rfc2813.txt (56681B)
1 2 3 4 5 6 7 Network Working Group C. Kalt 8 Request for Comments: 2813 April 2000 9 Updates: 1459 10 Category: Informational 11 12 13 Internet Relay Chat: Server Protocol 14 15 Status of this Memo 16 17 This memo provides information for the Internet community. It does 18 not specify an Internet standard of any kind. Distribution of this 19 memo is unlimited. 20 21 Copyright Notice 22 23 Copyright (C) The Internet Society (2000). All Rights Reserved. 24 25 Abstract 26 27 While based on the client-server model, the IRC (Internet Relay Chat) 28 protocol allows servers to connect to each other effectively forming 29 a network. 30 31 This document defines the protocol used by servers to talk to each 32 other. It was originally a superset of the client protocol but has 33 evolved differently. 34 35 First formally documented in May 1993 as part of RFC 1459 [IRC], most 36 of the changes brought since then can be found in this document as 37 development was focused on making the protocol scale better. Better 38 scalability has allowed existing world-wide networks to keep growing 39 and reach sizes which defy the old specification. 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 Kalt Informational [Page 1] 59 60 RFC 2813 Internet Relay Chat: Server Protocol April 2000 61 62 63 Table of Contents 64 65 1. Introduction ............................................... 3 66 2. Global database ............................................ 3 67 2.1 Servers ................................................ 3 68 2.2 Clients ................................................ 4 69 2.2.1 Users ............................................. 4 70 2.2.2 Services .......................................... 4 71 2.3 Channels ............................................... 4 72 3. The IRC Server Specification ............................... 5 73 3.1 Overview ............................................... 5 74 3.2 Character codes ........................................ 5 75 3.3 Messages ............................................... 5 76 3.3.1 Message format in Augmented BNF ................... 6 77 3.4 Numeric replies ........................................ 7 78 4. Message Details ............................................ 7 79 4.1 Connection Registration ................................ 8 80 4.1.1 Password message .................................. 8 81 4.1.2 Server message .................................... 9 82 4.1.3 Nick .............................................. 10 83 4.1.4 Service message ................................... 11 84 4.1.5 Quit .............................................. 12 85 4.1.6 Server quit message ............................... 13 86 4.2 Channel operations ..................................... 14 87 4.2.1 Join message ...................................... 14 88 4.2.2 Njoin message ..................................... 15 89 4.2.3 Mode message ...................................... 16 90 5. Implementation details .................................... 16 91 5.1 Connection 'Liveness' .................................. 16 92 5.2 Accepting a client to server connection ................ 16 93 5.2.1 Users ............................................. 16 94 5.2.2 Services .......................................... 17 95 5.3 Establishing a server-server connection. ............... 17 96 5.3.1 Link options ...................................... 17 97 5.3.1.1 Compressed server to server links ............ 18 98 5.3.1.2 Anti abuse protections ....................... 18 99 5.3.2 State information exchange when connecting ........ 18 100 5.4 Terminating server-client connections .................. 19 101 5.5 Terminating server-server connections .................. 19 102 5.6 Tracking nickname changes .............................. 19 103 5.7 Tracking recently used nicknames ....................... 20 104 5.8 Flood control of clients ............................... 20 105 5.9 Non-blocking lookups ................................... 21 106 5.9.1 Hostname (DNS) lookups ............................ 21 107 5.9.2 Username (Ident) lookups .......................... 21 108 6. Current problems ........................................... 21 109 6.1 Scalability ............................................ 21 110 6.2 Labels ................................................. 22 111 112 113 114 Kalt Informational [Page 2] 115 116 RFC 2813 Internet Relay Chat: Server Protocol April 2000 117 118 119 6.2.1 Nicknames ......................................... 22 120 6.2.2 Channels .......................................... 22 121 6.2.3 Servers ........................................... 22 122 6.3 Algorithms ............................................. 22 123 7. Security Considerations .................................... 23 124 7.1 Authentication ......................................... 23 125 7.2 Integrity .............................................. 23 126 8. Current support and availability ........................... 24 127 9. Acknowledgements ........................................... 24 128 10. References ................................................ 24 129 11. Author's Address .......................................... 25 130 12. Full Copyright Statement ................................... 26 131 132 1. Introduction 133 134 This document is intended for people working on implementing an IRC 135 server but will also be useful to anyone implementing an IRC service. 136 137 Servers provide the three basic services required for realtime 138 conferencing defined by the "Internet Relay Chat: Architecture" 139 [IRC-ARCH]: client locator (via the client protocol [IRC-CLIENT]), 140 message relaying (via the server protocol defined in this document) 141 and channel hosting and management (following specific rules [IRC- 142 CHAN]). 143 144 2. Global database 145 146 Although the IRC Protocol defines a fairly distributed model, each 147 server maintains a "global state database" about the whole IRC 148 network. This database is, in theory, identical on all servers. 149 150 2.1 Servers 151 152 Servers are uniquely identified by their name which has a maximum 153 length of sixty three (63) characters. See the protocol grammar 154 rules (section 3.3.1) for what may and may not be used in a server 155 name. 156 157 Each server is typically known by all other servers, however it is 158 possible to define a "hostmask" to group servers together according 159 to their name. Inside the hostmasked area, all the servers have a 160 name which matches the hostmask, and any other server with a name 161 matching the hostmask SHALL NOT be connected to the IRC network 162 outside the hostmasked area. Servers which are outside the area have 163 no knowledge of the individual servers present inside the area, 164 instead they are presented with a virtual server which has the 165 hostmask for name. 166 167 168 169 170 Kalt Informational [Page 3] 171 172 RFC 2813 Internet Relay Chat: Server Protocol April 2000 173 174 175 2.2 Clients 176 177 For each client, all servers MUST have the following information: a 178 netwide unique identifier (whose format depends on the type of 179 client) and the server to which the client is connected. 