It would be nice, if some people (Doug??))), would pick some part of
the GUI and expand it, so that fewer questions arise. Just copy that
part and send me the expanded part.
Thanks.

[0,0,0,'heading','Validate Sender'],
[denySenderRe,'Expression to Identify Sender You Want To Block at Any
Cost*',60,textinput,'','(.*)',ConfigCompileRe,
  'If an incoming Sender matches this Perl regular expression
connection will be dropped. No Optout - Whitelist and NP-List will be
ignored.'],
[ValidateSenderLog,'Enable Validate Sender
Logging',0,checkbox,1,'(.*)',undef,
  'Enables verbose logging of all  actions in the maillog.'],
[DoFakedLocalHelo,'Validate Local HELOs',1,textinput,1,'(\d*)',undef,
  'If activated, the HELO is checked against Local Domains/Hosts. Even
whitelisted and NP-listed addresses will be blocked (and reported) if
the check apply. No mail will go into the corpus. If testmode is set
here, ccallspam will occur.<br /><span class="negative"> 0 =
deactivate, 1 = activate, 2 = log only, 3 = score only.</span>.'],

[DoFakedWL,'Skip VLH for Whitelisted',0,checkbox,'','(.*)',undef,
  'Disable "Validate Local HELOs" for whitelisted addresses. That
check is considered a sure bet, but you may decide here to let
whitelisted addresses pass.'],
[DoFakedNP,'Skip VLH for NP-listed',0,checkbox,'','(.*)',undef,
  'Disable "Validate Local HELOs" for addresses on the noProcessing
list. That check is considered a sure bet, but you may decide here to
let NP-listed addresses pass.'],
[myServerRe,"Secondary Hostnames/IP-Nr(s) of this server:
$localhostname ( $localhostaddr ) ",80,textinput,'','(.*)',undef,
  "Validate Helo will check incoming HELOs for this. Put all secondary
hostnames and ip-nrs besides $localhostname and $localhostaddr
here.<br />
  For example: 213\\.13\\.22\\.3|mail1\\.domain\\.com"],
  
[DoValidFormatHelo,'Validate Format of
HELOs',1,textinput,0,'(\d*)',undef,
  'If activated, the HELO is checked against the expression below. If
the Regular Expression matches, the HELO is validated as being ok.
Meaning it *wont* be blocked.<br />
  <span class="negative"> 0 = deactivate, 1 = activate, 2 = log only,
3 = score only.</span>'],

[validFormatHeloRe,'Expression to Validate Format of
HELO*',80,textinput,'^(([a-z\d][a-z\d\-]*)?[a-z\d]\.)+[a-z]{2,6}$','(.*)',ConfigCompileRe,
  'Validate Format HELO will check incoming HELOs according to
rfc1123. <br />For example:
^(([a-z\d][a-z\d\-]*)?[a-z\d]\.)+[a-z]{2,6}$ . '],


[DoInvalidFormatHelo,'Invalidate Format of
HELOs',1,textinput,1,'(\d*)',undef,
  'If activated, the HELO is checked against the expression below. If
the Regular Expression matches, the HELO is invalidated as being bad. 
Meaning it *will* be blocked.<br />
  <span class="negative"> 0 = deactivate, 1 = activate, 2 = log only,
3 = score only.</span>'],
[invalidFormatHeloRe,'Expression to Invalidate Format of
HELO*',80,textinput,'\d+[_.-]\d+[_.-]|^[^.]+\.?$|dynamic|ddns|dns\.org$','(.*)',ConfigCompileRe,
  'Validate Format HELO will check incoming HELOs for this. <br />
  For example:  \d+[_.-]\d+[_.-]|^[^.]+\.?$|dynamic|ddns|dns\.org$. '],
[heloBlacklistIgnore,'Don\'t block these
HELO\'s*',60,textinput,'','(.*)',ConfigMakeRe,
  'HELO / EHLO greetings on this list will be excluded from the HELO
checks. For example: host123.isp.com|host456.isp.com'],
[useHeloBlacklist,'Use the Helo Blacklist',1,textinput,0,'(.*)',undef,
  'Use the list of blacklisted-helo hosts built by rebuildspamdb.<br />
  You probably want to disable the HELO blacklist in the initial
training phase for ASSP.<span class="negative"> 0 = deactivate, 1 =
activate, 2 = log only, 3 = score only.</span>'],
[HeloMismatch,'Block mismatched HELOs',0,checkbox,'','(.*)',undef,
  'Check if an A lookup on the HELO/EHLO name matches first 2 octets
of the client IP address.'],

[DoNoValidLocalSender,'Validate Local Sender
Addresses','1',textinput,0,'(\d*)',undef,
  'If activated, each sender address with a local domain is checked
against Local Addresses and/or LDAP. <br /><span class="negative"> 0 =
deactivate, 1 = activate, 2 = log only, 3 = score only.</span>.'],
[DoNoSpoofing,'Block All Local Sender Addresses (No
Spoofing)',0,checkbox,0,'(.*)',undef,
  'If activated, all local sender addresses with a local domain are
blocked. '],

