X-Git-Url: https://arthur.barton.de/cgi-bin/gitweb.cgi?a=blobdiff_plain;f=NEWS;h=a81085a30ddde1dd0ca6a584ce58796b372fb9af;hb=9286686c0926274ef222a37d65fbd2b4f3ad1918;hp=143132e8743d4a517ff0f571374f1f65649ab1af;hpb=263c5edb606459a74bc3d18f455ae117c1268f69;p=ngircd.git diff --git a/NEWS b/NEWS index 143132e8..a81085a3 100644 --- a/NEWS +++ b/NEWS @@ -2,14 +2,32 @@ ngIRCd - Next Generation IRC Server http://ngircd.barton.de/ - (c)2001-2018 Alexander Barton and Contributors. + (c)2001-2019 Alexander Barton and Contributors. ngIRCd is free software and published under the terms of the GNU General Public License. -- NEWS -- -ngIRCd 25 - +ngIRCd 25 (2019-01-23) + + - Implement new configuration option "MaxPenaltyTime", which configures the + maximum penalty time increase in seconds, per penalty event. Set to -1 for + no limit (the default), 0 to disable penalties altogether. ngIRCd doesn't + use penalty increases higher than 2 seconds during normal operation, so + values higher than 1 rarely make sense. + Disabling (or reducing) penalties can greatly speed up "make check" runs + for example, see below, but are mostly a debugging feature and normally + not meant to be used on production systems! + Some example timings running "make check" from my macOS workstation: + - MaxPenaltyTime not set: 4:41,79s + - "MaxPenaltyTime = 1": 3:14,71s + - "MaxPenaltyTime = 0": 25,46s + Closes #249 and #251. + - Update Xcode project for latest Xcode version (10.0) + - Allow a 5th parameter in WEBIRC. Thanks to "ItsOnlyBinary". + Closes #247. + + ngIRCd 25~rc1 (2018-08-11) - Only send TOPIC updates to a channel when the topic actually changed: This prevents the channel from becoming flooded by unecessary TOPIC update messages, that can happen when IRC services try to enforce a certain topic @@ -279,7 +297,7 @@ ngIRCd 20.2 (2013-02-15) - This release is a bugfix release only, without new features. - Security: Fix a denial of service bug in the function handling KICK - commands that could be used by arbitrary users to to crash the daemon + commands that could be used by arbitrary users to crash the daemon (CVE-2013-1747). ngIRCd 20.1 (2013-01-02)