瀏覽代碼

Merge pull request #1046 from slingamn/changelog.4

add changelog for v2.1.0-rc1
tags/v2.1.0-rc1
Shivaram Lingamneni 4 年之前
父節點
當前提交
e0986c8608
No account linked to committer's email address
共有 6 個文件被更改,包括 172 次插入11 次删除
  1. 111
    0
      CHANGELOG.md
  2. 2
    2
      conventional.yaml
  3. 1
    1
      distrib/docker/run.sh
  4. 3
    2
      distrib/systemd/oragono.service
  5. 53
    4
      docs/MANUAL.md
  6. 2
    2
      oragono.yaml

+ 111
- 0
CHANGELOG.md 查看文件

@@ -1,6 +1,117 @@
1 1
 # Changelog
2 2
 All notable changes to Oragono will be documented in this file.
3 3
 
4
+## [2.1.0-rc1] - 2020-05-25
5
+We're pleased to be publishing the release candidate for 2.1.0 (the official release should follow in a week or so).
6
+
7
+Since the release of 2.0.0 in March, a number of new communities and organizations have adopted Oragono as a communications tool. This new release incorporates many improvements and fixes derived from the experiences of real-world operators and end users. Highlights include:
8
+
9
+* Native support for websockets contributed by [@hhirtz](https://github.com/hhirtz), eliminating the need for a separate websockets-to-IRC proxy server
10
+* Tighter control over the relationship between account names and nicknames, eliminating the need for extbans
11
+* Support for sending account verification emails directly from Oragono, including DKIM signatures
12
+
13
+Many thanks to [@ajaspers](https://github.com/ajaspers) and [@hhirtz](https://github.com/hhirtz) for contributing patches, to [@ajaspers](https://github.com/ajaspers), [@eklitzke](https://github.com/eklitzke), and [@hhirtz](https://github.com/hhirtz) for contributing code reviews, to [@ajaspers](https://github.com/ajaspers), [@bogdomania](https://github.com/bogdomania), [@clukawski](https://github.com/clukawski), Csibesz, [@csmith](https://github.com/csmith), [@eklitzke](https://github.com/eklitzke), [@nxths](https://github.com/nxths), [@hhirtz](https://github.com/hhirtz), [@jesopo](https://github.com/jesopo), [@jlnt](https://github.com/jlnt), [@justjanne](https://github.com/justjanne), [@jwheare](https://github.com/jwheare), [@k4bek4be](https://github.com/k4bek4be), [@kula](https://github.com/kula), [@kylef](https://github.com/kylef), [@Mitaka8](https://github.com/Mitaka8), [@petteri](https://github.com/petteri), [@PizzaLover2007](https://github.com/PizzaLover2007), [@prawnsalad](https://github.com/prawnsalad), [@RyanSquared](https://github.com/RyanSquared), savoyard, and [@xPaw](https://github.com/xPaw) for reporting issues, and to TODO: TRANSLATORS for contributing translations.
14
+
15
+This release includes changes to the config file format, including one breaking change: support for `server.ip-cloaking.secret-environment-variable` has been removed. (See below for instructions on how to upgrade if you were using this feature.) All other changes to the config file format are backwards compatible and do not require updating before restart.
16
+
17
+This release includes a database change. If you have `datastore.autoupgrade` set to `true` in your configuration, it will be automatically applied when you restart Oragono. Otherwise, you can update the database manually by running `oragono upgradedb` (see the manual for complete instructions).
18
+
19
+This release includes a change to the MySQL schema. This change will be applied automatically when you restart Oragono. It is fully backwards compatible (i.e., if it is necessary for you to downgrade Oragono back to 2.0.0, it will not be necessary to downgrade the schema).
20
+
21
+### Config Changes
22
+* Added `websocket` attribute of individual listeners, and a new `server.websockets` section, for configuring websocket listeners. (#967, thanks [@hhirtz](https://github.com/hhirtz)!)
