Advertisement
Guest User

Untitled

a guest
Sep 15th, 2015
188
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 16.19 KB | None | 0 0
  1. /* doc/example.conf - brief example configuration file
  2. *
  3. * Copyright (C) 2000-2002 Hybrid Development Team
  4. * Copyright (C) 2002-2005 ircd-ratbox development team
  5. * Copyright (C) 2005-2006 charybdis development team
  6. *
  7. * $Id: example.conf 3582 2007-11-17 21:55:48Z jilles $
  8. *
  9. * See reference.conf for more information.
  10. */
  11.  
  12. /* Extensions */
  13. loadmodule "extensions/chm_adminonly.so";
  14. loadmodule "extensions/chm_operonly.so";
  15. loadmodule "extensions/chm_sslonly.so";
  16. loadmodule "extensions/extb_account.so";
  17. loadmodule "extensions/extb_canjoin.so";
  18. loadmodule "extensions/extb_channel.so";
  19. loadmodule "extensions/extb_extgecos.so";
  20. loadmodule "extensions/extb_oper.so";
  21. loadmodule "extensions/extb_realname.so";
  22. loadmodule "extensions/extb_server.so";
  23. loadmodule "extensions/extb_ssl.so";
  24. loadmodule "extensions/hurt.so";
  25. loadmodule "extensions/ip_cloaking.so";
  26. #loadmodule "extensions/ip_cloaking_old.so";
  27. loadmodule "extensions/m_findforwards.so";
  28. loadmodule "extensions/m_identify.so";
  29. loadmodule "extensions/m_mkpasswd.so";
  30. loadmodule "extensions/m_webirc.so";
  31. loadmodule "extensions/m_forcejoin.so";
  32. loadmodule "extensions/m_forcepart.so";
  33. loadmodule "extensions/m_forcenick.so";
  34. loadmodule "extensions/m_cycle.so";
  35. loadmodule "extensions/m_forcejoin.so";
  36. loadmodule "extensions/m_forcepart.so";
  37. loadmodule "extensions/m_forcenick.so";
  38. loadmodule "extensions/m_oaccept.so";
  39. loadmodule "extensions/m_opme.so";
  40. loadmodule "extensions/m_ojoin.so";
  41. loadmodule "extensions/m_omode.so";
  42. loadmodule "extensions/m_olist.so";
  43. loadmodule "extensions/m_okick.so";
  44. loadmodule "modules/m_force.so";
  45. loadmodule "extensions/m_roleplay.so";
  46. loadmodule "extensions/no_oper_invis.so";
  47. loadmodule "extensions/sno_farconnect.so";
  48. loadmodule "extensions/sno_globalkline.so";
  49. loadmodule "extensions/sno_globaloper.so";
  50. loadmodule "extensions/sno_whois.so";
  51.  
  52. serverinfo {
  53. name = "lighting.sharkbnc.net";
  54. sid = "14F";
  55. description = "SharkBNC [Public Server]";
  56. network_name = "SharkBNC";
  57. network_desc = "SharkBNC [Public Server]";
  58. helpchan = "#help";
  59. helpurl = "http://sharkbnc.net";
  60. hub = yes;
  61.  
  62. /* On multi-homed hosts you may need the following. These define
  63. * the addresses we connect from to other servers. */
  64. /* for IPv4 */
  65. #vhost = "192.169.0.1";
  66. /* for IPv6 */
  67. #vhost6 = "3ffe:80e8:546::2";
  68.  
  69. /* ssl_private_key: our ssl private key */
  70. ssl_private_key = "etc/ssl.key";
  71.  
  72. /* ssl_cert: certificate for our ssl server */
  73. ssl_cert = "etc/ssl.cert";
  74.  
  75. /* ssl_dh_params: DH parameters, generate with openssl dhparam -out dh.pem 1024 */
  76. ssl_dh_params = "etc/dh.pem";
  77.  
  78. /* ssld_count: number of ssld processes you want to start, if you
  79. * have a really busy server, using N-1 where N is the number of
  80. * cpu/cpu cores you have might be useful. A number greater than one
  81. * can also be useful in case of bugs in ssld and because ssld needs
  82. * two file descriptors per SSL connection.
  83. */
  84. ssld_count = 1;
  85.  
  86. /* default max clients: the default maximum number of clients
  87. * allowed to connect. This can be changed once ircd has started by
  88. * issuing:
  89. * /quote set maxclients <limit>
  90. */
  91. default_max_clients = 2048;
  92. };
  93.  
