dbaa9dbd6c
on files in plugins dir: fixed a number of POD errors formatted some # comments into POD removed bare 1; (these are plugins, not perl modules) most instances of this were copy/pasted from a previous plugin that had it removed instances of # vim ts=N ... they weren't consistent, many didn't match .perltidyrc on modules that failed perl -c tests, added 'use Qpsmtpd::Constants;' Conflicts: plugins/async/check_earlytalker plugins/async/dns_whitelist_soft plugins/async/dnsbl plugins/async/queue/smtp-forward plugins/async/require_resolvable_fromhost plugins/async/rhsbl plugins/async/uribl plugins/auth/auth_checkpassword plugins/auth/auth_cvm_unix_local plugins/auth/auth_flat_file plugins/auth/auth_ldap_bind plugins/auth/auth_vpopmail plugins/auth/auth_vpopmail_sql plugins/auth/authdeny plugins/check_badmailfromto plugins/check_badrcptto_patterns plugins/check_bogus_bounce plugins/check_earlytalker plugins/check_norelay plugins/check_spamhelo plugins/connection_time plugins/dns_whitelist_soft plugins/dnsbl plugins/domainkeys plugins/greylisting plugins/hosts_allow plugins/http_config plugins/logging/adaptive plugins/logging/apache plugins/logging/connection_id plugins/logging/transaction_id plugins/logging/warn plugins/milter plugins/queue/exim-bsmtp plugins/queue/maildir plugins/queue/postfix-queue plugins/queue/smtp-forward plugins/quit_fortune plugins/random_error plugins/rcpt_map plugins/rcpt_regexp plugins/relay_only plugins/require_resolvable_fromhost plugins/rhsbl plugins/sender_permitted_from plugins/spamassassin plugins/tls plugins/tls_cert plugins/uribl plugins/virus/aveclient plugins/virus/bitdefender plugins/virus/clamav plugins/virus/clamdscan plugins/virus/hbedv plugins/virus/kavscanner plugins/virus/klez_filter plugins/virus/sophie plugins/virus/uvscan
143 lines
3.5 KiB
Perl
143 lines
3.5 KiB
Perl
#!perl -Tw
|
|
|
|
use Qpsmtpd::Plugin::Async::DNSBLBase;
|
|
|
|
use strict;
|
|
use warnings;
|
|
|
|
sub init {
|
|
my ($self, $qp, %args) = @_;
|
|
my $class = ref $self;
|
|
|
|
$self->isa_plugin("uribl");
|
|
{
|
|
no strict 'refs';
|
|
push @{"${class}::ISA"}, 'Qpsmtpd::Plugin::Async::DNSBLBase';
|
|
}
|
|
|
|
$self->SUPER::init($qp, %args);
|
|
}
|
|
|
|
sub register {
|
|
my $self = shift;
|
|
|
|
$self->register_hook('data_post', 'start_data_post');
|
|
$self->register_hook('data_post', 'finish_data_post');
|
|
}
|
|
|
|
sub start_data_post {
|
|
my ($self, $transaction) = @_;
|
|
my $class = ref $self;
|
|
|
|
my @names;
|
|
|
|
my $queries = $self->lookup_start($transaction, sub {
|
|
my ($self, $name) = @_;
|
|
push @names, $name;
|
|
});
|
|
|
|
my @hosts;
|
|
foreach my $z (keys %{$self->{uribl_zones}}) {
|
|
push @hosts, map { "$_.$z" } @names;
|
|
}
|
|
|
|
$transaction->notes(uribl_results => {});
|
|
$transaction->notes(uribl_zones => $self->{uribl_zones});
|
|
|
|
return DECLINED
|
|
unless @hosts && $class->lookup($self->qp, [ @hosts ], [ @hosts ]);
|
|
|
|
return YIELD;
|
|
}
|
|
|
|
sub finish_data_post {
|
|
my ($self, $transaction) = @_;
|
|
|
|
my $matches = $self->collect_results($transaction);
|
|
for (@$matches) {
|
|
$self->log(LOGWARN, $_->{desc});
|
|
if ($_->{action} eq 'add-header') {
|
|
$transaction->header->add('X-URIBL-Match', $_->{desc});
|
|
} elsif ($_->{action} eq 'deny') {
|
|
return (DENY, $_->{desc});
|
|
} elsif ($_->{action} eq 'denysoft') {
|
|
return (DENYSOFT, $_->{desc});
|
|
}
|
|
}
|
|
return DECLINED;
|
|
}
|
|
|
|
sub init_resolver { }
|
|
|
|
sub process_a_result {
|
|
my ($class, $qp, $result, $query) = @_;
|
|
|
|
my $transaction = $qp->transaction;
|
|
my $results = $transaction->notes('uribl_results');
|
|
my $zones = $transaction->notes('uribl_zones');
|
|
|
|
foreach my $z (keys %$zones) {
|
|
if ($query =~ /^(.*)\.$z$/) {
|
|
my $name = $1;
|
|
$results->{$z}->{$name}->{a} = $result;
|
|
}
|
|
}
|
|
}
|
|
|
|
sub process_txt_result {
|
|
my ($class, $qp, $result, $query) = @_;
|
|
|
|
my $transaction = $qp->transaction;
|
|
my $results = $transaction->notes('uribl_results');
|
|
my $zones = $transaction->notes('uribl_zones');
|
|
|
|
foreach my $z (keys %$zones) {
|
|
if ($query =~ /^(.*)\.$z$/) {
|
|
my $name = $1;
|
|
$results->{$z}->{$name}->{txt} = $result;
|
|
}
|
|
}
|
|
}
|
|
|
|
sub collect_results {
|
|
my ($self, $transaction) = @_;
|
|
|
|
my $results = $transaction->notes('uribl_results');
|
|
|
|
my @matches;
|
|
foreach my $z (keys %$results) {
|
|
foreach my $n (keys %{$results->{$z}}) {
|
|
if (exists $results->{$z}->{$n}->{a}) {
|
|
if ($self->evaluate($z, $results->{$z}->{$n}->{a})) {
|
|
$self->log(LOGDEBUG, "match $n in $z");
|
|
push @matches, {
|
|
action => $self->{uribl_zones}->{$z}->{action},
|
|
desc => "$n in $z: " .
|
|
($results->{$z}->{$n}->{txt} || $results->{$z}->{$n}->{a}),
|
|
};
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return \@matches;
|
|
}
|
|
|
|
=head1 NAME
|
|
|
|
uribl - URIBL blocking plugin for qpsmtpd
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
This plugin implements DNSBL lookups for URIs found in spam, such as that
|
|
implemented by SURBL (see E<lt>http://surbl.org/E<gt>). Incoming messages are
|
|
scanned for URIs, which are then checked against one or more URIBLs in a
|
|
fashion similar to DNSBL systems.
|
|
|
|
=head1 CONFIGURATION
|
|
|
|
See the documentation of the non-async version. The timeout config option is
|
|
ignored, the ParaDNS timeout is used instead.
|
|
|
|
=cut
|