summary refs log tree commit diff
path: root/extra/palaver/pounce-palaver.1 (unfollow)
Commit message (Collapse)Author
2023-02-07Remove pounce-editJune McEnroe
Temporarily? It never got finished and I need to be able to cut new releases of pounce without it.
2023-02-07Set msg.cmd to NULL if it is empty stringJune McEnroe
This fixes allowing empty lines from clients during registration.
2023-02-07Fix segfault parsing line with only tagsJune McEnroe
2022-10-30Check local-pass and sasl-plain in editJune McEnroe
2022-10-30Refactor edit options listJune McEnroe
2022-10-30Use $pounce as clientQuit keywordJune McEnroe
2022-10-30OpenBSD: Fix broken unveil in calico on 7.2June McEnroe
Relevant OpenBSD changelog: > o AF_UNIX socket bind(2) and connect(2) now follow unveil(2) > configuration.
2022-07-17Use xdg.c for pounce-palaverJune McEnroe
2022-07-17Update copyrights, authorsJune McEnroe
2022-07-17Update README for flat extrasJune McEnroe
2022-06-18Flatten extras to top-level directoryJune McEnroe
2022-06-17edit: Validate size is power of twoJune McEnroe
2022-05-19Fix uninit read when checking if bindPath is a directoryJune McEnroe
2022-04-07edit: Rename configs to over & underJune McEnroe
2022-04-04edit: Be more helpfulJune McEnroe
2022-04-04edit: Shuffle option safety aroundJune McEnroe
2022-04-04edit: Note that pounce still needs to restartJune McEnroe
2022-04-03edit: Validate optionsJune McEnroe
2022-04-03edit: Implement completely uncheckedJune McEnroe
2022-04-03edit: Add prospective pounce-edit(1) manualJune McEnroe
2022-04-03Allow quitting pounce from clientsJune McEnroe
2022-03-29Rename client->error to client->removeJune McEnroe
2022-03-29Send 900 as part of stateSyncJune McEnroe
Sent before 001 since that is normally when you would receive it.
2022-03-29Send real account name in fake 900June McEnroe
This only exists in case of clients that won't use a TLS client cert without trying to use SASL EXTERNAL. Honestly I'm not sure if they actually exist. But if they do, they might be happier to receive the real account name afterwards.
2022-03-29Track account name from 900 numericJune McEnroe
2022-03-29Set clientOrigin from bindHost, add dot if necessaryJune McEnroe
Since effectively the difference between a nick origin and a server origin is the presence of a dot.
2022-03-29Replace ORIGIN #define with clientOrigin variableJune McEnroe
2022-03-29Handle CAP REQ causal.agency/passive after registrationJune McEnroe
If we supported disabling caps, there would need to be a corresponding check and activeIncr().
2022-03-14Document using -S to connect over IPv4 or IPv6June McEnroe
2021-11-28notify, palaver: Add -t to trust self-signed certificatesOmar Polo
2021-10-15Remove CAVEATS section 3.0June McEnroe
The first one is already covered in the opening paragraphs. The second is now I think better covered by the DIAGNOSTICS section, though maybe not as specifically.
2021-10-15Note Libera userhost-in-names in QUIRKSJune McEnroe
2021-10-15Prefix other example commands with $ promptJune McEnroe
2021-10-15Add back pounce EXAMPLES sectionJune McEnroe
2021-10-15Prefix example commands with $ promptJune McEnroe
2021-10-15Note TLS certificate requirement early in manualJune McEnroe
2021-10-07Remove certbot from calico(1) exampleJune McEnroe
2021-10-07Don't call pounce a daemonJune McEnroe
2021-10-07Refer to long option names rather than flagsJune McEnroe
Except of course when flags only exist as flags.
2021-10-07Separate options into three sectionsJune McEnroe
2021-10-07Remove mention of capsicum from READMEJune McEnroe
2021-10-07OpenBSD: Simplify unveil(2) callsJune McEnroe
2021-10-05Refactor XDG base directory iterator APIJune McEnroe
Finally something more reasonable for call sites.
2021-10-05Load and reload local certificates like normalJune McEnroe
2021-10-05Delete local-path socket like normalJune McEnroe
2021-10-05FreeBSD: Remove capsicum supportJune McEnroe
capsicum is too impractical and removing it will allow much more straightforward code.
2021-10-05Remove certbot default pathsJune McEnroe
2021-10-03Remove TCP keepalive settingsJune McEnroe
TCP keepalives were originally enabled to solve the problem of client connections staying idle for long periods of time, due to pounce not relaying PINGs from the server. Long-idle TCP connections are likely to be dropped by NAT routers, causing timeouts. Unfortunately, the TCP_KEEPIDLE socket option is not available on OpenBSD, so this was useless for pounce running there. The default timeout before sending keepalives is 2 hours, which is far longer than the timeout used by NAT routers, which seems to be 30 minutes. Now that pounce sends its own PINGs to idle clients approximately every 15 minutes, these TCP keepalive settings are unnecessary.
2021-10-03Intercept client PONGJune McEnroe
Since pounce responds to server PINGs itself and doesn't relay them to clients, the only PING a client could be responding to is one of pounce's, in which case it doesn't make sense to relay the PONG to the server.
2021-10-03Send PING to idle clients after 15 minutesJune McEnroe
This is to keep TCP connections to clients from being idle for more than 15 minutes, since regular PINGs from the server are answered by pounce and not relayed to clients. Note that there is still no timeout on poll(2) unless there are need clients. We assume that we are receiving (and swallowing) regular PINGs from the server at an interval shorter than 15 minutes, so a poll(2) timeout would be pointless.