-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> What I want, of course, is the IP address the
> connect was from.  Has anybody patched rblsmtpd to log that >already?

This is what I did:
- ------- cut here -------
+++ rblsmtpd-0.70/rblsmtpd.c    Mon May 10 21:19:25 1999
@@ -75,6 +75,9 @@
        break;
       default:
         if (!stralloc_copys(&message,flagbounce ? "553 " : "451 ")) die_sys();
+       if (!stralloc_cats(&message,"(Remote IP: ")) die_sys();
+       if (!stralloc_cats(&message,x)) die_sys();
+       if (!stralloc_cats(&message,") ")) die_sys();
         if (!stralloc_cat(&message,&rbltext)) die_sys();
     }
   }
- ---- cut here ---
It works and I didn't see any leaks - after all, rblsmtpd exits frequently
anyway.

Comments anyone?

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.0.2 -- QDPGP 2.60 
Comment: http://community.wow.net/grt/qdpgp.html

iQA/AwUBN1uGWlMwP8g7qbw/EQKd/wCdG30BZum9Ejmai7fBuNd/xCDx4WgAnjY8
Zylw0Hq5XfKcB5nSp5sjxniD
=yUPk
-----END PGP SIGNATURE-----
--
Petr Novotny, ANTEK CS
[EMAIL PROTECTED]
http://www.antek.cz
PGP key ID: 0x3BA9BC3F
-- Don't you know there ain't no devil there's just God when he's drunk.
                                                             [Tom Waits]

Reply via email to