180 181 2.2.1 Users 182 183 Each user is distinguished from other users by a unique nickname 184 having a maximum length of nine (9) characters. See the protocol 185 grammar rules (section 3.3.1) for what may and may not be used in a 186 nickname. In addition to the nickname, all servers MUST have the 187 following information about all users: the name of the host that the 188 user is running on, the username of the user on that host, and the 189 server to which the client is connected. 190 191 2.2.2 Services 192 193 Each service is distinguished from other services by a service name 194 composed of a nickname and a server name. The nickname has a maximum 195 length of nine (9) characters. See the protocol grammar rules 196 (section 3.3.1) for what may and may not be used in a nickname. The 197 server name used to compose the service name is the name of the 198 server to which the service is connected. In addition to this 199 service name all servers MUST know the service type. 200 201 Services differ from users by the format of their identifier, but 202 more importantly services and users don't have the same type of 203 access to the server: services can request part or all of the global 204 state information that a server maintains, but have a more restricted 205 set of commands available to them (See "IRC Client Protocol" [IRC- 206 CLIENT] for details on which) and are not allowed to join channels. 207 Finally services are not usually subject to the "Flood control" 208 mechanism described in section 5.8. 209 210 2.3 Channels 211 212 Alike services, channels have a scope [IRC-CHAN] and are not 213 necessarily known to all servers. When a channel existence is known 214 to a server, the server MUST keep track of the channel members, as 215 well as the channel modes. 216 217 218 219 220 221 222 223 224 225 226 Kalt Informational [Page 4] 227 228 RFC 2813 Internet Relay Chat: Server Protocol April 2000 229 230 231 3. The IRC Server Specification 232 233 3.1 Overview 234 235 The protocol as described herein is for use with server to server 236 connections. For client to server connections, see the IRC Client 237 Protocol specification. 238 239 There are, however, more restrictions on client connections (which 240 are considered to be untrustworthy) than on server connections. 241 242 3.2 Character codes 243 244 No specific character set is specified. The protocol is based on a a 245 set of codes which are composed of eight (8) bits, making up an 246 octet. Each message may be composed of any number of these octets; 247 however, some octet values are used for control codes which act as 248 message delimiters. 249 250 Regardless of being an 8-bit protocol, the delimiters and keywords 251 are such that protocol is mostly usable from US-ASCII terminal and a 252 telnet connection. 253 254 Because of IRC's Scandinavian origin, the characters {}|^ are 255 considered to be the lower case equivalents of the characters []\~, 256 respectively. This is a critical issue when determining the 257 equivalence of two nicknames, or channel names. 258 259 3.3 Messages 260 261 Servers and clients send each other messages which may or may not 262 generate a reply. Most communication between servers do not generate 263 any reply, as servers mostly perform routing tasks for the clients. 264 265 Each IRC message may consist of up to three main parts: the prefix 266 (OPTIONAL), the command, and the command parameters (maximum of 267 fifteen (15)). The prefix, command, and all parameters are separated 268 by one ASCII space character (0x20) each. 269 270 The presence of a prefix is indicated with a single leading ASCII 271 colon character (':', 0x3b), which MUST be the first character of the 272 message itself. There MUST be NO gap (whitespace) between the colon 273 and the prefix. The prefix is used by servers to indicate the true 274 origin of the message. If the prefix is missing from the message, it 275 is assumed to have originated from the connection from which it was 276 received. Clients SHOULD not use a prefix when sending a message 277 from themselves; if they use one, the only valid prefix is the 278 registered nickname associated with the client. 279 280 281 282 Kalt Informational [Page 5] 283 284 RFC 2813 Internet Relay Chat: Server Protocol April 2000 285 286 287 When a server receives a message, it MUST identify its source using 288 the (eventually assumed) prefix. If the prefix cannot be found in 289 the server's internal database, it MUST be discarded, and if the 290 prefix indicates the message comes from an (unknown) server, the link 291 from which the message was received MUST be dropped. Dropping a link 292 in such circumstances is a little excessive but necessary to maintain 293 the integrity of the network and to prevent future problems. Another 294 common error condition is that the prefix found in the server's 295 internal database identifies a different source (typically a source 296 registered from a different link than from which the message 297 arrived). If the message was received from a server link and the 298 prefix identifies a client, a KILL message MUST be issued for the 299 client and sent to all servers. In other cases, the link from which 300 the message arrived SHOULD be dropped for clients, and MUST be 301 dropped for servers. In all cases, the message MUST be discarded. 302 303 The command MUST either be a valid IRC command or a three (3) digit 304 number represented in ASCII text. 305 306 IRC messages are always lines of characters terminated with a CR-LF 307 (Carriage Return - Line Feed) pair, and these messages SHALL NOT 308 exceed 512 characters in length, counting all characters including 309 the trailing CR-LF. Thus, there are 510 characters maximum allowed 310 for the command and its parameters. There is no provision for 311 continuation message lines. See section 5 for more details about 312 current implementations. 313 314 3.3.1 Message format in Augmented BNF 315 316 The protocol messages must be extracted from the contiguous stream of 317 octets. The current solution is to designate two characters, CR and 318 LF, as message separators. Empty messages are silently ignored, 319 which permits use of the sequence CR-LF between messages without 320 extra problems. 321 322 The extracted message is parsed into the components <prefix>, 323 <command> and list of parameters (<params>). 324 325 The Augmented BNF representation for this is found in "IRC Client 326 Protocol" [IRC-CLIENT]. 327 328 The extended prefix (["!" user "@" host ]) MUST NOT be used in server 329 to server communications and is only intended for server to client 330 messages in order to provide clients with more useful information 331 about who a message is from without the need for additional queries. 