Browse Source

Merge pull request #1046 from slingamn/changelog.4

add changelog for v2.1.0-rc1
tags/v2.1.0-rc1
Shivaram Lingamneni 4 years ago
parent
commit
e0986c8608
No account linked to committer's email address
6 changed files with 172 additions and 11 deletions
  1. 111
    0
      CHANGELOG.md
  2. 2
    2
      conventional.yaml
  3. 1
    1
      distrib/docker/run.sh
  4. 3
    2
      distrib/systemd/oragono.service
  5. 53
    4
      docs/MANUAL.md
  6. 2
    2
      oragono.yaml

+ 111
- 0
CHANGELOG.md View File

1
 # Changelog
1
 # Changelog
2
 All notable changes to Oragono will be documented in this file.
2
 All notable changes to Oragono will be documented in this file.
3
 
3
 
4
+## [2.1.0-rc1] - 2020-05-25
5
+We're pleased to be publishing the release candidate for 2.1.0 (the official release should follow in a week or so).
6
+
7
+Since the release of 2.0.0 in March, a number of new communities and organizations have adopted Oragono as a communications tool. This new release incorporates many improvements and fixes derived from the experiences of real-world operators and end users. Highlights include:
8
+
9
+* Native support for websockets contributed by [@hhirtz](https://github.com/hhirtz), eliminating the need for a separate websockets-to-IRC proxy server
10
+* Tighter control over the relationship between account names and nicknames, eliminating the need for extbans
11
+* Support for sending account verification emails directly from Oragono, including DKIM signatures
12
+
13
+Many thanks to [@ajaspers](https://github.com/ajaspers) and [@hhirtz](https://github.com/hhirtz) for contributing patches, to [@ajaspers](https://github.com/ajaspers), [@eklitzke](https://github.com/eklitzke), and [@hhirtz](https://github.com/hhirtz) for contributing code reviews, to [@ajaspers](https://github.com/ajaspers), [@bogdomania](https://github.com/bogdomania), [@clukawski](https://github.com/clukawski), Csibesz, [@csmith](https://github.com/csmith), [@eklitzke](https://github.com/eklitzke), [@nxths](https://github.com/nxths), [@hhirtz](https://github.com/hhirtz), [@jesopo](https://github.com/jesopo), [@jlnt](https://github.com/jlnt), [@justjanne](https://github.com/justjanne), [@jwheare](https://github.com/jwheare), [@k4bek4be](https://github.com/k4bek4be), [@kula](https://github.com/kula), [@kylef](https://github.com/kylef), [@Mitaka8](https://github.com/Mitaka8), [@petteri](https://github.com/petteri), [@PizzaLover2007](https://github.com/PizzaLover2007), [@prawnsalad](https://github.com/prawnsalad), [@RyanSquared](https://github.com/RyanSquared), savoyard, and [@xPaw](https://github.com/xPaw) for reporting issues, and to TODO: TRANSLATORS for contributing translations.
14
+
15
+This release includes changes to the config file format, including one breaking change: support for `server.ip-cloaking.secret-environment-variable` has been removed. (See below for instructions on how to upgrade if you were using this feature.) All other changes to the config file format are backwards compatible and do not require updating before restart.
16
+
17
+This release includes a database change. If you have `datastore.autoupgrade` set to `true` in your configuration, it will be automatically applied when you restart Oragono. Otherwise, you can update the database manually by running `oragono upgradedb` (see the manual for complete instructions).
18
+
19
+This release includes a change to the MySQL schema. This change will be applied automatically when you restart Oragono. It is fully backwards compatible (i.e., if it is necessary for you to downgrade Oragono back to 2.0.0, it will not be necessary to downgrade the schema).
20
+
21
+### Config Changes
22
+* Added `websocket` attribute of individual listeners, and a new `server.websockets` section, for configuring websocket listeners. (#967, thanks [@hhirtz](https://github.com/hhirtz)!)
23
+* The recommended default is now to enable IP cloaking. In order to facilitate this, the cloaking secret is now stored in the database, instead of the config file. If you currently have a secret stored in the config file (as `server.ip-cloaking.secret`), it will be automatically imported into the database. If you were using `secret-environment-variable` to distribute your cloaking secret, you can import it manually after restart using the new `/HOSTSERV SETCLOAKSECRET` command. (#952)
24
+* Added `accounts.nick-reservation.force-nick-equals-account`, which ensures that logged-in clients are using their account name as their nickname. This eliminates the need for extbans and is a new recommended default. (#864)
25
+* Added `guest-nickname-format` and `force-guest-format`, which optionally add a prefix like `Guest-` to the nicknames of unauthenticated users (#749)
26
+* The recommended default is now to enable history storage and playback, with messages expiring after 7 days. (As with all changes in recommended config values, applying this to an existing config file requires explicitly changing the values.) (#1030)
27
