This is an old revision of the document!
gpart show gpart set -a active /dev/ada0 gpart set -a bootme -i 3 /dev/ada0
… 3
was the number of my boot partition as seen in gpart show
…
route add -net 192.168.2.0/24 192.168.1.2
sysctl -a | egrep 'hw.machine|hw.model|hw.ncpu'
/usr/local/share/examples/bitlbee/bitlbee.conf
to /usr/local/etc/bitlbee/bitlbee.conf
/usr/local/share/examples/bitlbee/motd.txt
to /usr/local/etc/bitlbee/motd.txt
You have two options for launching bitlbee: either launch it from inetd(8) or run it as a stand-alone daemon.
Add the following line to /etc/inetd.conf
and reload inetd(8):
ircd stream tcp nowait bitlbee /usr/local/sbin/bitlbee bitlbee -I
Add the following line to /etc/rc.conf
:
bitlbee_enable="YES"
otr_policy
never
, opportunistic
, manual
, always
otr_color_encrypted
true
, false
untrusted
=red, trusted
=green. otr_does_html
never
: disables the OTR subsystem. opportunistic
: A magic whitespace pattern will be appended to the first message sent to any user. If the peer is also running opportunistic OTR, an encrypted connection will be set up automatically. manual
: OTR connections must be established explicitly using otr connect. always
: enforces encrypted communication by causing BitlBee to refuse to send any cleartext messages at all. The “magic whitespace pattern” that opportunistic OTR uses consists of 16-40 bytes of either space or tab characters (See the “Tagged plaintext messages” section of the OTR spec for more details). This might cause minor visual issues in some IM clients.
1 <@alice> otr connect bob 2 <@alice> otr smpq bob "question question question" answer 3 <@root> smp: initiating with bob...
1 <@root> smp: initiated by alice with question: "question question question" 2 <@root> smp: respond with otr smp alice <answer> 3 <@bob> otr smp alice answer 4 <@root> smp: responding to alice... 5 <@root> smp alice: secrets proved equal, fingerprint trusted
Links: Tech Info … Mantis Area