Yes, this can be done using configuration directories. Simply follow
David's example below, but change the configuration files
(.../domain_setups/_recipient_/tld/firstdomain) to contain one or more
of the following options as appropriate:
ip-in-rdns-keyword-blacklist-file=!!!
reject-missing-rdns=0
reject-unresolvable-rdns=0
-- Sam Clippinger
Erald Troja wrote:
> David/Linto,
>
> This is very interesting setup.
>
> I would like to push it a bit further and try to find out if it's
> possible to have a IP_IN_RDNS_KEYWORDS restriction in place
> server wide, while allowing a few handpicked domains to have it fully
> turned off. We would like to maintain for RDNS existance and
> RNDS_RESOLVE existance serverwide as well.
>
> As of now I realize it's possible to simply whitelist a few handpicked
> Reverse DNS's
>
> Is this setup possible?
>
> Thanks.
>
> ------------------------
> Erald Troja
>
>
> David Stiller wrote:
>
>> Hi Linto,
>>
>> the per-domain basis you can create by using the config-dir option,
>> wich is well documented in the documentation:
>>
>> http://www.spamdyke.org/documentation/README.html#CONFIGURATION_DIR
>>
>> Nearly any combination of sender and recipient can be configured
>> with this option. This way i configure black- and whitelists for
>> my customers.
>>
>> My structure looks like the following.
>>
>> In /etc/spamdyke.conf i set:
>> config-dir=/var/qmail/spamdyke/domain_setups
>>
>> The directories contain:
>>
>> domain_setups/
>> `-- _recipient_
>> |-- tld
>> | `-- firstdomain (file)
>> `-- tld2
>> `-- seconddomain (file)
>>
>>
>> domain_configs/
>> |-- firstdomain.tld
>> | |-- customer_blacklist_ip
>> | |-- customer_blacklist_rdns
>> | |-- customer_whitelist_ip
>> | `-- customer_whitelist_rdns
>> `-- seconddomain.tld2
>> |-- customer_blacklist_ip
>> |-- customer_blacklist_rdns
>> |-- customer_whitelist_ip
>> `-- customer_whitelist_rdns
>>
>> In the file "firstdomain" you can setup the configuration
>> for the domain and also the IP_IN_RDNS_KEYWORDS of course.
>>
>> In my case these are:
>>
>> ip-blacklist-file=/var/qmail/spamdyke/domain_configs/firstdomain.tld/customer_blacklist_ip
>> rdns-blacklist-file=/var/qmail/spamdyke/domain_configs/firstdomain.tld/customer_blacklist_rdns
>> ip-whitelist-file=/var/qmail/spamdyke/domain_configs/firstdomain.tld/customer_whitelist_ip
>> rdns-whitelist-file=/var/qmail/spamdyke/domain_configs/firstdomain.tld/customer_whitelist_rdns
>> sender-blacklist-file=/var/qmail/spamdyke/domain_configs/firstdomain.tld/customer_blacklist_sender
>>
>> I hope this helps! ;)
>>
>> David
>>
>>
>> Linto Paul schrieb:
>>
>>> Greetings,
>>>
>>> Could please let me know if there is a way to whitelist a domain on
>>> the IP_IN_RDNS_KEYWORDS on a per domain basis.
>>>
>>> Say we get user complaining about a domain called example.com
>>> <http://example.com>, and they say, I am the owner of example.com
>>> <http://example.com> and want this feature not used onto our domain
>>> even though you host it for us.
>>>
>>> ~~~~~~~~~~~~~~~
>>> Oct 21 11:46:44 mail01 spamdyke[24348]: DENIED_IP_IN_RDNS from:
>>> [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> to:
>>> [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> origin_ip: 66.49.15.190
>>> <http://66.49.15.190> origin_rdns: 66.49.15.190.nw.nuvox.net
>>> <http://66.49.15.190.nw.nuvox.net> auth: (unknown)
>>> ~~~~~~~~~~~~~~~~~~~~
>>>
>>> We have the RDNS blocked in our server via keyword:-
>>>
>>> .nuvox.net <http://nuvox.net>
>>>
>>> Is it possible to just put a whitelist for example.com
>>> <http://example.com> and deny all others matching this keyword.
>>>
>>> Thanks,
>>> Linto Paul
>>>
>>>
>>> On Thu, Oct 16, 2008 at 10:30 PM, <[EMAIL PROTECTED]
>>> <mailto:[EMAIL PROTECTED]>> wrote:
>>>
>>> Send spamdyke-users mailing list submissions to
>>> [email protected]
>>> <mailto:[email protected]>
>>>
>>> To subscribe or unsubscribe via the World Wide Web, visit
>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>> or, via email, send a message with subject or body 'help' to
>>> [EMAIL PROTECTED]
>>> <mailto:[EMAIL PROTECTED]>
>>>
>>> You can reach the person managing the list at
>>> [EMAIL PROTECTED]
>>> <mailto:[EMAIL PROTECTED]>
>>>
>>> When replying, please edit your Subject line so it is more specific
>>> than "Re: Contents of spamdyke-users digest..."
>>>
>>>
>>> Today's Topics:
>>>
>>> 1. Regular-Expression Support (Felix Buenemann)
>>> 2. Re: spamdyke +ip-in-rdns-keyword-blacklist-entry option
>>> (Arthur Girardi)
>>> 3. Re: spamdyke +ip-in-rdns-keyword-blacklist-entry option
>>> (Felix Buenemann)
>>> 4. Re: spamdyke +ip-in-rdns-keyword-blacklist-entryoption
>>> (Tim Mancour)
>>>
>>>
>>> ----------------------------------------------------------------------
>>>
>>> Message: 1
>>> Date: Thu, 16 Oct 2008 17:07:56 +0200
>>> From: Felix Buenemann <[EMAIL PROTECTED]
>>> <mailto:[EMAIL PROTECTED]>>
>>> Subject: [spamdyke-users] Regular-Expression Support
>>> To: [email protected] <mailto:[email protected]>
>>> Message-ID: <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>>
>>> Content-Type: text/plain; charset=ISO-8859-15
>>>
>>> Hi Sam,
>>>
>>> I wonder wether there is a specific reason not to use regular
>>> expressions via the PCRE lib to match patterns in blacklist files etc.
>>>
>>> Has this been avoided for performance reasons?
>>>
>>> -- Felix Buenemann
>>>
>>>
>>>
>>> ------------------------------
>>>
>>> Message: 2
>>> Date: Thu, 16 Oct 2008 12:12:58 -0300
>>> From: Arthur Girardi <[EMAIL PROTECTED]
>>> <mailto:[EMAIL PROTECTED]>>
>>> Subject: Re: [spamdyke-users] spamdyke
>>> +ip-in-rdns-keyword-blacklist-entry option
>>> To: [email protected] <mailto:[email protected]>
>>> Message-ID: <[EMAIL PROTECTED]
>>> <mailto:[EMAIL PROTECTED]>>
>>> Content-Type: text/plain; charset=ISO-8859-1; DelSp="Yes";
>>> format="flowed"
>>>
>>> For me it looks as if the message is being blocked because it contains
>>> the country code and ip in the rdns and his setup has
>>> reject-ip-in-cc-rdns enabled.
>>>
>>> In the FAQ it says it will check reject-ip-in-cc-rdns before looking
>>> at the rdns whitelist. I'm not sure if reject-ip-in-cc-rdns would
>>> reject on spot even if it would match in the next filter (rdns
>>> whitelist).
