comparison libpurple/protocols/irc/PROTOCOL @ 15374:5fe8042783c1

Rename gtk/ and libgaim/ to pidgin/ and libpurple/
author Sean Egan <seanegan@gmail.com>
date Sat, 20 Jan 2007 02:32:10 +0000
parents
children
comparison
equal deleted inserted replaced
15373:f79e0f4df793 15374:5fe8042783c1
1
2
3
4
5
6
7 Network Working Group J. Oikarinen
8 Request for Comments: 1459 D. Reed
9 May 1993
10
11
12 Internet Relay Chat Protocol
13
14 Status of This Memo
15
16 This memo defines an Experimental Protocol for the Internet
17 community. Discussion and suggestions for improvement are requested.
18 Please refer to the current edition of the "IAB Official Protocol
19 Standards" for the standardization state and status of this protocol.
20 Distribution of this memo is unlimited.
21
22 Abstract
23
24 The IRC protocol was developed over the last 4 years since it was
25 first implemented as a means for users on a BBS to chat amongst
26 themselves. Now it supports a world-wide network of servers and
27 clients, and is stringing to cope with growth. Over the past 2 years,
28 the average number of users connected to the main IRC network has
29 grown by a factor of 10.
30
31 The IRC protocol is a text-based protocol, with the simplest client
32 being any socket program capable of connecting to the server.
33
34 Table of Contents
35
36 1. INTRODUCTION ............................................... 4
37 1.1 Servers ................................................ 4
38 1.2 Clients ................................................ 5
39 1.2.1 Operators .......................................... 5
40 1.3 Channels ................................................ 5
41 1.3.1 Channel Operators .................................... 6
42 2. THE IRC SPECIFICATION ....................................... 7
43 2.1 Overview ................................................ 7
44 2.2 Character codes ......................................... 7
45 2.3 Messages ................................................ 7
46 2.3.1 Message format in 'pseudo' BNF .................... 8
47 2.4 Numeric replies ......................................... 10
48 3. IRC Concepts ................................................ 10
49 3.1 One-to-one communication ................................ 10
50 3.2 One-to-many ............................................. 11
51 3.2.1 To a list .......................................... 11
52 3.2.2 To a group (channel) ............................... 11
53 3.2.3 To a host/server mask .............................. 12
54 3.3 One to all .............................................. 12
55
56
57
58 Oikarinen & Reed [Page 1]
59
60 RFC 1459 Internet Relay Chat Protocol May 1993
61
62
63 3.3.1 Client to Client ................................... 12
64 3.3.2 Clients to Server .................................. 12
65 3.3.3 Server to Server ................................... 12
66 4. MESSAGE DETAILS ............................................. 13
67 4.1 Connection Registration ................................. 13
68 4.1.1 Password message ................................... 14
69 4.1.2 Nickname message ................................... 14
70 4.1.3 User message ....................................... 15
71 4.1.4 Server message ..................................... 16
72 4.1.5 Operator message ................................... 17
73 4.1.6 Quit message ....................................... 17
74 4.1.7 Server Quit message ................................ 18
75 4.2 Channel operations ...................................... 19
76 4.2.1 Join message ....................................... 19
77 4.2.2 Part message ....................................... 20
78 4.2.3 Mode message ....................................... 21
79 4.2.3.1 Channel modes ................................. 21
80 4.2.3.2 User modes .................................... 22
81 4.2.4 Topic message ...................................... 23
82 4.2.5 Names message ...................................... 24
83 4.2.6 List message ....................................... 24
84 4.2.7 Invite message ..................................... 25
85 4.2.8 Kick message ....................................... 25
86 4.3 Server queries and commands ............................. 26
87 4.3.1 Version message .................................... 26
88 4.3.2 Stats message ...................................... 27
89 4.3.3 Links message ...................................... 28
90 4.3.4 Time message ....................................... 29
91 4.3.5 Connect message .................................... 29
92 4.3.6 Trace message ...................................... 30
93 4.3.7 Admin message ...................................... 31
94 4.3.8 Info message ....................................... 31
95 4.4 Sending messages ........................................ 32
96 4.4.1 Private messages ................................... 32
97 4.4.2 Notice messages .................................... 33
98 4.5 User-based queries ...................................... 33
99 4.5.1 Who query .......................................... 33
100 4.5.2 Whois query ........................................ 34
101 4.5.3 Whowas message ..................................... 35
102 4.6 Miscellaneous messages .................................. 35
103 4.6.1 Kill message ....................................... 36
104 4.6.2 Ping message ....................................... 37
105 4.6.3 Pong message ....................................... 37
106 4.6.4 Error message ...................................... 38
107 5. OPTIONAL MESSAGES ........................................... 38
108 5.1 Away message ............................................ 38
109 5.2 Rehash command .......................................... 39
110 5.3 Restart command ......................................... 39
111
112
113
114 Oikarinen & Reed [Page 2]
115
116 RFC 1459 Internet Relay Chat Protocol May 1993
117
118
119 5.4 Summon message .......................................... 40
120 5.5 Users message ........................................... 40
121 5.6 Operwall command ........................................ 41
122 5.7 Userhost message ........................................ 42
123 5.8 Ison message ............................................ 42
124 6. REPLIES ..................................................... 43
125 6.1 Error Replies ........................................... 43
126 6.2 Command responses ....................................... 48
127 6.3 Reserved numerics ....................................... 56
128 7. Client and server authentication ............................ 56
129 8. Current Implementations Details ............................. 56
130 8.1 Network protocol: TCP ................................... 57
131 8.1.1 Support of Unix sockets ............................ 57
132 8.2 Command Parsing ......................................... 57
133 8.3 Message delivery ........................................ 57
134 8.4 Connection 'Liveness' ................................... 58
135 8.5 Establishing a server-client connection ................. 58
136 8.6 Establishing a server-server connection ................. 58
137 8.6.1 State information exchange when connecting ......... 59
138 8.7 Terminating server-client connections ................... 59
139 8.8 Terminating server-server connections ................... 59
140 8.9 Tracking nickname changes ............................... 60
141 8.10 Flood control of clients ............................... 60
142 8.11 Non-blocking lookups ................................... 61
143 8.11.1 Hostname (DNS) lookups ............................ 61
144 8.11.2 Username (Ident) lookups .......................... 61
145 8.12 Configuration file ..................................... 61
146 8.12.1 Allowing clients to connect ....................... 62
147 8.12.2 Operators ......................................... 62
148 8.12.3 Allowing servers to connect ....................... 62
149 8.12.4 Administrivia ..................................... 63
150 8.13 Channel membership ..................................... 63
151 9. Current problems ............................................ 63
152 9.1 Scalability ............................................. 63
153 9.2 Labels .................................................. 63
154 9.2.1 Nicknames .......................................... 63
155 9.2.2 Channels ........................................... 64
156 9.2.3 Servers ............................................ 64
157 9.3 Algorithms .............................................. 64
158 10. Support and availability ................................... 64
159 11. Security Considerations .................................... 65
160 12. Authors' Addresses ......................................... 65
161
162
163
164
165
166
167
168
169
170 Oikarinen & Reed [Page 3]
171
172 RFC 1459 Internet Relay Chat Protocol May 1993
173
174
175 1. INTRODUCTION
176
177 The IRC (Internet Relay Chat) protocol has been designed over a
178 number of years for use with text based conferencing. This document
179 describes the current IRC protocol.
180
181 The IRC protocol has been developed on systems using the TCP/IP
182 network protocol, although there is no requirement that this remain
183 the only sphere in which it operates.
184
185 IRC itself is a teleconferencing system, which (through the use of
186 the client-server model) is well-suited to running on many machines
187 in a distributed fashion. A typical setup involves a single process
188 (the server) forming a central point for clients (or other servers)
189 to connect to, performing the required message delivery/multiplexing
190 and other functions.
191
192 1.1 Servers
193
194 The server forms the backbone of IRC, providing a point to which
195 clients may connect to to talk to each other, and a point for other
196 servers to connect to, forming an IRC network. The only network
197 configuration allowed for IRC servers is that of a spanning tree [see
198 Fig. 1] where each server acts as a central node for the rest of the
199 net it sees.
200
201
202 [ Server 15 ] [ Server 13 ] [ Server 14]
203 / \ /
204 / \ /
205 [ Server 11 ] ------ [ Server 1 ] [ Server 12]
206 / \ /
207 / \ /
208 [ Server 2 ] [ Server 3 ]
209 / \ \
210 / \ \
211 [ Server 4 ] [ Server 5 ] [ Server 6 ]
212 / | \ /
213 / | \ /
214 / | \____ /
215 / | \ /
216 [ Server 7 ] [ Server 8 ] [ Server 9 ] [ Server 10 ]
217
218 :
219 [ etc. ]
220 :
221
222 [ Fig. 1. Format of IRC server network ]
223
224
225
226 Oikarinen & Reed [Page 4]
227
228 RFC 1459 Internet Relay Chat Protocol May 1993
229
230
231 1.2 Clients
232
233 A client is anything connecting to a server that is not another
234 server. Each client is distinguished from other clients by a unique
235 nickname having a maximum length of nine (9) characters. See the
236 protocol grammar rules for what may and may not be used in a
237 nickname. In addition to the nickname, all servers must have the
238 following information about all clients: the real name of the host
239 that the client is running on, the username of the client on that
240 host, and the server to which the client is connected.
241
242 1.2.1 Operators
243
244 To allow a reasonable amount of order to be kept within the IRC
245 network, a special class of clients (operators) is allowed to perform
246 general maintenance functions on the network. Although the powers
247 granted to an operator can be considered as 'dangerous', they are
248 nonetheless required. Operators should be able to perform basic
249 network tasks such as disconnecting and reconnecting servers as
250 needed to prevent long-term use of bad network routing. In
251 recognition of this need, the protocol discussed herein provides for
252 operators only to be able to perform such functions. See sections
253 4.1.7 (SQUIT) and 4.3.5 (CONNECT).
254
255 A more controversial power of operators is the ability to remove a
256 user from the connected network by 'force', i.e. operators are able
257 to close the connection between any client and server. The
258 justification for this is delicate since its abuse is both
259 destructive and annoying. For further details on this type of
260 action, see section 4.6.1 (KILL).
261
262 1.3 Channels
263
264 A channel is a named group of one or more clients which will all
265 receive messages addressed to that channel. The channel is created
266 implicitly when the first client joins it, and the channel ceases to
267 exist when the last client leaves it. While channel exists, any
268 client can reference the channel using the name of the channel.
269
270 Channels names are strings (beginning with a '&' or '#' character) of
271 length up to 200 characters. Apart from the the requirement that the
272 first character being either '&' or '#'; the only restriction on a
273 channel name is that it may not contain any spaces (' '), a control G
274 (^G or ASCII 7), or a comma (',' which is used as a list item
275 separator by the protocol).
276
277 There are two types of channels allowed by this protocol. One is a
278 distributed channel which is known to all the servers that are
279
280
281
282 Oikarinen & Reed [Page 5]
283
284 RFC 1459 Internet Relay Chat Protocol May 1993
285
286
287 connected to the network. These channels are marked by the first
288 character being a only clients on the server where it exists may join
289 it. These are distinguished by a leading '&' character. On top of
290 these two types, there are the various channel modes available to
291 alter the characteristics of individual channels. See section 4.2.3
292 (MODE command) for more details on this.
293
294 To create a new channel or become part of an existing channel, a user
295 is required to JOIN the channel. If the channel doesn't exist prior
296 to joining, the channel is created and the creating user becomes a
297 channel operator. If the channel already exists, whether or not your
298 request to JOIN that channel is honoured depends on the current modes
299 of the channel. For example, if the channel is invite-only, (+i),
300 then you may only join if invited. As part of the protocol, a user
301 may be a part of several channels at once, but a limit of ten (10)
302 channels is recommended as being ample for both experienced and
303 novice users. See section 8.13 for more information on this.
304
305 If the IRC network becomes disjoint because of a split between two
306 servers, the channel on each side is only composed of those clients
307 which are connected to servers on the respective sides of the split,
308 possibly ceasing to exist on one side of the split. When the split
309 is healed, the connecting servers announce to each other who they
310 think is in each channel and the mode of that channel. If the
311 channel exists on both sides, the JOINs and MODEs are interpreted in
312 an inclusive manner so that both sides of the new connection will
313 agree about which clients are in the channel and what modes the
314 channel has.
315
316 1.3.1 Channel Operators
317
318 The channel operator (also referred to as a "chop" or "chanop") on a
319 given channel is considered to 'own' that channel. In recognition of
320 this status, channel operators are endowed with certain powers which
321 enable them to keep control and some sort of sanity in their channel.
322 As an owner of a channel, a channel operator is not required to have
323 reasons for their actions, although if their actions are generally
324 antisocial or otherwise abusive, it might be reasonable to ask an IRC
325 operator to intervene, or for the usersjust leave and go elsewhere
326 and form their own channel.
327
328 The commands which may only be used by channel operators are:
329
330 KICK - Eject a client from the channel
331 MODE - Change the channel's mode
332 INVITE - Invite a client to an invite-only channel (mode +i)
333 TOPIC - Change the channel topic in a mode +t channel
334
335
336
337
338 Oikarinen & Reed [Page 6]
339
340 RFC 1459 Internet Relay Chat Protocol May 1993
341
342
343 A channel operator is identified by the '@' symbol next to their
344 nickname whenever it is associated with a channel (ie replies to the
345 NAMES, WHO and WHOIS commands).
346
347 2. The IRC Specification
348
349 2.1 Overview
350
351 The protocol as described herein is for use both with server to
352 server and client to server connections. There are, however, more
353 restrictions on client connections (which are considered to be
354 untrustworthy) than on server connections.
355
356 2.2 Character codes
357
358 No specific character set is specified. The protocol is based on a a
359 set of codes which are composed of eight (8) bits, making up an
360 octet. Each message may be composed of any number of these octets;
361 however, some octet values are used for control codes which act as
362 message delimiters.
363
364 Regardless of being an 8-bit protocol, the delimiters and keywords
365 are such that protocol is mostly usable from USASCII terminal and a
366 telnet connection.
367
368 Because of IRC's scandanavian origin, the characters {}| are
369 considered to be the lower case equivalents of the characters []\,
370 respectively. This is a critical issue when determining the
371 equivalence of two nicknames.
372
373 2.3 Messages
374
375 Servers and clients send eachother messages which may or may not
376 generate a reply. If the message contains a valid command, as
377 described in later sections, the client should expect a reply as
378 specified but it is not advised to wait forever for the reply; client
379 to server and server to server communication is essentially
380 asynchronous in nature.
381
382 Each IRC message may consist of up to three main parts: the prefix
383 (optional), the command, and the command parameters (of which there
384 may be up to 15). The prefix, command, and all parameters are
385 separated by one (or more) ASCII space character(s) (0x20).
386
387 The presence of a prefix is indicated with a single leading ASCII
388 colon character (':', 0x3b), which must be the first character of the
389 message itself. There must be no gap (whitespace) between the colon
390 and the prefix. The prefix is used by servers to indicate the true
391
392
393
394 Oikarinen & Reed [Page 7]
395
396 RFC 1459 Internet Relay Chat Protocol May 1993
397
398
399 origin of the message. If the prefix is missing from the message, it
400 is assumed to have originated from the connection from which it was
401 received. Clients should not use prefix when sending a message from
402 themselves; if they use a prefix, the only valid prefix is the
403 registered nickname associated with the client. If the source
404 identified by the prefix cannot be found from the server's internal
405 database, or if the source is registered from a different link than
406 from which the message arrived, the server must ignore the message
407 silently.
408
409 The command must either be a valid IRC command or a three (3) digit
410 number represented in ASCII text.
411
412 IRC messages are always lines of characters terminated with a CR-LF
413 (Carriage Return - Line Feed) pair, and these messages shall not
414 exceed 512 characters in length, counting all characters including
415 the trailing CR-LF. Thus, there are 510 characters maximum allowed
416 for the command and its parameters. There is no provision for
417 continuation message lines. See section 7 for more details about
418 current implementations.
419
420 2.3.1 Message format in 'pseudo' BNF
421
422 The protocol messages must be extracted from the contiguous stream of
423 octets. The current solution is to designate two characters, CR and
424 LF, as message separators. Empty messages are silently ignored,
425 which permits use of the sequence CR-LF between messages
426 without extra problems.
427
428 The extracted message is parsed into the components <prefix>,
429 <command> and list of parameters matched either by <middle> or
430 <trailing> components.
431
432 The BNF representation for this is:
433
434
435 <message> ::= [':' <prefix> <SPACE> ] <command> <params> <crlf>
436 <prefix> ::= <servername> | <nick> [ '!' <user> ] [ '@' <host> ]
437 <command> ::= <letter> { <letter> } | <number> <number> <number>
438 <SPACE> ::= ' ' { ' ' }
439 <params> ::= <SPACE> [ ':' <trailing> | <middle> <params> ]
440
441 <middle> ::= <Any *non-empty* sequence of octets not including SPACE
442 or NUL or CR or LF, the first of which may not be ':'>
443 <trailing> ::= <Any, possibly *empty*, sequence of octets not including
444 NUL or CR or LF>
445
446 <crlf> ::= CR LF
447
448
449
450 Oikarinen & Reed [Page 8]
451
452 RFC 1459 Internet Relay Chat Protocol May 1993
453
454
455 NOTES:
456
457 1) <SPACE> is consists only of SPACE character(s) (0x20).
458 Specially notice that TABULATION, and all other control
459 characters are considered NON-WHITE-SPACE.
460
461 2) After extracting the parameter list, all parameters are equal,
462 whether matched by <middle> or <trailing>. <Trailing> is just
463 a syntactic trick to allow SPACE within parameter.
464
465 3) The fact that CR and LF cannot appear in parameter strings is
466 just artifact of the message framing. This might change later.
467
468 4) The NUL character is not special in message framing, and
469 basically could end up inside a parameter, but as it would
470 cause extra complexities in normal C string handling. Therefore
471 NUL is not allowed within messages.
472
473 5) The last parameter may be an empty string.
474
475 6) Use of the extended prefix (['!' <user> ] ['@' <host> ]) must
476 not be used in server to server communications and is only
477 intended for server to client messages in order to provide
478 clients with more useful information about who a message is
479 from without the need for additional queries.
480
481 Most protocol messages specify additional semantics and syntax for
482 the extracted parameter strings dictated by their position in the
483 list. For example, many server commands will assume that the first
484 parameter after the command is the list of targets, which can be
485 described with:
486
487 <target> ::= <to> [ "," <target> ]
488 <to> ::= <channel> | <user> '@' <servername> | <nick> | <mask>
489 <channel> ::= ('#' | '&') <chstring>
490 <servername> ::= <host>
491 <host> ::= see RFC 952 [DNS:4] for details on allowed hostnames
492 <nick> ::= <letter> { <letter> | <number> | <special> }
493 <mask> ::= ('#' | '$') <chstring>
494 <chstring> ::= <any 8bit code except SPACE, BELL, NUL, CR, LF and
495 comma (',')>
496
497 Other parameter syntaxes are:
498
499 <user> ::= <nonwhite> { <nonwhite> }
500 <letter> ::= 'a' ... 'z' | 'A' ... 'Z'
501 <number> ::= '0' ... '9'
502 <special> ::= '-' | '[' | ']' | '\' | '`' | '^' | '{' | '}'
503
504
505
506 Oikarinen & Reed [Page 9]
507
508 RFC 1459 Internet Relay Chat Protocol May 1993
509
510
511 <nonwhite> ::= <any 8bit code except SPACE (0x20), NUL (0x0), CR
512 (0xd), and LF (0xa)>
513
514 2.4 Numeric replies
515
516 Most of the messages sent to the server generate a reply of some
517 sort. The most common reply is the numeric reply, used for both
518 errors and normal replies. The numeric reply must be sent as one
519 message consisting of the sender prefix, the three digit numeric, and
520 the target of the reply. A numeric reply is not allowed to originate
521 from a client; any such messages received by a server are silently
522 dropped. In all other respects, a numeric reply is just like a normal
523 message, except that the keyword is made up of 3 numeric digits
524 rather than a string of letters. A list of different replies is
525 supplied in section 6.
526
527 3. IRC Concepts.
528
529 This section is devoted to describing the actual concepts behind the
530 organization of the IRC protocol and how the current
531 implementations deliver different classes of messages.
532
533
534
535 1--\
536 A D---4
537 2--/ \ /
538 B----C
539 / \
540 3 E
541
542 Servers: A, B, C, D, E Clients: 1, 2, 3, 4
543
544 [ Fig. 2. Sample small IRC network ]
545
546 3.1 One-to-one communication
547
548 Communication on a one-to-one basis is usually only performed by
549 clients, since most server-server traffic is not a result of servers
550 talking only to each other. To provide a secure means for clients to
551 talk to each other, it is required that all servers be able to send a
552 message in exactly one direction along the spanning tree in order to
553 reach any client. The path of a message being delivered is the
554 shortest path between any two points on the spanning tree.
555
556 The following examples all refer to Figure 2 above.
557
558
559
560
561
562 Oikarinen & Reed [Page 10]
563
564 RFC 1459 Internet Relay Chat Protocol May 1993
565
566
567 Example 1:
568 A message between clients 1 and 2 is only seen by server A, which
569 sends it straight to client 2.
570
571 Example 2:
572 A message between clients 1 and 3 is seen by servers A & B, and
573 client 3. No other clients or servers are allowed see the message.
574
575 Example 3:
576 A message between clients 2 and 4 is seen by servers A, B, C & D
577 and client 4 only.
578
579 3.2 One-to-many
580
581 The main goal of IRC is to provide a forum which allows easy and
582 efficient conferencing (one to many conversations). IRC offers
583 several means to achieve this, each serving its own purpose.
584
585 3.2.1 To a list
586
587 The least efficient style of one-to-many conversation is through
588 clients talking to a 'list' of users. How this is done is almost
589 self explanatory: the client gives a list of destinations to which
590 the message is to be delivered and the server breaks it up and
591 dispatches a separate copy of the message to each given destination.
592 This isn't as efficient as using a group since the destination list
593 is broken up and the dispatch sent without checking to make sure
594 duplicates aren't sent down each path.
595
596 3.2.2 To a group (channel)
597
598 In IRC the channel has a role equivalent to that of the multicast
599 group; their existence is dynamic (coming and going as people join
600 and leave channels) and the actual conversation carried out on a
601 channel is only sent to servers which are supporting users on a given
602 channel. If there are multiple users on a server in the same
603 channel, the message text is sent only once to that server and then
604 sent to each client on the channel. This action is then repeated for
605 each client-server combination until the original message has fanned
606 out and reached each member of the channel.
607
608 The following examples all refer to Figure 2.
609
610 Example 4:
611 Any channel with 1 client in it. Messages to the channel go to the
612 server and then nowhere else.
613
614
615
616
617
618 Oikarinen & Reed [Page 11]
619
620 RFC 1459 Internet Relay Chat Protocol May 1993
621
622
623 Example 5:
624 2 clients in a channel. All messages traverse a path as if they
625 were private messages between the two clients outside a channel.
626
627 Example 6:
628 Clients 1, 2 and 3 in a channel. All messages to the channel are
629 sent to all clients and only those servers which must be traversed
630 by the message if it were a private message to a single client. If
631 client 1 sends a message, it goes back to client 2 and then via
632 server B to client 3.
633
634 3.2.3 To a host/server mask
635
636 To provide IRC operators with some mechanism to send messages to a
637 large body of related users, host and server mask messages are
638 provided. These messages are sent to users whose host or server
639 information match that of the mask. The messages are only sent to
640 locations where users are, in a fashion similar to that of channels.
641
642 3.3 One-to-all
643
644 The one-to-all type of message is better described as a broadcast
645 message, sent to all clients or servers or both. On a large network
646 of users and servers, a single message can result in a lot of traffic
647 being sent over the network in an effort to reach all of the desired
648 destinations.
649
650 For some messages, there is no option but to broadcast it to all
651 servers so that the state information held by each server is
652 reasonably consistent between servers.
653
654 3.3.1 Client-to-Client
655
656 There is no class of message which, from a single message, results in
657 a message being sent to every other client.
658
659 3.3.2 Client-to-Server
660
661 Most of the commands which result in a change of state information
662 (such as channel membership, channel mode, user status, etc) must be
663 sent to all servers by default, and this distribution may not be
664 changed by the client.
665
666 3.3.3 Server-to-Server.
667
668 While most messages between servers are distributed to all 'other'
669 servers, this is only required for any message that affects either a
670 user, channel or server. Since these are the basic items found in
671
672
673
674 Oikarinen & Reed [Page 12]
675
676 RFC 1459 Internet Relay Chat Protocol May 1993
677
678
679 IRC, nearly all messages originating from a server are broadcast to
680 all other connected servers.
681
682 4. Message details
683
684 On the following pages are descriptions of each message recognized by
685 the IRC server and client. All commands described in this section
686 must be implemented by any server for this protocol.
687
688 Where the reply ERR_NOSUCHSERVER is listed, it means that the
689 <server> parameter could not be found. The server must not send any
690 other replies after this for that command.
691
692 The server to which a client is connected is required to parse the
693 complete message, returning any appropriate errors. If the server
694 encounters a fatal error while parsing a message, an error must be
695 sent back to the client and the parsing terminated. A fatal error
696 may be considered to be incorrect command, a destination which is
697 otherwise unknown to the server (server, nick or channel names fit
698 this category), not enough parameters or incorrect privileges.
699
700 If a full set of parameters is presented, then each must be checked
701 for validity and appropriate responses sent back to the client. In
702 the case of messages which use parameter lists using the comma as an
703 item separator, a reply must be sent for each item.
704
705 In the examples below, some messages appear using the full format:
706
707 :Name COMMAND parameter list
708
709 Such examples represent a message from "Name" in transit between
710 servers, where it is essential to include the name of the original
711 sender of the message so remote servers may send back a reply along
712 the correct path.
713
714 4.1 Connection Registration
715
716 The commands described here are used to register a connection with an
717 IRC server as either a user or a server as well as correctly
718 disconnect.
719
720 A "PASS" command is not required for either client or server
721 connection to be registered, but it must precede the server message
722 or the latter of the NICK/USER combination. It is strongly
723 recommended that all server connections have a password in order to
724 give some level of security to the actual connections. The
725 recommended order for a client to register is as follows:
726
727
728
729
730 Oikarinen & Reed [Page 13]
731
732 RFC 1459 Internet Relay Chat Protocol May 1993
733
734
735 1. Pass message
736 2. Nick message
737 3. User message
738
739 4.1.1 Password message
740
741
742 Command: PASS
743 Parameters: <password>
744
745 The PASS command is used to set a 'connection password'. The
746 password can and must be set before any attempt to register the
747 connection is made. Currently this requires that clients send a PASS
748 command before sending the NICK/USER combination and servers *must*
749 send a PASS command before any SERVER command. The password supplied
750 must match the one contained in the C/N lines (for servers) or I
751 lines (for clients). It is possible to send multiple PASS commands
752 before registering but only the last one sent is used for
753 verification and it may not be changed once registered. Numeric
754 Replies:
755
756 ERR_NEEDMOREPARAMS ERR_ALREADYREGISTRED
757
758 Example:
759
760 PASS secretpasswordhere
761
762 4.1.2 Nick message
763
764 Command: NICK
765 Parameters: <nickname> [ <hopcount> ]
766
767 NICK message is used to give user a nickname or change the previous
768 one. The <hopcount> parameter is only used by servers to indicate
769 how far away a nick is from its home server. A local connection has
770 a hopcount of 0. If supplied by a client, it must be ignored.
771
772 If a NICK message arrives at a server which already knows about an
773 identical nickname for another client, a nickname collision occurs.
774 As a result of a nickname collision, all instances of the nickname
775 are removed from the server's database, and a KILL command is issued
776 to remove the nickname from all other server's database. If the NICK
777 message causing the collision was a nickname change, then the
778 original (old) nick must be removed as well.
779
780 If the server recieves an identical NICK from a client which is
781 directly connected, it may issue an ERR_NICKCOLLISION to the local
782 client, drop the NICK command, and not generate any kills.
783
784
785
786 Oikarinen & Reed [Page 14]
787
788 RFC 1459 Internet Relay Chat Protocol May 1993
789
790
791 Numeric Replies:
792
793 ERR_NONICKNAMEGIVEN ERR_ERRONEUSNICKNAME
794 ERR_NICKNAMEINUSE ERR_NICKCOLLISION
795
796 Example:
797
798 NICK Wiz ; Introducing new nick "Wiz".
799
800 :WiZ NICK Kilroy ; WiZ changed his nickname to Kilroy.
801
802 4.1.3 User message
803
804 Command: USER
805 Parameters: <username> <hostname> <servername> <realname>
806
807 The USER message is used at the beginning of connection to specify
808 the username, hostname, servername and realname of s new user. It is
809 also used in communication between servers to indicate new user
810 arriving on IRC, since only after both USER and NICK have been
811 received from a client does a user become registered.
812
813 Between servers USER must to be prefixed with client's NICKname.
814 Note that hostname and servername are normally ignored by the IRC
815 server when the USER command comes from a directly connected client
816 (for security reasons), but they are used in server to server
817 communication. This means that a NICK must always be sent to a
818 remote server when a new user is being introduced to the rest of the
819 network before the accompanying USER is sent.
820
821 It must be noted that realname parameter must be the last parameter,
822 because it may contain space characters and must be prefixed with a
823 colon (':') to make sure this is recognised as such.
824
825 Since it is easy for a client to lie about its username by relying
826 solely on the USER message, the use of an "Identity Server" is
827 recommended. If the host which a user connects from has such a
828 server enabled the username is set to that as in the reply from the
829 "Identity Server".
830
831 Numeric Replies:
832
833 ERR_NEEDMOREPARAMS ERR_ALREADYREGISTRED
834
835 Examples:
836
837
838 USER guest tolmoon tolsun :Ronnie Reagan
839
840
841
842 Oikarinen & Reed [Page 15]
843
844 RFC 1459 Internet Relay Chat Protocol May 1993
845
846
847 ; User registering themselves with a
848 username of "guest" and real name
849 "Ronnie Reagan".
850
851
852 :testnick USER guest tolmoon tolsun :Ronnie Reagan
853 ; message between servers with the
854 nickname for which the USER command
855 belongs to
856
857 4.1.4 Server message
858
859 Command: SERVER
860 Parameters: <servername> <hopcount> <info>
861
862 The server message is used to tell a server that the other end of a
863 new connection is a server. This message is also used to pass server
864 data over whole net. When a new server is connected to net,
865 information about it be broadcast to the whole network. <hopcount>
866 is used to give all servers some internal information on how far away
867 all servers are. With a full server list, it would be possible to
868 construct a map of the entire server tree, but hostmasks prevent this
869 from being done.
870
871 The SERVER message must only be accepted from either (a) a connection
872 which is yet to be registered and is attempting to register as a
873 server, or (b) an existing connection to another server, in which
874 case the SERVER message is introducing a new server behind that
875 server.