+* Added `history.retention` section for controlling new features related to history storage and deletion (#858)
28
+* The recommended default for `accounts.multiclient.always-on` is now `opt-in` (#919)
29
+* Added `accounts.default-user-modes`; the recommended default is now to set `+i` on all users automatically (#942, thanks [@ajaspers](https://github.com/ajaspers)!)
30
+* Added `channels.list-delay`, allowing restrictions on channel listings as a defence against spambots (#964)
31
+* Added `accounts.multiclient.auto-away`, allowing always-on clients to be automatically marked as away when all their sessions disconnect
32
+* Added `accounts.throttling` as a global throttle on the creation of new accounts (#913)
33
+* New format for `accounts.callbacks.mailto`, allowing direct email sending and DKIM signing (#921)
34
+* Added `accounts.login-via-pass-command`, providing a new mechanism for legacy clients to authenticate to accounts by sending `PASS account:password` pre-registration (#1020)
35
+* Added `datastore.mysql.socket-path`, allowing MySQL connections over UNIX domain sockets (#1016, thanks savoyard and [@ajaspers](https://github.com/ajaspers)!)
36
+* Added `roleplay` section for controlling the server's roleplay features (#865)
37
+* The recommended default for `accounts.nick-reservation.allow-custom-enforcement` is now `false` (#918)
38
+* The recommended default is now to allow PROXY and WEBIRC lines from localhost (#989, #1011)
39
+* Added `channels.registration.operator-only`, optionally restricting channel registrations to operators (#685)
40
+* Added `server.output-path` for controlling where the server writes output files (#1004)
41
+* Operator capability names prefixed with `oper:` have been normalized to remove the prefix (the old names are still respected in the config file) (#868)
42
+* The log category names `localconnect` and `localconnect-ip` have been changed to `connect` and `connect-ip` respectively (the old names are still respected in the config file) (#940)
43
+
44
+### Security
45
+* Fixed incorrect enforcement of ban/invite/exception masks under some circumstances (#983)
46
+* STATUSMSG were being stored in history without the relevant minimum-prefix information, so they could be replayed to unprivileged users. This was fixed by not storing them at all. (#959, thanks [@prawnsalad](https://github.com/prawnsalad)!)
47
+* Fixed invisible users not being hidden from `WHO *` queries (#991, thanks [@ajaspers](https://github.com/ajaspers)!)
48
+
49
+### Fixed
50
+* Fixed incorrect rejection of `draft/multiline` messages containing blank lines (#1005, thanks [@jwheare](https://github.com/jwheare)!)
51
+* Fixed roleplay commands, which were completely broken from v1.1.0 through v2.0.0 (#865, thanks [@petteri](https://github.com/petteri) and [@Mitaka8](https://github.com/Mitaka8)!)
52
+* Fixed `/SAMODE` applying user mode changes to the operator instead of the target user (#866, thanks [@csmith](https://github.com/csmith)!)
53
+* Fixed some channels not being unregistered during account unregistration (#889)
54
+* Fixed `/NICKSERV SET` and related commands being unavailable when account registration is disabled (#922, thanks [@PizzaLover2007](https://github.com/PizzaLover2007)!)
55
+* Fixed `TAGMSG` not being replayed correctly in history (#1044)
56
+* Fixed `301 RPL_AWAY` not being sent in `WHOIS` responses when applicable (#850)
57
+* `/OPER` with no password no longer disconnects the client (#951)
58
+* Fixed failure to send extended-join responses after account unregistration (#933, thanks [@jesopo](https://github.com/jesopo)!)
59
+* Improved validation of channel keys (#1021, thanks [@kylef](https://github.com/kylef)!)
60
+* Fixed labeling of `421 ERR_UNKNOWNCOMMAND` responses (#994, thanks [@k4bek4be](https://github.com/k4bek4be)!)
61
+* Fixed incorrect parsing of ident protocol responses (#1002, thanks [@justjanne](https://github.com/justjanne)!)
62
+* Fixed redundant `/INVITE` commands not sending `443 ERR_USERONCHANNEL` (#842, thanks [@hhirtz](https://github.com/hhirtz)!)
63
+* Fixed `/NICKSERV REGISTER` response displaying `mailto:` out of context (#985, thanks [@eklitzke](https://github.com/eklitzke)!)
64
+* Fixed HostServ approval and rejection notices being sent from the wrong source (#805)
65
+* Error messages for invalid TLS certificate/key pairs are now more informative (#982)
66
+* Fixed error message when attempting to attach a plaintext session to an always-on client (#955, thanks [@bogdomania](https://github.com/bogdomania) and [@xPaw](https://github.com/xPaw)!)
67
+* Increased the TLS handshake timeout, increasing reliability under high CPU contention (#894)
68
+* Fixed `CHANMODES` ISUPPORT token (#408, #874, thanks [@hhirtz](https://github.com/hhirtz)!)
69
+* Fixed edge cases in handling of the `+k` channel mode parameter (#874, thanks [@hhirtz](https://github.com/hhirtz)!)
70
+* `account-notify` lines are now part of the labeled-response batch when applicable (#1018)
71
+* Fixed incorrect help description of channel mode `+R` (#930, thanks [@PizzaLover2007](https://github.com/PizzaLover2007)!)
