Dancer-ircd Conferen in debian

Pagina: 1
Acties:
  • 167 views sinds 30-01-2008

  • stefklep
  • Registratie: Januari 2003
  • Laatst online: 06-05 11:07

stefklep

((Stefklepje))

Topicstarter
Ik heb paar maanden terug debian geïnstalleerd. Dat bevalt me allemaal goed nu wouw ik graag ook een irc server op zetten. Dus heb ik apt-get install dancer-ircd gedaan dat is allemaal goed gegaan. ik willen nu ook graag een cannel en dat is nu het probleem ik kan geen cannel aanmaken. Hij geeft ook elkeer deze fout
*** Notice -- Server is currently split, channel modes are limited.
Ik ben ook al wisten google kan over deze fout niet zo veel vinden. En kan ook nergens anders vinden waar ik dan precies die cannel moet aanmaken ik heb het in de /etc/dancer-ircd/ircd.conf gedaan
Ik weet op dit gebied er niet zo veel over op de site van debian kan ik ook niks terug vinden.

Stefklep

  • Vae Victis
  • Registratie: April 2001
  • Laatst online: 06-05 22:46

Vae Victis

Dark Lord of the Sith

Ik denk dat je eens moet verdiepen in je config van je ircd.
Je ircd wil connecten met een andere irc server.
Omdat die dat niet mag/kan geeft hij aan dat hij gesplit is.
En mag je geen chans aanmaken.

Even in je config duiken dus, staat meestal zeer duidelijk in wat en hoe je moet configgen.

  • stefklep
  • Registratie: Januari 2003
  • Laatst online: 06-05 11:07

stefklep

((Stefklepje))

Topicstarter
Ik heb het probleem gevonden van *** Notice -- Server is currently split, channel modes are limited.
maar nu zit ik nu nog met het probleem ik kan nergens geen cannels aanmaken

  • Vae Victis
  • Registratie: April 2001
  • Laatst online: 06-05 22:46

Vae Victis

Dark Lord of the Sith

Chans aanmaken doe je met clients dat weet je?

  • stefklep
  • Registratie: Januari 2003
  • Laatst online: 06-05 11:07

stefklep

((Stefklepje))

Topicstarter
ik wil alleen bv #stefan aanmaken en dat gaat niet met de client alles al geprobeerd maar dat lukt niet

  • Vae Victis
  • Registratie: April 2001
  • Laatst online: 06-05 22:46

Vae Victis

Dark Lord of the Sith

Zonder config file kan niemand echt zeggen wat er nou mis is.
Duik er eens in en ga alles even stap voor stap bijlangs.
En lees ook even de readme en install file die erbij geleverd zijn.
Staat vast ook in hoe je je config file aanpast.

  • stefklep
  • Registratie: Januari 2003
  • Laatst online: 06-05 11:07

stefklep

((Stefklepje))

Topicstarter
# IRC - Internet Relay Chat, doc/example.conf
# Copyright (C) 1992, Bill Wisner
#
# Modified by Rodder, Jon Lusky <lusky@blown.net>,
# at one time, but he didn't credit his changes.
# Updated Dec 19, 1997 Diane Bruce aka db/Dianora <db@db.net>
# please also read example.conf.trillian, it covers
# elements this example misses.
# -db
# Updated again July 17, 1998 -db
# Updated 990102 to take out P: line connection limiting code
# Updated again July 5, 1999 -db
# Updated for dancer 2000/08/04 -- asuffield
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 1, or (at your option)
# any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
#
#
# IRC example configuration file
#
# This file describes the information that should be present in your IRC
# configuration and how to present it.
#
# M: set your server's name. Fields are, in order, host name (domain style),
# optional bind address, a text name, and unused.
#
# NOTE: The "optional bind address" is an address used in binding to a
# local address when we connect outbound. For example, if your server machine
# is myhost.example.com (192.168.1.5) and you want IRCD to connect to others
# from irc.example.com (192.168.1.250), you'd put 192.168.1.250 in the
# "optional bind address" field. If left blank, UNIX will choose the primary
# address of the interface closest to the destination.
#
# NOTE: As of hybrid-6, the port field no longer binds a port by default.
# It is an inoperative and obsolete field.
#
M:hannibal.xs4all.nl.:192.168.1.60:hannibal.xs4all.nl:
# #H@nnibal
# A: administrative information. This line should have three fields, which
# may contain any arbitrary text. It is printed by the /ADMIN command.
#
A:Example location:My address:H@nnibal <irc@hannibal.xs4all.nl>

#
# Y: define connection class. A class must be defined in a Y: line before
# it is used in a C, N, or I line. The fields are, in order, class number,
# ping frequency in seconds, connect frequency in seconds, maximum
# number of links (used for auto-connecting), and size of sendq.
# For servers a sendq of at least 4mb is recommended if not more.
#
# N.B. Y lines must be defined before I lines and O lines, since
# both I lines and O lines make reference to Y lines or classes.
#
# For clients, the connect frequency field is used to set the maximum
# number of connects from same IP address. i.e. setting this field to '1'
# will limit every I line using this Y, to one connection per IP address.
# leaving it blank or 0, will disable any such checking.
#
# Class numbers must be positive to ensure future modification of ircd to
# use -1 internally could not be complicated with it's use externally.
#
Y:1:90:0:20:100000
Y:2:90:300:10:4000000

#
# .include lines, insert a file from DPATH directory into the conf
# you could use this to insert a common file between several
# ircd's if you wished. include files are handled after all the
# other lines in the conf file are done. i.e. a .include is always
# as if it was at the end of the conf file.
#
# This brings in the external O:lines file, if there is one
.include "/etc/dancer-ircd/olines"

#
# I: authorize clients to connect to your server. You can use domains,
# IP addresses, and asterisk wildcards. The second field can contain a
# password that the client must use in order to be allowed to connect.
# The optional fifth field may contain a connection class number.
#
#I:NOMATCH::*.alaska.edu::1
#I:NOMATCH:password:acad3.alaska.edu::1
#
# If using IDENT, to activate it, you need to place a "user@" in the
# host segment.
#
#I:*@acad3.alask.edu::*@acad3.alaska.edu::1
#I:root@acad.alask.edu::root@acad.alaska.edu::1
#
# The above are bad examples of I-lines, what really happens is something
# like this:
#

I:NOMATCH::*@*::1

## This is a correct example in hybrid-6, the username
## is not used for an IP I line (this may be changed, its a simple change
## but EFnet is currently deprecating the use of non resolving client hosts)
## If the IP block has a resolving host name, it will be shown instead
## of the IP address. This just serves to allow on an entire block of ip's
## without needing to specify each individual hostname.
## Note, you must use an 'x' in the name field

#I:128.250.0.0/16::x::1

#
# You can also limit the number of connections from one host
# to any value. This can be used to stop cloners
# This is done using the normally unused confreq line in the Y line.
#
# i.e.
# Allow 100 users in a "bad boy" class, but allow only ONE
# user per IP to connect at a time.
#
#Y:3:90:1:100:100000
#
# Remember to put your "bad boy" I line last in the file, so it
# seen first and matches first before your standard I lines
#
# With hybrid ircd, max connections is taken from the class
# not per I line. i.e. the 3 I lines following will always add
# up to 100 or less, not 100 per I line.
#
#I:NOMATCH::*@*ppp*::3
#I:NOMATCH::*@*slip*::3
#I:NOMATCH::*@*ts*::3
#
# a name pattern in the first field will never cause a match since it's only
# ever matched against an IP# in the form a.b.c.d and a number in the third
# field will never match since a hostname is always compared against this
# field. The '@' needs to be in the IP# section for ident to be used.

#
## additional prefix characters in I lines are defined
##
## from comstud
##
## 1) There are noticable differences in I: lines now.
## There are 4 special characters that you can stick in front
## of a hostname or ip# that do special things.
## These characers are:
## - This will never put a ~ for a user not running identd
## + This will force people matching this I: to require identd
## ! This means to only allow 1 connection per ip# in this I:
## $ (Not used in hybrid)
##
## Examples:
##
## a) I:x::!*@*ppp*::class will only allow X connections per ip# for people
## who have *ppp* in their hostname where X is given in the Y: line.
## If there is no ! and you have a limit in your Y: line, then it matches
## full user@host instead of just host.

## b) I:x::-*@*.cris.com::class will never show a ~, even though they may
## not be running identd. (This is equivilent to the old way of not
## specifying a @ in the I: line).

## Additionally since ircd-hybrid-6
## B/E/F lines were removed and replaced with 3 other special characters
## in I lines
##
## ^ This will exempt a user from K/G lines, limited protection from D lines
## & User can run bots (old B line)
## > This user is exempt from I line/server side connection limits
## (old F line)
## _ This user is exempt from G lines
##
## A variant of amm's spoofing code was added
## = Spoof this users IP, normally only used for opers
##
## < This user is exempt from idle restrictions if IDLE_CHECK is defined
##

## Examples
## c) I:NOMATCH::^db@koruna.varner.com::3
## This user is exempt from k/g lines
## d) I:NOMATCH::&jerdfelt@*mindspring.net::3
## This user can run a bot, and is also "e lined"
## e) I:NOMATCH::>lusky@*vol.com::3
## This user is immune from I line limits
## f) I:NOMATCH::^&>mpearce@*varner.com::3
## This user can run a bot, is exempt
## from client connect limits.
## g) I:smurfers.are.lame::=dgalas@*somewhere.com::3
## Show this user as being dgalas@smurfers.are.lame
## an IP can be used instead as long as the name field does not begin
## with an 'x'
## i.e.
## I:192.168.0.0/24::x::3 #this is an IP I line
## I:192.168.0.0::db@*somesite.com::3 #this is a spoofed IP
#
# O: authorize operators. Fields are, in order, host name the operator must
# be logged in from (wildcards allowed), operator's password, operator's
# nickname.
##

## O:lines are better described in the dancer-oper-guide than here
## The new format for dancer has the 4th field (port) as the allowed umodes,
## and the 6th field (after the connection class) as the default umodes to
## be set on OPER.
# Examples:

O:*:$1$nmNi3oKw$/TTB9SfKK3.KPYfKBYLy20:admin:abcdDfFgGhHkKlLmMnNpPrRsSUvVwWxXyYzZ0123459*:1:acdDfFgGhHkKlRsSUvVWXyYzZ0123459
O:*:$1$nmNi3oKw$/TTB9SfKK3.KPYfKBYLy20:luser::1:

## NOTE: These examples are from hybrid, and are not valid for dancer.
#
# The first example allows me to become an operator from any
# machine in alaska.edu by typing /oper crunchy frog.
#
#O:*.alaska.edu:frog:crunchy
#
## This example allow this oper, to global kill, do remote squit/connect
## unklines, glines, and use umode +n
##
#O:db@*db.net:-encrypted password-:Dianora:ORUGN:3
#
##
## This example disables this opers use of global kill, unkline, and gline
## The oper can still do remote squits/connects
##
#O:newbie@*some.net:-encrypted password-:newbie:oug:3
##
## This example disables this opers use of global kill, unkline,
## gline and gline and remote squits/connects
## essentially the same permissions as a local oper, but with the "vanity"
## They can still local kill and kline for example.
##
#O:vanity@*some.net:-encrypted password-:vanity:oug:3
##
## you could make someone vantiy even more, by disabling their
## kill/kline privs... note they can still do full traces
## umode +c (watch connections) and do rehash
## But otherwise, this set of flags is not practical for
## a normal oper.
##
#O:vanity@*some.net:-encrypted password-:vanity:nougk:3
#
## a monitor bot could be given the following privs
## k - no kline/kill
## g - make sure no GLINE
## o - no global kill (already taken care of by 'k' flag above)
## r - no remote routing/squits
## N - allow this monitor to use umode +n for nick changes
##
## Some admins do not like remote tcm kills/klines. If this
## tcm oper gets compromised, the best they can do is
## rehash/trace/umode +cn , i.e. no global kills or "fun" for the
## compromised o line. But its still quite usuable for monitoring
## clones and nick flooders.
##
#
#o:tcm@*varner.com:-encrypted password-:tcm:kgorN:3
#
## Of course, leaving out the flags entirely defaults to
## reasonable defaults, so if you don't want to worry about it, then don't.
## You can always add G later for example.
#
## O : Global operator
## No explicit G or G-line flag, no N or allow umode +n flag
##
#O:db@ircd.dianora.com:-encrypted password-:Dianora::3
#
# o : local operator.
#o:trainee@shell.box.com:password:MyNick::3
#
##
## The fifth field of an O line, is the new class this oper will join
##

# C:, N: set up connections to other servers.
#
# C: specifies a server that your server may connect to.
# N: allows a remote server to connect to your own.
#
# The two lines are usually given in pairs.
#
# These lines may contain a password in the second field. In fact, to
# maintain proper security, *all* IRC server links must have passwords.
#
# If a C: line contains four fields (the fourth being a TCP port number)
# IRC will actively try to connect to that server. You should have at least
# one such line.
#
# If an N: line contains four fields, the fourth should contain a number that
# specifies how many components of your own server's name to strip off the
# front and be replaced with a *. This is done to implement hostmasking.
# For example, to make hayes.ims.alaska.edu present itself to the world as
# *.alaska.edu, I would use a 2 (to strip off the first two parts). If you
# use this, be sure to tell the administrator of the servers you link to --
# they must add your hostmasked name to their configuration file or you will
# be unable to connect.
#
# The host part of C/N lines MUST contain a valid hostname or IP address
# The host part in the C:line MUST be identical to the host part in the N:line
# The name part of the C/N lines MUST match the associated H/L line name
#
# The fifth field may contain a connection class number.
#
# The following two lines tell my server to try connecting to
# byron.u.washington.edu.
#
#C:byron.u.washington.edu:crunchyfrog:byron.u.washington.edu:6667:2
#N:byron.u.washington.edu:crunchyfrog:byron.u.washington.edu:2:2
#
# The following two lines allow a server to connect to my server, but my
# server will not make any attempt to connect to it. Note that since the
# server is local to me, I am not using hostmasking.
#
#C:kaja.gi.alaska.edu:llamas:kaja.gi.alaska.edu::2
#N:kaja.gi.alaska.edu:llamas:kaja.gi.alaska.edu::2
#
# C and N lines may also use the "user@" combination in the same way as
# the I-lines.
#
#C:wisner@kaja.gi.alaska.edu:llamas:kaja.gi.alaska.edu::2
#N:wisner@kaja.gi.alaska.edu:llamas:kaja.gi.alaska.edu::2

## The password in the N:line is usually an MD5 hash, not cleartext
## It must match the password in the C:line on the remote server.
## For serious security, the two servers should have different passwords
## in their C lines, with each other's hash in their N lines.

#
# K: kill a user automatically upon connecting. This is used to deny
# troublesome users access to your server. The fields are, in order,
# hostname (wildcards are allowed), time of day, and username.

## Timed k-lines and R: lines are not recommended by the hybrid
## team. They might not even work. Timed-klines made more sense
## for university ircd's but nowadays with so many open irc servers
## around, it just seems pointless.
## -Dianora

# The second example restricts access from acad3.alaska.edu from
# 9:00am to noon, and 2:00pm to 5:00pm. This form is only supported if
# TIMED_KLINES is defined.
#
#K:*.alaska.edu::FSSPR
#K:acad3.alaska.edu:0900-1200,1400-1700:*

# Note: it is preferable to place and remove K:lines from a running
# ircd, with the KLINE and UNKLINE commands, which write to the kline.conf
# file directly, in order to handle timestampts and distribution
# across the network cleanly.

#
# R: restrict user access. This is an extended form of the K: line.
# It looks for a match then runs an outside program that will determine
# whether the person should be allowed on. The fields are hostname,
# program, and username. A full pathname to the program should be used.
# The output of the program should be a string of the form "Y <message>"
# to allow the user, or "N <message>" to block them. In the first case
# the message is ignored; in the latter, it is sent as an error message
# to the user. R: lines are only functional if activated in config.h.
#
#R:kaja.gi.alaska.edu:/usr/local/lib/irc/does-eric-get-in:ejo
#
## NOTE: L:lines are not really appropriate for centrally maintained
## networks. It is not recommended that you use them.
#
# L: leaf. This forces the server listed to act as a leaf. If such a
# server allows any other servers to connect to it, its link is
# dropped. If a port parameter is non-zero, it is used to control the
# maximum depth that link will allow, where depth is the tree depth of
# that branch.
#
#L:::kaja.gi.alaska.edu
#L:::cm5.eng.umd.edu:1
#
# A new extension to the L-line allows you to be selective
# about which other servers you wish the connecting server to behave as
# as a leaf towards. The following would not allow any server connecting
# with a name that matches *.fi to introduce a server matching *.edu.
#
#L:*.edu::*.fi
#
# H: Hub. This is required to allow other servers which connect to you as
# a hub and introduce other servers.
#
#H:*.au:*:*.au
H:*::*
#
# P : port. The port line allows the server to listen on various ports for
# connections. Fields in order: unused,
# address to bind to, unused, port to listen on
#
# NOTE: As of hybrid-6, you MUST have at least one P: line defining a port
# to listen on, or the server won't do much.
#
P::::6667
#P::209.42.128.252::31337
#
# Listen on port 6665 on all available interfaces. Only allow connections from
# net 128.32. This is checked before existance of other access is available.
# 128.32.* == 128.32.0.0 where 0 is a wildcard.
# Also listen to port 31337 on only 209.42.128.252. Allow connections from
# anywhere.
#
# D : dump. Dumps all connect attempts from the matched IP
# without any procesing.
#
# First arg is target IP and CIDR mask, second is a comment.
#
#D:208.148.84.3:bot host that changes domain names frequently
#D:128.183.0/24:NASA users aren't supposed to be on IRC
#
# d : immunity to D dump
# As in D line , First arg is targe IP and CIDR mask, second is a comment.
#
#d:199.0.154.0/24:Don't D line ais.net:

## NOTE: This is "not approved on OPN". Nor is it active in the default
## compile-time configuration. All dancer servers are slaved to each
## other by default, and this is the intended usage of dancer. All other
## applications are unsupported.
#
# server "clusters"
# U: lines treat each of these servers as being part of your server cluster
# klines placed on this server will be forwarded to the servers named
# in the U lines here. LOCOPS will also be forwarded, but will appear
# as "SLOCOPS" instead of "LOCOPS"
#
# i.e. irc_hub.somewhere.net has leaf servers irc1.somewhere.net
# irc2.somewhere.net

# Hub server would have
#U:irc1.somewhere.net:
#U:irc2.somewhere.net

# each client server would have
#U:irc_hub.somewhere.net


#
#
# Q lines, not the old server Q lines, but Quarantine lines for
# nicks. Only checked at NICK time, i.e. if added and hashed in
# will not kill users who match this nick.
#
#Q:dcc-*:dcc bots not allowed on this server
#Q:lamestbot:You have to be kidding me
#Q:crush:In memory of Janet Pippin
#Q:cwush:In memory of Janet Pippin
#Q:callas:Only allowed from this host:callas@oper.irc.arpa.com

#
# if JUPE_CHANNEL is defined you can also jupe a channel locally
#
## NOTE: JUPE_CHANNEL is not defined by default. This may change later
## when it can be arranged for a jupe to propagate across all servers
## more effectively.
#
# i.e. no one on your server can join this channel.
# You need the backslash to escape the # in the channel
#
#Q:\#packet:I am tired of the packet fights for this channel
#
# X lines.
# Used to match gecos fields and prohibit users or warn about users
# who have matching strings in those fields from getting on the server.
#
# All X line matches are sent to opers in +r user mode
# On an X line, a non 0 value for port exits that client
# a 0 value, only warns on +r
#
# These three examples only warn
#X:*www*:Possible spambot warning 1::0
#X:*http*:Possible spambot warning 2::0
#X:*sex*:Possible spambot warning 3::0
#
# These two examples reject the client
# use this to reject IPHONE users
#X:* vc:IPHONE user::1
# This is a very probable spambot
#X:*see me at*:This has GOT to be a spambot::1
#X:*hi baby*:This has GOT to be a spambot::1
Q:\#stefan
#C:#stefan3
# The .include directive is available so you can store
# additional configuration lines in separate files.
# Syntax: .include "filename"

#.include "opers.conf"

# This should contain the name(s) and email(s) of the services
# administrator(s) - just to tell users who to contact w/ questions

A:Inept services admin <hannibal@hannial.xs4all.nl>

# The first field is the name you want the services server to be. It
# should match the C/N lines of the hub server. The second field is
# the text info for the services (it corresponds to the third field
# in a server's M line)

N:services.:Local services

# This line should contain three fields. In order, the password for
# the connection, the hostname (or IP address) of the hub server to
# connect to, and the port to connect at. If no port is specified,
# DefaultHubPort, specified in settings.conf, is used. You may put
# as many S: lines as you wish. If services cannot connect to the
# first server, or gets disconnected, it will move onto the next one
# and so on.
# (The password must match the C/N lines of the hub server).

S:password:hannibal.xs4all.nl:6667
#S:ConnectPassword:irc.hub.net:6667
#S:DumbPass:irc.althub.net:6666
#S:Services:irc.anotherhub.net:

# V: lines specify a virtual hostname to bind to when connecting to
# a remote site. IP Addresses can be used as well. If multiple V:
# lines are given, only the first is used

#V:hannibal.xs4all.nl
#V:192.168.1.60

# O: lines specify users who will have access to HybServ. The first
# field should contain the user's username@host. The second should
# be a password that the user will be required to register with in
# order to use services. The third field is the nickname of the user
# (ie: the nickname that will appear in the partyline) Finally, the
# fourth field is a list of flags the user will have, entitling them
# to different privileges. All four fields must be given, or HybServ
# will not consider the line valid. Read the file doc/README-FLAGS
# for full descriptions on each type of flag available.
# ** NOTE: All passwords should be encrypted if CRYPT_OPER_PASSWORDS
# is defined in config.h (which is the default) - use
# mkpasswd to generate the password

#O:servadmin@services.com:DifficultPassword:ServAdmin:segj
#O:admin@services.com:Password:Nickname:aegj
#O:coadmin@services.com:ChangeThis:Charlie:ae
#O:cool@neat.com:Neato:CoolGuy:jf
#O:oper@oper.com:Oper:OperGuy:ogj

# C: lines specify channels that OperServ will monitor. The first
# field is the name of the channel.

#C:#HybNet
#C:#services
#C:#stefan

# I: lines specify restricted hostmasks. The fields, in order:
# the hostmask, the number of connections allowed from the hostmask.

# Allows only 3 connections from cloneguy@*.clones.org
#I:cloneguy@*.clones.org:3
# Allows a total of 6 users from the .blah.com domain
#I:*.blah.com:6

# B: lines are to specify TCM bots to link to. The fields are, in
# order, the hostname of the box the TCM is running on, the nickname
# of the TCM, the password to use for linking to the TCM, and the
# port the TCM is listening on. If you don't specify a port, the
# default of 6800 is used. Make sure that the TCM bots you list here
# have an N: and C: line in their userlist.cf, matching the password,
# nick (OperServ), and hostname that HybServ is running on.

#B:irc.tcm.com:tcmMON:FakePass:6800
#B:irc.tcm2.org:lalaMON:Blah:

# L: lines give remote TCM bots access to link to HybServ. The fields
# are the hostmask of the remote TCM's box, the nickname of the TCM,
# and the password for connecting. Please see the file TCM-LINKING
# if you have no clue what a TCM is, or are not sure how to get a
# TCM to link to HybServ.

#L:*.tcm.org:tcmMON:FakePass
#L:tcm@*.bots.com:tcmMON:FakePass

# P: lines specify ports to listen on for tcm or user connections
# The fields are the hostmask to accept (optional), the port
# number to listen on, and the type of connection to allow
# (ie: tcm or users) The hostmask field is only used if the
# connection is for users, since the tcm hostmask is given in
# the first field of the L: line

# Listens for tcm bot connections on port 6900
#P::6900:tcm
# Allows users matching *.com to connect on port 5555
#P:*.com:5555:users
# Allows anyone to connect on port 5656
#P::5656:users

# J: lines specify server jupes (servers that match a jupe line
# will not be allowed to connect to the network). The first field
# should contain the name of the server. The second is the reason
# that the server is juped. The third field is the nick of the
# oper who set the jupe, and possibly the date

#J:bad.server.com:you were bad:SideWnder 1998/09/20
#J:slow.server.com:too much lag =P:AnOper 1990/02/02
#J:*.dumb.org:dumb server:AnOper

# G: lines specify users who are banned from the network (glined).
# The first parameter is the hostname. It may also include a
# user@host. The second parameter is the reason the user is glined.
# Finally, the third field is the user who set the gline, and
# possibly the date

#G:*.badguy.com:You are a bad guy:SideWnder 1998/09/20
#G:*dumb@*.dumb.com:Harrassing Users.:SomeOper
#G:*grr*@*:grr:SomeOper 1997/02/01

# M: lines are auto-connecting lines for HybServ - it will try to connect
# those leaves in field 4 to server in field 2 after split time in field
# 5.
#M:irc.myhub1.com:6669:irc.splitted.com:1m 4s
#M:irc.splitted.com::irc.splitted2.com:1h

Verwijderd

NOS policy - updated 01/04/03

erm, het is wel de bedoeling dat je de hints van mensen die replyen opvolgt. Heb je de config al doorgelezen en veranderd? Nu lijkt dit topic teveel op een helpdesk topic, dus gooi ik hem op slot. Success :)
Pagina: 1

Dit topic is gesloten.