You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

oragono.yaml 27KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684
  1. # oragono IRCd config
  2. # network configuration
  3. network:
  4. # name of the network
  5. name: OragonoTest
  6. # server configuration
  7. server:
  8. # server name
  9. name: oragono.test
  10. # addresses to listen on
  11. listeners:
  12. # The standard plaintext port for IRC is 6667. This will listen on all interfaces:
  13. ":6667":
  14. # Allowing plaintext over the public Internet poses security and privacy issues,
  15. # so if possible, we recommend that you comment out the above line and replace
  16. # it with these two, which listen only on local interfaces:
  17. # "127.0.0.1:6667": # (loopback ipv4, localhost-only)
  18. # "[::1]:6667": # (loopback ipv6, localhost-only)
  19. # Alternately, if you have a TLS certificate issued by a recognized CA,
  20. # you can configure port 6667 as an STS-only listener that only serves
  21. # "redirects" to the TLS port, but doesn't allow chat. See the manual
  22. # for details.
  23. # The standard SSL/TLS port for IRC is 6697. This will listen on all interfaces:
  24. ":6697":
  25. tls:
  26. key: tls.key
  27. cert: tls.crt
  28. # 'proxy' should typically be false. It's only for Kubernetes-style load
  29. # balancing that does not terminate TLS, but sends an initial PROXY line
  30. # in plaintext.
  31. proxy: false
  32. # Example of a Unix domain socket for proxying:
  33. # "/tmp/oragono_sock":
  34. # Example of a Tor listener: any connection that comes in on this listener will
  35. # be considered a Tor connection. It is strongly recommended that this listener
  36. # *not* be on a public interface --- it should be on 127.0.0.0/8 or unix domain:
  37. # "/hidden_service_sockets/oragono_tor_sock":
  38. # tor: true
  39. # sets the permissions for Unix listen sockets. on a typical Linux system,
  40. # the default is 0775 or 0755, which prevents other users/groups from connecting
  41. # to the socket. With 0777, it behaves like a normal TCP socket
  42. # where anyone can connect.
  43. unix-bind-mode: 0777
  44. # configure the behavior of Tor listeners (ignored if you didn't enable any):
  45. tor-listeners:
  46. # if this is true, connections from Tor must authenticate with SASL
  47. require-sasl: false
  48. # what hostname should be displayed for Tor connections?
  49. vhost: "tor-network.onion"
  50. # allow at most this many connections at once (0 for no limit):
  51. max-connections: 64
  52. # connection throttling (limit how many connection attempts are allowed at once):
  53. throttle-duration: 10m
  54. # set to 0 to disable throttling:
  55. max-connections-per-duration: 64
  56. # strict transport security, to get clients to automagically use TLS
  57. sts:
  58. # whether to advertise STS
  59. #
  60. # to stop advertising STS, leave this enabled and set 'duration' below to "0". this will
  61. # advertise to connecting users that the STS policy they have saved is no longer valid
  62. enabled: false
  63. # how long clients should be forced to use TLS for.
  64. # setting this to a too-long time will mean bad things if you later remove your TLS.
  65. # the default duration below is 1 month, 2 days and 5 minutes.
  66. duration: 1mo2d5m
  67. # tls port - you should be listening on this port above
  68. port: 6697
  69. # should clients include this STS policy when they ship their inbuilt preload lists?
  70. preload: false
  71. # casemapping controls what kinds of strings are permitted as identifiers (nicknames,
  72. # channel names, account names, etc.), and how they are normalized for case.
  73. # with the recommended default of 'precis', utf-8 identifiers that are "sane"
  74. # (according to RFC 8265) are allowed, and the server additionally tries to protect
  75. # against confusable characters ("homoglyph attacks").
  76. # the other options are 'ascii' (traditional ASCII-only identifiers), and 'permissive',
  77. # which allows identifiers to contain unusual characters like emoji, but makes users
  78. # vulnerable to homoglyph attacks. unless you're really confident in your decision,
  79. # we recommend leaving this value at its default (changing it once the network is
  80. # already up and running is problematic).
