| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679 | rspamd_config.MAILCOW_AUTH = {	callback = function(task)		local uname = task:get_user()		if uname then			return 1		end	end}local monitoring_hosts = rspamd_config:add_map{  url = "/etc/rspamd/custom/monitoring_nolog.map",  description = "Monitoring hosts",  type = "regexp"}rspamd_config:register_symbol({  name = 'SMTP_ACCESS',  type = 'postfilter',  callback = function(task)    local util = require("rspamd_util")    local rspamd_logger = require "rspamd_logger"    local rspamd_ip = require 'rspamd_ip'    local uname = task:get_user()    local limited_access = task:get_symbol("SMTP_LIMITED_ACCESS")    if not uname then      return false    end    if not limited_access then      return false    end    local hash_key = 'SMTP_ALLOW_NETS_' .. uname    local redis_params = rspamd_parse_redis_server('smtp_access')    local ip = task:get_from_ip()    if ip == nil or not ip:is_valid() then      return false    end    local from_ip_string = tostring(ip)    smtp_access_table = {from_ip_string}    local maxbits = 128    local minbits = 32    if ip:get_version() == 4 then        maxbits = 32        minbits = 8    end    for i=maxbits,minbits,-1 do      local nip = ip:apply_mask(i):to_string() .. "/" .. i      table.insert(smtp_access_table, nip)    end    local function smtp_access_cb(err, data)      if err then        rspamd_logger.infox(rspamd_config, "smtp_access query request for ip %s returned invalid or empty data (\"%s\") or error (\"%s\")", ip, data, err)        return false      else        rspamd_logger.infox(rspamd_config, "checking ip %s for smtp_access in %s", from_ip_string, hash_key)        for k,v in pairs(data) do          if (v and v ~= userdata and v == '1') then            rspamd_logger.infox(rspamd_config, "found ip in smtp_access map")            task:insert_result(true, 'SMTP_ACCESS', 0.0, from_ip_string)            return true          end        end        rspamd_logger.infox(rspamd_config, "couldnt find ip in smtp_access map")        task:insert_result(true, 'SMTP_ACCESS', 999.0, from_ip_string)        return true      end    end    table.insert(smtp_access_table, 1, hash_key)    local redis_ret_user = rspamd_redis_make_request(task,      redis_params, -- connect params      hash_key, -- hash key      false, -- is write      smtp_access_cb, --callback      'HMGET', -- command      smtp_access_table -- arguments    )    if not redis_ret_user then      rspamd_logger.infox(rspamd_config, "cannot check smtp_access redis map")    end  end,  priority = 10})rspamd_config:register_symbol({  name = 'POSTMASTER_HANDLER',  type = 'prefilter',  callback = function(task)  local rcpts = task:get_recipients('smtp')  local rspamd_logger = require "rspamd_logger"  local lua_util = require "lua_util"  local from = task:get_from(1)  -- not applying to mails with more than one rcpt to avoid bypassing filters by addressing postmaster  if rcpts and #rcpts == 1 then    for _,rcpt in ipairs(rcpts) do      local rcpt_split = rspamd_str_split(rcpt['addr'], '@')      if #rcpt_split == 2 then        if rcpt_split[1] == 'postmaster' then          task:set_pre_result('accept', 'whitelisting postmaster smtp rcpt')          return        end      end    end  end  if from then    for _,fr in ipairs(from) do      local fr_split = rspamd_str_split(fr['addr'], '@')      if #fr_split == 2 then        if fr_split[1] == 'postmaster' and task:get_user() then          -- no whitelist, keep signatures          task:insert_result(true, 'POSTMASTER_FROM', -2500.0)          return        end      end    end  end  end,  priority = 10})rspamd_config:register_symbol({  name = 'KEEP_SPAM',  type = 'prefilter',  callback = function(task)    local util = require("rspamd_util")    local rspamd_logger = require "rspamd_logger"    local rspamd_ip = require 'rspamd_ip'    local uname = task:get_user()    if uname then      return false    end    local redis_params = rspamd_parse_redis_server('keep_spam')    local ip = task:get_from_ip()    if ip == nil or not ip:is_valid() then      return false    end    local from_ip_string = tostring(ip)    ip_check_table = {from_ip_string}    local maxbits = 128    local minbits = 32    if ip:get_version() == 4 then        maxbits = 32        minbits = 8    end    for i=maxbits,minbits,-1 do      local nip = ip:apply_mask(i):to_string() .. "/" .. i      