mirror of
https://github.com/rspamd/rspamd.git
synced 2024-07-29 08:17:22 +02:00
126 lines
3.8 KiB
Plaintext
126 lines
3.8 KiB
Plaintext
# Please don't modify this file as your changes might be overwritten with
|
|
# the next update.
|
|
#
|
|
# You can modify '$LOCAL_CONFDIR/rspamd.conf.local.override' to redefine
|
|
# parameters defined on the top level
|
|
#
|
|
# You can modify '$LOCAL_CONFDIR/rspamd.conf.local' to add
|
|
# parameters defined on the top level
|
|
#
|
|
# For specific modules or configuration you can also modify
|
|
# '$LOCAL_CONFDIR/local.d/file.conf' - to add your options or rewrite defaults
|
|
# '$LOCAL_CONFDIR/override.d/file.conf' - to override the defaults
|
|
#
|
|
# See https://rspamd.com/doc/tutorials/writing_rules.html for details
|
|
|
|
surbl {
|
|
whitelist = [
|
|
"https://maps.rspamd.com/rspamd/surbl-whitelist.inc.zst",
|
|
"${DBDIR}/surbl-whitelist.inc.local",
|
|
"fallback+file://${CONFDIR}/surbl-whitelist.inc"
|
|
];
|
|
exceptions = [
|
|
"https://maps.rspamd.com/rspamd/2tld.inc.zst",
|
|
"${DBDIR}/2tld.inc.local",
|
|
"fallback+file://${CONFDIR}/2tld.inc"
|
|
];
|
|
|
|
rules {
|
|
"SURBL_MULTI" {
|
|
suffix = "multi.surbl.org";
|
|
check_dkim = true;
|
|
bits {
|
|
CRACKED_SURBL = 128; # From February 2016
|
|
ABUSE_SURBL = 64;
|
|
MW_SURBL_MULTI = 16;
|
|
PH_SURBL_MULTI = 8;
|
|
SURBL_BLOCKED = 1;
|
|
}
|
|
}
|
|
"URIBL_MULTI" {
|
|
suffix = "multi.uribl.com";
|
|
check_dkim = true;
|
|
bits {
|
|
URIBL_BLOCKED = 1;
|
|
URIBL_BLACK = 2;
|
|
URIBL_GREY = 4;
|
|
URIBL_RED = 8;
|
|
}
|
|
}
|
|
"RSPAMD_URIBL" {
|
|
suffix = "uribl.rspamd.com";
|
|
check_dkim = true;
|
|
process_script =<<EOD
|
|
function(url, suffix)
|
|
local cr = require "rspamd_cryptobox_hash"
|
|
local h = cr.create(url):base32():sub(1, 32)
|
|
return string.format("%s.%s", h, suffix)
|
|
end
|
|
EOD;
|
|
}
|
|
"DBL" {
|
|
suffix = "dbl.spamhaus.org";
|
|
no_ip = true;
|
|
check_dkim = true;
|
|
|
|
ips = {
|
|
# spam domain
|
|
DBL_SPAM = "127.0.1.2";
|
|
# phish domain
|
|
DBL_PHISH = "127.0.1.4";
|
|
# malware domain
|
|
DBL_MALWARE = "127.0.1.5";
|
|
# botnet C&C domain
|
|
DBL_BOTNET = "127.0.1.6";
|
|
# abused legit spam
|
|
DBL_ABUSE = "127.0.1.102";
|
|
# abused spammed redirector domain
|
|
DBL_ABUSE_REDIR = "127.0.1.103";
|
|
# abused legit phish
|
|
DBL_ABUSE_PHISH = "127.0.1.104";
|
|
# abused legit malware
|
|
DBL_ABUSE_MALWARE = "127.0.1.105";
|
|
# abused legit botnet C&C
|
|
DBL_ABUSE_BOTNET = "127.0.1.106";
|
|
# error - IP queries prohibited!
|
|
DBL_PROHIBIT = "127.0.1.255";
|
|
}
|
|
}
|
|
|
|
"SBL_URIBL" {
|
|
suffix = "sbl.spamhaus.org";
|
|
resolve_ip = true;
|
|
ips {
|
|
URIBL_SBL = "127.0.0.2";
|
|
URIBL_SBL_CSS = "127.0.0.3";
|
|
}
|
|
}
|
|
|
|
"SEM_URIBL_UNKNOWN" {
|
|
suffix = "uribl.spameatingmonkey.net";
|
|
bits {
|
|
SEM_URIBL = 2;
|
|
}
|
|
no_ip = true;
|
|
}
|
|
|
|
"SEM_URIBL_FRESH15_UNKNOWN" {
|
|
suffix = "fresh15.spameatingmonkey.net";
|
|
bits {
|
|
SEM_URIBL_FRESH15 = 2;
|
|
}
|
|
no_ip = true;
|
|
}
|
|
|
|
"RBL_SARBL_BAD" {
|
|
suffix = "public.sarbl.org";
|
|
noip = true;
|
|
images = true;
|
|
}
|
|
}
|
|
|
|
.include(try=true,priority=5) "${DBDIR}/dynamic/surbl.conf"
|
|
.include(try=true,priority=1,duplicate=merge) "$LOCAL_CONFDIR/local.d/surbl.conf"
|
|
.include(try=true,priority=10) "$LOCAL_CONFDIR/override.d/surbl.conf"
|
|
}
|