  81. casemapping: "precis"
  82. # whether to look up user hostnames with reverse DNS
  83. # (to suppress this for privacy purposes, use the ip-cloaking options below)
  84. lookup-hostnames: true
  85. # whether to confirm hostname lookups using "forward-confirmed reverse DNS", i.e., for
  86. # any hostname returned from reverse DNS, resolve it back to an IP address and reject it
  87. # unless it matches the connecting IP
  88. forward-confirm-hostnames: true
  89. # use ident protocol to get usernames
  90. check-ident: false
  91. # password to login to the server
  92. # generated using "oragono genpasswd"
  93. #password: ""
  94. # motd filename
  95. # if you change the motd, you should move it to ircd.motd
  96. motd: oragono.motd
  97. # motd formatting codes
  98. # if this is true, the motd is escaped using formatting codes like $c, $b, and $i
  99. motd-formatting: true
  100. # addresses/CIDRs the PROXY command can be used from
  101. # this should be restricted to 127.0.0.1/8 and ::1/128 (unless you have a good reason)
  102. # you should also add these addresses to the connection limits and throttling exemption lists
  103. proxy-allowed-from:
  104. # - localhost
  105. # - "192.168.1.1"
  106. # - "192.168.10.1/24"
  107. # controls the use of the WEBIRC command (by IRC<->web interfaces, bouncers and similar)
  108. webirc:
  109. # one webirc block -- should correspond to one set of gateways
  110. -
  111. # SHA-256 fingerprint of the TLS certificate the gateway must use to connect
  112. # (comment this out to use passwords only)
  113. fingerprint: "abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789"
  114. # password the gateway uses to connect, made with oragono genpasswd
  115. password: "$2a$04$sLEFDpIOyUp55e6gTMKbOeroT6tMXTjPFvA0eGvwvImVR9pkwv7ee"
  116. # addresses/CIDRs that can use this webirc command
  117. # you should also add these addresses to the connection limits and throttling exemption lists
  118. hosts:
  119. # - localhost
  120. # - "192.168.1.1"
  121. # - "192.168.10.1/24"
  122. # allow use of the RESUME extension over plaintext connections:
  123. # do not enable this unless the ircd is only accessible over internal networks
  124. allow-plaintext-resume: false
  125. # maximum length of clients' sendQ in bytes
  126. # this should be big enough to hold bursts of channel/direct messages
  127. max-sendq: 96k
  128. # compatibility with legacy clients
  129. compatibility:
  130. # many clients require that the final parameter of certain messages be an
  131. # RFC1459 trailing parameter, i.e., prefixed with :, whether or not this is
  132. # actually required. this forces Oragono to send those parameters
  133. # as trailings. this is recommended unless you're testing clients for conformance;
  134. # defaults to true when unset for that reason.
  135. force-trailing: true
  136. # some clients (ZNC 1.6.x and lower, Pidgin 2.12 and lower) do not
  137. # respond correctly to SASL messages with the server name as a prefix:
  138. # https://github.com/znc/znc/issues/1212
  139. # this works around that bug, allowing them to use SASL.
  140. send-unprefixed-sasl: true
  141. # IP-based DoS protection
  142. ip-limits:
  143. # whether to limit the total number of concurrent connections per IP/CIDR
  144. count: true
  145. # maximum concurrent connections per IP/CIDR
  146. max-concurrent-connections: 16
  147. # whether to restrict the rate of new connections per IP/CIDR
  148. throttle: true
  149. # how long to keep track of connections for
  150. window: 10m
  151. # maximum number of new connections per IP/CIDR within the given duration
  152. max-connections-per-window: 32
  153. # how long to ban offenders for. after banning them, the number of connections is
  154. # reset, which lets you use /UNDLINE to unban people
  155. throttle-ban-duration: 10m
  156. # how wide the CIDR should be for IPv4 (a /32 is a fully specified IPv4 address)
  157. cidr-len-ipv4: 32
  158. # how wide the CIDR should be for IPv6 (a /64 is the typical prefix assigned
  159. # by an ISP to an individual customer for their LAN)
  160. cidr-len-ipv6: 64
  161. # IPs/networks which are exempted from connection limits
  162. exempted:
  163. - "localhost"
  164. # - "192.168.1.1"
  165. # - "2001:0db8::/32"
  166. # custom connection limits for certain IPs/networks. note that CIDR
  167. # widths defined here override the default CIDR width --- the limit
  168. # will apply to the entire CIDR no matter how large or small it is
  169. custom-limits:
  170. # "8.8.0.0/16":
  171. # max-concurrent-connections: 128
  172. # max-connections-per-window: 1024
  173. # IP cloaking hides users' IP addresses from other users and from channel admins
  174. # (but not from server admins), while still allowing channel admins to ban
  175. # offending IP addresses or networks. In place of hostnames derived from reverse
  176. # DNS, users see fake domain names like pwbs2ui4377257x8.oragono. These names are
  177. # generated deterministically from the underlying IP address, but if the underlying
  178. # IP is not already known, it is infeasible to recover it from the cloaked name.
