1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
|
--[[
Copyright (c) 2016, Vsevolod Stakhov <vsevolod@highsecure.ru>
Copyright (c) 2016, Andrew Lewis <nerf@judo.za.org>
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
]]--
-- A plugin that implements replies check using redis
-- Default port for redis upstreams
local redis_params
local whitelisted_ip
local settings = {
action = nil,
expire = 86400, -- 1 day by default
key_prefix = 'rr',
message = 'Message is reply to one we originated',
symbol = 'REPLY',
}
local rspamd_logger = require 'rspamd_logger'
local rspamd_redis = require 'rspamd_redis'
local upstream_list = require 'rspamd_upstream_list'
local hash = require 'rspamd_cryptobox_hash'
local function make_key(goop)
local h = hash.create()
h:update(goop)
local key = h:base32():sub(1, 20)
key = settings['key_prefix'] .. key
return key
end
local function replies_check(task)
local function redis_get_cb(err, data)
if err ~= nil then
rspamd_logger.errx('redis_get_cb received error: %1', err)
return
end
if data == '1' then
-- Hash was found
task:insert_result(settings['symbol'], 0.0)
if settings['action'] ~= nil then
local ip_addr = task:get_ip()
if task:get_user() or (ip_addr and ip_addr:is_local()) then
rspamd_logger.infox(task, "not forcing action for local network or authorized user");
else
task:set_pre_result(settings['action'], settings['message'])
end
end
end
end
-- If in-reply-to header not present return
local irt = task:get_header_raw('in-reply-to')
if irt == nil then
return
end
-- Create hash of in-reply-to and query redis
local key = make_key(irt)
local ret,_,_ = rspamd_redis_make_request(task,
redis_params, -- connect params
key, -- hash key
false, -- is write
redis_get_cb, --callback
'GET', -- command
{key} -- arguments
)
if not ret then
rspamd_logger.errx("redis request wasn't scheduled")
end
end
local function replies_set(task)
local function redis_set_cb(err, data)
if err ~=nil then
rspamd_logger.errx('redis_set_cb received error: %1', err)
end
end
-- If sender is unauthenticated return
if task:get_user() == nil then
return
end
-- If no message-id present return
local msg_id = task:get_header_raw('message-id')
if msg_id == nil then
return
end
-- Create hash of message-id and store to redis
local key = make_key(msg_id)
local ret,_,_ = rspamd_redis_make_request(task,
redis_params, -- connect params
key, -- hash key
true, -- is write
redis_set_cb, --callback
'SETEX', -- command
{key, tostring(settings['expire']), "1"} -- arguments
)
if not ret then
rspamd_logger.errx("redis request wasn't scheduled")
end
end
local opts = rspamd_config:get_all_opt('replies')
if not (opts and type(opts) == 'table') then
rspamd_logger.infox(rspamd_config, 'module is unconfigured')
return
end
if opts then
redis_params = rspamd_parse_redis_server('replies')
if not redis_params then
rspamd_logger.infox(rspamd_config, 'no servers are specified, disabling module')
else
rspamd_config:register_symbol({
name = 'REPLIES_SET',
type = 'postfilter',
callback = replies_set,
priority = 5
})
rspamd_config:register_symbol({
name = 'REPLIES_CHECK',
type = 'prefilter',
callback = replies_check,
priority = 10
})
end
for k,v in pairs(opts) do
settings[k] = v
end
end
|