Hi Linto,
the per-domain basis you can create by using the config-dir option,
wich is well documented in the documentation:
http://www.spamdyke.org/documentation/README.html#CONFIGURATION_DIR
Nearly any combination of sender and recipient can be configured
with this option. This way i configure black- and whitelists for
my customers.
My structure looks like the following.
In /etc/spamdyke.conf i set:
config-dir=/var/qmail/spamdyke/domain_setups
The directories contain:
domain_setups/
`-- _recipient_
|-- tld
| `-- firstdomain (file)
`-- tld2
`-- seconddomain (file)
domain_configs/
|-- firstdomain.tld
| |-- customer_blacklist_ip
| |-- customer_blacklist_rdns
| |-- customer_whitelist_ip
| `-- customer_whitelist_rdns
`-- seconddomain.tld2
|-- customer_blacklist_ip
|-- customer_blacklist_rdns
|-- customer_whitelist_ip
`-- customer_whitelist_rdns
In the file "firstdomain" you can setup the configuration
for the domain and also the IP_IN_RDNS_KEYWORDS of course.
In my case these are:
ip-blacklist-file=/var/qmail/spamdyke/domain_configs/firstdomain.tld/customer_blacklist_ip
rdns-blacklist-file=/var/qmail/spamdyke/domain_configs/firstdomain.tld/customer_blacklist_rdns
ip-whitelist-file=/var/qmail/spamdyke/domain_configs/firstdomain.tld/customer_whitelist_ip
rdns-whitelist-file=/var/qmail/spamdyke/domain_configs/firstdomain.tld/customer_whitelist_rdns
sender-blacklist-file=/var/qmail/spamdyke/domain_configs/firstdomain.tld/customer_blacklist_sender
I hope this helps! ;)
David
Linto Paul schrieb:
Greetings,
Could please let me know if there is a way to whitelist a domain on
the IP_IN_RDNS_KEYWORDS on a per domain basis.
Say we get user complaining about a domain called example.com
<http://example.com>, and they say, I am the owner of example.com
<http://example.com> and want this feature not used onto our domain
even though you host it for us.
~~~~~~~~~~~~~~~
Oct 21 11:46:44 mail01 spamdyke[24348]: DENIED_IP_IN_RDNS from:
[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> to:
[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> origin_ip: 66.49.15.190
<http://66.49.15.190> origin_rdns: 66.49.15.190.nw.nuvox.net
<http://66.49.15.190.nw.nuvox.net> auth: (unknown)
~~~~~~~~~~~~~~~~~~~~
We have the RDNS blocked in our server via keyword:-
.nuvox.net <http://nuvox.net>
Is it possible to just put a whitelist for example.com
<http://example.com> and deny all others matching this keyword.
Thanks,
Linto Paul
On Thu, Oct 16, 2008 at 10:30 PM, <[EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]>> wrote:
Send spamdyke-users mailing list submissions to
spamdyke-users@spamdyke.org
<mailto:spamdyke-users@spamdyke.org>
To subscribe or unsubscribe via the World Wide Web, visit
http://www.spamdyke.org/mailman/listinfo/spamdyke-users
or, via email, send a message with subject or body 'help' to
[EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]>
You can reach the person managing the list at
[EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]>
When replying, please edit your Subject line so it is more specific
than "Re: Contents of spamdyke-users digest..."
Today's Topics:
1. Regular-Expression Support (Felix Buenemann)
2. Re: spamdyke +ip-in-rdns-keyword-blacklist-entry option
(Arthur Girardi)
3. Re: spamdyke +ip-in-rdns-keyword-blacklist-entry option
(Felix Buenemann)
4. Re: spamdyke +ip-in-rdns-keyword-blacklist-entryoption
(Tim Mancour)
----------------------------------------------------------------------
Message: 1
Date: Thu, 16 Oct 2008 17:07:56 +0200
From: Felix Buenemann <[EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]>>
Subject: [spamdyke-users] Regular-Expression Support
To: spamdyke-users@spamdyke.org <mailto:spamdyke-users@spamdyke.org>
Message-ID: <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>>
Content-Type: text/plain; charset=ISO-8859-15
Hi Sam,
I wonder wether there is a specific reason not to use regular
expressions via the PCRE lib to match patterns in blacklist files etc.
Has this been avoided for performance reasons?
-- Felix Buenemann
------------------------------
Message: 2
Date: Thu, 16 Oct 2008 12:12:58 -0300
From: Arthur Girardi <[EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]>>
Subject: Re: [spamdyke-users] spamdyke
+ip-in-rdns-keyword-blacklist-entry option
To: spamdyke-users@spamdyke.org <mailto:spamdyke-users@spamdyke.org>
Message-ID: <[EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]>>
Content-Type: text/plain; charset=ISO-8859-1; DelSp="Yes";
format="flowed"
For me it looks as if the message is being blocked because it contains
the country code and ip in the rdns and his setup has
reject-ip-in-cc-rdns enabled.
In the FAQ it says it will check reject-ip-in-cc-rdns before looking
at the rdns whitelist. I'm not sure if reject-ip-in-cc-rdns would
reject on spot even if it would match in the next filter (rdns
whitelist).
Arthur
Citando Sam Clippinger <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>>:
> It looks like you're trying to use keywords in your rDNS
whitelist file;
> those files don't work that way. In an rDNS whitelist file, you can
> either give complete rDNS names or you can give partial names
(starting
> with a dot) that will match the end of an rDNS name. For example:
> fully.qualified.domain.name.example.com
<http://fully.qualified.domain.name.example.com>
> Will match only one rDNS name (i.e. the entire name
> "fully.qualified.domain.name.example.com
<http://fully.qualified.domain.name.example.com>").
>
> To match all names within a domain (or subdomain):
> .name.example.com <http://name.example.com>
> Will match rDNS names that end with ".name.example.com
<http://name.example.com>" (e.g.
> "fully.qualified.domain.name.example.com
<http://fully.qualified.domain.name.example.com>",
> "silly.domain.name.example.com
<http://silly.domain.name.example.com>" or "short.name.example.com
<http://short.name.example.com>").
>
> This file format is documented here:
> http://www.spamdyke.org/documentation/README_rdns_file_format.html
>
> -- Sam Clippinger
>
> [EMAIL PROTECTED] wrote:
>> Hi list!
>> I run spamdyke 4.0.5 on Debian.
>>
>> I have this in my whitelist_rdns:
>> .static.
>> static.
>> .dedicated.
>> dedicated.
>>
>> But spamdyke reject emails:
>> 10/16/2008 15:03:52 LOG OUTPUT
>> DENIED_IP_IN_CC_RDNS from: [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>
to:
[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> origin_ip:
>> xxx.xxx.xxx.xxx origin_rdns: port-xxx-xxx-xxx-xxx.static.qsc.de
<http://port-xxx-xxx-xxx-xxx.static.qsc.de> auth:
>> (unknown)
>>
>> 10/16/2008 15:03:52 FROM REMOTE TO CHILD: 6 bytes
>> DATA
>>
>> 10/16/2008 15:03:52 FROM SPAMDYKE TO REMOTE: 82 bytes
>> 554 Refused. Your reverse DNS entry contains your IP address and a
>> country code.
>>
>> 10/16/2008 15:03:52 FROM REMOTE TO CHILD: 6 bytes
>> RSET
>>
>> 10/16/2008 15:03:52 FROM SPAMDYKE TO REMOTE: 82 bytes
>> 554 Refused. Your reverse DNS entry contains your IP address and a
>> country code.
>>
>> 10/16/2008 15:03:52 FROM REMOTE TO CHILD: 6 bytes
>> QUIT
>>
>> 10/16/2008 15:03:52 FROM SPAMDYKE TO REMOTE: 82 bytes
>> 221 Refused. Your reverse DNS entry contains your IP address and a
>> country code.
>>
>> 10/16/2008 15:03:52 CLOSED
>>
>> Should
>> .static.
>> not match
>> port-xxx-xxx-xxx-xxx.static.qsc.de
<http://port-xxx-xxx-xxx-xxx.static.qsc.de>
>> normally?
>>
>> Is this the same issue what Erald report or a new problem or
did I think
>> in s.th <http://s.th>. wrong?
