You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently, eggdrop doesnt log IPs and pots of incomming connections to ssl ports.
It would be useful, esp. in case of ssl handshake failure.
Solution would be to add some code in the beginning of tls.c:ssl_handshake()
Function parameter host might be null for incomming commections, so we would have to do something like:
if (!host) {
struct sockaddr_in addr;
socklen_t addr_len = sizeof(addr);
if (getpeername(sock, (struct sockaddr *) &addr, &addr_len) == 0) {
char host[INET_ADDRSTRLEN];
inet_ntop(AF_INET, &(addr.sin_addr), host, INET_ADDRSTRLEN);
int port = ntohs(addr.sin_port);
debug2("attempting SSL negotiation from %s:%d to ...\n", host, port);
}
}
of course for ipv6 also via something like
#ifdef IPV6
} else if (family == AF_INET6) {
The text was updated successfully, but these errors were encountered:
Currently, eggdrop doesnt log IPs and pots of incomming connections to ssl ports.
It would be useful, esp. in case of ssl handshake failure.
Solution would be to add some code in the beginning of
tls.c:ssl_handshake()
Function parameter
host
might benull
for incomming commections, so we would have to do something like:of course for ipv6 also via something like
The text was updated successfully, but these errors were encountered: