Rev 1 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed
| Rev | Author | Line No. | Line |
|---|---|---|---|
| 1 | magnus | 1 | Note, this patch is unmaintained. It is not supposed to be functional or |
| 2 | safe anymore, but I'm leaving it behind if you'd like to backport the 2.6 |
||
| 3 | patch to SA 2.4 (much easier than with 2.6) |
||
| 4 | |||
| 5 | -- Marc |
||
| 6 | |||
| 7 | |||
| 8 | diff -urN SpamAssassin.orig/Conf.pm SpamAssassin/Conf.pm |
||
| 9 | --- SpamAssassin.orig/Conf.pm Mon Jul 14 11:57:40 2003 |
||
| 10 | +++ SpamAssassin/Conf.pm Sun Feb 22 17:17:03 2004 |
||
| 11 | @@ -66,6 +66,9 @@ |
||
| 12 | use constant TYPE_RBL_EVALS => 0x0013; |
||
| 13 | # UNUSED => 0x0014 |
||
| 14 | use constant TYPE_RBL_RES_EVALS => 0x0015; |
||
| 15 | +# Need to reserve a number with the SA folks (needs to be odd as it is an |
||
| 16 | +# eval test) |
||
| 17 | +use constant TYPE_RES_EVALS => 0x0021; |
||
| 18 | |||
| 19 | $VERSION = 'bogus'; # avoid CPAN.pm picking up version strings later |
||
| 20 | |||
| 21 | @@ -1507,6 +1510,9 @@ |
||
| 22 | if (/^header\s+(\S+)\s+rblreseval:(.*)$/) { |
||
| 23 | $self->add_test ($1, $2, TYPE_RBL_RES_EVALS); next; |
||
| 24 | } |
||
| 25 | + if (/^header\s+(\S+)\s+reseval:(.*)$/) { |
||
| 26 | + $self->add_test ($1, $2, TYPE_RES_EVALS); next; |
||
| 27 | + } |
||
| 28 | if (/^header\s+(\S+)\s+eval:(.*)$/) { |
||
| 29 | my ($name,$rule) = ($1, $2); |
||
| 30 | # Backward compatibility with old rule names -- Marc |
||
| 31 | @@ -2096,6 +2102,9 @@ |
||
| 32 | } |
||
| 33 | elsif ($type == TYPE_RBL_RES_EVALS) { |
||
| 34 | $self->{rbl_res_evals}->{$name} = \@args; |
||
| 35 | + } |
||
| 36 | + elsif ($type == TYPE_RES_EVALS) { |
||
| 37 | + $self->{res_evals}->{$name} = \@args; |
||
| 38 | } |
||
| 39 | elsif ($type == TYPE_RAWBODY_EVALS) { |
||
| 40 | $self->{rawbody_evals}->{$name} = \@args; |
||
| 41 | diff -urN SpamAssassin.orig/EvalTests.pm SpamAssassin/EvalTests.pm |
||
| 42 | --- SpamAssassin.orig/EvalTests.pm Mon Feb 23 23:28:37 2004 |
||
| 43 | +++ SpamAssassin/EvalTests.pm Tue Feb 24 21:34:36 2004 |
||
| 44 | @@ -1863,6 +1863,195 @@ |
||
| 45 | return 0; |
||
| 46 | } |
||
| 47 | |||
| 48 | + |
||
| 49 | +# This was originally written to implement greylisting in SA-Exim, although |
||
| 50 | +# I have tried to make it more general and allow for reuse in other MTAs |
||
| 51 | +# (although they will need to |
||
| 52 | +# 1) be running SA at SMTP time |
||
| 53 | +# 2) Provide the list of rcpt to and env from in some headers for SA to read |
||
| 54 | +# 3) Provide the IP of the connecting host ) |
||
| 55 | +# |
||
| 56 | +# This rule should get a negative score so that if we've already seen the |
||
| 57 | +# greylisting tuplet before, we lower the score, which hopefully brings us from |
||
| 58 | +# a tempreject to an accept (at least that's how sa-exim does it) |
||
| 59 | +# -- Marc <marc_soft@merlins.org> 2004/01/19 |
||
| 60 | + |
||
| 61 | +sub greylisting { |
||
| 62 | + # db/file/dir / pointer type / how many secs to greylist after 1st connection |
||
| 63 | + # SA score after which we don't bother running / SMTP time data header names |
||
| 64 | + my ($self, $dirorfileordb, $method, $greylisttime, $dontcheckscore, |
||
| 65 | + $connectiphdr, $envfromhdr, $rcpttohdr) = @_; |
||
| 66 | + my $dirorfile = shift @_; |
||
| 67 | + |
||
| 68 | + my $connectip; |
||
| 69 | + my $envfrom; |
||
| 70 | + my $rcptto; |
||
| 71 | + my @rcptto; |
||
| 72 | + my $iswhitelisted=0; |
||
| 73 | + my $err; |
||
| 74 | + my $mesgid = $self->get ('Message-Id')."\n"; |
||
| 75 | + my $tuplet; |
||
| 76 | + |
||
| 77 | + # No newlines, thank you (yes, you need this twice apparently) |
||
| 78 | + chomp ($mesgid); |
||
| 79 | + chomp ($mesgid); |
||
| 80 | + $mesgid =~ s/\012/|/g; |
||
| 81 | + |
||
| 82 | + # For stuff that we know is spam, don't greylist the host |
||
| 83 | + # (that might help later spam with a lower score to come in) |
||
| 84 | + if ($self->{hits} >= $dontcheckscore) |
||
| 85 | + { |
||
| 86 | + #warn "debug: skipping greylisting on $mesgid, since score is already ".$self->{hits}." and you configured greylisting to not bother with anything above $dontcheckscore\n"; |
||
| 87 | + return 0; |
||
| 88 | + } |
||
| 89 | + |
||
| 90 | + |
||
| 91 | + if (not $connectip = $self->get($connectiphdr)) |
||
| 92 | + { |
||
| 93 | + warn "Couldn't get Connecting IP header $connectiphdr for message $mesgid, skipping greylisting call\n"; |
||
| 94 | + return 0; |
||
| 95 | + } |
||
| 96 | + chomp($connectip); |
||
| 97 | + # Clean up input (for security, if you use files/dirs) |
||
| 98 | + $connectip =~ s#/#-#g; |
||
| 99 | + |
||
| 100 | + if (not $envfrom = $self->get($envfromhdr)) |
||
| 101 | + { |
||
| 102 | + warn "Couldn't get Envelope From header $envfromhdr for message $mesgid, skipping greylisting call\n"; |
||
| 103 | + return 0; |
||
| 104 | + } |
||
| 105 | + chomp($envfrom); |
||
| 106 | + # Clean up input (for security, if you use files/dirs) |
||
| 107 | + $envfrom =~ s#/#-#g; |
||
| 108 | + |
||
| 109 | + if (not $rcptto = $self->get($rcpttohdr)) |
||
| 110 | + { |
||
| 111 | + warn "Couldn't get Rcpt To header $rcpttohdr for message $mesgid, skipping greylisting call\n"; |
||
| 112 | + return 0; |
||
| 113 | + } |
||
| 114 | + chomp($rcptto); |
||
| 115 | + # Clean up input (for security, if you use files/dirs) |
||
| 116 | + $rcptto =~ s#/#-#g; |
||
| 117 | + @rcptto = split(/, /, $rcptto); |
||
| 118 | + |
||
| 119 | + umask 0007; |
||
| 120 | + |
||
| 121 | + foreach $rcptto (@rcptto) |
||
| 122 | + { |
||
| 123 | + my $ipdir = "$dirorfileordb/$connectip"; |
||
| 124 | + my $tupletdir = "$ipdir/$envfrom"; |
||
| 125 | + |
||
| 126 | + $tuplet = "$tupletdir/$rcptto"; |
||
| 127 | + |
||
| 128 | + # The dir method is easy to fiddle with and expire records in (with |
||
| 129 | + # a find | rm) but it's probably more I/O extensive than a real DB |
||
| 130 | + # and suffers from directory size problems if a specific IP is sending |
||
| 131 | + # generating tens of thousands of tuplets. -- Marc |
||
| 132 | + # That said, I prefer formats I can easily tinker with, and not having to |
||
| 133 | + # worry about buggy locking and so forth |
||
| 134 | + if ($method eq "dir") |
||
| 135 | + { |
||
| 136 | + # make directory whether it's there or not (faster than test and set) |
||
| 137 | + mkdir $ipdir; |
||
| 138 | + mkdir $tupletdir; |
||
| 139 | + |
||
| 140 | + if (not -e $tuplet) |
||
| 141 | + { |
||
| 142 | + # If the tuplets aren't there, we create them and continue in |
||
| 143 | + # case there are other ones (one of them might be whitelisted already) |
||
| 144 | + $err="creating $tuplet"; |
||
| 145 | + open (TUPLET, ">$tuplet") or goto greylisterror; |
||
| 146 | + print TUPLET time."\n"; |
||
| 147 | + print TUPLET "Status: Greylisted\n"; |
||
| 148 | + print TUPLET "Last Message-Id: $mesgid\n"; |
||
| 149 | + print TUPLET "Whitelisted Count: 0\n"; |
||
| 150 | + print TUPLET "Query Count: 1\n"; |
||
| 151 | + $err="closing first-written $tuplet"; |
||
| 152 | + close TUPLET or goto greylisterror; |
||
| 153 | + } |
||
| 154 | + else |
||
| 155 | + { |
||
| 156 | + my $time; |
||
| 157 | + my $status; |
||
| 158 | + my $whitelistcount; |
||
| 159 | + my $querycount; |
||
| 160 | + |
||
| 161 | + # Take into account race condition of expiring deletes and us running |
||
| 162 | + $err="reading $tuplet"; |
||
| 163 | + open (TUPLET, "<$tuplet") or goto greylisterror; |
||
| 164 | + $err="Couldn't read time"; |
||
| 165 | + $time=<TUPLET> or goto greylisterror; |
||
| 166 | + chomp ($time); |
||
| 167 | + |
||
| 168 | + $err="Couldn't read status"; |
||
| 169 | + $status=<TUPLET> or goto greylisterror; |
||
| 170 | + chomp ($status); |
||
| 171 | + $err="Couldn't extract Status from $status"; |
||
| 172 | + $status =~ s/^Status: // or goto greylisterror; |
||
| 173 | + |
||
| 174 | + # Skip Mesg-Id |
||
| 175 | + $err="Couldn't skip Mesg-Id"; |
||
| 176 | + $_=<TUPLET> or goto greylisterror; |
||
| 177 | + |
||
| 178 | + $err="Couldn't read whitelistcount"; |
||
| 179 | + $whitelistcount=<TUPLET> or goto greylisterror; |
||
| 180 | + chomp ($whitelistcount); |
||
| 181 | + $err="Couldn't extract Whitelisted Count from $whitelistcount"; |
||
| 182 | + $whitelistcount =~ s/^Whitelisted Count: // or goto greylisterror; |
||
| 183 | + |
||
| 184 | + $err="Couldn't read querycount"; |
||
| 185 | + $querycount=<TUPLET> or goto greylisterror; |
||
| 186 | + chomp ($querycount); |
||
| 187 | + $err="Couldn't extract Query Count from $querycount"; |
||
| 188 | + $querycount =~ s/^Query Count: // or goto greylisterror; |
||
| 189 | + close (TUPLET); |
||
| 190 | + |
||
