"18.177.0.118"; }
# Select a seed from /dev/random or the appropriate local alter-
native. # If /dev/random doesn't exist, use a seed # Note: on
Linux, /dev/urandom should probably be used--it won't block.
seedfile "/dev/random";
# Let's set up some logging logging { syslog daemon; #
set the syslog facility to daemon
logpath "/home/irc/logs" # path prepended to log file
names
log kill syslog notice; # log kills to syslog at priority
"notice" log squit syslog notice; log connect
syslog debug;
log oper file "opers.log"; # log /opers to file "op-
ers.log" log gline file "gline.log";
nolog users; # turn off logging for users (default, but
illustrative)
pid "ircd.pid"; }
binpath "/home/irc/bin/ircd"; # binary to exec() when we /restart
libpath "/home/irc/lib"; # directory to chdir() to on start-up
# Here's an authorization record--defines who is permitted on the
server # and what special information needs to be remembered
about them. auth everyone { host "*@*"; # hosts this
auth record matches maxusers 1200; # Max users for this
auth record perhost 2; # Maximum of 2 users per host
on this server global 3; # Maximum of 2 users per
host on the entire network ping 120; # ping them
once every 120 seconds if link inactive sendq 270000; #
max sendq for everyone in the auth record }
# Here's another one for miters people auth miters { host
"*@*.mit.edu"; host "*@18.*"; maxusers 1200;
perhost 1; global 1; ping 300;
sendq 120000; }
# And here's a back door for my operators--perhaps to be used in
an emergency auth opers { host "*@*"; unset
ident; # no identd unset banable; # no denial rules
unset limit; # ignore any limits set ip-
spoof; # hostname is spoofed to protect the guilty
password "MybacKd004!"; # password-only access
motd "opers.motd"; # a special MOTD for opers }
port { accept opers; # auth records are tried in order
# allow channel hacks and glines server uworld.undernet.org {
set channelhack; set gline; }
server uworld2.undernet.org { set channelhack;
set gline; }
server uworld.eu.undernet.org { set channelhack;
set gline; }
# allow channel hacks only server channels.undernet.org {
set channelhack; }
server channels2.undernet.org { set channelhack; }
# here's some link class definitions for servers (only) class
hubs { limit 2; # Max connection attempts per
class freq 600; # Connect frequency ping
300; # how often to ping them sendq 2700000; #
sendq }
# Here's a hub link server santaclara.ca.us.undernet.org {
class hubs; # this is in the hubs
link class
link 4400 "205.158.23.3"; # link address
password "toysrus"; # link password set
auto; # we'll auto to it set
hub; # it's a hub }
server dallas-r.tx.us.undernet.org { class hubs;
link 4400 "204.178.73.175"; password "arey-
ouready?"; set auto; set hub;
deny "linked(santaclara.ca.us.undernet.org)"; # a d-line
}
# here's a leaf server vancouver.bc.ca.undernet.org {
link 4400 "199.60.228.129"; password "toylink";
set auto;
denyoper "linked(santaclara.ca.us.undernet.org)"; # a D-
line }
# here's a set of default flags for opers # # the part before the
'.' specifies the namespace the flags are from-- # not necessary
inside the user record itself, but we don't otherwise # know the
namespace here. The part after the '.' is a label. flagset us-
er.oper { set kill; # allow kills... set
kline; # allow kline/unkline set gline; # allow
local glines set rehash; # can use /rehash
# nick jupes user Uworld { set juped; }
user Uworld2 { set juped; }
user EUworld { set juped; }
user X { set juped; }
user W { set juped; }
# File deny records are kept in; this can be modified from online
denyfile "klines.conf";
Man(1) output converted with
man2html