( ":" / nospcrlfcl )
  238. trailing = *( ":" / " " / nospcrlfcl )
  239. SPACE = %x20 ; space character
  240. crlf = %x0D %x0A ; "carriage return" "linefeed"
  241. Kalt Informational [Page 6]
  242. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  243. NOTES:
  244. 1) After extracting the parameter list, all parameters are equal
  245. whether matched by <middle> or <trailing>. <trailing> is just a
  246. syntactic trick to allow SPACE within the parameter.
  247. 2) The NUL (%x00) character is not special in message framing, and
  248. basically could end up inside a parameter, but it would cause
  249. extra complexities in normal C string handling. Therefore, NUL
  250. is not allowed within messages.
  251. Most protocol messages specify additional semantics and syntax for
  252. the extracted parameter strings dictated by their position in the
  253. list. For example, many server commands will assume that the first
  254. parameter after the command is the list of targets, which can be
  255. described with:
  256. target = nickname / server
  257. msgtarget = msgto *( "," msgto )
  258. msgto = channel / ( user [ "%" host ] "@" servername )
  259. msgto =/ ( user "%" host ) / targetmask
  260. msgto =/ nickname / ( nickname "!" user "@" host )
  261. channel = ( "#" / "+" / ( "!" channelid ) / "&" ) chanstring
  262. [ ":" chanstring ]
  263. servername = hostname
  264. host = hostname / hostaddr
  265. hostname = shortname *( "." shortname )
  266. shortname = ( letter / digit ) *( letter / digit / "-" )
  267. *( letter / digit )
  268. ; as specified in RFC 1123 [HNAME]
  269. hostaddr = ip4addr / ip6addr
  270. ip4addr = 1*3digit "." 1*3digit "." 1*3digit "." 1*3digit
  271. ip6addr = 1*hexdigit 7( ":" 1*hexdigit )
  272. ip6addr =/ "0:0:0:0:0:" ( "0" / "FFFF" ) ":" ip4addr
  273. nickname = ( letter / special ) *8( letter / digit / special / "-" )
  274. targetmask = ( "$" / "#" ) mask
  275. ; see details on allowed masks in section 3.3.1
  276. chanstring = %x01-07 / %x08-09 / %x0B-0C / %x0E-1F / %x21-2B
  277. chanstring =/ %x2D-39 / %x3B-FF
  278. ; any octet except NUL, BELL, CR, LF, " ", "," and ":"
  279. channelid = 5( %x41-5A / digit ) ; 5( A-Z / 0-9 )
  280. Kalt Informational [Page 7]
  281. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  282. Other parameter syntaxes are:
  283. user = 1*( %x01-09 / %x0B-0C / %x0E-1F / %x21-3F / %x41-FF )
  284. ; any octet except NUL, CR, LF, " " and "@"
  285. key = 1*23( %x01-05 / %x07-08 / %x0C / %x0E-1F / %x21-7F )
  286. ; any 7-bit US_ASCII character,
  287. ; except NUL, CR, LF, FF, h/v TABs, and " "
  288. letter = %x41-5A / %x61-7A ; A-Z / a-z
  289. digit = %x30-39 ; 0-9
  290. hexdigit = digit / "A" / "B" / "C" / "D" / "E" / "F"
  291. special = %x5B-60 / %x7B-7D
  292. ; "[", "]", "\", "`", "_", "^", "{", "|", "}"
  293. NOTES:
  294. 1) The <hostaddr> syntax is given here for the sole purpose of
  295. indicating the format to follow for IP addresses. This
  296. reflects the fact that the only available implementations of
  297. this protocol uses TCP/IP as underlying network protocol but is
  298. not meant to prevent other protocols to be used.
  299. 2) <hostname> has a maximum length of 63 characters. This is a
  300. limitation of the protocol as internet hostnames (in
  301. particular) can be longer. Such restriction is necessary
  302. because IRC messages are limited to 512 characters in length.
  303. Clients connecting from a host which name is longer than 63
  304. characters are registered using the host (numeric) address
  305. instead of the host name.
  306. 3) Some parameters used in the following sections of this
  307. documents are not defined here as there is nothing specific
  308. about them besides the name that is used for convenience.
  309. These parameters follow the general syntax defined for
  310. <params>.
  311. 2.4 Numeric replies
  312. Most of the messages sent to the server generate a reply of some
  313. sort. The most common reply is the numeric reply, used for both
  314. errors and normal replies. The numeric reply MUST be sent as one
  315. message consisting of the sender prefix, the three-digit numeric, and
  316. the target of the reply. A numeric reply is not allowed to originate
  317. from a client. In all other respects, a numeric reply is just like a
  318. normal message, except that the keyword is made up of 3 numeric
  319. digits rather than a string of letters. A list of different replies
  320. is supplied in section 5 (Replies).
  321. Kalt Informational [Page 8]
  322. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  323. 2.5 Wildcard expressions
  324. When wildcards are allowed in a string, it is referred as a "mask".
  325. For string matching purposes, the protocol allows the use of two
  326. special characters: '?' (%x3F) to match one and only one character,
  327. and '*' (%x2A) to match any number of any characters. These two
  328. characters can be escaped using the character '\' (%x5C).
  329. The Augmented BNF syntax for this is:
  330. mask = *( nowild / noesc wildone / noesc wildmany )
  331. wildone = %x3F
  332. wildmany = %x2A
  333. nowild = %x01-29 / %x2B-3E / %x40-FF
  334. ; any octet except NUL, "*", "?"
  335. noesc = %x01-5B / %x5D-FF
  336. ; any octet except NUL and "\"
  337. matchone = %x01-FF
  338. ; matches wildone
  339. matchmany = *matchone
  340. ; matches wildmany
  341. Examples:
  342. a?c ; Matches any string of 3 characters in length starting
  343. with "a" and ending with "c"
  344. a*c ; Matches any string of at least 2 characters in length
  345. starting with "a" and ending with "c"
  346. 3. Message Details
  347. On the following pages there are descriptions of each message
  348. recognized by the IRC server and client. All commands described in
  349. this section MUST be implemented by any server for this protocol.
  350. Where the reply ERR_NOSUCHSERVER is returned, it means that the
  351. target of the message could not be found. The server MUST NOT send
  352. any other replies after this error for that command.
  353. The server to which a client is connected is required to parse the
  354. complete message, and return any appropriate errors.
  355. If multiple parameters is presented, then each MUST be checked for
  356. validity and appropriate responses MUST be sent back to the client.
  357. In the case of incorrect messages which use parameter lists with
  358. comma as an item separator, a reply MUST be sent for each item.
  359. Kalt Informational [Page 9]
  360. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  361. 3.1 Connection Registration
  362. The commands described here are used to register a connection with an
  363. IRC server as a user as well as to correctly disconnect.
  364. A "PASS" command is not required for a client connection to be
  365. registered, but it MUST precede the latter of the NICK/USER
  366. combination (for a user connection) or the SERVICE command (for a
  367. service connection). The RECOMMENDED order for a client to register
  368. is as follows:
  369. 1. Pass message
  370. 2. Nick message 2. Service message
  371. 3. User message
  372. Upon success, the client will receive an RPL_WELCOME (for users) or
  373. RPL_YOURESERVICE (for services) message indicating that the
  374. connection is now registered and known the to the entire IRC network.
  375. The reply message MUST contain the full client identifier upon which
  376. it was registered.
  377. 3.1.1 Password message
  378. Command: PASS
  379. Parameters: <password>
  380. The PASS command is used to set a 'connection password'. The
  381. optional password can and MUST be set before any attempt to register
  382. the connection is made. Currently this requires that user send a
  383. PASS command before sending the NICK/USER combination.
  384. Numeric Replies:
  385. ERR_NEEDMOREPARAMS ERR_ALREADYREGISTRED
  386. Example:
  387. PASS secretpasswordhere
  388. 3.1.2 Nick message
  389. Command: NICK
  390. Parameters: <nickname>
  391. NICK command is used to give user a nickname or change the existing
  392. one.
  393. Kalt Informational [Page 10]
  394. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  395. Numeric Replies:
  396. ERR_NONICKNAMEGIVEN ERR_ERRONEUSNICKNAME
  397. ERR_NICKNAMEINUSE ERR_NICKCOLLISION
  398. ERR_UNAVAILRESOURCE ERR_RESTRICTED
  399. Examples:
  400. NICK Wiz ; Introducing new nick "Wiz" if session is
  401. still unregistered, or user changing his
  402. nickname to "Wiz"
  403. :WiZ!jto@tolsun.oulu.fi NICK Kilroy
  404. ; Server telling that WiZ changed his
  405. nickname to Kilroy.
  406. 3.1.3 User message
  407. Command: USER
  408. Parameters: <user> <mode> <unused> <realname>
  409. The USER command is used at the beginning of connection to specify
  410. the username, hostname and realname of a new user.
  411. The <mode> parameter should be a numeric, and can be used to
  412. automatically set user modes when registering with the server. This
  413. parameter is a bitmask, with only 2 bits having any signification: if
  414. the bit 2 is set, the user mode 'w' will be set and if the bit 3 is
  415. set, the user mode 'i' will be set. (See Section 3.1.5 "User
  416. Modes").
  417. The <realname> may contain space characters.
  418. Numeric Replies:
  419. ERR_NEEDMOREPARAMS ERR_ALREADYREGISTRED
  420. Example:
  421. USER guest 0 * :Ronnie Reagan ; User registering themselves with a
  422. username of "guest" and real name
  423. "Ronnie Reagan".
  424. USER guest 8 * :Ronnie Reagan ; User registering themselves with a
  425. username of "guest" and real name
  426. "Ronnie Reagan", and asking to be set
  427. invisible.
  428. Kalt Informational [Page 11]
  429. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  430. 3.1.4 Oper message
  431. Command: OPER
  432. Parameters: <name> <password>
  433. A normal user uses the OPER command to obtain operator privileges.
  434. The combination of <name> and <password> are REQUIRED to gain
  435. Operator privileges. Upon success, the user will receive a MODE
  436. message (see section 3.1.5) indicating the new user modes.
  437. Numeric Replies:
  438. ERR_NEEDMOREPARAMS RPL_YOUREOPER
  439. ERR_NOOPERHOST ERR_PASSWDMISMATCH
  440. Example:
  441. OPER foo bar ; Attempt to register as an operator
  442. using a username of "foo" and "bar"
  443. as the password.
  444. 3.1.5 User mode message
  445. Command: MODE
  446. Parameters: <nickname>
  447. *( ( "+" / "-" ) *( "i" / "w" / "o" / "O" / "r" ) )
  448. The user MODE's are typically changes which affect either how the
  449. client is seen by others or what 'extra' messages the client is sent.
  450. A user MODE command MUST only be accepted if both the sender of the
  451. message and the nickname given as a parameter are both the same. If
  452. no other parameter is given, then the server will return the current
  453. settings for the nick.
  454. The available modes are as follows:
  455. a - user is flagged as away;
  456. i - marks a users as invisible;
  457. w - user receives wallops;
  458. r - restricted user connection;
  459. o - operator flag;
  460. O - local operator flag;
  461. s - marks a user for receipt of server notices.
  462. Additional modes may be available later on.
  463. Kalt Informational [Page 12]
  464. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  465. The flag 'a' SHALL NOT be toggled by the user using the MODE command,
  466. instead use of the AWAY command is REQUIRED.
  467. If a user attempts to make themselves an operator using the "+o" or
  468. "+O" flag, the attempt SHOULD be ignored as users could bypass the
  469. authentication mechanisms of the OPER command. There is no
  470. restriction, however, on anyone `deopping' themselves (using "-o" or
  471. "-O").
  472. On the other hand, if a user attempts to make themselves unrestricted
  473. using the "-r" flag, the attempt SHOULD be ignored. There is no
  474. restriction, however, on anyone `deopping' themselves (using "+r").
  475. This flag is typically set by the server upon connection for
  476. administrative reasons. While the restrictions imposed are left up
  477. to the implementation, it is typical that a restricted user not be
  478. allowed to change nicknames, nor make use of the channel operator
  479. status on channels.
  480. The flag 's' is obsolete but MAY still be used.
  481. Numeric Replies:
  482. ERR_NEEDMOREPARAMS ERR_USERSDONTMATCH
  483. ERR_UMODEUNKNOWNFLAG RPL_UMODEIS
  484. Examples:
  485. MODE WiZ -w ; Command by WiZ to turn off
  486. reception of WALLOPS messages.
  487. MODE Angel +i ; Command from Angel to make herself
  488. invisible.
  489. MODE WiZ -o ; WiZ 'deopping' (removing operator
  490. status).
  491. 3.1.6 Service message
  492. Command: SERVICE
  493. Parameters: <nickname> <reserved> <distribution> <type>
  494. <reserved> <info>
  495. The SERVICE command to register a new service. Command parameters
  496. specify the service nickname, distribution, type and info of a new
  497. service.
  498. Kalt Informational [Page 13]
  499. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  500. The <distribution> parameter is used to specify the visibility of a
  501. service. The service may only be known to servers which have a name
  502. matching the distribution. For a matching server to have knowledge
  503. of the service, the network path between that server and the server
  504. on which the service is connected MUST be composed of servers which
  505. names all match the mask.
  506. The <type> parameter is currently reserved for future usage.
  507. Numeric Replies:
  508. ERR_ALREADYREGISTRED ERR_NEEDMOREPARAMS
  509. ERR_ERRONEUSNICKNAME
  510. RPL_YOURESERVICE RPL_YOURHOST
  511. RPL_MYINFO
  512. Example:
  513. SERVICE dict * *.fr 0 0 :French Dictionary ; Service registering
  514. itself with a name of "dict". This
  515. service will only be available on
  516. servers which name matches "*.fr".
  517. 3.1.7 Quit
  518. Command: QUIT
  519. Parameters: [ <Quit Message> ]
  520. A client session is terminated with a quit message. The server
  521. acknowledges this by sending an ERROR message to the client.
  522. Numeric Replies:
  523. None.
  524. Example:
  525. QUIT :Gone to have lunch ; Preferred message format.
  526. :syrk!kalt@millennium.stealth.net QUIT :Gone to have lunch ; User
  527. syrk has quit IRC to have lunch.
  528. Kalt Informational [Page 14]
  529. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  530. 3.1.8 Squit
  531. Command: SQUIT
  532. Parameters: <server> <comment>
  533. The SQUIT command is available only to operators. It is used to
  534. disconnect server links. Also servers can generate SQUIT messages on
  535. error conditions. A SQUIT message may also target a remote server
  536. connection. In this case, the SQUIT message will simply be sent to
  537. the remote server without affecting the servers in between the
  538. operator and the remote server.
  539. The <comment> SHOULD be supplied by all operators who execute a SQUIT
  540. for a remote server. The server ordered to disconnect its peer
  541. generates a WALLOPS message with <comment> included, so that other
  542. users may be aware of the reason of this action.
  543. Numeric replies:
  544. ERR_NOPRIVILEGES ERR_NOSUCHSERVER
  545. ERR_NEEDMOREPARAMS
  546. Examples:
  547. SQUIT tolsun.oulu.fi :Bad Link ? ; Command to uplink of the server
  548. tolson.oulu.fi to terminate its
  549. connection with comment "Bad Link".
  550. :Trillian SQUIT cm22.eng.umd.edu :Server out of control ; Command
  551. from Trillian from to disconnect
  552. "cm22.eng.umd.edu" from the net with
  553. comment "Server out of control".
  554. 3.2 Channel operations
  555. This group of messages is concerned with manipulating channels, their
  556. properties (channel modes), and their contents (typically users).
  557. For this reason, these messages SHALL NOT be made available to
  558. services.
  559. All of these messages are requests which will or will not be granted
  560. by the server. The server MUST send a reply informing the user
  561. whether the request was granted, denied or generated an error. When
  562. the server grants the request, the message is typically sent back
  563. (eventually reformatted) to the user with the prefix set to the user
  564. itself.
  565. Kalt Informational [Page 15]
  566. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  567. The rules governing how channels are managed are enforced by the
  568. servers. These rules are beyond the scope of this document. More
  569. details are found in "Internet Relay Chat: Channel Management" [IRC-
  570. CHAN].
  571. 3.2.1 Join message
  572. Command: JOIN
  573. Parameters: ( <channel> *( "," <channel> ) [ <key> *( "," <key> ) ] )
  574. / "0"
  575. The JOIN command is used by a user to request to start listening to
  576. the specific channel. Servers MUST be able to parse arguments in the
  577. form of a list of target, but SHOULD NOT use lists when sending JOIN
  578. messages to clients.
  579. Once a user has joined a channel, he receives information about
  580. all commands his server receives affecting the channel. This
  581. includes JOIN, MODE, KICK, PART, QUIT and of course PRIVMSG/NOTICE.
  582. This allows channel members to keep track of the other channel
  583. members, as well as channel modes.
  584. If a JOIN is successful, the user receives a JOIN message as
  585. confirmation and is then sent the channel's topic (using RPL_TOPIC) and
  586. the list of users who are on the channel (using RPL_NAMREPLY), which
  587. MUST include the user joining.
  588. Note that this message accepts a special argument ("0"), which is
  589. a special request to leave all channels the user is currently a member
  590. of. The server will process this message as if the user had sent
  591. a PART command (See Section 3.2.2) for each channel he is a member
  592. of.
  593. Numeric Replies:
  594. ERR_NEEDMOREPARAMS ERR_BANNEDFROMCHAN
  595. ERR_INVITEONLYCHAN ERR_BADCHANNELKEY
  596. ERR_CHANNELISFULL ERR_BADCHANMASK
  597. ERR_NOSUCHCHANNEL ERR_TOOMANYCHANNELS
  598. ERR_TOOMANYTARGETS ERR_UNAVAILRESOURCE
  599. RPL_TOPIC
  600. Examples:
  601. JOIN #foobar ; Command to join channel #foobar.
  602. JOIN &foo fubar ; Command to join channel &foo using
  603. key "fubar".
  604. Kalt Informational [Page 16]
  605. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  606. JOIN #foo,&bar fubar ; Command to join channel #foo using
  607. key "fubar" and &bar using no key.
  608. JOIN #foo,#bar fubar,foobar ; Command to join channel #foo using
  609. key "fubar", and channel #bar using
  610. key "foobar".
  611. JOIN #foo,#bar ; Command to join channels #foo and
  612. #bar.
  613. JOIN 0 ; Leave all currently joined
  614. channels.
  615. :WiZ!jto@tolsun.oulu.fi JOIN #Twilight_zone ; JOIN message from WiZ
  616. on channel #Twilight_zone
  617. 3.2.2 Part message
  618. Command: PART
  619. Parameters: <channel> *( "," <channel> ) [ <Part Message> ]
  620. The PART command causes the user sending the message to be removed
  621. from the list of active members for all given channels listed in the
  622. parameter string. If a "Part Message" is given, this will be sent
  623. instead of the default message, the nickname. This request is always
  624. granted by the server.
  625. Servers MUST be able to parse arguments in the form of a list of
  626. target, but SHOULD NOT use lists when sending PART messages to
  627. clients.
  628. Numeric Replies:
  629. ERR_NEEDMOREPARAMS ERR_NOSUCHCHANNEL
  630. ERR_NOTONCHANNEL
  631. Examples:
  632. PART #twilight_zone ; Command to leave channel
  633. "#twilight_zone"
  634. PART #oz-ops,&group5 ; Command to leave both channels
  635. "&group5" and "#oz-ops".
  636. :WiZ!jto@tolsun.oulu.fi PART #playzone :I lost
  637. ; User WiZ leaving channel
  638. "#playzone" with the message "I
  639. lost".
  640. Kalt Informational [Page 17]
  641. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  642. 3.2.3 Channel mode message
  643. Command: MODE
  644. Parameters: <channel> *( ( "-" / "+" ) *<modes> *<modeparams> )
  645. The MODE command is provided so that users may query and change the
  646. characteristics of a channel. For more details on available modes
  647. and their uses, see "Internet Relay Chat: Channel Management" [IRC-
  648. CHAN]. Note that there is a maximum limit of three (3) changes per
  649. command for modes that take a parameter.
  650. Numeric Replies:
  651. ERR_NEEDMOREPARAMS ERR_KEYSET
  652. ERR_NOCHANMODES ERR_CHANOPRIVSNEEDED
  653. ERR_USERNOTINCHANNEL ERR_UNKNOWNMODE
  654. RPL_CHANNELMODEIS
  655. RPL_BANLIST RPL_ENDOFBANLIST
  656. RPL_EXCEPTLIST RPL_ENDOFEXCEPTLIST
  657. RPL_INVITELIST RPL_ENDOFINVITELIST
  658. RPL_UNIQOPIS
  659. The following examples are given to help understanding the syntax of
  660. the MODE command, but refer to modes defined in "Internet Relay Chat:
  661. Channel Management" [IRC-CHAN].
  662. Examples:
  663. MODE #Finnish +imI *!*@*.fi ; Command to make #Finnish channel
  664. moderated and 'invite-only' with user
  665. with a hostname matching *.fi
  666. automatically invited.
  667. MODE #Finnish +o Kilroy ; Command to give 'chanop' privileges
  668. to Kilroy on channel #Finnish.
  669. MODE #Finnish +v Wiz ; Command to allow WiZ to speak on
  670. #Finnish.
  671. MODE #Fins -s ; Command to remove 'secret' flag
  672. from channel #Fins.
  673. MODE #42 +k oulu ; Command to set the channel key to
  674. "oulu".
  675. MODE #42 -k oulu ; Command to remove the "oulu"
  676. channel key on channel "#42".
  677. Kalt Informational [Page 18]
  678. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  679. MODE #eu-opers +l 10 ; Command to set the limit for the
  680. number of users on channel
  681. "#eu-opers" to 10.
  682. :WiZ!jto@tolsun.oulu.fi MODE #eu-opers -l
  683. ; User "WiZ" removing the limit for
  684. the number of users on channel "#eu-
  685. opers".
  686. MODE &oulu +b ; Command to list ban masks set for
  687. the channel "&oulu".
  688. MODE &oulu +b *!*@* ; Command to prevent all users from
  689. joining.
  690. MODE &oulu +b *!*@*.edu +e *!*@*.bu.edu
  691. ; Command to prevent any user from a
  692. hostname matching *.edu from joining,
  693. except if matching *.bu.edu
  694. MODE #bu +be *!*@*.edu *!*@*.bu.edu
  695. ; Comment to prevent any user from a
  696. hostname matching *.edu from joining,
  697. except if matching *.bu.edu
  698. MODE #meditation e ; Command to list exception masks set
  699. for the channel "#meditation".
  700. MODE #meditation I ; Command to list invitations masks
  701. set for the channel "#meditation".
  702. MODE !12345ircd O ; Command to ask who the channel
  703. creator for "!12345ircd" is
  704. 3.2.4 Topic message
  705. Command: TOPIC
  706. Parameters: <channel> [ <topic> ]
  707. The TOPIC command is used to change or view the topic of a channel.
  708. The topic for channel <channel> is returned if there is no <topic>
  709. given. If the <topic> parameter is present, the topic for that
  710. channel will be changed, if this action is allowed for the user
  711. requesting it. If the <topic> parameter is an empty string, the
  712. topic for that channel will be removed.
  713. Kalt Informational [Page 19]
  714. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  715. Numeric Replies:
  716. ERR_NEEDMOREPARAMS ERR_NOTONCHANNEL
  717. RPL_NOTOPIC RPL_TOPIC
  718. ERR_CHANOPRIVSNEEDED ERR_NOCHANMODES
  719. Examples:
  720. :WiZ!jto@tolsun.oulu.fi TOPIC #test :New topic ; User Wiz setting the
  721. topic.
  722. TOPIC #test :another topic ; Command to set the topic on #test
  723. to "another topic".
  724. TOPIC #test : ; Command to clear the topic on
  725. #test.
  726. TOPIC #test ; Command to check the topic for
  727. #test.
  728. 3.2.5 Names message
  729. Command: NAMES
  730. Parameters: [ <channel> *( "," <channel> ) [ <target> ] ]
  731. By using the NAMES command, a user can list all nicknames that are
  732. visible to him. For more details on what is visible and what is not,
  733. see "Internet Relay Chat: Channel Management" [IRC-CHAN]. The
  734. <channel> parameter specifies which channel(s) to return information
  735. about. There is no error reply for bad channel names.
  736. If no <channel> parameter is given, a list of all channels and their
  737. occupants is returned. At the end of this list, a list of users who
  738. are visible but either not on any channel or not on a visible channel
  739. are listed as being on `channel' "*".
  740. If the <target> parameter is specified, the request is forwarded to
  741. that server which will generate the reply.