>>>
>>> Arthur
>>>
>>> Citando Sam Clippinger <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>>:
>>>
>>> > It looks like you're trying to use keywords in your rDNS
>>> whitelist file;
>>> > those files don't work that way. In an rDNS whitelist file, you can
>>> > either give complete rDNS names or you can give partial names
>>> (starting
>>> > with a dot) that will match the end of an rDNS name. For example:
>>> > fully.qualified.domain.name.example.com
>>> <http://fully.qualified.domain.name.example.com>
>>> > Will match only one rDNS name (i.e. the entire name
>>> > "fully.qualified.domain.name.example.com
>>> <http://fully.qualified.domain.name.example.com>").
>>> >
>>> > To match all names within a domain (or subdomain):
>>> > .name.example.com <http://name.example.com>
>>> > Will match rDNS names that end with ".name.example.com
>>> <http://name.example.com>" (e.g.
>>> > "fully.qualified.domain.name.example.com
>>> <http://fully.qualified.domain.name.example.com>",
>>> > "silly.domain.name.example.com
>>> <http://silly.domain.name.example.com>" or "short.name.example.com
>>> <http://short.name.example.com>").
>>> >
>>> > This file format is documented here:
>>> > http://www.spamdyke.org/documentation/README_rdns_file_format.html
>>> >
>>> > -- Sam Clippinger
>>> >
>>> > [EMAIL PROTECTED] wrote:
>>> >> Hi list!
>>> >> I run spamdyke 4.0.5 on Debian.
>>> >>
>>> >> I have this in my whitelist_rdns:
>>> >> .static.
>>> >> static.
>>> >> .dedicated.
>>> >> dedicated.
>>> >>
>>> >> But spamdyke reject emails:
>>> >> 10/16/2008 15:03:52 LOG OUTPUT
>>> >> DENIED_IP_IN_CC_RDNS from: [EMAIL PROTECTED] <mailto:[EMAIL
>>> PROTECTED]> to:
>>> [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> origin_ip:
>>> >> xxx.xxx.xxx.xxx origin_rdns: port-xxx-xxx-xxx-xxx.static.qsc.de
>>> <http://port-xxx-xxx-xxx-xxx.static.qsc.de> auth:
>>> >> (unknown)
>>> >>
>>> >> 10/16/2008 15:03:52 FROM REMOTE TO CHILD: 6 bytes
>>> >> DATA
>>> >>
>>> >> 10/16/2008 15:03:52 FROM SPAMDYKE TO REMOTE: 82 bytes
>>> >> 554 Refused. Your reverse DNS entry contains your IP address and a
>>> >> country code.
>>> >>
>>> >> 10/16/2008 15:03:52 FROM REMOTE TO CHILD: 6 bytes
>>> >> RSET
>>> >>
>>> >> 10/16/2008 15:03:52 FROM SPAMDYKE TO REMOTE: 82 bytes
>>> >> 554 Refused. Your reverse DNS entry contains your IP address and a
>>> >> country code.
>>> >>
>>> >> 10/16/2008 15:03:52 FROM REMOTE TO CHILD: 6 bytes
>>> >> QUIT
>>> >>
>>> >> 10/16/2008 15:03:52 FROM SPAMDYKE TO REMOTE: 82 bytes
>>> >> 221 Refused. Your reverse DNS entry contains your IP address and a
>>> >> country code.
>>> >>
>>> >> 10/16/2008 15:03:52 CLOSED
>>> >>
>>> >> Should
>>> >> .static.
>>> >> not match
>>> >> port-xxx-xxx-xxx-xxx.static.qsc.de
>>> <http://port-xxx-xxx-xxx-xxx.static.qsc.de>
>>> >> normally?
>>> >>
>>> >> Is this the same issue what Erald report or a new problem or
>>> did I think
>>> >> in s.th <http://s.th>. wrong?
>>> >>
>>> >> Gruss,
>>> >> Peter
>>> >>
>>> > _______________________________________________
>>> > spamdyke-users mailing list
>>> > [email protected] <mailto:[email protected]>
>>> > http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>> >
>>>
>>>
>>>
>>>
>>> ------------------------------
>>>
>>> Message: 3
>>> Date: Thu, 16 Oct 2008 17:23:24 +0200
>>> From: Felix Buenemann <[EMAIL PROTECTED]
>>> <mailto:[EMAIL PROTECTED]>>
>>> Subject: Re: [spamdyke-users] spamdyke
>>> +ip-in-rdns-keyword-blacklist-entry option
>>> To: [email protected] <mailto:[email protected]>
>>> Message-ID: <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>>
>>> Content-Type: text/plain; charset=ISO-8859-1
>>>
>>> Am 15.10.2008 15:20 Uhr, Tim Mancour schrieb:
>>> > Sam,
>>> >
>>> > There is a set of POSIX compatible regular expression functions
>>> available in
>>> > "C". The functions regcomp() and regexec() are both used by
>>> qmail to provide
>>> > regexp testing for the control/badxxxxx files.
>>>
>>> I jusrt wrote a similar mail, as I was wondering why NOT to use
>>> regexes
>>> in spamdyke, my only idea was that it could hurt performance.
>>>
>>> There is the PCRE library which enable parsing of perl compatible
>>> regular expressions, which have IMHO the cleanest and most widely used
>>> regex syntax. It's also very easy to test those regexes using perl.
>>>
>>> >
>>> > Regards,
>>> > Tim
>>>
>>> -- Felix
>>>
>>> > -----Original Message-----
>>> > From: [EMAIL PROTECTED]
>>> <mailto:[EMAIL PROTECTED]>
>>> > [mailto:[EMAIL PROTECTED]
>>> <mailto:[EMAIL PROTECTED]>] On Behalf Of Sam
>>> Clippinger
>>> > Sent: Wednesday, October 15, 2008 12:57 AM
>>> > To: spamdyke users
>>> > Subject: Re: [spamdyke-users] spamdyke
>>> +ip-in-rdns-keyword-blacklist-entry
>>> > option
>>> >
>>> > The kind of wildcards you're asking for (especially "*.*") would
>>> not be easy
>>> > to implement. However, the code that requires a keyword to be
>>> surrounded by
>>> > non-alphanumeric characters could be easily removed if you want
>>> to test the
>>> > results. In filter.c, just remove the if() block from lines 697
>>> to 706 (in
>>> > version 4.0.5). Rerun "make" and install the new binary. My
>>> instinct says
>>> > you won't like the new behavior but I could easily be wrong.
>>> >
>>> > In the long run, the best solution is probably to add support
>>> for regular
>>> > expressions. They're much more flexible and powerful and the
>>> documentation
>>> > would be much simpler as well, since many tutorials already
>>> exist for
>>> > regexps. Several people have asked for regular expression
>>> support and it's
>>> > on my list (though it's not high priority at the moment).
>>> >
>>> > -- Sam Clippinger
>>> >
>>> > Youri V. Kravatsky wrote:
>>> >> Hello Sam,
>>> >>
>>> >>
>>> >>> BTW, spamdyke won't find a keyword like "dyn" in the middle of
>>> other
>>> >>> text like "dynamic". In order to match, a keyword must (1) be
>>> at the
>>> >>> beginning of the name, (2) be surrounded with non-alphanumeric
>>> >>> characters (i.e. dots or dashes) AND include the rDNS name's
>>> TLD (e.g.
>>> >>> "example" would not be found in "11.22.33.44.example.com
>>> <http://11.22.33.44.example.com>") or (3) the
>>> >>> keyword must begin with a dot AND match the entire end of the rDNS
>>> >>> name (e.g. ".example.com <http://example.com>" would match
>>> "11.22.33.44.example.com <http://11.22.33.44.example.com>").
>>> >>> This logic exists to prevent a keyword like "dynamic" from
>>> matching
>>> >>> "11.22.33.44.notdynamic.example.com
>>> <http://11.22.33.44.notdynamic.example.com>".
