IRC-Junkie.org – IRC News

All about Internet Relay Chat

Anope releases v1.9.6

Anope has officially released v1.9.6 as of Feb. 3rd, 2012. This release has some major changes. Not only adds and fixes but some interior changes as well.

As of 1.9.6, Anope has changed some of the configuration, so it is recommended that users upgrading should start with a fresh configuration file.

There is also a new database format, so therefore the old db_plain has now been depreciated. It is recommended that users upgrading should read the example configuration on how to upgrade your databases.

Users using MySQL with previous versions will need to export their databases to flatfile first before importing into 1.9.6.

There have been some significant changes in this version, they are as followed:

  • Added ability to configure emails sent by services
  • Added chanserv/up and chanserv/down
  • Added m_proxyscan
  • Added more configurability for what vhosts are valid
  • Added chanserv/log
  • Added ability to configure ChanServ privileges
  • Added a new database format
  • Added SQLite support
  • Added more verbose messages on start up
  • Added ability for chanserv/suspend and nickserv/suspend to take an expiry time
  • Added no nickname ownership config option
  • Added m_rewrite
  • Added akill IDs
  • Fixed crash in clearusers
  • Fixed crash in /os oper info
  • Fixed eventfd Config check to work properly on OpenVZ

To download this version from the source, Click Here.
To download this version for Windows, Click Here.

Sources: http://www.anope.org/news_index.php

lightIRC v1.2.3 Build 101

As most already know, lightIRC is one of the most popular and most used Flash Clients used on IRC to this date. It has support for multiple languages, css styling, and even a webcam!

The newest version of lightIRC, recently released on Feb. 16, 2012 has added the following features:

  • Added Arabian (ar) translation
  • Parameter showVerboseUserInformation (default false) adds ident and host information for joins, parts and quits
  • Parameter targetFrame (default “_blank”) lets you specify the target frame for clicked URLs in the chat area
  • Fix: Focus did jump to channel input if identify password popup was open
  • Fix: Space key did accept webcam requests while typing a message
  • Fix: Errors occured if having webcam enabled without rtmfp parameter
  • Fix: webcamVideoOnly/webcamAudioOnly bug

lightIRC can be used for both personal use, as well as commercial use, which requires a special license. It can be easily used by all users no matter how IRC savvy they are. It can also be hosted either by yourself, or by using the lightIRC servers.

The most recent version can be obtained Here.

For more information regarding lightIRC, Click Here.

Mac OS X IRC Client Textual Version 2.1 Hits AppStore

The OS X IRC client Textual just got released as version 2.1 in the Mac OS AppStore.

 

What has begun as a fork of LimeChat has quickly evolved into something very distinct and usable, which was a main point of critique with the original.

Textual Mac OS X IRC Client

Textual Mac OS X IRC Client

Textuals’ feature-set is really complete: themes, plugins and an extensive range of configuration options.

One neat feature is the inline display of graphics and YouTube video thumbnails so you know what you’re going to click on even before you click.

What really sets Textual apart from other clients on OS X is its stability – crashes and lockups are really far and few between, if any. Attaching to a bouncer with log-replay doesn’t take longer than a few seconds even for a channel # in the high double-digits.

 

Textual is a fully Lion-compatible and also supports fullscreen IRCing so you’re no longer distracted by work when you’re chatting with your buddies ;)

 

Since 2.1 it now supports SASL plaintext auth, IPv6, regular expression support for highlights and it already complies with Apples’ new sandboxing requirement for Apps distributed via the AppStore.

 

The client is a paid-for app and costs $4.99, is available as a Trial version and even can be built by yourself from source.

 

AppStore link: Textual

Changelog

EGs Project for Atheme

EGs (EpicGeeks Services) is the newest Open Source Web Interface for the Atheme IRC Services Package. It was developed by Joseph Newing (synmuffin), a developer living and working on Ontario, Canada. J. Newing is currently the only developer of the EGs Project.

The requirements for running the EGs Project

EGs currently has support for the following:

  • ChanServ – Channel Info, Topic Changes, Kick/Ban/Akick A User, Channel Flags.
  • NickServ – Nick Info, Password Changes, Email Changes.
  • MemoServ – Read/Send/Receive/Forward Memos.
  • HostServ – View Available vHosts, Request New vHost.
  • OperServ – Global Messages, Akill, Set SuperAdmins, Load/Unload Modules, Rehash Services.

The EGs Project is currently in 3.1 Beta Version, Released on Feb. 24th, 2012. It works with the latest stable version of Atheme IRC Sevices as well as a few older versions. The project has Https support as well as New User Registration.

EGs is currently taking feature requests, as well as allowing features to be developed and sent to synmuffin to review and possibly added to the public version. If you think you deserve access to the git repo, please come talk to synmuffin on IRCMojo

More information can be found at the EGs Development Page

IRC Defender arbitrary code execution exploit

Yesterday, news broke that there is an arbitrary code execution exploit within the still popular IRC security service IRC Defender which is, according to the reporter, being actively exploited.

The flaw is said to be within the InspIRCd link module for which a patched version exists, but according to the original post to the IRC-Security mailinglist there are more flaws within the InspIRCd link module and also within the UnrealIRCd link module.

The original poster on the mailinglist suggests to get rid of IRC Defender immediately and to replace it with something else (have a look at Omega Security Services) and also to check for signs of recent intrusions which have taken place on or after 15th November. He also urges to look out for rogue entries in ~/.ssh/authorized_keys and look for suspicious processes.

So far, at least three networks seem to have been exploited due to this flaw – the highest profile victim so far seems to be the hack of the AnonOps network which also seems to have been possible due to that flaw – contrary to the rumored Anope 0-day.

Original post on the IRC-Security mailinglist is here (needs registration).

Thanks to alyx for the tip etc!

The patched inspircd12.pm link module can be obtained from here.

  Copyright secured by Digiprove