| 191 | + $querycount++; |
||
| 192 | + if ((time - $time) > $greylisttime) |
||
| 193 | + { |
||
| 194 | + $status="Whitelisted"; |
||
| 195 | + $whitelistcount++; |
||
| 196 | + } |
||
| 197 | + |
||
| 198 | + $err="re-writing $tuplet"; |
||
| 199 | + open (TUPLET, ">$tuplet") or goto greylisterror; |
||
| 200 | + print TUPLET "$time\n"; |
||
| 201 | + print TUPLET "Status: $status\n"; |
||
| 202 | + print TUPLET "Last Message-Id: $mesgid\n"; |
||
| 203 | + print TUPLET "Whitelisted Count: $whitelistcount\n"; |
||
| 204 | + print TUPLET "Query Count: $querycount\n"; |
||
| 205 | + $err="closing re-written $tuplet"; |
||
| 206 | + close TUPLET or goto greylisterror; |
||
| 207 | + |
||
| 208 | + # We continue processing the other recipients, to setup or |
||
| 209 | + # update their counters |
||
| 210 | + if ($status="Whitelisted") |
||
| 211 | + { |
||
| 212 | + $iswhitelisted=1; |
||
| 213 | + } |
||
| 214 | + } |
||
| 215 | + } |
||
| 216 | + elsif ($method eq "file") |
||
| 217 | + { |
||
| 218 | + warn "codeme\n"; |
||
| 219 | + } |
||
| 220 | + elsif ($method eq "db") |
||
| 221 | + { |
||
| 222 | + warn "codeme\n"; |
||
| 223 | + } |
||
| 224 | + } |
||
| 225 | + |
||
| 226 | + return $iswhitelisted; |
||
| 227 | + |
||
| 228 | + greylisterror: |
||
| 229 | + warn "Reached greylisterror: $err / $!"; |
||
| 230 | + # delete tuplet since it apparently had issues but don't check for errors |
||
| 231 | + # in case it was a permission denied on write |
||
| 232 | + unlink ($tuplet); |
||
| 233 | + return $iswhitelisted; |
||
| 234 | +} |
||
| 235 | + |
||
| 236 | + |
||
| 237 | ########################################################################### |
||
| 238 | # BODY TESTS: |
||
| 239 | ########################################################################### |
||
| 240 | diff -urN SpamAssassin.orig/PerMsgStatus.pm SpamAssassin/PerMsgStatus.pm |
||
| 241 | --- SpamAssassin.orig/PerMsgStatus.pm Mon May 12 12:15:33 2003 |
||
| 242 | +++ SpamAssassin/PerMsgStatus.pm Sun Feb 22 17:47:11 2004 |
||
| 243 | @@ -189,6 +189,9 @@ |
||
| 244 | |||
| 245 | # add points from Bayes, before adjusting the AWL |
||
| 246 | $self->{hits} += $self->{learned_hits}; |
||
| 247 | + |
||
| 248 | + # Now, we can run rules that have to run last |
||
| 249 | + $self->do_res_eval_tests(); |
||
| 250 | |||
| 251 | # Do AWL tests last, since these need the score to have already been |
||
| 252 | # calculated |
||
| 253 | @@ -1866,6 +1869,11 @@ |
||
| 254 | my ($self) = @_; |
||
| 255 | # run_rbl_eval_tests doesn't process check returns unless you set needresult |
||
| 256 | $self->run_rbl_eval_tests ($self->{conf}->{rbl_res_evals}, 1); |
||
| 257 | +} |
||
| 258 | + |
||
| 259 | +sub do_res_eval_tests { |
||
| 260 | + my ($self) = @_; |
||
| 261 | + $self->run_eval_tests ($self->{conf}->{res_evals}, ''); |
||
| 262 | } |
||
| 263 | |||
| 264 | sub do_head_eval_tests { |