From 4c421647b54d547444e6d78c95ee008febf59331 Mon Sep 17 00:00:00 2001 From: Emil Williams Date: Tue, 27 May 2025 19:10:30 -0600 Subject: [PATCH] -- --- irc.html | 50 ++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 50 insertions(+) create mode 100644 irc.html diff --git a/irc.html b/irc.html new file mode 100644 index 0000000..bcbde1d --- /dev/null +++ b/irc.html @@ -0,0 +1,50 @@ + + + + + + + +Xolatile.Top + + +

Registering

+

You need a client that can connect with SASL (Weechat, irssi, etc.) and must fully set it up BEFORE reconnecting.

+

You'll have exclusive control over your nick and will have enabled a server-side bouncer.

+

+/nick your_nick_forever
+/msg nickserv register 
+
+

Authentication methods (pick one)

+

SASL PLAIN

+

Simple plaintext password, the most widely supported and relatively easy to setup.

+
+set sasl_mechanism = plain
+set sasl_username  = nick
+set sasl_password  =  # same as registration
+
+

+

CertFP/SASL EXTERN

+

Certificate based authentication, more intensive setup. You're objectively cooler for using it.

+

The following commands are required, this generates a valid certificate and prints the fingerprint which you must copy to your IRC client.

+
+$ openssl genpkey -algorithm ed25519 -out private.pem
+$ openssl req -new -x509 -key private.pem -out cert.pem -days 365
+# go through the prompt, just hit enter...
+$ cat private.pem cert.pem > nick.pem
+$ rm private.pem cert.pem
+# then get your fingerprint, copy this into your clipboard...
+$ openssl x509 -in nick.pem -outform DER | sha256sum -b | awk '{print $1}'
+$ mv nick.pem ~/.cert/
+
+

Add that fingerprint like this:

+
+/msg nickserv cert add FINGERPRINT
+
+

For weechat, you may configure it like this, and in general these are the details you must supply:

+
+set sasl_mechanism = external # overrides sasl configuration and uses client-side tls cert
+set tls_cert = ~/.cert/nick.pem
+
+ +