23
+* The recommended default is now to enable IP cloaking. In order to facilitate this, the cloaking secret is now stored in the database, instead of the config file. If you currently have a secret stored in the config file (as `server.ip-cloaking.secret`), it will be automatically imported into the database. If you were using `secret-environment-variable` to distribute your cloaking secret, you can import it manually after restart using the new `/HOSTSERV SETCLOAKSECRET` command. (#952)
24
+* Added `accounts.nick-reservation.force-nick-equals-account`, which ensures that logged-in clients are using their account name as their nickname. This eliminates the need for extbans and is a new recommended default. (#864)
25
+* Added `guest-nickname-format` and `force-guest-format`, which optionally add a prefix like `Guest-` to the nicknames of unauthenticated users (#749)
26
+* The recommended default is now to enable history storage and playback, with messages expiring after 7 days. (As with all changes in recommended config values, applying this to an existing config file requires explicitly changing the values.) (#1030)
27
+* Added `history.retention` section for controlling new features related to history storage and deletion (#858)
28
+* The recommended default for `accounts.multiclient.always-on` is now `opt-in` (#919)
29
+* Added `accounts.default-user-modes`; the recommended default is now to set `+i` on all users automatically (#942, thanks [@ajaspers](https://github.com/ajaspers)!)
30
+* Added `channels.list-delay`, allowing restrictions on channel listings as a defence against spambots (#964)
31
+* Added `accounts.multiclient.auto-away`, allowing always-on clients to be automatically marked as away when all their sessions disconnect
32
+* Added `accounts.throttling` as a global throttle on the creation of new accounts (#913)
33
+* New format for `accounts.callbacks.mailto`, allowing direct email sending and DKIM signing (#921)
34
+* Added `accounts.login-via-pass-command`, providing a new mechanism for legacy clients to authenticate to accounts by sending `PASS account:password` pre-registration (#1020)
35
+* Added `datastore.mysql.socket-path`, allowing MySQL connections over UNIX domain sockets (#1016, thanks savoyard and [@ajaspers](https://github.com/ajaspers)!)
36
+* Added `roleplay` section for controlling the server's roleplay features (#865)
37
+* The recommended default for `accounts.nick-reservation.allow-custom-enforcement` is now `false` (#918)
38
+* The recommended default is now to allow PROXY and WEBIRC lines from localhost (#989, #1011)
39
+* Added `channels.registration.operator-only`, optionally restricting channel registrations to operators (#685)
40
+* Added `server.output-path` for controlling where the server writes output files (#1004)
41
+* Operator capability names prefixed with `oper:` have been normalized to remove the prefix (the old names are still respected in the config file) (#868)
42
+* The log category names `localconnect` and `localconnect-ip` have been changed to `connect` and `connect-ip` respectively (the old names are still respected in the config file) (#940)
43
+
44
+### Security
45
+* Fixed incorrect enforcement of ban/invite/exception masks under some circumstances (#983)
46
+* STATUSMSG were being stored in history without the relevant minimum-prefix information, so they could be replayed to unprivileged users. This was fixed by not storing them at all. (#959, thanks [@prawnsalad](https://github.com/prawnsalad)!)
47
+* Fixed invisible users not being hidden from `WHO *` queries (#991, thanks [@ajaspers](https://github.com/ajaspers)!)
48
+
49
+### Fixed
50