72
+* Fixed `255 RPL_LUSERME` response to indicate that the number of federated peer servers is 0 (#846, thanks [@RyanSquared](https://github.com/RyanSquared)!)
73
+
74
+### Changed
75
+* Account names are now permanent identifiers; they cannot be re-registered after unregistration, and applicable nickname protections remain in force. (#793)
76
+* User modes of always-on clients now persist across server restarts (#819)
77
+* Registered channels with no members remain present on the server, including their in-memory history messages when applicable (#704, thanks [@bogdomania](https://github.com/bogdomania)!)
78
+* Updated the [setname](https://ircv3.net/specs/extensions/setname) IRCv3 capability to its ratified version (#1001)
79
+* `/CHANSERV AMODE` now takes immediate effect (#729)
80
+* The channel founder can now take any action that would require channel privileges without actually having the `+q` mode (#950, #998)
81
+* Account unregistration now always disconnects the client (#1028)
82
+* Fakelag is now temporarily disabled during the sending of a `draft/multiline` message batch (#817)
83
+* Failed attempts to join a `+R` channel now send `477 ERR_NEEDREGGEDNICK` (#936, thanks [@PizzaLover2007](https://github.com/PizzaLover2007), [@jesopo](https://github.com/jesopo)!)
84
+* Channels with persistent history can no longer be renamed with `/RENAME` (#827)
85
+* The self-signed certificate generation command `oragono mkcerts` now generates a 2048-bit RSA certificate, instead of a NIST P-521 ECDSA certificate (#898)
86
+* Cleaned up compatibility with an obsolete WEBIRC escaping convention (#869)
87
+* The cloak secret is now stored in the database, so it can no longer be rotated by changing `server.ip-cloaking.secret`. To rotate the secret, use the new `/HOSTSERV SETCLOAKSECRET` command. (#952)
88
+
89
+### Added
90
+* Added native support for websockets (#967, thanks [@hhirtz](https://github.com/hhirtz)!)
91
+* Added support for sending verification emails directly (i.e., without a MTA/smarthost), including DKIM signing (#920, #921)
92
+* Added `/NICKSERV LIST` and `/CHANSERV LIST`, allowing operators to list registered nicknames and channels (#974, thanks [@ajaspers](https://github.com/ajaspers)!)
93
+* Added auto-away feature for marking always-on clients away when all their sessions are disconnected; see `accounts.multiclient.auto-away` and `/NICKSERV HELP SET` for more information (#824)
94
+* Added `/HISTSERV PLAY`, which plays back history messages as NOTICEs from the `HistServ` service (#383, thanks [@nxths](https://github.com/nxths)!)
95
+* Added `/HISTSERV DELETE` for deleting history messages (see the config option `history.retention.allow-individual-delete`) (#858)
96
+* Added `/HISTSERV FORGET` for deleting all history messages associated with an account (see the config option `history.retention.enable-account-indexing`) (#858)
97
+* Added `/HISTSERV EXPORT` for exporting all history messages associated with an account as JSON. This can be used at the user's request for regulatory compliance reasons (see the config option `history.retention.enable-account-indexing`) (#858)
98
+* Added support for logging legacy clients into accounts via the `PASS` command, with the [account:password](https://freenode.net/kb/answer/registration#logging-in) syntax used by Freenode. To enable this feature, set `accounts.login-via-pass-command` to `true`. (#1020, thanks [@jlnt](https://github.com/jlnt)!)
99
+* Added `/NICKSERV ERASE` as an escape hatch for operators, allowing an account to be erased and re-registered (#793)
100
+* Added support for playing back `MODE` and `TOPIC` messages in history (#532)
101
+* Added `conventional.yaml`, a version of the config file that provides a more traditional IRC experience. We recommend a config file based on `oragono.yaml` for production networks, and one based on `conventional.yaml` for IRCv3 conformance testing. (#918)
102
+* Added an optional global throttle on the creation of new accounts (#913)
103
+* Added support for restricting `/LIST` responses sent to anonymous clients (#964)
104
+* Added support for the Plan 9 operating system and its derivatives, including testing on 9front (#1025, thanks [@clukawski](https://github.com/clukawski)!)
105
+
106
+### Removed
107
+* Removed support for colored log output (#940, #939)
108
+* Removed support for distributing the cloaking secret via environment variables (#952)
109
+
110
+### Internal
111
+* `make build` now includes an abbreviated git hash in the `002 RPL_YOURHOST` and `004 RPL_MYINFO` version strings, when applicable (#1031)
112
+* Official releases no longer contain the git hash, only the revision tag (#1031)
113
+* Official releases are now built with `-trimpath` (#901)
114
+
4
 ## [2.0.0] - 2020-03-08
115
 ## [2.0.0] - 2020-03-08
5
 We're pleased to announce Oragono 2.0.0, a major update with a wide range of enhancements and fixes. Highlights include:
116
 We're pleased to announce Oragono 2.0.0, a major update with a wide range of enhancements and fixes. Highlights include:
6
 
117
 

+ 2
- 2
conventional.yaml View File

152
             fingerprint: "abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789"
152
             fingerprint: "abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789"
153
 
153
 
154
             # password the gateway uses to connect, made with oragono genpasswd
154
             # password the gateway uses to connect, made with oragono genpasswd
155
-            password: "$2a$04$sLEFDpIOyUp55e6gTMKbOeroT6tMXTjPFvA0eGvwvImVR9pkwv7ee"
155
+            password: "$2a$04$abcdef0123456789abcdef0123456789abcdef0123456789abcde"
156
 
156
 
157
             # addresses/CIDRs that can use this webirc command
157
             # addresses/CIDRs that can use this webirc command
158
             # you should also add these addresses to the connection limits and throttling exemption lists
158
             # you should also add these addresses to the connection limits and throttling exemption lists
589
         # or by certificate fingerprint, or both. if a password hash is set, then a
589
         # or by certificate fingerprint, or both. if a password hash is set, then a
590
         # password is required to oper up (e.g., /OPER dan mypassword). to generate
590
         # password is required to oper up (e.g., /OPER dan mypassword). to generate
591
         # the hash, use `oragono genpasswd`.
591
         # the hash, use `oragono genpasswd`.
592
-        password: "$2a$04$LiytCxaY0lI.guDj2pBN4eLRD5cdM2OLDwqmGAgB6M2OPirbF5Jcu"
592
+        password: "$2a$04$0123456789abcdef0123456789abcdef0123456789abcdef01234"
593
 
593
 
594
         # if a SHA-256 certificate fingerprint is configured here, then it will be
594
         # if a SHA-256 certificate fingerprint is configured here, then it will be
595
         # required to /OPER. if you comment out the password hash above, then you can
595
         # required to /OPER. if you comment out the password hash above, then you can

+ 1
- 1
distrib/docker/run.sh View File

11
     OPERPASS=$(< /dev/urandom tr -dc _A-Z-a-z-0-9 | head -c20)
11
     OPERPASS=$(< /dev/urandom tr -dc _A-Z-a-z-0-9 | head -c20)
12
     echo "Oper username:password is admin:$OPERPASS"
12
     echo "Oper username:password is admin:$OPERPASS"
13
     ENCRYPTEDPASS=$(echo "$OPERPASS" | /ircd-bin/oragono genpasswd)
13
     ENCRYPTEDPASS=$(echo "$OPERPASS" | /ircd-bin/oragono genpasswd)
14
-    ORIGINALPASS='\$2a\$04\$LiytCxaY0lI.guDj2pBN4eLRD5cdM2OLDwqmGAgB6M2OPirbF5Jcu'
14
+    ORIGINALPASS='\$2a\$04\$0123456789abcdef0123456789abcdef0123456789abcdef01234'
15
 
