You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

rbl.conf 8.3KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319
  1. # Please don't modify this file as your changes might be overwritten with
  2. # the next update.
  3. #
  4. # You can modify 'local.d/rbl.conf' to add and merge
  5. # parameters defined inside this section
  6. #
  7. # You can modify 'override.d/rbl.conf' to strictly override all
  8. # parameters defined inside this section
  9. #
  10. # See https://rspamd.com/doc/faq.html#what-are-the-locald-and-overrided-directories
  11. # for details
  12. #
  13. # Module documentation can be found at https://rspamd.com/doc/modules/rbl.html
  14. rbl {
  15. default_exclude_users = true;
  16. default_unknown = true;
  17. url_whitelist = [
  18. "https://maps.rspamd.com/rspamd/surbl-whitelist.inc.zst",
  19. "$LOCAL_CONFDIR/local.d/maps.d/surbl-whitelist.inc.local",
  20. "${DBDIR}/surbl-whitelist.inc.local",
  21. "fallback+file://${CONFDIR}/maps.d/surbl-whitelist.inc"
  22. ];
  23. rbls {
  24. spamhaus {
  25. symbol = "SPAMHAUS"; # Augmented by prefixes
  26. rbl = "zen.spamhaus.org";
  27. # Check types
  28. checks = ['received', 'from'];
  29. symbols_prefixes = {
  30. received = 'RECEIVED',
  31. from = 'RBL',
  32. }
  33. returncodes {
  34. SPAMHAUS_SBL = "127.0.0.2";
  35. SPAMHAUS_CSS = "127.0.0.3";
  36. SPAMHAUS_XBL = ["127.0.0.4", "127.0.0.5",
  37. "127.0.0.6", "127.0.0.7"];
  38. SPAMHAUS_PBL = ["127.0.0.10", "127.0.0.11"];
  39. SPAMHAUS_DROP = "127.0.0.9";
  40. SPAMHAUS_BLOCKED_OPENRESOLVER = "127.255.255.254";
  41. SPAMHAUS_BLOCKED= "127.255.255.255";
  42. }
  43. }
  44. mailspike {
  45. symbol = "MAILSPIKE";
  46. rbl = "rep.mailspike.net";
  47. is_whitelist = true;
  48. checks = ['from'];
  49. whitelist_exception = "MAILSPIKE";
  50. whitelist_exception = "RWL_MAILSPIKE_GOOD";
  51. whitelist_exception = "RWL_MAILSPIKE_NEUTRAL";
  52. whitelist_exception = "RWL_MAILSPIKE_POSSIBLE";
  53. whitelist_exception = "RBL_MAILSPIKE_WORST";
  54. whitelist_exception = "RBL_MAILSPIKE_VERYBAD";
  55. whitelist_exception = "RBL_MAILSPIKE_BAD";
  56. returncodes {
  57. RBL_MAILSPIKE_WORST = "127.0.0.10";
  58. RBL_MAILSPIKE_VERYBAD = "127.0.0.11";
  59. RBL_MAILSPIKE_BAD = "127.0.0.12";
  60. RWL_MAILSPIKE_NEUTRAL = ["127.0.0.16", "127.0.0.15", "127.0.0.14", "127.0.0.13"];
  61. RWL_MAILSPIKE_POSSIBLE = "127.0.0.17";
  62. RWL_MAILSPIKE_GOOD = "127.0.0.18";
  63. RWL_MAILSPIKE_VERYGOOD = "127.0.0.19";
  64. RWL_MAILSPIKE_EXCELLENT = "127.0.0.20";
  65. }
  66. }
  67. senderscore {
  68. symbol = "RBL_SENDERSCORE";
  69. checks = ['from'];
  70. rbl = "bl.score.senderscore.com";
  71. }
  72. sem {
  73. symbol = "RBL_SEM";
  74. rbl = "bl.spameatingmonkey.net";
  75. ipv6 = false;
  76. checks = ['from'];
  77. }
  78. semIPv6 {
  79. symbol = "RBL_SEM_IPV6";
  80. rbl = "bl.ipv6.spameatingmonkey.net";
  81. ipv4 = false;
