Skip to Content.
Sympa Menu

postfilter - [Postfilter] Küldésnél hiba...

postfilter AT lists.kfki.hu

Subject: Postfilter mailing list

List archive

[Postfilter] Küldésnél hiba...


Chronological Thread 
  • From: Szabó Bence <szabob AT benceszabo.no-ip.com>
  • To: postfilter AT sunserv.kfki.hu
  • Subject: [Postfilter] Küldésnél hiba...
  • Date: Fri, 24 Aug 2007 12:25:26 +0200
  • List-archive: <http://sunserv.kfki.hu/pipermail/postfilter>
  • List-id: Postfilter mailing list <postfilter.lists.kfki.hu>

Szia Józsi!

No, mellékeltem a dolgokat. Kellhet még valami?

Köszi:
Bence

main.cf:
#
# Postfilter config file
#

#
# Postfilter policy daemon settings
#

# Local TCP port to listen to
daemon_port = 10255
# User and group the process changes to
daemon_user = postfil
daemon_group = postfil
# Chroot directory
daemon_chroot = /
# Net::Server::PreFork parameters
daemon_min_servers = 2
daemon_min_spare_servers = 2
daemon_max_spare_servers = 10
daemon_max_servers = 50
daemon_max_requests = 100
daemon_log_level = 2
# Reload the main configuration from the database automatically
# after so many seconds is elapsed. By setting to zero
# reloading is disabled.
daemon_reload_config = 10*60 # every ten minutes

# Message returned back to Postfix when something goes haywire
# at reading the database tables
daemon_hard_error = 451 Server configuration error

# Message returned back to Postfix when something goes haywire
# at writing a database table
# In a replicated setup:
# daemon_soft_error = dunno
# In a standalone SQL server setup
# CHANGE ME
daemon_soft_error = 451 Server configuration error

# Templates can be defined for every restriction type and
# for every restriction type with every valid subject:
# daemon_template_<type> = permit|dunno|discard|hold|[45]nn txt
# daemon_template_<type>_<subject> = permit|dunno|discard|hold|[45]nn
txt #
# Mandatory default template which is used
# if no response or template was found.
daemon_default_template =
554 Access denied
# Mandatory mark template
daemon_mark_template =
X-Postfilter: SPAM marked by {$lookup_class}: {$lookup_policy}

# Predefined templates
daemon_template_rbl =
554 Service unavailable; {$lookup_subject} ({$lookup_what})
blocked using {$rbl_domain . ($txt_record ? ": " .
$txt_record : "")} daemon_template_rhsbl =
554 Service unavailable; {$lookup_subject} ({$lookup_what})
blocked using {$rbl_domain . ($txt_record ? ": " .
$txt_record : "")} daemon_template_invalid_helo_name =
{$helo_name =~ /^\[/
? "501 <$helo_name>: Helo command rejected: invalid IP
address" : "501 <$helo_name>: Helo command rejected: invalid name" }
daemon_template_non_fqdn_helo_name =
{$helo_name =~ /^\[/
? "501 <$helo_name>: Helo command rejected: invalid IP
address" : "504 <$helo_name>: Helo command rejected: need
fully-qualified hostname" } daemon_template_unknown_client_name =
450 Client host rejected: cannot find your hostname,
[{$client_address}] daemon_template_unknown_helo_name =
{$helo_name =~ /^\[/
? "501 <$helo_name>: Helo command rejected: invalid IP
address" : "450 <$helo_name>: Helo command rejected: host not found" }
daemon_template_unknown_recipient =
550 <{$recipient}>: Recipient address rejected: user unknown
daemon_template_greylist_client =
450 <{$recipient}>: Please try again later.
daemon_template_captcha_sender =
550 Sorry, you must verify that you are a human
on the page {$captcha_url}
in order to be able to send E-mail
as {$sender} to {$recipient}.
daemon_template_throttle =
450 Sorry, you are over your mail quota. Please try again later.

#
# Captcha related parameters
#
# Length of string generated as captcha test
captcha_length = 8
# Timeout for captcha in seconds in the database
captcha_timeout = 24*60*60
# Maximum time in seconds accepted between displaying the captcha
# on the CGI interface and accepting the response
captcha_thinking_time = 30
# How many challenges are generated
captcha_probes = 5
# Captcha CGI URL: CHANGE ME
captcha_url = https://octans.ett.bme.hu/cgi-bin/captcha.cgi
# Temporary directory for captcha.cgi
captcha_tmp_dir = /usr/local/postfilter/tmp
#
# Captcha in image
#
# GD::SecurityImage support
# See 'perldoc GD::SecurityImage' for the description
# of the supported parameters.
# Colors must be given in hex without the leading '#',
# i.e. FFFFFF instead of #FFFFFF.
# Naming convention: captcha_image_<function>_<parameter>
# GD::SecurityImage::new() parameters: all supported
captcha_image_new_width = 500
captcha_image_new_height = 80
captcha_image_new_lines = 20
# Builtin font used at creating the text
captcha_image_new_gd_font = large
# If defined, captcha_image_new_font overrides
# captcha_image_new_gd_font.
# It is either the path to a TrueType font or 'random'
# to pick a font randomly from captcha_image_new_ttf_fonts.
captcha_image_new_font = random
# TrueType fonts to generate the text: CHANGE ME
captcha_image_new_ttf_fonts =
/usr/share/fonts/truetype/freefont/FreeSans.ttf
/usr/share/fonts/truetype/freefont/FreeSansOblique.ttf
/usr/share/fonts/truetype/freefont/FreeSerif.ttf
/usr/share/fonts/truetype/freefont/FreeSerifItalic.ttf
/usr/share/fonts/truetype/ttf-bitstream-vera/Vera.ttf
/usr/share/fonts/truetype/ttf-bitstream-vera/VeraIt.ttf
/usr/share/fonts/truetype/ttf-bitstream-vera/VeraSe.ttf
captcha_image_new_frame = 0
captcha_image_new_thickness = 1
captcha_image_new_bgcolor = FFFFFF
captcha_image_new_send_ctobg = 1
captcha_image_new_ptsize = 24
captcha_image_new_scramble = 1
# GD::SecurityImage::create() parameters:
# method, style, text_color, line_color
captcha_image_create_method = ttf
# Style: random, or one of captcha_image_create_styles
captcha_image_create_style = random
captcha_image_create_text_color = 000000
captcha_image_create_line_color = 000000
# Styles
captcha_image_create_styles = default rect circle ellipse ec
# GD::SecurityImage::particle() parameters:
# density, maxdots
captcha_image_particle_density = 3000
captcha_image_particle_maxdots = 2
# GD::SecurityImage::out() parameters:
# force
captcha_image_out_force = png

