https://issues.apache.org/SpamAssassin/show_bug.cgi?id=7060
Bug ID: 7060
Summary: Allow local criteria for blocking <A HREF> URL's based
on the hosts ISP, Country, or CIDR block
Product: Spamassassin
Version: unspecified
Hardware: PC
OS: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Plugins
Assignee: [email protected]
Reporter: [email protected]
Created attachment 5207
--> https://issues.apache.org/SpamAssassin/attachment.cgi?id=5207&action=edit
First cut at module
Setting up rules to use URIDNSBL.pm can be tricky for the uninitiated, and
debugging issues requires specific knowledge of how the RR's are encoded for
that DNSBL.
New entries sometimes take a while to get propagated.
And one has to use to totality of blacklisting: there is no way to configure
only using selected parts of the DNSBL.
This plugin allows a site administrator to make trivial, instantaneous
blacklisting entries based on Country Code (ISO 3166 2 letter codes), ISP name
(as per the OrgName in the regional registry's database), or explicit CIDR
blocks.
The first 2 functions require Geo::IP to be installed, and licensing of the
GeoIPISP database in the case of ISP blocking.
See the attachment for documentation on usage and dependencies.
One known issue at this time is that the plugin uses synchronous name to
address mappings via gethostbyname().
If a look-aside cache of mappings were available, as the one proposed in bug
#7054, then both execution time and the number of DNS RR requests could be
reduced.
Until then, the synchronous name lookups make this plugin unsuitable for
high-volume sites.
--
You are receiving this mail because:
You are the assignee for the bug.