summaryrefslogtreecommitdiffstats
path: root/src/plugins
Commit message (Collapse)AuthorAgeFilesLines
* [Minor] Clickhouse: Change scores to Float32 for nowVsevolod Stakhov2019-05-221-1/+1
|
* [Fix] Arc: Another bunch of fixes for arc signingVsevolod Stakhov2019-05-221-4/+3
|
* [Fix] Arc: More arc signing fixesVsevolod Stakhov2019-05-221-20/+29
|
* [Fix] Fix ARC signing after fixing another bug in it...Vsevolod Stakhov2019-05-221-4/+1
|
* [Fix] Ratelimit: Fix dynamic scoreVsevolod Stakhov2019-05-221-1/+1
|
* [Fix] Re-use milter_headers settings when doing arc signingVsevolod Stakhov2019-05-131-2/+19
| | | | Issue: #2073
* [Minor] Change the default list of oversigned headersVsevolod Stakhov2019-05-131-2/+2
| | | | | | | | | | | | | | | | | | | Trivia: `Subject` header needs to be oversigned as an attacker could add some 'bad' subject to DKIM signed emails with no subject (rare but possible case). This header is clearly displayed to a user hence, its presence as well as absence MUST be oversigned explicitly. `Reply-To` header is widely used to designate a special address used for replies only but not for authentication checks. It is thus possible to add a malicious `Reply-To` header to force users to reply to a DKIM signed email to some attacker's controlled email address. It clearly opens surface for social engineering like attacks and this header must thus be unconditionally oversigned even if not presented in an original message. Issue: #2887
* Fix typos (separately, transferred)hartzell2019-05-111-1/+1
|
* [Minor] Sign list-help headerVsevolod Stakhov2019-05-101-2/+2
| | | | Issue: #2887
* [Fix] Change the default oversigning headers to a more sane listVsevolod Stakhov2019-05-101-8/+8
| | | | Issue: #2887
* [Minor] Clickhouse: Change default partitioning schemaVsevolod Stakhov2019-05-071-1/+1
|
* Merge pull request #2886 from heraklit256/p7s-textplainVsevolod Stakhov2019-05-061-1/+1
|\ | | | | [Fix] allow PKCS7 signatures to be text/plain, too
| * [Fix] allow PKCS7 signatures to be text/plain, tooheraklit2562019-05-041-1/+1
| |
* | [Minor] Pet luacheckVsevolod Stakhov2019-05-051-6/+6
|/
* [Fix] Do not blacklist mail by SPF/DMARC for local/authed usersVsevolod Stakhov2019-05-042-5/+36
| | | | Issue: #2871
* [Minor] Pet luacheckVsevolod Stakhov2019-05-041-1/+2
|
* [Minor] Clickhouse: Add clock skew protectionVsevolod Stakhov2019-05-031-0/+5
|
* [Fix] Clickhouse: Fix lots of storage issuesVsevolod Stakhov2019-05-031-104/+83
|
* [Fix] Fix memory in arc signing logicVsevolod Stakhov2019-05-031-0/+5
|
* [Feature] Clickhouse: Modernise table initial schemaVsevolod Stakhov2019-05-031-2/+4
|
* [Fix] Switch to GMTVsevolod Stakhov2019-05-012-2/+2
|
* [Minor] lua_scanners - try dynamic scanCarsten Rosenberg2019-04-292-8/+28
|
* [Fix] Set dmarc force action as least actionVsevolod Stakhov2019-04-291-1/+1
|
* [Minor] Do not use `get_symbol` to check existanceVsevolod Stakhov2019-04-241-4/+4
|
* [Feature] Lua_util: Allow to obfuscate different fieldsVsevolod Stakhov2019-04-232-3/+4
|
* [Minor] Clickhouse: Send rows exactly when limit is reachedVsevolod Stakhov2019-04-231-1/+1
|
* [Fix] Fix issue with urls with no tld (e.g. IP)Vsevolod Stakhov2019-04-231-1/+3
|
* [Minor] Remove unused requireVsevolod Stakhov2019-04-222-2/+0
|
* [Minor] Oops, fix module name passingVsevolod Stakhov2019-04-222-2/+2
|
* [Project] Add vault support for dkim and arc signingVsevolod Stakhov2019-04-222-36/+44
|
* [Project] Preliminary vault support for DKIM signingVsevolod Stakhov2019-04-222-30/+3
|
* [Minor] Unify redis signing in ARCVsevolod Stakhov2019-04-211-56/+46
|
* [Minor] Unify settings checksVsevolod Stakhov2019-04-212-14/+3
|
* [Minor] Dkim_signing: Unify redis signing routinesVsevolod Stakhov2019-04-211-90/+42
|
* [Minor] Add more fields to the DMARC reportsVsevolod Stakhov2019-04-201-3/+11
| | | | Issue: #2847
* [Fix] Clickhouse: Do not store digest as it is not needed nowVsevolod Stakhov2019-04-181-1/+6
|
* [Minor] Fix migrationVsevolod Stakhov2019-04-181-1/+1
|
* [Fix] Clickhouse: Support custom actionsVsevolod Stakhov2019-04-181-3/+30
| | | | Issue: #2861
* [Minor] Add "iso" to bad_extensionsAlexander Moisseev2019-04-181-4/+5
|
* [Minor] Emails: Lowercase all emails before checkVsevolod Stakhov2019-04-171-0/+3
| | | | | Issue: #2857 Closes: #2857
* [Fix] Hum, it seems that 99ff1c8 was not correctVsevolod Stakhov2019-04-171-2/+2
|
* Merge pull request #2855 from moisseev/mime-typesVsevolod Stakhov2019-04-171-1/+1
|\ | | | | [Minor] Avoid comparing string with boolean
| * [Minor] Avoid comparing string with booleanAlexander Moisseev2019-04-171-1/+1
| | | | | | | | when CT is not found
* | [Minor] Fuzzy upstream error threshold configMurat Mukhtarov2019-04-171-0/+44
|/ | | | | | | | | | It would be nice to be able to configure `max_errors` and `revive_time` for fuzzy check module for low traffic systems. When traffic volume is relatively low an error rate builds at very slow rate and it would take a while to reach default 40% threshold. At the same time waiting for 60s sometimes could be unreasonable for dynamic environments to re-resolve rspamd fuzzy storage.
* [Minor] Another misprint...Vsevolod Stakhov2019-04-161-3/+3
|
* [Minor] Fix another misprintVsevolod Stakhov2019-04-161-1/+1
|
* [Minor] Fix misprintVsevolod Stakhov2019-04-161-1/+1
|
* Merge pull request #2852 from spacefreak86/mime_typesVsevolod Stakhov2019-04-161-4/+6
|\ | | | | [Minor] Improve mime_types plugin
| * [Minor] mime_types: use higher weighted MIME typeThomas Oettli2019-04-161-4/+3
| | | | | | | | if detected MIME type differs from Content-Type header
| * [Minor] mime_types: decode hex encoded charactersThomas Oettli2019-04-151-0/+3
| | | | | | | | in filenames to improve file extension detection