  82. ipv6 = true;
  83. checks = ['from'];
  84. }
  85. dnswl {
  86. symbol = "RCVD_IN_DNSWL";
  87. rbl = "list.dnswl.org";
  88. ipv6 = true;
  89. checks = ['from', 'received'];
  90. is_whitelist = true;
  91. whitelist_exception = "RCVD_IN_DNSWL";
  92. whitelist_exception = "RCVD_IN_DNSWL_NONE";
  93. whitelist_exception = "RCVD_IN_DNSWL_LOW";
  94. whitelist_exception = "DNSWL_BLOCKED";
  95. returncodes {
  96. RCVD_IN_DNSWL_NONE = "127.0.%d+.0";
  97. RCVD_IN_DNSWL_LOW = "127.0.%d+.1";
  98. RCVD_IN_DNSWL_MED = "127.0.%d+.2";
  99. RCVD_IN_DNSWL_HI = "127.0.%d+.3";
  100. DNSWL_BLOCKED = "127.0.0.255";
  101. }
  102. }
  103. # Provided by https://virusfree.cz
  104. virusfree {
  105. symbol = "RBL_VIRUSFREE_UNKNOWN";
  106. rbl = "bip.virusfree.cz";
  107. ipv6 = true;
  108. checks = ['from'];
  109. returncodes {
  110. RBL_VIRUSFREE_BOTNET = "127.0.0.2";
  111. }
  112. }
  113. nixspam {
  114. symbol = "RBL_NIXSPAM";
  115. rbl = "ix.dnsbl.manitu.net";
  116. ipv6 = true;
  117. checks = ['from'];
  118. }
  119. blocklistde {
  120. symbols_prefixes = {
  121. received = 'RECEIVED',
  122. from = 'RBL',
  123. }
  124. symbol = "BLOCKLISTDE";
  125. rbl = "bl.blocklist.de";
  126. ipv6 = true;
  127. checks = ['from', 'received'];
  128. }
  129. # Dkim whitelist
  130. dnswl_dwl {
  131. symbol = "DWL_DNSWL";
  132. rbl = "dwl.dnswl.org";
  133. checks = ['dkim'];
  134. ignore_whitelist = true;
  135. unknown = false;
  136. returncodes {
  137. DWL_DNSWL_NONE = "127.0.%d+.0";
  138. DWL_DNSWL_LOW = "127.0.%d+.1";
  139. DWL_DNSWL_MED = "127.0.%d+.2";
  140. DWL_DNSWL_HI = "127.0.%d+.3";
  141. DWL_DNSWL_BLOCKED = "127.0.0.255";
  142. }
  143. }
  144. RSPAMD_EMAILBL {
  145. ignore_whitelist = true;
  146. ignore_defaults = true;
  147. emails_delimiter = ".";
  148. hash_format = "base32";
  149. hash_len = 32;
  150. rbl = "email.rspamd.com";
  151. checks = ['emails', 'replyto'];
  152. hash = "blake2";
  153. returncodes = {
  154. RSPAMD_EMAILBL = "127.0.0.2";
  155. }
  156. }
  157. MSBL_EBL {
  158. ignore_whitelist = true;
  159. ignore_defaults = true;
  160. rbl = "ebl.msbl.org";
  161. checks = ['emails', 'replyto'];
  162. emails_domainonly = false;
  163. hash = "sha1";
  164. returncodes = {
  165. MSBL_EBL = [
  166. "127.0.0.2",
  167. "127.0.0.3"
  168. ];
  169. MSBL_EBL_GREY = [
  170. "127.0.1.2",
  171. "127.0.1.3"
  172. ];
  173. }
  174. }
  175. # Old SURBL module
  176. "SURBL_MULTI" {
  177. ignore_defaults = true;
  178. rbl = "multi.surbl.org";
  179. checks = ['emails', 'dkim', 'urls'];
  180. emails_domainonly = true;
  181. returnbits = {
  182. CRACKED_SURBL = 128; # From February 2016
  183. ABUSE_SURBL = 64;
  184. MW_SURBL_MULTI = 16;
  185. PH_SURBL_MULTI = 8;
  186. SURBL_BLOCKED = 1;
  187. }
  188. }
  189. "URIBL_MULTI" {
  190. ignore_defaults = true;
  191. rbl = "multi.uribl.com";
  192. checks = ['emails', 'dkim', 'urls'];