15
 
16
     awk "{gsub(/password: \\\"$ORIGINALPASS\\\"/,\"password: \\\"$ENCRYPTEDPASS\\\"\")}1" /tmp/ircd.yaml > /tmp/ircd2.yaml
16
     awk "{gsub(/password: \\\"$ORIGINALPASS\\\"/,\"password: \\\"$ENCRYPTEDPASS\\\"\")}1" /tmp/ircd.yaml > /tmp/ircd2.yaml
17
 
17
 

+ 3
- 2
distrib/systemd/oragono.service View File

2
 Description=oragono
2
 Description=oragono
3
 After=network.target
3
 After=network.target
4
 # If you are using MySQL for history storage, comment out the above line
4
 # If you are using MySQL for history storage, comment out the above line
5
-# and uncomment these two instead:
6
-# Requires=mysql.service
5
+# and uncomment these two instead (you must independently install and configure
6
+# MySQL for your system):
7
+# Wants=mysql.service
7
 # After=network.target mysql.service
8
 # After=network.target mysql.service
8
 
9
 
9
 [Service]
10
 [Service]

+ 53
- 4
docs/MANUAL.md View File

5
     ▐█▌.▐▌▐█•█▌▐█ ▪▐▌▐█▄▪▐█▐█▌ ▐▌██▐█▌▐█▌.▐▌
5
     ▐█▌.▐▌▐█•█▌▐█ ▪▐▌▐█▄▪▐█▐█▌ ▐▌██▐█▌▐█▌.▐▌
6
      ▀█▄▀▪.▀  ▀ ▀  ▀ ·▀▀▀▀  ▀█▄▀ ▀▀ █▪ ▀█▄▀▪
6
      ▀█▄▀▪.▀  ▀ ▀  ▀ ·▀▀▀▀  ▀█▄▀ ▀▀ █▪ ▀█▄▀▪
7
 
7
 
8
-         Oragono IRCd Manual 2019-06-12
8
+           Oragono IRCd Manual v2.1.0
9
               https://oragono.io/
9
               https://oragono.io/
10
 
10
 
11
 _Copyright © Daniel Oaks <daniel@danieloaks.net>, Shivaram Lingamneni <slingamn@cs.stanford.edu>_
11
 _Copyright © Daniel Oaks <daniel@danieloaks.net>, Shivaram Lingamneni <slingamn@cs.stanford.edu>_
22
 - Installing
22
 - Installing
23
     - Windows
23
     - Windows
24
     - macOS / Linux / Raspberry Pi
24
     - macOS / Linux / Raspberry Pi
25
+    - Docker
26
+    - Becoming an operator
25
     - Productionizing
27
     - Productionizing
26
     - Upgrading
28
     - Upgrading
27
 - Features
29
 - Features
38
     - User Modes
40
     - User Modes
39
     - Channel Modes
41
     - Channel Modes
40
     - Channel Prefixes
42
     - Channel Prefixes
43
+    - Client certificates
41
 - Commands
44
 - Commands
42
 - Working with other software
45
 - Working with other software
46
+    - Kiwi IRC
43
     - HOPM
47
     - HOPM
44
     - Tor
48
     - Tor
45
 - Acknowledgements
49
 - Acknowledgements
66
 * Bleeding-edge [IRCv3 support](http://ircv3.net/software/servers.html), suitable for use as an IRCv3 reference implementation
70
 * Bleeding-edge [IRCv3 support](http://ircv3.net/software/servers.html), suitable for use as an IRCv3 reference implementation
67
 * Highly customizable via a rehashable (i.e., reloadable at runtime) YAML config
71
 * Highly customizable via a rehashable (i.e., reloadable at runtime) YAML config
68
 
72
 
69
-In addition to its unique features (integrated services and bouncer, comprehensive internationalization), Oragono also strives for feature parity with other major servers. Oragono has multiple communities using it as a day-to-day chat server and is fairly mature --- we encourage you to consider it for your organization or community!
73
+In addition to its unique features (integrated services and bouncer, comprehensive internationalization), Oragono also strives for feature parity with other major servers. Oragono is a mature project with multiple communities using it as a day-to-day chat server --- we encourage you to consider it for your organization or community!
70
 
