In addition, due to the online rpg sex spil abuse that led Tor access to be disabled in the past, we have unfortunately had to add another couple of restrictions: You must log in using sasl external or ecdsa-nist256P-challenge (more below).
Note that due to the SSL certificates not matching the hidden service, you might have to disable the verification in your client.
If you log out while connected via Tor, you will not be able to log in without reconnecting.Many systems install these by default, but some (such as privat gratis chat-rummet FreeBSD) do not.You can't directly connect to t via Tor; use the following hidden service as the server address instead: freenodeok2gncmy.Client SSL certificates are also supported, and may be used for identification to services.The freenode network can be accessed via the freenode webchat or using an IRC client such as irssi, WeeChat, ERC, HexChat, Smuxi, Quassel or mIRC.If your client thinks the server's certificate is invalid, make sure you are connecting to t rather than any other name that leads to freenode.If your client supports key pinning, you can verify our Tor server's public key fingerprint: you'll then want to tell your client to try the external mechanism.
On most linux distributions this will be in a package named something like ca-certificates.If you haven't set up the requisite sasl authentication, we recommend sasl external.In order to verify the server certificates on connection, ægte brother-sex hjem some additional work may be required.We lack comprehensive documentation for this, but it's a feature in most modern clients, so please check their docs for instructions for now.This is documented in our knowledge base.You can connect to freenode by pointing your IRC client at t on ports for plain-text connections, or ports 6697, 70 for SSL-encrypted connections.Certificate verification will generally only work when connecting.You'll need to generate a client certificate and add that to your NickServ account.See this kb article.If you have connected with a client certificate, has client certificate fingerprint f1ecf cda14cccc76e5d7114be4195 (showing your certificate's SHA1 fingerprint in place of f1ecf46.
For most clients this should be sufficient.
For FreeBSD, the package is named ca_root_nss, which will install the appropriate root certificates in /usr/local/share/certs/t.