1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
|
--[[
Copyright (c) 2011-2015, Vsevolod Stakhov <vsevolod@highsecure.ru>
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
]]--
-- Phishing detection interface for selecting phished urls and inserting corresponding symbol
--
--
local symbol = 'PHISHED_URL'
local domains = nil
local strict_domains = {}
local redirector_domains = {}
local rspamd_logger = require "rspamd_logger"
local util = require "rspamd_util"
local opts = rspamd_config:get_all_opt('phishing')
local function phishing_cb(task)
local urls = task:get_urls()
if urls then
for _,url in ipairs(urls) do
if url:is_phished() then
local found = false
local purl = url:get_phished()
local tld = url:get_tld()
local ptld = purl:get_tld()
if not ptld or not tld then
return
end
local weight = 1.0
local dist = util.levenshtein_distance(tld, ptld)
dist = 2 * dist / (#tld + #ptld)
if dist > 0.3 and dist <= 1.0 then
-- Use distance to penalize the total weight
weight = util.tanh(3 * (1 - dist + 0.1))
end
rspamd_logger.debugx(task, "distance: %1 -> %2: %3", tld, ptld, dist)
if #redirector_domains > 0 then
for _,rule in ipairs(redirector_domains) do
if rule['map']:get_key(url:get_tld()) then
task:insert_result(rule['symbol'], weight, ptld)
found = true
end
end
end
if not found and #strict_domains > 0 then
for _,rule in ipairs(strict_domains) do
if rule['map']:get_key(ptld) then
task:insert_result(rule['symbol'], 1.0, ptld)
found = true
end
end
end
if not found then
if domains then
if domains:get_key(ptld) then
task:insert_result(symbol, weight, ptld)
end
else
task:insert_result(symbol, weight, ptld)
end
end
end
end
end
end
local function phishing_map(mapname, phishmap)
if opts[mapname] then
local xd = {}
if type(opts[mapname]) == 'table' then
xd = opts[mapname]
else
xd[1] = opts[mapname]
end
for _,d in ipairs(xd) do
local s, _ = string.find(d, ':[^:]+$')
if s then
local sym = string.sub(d, s + 1, -1)
local map = string.sub(d, 1, s - 1)
rspamd_config:register_virtual_symbol(sym, 1, id)
local rmap = rspamd_config:add_hash_map (map, 'Phishing ' .. mapname .. ' map')
if rmap then
local rule = {symbol = sym, map = rmap}
table.insert(phishmap, rule)
else
rspamd_logger.infox(rspamd_config, 'cannot add map: ' .. map .. ' for symbol: ' .. sym)
end
else
rspamd_logger.infox(rspamd_config, mapname .. ' option must be in format <map>:<symbol>')
end
end
end
end
if opts then
if opts['symbol'] then
symbol = opts['symbol']
-- Register symbol's callback
rspamd_config:register_symbol({
name = symbol,
callback = phishing_cb
})
end
if opts['domains'] and type(opt['domains']) == 'string' then
domains = rspamd_config:add_hash_map (opts['domains'])
end
phishing_map('strict_domains', strict_domains)
phishing_map('redirector_domains', redirector_domains)
end
|