doc: add IRC SASL authentication in user guide
This commit is contained in:
parent
4ed5ff86fd
commit
c96499c817
@ -1241,6 +1241,31 @@ $ cat nick.cer nick.key > ~/.weechat/ssl/nick.pem
|
||||
|
||||
Für weiterreichende Informationen lesen Sie bitte: http://www.oftc.net/oftc/NickServ/CertFP
|
||||
|
||||
// TRANSLATION MISSING
|
||||
[[irc_sasl_authentication]]
|
||||
SASL authentication
|
||||
^^^^^^^^^^^^^^^^^^^
|
||||
|
||||
WeeChat supports SASL authentication, using two mechanisms: "plain" (default)
|
||||
or "dh-blowfish" (crypted password).
|
||||
|
||||
Options in servers are:
|
||||
|
||||
* 'sasl_mechanism': mechanism to use ("plain" or "dh-blowfish")
|
||||
* 'sasl_timeout': timeout (in seconds) for authentication
|
||||
* 'sasl_username': username
|
||||
* 'sasl_password': password
|
||||
|
||||
If you want to use "dh-blowfish" by default for all servers:
|
||||
|
||||
----------------------------------------
|
||||
/set irc.server_default.sasl_mechanism dh-blowfish
|
||||
----------------------------------------
|
||||
|
||||
[NOTE]
|
||||
The "gcrypt" library required when compiling WeeChat in order to use
|
||||
"dh-blowfish" mechanism (see <<dependencies,dependencies>>).
|
||||
|
||||
[[irc_tor_freenode]]
|
||||
Verbindung zu Freenode mittels TOR/SASL herstellen
|
||||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
@ -1251,7 +1276,7 @@ Dies dient dazu die eigene Privatsphäre und Sicherheit im Internet zu erhöhen.
|
||||
|
||||
Zuerst sollte man sicher gehen, dass WeeChat mit <<dependencies,libgcrypt11-dev>> kompiliert
|
||||
wurde (sofern WeeChat aus den Quellen erstellt wurde); es ist nicht verpflichtend, allerdings
|
||||
bietet DH-BLOWFISH eine größere Sicherheit als eine PLAIN Authentifikation mittels SASL.
|
||||
bietet "dh-blowfish" eine größere Sicherheit als eine "plain" Authentifikation mittels SASL.
|
||||
|
||||
Im ersten Schritt muss TOR installiert werden. Für Debian (und Derivate):
|
||||
|
||||
|
@ -1222,6 +1222,30 @@ $ cat nick.cer nick.key > ~/.weechat/ssl/nick.pem
|
||||
|
||||
For more information, look at http://www.oftc.net/oftc/NickServ/CertFP
|
||||
|
||||
[[irc_sasl_authentication]]
|
||||
SASL authentication
|
||||
^^^^^^^^^^^^^^^^^^^
|
||||
|
||||
WeeChat supports SASL authentication, using two mechanisms: "plain" (default)
|
||||
or "dh-blowfish" (crypted password).
|
||||
|
||||
Options in servers are:
|
||||
|
||||
* 'sasl_mechanism': mechanism to use ("plain" or "dh-blowfish")
|
||||
* 'sasl_timeout': timeout (in seconds) for authentication
|
||||
* 'sasl_username': username
|
||||
* 'sasl_password': password
|
||||
|
||||
If you want to use "dh-blowfish" by default for all servers:
|
||||
|
||||
----------------------------------------
|
||||
/set irc.server_default.sasl_mechanism dh-blowfish
|
||||
----------------------------------------
|
||||
|
||||
[NOTE]
|
||||
The "gcrypt" library required when compiling WeeChat in order to use
|
||||
"dh-blowfish" mechanism (see <<dependencies,dependencies>>).
|
||||
|
||||
[[irc_tor_freenode]]
|
||||
Connect to Freenode with TOR/SASL
|
||||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
@ -1231,8 +1255,8 @@ In addition to SSL, Freenode servers support connections with TOR
|
||||
and groups to improve their privacy and security on the Internet.
|
||||
|
||||
First, make sure to have WeeChat compiled with <<dependencies,libgcrypt11-dev>>
|
||||
(if built from sources); it's not mandatory, but DH-BLOWFISH ensures stronger
|
||||
security compared to PLAIN authentication system with SASL.
|
||||
(if built from sources); it's not mandatory, but "dh-blowfish" ensures stronger
|
||||
security compared to "plain" authentication system with SASL.
