1 # Format of this file: description<nl>variable<nl>helptext<nl><nl>.
2 # If the question being documented is of type "choice", we list
3 # only the first occurring config variable. The help texts
4 # must not contain empty lines. No variable should occur twice; if it
5 # does, only the first occurrence will be used by Configure. The lines
6 # in a help text should be indented two positions. Lines starting with
7 # `#' are ignored. Limit your lines to 78 characters.
9 # If you add a help text to this file, please try to be as gentle as
10 # possible. Don't use unexplained acronyms and generally write for the
11 # hypothetical admin who has just downloaded ircu for the first time.
12 # Tell them what to do if they're unsure. Technical information
13 # should go in a README in the Documentation directory. Mention all
14 # the relevant READMEs and HOWTOs in the help text.
16 # All this was shamelessly stolen from several different sources. Many
17 # thanks to all the contributors. The texts are copyrighted # (c) 1997
18 # by Carlo Wood and governed by the GNU Public License.
21 Do you want to change your previous configuration
23 You will be presented a series of questions that you have to answer
24 in order to configure the IRC daemon, prior to compilation.
25 If you went through this before, then your choices have been stored
26 in a file '.config'. If you want to use the same stored configuration
27 now, specify 'n'; this will quickly skip through all questions that
28 you already answered previously, only prompting you for NEW questions.
29 Note that NEW questions only can occur when you just upgraded to a
30 new version. Note also that if you abort by pressing ^C (control-C)
31 anywhere, then all answers are lost; you must finish it before the
33 Pressing a 'c' or 'C' (followed by a return) on any question will
34 Continue the script in "use_defaults mode", that means that it will
35 take all default values unless it finds a NEW question (like when you
36 specify a 'n' here). 'C' will finish everything, but a 'c' will
37 only finish the current paragraph.
38 If you are unsure, or if you want to change a previously entered
39 configuration, specify 'y'.
41 Which compiler do you want to use
43 Here you need to specify the C compiler you want to use.
44 Using 'gcc' is highly recommended, you might even want to install it
45 on your machine first. Note that you can specify the full path if you
46 are not sure if the compiler is in your PATH (or whether or not the right
47 compiler will be used). An example is: "/usr/ucb/cc".
48 The package needs an ANSI compiler. Some compilers need an extra option
49 to compile ANSI C. In those cases you can add these options also here.
50 For example, on a HPUX-8.x you would use (if you don't have gcc):
51 "cc -Aa -D_HPUX_SOURCE".
52 Note that you should not use quotes.
54 What flags should I pass to $CC
56 These are the compiler flags, used for CC when compiling.
57 If you are not using gcc, it might be possible that your compiler is not
58 supporting -g and -O at the same time. The -g option is necessary to be
59 able to debug the daemon in the case it contains a bug that makes the
60 ircd core dump. Unless you use a version that is proven to be VERY stable,
61 it is highly recommended to use this option. All Undernet production servers
62 are expected to use it in order to help coder-com to track down bugs.
63 The -O3 will optimize the code - it also makes debugging harder.
64 If you have plenty of cpu cycles then you can use -O2 instead of -O3:
65 it will disable inlining which makes it easier to debug or core dump,
66 the daemon will use a few percent more cpu however.
67 If you are not running a production server you should remove the -Ox.
68 Ircd developers can optionally use more options to turn on extra warnings.
69 Developers (which are using gcc of course ;), should use:
70 "-g -Wall -pedantic -DGODMODE"
71 Note that you should not use quotes.
72 Note that the server uses several non-ANSI (though POSIX.1) function calls.
74 Do you need extra include directories
76 If your compiler needs extra include directories, you can specify them
77 here as a space separated list of directories. Do not use quotes and do
78 not specify the '-I' prefix. Usually you don't have to specify any
79 extra include directory, in that case you should specify "none" here.
80 If unsure, try "none" (without quotes) and see if all the '#include'
81 header files are found during compilation.
83 Which linker flags do you need
85 Here you can specify extra flags that will be passed to the linker.
86 Usually you will not need to pass any flags and you can therefore
87 specify "none" here (without the quotes).
88 SunOS users may want to add "-Bstatic" (but only if you need it).
89 You can also specify any "-L..." flags here if you need those for
92 Which extra libraries do you need
94 Some Operating Systems need linking with extra libraries for some of the
95 functions used by the daemon. In some cases, it is not known which
96 libraries are needed, even when the Operating System is known. This is
97 for instance the case with SunOS, some need -lresolv, while others don't.
98 If you forget to add a library then this will result in 'undefined variables'
99 during linking. If you do not know which library to add, it might be
100 helpful to use the unix command `nm', which lists the variables of a
101 library. For instance, if you get "unknown variable '_res_mkquery'", and you
102 wonder if this is in /usr/lib/libresolv.so, you can do:
103 nm /usr/lib/libresolv.so | grep res_mkquery
104 Do not use the leading '_' in the grep, this underscore is added by the
105 assembler but is not part of the original variable name and does not show
106 up in the output of nm.
107 Most libraries are in /lib or /usr/lib, which are scanned by default. In
108 some cases you will need to tell the linker where to search for a library.
109 You can do this by adding an -L... option to IRCDLIBS. For instance:
110 "-L/usr/ucblib -lucb" will look for 'libucb.so' in /usr/ucblib too.
111 Here is a list of what you MAYBE need to specify depending on your
115 Dynix/ptx -lsocket -linet -lnsl -lseq
116 Dell SVR4 -lsocket -lnsl -lucb
117 All others Default provided by autoconf
118 If unsure use the default provided by autoconf.
120 Where should I install the ircd binary
122 After compilation (by typing 'make'), you can install the server with
123 the command 'make install'. This will install the ircd in the directory
124 you specify here. The package tries to use a meaningful name by naming
125 the binary "ircd.<tag>", where <tag> is the name of the last patch that
126 was applied by the maintainer. A symbolic link (to be specified next)
127 will be used to point to this binary. This allows a /RESTART to
128 immediately start the new version, while keeping the old binary.