#
# Captcha in audio
#
# Text to audio file converter program.
# Use $input and $output to denote the input/output
# files on the commandline: CHANGE ME
captcha_speech_text2wave =
/usr/bin/text2wave -otype wav -o $output $input
# Complete content type of the output file generated
# by text2wave above.
captcha_speech_content_type = audio/x-wav

#
# Policy definitions
#

#
# Global policies for every user
#

# Check the table of globally blacklisted external clients
policy_blacklist_client =
blacklist:client:table=banned_client
550 Access denied. Go away.

# Check the table of globally blacklisted sender addresses
policy_blacklist_sender =
blacklist:sender:table=banned_sender
550 Access denied. Go away.

# Check the table of blacklisted helo names (i.e ours)
# and reject if the client uses any of them
policy_blacklist_helo =
blacklist:helo_name:table=banned_helo
550 Access denied: faked HELO/EHLO name.

# Check the table of blacklisted helo names (i.e ours)
# and add the client machines which fake our helo names
# to the spamtrap table to ban them for a longer time.
#policy_blacklist_helo =
# blacklist:helo_name:table=banned_helo
# update:client_address:table=spamtrap
# 550 Access denied: faked HELO/EHLO name.

# Relay to third party servers for which
# we do not know the valid addresses or don't
# want to force to use Postfilter
#policy_relay =
# whitelist:recipient_domain:table=pass_relay_domains

# Update spamtrap table if client wants to send a message
# to one of our honeypot addresses/patterns
# Skip null senders in the case spammers forge our honeypot
# addresses as senders (it happened here...)
policy_update_spamtrap =
blacklist:recipient:table=honeypot
regexp:sender:pattern=/^<>$/:match=dunno:nomatch=reject
update:client_address:table=spamtrap
discard Client trapped in spamtrap

# Check my users when sending mail:
# throttle and update user whitelists where enabled
# CHANGEME
policy_my_users =
# Match either authenticated sender or mynetwork client
or_group:begin
authenticated:sasl:match=reject:nomatch=dunno

regexp:client_address:pattern=/^192\.168\.0\./:match=reject:nomatch=dunno
or_group:end
# Update user whitelist, where enabled
# If sender is on the list, accept it otherwise continue
# with the restrictions on this list.
filter:sender:table=user:enable=auto_whitelist:default=reject
# Throttle our users: reject or explicitly permit
throttle:sasl_username
:count_max=500:rcpt_max=1000
:quota_max=500*1024*1024:time_period=60*60
:match=reject:nomatch=permit

# User whitelist: lookup the sender address in the user_whitelist
# table indexed by the recipient address and if the sender is found,
# let the message in.
policy_user_whitelist =
user_list:recipient:table=user_whitelist:lookup=sender

# Apply the spam filtering settings of the recipient for incoming
messages # by disabling the policy applied for outgoing messages
policy_filter = filter:recipient:table=user:disable=auto_whitelist

#
# Policies which are available for the users
# directly (expert users) or indirectly (novice users, via classes)
#

# Check spamtrap table and discard clients found in it
policy_spamtrap =
blacklist:client_address:table=spamtrap
discard Client trapped in spamtrap

# Check dha table and reject clients found in it
policy_dha =
counter:client_address:table=dha:check:limit=5
550 Too many probes, access denied.

# Auto-whitelist my recipient when I send an E-mail
policy_auto_whitelist =
update:recipient:table=user_whitelist:type=user_list
# update returns reject so we need an explicit permit here:
permit

# Local blacklist table based on client address/hostname/domainname
policy_blacklist =
blacklist:client:table=blacklist
550 Access denied. Your site is banned because of the
unsolicited mail messages received from it.

# Greylist yet-unseen senders
policy_greylist =
lookup:client_address:table=greylist_white:match=permit:nomatch=reject
greylist:client:delay=5*60:whitelist=50,
450 Service is administratively unavailable, try again later.

# Policies constructed from the basic restrictions
policy_non_fqdn_helo = non_fqdn:helo_name

policy_unknown_client = unknown:client_name
policy_unknown_helo = unknown:helo_name
policy_unknown_recipient =
unknown:recipient
# Update dha table to catch directory harvest attackers

counter:client_address:table=dha:limit=5:time_period=3*60:match=reject:nomatch=reject
550 <{$recipient}>: Recipient address rejected: user unknown


# RBL and RHSBL policies
policy_ordb = rbl:client_address:domain=relays.ordb.org
policy_dsbl = rbl:client_address:domain=list.dsbl.org
policy_spamhaus = rbl:client_address:domain=sbl.spamhaus.org
policy_opm = rbl:client_address:domain=opm.blitzed.org
policy_cbl = rbl:client_address:domain=cbl.abuseat.org

# Recipient address ccepts senders from user whitelist
# and passing captcha test
policy_closed = captcha:sender

# Recipient address accepts senders from
# user whitelist only
policy_really_closed = 550 Recipient does not accept your mail.

