comparison xml/dnsbl.in @ 171:8deb51871b3d

fix pre/post scripts in rpm spec file
author carl
date Thu, 30 Aug 2007 14:40:03 -0700
parents bd33eaccfed8
children d3189495ec68
comparison
equal deleted inserted replaced
170:bd33eaccfed8 171:8deb51871b3d
629 context main-default { 629 context main-default {
630 // outbound dnsbl filtering to catch our own customers that end up on the sbl 630 // outbound dnsbl filtering to catch our own customers that end up on the sbl
631 dnsbl localp partial.blackholes.five-ten-sg.com "Mail from %s rejected - local; see http://www.five-ten-sg.com/blackhole.php?%s"; 631 dnsbl localp partial.blackholes.five-ten-sg.com "Mail from %s rejected - local; see http://www.five-ten-sg.com/blackhole.php?%s";
632 dnsbl local blackholes.five-ten-sg.com "Mail from %s rejected - local; see http://www.five-ten-sg.com/blackhole.php?%s"; 632 dnsbl local blackholes.five-ten-sg.com "Mail from %s rejected - local; see http://www.five-ten-sg.com/blackhole.php?%s";
633 dnsbl sbl sbl-xbl.spamhaus.org "Mail from %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s"; 633 dnsbl sbl sbl-xbl.spamhaus.org "Mail from %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s";
634 dnsbl dul dul.dnsbl.sorbs.net "Mail from %s rejected - dul; see http://www.sorbs.net/lookup.shtml?%s"; 634 dnsbl_list local sbl;
635 dnsbl_list local sbl dul;
636 635
637 // outbound content filtering to prevent our own customers from sending spam 636 // outbound content filtering to prevent our own customers from sending spam
638 content on { 637 content on {
639 filter sbl-xbl.spamhaus.org "Mail containing %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s"; 638 filter sbl-xbl.spamhaus.org "Mail containing %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s";
640 uribl multi.surbl.org "Mail containing %s rejected - surbl; see http://www.rulesemporium.com/cgi-bin/uribl.cgi?bl0=1&domain0=%s"; 639 uribl multi.surbl.org "Mail containing %s rejected - surbl; see http://www.rulesemporium.com/cgi-bin/uribl.cgi?bl0=1&domain0=%s";
645 html_tags { include "html-tags.conf"; }; 644 html_tags { include "html-tags.conf"; };
646 html_limit on 20 "Mail containing excessive bad html tags rejected"; 645 html_limit on 20 "Mail containing excessive bad html tags rejected";
647 html_limit off; 646 html_limit off;
648 host_limit on 20 "Mail containing excessive host names rejected"; 647 host_limit on 20 "Mail containing excessive host names rejected";
649 host_limit soft 20; 648 host_limit soft 20;
649 spamassassin 4;
650 }; 650 };
651 651
652 // backscatter prevention - don't send bounces for mail that we accepted but could not forward 652 // backscatter prevention - don't send bounces for mail that we accepted but could not forward
653 // we only send bounces to our own customers 653 // we only send bounces to our own customers
654 env_from unknown { 654 env_from unknown {
655 "<>" black; 655 "<>" black;
656 }; 656 };
657 657
658 // hourly recipient rate limit by smtp auth client id 658 // hourly recipient rate limit by smtp auth client id
659 rate_limit 30 { // default 659 rate_limit 30 { // default
660 fred 100; // override default limits 660 #fred 100; // override default limits
661 joe 10; // "" 661 #joe 10; // ""
662 }; 662 };
663 }; 663 };
664 664
665 context sample { 665 context main {
666 dnsbl localp partial.blackholes.five-ten-sg.com "Mail from %s rejected - local; see http://www.five-ten-sg.com/blackhole.php?%s";
666 dnsbl local blackholes.five-ten-sg.com "Mail from %s rejected - local; see http://www.five-ten-sg.com/blackhole.php?%s"; 667 dnsbl local blackholes.five-ten-sg.com "Mail from %s rejected - local; see http://www.five-ten-sg.com/blackhole.php?%s";
667 dnsbl sbl sbl-xbl.spamhaus.org "Mail from %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s"; 668 dnsbl sbl sbl-xbl.spamhaus.org "Mail from %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s";
668 dnsbl xbl xbl.spamhaus.org "Mail from %s rejected - xbl; see http://www.spamhaus.org/query/bl?ip=%s"; 669 dnsbl xbl xbl.spamhaus.org "Mail from %s rejected - xbl; see http://www.spamhaus.org/query/bl?ip=%s";
669 dnsbl dul dul.dnsbl.sorbs.net "Mail from %s rejected - dul; see http://www.sorbs.net/lookup.shtml?%s"; 670 dnsbl_list local sbl;
670 dnsbl_list local sbl dul;
671 671
672 content on { 672 content on {
673 filter sbl-xbl.spamhaus.org "Mail containing %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s"; 673 filter sbl-xbl.spamhaus.org "Mail containing %s rejected - sbl; see http://www.spamhaus.org/query/bl?ip=%s";
674 uribl multi.surbl.org "Mail containing %s rejected - surbl; see http://www.rulesemporium.com/cgi-bin/uribl.cgi?bl0=1&domain0=%s"; 674 uribl multi.surbl.org "Mail containing %s rejected - surbl; see http://www.rulesemporium.com/cgi-bin/uribl.cgi?bl0=1&domain0=%s";
675 #uribl black.uribl.com "Mail containing %s rejected - uribl; see http://l.uribl.com/?d=%s"; 675 #uribl black.uribl.com "Mail containing %s rejected - uribl; see http://l.uribl.com/?d=%s";
676 ignore { include "hosts-ignore.conf"; }; 676 ignore { include "hosts-ignore.conf"; };
677 tld { include "tld.conf"; }; 677 tld { include "tld.conf"; };
678 cctld { include "cctld.conf"; }; 678 cctld { include "cctld.conf"; };
679 html_tags { include "html-tags.conf"; }; 679 html_tags { include "html-tags.conf"; };
680 html_limit on 20 "Mail containing excessive bad html tags rejected";
681 html_limit off; 680 html_limit off;
682 host_limit on 20 "Mail containing excessive host names rejected";
683 host_limit soft 20; 681 host_limit soft 20;
684 }; 682 spamassassin 5;
683 };
684
685 generic "(^|[.-])(host)?([0-9]{1,3}[.-](Red-|dynamic[.-])?){4}"
686 "your mail server %s seems to have a generic name";
685 687
686 env_to { 688 env_to {
689 # !! replace this with your domain names
687 # child contexts are not allowed to specify recipient addresses outside these domains 690 # child contexts are not allowed to specify recipient addresses outside these domains
688 # leave this outer global context env_to empty to allow arbitrary recipients in child contexts 691 # or leave this empty to allow unrestricted child contexts
689 mydomain.com; 692 # example.com;
690 customer1.com;
691 customer1a.com;
692 customer1b.com;
693 customer2.com;
694 customer2a.com;
695 customer2b.com;
696 }; 693 };
697 694
698 context whitelist { 695 context whitelist {
699 content off {}; 696 content off {};
700 env_to { 697 env_to {
701 # dcc_to ok { include "/var/dcc/whitecommon"; }; # copy the dcc OK values (env_to) into this context 698 # dcc_to ok { include "/var/dcc/whitecommon"; };
702 }; 699 };
703 env_from white {}; # white forces all unmatched from addresses (everyone in this case) to be whitelisted 700 env_from white {}; # white forces all unmatched from addresses (everyone in this case) to be whitelisted
704 # so all mail TO these env_to addresses is accepted 701 # so all mail TO these env_to addresses is accepted
705 }; 702 };
706 703
707 context minimal {
708 dnsbl_list sbl dul;
709 content on {};
710 env_to {
711 sales@mydomain.com;
712 };
713 };
714
715 context blacklist {
716 env_to {
717 dcc_to many { include "/var/dcc/whitecommon"; }; # copy the dcc MANY values (env_to) into this context
718 old-employee@mydomain.com;
719 };
720 env_from black {}; # black forces all unmatched from addresses (everyone in this case) to be blacklisted
721 # so all mail TO these env_to addresses is rejected
722 };
723
724 context vp { # special context for the vp
725 env_to {
726 vp@mydomain.com;
727 };
728 env_from inherit {
729 nai.com black; # the vp does not like nai
730 yahoo.com unknown; # override parent context blacklisting
731 mother@spammyisp.com white; # suppress dnsbl checking
732 };
733 };
734
735 context customer1 {
736 dnsbl_list sbl dul;
737 env_to {
738 customer1.com;
739 customer1a.com;
740 customer1b.com;
741 };
742
743 # we can reject unknown users
744 verify mail.customer1.com;
745
746 # whitelist anyone to whom we have sent mail in the last 90 days
747 autowhite 90 "autowhite/customer1";
748
749 context customer1a {
750 env_to {
751 customer1a.com;
752 };
753 env_from black { # blacklist everything
754 first@acceptable.com unknown; # except these specific envelope senders
755 second@another.com unknown;
756 yahoo.com inherit; # delegate to the parent
757 };
758 };
759
760 env_from { # default value of the default is inherit
761 yahoo.com black; # no mail from yahoo
762 first@yahoo.com unknown; # except this one
763 };
764 };
765
766 context customer2 {
767 dnsbl_list sbl;
768 env_to {
769 customer2.com;
770 customer2a.com;
771 customer2b.com;
772 };
773 };
774
775 # this is at the end, so that these abuse@ and postmaster@ entries will
776 # override any conflicting entries inside the customer contexts.
777 context abuse { 704 context abuse {
778 dnsbl_list xbl; 705 dnsbl_list xbl;
779 content off {}; 706 content off {};
780 env_to { 707 env_to {
781 abuse@; # no content filtering on abuse reports 708 abuse@ # no content filtering on abuse reports
782 postmaster@; # "" 709 postmaster@ # ""
783 }; 710 };
784 env_from unknown {}; # ignore all parent white/black listing 711 env_from unknown {}; # ignore all parent white/black listing
785 }; 712 };
786 713
714 context minimal {
715 dnsbl_list sbl;
716 content on {};
717 generic "^$ " " "; # regex cannot match, to disable generic rdns rejects
718 env_to {
719 };
720 };
721
722 context blacklist {
723 env_to {
724 # dcc_to many { include "/var/dcc/whitecommon"; };
725 };
726 env_from black {}; # black forces all unmatched from addresses (everyone in this case) to be blacklisted
727 # so all mail TO these env_to addresses is rejected
728 };
729
787 env_from unknown { 730 env_from unknown {
788 dcc_from { include "/var/dcc/whitecommon"; }; # copy the dcc OK/MANY values (env_from, substitute mail_host) into this context 731 abuse@ abuse; # replies to abuse reports use the abuse context
789 abuse@ abuse; # replies to abuse reports use the abuse context 732 # dcc_from { include "/var/dcc/whitecommon"; };
790 yahoo.com black; # don't take mail from yahoo 733 };
791 spammer@example.com black; 734
792 }; 735 autowhite 90 "autowhite/my-auto-whitelist";
736 # install should create /etc/dnsbl/autowhite writable by userid dnsbl
793 };]]></literallayout> 737 };]]></literallayout>
794 </refsect1> 738 </refsect1>
795 739
796 <refsect1 id='version.5'> 740 <refsect1 id='version.5'>
797 <title>CVS Version</title> 741 <title>CVS Version</title>