Blame
Date:
Wed Feb 1 05:00:29 2023 UTC
Message:
Daily backup
01
2023-01-22
jrmu
version=pmwiki-2.2.130 ordered=1 urlencoded=1
02
2023-01-22
jrmu
agent=Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.164 Safari/537.36 OPR/77.0.4054.277
03
2023-01-22
jrmu
author=wiz
04
2023-01-22
jrmu
charset=UTF-8
05
2023-01-22
jrmu
csum=
06
2023-01-22
jrmu
ctime=1611593974
07
2023-01-22
jrmu
host=77.100.13.190
08
2023-01-22
jrmu
name=Openbsd.ZNCModules
09
2023-01-22
jrmu
rev=7
10
2023-01-22
jrmu
targets=
11
2023-01-22
jrmu
text=(:title ZNC Modules:)%0a%0aSuppose you want to install [[https://github.com/CyberShadow/znc-clientbuffer/archive/master.zip|clientbuffer]], a 3rd party module. Download the source code:%0a%0a[@%0a$ cd%0a$ ftp https://github.com/CyberShadow/znc-clientbuffer/archive/master.zip%0a$ unzip master.zip%0a$ mv znc-clientbuffer-master/{Makefile,clientbuffer.cpp} znc-1.8.2/modules/%0a$ cd znc-1.8.2/modules/%0a$ gmake%0a$ doas su mkdir /home/znc/home/znc/.znc/modules%0a$ doas cp clientbuffer.so /home/znc/home/znc/.znc/modules/%0a$ doas chown -R znc:daemon /home/znc/home/znc/.znc/modules/%0a@]%0a%0a!! Tips%0a%0aPlease don't use fail2ban for znc; one team tried to do it and immediately %0abroke their web panel because fail2ban banned 127.0.0.1 (which relayd uses): %0a%0a[@ %0a20:37 %3cjrmu> help %0a20:37 %3c*fail2ban> Attempts [count]: The number of allowed failed login attempts. %0a20:37 %3c*fail2ban> Ban %3chosts>: Ban the specified hosts. %0a20:37 %3c*fail2ban> Help %3csearch>: Generate this output %0a20:37 %3c*fail2ban> List: List banned hosts. %0a20:37 %3c*fail2ban> Timeout [minutes]: The number of minutes IPs are blocked after a %0a failed login. %0a20:37 %3c*fail2ban> Unban %3chosts>: Unban the specified hosts. %0a20:37 %3cjrmu> list %0a20:37 %3c*fail2ban> 127.0.0.1: 2 %0a20:37 %3cjrmu> unban 127.0.0.1 %0a20:37 %3c*fail2ban> Unbanned: 127.0.0.1 %0a20:37 %3cjrmu> list %0a20:37 %3c*fail2ban> No bans %0a@]%0a%0aI had to unload the module to restore web panel access. %0a%0a%0aZnc has some extra modules like tcl, python etc, if you want to active one or more of these modules for your znc the command would be%0a./configure.sh --enable-tcl --enable-python %0a%0afor help or list of the options you can use %0a./configure --help%0a%0aNB. you got to be in znc directory to issue this command.%0a%0a
12
2023-01-22
jrmu
time=1628694419
13
2023-01-22
jrmu
title=ZNC Modules
14
2023-01-22
jrmu
author:1628694419=wiz
15
2023-01-22
jrmu
diff:1628694419:1612269753:=40,49d39%0a%3c %0a%3c %0a%3c Znc has some extra modules like tcl, python etc, if you want to active one or more of these modules for your znc the command would be%0a%3c ./configure.sh --enable-tcl --enable-python %0a%3c %0a%3c for help or list of the options you can use %0a%3c ./configure --help%0a%3c %0a%3c NB. you got to be in znc directory to issue this command.%0a%3c %0a
16
2023-01-22
