Mercurial > dnsbl
annotate dnsbl.conf @ 256:818cabace58f
Added tag stable-6-0-30 for changeset d6d5c50b9278
author | Carl Byington <carl@five-ten-sg.com> |
---|---|
date | Mon, 09 Apr 2012 18:13:58 -0700 |
parents | d6d5c50b9278 |
children | be939802c64e |
rev | line source |
---|---|
127 | 1 context main-default { |
2 // outbound dnsbl filtering to catch our own customers that end up on the sbl | |
3 dnsbl sbl sbl-xbl.spamhaus.org "Mail from %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s"; | |
174 | 4 dnsbl_list sbl; |
127 | 5 |
6 // outbound content filtering to prevent our own customers from sending spam | |
7 content on { | |
8 filter sbl-xbl.spamhaus.org "Mail containing %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s"; | |
9 uribl multi.surbl.org "Mail containing %s rejected - surbl; see http://www.rulesemporium.com/cgi-bin/uribl.cgi?bl0=1&domain0=%s"; | |
10 #uribl black.uribl.com "Mail containing %s rejected - uribl; see http://l.uribl.com/?d=%s"; | |
11 ignore { include "hosts-ignore.conf"; }; | |
12 tld { include "tld.conf"; }; | |
13 cctld { include "cctld.conf"; }; | |
14 html_tags { include "html-tags.conf"; }; | |
15 html_limit on 20 "Mail containing excessive bad html tags rejected"; | |
16 html_limit off; | |
17 host_limit on 20 "Mail containing excessive host names rejected"; | |
18 host_limit soft 20; | |
178 | 19 spamassassin 4; |
20 require_match yes; | |
21 dcc_greylist yes; | |
22 dcc_bulk_threshold 50; | |
127 | 23 }; |
24 | |
25 // backscatter prevention - don't send bounces for mail that we accepted but could not forward | |
26 // we only send bounces to our own customers | |
27 env_from unknown { | |
28 "<>" black; | |
29 }; | |
136 | 30 |
144
31ff00ea6bfb
allow parent/child to share a fully qualified env_to address
carl
parents:
140
diff
changeset
|
31 // hourly recipient rate limit by smtp auth client id |
255
d6d5c50b9278
Allow dnswl_list and dnsbl_list to be empty, to override lists specified in the ancestor contexts. Add daily recipient limits as a multiple of the hourly limits.
Carl Byington <carl@five-ten-sg.com>
parents:
249
diff
changeset
|
32 // default hourly limit is 30 |
d6d5c50b9278
Allow dnswl_list and dnsbl_list to be empty, to override lists specified in the ancestor contexts. Add daily recipient limits as a multiple of the hourly limits.
Carl Byington <carl@five-ten-sg.com>
parents:
249
diff
changeset
|
33 // daily limits are 4 times the hourly limit |
d6d5c50b9278
Allow dnswl_list and dnsbl_list to be empty, to override lists specified in the ancestor contexts. Add daily recipient limits as a multiple of the hourly limits.
Carl Byington <carl@five-ten-sg.com>
parents:
249
diff
changeset
|
34 rate_limit 30 4 { // default |
144
31ff00ea6bfb
allow parent/child to share a fully qualified env_to address
carl
parents:
140
diff
changeset
|
35 #fred 100; // override default limits |
31ff00ea6bfb
allow parent/child to share a fully qualified env_to address
carl
parents:
140
diff
changeset
|
36 #joe 10; // "" |
136 | 37 }; |
127 | 38 }; |
39 | |
94 | 40 context main { |
136 | 41 dnsbl localp partial.blackholes.five-ten-sg.com "Mail from %s rejected - local; see http://www.five-ten-sg.com/blackhole.php?%s"; |
94 | 42 dnsbl local blackholes.five-ten-sg.com "Mail from %s rejected - local; see http://www.five-ten-sg.com/blackhole.php?%s"; |
174 | 43 dnsbl sbl zen.spamhaus.org "Mail from %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s"; |
94 | 44 dnsbl xbl xbl.spamhaus.org "Mail from %s rejected - xbl; see http://www.spamhaus.org/query/bl?ip=%s"; |
249 | 45 dnswl dnswl.org list.dnswl.org 2; |
171 | 46 dnsbl_list local sbl; |
249 | 47 dnswl_list dnswl.org; |
94 | 48 |
49 content on { | |
50 filter sbl-xbl.spamhaus.org "Mail containing %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s"; | |
122 | 51 uribl multi.surbl.org "Mail containing %s rejected - surbl; see http://www.rulesemporium.com/cgi-bin/uribl.cgi?bl0=1&domain0=%s"; |
119 | 52 #uribl black.uribl.com "Mail containing %s rejected - uribl; see http://l.uribl.com/?d=%s"; |
94 | 53 ignore { include "hosts-ignore.conf"; }; |
54 tld { include "tld.conf"; }; | |
119 | 55 cctld { include "cctld.conf"; }; |
56 html_tags { include "html-tags.conf"; }; | |
94 | 57 html_limit off; |
58 host_limit soft 20; | |
178 | 59 spamassassin 5; |
60 require_match yes; | |
61 dcc_greylist yes; | |
62 dcc_bulk_threshold 20; | |
94 | 63 }; |
64 | |
216
784030ac71f1
Never whitelist self addressed mail. Changes for Fedora 10 and const correctness.
Carl Byington <carl@five-ten-sg.com>
parents:
179
diff
changeset
|
65 generic "^dsl.static.*ttnet.net.tr$|(^|[x.-])(ppp|h|host)?([0-9]{1,3}[x.-](Red-|dynamic[x.-])?){4}" |
168 | 66 "your mail server %s seems to have a generic name"; |
67 | |
233
5c3e9bf45bb5
Add whitelisting by regex expression filtering.
Carl Byington <carl@five-ten-sg.com>
parents:
216
diff
changeset
|
68 white_regex "=example.com=user@yourhostingaccount.com$"; |
5c3e9bf45bb5
Add whitelisting by regex expression filtering.
Carl Byington <carl@five-ten-sg.com>
parents:
216
diff
changeset
|
69 |
94 | 70 env_to { |
100
63e8633abc34
allow empty env_to at global context to remove all restrictions on child contexts
carl
parents:
94
diff
changeset
|
71 # !! replace this with your domain names |
63e8633abc34
allow empty env_to at global context to remove all restrictions on child contexts
carl
parents:
94
diff
changeset
|
72 # child contexts are not allowed to specify recipient addresses outside these domains |
179 | 73 # if this is a backup-mx, you need to include here domains for which you relay to the primary mx |
174 | 74 include "/etc/mail/local-host-names"; |
94 | 75 }; |
76 | |
77 context whitelist { | |
78 content off {}; | |
79 env_to { | |
80 # dcc_to ok { include "/var/dcc/whitecommon"; }; | |
81 }; | |
82 env_from white {}; # white forces all unmatched from addresses (everyone in this case) to be whitelisted | |
83 # so all mail TO these env_to addresses is accepted | |
84 }; | |
85 | |
86 context abuse { | |
87 dnsbl_list xbl; | |
88 content off {}; | |
174 | 89 generic "^$ " " "; # regex cannot match, to disable generic rdns rejects |
94 | 90 env_to { |
91 abuse@ # no content filtering on abuse reports | |
92 postmaster@ # "" | |
93 }; | |
94 env_from unknown {}; # ignore all parent white/black listing | |
95 }; | |
96 | |
97 context minimal { | |
171 | 98 dnsbl_list sbl; |
178 | 99 content on { |
100 spamassassin 10; | |
101 dcc_bulk_threshold many; | |
102 }; | |
171 | 103 generic "^$ " " "; # regex cannot match, to disable generic rdns rejects |
94 | 104 env_to { |
105 }; | |
106 }; | |
107 | |
108 context blacklist { | |
255
d6d5c50b9278
Allow dnswl_list and dnsbl_list to be empty, to override lists specified in the ancestor contexts. Add daily recipient limits as a multiple of the hourly limits.
Carl Byington <carl@five-ten-sg.com>
parents:
249
diff
changeset
|
109 dnsbl_list ; |
d6d5c50b9278
Allow dnswl_list and dnsbl_list to be empty, to override lists specified in the ancestor contexts. Add daily recipient limits as a multiple of the hourly limits.
Carl Byington <carl@five-ten-sg.com>
parents:
249
diff
changeset
|
110 dnswl_list ; |
94 | 111 env_to { |
112 # dcc_to many { include "/var/dcc/whitecommon"; }; | |
113 }; | |
114 env_from black {}; # black forces all unmatched from addresses (everyone in this case) to be blacklisted | |
115 # so all mail TO these env_to addresses is rejected | |
116 }; | |
117 | |
118 env_from unknown { | |
119 abuse@ abuse; # replies to abuse reports use the abuse context | |
120 # dcc_from { include "/var/dcc/whitecommon"; }; | |
121 }; | |
153 | 122 |
167
9b129ed78d7d
actually use spamassassin result, allow build without spam assassin, only call it if some recipient needs it.
carl
parents:
165
diff
changeset
|
123 autowhite 90 "autowhite/my-auto-whitelist"; |
9b129ed78d7d
actually use spamassassin result, allow build without spam assassin, only call it if some recipient needs it.
carl
parents:
165
diff
changeset
|
124 # install should create /etc/dnsbl/autowhite writable by userid dnsbl |
94 | 125 }; |
126 |