332 333 334 335 336 337 338 Kalt Informational [Page 6] 339 340 RFC 2813 Internet Relay Chat: Server Protocol April 2000 341 342 343 3.4 Numeric replies 344 345 Most of the messages sent to the server generate a reply of some 346 sort. The most common reply is the numeric reply, used for both 347 errors and normal replies. The numeric reply MUST be sent as one 348 message consisting of the sender prefix, the three digit numeric, and 349 the target of the reply. A numeric reply is not allowed to originate 350 from a client; any such messages received by a server are silently 351 dropped. In all other respects, a numeric reply is just like a normal 352 message, except that the keyword is made up of 3 numeric digits 353 rather than a string of letters. A list of different replies is 354 supplied in "IRC Client Protocol" [IRC-CLIENT]. 355 356 4. Message Details 357 358 All the messages recognized by the IRC server and client are 359 described in the IRC Client Protocol specification. 360 361 Where the reply ERR_NOSUCHSERVER is returned, it means that the 362 target of the message could not be found. The server MUST NOT send 363 any other replies after this error for that command. 364 365 The server to which a client is connected is required to parse the 366 complete message, returning any appropriate errors. If the server 367 encounters a fatal error while parsing a message, an error MUST be 368 sent back to the client and the parsing terminated. A fatal error 369 may follow from incorrect command, a destination which is otherwise 370 unknown to the server (server, client or channel names fit this 371 category), not enough parameters or incorrect privileges. 372 373 If a full set of parameters is presented, then each MUST be checked 374 for validity and appropriate responses sent back to the client. In 375 the case of messages which use parameter lists using the comma as an 376 item separator, a reply MUST be sent for each item. 377 378 In the examples below, some messages appear using the full format: 379 380 :Name COMMAND parameter list 381 382 Such examples represent a message from "Name" in transit between 383 servers, where it is essential to include the name of the original 384 sender of the message so remote servers may send back a reply along 385 the correct path. 386 387 The message details for client to server communication are described 388 in the "IRC Client Protocol" [IRC-CLIENT]. Some sections in the 389 following pages apply to some of these messages, they are additions 390 to the message specifications which are only relevant to server to 391 392 393 394 Kalt Informational [Page 7] 395 396 RFC 2813 Internet Relay Chat: Server Protocol April 2000 397 398 399 server communication, or to the server implementation. The messages 400 which are introduced here are only used for server to server 401 communication. 402 403 4.1 Connection Registration 404 405 The commands described here are used to register a connection with 406 another IRC server. 407 408 4.1.1 Password message 409 410 Command: PASS 411 Parameters: <password> <version> <flags> [<options>] 412 413 The PASS command is used to set a 'connection password'. The 414 password MUST be set before any attempt to register the connection is 415 made. Currently this means that servers MUST send a PASS command 416 before any SERVER command. Only one (1) PASS command SHALL be 417 accepted from a connection. 418 419 The last three (3) parameters MUST be ignored if received from a 420 client (e.g. a user or a service). They are only relevant when 421 received from a server. 422 423 The <version> parameter is a string of at least four (4) characters, 424 and up to fourteen (14) characters. The first four (4) characters 425 MUST be digits and indicate the protocol version known by the server 426 issuing the message. The protocol described by this document is 427 version 2.10 which is encoded as "0210". The remaining OPTIONAL 428 characters are implementation dependent and should describe the 429 software version number. 430 431 The <flags> parameter is a string of up to one hundred (100) 432 characters. It is composed of two substrings separated by the 433 character "|" (%x7C). If present, the first substring MUST be the 434 name of the implementation. The reference implementation (See 435 Section 8, "Current support and availability") uses the string "IRC". 436 If a different implementation is written, which needs an identifier, 437 then that identifier should be registered through publication of an 438 RFC. The second substring is implementation dependent. Both 439 substrings are OPTIONAL, but the character "|" is REQUIRED. The 440 character "|" MUST NOT appear in either substring. 441 442 Finally, the last parameter, <options>, is used for link options. 443 The only options defined by the protocol are link compression (using 444 the character "Z"), and an abuse protection flag (using the character 445 446 447 448 449 450 Kalt Informational [Page 8] 451 452 RFC 2813 Internet Relay Chat: Server Protocol April 2000 453 454 455 "P"). See sections 5.3.1.1 (Compressed server to server links) and 456 5.3.1.2 (Anti abuse protections) respectively for more information on 457 these options. 458 459 Numeric Replies: 460 461 ERR_NEEDMOREPARAMS ERR_ALREADYREGISTRED 462 463 Example: 464 465 PASS moresecretpassword 0210010000 IRC|aBgH$ Z 466 467 4.1.2 Server message 468 469 Command: SERVER 470 Parameters: <servername> <hopcount> <token> <info> 471 472 The SERVER command is used to register a new server. A new connection 473 introduces itself as a server to its peer. This message is also used 474 to pass server data over whole net. When a new server is connected 475 to net, information about it MUST be broadcasted to the whole 476 network. 477 478 The <info> parameter may contain space characters. 479 480 <hopcount> is used to give all servers some internal information on 481 how far away each server is. Local peers have a value of 0, and each 482 passed server increments the value. With a full server list, it 483 would be possible to construct a map of the entire server tree, but 484 hostmasks prevent this from being done. 485 486 The <token> parameter is an unsigned number used by servers as an 487 identifier. This identifier is subsequently used to reference a 488 server in the NICK and SERVICE messages sent between servers. Server 489 tokens only have a meaning for the point-to-point peering they are 490 used and MUST be unique for that connection. They are not global. 491 492 The SERVER message MUST only be accepted from either (a) a connection 493 which is yet to be registered and is attempting to register as a 494 server, or (b) an existing connection to another server, in which 495 case the SERVER message is introducing a new server behind that 496 server. 