[DoReversed,'Reversed Lookup',1,textinput,'0','(.*)',undef,
  'If activated, each sender IP is checked for a PTR record. This
requires an installed <a
href="http://search.cpan.org/search?query=Net::DNS";
rel="external">Net::DNS</a> module in PERL.<br />
  <span class="negative"> 0 = deactivate, 1 = activate, 2 = log only,
3 = score only.</span>'],
[DoInvalidPTR,'Reversed Lookup FQDN',1,textinput,'0','(.*)',undef,
  'If activated, the PTR-FQDN record is checked against the Regex.
This requires an installed <a
href="http://search.cpan.org/search?query=Net::DNS";
rel="external">Net::DNS</a> module in PERL.<br />
  <span class="negative"> 0 = deactivate, 1 = activate, 2 = log only,
3 = score only.</span>'],
[invalidPTRRe,'Expression to Invalidate Format of
PTR*',80,textinput,'^\d+\.\d+\.\d+\.\d+$|^[^\.]+\.?$','(.*)',ConfigCompileRe,
  'Validate Format PTR will check PTR records for this. <br />
  For example:  ^\d+\.\d+\.\d+\.\d+$|^[^\.]+\.?$. '],
 
 
[DoDomainCheck,'Validate Sender Domain
MX/A',1,textinput,'0','(.*)',undef,
  'If activated, each sender address is checked for a valid MX/A
record.
  This requires an installed <a
href="http://search.cpan.org/~maurice/Email-Valid-0.15/Valid.pm";
rel="external">Email::Valid</a> module in PERL.<br />
  <span class="negative"> 0 = deactivate, 1 = activate, 2 = log only,
3 = score only.</span>'],
[SenderInvalidError,'Sender Validation Error',80,textinput,'554 5.7.7
REASON .','(.*)',undef,
  'SMTP error message to reject invalid senders. The literal REASON is
replaced by (missing MX,missing PTR,invalid Helo,invalid user)
depending on the check.<br /><hr />
  <div class=\"menuLevel1\">Notes On Validate Sender</div>
  <input type="button" value="Notes"
onClick="javascript:popFileEditor(\'notes/validatesender.txt\',3);">'],
[0,0,0,'heading','Delaying'],
[EnableDelaying,'Enable Delaying',0,checkbox,0,'(.*)',undef,
  'Enable Greylisting (to avoid name clash let\'s call it Delaying) as
described at <a
href="http://projects.puremagic.com/greylisting/whitepaper.html";
rel="external">greylisting-whitepaper</a>.<br />
  It\'s a new method of blocking significant amounts of spam at the
mailserver level, but without resorting to heavyweight <br />
  statistical analysis or other heuristical approaches.'],
[DelayWL,'Whitelisted Delaying',0,checkbox,0,'(.*)',undef,
  'Enable Delaying for whitelisted users also.'],
[DelaySL,'Spamlovers Delaying',0,checkbox,0,'(.*)',undef,
  'Enable Delaying for spamlovers also.'],
[DelayAddHeader,'Add X-Assp-Delayed Header',0,checkbox,1,'(.*)',undef,
  'Add X-Assp-Delayed header to header of all delayed or whitelisted
emails.'],
[DelayLog,'Enable Delaying logging',0,checkbox,0,'(.*)',undef,
  'Enables verbose logging of all Delaying actions in the maillog.'],
[DelayEmbargoTime,'Embargo Time',5,textinput,5,'(\d+)',undef,
  'Enter the number of minutes for which delivery, related with new
\'triplet\' (IP address of the sending<br />
  host + mail from + rcpt to), is refused with a temporary failure.
Default is 5 minutes.'],
[DelayWaitTime,'Wait Time',5,textinput,28,'(\d+)',undef,
  'Enter the number of hours to wait for delivery attempts related
with recognised \'triplet\'; delivery is accepted <br />
  immediately and the \'tuplet\' (IP address of the sending host +
sender\'s domain) is whitelisted. Default is 28 hours.'],
[DelayExpiryTime,'Expiry Time',5,textinput,36,'(\d+)',undef,
  'Enter the number of days for which whitelisted \'tuplet\' is
considered valid. Default is 36 days.'],
[DelayUseNetblocks,'Use IP Netblocks',0,checkbox,1,'(.*)',undef,
  'Perform the IP address checks of the sending host based on the /24
subnet it is at rather than the specific IP. <br />
  This feature may be useful for legitimate mail systems that shuffle
messages among SMTP clients between retransmissions.'],
[DelayNormalizeVERPs,'Normalize VERP
Addresses',0,checkbox,1,'(.*)',undef,
  'Some mailing lists (such as Ezmlm) try to track bounces to
individual mails, rather than just individual recipients, <br />
  which creates a variation on the VERP method where each email has
it\'s own unique envelope sender. Since the automatic <br />
  whitelisting that is built into Delaying depends on the envelope
addresses for subsequent emails being the same, <br />
  the delay filter will attempt to normalize the unique sender
addresses, when this option is checked.'],
[DelayExpireOnSpam,'Expire Spamming Whitelisted
Tuplets',0,checkbox,1,'(.*)',undef,
  'If a whitelisted \'tuplet\' is ever associated with spam, viri,
failed rbl, spf etc, it is deleted from the whitelist. <br />
  This renews the temporary embargo for subsequent mail involving the
tuplet.'],
[CleanDelayDBInterval,'Clean Up Delaying
Database',10,textinput,3600,'(\d+)',undef,
  'Delete outdated entries from triplets and whitelisted tuplets
databases every this many seconds.<br />
  Note: the current timeout must expire before the new setting is
loaded, or you can restart.
  Defaults to 1 hour.'],
[noDelay,'Don\'t Delay these
IP\'s*',60,textinput,'file:nodelay.txt','(.*)',ConfigMakeRe,
  'Enter IP addresses that you don\'t want to be delayed, separated by
pipes (|). There are misbehaving MTAs that will <br />
  not be able to get a legitimate email through a greylisting server
because they do not try again later. An INCOMPLETE <br />
  list of such mailers is available at <a
href="http://cvs.puremagic.com/viewcvs/greylisting/schema/whitelist_ip.txt";
rel="external">cvs.puremagic.com/viewcvs/greylisting/schema/whitelist_ip.txt</a>.
<br />
  When using mentioned list remember to add trailing dots in IP
addresses which specify subnets (eg. 192.168 -> 192.168. ).<br />
  For example: 127.0.0.1|192.168.'],
[DelayError,'Reply Message to Refuse Delayed E<!--get rid of google
autofill-->mail',80,textinput,'451 4.7.1 Please try again
later','(45\d .*)',undef,
  'SMTP reply message to refuse delayed mail. Default: 451 4.7.1
Please try again later
  <br /><hr />
  <div class=\"menuLevel1\">Notes On Delaying</div>
  <input type="button" value="Notes"
onClick="javascript:popFileEditor(\'notes/delaying.txt\',3);">
'],

