about summary refs log tree commit diff
AgeCommit message (Collapse)Author
2024-04-11Update doc/Platforms.txtAlexander Barton
2024-04-11ngircd.service: Redirect stdout and stderr to the journalAlexander Barton
2024-04-06Prepare documentation for ngIRCd 27~rc1Alexander Barton
2024-04-06Ping the service manager and set a status messageAlexander Barton
Periodically "ping" the service manager (every 3 seconds) and set a status message showing connection statistics. This enables using the systemd(8) watchdog functionality for the "ngircd.service" unit.
2024-04-06Add support for the "sd_notify" protocolAlexander Barton
This allows the "ngircd.service" systemd(8) unit to use the "notify" service type, which allows for better status tracking by the service manager.
2024-04-05Add ".trunk" to .gitignore fileAlexander Barton
2024-04-05Test suite: wait for ERROR message on QUITAlexander Barton
Wait for the "ERROR :Closing connection" message sent by ngIRCd when handling the QUIT command, do not wait for "Connection closed" which is actually output by the telnet(1) command and is implementation dependant! For example, on Haiku OS, this is not always(!) echoed (the command seems to hang sometimes?) which results in unpredictable failures in the test suite ...
2024-04-05Test suite: simplify and enhance getpid.shAlexander Barton
- Try to only search for processes of the current user. - Prefer using pgrep (in addition to pidof) when available. - Streamline system overrides. - Get rid of HEAD_FLAGS: all systems so far support "-1". - Use "ps -o pid,comm" as the default, which is POSIX.1. - Use "sort -r" to hopefully get the newest (=highest) PID, which is the case on older systems not using randomized PIDs at least.
2024-04-05Test suite: clean up scriptsAlexander Barton
- Reformat code. - Cleanup some glitches, streamline scripts ... - Enable "set -u": Error on unset variables. - Detect "$srcdir" in prep-server3 script, too.
2024-04-02Revert "testsuite: Pass -nameopt to openssl s_client."Alexander Barton
Although this is a nice looking solution, it is not that portable: for example, the "openssl s_client" command of LibreSSL 3.8.2 on OpenBSD 7.4 does not support it. So let's revert back to the "uglier" but working variant ... This reverts commit bdb55fb4b322b2c84530855a3b5148a0e387f5b4.
2024-03-31Fix quoting in code examples in doc/Container.mdAlexander Barton
2024-03-31Change leftover GnuTLS "slot handling" messages to debug levelAlexander Barton
This completes commit f96966a6.
2024-03-31Add feature info to Debian package descriptionAlexander Barton
2024-03-31Try to set file descriptor limit to its maximum and show info on startupAlexander Barton
The number of possible parallel connections is limited by the process file descriptor limit (among other things). Therefore try to upgrade the current "soft" limit to its "hard" maximum (but limit it to 100000), and show an information or even warning, wenn still less than the configured "MaxConnections" setting. Please note that ngIRCd and its linked libraries (like PAM) need file descriptors not only for incoming and outgoing IRC connections, but for reading files and inter-process communication, too! Therefore the actual connection limit is _less_ than the file descriptor limit! This introduces the new MAX_FD_LIMIT (100000) #define.
2024-03-31ngircd.8: Update for the now always available debug-modeAlexander Barton
2024-03-31Update and fix logcheck(8) rulesAlexander Barton
2024-03-31S2S-SSL/GnuTLS: Enable CRL verificationChristoph Biedl
2024-03-23S2S-TLS: Fix "make check" in separate build directoryAlexander Barton
2024-03-23S2S-TLS: Add notice to INSTALL.mdAlexander Barton
2024-03-23S2S-TLS: Convert SSL.txt to Markdown and update information givenAlexander Barton
No longer describe creating self-signed certificates or using "stunnel", as both is not recommended.
2024-03-23S2S-TLS/GnuTLS: Fix handling of connections without peer certificatesAlexander Barton
2024-03-23S2S-TLS: Verify the TLS certificates by defaultAlexander Barton
This is already mentioned as the default in the manual page and the sample configuration file, but was actually not enabled in the code!
2024-03-23S2S-TLS/GnuTLS: Streamline loggingAlexander Barton
2024-03-23S2S-TLS/GnuTLS: Fix handling of certificate information for incoming connectionsAlexander Barton
Show proper certificate information for incoming connections, too, and not "peer did not present a certificate", regardless if the client sent a certificate or not. This change is for GnuTLS and similar to what was implemented in commit for OpenSSL in "S2S-TLS/OpenSSL: Fix handling of certificate information for incoming connections".
2024-03-23S2S-TLS/GnuTLS: Update SSL code for GnuTLS certificate reloadingAlexander Barton
Without this, the S2S-TLS-Patch not even compiles with GnuTLS because of the "new" GnuTLS certificate reload support implemented in commit eead4a63 ("x509_cred_slot").
2024-03-23S2S-TLS: MAX_CERT_CHAIN_LENGTH is only used by OpenSSLAlexander Barton
2024-03-23S2S-TLS: Fix formatting and sort new SSL options in ngircd.conf manual pageAlexander Barton
2024-03-23S2S-TLS/OpenSSL: Streamline loggingAlexander Barton
This includes simplifying cb_connserver_login_ssl() a bit, we do not have to code for invalid state which was ruled out by an assert() and therefore can get rid of the goto altogether (and don't log the same error twice with different messages).
