Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SASL support #470

Open
Asara opened this issue Jul 12, 2017 · 10 comments
Open

SASL support #470

Asara opened this issue Jul 12, 2017 · 10 comments
Labels
T-Enhancement New features, changes in functionality, performance boosts, user-facing improvements.

Comments

@Asara
Copy link

Asara commented Jul 12, 2017

Attempting to connect to a freenode from a AS running in AWS leads to this error:

{"command":"ERROR","rawCommand":"ERROR","commandType":"normal","args":["Closing Link: ec2-34-192-170-23.compute-1.amazonaws.com (SASL access only)"]}

Edit: Should probably just rename this to a feature request asking for SASL support in reality. Please feel free to do so if that is the case! :)

@kegsay kegsay changed the title Bot unable to connect from AWS SASL support Jul 12, 2017
@Mikaela
Copy link
Contributor

Mikaela commented Jul 12, 2017

SASL specifications:

  • This is an optional extension and not so widely supported yet, but it features SASL REAUTH which allows identifying with SASL after you are already connected e.g. after netsplit when you were connected to splitted server without services and the split is over and services return. Integrate with NickServ #82 (comment)

I think the issue would be better named as SASL PLAIN support for now and possibly later have separate issue for SASL EXTERNAL (aka/or CertFP (#459)) and I recommend my recommendation on ignoring ECDSA-NIST256p-CHALLENGE from #82 (comment) because of znc/znc#746 (comment).

Mikaela added a commit to Mikaela/mikaela.github.io that referenced this issue Jul 18, 2017
TODO: Rewrite this part When matrix-org/matrix-appservice-irc#470 is done
and there is actually standardized and more universal method for logging
in automatically.
@henk717
Copy link

henk717 commented Aug 16, 2017

!storepass is currently not supported on the Rizon bridge.
Rizon lacks PASS support, this can be solved by implementing this feature request.
SASL PLAIN is supported alongside EXTERNAL on there IRC network.

@Half-Shot
Copy link
Contributor

Worth pointing out tthe upstream library supports this! It just needs careful integration.

@Half-Shot Half-Shot mentioned this issue Aug 10, 2018
@Half-Shot
Copy link
Contributor

SASL PLAIN is now supported.

@Asara
Copy link
Author

Asara commented Dec 11, 2018

Is it possible to re-open this issue? I would say that #689 still being an issue means that SASL support isn't really baked in yet.

@Mikaela
Copy link
Contributor

Mikaela commented Apr 24, 2019

@Half-Shot I would also request reopening this issue until users can actually use SASL to login. I think it would be more clear for majority of users for this to be open than pointing to #673.

@Half-Shot Half-Shot reopened this Apr 24, 2019
@Half-Shot
Copy link
Contributor

Right yes. This needs #673 and #689 to be completed in order to close it.

@thiras
Copy link

thiras commented Sep 27, 2020

Still waiting for it to start the migration to the matrix. Is there any ETA?

@Mikaela
Copy link
Contributor

Mikaela commented Feb 21, 2021

I think this is required for most (if not even all) Oragono Ergo deployments due to its integrated bouncer and force-nick-equals-account.

@justinbot justinbot added T-Enhancement New features, changes in functionality, performance boosts, user-facing improvements. and removed feature-req labels May 13, 2022
@poVoq
Copy link

poVoq commented Feb 24, 2023

Any news on this? Also SASL for the Matrixbot seems to fail when the IRC network (like Ergo.chat based ones) only supports real SASL login and not the fallback via server password it seems.

Edit: actually Ergo does support this, not sure why it still fails.

Edit: I set the bridge to force SASL and the bot still fails to use the SASL account on my Ergo IRC network and rather switches to an unregistered alt-nick. Something about the way this bridge does SASL is not standard conformant it seems.

Edit: So... apparently it works for user accounts but not the bridge bot...

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
T-Enhancement New features, changes in functionality, performance boosts, user-facing improvements.
Projects
None yet
Development

No branches or pull requests

8 participants