-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
> What I want, of course, is the IP address the
> connect was from. Has anybody patched rblsmtpd to log that >already?
This is what I did:
- ------- cut here -------
+++ rblsmtpd-0.70/rblsmtpd.c Mon May 10 21:19:25 1999
@@ -75,6 +75,9 @@
break;
default:
if (!stralloc_copys(&message,flagbounce ? "553 " : "451 ")) die_sys();
+ if (!stralloc_cats(&message,"(Remote IP: ")) die_sys();
+ if (!stralloc_cats(&message,x)) die_sys();
+ if (!stralloc_cats(&message,") ")) die_sys();
if (!stralloc_cat(&message,&rbltext)) die_sys();
}
}
- ---- cut here ---
It works and I didn't see any leaks - after all, rblsmtpd exits frequently
anyway.
Comments anyone?
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.0.2 -- QDPGP 2.60
Comment: http://community.wow.net/grt/qdpgp.html
iQA/AwUBN1uGWlMwP8g7qbw/EQKd/wCdG30BZum9Ejmai7fBuNd/xCDx4WgAnjY8
Zylw0Hq5XfKcB5nSp5sjxniD
=yUPk
-----END PGP SIGNATURE-----
--
Petr Novotny, ANTEK CS
[EMAIL PROTECTED]
http://www.antek.cz
PGP key ID: 0x3BA9BC3F
-- Don't you know there ain't no devil there's just God when he's drunk.
[Tom Waits]