1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-01-21 08:42:23 +00:00

- Add more useful patches

- Use OPTIONS

PR:		ports/66173
Submitted by:	Michael Ranner
Approved by:	maintainer timeout
This commit is contained in:
Volker Stolz 2004-06-23 11:06:24 +00:00
parent 64a66d34fb
commit 21cbaa90c4
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=112039
5 changed files with 588 additions and 18 deletions

View File

@ -7,7 +7,7 @@
PORTNAME= messagewall
PORTVERSION= 1.0.8
PORTREVISION= 2
PORTREVISION= 3
CATEGORIES= mail
MASTER_SITES= http://www.messagewall.org/download/
DISTNAME= messagewall-${PORTVERSION}
@ -22,42 +22,72 @@ MAN1= messagewall.1 messagewallctl.1 messagewallstats.1
MAN5= messagewall.conf.5 messagewall_profiles.5
CONF1= messagewall.conf
OPTIONS= BROKEN_PARAMETER "Detect unwanted extensions properly" off \
ESMTP_SIZE_OPTION "Handle the size option in MAIL FROM" off \
MULTI_RCPT "Allow multiple recipients" off \
PARANOIA "Detect faked mails from AOL, Hotmail" off \
SPAM_STATS "Add spam statistics to messagewallstats" off
WRKSRC= ${WRKDIR}/messagewall
GNU_CONFIGURE= yes
USE_REINPLACE= yes
pre-fetch:
@${ECHO} ""
@${ECHO} "You may use the following build options:"
@${ECHO} ""
@${ECHO} " -DMESSAGEWALL_ALLOW_MULT_RCPT to allow multiple recipients"
@${ECHO} " The profile for the first recipient will be applied to all"
@${ECHO} " recipients of the message."
@${ECHO} ""
@${ECHO} " -DWITH_ESMTP_SIZE_OPTION to allow messagewall to handle the"
@${ECHO} " size option in MAIL FROM: <foo@bar.com> SIZE=12345678 (RFC1870)"
@${ECHO} " This can safe a lot of bandwith, because it rejects any email,"
@${ECHO} " if message size is greater than max message size."
@${ECHO} ""
.include <bsd.port.pre.mk>
# Patch from "Quentin Guernsey" <quentin@wingateweb.com>
# for details see http://www.messagewall.org/cgi-bin/ezmlm-browse.cgi?command=showmsg&list=messagewall-discuss&month=200303&msgnum=921&threadid=lcjcimckfmdphlhpjjhn
.if defined(MESSAGEWALL_ALLOW_MULT_RCPT)
# Allow multiple recipients, The profile for the first recipient will be
# applied to all recipients of the message.
# For details see http://www.messagewall.org/cgi-bin/ezmlm-browse.cgi?command=showmsg&list=messagewall-discuss&month=200303&msgnum=921&threadid=lcjcimckfmdphlhpjjhn
.if defined(WITH_MULTI_RCPT) || defined(MESSAGEWALL_ALLOW_MULT_RCPT)
EXTRA_PATCHES+= ${PATCHDIR}/allow-multiple-recipients.patch
.endif
# Patch from "Michael Ranner" <mranner@inode.at>
# for details see http://www.ranner.jawa.at/messagewall.php
# Allow messagewall to handle the size option in MAIL FROM: <foo@bar.com>
# SIZE=12345678 (RFC1870). This can safe a lot of bandwith, because it rejects
# any email, if message size is greater than max message size.
# For details see http://www.ranner.jawa.at/messagewall.php
.if defined(WITH_ESMTP_SIZE_OPTION)
EXTRA_PATCHES+= ${PATCHDIR}/esmtpsize.patch
.endif
# Patch from "Collin Mulliner" <collin@mulliner.org>
# Some email viruses use badly composed mime attachments. MessageWall can't
# handle these by default. This breaks the detection of files with unwanted
# extensions. This patch removes this disadvantage.
# For details see http://www.mulliner.org/collin/patches.php
.if defined(WITH_BROKEN_PARAMETER)
EXTRA_PATCHES+= ${PATCHDIR}/broken_parameter_value.patch
.else
EXTRA_PATCHES+= ${PATCHDIR}/applemail.patch
.endif
# Patch from "Collin Mulliner" <collin@mulliner.org>
# This adds a check method to detect faked mails from big sites like Hotmail
# or AOL. It checks the by/from fields in the mail trace header "Received:"
# for a host name that matches the domain of the senders address.
# A new profile option is available to configure which domains to check.
# For details see http://www.mulliner.org/collin/patches.php
.if defined(WITH_PARANOIA)
EXTRA_PATCHES+= ${PATCHDIR}/paranoia.patch
.endif
# Patch from "Collin Mulliner" <collin@mulliner.org>
# Adds some nice spam statistics to the end of the output from
# messagewallstats
# For details see http://www.mulliner.org/collin/patches.php
.if defined(WITH_SPAM_STATS)
EXTRA_PATCHES+= ${PATCHDIR}/spam_stats.patch
.endif
post-patch:
${REINPLACE_CMD} -e 's|/usr/local|${LOCALBASE}|g' \
${WRKSRC}/firemake.cflags \
${WRKSRC}/firemake.ldflags
${REINPLACE_CMD} -e 's|-lcrypto|-lcrypto ${PTHREAD_LIBS}|' \
${WRKSRC}/firemake.libs
.if defined(WITH_PARANOIA)
@${RM} ${WRKSRC}/profiles/Warning.orig
.endif
do-install:
@${CP} ${WRKSRC}/messagewall ${PREFIX}/bin
@ -79,4 +109,4 @@ do-install:
post-install:
@${CAT} ${PKGMESSAGE}
.include <bsd.port.mk>
.include <bsd.port.post.mk>

View File

@ -0,0 +1,21 @@
--- rfc822.c.orig Fri Jul 12 19:45:03 2002
+++ rfc822.c Sun May 2 18:04:34 2004
@@ -156,7 +156,7 @@
} else {
j = i;
while (j < headervalue->l &&
- strchr(RFC822_WHITESPACE,headervalue->s[j]) == NULL)
+ strchr(RFC822_WHITESPACE_LOOSE,headervalue->s[j]) == NULL && headervalue->s[j] != ';')
j++;
}
--- rfc822.h.orig Mon Jun 24 20:45:00 2002
+++ rfc822.h Sun May 2 18:04:34 2004
@@ -21,6 +21,7 @@
#include <firestring.h>
#define RFC822_WHITESPACE " \t"
+#define RFC822_WHITESPACE_LOOSE "\t\n\r"
#define RFC822_VALUE_MAXLEN 256
struct rfc822_message_t {

View File

@ -0,0 +1,433 @@
--- dbase.c.orig 2002-10-18 17:24:16.000000000 +0200
+++ dbase.c 2003-01-26 13:33:27.000000000 +0100
@@ -653,6 +653,8 @@
dbase_load_estr_score_ll(config,&profile->filename_reject,"filename_reject");
dbase_load_estr_score_ll(config,&profile->mime_reject,"mime_reject");
+ dbase_load_estr_score_ll(config,&profile->fakedbighost_reject,"fakedbighost_reject");
+
dbase_load_estr_ll(config,&profile->mime_strip,"mime_strip");
dbase_load_estr_ll(config,&profile->mime_allow,"mime_allow");
dbase_load_int(config,&profile->reject,"reject");
--- firemake.binaries.orig 2002-06-28 22:29:44.000000000 +0200
+++ firemake.binaries 2003-01-26 13:33:27.000000000 +0100
@@ -1,3 +1,3 @@
-messagewall: auth.o client.o dbase.o dnsbl.o dnsdcc.o md5.o messagewall.o mime.o rdns.o rfc822.o rmx.o security.o smtp.o tls.o virus.o
+messagewall: auth.o client.o dbase.o dnsbl.o dnsdcc.o md5.o messagewall.o mime.o rdns.o rfc822.o rmx.o security.o smtp.o tls.o virus.o paranoia.o
messagewallctl: messagewallctl.o
messagewallstats: messagewallstats.o
--- man/messagewall_profiles.5.orig 2002-07-22 17:17:33.000000000 +0200
+++ man/messagewall_profiles.5 2003-01-26 13:33:27.000000000 +0100
@@ -1,5 +1,5 @@
.\" (C) 2002 Ian Gulliver
-.TH messagewall_profiles 5 2002-06-08
+.TH messagewall_profiles 5 2002-12-06
.SH DESCRIPTION
Any regular files in the directory defined as
.B profile_dir
@@ -42,7 +42,7 @@
.I Default: 1
.br
This is the score at which MessageWall will reject the message.
-Any message acheiving a score below this will simply have warnings
+Any message achieving a score below this will simply have warnings
added to its headers indicating which tests it failed.
.B mime_strip
@@ -138,6 +138,29 @@
return mail cause the message to be rejected. This should be safe
to use in almost all cases.
+.B fakedbighost_reject
+.br
+.I Example:
+.br
+.I fakedbighost_reject=1,hotmail.com
+.br
+The value of a
+.B fakedbighost_reject
+line should contain a domain/host name. Incoming mail from this
+domain (the domainname is taken from the sending address) is checked against
+the "Received:" header fields. If NO match is found the assigned score is added.
+Use this with extreme care! And only use this for big sites that have their
+mail servers host name in the Received header line. If only the ip address
+is shown in the Received header (which is ok with rfc821) this feature is
+worthless. Many small sites are
+virtual which means the host name of the actual domain the mail belongs
+to isn't shown in any of the Received lines. Instead the name or ip
+address of the ISP hosting the virtual domain is in the Received line.
+And don't forget nearly all header lines can be forged.
+There can be multiple
+.B fakedbighost_reject
+lines.
+
.B header_reject
.br
.I Example:
@@ -146,7 +169,7 @@
.br
The value of a
.B header_reject
-line should contain a colon seperated
