InspIRCd v4 is still early in development!
If you use this branch you may experience crashes, weird behaviour, and unannounced breaking changes.
You probably want to use InspIRCd v3 instead.
The "password_hash" Module (v4)
Description
This module allows passwords to be hashed and adds the /MKPASSWD
command which allows the generation of hashed passwords for use in the server configuration.
Configuration
To load this module use the following <module>
tag:
<module name="password_hash">
<mkpasswd>
The <mkpasswd>
tag defines settings about how the mkpasswd module should behave. This tag can only be defined once.
Name | Type | Default Value | Description |
---|---|---|---|
operonly | Boolean | No | Whether the /MKPASSWD command is only usable by server operators. You should enable this once you have generated your passwords. |
Example Usage
<mkpasswd operonly="no">
Commands
Name | Parameter Count | Syntax | Description |
---|---|---|---|
MKPASSWD | 2 | <hash> <password> | Hashes <password> using the <hash> algorithm. |
The following hashing modules are included with InspIRCd:
Algorithm | Module(s) | Description |
---|---|---|
argon2d | argon2 | Hashes using the Argon2d algorithm. |
argon2i | argon2 | Hashes using the Argon2i algorithm. |
argon2id | argon2 | Hashes using the Argon2id algorithm. |
bcrypt | bcrypt | Hashes using the bcrypt algorithm. |
hmac-md5 | password_hash, md5 | Hashes using the MD5 and HMAC algorithms. |
hmac-sha1 | password_hash, sha1 | Hashes using the SHA-1 and HMAC algorithms. |
hmac-sha224 | password_hash, sha2 | Hashes using the SHA-224 and HMAC algorithms. |
hmac-sha256 | password_hash, sha2 | Hashes using the SHA-256 and HMAC algorithms. |
hmac-sha384 | password_hash, sha2 | Hashes using the SHA-384 and HMAC algorithms. |
hmac-sha512 | password_hash, sha2 | Hashes using the SHA-512 and HMAC algorithms. |
md5 | md5 | Hashes using the MD5 algorithm. |
pbkdf2-hmac-md5 | pbkdf2, md5 | Hashes using the MD5 and PBKDF2 algorithms. |
pbkdf2-hmac-sha1 | pbkdf2, sha1 | Hashes using the SHA-1 and PBKDF2 algorithms. |
pbkdf2-hmac-sha224 | pbkdf2, sha2 | Hashes using the SHA-224 and PBKDF2 algorithms. |
pbkdf2-hmac-sha256 | pbkdf2, sha2 | Hashes using the SHA-256 and PBKDF2 algorithms. |
pbkdf2-hmac-sha384 | pbkdf2, sha2 | Hashes using the SHA-384 and PBKDF2 algorithms. |
pbkdf2-hmac-sha512 | pbkdf2, sha2 | Hashes using the SHA-512 and PBKDF2 algorithms. |
sha1 | sha1 | Hashes using the SHA-1 algorithm. |
sha224 | sha2 | Hashes using the SHA-224 algorithm. |
sha256 | sha2 | Hashes using the SHA-256 algorithm. |
sha384 | sha2 | Hashes using the SHA-384 algorithm. |
sha512 | sha2 | Hashes using the SHA-512 algorithm. |
Example Usage
Hashes the password "hunter2" using the HMAC-SHA-256 algorithm:
/MKPASSWD hmac-sha256 hunter2
Special Notes
You should only run this command on a server that you trust as the plaintext password may be intercepted by an attacker.