  179. ip-cloaking:
  180. # whether to enable IP cloaking
  181. enabled: false
  182. # fake TLD at the end of the hostname, e.g., pwbs2ui4377257x8.oragono
  183. netname: "oragono"
  184. # secret key to prevent dictionary attacks against cloaked IPs
  185. # any high-entropy secret is valid for this purpose:
  186. # you MUST generate a new one for your installation.
  187. # suggestion: use the output of `oragono mksecret`
  188. # note that rotating this key will invalidate all existing ban masks.
  189. secret: "siaELnk6Kaeo65K3RCrwJjlWaZ-Bt3WuZ2L8MXLbNb4"
  190. # name of an environment variable to pull the secret from, for use with
  191. # k8s secret distribution:
  192. # secret-environment-variable: "ORAGONO_CLOAKING_SECRET"
  193. # the cloaked hostname is derived only from the CIDR (most significant bits
  194. # of the IP address), up to a configurable number of bits. this is the
  195. # granularity at which bans will take effect for IPv4. Note that changing
  196. # this value will invalidate any stored bans.
  197. cidr-len-ipv4: 32
  198. # analogous granularity for IPv6
  199. cidr-len-ipv6: 64
  200. # number of bits of hash output to include in the cloaked hostname.
  201. # more bits means less likelihood of distinct IPs colliding,
  202. # at the cost of a longer cloaked hostname. if this value is set to 0,
  203. # all users will receive simply `netname` as their cloaked hostname.
  204. num-bits: 80
  205. # account options
  206. accounts:
  207. # is account authentication enabled, i.e., can users log into existing accounts?
  208. authentication-enabled: true
  209. # account registration
  210. registration:
  211. # can users register new accounts for themselves? if this is false, operators with
  212. # the `accreg` capability can still create accounts with `/NICKSERV SAREGISTER`
  213. enabled: true
  214. # this is the bcrypt cost we'll use for account passwords
  215. bcrypt-cost: 12
  216. # length of time a user has to verify their account before it can be re-registered
  217. verify-timeout: "32h"
  218. # callbacks to allow
  219. enabled-callbacks:
  220. - none # no verification needed, will instantly register successfully
  221. # example configuration for sending verification emails via a local mail relay
  222. # callbacks:
  223. # mailto:
  224. # server: localhost
  225. # port: 25
  226. # tls:
  227. # enabled: false
  228. # username: ""
  229. # password: ""
  230. # sender: "admin@my.network"
  231. # throttle account login attempts (to prevent either password guessing, or DoS
  232. # attacks on the server aimed at forcing repeated expensive bcrypt computations)
  233. login-throttling:
  234. enabled: true
  235. # window
  236. duration: 1m
  237. # number of attempts allowed within the window
  238. max-attempts: 3
  239. # some clients (notably Pidgin and Hexchat) offer only a single password field,
  240. # which makes it impossible to specify a separate server password (for the PASS
  241. # command) and SASL password. if this option is set to true, a client that
  242. # successfully authenticates with SASL will not be required to send
  243. # PASS as well, so it can be configured to authenticate with SASL only.
  244. skip-server-password: false
  245. # require-sasl controls whether clients are required to have accounts
  246. # (and sign into them using SASL) to connect to the server
  247. require-sasl:
  248. # if this is enabled, all clients must authenticate with SASL while connecting
  249. enabled: false
  250. # IPs/CIDRs which are exempted from the account requirement
  251. exempted:
  252. - "localhost"
  253. # - '10.10.0.0/16'
  254. # nick-reservation controls how, and whether, nicknames are linked to accounts
  255. nick-reservation:
  256. # is there any enforcement of reserved nicknames?
  257. enabled: true
  258. # how many nicknames, in addition to the account name, can be reserved?
  259. additional-nick-limit: 2
  260. # method describes how nickname reservation is handled
  261. # timeout: let the user change to the registered nickname, give them X seconds
  262. # to login and then rename them if they haven't done so
  263. # strict: don't let the user change to the registered nickname unless they're
  264. # already logged-in using SASL or NickServ
  265. # optional: no enforcement by default, but allow users to opt in to
  266. # the enforcement level of their choice
  267. #
  268. # 'optional' matches the behavior of other NickServs, but 'strict' is
  269. # preferable if all your users can enable SASL.
  270. method: optional
  271. # allow users to set their own nickname enforcement status, e.g.,
  272. # to opt in to strict enforcement
  273. allow-custom-enforcement: true
  274. # rename-timeout - this is how long users have 'til they're renamed
  275. rename-timeout: 30s
  276. # rename-prefix - this is the prefix to use when renaming clients (e.g. Guest-AB54U31)
  277. rename-prefix: Guest-
  278. # bouncer controls whether oragono can act as a bouncer, i.e., allowing
  279. # multiple connections to attach to the same client/nickname identity
  280. bouncer:
  281. # when disabled, each connection must use a separate nickname (as is the
  282. # typical behavior of IRC servers). when enabled, a new connection that
  283. # has authenticated with SASL can associate itself with an existing
  284. # client
  285. enabled: true
  286. # clients can opt in to bouncer functionality using the cap system, or
  287. # via nickserv. if this is enabled, then they have to opt out instead
  288. allowed-by-default: false
  289. # vhosts controls the assignment of vhosts (strings displayed in place of the user's
  290. # hostname/IP) by the HostServ service
  291. vhosts:
  292. # are vhosts enabled at all?
  293. enabled: true
  294. # maximum length of a vhost
  295. max-length: 64
  296. # regexp for testing the validity of a vhost
  297. # (make sure any changes you make here are RFC-compliant)
  298. valid-regexp: '^[0-9A-Za-z.\-_/]+$'
  299. # options controlling users requesting vhosts:
  300. user-requests:
  301. # can users request vhosts at all? if this is false, operators with the
  302. # 'vhosts' capability can still assign vhosts manually
  303. enabled: false
  304. # if uncommented, all new vhost requests will be dumped into the given
  305. # channel, so opers can review them as they are sent in. ensure that you
  306. # have registered and restricted the channel appropriately before you
  307. # uncomment this.
  308. #channel: "#vhosts"
  309. # after a user's vhost has been approved or rejected, they need to wait
  310. # this long (starting from the time of their original request)
  311. # before they can request a new one.
  312. cooldown: 168h
  313. # vhosts that users can take without approval, using `/HS TAKE`
  314. offer-list:
  315. #- "oragono.test"
  316. # support for deferring password checking to an external LDAP server
  317. # you should probably ignore this section! consult the grafana docs for details:
  318. # https://grafana.com/docs/grafana/latest/auth/ldap/
  319. # you will probably want to set require-sasl and disable accounts.registration.enabled
  320. # ldap:
  321. # enabled: true
  322. # # should we automatically create users if their LDAP login succeeds?
  323. # autocreate: true
  324. # # example configuration that works with Forum Systems's testing server:
  325. # # https://www.forumsys.com/tutorials/integration-how-to/ldap/online-ldap-test-server/
  326. # host: "ldap.forumsys.com"
  327. # port: 389
  328. # timeout: 30s
  329. # # example "single-bind" configuration, where we bind directly to the user's entry:
  330. # bind-dn: "uid=%s,dc=example,dc=com"
  331. # # example "admin bind" configuration, where we bind to an initial admin user,
  332. # # then search for the user's entry with a search filter:
  333. # #search-base-dns:
  334. # # - "dc=example,dc=com"
  335. # #bind-dn: "cn=read-only-admin,dc=example,dc=com"
  336. # #bind-password: "password"
  337. # #search-filter: "(uid=%s)"
  338. # # example of requiring that users be in a particular group
  339. # # (note that this is an OR over the listed groups, not an AND):
  340. # #require-groups:
  341. # # - "ou=mathematicians,dc=example,dc=com"
  342. # #group-search-filter-user-attribute: "dn"
  343. # #group-search-filter: "(uniqueMember=%s)"
  344. # #group-search-base-dns:
  345. # # - "dc=example,dc=com"
  346. # # example of group membership testing via user attributes, as in AD
  347. # # or with OpenLDAP's "memberOf overlay" (overrides group-search-filter):
  348. # attributes:
  349. # member-of: "memberOf"
  350. # channel options
  351. channels:
  352. # modes that are set when new channels are created
  353. # +n is no-external-messages and +t is op-only-topic
  354. # see /QUOTE HELP cmodes for more channel modes
  355. default-modes: +nt
  356. # how many channels can a client be in at once?
  357. max-channels-per-client: 100
  358. # if this is true, new channels can only be created by operators with the
  359. # `chanreg` operator capability
  360. operator-only-creation: false
  361. # channel registration - requires an account
  362. registration:
  363. # can users register new channels?
  364. enabled: true
  365. # how many channels can each account register?
  366. max-channels-per-account: 15
  367. # operator classes
  368. oper-classes:
  369. # local operator
  370. "local-oper":
  371. # title shown in WHOIS
  372. title: Local Operator
  373. # capability names
  374. capabilities:
  375. - "oper:local_kill"
  376. - "oper:local_ban"
  377. - "oper:local_unban"
  378. - "nofakelag"
  379. # network operator
  380. "network-oper":
  381. # title shown in WHOIS
  382. title: Network Operator
  383. # oper class this extends from
  384. extends: "local-oper"
  385. # capability names
  386. capabilities:
  387. - "oper:remote_kill"
  388. - "oper:remote_ban"
  389. - "oper:remote_unban"
  390. # server admin
  391. "server-admin":
  392. # title shown in WHOIS
  393. title: Server Admin
  394. # oper class this extends from
  395. extends: "local-oper"
  396. # capability names
  397. capabilities:
  398. - "oper:rehash"
  399. - "oper:die"
  400. - "accreg"
  401. - "sajoin"
  402. - "samode"
  403. - "vhosts"
  404. - "chanreg"
  405. # ircd operators
  406. opers:
  407. # operator named 'dan'
  408. dan:
  409. # which capabilities this oper has access to
  410. class: "server-admin"
  411. # custom whois line
  412. whois-line: is a cool dude
  413. # custom hostname
  414. vhost: "n"
  415. # modes are the modes to auto-set upon opering-up
  416. modes: +is acjknoqtuxv
  417. # operators can be authenticated either by password (with the /OPER command),
  418. # or by certificate fingerprint, or both. if a password hash is set, then a
  419. # password is required to oper up (e.g., /OPER dan mypassword). to generate
  420. # the hash, use `oragono genpasswd`.
  421. password: "$2a$04$LiytCxaY0lI.guDj2pBN4eLRD5cdM2OLDwqmGAgB6M2OPirbF5Jcu"
  422. # if a SHA-256 certificate fingerprint is configured here, then it will be
  423. # required to /OPER. if you comment out the password hash above, then you can
  424. # /OPER without a password.
  425. #fingerprint: "abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789"
  426. # if 'auto' is set (and no password hash is set), operator permissions will be
  427. # granted automatically as soon as you connect with the right fingerprint.
  428. #auto: true
  429. # logging, takes inspiration from Insp
  430. logging:
  431. -
  432. # how to log these messages
  433. #
  434. # file log to given target filename
  435. # stdout log to stdout
  436. # stderr log to stderr
  437. # (you can specify multiple methods, e.g., to log to both stderr and a file)
  438. method: stderr
  439. # filename to log to, if file method is selected
  440. # filename: ircd.log
  441. # type(s) of logs to keep here. you can use - to exclude those types
  442. #
  443. # exclusions take precedent over inclusions, so if you exclude a type it will NEVER
  444. # be logged, even if you explicitly include it
  445. #
  446. # useful types include:
  447. # * everything (usually used with exclusing some types below)
  448. # server server startup, rehash, and shutdown events
  449. # accounts account registration and authentication
  450. # channels channel creation and operations
  451. # commands command calling and operations
  452. # opers oper actions, authentication, etc
  453. # services actions related to NickServ, ChanServ, etc.
  454. # internal unexpected runtime behavior, including potential bugs
  455. # userinput raw lines sent by users
  456. # useroutput raw lines sent to users
  457. type: "* -userinput -useroutput"
  458. # one of: debug info warn error
  459. level: info
  460. #-
  461. # # example of a file log that avoids logging IP addresses
  462. # method: file
  463. # filename: ircd.log
  464. # type: "* -userinput -useroutput -localconnect -localconnect-ip"
  465. # level: debug
  466. # debug options
  467. debug:
  468. # when enabled, oragono will attempt to recover from certain kinds of
  469. # client-triggered runtime errors that would normally crash the server.
