summaryrefslogtreecommitdiffstats
path: root/src/plugins/lua
Commit message (Collapse)AuthorAgeFilesLines
...
* | [Fix] Fix dynamic_symbols in the multimap pluginVsevolod Stakhov2024-05-201-2/+2
|/
* [Minor] Add bad file types commonly found in archives attached to malspamtwesterhever2024-04-281-0/+4
|
* [Enhancement] Exclude false positives of MIME_DOUBLE_BAD_EXTENSIONDmitriy Alekseev2024-04-111-1/+6
| | | If we detected extension of the file and this extension is equal to the real extension then we should not pass second extension to check function as it will trigger false positive for MIME_DOUBLE_BAD_EXTENSION.
* [Fix] Honor dynamic thresholds for greylisting moduleVsevolod Stakhov2024-04-051-1/+1
|
* [Minor] Remove redundant metric nameVsevolod Stakhov2024-04-051-1/+1
|
* [Fix] Update greylisting threshold as it can be easily dynamicVsevolod Stakhov2024-04-051-7/+4
| | | | | Issue: #4908 Closes: #4908
* [Minor] Fix format of example setting (rspamd.com#736)Andrew Lewis2024-03-251-1/+1
|
* [Rework] Another rework of the dkim signing logicVsevolod Stakhov2024-03-091-21/+18
|
* [Rework] Allow multiple conditions for dkim signing when using vault/redisVsevolod Stakhov2024-03-091-1/+1
|
* [Fix] Allow different template expansion parametersVsevolod Stakhov2024-02-211-3/+3
| | | | Probably one of the most dirty hacks I've used in the Lua code in Rspamd...
* Revert "[Fix] Fix history key, as we use `{=` and not `{{` in templates"Vsevolod Stakhov2024-02-211-1/+1
|
* [Fix] Fix history key, as we use `{=` and not `{{` in templatesVsevolod Stakhov2024-02-211-1/+1
|
* [Fix] Encode headers in metadata exporterVsevolod Stakhov2024-02-131-7/+8
| | | | Issue: #4808
* [Minor] Fix doc stringVsevolod Stakhov2024-01-291-1/+1
|
* [Feature] Allow to add templates to redis history prefixVsevolod Stakhov2024-01-291-11/+14
| | | | | Issue: #4793 Closes: #4793
* [Rework] Breaking: Do not report module as actionAlexander Moisseev2024-01-281-2/+1
| | | | | | | | in the /history response since we have the `passthrough_module` key for that purpose. While that might be handy in some situations, mixing actions and module names is confusing in general.
* [Minor] Allow the same logic for recipientsVsevolod Stakhov2024-01-271-5/+41
|
* [Feature] Add extraction type for `from` mapsVsevolod Stakhov2024-01-271-5/+29
| | | | | | | | | Attribute name: `extract_from`. Possible values: * `default` - try smtp, if not exists try mime * `mime` - check mime only * `smtp` - check smtp only * `both` - try to match both
* [Minor] rbl: fix warningAndrew Lewis2024-01-251-1/+1
|
* [Fix] multimap: rawtext: use decoded partsAndrew Lewis2024-01-191-1/+1
|
* [Feature] Support suppressing DMARC reporting for particular recipientsAndrew Lewis2024-01-101-1/+13
|
* [Minor] Fix typo in hfilter mapmoisseev2023-12-241-2/+2
|
* [Minor] Log a debug message when ratelimit skippedmoisseev2023-12-221-0/+1
| | | | for a local request
* [Minor] ratelimit: make per-bucket symbol behave like global symbolAndrew Lewis2023-12-211-1/+1
|
* [Feature] rbl: support disabling or replacing url_whitelist per RBLAndrew Lewis2023-12-121-2/+2
|
* [Fix] known_senders: fix config handlingAndrew Lewis2023-11-091-2/+3
|
* [Minor] force_actions: set a group for symbolsAndrew Lewis2023-11-041-1/+3
|
* Merge pull request #4678 from fatalbanana/rbl_exclude_localVsevolod Stakhov2023-11-031-4/+2
|\ | | | | [Fix] rbl: unbreak `exclude_local`
| * [Fix] rbl: fix `exclude_local`Andrew Lewis2023-11-031-4/+2
| |
* | [Minor] Treat *.zpaq attachments as archives and harmfultwesterhever2023-11-031-0/+2
|/ | | | Rationale: https://dshield.org/diary/Malware+Dropped+Through+a+ZPAQ+Archive/30366/
* Merge pull request #4657 from fatalbanana/rbl_matchersVsevolod Stakhov2023-10-261-8/+68
|\ | | | | [Feature] rbl: support use of different matchers for return codes
| * [Minor] Reiterate on the previous changesAndrew Lewis2023-10-261-4/+4
| | | | | | | | | | - Demote message to info level - Name it returncodes_matcher for better specificity
| * [Feature] rbl: support globbed return codesAndrew Lewis2023-10-251-1/+11
| |
| * [Feature] rbl: support checking returncodes by CIDRAndrew Lewis2023-10-251-19/+41
| |
| * [Feature] rbl: support checking returncodes by regexAndrew Lewis2023-10-241-0/+13
| |
| * [Minor] rbl: support use of different matchers for return codesAndrew Lewis2023-10-241-3/+18
| |
* | [Minor] Remove duplicate *.app attachment typetwesterhever2023-10-251-1/+0
| | | | | | | | Reported by @fatalbanana.