129 Note that you need to have write permissions in this directory during
130 the install. Please re-check the permissions/owner and group after
133 What should the name of the installed symbolic link to the executable be
135 'make install' installs the binary with an unique name, however it makes
136 a symbolic link to this newly installed executable which always has the
137 same name, so you can use /RESTART and/or use this name in scripts that
138 automatically restart the ircd after a reboot or crash.
139 Here you can specify the name of that symbolic link. Note that it may
140 not contain a '/'; it is just the name if the symbolic link and will be
143 Which permissions do you want the binary to have
145 Here you need to specify the octal file mode of the ircd binary.
146 Recommended is 711 - but you might need setuid or something.
147 Note that using a setuid and starting the daemon as another user
148 does prohibit the daemon from core dumping in case of a crash on some
151 Which owner do you want the binary to have
153 This will be the owner of the ircd binary after installation.
155 Which group do you want the binary to have
157 This will be the group of the ircd binary after installation.
159 Where should I install the man page
161 This is the base directory where the manual page of the ircd is installed.
162 If you are not root on your system, you can change it to your personal
163 manpath directory (which of course should be in your MANPATH environment
166 Use inlining for a few crucial functions
168 This will increases the size of the executable with 7 kb, but it also
169 speeds up execution a bit :). Your compiler needs to understand the
170 keyword __inline__ (GNU gcc and egcs do).
171 If unsure, try if `y' compiles. If it doesn't, you can try using a
172 C++ compiler (ie, configure CC to be 'g++' instead 'gcc').
174 You have poll(), but do you want to use it
176 Some Operating Systems implement select() by calling poll(), others
177 implement poll() by calling select(). The best performance will be
178 achieved by calling the lowest (sys)call ourselves of course.
179 The Undernet Daemon allows you to use select() or poll().
180 If you specify 'y' here, the daemon will use poll() directly, otherwise
181 it will use select(). If you don't know what your Operating System
182 uses as syscall, you can compile the server with USE_POLL and detach
183 the running process with 'strace -p <pid>', 'truss -p <pid>' or
184 'trace -p <pid>' depending on your Operating System, these UNIX commands
185 will show you the syscalls and therefore show if you use poll() or select().
186 The advantage of using poll() is that you are not bothered by the limits
187 of select() and fd_set size (ie, the number of clients that connect).
188 The following Operating Systems seem to use poll():
189 Solaris 2.x, SunOS 4.x, AIX, Digital UNIX, and NetBSD.
190 linux-2.2.x use poll(), but only of your glibc was compiled with that
191 kernel (and it won't unless you compile it yourself).
192 The following Operating Systems use select():
194 If unsure, test it (a ./configure check will be added in ircu2.10.06).
196 What is the domain name of your network
198 This define allows you to specify what you consider to be 'local'.
199 It is only used for statistics. When you issue the IRC command /stats w,
200 the server will respond with statistics of how many clients have been
201 connecting to your server in the last minute, hour and day. It will
202 give these statistics for all connections (including the servers), all
203 clients (from anywhere) and also for clients whose hostname ends on
204 the domain you specify here. So if you are an ISP and you want to know
205 specifically the client load from your own domain, specify that domain
206 here. If you are unsure what to do, then it isn't really important what
207 you give here, just don't give an empty string. A good guess is the last
208 two parts of your own hostname (ie, if your hostname is foo.bar.nowhere.org,
209 specify 'nowhere.org'). Note that the string you give should NOT start
210 with a '.' and you should not use quotes.
212 Please give a random seed of eight characters
214 You should specify exactly eight characters (0-9A-Za-z) here. Do not use
215 quotes or any other special characters. This value is used to initialize
216 the random generator of the server which is used to generate PING/PONG
217 cookies in order to stop spoofing IP-numbers (a PING with a random number is
218 sent to this IP-number and if the client doesn't respond with the
219 exact same number, access is denied). In order to make the random
220 number impossible to guess, it is important that you use your own random
223 Does your host have a reliable clock
225 You should really ONLY specify 'y' here when your system clock is
226 stable and accurate at all times (within a few seconds).
227 If you are running ntpdate on a regular basis, or an equivalent
228 like xntpd, to keep your system clock synchronized over the network,
229 then you might have an accurate clock. However, this is not guaranteed,
230 for example, it is known that xntpd gives unstable results on linux
231 in some cases. Note that an unstable clock is worse then an clock that
232 has a constant offset, because the servers attempt to correct for a
233 constant offset, but do not correct jumps of your system clock !
234 In general you SHOULD be running ntpdate or equivalent AND make sure it
235 works when you run a production server on Undernet. Otherwise leave
236 your clock alone and specify 'n' here.
237 If unsure specify 'n' !
239 Change root (/) after start of daemon
241 If you are a security freak and you want to the daemon to run in
242 its own environment, then you can specify 'y' here. The daemon will
243 change '/' to 'DPATH' (which you will have to specify later).
244 If this confuses you or if you are uncertain, specify 'n'.
246 Do you want the daemon set its own uid/gid
248 If you specify 'y' here, then the daemon will attempt to set its
249 User ID (uid) and Group ID (gid) to the numeric values that you will
250 have to specify next. This only makes sense if you (have to) start
251 the server as root. The most secure operation of the server is to
252 not use setuid stuff (here or by means of setting the file mode)
253 and to run the server as a special user only (ie 'irc'). Of course
254 this user must have access to all log and configuration files.
255 Note that using a setuid and starting the daemon as another user
256 does prohibit the daemon from core dumping in case of a crash on some
258 This option is actually only necessary when you use the Change Root
259 option, because otherwise you can use the file mode to set the uid
260 and gid. Note that the server refuses to run as root.
261 If unsure, specify 'n'.
265 Ok, if you insist on using this option: Here you must specify the
266 numeric value of the uid that you want the server to run as.
267 Note that you need to look in the right /etc/passwd file, which isn't
268 the same file when you used the Change Root option.
272 Ok, if you insist on using this option: Here you must specify the
273 numeric value of the gid that you want the server to run as.
274 Note that you need to look in the right /etc/group file, which isn't
275 the same file when you used the Change Root option.
277 Allow to specify configuration file on command line
279 If you specify 'y' here, you will be allowed to specify the ircd.conf
280 path (the ircd daemon configuration file) on the command line when
281 starting the daemon (with the -f <ircd.conf file> option).
282 Note that defining this and installing ircd SUID or SGID is a MAJOR
283 security problem - they can use the '-f' option to read any files
284 that the 'new' access lets them. Note also that defining this is
285 a major security hole if other users have accounts on the same machine;
286 when your ircd goes down and some other user starts up the server with
287 a new conf file that has some extra O-lines. So don't use this unless
290 Set up a Unix domain socket to connect clients/servers
292 If there are lots of users having an account on the same machine
293 (which is very unlikely because the server needs all cpu ;), then
294 using a UNIX domain socket to connect these clients to is more
295 efficient then letting them connect via TCP/IP. A UNIX domain
296 socket is a special device that will be created in your File System.
297 Your client must also support connecting to a UNIX domain socket.
298 The name of the special device must be specified in the "ircd.conf"
299 file by means of an extra 'P: line', see doc/example.conf for the
301 If you don't have many IRC-ing users on the same host as the server,
302 or when your local IRC client doesn't support UNIX domain sockets,
303 specify 'n' here. Otherwise specify 'y'.
305 Do you need virtual hosting
307 This is only needed when you want to run two or more servers on the
308 same machine and on the same port (but different devices).
309 In general you will only need this if you have at least two ethernet
310 cards in your machine with a different IP-number.
311 If you specify 'y' here, then you can "bind" a server to one of your
312 interfaces. You should use the command line option '-w' to tell the
313 server to which interface to bind to. No error is reported if this
314 fails, the server will simply not run.
315 If no '-w' option is given then the server name specified in the
316 'M: line' of the "ircd.conf" file of the server is used, provided it
317 resolves to an IP-number of one of your interfaces. Note that
318 normally the name does not have to resolve, but when you define this,
319 it MUST resolve or you must use the -w command line option, or the
321 If you are unsure, specify 'n'.
323 Will you connect to more then one server at a time
325 All servers of one IRC "network" are connected in a "tree" (no loops).
326 Servers that are only connected to one other server (called the
327 'uplink') are called "leafs", servers that are connected to more then
328 one other server are called HUBs.
329 If you specify 'n' here then your server will prevent itself from acciden-
330 tally connecting to two servers at once, which is good because this is
331 generally bad for servers in "leaf" positions (they are net.wise located
332 too bad to route traffic). Note that on Undernet all newly linked servers
333 are linked as leafs during their test phase, and should specify 'n' here.
335 Do you want support for the old I:*:ONE:*:: construct
337 Server versions prior to ircu2.10.05 used to use the string "ONE"
338 as password in an I: line to indicate that only one connection was
339 allowed for any given IP number that matched that I: line.
340 This method only counted the *local* connections though.
341 As of ircu2.10.05 you can specifiy a single(!) digit as password
342 which then will allow that many connections from the same IP number.
343 However, now the IP numbers of ALL clients are counted, also those
344 that are connected to other servers.
345 If you do not use the depricated "ONE" password in your ircd.conf,
346 specify 'n' here. Note that if you you DO use the "ONE" password
347 and you specify 'n' here, then you should change all occurances of
348 "ONE" to "1" (this is the recommended procedure).
349 If you are lazy and you don't want to change the "ONE" passwords
350 into a "1", then specify 'y' here.
352 Send a short message instead of the MOTD to connecting clients
354 Every time a client connects to your server, the full Message Of
355 The Day (as specified in its file MPATH) is sent to the client.
356 Even while many clients allow the user to ignore the message of
357 the day: the server still sends it. Many users never read the
358 message of the day anyway, making it a huge waste of bandwidth.
359 If you specify 'y' here than the server won't send the MOTD by
360 default to the client, but rather tell the client when the MOTD
361 was last changed and how to receive the MOTD by typing /MOTD.
362 If unsure specify 'n'.
364 Do you want to enable debugging output
366 Sometimes things just don't work. This doesn't have to be a crash,
367 but it is also possible that your server just doesn't want to start
368 at all, or disallows clients to connect at all, etc.
369 With all such drastic and REPRODUCIBLE problems, it makes sense to
370 recompile the server with this option set and then running the
371 ircd (irc daemon) with the (extra) command line options: -t -x9
372 This will make the server run in the foreground and write debug output
373 to the terminal; in a lot of cases this can give a clue on what is
374 wrong (although more often it doesn't).
375 Because defining DEBUGMODE uses a LOT of cpu and is never useful
376 unless you are debugging a reproducible test case, you should never
377 specify 'y' here except for the reason just mentioned.
378 You should certainly NEVER specify 'y' for a server that runs on a
381 Do you want memory- allocation and/or leak checking
383 If you specify 'y' here, then the server will start to do book keeping
384 on the allocated memory blocks. This uses extra cpu and memory,
385 so normally you do not want this - unless you are debugging.
386 This option uses 8 bytes extra per allocated memory block.
387 The main purpose of this option is to check if a call to free(2) is done
388 with a valid pointer - if the pointer was not previously returned by
389 malloc(2), calloc(2) or realloc(2), the server will core dump in a place
390 that allows the maintainer to get an idea of what went wrong - but only
391 when the server was compiled with the -g flag of course.
392 You also need to specify 'y' here if you want to search for memory leaks.
393 On a production server, specify 'n' - unless you have lots of cpu to
394 spare and you volunteer to search for memory leaks - contact the
395 maintainer in this case.
396 If unsure, specify 'n'.
398 Do you want to have boundary checking
400 One of the most nasty bugs are those where buffer overruns are involved.
401 In an attempt to catch those in an early stage, this option will add
402 so called "magic numbers" to the beginning and end of each allocated
403 memory block. When a block is freed or reallocated, the magic numbers
404 are checked and the server core dumps when they were corrupted.
405 This option uses 12 bytes extra per allocated memory block.
406 It doesn't really use much extra cpu compared to defining DEBUGMALLOC, so
407 you might as well specify 'y' here, just in case. It only makes sense
408 though if you compiled the server with compiler option '-g'.
409 If unsure, specify 'n'.
411 Do you want memory leak testing (stats M)
413 If you specify 'y' here then the server will start to do extra book keeping
414 on the allocated memory blocks, counting the number of currently allocated
415 blocks per source code location (file and line number). You will be able
416 to retrieve these statistics with the command /stats M.
417 When there is a memory leak, then allocated memory blocks that were allocated
418 under certain conditions are never freed (however the contents of those
419 memory blocks are never used anymore); this would result in a (slow?)
420 increase of the count of allocated memory blocks. This option allows to
421 find where these blocks were allocated which might give a clue on the memory
423 This option uses 4 bytes extra per allocated memory block.
424 If you want to look for memory leaks, specify 'y' - otherwise specify 'n'.
426 Do you want extra info on allocated sizes
428 If you specify 'y' here then the server will start to do extra book keeping
429 on the sizes of the allocated memory blocks. /stats M will not only return
430 the number of allocated blocks, but also the total number of allocated
431 bytes involved. If you defined MEMLEAKSTATS to look for memory leaks, it
432 will give the total number of allocated memory per source code location
433 (file and line number).
434 This option uses 4 bytes extra per allocated memory block, unless you already
435 specified 'y' for MEMMAGICNUMS (boundary checking), because in that case
436 it was already included (and it doesn't matter what you specify here).
437 I think you should specify 'y' here, its more fun to see the sizes :).
439 Do you want support for a time interval with /stats M
441 If you specify 'y' here then the server will start to do extra book keeping
442 on the allocated memory blocks, storing the time at which the memory block
443 was allocated. This especially slows down /stats M (but unless you use
444 that command frequently, it shouldn't really matter) and uses again 4 bytes
445 of extra memory per allocated memory block.
446 This option is especially useful if you are looking for memory leaks
447 because it allows you to specify a time window with /stats M for which
448 counted blocks must be returned. This allows to ignore recently allocated
449 blocks and permanently allocated blocks (since the start of the server).
451 Are you testing on a host without DNS
453 If you are playing with the server off-line, and no DNS is available, then
454 long delays occur before the server starts up because it tries to resolv
455 the name given on the M:line (which usually isn't given in /etc/hosts) and
456 for each connecting client.
457 If you specify 'y' here, then a call to gethostbyname() will be done only
458 for the real hostname, and the server will not try to resolv clients that
459 connect to `localhost'.
460 Note that other calls to gethostbyname() are still done anyway if you
461 use VIRTUAL_HOST and that the server still tries to resolv clients
462 that connect to the real IP-number of the server.
464 Directory where all ircd stuff sits
466 DPATH is provided so that the other path names may be provided in just
467 filename form. It is the Default PATH. When the server starts, it
468 chdir's to DPATH before chroot or any other file operation, making
469 it the "current directory" for the server. This is where core files
470 will go if the server core dumps.
471 Note that you should not include quotes here.
472 Note also that the command line option "-d <dir>" overrides the DPATH
473 you give here, except for the chroot (if you use that).
475 Server configuration file
477 This is the IRC daemon Configuration filename, mostly called "ircd.conf".
478 If you just specify the filename, the server will read its configuration
479 file from the Default Path "DPATH", which you specified above. However,
480 you are also allowed to specify a full path.
481 Note that you should not include quotes here.
485 MPATH is the filename, relative to DPATH, or the full path, of the
486 "Message Of The Day" file; mostly called "ircd.motd". The contents
487 of this file will be sent to every client that connects to the server,
489 Note that you should not include quotes here.
491 Server remote MOTD file (3 lines max)
493 RPATH is the filename, relative to DPATH, or the full path, of the
494 "Remote Message Of The Day" file; mostly called "remote.motd". The
495 contents of this file will be sent to every remote client that issues
496 a /MOTD <your server name>. Only the first three lines are sent, so
497 you might want to keep it that short ;).
498 Note that you should not include quotes here.
502 PPATH is the filename, relative to DPATH, or the full path, of the
503 "PID file", mostly called "ircd.pid". It is used for storing the
504 server's PID so a ps(1) isn't necessary.
505 Note that you should not include quotes here.
507 Do you want to log the use of /WHO x% (recommended)
509 Specify 'y' here if you want to log the use of /WHO ... x%... by your
510 Opers (see doc/readme.who). This is highly recommended since it will
511 reduce the abuse of this `spy' function. Note: You can disable this
512 spy function completely below, in which case you can give 'n' here.
513 If unsure specify 'y'.
515 Give the path and(or) filename of this log file
517 WPATH is the filename, relative to DPATH, or the full path, of the
518 log file where the use of /WHO ... x% ... by your Opers will be logged
519 (see doc/readme.who), mostly called "whox.log".
520 Note that you should not include quotes here.
522 Do you want to log G-lines to a separate file
524 Specify 'y' here if you want to log G-lines (Global access bans)
527 Give the path and(or) filename of this log file
529 GPATH is the filename, relative to DPATH, or the full path, of the
530 log file where the G-lines will be stored, mostly called "gline.log".
531 Note that you should not include quotes here.
533 Do you want to log JUPEs to a separate file
535 Specify 'y' here if you want to log JUPEs (Jupiters) to a local file.
537 Give the path and(or) filename of this log file
539 JPATH is the filename, relative to DPATH, or the full path, of the
540 log file where the logs of JUPEs will be stored; it is usually called
541 "jupe.log". Note that you should not include quotes here.
543 Do you want to log OPMODEs and CLEARMODEs to a separate file
545 Specify 'y' here if you want to log OPMODEs and CLEARMODEs to a local
548 Give the path and(or) filename of this log file
550 OPATH is the filename, relative to DPATH, or the full path, of the
551 log file where the logs of OPMODEs and CLEARMODEs will be stored; it
552 is usually called "opmode.log". Note that you should not include
555 Do you want to log connecting users to a separate file
557 Specify 'y' here if you want to log who is connecting to your server.
558 This file can grow VERY fast on a large net work, so you probably
559 want to specify 'n' here.
561 Give the path and(or) filename of this log file
563 Here you need to specify the name of the log file where the server
564 should write the data about connecting users to. You can also specify
565 a full path. Note that you should not include quotes here.
567 Do you want to log Opers to a separate file
569 Specify 'y' here if you want to log who is successfully becoming an
570 IRC Operator on your server.
572 Give the path and(or) filename of this log file
574 Here you need to specify the name of the log file where the server
575 should write the data about Opering users. You can also specify a
576 full path. Note that you should not include quotes here.
578 Do you want to use syslog
580 If you are the sys admin of this machine, or if you have permission
581 of the sys admin to do so, you can let the server write data about
582 certain events to the syslog. You will be prompted for the events
583 that you want to log being one or more of: KILL's, SQUIT's, CONNECT's,
584 OPERing, Connecting Users and finally the log facility.
585 If you are unsure, specify 'n'. It is probably not a good idea to use
586 this on a large IRC net work.
588 Log all operator kills to syslog
590 Specify 'y' here if you want all KILLs to be written to syslog.
591 Note that on a large IRC net work this is a LOT of data.
593 Log all remote squits for all servers to syslog
595 Specify 'y' here if you want all SQUITs to be written to syslog.
596 Note that on a large IRC net work this is a LOT of data.
598 Log remote connect messages for other all servers
600 Specify 'y' here if you want all CONNECTs to be written to syslog.
601 Note that on a large IRC net work this is a LOT of data.
603 Log all users who successfully become an Oper
605 Specify 'y' here if you want all OPERs to be written to syslog.
606 Note that on a large IRC net work this is a LOT of data.
608 Send userlog stuff to syslog
610 Specify 'y' here if you want all connecting users to be written to syslog.
611 Note that on a large IRC net work this is EXTREMELY MUCH data.
612 You really want to specify 'n' here.
614 Log facility (daemon, user, local0-7)
616 Well if you got this far and still need help, then I think you should
617 go back and specify 'n' at the question "Do you want to use syslog".
619 Which local facility (0-7)
621 Well if you got this far and still need help, then I think you should
622 go back and specify 'n' at the question "Do you want to use syslog".
624 Use crypted passwords for operators
626 In order to allow certain users to become IRC OPERators, they must
627 authenticate themselves with a password. This password is matched
628 against an 'O: line' in the "ircd.conf" configuration file, see
629 doc/example.conf for more details. If you specify 'y' here, you are
630 allowed to use the DES encrypted form of these passwords in your
631 "ircd.conf" file (even more, your Opers don't have to tell you their
632 real password, they can provide the DES encrypted form themselves).
633 Since it has happened often in the past that the "ircd.conf" file
634 was compromised somehow, you are highly encouraged to specify 'y' here
635 and use the DES encrypted form. You can find a program 'mkpasswd' in
636 the ircd/crypt directory that will allow you to generate the encrypted
639 Max size of the total of of all sendqs (bytes)
641 This specifies the maximum amount of RAM that your server will allocate
642 for buffering sendQ's. Small leafs can use a value as little as 1000000,
643 while large HUBs need to specify a value as high as 20000000.
644 If you run out of memory, clients and/or servers are dropped with the
645 error "Buffer allocation error". Then you will have to up this number
646 (and install more RAM if appropriate).
647 If you want a more educated guess for this value then realize that any
648 value is good if you _really_ rather want to drop servers and clients
649 then allocate more memory; this will be the case when there is the
650 danger to run out memory for other allocations.
651 Even if you run the daemon on a dedicated machine, then specifying the
652 maximum of the RAM you have is a Bad Thing because really running out
653 of memory is a lot worse then dropping clients in a controlled way:
654 if possible you should have memory left for all the internal structures
655 (channels, clients, banlists, receive buffers) at all times.
656 On average, clients seem to use 150 bytes of sendQ, but at peak moments
657 this can easily increase to 2032 bytes per client (sendQs are allocated
658 in chunks of 2032 bytes).
659 The maximum possible ammount that can be allocated for sendQs is the
660 number of connected clients times whatever you specified as maximum
661 sendQ in your Y: lines in the ircd.conf file. Likely, that value will
662 be larger then the ammount of RAM you have.
663 The educated guess I talked about earlier would be 'number of clients'
664 times * 2048 bytes + 'size of net.burst' * n, where `n' is 1 for leafs
665 and up till 5 for HUB's. The 'size of net.burst' is about 125 bytes
666 per online client (on the total network).
667 For large HUBs with 4000 clients on undernet (30,000 users), this results
668 in 27 Mb. Leafs could use 12 Mb. Of course you can use less when you
669 have less than 4000 local clients.
670 Don't forget to specify this value in bytes.
672 Max receive queue for clients (bytes)
674 Currently, everything that a client sends to a server is read by the server
675 and stored in a buffer (the clients receive queue). The server will
676 process messages from this queue one by one (running over all clients
677 each time). When a client sends new messages faster they get processed,
678 and the size of its receive buffer reaches this value, the client is
679 dropped with the error "Excess flood". A reasonable value is 1024 bytes.
680 The maximum size is 8000 bytes.
682 Maximum number of network connections (23 - (FD_SETSIZE-4))
684 This specifies the maximum number of network connections the server
685 will use. You also need some non-network connects (log files etc), so
686 the maximum value is "FD_SETSIZE-4". The minimum value is 23.
687 The only benefit of using a small value is that your server uses less
688 memory - but *only* when you really have a small (client) load.
689 Routing server that hardly take clients can use 128 here for instance.
690 Servers that are always full should just specify the maximum amount
691 that still works (which might be less then FD_SETSIZE-4, some OS need
692 kernel hacking to allow more then 1024 fds per process). The only max.
693 value that is guaranteed to work is 252 ;). Note that if the value of
694 FD_SETSIZE is for instance 1024, then that doesn't mean you can't
695 connect MORE clients - but in this case you certainly need kernel
696 hacking. Find an experienced admin with the same Operating System and
697 ask him what the maximum is and how to achieve it.
699 Nickname history length
700 NICKNAMEHISTORYLENGTH
701 This value specifies the length of the nick name history list, which
702 is only used for /WHOWAS. It uses about 300 to 400 bytes per entry.
703 Note that at a net.break so many client disappear that the whole
704 "whowas" list refreshed a few times (unless you make it as big as
705 20,000 of course - but you shouldn't because thats a waste of ram
706 and cpu). A reasonable value is 'total number of clients' / 25.
708 Allow Opers to see (dis)connects of local clients
710 If you specify 'y' here, you will be allowed to see all client connects and
711 disconnects as a server notice. The historical reason for adding this
712 option was to detect clone bots that connected to your server. However,
713 on a large IRC network like Undernet, the number of clients that connect
714 are so huge that it is not possible to keep an eye on this and everyone
715 has been filtering these notices out anyway. Next to that it turned out
716 to use no less then 10% of the total cpu usage last time I measured it
717 (this has been improved after that, but still).
718 Unless you insist on seeing those notices you should specify 'n' here.
719 Note that in the meantime Undernet has a LOT of other (semi- and fully-
720 automated) ways to detect clone bots, which work a LOT better for this
723 Show IP address in client connection notices
725 Usually when showing a client connection, a nick, userid and hostname are
726 displayed. Selecting 'y' here will also display the numeric IP and connection
727 class of the connecting client. This can be useful for detecting spoofed DNS and
728 virtual hosted clones. This does use extra CPU though and is generally not needed,
729 however if a connection monitor bot is the only client that looks at these
730 notices, it is more efficient than sending USERIP for every connection. This
731 option makes the server compatible with Hybrid tcm bots.
733 Do you want to use R: lines in your configuration file
735 If you specify 'y' here you will be allowed to use R:lines in the "ircd.conf".
736 This allows more freedom in restricting connections to your server by
737 calling an external program to determine whether to allow the connection.
738 It also uses a lot of overhead however, and can bog things down, so you should
739 consider whether you really need them, and if you can handle the extra load.
740 If unsure, specify 'n'.
742 Process R: lines every rehash
744 You may not want to have the R: lines checks everywhere since this can
745 cost a lot of time and delays. If you specify 'y' here, then R: lines are
746 checked whenever the "ircd.conf" file is reloaded (when the REHASH command
747 is used, or a signal SIGHUP is received by the daemon). This shouldn't be
748 too much of a drain on the system if the R:lines programs are short.
750 Process R: lines always
752 If you specify 'y' here then R: lines will be checked as often as K: lines.
753 Note that this is -very- likely to cause a severe drain on your resources.
754 Use at your own risk, specify 'n' unless your really sure.
756 Allow (local) Opers to see all local invisible users
758 If you specify 'y' here, then your (local) IRC Operators will be able to
759 see all local invisible users (clients connected to your own server).
760 The reason for this is to hunt for clone bots, make sure your Operators do
761 not use this "feature" for spying on individuals and respect the user that
762 wishes to be invisible (mostly meaning that they don't want to be found when
763 on certain channels).
764 Note: If you answer 'n' here, then you will also not be able to see remote
765 invisible users (if you specify 'y' you will also get a configuration
766 question that asks you to specify whether or not you want your Opers to see
767 remote invisible users or not).
769 Allow Opers to see all invisible users
770 SHOW_ALL_INVISIBLE_USERS
771 If you specify 'y' here, then your global IRC Operators (O:) will be able
772 to see ALL invisible users. The reason for this is to hunt for clone bots,
773 make sure your Operators do not use this "feature" for spying on individuals
774 and respect the user that wishes to be invisible (mostly meaning that they
775 don't want to be found when on certain channels).
777 Allow global Opers (O:) to see inside secret channels
778 OPERS_SEE_IN_SECRET_CHANNELS
779 If you specify 'y' here, then your global IRC Operators (O:) will be able
780 to see who is on a specified, secret channel, without joining themselfs.
781 This can be needed to make a reasonable judgement in the case of a "channel
782 takeover" being reported, while the channel is set invite only.
783 See doc/readme.who for more details.
785 Allow local Opers (o:) to see inside secret channels
786 LOCOP_SEE_IN_SECRET_CHANNELS
787 If you specify 'y' here, then your local IRC Operators (o:) will be able
788 to see who is on a specified, secret channel, without joining themselfs.
789 This can be needed to make a reasonable judgement in the case of a "channel
790 takeover" being reported, while the channel is set invite only.
791 See doc/readme.who for more details.
792 If unsure, specify 'n'.
794 Don't truncate obnoxiously long /who output for opers
796 A /who command can sometimes return several hundred lines of info. To
797 reduce flooding and sending too much, the output is truncated. By
798 answering 'y' to this, when an IRC Operator uses /who, the output will
799 not be truncated, no matter how much data is returned.
801 Allow Opers to use the KILL command
803 You can select 'n' if you don't think operators should be able
804 to use the KILL command, and wish to prevent your operators from
805 using it. This will not, however, prevent operators on other
806 servers from issuing KILLs to your clients. You probably want to
807 select 'y' for this unless you really really don't think KILL
808 should -ever- be used by an operator.
810 Allow Opers to use the REHASH command
812 Allows operators to use the REHASH command to reload the servers
813 configuration file (ircd.conf) if you select 'n', you can still
814 reload the configuration file with a unix command,
815 kill -HUP `cat ircd.pid`. If unsure, select 'y'.
817 Allow Opers to use the RESTART command
819 Allows an operator to use the RESTART command to cause the server
820 to restart, using the ircd executable in SPATH. If unsure, select 'y'.
822 Allow Opers to use the DIE command
824 Allows an operator to use the DIE command to shutdown the server
825 online. If you select 'n' you will need to send the server a kill
826 signal to shutdown the server. If unsure, select 'y'.
828 Allow Opers to add local G-lines
830 Allows operators to add local G-lines with the GLINE command. This is
831 like a *local* KILL, except that the user being killed can't immediately
832 reconnect: He will have to wait for the G-line to expire.
833 The reason for adding this is that a KILL is rather useless for removing
834 (or 'warning') abusers (it is still THE command to remove ghosts and
835 a-like, the reason KILL was added in the first place). However, adding
836 G-lines for a dynamic IP with expire times larger then 10 minutes is highly
837 discouraged: The user will already have dialed in via another IP or account
838 and the G-line would only harm other, innocent, users.
840 Allow Opers to connect from a remote site
842 If you select 'n' for this, clients must be on the 'same network' as
843 the server in order to gain oper privledges. If you're not sure, just
846 Allow local opers to use the REHASH command
848 Allows a local operator (defined by a lowercase o:line in ircd.conf)
849 to cause the server to reload its configuration file (ircd.conf) with
850 the REHASH command. If unsure, select 'n'.
852 Allow local opers to use the RESTART command
854 Allows a local operator (defined by a lowercase o:line in ircd.conf)
855 to use the RESTART command. If unsure, select 'n'.
857 Allow local opers to use the DIE command
859 Allows a local operator (defined by a lowercase o:line in ircd.conf)
860 to use the DIE command. If unsure, select 'n'.
862 Allow local opers to add local G-lines
864 Allows a local operator (defined by a lowercase o:line in ircd.conf)
865 to add local G-lines with the GLINE command. This is like a *local* KILL,
866 except that the user being killed can't immediately reconnect: He will
867 have to wait for the G-line to expire.
869 Do you want to have a default LIST parameter
871 Pre-Undernet, the LIST command could either be given with one channel
872 name, or without any parameter. In the last case it would simply list
873 all channels. In time the IRC networks grew big, until the output of
874 the LIST command always filled up the sendQ of the client (and dis-
875 connected it). This was fixed by Carlo Wood (Run@IRC) on request of a
876 Dutch ISP whose users complained about this: The LIST output is now
877 generated in small chunks, generating more each time when there is room
878 in the clients sendQ. However, then it turned out that LIST (now it
879 worked) used 50% of all cpu (not even mentioning the bandwidth)...
880 This was unacceptable and the mentioned patch was disabled. On the
881 other hand we wanted LIST to work at least partly, so a few new
882 parameters have been added to LIST: <,>,C<,C>,T<,T> each followed by
883 a number they filter respectively the number of users on the channel,
884 the creation time of the channel (or age, depended on the value of
885 the number) and the topic set time.
886 If you specify 'y' here, then each time a "/LIST" (without parameter)
887 is issued by a client, a default parameter is used. Note that when
888 a parameter is used, the client can still max. sendq out - the send
889 flood control only works without any parameter.
890 If you specify 'n' here then a "/LIST" without parameters will list
891 all channels (and work), but as just said: it uses a LOT of cpu and
892 bandwidth on a large net.work.
893 If you specify 'y' you will be prompted for the default parameter.
895 Give default LIST parameter
897 Here you need to specify the default LIST parameter which is used
898 when the server receives a LIST without any parameter.
899 You should use something that limits the output to a maximum of a
900 few hundred channels; for instance "T<10" (topic is set less then
901 10 seconds ago) or ">10" (more then 10 users on the channel) or even
902 a combination of this. Note that you should not include quotes here.
904 K: line comments treated as a file
906 If you specify 'y' here, then K: line comments (see doc/example.conf
907 for more details on the K: line syntax) will be treated as a filename
908 by default. The file needs to exist and will be written to clients
909 that match that K: line.
910 If you specify 'n' here, then K: line comments will be treated as
911 a comments by default.
912 In both cases you can override the default by prepending a filename
913 with a '!' or enclose a comment between double quotes.
914 If unsure, use the default.
916 Only nullify idle-time on PRIVMSG
918 The IRC command WHOIS gives an idle time for clients. If you want that
919 this idle time is set to zero only when the clients send a PRIVMSG,
920 then you should specify a 'y' here.
921 If you specify a 'n' then the idle time will be nullified on all messages
922 except the server PING/PONG.
924 Check clone limit (2!)
928 Check clone period (20!)
932 Check clone delay (600!)
936 Max auto connects per class (1!)
940 Enable message logging
942 Define this if you want the server to log received messages in static memory
943 at parsing time. -This is for debugging purposes only-. You might want to
944 redefine LOG_MASK_TYPE in s_debug.h and LOG_MASK_LEVEL in s_debug.c too.
945 The default is to log all messages that change some status in server's data
946 structures. Select 'n' unless you are debugging the server code.
947 DO NOT SELECT THIS ON PRODUCTION SERVERS!
951 Number of messages to log. Keep this low as raising it to 1024 will use 800k
952 of _static_ memory! Recommended value is 128. You must include this even if
953 you selected 'n' for MSGLOG_ENABLED.
955 Only allow KILLs of local clients
957 This only allows operators of this server to KILL clients directly connected
958 to this server. Operators will not be able to issue KILLs for clients on
959 other servers. Some networks (not Undernet) require that this be defined
960 for newly linking servers, but if you haven't been told to do otherwise,
963 Max server idle time (60)
965 This is the maximum idle time for the server. If no messages are received
966 in TIMSEC seconds, PINGFREQUENCY and CONNECTFREQUENCY are checked.
967 Recommended value is 60 seconds.
969 KILL nick chase time limit (30)
971 This is the maximum amount of time a KILL command will automatically change
972 to the current nick of a user that has just changed nicks from the one given
973 with the original KILL. Don't change this unless you really need to.
975 Max number of channels per user (recommended: 5)
977 This is the maximum number of channels a user can be in at a time.
978 The "mandatory" value on Undernet is currently 10. Since it only
979 influences the local server when you decrease it, its up to you to decide
980 if you want to use a smaller value. Do not use a larger value however,
981 because it DOES cost more memory and bandwidth on all other servers
982 when you allow users to join more channels simultaneously.
983 One of the most important reasons to choose a smaller value is the fact
984 that the now-a-days 'GUI' clients tend to stay on every channel they
985 join (they aren't bothered by flooding in other channels). It DOES take
986 your bandwidth however to send all those messages for 10 different
987 channels to all your users.
989 Max number of silence masks (15!)
991 This is the maximum number of masks a user can silence at a time.
992 The silence command allows users to filter messages directed at them
993 from certain users or domains, at the source server. Increasing this
994 number allows users to use up more memory with inefficient use of the
995 command. If your not sure, don't change this.
997 Expected average banmask length (40!)
999 This is the expected average banmask length. Leave it at 40.
1001 Use .config of THIS source tree as your upgrade default
1003 Each source tree keeps its *own* config/.config file with the default
1004 values for all questions (those that you gave the last time you did a
1005 'make config'). Whenever you do 'make config' again in this source tree,
1006 you will get these defaults.
1007 However, when you *upgrade* to a new version (and get a NEW source tree),
1008 it doesn't have a .config yet and will (try to) use a .config of one of
1009 your previous source trees.
1010 If you specify 'y' here, then the last defaults of THIS source tree will
1011 be used in your next upgrade. Note that any changes you make later to
1012 config/.config (by running 'make config' again) will also take effect
1013 on this later upgrade.
1014 You can always change this by making a new hard link from .config ->
1015 ircu2.10.xx/config/.config in the directory where you keep the source
1017 If unsure, and you are not currently installing a test source tree,
1018 specify 'y'. If this is a second source tree that you will only be
1019 experimenting with, specify 'n'.
1021 Class 0 ping frequency (120)
1023 If the daemon doesn't receive anything from any of its links within
1024 PINGFREQUENCY seconds, then the it will attempt to check for an active link
1025 with a PING message. If no reply is received within (PINGFREQUENCY * 2)
1026 seconds, then the connection will be closed. This value is overridden by
1027 a Y:line in "ircd.conf" if the connections I/C/N: line in "ircd.conf" assigns
1028 a specific class to the connection (recommended).
1030 Class 0 connect frequency (600)
1032 This is the default frequency that the server attempts to reconnect with
1033 its uplink server if it is set to auto connect to it. Note that this value
1034 is overridden by a Y:line in ircd.conf if the C/N:lines in ircd.conf
1035 assigns a specific class to the connection (recommended).
1037 Min time before a link is good (300)
1039 Often the net breaks for a short time and its useful to reestablish the
1040 same connection faster than CONNECTFREQUENCY would allow, but to keep
1041 from trying again on a bad connection, we require that the connection be
1042 open for a certain minimum time. The recommended value is 300 seconds.
1044 Wait before reconnecting to good link (10!)
1046 When attempting to quickly reestablish a connection to a good link, we
1047 give the net a few seconds to steady. This time must be long enough for
1048 the other end to notice it broke too. The recommended value is 10 seconds.
1050 connect(2) timeout (90!)
1052 Number of seconds to wait for a connect(2) call to complete. NOTE: this
1053 must be at *LEAST* 10. When a client connects, it has CONNECTTIMEOUT - 10
1054 seconds for its host to respond to an ident lookup query and for a DNS
1055 lookup to complete. It is recommended you don't change this value, but if
1056 you do, consider the fact that users whose clients do not support NOSPOOF
1057 will have to type /QUOTE PING <big number> before registration.
1059 Max send queue (40000)
1060 DEFAULTMAXSENDQLENGTH
1061 This is the default value of the "max. sendq length" of Y: line classes
1062 (see doc/example.conf for details on Y: lines). You will probably
1063 always override this value in your "ircd.conf" with the Y: lines.
1064 The given value used to be an often used value for client sendqs.
1066 Use new MODE implementation
1068 This enables a new implementation of m_mode. THIS IS AN EXPERIMENTAL
1069 FEATURE; DO NOT ENABLE UNLESS YOU KNOW WHAT YOU ARE DOING! Note that,
1070 due to apparent stability, this new implementation has been enabled.
1072 Use new oper commands (JUPE, CLEARMODE, OPMODE, GLINE)
1074 Several new oper-only commands were added to the server source
1075 during the Uworld integration project. Until all servers are
1076 upgraded to versions that understand the new server<->server
1077 traffic, they must remain disabled, however. This option activates
1078 the client-side part of those changes.