74
 
71
 ## Scalability
75
 ## Scalability
72
 
76
 
124
 For further information and a sample docker-compose file see the separate [Docker documentation](https://github.com/oragono/oragono/blob/master/distrib/docker/README.md).
128
 For further information and a sample docker-compose file see the separate [Docker documentation](https://github.com/oragono/oragono/blob/master/distrib/docker/README.md).
125
 
129
 
126
 
130
 
131
+## Becoming an operator
132
+
133
+Many administrative actions on an IRC server are performed "in-band" as IRC commands sent from a client. The client in question must be an IRC operator ("oper", "ircop"). The easiest way to become an operator on your new Oragono instance is first to pick a strong, secure password, then "hash" it using the `oragono genpasswd` command (run `oragono genpasswd` from the command line, then enter your password twice), then copy the resulting hash into the `opers` section of your `ircd.yaml` file. Then you can become an operator by issuing the IRC command: `/oper admin mysecretpassword`.
134
+
135
+
127
 ## Productionizing
136
 ## Productionizing
128
 
137
 
129
 The recommended way to operate oragono as a service on Linux is via systemd. This provides a standard interface for starting, stopping, and rehashing (via `systemctl reload`) the service. It also captures oragono's loglines (sent to stderr in the default configuration) and writes them to the system journal.
138
 The recommended way to operate oragono as a service on Linux is via systemd. This provides a standard interface for starting, stopping, and rehashing (via `systemctl reload`) the service. It also captures oragono's loglines (sent to stderr in the default configuration) and writes them to the system journal.
322
 
331
 
323
 Unfortunately, client support for history playback is still patchy. In descending order of support:
332
 Unfortunately, client support for history playback is still patchy. In descending order of support:
324
 
333
 
325
-1. The [IRCv3 chathistory specification](https://github.com/ircv3/ircv3-specifications/pull/393/) offers the most fine-grained control over history replay. It is supported by [Kiwi IRC's unreleased master branch](https://kiwiirc.com/), and hopefully other clients soon.
334
+1. The [IRCv3 chathistory specification](https://github.com/ircv3/ircv3-specifications/pull/393/) offers the most fine-grained control over history replay. It is supported by [Kiwi IRC](https://github.com/kiwiirc/kiwiirc), and hopefully other clients soon.
326
 1. We emulate the [ZNC playback module](https://wiki.znc.in/Playback) for clients that support it. You may need to enable support for it explicitly in your client (see the "ZNC" section below).
335
 1. We emulate the [ZNC playback module](https://wiki.znc.in/Playback) for clients that support it. You may need to enable support for it explicitly in your client (see the "ZNC" section below).
327
 1. If you are not using the multiclient functionality, but your client is set to be always-on (see the previous section for details), Oragono will remember the last time your client signed out. You can then set your account to replay only messages you missed with `/msg NickServ set autoreplay-missed on`. Unfortunately, this feature will only work reliably if you are *not* using the multiclient functionality described in the above section --- you must be connecting with at most one client at a time.
336
 1. If you are not using the multiclient functionality, but your client is set to be always-on (see the previous section for details), Oragono will remember the last time your client signed out. You can then set your account to replay only messages you missed with `/msg NickServ set autoreplay-missed on`. Unfortunately, this feature will only work reliably if you are *not* using the multiclient functionality described in the above section --- you must be connecting with at most one client at a time.
328
 1. You can manually request history using `/history #channel 1h` (the parameter is either a message count or a time duration). (Depending on your client, you may need to use `/QUOTE history` instead.)
337
 1. You can manually request history using `/history #channel 1h` (the parameter is either a message count or a time duration). (Depending on your client, you may need to use `/QUOTE history` instead.)
335
 
344
 
336
 IP cloaking is a way of balancing these concerns about abuse with concerns about user privacy. With cloaking, the user's IP address is deterministically "scrambled", typically via a cryptographic [MAC](https://en.wikipedia.org/wiki/Message_authentication_code), to form a "cloaked" hostname that replaces the usual reverse-DNS-based hostname. Users cannot reverse the scrambling to learn each other's IPs, but can ban a scrambled address the same way they would ban a regular hostname.
345
 IP cloaking is a way of balancing these concerns about abuse with concerns about user privacy. With cloaking, the user's IP address is deterministically "scrambled", typically via a cryptographic [MAC](https://en.wikipedia.org/wiki/Message_authentication_code), to form a "cloaked" hostname that replaces the usual reverse-DNS-based hostname. Users cannot reverse the scrambling to learn each other's IPs, but can ban a scrambled address the same way they would ban a regular hostname.
337
 
