WeeChat DevCenter

Tag - sasl

Entries feed

Saturday, June 12 2021

IRC SASL SCRAM authentication

IRC SASL SCRAM authentication has been added in WeeChat 3.2, with 3 new mechanisms:

  • scram-sha-1: SASL SCRAM with SHA-1 digest algorithm,
  • scram-sha-256: SASL SCRAM with SHA-256 digest algorithm,
  • scram-sha-512: SASL SCRAM with SHA-512 digest algorithm.

References:

Sunday, February 8 2015

SASL ECDSA-NIST256P-CHALLENGE

The support of a new SASL mechanism called "ecdsa-nist256p-challenge" has been added three weeks ago.
This new mechanism uses a challenge with public/private key, so no password is required to connect.

Instructions to configure and use this mechanism are in user's guide: https://weechat.org/doc/devel/user/en/#irc_sasl_authentication.

Important notes:

  • GnuTLS ≥ 3.0.21 is required.
  • This mechanism can only be used on servers supporting it (for example servers using atheme, like freenode).

Friday, February 19 2010

SASL authentication with IRC server

It is now possible to use SASL authentication with IRC server, using two mechanisms: "plain" (default) or "dh-blowfish" (crypted password).

New options have been added to servers:

  • sasl_mechanism: mechanism to use ("plain" or "dh-blowfish")
  • sasl_timeout: timeout (in seconds) for authentication
  • sasl_username: username
  • sasl_password: password

You just have to setup username (your nick) and password (password of nick) and then connect to server, you'll be identified with SASL if all is ok.

If you want to set "dh-blowfish" by default for all servers:

/set irc.server_default.sasl_mechanism dh-blowfish