# Marker policies: system must put them at the
# end of the list of the user policies
policy_report = permit
policy_content_filter = permit

#
# Class definitions
#

# Postfilter classes are built from policies defined above.
# There are built-in classes (full, expert and slave) which you don't
# have to (and cannot) define.

# The definition of the non-built-in classes
class_none = report
# Minimal filtering: check spamtrap database, apply auto-whitelisting,
# check greylist and trigger reporting
class_minimal = spamtrap dha greylist auto_whitelist report
# Medium filtering: minimal, plus check some RBL database
class_medium = spamtrap dha greylist ordb dsbl opm auto_whitelist report
# Full filtering: all policies from cgi_expert_policies
# Closed: auto-whitelist when sending, check whitelist and apply captcha
# when receiving
class_closed = auto_whitelist closed report
# Really-closed: do not apply captcha
class_really_closed = auto_whitelist really_closed report
class_content_filter = content_filter

# The heart of the policy daemon:
# default class which is applied for every policy request
# CHANGE ME
daemon_default_recipient_class =
my_users # my users: throttle or update
user whitelits # External/unauthenticated clients:
update_spamtrap # update spamtrap
#relay # relay to servers with
unknown addresses blacklist_client # blacklisted clients
blacklist_sender # blacklisted senders
blacklist_helo # blacklisted helo names
# unknown_recipient # reject unknown recipients
user_whitelist # check user whitelist
filter # continue with user
settings

#
# Webserver, CGI script
#
# The URL of the postfilter.cgi script: CHANGE ME
cgi_url = https://octans.ett.bme.hu/cgi-bin/postfilter.cgi
# Templates directory
cgi_templates = /usr/local/postfilter/templates
# CSS style file: CHANGE ME
cgi_style = /images/postfilter.css
# Languages supported on the CGI interfaces.
cgi_languages = hu en
# Default languages for the postfilter and captcha pages:
cgi_lang_default_captcha = hu
cgi_lang_default_postfilter = hu
# Language names in the order of cgi_languages
cgi_lang_en_name = English Hungarian
cgi_lang_hu_name = angol magyar
# Language locale, image template and character set.
cgi_lang_en_locale = en-US
cgi_lang_hu_locale = hu-HU
# CHANGE ME
cgi_lang_en_img = <img src="/images/uk.png" alt="English">
cgi_lang_hu_img = <img src="/images/hu.png" alt="Magyar">
cgi_lang_en_charset = ISO-8859-1
cgi_lang_hu_charset = ISO-8859-2
# Logo
cgi_logo = <a href="http://www.kfki.hu/cnc/projekt/postfilter";>
<img border=0 src="/images/postfilter.png"></a>
# Command by which the CGI script can send E-mail
cgi_sendmail = /usr/lib/sendmail -t
# E-mail address used as sender in the messages sent by the CGI
# CHANGE ME
cgi_admin_email =
server AT octans.ett.bme.hu
# CHANGE ME
# List of administrators
cgi_admins = foo AT your.domain
# Length of cookie for sessions
cgi_cookie_session = 32
# Length of cookie as one time password for login
cgi_cookie_login = 16
# Session cookie timeout in seconds. After this time elapsed
# user must log in again.
cgi_cookie_timeout = 60*60
# Users may disable quota (throttling) for the given amount of time
# in seconds (if 0, disabling quota is not supported)
cgi_disable_throttle = 60*60

#
# Error and information message templates
# The following variables are available:
#
# $login login address
# $email master address (same as login,
except for admins) # $alternate_address alternate address
user typed in # Database error or other general error condition
cgi_message_en_internal_error = Internal error, please turn to the
system administrator! cgi_message_hu_internal_error = Rendszerhiba,
kérem forduljon a rendszergazdához! # Login address does not exists
cgi_message_en_login_not_exists = Address {$login} does not exists
cgi_message_hu_login_not_exists = {$login} nem létező E-mail cím
# Login cookie sent to given address
cgi_message_en_login_cookie_sent = The one time password has been
posted to {$login}. cgi_message_hu_login_cookie_sent = Az egyszer
használatos jelszót postáztam a {$login} címre. # Alternate address
does not exists cgi_message_en_alternate_not_exists = Address
{$alternate_address} does not exists
cgi_message_hu_alternate_not_exists = {$alternate_address} nem létező
E-mail cím # Address cannot be specified as alternate, as it's already
bound to # a master address cgi_message_en_alternate_already_bound =
Address {$alternate_address} is already bound to an address.
cgi_message_hu_alternate_already_bound = {$alternate_address} cím már
le van kötve. # Cookie belonging to the login address does not exist.
cgi_message_en_cookie_not_exists = Cookie does not exists.
cgi_message_hu_cookie_not_exists = Hiányzó kulcs. # Cookie timed out
cgi_message_en_cookie_timed_out = Expired cookie, please login again.
cgi_message_hu_cookie_timed_out = Lejárt kulcs, kérem jelentkezzen be
újra. # Invalid cookie: cookie sent by the client and what can be found
in the # database does not match.
cgi_message_en_invalid_cookie = Invalid cookie.
cgi_message_hu_invalid_cookie = Érvénytelen kulcs.
# Invalid login, user address does not exist
cgi_message_en_invalid_login = Invalid login.
cgi_message_hu_invalid_login = Érvénytelen bejelentkezés.
# User typed a slave/alternate address to login
cgi_message_en_use_master = Use your master address {$email} to login
cgi_message_hu_use_master = {$email} E-mail címével jelentkezzen be.
# Invalid login, password does not match
cgi_message_en_invalid_passwd = Invalid login.
cgi_message_hu_invalid_passwd = Érvénytelen bejelentkezés.
# User hasn't set his/her password yet.
cgi_message_en_no_passwd = Please set your password!
cgi_message_hu_no_passwd = Ne felejtse el beállítani a jelszavát!
# Invalid login, user tries to play god
cgi_message_en_tricky_user = Invalid login.
cgi_message_hu_tricky_user = Érvénytelen bejelentkezés.
# Admin specified an unknown email address
cgi_message_en_email_not_exists = {$email} address does not exists.
cgi_message_hu_email_not_exists = {$email} E-mail cím nem létezik.
# Whitelist address checking: E-mail address pattern invalid
cgi_message_en_bad_pattern = Invalid E-mail address pattern.
cgi_message_hu_bad_pattern = Érvénytelen E-mail cím minta!
# Mistyped password
cgi_message_en_bad_passwd = Mistyped password.
cgi_message_hu_bad_passwd = Elírt jelszó!
# Weak password
cgi_message_en_weak_passwd = Weak password.
cgi_message_hu_weak_passwd = Gyenge jelszó!
# Alternate addresses: E-mail address is invalid
cgi_message_en_bad_address = Invalid E-mail address.
cgi_message_hu_bad_address = Érvénytelen E-mail cím!
# Token has been posted to the alternate address for verification.
cgi_message_en_token_sent = The key has been posted to
{$alternate_address}. cgi_message_hu_token_sent = A kulcsot postáztam a
{$alternate_address} címre. # Invalid token: what user typed in does
not match with the token we # sent to the alternate address
cgi_message_en_invalid_token = Invalid token.
cgi_message_hu_invalid_token = Érvénytelen kulcs!
# Virtual addresses can be created from the master address only.
cgi_message_en_master_only = Only master address may have virtual
addresses cgi_message_hu_master_only = Csak a fő E-mail címéhez
definiálhat virtuális E-mail címeket. # Captcha-related error messages:
# No such captcha
cgi_message_en_captcha_not_exists = Captcha does not exists.
cgi_message_hu_captcha_not_exists = A captcha feladat nem létezik.
# Captcha timed out
cgi_message_en_captcha_timed_out = Captcha timed out.
cgi_message_hu_captcha_timed_out = A captcha feladat már lejárt.
# Too much probes
cgi_message_en_captcha_probes_exhausted = Captcha probes exhausted.
cgi_message_hu_captcha_probes_exhausted = Túl sok próbálkozás.
# No match
cgi_message_en_captcha_no_match = {$probes ? "Captcha does not match,
try again. You may have $probes another probes." : "Sorry, you failed
to pass our captcha challenge."} cgi_message_hu_captcha_no_match =
{$probes ? "Nem jó megoldás, kérem próbálkozzon újra. Még $probes
kísérletet tehet." : "Sajnos nem sikerült megoldania a captcha
feladatokat."}

# Too slow
cgi_message_en_captcha_too_slow = You are too slow, try again.
cgi_message_hu_captcha_too_slow = Túlságosan lassú volt, kérem próbálja
meg újra. # Labels used in the forms
# On and off
cgi_label_en_on = enable
cgi_label_hu_on = bekapcsolom
cgi_label_en_off = disable
cgi_label_hu_off = kikapcsolom
# Add to list and delete from list
cgi_label_en_add = add to list
cgi_label_hu_add = hozzáadom
cgi_label_en_del = delete from list
cgi_label_hu_del = törlöm

# Classes which are offered to the user to choose from
# in novice mode. The order determines how the classes
# are listed on the CGI interface in novice mode.
# CHANGE ME
cgi_novice_classes = none minimal medium full expert slave
closed really_closed content_filter

# Default class when changing from expert to novice
cgi_default_novice_class = none

# Class descriptions on the CGI interface for all
# classes from cgi_novice_classes
cgi_label_class_en_none = No filtering at all
cgi_label_class_hu_none = Nincs semmilyen szűrés bekapcsolva
cgi_label_class_en_minimal = Minimal filtering
cgi_label_class_hu_minimal = Minimális szűrés
cgi_label_class_en_medium = Medium filtering
cgi_label_class_hu_medium = Közepes szűrés
cgi_label_class_en_full = All filtering settings enabled
cgi_label_class_hu_full = Minden szűrési lehetőség bekapcsolása
cgi_label_class_en_expert = Personal tunings of the settings
cgi_label_class_hu_expert = A szűrési lehetőségek egyéni beállítása
cgi_label_class_en_slave = Clone the settings of {$email}
cgi_label_class_hu_slave = {$email} cím beállításai legyenek érvényesek
cgi_label_class_en_closed = Allow posting from my whitelist only but
human senders can be added to my whitelist after they
passed a so called captcha test
cgi_label_class_hu_closed = Csak a kivétellistámról fogadok el levelet,
de arra ismeretlenek egy
ún. captcha teszt teljesítése után fölkerülhetnek
cgi_label_class_en_really_closed = Allow posting from my whitelist only
cgi_label_class_hu_really_closed = Csak a kivétellistámról fogadok el
levelet cgi_label_class_en_content_filter = Flag only the messages
which seems to be spam cgi_label_class_hu_content_filter = Csak jelölje
meg a rendszer a leveleket, amelyeket spam-nak tekint