  742. Wildcards are allowed in the <target> parameter.
  743. Numerics:
  744. ERR_TOOMANYMATCHES ERR_NOSUCHSERVER
  745. RPL_NAMREPLY RPL_ENDOFNAMES
  746. Kalt Informational [Page 20]
  747. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  748. Examples:
  749. NAMES #twilight_zone,#42 ; Command to list visible users on
  750. #twilight_zone and #42
  751. NAMES ; Command to list all visible
  752. channels and users
  753. 3.2.6 List message
  754. Command: LIST
  755. Parameters: [ <channel> *( "," <channel> ) [ <target> ] ]
  756. The list command is used to list channels and their topics. If the
  757. <channel> parameter is used, only the status of that channel is
  758. displayed.
  759. If the <target> parameter is specified, the request is forwarded to
  760. that server which will generate the reply.
  761. Wildcards are allowed in the <target> parameter.
  762. Numeric Replies:
  763. ERR_TOOMANYMATCHES ERR_NOSUCHSERVER
  764. RPL_LIST RPL_LISTEND
  765. Examples:
  766. LIST ; Command to list all channels.
  767. LIST #twilight_zone,#42 ; Command to list channels
  768. #twilight_zone and #42
  769. 3.2.7 Invite message
  770. Command: INVITE
  771. Parameters: <nickname> <channel>
  772. The INVITE command is used to invite a user to a channel. The
  773. parameter <nickname> is the nickname of the person to be invited to
  774. the target channel <channel>. There is no requirement that the
  775. channel the target user is being invited to must exist or be a valid
  776. channel. However, if the channel exists, only members of the channel
  777. are allowed to invite other users. When the channel has invite-only
  778. flag set, only channel operators may issue INVITE command.
  779. Kalt Informational [Page 21]
  780. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  781. Only the user inviting and the user being invited will receive
  782. notification of the invitation. Other channel members are not
  783. notified. (This is unlike the MODE changes, and is occasionally the
  784. source of trouble for users.)
  785. Numeric Replies:
  786. ERR_NEEDMOREPARAMS ERR_NOSUCHNICK
  787. ERR_NOTONCHANNEL ERR_USERONCHANNEL
  788. ERR_CHANOPRIVSNEEDED
  789. RPL_INVITING RPL_AWAY
  790. Examples:
  791. :Angel!wings@irc.org INVITE Wiz #Dust
  792. ; Message to WiZ when he has been
  793. invited by user Angel to channel
  794. #Dust
  795. INVITE Wiz #Twilight_Zone ; Command to invite WiZ to
  796. #Twilight_zone
  797. 3.2.8 Kick command
  798. Command: KICK
  799. Parameters: <channel> *( "," <channel> ) <user> *( "," <user> )
  800. [<comment>]
  801. The KICK command can be used to request the forced removal of a user
  802. from a channel. It causes the <user> to PART from the <channel> by
  803. force. For the message to be syntactically correct, there MUST be
  804. either one channel parameter and multiple user parameter, or as many
  805. channel parameters as there are user parameters. If a "comment" is
  806. given, this will be sent instead of the default message, the nickname
  807. of the user issuing the KICK.
  808. The server MUST NOT send KICK messages with multiple channels or
  809. users to clients. This is necessarily to maintain backward
  810. compatibility with old client software.
  811. Numeric Replies:
  812. ERR_NEEDMOREPARAMS ERR_NOSUCHCHANNEL
  813. ERR_BADCHANMASK ERR_CHANOPRIVSNEEDED
  814. ERR_USERNOTINCHANNEL ERR_NOTONCHANNEL
  815. Kalt Informational [Page 22]
  816. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  817. Examples:
  818. KICK &Melbourne Matthew ; Command to kick Matthew from
  819. &Melbourne
  820. KICK #Finnish John :Speaking English
  821. ; Command to kick John from #Finnish
  822. using "Speaking English" as the
  823. reason (comment).
  824. :WiZ!jto@tolsun.oulu.fi KICK #Finnish John
  825. ; KICK message on channel #Finnish
  826. from WiZ to remove John from channel
  827. 3.3 Sending messages
  828. The main purpose of the IRC protocol is to provide a base for clients
  829. to communicate with each other. PRIVMSG, NOTICE and SQUERY
  830. (described in Section 3.5 on Service Query and Commands) are the only
  831. messages available which actually perform delivery of a text message
  832. from one client to another - the rest just make it possible and try
  833. to ensure it happens in a reliable and structured manner.
  834. 3.3.1 Private messages
  835. Command: PRIVMSG
  836. Parameters: <msgtarget> <text to be sent>
  837. PRIVMSG is used to send private messages between users, as well as to
  838. send messages to channels. <msgtarget> is usually the nickname of
  839. the recipient of the message, or a channel name.
  840. The <msgtarget> parameter may also be a host mask (#<mask>) or server
  841. mask ($<mask>). In both cases the server will only send the PRIVMSG
  842. to those who have a server or host matching the mask. The mask MUST
  843. have at least 1 (one) "." in it and no wildcards following the last
  844. ".". This requirement exists to prevent people sending messages to
  845. "#*" or "$*", which would broadcast to all users. Wildcards are the
  846. '*' and '?' characters. This extension to the PRIVMSG command is
  847. only available to operators.
  848. Numeric Replies:
  849. ERR_NORECIPIENT ERR_NOTEXTTOSEND
  850. ERR_CANNOTSENDTOCHAN ERR_NOTOPLEVEL
  851. ERR_WILDTOPLEVEL ERR_TOOMANYTARGETS
  852. ERR_NOSUCHNICK
  853. RPL_AWAY
  854. Kalt Informational [Page 23]
  855. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  856. Examples:
  857. :Angel!wings@irc.org PRIVMSG Wiz :Are you receiving this message ?
  858. ; Message from Angel to Wiz.
  859. PRIVMSG Angel :yes I'm receiving it !
  860. ; Command to send a message to Angel.
  861. PRIVMSG jto@tolsun.oulu.fi :Hello !
  862. ; Command to send a message to a user
  863. on server tolsun.oulu.fi with
  864. username of "jto".
  865. PRIVMSG kalt%millennium.stealth.net@irc.stealth.net :Are you a frog?
  866. ; Message to a user on server
  867. irc.stealth.net with username of
  868. "kalt", and connected from the host
  869. millennium.stealth.net.
  870. PRIVMSG kalt%millennium.stealth.net :Do you like cheese?
  871. ; Message to a user on the local
  872. server with username of "kalt", and
  873. connected from the host
  874. millennium.stealth.net.
  875. PRIVMSG Wiz!jto@tolsun.oulu.fi :Hello !
  876. ; Message to the user with nickname
  877. Wiz who is connected from the host
  878. tolsun.oulu.fi and has the username
  879. "jto".
  880. PRIVMSG $*.fi :Server tolsun.oulu.fi rebooting.
  881. ; Message to everyone on a server
  882. which has a name matching *.fi.
  883. PRIVMSG #*.edu :NSFNet is undergoing work, expect interruptions
  884. ; Message to all users who come from
  885. a host which has a name matching
  886. *.edu.
  887. 3.3.2 Notice
  888. Command: NOTICE
  889. Parameters: <msgtarget> <text>
  890. The NOTICE command is used similarly to PRIVMSG. The difference
  891. between NOTICE and PRIVMSG is that automatic replies MUST NEVER be
  892. sent in response to a NOTICE message. This rule applies to servers
  893. Kalt Informational [Page 24]
  894. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  895. too - they MUST NOT send any error reply back to the client on
  896. receipt of a notice. The object of this rule is to avoid loops
  897. between clients automatically sending something in response to
  898. something it received.
  899. This command is available to services as well as users.
  900. This is typically used by services, and automatons (clients with
  901. either an AI or other interactive program controlling their actions).
  902. See PRIVMSG for more details on replies and examples.
  903. 3.4 Server queries and commands
  904. The server query group of commands has been designed to return
  905. information about any server which is connected to the network.
  906. In these queries, where a parameter appears as <target>, wildcard
  907. masks are usually valid. For each parameter, however, only one query
  908. and set of replies is to be generated. In most cases, if a nickname
  909. is given, it will mean the server to which the user is connected.
  910. These messages typically have little value for services, it is
  911. therefore RECOMMENDED to forbid services from using them.
  912. 3.4.1 Motd message
  913. Command: MOTD
  914. Parameters: [ <target> ]
  915. The MOTD command is used to get the "Message Of The Day" of the given
  916. server, or current server if <target> is omitted.
  917. Wildcards are allowed in the <target> parameter.
  918. Numeric Replies:
  919. RPL_MOTDSTART RPL_MOTD
  920. RPL_ENDOFMOTD ERR_NOMOTD
  921. 3.4.2 Lusers message
  922. Command: LUSERS
  923. Parameters: [ <mask> [ <target> ] ]
  924. The LUSERS command is used to get statistics about the size of the
  925. IRC network. If no parameter is given, the reply will be about the
  926. whole net. If a <mask> is specified, then the reply will only
  927. Kalt Informational [Page 25]
  928. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  929. concern the part of the network formed by the servers matching the
  930. mask. Finally, if the <target> parameter is specified, the request
  931. is forwarded to that server which will generate the reply.
  932. Wildcards are allowed in the <target> parameter.
  933. Numeric Replies:
  934. RPL_LUSERCLIENT RPL_LUSEROP
  935. RPL_LUSERUNKOWN RPL_LUSERCHANNELS
  936. RPL_LUSERME ERR_NOSUCHSERVER
  937. 3.4.3 Version message
  938. Command: VERSION
  939. Parameters: [ <target> ]
  940. The VERSION command is used to query the version of the server
  941. program. An optional parameter <target> is used to query the version
  942. of the server program which a client is not directly connected to.
  943. Wildcards are allowed in the <target> parameter.
  944. Numeric Replies:
  945. ERR_NOSUCHSERVER RPL_VERSION
  946. Examples:
  947. VERSION tolsun.oulu.fi ; Command to check the version of
  948. server "tolsun.oulu.fi".
  949. 3.4.4 Stats message
  950. Command: STATS
  951. Parameters: [ <query> [ <target> ] ]
  952. The stats command is used to query statistics of certain server. If
  953. <query> parameter is omitted, only the end of stats reply is sent
  954. back.
  955. A query may be given for any single letter which is only checked by
  956. the destination server and is otherwise passed on by intermediate
  957. servers, ignored and unaltered.
  958. Wildcards are allowed in the <target> parameter.
  959. Kalt Informational [Page 26]
  960. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  961. Except for the ones below, the list of valid queries is
  962. implementation dependent. The standard queries below SHOULD be
  963. supported by the server:
  964. l - returns a list of the server's connections, showing how
  965. long each connection has been established and the
  966. traffic over that connection in Kbytes and messages for
  967. each direction;
  968. m - returns the usage count for each of commands supported
  969. by the server; commands for which the usage count is
  970. zero MAY be omitted;
  971. o - returns a list of configured privileged users,
  972. operators;
  973. u - returns a string showing how long the server has been
  974. up.
  975. It is also RECOMMENDED that client and server access configuration be
  976. published this way.
  977. Numeric Replies:
  978. ERR_NOSUCHSERVER
  979. RPL_STATSLINKINFO RPL_STATSUPTIME
  980. RPL_STATSCOMMANDS RPL_STATSOLINE
  981. RPL_ENDOFSTATS
  982. Examples:
  983. STATS m ; Command to check the command usage
  984. for the server you are connected to
  985. 3.4.5 Links message
  986. Command: LINKS
  987. Parameters: [ [ <remote server> ] <server mask> ]
  988. With LINKS, a user can list all servernames, which are known by the
  989. server answering the query. The returned list of servers MUST match
  990. the mask, or if no mask is given, the full list is returned.
  991. If <remote server> is given in addition to <server mask>, the LINKS
  992. command is forwarded to the first server found that matches that name
  993. (if any), and that server is then required to answer the query.
  994. Numeric Replies:
  995. ERR_NOSUCHSERVER
  996. RPL_LINKS RPL_ENDOFLINKS
  997. Kalt Informational [Page 27]
  998. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  999. Examples:
  1000. LINKS *.au ; Command to list all servers which
  1001. have a name that matches *.au;
  1002. LINKS *.edu *.bu.edu ; Command to list servers matching
  1003. *.bu.edu as seen by the first server
  1004. matching *.edu.
  1005. 3.4.6 Time message
  1006. Command: TIME
  1007. Parameters: [ <target> ]
  1008. The time command is used to query local time from the specified
  1009. server. If the <target> parameter is not given, the server receiving
  1010. the command must reply to the query.
  1011. Wildcards are allowed in the <target> parameter.
  1012. Numeric Replies:
  1013. ERR_NOSUCHSERVER RPL_TIME
  1014. Examples:
  1015. TIME tolsun.oulu.fi ; check the time on the server
  1016. "tolson.oulu.fi"
  1017. 3.4.7 Connect message
  1018. Command: CONNECT
  1019. Parameters: <target server> <port> [ <remote server> ]
  1020. The CONNECT command can be used to request a server to try to
  1021. establish a new connection to another server immediately. CONNECT is
  1022. a privileged command and SHOULD be available only to IRC Operators.
  1023. If a <remote server> is given and its mask doesn't match name of the
  1024. parsing server, the CONNECT attempt is sent to the first match of
  1025. remote server. Otherwise the CONNECT attempt is made by the server
  1026. processing the request.
  1027. The server receiving a remote CONNECT command SHOULD generate a
  1028. WALLOPS message describing the source and target of the request.
  1029. Numeric Replies:
  1030. ERR_NOSUCHSERVER ERR_NOPRIVILEGES
  1031. ERR_NEEDMOREPARAMS
  1032. Kalt Informational [Page 28]
  1033. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1034. Examples:
  1035. CONNECT tolsun.oulu.fi 6667 ; Command to attempt to connect local
  1036. server to tolsun.oulu.fi on port 6667
  1037. 3.4.8 Trace message
  1038. Command: TRACE
  1039. Parameters: [ <target> ]
  1040. TRACE command is used to find the route to specific server and
  1041. information about its peers. Each server that processes this command
  1042. MUST report to the sender about it. The replies from pass-through
  1043. links form a chain, which shows route to destination. After sending
  1044. this reply back, the query MUST be sent to the next server until
  1045. given <target> server is reached.
  1046. TRACE command is used to find the route to specific server. Each
  1047. server that processes this message MUST tell the sender about it by
  1048. sending a reply indicating it is a pass-through link, forming a chain
  1049. of replies. After sending this reply back, it MUST then send the
  1050. TRACE message to the next server until given server is reached. If
  1051. the <target> parameter is omitted, it is RECOMMENDED that TRACE
  1052. command sends a message to the sender telling which servers the local
  1053. server has direct connection to.
  1054. If the destination given by <target> is an actual server, the
  1055. destination server is REQUIRED to report all servers, services and
  1056. operators which are connected to it; if the command was issued by an
  1057. operator, the server MAY also report all users which are connected to
  1058. it. If the destination given by <target> is a nickname, then only a
  1059. reply for that nickname is given. If the <target> parameter is
  1060. omitted, it is RECOMMENDED that the TRACE command is parsed as
  1061. targeted to the processing server.
  1062. Wildcards are allowed in the <target> parameter.
  1063. Numeric Replies:
  1064. ERR_NOSUCHSERVER
  1065. If the TRACE message is destined for another server, all
  1066. intermediate servers must return a RPL_TRACELINK reply to indicate
  1067. that the TRACE passed through it and where it is going next.
  1068. RPL_TRACELINK
  1069. Kalt Informational [Page 29]
  1070. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1071. A TRACE reply may be composed of any number of the following
  1072. numeric replies.
  1073. RPL_TRACECONNECTING RPL_TRACEHANDSHAKE
  1074. RPL_TRACEUNKNOWN RPL_TRACEOPERATOR
  1075. RPL_TRACEUSER RPL_TRACESERVER
  1076. RPL_TRACESERVICE RPL_TRACENEWTYPE
  1077. RPL_TRACECLASS RPL_TRACELOG
  1078. RPL_TRACEEND
  1079. Examples:
  1080. TRACE *.oulu.fi ; TRACE to a server matching
  1081. *.oulu.fi
  1082. 3.4.9 Admin command
  1083. Command: ADMIN
  1084. Parameters: [ <target> ]
  1085. The admin command is used to find information about the administrator
  1086. of the given server, or current server if <target> parameter is
  1087. omitted. Each server MUST have the ability to forward ADMIN messages
  1088. to other servers.
  1089. Wildcards are allowed in the <target> parameter.
  1090. Numeric Replies:
  1091. ERR_NOSUCHSERVER
  1092. RPL_ADMINME RPL_ADMINLOC1
  1093. RPL_ADMINLOC2 RPL_ADMINEMAIL
  1094. Examples:
  1095. ADMIN tolsun.oulu.fi ; request an ADMIN reply from
  1096. tolsun.oulu.fi
  1097. ADMIN syrk ; ADMIN request for the server to
  1098. which the user syrk is connected
  1099. Kalt Informational [Page 30]
  1100. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1101. 3.4.10 Info command
  1102. Command: INFO
  1103. Parameters: [ <target> ]
  1104. The INFO command is REQUIRED to return information describing the
  1105. server: its version, when it was compiled, the patchlevel, when it
  1106. was started, and any other miscellaneous information which may be
  1107. considered to be relevant.
  1108. Wildcards are allowed in the <target> parameter.
  1109. Numeric Replies:
  1110. ERR_NOSUCHSERVER
  1111. RPL_INFO RPL_ENDOFINFO
  1112. Examples:
  1113. INFO csd.bu.edu ; request an INFO reply from
  1114. csd.bu.edu
  1115. INFO Angel ; request info from the server that
  1116. Angel is connected to.
  1117. 3.5 Service Query and Commands
  1118. The service query group of commands has been designed to return
  1119. information about any service which is connected to the network.
  1120. 3.5.1 Servlist message
  1121. Command: SERVLIST
  1122. Parameters: [ <mask> [ <type> ] ]
  1123. The SERVLIST command is used to list services currently connected to
  1124. the network and visible to the user issuing the command. The
  1125. optional parameters may be used to restrict the result of the query
  1126. (to matching services names, and services type).
  1127. Numeric Replies:
  1128. RPL_SERVLIST RPL_SERVLISTEND
  1129. Kalt Informational [Page 31]
  1130. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1131. 3.5.2 Squery
  1132. Command: SQUERY
  1133. Parameters: <servicename> <text>
  1134. The SQUERY command is used similarly to PRIVMSG. The only difference
  1135. is that the recipient MUST be a service. This is the only way for a
  1136. text message to be delivered to a service.
  1137. See PRIVMSG for more details on replies and example.
  1138. Examples:
  1139. SQUERY irchelp :HELP privmsg
  1140. ; Message to the service with
  1141. nickname irchelp.
  1142. SQUERY dict@irc.fr :fr2en blaireau
  1143. ; Message to the service with name
  1144. dict@irc.fr.
  1145. 3.6 User based queries
  1146. User queries are a group of commands which are primarily concerned
  1147. with finding details on a particular user or group users. When using
  1148. wildcards with any of these commands, if they match, they will only
  1149. return information on users who are 'visible' to you. The visibility
  1150. of a user is determined as a combination of the user's mode and the
  1151. common set of channels you are both on.
  1152. Although services SHOULD NOT be using this class of message, they are
  1153. allowed to.
  1154. 3.6.1 Who query
  1155. Command: WHO
  1156. Parameters: [ <mask> [ "o" ] ]
  1157. The WHO command is used by a client to generate a query which returns
  1158. a list of information which 'matches' the <mask> parameter given by
  1159. the client. In the absence of the <mask> parameter, all visible
  1160. (users who aren't invisible (user mode +i) and who don't have a
  1161. common channel with the requesting client) are listed. The same
  1162. result can be achieved by using a <mask> of "0" or any wildcard which
  1163. will end up matching every visible user.
  1164. The <mask> passed to WHO is matched against users' host, server, real
  1165. name and nickname if the channel <mask> cannot be found.
  1166. Kalt Informational [Page 32]
  1167. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1168. If the "o" parameter is passed only operators are returned according
  1169. to the <mask> supplied.
  1170. Numeric Replies:
  1171. ERR_NOSUCHSERVER
  1172. RPL_WHOREPLY RPL_ENDOFWHO
  1173. Examples:
  1174. WHO *.fi ; Command to list all users who match
  1175. against "*.fi".
  1176. WHO jto* o ; Command to list all users with a
  1177. match against "jto*" if they are an
  1178. operator.
  1179. 3.6.2 Whois query
  1180. Command: WHOIS
  1181. Parameters: [ <target> ] <mask> *( "," <mask> )
  1182. This command is used to query information about particular user.
  1183. The server will answer this command with several numeric messages
  1184. indicating different statuses of each user which matches the mask (if
  1185. you are entitled to see them). If no wildcard is present in the
  1186. <mask>, any information about that nick which you are allowed to see
  1187. is presented.
  1188. If the <target> parameter is specified, it sends the query to a
  1189. specific server. It is useful if you want to know how long the user
  1190. in question has been idle as only local server (i.e., the server the
  1191. user is directly connected to) knows that information, while
  1192. everything else is globally known.
  1193. Wildcards are allowed in the <target> parameter.
  1194. Numeric Replies:
  1195. ERR_NOSUCHSERVER ERR_NONICKNAMEGIVEN
  1196. RPL_WHOISUSER RPL_WHOISCHANNELS
  1197. RPL_WHOISCHANNELS RPL_WHOISSERVER
  1198. RPL_AWAY RPL_WHOISOPERATOR
  1199. RPL_WHOISIDLE ERR_NOSUCHNICK
  1200. RPL_ENDOFWHOIS
  1201. Kalt Informational [Page 33]
  1202. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1203. Examples:
  1204. WHOIS wiz ; return available user information
  1205. about nick WiZ
  1206. WHOIS eff.org trillian ; ask server eff.org for user
  1207. information about trillian
  1208. 3.6.3 Whowas
  1209. Command: WHOWAS
  1210. Parameters: <nickname> *( "," <nickname> ) [ <count> [ <target> ] ]
  1211. Whowas asks for information about a nickname which no longer exists.
  1212. This may either be due to a nickname change or the user leaving IRC.
  1213. In response to this query, the server searches through its nickname
  1214. history, looking for any nicks which are lexically the same (no wild
  1215. card matching here). The history is searched backward, returning the
  1216. most recent entry first. If there are multiple entries, up to
  1217. <count> replies will be returned (or all of them if no <count>
  1218. parameter is given). If a non-positive number is passed as being
  1219. <count>, then a full search is done.
  1220. Wildcards are allowed in the <target> parameter.
  1221. Numeric Replies:
  1222. ERR_NONICKNAMEGIVEN ERR_WASNOSUCHNICK
  1223. RPL_WHOWASUSER RPL_WHOISSERVER
  1224. RPL_ENDOFWHOWAS
  1225. Examples:
  1226. WHOWAS Wiz ; return all information in the nick
  1227. history about nick "WiZ";
  1228. WHOWAS Mermaid 9 ; return at most, the 9 most recent
  1229. entries in the nick history for
  1230. "Mermaid";
  1231. WHOWAS Trillian 1 *.edu ; return the most recent history for
  1232. "Trillian" from the first server
  1233. found to match "*.edu".
  1234. 3.7 Miscellaneous messages
  1235. Messages in this category do not fit into any of the above categories
  1236. but are nonetheless still a part of and REQUIRED by the protocol.
  1237. Kalt Informational [Page 34]
  1238. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1239. 3.7.1 Kill message
  1240. Command: KILL
  1241. Parameters: <nickname> <comment>
  1242. The KILL command is used to cause a client-server connection to be
  1243. closed by the server which has the actual connection. Servers
  1244. generate KILL messages on nickname collisions. It MAY also be
  1245. available available to users who have the operator status.
  1246. Clients which have automatic reconnect algorithms effectively make
  1247. this command useless since the disconnection is only brief. It does
  1248. however break the flow of data and can be used to stop large amounts
  1249. of 'flooding' from abusive users or accidents. Abusive users usually
  1250. don't care as they will reconnect promptly and resume their abusive
  1251. behaviour. To prevent this command from being abused, any user may
  1252. elect to receive KILL messages generated for others to keep an 'eye'
  1253. on would be trouble spots.
  1254. In an arena where nicknames are REQUIRED to be globally unique at all
  1255. times, KILL messages are sent whenever 'duplicates' are detected
  1256. (that is an attempt to register two users with the same nickname) in
  1257. the hope that both of them will disappear and only 1 reappear.
  1258. When a client is removed as the result of a KILL message, the server
  1259. SHOULD add the nickname to the list of unavailable nicknames in an
  1260. attempt to avoid clients to reuse this name immediately which is
  1261. usually the pattern of abusive behaviour often leading to useless
  1262. "KILL loops". See the "IRC Server Protocol" document [IRC-SERVER]
  1263. for more information on this procedure.
  1264. The comment given MUST reflect the actual reason for the KILL. For
  1265. server-generated KILLs it usually is made up of details concerning
  1266. the origins of the two conflicting nicknames. For users it is left
  1267. up to them to provide an adequate reason to satisfy others who see
  1268. it. To prevent/discourage fake KILLs from being generated to hide
  1269. the identify of the KILLer, the comment also shows a 'kill-path'
  1270. which is updated by each server it passes through, each prepending
  1271. its name to the path.
  1272. Numeric Replies:
  1273. ERR_NOPRIVILEGES ERR_NEEDMOREPARAMS
  1274. ERR_NOSUCHNICK ERR_CANTKILLSERVER
  1275. Kalt Informational [Page 35]
  1276. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1277. NOTE:
  1278. It is RECOMMENDED that only Operators be allowed to kill other users
  1279. with KILL command. This command has been the subject of many
  1280. controversies over the years, and along with the above
  1281. recommendation, it is also widely recognized that not even operators
  1282. should be allowed to kill users on remote servers.
  1283. 3.7.2 Ping message
  1284. Command: PING
  1285. Parameters: <server1> [ <server2> ]
  1286. The PING command is used to test the presence of an active client or
  1287. server at the other end of the connection. Servers send a PING
  1288. message at regular intervals if no other activity detected coming
  1289. from a connection. If a connection fails to respond to a PING
  1290. message within a set amount of time, that connection is closed. A
  1291. PING message MAY be sent even if the connection is active.
  1292. When a PING message is received, the appropriate PONG message MUST be
  1293. sent as reply to <server1> (server which sent the PING message out)
  1294. as soon as possible. If the <server2> parameter is specified, it
  1295. represents the target of the ping, and the message gets forwarded
  1296. there.
  1297. Numeric Replies:
  1298. ERR_NOORIGIN ERR_NOSUCHSERVER
  1299. Examples:
  1300. PING tolsun.oulu.fi ; Command to send a PING message to
  1301. server
  1302. PING WiZ tolsun.oulu.fi ; Command from WiZ to send a PING
  1303. message to server "tolsun.oulu.fi"
  1304. PING :irc.funet.fi ; Ping message sent by server
  1305. "irc.funet.fi"
  1306. Kalt Informational [Page 36]
  1307. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1308. 3.7.3 Pong message
  1309. Command: PONG
  1310. Parameters: <server> [ <server2> ]
  1311. PONG message is a reply to ping message. If parameter <server2> is
  1312. given, this message MUST be forwarded to given target. The <server>
  1313. parameter is the name of the entity who has responded to PING message
  1314. and generated this message.
  1315. Numeric Replies:
  1316. ERR_NOORIGIN ERR_NOSUCHSERVER
  1317. Example:
  1318. PONG csd.bu.edu tolsun.oulu.fi ; PONG message from csd.bu.edu to
  1319. tolsun.oulu.fi
  1320. 3.7.4 Error
  1321. Command: ERROR
  1322. Parameters: <error message>
  1323. The ERROR command is for use by servers when reporting a serious or
  1324. fatal error to its peers. It may also be sent from one server to
  1325. another but MUST NOT be accepted from any normal unknown clients.
  1326. Only an ERROR message SHOULD be used for reporting errors which occur
  1327. with a server-to-server link. An ERROR message is sent to the server
  1328. at the other end (which reports it to appropriate local users and
  1329. logs) and to appropriate local users and logs. It is not to be
  1330. passed onto any other servers by a server if it is received from a
  1331. server.
  1332. The ERROR message is also used before terminating a client
  1333. connection.
  1334. When a server sends a received ERROR message to its operators, the
  1335. message SHOULD be encapsulated inside a NOTICE message, indicating
  1336. that the client was not responsible for the error.
  1337. Numerics:
  1338. None.
  1339. Kalt Informational [Page 37]
  1340. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1341. Examples:
  1342. ERROR :Server *.fi already exists ; ERROR message to the other server
  1343. which caused this error.
  1344. NOTICE WiZ :ERROR from csd.bu.edu -- Server *.fi already exists
  1345. ; Same ERROR message as above but
  1346. sent to user WiZ on the other server.
  1347. 4. Optional features
  1348. This section describes OPTIONAL messages. They are not required in a
  1349. working server implementation of the protocol described herein. In
  1350. the absence of the feature, an error reply message MUST be generated
  1351. or an unknown command error. If the message is destined for another
  1352. server to answer then it MUST be passed on (elementary parsing
  1353. REQUIRED) The allocated numerics for this are listed with the
  1354. messages below.
  1355. From this section, only the USERHOST and ISON messages are available
  1356. to services.
  1357. 4.1 Away
  1358. Command: AWAY
  1359. Parameters: [ <text> ]
  1360. With the AWAY command, clients can set an automatic reply string for
  1361. any PRIVMSG commands directed at them (not to a channel they are on).
  1362. The server sends an automatic reply to the client sending the PRIVMSG
  1363. command. The only replying server is the one to which the sending
  1364. client is connected to.
  1365. The AWAY command is used either with one parameter, to set an AWAY
  1366. message, or with no parameters, to remove the AWAY message.
  1367. Because of its high cost (memory and bandwidth wise), the AWAY
  1368. message SHOULD only be used for client-server communication. A
  1369. server MAY choose to silently ignore AWAY messages received from
  1370. other servers. To update the away status of a client across servers,
  1371. the user mode 'a' SHOULD be used instead. (See Section 3.1.5)
  1372. Numeric Replies:
  1373. RPL_UNAWAY RPL_NOWAWAY
  1374. Kalt Informational [Page 38]
  1375. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1376. Example:
  1377. AWAY :Gone to lunch. Back in 5 ; Command to set away message to
  1378. "Gone to lunch. Back in 5".
  1379. 4.2 Rehash message
  1380. Command: REHASH
  1381. Parameters: None
  1382. The rehash command is an administrative command which can be used by
  1383. an operator to force the server to re-read and process its
  1384. configuration file.
  1385. Numeric Replies:
  1386. RPL_REHASHING ERR_NOPRIVILEGES
  1387. Example:
  1388. REHASH ; message from user with operator
  1389. status to server asking it to reread
  1390. its configuration file.
  1391. 4.3 Die message
  1392. Command: DIE
  1393. Parameters: None
  1394. An operator can use the DIE command to shutdown the server. This
  1395. message is optional since it may be viewed as a risk to allow
  1396. arbitrary people to connect to a server as an operator and execute
  1397. this command.
  1398. The DIE command MUST always be fully processed by the server to which
  1399. the sending client is connected and MUST NOT be passed onto other
  1400. connected servers.
  1401. Numeric Replies:
  1402. ERR_NOPRIVILEGES
  1403. Example:
  1404. DIE ; no parameters required.
  1405. Kalt Informational [Page 39]
  1406. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1407. 4.4 Restart message
  1408. Command: RESTART
  1409. Parameters: None
  1410. An operator can use the restart command to force the server to
  1411. restart itself. This message is optional since it may be viewed as a
  1412. risk to allow arbitrary people to connect to a server as an operator
  1413. and execute this command, causing (at least) a disruption to service.
  1414. The RESTART command MUST always be fully processed by the server to
  1415. which the sending client is connected and MUST NOT be passed onto
  1416. other connected servers.
  1417. Numeric Replies:
  1418. ERR_NOPRIVILEGES
  1419. Example:
  1420. RESTART ; no parameters required.
  1421. 4.5 Summon message
  1422. Command: SUMMON
  1423. Parameters: <user> [ <target> [ <channel> ] ]
  1424. The SUMMON command can be used to give users who are on a host
  1425. running an IRC server a message asking them to please join IRC. This
  1426. message is only sent if the target server (a) has SUMMON enabled, (b)
  1427. the user is logged in and (c) the server process can write to the
  1428. user's tty (or similar).
  1429. If no <server> parameter is given it tries to summon <user> from the
  1430. server the client is connected to is assumed as the target.
  1431. If summon is not enabled in a server, it MUST return the
  1432. ERR_SUMMONDISABLED numeric.
  1433. Numeric Replies:
  1434. ERR_NORECIPIENT ERR_FILEERROR
  1435. ERR_NOLOGIN ERR_NOSUCHSERVER
  1436. ERR_SUMMONDISABLED RPL_SUMMONING
  1437. Kalt Informational [Page 40]
  1438. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1439. Examples:
  1440. SUMMON jto ; summon user jto on the server's
  1441. host
  1442. SUMMON jto tolsun.oulu.fi ; summon user jto on the host which a
  1443. server named "tolsun.oulu.fi" is
  1444. running.
  1445. 4.6 Users
  1446. Command: USERS
  1447. Parameters: [ <target> ]
  1448. The USERS command returns a list of users logged into the server in a
  1449. format similar to the UNIX commands who(1), rusers(1) and finger(1).
  1450. If disabled, the correct numeric MUST be returned to indicate this.
  1451. Because of the security implications of such a command, it SHOULD be
  1452. disabled by default in server implementations. Enabling it SHOULD
  1453. require recompiling the server or some equivalent change rather than
  1454. simply toggling an option and restarting the server. The procedure
  1455. to enable this command SHOULD also include suitable large comments.
  1456. Numeric Replies:
  1457. ERR_NOSUCHSERVER ERR_FILEERROR
  1458. RPL_USERSSTART RPL_USERS
  1459. RPL_NOUSERS RPL_ENDOFUSERS
  1460. ERR_USERSDISABLED
  1461. Disabled Reply:
  1462. ERR_USERSDISABLED
  1463. Example:
  1464. USERS eff.org ; request a list of users logged in
  1465. on server eff.org
  1466. 4.7 Operwall message
  1467. Command: WALLOPS
  1468. Parameters: <Text to be sent>
  1469. The WALLOPS command is used to send a message to all currently
  1470. connected users who have set the 'w' user mode for themselves. (See
  1471. Section 3.1.5 "User modes").
  1472. Kalt Informational [Page 41]
  1473. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1474. After implementing WALLOPS as a user command it was found that it was
  1475. often and commonly abused as a means of sending a message to a lot of
  1476. people. Due to this, it is RECOMMENDED that the implementation of
  1477. WALLOPS allows and recognizes only servers as the originators of
  1478. WALLOPS.
  1479. Numeric Replies:
  1480. ERR_NEEDMOREPARAMS
  1481. Example:
  1482. :csd.bu.edu WALLOPS :Connect '*.uiuc.edu 6667' from Joshua ; WALLOPS
  1483. message from csd.bu.edu announcing a
  1484. CONNECT message it received from
  1485. Joshua and acted upon.
  1486. 4.8 Userhost message
  1487. Command: USERHOST
  1488. Parameters: <nickname> *( SPACE <nickname> )
  1489. The USERHOST command takes a list of up to 5 nicknames, each
  1490. separated by a space character and returns a list of information
  1491. about each nickname that it found. The returned list has each reply
  1492. separated by a space.
  1493. Numeric Replies:
  1494. RPL_USERHOST ERR_NEEDMOREPARAMS
  1495. Example:
  1496. USERHOST Wiz Michael syrk ; USERHOST request for information on
  1497. nicks "Wiz", "Michael", and "syrk"
  1498. :ircd.stealth.net 302 yournick :syrk=+syrk@millennium.stealth.net
  1499. ; Reply for user syrk
  1500. 4.9 Ison message
  1501. Command: ISON
  1502. Parameters: <nickname> *( SPACE <nickname> )
  1503. The ISON command was implemented to provide a quick and efficient
  1504. means to get a response about whether a given nickname was currently
  1505. on IRC. ISON only takes one (1) type of parameter: a space-separated
  1506. list of nicks. For each nickname in the list that is present, the
  1507. Kalt Informational [Page 42]
  1508. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1509. server adds that to its reply string. Thus the reply string may
  1510. return empty (none of the given nicks are present), an exact copy of
  1511. the parameter string (all of them present) or any other subset of the
  1512. set of nicks given in the parameter. The only limit on the number of
  1513. nicks that may be checked is that the combined length MUST NOT be too
  1514. large as to cause the server to chop it off so it fits in 512
  1515. characters.
  1516. ISON is only processed by the server local to the client sending the
  1517. command and thus not passed onto other servers for further
  1518. processing.
  1519. Numeric Replies:
  1520. RPL_ISON ERR_NEEDMOREPARAMS
  1521. Example:
  1522. ISON phone trillian WiZ jarlek Avalon Angel Monstah syrk
  1523. ; Sample ISON request for 7 nicks.
  1524. 5. Replies
  1525. The following is a list of numeric replies which are generated in
  1526. response to the commands given above. Each numeric is given with its
  1527. number, name and reply string.
  1528. 5.1 Command responses
  1529. Numerics in the range from 001 to 099 are used for client-server
  1530. connections only and should never travel between servers. Replies
  1531. generated in the response to commands are found in the range from 200
  1532. to 399.
  1533. 001 RPL_WELCOME
  1534. "Welcome to the Internet Relay Network
  1535. <nick>!<user>@<host>"
  1536. 002 RPL_YOURHOST
  1537. "Your host is <servername>, running version <ver>"
  1538. 003 RPL_CREATED
  1539. "This server was created <date>"
  1540. 004 RPL_MYINFO
  1541. "<servername> <version> <available user modes>
  1542. <available channel modes>"
  1543. - The server sends Replies 001 to 004 to a user upon
  1544. successful registration.
  1545. Kalt Informational [Page 43]
  1546. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1547. 005 RPL_BOUNCE
  1548. "Try server <server name>, port <port number>"
  1549. - Sent by the server to a user to suggest an alternative
  1550. server. This is often used when the connection is
  1551. refused because the server is already full.
  1552. 302 RPL_USERHOST
  1553. ":*1<reply> *( " " <reply> )"
  1554. - Reply format used by USERHOST to list replies to
  1555. the query list. The reply string is composed as
  1556. follows:
  1557. reply = nickname [ "*" ] "=" ( "+" / "-" ) hostname
  1558. The '*' indicates whether the client has registered
  1559. as an Operator. The '-' or '+' characters represent
  1560. whether the client has set an AWAY message or not
  1561. respectively.
  1562. 303 RPL_ISON
  1563. ":*1<nick> *( " " <nick> )"
  1564. - Reply format used by ISON to list replies to the
  1565. query list.
  1566. 301 RPL_AWAY
  1567. "<nick> :<away message>"
  1568. 305 RPL_UNAWAY
  1569. ":You are no longer marked as being away"
  1570. 306 RPL_NOWAWAY
  1571. ":You have been marked as being away"
  1572. - These replies are used with the AWAY command (if
  1573. allowed). RPL_AWAY is sent to any client sending a
  1574. PRIVMSG to a client which is away. RPL_AWAY is only
  1575. sent by the server to which the client is connected.
  1576. Replies RPL_UNAWAY and RPL_NOWAWAY are sent when the
  1577. client removes and sets an AWAY message.
  1578. 311 RPL_WHOISUSER
  1579. "<nick> <user> <host> * :<real name>"
  1580. 312 RPL_WHOISSERVER
  1581. "<nick> <server> :<server info>"
  1582. 313 RPL_WHOISOPERATOR
  1583. "<nick> :is an IRC operator"
  1584. Kalt Informational [Page 44]
  1585. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1586. 317 RPL_WHOISIDLE
  1587. "<nick> <integer> :seconds idle"
  1588. 318 RPL_ENDOFWHOIS
  1589. "<nick> :End of WHOIS list"
  1590. 319 RPL_WHOISCHANNELS
  1591. "<nick> :*( ( "@" / "+" ) <channel> " " )"
  1592. - Replies 311 - 313, 317 - 319 are all replies
  1593. generated in response to a WHOIS message. Given that
  1594. there are enough parameters present, the answering
  1595. server MUST either formulate a reply out of the above
  1596. numerics (if the query nick is found) or return an
  1597. error reply. The '*' in RPL_WHOISUSER is there as
  1598. the literal character and not as a wild card. For
  1599. each reply set, only RPL_WHOISCHANNELS may appear
  1600. more than once (for long lists of channel names).
  1601. The '@' and '+' characters next to the channel name
  1602. indicate whether a client is a channel operator or
  1603. has been granted permission to speak on a moderated
  1604. channel. The RPL_ENDOFWHOIS reply is used to mark
  1605. the end of processing a WHOIS message.
  1606. 314 RPL_WHOWASUSER
  1607. "<nick> <user> <host> * :<real name>"
  1608. 369 RPL_ENDOFWHOWAS
  1609. "<nick> :End of WHOWAS"
  1610. - When replying to a WHOWAS message, a server MUST use
  1611. the replies RPL_WHOWASUSER, RPL_WHOISSERVER or
  1612. ERR_WASNOSUCHNICK for each nickname in the presented
  1613. list. At the end of all reply batches, there MUST
  1614. be RPL_ENDOFWHOWAS (even if there was only one reply
  1615. and it was an error).
  1616. 321 RPL_LISTSTART
  1617. Obsolete. Not used.
  1618. 322 RPL_LIST
  1619. "<channel> <# visible> :<topic>"
  1620. 323 RPL_LISTEND
  1621. ":End of LIST"
  1622. - Replies RPL_LIST, RPL_LISTEND mark the actual replies
  1623. with data and end of the server's response to a LIST
  1624. command. If there are no channels available to return,
  1625. only the end reply MUST be sent.
  1626. Kalt Informational [Page 45]
  1627. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1628. 325 RPL_UNIQOPIS
  1629. "<channel> <nickname>"
  1630. 324 RPL_CHANNELMODEIS
  1631. "<channel> <mode> <mode params>"
  1632. 331 RPL_NOTOPIC
  1633. "<channel> :No topic is set"
  1634. 332 RPL_TOPIC
  1635. "<channel> :<topic>"
  1636. - When sending a TOPIC message to determine the
  1637. channel topic, one of two replies is sent. If
  1638. the topic is set, RPL_TOPIC is sent back else
  1639. RPL_NOTOPIC.
  1640. 341 RPL_INVITING
  1641. "<channel> <nick>"
  1642. - Returned by the server to indicate that the
  1643. attempted INVITE message was successful and is
  1644. being passed onto the end client.
  1645. 342 RPL_SUMMONING
  1646. "<user> :Summoning user to IRC"
  1647. - Returned by a server answering a SUMMON message to
  1648. indicate that it is summoning that user.
  1649. 346 RPL_INVITELIST
  1650. "<channel> <invitemask>"
  1651. 347 RPL_ENDOFINVITELIST
  1652. "<channel> :End of channel invite list"
  1653. - When listing the 'invitations masks' for a given channel,
  1654. a server is required to send the list back using the
  1655. RPL_INVITELIST and RPL_ENDOFINVITELIST messages. A
  1656. separate RPL_INVITELIST is sent for each active mask.
  1657. After the masks have been listed (or if none present) a
  1658. RPL_ENDOFINVITELIST MUST be sent.
  1659. 348 RPL_EXCEPTLIST
  1660. "<channel> <exceptionmask>"
  1661. 349 RPL_ENDOFEXCEPTLIST
  1662. "<channel> :End of channel exception list"
  1663. Kalt Informational [Page 46]
  1664. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1665. - When listing the 'exception masks' for a given channel,
  1666. a server is required to send the list back using the
  1667. RPL_EXCEPTLIST and RPL_ENDOFEXCEPTLIST messages. A
  1668. separate RPL_EXCEPTLIST is sent for each active mask.
  1669. After the masks have been listed (or if none present)
  1670. a RPL_ENDOFEXCEPTLIST MUST be sent.
  1671. 351 RPL_VERSION
  1672. "<version>.<debuglevel> <server> :<comments>"
  1673. - Reply by the server showing its version details.
  1674. The <version> is the version of the software being
  1675. used (including any patchlevel revisions) and the
  1676. <debuglevel> is used to indicate if the server is
  1677. running in "debug mode".
  1678. The "comments" field may contain any comments about
  1679. the version or further version details.
  1680. 352 RPL_WHOREPLY
  1681. "<channel> <user> <host> <server> <nick>
  1682. ( "H" / "G" > ["*"] [ ( "@" / "+" ) ]
  1683. :<hopcount> <real name>"
  1684. 315 RPL_ENDOFWHO
  1685. "<name> :End of WHO list"
  1686. - The RPL_WHOREPLY and RPL_ENDOFWHO pair are used
  1687. to answer a WHO message. The RPL_WHOREPLY is only
  1688. sent if there is an appropriate match to the WHO
  1689. query. If there is a list of parameters supplied
  1690. with a WHO message, a RPL_ENDOFWHO MUST be sent
  1691. after processing each list item with <name> being
  1692. the item.
  1693. 353 RPL_NAMREPLY
  1694. "( "=" / "*" / "@" ) <channel>
  1695. :[ "@" / "+" ] <nick> *( " " [ "@" / "+" ] <nick> )
  1696. - "@" is used for secret channels, "*" for private
  1697. channels, and "=" for others (public channels).
  1698. 366 RPL_ENDOFNAMES
  1699. "<channel> :End of NAMES list"
  1700. - To reply to a NAMES message, a reply pair consisting
  1701. of RPL_NAMREPLY and RPL_ENDOFNAMES is sent by the
  1702. server back to the client. If there is no channel
  1703. found as in the query, then only RPL_ENDOFNAMES is
  1704. Kalt Informational [Page 47]
  1705. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1706. returned. The exception to this is when a NAMES
  1707. message is sent with no parameters and all visible
  1708. channels and contents are sent back in a series of
  1709. RPL_NAMEREPLY messages with a RPL_ENDOFNAMES to mark
  1710. the end.
  1711. 364 RPL_LINKS
  1712. "<mask> <server> :<hopcount> <server info>"
  1713. 365 RPL_ENDOFLINKS
  1714. "<mask> :End of LINKS list"
  1715. - In replying to the LINKS message, a server MUST send
  1716. replies back using the RPL_LINKS numeric and mark the
  1717. end of the list using an RPL_ENDOFLINKS reply.
  1718. 367 RPL_BANLIST
  1719. "<channel> <banmask>"
  1720. 368 RPL_ENDOFBANLIST
  1721. "<channel> :End of channel ban list"
  1722. - When listing the active 'bans' for a given channel,
  1723. a server is required to send the list back using the
  1724. RPL_BANLIST and RPL_ENDOFBANLIST messages. A separate
  1725. RPL_BANLIST is sent for each active banmask. After the
  1726. banmasks have been listed (or if none present) a
  1727. RPL_ENDOFBANLIST MUST be sent.
  1728. 371 RPL_INFO
  1729. ":<string>"
  1730. 374 RPL_ENDOFINFO
  1731. ":End of INFO list"
  1732. - A server responding to an INFO message is required to
  1733. send all its 'info' in a series of RPL_INFO messages
  1734. with a RPL_ENDOFINFO reply to indicate the end of the
  1735. replies.
  1736. 375 RPL_MOTDSTART
  1737. ":- <server> Message of the day - "
  1738. 372 RPL_MOTD
  1739. ":- <text>"
  1740. 376 RPL_ENDOFMOTD
  1741. ":End of MOTD command"
  1742. - When responding to the MOTD message and the MOTD file
  1743. is found, the file is displayed line by line, with
  1744. each line no longer than 80 characters, using
  1745. Kalt Informational [Page 48]
  1746. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1747. RPL_MOTD format replies. These MUST be surrounded
  1748. by a RPL_MOTDSTART (before the RPL_MOTDs) and an
  1749. RPL_ENDOFMOTD (after).
  1750. 381 RPL_YOUREOPER
  1751. ":You are now an IRC operator"
  1752. - RPL_YOUREOPER is sent back to a client which has
  1753. just successfully issued an OPER message and gained
  1754. operator status.
  1755. 382 RPL_REHASHING
  1756. "<config file> :Rehashing"
  1757. - If the REHASH option is used and an operator sends
  1758. a REHASH message, an RPL_REHASHING is sent back to
  1759. the operator.
  1760. 383 RPL_YOURESERVICE
  1761. "You are service <servicename>"
  1762. - Sent by the server to a service upon successful
  1763. registration.
  1764. 391 RPL_TIME
  1765. "<server> :<string showing server's local time>"
  1766. - When replying to the TIME message, a server MUST send
  1767. the reply using the RPL_TIME format above. The string
  1768. showing the time need only contain the correct day and
  1769. time there. There is no further requirement for the
  1770. time string.
  1771. 392 RPL_USERSSTART
  1772. ":UserID Terminal Host"
  1773. 393 RPL_USERS
  1774. ":<username> <ttyline> <hostname>"
  1775. 394 RPL_ENDOFUSERS
  1776. ":End of users"
  1777. 395 RPL_NOUSERS
  1778. ":Nobody logged in"
  1779. - If the USERS message is handled by a server, the
  1780. replies RPL_USERSTART, RPL_USERS, RPL_ENDOFUSERS and
  1781. RPL_NOUSERS are used. RPL_USERSSTART MUST be sent
  1782. first, following by either a sequence of RPL_USERS
  1783. or a single RPL_NOUSER. Following this is
  1784. RPL_ENDOFUSERS.
  1785. Kalt Informational [Page 49]
  1786. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1787. 200 RPL_TRACELINK
  1788. "Link <version & debug level> <destination>
  1789. <next server> V<protocol version>
  1790. <link uptime in seconds> <backstream sendq>
  1791. <upstream sendq>"
  1792. 201 RPL_TRACECONNECTING
  1793. "Try. <class> <server>"
  1794. 202 RPL_TRACEHANDSHAKE
  1795. "H.S. <class> <server>"
  1796. 203 RPL_TRACEUNKNOWN
  1797. "???? <class> [<client IP address in dot form>]"
  1798. 204 RPL_TRACEOPERATOR
  1799. "Oper <class> <nick>"
  1800. 205 RPL_TRACEUSER
  1801. "User <class> <nick>"
  1802. 206 RPL_TRACESERVER
  1803. "Serv <class> <int>S <int>C <server>
  1804. <nick!user|*!*>@<host|server> V<protocol version>"
  1805. 207 RPL_TRACESERVICE
  1806. "Service <class> <name> <type> <active type>"
  1807. 208 RPL_TRACENEWTYPE
  1808. "<newtype> 0 <client name>"
  1809. 209 RPL_TRACECLASS
  1810. "Class <class> <count>"
  1811. 210 RPL_TRACERECONNECT
  1812. Unused.
  1813. 261 RPL_TRACELOG
  1814. "File <logfile> <debug level>"
  1815. 262 RPL_TRACEEND
  1816. "<server name> <version & debug level> :End of TRACE"
  1817. - The RPL_TRACE* are all returned by the server in
  1818. response to the TRACE message. How many are
  1819. returned is dependent on the TRACE message and
  1820. whether it was sent by an operator or not. There
  1821. is no predefined order for which occurs first.
  1822. Replies RPL_TRACEUNKNOWN, RPL_TRACECONNECTING and
  1823. RPL_TRACEHANDSHAKE are all used for connections
  1824. which have not been fully established and are either
  1825. unknown, still attempting to connect or in the
  1826. process of completing the 'server handshake'.
  1827. RPL_TRACELINK is sent by any server which handles
  1828. a TRACE message and has to pass it on to another
  1829. server. The list of RPL_TRACELINKs sent in
  1830. response to a TRACE command traversing the IRC
  1831. network should reflect the actual connectivity of
  1832. the servers themselves along that path.
  1833. Kalt Informational [Page 50]
  1834. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1835. RPL_TRACENEWTYPE is to be used for any connection
  1836. which does not fit in the other categories but is
  1837. being displayed anyway.
  1838. RPL_TRACEEND is sent to indicate the end of the list.
  1839. 211 RPL_STATSLINKINFO
  1840. "<linkname> <sendq> <sent messages>
  1841. <sent Kbytes> <received messages>
  1842. <received Kbytes> <time open>"
  1843. - reports statistics on a connection. <linkname>
  1844. identifies the particular connection, <sendq> is
  1845. the amount of data that is queued and waiting to be
  1846. sent <sent messages> the number of messages sent,
  1847. and <sent Kbytes> the amount of data sent, in
  1848. Kbytes. <received messages> and <received Kbytes>
  1849. are the equivalent of <sent messages> and <sent
  1850. Kbytes> for received data, respectively. <time
  1851. open> indicates how long ago the connection was
  1852. opened, in seconds.
  1853. 212 RPL_STATSCOMMANDS
  1854. "<command> <count> <byte count> <remote count>"
  1855. - reports statistics on commands usage.
  1856. 219 RPL_ENDOFSTATS
  1857. "<stats letter> :End of STATS report"
  1858. 242 RPL_STATSUPTIME
  1859. ":Server Up %d days %d:%02d:%02d"
  1860. - reports the server uptime.
  1861. 243 RPL_STATSOLINE
  1862. "O <hostmask> * <name>"
  1863. - reports the allowed hosts from where user may become IRC
  1864. operators.
  1865. 221 RPL_UMODEIS
  1866. "<user mode string>"
  1867. - To answer a query about a client's own mode,
  1868. RPL_UMODEIS is sent back.
  1869. 234 RPL_SERVLIST
  1870. "<name> <server> <mask> <type> <hopcount> <info>"
  1871. Kalt Informational [Page 51]
  1872. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1873. 235 RPL_SERVLISTEND
  1874. "<mask> <type> :End of service listing"
  1875. - When listing services in reply to a SERVLIST message,
  1876. a server is required to send the list back using the
  1877. RPL_SERVLIST and RPL_SERVLISTEND messages. A separate
  1878. RPL_SERVLIST is sent for each service. After the
  1879. services have been listed (or if none present) a
  1880. RPL_SERVLISTEND MUST be sent.
  1881. 251 RPL_LUSERCLIENT
  1882. ":There are <integer> users and <integer>
  1883. services on <integer> servers"
  1884. 252 RPL_LUSEROP
  1885. "<integer> :operator(s) online"
  1886. 253 RPL_LUSERUNKNOWN
  1887. "<integer> :unknown connection(s)"
  1888. 254 RPL_LUSERCHANNELS
  1889. "<integer> :channels formed"
  1890. 255 RPL_LUSERME
  1891. ":I have <integer> clients and <integer>
  1892. servers"
  1893. - In processing an LUSERS message, the server
  1894. sends a set of replies from RPL_LUSERCLIENT,
  1895. RPL_LUSEROP, RPL_USERUNKNOWN,
  1896. RPL_LUSERCHANNELS and RPL_LUSERME. When
  1897. replying, a server MUST send back
  1898. RPL_LUSERCLIENT and RPL_LUSERME. The other
  1899. replies are only sent back if a non-zero count
  1900. is found for them.
  1901. 256 RPL_ADMINME
  1902. "<server> :Administrative info"
  1903. 257 RPL_ADMINLOC1
  1904. ":<admin info>"
  1905. 258 RPL_ADMINLOC2
  1906. ":<admin info>"
  1907. 259 RPL_ADMINEMAIL
  1908. ":<admin info>"
  1909. - When replying to an ADMIN message, a server
  1910. is expected to use replies RPL_ADMINME
  1911. through to RPL_ADMINEMAIL and provide a text
  1912. message with each. For RPL_ADMINLOC1 a
  1913. description of what city, state and country
  1914. the server is in is expected, followed by
  1915. details of the institution (RPL_ADMINLOC2)
  1916. Kalt Informational [Page 52]
  1917. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1918. and finally the administrative contact for the
  1919. server (an email address here is REQUIRED)
  1920. in RPL_ADMINEMAIL.
  1921. 263 RPL_TRYAGAIN
  1922. "<command> :Please wait a while and try again."
  1923. - When a server drops a command without processing it,
  1924. it MUST use the reply RPL_TRYAGAIN to inform the
  1925. originating client.
  1926. 5.2 Error Replies
  1927. Error replies are found in the range from 400 to 599.
  1928. 401 ERR_NOSUCHNICK
  1929. "<nickname> :No such nick/channel"
  1930. - Used to indicate the nickname parameter supplied to a
  1931. command is currently unused.
  1932. 402 ERR_NOSUCHSERVER
  1933. "<server name> :No such server"
  1934. - Used to indicate the server name given currently
  1935. does not exist.
  1936. 403 ERR_NOSUCHCHANNEL
  1937. "<channel name> :No such channel"
  1938. - Used to indicate the given channel name is invalid.
  1939. 404 ERR_CANNOTSENDTOCHAN
  1940. "<channel name> :Cannot send to channel"
  1941. - Sent to a user who is either (a) not on a channel
  1942. which is mode +n or (b) not a chanop (or mode +v) on
  1943. a channel which has mode +m set or where the user is
  1944. banned and is trying to send a PRIVMSG message to
  1945. that channel.
  1946. 405 ERR_TOOMANYCHANNELS
  1947. "<channel name> :You have joined too many channels"
  1948. - Sent to a user when they have joined the maximum
  1949. number of allowed channels and they try to join
  1950. another channel.
  1951. Kalt Informational [Page 53]
  1952. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1953. 406 ERR_WASNOSUCHNICK
  1954. "<nickname> :There was no such nickname"
  1955. - Returned by WHOWAS to indicate there is no history
  1956. information for that nickname.
  1957. 407 ERR_TOOMANYTARGETS
  1958. "<target> :<error code> recipients. <abort message>"
  1959. - Returned to a client which is attempting to send a
  1960. PRIVMSG/NOTICE using the user@host destination format
  1961. and for a user@host which has several occurrences.
  1962. - Returned to a client which trying to send a
  1963. PRIVMSG/NOTICE to too many recipients.
  1964. - Returned to a client which is attempting to JOIN a safe
  1965. channel using the shortname when there are more than one
  1966. such channel.
  1967. 408 ERR_NOSUCHSERVICE
  1968. "<service name> :No such service"
  1969. - Returned to a client which is attempting to send a SQUERY
  1970. to a service which does not exist.
  1971. 409 ERR_NOORIGIN
  1972. ":No origin specified"
  1973. - PING or PONG message missing the originator parameter.
  1974. 411 ERR_NORECIPIENT
  1975. ":No recipient given (<command>)"
  1976. 412 ERR_NOTEXTTOSEND
  1977. ":No text to send"
  1978. 413 ERR_NOTOPLEVEL
  1979. "<mask> :No toplevel domain specified"
  1980. 414 ERR_WILDTOPLEVEL
  1981. "<mask> :Wildcard in toplevel domain"
  1982. 415 ERR_BADMASK
  1983. "<mask> :Bad Server/host mask"
  1984. - 412 - 415 are returned by PRIVMSG to indicate that
  1985. the message wasn't delivered for some reason.
  1986. ERR_NOTOPLEVEL and ERR_WILDTOPLEVEL are errors that
  1987. are returned when an invalid use of
  1988. "PRIVMSG $<server>" or "PRIVMSG #<host>" is attempted.
  1989. Kalt Informational [Page 54]
  1990. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  1991. 421 ERR_UNKNOWNCOMMAND
  1992. "<command> :Unknown command"
  1993. - Returned to a registered client to indicate that the
  1994. command sent is unknown by the server.
  1995. 422 ERR_NOMOTD
  1996. ":MOTD File is missing"
  1997. - Server's MOTD file could not be opened by the server.
  1998. 423 ERR_NOADMININFO
  1999. "<server> :No administrative info available"
  2000. - Returned by a server in response to an ADMIN message
  2001. when there is an error in finding the appropriate
  2002. information.
  2003. 424 ERR_FILEERROR
  2004. ":File error doing <file op> on <file>"
  2005. - Generic error message used to report a failed file
  2006. operation during the processing of a message.
  2007. 431 ERR_NONICKNAMEGIVEN
  2008. ":No nickname given"
  2009. - Returned when a nickname parameter expected for a
  2010. command and isn't found.
  2011. 432 ERR_ERRONEUSNICKNAME
  2012. "<nick> :Erroneous nickname"
  2013. - Returned after receiving a NICK message which contains
  2014. characters which do not fall in the defined set. See
  2015. section 2.3.1 for details on valid nicknames.
  2016. 433 ERR_NICKNAMEINUSE
  2017. "<nick> :Nickname is already in use"
  2018. - Returned when a NICK message is processed that results
  2019. in an attempt to change to a currently existing
  2020. nickname.
  2021. Kalt Informational [Page 55]
  2022. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  2023. 436 ERR_NICKCOLLISION
  2024. "<nick> :Nickname collision KILL from <user>@<host>"
  2025. - Returned by a server to a client when it detects a
  2026. nickname collision (registered of a NICK that
  2027. already exists by another server).