table.insert(ip_check_table, nip)    end    local function keep_spam_cb(err, data)      if err then        rspamd_logger.infox(rspamd_config, "keep_spam query request for ip %s returned invalid or empty data (\"%s\") or error (\"%s\")", ip, data, err)        return false      else        for k,v in pairs(data) do          if (v and v ~= userdata and v == '1') then            rspamd_logger.infox(rspamd_config, "found ip in keep_spam map, setting pre-result")            task:set_pre_result('accept', 'ip matched with forward hosts')          end        end      end    end    table.insert(ip_check_table, 1, 'KEEP_SPAM')    local redis_ret_user = rspamd_redis_make_request(task,      redis_params, -- connect params      'KEEP_SPAM', -- hash key      false, -- is write      keep_spam_cb, --callback      'HMGET', -- command      ip_check_table -- arguments    )    if not redis_ret_user then      rspamd_logger.infox(rspamd_config, "cannot check keep_spam redis map")    end  end,  priority = 19})rspamd_config:register_symbol({  name = 'TLS_HEADER',  type = 'postfilter',  callback = function(task)    local rspamd_logger = require "rspamd_logger"    local tls_tag = task:get_request_header('TLS-Version')    if type(tls_tag) == 'nil' then      task:set_milter_reply({        add_headers = {['X-Last-TLS-Session-Version'] = 'None'}      })    else      task:set_milter_reply({        add_headers = {['X-Last-TLS-Session-Version'] = tostring(tls_tag)}      })    end  end,  priority = 12})rspamd_config:register_symbol({  name = 'TAG_MOO',  type = 'postfilter',  callback = function(task)    local util = require("rspamd_util")    local rspamd_logger = require "rspamd_logger"    local redis_params = rspamd_parse_redis_server('taghandler')    local rspamd_http = require "rspamd_http"    local rcpts = task:get_recipients('smtp')    local lua_util = require "lua_util"    local tagged_rcpt = task:get_symbol("TAGGED_RCPT")    local mailcow_domain = task:get_symbol("RCPT_MAILCOW_DOMAIN")    local function remove_moo_tag()      local moo_tag_header = task:get_header('X-Moo-Tag', false)      if moo_tag_header then        task:set_milter_reply({          remove_headers = {['X-Moo-Tag'] = 0},        })      end      return true    end    if tagged_rcpt and tagged_rcpt[1].options and mailcow_domain then      local tag = tagged_rcpt[1].options[1]      rspamd_logger.infox("found tag: %s", tag)      local action = task:get_metric_action('default')      rspamd_logger.infox("metric action now: %s", action)      if action ~= 'no action' and action ~= 'greylist' then        rspamd_logger.infox("skipping tag handler for action: %s", action)        remove_moo_tag()        return true      end      local function http_callback(err_message, code, body, headers)        if body ~= nil and body ~= "" then          rspamd_logger.infox(rspamd_config, "expanding rcpt to \"%s\"", body)          local function tag_callback_subject(err, data)            if err or type(data) ~= 'string' then              rspamd_logger.infox(rspamd_config, "subject tag handler rcpt %s returned invalid or empty data (\"%s\") or error (\"%s\") - trying subfolder tag handler...", body, data, err)              local function tag_callback_subfolder(err, data)                if err or type(data) ~= 'string' then                  rspamd_logger.infox(rspamd_config, "subfolder tag handler for rcpt %s returned invalid or empty data (\"%s\") or error (\"%s\")", body, data, err)                  remove_moo_tag()                else                  rspamd_logger.infox("Add X-Moo-Tag header")                  task:set_milter_reply({                    add_headers = {['X-Moo-Tag'] = 'YES'}                  })                end              end              local redis_ret_subfolder = rspamd_redis_make_request(task,                redis_params, -- connect params                body, -- hash key                false, -- is write                tag_callback_subfolder, --callback                'HGET', -- command                {'RCPT_WANTS_SUBFOLDER_TAG', body} -- arguments              )              if not redis_ret_subfolder then                rspamd_logger.infox(rspamd_config, "cannot make request to load tag handler for rcpt")                remove_moo_tag()              end            else              rspamd_logger.infox("user wants subject modified for tagged mail")              local sbj = task:get_header('Subject')              new_sbj = '=?UTF-8?B?' .. tostring(util.encode_base64('[' .. tag .. '] ' .. sbj)) .. '?