+* Fixed incorrect rejection of `draft/multiline` messages containing blank lines (#1005, thanks [@jwheare](https://github.com/jwheare)!)
51
+* Fixed roleplay commands, which were completely broken from v1.1.0 through v2.0.0 (#865, thanks [@petteri](https://github.com/petteri) and [@Mitaka8](https://github.com/Mitaka8)!)
52
+* Fixed `/SAMODE` applying user mode changes to the operator instead of the target user (#866, thanks [@csmith](https://github.com/csmith)!)
53
+* Fixed some channels not being unregistered during account unregistration (#889)
54
+* Fixed `/NICKSERV SET` and related commands being unavailable when account registration is disabled (#922, thanks [@PizzaLover2007](https://github.com/PizzaLover2007)!)
55
+* Fixed `TAGMSG` not being replayed correctly in history (#1044)
56
+* Fixed `301 RPL_AWAY` not being sent in `WHOIS` responses when applicable (#850)
57
+* `/OPER` with no password no longer disconnects the client (#951)
58
+* Fixed failure to send extended-join responses after account unregistration (#933, thanks [@jesopo](https://github.com/jesopo)!)
59
+* Improved validation of channel keys (#1021, thanks [@kylef](https://github.com/kylef)!)
60
+* Fixed labeling of `421 ERR_UNKNOWNCOMMAND` responses (#994, thanks [@k4bek4be](https://github.com/k4bek4be)!)
61
+* Fixed incorrect parsing of ident protocol responses (#1002, thanks [@justjanne](https://github.com/justjanne)!)
62
+* Fixed redundant `/INVITE` commands not sending `443 ERR_USERONCHANNEL` (#842, thanks [@hhirtz](https://github.com/hhirtz)!)
63
+* Fixed `/NICKSERV REGISTER` response displaying `mailto:` out of context (#985, thanks [@eklitzke](https://github.com/eklitzke)!)
64
+* Fixed HostServ approval and rejection notices being sent from the wrong source (#805)
65
+* Error messages for invalid TLS certificate/key pairs are now more informative (#982)
66
+* Fixed error message when attempting to attach a plaintext session to an always-on client (#955, thanks [@bogdomania](https://github.com/bogdomania) and [@xPaw](https://github.com/xPaw)!)
67
+* Increased the TLS handshake timeout, increasing reliability under high CPU contention (#894)
68
+* Fixed `CHANMODES` ISUPPORT token (#408, #874, thanks [@hhirtz](https://github.com/hhirtz)!)
69
+* Fixed edge cases in handling of the `+k` channel mode parameter (#874, thanks [@hhirtz](https://github.com/hhirtz)!)
70
+* `account-notify` lines are now part of the labeled-response batch when applicable (#1018)
71
+* Fixed incorrect help description of channel mode `+R` (#930, thanks [@PizzaLover2007](https://github.com/PizzaLover2007)!)
72
+* Fixed `255 RPL_LUSERME` response to indicate that the number of federated peer servers is 0 (#846, thanks [@RyanSquared](https://github.com/RyanSquared)!)
73
+
74
+### Changed
75
+* Account names are now permanent identifiers; they cannot be re-registered after unregistration, and applicable nickname protections remain in force. (#793)
76
+* User modes of always-on clients now persist across server restarts (#819)
77
+* Registered channels with no members remain present on the server, including their in-memory history messages when applicable (#704, thanks [@bogdomania](https://github.com/bogdomania)!)
78
+* Updated the [setname](https://ircv3.net/specs/extensions/setname) IRCv3 capability to its ratified version (#1001)
79
+* `/CHANSERV AMODE` now takes immediate effect (#729)
80
+* The channel founder can now take any action that would require channel privileges without actually having the `+q` mode (#950, #998)
81
+* Account unregistration now always disconnects the client (#1028)
82
+* Fakelag is now temporarily disabled during the sending of a `draft/multiline` message batch (#817)
83
