*con->fake_username = '\0';
*con->fake_hostname = '\0';
*con->fake_roomname = '\0';
+ *con->cs_clientinfo = '\0';
generate_nonce(con);
safestrncpy(con->cs_host, config.c_fqdn, sizeof con->cs_host);
safestrncpy(con->cs_addr, "", sizeof con->cs_addr);
database, after a reverse lookup on the UID to get the account name.
We can take this opportunity to check to see if this is a legit account.
*/
+ snprintf(con->cs_clientinfo, sizeof(con->cs_clientinfo),
+ "PID: "F_PID_T"; UID: "F_UID_T"; GID: "F_XPID_T" ",
+ credentials.pid,
+ credentials.uid,
+ credentials.gid);
}
}
#endif
char user[64];
};
-#define CTDLUSERIP (IsEmptyStr(CC->cs_addr) ? "localsocket" : CC->cs_addr)
+#define CTDLUSERIP (IsEmptyStr(CC->cs_addr) ? CC->cs_clientinfo: CC->cs_addr)
void cit_backtrace(void);
void cit_panic_backtrace(int SigNum);
int cs_clientdev; /* client developer ID */
int cs_clienttyp; /* client type code */
int cs_clientver; /* client version number */
+ char cs_clientinfo[256];/* if its a unix domain socket, some info for logging. */
uid_t cs_UDSclientUID; /* the uid of the client when talking via UDS */
char cs_clientname[32]; /* name of client software */
char cs_host[64]; /* host logged in from */