+line should contain a colon separated
string of Header:Key. The "Key" will be case-sensitively searched
for in the value of the header. If a match is found, the message
is refused. There can be multiple
@@ -161,7 +184,7 @@
.br
The value of a
.B header_rejecti
-line should contain a colon seperated
+line should contain a colon separated
string of Header:Key. The "Key" will be case-insensitively searched
for in the value of the header. If a match is found, the message
is refused. There can be multiple
--- messagewall.h.orig 2002-10-18 17:24:16.000000000 +0200
+++ messagewall.h 2003-01-26 13:33:39.000000000 +0100
@@ -167,6 +167,7 @@
int reject;
struct messagewall_header_reject_t *header_rejecti;
struct messagewall_header_reject_t *header_reject;
+ struct messagewall_estr_score_ll_t *fakedbighost_reject;
struct messagewall_estr_score_ll_t *body_reject;
struct messagewall_estr_score_ll_t *body_rejecti;
struct messagewall_estr_score_ll_t *filename_reject;
--- messagewallstats.c.orig 2002-10-18 17:24:16.000000000 +0200
+++ messagewallstats.c 2003-01-26 13:33:27.000000000 +0100
@@ -21,6 +21,7 @@
#include <string.h>
#include <firestring.h>
+
static const char tagstring[] = "$Id: messagewallstats.c,v 1.17.2.3 2002/10/01 19:05:22 ian Exp $";
struct counter {
@@ -37,6 +38,7 @@
struct counter *rmx = NULL;
struct counter *rmx_temp = NULL;
struct counter *to_cc = NULL;
+struct counter *fakedbighost = NULL;
struct counter *from = NULL;
struct counter *dnsbl_domain = NULL;
struct counter *dnsdcc = NULL;
@@ -118,6 +120,7 @@
int filter_dnsbl_domain = 0;
int filter_dnsbl = 0;
int filter_to_cc = 0;
+ int filter_fakedbighost = 0;
int filter_from = 0;
int filter_rmx = 0;
int filter_rdns = 0;
@@ -302,6 +305,20 @@
}
continue;
}
+
+ if (strstr(line, "no matching host of domain from sending address found in mail trace header") != NULL) {
+ filter_fakedbighost++;
+ start = strstr(line,"PARANOIA/WARNING: ");
+ if (start == NULL)
+ continue;
+ start += 18;
+ end = strchr(start,':');
+ if (end != NULL) {
+ *end = '\0';
+ increment(&fakedbighost,start);
+ }
+ continue;
+ }
if (strstr(line,"envelope reverse path not in From\n") != NULL) {
filter_from++;
@@ -574,6 +591,8 @@
fprintf(stdout,"Messages Rejected by Filter: %d\n",filter_reject);
fprintf(stdout,"\tFailed To/CC: %d\n",filter_to_cc);
print(to_cc,"\t\t");
+ fprintf(stdout,"\tFailed From/faked big host: %d\n",filter_fakedbighost);
+ print(fakedbighost,"\t\t");
fprintf(stdout,"\tFailed From: %d\n",filter_from);
print(from,"\t\t");
fprintf(stdout,"\tMatched DNSBL: %d\n",filter_dnsbl);
--- paranoia.c.orig 1970-01-01 01:00:00.000000000 +0100
+++ paranoia.c 2003-01-26 13:33:27.000000000 +0100
@@ -0,0 +1,145 @@
+/*
+paranoia.c - paranoia host checking for MessageWall
+Copyright (C) 2002 Collin R. Mulliner
+
+MessageWall Copyright (C) 2002 Ian Gulliver
+
+This program is free software; you can redistribute it and/or modify
+it under the terms of version 2 of the GNU General Public License as
+published by the Free Software Foundation.
+
+This program is distributed in the hope that it will be useful,
+but WITHOUT ANY WARRANTY; without even the implied warranty of
+MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+GNU General Public License for more details.
+
+You should have received a copy of the GNU General Public License
+along with this program; if not, write to the Free Software
+Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+*/