497 498 Most errors that occur with the receipt of a SERVER command result in 499 the connection being terminated by the destination host (target 500 SERVER). Because of the severity of such event, error replies are 501 usually sent using the "ERROR" command rather than a numeric. 502 503 504 505 506 Kalt Informational [Page 9] 507 508 RFC 2813 Internet Relay Chat: Server Protocol April 2000 509 510 511 If a SERVER message is parsed and it attempts to introduce a server 512 which is already known to the receiving server, the connection, from 513 which that message arrived, MUST be closed (following the correct 514 procedures), since a duplicate route to a server has been formed and 515 the acyclic nature of the IRC tree breaks. In some conditions, the 516 connection from which the already known server has registered MAY be 517 closed instead. It should be noted that this kind of error can also 518 be the result of a second running server, problem which cannot be 519 fixed within the protocol and typically requires human intervention. 520 This type of problem is particularly insidious, as it can quite 521 easily result in part of the IRC network to be isolated, with one of 522 the two servers connected to each partition therefore making it 523 impossible for the two parts to unite. 524 525 Numeric Replies: 526 527 ERR_ALREADYREGISTRED 528 529 Example: 530 531 SERVER test.oulu.fi 1 1 :Experimental server ; New server 532 test.oulu.fi introducing itself and 533 attempting to register. 534 535 :tolsun.oulu.fi SERVER csd.bu.edu 5 34 :BU Central Server ; Server 536 tolsun.oulu.fi is our uplink for 537 csd.bu.edu which is 5 hops away. The 538 token "34" will be used by 539 tolsun.oulu.fi when introducing new 540 users or services connected to 541 csd.bu.edu. 542 543 4.1.3 Nick 544 545 Command: NICK 546 Parameters: <nickname> <hopcount> <username> <host> <servertoken> 547 <umode> <realname> 548 549 This form of the NICK message MUST NOT be allowed from user 550 connections. However, it MUST be used instead of the NICK/USER pair 551 to notify other servers of new users joining the IRC network. 552 553 This message is really the combination of three distinct messages: 554 NICK, USER and MODE [IRC-CLIENT]. 555 556 The <hopcount> parameter is used by servers to indicate how far away 557 a user is from its home server. A local connection has a hopcount of 558 0. The hopcount value is incremented by each passed server. 559 560 561 562 Kalt Informational [Page 10] 563 564 RFC 2813 Internet Relay Chat: Server Protocol April 2000 565 566 567 The <servertoken> parameter replaces the <servername> parameter of 568 the USER (See section 4.1.2 for more information on server tokens). 569 570 Examples: 571 572 NICK syrk 5 kalt millennium.stealth.net 34 +i :Christophe Kalt ; New 573 user with nickname "syrk", username 574 "kalt", connected from host 575 "millennium.stealth.net" to server 576 "34" ("csd.bu.edu" according to the 577 previous example). 578 579 :krys NICK syrk ; The other form of the NICK message, 580 as defined in "IRC Client Protocol" 581 [IRC-CLIENT] and used between 582 servers: krys changed his nickname to 583 syrk 584 585 4.1.4 Service message 586 587 Command: SERVICE 588 Parameters: <servicename> <servertoken> <distribution> <type> 589 <hopcount> <info> 590 591 The SERVICE command is used to introduce a new service. This form of 592 the SERVICE message SHOULD NOT be allowed from client (unregistered, 593 or registered) connections. However, it MUST be used between servers 594 to notify other servers of new services joining the IRC network. 595 596 The <servertoken> is used to identify the server to which the service 597 is connected. (See section 4.1.2 for more information on server 598 tokens). 599 600 The <hopcount> parameter is used by servers to indicate how far away 601 a service is from its home server. A local connection has a hopcount 602 of 0. The hopcount value is incremented by each passed server. 603 604 The <distribution> parameter is used to specify the visibility of a 605 service. The service may only be known to servers which have a name 606 matching the distribution. For a matching server to have knowledge 607 of the service, the network path between that server and the server 608 to which the service is connected MUST be composed of servers whose 609 names all match the mask. Plain "*" is used when no restriction is 610 wished. 611 612 The <type> parameter is currently reserved for future usage. 613 614 615 616 617 618 Kalt Informational [Page 11] 619 620 RFC 2813 Internet Relay Chat: Server Protocol April 2000 621 622 623 Numeric Replies: 624 625 ERR_ALREADYREGISTRED ERR_NEEDMOREPARAMS 626 ERR_ERRONEUSNICKNAME 627 RPL_YOURESERVICE RPL_YOURHOST 628 RPL_MYINFO 629 630 Example: 631 632 SERVICE dict@irc.fr 9 *.fr 0 1 :French Dictionary r" registered on 633 server "9" is being announced to 634 another server. This service will 635 only be available on servers whose 636 name matches "*.fr". 637 638 4.1.5 Quit 639 640 Command: QUIT 641 Parameters: [<Quit Message>] 642 643 A client session ends with a quit message. The server MUST close the 644 connection to a client which sends a QUIT message. If a "Quit 645 Message" is given, this will be sent instead of the default message, 646 the nickname or service name. 647 648 When "netsplit" (See Section 4.1.6) occur, the "Quit Message" is 649 composed of the names of two servers involved, separated by a space. 650 The first name is that of the server which is still connected and the 651 second name is either that of the server which has become 652 disconnected or that of the server to which the leaving client was 653 connected: 654 655 <Quit Message> = ":" servername SPACE servername 656 657 Because the "Quit Message" has a special meaning for "netsplits", 658 servers SHOULD NOT allow a client to use a <Quit Message> in the 659 format described above. 660 661 If, for some other reason, a client connection is closed without the 662 client issuing a QUIT command (e.g. client dies and EOF occurs on 663 socket), the server is REQUIRED to fill in the quit message with some 664 sort of message reflecting the nature of the event which caused it to 665 happen. Typically, this is done by reporting a system specific 666 error. 667 668 Numeric Replies: 669 670 None. 671 672 673 674 Kalt Informational [Page 12] 675 676 RFC 2813 Internet Relay Chat: Server Protocol April 2000 677 678 679 Examples: 680 681 :WiZ QUIT :Gone to have lunch ; Preferred message format. 682 683 4.1.6 Server quit message 684 685 Command: SQUIT 686 Parameters: <server> <comment> 687 688 The SQUIT message has two distinct uses. 689 690 The first one (described in "Internet Relay Chat: Client Protocol" 691 [IRC-CLIENT]) allows operators to break a local or remote server 692 link. This form of the message is also eventually used by servers to 693 break a remote server link. 694 695 The second use of this message is needed to inform other servers when 696 a "network split" (also known as "netsplit") occurs, in other words 697 to inform other servers about quitting or dead servers. If a server 698 wishes to break the connection to another server it MUST send a SQUIT 699 message to the other server, using the name of the other server as 700 the server parameter, which then closes its connection to the 701 quitting server. 