[0,0,0,'heading','SPF'],
[ValidateSPF,'Enable SPF Validation',0,checkbox,1,'(.*)',undef,
  'Enable Sender Policy Framework Validation as described at <a
href="http://spf.pobox.com"; rel="external">spf.pobox.com</a>.<br />
  This requires an installed <a
href="http://spf.pobox.com/downloads.html";
rel="external">Mail::SPF::Query</a> module in PERL.<br />
  Senders that fail SPF validation will receive a 550 5.7.1 [Sender
not authorized by domain policy] SMTP error code.<br />
  Note: no error is sent if SPF is in test mode.'],
[SPFWL,'Whitelisted SPF Validation',0,checkbox,1,'(.*)',undef,
  'Enable Sender Policy Framework Validation for whitelisted users
also.'],
[SPFNP,'noProcessing SPF Validation',0,checkbox,1,'(.*)',undef,
  'Enable Sender Policy Framework Validation for nonprocessed messages
also.'],
[AddSPFHeader,'Add Received-SPF Header',0,checkbox,1,'(.*)',undef,
  'Add Received-SPF header to header of all emails processed by SPF.'],
[SPFLog,'Enable SPF logging',0,checkbox,0,'(.*)',undef,
  'Enables verbose logging of all SPF checks in the maillog. Default
is to log failures only.'],
[LocalPolicySPF,'Local SPF Policy',60,textinput,'v=spf1 a/24 mx/24 ptr
~all','(.*)',undef,
  'If the sending domain does not publish its own SPF Records a local
policy can be defined.<br />
  The default is v=spf1 a/24 mx/24 ptr ~all'],
[SPFsoftfail,'Fail SPF Softfail Validations',0,checkbox,0,'(.*)',undef,
  'Intentionally fail SPF softfail status responses'],
[SPFneutral,'Fail SPF Neutral Validations',0,checkbox,0,'(.*)',undef,
  'Intentionally fail SPF neutral status responses'],

[DebugSPF,'Enable SPF Debug output to ASSP
Logfile',0,checkbox,0,'(.*)',undef,
  'Enables verbose debugging of SPF queries within the
Mail::SPF::Query module.
  <br /><hr />
  <div class=\"menuLevel1\">Notes On SPF</div>
  <input type="button" value="Notes"
onClick="javascript:popFileEditor(\'notes/spf.txt\',3);">
  '],


-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys - and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
Assp-user mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/assp-user

Reply via email to