home bbs files messages ]

Just a sample of the Echomail archive

<< oldest | < older | list | newer > | newest >> ]

 Message 8523 
 Oli to Michiel van der Vlist 
 Feature request 
 06 Nov 23 20:16:11 
 
MSGID: 2:280/464.47 65493b7a
REPLY: 2:280/5555 6547e4e2
PID: JamNNTPd/Linux 1
CHRS: LATIN-1 2
TZUTC: 0100
TID: CrashMail II/Linux 1.7
Michiel wrote (2023-11-05):

 MvdV> Hello Binkd Team,

 MvdV> I would like to see the following.

 MvdV> On an incoming call binkd reports:

 MvdV> - 10 May 14:46:36 [756] incoming from 2001:16d8:ff00:306::2 (3499)

 MvdV> What I would like to see is this:

 MvdV> - 10 May 14:46:36 [756] incoming from 2001:16d8:ff00:306::2 (3499) to
 MvdV> 2001:7b8:2ff:3a9::2

 MvdV> Where 2001:7b8:2ff:3a9::2 is one of my own IP addresses, the address
that
 MvdV> caller used to contact my binkd server.


 MvdV> Reason:

 MvdV> My binkd server is "multi homed". It can be reached via two different
 MvdV> ways. Via my SixXs tunnel and via my he.net tunnel. In order to judge
how
 MvdV> effective this "multi homing" is, I would like to see via which channel
 MvdV> an incoming call comes in.

A Perl hook might work. Something like:

sub on_handshake
{
    Log(3,"incoming to $our_ip $our_port");
}


or modify the "incoming" log message in the on_log() hook

---
 * Origin: No REPLY kludge - no reply (2:280/464.47)
SEEN-BY: 1/123 15/0 90/1 103/705 105/81 106/201 123/131 124/5016 129/305
SEEN-BY: 153/757 7715 154/10 203/0 218/700 221/0 226/30 227/114 229/110
SEEN-BY: 229/112 113 200 206 275 307 317 426 428 470 550 664 700 240/1120
SEEN-BY: 240/5832 266/512 280/464 5003 5555 282/1038 291/111 292/854
SEEN-BY: 292/8125 301/1 305/3 310/31 317/3 320/219 322/757 341/66
SEEN-BY: 341/234 342/200 396/45 423/120 460/58 633/267 280 281 384
SEEN-BY: 633/410 412 418 420 509 2744 712/848 770/1 5020/400
PATH: 280/464 633/280 229/426


<< oldest | < older | list | newer > | newest >> ]

(c) 1994,  bbs@darkrealms.ca