702 703 The <comment> is filled in by servers which SHOULD place an error or 704 similar message here. 705 706 Both of the servers which are on either side of the connection being 707 closed are REQUIRED to send out a SQUIT message (to all its other 708 server connections) for all other servers which are considered to be 709 behind that link. 710 711 Similarly, a QUIT message MAY be sent to the other still connected 712 servers on behalf of all clients behind that quitting link. In 713 addition to this, all channel members of a channel which lost a 714 member due to the "split" MUST be sent a QUIT message. Messages to 715 channel members are generated by each client's local server. 716 717 If a server connection is terminated prematurely (e.g., the server on 718 the other end of the link died), the server which detects this 719 disconnection is REQUIRED to inform the rest of the network that the 720 connection has closed and fill in the comment field with something 721 appropriate. 722 723 When a client is removed as the result of a SQUIT message, the server 724 SHOULD add the nickname to the list of temporarily unavailable 725 nicknames in an attempt to prevent future nickname collisions. See 726 727 728 729 730 Kalt Informational [Page 13] 731 732 RFC 2813 Internet Relay Chat: Server Protocol April 2000 733 734 735 section 5.7 (Tracking recently used nicknames) for more information 736 on this procedure. 737 738 Numeric replies: 739 740 ERR_NOPRIVILEGES ERR_NOSUCHSERVER 741 ERR_NEEDMOREPARAMS 742 743 Example: 744 745 SQUIT tolsun.oulu.fi :Bad Link ? ; the server link tolson.oulu.fi 746 has been terminated because of "Bad 747 Link". 748 749 :Trillian SQUIT cm22.eng.umd.edu :Server out of control ; message 750 from Trillian to disconnect 751 "cm22.eng.umd.edu" from the net 752 because "Server out of control". 753 754 4.2 Channel operations 755 756 This group of messages is concerned with manipulating channels, their 757 properties (channel modes), and their contents (typically users). In 758 implementing these, a number of race conditions are inevitable when 759 users at opposing ends of a network send commands which will 760 ultimately clash. It is also REQUIRED that servers keep a nickname 761 history to ensure that wherever a <nick> parameter is given, the 762 server check its history in case it has recently been changed. 763 764 4.2.1 Join message 765 766 Command: JOIN 767 Parameters: <channel>[ %x7 <modes> ] 768 *( "," <channel>[ %x7 <modes> ] ) 769 770 The JOIN command is used by client to start listening a specific 771 channel. Whether or not a client is allowed to join a channel is 772 checked only by the local server the client is connected to; all 773 other servers automatically add the user to the channel when the 774 command is received from other servers. 775 776 Optionally, the user status (channel modes 'O', 'o', and 'v') on the 777 channel may be appended to the channel name using a control G (^G or 778 ASCII 7) as separator. Such data MUST be ignored if the message 779 wasn't received from a server. This format MUST NOT be sent to 780 clients, it can only be used between servers and SHOULD be avoided. 781 782 783 784 785 786 Kalt Informational [Page 14] 787 788 RFC 2813 Internet Relay Chat: Server Protocol April 2000 789 790 791 The JOIN command MUST be broadcast to all servers so that each server 792 knows where to find the users who are on the channel. This allows 793 optimal delivery of PRIVMSG and NOTICE messages to the channel. 794 795 Numeric Replies: 796 797 ERR_NEEDMOREPARAMS ERR_BANNEDFROMCHAN 798 ERR_INVITEONLYCHAN ERR_BADCHANNELKEY 799 ERR_CHANNELISFULL ERR_BADCHANMASK 800 ERR_NOSUCHCHANNEL ERR_TOOMANYCHANNELS 801 ERR_TOOMANYTARGETS ERR_UNAVAILRESOURCE 802 RPL_TOPIC 803 804 Examples: 805 806 :WiZ JOIN #Twilight_zone ; JOIN message from WiZ 807 808 4.2.2 Njoin message 809 810 Command: NJOIN 811 Parameters: <channel> [ "@@" / "@" ] [ "+" ] <nickname> 812 *( "," [ "@@" / "@" ] [ "+" ] <nickname> ) 813 814 The NJOIN message is used between servers only. If such a message is 815 received from a client, it MUST be ignored. It is used when two 816 servers connect to each other to exchange the list of channel members 817 for each channel. 818 819 Even though the same function can be performed by using a succession 820 of JOIN, this message SHOULD be used instead as it is more efficient. 821 The prefix "@@" indicates that the user is the "channel creator", the 822 character "@" alone indicates a "channel operator", and the character 823 '+' indicates that the user has the voice privilege. 824 825 Numeric Replies: 826 827 ERR_NEEDMOREPARAMS ERR_NOSUCHCHANNEL 828 ERR_ALREADYREGISTRED 829 830 Examples: 831 832 :ircd.stealth.net NJOIN #Twilight_zone :@WiZ,+syrk,avalon ; NJOIN 833 message from ircd.stealth.net 834 announcing users joining the 835 #Twilight_zone channel: WiZ with 836 channel operator status, syrk with 837 voice privilege and avalon with no 838 privilege. 839 840 841 842 Kalt Informational [Page 15] 843 844 RFC 2813 Internet Relay Chat: Server Protocol April 2000 845 846 847 4.2.3 Mode message 848 849 The MODE message is a dual-purpose command in IRC. It allows both 850 usernames and channels to have their mode changed. 851 852 When parsing MODE messages, it is RECOMMENDED that the entire message 853 be parsed first, and then the changes which resulted passed on. 854 855 It is REQUIRED that servers are able to change channel modes so that 856 "channel creator" and "channel operators" may be created. 857 858 5. Implementation details 859 860 A the time of writing, the only current implementation of this 861 protocol is the IRC server, version 2.10. Earlier versions may 862 implement some or all of the commands described by this document with 863 NOTICE messages replacing many of the numeric replies. Unfortunately, 864 due to backward compatibility requirements, the implementation of 865 some parts of this document varies with what is laid out. One 866 notable difference is: 867 868 * recognition that any LF or CR anywhere in a message marks 869 the end of that message (instead of requiring CR-LF); 870 871 The rest of this section deals with issues that are mostly of 872 importance to those who wish to implement a server but some parts 873 also apply directly to clients as well. 874 875 5.1 Connection 'Liveness' 876 877 To detect when a connection has died or become unresponsive, the 878 server MUST poll each of its connections. The PING command (See "IRC 879 Client Protocol" [IRC-CLIENT]) is used if the server doesn't get a 880 response from its peer in a given amount of time. 881 882 If a connection doesn't respond in time, its connection is closed 883 using the appropriate procedures. 