# These policies will be offered to the users in expert mode
# to select from and the order here determines how the policies
# are listed on the CGI interface and stored in the database.
# CHANGE ME
cgi_expert_policies =
spamtrap
dha
blacklist
greylist
non_fqdn_helo
ordb dsbl spamhaus opm cbl
unknown_client
unknown_helo
auto_whitelist
report
content_filter

# Expert policies offered to the users in expert mode without
# mark support:
cgi_expert_policies_without_mark = report content_filter

# Default expert policies when changing from novice to expert
# *and* we cannot figure out the policies to enable from
# the novice setting (like slave case)
cgi_default_expert_policies = report

# The head, description and select definitions for all policies
# from cgi_expert_policies:

# report
cgi_label_policy_head_en_report = Daily summary
cgi_label_policy_desc_en_report =
The Postfilter system can generate daily summaries of the
filtered out messages, which helps to discover accidentally filtered
out real partners.
cgi_label_policy_select_en_report = Sending daily summary
cgi_label_policy_head_hu_report = Napi összesítő
cgi_label_policy_desc_hu_report =
A rendszer bármely szűrőfeltétel miatt visszautasított
levelekről napi összesítőt tud készíteni, amely alapján a véletlenül
kitiltott partnerek könnyen felfedezhetők és kivétellistára tehetők.
cgi_label_policy_select_hu_report = A napi összesítő elküldését
# content_filter
cgi_label_policy_head_en_content_filter = Flagging spam by content
filtering cgi_label_policy_desc_en_content_filter =
Use a content filtering engine and flag the messages
which seems to be spam
cgi_label_policy_select_en_content_filter = Flagging spam
cgi_label_policy_head_hu_content_filter = Spam megjelölés
tartalomelemzéssel cgi_label_policy_desc_hu_content_filter =
Tartalomelemzés alapján a rendszer jelölje meg a spam-nak
tekintett leveleket cgi_label_policy_select_hu_content_filter = A spam
megjelölést # spamtrap
cgi_label_policy_head_en_spamtrap = Spamtrap
cgi_label_policy_desc_en_spamtrap =
E-mail sender machines which want to send an E-mail to our
honeypot addresses are automatically put into a blacklist database.
Because the honeypot addresses are hidden on our public WWW server,
only E-mail harvester programs run by spammers or their supporters can
easily discover them. The machines put into the database are
automatically removed after a predefined time, so later they can send
E-mail again.<p> The content of the spamtrap database can be viewed:
{dump_url('spamtrap', 'spamtrap database')}
cgi_label_policy_select_en_spamtrap = Use of spamtrap database
cgi_label_policy_head_hu_spamtrap = Spammer csapda
cgi_label_policy_desc_hu_spamtrap =
A webszerverünkön elrejtett
érvénytelen E-mail címre levelet küldők automatikusan egy
adatbázisba kerülnek. Az E-mail cím rejtettségénél fogva csak a
spammerek által használt automatikus E-mail gyűjtő programokon
keresztül juthat bárki kezébe. Ha az adott gépről legalább hét napon
keresztül nem érkezik újabb levél, az IP címet az adatbázisból
automatikusan töröljük.<p> A spamtrap adatbázis jelenlegi tartalma
megtekinthető: {dump_url('spamtrap', 'spamtrap adatbázis')}
cgi_label_policy_select_hu_spamtrap = A spammer csapda használatát
# DHA
cgi_label_policy_head_en_dha = DHA database
cgi_label_policy_desc_en_dha =
DHA attackers (Directory Harvest Attack) tries to collect
our E-mail addresses by brute-force probing and then sells
the collected valid addresses to spammers.
Such attackers are collected in the
{dump_url('dha', 'DHA database')} and removed afer a predefined
time. cgi_label_policy_select_en_dha = Use of DHA database
cgi_label_policy_head_hu_dha = DHA támadók adatbázisa
cgi_label_policy_desc_hu_dha =
DHA (Directory Harvest Attack) támadók nyers próbálgatással
próbálják begyűjteni az érvényes E-mail címeinket, majd továbbadják az
spammereknek. Az ilyen támadókat a
{dump_url('dha', 'DHA adatbázisba')}
gyűjtük, majd egy idő után automatikusan töröljük őket.
cgi_label_policy_select_hu_dha = A DHA adatbázis használatát
# auto_whitelist
cgi_label_policy_head_en_auto_whitelist = Automatic whitelist
cgi_label_policy_desc_en_auto_whitelist =
If you enable this option, then when you send an E-mail, your
recipients will be put onto your personal whitelist
automatically.<p> Please note, mailing list servers tend to send the
messages from E-mail addresses like 'listname-bounce@listserver' instead
of the address 'listname@listserver' what you use when sending
a message to the list. Also, monthly reminders and other
administrative messages may be sent to you from addresses like
'listname-admin@listserver'
cgi_label_policy_select_en_auto_whitelist = Automatic whitelisting of
my recipients cgi_label_policy_head_hu_auto_whitelist = Automatikus
fehér lista cgi_label_policy_desc_hu_auto_whitelist =
Ha bekapcsolja ezt a feltételt, akkor amikor E-mail üzenetet
küld valakinek, a címzettje automatikusan felkerül az egyéni
kivétellistájára.<p>
Kérjük ügyeljen rá, hogy a levelező listák üzenetei általában
a 'listanev-bounce@listaszerver' címről érkeznek, és nem a lista
'listanev@listaszerver' címéről. Hasonló módon, a havi
emlékeztetők és más adminisztratív üzenetek általában a
listanev-admin@listaszerver' címről érkeznek.
cgi_label_policy_select_hu_auto_whitelist = A címzettjeim automatikus
fehér listázást # blacklist: CHANGE ME
cgi_label_policy_head_en_blacklist = Local blacklist
cgi_label_policy_desc_en_blacklist =
The IT division of our site maintains a blacklist of the senders
which abused our mail service and was reported by the users
at the address <a
href="mailto:abuse AT your.domain";>abuse AT your.domain</a>.
cgi_label_policy_select_en_blacklist = Use of blacklist database
cgi_label_policy_head_hu_blacklist = Lokális tiltólista # blacklist:
CHANGE ME cgi_label_policy_desc_hu_blacklist =
Fenntartunk egy lokális tiltólistát azon gépekről és
domainekről, amelyek spam-okat küldtek és felhasználóink jelezték az a
<a href="mailto:abuse AT your.domain";>abuse AT your.domain</a> címen.
cgi_label_policy_select_hu_blacklist = A lokális tiltólista használatát
# greylist
cgi_label_policy_head_en_greylist = Greylisting
cgi_label_policy_desc_en_greylist =
Greylisting is an technique where senders haven't seen yet
are forced to stop and send the E-mail to you a little bit
later. This simple method is extremely effective in
blocking spam and still letting in legitimate E-mail messages.
cgi_label_policy_select_en_greylist = Use of greylisting
cgi_label_policy_head_hu_greylist = Szürke lista (greylisting)
cgi_label_policy_desc_hu_greylist =
A szürke lista egy igen hatékony módszer a spam üzenetek
kiszűrésére: eddig még nem látott levélüldőket arra
kényszerítjük, hogy az E-mail-t ne azonnal, hanem kicsit
később küldjék el. A szürke lista valódi levélküldőknél
csupán kis késleltetést jelent, miközben a spam-ok igen
magas százalékát képes kiszűrni.
cgi_label_policy_select_hu_greylist = A szürke lista használatát
# non fqdn hello
cgi_label_policy_head_en_non_fqdn_helo = Invalid sender mailname
cgi_label_policy_desc_en_non_fqdn_helo =
The filtering is based on the announced name of the sender mail
server (HELO/EHLO name), which should syntactically be correct.
Open-relay servers tend to have a badly configured mail system
and the spam sent via such systems can be filtered out by this