jrmu
host:1628694419=77.100.13.190
17
2023-01-22
jrmu
author:1612269753=jrmu
18
2023-01-22
jrmu
diff:1612269753:1612269715:=21,22c21%0a%3c %0a%3c [@ %0a---%0a> %0a37,38c36%0a%3c @]%0a%3c %0a---%0a> %0a
19
2023-01-22
jrmu
host:1612269753=198.251.81.119
20
2023-01-22
jrmu
author:1612269715=jrmu
21
2023-01-22
jrmu
diff:1612269715:1611594829:=16,37d15%0a%3c %0a%3c !! Tips%0a%3c %0a%3c Please don't use fail2ban for znc; one team tried to do it and immediately %0a%3c broke their web panel because fail2ban banned 127.0.0.1 (which relayd uses): %0a%3c %0a%3c 20:37 %3cjrmu> help %0a%3c 20:37 %3c*fail2ban> Attempts [count]: The number of allowed failed login attempts. %0a%3c 20:37 %3c*fail2ban> Ban %3chosts>: Ban the specified hosts. %0a%3c 20:37 %3c*fail2ban> Help %3csearch>: Generate this output %0a%3c 20:37 %3c*fail2ban> List: List banned hosts. %0a%3c 20:37 %3c*fail2ban> Timeout [minutes]: The number of minutes IPs are blocked after a %0a%3c failed login. %0a%3c 20:37 %3c*fail2ban> Unban %3chosts>: Unban the specified hosts. %0a%3c 20:37 %3cjrmu> list %0a%3c 20:37 %3c*fail2ban> 127.0.0.1: 2 %0a%3c 20:37 %3cjrmu> unban 127.0.0.1 %0a%3c 20:37 %3c*fail2ban> Unbanned: 127.0.0.1 %0a%3c 20:37 %3cjrmu> list %0a%3c 20:37 %3c*fail2ban> No bans %0a%3c %0a%3c I had to unload the module to restore web panel access. %0a
22
2023-01-22
jrmu
host:1612269715=198.251.81.119
23
2023-01-22
jrmu
author:1611594829=jrmu
24
2023-01-22
jrmu
diff:1611594829:1611594644:=12,13c12,13%0a%3c $ doas su mkdir /home/znc/home/znc/.znc/modules%0a%3c $ doas cp clientbuffer.so /home/znc/home/znc/.znc/modules/%0a---%0a> $ doas su mkdir /home/znc/home/znc/.znc/modules %0a> $ doas cp clientbuffer.so /home/znc/home/znc/.znc/modules/ %0a
25
2023-01-22
jrmu
host:1611594829=125.231.20.163
26
2023-01-22
jrmu
author:1611594644=jrmu
27
2023-01-22
jrmu
diff:1611594644:1611594346:=12,14d11%0a%3c $ doas su mkdir /home/znc/home/znc/.znc/modules %0a%3c $ doas cp clientbuffer.so /home/znc/home/znc/.znc/modules/ %0a%3c $ doas chown -R znc:daemon /home/znc/home/znc/.znc/modules/%0a
28
2023-01-22
jrmu
host:1611594644=125.231.20.163
29
2023-01-22
jrmu
author:1611594346=jrmu
30
2023-01-22
jrmu
diff:1611594346:1611593974:=6d5%0a%3c $ cd%0a8,11d6%0a%3c $ unzip master.zip%0a%3c $ mv znc-clientbuffer-master/{Makefile,clientbuffer.cpp} znc-1.8.2/modules/%0a%3c $ cd znc-1.8.2/modules/%0a%3c $ gmake%0a
31
2023-01-22
jrmu
host:1611594346=125.231.20.163
32
2023-01-22
jrmu
author:1611593974=jrmu
33
2023-01-22
jrmu
diff:1611593974:1611593974:=1,7d0%0a%3c (:title ZNC Modules:)%0a%3c %0a%3c Suppose you want to install [[https://github.com/CyberShadow/znc-clientbuffer/archive/master.zip|clientbuffer]], a 3rd party module. Download the source code:%0a%3c %0a%3c [@%0a%3c $ ftp https://github.com/CyberShadow/znc-clientbuffer/archive/master.zip%0a%3c @]%0a
34
2023-01-22
jrmu
host:1611593974=125.231.20.163
IRCNow