+
+#include <stdio.h>
+#include <string.h>
+#include <firestring.h>
+#include "messagewall.h"
+#include "mime.h"
+#include "smtp.h"
+#include "rfc822.h"
+#include "paranoia.h"
+
+/*
+ * look for domain in "by" and "from" part of mail path (in "Received" line)
+ */
+int check_by_from(struct firestring_estr_t *hline, struct firestring_estr_t *domain)
+{
+ struct firestring_estr_t host;
+ int i;
+
+
+ i = firestring_estr_stristr(hline, "from", 0);
+ if (i != -1) {
+ i += 4;
+ while (hline->l > i && strchr(RFC822_WHITESPACE, hline->s[i])) { i++; }
+ host.s = &hline->s[i];
+ host.l = i;
+ while (hline->l > i && !strchr(RFC822_WHITESPACE, hline->s[i])) { i++; }
+ host.l = i - host.l;
+ host.a = host.l;
+
+ if (firestring_estr_estristr(&host, domain, 0) != -1) return(0);
+ }
+
+ i = firestring_estr_stristr(hline, "by", 0);
+ if (i != -1) {
+ i += 2;
+ while (hline->l > i && strchr(RFC822_WHITESPACE, hline->s[i])) { i++; }
+ host.s = &hline->s[i];
+ host.l = i;
+ while (hline->l > i && !strchr(RFC822_WHITESPACE, hline->s[i])) { i++; }
+ host.l = i - host.l;
+ host.a = host.l;
+
+ if (firestring_estr_estristr(&host, domain, 0) != -1) return(0);
+ }
+
+ return(1);
+}
+
+/*
+ * mail path checking
+ */
+int paranoia_fakedbighost_check(struct rfc822_message_t *message, struct messagewall_estr_score_ll_t *head, struct firestring_estr_t *address)
+{
+ struct firestring_estr_t *value;
+ int i, n;
+ struct firestring_estr_t domain_part, *recv;
+ int atpos, dotpos, lastdotpos, llastdotpos;
+ int docheck = 0;
+
+/* fprintf(stderr, "Paranoia DEBUG: address=");
+ for (i = 0; i < address->l; i++) {
+ fprintf(stderr, "%c", address->s[i]);
+ }
+ fprintf(stderr, "\n");
+*/
+ /* we only want the second level domain, no subdomain or host */
+ atpos = firestring_estr_strchr(address, '@', 0);
+ if (atpos != -1) {
+ dotpos = atpos;
+ lastdotpos = atpos;
+ do {
+ llastdotpos = lastdotpos;
+ lastdotpos = dotpos;
+ dotpos = firestring_estr_strchr(address, '.', lastdotpos+1);
+ } while (dotpos != -1);
+
+ firestring_estr_alloc(&domain_part, address->l);
+ firestring_estr_estrcpy(&domain_part, address, llastdotpos+1);
+ }
+ else return(0);
+
+/* fprintf(stderr, "Paranoia DEBUG: domain=");
+ for (i = 0; i < domain_part.l; i++) {
+ fprintf(stderr, "%c", domain_part.s[i]);
+ }
+ fprintf(stderr, "\n");
+*/
+ /* do we have to check this message? */
+ while (head != NULL) {
+ if (firestring_estr_estristr(&head->string, &domain_part, 0) == 0) {
+ docheck = 1;
+ break;
+ }
+ head = head->next;
+ }
+
+ /* don't do check! - return ok */
+ if (docheck == 0) {
+ firestring_estr_free(&domain_part);
+ return(0);
+ }
+
+ /* some debbuging stuff */
+/* fprintf(stderr,"Paranoia DEBUG: [from: %s] [domain: %s]\n", address->s, domain_part.s);
+*/
+ /* step thru all received lines and check the by/from hosts */
+ n = 0;
+ do {
+ recv = rfc822_header_value_n(message, "Received:", n);
+
+ if (recv != NULL) {
+ /* if check is successful return */
+ if (check_by_from(recv, &domain_part) == 0) {
+ firestring_estr_free(&domain_part);
+ return(0);
+ }
+ }
+ n++;
+ } while (recv != NULL);
+
+ /* free memory */
+ firestring_estr_free(&domain_part);
+
+ /* return score when not found */
+ return(head->score);
+}
--- paranoia.h.orig 1970-01-01 01:00:00.000000000 +0100
+++ paranoia.h 2003-01-26 13:33:27.000000000 +0100
@@ -0,0 +1,31 @@
+/*
+paranoia.c - paranoia host checking declarations for MessageWall
+Copyright (C) 2002 Collin R. Mulliner