>>
>> Gruss,
>> Peter
>>
> _______________________________________________
> spamdyke-users mailing list
> spamdyke-users@spamdyke.org <mailto:spamdyke-users@spamdyke.org>
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>
------------------------------
Message: 3
Date: Thu, 16 Oct 2008 17:23:24 +0200
From: Felix Buenemann <[EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]>>
Subject: Re: [spamdyke-users] spamdyke
+ip-in-rdns-keyword-blacklist-entry option
To: spamdyke-users@spamdyke.org <mailto:spamdyke-users@spamdyke.org>
Message-ID: <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>>
Content-Type: text/plain; charset=ISO-8859-1
Am 15.10.2008 15:20 Uhr, Tim Mancour schrieb:
> Sam,
>
> There is a set of POSIX compatible regular expression functions
available in
> "C". The functions regcomp() and regexec() are both used by
qmail to provide
> regexp testing for the control/badxxxxx files.
I jusrt wrote a similar mail, as I was wondering why NOT to use
regexes
in spamdyke, my only idea was that it could hurt performance.
There is the PCRE library which enable parsing of perl compatible
regular expressions, which have IMHO the cleanest and most widely used
regex syntax. It's also very easy to test those regexes using perl.
>
> Regards,
> Tim
-- Felix
> -----Original Message-----
> From: [EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]>
> [mailto:[EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]>] On Behalf Of Sam
Clippinger
> Sent: Wednesday, October 15, 2008 12:57 AM
> To: spamdyke users
> Subject: Re: [spamdyke-users] spamdyke
+ip-in-rdns-keyword-blacklist-entry
> option
>
> The kind of wildcards you're asking for (especially "*.*") would
not be easy
> to implement. However, the code that requires a keyword to be
surrounded by
> non-alphanumeric characters could be easily removed if you want
to test the
> results. In filter.c, just remove the if() block from lines 697
to 706 (in
> version 4.0.5). Rerun "make" and install the new binary. My
instinct says
> you won't like the new behavior but I could easily be wrong.
>
> In the long run, the best solution is probably to add support
for regular
> expressions. They're much more flexible and powerful and the
documentation
> would be much simpler as well, since many tutorials already
exist for
> regexps. Several people have asked for regular expression
support and it's
> on my list (though it's not high priority at the moment).
>
> -- Sam Clippinger
>
> Youri V. Kravatsky wrote:
>> Hello Sam,
>>
>>
>>> BTW, spamdyke won't find a keyword like "dyn" in the middle of
other
>>> text like "dynamic". In order to match, a keyword must (1) be
at the
>>> beginning of the name, (2) be surrounded with non-alphanumeric
>>> characters (i.e. dots or dashes) AND include the rDNS name's
TLD (e.g.
>>> "example" would not be found in "11.22.33.44.example.com
<http://11.22.33.44.example.com>") or (3) the
>>> keyword must begin with a dot AND match the entire end of the rDNS
>>> name (e.g. ".example.com <http://example.com>" would match
"11.22.33.44.example.com <http://11.22.33.44.example.com>").
>>> This logic exists to prevent a keyword like "dynamic" from
matching
>>> "11.22.33.44.notdynamic.example.com
<http://11.22.33.44.notdynamic.example.com>".
>>>
>> Well, it is not good really, I know that correctly work on
wildcards
>> is not easy work in C, unlike, perl, but it would be very good
to use
>> file like
>> .*dynamic.*
>> .dynamic*.*
>
>> .broadband*.*
>
>> .*broadband.*
>
>> .*cable.*
>
>> .cable*.*
>
>> .*pppoe.*
>
>> .pppoe*.*
>> Or else we will read log for a full days to find out all
possible
>> home-dynamic-cable-broadband providers all over the world...
>>
------------------------------
Message: 4
Date: Thu, 16 Oct 2008 12:04:24 -0400
From: "Tim Mancour" <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>>
Subject: Re: [spamdyke-users] spamdyke
+ip-in-rdns-keyword-blacklist-entryoption
To: "'spamdyke users'" <spamdyke-users@spamdyke.org
<mailto:spamdyke-users@spamdyke.org>>
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset="us-ascii"
I added a rdns regexp matching to my qmailtoaster a few years ago
and I have
not noticed any performance issues. You do, however, have to make
sure that
you keep the number of expressions do to a minimum set (my list of
expressions is currently around 50 lines long).
-----Original Message-----
From: [EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]>
[mailto:[EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]>] On Behalf Of Felix
Buenemann
Sent: Thursday, October 16, 2008 11:23 AM
To: spamdyke-users@spamdyke.org <mailto:spamdyke-users@spamdyke.org>
Subject: Re: [spamdyke-users] spamdyke
+ip-in-rdns-keyword-blacklist-entryoption
Am 15.10.2008 15:20 Uhr, Tim Mancour schrieb:
> Sam,
>
> There is a set of POSIX compatible regular expression functions
> available in "C". The functions regcomp() and regexec() are both
used
> by qmail to provide regexp testing for the control/badxxxxx files.
