aboutsummaryrefslogtreecommitdiffstats
path: root/packages
diff options
context:
space:
mode:
authorScott Ullrich <sullrich@pfsense.org>2006-04-27 21:08:17 +0000
committerScott Ullrich <sullrich@pfsense.org>2006-04-27 21:08:17 +0000
commit768c1c64bb042a6f1dccad91ac71d8b4b68570fa (patch)
tree676445664890eed1e7f65874350405f872b2ba23 /packages
parent837f185573e0bcc68d60db84a1443c63f3a0dda8 (diff)
downloadpfsense-packages-768c1c64bb042a6f1dccad91ac71d8b4b68570fa.tar.gz
pfsense-packages-768c1c64bb042a6f1dccad91ac71d8b4b68570fa.tar.bz2
pfsense-packages-768c1c64bb042a6f1dccad91ac71d8b4b68570fa.zip
Log actions performed by spamd users
Diffstat (limited to 'packages')
-rw-r--r--packages/spamd_db_ext.php4
1 files changed, 4 insertions, 0 deletions
diff --git a/packages/spamd_db_ext.php b/packages/spamd_db_ext.php
index ea5eb1d0..88164e60 100644
--- a/packages/spamd_db_ext.php
+++ b/packages/spamd_db_ext.php
@@ -71,6 +71,7 @@ if($_GET['action'] or $_POST['action']) {
usleep(100);
exec("/usr/local/sbin/spamdb -a {$srcip}");
mwexec("/sbin/pfctl -q -t blacklist -T replace -f /var/db/blacklist.txt");
+ log_error("spamd: {$srcip} has been whitelisted by {$_SERVER['REMOTE_ADDR']}");
hup_spamd();
exit;
} else if($action == "delete") {
@@ -79,6 +80,7 @@ if($_GET['action'] or $_POST['action']) {
hup_spamd();
mwexec("/sbin/pfctl -q -t spamd -T delete $srcip");
mwexec("/sbin/pfctl -q -t blacklist -T replace -f /var/db/blacklist.txt");
+ log_error("spamd: {$srcip} has been deleted by {$_SERVER['REMOTE_ADDR']}");
exit;
} else if($action == "spamtrap") {
delete_from_spamd_db($email);
@@ -86,12 +88,14 @@ if($_GET['action'] or $_POST['action']) {
exec("/usr/local/sbin/spamdb -a \"<{$email}>\" -T");
hup_spamd();
mwexec("/sbin/pfctl -q -t blacklist -T add -f /var/db/blacklist.txt");
+ log_error("spamd: {$srcip} has been blacklisted by {$_SERVER['REMOTE_ADDR']}");
exit;
} else if($action == "trapped") {
delete_from_spamd_db($srcip);
usleep(100);
exec("/usr/local/sbin/spamdb -a {$srcip} -t");
add_to_blacklist($srcip);
+ log_error("spamd: {$srcip} has been trapped by {$_SERVER['REMOTE_ADDR']}");
hup_spamd();
exit;
}