  470. # this makes the server more resilient to DoS, but could result in incorrect
  471. # behavior. deployments that would prefer to "start from scratch", e.g., by
  472. # letting the process crash and auto-restarting it with systemd, can set
  473. # this to false.
  474. recover-from-errors: true
  475. # optionally expose a pprof http endpoint: https://golang.org/pkg/net/http/pprof/
  476. # it is strongly recommended that you don't expose this on a public interface;
  477. # if you need to access it remotely, you can use an SSH tunnel.
  478. # set to `null`, "", leave blank, or omit to disable
  479. # pprof-listener: "localhost:6060"
  480. # datastore configuration
  481. datastore:
  482. # path to the datastore
  483. path: ircd.db
  484. # if the database schema requires an upgrade, `autoupgrade` will attempt to
  485. # perform it automatically on startup. the database will be backed
  486. # up, and if the upgrade fails, the original database will be restored.
  487. autoupgrade: true
  488. # languages config
  489. languages:
  490. # whether to load languages
  491. enabled: true
  492. # default language to use for new clients
  493. # 'en' is the default English language in the code
  494. default: en
  495. # which directory contains our language files
  496. path: languages
  497. # limits - these need to be the same across the network
  498. limits:
  499. # nicklen is the max nick length allowed
  500. nicklen: 32
  501. # identlen is the max ident length allowed
  502. identlen: 20
  503. # channellen is the max channel length allowed
  504. channellen: 64
  505. # awaylen is the maximum length of an away message
  506. awaylen: 500
  507. # kicklen is the maximum length of a kick message
  508. kicklen: 1000
  509. # topiclen is the maximum length of a channel topic
  510. topiclen: 1000
  511. # maximum number of monitor entries a client can have
  512. monitor-entries: 100
  513. # whowas entries to store
  514. whowas-entries: 100
  515. # maximum length of channel lists (beI modes)
  516. chan-list-modes: 60
  517. # maximum number of messages to accept during registration (prevents
  518. # DoS / resource exhaustion attacks):
  519. registration-messages: 1024
  520. # message length limits for the new multiline cap
  521. multiline:
  522. max-bytes: 4096 # 0 means disabled
  523. max-lines: 100 # 0 means no limit
  524. # fakelag: prevents clients from spamming commands too rapidly
  525. fakelag:
  526. # whether to enforce fakelag
  527. enabled: true
  528. # time unit for counting command rates
  529. window: 1s
  530. # clients can send this many commands without fakelag being imposed
  531. burst-limit: 5
  532. # once clients have exceeded their burst allowance, they can send only
  533. # this many commands per `window`:
  534. messages-per-window: 2
  535. # client status resets to the default state if they go this long without
  536. # sending any commands:
  537. cooldown: 2s
  538. # message history tracking, for the RESUME extension and possibly other uses in future
  539. history:
  540. # should we store messages for later playback?
  541. # the current implementation stores messages in RAM only; they do not persist
  542. # across server restarts. however, you should not enable this unless you understand
  543. # how it interacts with the GDPR and/or any data privacy laws that apply
  544. # in your country and the countries of your users.
  545. enabled: false
  546. # how many channel-specific events (messages, joins, parts) should be tracked per channel?
  547. channel-length: 1024
  548. # how many direct messages and notices should be tracked per user?
  549. client-length: 256
  550. # how long should we try to preserve messages?
  551. # if `autoresize-window` is 0, the in-memory message buffers are preallocated to
  552. # their maximum length. if it is nonzero, the buffers are initially small and
  553. # are dynamically expanded up to the maximum length. if the buffer is full
  554. # and the oldest message is older than `autoresize-window`, then it will overwrite
  555. # the oldest message rather than resize; otherwise, it will expand if possible.
  556. autoresize-window: 1h
  557. # number of messages to automatically play back on channel join (0 to disable):
  558. autoreplay-on-join: 0
  559. # maximum number of CHATHISTORY messages that can be
  560. # requested at once (0 disables support for CHATHISTORY)
  561. chathistory-maxmessages: 100