added info about what open proxy was found in akill message

This commit is contained in:
fishwaldo 2003-02-14 13:24:32 +00:00
parent 585c4745d4
commit 566d2bbcc3
2 changed files with 3 additions and 2 deletions

View file

@ -7,6 +7,7 @@ Open Proxy Scanning Bot Module for NeoStats Changelog.
- added REMOVE function to help remove akills set by OPSB
- Bah, really fixed set to not work at all!
- Added some stats on cachehits and opm hits
- Added details about what open proxy was found
* Version 1.0RC3 * 5/11/2002 * Fish
- Fixed a problem when we delete a scanned user out of the active list when the tcp connect had finished, but not the dns bl lookup...

View file

@ -20,7 +20,7 @@
** USA
**
** NeoStats CVS Identification
** $Id: proxy.c,v 1.12 2003/01/30 11:29:25 fishwaldo Exp $
** $Id: proxy.c,v 1.13 2003/02/14 13:24:32 fishwaldo Exp $
*/
@ -89,7 +89,7 @@ void do_ban(scaninfo *scandata) {
chanalert(s_opsb, "Banning %s (%s) for Open Proxy - %s(%d)", scandata->who, inet_ntoa(scandata->ipaddr), proxy_list[sockdata->type].type, proxy_list[sockdata->type].port);
globops(s_opsb, "Banning %s (%s) for Open Proxy - %s(%d)", scandata->who, inet_ntoa(scandata->ipaddr), proxy_list[sockdata->type].type, proxy_list[sockdata->type].port);
if (scandata->u) prefmsg(scandata->u->nick, s_opsb, "Banning %s (%s) for Open Proxy - %s(%d)", scandata->who, inet_ntoa(scandata->ipaddr), proxy_list[sockdata->type].type, proxy_list[sockdata->type].port);
sakill_cmd(inet_ntoa(scandata->ipaddr), "*", s_opsb, opsb.bantime, "Open Proxy found on your host. Please visit the following website for more info: www.blitzed.org/proxy?ip=%s", inet_ntoa(scandata->ipaddr));
sakill_cmd(inet_ntoa(scandata->ipaddr), "*", s_opsb, opsb.bantime, "Open Proxy found on your host. %s(%s) Please visit the following website for more info: www.blitzed.org/proxy?ip=%s", proxy_list[sockdata->type].type, proxy_list[sockdata->type].port, inet_ntoa(scandata->ipaddr));
if ((fp = fopen("logs/opsb.log", "a")) == NULL) return;
fprintf(fp, "%s:%s:%s\n", proxy_list[sockdata->type].type, inet_ntoa(scandata->ipaddr), scandata->connectstring);
fclose(fp);