diff options
author | Scott Ullrich <sullrich@pfsense.org> | 2006-04-27 21:08:17 +0000 |
---|---|---|
committer | Scott Ullrich <sullrich@pfsense.org> | 2006-04-27 21:08:17 +0000 |
commit | 768c1c64bb042a6f1dccad91ac71d8b4b68570fa (patch) | |
tree | 676445664890eed1e7f65874350405f872b2ba23 /packages/spamd_db_ext.php | |
parent | 837f185573e0bcc68d60db84a1443c63f3a0dda8 (diff) | |
download | pfsense-packages-768c1c64bb042a6f1dccad91ac71d8b4b68570fa.tar.gz pfsense-packages-768c1c64bb042a6f1dccad91ac71d8b4b68570fa.tar.bz2 pfsense-packages-768c1c64bb042a6f1dccad91ac71d8b4b68570fa.zip |
Log actions performed by spamd users
Diffstat (limited to 'packages/spamd_db_ext.php')
-rw-r--r-- | packages/spamd_db_ext.php | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/packages/spamd_db_ext.php b/packages/spamd_db_ext.php index ea5eb1d0..88164e60 100644 --- a/packages/spamd_db_ext.php +++ b/packages/spamd_db_ext.php @@ -71,6 +71,7 @@ if($_GET['action'] or $_POST['action']) { usleep(100); exec("/usr/local/sbin/spamdb -a {$srcip}"); mwexec("/sbin/pfctl -q -t blacklist -T replace -f /var/db/blacklist.txt"); + log_error("spamd: {$srcip} has been whitelisted by {$_SERVER['REMOTE_ADDR']}"); hup_spamd(); exit; } else if($action == "delete") { @@ -79,6 +80,7 @@ if($_GET['action'] or $_POST['action']) { hup_spamd(); mwexec("/sbin/pfctl -q -t spamd -T delete $srcip"); mwexec("/sbin/pfctl -q -t blacklist -T replace -f /var/db/blacklist.txt"); + log_error("spamd: {$srcip} has been deleted by {$_SERVER['REMOTE_ADDR']}"); exit; } else if($action == "spamtrap") { delete_from_spamd_db($email); @@ -86,12 +88,14 @@ if($_GET['action'] or $_POST['action']) { exec("/usr/local/sbin/spamdb -a \"<{$email}>\" -T"); hup_spamd(); mwexec("/sbin/pfctl -q -t blacklist -T add -f /var/db/blacklist.txt"); + log_error("spamd: {$srcip} has been blacklisted by {$_SERVER['REMOTE_ADDR']}"); exit; } else if($action == "trapped") { delete_from_spamd_db($srcip); usleep(100); exec("/usr/local/sbin/spamdb -a {$srcip} -t"); add_to_blacklist($srcip); + log_error("spamd: {$srcip} has been trapped by {$_SERVER['REMOTE_ADDR']}"); hup_spamd(); exit; } |