I jusrt wrote a similar mail, as I was wondering why NOT to use
regexes in
spamdyke, my only idea was that it could hurt performance.
There is the PCRE library which enable parsing of perl compatible
regular
expressions, which have IMHO the cleanest and most widely used
regex syntax.
It's also very easy to test those regexes using perl.
>
> Regards,
> Tim
-- Felix
> -----Original Message-----
> From: [EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]>
> [mailto:[EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]>] On Behalf Of Sam
> Clippinger
> Sent: Wednesday, October 15, 2008 12:57 AM
> To: spamdyke users
> Subject: Re: [spamdyke-users] spamdyke
> +ip-in-rdns-keyword-blacklist-entry
> option
>
> The kind of wildcards you're asking for (especially "*.*") would not
> be easy to implement. However, the code that requires a keyword
to be
> surrounded by non-alphanumeric characters could be easily removed if
> you want to test the results. In filter.c, just remove the if()
block
> from lines 697 to 706 (in version 4.0.5). Rerun "make" and install
> the new binary. My instinct says you won't like the new
behavior but I
could easily be wrong.
>
> In the long run, the best solution is probably to add support for
> regular expressions. They're much more flexible and powerful
and the
> documentation would be much simpler as well, since many tutorials
> already exist for regexps. Several people have asked for regular
> expression support and it's on my list (though it's not high
priority at
the moment).
>
> -- Sam Clippinger
>
> Youri V. Kravatsky wrote:
>> Hello Sam,
>>
>>
>>> BTW, spamdyke won't find a keyword like "dyn" in the middle of
other
>>> text like "dynamic". In order to match, a keyword must (1) be at
>>> the beginning of the name, (2) be surrounded with non-alphanumeric
>>> characters (i.e. dots or dashes) AND include the rDNS name's
TLD (e.g.
>>> "example" would not be found in "11.22.33.44.example.com
<http://11.22.33.44.example.com>") or (3)
>>> the keyword must begin with a dot AND match the entire end of the
>>> rDNS name (e.g. ".example.com <http://example.com>" would
match "11.22.33.44.example.com <http://11.22.33.44.example.com>").
>>> This logic exists to prevent a keyword like "dynamic" from
matching
>>> "11.22.33.44.notdynamic.example.com
<http://11.22.33.44.notdynamic.example.com>".
>>>
>> Well, it is not good really, I know that correctly work on
wildcards
>> is not easy work in C, unlike, perl, but it would be very good
to use
>> file like
>> .*dynamic.*
>> .dynamic*.*
>
>> .broadband*.*
>
>> .*broadband.*
>
>> .*cable.*
>
>> .cable*.*
>
>> .*pppoe.*
>
>> .pppoe*.*
>> Or else we will read log for a full days to find out all
possible
>> home-dynamic-cable-broadband providers all over the world...
>>
_______________________________________________
spamdyke-users mailing list
spamdyke-users@spamdyke.org <mailto:spamdyke-users@spamdyke.org>
http://www.spamdyke.org/mailman/listinfo/spamdyke-users
------------------------------
_______________________________________________
spamdyke-users mailing list
spamdyke-users@spamdyke.org <mailto:spamdyke-users@spamdyke.org>
http://www.spamdyke.org/mailman/listinfo/spamdyke-users
End of spamdyke-users Digest, Vol 17, Issue 37
**********************************************
------------------------------------------------------------------------
_______________________________________________
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users
--
BLACKBIT neue Medien GmbH | BLACKBIT neue Werbung GmbH
Technischer Support/ Hotline
Ernst-Ruhstrat-Straße 6 - D-37079 Göttingen
Geschäftsführer: Stefano Viani
Registergericht: Amtsgericht Göttingen, HRB 3222
Umsatzsteueridentifikationsnummer (§ 27a UstG): DE 813 114 917
Tel: +49-551-50675-50 - Fax: +49-551-50675-20
E-Mail: [EMAIL PROTECTED]
Klassische Werbung und Online-Marketing: http://www.blackbit.de
Software fuer Online-Marketing: http://www.go-community.de
_______________________________________________
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users