TIP: Click on subject to list as thread! ANSI
echo: binkd
to: Paul Hayton
from: Oli
date: 2021-05-20 12:52:00
subject: Rejecting an incoming con

Paul wrote (2021-05-20):

 PH> I'm looking for a way for BinkD to reject the incoming connection based on
 PH> something like SYS or ZYZ info presented. Is such a thing possible using a
 PH> perl script or similar?

 PH> Note I am not a perl guru so any suggested fix you have I'd appreciate a
 PH> bit of hand holding to implement it.

There is some documentation in doc/perlhooks.txt

I think it should be possible to abort the session:

  6) after_handshake()
     - called after complete login information transferred
     - defined vars: session level 2
     - return non-empty string to abort session with that reason

  Session Data

    This variables are set for session hooks depending of their availability:

                 1 2 3   <- session vars level (see hooks description)
    $sysname       + +   remote system name
    $sysop         + +   remote sysop



Have you built binkd with perl support?

---
                                                                           
* Origin: . (2:280/464.47)

SOURCE: echomail via QWK@pharcyde.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.