2024-03-23S2S-TLS/OpenSSL: Postpone verification of TLS session right before server ↵Alexander Barton
handshake The verify callback in OpenSSL is called pretty early, and at that time it is not possible yet to check which connection it belongs to, and some connections may have relaxed requirements. So always return success in the Verify_openssl() callback, and postpone validation of the TLS session until starting the server handshake in cb_connserver_login_ssl(), when we know which server this connection belongs to and which options (like "SSLVerify") are in effect. The code doing this was already present in cb_connserver_login_ssl(), but this patch adds a more prominent comment to the function.
2024-03-23S2S-TLS/OpenSSL: Fix handling of certificate information for incoming ↵Alexander Barton
connections Show proper certificate information for incoming connections, too, and not "peer did not present a certificate", regardless if the client sent a certificate or not. And free the client certificate structure "peer_cert" on incoming connections as well!
2024-03-23S2S-TLS/OpenSSL: Set the verification flags only onceAlexander Barton
Set the verification flags in the ConnSSL_SetVerifyProperties_openssl function only, don't override them in ConnSSL_InitLibrary() afterwards. No functional changes, now ConnSSL_SetVerifyProperties_openssl() sets exactly the parameters which ConnSSL_InitLibrary() always overwrote ...
2024-03-23S2S-TLS/OpenSSL: Always setup host name verificationAlexander Barton
Setup host name verification even when the "SSLVerify" option is disabled, because even then the peer can present a valid certificate and validation would always(!) fail because of the missing host name verification setup.
2024-03-23S2S-TLS: Remove leftover debug messagesAlexander Barton
2024-03-23S2S-TLS: Add missing CAFile and CRLFile options to "configtest" outputAlexander Barton
2024-03-23Support for server certificate validation on server links [S2S-TLS]Christoph Biedl
This patch provides code to validate the server certificate in server links, defeating nasty man-in-the-middle attacks on server links. Features: - Check whether the certificate is signed by a trusted certificate authority (CA). - Check the host name, including wildcard certificates and Subject Alternative Names. - Optionally check against a certificate revocation list (CRL). - Implementation for both OpenSSL and GnuTLS linkage. Left for another day: - Parameterize the TLS parameter of an outbound connection. Currently, it's hardcoded to disable all versions before TLSv1.1. - Using certificate as CA-certificate. They work for GnuTLS only but perhaps this should rather raise an error there, too. - Optional OCSP checking. - Checking client certificates. Code is there but this first needs some consideration about the use cases. This could replace all other authentication methods, for both client-server and server-server connections. This patch is based on a patch by Florian Westphal from 2009, which implemented this for OpenSSL only: From: Florian Westphal <fw@strlen.de> Date: Mon, 18 May 2009 00:29:02 +0200 Subject: SSL/TLS: Add initial certificate support to OpenSSL backend Commit message modified by Alex Barton. Closes #120, "Server links using TLS/SSL need certificate validation". Supersedes PR #8, "Options for verifying and requiring SSL client certificates", which had (incomplete?) code for OpenSSL, no GnuTLS.
2024-03-23Streamline README.md & INSTALL.md filesAlexander Barton
- Tweak some paragraphs and bring others more in line with texts on the homepage ... - Try to not duplicate information: - Configuration is explained in doc/QuickStart.md; - command line parameters are already better described in the ngircd(8) manual page. - Move all pointers to documentation to the README.md file, which is directly shown in GitHub when browsing the repository, for example.
2024-03-23Bring manual page more in line with README.md and homepageAlexander Barton
2024-03-17QuickStart.md: Tweak the text a bit ...Alexander Barton
2024-03-17INSTALL.md: Add info for macOS systemsAlexander Barton
2024-03-17METATADA: Fix unsetting "cloakhost"Alexander Barton
Correctly re-generate the "cloaked hostname" when removing the "cloakhost" using an empty string by passing down NULL instead of the empty string, which results in protocol violations (for example on WHOIS).
2024-03-17Update the "rpm" make target to use rpmbuild(8)Alexander Barton
2024-03-17Add a Dockerfile and documentation to the projectAlexander Barton
2024-02-10Streamline the "testsuite" and "srcdoc" make targetsAlexander Barton
2024-02-10Remove outdated, unsupported and broken support for splint(1)Alexander Barton
2024-02-10Git: Streamline and simplify .gitignore fileAlexander Barton
2024-02-10Convert contrib/README to MarkdownAlexander Barton
2024-02-05Doxygen: Update the footer linksAlexander Barton
2024-02-05testsuite: Pass -nameopt to openssl s_client.Sebastian Andrzej Siewior
The default value for the -nameopt option changed in OpenSSL 3.2 from `oneline' to `utf8'. The `oneline' option also included a space around the fields which is not the case for `utf8'. This means that CN = my.first.domain.tld changed to CN=my.first.domain.tld and is now longer recognized, leading to test failure. This can be fixed by either going back to `oneline' or keeping `utf8' and adding additionally `space_eq'. Anoter way would be to teach the expect that the space is optional. Add explicit -nameopt option with `utf8,space_eq' which is understood by by OpenSSL 3.2 and earlier to make explicit. Remove the wildcard. Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>
2024-01-23Debian package: Enable the [SSL] sectionAlexander Barton
This makes sense because the package is build with SSL support enabled, and we set and enable "CAFile" in commit ae9cfade -- which results in an error when this is not in an enabled(!) [SSL] section ...
2024-01-232nd attempt to always show the correct config file name ...Alexander Barton
But we are getting there!