='              task:set_milter_reply({                remove_headers = {                  ['Subject'] = 1,                  ['X-Moo-Tag'] = 0                },                add_headers = {['Subject'] = new_sbj}              })            end          end          local redis_ret_subject = rspamd_redis_make_request(task,            redis_params, -- connect params            body, -- hash key            false, -- is write            tag_callback_subject, --callback            'HGET', -- command            {'RCPT_WANTS_SUBJECT_TAG', body} -- arguments          )          if not redis_ret_subject then            rspamd_logger.infox(rspamd_config, "cannot make request to load tag handler for rcpt")            remove_moo_tag()          end        end      end      if rcpts and #rcpts == 1 then        for _,rcpt in ipairs(rcpts) do          local rcpt_split = rspamd_str_split(rcpt['addr'], '@')          if #rcpt_split == 2 then            if rcpt_split[1] == 'postmaster' then              rspamd_logger.infox(rspamd_config, "not expanding postmaster alias")              remove_moo_tag()            else              rspamd_http.request({                task=task,                url='http://nginx:8081/aliasexp.php',                body='',                callback=http_callback,                headers={Rcpt=rcpt['addr']},              })            end          end        end      end    else      remove_moo_tag()    end  end,  priority = 19})rspamd_config:register_symbol({  name = 'BCC',  type = 'postfilter',  callback = function(task)    local util = require("rspamd_util")    local rspamd_http = require "rspamd_http"    local rspamd_logger = require "rspamd_logger"    local from_table = {}    local rcpt_table = {}    if task:has_symbol('ENCRYPTED_CHAT') then      return -- stop    end    local send_mail = function(task, bcc_dest)      local lua_smtp = require "lua_smtp"      local function sendmail_cb(ret, err)        if not ret then          rspamd_logger.errx(task, 'BCC SMTP ERROR: %s', err)        else          rspamd_logger.infox(rspamd_config, "BCC SMTP SUCCESS TO %s", bcc_dest)        end      end      if not bcc_dest then        return -- stop      end      -- dot stuff content before sending      local email_content = tostring(task:get_content())      email_content = string.gsub(email_content, "\r\n%.", "\r\n..")      -- send mail      lua_smtp.sendmail({        task = task,        host = os.getenv("IPV4_NETWORK") .. '.253',        port = 591,        from = task:get_from(stp)[1].addr,        recipients = bcc_dest,        helo = 'bcc',        timeout = 20,      }, email_content, sendmail_cb)    end    -- determine from    local from = task:get_from('smtp')    if from then      for _, a in ipairs(from) do        table.insert(from_table, a['addr']) -- add this rcpt to table        table.insert(from_table, '@' .. a['domain']) -- add this rcpts domain to table      end    else      return -- stop    end    -- determine rcpts    local rcpts = task:get_recipients('smtp')    if rcpts then      for _, a in ipairs(rcpts) do        table.insert(rcpt_table, a['addr']) -- add this rcpt to table        table.insert(rcpt_table, '@' .. a['domain']) -- add this rcpts domain to table      end    else      return -- stop    end    local action = task:get_metric_action('default')    rspamd_logger.infox("metric action now: %s", action)    local function rcpt_callback(err_message, code, body, headers)      if err_message == nil and code == 201 and body ~= nil then        if action == 'no action' or action == 'add header' or action == 'rewrite subject' then          send_mail(task, body)        end      end    end    local function from_callback(err_message, code, body, headers)      if err_message == nil and code == 201 and body ~= nil then        if action == 'no action' or action == 'add header' or action == 'rewrite subject' then          send_mail(task, body)        end      end    end    if rcpt_table then      for _,e in ipairs(rcpt_table) do        rspamd_logger.infox(rspamd_config, "checking bcc for rcpt address %s", e)        rspamd_http.request({          task=task,          url='http://nginx:8081/bcc.php',          