  193. emails_domainonly = true;
  194. returnbits {
  195. URIBL_BLOCKED = 1;
  196. URIBL_BLACK = 2;
  197. URIBL_GREY = 4;
  198. URIBL_RED = 8;
  199. }
  200. }
  201. "RSPAMD_URIBL" {
  202. ignore_defaults = true;
  203. rbl = "uribl.rspamd.com";
  204. checks = ['emails', 'dkim', 'urls'];
  205. emails_domainonly = true;
  206. hash = 'blake2';
  207. hash_len = 32;
  208. hash_format = 'base32';
  209. returncodes = {
  210. RSPAMD_URIBL = [
  211. "127.0.0.2",
  212. ];
  213. }
  214. }
  215. "DBL" {
  216. ignore_defaults = true;
  217. rbl = "dbl.spamhaus.org";
  218. no_ip = true;
  219. checks = ['emails', 'dkim', 'urls'];
  220. emails_domainonly = true;
  221. returncodes = {
  222. # spam domain
  223. DBL_SPAM = "127.0.1.2";
  224. # phish domain
  225. DBL_PHISH = "127.0.1.4";
  226. # malware domain
  227. DBL_MALWARE = "127.0.1.5";
  228. # botnet C&C domain
  229. DBL_BOTNET = "127.0.1.6";
  230. # abused legit spam
  231. DBL_ABUSE = "127.0.1.102";
  232. # abused spammed redirector domain
  233. DBL_ABUSE_REDIR = "127.0.1.103";
  234. # abused legit phish
  235. DBL_ABUSE_PHISH = "127.0.1.104";
  236. # abused legit malware
  237. DBL_ABUSE_MALWARE = "127.0.1.105";
  238. # abused legit botnet C&C
  239. DBL_ABUSE_BOTNET = "127.0.1.106";
  240. # error - IP queries prohibited!
  241. DBL_PROHIBIT = "127.0.1.255";
  242. # issue #3074
  243. DBL_BLOCKED_OPENRESOLVER = "127.255.255.254";
  244. DBL_BLOCKED = "127.255.255.255";
  245. }
  246. }
  247. # Not enabled by default due to privacy concerns! (see also groups.d/surbl_group.conf)
  248. "SPAMHAUS_ZEN_URIBL" {
  249. enabled = false;
  250. rbl = "zen.spamhaus.org";
  251. checks = ['emails'];
  252. resolve_ip = true;
  253. returncodes = {
  254. URIBL_SBL = "127.0.0.2";
  255. URIBL_SBL_CSS = "127.0.0.3";
  256. URIBL_XBL = ["127.0.0.4", "127.0.0.5", "127.0.0.6", "127.0.0.7"];
  257. URIBL_PBL = ["127.0.0.10", "127.0.0.11"];
  258. URIBL_DROP = "127.0.0.9";
  259. }
  260. }
  261. "SEM_URIBL_UNKNOWN" {
  262. ignore_defaults = true;
  263. rbl = "uribl.spameatingmonkey.net";
  264. no_ip = true;
  265. checks = ['emails', 'dkim', 'urls'];
  266. emails_domainonly = true;
  267. returnbits {
  268. SEM_URIBL = 2;
  269. }
  270. }
  271. "SEM_URIBL_FRESH15_UNKNOWN" {
  272. ignore_defaults = true;
  273. rbl = "fresh15.spameatingmonkey.net";
  274. no_ip = true;
  275. checks = ['emails', 'dkim', 'urls'];
  276. emails_domainonly = true;
  277. returnbits {
  278. SEM_URIBL_FRESH15 = 2;
  279. }
  280. }
  281. # Proved to be broken
  282. #"RBL_SARBL_BAD" {
  283. # suffix = "public.sarbl.org";
  284. # noip = true;
  285. # images = true;
  286. #}
  287. }
  288. .include(try=true,priority=5) "${DBDIR}/dynamic/rbl.conf"
  289. .include(try=true,priority=1,duplicate=merge) "$LOCAL_CONFDIR/local.d/rbl.conf"
  290. .include(try=true,priority=10) "$LOCAL_CONFDIR/override.d/rbl.conf"
  291. }