# escape any character \c = c (\n = n, \\ = \, ...). This format allow non-ascii
# strings and string concatenation " abcd " "ef" = " abcd ef".
# - ASCII-only strings can be written without double-quotes. They can be splitted
-# into several lines using shell-like escaping of EOL. A string begins on the
-# first non-blank character. This king of string can not contain semi-colons.
+# into several lines using shell-like escaping of EOL. A string begins and ends on
+# on a non-blank character. This king of string can not contain semi-colons.
# eg:
# The following format are equivalent:
# (1) this is a str\
# - a list of type-specific parameters
# - a list of hooks (on_hookname)
#
+# Format:
+# A filter look likes that:
+#
+# filter_name {
+# type = type_name;
+# param1 = parameter value 1;
+# ...
+# on_hook1 = action1;
+# on_hook2 = action2;
+# ...
+# }
+#
# Hooks:
# A filter can returns different values. Each return value is given a name. The
# configuration associates an action to run to a return value name.
#
# Filter:
# Current defined filter types are:
-# - rbl: match the client_address against one or more blacklist files from a rbl
+# - iplist: match the client_address against one or more blacklist files from a rbl
# Parameters:
# - file: (non)?lock:weight:filename
-# declare a file to load. If lock is given, the blacklist is locked into the
+# declare a file to load. If lock is given, the klist is locked into the
# RAM. The weight is a number giving the weight of this blaclist file in the
# score of the IP
-# - soft_threshold: score (default: 0)
+# - soft_threshold: score (default: 1)
# minimum score to match the soft_match return value
-# - hard_threshold: score (default: 0)
+# - hard_threshold: score (default: 1)
# minimum score to match the hard_match return value
# Return value:
# The score of a query is the sum of the weight of the blacklist it matched.
# - If the IP can not be parsed, returns error
-# - If the score is strictly greater than hard_threshold, returns hard_match
-# - If the score is strictly greater than soft_threshold, returns soft_match
+# - If the score is strictly greater >= than hard_threshold, returns hard_match
+# - If the score is strictly greater >= than soft_threshold, returns soft_match
# - Else, returns fail
-#
+
+# Lookup in a rbl
+spamhaus_and_abuseat {
+ type = iplist;
+
+ # configuration
+ file = lock:10:/var/spool/postlicyd/rbl.spamhaus.org;
+ file = lock:1:/var/spool/postlicyd/cbl.abuseat.org;
+ soft_threshold = 1;
+ hard_threshold = 11;
+
+ # hooks
+ on_soft_match = greylist;
+ on_hard_match = postfix:REJECT optional text;
+ on_fail = postfix:OK;
+ on_error = postfix:DUNNO;
+}
+
+
+# - strlist: match strings from the query against a list of list.
+# Parameters:
+# - file: (non)?lock:(pre|suf)fix:weight:filename
+# declare a file to load. If lock is given, the list is locked into the
+# RAM. Prefix/Suffix is a parameter to tell the matcher which is the most
+# efficient storage order. The strings are internally stored into a trie that
+# allow high compression if a lot of prefix are shared by several strings. If
+# you choose "prefix", string are stored in the natural order in memory and
+# prefix compression is performed. If you choose "suffix", strings are stored
+# in reverse order in memory and suffix compression is performed. The weight
+# is a number giving the weight of this list in the string score.
+# - soft_threshold: score (default: 1)
+# minimum score to match the soft_match return value
+# - hard_threshold: score (default: 1)
+# minimum score to match the hard_match return value
+# - fields: field_name(,field_name)*
+# list of field the match the string against.
+# currently only email OR hostname fields are supported. You MUST choose only
+# one of these types per strlist, and be carefull that the field you requested
+# are available in the protocol state you want to use this filter for.
+# * hostname fields: helo_name, client_name, reverse_client_name
+# * email fields: sender, recipient
+# Return value:
+# The score of a query is the sum of the weight of the list it matched.
+# - If the score is strictly greater >= than hard_threshold, returns hard_match
+# - If the score is strictly greater >= than soft_threshold, returns soft_match
+# - Else, returns fail
+# State:
+# - to match helo_name, you must be on HELO state or later
+# (stmpd_helo_restrictions)
+# - to match sender, you must be on MAIL state or later
+# (smtpd_sender_restrictions)
+# - to match recipient, you must on RCPT state (stmpd_recipient_restrictions)
+# - client_name and reverse_client_name are always available
+
+# Whitelist some clients
+client_whitelist {
+ type = strlist;
+
+ # configuration
+ file = lock:1:/var/spool/postlicyd/client_whitelist;
+ fields = client_name;
+
+ # hooks
+ on_hard_match = postfix:OK;
+ on_fail = spamhaus_and_abuseat;
+}
+
+
# - greylist: greylister
# Paramters:
# - path: /my/path/ (required)
# - if the client is whitelisted, returns whitelist
# - if the client is greylisted, returns greylist
# - if a error occured (not currently possible), returns error
-#
-# Format:
-# A filter look likes that:
-#
-# filter_name {
-# type = type_name;
-# param1 = parameter value 1;
-# ...
-# on_action1 = action;
-# }
-
+# State:
+# this filter is a recipient filter and works in RCPT state only
+# (smtpd_recipient_restrictions).
+# Perform greylisting
greylist {
type = greylist;
on_whitelist = postfix:OK;
}
-spamhaus_and_abuseat {
- type = rbl;
-
- # configuration
- file = lock:10:/var/spool/postlicyd/rbl.spamhaus.org;
- file = lock:1:/var/spool/postlicyd/cbl.abuseat.org;
- soft_threshold = 0;
- hard_threshold = 10;
-
- # hooks
- on_soft_match = greylist;
- on_hard_match = postfix:REJECT optional text;
- on_fail = postfix:OK;
- on_error = postfix:DUNNO;
-}
-
# ENTRY POINTS
#
# - data_filter: called on the DATA command (smtpd_data_restrictions)
# - end_of_data_filter: called on the END-OF-DATA command
# (smtpd_end_of_data_restrictions)
-# - ertn_filter: called on the ETRN command (stmpd_etrn_restrictions)
+# - etrn_filter: called on the ETRN command (stmpd_etrn_restrictions)
# - verify_filter: called on the VRFY command (no postfix hook ?)
-recipient_filter = spamhaus_and_abuseat;
+recipient_filter = client_whitelist;
+
+
+# SERVER PORT
+#
+# Port to which the server is bound. The default is 10000. If the port is specified as
+# a command line parameter, the value specified on command line overides this value.
+#
+# You must RESTART the server to change the port (reload does not affect the port).
+
+port = 10000;
# vim:set syntax=conf: