You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

rbl.conf 8.4KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323
  1. # Please don't modify this file as your changes might be overwritten with
  2. # the next update.
  3. #
  4. # You can modify 'local.d/rbl.conf' to add and merge
  5. # parameters defined inside this section
  6. #
  7. # You can modify 'override.d/rbl.conf' to strictly override all
  8. # parameters defined inside this section
  9. #
  10. # See https://rspamd.com/doc/faq.html#what-are-the-locald-and-overrided-directories
  11. # for details
  12. #
  13. # Module documentation can be found at https://rspamd.com/doc/modules/rbl.html
  14. rbl {
  15. default_exclude_users = true;
  16. default_exclude_local = true;
  17. default_unknown = true;
  18. default_dkim_domainonly = true;
  19. default_dkim_match_from = false;
  20. default_ipv4 = true;
  21. default_ipv6 = true;
  22. url_whitelist = [
  23. "https://maps.rspamd.com/rspamd/surbl-whitelist.inc.zst",
  24. "$LOCAL_CONFDIR/local.d/maps.d/surbl-whitelist.inc.local",
  25. "${DBDIR}/surbl-whitelist.inc.local",
  26. "fallback+file://${CONFDIR}/maps.d/surbl-whitelist.inc"
  27. ];
  28. rbls {
  29. spamhaus {
  30. symbol = "SPAMHAUS"; # Augmented by prefixes
  31. rbl = "zen.spamhaus.org";
  32. # Check types
  33. checks = ['received', 'from'];
  34. symbols_prefixes = {
  35. received = 'RECEIVED',
  36. from = 'RBL',
  37. }
  38. returncodes {
  39. SPAMHAUS_SBL = "127.0.0.2";
  40. SPAMHAUS_CSS = "127.0.0.3";
  41. SPAMHAUS_XBL = ["127.0.0.4", "127.0.0.5",
  42. "127.0.0.6", "127.0.0.7"];
  43. SPAMHAUS_PBL = ["127.0.0.10", "127.0.0.11"];
  44. SPAMHAUS_DROP = "127.0.0.9";
  45. SPAMHAUS_BLOCKED_OPENRESOLVER = "127.255.255.254";
  46. SPAMHAUS_BLOCKED= "127.255.255.255";
  47. }
  48. }
  49. mailspike {
  50. symbol = "MAILSPIKE";
  51. rbl = "rep.mailspike.net";
  52. is_whitelist = true;
  53. checks = ['from'];
  54. whitelist_exception = "MAILSPIKE";
  55. whitelist_exception = "RWL_MAILSPIKE_GOOD";
  56. whitelist_exception = "RWL_MAILSPIKE_NEUTRAL";
  57. whitelist_exception = "RWL_MAILSPIKE_POSSIBLE";
  58. whitelist_exception = "RBL_MAILSPIKE_WORST";
  59. whitelist_exception = "RBL_MAILSPIKE_VERYBAD";
  60. whitelist_exception = "RBL_MAILSPIKE_BAD";
  61. returncodes {
  62. RBL_MAILSPIKE_WORST = "127.0.0.10";
  63. RBL_MAILSPIKE_VERYBAD = "127.0.0.11";
  64. RBL_MAILSPIKE_BAD = "127.0.0.12";
  65. RWL_MAILSPIKE_NEUTRAL = ["127.0.0.16", "127.0.0.15", "127.0.0.14", "127.0.0.13"];
  66. RWL_MAILSPIKE_POSSIBLE = "127.0.0.17";
  67. RWL_MAILSPIKE_GOOD = "127.0.0.18";
  68. RWL_MAILSPIKE_VERYGOOD = "127.0.0.19";
  69. RWL_MAILSPIKE_EXCELLENT = "127.0.0.20";
  70. }
  71. }
  72. senderscore {
  73. symbol = "RBL_SENDERSCORE";
  74. checks = ['from'];
  75. rbl = "bl.score.senderscore.com";
  76. }
  77. sem {
  78. symbol = "RBL_SEM";
  79. rbl = "bl.spameatingmonkey.net";
  80. ipv6 = false;
  81. checks = ['from'];
  82. }
  83. semIPv6 {
  84. symbol = "RBL_SEM_IPV6";
  85. rbl = "bl.ipv6.spameatingmonkey.net";
  86. ipv4 = false;
  87. ipv6 = true;
  88. checks = ['from'];
  89. }
  90. dnswl {
  91. symbol = "RCVD_IN_DNSWL";
  92. rbl = "list.dnswl.org";
  93. ipv6 = true;
  94. checks = ['from', 'received'];
  95. is_whitelist = true;
  96. whitelist_exception = "RCVD_IN_DNSWL";
  97. whitelist_exception = "RCVD_IN_DNSWL_NONE";
  98. whitelist_exception = "RCVD_IN_DNSWL_LOW";
  99. whitelist_exception = "DNSWL_BLOCKED";
  100. returncodes {
  101. RCVD_IN_DNSWL_NONE = "127.0.%d+.0";
  102. RCVD_IN_DNSWL_LOW = "127.0.%d+.1";
  103. RCVD_IN_DNSWL_MED = "127.0.%d+.2";
  104. RCVD_IN_DNSWL_HI = "127.0.%d+.3";
  105. DNSWL_BLOCKED = "127.0.0.255";
  106. }
  107. }
  108. # Provided by https://virusfree.cz
  109. virusfree {
  110. symbol = "RBL_VIRUSFREE_UNKNOWN";
  111. rbl = "bip.virusfree.cz";
  112. ipv6 = true;
  113. checks = ['from'];
  114. returncodes {
  115. RBL_VIRUSFREE_BOTNET = "127.0.0.2";
  116. }
  117. }
  118. nixspam {
  119. symbol = "RBL_NIXSPAM";
  120. rbl = "ix.dnsbl.manitu.net";
  121. ipv6 = true;
  122. checks = ['from'];
  123. }
  124. blocklistde {
  125. symbols_prefixes = {
  126. received = 'RECEIVED',
  127. from = 'RBL',
  128. }
  129. symbol = "BLOCKLISTDE";
  130. rbl = "bl.blocklist.de";
  131. ipv6 = true;
  132. checks = ['from', 'received'];
  133. }
  134. # Dkim whitelist
  135. dnswl_dwl {
  136. symbol = "DWL_DNSWL";
  137. rbl = "dwl.dnswl.org";
  138. checks = ['dkim'];
  139. ignore_whitelist = true;
  140. unknown = false;
  141. returncodes {
  142. DWL_DNSWL_NONE = "127.0.%d+.0";
  143. DWL_DNSWL_LOW = "127.0.%d+.1";
  144. DWL_DNSWL_MED = "127.0.%d+.2";
  145. DWL_DNSWL_HI = "127.0.%d+.3";
  146. DWL_DNSWL_BLOCKED = "127.0.0.255";
  147. }
  148. }
  149. RSPAMD_EMAILBL {
  150. ignore_whitelist = true;
  151. ignore_defaults = true;
  152. emails_delimiter = ".";
  153. hash_format = "base32";
  154. hash_len = 32;
  155. rbl = "email.rspamd.com";
  156. checks = ['emails', 'replyto'];
  157. hash = "blake2";
  158. returncodes = {
  159. RSPAMD_EMAILBL = "127.0.0.2";
  160. }
  161. }
  162. MSBL_EBL {
  163. ignore_whitelist = true;
  164. ignore_defaults = true;
  165. rbl = "ebl.msbl.org";
  166. checks = ['emails', 'replyto'];
  167. emails_domainonly = false;
  168. hash = "sha1";
  169. returncodes = {
  170. MSBL_EBL = [
  171. "127.0.0.2",
  172. "127.0.0.3"
  173. ];
  174. MSBL_EBL_GREY = [
  175. "127.0.1.2",
  176. "127.0.1.3"
  177. ];
  178. }
  179. }
  180. # Old SURBL module
  181. "SURBL_MULTI" {
  182. ignore_defaults = true;
  183. rbl = "multi.surbl.org";
  184. checks = ['emails', 'dkim', 'urls'];
  185. emails_domainonly = true;
  186. returnbits = {
  187. CRACKED_SURBL = 128; # From February 2016
  188. ABUSE_SURBL = 64;
  189. MW_SURBL_MULTI = 16;
  190. PH_SURBL_MULTI = 8;
  191. SURBL_BLOCKED = 1;
  192. }
  193. }
  194. "URIBL_MULTI" {
  195. ignore_defaults = true;
  196. rbl = "multi.uribl.com";
  197. checks = ['emails', 'dkim', 'urls'];
  198. emails_domainonly = true;
  199. returnbits {
  200. URIBL_BLOCKED = 1;
  201. URIBL_BLACK = 2;
  202. URIBL_GREY = 4;
  203. URIBL_RED = 8;
  204. }
  205. }
  206. "RSPAMD_URIBL" {
  207. ignore_defaults = true;
  208. rbl = "uribl.rspamd.com";
  209. checks = ['emails', 'dkim', 'urls'];
  210. emails_domainonly = true;
  211. hash = 'blake2';
  212. hash_len = 32;
  213. hash_format = 'base32';
  214. returncodes = {
  215. RSPAMD_URIBL = [
  216. "127.0.0.2",
  217. ];
  218. }
  219. }
  220. "DBL" {
  221. ignore_defaults = true;
  222. rbl = "dbl.spamhaus.org";
  223. no_ip = true;
  224. checks = ['emails', 'dkim', 'urls'];
  225. emails_domainonly = true;
  226. returncodes = {
  227. # spam domain
  228. DBL_SPAM = "127.0.1.2";
  229. # phish domain
  230. DBL_PHISH = "127.0.1.4";
  231. # malware domain
  232. DBL_MALWARE = "127.0.1.5";
  233. # botnet C&C domain
  234. DBL_BOTNET = "127.0.1.6";
  235. # abused legit spam
  236. DBL_ABUSE = "127.0.1.102";
  237. # abused spammed redirector domain
  238. DBL_ABUSE_REDIR = "127.0.1.103";
  239. # abused legit phish
  240. DBL_ABUSE_PHISH = "127.0.1.104";
  241. # abused legit malware
  242. DBL_ABUSE_MALWARE = "127.0.1.105";
  243. # abused legit botnet C&C
  244. DBL_ABUSE_BOTNET = "127.0.1.106";
  245. # error - IP queries prohibited!
  246. DBL_PROHIBIT = "127.0.1.255";
  247. # issue #3074
  248. DBL_BLOCKED_OPENRESOLVER = "127.255.255.254";
  249. DBL_BLOCKED = "127.255.255.255";
  250. }
  251. }
  252. # Not enabled by default due to privacy concerns! (see also groups.d/surbl_group.conf)
  253. #"SPAMHAUS_ZEN_URIBL" {
  254. # suffix = "zen.spamhaus.org";
  255. # resolve_ip = true;
  256. # check_emails = true;
  257. # ips {
  258. # URIBL_SBL = "127.0.0.2";
  259. # URIBL_SBL_CSS = "127.0.0.3";
  260. # URIBL_XBL = ["127.0.0.4", "127.0.0.5", "127.0.0.6", "127.0.0.7"];
  261. # URIBL_PBL = ["127.0.0.10", "127.0.0.11"];
  262. # URIBL_DROP = "127.0.0.9";
  263. # }
  264. #}
  265. "SEM_URIBL_UNKNOWN" {
  266. ignore_defaults = true;
  267. rbl = "uribl.spameatingmonkey.net";
  268. no_ip = true;
  269. checks = ['emails', 'dkim', 'urls'];
  270. emails_domainonly = true;
  271. returnbits {
  272. SEM_URIBL = 2;
  273. }
  274. }
  275. "SEM_URIBL_FRESH15_UNKNOWN" {
  276. ignore_defaults = true;
  277. rbl = "fresh15.spameatingmonkey.net";
  278. no_ip = true;
  279. checks = ['emails', 'dkim', 'urls'];
  280. emails_domainonly = true;
  281. returnbits {
  282. SEM_URIBL_FRESH15 = 2;
  283. }
  284. }
  285. # Proved to be broken
  286. #"RBL_SARBL_BAD" {
  287. # suffix = "public.sarbl.org";
  288. # noip = true;
  289. # images = true;
  290. #}
  291. }
  292. .include(try=true,priority=5) "${DBDIR}/dynamic/rbl.conf"
  293. .include(try=true,priority=1,duplicate=merge) "$LOCAL_CONFDIR/local.d/rbl.conf"
  294. .include(try=true,priority=10) "$LOCAL_CONFDIR/override.d/rbl.conf"
  295. }