--- snapshot-20010329/src/global/mail_params.h.wiget Thu Apr 26 14:55:19 2001 +++ snapshot-20010329/src/global/mail_params.h Thu Apr 26 14:55:20 2001 @@ -1423,6 +1423,13 @@ #define DEF_SYSLOG_NAME "postfix" extern char *var_syslog_name; + /* + * SMTPD messages + */ +#define VAR_REJECT_REPLY_MSG_ACCESS_DENIED "smtpd_reject_msg_access_denied" +#define DEF_REJECT_REPLY_MSG_ACCESS_DENIED "rejected: Relay access denied." +extern char *var_reject_reply_msg_access_denied; + /* LICENSE /* .ad /* .fi --- snapshot-20010329/src/global/mail_params.c.wiget Thu Apr 26 14:55:19 2001 +++ snapshot-20010329/src/global/mail_params.c Thu Apr 26 14:55:20 2001 @@ -65,6 +65,7 @@ /* /* char *var_import_environ; /* char *var_export_environ; +/* char *var_reject_reply_msg_access_denied; /* /* void mail_params_init() /* DESCRIPTION @@ -206,6 +207,7 @@ char *var_import_environ; char *var_export_environ; +char *var_reject_reply_msg_access_denied; /* check_myhostname - lookup hostname and validate */ @@ -343,6 +345,7 @@ VAR_SMTP_TLS_CLIST, DEF_SMTP_TLS_CLIST, &var_smtp_tls_cipherlist, 0, 0, VAR_SMTP_TLS_SCACHE_DB, DEF_SMTP_TLS_SCACHE_DB, &var_smtp_tls_scache_db, 0, 0, VAR_TLS_DAEMON_RAND_SOURCE, DEF_TLS_DAEMON_RAND_SOURCE, &var_tls_daemon_rand_source, 0, 0, + VAR_REJECT_REPLY_MSG_ACCESS_DENIED, DEF_REJECT_REPLY_MSG_ACCESS_DENIED, &var_reject_reply_msg_access_denied, 1, 0, 0, }; static CONFIG_STR_FN_TABLE function_str_defaults_2[] = { --- snapshot-20010329/src/smtpd/smtpd_check.c.wiget Thu Apr 26 14:55:20 2001 +++ snapshot-20010329/src/smtpd/smtpd_check.c Thu Apr 26 15:17:10 2001 @@ -823,6 +823,7 @@ char *reply_name, char *reply_class) { char *myname = "check_relay_domains"; + VSTRING *reply_msg = vstring_alloc(1); if (msg_verbose) msg_info("%s: %s", myname, recipient); @@ -842,9 +843,10 @@ /* * Deny relaying between sites that both are not in relay_domains. */ + vstring_strcat(reply_msg, "%d <%s>: %s "); + vstring_strcat(reply_msg, var_reject_reply_msg_access_denied); return (smtpd_check_reject(state, MAIL_ERROR_POLICY, - "%d <%s>: %s odrzucony/rejected: Relay access denied", - var_relay_code, reply_name, reply_class)); + vstring_export(reply_msg), var_relay_code, reply_name, reply_class)); } /* permit_auth_destination - OK for message relaying */ @@ -902,6 +904,7 @@ static int reject_unauth_destination(SMTPD_STATE *state, char *recipient) { char *myname = "reject_unauth_destination"; + VSTRING *reply_msg = vstring_alloc(1); if (msg_verbose) msg_info("%s: %s", myname, recipient); @@ -915,9 +918,10 @@ /* * Reject relaying to sites that are not listed in relay_domains. */ + vstring_strcat(reply_msg, "%d <%s>: "); + vstring_strcat(reply_msg, var_reject_reply_msg_access_denied); return (smtpd_check_reject(state, MAIL_ERROR_POLICY, - "%d <%s>: Relay access denied", - var_relay_code, recipient)); + vstring_export(reply_msg), var_relay_code, recipient)); } /* reject_unauth_pipelining - reject improper use of SMTP command pipelining */ --- snapshot-20010329/src/smtpd/smtpd.c.wiget Thu Apr 26 14:55:19 2001 +++ snapshot-20010329/src/smtpd/smtpd.c Thu Apr 26 14:55:20 2001 @@ -1734,6 +1734,7 @@ VAR_SMTPD_SASL_REALM, DEF_SMTPD_SASL_REALM, &var_smtpd_sasl_realm, 1, 0, VAR_FILTER_XPORT, DEF_FILTER_XPORT, &var_filter_xport, 0, 0, VAR_RELAY_CCERTS, DEF_RELAY_CCERTS, &var_relay_ccerts, 0, 0, + VAR_REJECT_REPLY_MSG_ACCESS_DENIED, DEF_REJECT_REPLY_MSG_ACCESS_DENIED, &var_reject_reply_msg_access_denied, 1, 0, 0, };