Skip to content
This repository was archived by the owner on Jun 6, 2021. It is now read-only.

Commit d168ffb

Browse files
authored
Explain SASL access only IP ranges (#430)
1 parent 2c64375 commit d168ffb

File tree

1 file changed

+9
-0
lines changed

1 file changed

+9
-0
lines changed

content/kb/using/sasl.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,3 +30,12 @@ If you know of any additions or corrections to the lists above, or would like to
3030

3131
Documentation on how to create certificates and add their fingerprints to NickServ for SASL EXTERNAL
3232
can be found in [the article on NickServ and certificates](kb/using/certfp).
33+
34+
SASL access only IP ranges
35+
==========================
36+
37+
Some IP address ranges are configured to require SASL authentication to an existing NickServ account with a **verified email address**. Connections from these ranges will be refused with the message `SASL access only`. You can follow the instructions above to configure many commonly used clients.
38+
39+
To [create a NickServ account](https://freenode.net/kb/answer/registration) from a restricted IP address, you can first connect to the [freenode webchat](https://webchat.freenode.net). Webchat is not affected by the SASL restriction. Once your NickServ account's email address has been verified you can use that account to satisfy the SASL requirement.
40+
41+
SASL access only restrictions are typically applied to addresses ranges that are the source of frequent policy violations due to providing easy access to dynamic addresses to a wide range of users. These ranges are typically used by VPN, cloud-computing, and mobile network providers. *These restrictions are not targeted at individual users.*

0 commit comments

Comments
 (0)