  94. admin {
  95. name = "IRCBlaze Administration";
  96. description = "IRCBlaze Client Server";
  97. email = "root@sharkbnc.net";
  98. };
  99.  
  100. log {
  101. fname_userlog = "logs/userlog";
  102. #fname_fuserlog = "logs/fuserlog";
  103. fname_operlog = "logs/operlog";
  104. #fname_foperlog = "logs/foperlog";
  105. fname_serverlog = "logs/serverlog";
  106. #fname_klinelog = "logs/klinelog";
  107. fname_killlog = "logs/killlog";
  108. fname_operspylog = "logs/operspylog";
  109. #fname_ioerrorlog = "logs/ioerror";
  110. };
  111.  
  112. /* class {} blocks MUST be specified before anything that uses them. That
  113. * means they must be defined before auth {} and before connect {}.
  114. */
  115. class "users" {
  116. ping_time = 2 minutes;
  117. number_per_ident = 5;
  118. number_per_ip = 2;
  119. number_per_ip_global = 4;
  120. cidr_ipv4_bitlen = 24;
  121. cidr_ipv6_bitlen = 64;
  122. number_per_cidr = 200;
  123. max_number = 3000;
  124. sendq = 400 kbytes;
  125. };
  126.  
  127. class "opers" {
  128. ping_time = 5 minutes;
  129. number_per_ip = 10;
  130. max_number = 1000;
  131. sendq = 1 megabyte;
  132. };
  133.  
  134. class "server" {
  135. ping_time = 5 minutes;
  136. connectfreq = 5 minutes;
  137. max_number = 1;
  138. sendq = 4 megabytes;
  139. };
  140.  
  141. listen {
  142. /* If you want to listen on a specific IP only, specify host.
  143. * host definitions apply only to the following port line.
  144. */
  145. host = "104.236.11.127";
  146. port = 5000, 6665 .. 6669;
  147. sslport = 6697;
  148.  
  149. host = "104.236.11.127";
  150. port = 5000;
  151.  
  152. /* Listen on IPv6 (if you used host= above).
  153. * host = "2001:470:3018::6667";
  154. * port = 5000, 6665 .. 6669;
  155. * sslport = 6697;
  156. */
  157. };
  158.  
  159. /* auth {}: allow users to connect to the ircd (OLD I:)
  160. * auth {} blocks MUST be specified in order of precedence. The first one
  161. * that matches a user will be used. So place spoofs first, then specials,
  162. * then general access, then restricted.
  163. */
  164. auth {
  165. /* user: the user@host allowed to connect. Multiple IPv4/IPv6 user
  166. * lines are permitted per auth block. This is matched against the
  167. * hostname and IP address (using :: shortening for IPv6 and
  168. * prepending a 0 if it starts with a colon) and can also use CIDR
  169. * masks.
  170. */
  171. user = "*@172.16.0.0/12";
  172. user = "*test@123D:B567:*";
  173.  
  174. /* auth_user: The username (authenticated via SASL or PASS) allowed
  175. * to connect. You are able to put multiple auth_user lines. If people
  176. * are authenticating via SASL in this way, it is recommended to comment
  177. * out the password option below. You will also *NEED* to specify a user
  178. * line above auth_user, this can safely be "*@*", however.
  179. */
  180. auth_user = "jilles";
  181. auth_user = "jdhore";
  182.  
  183. /* password: an optional password that is required to use this block.
  184. * By default this is not encrypted, specify the flag "encrypted" in
  185. * flags = ...; below if it is.
  186. */
  187. password = "letmein";
  188.  
  189. /* spoof: fake the users user@host to be be this. You may either
  190. * specify a host or a user@host to spoof to. This is free-form,
  191. * just do everyone a favour and dont abuse it. (OLD I: = flag)
  192. */
  193. spoof = "I.still.hate.packets";
  194.  
  195. /* autojoin: Channel (or channels, comma-seperated) to join users
  196. * in this auth block to on connect. Note that this won't join
  197. * the user through any bans or otherwise restrictive chmodes.
  198. */
  199. autojoin = "#SharkBNC";
  200.  
  201. /* Possible flags in auth:
  202. *
  203. * encrypted | password is encrypted with mkpasswd
  204. * spoof_notice | give a notice when spoofing hosts
  205. * exceed_limit (old > flag) | allow user to exceed class user limits
  206. * kline_exempt (old ^ flag) | exempt this user from k/g/xlines&dnsbls
  207. * dnsbl_exempt | exempt this user from dnsbls
  208. * spambot_exempt | exempt this user from spambot checks
  209. * shide_exempt | exempt this user from serverhiding
  210. * jupe_exempt | exempt this user from generating
  211. * warnings joining juped channels
  212. * resv_exempt | exempt this user from resvs
  213. * flood_exempt | exempt this user from flood limits
  214. * USE WITH CAUTION.
  215. * no_tilde (old - flag) | don't prefix ~ to username if no ident
  216. * need_ident (old + flag) | require ident for user in this class
  217. * need_ssl | require SSL/TLS for user in this class
  218. * need_sasl | require SASL id for user in this class
  219. */
  220. flags = kline_exempt, exceed_limit;
  221.  
  222. /* class: the class the user is placed in */
  223. class = "opers";
  224. };
  225.  
  226. /* Example WEBIRC authblock */
  227. auth {
  228. /* user: webirc@IP.OF.YOUR.WEBIRC . the webirc@ part is required */
  229. user = "webirc@23.95.87.115";
  230.  
  231. /* password: password the webirc client sends in the WEBIRC command.
  232. * You can use a encrypted password here (see above auth block).
  233. */
  234. password = "fish";
  235.  
  236. /* spoof: This is required to keep it what it is currently if you
  237. * want the webirc client to show the users' real host as their
  238. * host on IRC.
  239. */
  240. spoof = "webirc.";
  241. class = "users";
  242. };
  243.  
  244. auth {
  245. user = "*@193.35.58.234"; user = "*@193.35.58.235";
  246. user = "*@193.35.58.236"; user = "*@139.162.195.43";user = "*@104.236.11.127"; user = "*@207.66.193.153"; autojoin = "#SharkBNC";
  247. spoof = "sharkbnc.net";
  248. flags = exceed_limit, dnsbl_exempt, no_tilde;
  249. class = "opers";
  250. };
  251.  
  252.  
  253.  
  254. auth {
  255. user = "*@64.62.228.82";
  256. user = "*@207.192.75.252";
  257. user = "*@78.129.202.38";
  258. user = "*@45.34.121.250";
  259. user = "*@109.169.29.95";
  260. password = "mightyducks25";
  261. spoof = "webirc.";
  262. class = "users";
  263. };
  264.  
  265. auth {
  266. user = "*@*";
  267. class = "users";
  268. flags = no_tilde;
  269. };
  270.  
  271. /* privset {} blocks MUST be specified before anything that uses them. That
  272. * means they must be defined before operator {}.
  273. */
  274. privset "local_op" {
  275. privs = oper:local_kill, oper:operwall;
  276. };
  277.  
  278. privset "server_bot" {
  279. extends = "local_op";
  280. privs = oper:kline, oper:remoteban, snomask:nick_changes;
  281. };
  282.  
  283. privset "global_op" {
  284. extends = "local_op";
  285. privs = oper:global_kill, oper:routing, oper:kline, oper:unkline, oper:xline,
  286. oper:resv, oper:mass_notice, oper:remoteban;
  287. };
  288.  
  289. privset "admin" {
  290. extends = "global_op";
  291. privs = oper:admin, oper:die, oper:rehash, oper:spy, oper:override, snomask:nick_changes;
  292. };
  293.  
  294. connect "services.sharkbnc.net" {
  295. host = "188.166.251.44";
  296. send_password = "LolHahHehYes123";
  297. accept_password = "LolHahHehYes123";
  298. port = 5000;
  299. hub_mask = "*";
  300. class = "server";
  301. flags = compressed, topicburst;
  302.  
  303. #fingerprint = "c77106576abf7f9f90cca0f63874a60f2e40a64b";
  304.  
  305. /* If the connection is IPv6, uncomment below.
  306. * Use 0::1, not ::1, for IPv6 localhost. */
  307. #aftype = ipv6;
  308. };
  309.  
  310. connect "janus.sharkbnc.net" {
  311. host = "*";
  312. send_password = "janus";
  313. accept_password = "janus";
  314. port = 5000;
  315. hub_mask = "*";
  316. class = "server";
  317. flags = compressed, topicburst, autoconn;
  318. };
  319. connect "relay.irc" {
  320. host = "108.196.9.243";
  321. send_password = "janus";
  322. accept_password = "janus";
  323. port = 8005;
  324. hub_mask = "*";
  325. class = "server";
  326. flags = topicburst, autoconn;
  327. };
  328.  
  329. service {
  330. name = "services.sharkbnc.net";
  331. };
  332.  
  333. cluster {
  334. name = "*";
  335. flags = kline, tkline, unkline, xline, txline, unxline, resv, tresv, unresv;
  336. };
  337.  
  338. shared {
  339. oper = "*@*", "*";
  340. flags = all;
  341. };
  342.  
  343. /* exempt {}: IPs that are exempt from Dlines and rejectcache. (OLD d:) */
  344. exempt {
  345. ip = "188.166.251.44";
  346. };
  347.  
  348. channel {
  349. #disabledmodes = "ME";
  350. autochanmodes = "nt";
  351. admin_on_channel_create = no;
  352. exemptchanops = "NT";
  353. use_halfop = yes;
  354. use_admin = yes;
  355. use_knock = yes;
  356. use_local_channels = yes;
  357. knock_delay = 5 minutes;
  358. knock_delay_channel = 1 minute;
  359. max_chans_per_user = 30;
  360. max_bans = 100;
  361. max_bans_large = 500;
  362. default_split_user_count = 0;
  363. default_split_server_count = 0;
  364. no_create_on_split = no;
  365. no_join_on_split = no;
  366. burst_topicwho = yes;
  367. kick_on_split_riding = no;
  368. only_ascii_channels = no;
  369. cycle_host_change = no;
  370. host_in_topic = yes;
  371. resv_forcepart = yes;
  372. channel_target_change = yes;
  373. };
  374.  
  375. serverhide {
  376. flatten_links = yes;
  377. links_delay = 5 minutes;
  378. hidden = no;
  379. disable_hidden = no;
  380. };
  381.  
  382. /* These are the blacklist settings.
  383. * You can have multiple combinations of host and rejection reasons.
  384. * They are used in pairs of one host/rejection reason.
  385. *
  386. * These settings should be adequate for most networks, and are (presently)
  387. * required for use on AthemeNet.
  388. *
  389. * Word to the wise: Do not use blacklists like SPEWS for blocking IRC
  390. * connections.
  391. *
  392. * As of charybdis 2.1.3, you can do some keyword substitution on the rejection
  393. * reason. The available keyword substitutions are:
  394. *
  395. * ${ip} - the user's IP
  396. * ${host} - the user's canonical hostname
  397. * ${dnsbl-host} - the dnsbl hostname the lookup was done against
  398. * ${nick} - the user's nickname
  399. * ${network-name} - the name of the network
  400. *
  401. * Note: AHBL (the providers of the below *.ahbl.org BLs) request that they be
  402. * contacted, via email, at admins@2mbit.com before using these BLs.
  403. * See <http://www.ahbl.org/services.php> for more information.
  404. */
  405. blacklist {
  406. host = "rbl.efnetrbl.org";
  407. reject_reason = "${nick}, your IP (${ip}) is listed in EFnet's RBL. For assistance, see http://efnetrbl.org/?i=${ip}";
  408.  
  409. host = "*";
  410. reject_reason = "${nick}, your IP (${ip}) is listed in DroneBL. For assistance, see http://dronebl.org/lookup_branded.do?ip=${ip}&network=${network-name}";
  411.  
  412. host = "*";
  413. reject_reason = "${nick}, your IP (${ip}) is listed in ${dnsbl-host} for abusive IRC behaviour. To prevent ${network-name} from abuse, we are not allowing connections from this IP address.";
  414.  
  415. # host = "tor.ahbl.org";
  416. # reject_reason = "${nick}, your IP (${ip}) is listed as a TOR exit node. In order to protect ${network-name} from tor-based abuse, we are not allowing TOR exit nodes to connect to our network.";
  417. };
  418.  
  419. alias "NickServ" {
  420. target = "NickServ";
  421. };
  422.  
  423. alias "ChanServ" {
  424. target = "ChanServ";
  425. };
  426.  
  427. alias "OperServ" {
  428. target = "OperServ";
  429. };
  430.  
  431. alias "MemoServ" {
  432. target = "MemoServ";
  433. };
  434.  
  435. alias "HostServ" {
  436. target = "HostServ";
  437. };
  438.  
  439. alias "BotServ" {
  440. target = "BotServ";
  441. };
  442.  
