Z-lines do not wait for an ident response from the connecting user, but immediately close the socket once the user’s IP is compared to the Z-line list and a match is found. IRCnet these days runs the ircd 2. Z-lines are a variant of K-lines, which work in much the same way. For more information on changes in ircd 2. Other IRCd’s that utilize this protocol extension include beware ircd.

ircd 2.11

Uploader: Nele
Date Added: 5 February 2012
File Size: 5.82 Mb
Operating Systems: Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X
Downloads: 84952
Price: Free* [*Free Regsitration Required]

Time stamping itself has been revised several times to fix various issues in its design.

ircd 2.11

Today, EFnet opers jupe nicknames that are used as services on other networks. Some servers even run semi-official websites. Large IRC networks consist of multiple servers for horizontal scaling purposes. When a user is k-lined short for kill linethe user is banned from a certain server, either for a certain amount of time or permanently.

Debian — Details of package ircd-irc2 in sid

Using hostmasks and IP addresses in the O-line requires the IP address to remain the same but provides additional security. In its first incarnations, IRC did not have many features that are taken for granted today, such as named channels and channel iircd. The common ports for an IRCd process are towith being the historical default.

With each new IRCd, a slightly different version of the IRC protocol is used, [17] [18] and many IRC clients and bots orcd forced to compromise on jrcd or vary their implementation based on the server to which they are connected. IRC subculture Jarkko Oikarinen. Very few ircds are multithreaded as nearly every action needs to access at least read and possibly modify the global state.


Your unique nick is mentioned in the plethora of text that you get when you connect to the server. Linux offers this ability in the form of epollin kernel series newer than 2.

Forced Nick Change

There are a number of other network “lines” relating to the K-line. In practice IRC operators now use jupe configurations to administratively make channel or nicknames unavailable.

You may want to test this feature thoroughly before relying on it in a channel you irdc about. But what if they change to a nick that gets collided again?

Please update this article to reflect recent events or newly available information. IRCU coders have mentioned increases in the practical capacity per server from 10, users to 20, users. 2.111 and Channel registration are not available, which means that several channels run a bot often an eggdrop to take care of identifying operators and similar channel affairs at a local level.

For more information on changes in ircd 2. G-lines are normally applied to a user who has received a K-line on one server but continues to abuse the network by connecting via a different server. More information on this may be found at http: The latest versions of such protocols are:. Whenever a G-lined person attempts to connect to the IRC network, either the services or the IRC daemon will automatically disconnect the client, often displaying a message explaining the reasoning behind the ban.

RPM resource ircd

This results in delay, and, if the DNS doesn’t return correct results, the banned user may still get on the network. The original code base continued to be developed mainly for use on the IRCnet network.


The TS6 protocol is an extension to the Internet Relay Chat protocol for server to server communications developed initially by the developers of ircd-ratbox. These attempts have met with mixed success, and large doses of skepticism from the existing IRC development community. For some of the reasons listed above, in particular the antique code base, IRCnet is sometimes regarded as a bit old-fashioned network.

Both users then had to reconnect to their servers. Z-lines can also be global, in which case they are called GZ-lines.

Please look at a server overview if you want to connect to the network. It has been extended by various IRC software and has the feature that proper implementations of TS6 can link to each other by using feature negotiation—even if features are disparate. G-lines are a variant of K-lines, which work in much the same way, except K-lines only disconnect clients on one server of the network.

ircd 2.11

You often find that different servers allow a different amount of connections per subnet or IP. Most Z-lines are “awarded” to people who abuse the network as a whole on smaller networks, these are more frequently issued for isolated incidents.