View Issue Details

IDProjectCategoryView StatusLast Update
0004362unrealircdpublic2023-05-22 12:26
Reporterkatsklaw Assigned Tosyzop  
PrioritynormalSeverityfeatureReproducibilityN/A
Status closedResolutionno change required 
Platformx86_64OSDebianOS Version6/7
Product Version3.4-alpha3 
Summary0004362: [feature] Add vhost::class
DescriptionSimply put, add vhost::class. It works the same as allow::class or oper::class
TagsNo tags attached.
3rd party modules

Relationships

duplicate of 0004216 acknowledgednenolod [feature] Enhance vhost block 

Activities

syzop

2015-06-15 17:16

administrator   ~0018397

Could you tell us where it's for? Like an example case when you would use this?

First reaction: It sounds odd to do class modifying in a vhost block. I mean.. it's for vhosts... later on it was extended to also add an swhois but that's still more or less in the same area of things (namely: appearance). A class, however, is something different.

katsklaw

2015-06-15 19:19

reporter   ~0018399

If you know a person well enough to give them a vhost, you can reasonably trust them with more resources. ie, a higher sendQ or a higher maxclients.

the easiest way to do this is likely to just add vhost::class, then control it via a class block.

katsklaw

2015-06-15 19:32

reporter   ~0018402

as a side note, the severity should be "feature" not "minor". this is a feature request, not a bug.

At present I lack the access to change it myself.

dg

2015-06-24 00:26

reporter   ~0018415

In my usecase, clients from Tor may need a higher maxclients because they all appear from the same IP, whereas for I2P clients they have individual anonymous addresses via CGI.

This would be great to help minimize the need for separate servers.

tmcarthur

2015-07-26 04:55

reporter   ~0018567

At this point, my honest suggestion would be to use an oper block for this kind of thing.

Oper permissions refactor has made it so oper doesn't really give you _any_ permissions without an associated class, but can be used to set things like this.

Thoughts?

dboyz

2015-07-26 05:34

reporter   ~0018568

Firstly, I think assigning vhost to allow block makes more sense.

I think the idea here is to assign vhost to a group of clients categorized under the allow block. A good example here is clients connecting from Tor as mentioned by dg. Once hence receive their vhost as such: "Tor.gateway.unrealircd.org". Another example would be WebIRC: "irccloud.gateway.unrealircd.org".

0004370 has a similar feature request

syzop

2023-05-20 15:50

administrator   ~0022874

Last edited: 2023-05-20 15:52

I don't think the vhost block would be suitable for this. Though I recognize the occasional need for making users special without giving them oper rights.
Sadly what tmcarthur wrote earlier is not really the case, the current oper system even after the rewrite from back then still has lots of IsOper() checks that give at least "reading rights" for various things like IP addresses and such (me also being to blame for that :p).

You could nowadays with security groups do quite some neat stuff. I use this approach on *.unrealircd.org by the way:

security-group staff {
        // Select staff by services account name:
        account { One; Two; Three; Four; }
        // Or by certificate fingerprint:
        certfp {
                aaaaabbbbbccccetc;
        }
}

/* Put people in security-group staff in the class block staff */
allow {
        match { security-group staff; }
        class staff;
}

And then you also create a set::anti-flood::staff block in which you have higher flood limits, lower lag, more maxchannelsperuser and such. Whatever you like.

NOTE: For the staff security group users being put in the staff class, they would either need certfp (always works) or for account they would need to use SASL (does not work when services are down). This because users are put in a class on-connect and not afterwards so NS IDENTIFY afterwards would then match them for security group 'staff' but would not put them in the 'staff' class. It would use set::anti-flood::staff settings for them though.

So I think this issue can be closed. We should tell users more about this great functionality, though, like by best practices or examples :)

syzop

2023-05-22 12:26

administrator   ~0022877

Related feature is now this:
https://www.unrealircd.org/docs/Set_block#Set_block_for_a_security_group

Issue History

Date Modified Username Field Change
2015-06-15 14:43 katsklaw New Issue
2015-06-15 17:16 syzop Note Added: 0018397
2015-06-15 19:19 katsklaw Note Added: 0018399
2015-06-15 19:32 katsklaw Note Added: 0018402
2015-06-24 00:26 dg Note Added: 0018415
2015-07-09 18:57 syzop Relationship added duplicate of 0004216
2015-07-26 04:55 tmcarthur Note Added: 0018567
2015-07-26 05:34 dboyz Note Added: 0018568
2015-08-08 17:49 syzop Severity minor => feature
2023-05-20 15:50 syzop Note Added: 0022874
2023-05-20 15:50 syzop Assigned To => syzop
2023-05-20 15:50 syzop Status new => closed
2023-05-20 15:50 syzop Resolution open => no change required
2023-05-20 15:52 syzop Note Edited: 0022874
2023-05-20 15:52 syzop Note Edited: 0022874
2023-05-22 12:26 syzop Note Added: 0022877