>>> >>>
>>> >> Well, it is not good really, I know that correctly work on
>>> wildcards
>>> >> is not easy work in C, unlike, perl, but it would be very good
>>> to use
>>> >> file like
>>> >> .*dynamic.*
>>> >> .dynamic*.*
>>> >
>>> >> .broadband*.*
>>> >
>>> >> .*broadband.*
>>> >
>>> >> .*cable.*
>>> >
>>> >> .cable*.*
>>> >
>>> >> .*pppoe.*
>>> >
>>> >> .pppoe*.*
>>> >> Or else we will read log for a full days to find out all
>>> possible
>>> >> home-dynamic-cable-broadband providers all over the world...
>>> >>
>>>
>>>
>>>
>>>
>>> ------------------------------
>>>
>>> Message: 4
>>> Date: Thu, 16 Oct 2008 12:04:24 -0400
>>> From: "Tim Mancour" <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>>
>>> Subject: Re: [spamdyke-users] spamdyke
>>> +ip-in-rdns-keyword-blacklist-entryoption
>>> To: "'spamdyke users'" <[email protected]
>>> <mailto:[email protected]>>
>>> Message-ID: <[EMAIL PROTECTED]>
>>> Content-Type: text/plain; charset="us-ascii"
>>>
>>> I added a rdns regexp matching to my qmailtoaster a few years ago
>>> and I have
>>> not noticed any performance issues. You do, however, have to make
>>> sure that
>>> you keep the number of expressions do to a minimum set (my list of
>>> expressions is currently around 50 lines long).
>>>
>>> -----Original Message-----
>>> From: [EMAIL PROTECTED]
>>> <mailto:[EMAIL PROTECTED]>
>>> [mailto:[EMAIL PROTECTED]
>>> <mailto:[EMAIL PROTECTED]>] On Behalf Of Felix
>>> Buenemann
>>> Sent: Thursday, October 16, 2008 11:23 AM
>>> To: [email protected] <mailto:[email protected]>
>>> Subject: Re: [spamdyke-users] spamdyke
>>> +ip-in-rdns-keyword-blacklist-entryoption
>>>
>>> Am 15.10.2008 15:20 Uhr, Tim Mancour schrieb:
>>> > Sam,
>>> >
>>> > There is a set of POSIX compatible regular expression functions
>>> > available in "C". The functions regcomp() and regexec() are both
>>> used
>>> > by qmail to provide regexp testing for the control/badxxxxx files.
>>>
>>> I jusrt wrote a similar mail, as I was wondering why NOT to use
>>> regexes in
>>> spamdyke, my only idea was that it could hurt performance.
>>>
>>> There is the PCRE library which enable parsing of perl compatible
>>> regular
>>> expressions, which have IMHO the cleanest and most widely used
>>> regex syntax.
>>> It's also very easy to test those regexes using perl.
>>>
>>> >
>>> > Regards,
>>> > Tim
>>>
>>> -- Felix
>>>
>>> > -----Original Message-----
>>> > From: [EMAIL PROTECTED]
>>> <mailto:[EMAIL PROTECTED]>
>>> > [mailto:[EMAIL PROTECTED]
>>> <mailto:[EMAIL PROTECTED]>] On Behalf Of Sam
>>> > Clippinger
>>> > Sent: Wednesday, October 15, 2008 12:57 AM
>>> > To: spamdyke users
>>> > Subject: Re: [spamdyke-users] spamdyke
>>> > +ip-in-rdns-keyword-blacklist-entry
>>> > option
>>> >
>>> > The kind of wildcards you're asking for (especially "*.*") would not
>>> > be easy to implement. However, the code that requires a keyword
>>> to be
>>> > surrounded by non-alphanumeric characters could be easily removed if
>>> > you want to test the results. In filter.c, just remove the if()
>>> block
>>> > from lines 697 to 706 (in version 4.0.5). Rerun "make" and install
>>> > the new binary. My instinct says you won't like the new
>>> behavior but I
>>> could easily be wrong.
