|
|
|
@ -22,7 +22,8 @@ flags |
|
|
|
FLAG_INTERNALLY_SOURCED: 1, |
|
|
|
FLAG_ASSOCIATE_SERVER: 2, |
|
|
|
FLAG_SKIP_NAT_CORRECTION: 3, |
|
|
|
FLAG_ASSOCIATE_USER: 4; |
|
|
|
FLAG_ASSOCIATE_USER: 4, |
|
|
|
FLAG_TRUSTED_SOURCE: 5; |
|
|
|
|
|
|
|
#!define FLB_NATB 1 |
|
|
|
#!define FLB_NATSIPPING 2 |
|
|
|
@ -274,7 +275,8 @@ route[HANDLE_OPTIONS] |
|
|
|
if (is_method("OPTIONS")) { |
|
|
|
if (isflagset(FLAG_INTERNALLY_SOURCED)) { |
|
|
|
route(INTERNAL_TO_EXTERNAL_RELAY); |
|
|
|
} else if ($rd =~ "[0-9]{1,3}\.[0-9]{1,3}.[0-9]{1,3}\.[0-9]{1,3}") { |
|
|
|
} else if (!isflagset(FLAG_TRUSTED_SOURCE) |
|
|
|
&& $rd =~ "[0-9]{1,3}\.[0-9]{1,3}.[0-9]{1,3}\.[0-9]{1,3}") { |
|
|
|
xlog("L_WARN", "$ci|end|dropping OPTIONS request with IP domain"); |
|
|
|
} else { |
|
|
|
sl_send_reply("200", "Rawr!!"); |
|
|
|
@ -408,7 +410,8 @@ route[DOS_PREVENTION] |
|
|
|
{ |
|
|
|
# allow request from internal network or from whitelist |
|
|
|
if (isflagset(FLAG_INTERNALLY_SOURCED) || allow_source_address(TRUSTED_ADR_GROUP)) { |
|
|
|
xlog("L_DBG", "$ci|log|request from trusted IP"); |
|
|
|
xlog("L_INFO", "$ci|log|request from trusted IP"); |
|
|
|
setflag(FLAG_TRUSTED_SOURCE); |
|
|
|
return; |
|
|
|
} |
|
|
|
|
|
|
|
|