876
877 Most errors that occur with the receipt of a SERVER command result in
878 the connection being terminated by the destination host (target
879 SERVER). Error replies are usually sent using the "ERROR" command
880 rather than the numeric since the ERROR command has several useful
881 properties which make it useful here.
882
883 If a SERVER message is parsed and attempts to introduce a server
884 which is already known to the receiving server, the connection from
885 which that message must be closed (following the correct procedures),
886 since a duplicate route to a server has formed and the acyclic nature
887 of the IRC tree broken.
888
889 Numeric Replies:
890
891 ERR_ALREADYREGISTRED
892
893 Example:
894
895
896
897
898 Oikarinen & Reed [Page 16]
899
900 RFC 1459 Internet Relay Chat Protocol May 1993
901
902
903 SERVER test.oulu.fi 1 :[tolsun.oulu.fi] Experimental server
904 ; New server test.oulu.fi introducing
905 itself and attempting to register. The
906 name in []'s is the hostname for the
907 host running test.oulu.fi.
908
909
910 :tolsun.oulu.fi SERVER csd.bu.edu 5 :BU Central Server
911 ; Server tolsun.oulu.fi is our uplink
912 for csd.bu.edu which is 5 hops away.
913
914 4.1.5 Oper
915
916 Command: OPER
917 Parameters: <user> <password>
918
919 OPER message is used by a normal user to obtain operator privileges.
920 The combination of <user> and <password> are required to gain
921 Operator privileges.
922
923 If the client sending the OPER command supplies the correct password
924 for the given user, the server then informs the rest of the network
925 of the new operator by issuing a "MODE +o" for the clients nickname.
926
927 The OPER message is client-server only.
928
929 Numeric Replies:
930
931 ERR_NEEDMOREPARAMS RPL_YOUREOPER
932 ERR_NOOPERHOST ERR_PASSWDMISMATCH
933
934 Example:
935
936 OPER foo bar ; Attempt to register as an operator
937 using a username of "foo" and "bar" as
938 the password.
939
940 4.1.6 Quit
941
942 Command: QUIT
943 Parameters: [<Quit message>]
944
945 A client session is ended with a quit message. The server must close
946 the connection to a client which sends a QUIT message. If a "Quit
947 Message" is given, this will be sent instead of the default message,
948 the nickname.
949
950 When netsplits (disconnecting of two servers) occur, the quit message
951
952
953
954 Oikarinen & Reed [Page 17]
955
956 RFC 1459 Internet Relay Chat Protocol May 1993
957
958
959 is composed of the names of two servers involved, separated by a
960 space. The first name is that of the server which is still connected
961 and the second name is that of the server that has become
962 disconnected.
963
964 If, for some other reason, a client connection is closed without the
965 client issuing a QUIT command (e.g. client dies and EOF occurs
966 on socket), the server is required to fill in the quit message with
967 some sort of message reflecting the nature of the event which
968 caused it to happen.
969
970 Numeric Replies:
971
972 None.
973
974 Examples:
975
976 QUIT :Gone to have lunch ; Preferred message format.
977
978 4.1.7 Server quit message
979
980 Command: SQUIT
981 Parameters: <server> <comment>
982
983 The SQUIT message is needed to tell about quitting or dead servers.
984 If a server wishes to break the connection to another server it must
985 send a SQUIT message to the other server, using the the name of the
986 other server as the server parameter, which then closes its
987 connection to the quitting server.
988
989 This command is also available operators to help keep a network of
990 IRC servers connected in an orderly fashion. Operators may also
991 issue an SQUIT message for a remote server connection. In this case,
992 the SQUIT must be parsed by each server inbetween the operator and
993 the remote server, updating the view of the network held by each
994 server as explained below.
995
996 The <comment> should be supplied by all operators who execute a SQUIT
997 for a remote server (that is not connected to the server they are
998 currently on) so that other operators are aware for the reason of
999 this action. The <comment> is also filled in by servers which may
1000 place an error or similar message here.
1001
1002 Both of the servers which are on either side of the connection being
1003 closed are required to to send out a SQUIT message (to all its other
1004 server connections) for all other servers which are considered to be
1005 behind that link.
1006
1007
1008
1009
1010 Oikarinen & Reed [Page 18]
1011
1012 RFC 1459 Internet Relay Chat Protocol May 1993
1013
1014
1015 Similarly, a QUIT message must be sent to the other connected servers
1016 rest of the network on behalf of all clients behind that link. In
1017 addition to this, all channel members of a channel which lost a
1018 member due to the split must be sent a QUIT message.
1019
1020 If a server connection is terminated prematurely (e.g. the server on
1021 the other end of the link died), the server which detects
1022 this disconnection is required to inform the rest of the network
1023 that the connection has closed and fill in the comment field
1024 with something appropriate.
1025
1026 Numeric replies:
1027
1028 ERR_NOPRIVILEGES ERR_NOSUCHSERVER
1029
1030 Example:
1031
1032 SQUIT tolsun.oulu.fi :Bad Link ? ; the server link tolson.oulu.fi has
1033 been terminated because of "Bad Link".
1034
1035 :Trillian SQUIT cm22.eng.umd.edu :Server out of control
1036 ; message from Trillian to disconnect
1037 "cm22.eng.umd.edu" from the net
1038 because "Server out of control".
1039
1040 4.2 Channel operations
1041
1042 This group of messages is concerned with manipulating channels, their
1043 properties (channel modes), and their contents (typically clients).
1044 In implementing these, a number of race conditions are inevitable
1045 when clients at opposing ends of a network send commands which will
1046 ultimately clash. It is also required that servers keep a nickname
1047 history to ensure that wherever a <nick> parameter is given, the
1048 server check its history in case it has recently been changed.
1049
1050 4.2.1 Join message
1051
1052 Command: JOIN
1053 Parameters: <channel>{,<channel>} [<key>{,<key>}]
1054
1055 The JOIN command is used by client to start listening a specific
1056 channel. Whether or not a client is allowed to join a channel is
1057 checked only by the server the client is connected to; all other
1058 servers automatically add the user to the channel when it is received
1059 from other servers. The conditions which affect this are as follows:
1060
1061 1. the user must be invited if the channel is invite-only;
1062
1063
1064
1065
1066 Oikarinen & Reed [Page 19]
1067
1068 RFC 1459 Internet Relay Chat Protocol May 1993
1069
1070
1071 2. the user's nick/username/hostname must not match any
1072 active bans;
1073
1074 3. the correct key (password) must be given if it is set.
1075
1076 These are discussed in more detail under the MODE command (see
1077 section 4.2.3 for more details).
1078
1079 Once a user has joined a channel, they receive notice about all
1080 commands their server receives which affect the channel. This
1081 includes MODE, KICK, PART, QUIT and of course PRIVMSG/NOTICE. The
1082 JOIN command needs to be broadcast to all servers so that each server
1083 knows where to find the users who are on the channel. This allows
1084 optimal delivery of PRIVMSG/NOTICE messages to the channel.
1085
1086 If a JOIN is successful, the user is then sent the channel's topic
1087 (using RPL_TOPIC) and the list of users who are on the channel (using
1088 RPL_NAMREPLY), which must include the user joining.
1089
1090 Numeric Replies:
1091
1092 ERR_NEEDMOREPARAMS ERR_BANNEDFROMCHAN
1093 ERR_INVITEONLYCHAN ERR_BADCHANNELKEY
1094 ERR_CHANNELISFULL ERR_BADCHANMASK
1095 ERR_NOSUCHCHANNEL ERR_TOOMANYCHANNELS
1096 RPL_TOPIC
1097
1098 Examples:
1099
1100 JOIN #foobar ; join channel #foobar.
1101
1102 JOIN &foo fubar ; join channel &foo using key "fubar".
1103
1104 JOIN #foo,&bar fubar ; join channel #foo using key "fubar"
1105 and &bar using no key.
1106
1107 JOIN #foo,#bar fubar,foobar ; join channel #foo using key "fubar".
1108 and channel #bar using key "foobar".
1109
1110 JOIN #foo,#bar ; join channels #foo and #bar.
1111
1112 :WiZ JOIN #Twilight_zone ; JOIN message from WiZ
1113
1114 4.2.2 Part message
1115
1116 Command: PART
1117 Parameters: <channel>{,<channel>}
1118
1119
1120
1121
1122 Oikarinen & Reed [Page 20]
1123
1124 RFC 1459 Internet Relay Chat Protocol May 1993
1125
1126
1127 The PART message causes the client sending the message to be removed
1128 from the list of active users for all given channels listed in the
1129 parameter string.
1130
1131 Numeric Replies:
1132
1133 ERR_NEEDMOREPARAMS ERR_NOSUCHCHANNEL
1134 ERR_NOTONCHANNEL
1135
1136 Examples:
1137
1138 PART #twilight_zone ; leave channel "#twilight_zone"
1139
1140 PART #oz-ops,&group5 ; leave both channels "&group5" and
1141 "#oz-ops".
1142
1143 4.2.3 Mode message
1144
1145 Command: MODE
1146
1147 The MODE command is a dual-purpose command in IRC. It allows both
1148 usernames and channels to have their mode changed. The rationale for
1149 this choice is that one day nicknames will be obsolete and the
1150 equivalent property will be the channel.
1151
1152 When parsing MODE messages, it is recommended that the entire message
1153 be parsed first and then the changes which resulted then passed on.
1154
1155 4.2.3.1 Channel modes
1156
1157 Parameters: <channel> {[+|-]|o|p|s|i|t|n|b|v} [<limit>] [<user>]
1158 [<ban mask>]
1159
1160 The MODE command is provided so that channel operators may change the
1161 characteristics of `their' channel. It is also required that servers
1162 be able to change channel modes so that channel operators may be
1163 created.
1164
1165 The various modes available for channels are as follows:
1166
1167 o - give/take channel operator privileges;
1168 p - private channel flag;
1169 s - secret channel flag;
1170 i - invite-only channel flag;
1171 t - topic settable by channel operator only flag;
1172 n - no messages to channel from clients on the outside;
1173 m - moderated channel;
1174 l - set the user limit to channel;
1175
1176
1177
1178 Oikarinen & Reed [Page 21]
1179
1180 RFC 1459 Internet Relay Chat Protocol May 1993
1181
1182
1183 b - set a ban mask to keep users out;
1184 v - give/take the ability to speak on a moderated channel;
1185 k - set a channel key (password).
1186
1187 When using the 'o' and 'b' options, a restriction on a total of three
1188 per mode command has been imposed. That is, any combination of 'o'
1189 and
1190
1191 4.2.3.2 User modes
1192
1193 Parameters: <nickname> {[+|-]|i|w|s|o}
1194
1195 The user MODEs are typically changes which affect either how the
1196 client is seen by others or what 'extra' messages the client is sent.
1197 A user MODE command may only be accepted if both the sender of the
1198 message and the nickname given as a parameter are both the same.
1199
1200 The available modes are as follows:
1201
1202 i - marks a users as invisible;
1203 s - marks a user for receipt of server notices;
1204 w - user receives wallops;
1205 o - operator flag.
1206
1207 Additional modes may be available later on.
1208
1209 If a user attempts to make themselves an operator using the "+o"
1210 flag, the attempt should be ignored. There is no restriction,
1211 however, on anyone `deopping' themselves (using "-o"). Numeric
1212 Replies:
1213
1214 ERR_NEEDMOREPARAMS RPL_CHANNELMODEIS
1215 ERR_CHANOPRIVSNEEDED ERR_NOSUCHNICK
1216 ERR_NOTONCHANNEL ERR_KEYSET
1217 RPL_BANLIST RPL_ENDOFBANLIST
1218 ERR_UNKNOWNMODE ERR_NOSUCHCHANNEL
1219
1220 ERR_USERSDONTMATCH RPL_UMODEIS
1221 ERR_UMODEUNKNOWNFLAG
1222
1223 Examples:
1224
1225 Use of Channel Modes:
1226
1227 MODE #Finnish +im ; Makes #Finnish channel moderated and
1228 'invite-only'.
1229
1230 MODE #Finnish +o Kilroy ; Gives 'chanop' privileges to Kilroy on
1231
1232
1233
1234 Oikarinen & Reed [Page 22]
1235
1236 RFC 1459 Internet Relay Chat Protocol May 1993
1237
1238
1239 channel #Finnish.
1240
1241 MODE #Finnish +v Wiz ; Allow WiZ to speak on #Finnish.
1242
1243 MODE #Fins -s ; Removes 'secret' flag from channel
1244 #Fins.
1245
1246 MODE #42 +k oulu ; Set the channel key to "oulu".
1247
1248 MODE #eu-opers +l 10 ; Set the limit for the number of users
1249 on channel to 10.
1250
1251 MODE &oulu +b ; list ban masks set for channel.
1252
1253 MODE &oulu +b *!*@* ; prevent all users from joining.
1254
1255 MODE &oulu +b *!*@*.edu ; prevent any user from a hostname
1256 matching *.edu from joining.
1257
1258 Use of user Modes:
1259
1260 :MODE WiZ -w ; turns reception of WALLOPS messages
1261 off for WiZ.
1262
1263 :Angel MODE Angel +i ; Message from Angel to make themselves
1264 invisible.
1265
1266 MODE WiZ -o ; WiZ 'deopping' (removing operator
1267 status). The plain reverse of this
1268 command ("MODE WiZ +o") must not be
1269 allowed from users since would bypass
1270 the OPER command.
1271
1272 4.2.4 Topic message
1273
1274 Command: TOPIC
1275 Parameters: <channel> [<topic>]
1276
1277 The TOPIC message is used to change or view the topic of a channel.
1278 The topic for channel <channel> is returned if there is no <topic>
1279 given. If the <topic> parameter is present, the topic for that
1280 channel will be changed, if the channel modes permit this action.
1281
1282 Numeric Replies:
1283
1284 ERR_NEEDMOREPARAMS ERR_NOTONCHANNEL
1285 RPL_NOTOPIC RPL_TOPIC
1286 ERR_CHANOPRIVSNEEDED
1287
1288
1289
1290 Oikarinen & Reed [Page 23]
1291
1292 RFC 1459 Internet Relay Chat Protocol May 1993
1293
1294
1295 Examples:
1296
1297 :Wiz TOPIC #test :New topic ;User Wiz setting the topic.
1298
1299 TOPIC #test :another topic ;set the topic on #test to "another
1300 topic".
1301
1302 TOPIC #test ; check the topic for #test.
1303
1304 4.2.5 Names message
1305
1306 Command: NAMES
1307 Parameters: [<channel>{,<channel>}]
1308
1309 By using the NAMES command, a user can list all nicknames that are
1310 visible to them on any channel that they can see. Channel names
1311 which they can see are those which aren't private (+p) or secret (+s)
1312 or those which they are actually on. The <channel> parameter
1313 specifies which channel(s) to return information about if valid.
1314 There is no error reply for bad channel names.
1315
1316 If no <channel> parameter is given, a list of all channels and their
1317 occupants is returned. At the end of this list, a list of users who
1318 are visible but either not on any channel or not on a visible channel
1319 are listed as being on `channel' "*".
1320
1321 Numerics:
1322
1323 RPL_NAMREPLY RPL_ENDOFNAMES
1324
1325 Examples:
1326
1327 NAMES #twilight_zone,#42 ; list visible users on #twilight_zone
1328 and #42 if the channels are visible to
1329 you.
1330
1331 NAMES ; list all visible channels and users
1332
1333 4.2.6 List message
1334
1335 Command: LIST
1336 Parameters: [<channel>{,<channel>} [<server>]]
1337
1338 The list message is used to list channels and their topics. If the
1339 <channel> parameter is used, only the status of that channel
1340 is displayed. Private channels are listed (without their
1341 topics) as channel "Prv" unless the client generating the query is
1342 actually on that channel. Likewise, secret channels are not listed
1343
1344
1345
1346 Oikarinen & Reed [Page 24]
1347
1348 RFC 1459 Internet Relay Chat Protocol May 1993
1349
1350
1351 at all unless the client is a member of the channel in question.
1352
1353 Numeric Replies:
1354
1355 ERR_NOSUCHSERVER RPL_LISTSTART
1356 RPL_LIST RPL_LISTEND
1357
1358 Examples:
1359
1360 LIST ; List all channels.
1361
1362 LIST #twilight_zone,#42 ; List channels #twilight_zone and #42
1363
1364 4.2.7 Invite message
1365
1366 Command: INVITE
1367 Parameters: <nickname> <channel>
1368
1369 The INVITE message is used to invite users to a channel. The
1370 parameter <nickname> is the nickname of the person to be invited to
1371 the target channel <channel>. There is no requirement that the
1372 channel the target user is being invited to must exist or be a valid
1373 channel. To invite a user to a channel which is invite only (MODE
1374 +i), the client sending the invite must be recognised as being a
1375 channel operator on the given channel.
1376
1377 Numeric Replies:
1378
1379 ERR_NEEDMOREPARAMS ERR_NOSUCHNICK
1380 ERR_NOTONCHANNEL ERR_USERONCHANNEL
1381 ERR_CHANOPRIVSNEEDED
1382 RPL_INVITING RPL_AWAY
1383
1384 Examples:
1385
1386 :Angel INVITE Wiz #Dust ; User Angel inviting WiZ to channel
1387 #Dust
1388
1389 INVITE Wiz #Twilight_Zone ; Command to invite WiZ to
1390 #Twilight_zone
1391
1392 4.2.8 Kick command
1393
1394 Command: KICK
1395 Parameters: <channel> <user> [<comment>]
1396
1397 The KICK command can be used to forcibly remove a user from a
1398 channel. It 'kicks them out' of the channel (forced PART).
1399
1400
1401
1402 Oikarinen & Reed [Page 25]
1403
1404 RFC 1459 Internet Relay Chat Protocol May 1993
1405
1406
1407 Only a channel operator may kick another user out of a channel.
1408 Each server that receives a KICK message checks that it is valid
1409 (ie the sender is actually a channel operator) before removing
1410 the victim from the channel.
1411
1412 Numeric Replies:
1413
1414 ERR_NEEDMOREPARAMS ERR_NOSUCHCHANNEL
1415 ERR_BADCHANMASK ERR_CHANOPRIVSNEEDED
1416 ERR_NOTONCHANNEL
1417
1418 Examples:
1419
1420 KICK &Melbourne Matthew ; Kick Matthew from &Melbourne
1421
1422 KICK #Finnish John :Speaking English
1423 ; Kick John from #Finnish using
1424 "Speaking English" as the reason
1425 (comment).
1426
1427 :WiZ KICK #Finnish John ; KICK message from WiZ to remove John
1428 from channel #Finnish
1429
1430 NOTE:
1431 It is possible to extend the KICK command parameters to the
1432 following:
1433
1434 <channel>{,<channel>} <user>{,<user>} [<comment>]
1435
1436 4.3 Server queries and commands
1437
1438 The server query group of commands has been designed to return
1439 information about any server which is connected to the network. All
1440 servers connected must respond to these queries and respond
1441 correctly. Any invalid response (or lack thereof) must be considered
1442 a sign of a broken server and it must be disconnected/disabled as
1443 soon as possible until the situation is remedied.
1444
1445 In these queries, where a parameter appears as "<server>", it will
1446 usually mean it can be a nickname or a server or a wildcard name of
1447 some sort. For each parameter, however, only one query and set of
1448 replies is to be generated.
1449
1450 4.3.1 Version message
1451
1452 Command: VERSION
1453 Parameters: [<server>]
1454
1455
1456
1457
1458 Oikarinen & Reed [Page 26]
1459
1460 RFC 1459 Internet Relay Chat Protocol May 1993
1461
1462
1463 The VERSION message is used to query the version of the server
1464 program. An optional parameter <server> is used to query the version
1465 of the server program which a client is not directly connected to.
1466
1467 Numeric Replies:
1468
1469 ERR_NOSUCHSERVER RPL_VERSION
1470
1471 Examples:
1472
1473 :Wiz VERSION *.se ; message from Wiz to check the version
1474 of a server matching "*.se"
1475
1476 VERSION tolsun.oulu.fi ; check the version of server
1477 "tolsun.oulu.fi".
1478
1479 4.3.2 Stats message
1480
1481 Command: STATS
1482 Parameters: [<query> [<server>]]
1483
1484 The stats message is used to query statistics of certain server. If
1485 <server> parameter is omitted, only the end of stats reply is sent
1486 back. The implementation of this command is highly dependent on the
1487 server which replies, although the server must be able to supply
1488 information as described by the queries below (or similar).
1489
1490 A query may be given by any single letter which is only checked by
1491 the destination server (if given as the <server> parameter) and is
1492 otherwise passed on by intermediate servers, ignored and unaltered.
1493 The following queries are those found in the current IRC
1494 implementation and provide a large portion of the setup information
1495 for that server. Although these may not be supported in the same way
1496 by other versions, all servers should be able to supply a valid reply
1497 to a STATS query which is consistent with the reply formats currently
1498 used and the purpose of the query.
1499
1500 The currently supported queries are:
1501
1502 c - returns a list of servers which the server may connect
1503 to or allow connections from;
1504 h - returns a list of servers which are either forced to be
1505 treated as leaves or allowed to act as hubs;
1506 i - returns a list of hosts which the server allows a client
1507 to connect from;
1508 k - returns a list of banned username/hostname combinations
1509 for that server;
1510 l - returns a list of the server's connections, showing how
1511
1512
1513
1514 Oikarinen & Reed [Page 27]
1515
1516 RFC 1459 Internet Relay Chat Protocol May 1993
1517
1518
1519 long each connection has been established and the traffic
1520 over that connection in bytes and messages for each
1521 direction;
1522 m - returns a list of commands supported by the server and
1523 the usage count for each if the usage count is non zero;
1524 o - returns a list of hosts from which normal clients may
1525 become operators;
1526 y - show Y (Class) lines from server's configuration file;
1527 u - returns a string showing how long the server has been up.
1528
1529 Numeric Replies:
1530
1531 ERR_NOSUCHSERVER
1532 RPL_STATSCLINE RPL_STATSNLINE
1533 RPL_STATSILINE RPL_STATSKLINE
1534 RPL_STATSQLINE RPL_STATSLLINE
1535 RPL_STATSLINKINFO RPL_STATSUPTIME
1536 RPL_STATSCOMMANDS RPL_STATSOLINE
1537 RPL_STATSHLINE RPL_ENDOFSTATS
1538
1539 Examples:
1540
1541 STATS m ; check the command usage for the server
1542 you are connected to
1543
1544 :Wiz STATS c eff.org ; request by WiZ for C/N line
1545 information from server eff.org
1546
1547 4.3.3 Links message
1548
1549 Command: LINKS
1550 Parameters: [[<remote server>] <server mask>]
1551
1552 With LINKS, a user can list all servers which are known by the server
1553 answering the query. The returned list of servers must match the
1554 mask, or if no mask is given, the full list is returned.
1555
1556 If <remote server> is given in addition to <server mask>, the LINKS
1557 command is forwarded to the first server found that matches that name
1558 (if any), and that server is then required to answer the query.
1559
1560 Numeric Replies:
1561
1562 ERR_NOSUCHSERVER
1563 RPL_LINKS RPL_ENDOFLINKS
1564
1565 Examples:
1566
1567
1568
1569
1570 Oikarinen & Reed [Page 28]
1571
1572 RFC 1459 Internet Relay Chat Protocol May 1993
1573
1574
1575 LINKS *.au ; list all servers which have a name
1576 that matches *.au;
1577
1578 :WiZ LINKS *.bu.edu *.edu ; LINKS message from WiZ to the first
1579 server matching *.edu for a list of
1580 servers matching *.bu.edu.
1581
1582 4.3.4 Time message
1583
1584 Command: TIME
1585 Parameters: [<server>]
1586
1587 The time message is used to query local time from the specified
1588 server. If the server parameter is not given, the server handling the
1589 command must reply to the query.
1590
1591 Numeric Replies:
1592
1593 ERR_NOSUCHSERVER RPL_TIME
1594
1595 Examples:
1596
1597 TIME tolsun.oulu.fi ; check the time on the server
1598 "tolson.oulu.fi"
1599
1600 Angel TIME *.au ; user angel checking the time on a
1601 server matching "*.au"
1602
1603 4.3.5 Connect message
1604
1605 Command: CONNECT
1606 Parameters: <target server> [<port> [<remote server>]]
1607
1608 The CONNECT command can be used to force a server to try to establish
1609 a new connection to another server immediately. CONNECT is a
1610 privileged command and is to be available only to IRC Operators. If
1611 a remote server is given then the CONNECT attempt is made by that
1612 server to <target server> and <port>.
1613
1614 Numeric Replies:
1615
1616 ERR_NOSUCHSERVER ERR_NOPRIVILEGES
1617 ERR_NEEDMOREPARAMS
1618
1619 Examples:
1620
1621 CONNECT tolsun.oulu.fi ; Attempt to connect a server to
1622 tolsun.oulu.fi
1623
1624
1625
1626 Oikarinen & Reed [Page 29]
1627
1628 RFC 1459 Internet Relay Chat Protocol May 1993
1629
1630
1631 :WiZ CONNECT eff.org 6667 csd.bu.edu
1632 ; CONNECT attempt by WiZ to get servers
1633 eff.org and csd.bu.edu connected on port
1634 6667.
1635
1636 4.3.6 Trace message
1637
1638 Command: TRACE
1639 Parameters: [<server>]
1640
1641 TRACE command is used to find the route to specific server. Each
1642 server that processes this message must tell the sender about it by
1643 sending a reply indicating it is a pass-through link, forming a chain
1644 of replies similar to that gained from using "traceroute". After
1645 sending this reply back, it must then send the TRACE message to the
1646 next server until given server is reached. If the <server> parameter
1647 is omitted, it is recommended that TRACE command send a message to
1648 the sender telling which servers the current server has direct
1649 connection to.
1650
1651 If the destination given by "<server>" is an actual server, then the
1652 destination server is required to report all servers and users which
1653 are connected to it, although only operators are permitted to see
1654 users present. If the destination given by <server> is a nickname,
1655 they only a reply for that nickname is given.
1656
1657 Numeric Replies:
1658
1659 ERR_NOSUCHSERVER
1660
1661 If the TRACE message is destined for another server, all intermediate
1662 servers must return a RPL_TRACELINK reply to indicate that the TRACE
1663 passed through it and where its going next.
1664
1665 RPL_TRACELINK
1666 A TRACE reply may be composed of any number of the following numeric
1667 replies.
1668
1669 RPL_TRACECONNECTING RPL_TRACEHANDSHAKE
1670 RPL_TRACEUNKNOWN RPL_TRACEOPERATOR
1671 RPL_TRACEUSER RPL_TRACESERVER
1672 RPL_TRACESERVICE RPL_TRACENEWTYPE
1673 RPL_TRACECLASS
1674
1675 Examples:
1676
1677 TRACE *.oulu.fi ; TRACE to a server matching *.oulu.fi
1678
1679
1680
1681
1682 Oikarinen & Reed [Page 30]
1683
1684 RFC 1459 Internet Relay Chat Protocol May 1993
1685
1686
1687 :WiZ TRACE AngelDust ; TRACE issued by WiZ to nick AngelDust
1688
1689 4.3.7 Admin command
1690
1691 Command: ADMIN
1692 Parameters: [<server>]
1693
1694 The admin message is used to find the name of the administrator of
1695 the given server, or current server if <server> parameter is omitted.
1696 Each server must have the ability to forward ADMIN messages to other
1697 servers.
1698
1699 Numeric Replies:
1700
1701 ERR_NOSUCHSERVER
1702 RPL_ADMINME RPL_ADMINLOC1
1703 RPL_ADMINLOC2 RPL_ADMINEMAIL
1704
1705 Examples:
1706
1707 ADMIN tolsun.oulu.fi ; request an ADMIN reply from
1708 tolsun.oulu.fi
1709
1710 :WiZ ADMIN *.edu ; ADMIN request from WiZ for first
1711 server found to match *.edu.
1712
1713 4.3.8 Info command
1714
1715 Command: INFO
1716 Parameters: [<server>]
1717
1718 The INFO command is required to return information which describes
1719 the server: its version, when it was compiled, the patchlevel, when
1720 it was started, and any other miscellaneous information which may be
1721 considered to be relevant.
1722
1723 Numeric Replies:
1724
1725 ERR_NOSUCHSERVER
1726 RPL_INFO RPL_ENDOFINFO
1727
1728 Examples:
1729
1730 INFO csd.bu.edu ; request an INFO reply from
1731 csd.bu.edu
1732
1733 :Avalon INFO *.fi ; INFO request from Avalon for first
1734 server found to match *.fi.
1735
1736
1737
1738 Oikarinen & Reed [Page 31]
1739
1740 RFC 1459 Internet Relay Chat Protocol May 1993
1741
1742
1743 INFO Angel ; request info from the server that
1744 Angel is connected to.
1745
1746 4.4 Sending messages
1747
1748 The main purpose of the IRC protocol is to provide a base for clients
1749 to communicate with each other. PRIVMSG and NOTICE are the only
1750 messages available which actually perform delivery of a text message
1751 from one client to another - the rest just make it possible and try
1752 to ensure it happens in a reliable and structured manner.
1753
1754 4.4.1 Private messages
1755
1756 Command: PRIVMSG
1757 Parameters: <receiver>{,<receiver>} <text to be sent>
1758
1759 PRIVMSG is used to send private messages between users. <receiver>
1760 is the nickname of the receiver of the message. <receiver> can also
1761 be a list of names or channels separated with commas.
1762
1763 The <receiver> parameter may also me a host mask (#mask) or server
1764 mask ($mask). In both cases the server will only send the PRIVMSG
1765 to those who have a server or host matching the mask. The mask must
1766 have at least 1 (one) "." in it and no wildcards following the
1767 last ".". This requirement exists to prevent people sending messages
1768 to "#*" or "$*", which would broadcast to all users; from
1769 experience, this is abused more than used responsibly and properly.
1770 Wildcards are the '*' and '?' characters. This extension to
1771 the PRIVMSG command is only available to Operators.
1772
1773 Numeric Replies:
1774
1775 ERR_NORECIPIENT ERR_NOTEXTTOSEND
1776 ERR_CANNOTSENDTOCHAN ERR_NOTOPLEVEL
1777 ERR_WILDTOPLEVEL ERR_TOOMANYTARGETS
1778 ERR_NOSUCHNICK
1779 RPL_AWAY
1780
1781 Examples:
1782
1783 :Angel PRIVMSG Wiz :Hello are you receiving this message ?
1784 ; Message from Angel to Wiz.
1785
1786 PRIVMSG Angel :yes I'm receiving it !receiving it !'u>(768u+1n) .br ;
1787 Message to Angel.
1788
1789 PRIVMSG jto@tolsun.oulu.fi :Hello !
1790 ; Message to a client on server
1791
1792
1793
1794 Oikarinen & Reed [Page 32]
1795
1796 RFC 1459 Internet Relay Chat Protocol May 1993
1797
1798
1799 tolsun.oulu.fi with username of "jto".
1800
1801 PRIVMSG $*.fi :Server tolsun.oulu.fi rebooting.
1802 ; Message to everyone on a server which
1803 has a name matching *.fi.
1804
1805 PRIVMSG #*.edu :NSFNet is undergoing work, expect interruptions
1806 ; Message to all users who come from a
1807 host which has a name matching *.edu.
1808
1809 4.4.2 Notice
1810
1811 Command: NOTICE
1812 Parameters: <nickname> <text>
1813
1814 The NOTICE message is used similarly to PRIVMSG. The difference
1815 between NOTICE and PRIVMSG is that automatic replies must never be
1816 sent in response to a NOTICE message. This rule applies to servers
1817 too - they must not send any error reply back to the client on
1818 receipt of a notice. The object of this rule is to avoid loops
1819 between a client automatically sending something in response to
1820 something it received. This is typically used by automatons (clients
1821 with either an AI or other interactive program controlling their
1822 actions) which are always seen to be replying lest they end up in a
1823 loop with another automaton.
1824
1825 See PRIVMSG for more details on replies and examples.
1826
1827 4.5 User based queries
1828
1829 User queries are a group of commands which are primarily concerned
1830 with finding details on a particular user or group users. When using
1831 wildcards with any of these commands, if they match, they will only
1832 return information on users who are 'visible' to you. The visibility
1833 of a user is determined as a combination of the user's mode and the
1834 common set of channels you are both on.
1835
1836 4.5.1 Who query
1837
1838 Command: WHO
1839 Parameters: [<name> [<o>]]
1840
1841 The WHO message is used by a client to generate a query which returns
1842 a list of information which 'matches' the <name> parameter given by
1843 the client. In the absence of the <name> parameter, all visible
1844 (users who aren't invisible (user mode +i) and who don't have a
1845 common channel with the requesting client) are listed. The same
1846 result can be achieved by using a <name> of "0" or any wildcard which
1847
1848
1849
1850 Oikarinen & Reed [Page 33]
1851
1852 RFC 1459 Internet Relay Chat Protocol May 1993
1853
1854
1855 will end up matching every entry possible.
1856
1857 The <name> passed to WHO is matched against users' host, server, real
1858 name and nickname if the channel <name> cannot be found.
1859
1860 If the "o" parameter is passed only operators are returned according
1861 to the name mask supplied.
1862
1863 Numeric Replies:
1864
1865 ERR_NOSUCHSERVER
1866 RPL_WHOREPLY RPL_ENDOFWHO
1867
1868 Examples:
1869
1870 WHO *.fi ; List all users who match against
1871 "*.fi".
1872
1873 WHO jto* o ; List all users with a match against
1874 "jto*" if they are an operator.
1875
1876 4.5.2 Whois query
1877
1878 Command: WHOIS
1879 Parameters: [<server>] <nickmask>[,<nickmask>[,...]]
1880
1881 This message is used to query information about particular user. The
1882 server will answer this message with several numeric messages
1883 indicating different statuses of each user which matches the nickmask
1884 (if you are entitled to see them). If no wildcard is present in the
1885 <nickmask>, any information about that nick which you are allowed to
1886 see is presented. A comma (',') separated list of nicknames may be
1887 given.
1888
1889 The latter version sends the query to a specific server. It is
1890 useful if you want to know how long the user in question has been
1891 idle as only local server (ie. the server the user is directly
1892 connected to) knows that information, while everything else is
1893 globally known.
1894
1895 Numeric Replies:
1896
1897 ERR_NOSUCHSERVER ERR_NONICKNAMEGIVEN
1898 RPL_WHOISUSER RPL_WHOISCHANNELS
1899 RPL_WHOISCHANNELS RPL_WHOISSERVER
1900 RPL_AWAY RPL_WHOISOPERATOR
1901 RPL_WHOISIDLE ERR_NOSUCHNICK
1902 RPL_ENDOFWHOIS
1903
1904
1905
1906 Oikarinen & Reed [Page 34]
1907
1908 RFC 1459 Internet Relay Chat Protocol May 1993
1909
1910
1911 Examples:
1912
1913 WHOIS wiz ; return available user information
1914 about nick WiZ
1915
1916 WHOIS eff.org trillian ; ask server eff.org for user
1917 information about trillian
1918
1919 4.5.3 Whowas
1920
1921 Command: WHOWAS
1922 Parameters: <nickname> [<count> [<server>]]
1923
1924 Whowas asks for information about a nickname which no longer exists.
1925 This may either be due to a nickname change or the user leaving IRC.
1926 In response to this query, the server searches through its nickname
1927 history, looking for any nicks which are lexically the same (no wild
1928 card matching here). The history is searched backward, returning the
1929 most recent entry first. If there are multiple entries, up to
1930 <count> replies will be returned (or all of them if no <count>
1931 parameter is given). If a non-positive number is passed as being
1932 <count>, then a full search is done.
1933
1934 Numeric Replies:
1935
1936 ERR_NONICKNAMEGIVEN ERR_WASNOSUCHNICK
1937 RPL_WHOWASUSER RPL_WHOISSERVER
1938 RPL_ENDOFWHOWAS
1939
1940 Examples:
1941
1942 WHOWAS Wiz ; return all information in the nick
1943 history about nick "WiZ";
1944
1945 WHOWAS Mermaid 9 ; return at most, the 9 most recent
1946 entries in the nick history for
1947 "Mermaid";
1948
1949 WHOWAS Trillian 1 *.edu ; return the most recent history for
1950 "Trillian" from the first server found
1951 to match "*.edu".
1952
1953 4.6 Miscellaneous messages
1954
1955 Messages in this category do not fit into any of the above categories
1956 but are nonetheless still a part of and required by the protocol.
1957
1958
1959
1960
1961
1962 Oikarinen & Reed [Page 35]
1963
1964 RFC 1459 Internet Relay Chat Protocol May 1993
1965
1966
1967 4.6.1 Kill message
1968
1969 Command: KILL
1970 Parameters: <nickname> <comment>
1971
1972 The KILL message is used to cause a client-server connection to be
1973 closed by the server which has the actual connection. KILL is used
1974 by servers when they encounter a duplicate entry in the list of valid
1975 nicknames and is used to remove both entries. It is also available
1976 to operators.
1977
1978 Clients which have automatic reconnect algorithms effectively make
1979 this command useless since the disconnection is only brief. It does
1980 however break the flow of data and can be used to stop large amounts
1981 of being abused, any user may elect to receive KILL messages
1982 generated for others to keep an 'eye' on would be trouble spots.
1983
1984 In an arena where nicknames are required to be globally unique at all
1985 times, KILL messages are sent whenever 'duplicates' are detected
1986 (that is an attempt to register two users with the same nickname) in
1987 the hope that both of them will disappear and only 1 reappear.
1988
1989 The comment given must reflect the actual reason for the KILL. For
1990 server-generated KILLs it usually is made up of details concerning
1991 the origins of the two conflicting nicknames. For users it is left
1992 up to them to provide an adequate reason to satisfy others who see
1993 it. To prevent/discourage fake KILLs from being generated to hide
1994 the identify of the KILLer, the comment also shows a 'kill-path'
1995 which is updated by each server it passes through, each prepending
1996 its name to the path.
1997
1998 Numeric Replies:
1999
2000 ERR_NOPRIVILEGES ERR_NEEDMOREPARAMS
2001 ERR_NOSUCHNICK ERR_CANTKILLSERVER
2002
2003
2004 KILL David (csd.bu.edu <- tolsun.oulu.fi)
2005 ; Nickname collision between csd.bu.edu
2006 and tolson.oulu.fi
2007
2008
2009 NOTE:
2010 It is recommended that only Operators be allowed to kill other users
2011 with KILL message. In an ideal world not even operators would need
2012 to do this and it would be left to servers to deal with.
2013
2014
2015
2016
2017
2018 Oikarinen & Reed [Page 36]
2019
2020 RFC 1459 Internet Relay Chat Protocol May 1993
2021
2022
2023 4.6.2 Ping message
2024
2025 Command: PING
2026 Parameters: <server1> [<server2>]
2027
2028 The PING message is used to test the presence of an active client at
2029 the other end of the connection. A PING message is sent at regular
2030 intervals if no other activity detected coming from a connection. If
2031 a connection fails to respond to a PING command within a set amount
2032 of time, that connection is closed.
2033
2034 Any client which receives a PING message must respond to <server1>
2035 (server which sent the PING message out) as quickly as possible with
2036 an appropriate PONG message to indicate it is still there and alive.
2037 Servers should not respond to PING commands but rely on PINGs from
2038 the other end of the connection to indicate the connection is alive.
2039 If the <server2> parameter is specified, the PING message gets
2040 forwarded there.
2041
2042 Numeric Replies:
2043
2044 ERR_NOORIGIN ERR_NOSUCHSERVER
2045
2046 Examples:
2047
2048 PING tolsun.oulu.fi ; server sending a PING message to
2049 another server to indicate it is still
2050 alive.
2051
2052 PING WiZ ; PING message being sent to nick WiZ
2053
2054 4.6.3 Pong message
2055
2056 Command: PONG
2057 Parameters: <daemon> [<daemon2>]
2058
2059 PONG message is a reply to ping message. If parameter <daemon2> is
2060 given this message must be forwarded to given daemon. The <daemon>
2061 parameter is the name of the daemon who has responded to PING message
2062 and generated this message.
2063
2064 Numeric Replies:
2065
2066 ERR_NOORIGIN ERR_NOSUCHSERVER
2067
2068 Examples:
2069
2070 PONG csd.bu.edu tolsun.oulu.fi ; PONG message from csd.bu.edu to
2071
2072
2073
2074 Oikarinen & Reed [Page 37]
2075
2076 RFC 1459 Internet Relay Chat Protocol May 1993
2077
2078
2079 tolsun.oulu.fi
2080
2081 4.6.4 Error
2082
2083 Command: ERROR
2084 Parameters: <error message>
2085
2086 The ERROR command is for use by servers when reporting a serious or
2087 fatal error to its operators. It may also be sent from one server to
2088 another but must not be accepted from any normal unknown clients.
2089
2090 An ERROR message is for use for reporting errors which occur with a
2091 server-to-server link only. An ERROR message is sent to the server
2092 at the other end (which sends it to all of its connected operators)
2093 and to all operators currently connected. It is not to be passed
2094 onto any other servers by a server if it is received from a server.
2095
2096 When a server sends a received ERROR message to its operators, the
2097 message should be encapsulated inside a NOTICE message, indicating
2098 that the client was not responsible for the error.
2099
2100 Numerics:
2101
2102 None.
2103
2104 Examples:
2105
2106 ERROR :Server *.fi already exists; ERROR message to the other server
2107 which caused this error.
2108
2109 NOTICE WiZ :ERROR from csd.bu.edu -- Server *.fi already exists
2110 ; Same ERROR message as above but sent
2111 to user WiZ on the other server.
2112
2113 5. OPTIONALS
2114
2115 This section describes OPTIONAL messages. They are not required in a
2116 working server implementation of the protocol described herein. In
2117 the absence of the option, an error reply message must be generated
2118 or an unknown command error. If the message is destined for another
2119 server to answer then it must be passed on (elementary parsing
2120 required) The allocated numerics for this are listed with the
2121 messages below.
2122
2123 5.1 Away
2124
2125 Command: AWAY
2126 Parameters: [message]
2127
2128
2129
2130 Oikarinen & Reed [Page 38]
2131
2132 RFC 1459 Internet Relay Chat Protocol May 1993
2133
2134
2135 With the AWAY message, clients can set an automatic reply string for
2136 any PRIVMSG commands directed at them (not to a channel they are on).
2137 The automatic reply is sent by the server to client sending the
2138 PRIVMSG command. The only replying server is the one to which the
2139 sending client is connected to.
2140
2141 The AWAY message is used either with one parameter (to set an AWAY
2142 message) or with no parameters (to remove the AWAY message).
2143
2144 Numeric Replies:
2145
2146 RPL_UNAWAY RPL_NOWAWAY
2147
2148 Examples:
2149
2150 AWAY :Gone to lunch. Back in 5 ; set away message to "Gone to lunch.
2151 Back in 5".
2152
2153 :WiZ AWAY ; unmark WiZ as being away.
2154
2155
2156 5.2 Rehash message
2157
2158 Command: REHASH
2159 Parameters: None
2160
2161 The rehash message can be used by the operator to force the server to
2162 re-read and process its configuration file.
2163
2164 Numeric Replies:
2165
2166 RPL_REHASHING ERR_NOPRIVILEGES
2167
2168 Examples:
2169
2170 REHASH ; message from client with operator
2171 status to server asking it to reread its
2172 configuration file.
2173
2174 5.3 Restart message
2175
2176 Command: RESTART
2177 Parameters: None
2178
2179 The restart message can only be used by an operator to force a server
2180 restart itself. This message is optional since it may be viewed as a
2181 risk to allow arbitrary people to connect to a server as an operator
2182 and execute this command, causing (at least) a disruption to service.
2183
2184
2185
2186 Oikarinen & Reed [Page 39]
2187
2188 RFC 1459 Internet Relay Chat Protocol May 1993
2189
2190
2191 The RESTART command must always be fully processed by the server to
2192 which the sending client is connected and not be passed onto other
2193 connected servers.
2194
2195 Numeric Replies:
2196
2197 ERR_NOPRIVILEGES
2198
2199 Examples:
2200
2201 RESTART ; no parameters required.
2202
2203 5.4 Summon message
2204
2205 Command: SUMMON
2206 Parameters: <user> [<server>]
2207
2208 The SUMMON command can be used to give users who are on a host
2209 running an IRC server a message asking them to please join IRC. This
2210 message is only sent if the target server (a) has SUMMON enabled, (b)
2211 the user is logged in and (c) the server process can write to the
2212 user's tty (or similar).
2213
2214 If no <server> parameter is given it tries to summon <user> from the
2215 server the client is connected to is assumed as the target.
2216
2217 If summon is not enabled in a server, it must return the
2218 ERR_SUMMONDISABLED numeric and pass the summon message onwards.
2219
2220 Numeric Replies:
2221
2222 ERR_NORECIPIENT ERR_FILEERROR
2223 ERR_NOLOGIN ERR_NOSUCHSERVER
2224 RPL_SUMMONING
2225
2226 Examples:
2227
2228 SUMMON jto ; summon user jto on the server's host
2229
2230 SUMMON jto tolsun.oulu.fi ; summon user jto on the host which a
2231 server named "tolsun.oulu.fi" is
2232 running.
2233
2234
2235 5.5 Users
2236
2237 Command: USERS
2238 Parameters: [<server>]
2239
2240
2241
2242 Oikarinen & Reed [Page 40]
2243
2244 RFC 1459 Internet Relay Chat Protocol May 1993
2245
2246
2247 The USERS command returns a list of users logged into the server in a
2248 similar format to who(1), rusers(1) and finger(1). Some people
2249 may disable this command on their server for security related
2250 reasons. If disabled, the correct numeric must be returned to
2251 indicate this.