>>> >
>>> > In the long run, the best solution is probably to add support for
>>> > regular expressions. They're much more flexible and powerful
>>> and the
>>> > documentation would be much simpler as well, since many tutorials
>>> > already exist for regexps. Several people have asked for regular
>>> > expression support and it's on my list (though it's not high
>>> priority at
>>> the moment).
>>> >
>>> > -- Sam Clippinger
>>> >
>>> > Youri V. Kravatsky wrote:
>>> >> Hello Sam,
>>> >>
>>> >>
>>> >>> BTW, spamdyke won't find a keyword like "dyn" in the middle of
>>> other
>>> >>> text like "dynamic". In order to match, a keyword must (1) be at
>>> >>> the beginning of the name, (2) be surrounded with non-alphanumeric
>>> >>> characters (i.e. dots or dashes) AND include the rDNS name's
>>> TLD (e.g.
>>> >>> "example" would not be found in "11.22.33.44.example.com
>>> <http://11.22.33.44.example.com>") or (3)
>>> >>> the keyword must begin with a dot AND match the entire end of the
>>> >>> rDNS name (e.g. ".example.com <http://example.com>" would
>>> match "11.22.33.44.example.com <http://11.22.33.44.example.com>").
>>> >>> This logic exists to prevent a keyword like "dynamic" from
>>> matching
>>> >>> "11.22.33.44.notdynamic.example.com
>>> <http://11.22.33.44.notdynamic.example.com>".
>>> >>>
>>> >> Well, it is not good really, I know that correctly work on
>>> wildcards
>>> >> is not easy work in C, unlike, perl, but it would be very good
>>> to use
>>> >> file like
>>> >> .*dynamic.*
>>> >> .dynamic*.*
>>> >
>>> >> .broadband*.*
>>> >
>>> >> .*broadband.*
>>> >
>>> >> .*cable.*
>>> >
>>> >> .cable*.*
>>> >
>>> >> .*pppoe.*
>>> >
>>> >> .pppoe*.*
>>> >> Or else we will read log for a full days to find out all
>>> possible
>>> >> home-dynamic-cable-broadband providers all over the world...
>>> >>
>>>
>>>
>>> _______________________________________________
>>> spamdyke-users mailing list
>>> [email protected] <mailto:[email protected]>
>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>>
>>>
>>>
>>> ------------------------------
>>>
>>> _______________________________________________
>>> spamdyke-users mailing list
>>> [email protected] <mailto:[email protected]>
>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>>
>>>
>>> End of spamdyke-users Digest, Vol 17, Issue 37
>>> **********************************************
>>>
>>>
>>> ------------------------------------------------------------------------
>>>
>>> _______________________________________________
>>> spamdyke-users mailing list
>>> [email protected]
>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>>
>>>
>> --
>> BLACKBIT neue Medien GmbH | BLACKBIT neue Werbung GmbH
>> Technischer Support/ Hotline
>> Ernst-Ruhstrat-Straße 6 - D-37079 Göttingen
>>
>> Geschäftsführer: Stefano Viani
>> Registergericht: Amtsgericht Göttingen, HRB 3222
>> Umsatzsteueridentifikationsnummer (§ 27a UstG): DE 813 114 917
>>
>> Tel: +49-551-50675-50 - Fax: +49-551-50675-20
>> E-Mail: [EMAIL PROTECTED]
>>
>> Klassische Werbung und Online-Marketing: http://www.blackbit.de
>> Software fuer Online-Marketing: http://www.go-community.de
>>
>>
>> ------------------------------------------------------------------------
>>
>> _______________________________________________
>> spamdyke-users mailing list
>> [email protected]
>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>
> _______________________________________________
> spamdyke-users mailing list
> [email protected]
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>
_______________________________________________
spamdyke-users mailing list
[email protected]
http://www.spamdyke.org/mailman/listinfo/spamdyke-users