123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216 |
- rspamd_config.MAILCOW_AUTH = {
- callback = function(task)
- local uname = task:get_user()
- if uname then
- return 1
- end
- end
- }
- local monitoring_hosts = rspamd_config:add_map{
- url = "/etc/rspamd/custom/monitoring_nolog.map",
- description = "Monitoring hosts",
- type = "regexp"
- }
- rspamd_config:register_symbol({
- name = 'KEEP_SPAM',
- type = 'prefilter',
- callback = function(task)
- local util = require("rspamd_util")
- local rspamd_logger = require "rspamd_logger"
- local rspamd_ip = require 'rspamd_ip'
- local uname = task:get_user()
- if uname then
- return false
- end
- local redis_params = rspamd_parse_redis_server('keep_spam')
- local ip = task:get_from_ip()
- if ip == nil or not ip:is_valid() then
- return false
- end
- local from_ip_string = tostring(ip)
- ip_check_table = {from_ip_string}
- local maxbits = 128
- local minbits = 32
- if ip:get_version() == 4 then
- maxbits = 32
- minbits = 8
- end
- for i=maxbits,minbits,-1 do
- local nip = ip:apply_mask(i):to_string() .. "/" .. i
- table.insert(ip_check_table, nip)
- end
- local function keep_spam_cb(err, data)
- if err then
- rspamd_logger.infox(rspamd_config, "keep_spam query request for ip %s returned invalid or empty data (\"%s\") or error (\"%s\")", ip, data, err)
- return false
- else
- for k,v in pairs(data) do
- if (v and v ~= userdata and v == '1') then
- rspamd_logger.infox(rspamd_config, "found ip in keep_spam map, setting pre-result", v)
- task:set_pre_result('accept', 'IP matched with forward hosts')
- end
- end
- end
- end
- table.insert(ip_check_table, 1, 'KEEP_SPAM')
- local redis_ret_user = rspamd_redis_make_request(task,
- redis_params, -- connect params
- 'KEEP_SPAM', -- hash key
- false, -- is write
- keep_spam_cb, --callback
- 'HMGET', -- command
- ip_check_table -- arguments
- )
- if not redis_ret_user then
- rspamd_logger.infox(rspamd_config, "cannot check keep_spam redis map")
- end
- end,
- priority = 19
- })
- rspamd_config:register_symbol({
- name = 'TLS_HEADER',
- type = 'postfilter',
- callback = function(task)
- local rspamd_logger = require "rspamd_logger"
- local tls_tag = task:get_request_header('TLS-Version')
- if type(tls_tag) == 'nil' then
- task:set_milter_reply({
- add_headers = {['X-Last-TLS-Session-Version'] = 'None'}
- })
- else
- task:set_milter_reply({
- add_headers = {['X-Last-TLS-Session-Version'] = tostring(tls_tag)}
- })
- end
- end,
- priority = 12
- })
- rspamd_config:register_symbol({
- name = 'TAG_MOO',
- type = 'postfilter',
- callback = function(task)
- local util = require("rspamd_util")
- local rspamd_logger = require "rspamd_logger"
- local tagged_rcpt = task:get_symbol("TAGGED_RCPT")
- local mailcow_domain = task:get_symbol("RCPT_MAILCOW_DOMAIN")
- if tagged_rcpt and tagged_rcpt[1].options and mailcow_domain then
- local tag = tagged_rcpt[1].options[1]
- rspamd_logger.infox("found tag: %s", tag)
- local action = task:get_metric_action('default')
- rspamd_logger.infox("metric action now: %s", action)
- if action ~= 'no action' and action ~= 'greylist' then
- rspamd_logger.infox("skipping tag handler for action: %s", action)
- task:set_metric_action('default', action)
- return true
- end
- local wants_subject_tag = task:get_symbol("RCPT_WANTS_SUBJECT_TAG")
- local wants_subfolder_tag = task:get_symbol("RCPT_WANTS_SUBFOLDER_TAG")
- if wants_subject_tag then
- rspamd_logger.infox("user wants subject modified for tagged mail")
- local sbj = task:get_header('Subject')
- new_sbj = '=?UTF-8?B?' .. tostring(util.encode_base64('[' .. tag .. '] ' .. sbj)) .. '?='
- task:set_milter_reply({
- remove_headers = {['Subject'] = 1},
- add_headers = {['Subject'] = new_sbj}
- })
- elseif wants_subfolder_tag then
- rspamd_logger.infox("Add X-Moo-Tag header")
- task:set_milter_reply({
- add_headers = {['X-Moo-Tag'] = 'YES'}
- })
- end
- end
- end,
- priority = 11
- })
- rspamd_config:register_symbol({
- name = 'DYN_RL_CHECK',
- type = 'prefilter',
- callback = function(task)
- local util = require("rspamd_util")
- local redis_params = rspamd_parse_redis_server('dyn_rl')
- local rspamd_logger = require "rspamd_logger"
- local envfrom = task:get_from(1)
- local uname = task:get_user()
- if not envfrom or not uname then
- return false
- end
- local uname = uname:lower()
- local env_from_domain = envfrom[1].domain:lower() -- get smtp from domain in lower case
- local function redis_cb_user(err, data)
- if err or type(data) ~= 'string' then
- rspamd_logger.infox(rspamd_config, "dynamic ratelimit request for user %s returned invalid or empty data (\"%s\") or error (\"%s\") - trying dynamic ratelimit for domain...", uname, data, err)
- local function redis_key_cb_domain(err, data)
- if err or type(data) ~= 'string' then
- rspamd_logger.infox(rspamd_config, "dynamic ratelimit request for domain %s returned invalid or empty data (\"%s\") or error (\"%s\")", env_from_domain, data, err)
- else
- rspamd_logger.infox(rspamd_config, "found dynamic ratelimit in redis for domain %s with value %s", env_from_domain, data)
- task:insert_result('DYN_RL', 0.0, data, env_from_domain)
- end
- end
- local redis_ret_domain = rspamd_redis_make_request(task,
- redis_params, -- connect params
- env_from_domain, -- hash key
- false, -- is write
- redis_key_cb_domain, --callback
- 'HGET', -- command
- {'RL_VALUE', env_from_domain} -- arguments
- )
- if not redis_ret_domain then
- rspamd_logger.infox(rspamd_config, "cannot make request to load ratelimit for domain")
- end
- else
- rspamd_logger.infox(rspamd_config, "found dynamic ratelimit in redis for user %s with value %s", uname, data)
- task:insert_result('DYN_RL', 0.0, data, uname)
- end
- end
- local redis_ret_user = rspamd_redis_make_request(task,
- redis_params, -- connect params
- uname, -- hash key
- false, -- is write
- redis_cb_user, --callback
- 'HGET', -- command
- {'RL_VALUE', uname} -- arguments
- )
- if not redis_ret_user then
- rspamd_logger.infox(rspamd_config, "cannot make request to load ratelimit for user")
- end
- return true
- end,
- flags = 'empty',
- priority = 20
- })
- rspamd_config:register_symbol({
- name = 'NO_LOG_STAT',
- type = 'postfilter',
- callback = function(task)
- local from = task:get_header('From')
- if from and monitoring_hosts:get_key(from) then
- task:set_flag('no_log')
- task:set_flag('no_stat')
- end
- end
- })
|