+* Failed attempts to join a `+R` channel now send `477 ERR_NEEDREGGEDNICK` (#936, thanks [@PizzaLover2007](https://github.com/PizzaLover2007), [@jesopo](https://github.com/jesopo)!)
84
+* Channels with persistent history can no longer be renamed with `/RENAME` (#827)
85
+* The self-signed certificate generation command `oragono mkcerts` now generates a 2048-bit RSA certificate, instead of a NIST P-521 ECDSA certificate (#898)
86
+* Cleaned up compatibility with an obsolete WEBIRC escaping convention (#869)
87
+* The cloak secret is now stored in the database, so it can no longer be rotated by changing `server.ip-cloaking.secret`. To rotate the secret, use the new `/HOSTSERV SETCLOAKSECRET` command. (#952)
88
+
89
+### Added
90
+* Added native support for websockets (#967, thanks [@hhirtz](https://github.com/hhirtz)!)
91
+* Added support for sending verification emails directly (i.e., without a MTA/smarthost), including DKIM signing (#920, #921)
92
+* Added `/NICKSERV LIST` and `/CHANSERV LIST`, allowing operators to list registered nicknames and channels (#974, thanks [@ajaspers](https://github.com/ajaspers)!)
93
+* Added auto-away feature for marking always-on clients away when all their sessions are disconnected; see `accounts.multiclient.auto-away` and `/NICKSERV HELP SET` for more information (#824)
94
+* Added `/HISTSERV PLAY`, which plays back history messages as NOTICEs from the `HistServ` service (#383, thanks [@nxths](https://github.com/nxths)!)
95
+* Added `/HISTSERV DELETE` for deleting history messages (see the config option `history.retention.allow-individual-delete`) (#858)
96
+* Added `/HISTSERV FORGET` for deleting all history messages associated with an account (see the config option `history.retention.enable-account-indexing`) (#858)
97
+* Added `/HISTSERV EXPORT` for exporting all history messages associated with an account as JSON. This can be used at the user's request for regulatory compliance reasons (see the config option `history.retention.enable-account-indexing`) (#858)
98
+* Added support for logging legacy clients into accounts via the `PASS` command, with the [account:password](https://freenode.net/kb/answer/registration#logging-in) syntax used by Freenode. To enable this feature, set `accounts.login-via-pass-command` to `true`. (#1020, thanks [@jlnt](https://github.com/jlnt)!)
99
+* Added `/NICKSERV ERASE` as an escape hatch for operators, allowing an account to be erased and re-registered (#793)
100
+* Added support for playing back `MODE` and `TOPIC` messages in history (#532)
101
+* Added `conventional.yaml`, a version of the config file that provides a more traditional IRC experience. We recommend a config file based on `oragono.yaml` for production networks, and one based on `conventional.yaml` for IRCv3 conformance testing. (#918)
102
+* Added an optional global throttle on the creation of new accounts (#913)
103
+* Added support for restricting `/LIST` responses sent to anonymous clients (#964)
104
+* Added support for the Plan 9 operating system and its derivatives, including testing on 9front (#1025, thanks [@clukawski](https://github.com/clukawski)!)
105
+
106
+### Removed
107
+* Removed support for colored log output (#940, #939)
108
+* Removed support for distributing the cloaking secret via environment variables (#952)
109
+
110
+### Internal
111
+* `make build` now includes an abbreviated git hash in the `002 RPL_YOURHOST` and `004 RPL_MYINFO` version strings, when applicable (#1031)
112
+* Official releases no longer contain the git hash, only the revision tag (#1031)
113
+* Official releases are now built with `-trimpath` (#901)
114
+
4 115
 ## [2.0.0] - 2020-03-08
5 116
 We're pleased to announce Oragono 2.0.0, a major update with a wide range of enhancements and fixes. Highlights include:
6 117
 

