Mercurial > dnsbl
annotate dnsbl.conf @ 139:003026deaed1 stable-5-21
add smtp auth rate limits
author | carl |
---|---|
date | Tue, 26 Sep 2006 15:21:17 -0700 |
parents | f4746d8a12a3 |
children | 4028de9b46dd |
rev | line source |
---|---|
127 | 1 context main-default { |
2 // outbound dnsbl filtering to catch our own customers that end up on the sbl | |
136 | 3 dnsbl localp partial.blackholes.five-ten-sg.com "Mail from %s rejected - local; see http://www.five-ten-sg.com/blackhole.php?%s"; |
127 | 4 dnsbl local blackholes.five-ten-sg.com "Mail from %s rejected - local; see http://www.five-ten-sg.com/blackhole.php?%s"; |
5 dnsbl sbl sbl-xbl.spamhaus.org "Mail from %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s"; | |
6 dnsbl dul dul.dnsbl.sorbs.net "Mail from %s rejected - dul; see http://www.sorbs.net/lookup.shtml?%s"; | |
7 dnsbl_list local sbl dul; | |
8 | |
9 // outbound content filtering to prevent our own customers from sending spam | |
10 content on { | |
11 filter sbl-xbl.spamhaus.org "Mail containing %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s"; | |
12 uribl multi.surbl.org "Mail containing %s rejected - surbl; see http://www.rulesemporium.com/cgi-bin/uribl.cgi?bl0=1&domain0=%s"; | |
13 #uribl black.uribl.com "Mail containing %s rejected - uribl; see http://l.uribl.com/?d=%s"; | |
14 ignore { include "hosts-ignore.conf"; }; | |
15 tld { include "tld.conf"; }; | |
16 cctld { include "cctld.conf"; }; | |
17 html_tags { include "html-tags.conf"; }; | |
18 html_limit on 20 "Mail containing excessive bad html tags rejected"; | |
19 html_limit off; | |
20 host_limit on 20 "Mail containing excessive host names rejected"; | |
21 host_limit soft 20; | |
22 }; | |
23 | |
24 // backscatter prevention - don't send bounces for mail that we accepted but could not forward | |
25 // we only send bounces to our own customers | |
26 env_from unknown { | |
27 "<>" black; | |
28 }; | |
136 | 29 |
30 // per recipient rates - only available in the default (first top level) context | |
31 rate_limit { | |
32 " " 30; // default specified by user name composed of a single blank | |
33 }; | |
127 | 34 }; |
35 | |
94 | 36 context main { |
136 | 37 dnsbl localp partial.blackholes.five-ten-sg.com "Mail from %s rejected - local; see http://www.five-ten-sg.com/blackhole.php?%s"; |
94 | 38 dnsbl local blackholes.five-ten-sg.com "Mail from %s rejected - local; see http://www.five-ten-sg.com/blackhole.php?%s"; |
39 dnsbl sbl sbl-xbl.spamhaus.org "Mail from %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s"; | |
40 dnsbl xbl xbl.spamhaus.org "Mail from %s rejected - xbl; see http://www.spamhaus.org/query/bl?ip=%s"; | |
41 dnsbl dul dul.dnsbl.sorbs.net "Mail from %s rejected - dul; see http://www.sorbs.net/lookup.shtml?%s"; | |
42 dnsbl_list local sbl dul; | |
43 | |
44 content on { | |
45 filter sbl-xbl.spamhaus.org "Mail containing %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s"; | |
122 | 46 uribl multi.surbl.org "Mail containing %s rejected - surbl; see http://www.rulesemporium.com/cgi-bin/uribl.cgi?bl0=1&domain0=%s"; |
119 | 47 #uribl black.uribl.com "Mail containing %s rejected - uribl; see http://l.uribl.com/?d=%s"; |
94 | 48 ignore { include "hosts-ignore.conf"; }; |
49 tld { include "tld.conf"; }; | |
119 | 50 cctld { include "cctld.conf"; }; |
51 html_tags { include "html-tags.conf"; }; | |
94 | 52 html_limit off; |
53 host_limit soft 20; | |
54 }; | |
55 | |
56 env_to { | |
100
63e8633abc34
allow empty env_to at global context to remove all restrictions on child contexts
carl
parents:
94
diff
changeset
|
57 # !! replace this with your domain names |
63e8633abc34
allow empty env_to at global context to remove all restrictions on child contexts
carl
parents:
94
diff
changeset
|
58 # child contexts are not allowed to specify recipient addresses outside these domains |
63e8633abc34
allow empty env_to at global context to remove all restrictions on child contexts
carl
parents:
94
diff
changeset
|
59 # or leave this empty to allow unrestricted child contexts |
63e8633abc34
allow empty env_to at global context to remove all restrictions on child contexts
carl
parents:
94
diff
changeset
|
60 # example.com; |
94 | 61 }; |
62 | |
63 context whitelist { | |
64 content off {}; | |
65 env_to { | |
66 # dcc_to ok { include "/var/dcc/whitecommon"; }; | |
67 }; | |
68 env_from white {}; # white forces all unmatched from addresses (everyone in this case) to be whitelisted | |
69 # so all mail TO these env_to addresses is accepted | |
70 }; | |
71 | |
72 context abuse { | |
73 dnsbl_list xbl; | |
74 content off {}; | |
75 env_to { | |
76 abuse@ # no content filtering on abuse reports | |
77 postmaster@ # "" | |
78 }; | |
79 env_from unknown {}; # ignore all parent white/black listing | |
80 }; | |
81 | |
82 context minimal { | |
83 dnsbl_list sbl dul; | |
84 content on {}; | |
85 env_to { | |
86 }; | |
87 }; | |
88 | |
89 context blacklist { | |
90 env_to { | |
91 # dcc_to many { include "/var/dcc/whitecommon"; }; | |
92 }; | |
93 env_from black {}; # black forces all unmatched from addresses (everyone in this case) to be blacklisted | |
94 # so all mail TO these env_to addresses is rejected | |
95 }; | |
96 | |
97 env_from unknown { | |
98 abuse@ abuse; # replies to abuse reports use the abuse context | |
99 # dcc_from { include "/var/dcc/whitecommon"; }; | |
100 }; | |
101 }; | |
102 |