/* do not try to process NIL values as client-info,
but store them for non-reserved keys */
- if (client->common.trusted && !client->id_logged && value != NULL)
+ if (client->common.connection_trusted &&
+ !client->id_logged && value != NULL)
handler->callback(client, key, value);
return TRUE;
}
t_strdup_printf("* ID %s\r\n",
imap_id_reply_generate(client->set->imap_id_send)));
const char *msg = "ID completed.";
- if (client->common.trusted)
+ if (client->common.connection_trusted)
msg = "Trusted ID completed.";
client_send_reply(&client->common, IMAP_CMD_REPLY_OK, msg);
}
event_add_str(client->event, "service", login_binary->protocol);
event_set_log_message_callback(client->event, client_log_msg_callback,
client);
- client->trusted = client_is_trusted(client);
+ client->connection_trusted = client_is_trusted(client);
if (conn->haproxied) {
client->haproxy_terminated_tls = conn->haproxy.ssl;
- client->connection_secured = conn->haproxy.ssl || client->trusted;
+ client->connection_secured = conn->haproxy.ssl ||
+ client->connection_trusted;
client->end_client_tls_secured = conn->haproxy.ssl;
client->local_name = conn->haproxy.hostname;
client->client_cert_common_name = conn->haproxy.cert_common_name;
} else {
- client->connection_secured = client->trusted ||
+ client->connection_secured = client->connection_trusted ||
net_ip_compare(&conn->real_remote_ip, &conn->real_local_ip);
}
client->proxy_ttl = LOGIN_PROXY_TTL;
TLS secured, not whether the original client connection is TLS
secured. */
bool end_client_tls_secured:1;
- bool trusted:1;
+ /* Connection is from a trusted client/proxy, which is allowed to e.g.
+ forward the original client IP address. Note that a trusted
+ connection is not necessarily considered secured. */
+ bool connection_trusted:1;
bool ssl_servername_settings_read:1;
bool banner_sent:1;
bool authenticating:1;
in_port_t remote_port;
bool args_ok = TRUE;
- if (!client->common.trusted) {
+ if (!client->common.connection_trusted) {
client_send_reply(&client->common, POP3_CMD_REPLY_OK,
"You are not from trusted IP - ignoring");
return TRUE;
client->io = io_add_istream(client->input, client_input, client);
str = t_str_new(128);
- if (client->trusted) {
+ if (client->connection_trusted) {
/* Dovecot extension to avoid extra roundtrip for CAPA */
str_append(str, "[XCLIENT] ");
}
{
struct submission_client *client = context;
- return client->common.trusted;
+ return client->common.connection_trusted;
}
static void submission_login_die(void)