+ 2
- 2
conventional.yaml 查看文件

@@ -152,7 +152,7 @@ server:
152 152
             fingerprint: "abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789"
153 153
 
154 154
             # password the gateway uses to connect, made with oragono genpasswd
155
-            password: "$2a$04$sLEFDpIOyUp55e6gTMKbOeroT6tMXTjPFvA0eGvwvImVR9pkwv7ee"
155
+            password: "$2a$04$abcdef0123456789abcdef0123456789abcdef0123456789abcde"
156 156
 
157 157
             # addresses/CIDRs that can use this webirc command
158 158
             # you should also add these addresses to the connection limits and throttling exemption lists
@@ -589,7 +589,7 @@ opers:
589 589
         # or by certificate fingerprint, or both. if a password hash is set, then a
590 590
         # password is required to oper up (e.g., /OPER dan mypassword). to generate
591 591
         # the hash, use `oragono genpasswd`.
592
-        password: "$2a$04$LiytCxaY0lI.guDj2pBN4eLRD5cdM2OLDwqmGAgB6M2OPirbF5Jcu"
592
+        password: "$2a$04$0123456789abcdef0123456789abcdef0123456789abcdef01234"
593 593
 
594 594
         # if a SHA-256 certificate fingerprint is configured here, then it will be
595 595
         # required to /OPER. if you comment out the password hash above, then you can

+ 1
- 1
distrib/docker/run.sh 查看文件

@@ -11,7 +11,7 @@ if [ ! -f "/ircd/ircd.yaml" ]; then
11 11
     OPERPASS=$(< /dev/urandom tr -dc _A-Z-a-z-0-9 | head -c20)
12 12
     echo "Oper username:password is admin:$OPERPASS"
13 13
     ENCRYPTEDPASS=$(echo "$OPERPASS" | /ircd-bin/oragono genpasswd)
14
-    ORIGINALPASS='\$2a\$04\$LiytCxaY0lI.guDj2pBN4eLRD5cdM2OLDwqmGAgB6M2OPirbF5Jcu'
14
+    ORIGINALPASS='\$2a\$04\$0123456789abcdef0123456789abcdef0123456789abcdef01234'
15 15
 
16 16
     awk "{gsub(/password: \\\"$ORIGINALPASS\\\"/,\"password: \\\"$ENCRYPTEDPASS\\\"\")}1" /tmp/ircd.yaml > /tmp/ircd2.yaml
17 17
 

+ 3
- 2
distrib/systemd/oragono.service 查看文件

@@ -2,8 +2,9 @@
2 2
 Description=oragono
3 3
 After=network.target
4 4
 # If you are using MySQL for history storage, comment out the above line
5
-# and uncomment these two instead:
6
-# Requires=mysql.service
5
+# and uncomment these two instead (you must independently install and configure
6
+# MySQL for your system):
7
+# Wants=mysql.service
7 8
 # After=network.target mysql.service
8 9
 
9 10
 [Service]

+ 53
- 4
docs/MANUAL.md 查看文件

@@ -5,7 +5,7 @@
5 5
     ▐█▌.▐▌▐█•█▌▐█ ▪▐▌▐█▄▪▐█▐█▌ ▐▌██▐█▌▐█▌.▐▌
6 6
      ▀█▄▀▪.▀  ▀ ▀  ▀ ·▀▀▀▀  ▀█▄▀ ▀▀ █▪ ▀█▄▀▪
7 7
 
8
-         Oragono IRCd Manual 2019-06-12
8
+           Oragono IRCd Manual v2.1.0
9 9
               https://oragono.io/
10 10
 
11 11
 _Copyright © Daniel Oaks <daniel@danieloaks.net>, Shivaram Lingamneni <slingamn@cs.stanford.edu>_
@@ -22,6 +22,8 @@ _Copyright © Daniel Oaks <daniel@danieloaks.net>, Shivaram Lingamneni <slingamn
22 22
 - Installing
23 23
     - Windows
24 24
     - macOS / Linux / Raspberry Pi
25
+    - Docker
26
+    - Becoming an operator
25 27
     - Productionizing
26 28
     - Upgrading
27 29
 - Features
@@ -38,8 +40,10 @@ _Copyright © Daniel Oaks <daniel@danieloaks.net>, Shivaram Lingamneni <slingamn
38 40
     - User Modes
39 41
     - Channel Modes
40 42
     - Channel Prefixes
43
+    - Client certificates
41 44
 - Commands
42 45
 - Working with other software
46
+    - Kiwi IRC
43 47
     - HOPM
44 48
     - Tor
45 49
 - Acknowledgements
@@ -66,7 +70,7 @@ Oragono's core design goals are:
66 70
 * Bleeding-edge [IRCv3 support](http://ircv3.net/software/servers.html), suitable for use as an IRCv3 reference implementation
67 71
 * Highly customizable via a rehashable (i.e., reloadable at runtime) YAML config
68 72
 
69
-In addition to its unique features (integrated services and bouncer, comprehensive internationalization), Oragono also strives for feature parity with other major servers. Oragono has multiple communities using it as a day-to-day chat server and is fairly mature --- we encourage you to consider it for your organization or community!
73
+In addition to its unique features (integrated services and bouncer, comprehensive internationalization), Oragono also strives for feature parity with other major servers. Oragono is a mature project with multiple communities using it as a day-to-day chat server --- we encourage you to consider it for your organization or community!
70 74
 
71 75
 ## Scalability
72 76
 
@@ -124,6 +128,11 @@ If you're using Arch Linux, you can also install the [`oragono` package](https:/
124 128
 For further information and a sample docker-compose file see the separate [Docker documentation](https://github.com/oragono/oragono/blob/master/distrib/docker/README.md).
125 129
 
126 130
 
131
+## Becoming an operator
132
+
133
+Many administrative actions on an IRC server are performed "in-band" as IRC commands sent from a client. The client in question must be an IRC operator ("oper", "ircop"). The easiest way to become an operator on your new Oragono instance is first to pick a strong, secure password, then "hash" it using the `oragono genpasswd` command (run `oragono genpasswd` from the command line, then enter your password twice), then copy the resulting hash into the `opers` section of your `ircd.yaml` file. Then you can become an operator by issuing the IRC command: `/oper admin mysecretpassword`.
134
+
135
+
127 136
 ## Productionizing
128 137
 
129 138
 The recommended way to operate oragono as a service on Linux is via systemd. This provides a standard interface for starting, stopping, and rehashing (via `systemctl reload`) the service. It also captures oragono's loglines (sent to stderr in the default configuration) and writes them to the system journal.
@@ -322,7 +331,7 @@ Oragono supports two methods of storing history, an in-memory buffer with a conf
322 331
 
323 332
 Unfortunately, client support for history playback is still patchy. In descending order of support:
324 333
 
325
-1. The [IRCv3 chathistory specification](https://github.com/ircv3/ircv3-specifications/pull/393/) offers the most fine-grained control over history replay. It is supported by [Kiwi IRC's unreleased master branch](https://kiwiirc.com/), and hopefully other clients soon.
334
+1. The [IRCv3 chathistory specification](https://github.com/ircv3/ircv3-specifications/pull/393/) offers the most fine-grained control over history replay. It is supported by [Kiwi IRC](https://github.com/kiwiirc/kiwiirc), and hopefully other clients soon.
326 335
 1. We emulate the [ZNC playback module](https://wiki.znc.in/Playback) for clients that support it. You may need to enable support for it explicitly in your client (see the "ZNC" section below).
327 336
 1. If you are not using the multiclient functionality, but your client is set to be always-on (see the previous section for details), Oragono will remember the last time your client signed out. You can then set your account to replay only messages you missed with `/msg NickServ set autoreplay-missed on`. Unfortunately, this feature will only work reliably if you are *not* using the multiclient functionality described in the above section --- you must be connecting with at most one client at a time.
328 337
 1. You can manually request history using `/history #channel 1h` (the parameter is either a message count or a time duration). (Depending on your client, you may need to use `/QUOTE history` instead.)
@@ -335,7 +344,7 @@ Unlike many other chat and web platforms, IRC traditionally exposes the user's I
335 344
 
336 345
 IP cloaking is a way of balancing these concerns about abuse with concerns about user privacy. With cloaking, the user's IP address is deterministically "scrambled", typically via a cryptographic [MAC](https://en.wikipedia.org/wiki/Message_authentication_code), to form a "cloaked" hostname that replaces the usual reverse-DNS-based hostname. Users cannot reverse the scrambling to learn each other's IPs, but can ban a scrambled address the same way they would ban a regular hostname.
337 346
 
338
-Oragono supports cloaking, which can be enabled via the `server.ip-cloaking` section of the config. However, Oragono's cloaking behavior differs from other IRC software. Rather than scrambling each of the 4 bytes of the IPv4 address (or each 2-byte pair of the 8 such pairs of the IPv6 address) separately, the server administrator configures a CIDR length (essentially, a fixed number of most-significant-bits of the address). The CIDR (i.e., only the most significant portion of the address) is then scrambled atomically to produce the cloaked hostname. This errs on the side of user privacy, since knowing the cloaked hostname for one CIDR tells you nothing about the cloaked hostnames of other CIDRs --- the scheme reveals only whether two users are coming from the same CIDR. We suggest using 32-bit CIDRs for IPv4 (i.e., the whole address) and 64-bit CIDRs for IPv6, since these are the typical assignments made by ISPs to individual customers.
347
+Oragono supports cloaking, which is enabled by default (via the `server.ip-cloaking` section of the config). However, Oragono's cloaking behavior differs from other IRC software. Rather than scrambling each of the 4 bytes of the IPv4 address (or each 2-byte pair of the 8 such pairs of the IPv6 address) separately, the server administrator configures a CIDR length (essentially, a fixed number of most-significant-bits of the address). The CIDR (i.e., only the most significant portion of the address) is then scrambled atomically to produce the cloaked hostname. This errs on the side of user privacy, since knowing the cloaked hostname for one CIDR tells you nothing about the cloaked hostnames of other CIDRs --- the scheme reveals only whether two users are coming from the same CIDR. We suggest using 32-bit CIDRs for IPv4 (i.e., the whole address) and 64-bit CIDRs for IPv6, since these are the typical assignments made by ISPs to individual customers.
339 348
 
340 349
 Setting `server.ip-cloaking.num-bits` to 0 gives users cloaks that don't depend on their IP address information at all, which is an option for deployments where privacy is a more pressing concern than abuse. Holders of registered accounts can also use the vhost system (for details, `/msg HostServ HELP`.)
341 350
 
@@ -436,6 +445,12 @@ You may want to configure a reverse proxy, such as nginx, for TLS termination --
436 445
 1. Add the reverse proxy's IP to `proxy-allowed-from` and `ip-limits.exempted`. (Use `localhost` to exempt all loopback IPs and Unix domain sockets.)
437 446
 1. Configure your reverse proxy to connect to an appropriate Oragono listener and send the PROXY line. In this [example nginx config](https://github.com/darwin-network/slash/commit/aae9ba08d70128eb4b700cade333fe824a53562d), nginx connects to Oragono via a Unix domain socket.
438 447
 
448
+## Client certificates
449
+
450
+Oragono supports authenticating to user accounts via TLS client certificates. The end user must enable the client certificate in their client and also enable SASL with the `EXTERNAL` method. To register an account using only a client certificate for authentication, connect with the client certificate and use `/NS REGISTER *` (or `/NS REGISTER * email@example.com` if email verification is enabled on the server). To add a client certificate to an existing account, obtain the SHA-256 fingerprint of the certificate (either by connecting with it and looking at your own `/WHOIS` response, in particular the `276 RPL_WHOISCERTFP` line, or using the openssl command `openssl x509 -noout -fingerprint -sha256 -in example_client_cert.pem`), then use the `/NS CERT` command).
451
+
452
+Client certificates are not supported over websockets due to a [Chrome bug](https://bugs.chromium.org/p/chromium/issues/detail?id=329884).
453
+
439 454
 
440 455
 --------------------------------------------------------------------------------------------
441 456
 
