Mercurial > dnsbl
annotate dnsbl.conf @ 145:9b9bab1d3c21 stable-5-25
dump effective dnsbl_list with -c switch
author | carl |
---|---|
date | Sun, 15 Oct 2006 12:41:46 -0700 |
parents | 31ff00ea6bfb |
children | 8d7c439bb6fa |
rev | line source |
---|---|
127 | 1 context main-default { |
2 // outbound dnsbl filtering to catch our own customers that end up on the sbl | |
136 | 3 dnsbl localp partial.blackholes.five-ten-sg.com "Mail from %s rejected - local; see http://www.five-ten-sg.com/blackhole.php?%s"; |
127 | 4 dnsbl local blackholes.five-ten-sg.com "Mail from %s rejected - local; see http://www.five-ten-sg.com/blackhole.php?%s"; |
5 dnsbl sbl sbl-xbl.spamhaus.org "Mail from %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s"; | |
6 dnsbl dul dul.dnsbl.sorbs.net "Mail from %s rejected - dul; see http://www.sorbs.net/lookup.shtml?%s"; | |
7 dnsbl_list local sbl dul; | |
8 | |
9 // outbound content filtering to prevent our own customers from sending spam | |
10 content on { | |
11 filter sbl-xbl.spamhaus.org "Mail containing %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s"; | |
12 uribl multi.surbl.org "Mail containing %s rejected - surbl; see http://www.rulesemporium.com/cgi-bin/uribl.cgi?bl0=1&domain0=%s"; | |
13 #uribl black.uribl.com "Mail containing %s rejected - uribl; see http://l.uribl.com/?d=%s"; | |
14 ignore { include "hosts-ignore.conf"; }; | |
15 tld { include "tld.conf"; }; | |
16 cctld { include "cctld.conf"; }; | |
17 html_tags { include "html-tags.conf"; }; | |
18 html_limit on 20 "Mail containing excessive bad html tags rejected"; | |
19 html_limit off; | |
20 host_limit on 20 "Mail containing excessive host names rejected"; | |
21 host_limit soft 20; | |
22 }; | |
23 | |
24 // backscatter prevention - don't send bounces for mail that we accepted but could not forward | |
25 // we only send bounces to our own customers | |
26 env_from unknown { | |
27 "<>" black; | |
28 }; | |
136 | 29 |
144
31ff00ea6bfb
allow parent/child to share a fully qualified env_to address
carl
parents:
140
diff
changeset
|
30 // hourly recipient rate limit by smtp auth client id |
140 | 31 rate_limit 30 { // default |
144
31ff00ea6bfb
allow parent/child to share a fully qualified env_to address
carl
parents:
140
diff
changeset
|
32 #fred 100; // override default limits |
31ff00ea6bfb
allow parent/child to share a fully qualified env_to address
carl
parents:
140
diff
changeset
|
33 #joe 10; // "" |
136 | 34 }; |
127 | 35 }; |
36 | |
94 | 37 context main { |
136 | 38 dnsbl localp partial.blackholes.five-ten-sg.com "Mail from %s rejected - local; see http://www.five-ten-sg.com/blackhole.php?%s"; |
94 | 39 dnsbl local blackholes.five-ten-sg.com "Mail from %s rejected - local; see http://www.five-ten-sg.com/blackhole.php?%s"; |
40 dnsbl sbl sbl-xbl.spamhaus.org "Mail from %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s"; | |
41 dnsbl xbl xbl.spamhaus.org "Mail from %s rejected - xbl; see http://www.spamhaus.org/query/bl?ip=%s"; | |
42 dnsbl dul dul.dnsbl.sorbs.net "Mail from %s rejected - dul; see http://www.sorbs.net/lookup.shtml?%s"; | |
43 dnsbl_list local sbl dul; | |
44 | |
45 content on { | |
46 filter sbl-xbl.spamhaus.org "Mail containing %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s"; | |
122 | 47 uribl multi.surbl.org "Mail containing %s rejected - surbl; see http://www.rulesemporium.com/cgi-bin/uribl.cgi?bl0=1&domain0=%s"; |
119 | 48 #uribl black.uribl.com "Mail containing %s rejected - uribl; see http://l.uribl.com/?d=%s"; |
94 | 49 ignore { include "hosts-ignore.conf"; }; |
50 tld { include "tld.conf"; }; | |
119 | 51 cctld { include "cctld.conf"; }; |
52 html_tags { include "html-tags.conf"; }; | |
94 | 53 html_limit off; |
54 host_limit soft 20; | |
55 }; | |
56 | |
57 env_to { | |
100
63e8633abc34
allow empty env_to at global context to remove all restrictions on child contexts
carl
parents:
94
diff
changeset
|
58 # !! replace this with your domain names |
63e8633abc34
allow empty env_to at global context to remove all restrictions on child contexts
carl
parents:
94
diff
changeset
|
59 # child contexts are not allowed to specify recipient addresses outside these domains |
63e8633abc34
allow empty env_to at global context to remove all restrictions on child contexts
carl
parents:
94
diff
changeset
|
60 # or leave this empty to allow unrestricted child contexts |
63e8633abc34
allow empty env_to at global context to remove all restrictions on child contexts
carl
parents:
94
diff
changeset
|
61 # example.com; |
94 | 62 }; |
63 | |
64 context whitelist { | |
65 content off {}; | |
66 env_to { | |
67 # dcc_to ok { include "/var/dcc/whitecommon"; }; | |
68 }; | |
69 env_from white {}; # white forces all unmatched from addresses (everyone in this case) to be whitelisted | |
70 # so all mail TO these env_to addresses is accepted | |
71 }; | |
72 | |
73 context abuse { | |
74 dnsbl_list xbl; | |
75 content off {}; | |
76 env_to { | |
77 abuse@ # no content filtering on abuse reports | |
78 postmaster@ # "" | |
79 }; | |
80 env_from unknown {}; # ignore all parent white/black listing | |
81 }; | |
82 | |
83 context minimal { | |
84 dnsbl_list sbl dul; | |
85 content on {}; | |
86 env_to { | |
87 }; | |
88 }; | |
89 | |
90 context blacklist { | |
91 env_to { | |
92 # dcc_to many { include "/var/dcc/whitecommon"; }; | |
93 }; | |
94 env_from black {}; # black forces all unmatched from addresses (everyone in this case) to be blacklisted | |
95 # so all mail TO these env_to addresses is rejected | |
96 }; | |
97 | |
98 env_from unknown { | |
99 abuse@ abuse; # replies to abuse reports use the abuse context | |
100 # dcc_from { include "/var/dcc/whitecommon"; }; | |
101 }; | |
102 }; | |
103 |