|
||||
|
||||
In first place, install TOR. For Debian (and derivated):
|
||||
|
||||
|
@ -1258,6 +1258,30 @@ $ cat nick.cer nick.key > ~/.weechat/ssl/nick.pem
|
||||
|
||||
Pour plus d'informations, consulter http://www.oftc.net/oftc/NickServ/CertFP
|
||||
|
||||
[[irc_sasl_authentication]]
|
||||
Authentification avec SASL
|
||||
^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
|
||||
WeeChat supporte l'authentification avec SASL, en utilisant deux mécanismes :
|
||||
"plain" (par défaut) ou "dh-blowfish" (mot de passe chiffré).
|
||||
|
||||
Les options dans le serveur sont :
|
||||
|
||||
* 'sasl_mechanism' : mécanisme à utiliser ("plain" ou "dh-blowfish")
|
||||
* 'sasl_timeout' : délai d'attente maximum (en secondes) pour l'authentification
|
||||
* 'sasl_username' : nom d'utilisateur
|
||||
* 'sasl_password' : mot de passe
|
||||
|
||||
Si vous voulez utiliser "dh-blowfish" par défaut pour tous les serveurs :
|
||||
|
||||
----------------------------------------
|
||||
/set irc.server_default.sasl_mechanism dh-blowfish
|
||||
----------------------------------------
|
||||
|
||||
[NOTE]
|
||||
La librairie "gcrypt" est requise lors de la compilation de WeeChat pour
|
||||
utiliser le mécanisme "dh-blowfish" (voir <<dependencies,les dépendances>>).
|
||||
|
||||
[[irc_tor_freenode]]
|
||||
Connexion à Freenode avec TOR/SASL
|
||||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
@ -1268,8 +1292,8 @@ personnes et groupes d'améliorer leur vie privée et sécurité sur Internet.
|
||||
|
||||
Premièrement, assurez-vous d'avoir compilé WeeChat avec
|
||||
<<dependencies,libgcrypt11-dev>> (si construit depuis les sources); ce n'est
|
||||
pas obligatoire, mais DH-BLOWFISH assure une meilleure sécurité comparé à
|
||||
l'authentification PLAIN avec SASL.
|
||||
pas obligatoire, mais "dh-blowfish" assure une meilleure sécurité comparé à
|
||||
l'authentification "plain" avec SASL.
|
||||
|
||||
En premier lieu, installez TOR. Pour Debian (et dérivés) :
|
||||
|
||||
|
@ -1247,6 +1247,31 @@ $ cat nick.cer nick.key > ~/.weechat/ssl/nick.pem
|
||||
|
||||
Per maggiori informazioni consultare http://www.oftc.net/oftc/NickServ/CertFP
|
||||
|
||||
// TRANSLATION MISSING
|
||||
[[irc_sasl_authentication]]
|
||||
SASL authentication
|
||||
^^^^^^^^^^^^^^^^^^^
|
||||
|
||||
WeeChat supports SASL authentication, using two mechanisms: "plain" (default)
|
||||
or "dh-blowfish" (crypted password).
|
||||
|
||||
Options in servers are:
|
||||
|
||||
* 'sasl_mechanism': mechanism to use ("plain" or "dh-blowfish")
|
||||
* 'sasl_timeout': timeout (in seconds) for authentication
|
||||
* 'sasl_username': username
|
||||
* 'sasl_password': password
|
||||
|
||||
If you want to use "dh-blowfish" by default for all servers:
|
||||
|
||||
----------------------------------------
|
||||
/set irc.server_default.sasl_mechanism dh-blowfish
|
||||
----------------------------------------
|
||||
|
||||
[NOTE]
|
||||
The "gcrypt" library required when compiling WeeChat in order to use
|
||||
"dh-blowfish" mechanism (see <<dependencies,dependencies>>).
|
||||
|
||||
[[irc_tor_freenode]]
|
||||
Connessione a Freenode con TOR/SASL
|
||||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
@ -1257,7 +1282,7 @@ utenti e gruppi di migliorare la propria privacy e la sicurezza su Internet.
|
||||
|
||||
Per prima cosa, assicurarsi che WeeChat sia compilato con
|
||||
<<dependencies,libgcrypt11-dev>> (se compilato da sorgenti); non è
|
||||
obbligatorio, ma DH-BLOWFISH assicura una maggiore sicurezza rispetto al
|
||||
obbligatorio, ma "dh-blowfish" assicura una maggiore sicurezza rispetto al
|
||||
sistema di autenticazione con SASL.
|
||||
|
||||
Il primo passo consiste nell'installare TOR. Per Debian (e derivate):
|
||||
|
Loading…
x
Reference in New Issue
Block a user