-
Notifications
You must be signed in to change notification settings - Fork 220
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
common: Default to SSL/TLS for new IRC networks #537
base: master
Are you sure you want to change the base?
Conversation
Change default for newly created IRC networks to use port 6697 with SSL/TLS. It's the year 2020, this should hopefully be a sane default. SSL/TLS can always be disabled as before. Fix up the Doxygen comments for Server::useSSL and PortDefaults.
3482d18
to
312d00e
Compare
One course of action:
Then…
|
Okay, so… HexChat is doing this by default. Time to consider Quassel switching as well..? hexchat/hexchat@747a52a (thanks to
Edit: Of note, Quassel's default network wizard is not affected by this change. Folks that just follow the wizard should still wind up in |
In short
6667
when uncheckingUse encrypted connection
Server::useSSL
andPortDefaults
Rationale
It's the year 2020, and several networks offer SSL/TLS with valid certificates. Quassel could default to enabling SSL/TLS for newly added networks.
However, a few large networks still do not support SSL/TLS on port 6697, alongside locally-hosted bridges, such as Bitlbee. This will require unchecking
Use encrypted connection
to connect those networks without SSL/TLS.All preset networks will work as before, according to the preset (most have SSL/TLS ports added already).
Subjective choice. This may result in increased support requests in
#quassel
.When SSL/TLS is not available on the configured port, Quassel will fail to connect to the IRC network with an error message (i.e.
Connection refused
). This can be remedied by editing the network and uncheckingUse encrypted connection
, but that's an extra step that might put off new users.There are other, more complex options, such as auto-detecting if an SSL/TLS port is available, or supporting the IRCv3
sts
capability.Opinions in
freenode
/#ircv3
are mixed - some clients are doing this already without reported issues, others are in favor of the more complex methods.Examples
Before
Add Network dialog
On the Settings - IRC - Networks page under the
Networks
heading,Add..
button clicked to add a new network to an existing network.Server Edit dialog
On the Settings - IRC - Networks page under the
Servers
heading,Add..
button clicked to add a new server to an existing network.After
Add Network dialog
On the Settings - IRC - Networks page under the
Networks
heading,Add..
button clicked to add a new network to an existing network.Server Edit dialog
On the Settings - IRC - Networks page under the
Servers
heading,Add..
button clicked to add a new server to an existing network.