* | Revert "[Minor] Increase scoring of *.exe attachments"twesterhever2023-10-241-1/+1
| | | | | | | | | | | | Reverted based on feedback by @moisseev. This reverts commit 8171424d846a3e33b5d0f9f7f4ee09ec8d553a03.
* | [Minor] Add additional bad attachment typestwesterhever2023-10-221-0/+11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | - app: Executable Application, blocked in Outlook by default - aspx: Active Server Page Extended, blocked in Outlook by default - dll: Dynamic-link Library - dqy: Microsoft Query File, blocking recommended in MS365 - iqy: ditto - mht: MHTML File, often abused for phishing and exploit attempts - mhtml: ditto - oqy: Microsoft Query File, blocking recommended in MS365 - rqy: ditto - slk: Microsoft Symbolic Link - wim: Windows Imaging Format
* | [Minor] Increase scoring of *.exe attachmentstwesterhever2023-10-221-1/+1
| | | | | | | | | | These are already banned in most environments, including GMail and Outlook. We may as well bump this score up to 4 eventually.
* | [Minor] Incorporate additional bad attachments from Microsofttwesterhever2023-10-221-0/+9
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | These are as follows: - htc: HTML Component File - pyc: Compiled Python Script - pyo: Optimized Compiled Python Module - pyw: Python Script To Be Executed With Suppressed Terminal Window - pyz: Python Zip Application - pyzw: Python Zip Application - vhd: Virtual Hard Disk - vhdx: Virtual Hard Disk Extended - wsf: Windows Script File Note that the Python file types remain unscored in archives, so distribution of these in source tarballs and the like is not affected by this commit. Source: https://support.microsoft.com/en-us/office/blocked-attachments-in-outlook-434752e1-02d3-4e90-9124-8b81e49a8519?ui=en-us&rs=en-us&ad=us
* | [Minor] Refer to third parties for attachment handling whenever possibletwesterhever2023-10-221-6/+6
|/ | | | | | | This avoids confusion and enqueries to the rspamd project, if it is made clear that the decision to score certain attachments high has been incorporated from a well-known third party, such as Google's or Microsoft's attachment handling policy.
* [Fix] DMARC reporting: fix reporting for subdomainsAndrew Lewis2023-10-161-1/+1
| | | | - Reported by: @bilym
* [Minor] Treat *.cue attachments as harmfultwesterhever2023-10-131-0/+1
| | | | Rationale: https://arstechnica.com/information-technology/2023/10/one-click-remote-code-exploit-in-cd-cue-files-affects-most-gnome-based-linux-distros/
* [Minor] RBL: Show DNS verification failure reasonVsevolod Stakhov2023-09-261-13/+19
|
* [Minor] Fix symbol nameVsevolod Stakhov2023-09-251-2/+2
|
* [Minor] Insert `UNKNOWN_SENDER` for the new sendersVsevolod Stakhov2023-09-251-1/+21
|
* [Project] Fix various issuesVsevolod Stakhov2023-09-241-4/+14
|
* [Conf] Add new plugin default configurationVsevolod Stakhov2023-09-241-2/+11
|
* [Minor] Fix misprintVsevolod Stakhov2023-09-231-1/+1
|