condition.<br> Unfortunately there are legitimate mail servers with bad
configuration as well, so please check your daily report on filtered
out messages and tune your settings/whitelist if your parners got
blocked. cgi_label_policy_select_en_non_fqdn_helo = Filtering based on
invalid sender mailname cgi_label_policy_head_hu_non_fqdn_helo =
Levelező szerver neve nem szabványos
cgi_label_policy_desc_hu_non_fqdn_helo = A feladó gép mint levelező
szerver nevének (HELO/EHLO név) szintaktikai ellenőrzésén alapuló
szűrés.<br> Bekapcsolásával a rosszul konfigurált
open-relay-ekről érkező spam-ok jól kiszűrhetőek, de egyúttal a
rendszer a gondatlanul konfigurált, spam-ot nem küldő szerverekről
érkező érvényes leveleinket is eldobhatja. A szűrésbe beeső
partnereinket kivétellistára véve a szintaktikai ellenőrzés hatékony
fegyver a spam-ok ellen.
cgi_label_policy_select_hu_non_fqdn_helo = A levelező szerver neve
szabványosságán alapuló szűrést # DNS
cgi_label_policy_head_en_unknown_client = Sender hostname DNS checking
cgi_label_policy_desc_en_unknown_client =
Very high fraction of the spams are sent by machines with
missing/incorrect DNS settings, which thus could be filtered out.
However, there are legitimate senders with bad DNS settings, so valid
messages can be filtered out by enabling this condition. If DNS
checking is too strong for you, do not enable it or better tune your
personal whitelist. <p>
E-mail messages filtered out due to the sender hostname DNS
checking condition are refused by a temporary error. That means the
sender machine will retry to post the message for 3-7 days. If your
messages get blocked due to this setting and you disable it or
whitelist the sender, there is a very good chance that your message
will be delivered without asking the sender to resend it again.
cgi_label_policy_select_en_unknown_client = Filtering based on hostname
DNS checking cgi_label_policy_head_hu_unknown_client = Névbejegyzés
(DNS) nem szabványos cgi_label_policy_desc_hu_unknown_client = A
spam-ok igen nagy részét hibásan vagy rosszul bejegyzett nevű/című
gépekről küldik. Sajnos a névhelyességen alapuló szűrés rosszul
konfigurált, "ártatlan" gépekről jövő leveleket is kiszűrhet, de ezen a
kivétel-listák használatával segíteni tudunk. <p>
A névhelyességen alapuló szűrések során a rosszul bejegyzett
géptől jövő levelet <b>ideiglenesen</b> utasítjuk vissza, azaz a levél
a <b>küldő</b> gépnél marad (általában 3-7 napig), és a küldő gép újab
kísérleteket fog tenni a levél kézbesítésére. Ha a feladó E-mail címét
az egyéni kivétel-listára felvesszük (vagy a küldő gép rendszergazdája
a névbejegyzést az adott időn belül kijavítja), akkor a visszautasított
levelet megkapjuk anélkül, hogy a levelet a feladónak kérésünkre újra
el kellene küldenie. <p>
A feladó gép névhelyességének az ellenőrzése a levelező
szerverünkkel közvetlenül kapcsolatba kerülő gépre vonatkozik.
cgi_label_policy_select_hu_unknown_client = A feladó gép DNS-beli
ellenőrzésén alapuló szűrést # unknown helo
cgi_label_policy_head_en_unknown_helo = Sender mailname DNS checking
cgi_label_policy_desc_en_unknown_helo =
Using this condition, we enable the DNS checking of the
announced mailname (HELO/EHLO name) of the sender machine.<br>
Please read the comments at the hostname DNS checking
condition, which is valid for this kind of DNS checking as well.
cgi_label_policy_select_en_unknown_helo = Filtering based on sender
mailname DNS checking cgi_label_policy_head_hu_unknown_helo = A
levelező szerver névbejegyzése (DNS) nem szabványos
cgi_label_policy_desc_hu_unknown_helo = A névhelyesség-ellenőrzés a
levelező szerverünkkel közvetlenül kommunikáló gépnek mint levelező
rendszernek a nevére (HELO/EHLO név) vonatkozik. Ugyan azok a
megjegyzések vonatkoznak rá, mint az előző névhelyesség ellenőrzésre. A
gyakorlatban csak a szintaktikai ellenőrzéssel együtt van értelme
bekapcsolni. Igen erős és sok hamis szűrést eredményező feltétel.
cgi_label_policy_select_hu_unknown_helo = A feladó gép mint
levelező-rendszer DNS-beli ellenőrzésén alapuló szűrést # ordb
cgi_label_policy_head_en_ordb = ORDB (Open Relay Database)
cgi_label_policy_desc_en_ordb =
<a href="http://relays.ordb.org/";>ORDB (Open Relay Database)</a>
is a database of verified open relay servers maintained by a
non-profit organization. Open relay server are found by spammers very
fast and then they use them to relay spam for them.
cgi_label_policy_select_en_ordb = Filtering based on ORDB
cgi_label_policy_head_hu_ordb = ORDB (Open Relay Database) adatbázis
cgi_label_policy_desc_hu_ordb =
Az <a href="http://relays.ordb.org/";>ORDB (Open Relay
Database)</a> adatbázis egy non-profit szervezet által karbantartott
adatbázis az ún open relay levelező szerverekről. Az open relay
szervereket a spammerek használják leveleik tömeges kézbesítése és
nyomaik eltüntetése végett. cgi_label_policy_select_hu_ordb = Az ORDB
adatbázis alapján való szűrést # dsbl
cgi_label_policy_head_en_dsbl = DSBL (Distributed Server Boycott List)
cgi_label_policy_desc_en_dsbl =
<a href="http://dsbl.org/main";>DSBL (Distributed Server Boycott
List)</a> is another database of open relay and open proxy servers.
cgi_label_policy_select_en_dsbl = Filtering based on DSBL
cgi_label_policy_head_hu_dsbl = DSBL (Distributed Server Boycott List)
adatbázis cgi_label_policy_desc_hu_dsbl =
A <a href="http://dsbl.org/main";>DSBL (Distributed Server
Boycott List)</a> adatbázis egy másik listája az open relay és open
proxy szervereknek. cgi_label_policy_select_hu_dsbl = A DSBL adatbázis
alapján való szűrést # spamhaus
cgi_label_policy_head_en_spamhaus = Spamhaus database
cgi_label_policy_desc_en_spamhaus =
The <a href="http://www.spamhaus.org";>Spamhaus database</a>
is a list of spammers and active supporters of spammers.
cgi_label_policy_select_en_spamhaus = Filtering based on Spamhaus
database cgi_label_policy_head_hu_spamhaus = Spamhaus adatbázis
cgi_label_policy_desc_hu_spamhaus =
A <a href="http://www.spamhaus.org";>Spamhaus adatbázis</a>
a spammerek és spam-ot aktívan támogatók listáját tartalmazza.
cgi_label_policy_select_hu_spamhaus = A Spamhaus adatbázis alapján való
szűrést # opm
cgi_label_policy_head_en_opm = Blitzed OPM (Open Proxies Monitor List)
database cgi_label_policy_desc_en_opm =
The <a href="http://opm.blitzed.org/";>Blitzed OPM (Open Proxies
Monitor List) database</a> contains open proxy servers.
cgi_label_policy_select_en_opm = Filtering based on Blitzed OPM
cgi_label_policy_head_hu_opm = Blitzed OPM (Open Proxies Monitor List)
adatbázis cgi_label_policy_desc_hu_opm =
A <a href="http://opm.blitzed.org/";>Blitzed OPM (Open Proxies
Monitor List) adatbázis</a> az open relay-ként használható proxy
szerverek listáját tartalmazza. cgi_label_policy_select_hu_opm = A
Blitzed OPM adatbázis alapján való szűrést # cbl
cgi_label_policy_head_en_cbl = CBS (Composite Blocking List) database
cgi_label_policy_desc_en_cbl =
The <a href="http://cbl.abuseat.org";>CBS (Composite Blocking
List)</a> database contains machines trapped by spamtraps.
cgi_label_policy_select_en_cbl = Filtering based on CBS
cgi_label_policy_head_hu_cbl = CBS (Composite Blocking List) adatbázis
cgi_label_policy_desc_hu_cbl =
A <a href="http://cbl.abuseat.org";>CBS (Composite Blocking
List)</a> adatbázisba a gépek IP címei spamcsapdákon keresztül kerülnek
be. cgi_label_policy_select_hu_cbl = A CBS adatbázis alapján való
szűrést

#
# Report
#
# Which host(s) should be queried to generate
# the report
# report_mysql_servers = your.mysql.server # centralized
setup # report_mysql_servers = smtp.server0 smtp.server1 # distributed
setup # CHANGE ME
report_mysql_servers = localhost
# Command by which the reports can be posted
report_sendmail = /usr/lib/sendmail -t
# Which policy triggers reporting
report_policy = report
# Default reporting language from cgi_languages
report_default_lang = hu
# Overwrite old report tables: 'daily', 'weekly' or 'monthly'
# (i.e. keep one, seven or 30 days of report tables)
report_overwrite = daily
# Create statistics: up to this number of top senders/etc listed
report_statistics = 50
# Headers in E-mail templates:
report_message_en_address = Recipient E-mail address:
report_message_hu_address = Cimzett E-mail cime:
report_message_en_class = Recipient filtering setting:
report_message_hu_class = Cimzett szuresi beallitasa:
report_message_en_policy = Recipient filtering condition:
report_message_hu_policy = Cimzett szuresi feltetele:
report_message_en_date = Date
report_message_hu_date = Datum
report_message_en_sender = Sender E-mail address
report_message_hu_sender = Felado E-mail cime
report_message_en_client = Sender machine
report_message_hu_client = Levelkuldo gep

# eof


mysql.log:
070824 11:31:58 12755 Connect postfix@localhost on postfix
12755 Query SELECT transport FROM domain WHERE
domain='*' and active = 1 12755 Query SELECT transport FROM
domain WHERE domain='*' and active = 1 12756 Connect
postfix@localhost on postfix 12756 Query SELECT goto FROM alias
WHERE address='octans.ett.bme.hu' AND active = 1 12757 Connect
postfix@localhost on postfix 12757 Query SELECT domain FROM
domain WHERE domain='octans.ett.bme.hu' and backupmx = '0' and active =
'1' 12758 Connect postfix@localhost on postfix 12758 Query
SELECT domain FROM domain WHERE domain='octans.ett.bme.hu' and backupmx
= '1' 12758 Query SELECT domain FROM domain WHERE
domain='ett.bme.hu' and backupmx = '1' 12758 Query SELECT domain
FROM domain WHERE domain='bme.hu' and backupmx = '1' 12758 Query
SELECT domain FROM domain WHERE domain='hu' and backupmx = '1' 12755
Query SELECT transport FROM domain WHERE
domain='test AT octans.ett.bme.hu'
and active = 1 12755 Query SELECT
transport FROM domain WHERE domain='octans.ett.bme.hu' and active = 1
12759 Connect postfix@localhost on postfix 12759 Query SELECT
destination FROM relocated WHERE
email='test AT octans.ett.bme.hu'
12759
Query SELECT destination FROM relocated WHERE
email=' AT octans.ett.bme.hu' 12756 Query SELECT goto FROM alias
WHERE address='ett.bme.hu' AND active = 1 12757 Query SELECT
domain FROM domain WHERE domain='ett.bme.hu' and backupmx = '0' and
active = '1' 12758 Query SELECT domain FROM domain WHERE
domain='ett.bme.hu' and backupmx = '1' 12758 Query SELECT domain
FROM domain WHERE domain='bme.hu' and backupmx = '1' 12758 Query
SELECT domain FROM domain WHERE domain='hu' and backupmx = '1' 12755
Query SELECT transport FROM domain WHERE
domain='szabob AT ett.bme.hu'
and active = 1 12755 Query SELECT
transport FROM domain WHERE domain='ett.bme.hu' and active = 1 12755
Query SELECT transport FROM domain WHERE domain='.bme.hu' and
active = 1 12755 Query SELECT transport FROM domain WHERE
domain='.hu' and active = 1 12759 Query SELECT destination FROM
relocated WHERE
email='szabob AT ett.bme.hu'
12759 Query SELECT
destination FROM relocated WHERE email=' AT ett.bme.hu' 12682 Query
SELECT _config FROM config ORDER BY _version DESC LIMIT 1 12682
Query SHOW TABLES FROM postfilter 12682 Query SHOW TABLES
FROM postfilter 12682 Query SHOW TABLES FROM postfilter 12682
Query SELECT _key AS __key, _value AS __value,
UNIX_TIMESTAMP(_timestamp) AS __timestamp FROM honeypot where
'szabob AT ett.bme.hu'
like _key 12760 Connect postfil@localhost on
postfilter 12682 Query SELECT _key AS __key, _value AS __value,
UNIX_TIMESTAMP(_timestamp) AS __timestamp FROM banned_client where
'sunshine.ett.bme.hu' like _key 12682 Query SELECT _key AS __key,
_value AS __value, UNIX_TIMESTAMP(_timestamp) AS __timestamp
FROM banned_client where '152.66.71.78' like _key
12760 Query set autocommit=1
12682 Query SELECT _key AS __key,
_value AS __value,
UNIX_TIMESTAMP(_timestamp) AS __timestamp
FROM banned_sender where
'test AT octans.ett.bme.hu'
like _key
12682 Query SELECT _key AS __key,
_value AS __value,
UNIX_TIMESTAMP(_timestamp) AS __timestamp
FROM banned_helo where 'bencelin.ett.bme.local' like _key
12682 Query SELECT * FROM user
where _address =
'szabob AT ett.bme.hu'
and _hidden = '0'
12760 Query SELECT _config
FROM config ORDER BY _version DESC LIMIT 1
12682 Query SELECT _key AS __key,
_value AS __value,
UNIX_TIMESTAMP(_timestamp) AS __timestamp
FROM dha where '152.66.71.78' like _key
12682 Query UPDATE dha SET _value='1'
where _key='152.66.71.78'
12682 Query INSERT INTO report
(_sender,_recipient, _client_name,_client_address,_username,
_class,_policy,_report,
_timestamp)

VALUES('test AT octans.ett.bme.hu','szabob AT ett.bme.hu','sunshine.ett.bme.hu','152.66.71.78','','default_recipient_class','unknown_recipient','1',NOW())
12760 Query SHOW TABLES FROM postfilter
12760 Query SHOW TABLES FROM postfilter
12760 Query SHOW TABLES FROM postfilter




Archive powered by MHonArc 2.6.19+.

Top of Page