346
 
338
-Oragono supports cloaking, which can be enabled via the `server.ip-cloaking` section of the config. However, Oragono's cloaking behavior differs from other IRC software. Rather than scrambling each of the 4 bytes of the IPv4 address (or each 2-byte pair of the 8 such pairs of the IPv6 address) separately, the server administrator configures a CIDR length (essentially, a fixed number of most-significant-bits of the address). The CIDR (i.e., only the most significant portion of the address) is then scrambled atomically to produce the cloaked hostname. This errs on the side of user privacy, since knowing the cloaked hostname for one CIDR tells you nothing about the cloaked hostnames of other CIDRs --- the scheme reveals only whether two users are coming from the same CIDR. We suggest using 32-bit CIDRs for IPv4 (i.e., the whole address) and 64-bit CIDRs for IPv6, since these are the typical assignments made by ISPs to individual customers.
347
+Oragono supports cloaking, which is enabled by default (via the `server.ip-cloaking` section of the config). However, Oragono's cloaking behavior differs from other IRC software. Rather than scrambling each of the 4 bytes of the IPv4 address (or each 2-byte pair of the 8 such pairs of the IPv6 address) separately, the server administrator configures a CIDR length (essentially, a fixed number of most-significant-bits of the address). The CIDR (i.e., only the most significant portion of the address) is then scrambled atomically to produce the cloaked hostname. This errs on the side of user privacy, since knowing the cloaked hostname for one CIDR tells you nothing about the cloaked hostnames of other CIDRs --- the scheme reveals only whether two users are coming from the same CIDR. We suggest using 32-bit CIDRs for IPv4 (i.e., the whole address) and 64-bit CIDRs for IPv6, since these are the typical assignments made by ISPs to individual customers.
339
 
348
 
340
 Setting `server.ip-cloaking.num-bits` to 0 gives users cloaks that don't depend on their IP address information at all, which is an option for deployments where privacy is a more pressing concern than abuse. Holders of registered accounts can also use the vhost system (for details, `/msg HostServ HELP`.)
349
 Setting `server.ip-cloaking.num-bits` to 0 gives users cloaks that don't depend on their IP address information at all, which is an option for deployments where privacy is a more pressing concern than abuse. Holders of registered accounts can also use the vhost system (for details, `/msg HostServ HELP`.)
341
 
350
 
436
 1. Add the reverse proxy's IP to `proxy-allowed-from` and `ip-limits.exempted`. (Use `localhost` to exempt all loopback IPs and Unix domain sockets.)
445
 1. Add the reverse proxy's IP to `proxy-allowed-from` and `ip-limits.exempted`. (Use `localhost` to exempt all loopback IPs and Unix domain sockets.)
437
 1. Configure your reverse proxy to connect to an appropriate Oragono listener and send the PROXY line. In this [example nginx config](https://github.com/darwin-network/slash/commit/aae9ba08d70128eb4b700cade333fe824a53562d), nginx connects to Oragono via a Unix domain socket.
446
 1. Configure your reverse proxy to connect to an appropriate Oragono listener and send the PROXY line. In this [example nginx config](https://github.com/darwin-network/slash/commit/aae9ba08d70128eb4b700cade333fe824a53562d), nginx connects to Oragono via a Unix domain socket.
438
 
447
 
448
+## Client certificates
449
+
450
+Oragono supports authenticating to user accounts via TLS client certificates. The end user must enable the client certificate in their client and also enable SASL with the `EXTERNAL` method. To register an account using only a client certificate for authentication, connect with the client certificate and use `/NS REGISTER *` (or `/NS REGISTER * email@example.com` if email verification is enabled on the server). To add a client certificate to an existing account, obtain the SHA-256 fingerprint of the certificate (either by connecting with it and looking at your own `/WHOIS` response, in particular the `276 RPL_WHOISCERTFP` line, or using the openssl command `openssl x509 -noout -fingerprint -sha256 -in example_client_cert.pem`), then use the `/NS CERT` command).
451
+
452
+Client certificates are not supported over websockets due to a [Chrome bug](https://bugs.chromium.org/p/chromium/issues/detail?id=329884).
453
+
439
 
454
 
440
 --------------------------------------------------------------------------------------------
455
 --------------------------------------------------------------------------------------------
441
 
456
 
687
 
702
 
688
 If you're looking for a bot that supports modern IRCv3 features, check out [bitbot](https://github.com/jesopo/bitbot/)!
703
 If you're looking for a bot that supports modern IRCv3 features, check out [bitbot](https://github.com/jesopo/bitbot/)!
689
 
704
 
705
+## Kiwi IRC
706
+
707
+[Kiwi IRC](https://github.com/kiwiirc/kiwiirc/) is a web-based IRC client with excellent IRCv3 support. In particular, it is the only major client to fully support Oragono's server-side history features. For a demonstration of these features, see the [Oragono testnet](https://testnet.oragono.io/kiwi).
708
+
709
+Current versions of Kiwi are 100% static files (HTML and Javascript), running entirely in the end user's browser without the need for a separate server-side backend. This frontend can connect directly to Oragono, using Oragono's support for native websockets. For best interoperability with firewalls, you should run an externally facing web server on port 443 that can serve both the static files and the websocket path, then have it reverse-proxy the websocket path to Oragono. For example, configure the following listener in ircd.yaml:
710
+
711
+```yaml
712
+        "127.0.0.1:8067":
713
+            websocket: true
714
+```
715
+
716
+then the following location block in your nginx config (this proxies only `/webirc` on your server to Oragono's websocket listener):
717
+
718
+```
719
+	location /webirc {
720
+		proxy_pass http://127.0.0.1:8067;
721
+		proxy_http_version 1.1;
722
+		proxy_set_header Upgrade $http_upgrade;
723
+		proxy_set_header Connection "Upgrade";
724
+		proxy_set_header X-Forwarded-For $remote_addr;
725
+		proxy_set_header X-Forwarded-Proto $scheme;
726
+	}
727
+```
728
+
729
+then add the following `startupOptions` to Kiwi's `static/config.json` file (see the [Oragono testnet's config.json](https://testnet.oragono.io/kiwi/static/config.json) for a fully functional example):
730
+
731
+```
732
+    "startupOptions" : {
733
+        "websocket": "wss://domain.example.com/webirc",
734
+        "channel": "#chat",
735
+        "nick": "kiwi-n?"
736
+    },
737
+```
738
+
690
 ## Hybrid Open Proxy Monitor (HOPM)
739
 ## Hybrid Open Proxy Monitor (HOPM)
691
 
740
 
692
 [hopm](https://github.com/ircd-hybrid/hopm) can be used to monitor your server for connections from open proxies, then automatically ban them. To configure hopm to work with oragono, add operator blocks like this to your oragono config file, which grant hopm the necessary privileges:
741
 [hopm](https://github.com/ircd-hybrid/hopm) can be used to monitor your server for connections from open proxies, then automatically ban them. To configure hopm to work with oragono, add operator blocks like this to your oragono config file, which grant hopm the necessary privileges:

+ 2
- 2
oragono.yaml View File

178
             fingerprint: "abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789"
178
             fingerprint: "abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789"
179
 
179
 
180
             # password the gateway uses to connect, made with oragono genpasswd
180
             # password the gateway uses to connect, made with oragono genpasswd
181
-            password: "$2a$04$sLEFDpIOyUp55e6gTMKbOeroT6tMXTjPFvA0eGvwvImVR9pkwv7ee"
181
+            password: "$2a$04$abcdef0123456789abcdef0123456789abcdef0123456789abcde"
182
 
182
 
183
             # addresses/CIDRs that can use this webirc command
183
             # addresses/CIDRs that can use this webirc command
184
             # you should also add these addresses to the connection limits and throttling exemption lists
184
             # you should also add these addresses to the connection limits and throttling exemption lists
615
         # or by certificate fingerprint, or both. if a password hash is set, then a
615
         # or by certificate fingerprint, or both. if a password hash is set, then a
616
         # password is required to oper up (e.g., /OPER dan mypassword). to generate
616
         # password is required to oper up (e.g., /OPER dan mypassword). to generate
617
         # the hash, use `oragono genpasswd`.
617
         # the hash, use `oragono genpasswd`.
618
-        password: "$2a$04$LiytCxaY0lI.guDj2pBN4eLRD5cdM2OLDwqmGAgB6M2OPirbF5Jcu"
618
+        password: "$2a$04$0123456789abcdef0123456789abcdef0123456789abcdef01234"
619
 
619
 
620
         # if a SHA-256 certificate fingerprint is configured here, then it will be
620
         # if a SHA-256 certificate fingerprint is configured here, then it will be
621
         # required to /OPER. if you comment out the password hash above, then you can
621
         # required to /OPER. if you comment out the password hash above, then you can

Loading…
Cancel
Save