884 885 5.2 Accepting a client to server connection 886 887 5.2.1 Users 888 889 When a server successfully registers a new user connection, it is 890 REQUIRED to send to the user unambiguous messages stating: the user 891 identifiers upon which it was registered (RPL_WELCOME), the server 892 name and version (RPL_YOURHOST), the server birth information 893 (RPL_CREATED), available user and channel modes (RPL_MYINFO), and it 894 MAY send any introductory messages which may be deemed appropriate. 895 896 897 898 Kalt Informational [Page 16] 899 900 RFC 2813 Internet Relay Chat: Server Protocol April 2000 901 902 903 In particular the server SHALL send the current user/service/server 904 count (as per the LUSER reply) and finally the MOTD (if any, as per 905 the MOTD reply). 906 907 After dealing with registration, the server MUST then send out to 908 other servers the new user's nickname (NICK message), other 909 information as supplied by itself (USER message) and as the server 910 could discover (from DNS servers). The server MUST NOT send this 911 information out with a pair of NICK and USER messages as defined in 912 "IRC Client Protocol" [IRC-CLIENT], but MUST instead take advantage 913 of the extended NICK message defined in section 4.1.3. 914 915 5.2.2 Services 916 917 Upon successfully registering a new service connection, the server is 918 subject to the same kind of REQUIREMENTS as for a user. Services 919 being somewhat different, only the following replies are sent: 920 RPL_YOURESERVICE, RPL_YOURHOST, RPL_MYINFO. 921 922 After dealing with this, the server MUST then send out to other 923 servers (SERVICE message) the new service's nickname and other 924 information as supplied by the service (SERVICE message) and as the 925 server could discover (from DNS servers). 926 927 5.3 Establishing a server-server connection. 928 929 The process of establishing a server-to-server connection is fraught 930 with danger since there are many possible areas where problems can 931 occur - the least of which are race conditions. 932 933 After a server has received a connection following by a PASS/SERVER 934 pair which were recognized as being valid, the server SHOULD then 935 reply with its own PASS/SERVER information for that connection as 936 well as all of the other state information it knows about as 937 described below. 938 939 When the initiating server receives a PASS/SERVER pair, it too then 940 checks that the server responding is authenticated properly before 941 accepting the connection to be that server. 942 943 5.3.1 Link options 944 945 Server links are based on a common protocol (defined by this 946 document) but a particular link MAY set specific options using the 947 PASS message (See Section 4.1.1). 948 949 950 951 952 953 954 Kalt Informational [Page 17] 955 956 RFC 2813 Internet Relay Chat: Server Protocol April 2000 957 958 959 5.3.1.1 Compressed server to server links 960 961 If a server wishes to establish a compressed link with its peer, it 962 MUST set the 'Z' flag in the options parameter to the PASS message. 963 If both servers request compression and both servers are able to 964 initialize the two compressed streams, then the remainder of the 965 communication is to be compressed. If any server fails to initialize 966 the stream, it will send an uncompressed ERROR message to its peer 967 and close the connection. 968 969 The data format used for the compression is described by RFC 1950 970 [ZLIB], RFC 1951 [DEFLATE] and RFC 1952 [GZIP]. 971 972 5.3.1.2 Anti abuse protections 973 974 Most servers implement various kinds of protections against possible 975 abusive behaviours from non trusted parties (typically users). On 976 some networks, such protections are indispensable, on others they are 977 superfluous. To require that all servers implement and enable such 978 features on a particular network, the 'P' flag is used when two 979 servers connect. If this flag is present, it means that the server 980 protections are enabled, and that the server REQUIRES all its server 981 links to enable them as well. 982 983 Commonly found protections are described in sections 5.7 (Tracking 984 recently used nicknames) and 5.8 (Flood control of clients). 985 986 5.3.2 State information exchange when connecting 987 988 The order of state information being exchanged between servers is 989 essential. The REQUIRED order is as follows: 990 991 * all known servers; 992 993 * all known client information; 994 995 * all known channel information. 996 997 Information regarding servers is sent via extra SERVER messages, 998 client information with NICK and SERVICE messages and channels with 999 NJOIN/MODE messages. 1000 1001 NOTE: channel topics SHOULD NOT be exchanged here because the TOPIC 1002 command overwrites any old topic information, so at best, the two 1003 sides of the connection would exchange topics. 1004 1005 1006 1007 1008 1009 1010 Kalt Informational [Page 18] 1011 1012 RFC 2813 Internet Relay Chat: Server Protocol April 2000 1013 1014 1015 By passing the state information about servers first, any collisions 1016 with servers that already exist occur before nickname collisions 1017 caused by a second server introducing a particular nickname. Due to 1018 the IRC network only being able to exist as an acyclic graph, it may 1019 be possible that the network has already reconnected in another 1020 location. In this event, the place where the server collision occurs 1021 indicates where the net needs to split. 1022 1023 5.4 Terminating server-client connections 1024 1025 When a client connection unexpectedly closes, a QUIT message is 1026 generated on behalf of the client by the server to which the client 1027 was connected. No other message is to be generated or used. 1028 1029 5.5 Terminating server-server connections 1030 1031 If a server-server connection is closed, either via a SQUIT command 1032 or "natural" causes, the rest of the connected IRC network MUST have 1033 its information updated by the server which detected the closure. 1034 The terminating server then sends a list of SQUITs (one for each 1035 server behind that connection). (See Section 4.1.6 (SQUIT)). 1036 1037 5.6 Tracking nickname changes 1038 1039 All IRC servers are REQUIRED to keep a history of recent nickname 1040 changes. This is important to allow the server to have a chance of 1041 keeping in touch of things when nick-change race conditions occur 1042 with commands manipulating them. Messages which MUST trace nick 1043 changes are: 1044 1045 * KILL (the nick being disconnected) 1046 1047 * MODE (+/- o,v on channels) 1048 1049 * KICK (the nick being removed from channel) 1050 1051 No other commands need to check nick changes. 