IPIntercept::NetfilterInterception(int fd, const IPAddress &me, IPAddress &dst, int silent)
{
#if LINUX_NETFILTER
- static time_t last_reported = 0;
struct addrinfo *lookup = NULL;
dst.GetAddrInfo(lookup,AF_INET);
IPIntercept::NetfilterTransparent(int fd, const IPAddress &me, IPAddress &dst, int silent)
{
#if LINUX_NETFILTER
- static time_t last_reported = 0;
struct addrinfo *lookup = NULL;
if( ! fd_table[fd].flags.transparent) return -1;
IPIntercept::IPFWInterception(int fd, const IPAddress &me, IPAddress &dst, int silent)
{
#if IPFW_TRANSPARENT
- static time_t last_reported = 0;
struct addrinfo *lookup = NULL;
dst.GetAddrInfo(lookup,AF_INET);
struct natlookup natLookup;
static int natfd = -1;
- static time_t last_reported = 0;
int x;
#if defined(IPFILTER_VERSION) && (IPFILTER_VERSION >= 4000027)
struct pfioc_natlook nl;
static int pffd = -1;
- static time_t last_reported = 0;
if( !me.IsIPv4() ) return -1;
if( !peer.IsIPv4() ) return -1;
class IPIntercept
{
public:
- IPIntercept() : transparent_active(0), intercept_active(0) {};
+ IPIntercept() : transparent_active(0), intercept_active(0), last_reported(0) {};
~IPIntercept() {};
/** Perform NAT lookups */
int transparent_active;
int intercept_active;
+ time_t last_reported; /**< Time of last error report. Throttles NAT error display to 1 per minute */
};
#if LINUX_NETFILTER && !defined(IP_TRANSPARENT)