  2028. 437 ERR_UNAVAILRESOURCE
  2029. "<nick/channel> :Nick/channel is temporarily unavailable"
  2030. - Returned by a server to a user trying to join a channel
  2031. currently blocked by the channel delay mechanism.
  2032. - Returned by a server to a user trying to change nickname
  2033. when the desired nickname is blocked by the nick delay
  2034. mechanism.
  2035. 441 ERR_USERNOTINCHANNEL
  2036. "<nick> <channel> :They aren't on that channel"
  2037. - Returned by the server to indicate that the target
  2038. user of the command is not on the given channel.
  2039. 442 ERR_NOTONCHANNEL
  2040. "<channel> :You're not on that channel"
  2041. - Returned by the server whenever a client tries to
  2042. perform a channel affecting command for which the
  2043. client isn't a member.
  2044. 443 ERR_USERONCHANNEL
  2045. "<user> <channel> :is already on channel"
  2046. - Returned when a client tries to invite a user to a
  2047. channel they are already on.
  2048. 444 ERR_NOLOGIN
  2049. "<user> :User not logged in"
  2050. - Returned by the summon after a SUMMON command for a
  2051. user was unable to be performed since they were not
  2052. logged in.
  2053. Kalt Informational [Page 56]
  2054. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  2055. 445 ERR_SUMMONDISABLED
  2056. ":SUMMON has been disabled"
  2057. - Returned as a response to the SUMMON command. MUST be
  2058. returned by any server which doesn't implement it.
  2059. 446 ERR_USERSDISABLED
  2060. ":USERS has been disabled"
  2061. - Returned as a response to the USERS command. MUST be
  2062. returned by any server which does not implement it.
  2063. 451 ERR_NOTREGISTERED
  2064. ":You have not registered"
  2065. - Returned by the server to indicate that the client
  2066. MUST be registered before the server will allow it
  2067. to be parsed in detail.
  2068. 461 ERR_NEEDMOREPARAMS
  2069. "<command> :Not enough parameters"
  2070. - Returned by the server by numerous commands to
  2071. indicate to the client that it didn't supply enough
  2072. parameters.
  2073. 462 ERR_ALREADYREGISTRED
  2074. ":Unauthorized command (already registered)"
  2075. - Returned by the server to any link which tries to
  2076. change part of the registered details (such as
  2077. password or user details from second USER message).
  2078. 463 ERR_NOPERMFORHOST
  2079. ":Your host isn't among the privileged"
  2080. - Returned to a client which attempts to register with
  2081. a server which does not been setup to allow
  2082. connections from the host the attempted connection
  2083. is tried.
  2084. 464 ERR_PASSWDMISMATCH
  2085. ":Password incorrect"
  2086. - Returned to indicate a failed attempt at registering
  2087. a connection for which a password was required and
  2088. was either not given or incorrect.
  2089. Kalt Informational [Page 57]
  2090. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  2091. 465 ERR_YOUREBANNEDCREEP
  2092. ":You are banned from this server"
  2093. - Returned after an attempt to connect and register
  2094. yourself with a server which has been setup to
  2095. explicitly deny connections to you.
  2096. 466 ERR_YOUWILLBEBANNED
  2097. - Sent by a server to a user to inform that access to the
  2098. server will soon be denied.
  2099. 467 ERR_KEYSET
  2100. "<channel> :Channel key already set"
  2101. 471 ERR_CHANNELISFULL
  2102. "<channel> :Cannot join channel (+l)"
  2103. 472 ERR_UNKNOWNMODE
  2104. "<char> :is unknown mode char to me for <channel>"
  2105. 473 ERR_INVITEONLYCHAN
  2106. "<channel> :Cannot join channel (+i)"
  2107. 474 ERR_BANNEDFROMCHAN
  2108. "<channel> :Cannot join channel (+b)"
  2109. 475 ERR_BADCHANNELKEY
  2110. "<channel> :Cannot join channel (+k)"
  2111. 476 ERR_BADCHANMASK
  2112. "<channel> :Bad Channel Mask"
  2113. 477 ERR_NOCHANMODES
  2114. "<channel> :Channel doesn't support modes"
  2115. 478 ERR_BANLISTFULL
  2116. "<channel> <char> :Channel list is full"
  2117. 481 ERR_NOPRIVILEGES
  2118. ":Permission Denied- You're not an IRC operator"
  2119. - Any command requiring operator privileges to operate
  2120. MUST return this error to indicate the attempt was
  2121. unsuccessful.
  2122. 482 ERR_CHANOPRIVSNEEDED
  2123. "<channel> :You're not channel operator"
  2124. - Any command requiring 'chanop' privileges (such as
  2125. MODE messages) MUST return this error if the client
  2126. making the attempt is not a chanop on the specified
  2127. channel.
  2128. Kalt Informational [Page 58]
  2129. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  2130. 483 ERR_CANTKILLSERVER
  2131. ":You can't kill a server!"
  2132. - Any attempts to use the KILL command on a server
  2133. are to be refused and this error returned directly
  2134. to the client.
  2135. 484 ERR_RESTRICTED
  2136. ":Your connection is restricted!"
  2137. - Sent by the server to a user upon connection to indicate
  2138. the restricted nature of the connection (user mode "+r").
  2139. 485 ERR_UNIQOPPRIVSNEEDED
  2140. ":You're not the original channel operator"
  2141. - Any MODE requiring "channel creator" privileges MUST
  2142. return this error if the client making the attempt is not
  2143. a chanop on the specified channel.
  2144. 491 ERR_NOOPERHOST
  2145. ":No O-lines for your host"
  2146. - If a client sends an OPER message and the server has
  2147. not been configured to allow connections from the
  2148. client's host as an operator, this error MUST be
  2149. returned.
  2150. 501 ERR_UMODEUNKNOWNFLAG
  2151. ":Unknown MODE flag"
  2152. - Returned by the server to indicate that a MODE
  2153. message was sent with a nickname parameter and that
  2154. the a mode flag sent was not recognized.
  2155. 502 ERR_USERSDONTMATCH
  2156. ":Cannot change mode for other users"
  2157. - Error sent to any user trying to view or change the
  2158. user mode for a user other than themselves.
  2159. 5.3 Reserved numerics
  2160. These numerics are not described above since they fall into one of
  2161. the following categories:
  2162. 1. no longer in use;
  2163. Kalt Informational [Page 59]
  2164. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  2165. 2. reserved for future planned use;
  2166. 3. in current use but are part of a non-generic 'feature' of
  2167. the current IRC server.
  2168. 231 RPL_SERVICEINFO 232 RPL_ENDOFSERVICES
  2169. 233 RPL_SERVICE
  2170. 300 RPL_NONE 316 RPL_WHOISCHANOP
  2171. 361 RPL_KILLDONE 362 RPL_CLOSING
  2172. 363 RPL_CLOSEEND 373 RPL_INFOSTART
  2173. 384 RPL_MYPORTIS
  2174. 213 RPL_STATSCLINE 214 RPL_STATSNLINE
  2175. 215 RPL_STATSILINE 216 RPL_STATSKLINE
  2176. 217 RPL_STATSQLINE 218 RPL_STATSYLINE
  2177. 240 RPL_STATSVLINE 241 RPL_STATSLLINE
  2178. 244 RPL_STATSHLINE 244 RPL_STATSSLINE
  2179. 246 RPL_STATSPING 247 RPL_STATSBLINE
  2180. 250 RPL_STATSDLINE
  2181. 492 ERR_NOSERVICEHOST
  2182. 6. Current implementations
  2183. The IRC software, version 2.10 is the only complete implementation of
  2184. the IRC protocol (client and server). Because of the small amount of
  2185. changes in the client protocol since the publication of RFC 1459
  2186. [IRC], implementations that follow it are likely to be compliant with
  2187. this protocol or to require a small amount of changes to reach
  2188. compliance.
  2189. 7. Current problems
  2190. There are a number of recognized problems with the IRC Client
  2191. Protocol, and more generally with the IRC Server Protocol. In order
  2192. to preserve backward compatibility with old clients, this protocol
  2193. has almost not evolved since the publication of RFC 1459 [IRC].
  2194. 7.1 Nicknames
  2195. The idea of the nickname on IRC is very convenient for users to use
  2196. when talking to each other outside of a channel, but there is only a
  2197. finite nickname space and being what they are, it's not uncommon for
  2198. several people to want to use the same nick. If a nickname is chosen
  2199. by two people using this protocol, either one will not succeed or
  2200. both will removed by use of a server KILL (See Section 3.7.1).
  2201. Kalt Informational [Page 60]
  2202. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  2203. 7.2 Limitation of wildcards
  2204. There is no way to escape the escape character "\" (%x5C). While
  2205. this isn't usually a problem, it makes it impossible to form a mask
  2206. with a backslash character ("\") preceding a wildcard.
  2207. 7.3 Security considerations
  2208. Security issues related to this protocol are discussed in the "IRC
  2209. Server Protocol" [IRC-SERVER] as they are mostly an issue for the
  2210. server side of the connection.
  2211. 8. Current support and availability
  2212. Mailing lists for IRC related discussion:
  2213. General discussion: ircd-users@irc.org
  2214. Protocol development: ircd-dev@irc.org
  2215. Software implementations:
  2216. ftp://ftp.irc.org/irc/server
  2217. ftp://ftp.funet.fi/pub/unix/irc
  2218. ftp://ftp.irc.org/irc/clients
  2219. Newsgroup: alt.irc
  2220. 9. Acknowledgements
  2221. Parts of this document were copied from the RFC 1459 [IRC] which
  2222. first formally documented the IRC Protocol. It has also benefited
  2223. from many rounds of review and comments. In particular, the
  2224. following people have made significant contributions to this
  2225. document:
  2226. Matthew Green, Michael Neumayer, Volker Paulsen, Kurt Roeckx, Vesa
  2227. Ruokonen, Magnus Tjernstrom, Stefan Zehl.
  2228. Kalt Informational [Page 61]
  2229. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  2230. 10. References
  2231. [KEYWORDS] Bradner, S., "Key words for use in RFCs to Indicate
  2232. Requirement Levels", BCP 14, RFC 2119, March 1997.
  2233. [ABNF] Crocker, D. and P. Overell, "Augmented BNF for Syntax
  2234. Specifications: ABNF", RFC 2234, November 1997.
  2235. [HNAME] Braden, R., "Requirements for Internet Hosts --
  2236. Application and Support", STD 3, RFC 1123, October 1989.
  2237. [IRC] Oikarinen, J. & D. Reed, "Internet Relay Chat Protocol",
  2238. RFC 1459, May 1993.
  2239. [IRC-ARCH] Kalt, C., "Internet Relay Chat: Architecture", RFC 2810,
  2240. April 2000.
  2241. [IRC-CHAN] Kalt, C., "Internet Relay Chat: Channel Management", RFC
  2242. 2811, April 2000.
  2243. [IRC-SERVER] Kalt, C., "Internet Relay Chat: Server Protocol", RFC
  2244. 2813, April 2000.
  2245. 11. Author's Address
  2246. Christophe Kalt
  2247. 99 Teaneck Rd, Apt #117
  2248. Ridgefield Park, NJ 07660
  2249. USA
  2250. EMail: kalt@stealth.net
  2251. Kalt Informational [Page 62]
  2252. RFC 2812 Internet Relay Chat: Client Protocol April 2000
  2253. 12. Full Copyright Statement
  2254. Copyright (C) The Internet Society (2000). All Rights Reserved.
  2255. This document and translations of it may be copied and furnished to
  2256. others, and derivative works that comment on or otherwise explain it
  2257. or assist in its implementation may be prepared, copied, published
  2258. and distributed, in whole or in part, without restriction of any
  2259. kind, provided that the above copyright notice and this paragraph are
  2260. included on all such copies and derivative works. However, this
  2261. document itself may not be modified in any way, such as by removing
  2262. the copyright notice or references to the Internet Society or other
  2263. Internet organizations, except as needed for the purpose of
  2264. developing Internet standards in which case the procedures for
  2265. copyrights defined in the Internet Standards process must be
  2266. followed, or as required to translate it into languages other than
  2267. English.
  2268. The limited permissions granted above are perpetual and will not be
  2269. revoked by the Internet Society or its successors or assigns.
  2270. This document and the information contained herein is provided on an
  2271. "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
  2272. TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
  2273. BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
  2274. HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
  2275. MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
  2276. Acknowledgement
  2277. Funding for the RFC Editor function is currently provided by the
  2278. Internet Society.
  2279. Kalt Informational [Page 63]