@@ -687,6 +702,40 @@ One exception is services frameworks like [Anope](https://github.com/anope/anope
687 702
 
688 703
 If you're looking for a bot that supports modern IRCv3 features, check out [bitbot](https://github.com/jesopo/bitbot/)!
689 704
 
705
+## Kiwi IRC
706
+
707
+[Kiwi IRC](https://github.com/kiwiirc/kiwiirc/) is a web-based IRC client with excellent IRCv3 support. In particular, it is the only major client to fully support Oragono's server-side history features. For a demonstration of these features, see the [Oragono testnet](https://testnet.oragono.io/kiwi).
708
+
709
+Current versions of Kiwi are 100% static files (HTML and Javascript), running entirely in the end user's browser without the need for a separate server-side backend. This frontend can connect directly to Oragono, using Oragono's support for native websockets. For best interoperability with firewalls, you should run an externally facing web server on port 443 that can serve both the static files and the websocket path, then have it reverse-proxy the websocket path to Oragono. For example, configure the following listener in ircd.yaml:
710
+
711
+```yaml
712
+        "127.0.0.1:8067":
713
+            websocket: true
714
+```
715
+
716
+then the following location block in your nginx config (this proxies only `/webirc` on your server to Oragono's websocket listener):
717
+
718
+```
719
+	location /webirc {
720
+		proxy_pass http://127.0.0.1:8067;
721
+		proxy_http_version 1.1;
722
+		proxy_set_header Upgrade $http_upgrade;
723
+		proxy_set_header Connection "Upgrade";
724
+		proxy_set_header X-Forwarded-For $remote_addr;
725
+		proxy_set_header X-Forwarded-Proto $scheme;
726
+	}
727
+```
728
+
729
+then add the following `startupOptions` to Kiwi's `static/config.json` file (see the [Oragono testnet's config.json](https://testnet.oragono.io/kiwi/static/config.json) for a fully functional example):
730
+
731
+```
732
+    "startupOptions" : {
733
+        "websocket": "wss://domain.example.com/webirc",
734
+        "channel": "#chat",
735
+        "nick": "kiwi-n?"
736
+    },
737
+```
738
+
690 739
 ## Hybrid Open Proxy Monitor (HOPM)
691 740
 
692 741
 [hopm](https://github.com/ircd-hybrid/hopm) can be used to monitor your server for connections from open proxies, then automatically ban them. To configure hopm to work with oragono, add operator blocks like this to your oragono config file, which grant hopm the necessary privileges:

+ 2
- 2
oragono.yaml 查看文件

@@ -178,7 +178,7 @@ server:
178 178
             fingerprint: "abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789"
179 179
 
180 180
             # password the gateway uses to connect, made with oragono genpasswd
181
-            password: "$2a$04$sLEFDpIOyUp55e6gTMKbOeroT6tMXTjPFvA0eGvwvImVR9pkwv7ee"
181
+            password: "$2a$04$abcdef0123456789abcdef0123456789abcdef0123456789abcde"
182 182
 
183 183
             # addresses/CIDRs that can use this webirc command
184 184
             # you should also add these addresses to the connection limits and throttling exemption lists
@@ -615,7 +615,7 @@ opers:
615 615
         # or by certificate fingerprint, or both. if a password hash is set, then a
616 616
         # password is required to oper up (e.g., /OPER dan mypassword). to generate
617 617
         # the hash, use `oragono genpasswd`.
618
-        password: "$2a$04$LiytCxaY0lI.guDj2pBN4eLRD5cdM2OLDwqmGAgB6M2OPirbF5Jcu"
618
+        password: "$2a$04$0123456789abcdef0123456789abcdef0123456789abcdef01234"
619 619
 
620 620
         # if a SHA-256 certificate fingerprint is configured here, then it will be
621 621
         # required to /OPER. if you comment out the password hash above, then you can

Loading…
取消
儲存