body='',          callback=rcpt_callback,          headers={Rcpt=e}        })      end    end    if from_table then      for _,e in ipairs(from_table) do        rspamd_logger.infox(rspamd_config, "checking bcc for from address %s", e)        rspamd_http.request({          task=task,          url='http://nginx:8081/bcc.php',          body='',          callback=from_callback,          headers={From=e}        })      end    end    return true  end,  priority = 20})rspamd_config:register_symbol({  name = 'DYN_RL_CHECK',  type = 'prefilter',  callback = function(task)    local util = require("rspamd_util")    local redis_params = rspamd_parse_redis_server('dyn_rl')    local rspamd_logger = require "rspamd_logger"    local envfrom = task:get_from(1)    local uname = task:get_user()    if not envfrom or not uname then      return false    end    local uname = uname:lower()    local env_from_domain = envfrom[1].domain:lower() -- get smtp from domain in lower case    local function redis_cb_user(err, data)      if err or type(data) ~= 'string' then        rspamd_logger.infox(rspamd_config, "dynamic ratelimit request for user %s returned invalid or empty data (\"%s\") or error (\"%s\") - trying dynamic ratelimit for domain...", uname, data, err)        local function redis_key_cb_domain(err, data)          if err or type(data) ~= 'string' then            rspamd_logger.infox(rspamd_config, "dynamic ratelimit request for domain %s returned invalid or empty data (\"%s\") or error (\"%s\")", env_from_domain, data, err)          else            rspamd_logger.infox(rspamd_config, "found dynamic ratelimit in redis for domain %s with value %s", env_from_domain, data)            task:insert_result('DYN_RL', 0.0, data, env_from_domain)          end        end        local redis_ret_domain = rspamd_redis_make_request(task,          redis_params, -- connect params          env_from_domain, -- hash key          false, -- is write          redis_key_cb_domain, --callback          'HGET', -- command          {'RL_VALUE', env_from_domain} -- arguments        )        if not redis_ret_domain then          rspamd_logger.infox(rspamd_config, "cannot make request to load ratelimit for domain")        end      else        rspamd_logger.infox(rspamd_config, "found dynamic ratelimit in redis for user %s with value %s", uname, data)        task:insert_result('DYN_RL', 0.0, data, uname)      end    end    local redis_ret_user = rspamd_redis_make_request(task,      redis_params, -- connect params      uname, -- hash key      false, -- is write      redis_cb_user, --callback      'HGET', -- command      {'RL_VALUE', uname} -- arguments    )    if not redis_ret_user then      rspamd_logger.infox(rspamd_config, "cannot make request to load ratelimit for user")    end    return true  end,  flags = 'empty',  priority = 20})rspamd_config:register_symbol({  name = 'NO_LOG_STAT',  type = 'postfilter',  callback = function(task)    local from = task:get_header('From')    if from and (monitoring_hosts:get_key(from) or from == "watchdog@localhost") then      task:set_flag('no_log')      task:set_flag('no_stat')    end  end})rspamd_config:register_symbol({  name = 'MOO_FOOTER',  type = 'prefilter',  callback = function(task)    local cjson = require "cjson"    local lua_mime = require "lua_mime"    local lua_util = require "lua_util"    local rspamd_logger = require "rspamd_logger"    local rspamd_http = require "rspamd_http"    local envfrom = task:get_from(1)    local uname = task:get_user()    if not envfrom or not uname then      return false    end    local uname = uname:lower()    local env_from_domain = envfrom[1].domain:lower()    local env_from_addr = envfrom[1].addr:lower()    -- determine newline type    local function newline(task)      local t = task:get_newlines_type()          if t == 'cr' then        return '\r'      elseif t == 'lf' then        return '\n'      end          return '\r\n'    end    -- retrieve footer    local function footer_cb(err_message, code, data, headers)      if err or type(data) ~= 'string' then        rspamd_logger.infox(rspamd_config, "domain wide footer request for user %s returned invalid or empty data (\"%s\") or error (\"%s\")", uname, data, err)      else                -- parse json string        local footer = cjson.decode(data)        if not footer then          rspamd_logger.infox(rspamd_config, "parsing domain wide footer for user %s returned invalid or empty data (\"%s\") or error (\"%s\")", uname, data, err)        else          if footer and type(footer) == "table" and (footer.html and footer.html ~= "" or footer.plain and footer.plain ~= "")  then            rspamd_logger.infox(rspamd_config, "found domain wide footer for user %s: html=%s, plain=%s, vars=%s", uname, footer.html, footer.plain, footer.vars)            local envfrom_mime = task:get_from(2)            local from_name = ""            if envfrom_mime and envfrom_mime[1].name then              from_name = envfrom_mime[1].name            elseif envfrom and envfrom[1].name then              from_name = envfrom[1].name            end            -- default replacements            local replacements = {              auth_user = uname,              from_user = envfrom[1].user,              from_name = from_name,              from_addr = envfrom[1].addr,              from_domain = envfrom[1].domain:lower()            }            -- add custom mailbox attributes            if footer.vars and type(footer.vars) == "string" then              local footer_vars = cjson.decode(footer.vars)              if type(footer_vars) == "table" then                for key, value in pairs(footer_vars) do                  replacements[key] = value                end              end            end            if footer.html and footer.html ~= "" then              footer.html = lua_util.jinja_template(footer.html, replacements, true)            end            if footer.plain and footer.plain ~= "" then              footer.plain = lua_util.jinja_template(footer.plain, replacements, true)            end              -- add footer            local out = {}            local rewrite = lua_mime.add_text_footer(task, footer.html, footer.plain) or {}                    local seen_cte            local newline_s = newline(task)                    local function rewrite_ct_cb(name, hdr)              if rewrite.need_rewrite_ct then                if name:lower() == 'content-type' then                  local nct = string.format('%s: %s/%s; charset=utf-8',                      'Content-Type', rewrite.new_ct.type, rewrite.new_ct.subtype)                  out[#out + 1] = nct                  return                elseif name:lower() == 'content-transfer-encoding' then                  out[#out + 1] = string.format('%s: %s',                      'Content-Transfer-Encoding', 'quoted-printable')                  seen_cte = true                  return                end              end              out[#out + 1] = hdr.raw:gsub('\r?\n?$', '')            end                    task:headers_foreach(rewrite_ct_cb, {full = true})                    if not seen_cte and rewrite.need_rewrite_ct then              out[#out + 1] = string.format('%s: %s', 'Content-Transfer-Encoding', 'quoted-printable')            end                    -- End of headers            out[#out + 1] = newline_s                    if rewrite.out then              for _,o in ipairs(rewrite.out) do                out[#out + 1] = o              end            else              out[#out + 1] = task:get_rawbody()            end            local out_parts = {}            for _,o in ipairs(out) do              if type(o) ~= 'table' then                out_parts[#out_parts + 1] = o                out_parts[#out_parts + 1] = newline_s              else                local removePrefix = "--\x0D\x0AContent-Type"                if string.lower(string.sub(tostring(o[1]), 1, string.len(removePrefix))) == string.lower(removePrefix) then                  o[1] = string.sub(tostring(o[1]), string.len("--\x0D\x0A") + 1)                end                out_parts[#out_parts + 1] = o[1]                if o[2] then                  out_parts[#out_parts + 1] = newline_s                end              end            end            task:set_message(out_parts)          else            rspamd_logger.infox(rspamd_config, "domain wide footer request for user %s returned invalid or empty data (\"%s\")", uname, data)          end        end      end    end    -- fetch footer    rspamd_http.request({      task=task,      url='http://nginx:8081/footer.php',      body='',      callback=footer_cb,      headers={Domain=env_from_domain,Username=uname,From=env_from_addr},    })    return true  end,  priority = 1})
 |