  443. alias "InfoServ" {
  444. target = "InfoServ";
  445. };
  446.  
  447. alias "GroupServ" {
  448. target = "GroupServ";
  449. };
  450.  
  451. alias "NS" {
  452. target = "NickServ";
  453. };
  454.  
  455. alias "CS" {
  456. target = "ChanServ";
  457. };
  458.  
  459. alias "OS" {
  460. target = "OperServ";
  461. };
  462.  
  463. alias "MS" {
  464. target = "MemoServ";
  465. };
  466.  
  467. alias "HS" {
  468. target = "HostServ";
  469. };
  470.  
  471. alias "BS" {
  472. target = "BotServ";
  473. };
  474.  
  475. alias "IS" {
  476. target = "InfoServ";
  477. };
  478.  
  479. alias "GS" {
  480. target = "GroupServ";
  481. };
  482.  
  483. general {
  484. hide_error_messages = opers;
  485. hide_spoof_ips = no;
  486.  
  487. /*
  488. * default umodes: umodes to set upon connection
  489. * If you have enabled the ip_cloaking extension, and you wish for
  490. * incoming clients to be cloaked upon connection, +x must be in
  491. * the umode string below.
  492. */
  493. default_umodes = "+ix";
  494.  
  495. default_operstring = "is an IRC Operator";
  496. default_adminstring = "is a Server Administrator";
  497. default_operhost = "staff.sharkbnc.net";
  498. #static_quit = "Client Quit";
  499. servicestring = "is a Network Service";
  500. disable_fake_channels = yes;
  501. hide_channel_below_users = 0;
  502. tkline_expire_notices = yes;
  503. default_floodcount = 10;
  504. failed_oper_notice = yes;
  505. dots_in_ident=2;
  506. min_nonwildcard = 4;
  507. min_nonwildcard_simple = 3;
  508. max_accept = 100;
  509. max_monitor = 100;
  510. anti_nick_flood = yes;
  511. max_nick_time = 20 seconds;
  512. max_nick_changes = 5;
  513. anti_spam_exit_message_time = 2 minutes;
  514. use_part_messages = yes;
  515. ts_warn_delta = 30 seconds;
  516. ts_max_delta = 5 minutes;
  517. client_exit = yes;
  518. collision_fnc = yes;
  519. global_snotices = yes;
  520. dline_with_reason = yes;
  521. kline_delay = 15 seconds;
  522. kline_with_reason = yes;
  523. kline_reason = "Quit: K-Lined";
  524. identify_service = "NickServ@services.sharkbnc.net";
  525. identify_command = "IDENTIFY";
  526. non_redundant_klines = yes;
  527. warn_no_nline = yes;
  528. use_propagated_bans = yes;
  529. stats_e_disabled = no;
  530. stats_c_oper_only=no;
  531. stats_h_oper_only=no;
  532. stats_y_oper_only=no;
  533. stats_o_oper_only=yes;
  534. stats_P_oper_only=no;
  535. stats_i_oper_only=masked;
  536. stats_k_oper_only=masked;
  537. map_oper_only = no;
  538. operspy_admin_only = no;
  539. operspy_dont_care_user_info = no;
  540. secret_channels_in_whois = no;
  541. caller_id_wait = 1 minute;
  542. pace_wait_simple = 1 second;
  543. pace_wait = 10 seconds;
  544. short_motd = no;
  545. ping_cookie = no;
  546. connect_timeout = 30 seconds;
  547. default_ident_timeout = 5;
  548. disable_auth = yes;
  549. no_oper_flood = yes;
  550. true_no_oper_flood = no;
  551. max_targets = 4;
  552. client_flood = 20;
  553. use_whois_actually = yes;
  554. oper_only_umodes = operwall, locops, servnotice;
  555. oper_umodes = locops, servnotice, operwall, wallop;
  556. oper_snomask = "+s";
  557. burst_away = yes;
  558. nick_delay = 0 seconds; # 15 minutes if you want to enable this
  559. reject_ban_time = 1 minute;
  560. reject_after_count = 3;
  561. reject_duration = 5 minutes;
  562. throttle_duration = 60;
  563. throttle_count = 4;
  564. expire_override_time = 5 minutes;
  565. };
  566.  
  567. modules {
  568. path = "modules";
  569. path = "modules/autoload";
  570. };
  571. .include "opers.conf"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement