about summary refs log tree commit diff
AgeCommit message (Collapse)Author
2024-08-18Update manual page datesAlexander Barton
2024-08-18Add labels to the containersAlexander Barton
2024-08-04Update documentation on CAFileosmarks
ngIRCd 27 now checks server certificates, and without `CAFile` set will reject all server/server connections with a confusing error. Update documentation to say that `CAFile` is needed to accept incoming server connections. Closes #320.
2024-07-27MODE: Reply with ERR_NOSUCHCHANNEL when the target is a channel (#319)Val Lorentz
While it is common for IRC servers to use ERR_NOSUCHNICK instead of ERR_NOSUCHCHANNEL when a target can be either a channel or a nick, it seems every other IRCd but UnrealIRCd uses ERR_NOSUCHCHANNEL in this particular case.
2024-05-22Github CI: Build on a matrix of (ubuntu,macos)x(gcc,clang)Siva Mahadevan
2024-04-26ngIRCd Release 27 rel-27Alexander Barton
2024-04-26Explicitely cast NumConnections etc. (size_t) to "long"Alexander Barton
This fixes the following compiler warning, for example on OpenSolaris: conn.c: In function 'Conn_Handler': conn.c:798:28: warning: format '%ld' expects argument of type 'long int', but argument 4 has type 'size_t' {aka 'unsigned int'} [-Wformat=]
2024-04-26Update ChangeLog, NEWS & AUTHORS.md for ngIRCd 27Alexander Barton
2024-04-26Update doc/Platforms.txtAlexander Barton
2024-04-19Clarify that "CAFile" is not set by defaultAlexander Barton
2024-04-19Add am example filter file for "Fail2Ban"Alexander Barton
2024-04-19Fix channel symbol returned by RPL_NAMREPLY for secret channelsVal Lorentz
References: - https://modern.ircdocs.horse/#rplnamreply-353 - https://datatracker.ietf.org/doc/html/rfc2812#page-47 - (RFC 1459 is irrelevant here, as https://datatracker.ietf.org/doc/html/rfc1459#page-51 uses a different format) Closes #313.
2024-04-13Don't abort startup when setgid/setuid() fails with EINVALAlexander Barton
Both setgid(2) as well as setuid(2) can fail with EINVAL in addition to EPERM, their manual pages state "EINVAL: The user/group ID specified in uid/gid is not valid in this user namespace ". So not only treat EPERM as an "acceptable error" and continue with logging the error, but do the same for EINVAL. This was triggered by the Void Linux xbps-uunshare(1) tool used for building "XBPS source packages" and reported by luca in #ngircd. Thanks!
2024-04-13Test suite: Correctly test for LOGNAME and USERAlexander Barton
2024-04-13Test suite: Don't use "pgrep -u" when LOGNAME and USER are not setAlexander Barton
Thanks for reporting this on IRC, luca!
2024-04-13ngIRCd Release 27~rc1 rel-27-rc1Alexander Barton
2024-04-13Test suite: Use $USER in getpid.sh when $LOGNAME is not setAlexander Barton
The LOGNAME environment variable is not set in GitHub "actions", for example ...
2024-04-11Update doc/Platforms.txtAlexander Barton
2024-04-11ngircd.service: Redirect stdout and stderr to the journalAlexander Barton
2024-04-06Prepare documentation for ngIRCd 27~rc1Alexander Barton
2024-04-06Ping the service manager and set a status messageAlexander Barton
Periodically "ping" the service manager (every 3 seconds) and set a status message showing connection statistics. This enables using the systemd(8) watchdog functionality for the "ngircd.service" unit.
2024-04-06Add support for the "sd_notify" protocolAlexander Barton
This allows the "ngircd.service" systemd(8) unit to use the "notify" service type, which allows for better status tracking by the service manager.
2024-04-05Add ".trunk" to .gitignore fileAlexander Barton
2024-04-05Test suite: wait for ERROR message on QUITAlexander Barton
Wait for the "ERROR :Closing connection" message sent by ngIRCd when handling the QUIT command, do not wait for "Connection closed" which is actually output by the telnet(1) command and is implementation dependant! For example, on Haiku OS, this is not always(!) echoed (the command seems to hang sometimes?) which results in unpredictable failures in the test suite ...
2024-04-05Test suite: simplify and enhance getpid.shAlexander Barton
- Try to only search for processes of the current user. - Prefer using pgrep (in addition to pidof) when available. - Streamline system overrides. - Get rid of HEAD_FLAGS: all systems so far support "-1". - Use "ps -o pid,comm" as the default, which is POSIX.1. - Use "sort -r" to hopefully get the newest (=highest) PID, which is the case on older systems not using randomized PIDs at least.
2024-04-05Test suite: clean up scriptsAlexander Barton
- Reformat code. - Cleanup some glitches, streamline scripts ... - Enable "set -u": Error on unset variables. - Detect "$srcdir" in prep-server3 script, too.