2252
2253 Numeric Replies:
2254
2255 ERR_NOSUCHSERVER ERR_FILEERROR
2256 RPL_USERSSTART RPL_USERS
2257 RPL_NOUSERS RPL_ENDOFUSERS
2258 ERR_USERSDISABLED
2259
2260 Disabled Reply:
2261
2262 ERR_USERSDISABLED
2263
2264 Examples:
2265
2266 USERS eff.org ; request a list of users logged in on
2267 server eff.org
2268
2269 :John USERS tolsun.oulu.fi ; request from John for a list of users
2270 logged in on server tolsun.oulu.fi
2271
2272 5.6 Operwall message
2273
2274 Command: WALLOPS
2275 Parameters: Text to be sent to all operators currently online
2276
2277 Sends a message to all operators currently online. After
2278 implementing WALLOPS as a user command it was found that it was
2279 often and commonly abused as a means of sending a message to a lot
2280 of people (much similar to WALL). Due to this it is recommended
2281 that the current implementation of WALLOPS be used as an
2282 example by allowing and recognising only servers as the senders of
2283 WALLOPS.
2284
2285 Numeric Replies:
2286
2287 ERR_NEEDMOREPARAMS
2288
2289 Examples:
2290
2291 :csd.bu.edu WALLOPS :Connect '*.uiuc.edu 6667' from Joshua; WALLOPS
2292 message from csd.bu.edu announcing a
2293 CONNECT message it received and acted
2294 upon from Joshua.
2295
2296
2297
2298 Oikarinen & Reed [Page 41]
2299
2300 RFC 1459 Internet Relay Chat Protocol May 1993
2301
2302
2303 5.7 Userhost message
2304
2305 Command: USERHOST
2306 Parameters: <nickname>{<space><nickname>}
2307
2308 The USERHOST command takes a list of up to 5 nicknames, each
2309 separated by a space character and returns a list of information
2310 about each nickname that it found. The returned list has each reply
2311 separated by a space.
2312
2313 Numeric Replies:
2314
2315 RPL_USERHOST ERR_NEEDMOREPARAMS
2316
2317 Examples:
2318
2319 USERHOST Wiz Michael Marty p ;USERHOST request for information on
2320 nicks "Wiz", "Michael", "Marty" and "p"
2321
2322 5.8 Ison message
2323
2324 Command: ISON
2325 Parameters: <nickname>{<space><nickname>}
2326
2327 The ISON command was implemented to provide a quick and efficient
2328 means to get a response about whether a given nickname was currently
2329 on IRC. ISON only takes one (1) parameter: a space-separated list of
2330 nicks. For each nickname in the list that is present, the server
2331 adds that to its reply string. Thus the reply string may return
2332 empty (none of the given nicks are present), an exact copy of the
2333 parameter string (all of them present) or as any other subset of the
2334 set of nicks given in the parameter. The only limit on the number
2335 of nicks that may be checked is that the combined length must not be
2336 too large as to cause the server to chop it off so it fits in 512
2337 characters.
2338
2339 ISON is only be processed by the server local to the client sending
2340 the command and thus not passed onto other servers for further
2341 processing.
2342
2343 Numeric Replies:
2344
2345 RPL_ISON ERR_NEEDMOREPARAMS
2346
2347 Examples:
2348
2349 ISON phone trillian WiZ jarlek Avalon Angel Monstah
2350 ; Sample ISON request for 7 nicks.
2351
2352
2353
2354 Oikarinen & Reed [Page 42]
2355
2356 RFC 1459 Internet Relay Chat Protocol May 1993
2357
2358
2359 6. REPLIES
2360
2361 The following is a list of numeric replies which are generated in
2362 response to the commands given above. Each numeric is given with its
2363 number, name and reply string.
2364
2365 6.1 Error Replies.
2366
2367 401 ERR_NOSUCHNICK
2368 "<nickname> :No such nick/channel"
2369
2370 - Used to indicate the nickname parameter supplied to a
2371 command is currently unused.
2372
2373 402 ERR_NOSUCHSERVER
2374 "<server name> :No such server"
2375
2376 - Used to indicate the server name given currently
2377 doesn't exist.
2378
2379 403 ERR_NOSUCHCHANNEL
2380 "<channel name> :No such channel"
2381
2382 - Used to indicate the given channel name is invalid.
2383
2384 404 ERR_CANNOTSENDTOCHAN
2385 "<channel name> :Cannot send to channel"
2386
2387 - Sent to a user who is either (a) not on a channel
2388 which is mode +n or (b) not a chanop (or mode +v) on
2389 a channel which has mode +m set and is trying to send
2390 a PRIVMSG message to that channel.
2391
2392 405 ERR_TOOMANYCHANNELS
2393 "<channel name> :You have joined too many \
2394 channels"
2395 - Sent to a user when they have joined the maximum
2396 number of allowed channels and they try to join
2397 another channel.
2398
2399 406 ERR_WASNOSUCHNICK
2400 "<nickname> :There was no such nickname"
2401
2402 - Returned by WHOWAS to indicate there is no history
2403 information for that nickname.
2404
2405 407 ERR_TOOMANYTARGETS
2406 "<target> :Duplicate recipients. No message \
2407
2408
2409
2410 Oikarinen & Reed [Page 43]
2411
2412 RFC 1459 Internet Relay Chat Protocol May 1993
2413
2414
2415 delivered"
2416
2417 - Returned to a client which is attempting to send a
2418 PRIVMSG/NOTICE using the user@host destination format
2419 and for a user@host which has several occurrences.
2420
2421 409 ERR_NOORIGIN
2422 ":No origin specified"
2423
2424 - PING or PONG message missing the originator parameter
2425 which is required since these commands must work
2426 without valid prefixes.
2427
2428 411 ERR_NORECIPIENT
2429 ":No recipient given (<command>)"
2430 412 ERR_NOTEXTTOSEND
2431 ":No text to send"
2432 413 ERR_NOTOPLEVEL
2433 "<mask> :No toplevel domain specified"
2434 414 ERR_WILDTOPLEVEL
2435 "<mask> :Wildcard in toplevel domain"
2436
2437 - 412 - 414 are returned by PRIVMSG to indicate that
2438 the message wasn't delivered for some reason.
2439 ERR_NOTOPLEVEL and ERR_WILDTOPLEVEL are errors that
2440 are returned when an invalid use of
2441 "PRIVMSG $<server>" or "PRIVMSG #<host>" is attempted.
2442
2443 421 ERR_UNKNOWNCOMMAND
2444 "<command> :Unknown command"
2445
2446 - Returned to a registered client to indicate that the
2447 command sent is unknown by the server.
2448
2449 422 ERR_NOMOTD
2450 ":MOTD File is missing"
2451
2452 - Server's MOTD file could not be opened by the server.
2453
2454 423 ERR_NOADMININFO
2455 "<server> :No administrative info available"
2456
2457 - Returned by a server in response to an ADMIN message
2458 when there is an error in finding the appropriate
2459 information.
2460
2461 424 ERR_FILEERROR
2462 ":File error doing <file op> on <file>"
2463
2464
2465
2466 Oikarinen & Reed [Page 44]
2467
2468 RFC 1459 Internet Relay Chat Protocol May 1993
2469
2470
2471 - Generic error message used to report a failed file
2472 operation during the processing of a message.
2473
2474 431 ERR_NONICKNAMEGIVEN
2475 ":No nickname given"
2476
2477 - Returned when a nickname parameter expected for a
2478 command and isn't found.
2479
2480 432 ERR_ERRONEUSNICKNAME
2481 "<nick> :Erroneus nickname"
2482
2483 - Returned after receiving a NICK message which contains
2484 characters which do not fall in the defined set. See
2485 section x.x.x for details on valid nicknames.
2486
2487 433 ERR_NICKNAMEINUSE
2488 "<nick> :Nickname is already in use"
2489
2490 - Returned when a NICK message is processed that results
2491 in an attempt to change to a currently existing
2492 nickname.
2493
2494 436 ERR_NICKCOLLISION
2495 "<nick> :Nickname collision KILL"
2496
2497 - Returned by a server to a client when it detects a
2498 nickname collision (registered of a NICK that
2499 already exists by another server).
2500
2501 441 ERR_USERNOTINCHANNEL
2502 "<nick> <channel> :They aren't on that channel"
2503
2504 - Returned by the server to indicate that the target
2505 user of the command is not on the given channel.
2506
2507 442 ERR_NOTONCHANNEL
2508 "<channel> :You're not on that channel"
2509
2510 - Returned by the server whenever a client tries to
2511 perform a channel effecting command for which the
2512 client isn't a member.
2513
2514 443 ERR_USERONCHANNEL
2515 "<user> <channel> :is already on channel"
2516
2517 - Returned when a client tries to invite a user to a
2518 channel they are already on.
2519
2520
2521
2522 Oikarinen & Reed [Page 45]
2523
2524 RFC 1459 Internet Relay Chat Protocol May 1993
2525
2526
2527 444 ERR_NOLOGIN
2528 "<user> :User not logged in"
2529
2530 - Returned by the summon after a SUMMON command for a
2531 user was unable to be performed since they were not
2532 logged in.
2533
2534 445 ERR_SUMMONDISABLED
2535 ":SUMMON has been disabled"
2536
2537 - Returned as a response to the SUMMON command. Must be
2538 returned by any server which does not implement it.
2539
2540 446 ERR_USERSDISABLED
2541 ":USERS has been disabled"
2542
2543 - Returned as a response to the USERS command. Must be
2544 returned by any server which does not implement it.
2545
2546 451 ERR_NOTREGISTERED
2547 ":You have not registered"
2548
2549 - Returned by the server to indicate that the client
2550 must be registered before the server will allow it
2551 to be parsed in detail.
2552
2553 461 ERR_NEEDMOREPARAMS
2554 "<command> :Not enough parameters"
2555
2556 - Returned by the server by numerous commands to
2557 indicate to the client that it didn't supply enough
2558 parameters.
2559
2560 462 ERR_ALREADYREGISTRED
2561 ":You may not reregister"
2562
2563 - Returned by the server to any link which tries to
2564 change part of the registered details (such as
2565 password or user details from second USER message).
2566
2567
2568 463 ERR_NOPERMFORHOST
2569 ":Your host isn't among the privileged"
2570
2571 - Returned to a client which attempts to register with
2572 a server which does not been setup to allow
2573 connections from the host the attempted connection
2574 is tried.
2575
2576
2577
2578 Oikarinen & Reed [Page 46]
2579
2580 RFC 1459 Internet Relay Chat Protocol May 1993
2581
2582
2583 464 ERR_PASSWDMISMATCH
2584 ":Password incorrect"
2585
2586 - Returned to indicate a failed attempt at registering
2587 a connection for which a password was required and
2588 was either not given or incorrect.
2589
2590 465 ERR_YOUREBANNEDCREEP
2591 ":You are banned from this server"
2592
2593 - Returned after an attempt to connect and register
2594 yourself with a server which has been setup to
2595 explicitly deny connections to you.
2596
2597 467 ERR_KEYSET
2598 "<channel> :Channel key already set"
2599 471 ERR_CHANNELISFULL
2600 "<channel> :Cannot join channel (+l)"
2601 472 ERR_UNKNOWNMODE
2602 "<char> :is unknown mode char to me"
2603 473 ERR_INVITEONLYCHAN
2604 "<channel> :Cannot join channel (+i)"
2605 474 ERR_BANNEDFROMCHAN
2606 "<channel> :Cannot join channel (+b)"
2607 475 ERR_BADCHANNELKEY
2608 "<channel> :Cannot join channel (+k)"
2609 481 ERR_NOPRIVILEGES
2610 ":Permission Denied- You're not an IRC operator"
2611
2612 - Any command requiring operator privileges to operate
2613 must return this error to indicate the attempt was
2614 unsuccessful.
2615
2616 482 ERR_CHANOPRIVSNEEDED
2617 "<channel> :You're not channel operator"
2618
2619 - Any command requiring 'chanop' privileges (such as
2620 MODE messages) must return this error if the client
2621 making the attempt is not a chanop on the specified
2622 channel.
2623
2624 483 ERR_CANTKILLSERVER
2625 ":You cant kill a server!"
2626
2627 - Any attempts to use the KILL command on a server
2628 are to be refused and this error returned directly
2629 to the client.
2630
2631
2632
2633
2634 Oikarinen & Reed [Page 47]
2635
2636 RFC 1459 Internet Relay Chat Protocol May 1993
2637
2638
2639 491 ERR_NOOPERHOST
2640 ":No O-lines for your host"
2641
2642 - If a client sends an OPER message and the server has
2643 not been configured to allow connections from the
2644 client's host as an operator, this error must be
2645 returned.
2646
2647 501 ERR_UMODEUNKNOWNFLAG
2648 ":Unknown MODE flag"
2649
2650 - Returned by the server to indicate that a MODE
2651 message was sent with a nickname parameter and that
2652 the a mode flag sent was not recognized.
2653
2654 502 ERR_USERSDONTMATCH
2655 ":Cant change mode for other users"
2656
2657 - Error sent to any user trying to view or change the
2658 user mode for a user other than themselves.
2659
2660 6.2 Command responses.
2661
2662 300 RPL_NONE
2663 Dummy reply number. Not used.
2664
2665 302 RPL_USERHOST
2666 ":[<reply>{<space><reply>}]"
2667
2668 - Reply format used by USERHOST to list replies to
2669 the query list. The reply string is composed as
2670 follows:
2671
2672 <reply> ::= <nick>['*'] '=' <'+'|'-'><hostname>
2673
2674 The '*' indicates whether the client has registered
2675 as an Operator. The '-' or '+' characters represent
2676 whether the client has set an AWAY message or not
2677 respectively.
2678
2679 303 RPL_ISON
2680 ":[<nick> {<space><nick>}]"
2681
2682 - Reply format used by ISON to list replies to the
2683 query list.
2684
2685 301 RPL_AWAY
2686 "<nick> :<away message>"
2687
2688
2689
2690 Oikarinen & Reed [Page 48]
2691
2692 RFC 1459 Internet Relay Chat Protocol May 1993
2693
2694
2695 305 RPL_UNAWAY
2696 ":You are no longer marked as being away"
2697 306 RPL_NOWAWAY
2698 ":You have been marked as being away"
2699
2700 - These replies are used with the AWAY command (if
2701 allowed). RPL_AWAY is sent to any client sending a
2702 PRIVMSG to a client which is away. RPL_AWAY is only
2703 sent by the server to which the client is connected.
2704 Replies RPL_UNAWAY and RPL_NOWAWAY are sent when the
2705 client removes and sets an AWAY message.
2706
2707 311 RPL_WHOISUSER
2708 "<nick> <user> <host> * :<real name>"
2709 312 RPL_WHOISSERVER
2710 "<nick> <server> :<server info>"
2711 313 RPL_WHOISOPERATOR
2712 "<nick> :is an IRC operator"
2713 317 RPL_WHOISIDLE
2714 "<nick> <integer> :seconds idle"
2715 318 RPL_ENDOFWHOIS
2716 "<nick> :End of /WHOIS list"
2717 319 RPL_WHOISCHANNELS
2718 "<nick> :{[@|+]<channel><space>}"
2719
2720 - Replies 311 - 313, 317 - 319 are all replies
2721 generated in response to a WHOIS message. Given that
2722 there are enough parameters present, the answering
2723 server must either formulate a reply out of the above
2724 numerics (if the query nick is found) or return an
2725 error reply. The '*' in RPL_WHOISUSER is there as
2726 the literal character and not as a wild card. For
2727 each reply set, only RPL_WHOISCHANNELS may appear
2728 more than once (for long lists of channel names).
2729 The '@' and '+' characters next to the channel name
2730 indicate whether a client is a channel operator or
2731 has been granted permission to speak on a moderated
2732 channel. The RPL_ENDOFWHOIS reply is used to mark
2733 the end of processing a WHOIS message.
2734
2735 314 RPL_WHOWASUSER
2736 "<nick> <user> <host> * :<real name>"
2737 369 RPL_ENDOFWHOWAS
2738 "<nick> :End of WHOWAS"
2739
2740 - When replying to a WHOWAS message, a server must use
2741 the replies RPL_WHOWASUSER, RPL_WHOISSERVER or
2742 ERR_WASNOSUCHNICK for each nickname in the presented
2743
2744
2745
2746 Oikarinen & Reed [Page 49]
2747
2748 RFC 1459 Internet Relay Chat Protocol May 1993
2749
2750
2751 list. At the end of all reply batches, there must
2752 be RPL_ENDOFWHOWAS (even if there was only one reply
2753 and it was an error).
2754
2755 321 RPL_LISTSTART
2756 "Channel :Users Name"
2757 322 RPL_LIST
2758 "<channel> <# visible> :<topic>"
2759 323 RPL_LISTEND
2760 ":End of /LIST"
2761
2762 - Replies RPL_LISTSTART, RPL_LIST, RPL_LISTEND mark
2763 the start, actual replies with data and end of the
2764 server's response to a LIST command. If there are
2765 no channels available to return, only the start
2766 and end reply must be sent.
2767
2768 324 RPL_CHANNELMODEIS
2769 "<channel> <mode> <mode params>"
2770
2771 331 RPL_NOTOPIC
2772 "<channel> :No topic is set"
2773 332 RPL_TOPIC
2774 "<channel> :<topic>"
2775
2776 - When sending a TOPIC message to determine the
2777 channel topic, one of two replies is sent. If
2778 the topic is set, RPL_TOPIC is sent back else
2779 RPL_NOTOPIC.
2780
2781 341 RPL_INVITING
2782 "<channel> <nick>"
2783
2784 - Returned by the server to indicate that the
2785 attempted INVITE message was successful and is
2786 being passed onto the end client.
2787
2788 342 RPL_SUMMONING
2789 "<user> :Summoning user to IRC"
2790
2791 - Returned by a server answering a SUMMON message to
2792 indicate that it is summoning that user.
2793
2794 351 RPL_VERSION
2795 "<version>.<debuglevel> <server> :<comments>"
2796
2797 - Reply by the server showing its version details.
2798 The <version> is the version of the software being
2799
2800
2801
2802 Oikarinen & Reed [Page 50]
2803
2804 RFC 1459 Internet Relay Chat Protocol May 1993
2805
2806
2807 used (including any patchlevel revisions) and the
2808 <debuglevel> is used to indicate if the server is
2809 running in "debug mode".
2810
2811 The "comments" field may contain any comments about
2812 the version or further version details.
2813
2814 352 RPL_WHOREPLY
2815 "<channel> <user> <host> <server> <nick> \
2816 <H|G>[*][@|+] :<hopcount> <real name>"
2817 315 RPL_ENDOFWHO
2818 "<name> :End of /WHO list"
2819
2820 - The RPL_WHOREPLY and RPL_ENDOFWHO pair are used
2821 to answer a WHO message. The RPL_WHOREPLY is only
2822 sent if there is an appropriate match to the WHO
2823 query. If there is a list of parameters supplied
2824 with a WHO message, a RPL_ENDOFWHO must be sent
2825 after processing each list item with <name> being
2826 the item.
2827
2828 353 RPL_NAMREPLY
2829 "<channel> :[[@|+]<nick> [[@|+]<nick> [...]]]"
2830 366 RPL_ENDOFNAMES
2831 "<channel> :End of /NAMES list"
2832
2833 - To reply to a NAMES message, a reply pair consisting
2834 of RPL_NAMREPLY and RPL_ENDOFNAMES is sent by the
2835 server back to the client. If there is no channel
2836 found as in the query, then only RPL_ENDOFNAMES is
2837 returned. The exception to this is when a NAMES
2838 message is sent with no parameters and all visible
2839 channels and contents are sent back in a series of
2840 RPL_NAMEREPLY messages with a RPL_ENDOFNAMES to mark
2841 the end.
2842
2843 364 RPL_LINKS
2844 "<mask> <server> :<hopcount> <server info>"
2845 365 RPL_ENDOFLINKS
2846 "<mask> :End of /LINKS list"
2847
2848 - In replying to the LINKS message, a server must send
2849 replies back using the RPL_LINKS numeric and mark the
2850 end of the list using an RPL_ENDOFLINKS reply.
2851
2852 367 RPL_BANLIST
2853 "<channel> <banid>"
2854 368 RPL_ENDOFBANLIST
2855
2856
2857
2858 Oikarinen & Reed [Page 51]
2859
2860 RFC 1459 Internet Relay Chat Protocol May 1993
2861
2862
2863 "<channel> :End of channel ban list"
2864
2865 - When listing the active 'bans' for a given channel,
2866 a server is required to send the list back using the
2867 RPL_BANLIST and RPL_ENDOFBANLIST messages. A separate
2868 RPL_BANLIST is sent for each active banid. After the
2869 banids have been listed (or if none present) a
2870 RPL_ENDOFBANLIST must be sent.
2871
2872 371 RPL_INFO
2873 ":<string>"
2874 374 RPL_ENDOFINFO
2875 ":End of /INFO list"
2876
2877 - A server responding to an INFO message is required to
2878 send all its 'info' in a series of RPL_INFO messages
2879 with a RPL_ENDOFINFO reply to indicate the end of the
2880 replies.
2881
2882 375 RPL_MOTDSTART
2883 ":- <server> Message of the day - "
2884 372 RPL_MOTD
2885 ":- <text>"
2886 376 RPL_ENDOFMOTD
2887 ":End of /MOTD command"
2888
2889 - When responding to the MOTD message and the MOTD file
2890 is found, the file is displayed line by line, with
2891 each line no longer than 80 characters, using
2892 RPL_MOTD format replies. These should be surrounded
2893 by a RPL_MOTDSTART (before the RPL_MOTDs) and an
2894 RPL_ENDOFMOTD (after).
2895
2896 381 RPL_YOUREOPER
2897 ":You are now an IRC operator"
2898
2899 - RPL_YOUREOPER is sent back to a client which has
2900 just successfully issued an OPER message and gained
2901 operator status.
2902
2903 382 RPL_REHASHING
2904 "<config file> :Rehashing"
2905
2906 - If the REHASH option is used and an operator sends
2907 a REHASH message, an RPL_REHASHING is sent back to
2908 the operator.
2909
2910 391 RPL_TIME
2911
2912
2913
2914 Oikarinen & Reed [Page 52]
2915
2916 RFC 1459 Internet Relay Chat Protocol May 1993
2917
2918
2919 "<server> :<string showing server's local time>"
2920
2921 - When replying to the TIME message, a server must send
2922 the reply using the RPL_TIME format above. The string
2923 showing the time need only contain the correct day and
2924 time there. There is no further requirement for the
2925 time string.
2926
2927 392 RPL_USERSSTART
2928 ":UserID Terminal Host"
2929 393 RPL_USERS
2930 ":%-8s %-9s %-8s"
2931 394 RPL_ENDOFUSERS
2932 ":End of users"
2933 395 RPL_NOUSERS
2934 ":Nobody logged in"
2935
2936 - If the USERS message is handled by a server, the
2937 replies RPL_USERSTART, RPL_USERS, RPL_ENDOFUSERS and
2938 RPL_NOUSERS are used. RPL_USERSSTART must be sent
2939 first, following by either a sequence of RPL_USERS
2940 or a single RPL_NOUSER. Following this is
2941 RPL_ENDOFUSERS.
2942
2943 200 RPL_TRACELINK
2944 "Link <version & debug level> <destination> \
2945 <next server>"
2946 201 RPL_TRACECONNECTING
2947 "Try. <class> <server>"
2948 202 RPL_TRACEHANDSHAKE
2949 "H.S. <class> <server>"
2950 203 RPL_TRACEUNKNOWN
2951 "???? <class> [<client IP address in dot form>]"
2952 204 RPL_TRACEOPERATOR
2953 "Oper <class> <nick>"
2954 205 RPL_TRACEUSER
2955 "User <class> <nick>"
2956 206 RPL_TRACESERVER
2957 "Serv <class> <int>S <int>C <server> \
2958 <nick!user|*!*>@<host|server>"
2959 208 RPL_TRACENEWTYPE
2960 "<newtype> 0 <client name>"
2961 261 RPL_TRACELOG
2962 "File <logfile> <debug level>"
2963
2964 - The RPL_TRACE* are all returned by the server in
2965 response to the TRACE message. How many are
2966 returned is dependent on the the TRACE message and
2967
2968
2969
2970 Oikarinen & Reed [Page 53]
2971
2972 RFC 1459 Internet Relay Chat Protocol May 1993
2973
2974
2975 whether it was sent by an operator or not. There
2976 is no predefined order for which occurs first.
2977 Replies RPL_TRACEUNKNOWN, RPL_TRACECONNECTING and
2978 RPL_TRACEHANDSHAKE are all used for connections
2979 which have not been fully established and are either
2980 unknown, still attempting to connect or in the
2981 process of completing the 'server handshake'.
2982 RPL_TRACELINK is sent by any server which handles
2983 a TRACE message and has to pass it on to another
2984 server. The list of RPL_TRACELINKs sent in
2985 response to a TRACE command traversing the IRC
2986 network should reflect the actual connectivity of
2987 the servers themselves along that path.
2988 RPL_TRACENEWTYPE is to be used for any connection
2989 which does not fit in the other categories but is
2990 being displayed anyway.
2991
2992 211 RPL_STATSLINKINFO
2993 "<linkname> <sendq> <sent messages> \
2994 <sent bytes> <received messages> \
2995 <received bytes> <time open>"
2996 212 RPL_STATSCOMMANDS
2997 "<command> <count>"
2998 213 RPL_STATSCLINE
2999 "C <host> * <name> <port> <class>"
3000 214 RPL_STATSNLINE
3001 "N <host> * <name> <port> <class>"
3002 215 RPL_STATSILINE
3003 "I <host> * <host> <port> <class>"
3004 216 RPL_STATSKLINE
3005 "K <host> * <username> <port> <class>"
3006 218 RPL_STATSYLINE
3007 "Y <class> <ping frequency> <connect \
3008 frequency> <max sendq>"
3009 219 RPL_ENDOFSTATS
3010 "<stats letter> :End of /STATS report"
3011 241 RPL_STATSLLINE
3012 "L <hostmask> * <servername> <maxdepth>"
3013 242 RPL_STATSUPTIME
3014 ":Server Up %d days %d:%02d:%02d"
3015 243 RPL_STATSOLINE
3016 "O <hostmask> * <name>"
3017 244 RPL_STATSHLINE
3018 "H <hostmask> * <servername>"
3019
3020 221 RPL_UMODEIS
3021 "<user mode string>"
3022
3023
3024
3025
3026 Oikarinen & Reed [Page 54]
3027
3028 RFC 1459 Internet Relay Chat Protocol May 1993
3029
3030
3031 - To answer a query about a client's own mode,
3032 RPL_UMODEIS is sent back.
3033
3034 251 RPL_LUSERCLIENT
3035 ":There are <integer> users and <integer> \
3036 invisible on <integer> servers"
3037 252 RPL_LUSEROP
3038 "<integer> :operator(s) online"
3039 253 RPL_LUSERUNKNOWN
3040 "<integer> :unknown connection(s)"
3041 254 RPL_LUSERCHANNELS
3042 "<integer> :channels formed"
3043 255 RPL_LUSERME
3044 ":I have <integer> clients and <integer> \
3045 servers"
3046
3047 - In processing an LUSERS message, the server
3048 sends a set of replies from RPL_LUSERCLIENT,
3049 RPL_LUSEROP, RPL_USERUNKNOWN,
3050 RPL_LUSERCHANNELS and RPL_LUSERME. When
3051 replying, a server must send back
3052 RPL_LUSERCLIENT and RPL_LUSERME. The other
3053 replies are only sent back if a non-zero count
3054 is found for them.
3055
3056 256 RPL_ADMINME
3057 "<server> :Administrative info"
3058 257 RPL_ADMINLOC1
3059 ":<admin info>"
3060 258 RPL_ADMINLOC2
3061 ":<admin info>"
3062 259 RPL_ADMINEMAIL
3063 ":<admin info>"
3064
3065 - When replying to an ADMIN message, a server
3066 is expected to use replies RLP_ADMINME
3067 through to RPL_ADMINEMAIL and provide a text
3068 message with each. For RPL_ADMINLOC1 a
3069 description of what city, state and country
3070 the server is in is expected, followed by
3071 details of the university and department
3072 (RPL_ADMINLOC2) and finally the administrative
3073 contact for the server (an email address here
3074 is required) in RPL_ADMINEMAIL.
3075
3076
3077
3078
3079
3080
3081
3082 Oikarinen & Reed [Page 55]
3083
3084 RFC 1459 Internet Relay Chat Protocol May 1993
3085
3086
3087 6.3 Reserved numerics.
3088
3089 These numerics are not described above since they fall into one of
3090 the following categories:
3091
3092 1. no longer in use;
3093
3094 2. reserved for future planned use;
3095
3096 3. in current use but are part of a non-generic 'feature' of
3097 the current IRC server.
3098
3099 209 RPL_TRACECLASS 217 RPL_STATSQLINE
3100 231 RPL_SERVICEINFO 232 RPL_ENDOFSERVICES
3101 233 RPL_SERVICE 234 RPL_SERVLIST
3102 235 RPL_SERVLISTEND
3103 316 RPL_WHOISCHANOP 361 RPL_KILLDONE
3104 362 RPL_CLOSING 363 RPL_CLOSEEND
3105 373 RPL_INFOSTART 384 RPL_MYPORTIS
3106 466 ERR_YOUWILLBEBANNED 476 ERR_BADCHANMASK
3107 492 ERR_NOSERVICEHOST
3108
3109 7. Client and server authentication
3110
3111 Clients and servers are both subject to the same level of
3112 authentication. For both, an IP number to hostname lookup (and
3113 reverse check on this) is performed for all connections made to the
3114 server. Both connections are then subject to a password check (if
3115 there is a password set for that connection). These checks are
3116 possible on all connections although the password check is only
3117 commonly used with servers.
3118
3119 An additional check that is becoming of more and more common is that
3120 of the username responsible for making the connection. Finding the
3121 username of the other end of the connection typically involves
3122 connecting to an authentication server such as IDENT as described in
3123 RFC 1413.
3124
3125 Given that without passwords it is not easy to reliably determine who
3126 is on the other end of a network connection, use of passwords is
3127 strongly recommended on inter-server connections in addition to any
3128 other measures such as using an ident server.
3129
3130 8. Current implementations
3131
3132 The only current implementation of this protocol is the IRC server,
3133 version 2.8. Earlier versions may implement some or all of the
3134 commands described by this document with NOTICE messages replacing
3135
3136
3137
3138 Oikarinen & Reed [Page 56]
3139
3140 RFC 1459 Internet Relay Chat Protocol May 1993
3141
3142
3143 many of the numeric replies. Unfortunately, due to backward
3144 compatibility requirements, the implementation of some parts of this
3145 document varies with what is laid out. On notable difference is:
3146
3147 * recognition that any LF or CR anywhere in a message marks the
3148 end of that message (instead of requiring CR-LF);
3149
3150 The rest of this section deals with issues that are mostly of
3151 importance to those who wish to implement a server but some parts
3152 also apply directly to clients as well.
3153
3154 8.1 Network protocol: TCP - why it is best used here.
3155
3156 IRC has been implemented on top of TCP since TCP supplies a reliable
3157 network protocol which is well suited to this scale of conferencing.
3158 The use of multicast IP is an alternative, but it is not widely
3159 available or supported at the present time.
3160
3161 8.1.1 Support of Unix sockets
3162
3163 Given that Unix domain sockets allow listen/connect operations, the
3164 current implementation can be configured to listen and accept both
3165 client and server connections on a Unix domain socket. These are
3166 recognized as sockets where the hostname starts with a '/'.
3167
3168 When providing any information about the connections on a Unix domain
3169 socket, the server is required to supplant the actual hostname in
3170 place of the pathname unless the actual socket name is being asked
3171 for.
3172
3173 8.2 Command Parsing
3174
3175 To provide useful 'non-buffered' network IO for clients and servers,
3176 each connection is given its own private 'input buffer' in which the
3177 results of the most recent read and parsing are kept. A buffer size
3178 of 512 bytes is used so as to hold 1 full message, although, this
3179 will usually hold several commands. The private buffer is parsed
3180 after every read operation for valid messages. When dealing with
3181 multiple messages from one client in the buffer, care should be taken
3182 in case one happens to cause the client to be 'removed'.
3183
3184 8.3 Message delivery
3185
3186 It is common to find network links saturated or hosts to which you
3187 are sending data unable to send data. Although Unix typically
3188 handles this through the TCP window and internal buffers, the server
3189 often has large amounts of data to send (especially when a new
3190 server-server link forms) and the small buffers provided in the
3191
3192
3193
3194 Oikarinen & Reed [Page 57]
3195
3196 RFC 1459 Internet Relay Chat Protocol May 1993
3197
3198
3199 kernel are not enough for the outgoing queue. To alleviate this
3200 problem, a "send queue" is used as a FIFO queue for data to be sent.
3201 A typical "send queue" may grow to 200 Kbytes on a large IRC network
3202 with a slow network connection when a new server connects.
3203
3204 When polling its connections, a server will first read and parse all
3205 incoming data, queuing any data to be sent out. When all available
3206 input is processed, the queued data is sent. This reduces the number
3207 of write() system calls and helps TCP make bigger packets.
3208
3209 8.4 Connection 'Liveness'
3210
3211 To detect when a connection has died or become unresponsive, the
3212 server must ping each of its connections that it doesn't get a
3213 response from in a given amount of time.
3214
3215 If a connection doesn't respond in time, its connection is closed
3216 using the appropriate procedures. A connection is also dropped if
3217 its sendq grows beyond the maximum allowed, because it is better to
3218 close a slow connection than have a server process block.
3219
3220 8.5 Establishing a server to client connection
3221
3222 Upon connecting to an IRC server, a client is sent the MOTD (if
3223 present) as well as the current user/server count (as per the LUSER
3224 command). The server is also required to give an unambiguous message
3225 to the client which states its name and version as well as any other
3226 introductory messages which may be deemed appropriate.
3227
3228 After dealing with this, the server must then send out the new user's
3229 nickname and other information as supplied by itself (USER command)
3230 and as the server could discover (from DNS/authentication servers).
3231 The server must send this information out with NICK first followed by
3232 USER.
3233
3234 8.6 Establishing a server-server connection.
3235
3236 The process of establishing of a server-to-server connection is
3237 fraught with danger since there are many possible areas where
3238 problems can occur - the least of which are race conditions.
3239
3240 After a server has received a connection following by a PASS/SERVER
3241 pair which were recognised as being valid, the server should then
3242 reply with its own PASS/SERVER information for that connection as
3243 well as all of the other state information it knows about as
3244 described below.
3245
3246 When the initiating server receives a PASS/SERVER pair, it too then
3247
3248
3249
3250 Oikarinen & Reed [Page 58]
3251
3252 RFC 1459 Internet Relay Chat Protocol May 1993
3253
3254
3255 checks that the server responding is authenticated properly before
3256 accepting the connection to be that server.
3257
3258 8.6.1 Server exchange of state information when connecting
3259
3260 The order of state information being exchanged between servers is
3261 essential. The required order is as follows:
3262
3263 * all known other servers;
3264
3265 * all known user information;
3266
3267 * all known channel information.
3268
3269 Information regarding servers is sent via extra SERVER messages, user
3270 information with NICK/USER/MODE/JOIN messages and channels with MODE
3271 messages.
3272
3273 NOTE: channel topics are *NOT* exchanged here because the TOPIC
3274 command overwrites any old topic information, so at best, the two
3275 sides of the connection would exchange topics.
3276
3277 By passing the state information about servers first, any collisions
3278 with servers that already exist occur before nickname collisions due
3279 to a second server introducing a particular nickname. Due to the IRC
3280 network only being able to exist as an acyclic graph, it may be
3281 possible that the network has already reconnected in another
3282 location, the place where the collision occurs indicating where the
3283 net needs to split.
3284
3285 8.7 Terminating server-client connections
3286
3287 When a client connection closes, a QUIT message is generated on
3288 behalf of the client by the server to which the client connected. No
3289 other message is to be generated or used.
3290
3291 8.8 Terminating server-server connections
3292
3293 If a server-server connection is closed, either via a remotely
3294 generated SQUIT or 'natural' causes, the rest of the connected IRC
3295 network must have its information updated with by the server which
3296 detected the closure. The server then sends a list of SQUITs (one
3297 for each server behind that connection) and a list of QUITs (again,
3298 one for each client behind that connection).
3299
3300
3301
3302
3303
3304
3305
3306 Oikarinen & Reed [Page 59]
3307
3308 RFC 1459 Internet Relay Chat Protocol May 1993
3309
3310
3311 8.9 Tracking nickname changes
3312
3313 All IRC servers are required to keep a history of recent nickname
3314 changes. This is required to allow the server to have a chance of
3315 keeping in touch of things when nick-change race conditions occur
3316 with commands which manipulate them. Commands which must trace nick
3317 changes are:
3318
3319 * KILL (the nick being killed)
3320
3321 * MODE (+/- o,v)
3322
3323 * KICK (the nick being kicked)
3324
3325 No other commands are to have nick changes checked for.
3326
3327 In the above cases, the server is required to first check for the
3328 existence of the nickname, then check its history to see who that
3329 nick currently belongs to (if anyone!). This reduces the chances of
3330 race conditions but they can still occur with the server ending up
3331 affecting the wrong client. When performing a change trace for an
3332 above command it is recommended that a time range be given and
3333 entries which are too old ignored.
3334
3335 For a reasonable history, a server should be able to keep previous
3336 nickname for every client it knows about if they all decided to
3337 change. This size is limited by other factors (such as memory, etc).
3338
3339 8.10 Flood control of clients
3340
3341 With a large network of interconnected IRC servers, it is quite easy
3342 for any single client attached to the network to supply a continuous
3343 stream of messages that result in not only flooding the network, but
3344 also degrading the level of service provided to others. Rather than
3345 require every 'victim' to be provide their own protection, flood
3346 protection was written into the server and is applied to all clients
3347 except services. The current algorithm is as follows:
3348
3349 * check to see if client's `message timer' is less than
3350 current time (set to be equal if it is);
3351
3352 * read any data present from the client;
3353
3354 * while the timer is less than ten seconds ahead of the current
3355 time, parse any present messages and penalize the client by
3356 2 seconds for each message;
3357
3358 which in essence means that the client may send 1 message every 2
3359
3360
3361
3362 Oikarinen & Reed [Page 60]
3363
3364 RFC 1459 Internet Relay Chat Protocol May 1993
3365
3366
3367 seconds without being adversely affected.
3368
3369 8.11 Non-blocking lookups
3370
3371 In a real-time environment, it is essential that a server process do
3372 as little waiting as possible so that all the clients are serviced
3373 fairly. Obviously this requires non-blocking IO on all network
3374 read/write operations. For normal server connections, this was not
3375 difficult, but there are other support operations that may cause the
3376 server to block (such as disk reads). Where possible, such activity
3377 should be performed with a short timeout.
3378
3379 8.11.1 Hostname (DNS) lookups
3380
3381 Using the standard resolver libraries from Berkeley and others has
3382 meant large delays in some cases where replies have timed out. To
3383 avoid this, a separate set of DNS routines were written which were
3384 setup for non-blocking IO operations and then polled from within the
3385 main server IO loop.
3386
3387 8.11.2 Username (Ident) lookups
3388
3389 Although there are numerous ident libraries for use and inclusion
3390 into other programs, these caused problems since they operated in a
3391 synchronous manner and resulted in frequent delays. Again the
3392 solution was to write a set of routines which would cooperate with
3393 the rest of the server and work using non-blocking IO.
3394
3395 8.12 Configuration File
3396
3397 To provide a flexible way of setting up and running the server, it is
3398 recommended that a configuration file be used which contains
3399 instructions to the server on the following:
3400
3401 * which hosts to accept client connections from;
3402
3403 * which hosts to allow to connect as servers;
3404
3405 * which hosts to connect to (both actively and
3406 passively);
3407
3408 * information about where the server is (university,
3409 city/state, company are examples of this);
3410
3411 * who is responsible for the server and an email address
3412 at which they can be contacted;
3413
3414 * hostnames and passwords for clients which wish to be given
3415
3416
3417
3418 Oikarinen & Reed [Page 61]
3419
3420 RFC 1459 Internet Relay Chat Protocol May 1993
3421
3422
3423 access to restricted operator commands.
3424
3425 In specifying hostnames, both domain names and use of the 'dot'
3426 notation (127.0.0.1) should both be accepted. It must be possible to
3427 specify the password to be used/accepted for all outgoing and
3428 incoming connections (although the only outgoing connections are
3429 those to other servers).
3430
3431 The above list is the minimum requirement for any server which wishes
3432 to make a connection with another server. Other items which may be
3433 of use are:
3434
3435 * specifying which servers other server may introduce;
3436
3437 * how deep a server branch is allowed to become;
3438
3439 * hours during which clients may connect.
3440
3441 8.12.1 Allowing clients to connect
3442
3443 A server should use some sort of 'access control list' (either in the
3444 configuration file or elsewhere) that is read at startup and used to
3445 decide what hosts clients may use to connect to it.
3446
3447 Both 'deny' and 'allow' should be implemented to provide the required
3448 flexibility for host access control.
3449
3450 8.12.2 Operators
3451
3452 The granting of operator privileges to a disruptive person can have
3453 dire consequences for the well-being of the IRC net in general due to
3454 the powers given to them. Thus, the acquisition of such powers
3455 should not be very easy. The current setup requires two 'passwords'
3456 to be used although one of them is usually easy guessed. Storage of
3457 oper passwords in configuration files is preferable to hard coding
3458 them in and should be stored in a crypted format (ie using crypt(3)
3459 from Unix) to prevent easy theft.
3460
3461 8.12.3 Allowing servers to connect
3462
3463 The interconnection of server is not a trivial matter: a bad
3464 connection can have a large impact on the usefulness of IRC. Thus,
3465 each server should have a list of servers to which it may connect and
3466 which servers may connect to it. Under no circumstances should a
3467 server allow an arbitrary host to connect as a server. In addition
3468 to which servers may and may not connect, the configuration file
3469 should also store the password and other characteristics of that
3470 link.
3471
3472
3473
3474 Oikarinen & Reed [Page 62]
3475
3476 RFC 1459 Internet Relay Chat Protocol May 1993
3477
3478
3479 8.12.4 Administrivia
3480
3481 To provide accurate and valid replies to the ADMIN command (see
3482 section 4.3.7), the server should find the relevant details in the
3483 configuration.
3484
3485 8.13 Channel membership
3486
3487 The current server allows any registered local user to join upto 10
3488 different channels. There is no limit imposed on non-local users so
3489 that the server remains (reasonably) consistant with all others on a
3490 channel membership basis
3491
3492 9. Current problems
3493
3494 There are a number of recognized problems with this protocol, all of
3495 which hope to be solved sometime in the near future during its
3496 rewrite. Currently, work is underway to find working solutions to
3497 these problems.
3498
3499 9.1 Scalability
3500
3501 It is widely recognized that this protocol does not scale
3502 sufficiently well when used in a large arena. The main problem comes
3503 from the requirement that all servers know about all other servers
3504 and users and that information regarding them be updated as soon as
3505 it changes. It is also desirable to keep the number of servers low
3506 so that the path length between any two points is kept minimal and
3507 the spanning tree as strongly branched as possible.
3508
3509 9.2 Labels
3510
3511 The current IRC protocol has 3 types of labels: the nickname, the
3512 channel name and the server name. Each of the three types has its
3513 own domain and no duplicates are allowed inside that domain.
3514 Currently, it is possible for users to pick the label for any of the
3515 three, resulting in collisions. It is widely recognized that this
3516 needs reworking, with a plan for unique names for channels and nicks
3517 that don't collide being desirable as well as a solution allowing a
3518 cyclic tree.
3519
3520 9.2.1 Nicknames
3521
3522 The idea of the nickname on IRC is very convenient for users to use
3523 when talking to each other outside of a channel, but there is only a
3524 finite nickname space and being what they are, its not uncommon for
3525 several people to want to use the same nick. If a nickname is chosen
3526 by two people using this protocol, either one will not succeed or
3527
3528
3529
3530 Oikarinen & Reed [Page 63]
3531
3532 RFC 1459 Internet Relay Chat Protocol May 1993
3533
3534
3535 both will removed by use of KILL (4.6.1).
3536
3537 9.2.2 Channels
3538
3539 The current channel layout requires that all servers know about all
3540 channels, their inhabitants and properties. Besides not scaling
3541 well, the issue of privacy is also a concern. A collision of
3542 channels is treated as an inclusive event (both people who create the
3543 new channel are considered to be members of it) rather than an
3544 exclusive one such as used to solve nickname collisions.
3545
3546 9.2.3 Servers
3547
3548 Although the number of servers is usually small relative to the
3549 number of users and channels, they two currently required to be known
3550 globally, either each one separately or hidden behind a mask.
3551
3552 9.3 Algorithms
3553
3554 In some places within the server code, it has not been possible to
3555 avoid N^2 algorithms such as checking the channel list of a set
3556 of clients.
3557
3558 In current server versions, there are no database consistency checks,
3559 each server assumes that a neighbouring server is correct. This
3560 opens the door to large problems if a connecting server is buggy or
3561 otherwise tries to introduce contradictions to the existing net.
3562
3563 Currently, because of the lack of unique internal and global labels,
3564 there are a multitude of race conditions that exist. These race
3565 conditions generally arise from the problem of it taking time for
3566 messages to traverse and effect the IRC network. Even by changing to
3567 unique labels, there are problems with channel-related commands being
3568 disrupted.
3569
3570 10. Current support and availability
3571
3572 Mailing lists for IRC related discussion:
3573 Future protocol: ircd-three-request@eff.org
3574 General discussion: operlist-request@eff.org
3575
3576 Software implemenations
3577 cs.bu.edu:/irc
3578 nic.funet.fi:/pub/irc
3579 coombs.anu.edu.au:/pub/irc
3580
3581 Newsgroup: alt.irc
3582
3583
3584
3585
3586 Oikarinen & Reed [Page 64]
3587
3588 RFC 1459 Internet Relay Chat Protocol May 1993
3589
3590
3591 Security Considerations
3592
3593 Security issues are discussed in sections 4.1, 4.1.1, 4.1.3, 5.5, and
3594 7.
3595
3596 12. Authors' Addresses
3597
3598 Jarkko Oikarinen
3599 Tuirantie 17 as 9
3600 90500 OULU
3601 FINLAND
3602
3603 Email: jto@tolsun.oulu.fi
3604
3605
3606 Darren Reed
3607 4 Pateman Street
3608 Watsonia, Victoria 3087
3609 Australia
3610
3611 Email: avalon@coombs.anu.edu.au
3612
3613
3614
3615
3616
3617
3618
3619
3620
3621
3622
3623
3624
3625
3626
3627
3628
3629
3630
3631
3632
3633
3634
3635
3636
3637
3638
3639
3640
3641
3642 Oikarinen & Reed [Page 65]
3643