doc: add IRC SASL authentication in user guide

This commit is contained in:
Sebastien Helleu 2011-08-03 12:30:43 +02:00
parent 4ed5ff86fd
commit c96499c817
4 changed files with 104 additions and 6 deletions

View File

@ -1241,6 +1241,31 @@ $ cat nick.cer nick.key > ~/.weechat/ssl/nick.pem
Für weiterreichende Informationen lesen Sie bitte: http://www.oftc.net/oftc/NickServ/CertFP
// TRANSLATION MISSING
[[irc_sasl_authentication]]
SASL authentication
^^^^^^^^^^^^^^^^^^^
WeeChat supports SASL authentication, using two mechanisms: "plain" (default)
or "dh-blowfish" (crypted password).
Options in servers are:
* 'sasl_mechanism': mechanism to use ("plain" or "dh-blowfish")
* 'sasl_timeout': timeout (in seconds) for authentication
* 'sasl_username': username
* 'sasl_password': password
If you want to use "dh-blowfish" by default for all servers:
----------------------------------------
/set irc.server_default.sasl_mechanism dh-blowfish
----------------------------------------
[NOTE]
The "gcrypt" library required when compiling WeeChat in order to use
"dh-blowfish" mechanism (see <<dependencies,dependencies>>).
[[irc_tor_freenode]]
Verbindung zu Freenode mittels TOR/SASL herstellen
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
@ -1251,7 +1276,7 @@ Dies dient dazu die eigene Privatsphäre und Sicherheit im Internet zu erhöhen.
Zuerst sollte man sicher gehen, dass WeeChat mit <<dependencies,libgcrypt11-dev>> kompiliert
wurde (sofern WeeChat aus den Quellen erstellt wurde); es ist nicht verpflichtend, allerdings
bietet DH-BLOWFISH eine größere Sicherheit als eine PLAIN Authentifikation mittels SASL.
bietet "dh-blowfish" eine größere Sicherheit als eine "plain" Authentifikation mittels SASL.
Im ersten Schritt muss TOR installiert werden. Für Debian (und Derivate):

View File

@ -1222,6 +1222,30 @@ $ cat nick.cer nick.key > ~/.weechat/ssl/nick.pem
For more information, look at http://www.oftc.net/oftc/NickServ/CertFP
[[irc_sasl_authentication]]
SASL authentication
^^^^^^^^^^^^^^^^^^^
WeeChat supports SASL authentication, using two mechanisms: "plain" (default)
or "dh-blowfish" (crypted password).
Options in servers are:
* 'sasl_mechanism': mechanism to use ("plain" or "dh-blowfish")
* 'sasl_timeout': timeout (in seconds) for authentication
* 'sasl_username': username
* 'sasl_password': password
If you want to use "dh-blowfish" by default for all servers:
----------------------------------------
/set irc.server_default.sasl_mechanism dh-blowfish
----------------------------------------
[NOTE]
The "gcrypt" library required when compiling WeeChat in order to use
"dh-blowfish" mechanism (see <<dependencies,dependencies>>).
[[irc_tor_freenode]]
Connect to Freenode with TOR/SASL
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
@ -1231,8 +1255,8 @@ In addition to SSL, Freenode servers support connections with TOR
and groups to improve their privacy and security on the Internet.
First, make sure to have WeeChat compiled with <<dependencies,libgcrypt11-dev>>
(if built from sources); it's not mandatory, but DH-BLOWFISH ensures stronger
security compared to PLAIN authentication system with SASL.
(if built from sources); it's not mandatory, but "dh-blowfish" ensures stronger
security compared to "plain" authentication system with SASL.
In first place, install TOR. For Debian (and derivated):

View File

@ -1258,6 +1258,30 @@ $ cat nick.cer nick.key > ~/.weechat/ssl/nick.pem
Pour plus d'informations, consulter http://www.oftc.net/oftc/NickServ/CertFP
[[irc_sasl_authentication]]
Authentification avec SASL
^^^^^^^^^^^^^^^^^^^^^^^^^^
WeeChat supporte l'authentification avec SASL, en utilisant deux mécanismes :
"plain" (par défaut) ou "dh-blowfish" (mot de passe chiffré).
Les options dans le serveur sont :
* 'sasl_mechanism' : mécanisme à utiliser ("plain" ou "dh-blowfish")
* 'sasl_timeout' : délai d'attente maximum (en secondes) pour l'authentification
* 'sasl_username' : nom d'utilisateur
* 'sasl_password' : mot de passe
Si vous voulez utiliser "dh-blowfish" par défaut pour tous les serveurs :
----------------------------------------
/set irc.server_default.sasl_mechanism dh-blowfish
----------------------------------------
[NOTE]
La librairie "gcrypt" est requise lors de la compilation de WeeChat pour
utiliser le mécanisme "dh-blowfish" (voir <<dependencies,les dépendances>>).
[[irc_tor_freenode]]
Connexion à Freenode avec TOR/SASL
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
@ -1268,8 +1292,8 @@ personnes et groupes d'améliorer leur vie privée et sécurité sur Internet.
Premièrement, assurez-vous d'avoir compilé WeeChat avec
<<dependencies,libgcrypt11-dev>> (si construit depuis les sources); ce n'est
pas obligatoire, mais DH-BLOWFISH assure une meilleure sécurité comparé à
l'authentification PLAIN avec SASL.
pas obligatoire, mais "dh-blowfish" assure une meilleure sécurité comparé à
l'authentification "plain" avec SASL.
En premier lieu, installez TOR. Pour Debian (et dérivés) :

View File

@ -1247,6 +1247,31 @@ $ cat nick.cer nick.key > ~/.weechat/ssl/nick.pem
Per maggiori informazioni consultare http://www.oftc.net/oftc/NickServ/CertFP
// TRANSLATION MISSING
[[irc_sasl_authentication]]
SASL authentication
^^^^^^^^^^^^^^^^^^^
WeeChat supports SASL authentication, using two mechanisms: "plain" (default)
or "dh-blowfish" (crypted password).
Options in servers are:
* 'sasl_mechanism': mechanism to use ("plain" or "dh-blowfish")
* 'sasl_timeout': timeout (in seconds) for authentication
* 'sasl_username': username
* 'sasl_password': password
If you want to use "dh-blowfish" by default for all servers:
----------------------------------------
/set irc.server_default.sasl_mechanism dh-blowfish
----------------------------------------
[NOTE]
The "gcrypt" library required when compiling WeeChat in order to use
"dh-blowfish" mechanism (see <<dependencies,dependencies>>).
[[irc_tor_freenode]]
Connessione a Freenode con TOR/SASL
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
@ -1257,7 +1282,7 @@ utenti e gruppi di migliorare la propria privacy e la sicurezza su Internet.
Per prima cosa, assicurarsi che WeeChat sia compilato con
<<dependencies,libgcrypt11-dev>> (se compilato da sorgenti); non è
obbligatorio, ma DH-BLOWFISH assicura una maggiore sicurezza rispetto al
obbligatorio, ma "dh-blowfish" assicura una maggiore sicurezza rispetto al
sistema di autenticazione con SASL.
Il primo passo consiste nell'installare TOR. Per Debian (e derivate):