-cert_chain certs/localhost-chain-cert.pem \
-CAfile /etc/pki/tls/make-ca/ca-bundle.crt \
-tls1_2 \
- -connect $(TESTIP):1065
+ -connect $(TESTIP):1025
# -status
# -crlf
-cert certs/localhost-cert.pem \
-key certs/localhost-key.pem \
-starttls smtp \
- -connect smtp.google.com:25
+ -connect tar1.osukiss.org:25
# -connect mx2.free.fr:25
# -connect mailprod1.safe.ca:587
TESTSRV = mailleur.example.com
TESTIP = 127.127.10.25
TESTPORT= 1025
-#TESTPROT= smtps
+TESTPROT= smtps
EXTIP = safemail3.safe.ca
EXTPORT = 25
TESTITER= 1
}
break;
case 7 : //contact is good, then sending a signon
- (void) log_fprintlog(contact->logptr,false,"opening connection CNT=%s",
- contact->mainsesid);
+ (void) log_fprintlog(contact->logptr,true,"Start CNT=%s",contact->mainsesid);
+ (void) log_fprintlog(contact->logptr,false,"(Contact open from [%s] to "
+ "[%s:%s])",
+ contact->peername,
+ contact->locip,
+ contact->locserv);
+ if (soc_iscrypted(contact->socptr)==true) {
+ int level;
+
+ level=soc_get_sec_level(contact->socptr);
+ (void) log_fprintlog(contact->logptr,false,cry,"server",level);
+ }
break;
default : //SAFE guard
proceed=false;
SQLPTR *sqlptr; //established contact database access
int delay; //communication max delay
char *fqdn; //fully qualified domain from peer
- char *locip; //socket local IP num
RELTYP privilege; //onnection privilege
char *authname; //Link is authenticated name
AFNTYP **localafns; //local IP as an AFNUM
+ char *locip; //socket local IP num
char *locname; //socket local hostname
char *locserv; //local service port
char *peername; //socket remote peer FQDN