2024-04-02Revert "testsuite: Pass -nameopt to openssl s_client."Alexander Barton
Although this is a nice looking solution, it is not that portable: for example, the "openssl s_client" command of LibreSSL 3.8.2 on OpenBSD 7.4 does not support it. So let's revert back to the "uglier" but working variant ... This reverts commit bdb55fb4b322b2c84530855a3b5148a0e387f5b4.
2024-03-31Fix quoting in code examples in doc/Container.mdAlexander Barton
2024-03-31Change leftover GnuTLS "slot handling" messages to debug levelAlexander Barton
This completes commit f96966a6.
2024-03-31Add feature info to Debian package descriptionAlexander Barton
2024-03-31Try to set file descriptor limit to its maximum and show info on startupAlexander Barton
The number of possible parallel connections is limited by the process file descriptor limit (among other things). Therefore try to upgrade the current "soft" limit to its "hard" maximum (but limit it to 100000), and show an information or even warning, wenn still less than the configured "MaxConnections" setting. Please note that ngIRCd and its linked libraries (like PAM) need file descriptors not only for incoming and outgoing IRC connections, but for reading files and inter-process communication, too! Therefore the actual connection limit is _less_ than the file descriptor limit! This introduces the new MAX_FD_LIMIT (100000) #define.
2024-03-31ngircd.8: Update for the now always available debug-modeAlexander Barton
2024-03-31Update and fix logcheck(8) rulesAlexander Barton
2024-03-31S2S-SSL/GnuTLS: Enable CRL verificationChristoph Biedl
2024-03-23S2S-TLS: Fix "make check" in separate build directoryAlexander Barton
2024-03-23S2S-TLS: Add notice to INSTALL.mdAlexander Barton
2024-03-23S2S-TLS: Convert SSL.txt to Markdown and update information givenAlexander Barton
No longer describe creating self-signed certificates or using "stunnel", as both is not recommended.
2024-03-23S2S-TLS/GnuTLS: Fix handling of connections without peer certificatesAlexander Barton
2024-03-23S2S-TLS: Verify the TLS certificates by defaultAlexander Barton
This is already mentioned as the default in the manual page and the sample configuration file, but was actually not enabled in the code!
2024-03-23S2S-TLS/GnuTLS: Streamline loggingAlexander Barton
2024-03-23S2S-TLS/GnuTLS: Fix handling of certificate information for incoming connectionsAlexander Barton
Show proper certificate information for incoming connections, too, and not "peer did not present a certificate", regardless if the client sent a certificate or not. This change is for GnuTLS and similar to what was implemented in commit for OpenSSL in "S2S-TLS/OpenSSL: Fix handling of certificate information for incoming connections".
2024-03-23S2S-TLS/GnuTLS: Update SSL code for GnuTLS certificate reloadingAlexander Barton
Without this, the S2S-TLS-Patch not even compiles with GnuTLS because of the "new" GnuTLS certificate reload support implemented in commit eead4a63 ("x509_cred_slot").
2024-03-23S2S-TLS: MAX_CERT_CHAIN_LENGTH is only used by OpenSSLAlexander Barton
2024-03-23S2S-TLS: Fix formatting and sort new SSL options in ngircd.conf manual pageAlexander Barton
2024-03-23S2S-TLS/OpenSSL: Streamline loggingAlexander Barton
This includes simplifying cb_connserver_login_ssl() a bit, we do not have to code for invalid state which was ruled out by an assert() and therefore can get rid of the goto altogether (and don't log the same error twice with different messages).
2024-03-23S2S-TLS/OpenSSL: Postpone verification of TLS session right before server ↵Alexander Barton
handshake The verify callback in OpenSSL is called pretty early, and at that time it is not possible yet to check which connection it belongs to, and some connections may have relaxed requirements. So always return success in the Verify_openssl() callback, and postpone validation of the TLS session until starting the server handshake in cb_connserver_login_ssl(), when we know which server this connection belongs to and which options (like "SSLVerify") are in effect. The code doing this was already present in cb_connserver_login_ssl(), but this patch adds a more prominent comment to the function.
2024-03-23S2S-TLS/OpenSSL: Fix handling of certificate information for incoming ↵Alexander Barton
connections Show proper certificate information for incoming connections, too, and not "peer did not present a certificate", regardless if the client sent a certificate or not. And free the client certificate structure "peer_cert" on incoming connections as well!
2024-03-23S2S-TLS/OpenSSL: Set the verification flags only onceAlexander Barton
Set the verification flags in the ConnSSL_SetVerifyProperties_openssl function only, don't override them in ConnSSL_InitLibrary() afterwards. No functional changes, now ConnSSL_SetVerifyProperties_openssl() sets exactly the parameters which ConnSSL_InitLibrary() always overwrote ...
2024-03-23S2S-TLS/OpenSSL: Always setup host name verificationAlexander Barton
Setup host name verification even when the "SSLVerify" option is disabled, because even then the peer can present a valid certificate and validation would always(!) fail because of the missing host name verification setup.
2024-03-23S2S-TLS: Remove leftover debug messagesAlexander Barton