1052 1053 In the above cases, the server is required to first check for the 1054 existence of the nickname, then check its history to see who that 1055 nick now belongs to (if anyone!). This reduces the chances of race 1056 conditions but they can still occur with the server ending up 1057 affecting the wrong client. When performing a change trace for an 1058 above command it is RECOMMENDED that a time range be given and 1059 entries which are too old ignored. 1060 1061 1062 1063 1064 1065 1066 Kalt Informational [Page 19] 1067 1068 RFC 2813 Internet Relay Chat: Server Protocol April 2000 1069 1070 1071 For a reasonable history, a server SHOULD be able to keep previous 1072 nickname for every client it knows about if they all decided to 1073 change. This size is limited by other factors (such as memory, etc). 1074 1075 5.7 Tracking recently used nicknames 1076 1077 This mechanism is commonly known as "Nickname Delay", it has been 1078 proven to significantly reduce the number of nickname collisions 1079 resulting from "network splits"/reconnections as well as abuse. 1080 1081 In addition of keeping track of nickname changes, servers SHOULD keep 1082 track of nicknames which were recently used and were released as the 1083 result of a "network split" or a KILL message. These nicknames are 1084 then unavailable to the server local clients and cannot be re-used 1085 (even though they are not currently in use) for a certain period of 1086 time. 1087 1088 The duration for which a nickname remains unavailable SHOULD be set 1089 considering many factors among which are the size (user wise) of the 1090 IRC network, and the usual duration of "network splits". It SHOULD 1091 be uniform on all servers for a given IRC network. 1092 1093 5.8 Flood control of clients 1094 1095 With a large network of interconnected IRC servers, it is quite easy 1096 for any single client attached to the network to supply a continuous 1097 stream of messages that result in not only flooding the network, but 1098 also degrading the level of service provided to others. Rather than 1099 require every 'victim' to provide their own protection, flood 1100 protection was written into the server and is applied to all clients 1101 except services. The current algorithm is as follows: 1102 1103 * check to see if client's `message timer' is less than current time 1104 (set to be equal if it is); 1105 1106 * read any data present from the client; 1107 1108 * while the timer is less than ten (10) seconds ahead of the current 1109 time, parse any present messages and penalize the client by two (2) 1110 seconds for each message; 1111 1112 * additional penalties MAY be used for specific commands which 1113 generate a lot of traffic across the network. 1114 1115 This in essence means that the client may send one (1) message every 1116 two (2) seconds without being adversely affected. Services MAY also 1117 be subject to this mechanism. 1118 1119 1120 1121 1122 Kalt Informational [Page 20] 1123 1124 RFC 2813 Internet Relay Chat: Server Protocol April 2000 1125 1126 1127 5.9 Non-blocking lookups 1128 1129 In a real-time environment, it is essential that a server process 1130 does as little waiting as possible so that all the clients are 1131 serviced fairly. Obviously this requires non-blocking IO on all 1132 network read/write operations. For normal server connections, this 1133 was not difficult, but there are other support operations that may 1134 cause the server to block (such as disk reads). Where possible, such 1135 activity SHOULD be performed with a short timeout. 1136 1137 5.9.1 Hostname (DNS) lookups 1138 1139 Using the standard resolver libraries from Berkeley and others has 1140 meant large delays in some cases where replies have timed out. To 1141 avoid this, a separate set of DNS routines were written for the 1142 current implementation. Routines were setup for non-blocking IO 1143 operations with local cache, and then polled from within the main 1144 server IO loop. 1145 1146 5.9.2 Username (Ident) lookups 1147 1148 Although there are numerous ident libraries (implementing the 1149 "Identification Protocol" [IDENT]) for use and inclusion into other 1150 programs, these caused problems since they operated in a synchronous 1151 manner and resulted in frequent delays. Again the solution was to 1152 write a set of routines which would cooperate with the rest of the 1153 server and work using non-blocking IO. 1154 1155 6. Current problems 1156 1157 There are a number of recognized problems with this protocol, all of 1158 which are hoped to be solved sometime in the near future during its 1159 rewrite. Currently, work is underway to find working solutions to 1160 these problems. 1161 1162 6.1 Scalability 1163 1164 It is widely recognized that this protocol does not scale 1165 sufficiently well when used in a large arena. The main problem comes 1166 from the requirement that all servers know about all other servers 1167 and clients and that information regarding them be updated as soon as 1168 it changes. It is also desirable to keep the number of servers low 1169 so that the path length between any two points is kept minimal and 1170 the spanning tree as strongly branched as possible. 1171 1172 1173 1174 1175 1176 1177 1178 Kalt Informational [Page 21] 1179 1180 RFC 2813 Internet Relay Chat: Server Protocol April 2000 1181 1182 1183 6.2 Labels 1184 1185 The current IRC protocol has 4 types of labels: the nickname, the 1186 channel name, the server name and the service name. Each of the four 1187 types has its own domain and no duplicates are allowed inside that 1188 domain. Currently, it is possible for users to pick the label for 1189 any of the first three, resulting in collisions. It is widely 1190 recognized that this needs reworking, with a plan for unique names 1191 for nicks that don't collide being desirable as well as a solution 1192 allowing a cyclic tree. 1193 1194 6.2.1 Nicknames 1195 1196 The idea of the nickname on IRC is very convenient for users to use 1197 when talking to each other outside of a channel, but there is only a 1198 finite nickname space and being what they are, it's not uncommon for 1199 several people to want to use the same nick. If a nickname is chosen 1200 by two people using this protocol, either one will not succeed or 1201 both will be removed by use of KILL (See Section 3.7.1 of "IRC Client 1202 Protocol" [IRC-CLIENT]). 1203 1204 6.2.2 Channels 1205 1206 The current channel layout requires that all servers know about all 1207 channels, their inhabitants and properties. Besides not scaling 1208 well, the issue of privacy is also a concern. A collision of 1209 channels is treated as an inclusive event (people from both nets on 1210 channel with common name are considered to be members of it) rather 1211 than an exclusive one such as used to solve nickname collisions. 1212 1213 This protocol defines "Safe Channels" which are very unlikely to be 1214 the subject of a channel collision. Other channel types are kept for 1215 backward compatibility. 1216 1217 6.2.3 Servers 1218 1219 Although the number of servers is usually small relative to the 1220 number of users and channels, they too are currently REQUIRED to be 1221 known globally, either each one separately or hidden behind a mask. 1222 1223 6.3 Algorithms 1224 1225 In some places within the server code, it has not been possible to 1226 avoid N^2 algorithms such as checking the channel list of a set of 1227 clients. 1228 1229 1230 1231 1232 1233 1234 Kalt Informational [Page 22] 1235 1236 RFC 2813 Internet Relay Chat: Server Protocol April 2000 1237 1238 1239 In current server versions, there are only few database consistency 1240 checks, most of the time each server assumes that a neighbouring 1241 server is correct. This opens the door to large problems if a 1242 connecting server is buggy or otherwise tries to introduce 1243 contradictions to the existing net. 1244 1245 Currently, because of the lack of unique internal and global labels, 1246 there are a multitude of race conditions that exist. These race 1247 conditions generally arise from the problem of it taking time for 1248 messages to traverse and effect the IRC network. Even by changing to 1249 unique labels, there are problems with channel-related commands being 1250 disrupted. 1251 1252 7. Security Considerations 1253 1254 7.1 Authentication 1255 1256 Servers only have two means of authenticating incoming connections: 1257 plain text password, and DNS lookups. While these methods are weak 1258 and widely recognized as unsafe, their combination has proven to be 1259 sufficient in the past: 1260 1261 * public networks typically allow user connections with only few 1262 restrictions, without requiring accurate authentication. 1263 1264 * private networks which operate in a controlled environment often 1265 use home-grown authentication mechanisms not available on the 1266 internet: reliable ident servers [IDENT], or other proprietary 1267 mechanisms. 1268 1269 The same comments apply to the authentication of IRC Operators. 1270 1271 It should also be noted that while there has been no real demand over 1272 the years for stronger authentication, and no real effort to provide 1273 better means to safely authenticate users, the current protocol 1274 offers enough to be able to easily plug-in external authentication 1275 methods based on the information that a client can submit to the 1276 server upon connection: nickname, username, password. 1277 1278 7.2 Integrity 1279 1280 Since the PASS and OPER messages of the IRC protocol are sent in 1281 clear text, a stream layer encryption mechanism (like "The TLS 1282 Protocol" [TLS]) could be used to protect these transactions. 1283 1284 1285 1286 1287 1288 1289 1290 Kalt Informational [Page 23] 1291 1292 RFC 2813 Internet Relay Chat: Server Protocol April 2000 1293 1294 1295 8. Current support and availability 1296 1297 Mailing lists for IRC related discussion: 1298 General discussion: ircd-users@irc.org 1299 Protocol development: ircd-dev@irc.org 1300 1301 Software implementations: 1302 ftp://ftp.irc.org/irc/server 1303 ftp://ftp.funet.fi/pub/unix/irc 1304 ftp://coombs.anu.edu.au/pub/irc 1305 1306 Newsgroup: alt.irc 1307 1308 9. Acknowledgements 1309 1310 Parts of this document were copied from the RFC 1459 [IRC] which 1311 first formally documented the IRC Protocol. It has also benefited 1312 from many rounds of review and comments. In particular, the 1313 following people have made significant contributions to this 1314 document: 1315 1316 Matthew Green, Michael Neumayer, Volker Paulsen, Kurt Roeckx, Vesa 1317 Ruokonen, Magnus Tjernstrom, Stefan Zehl. 1318 1319 10. References 1320 1321 [KEYWORDS] Bradner, S., "Key words for use in RFCs to Indicate 1322 Requirement Levels", BCP 14, RFC 2119, March 1997. 1323 1324 [ABNF] Crocker, D. and P. Overell, "Augmented BNF for Syntax 1325 Specifications: ABNF", RFC 2234, November 1997. 1326 1327 [IRC] Oikarinen, J. and D. Reed, "Internet Relay Chat 1328 Protocol", RFC 1459, May 1993. 1329 1330 [IRC-ARCH] Kalt, C., "Internet Relay Chat: Architecture", RFC 2810, 1331 April 2000. 1332 1333 [IRC-CLIENT] Kalt, C., "Internet Relay Chat: Client Protocol", RFC 1334 2812, April 2000. 1335 1336 1337 [IRC-CHAN] Kalt, C., "Internet Relay Chat: Channel Management", RFC 1338 2811, April 2000. 1339 1340 [ZLIB] Deutsch, P. and J-L. Gailly, "ZLIB Compressed Data 1341 Format Specification version 3.3", RFC 1950, May 1996. 1342 1343 1344 1345 1346 Kalt Informational [Page 24] 1347 1348 RFC 2813 Internet Relay Chat: Server Protocol April 2000 1349 1350 1351 [DEFLATE] Deutsch, P., "DEFLATE Compressed Data Format 1352 Specification version 1.3", RFC 1951, May 1996. 1353 1354 [GZIP] Deutsch, P., "GZIP file format specification version 1355 4.3", RFC 1952, May 1996. 1356 1357 [IDENT] St. Johns, M., "The Identification Protocol", RFC 1413, 1358 February 1993. 1359 1360 [TLS] Dierks, T. and C. Allen, "The TLS Protocol", RFC 2246, 1361 January 1999. 1362 1363 11. Author's Address 1364 1365 Christophe Kalt 1366 99 Teaneck Rd, Apt #117 1367 Ridgefield Park, NJ 07660 1368 USA 1369 1370 EMail: kalt@stealth.net 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 Kalt Informational [Page 25] 1403 1404 RFC 2813 Internet Relay Chat: Server Protocol April 2000 1405 1406 1407 12. Full Copyright Statement 1408 1409 Copyright (C) The Internet Society (2000). All Rights Reserved. 1410 1411 This document and translations of it may be copied and furnished to 1412 others, and derivative works that comment on or otherwise explain it 1413 or assist in its implementation may be prepared, copied, published 1414 and distributed, in whole or in part, without restriction of any 1415 kind, provided that the above copyright notice and this paragraph are 1416 included on all such copies and derivative works. However, this 1417 document itself may not be modified in any way, such as by removing 1418 the copyright notice or references to the Internet Society or other 1419 Internet organizations, except as needed for the purpose of 1420 developing Internet standards in which case the procedures for 1421 copyrights defined in the Internet Standards process must be 1422 followed, or as required to translate it into languages other than 1423 English. 1424 1425 The limited permissions granted above are perpetual and will not be 1426 revoked by the Internet Society or its successors or assigns. 1427 1428 This document and the information contained herein is provided on an 1429 "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING 1430 TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING 1431 BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION 1432 HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF 1433 MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 1434 1435 Acknowledgement 1436 1437 Funding for the RFC Editor function is currently provided by the 1438 Internet Society. 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 Kalt Informational [Page 26] 1459