+
+MessageWall Copyright (C) 2002 Ian Gulliver
+
+This program is free software; you can redistribute it and/or modify
+it under the terms of version 2 of the GNU General Public License as
+published by the Free Software Foundation.
+
+This program is distributed in the hope that it will be useful,
+but WITHOUT ANY WARRANTY; without even the implied warranty of
+MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+GNU General Public License for more details.
+
+You should have received a copy of the GNU General Public License
+along with this program; if not, write to the Free Software
+Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+*/
+
+#ifndef _PARANOIA_H
+#define _PARANOIA_H
+
+#define PARANOIA_MSG "no matching host of domain from sending address found in mail trace header"
+
+#include <firestring.h>
+
+int check_by_from(struct firestring_estr_t *hline, struct firestring_estr_t *domain);
+int paranoia_fakedbighost_check(struct rfc822_message_t *message, struct messagewall_estr_score_ll_t *head, struct firestring_estr_t *address);
+
+#endif
--- profiles/Warning.orig 2002-06-21 19:02:51.000000000 +0200
+++ profiles/Warning 2003-01-26 13:33:27.000000000 +0100
@@ -31,3 +31,6 @@
header_rejecti=1,X-Mailer:bulk
virus_scan=1,virus.patterns
mime_allow=text/plain
+fakedbighost_reject=1,hotmail.com
+fakedbighost_reject=1,aol.com
+
--- rfc822.c.orig 2002-07-12 19:45:03.000000000 +0200
+++ rfc822.c 2003-01-26 13:33:27.000000000 +0100
@@ -51,6 +51,44 @@
}
}
+/*
+ * get header value of header line with more then one accurence
+ * get Nth line (starts at 0 (zero)), count beginns top of mail
+ */
+struct firestring_estr_t *rfc822_header_value_n(struct rfc822_message_t *message, char *header, int n) {
+ static struct firestring_estr_t ret;
+ int i,j,l,c = 0;
+ int newline = 1;
+
+ l = strlen(header);
+ for (i = 0; i < message->header.l - l; i++) {
+ if (newline == 1 && firestring_strncasecmp(&message->header.s[i],header,l) == 0) {
+ if (c < n) { c++; continue; }
+ /*
+ * got it
+ */
+ i += l;
+ while (i < message->header.l && strchr(RFC822_WHITESPACE,message->header.s[i++]) != NULL);
+ i--;
+ for (j = i; j <= message->header.l - 2; j++)
+ if (memcmp(&message->header.s[j],"\r\n",2) == 0)
+ if (j >= message->header.l - 3 || strchr(RFC822_WHITESPACE,message->header.s[j+2]) == NULL)
+ break;
+ ret.s = &message->header.s[i];
+ ret.a = ret.l = j - i;
+ return &ret;
+ } else if (memcmp(&message->header.s[i],"\r\n",2) == 0) {
+ /*
+ * new line
+ */
+ newline = 1;
+ i++;
+ } else
+ newline = 0;
+ }
+ return NULL;
+}
+
struct firestring_estr_t *rfc822_header_value(struct rfc822_message_t *message, char *header) {
static struct firestring_estr_t ret;
int i,j,l;
--- rfc822.h.orig 2002-06-24 20:45:00.000000000 +0200
+++ rfc822.h 2003-01-26 13:33:27.000000000 +0100
@@ -30,6 +30,7 @@
int rfc822_split_message(struct firestring_estr_t *data, struct rfc822_message_t *message);
+struct firestring_estr_t *rfc822_header_value_n(struct rfc822_message_t *message, char *header, int n);
struct firestring_estr_t *rfc822_header_value(struct rfc822_message_t *message, char *header);
struct firestring_estr_t *rfc822_eheader_value(struct rfc822_message_t *message, struct firestring_estr_t *header);
struct firestring_estr_t *rfc822_parameter_value(struct firestring_estr_t *headervalue, char *parameter);
--- smtp.c.orig 2002-10-18 17:24:16.000000000 +0200
+++ smtp.c 2003-01-26 13:33:27.000000000 +0100
@@ -206,6 +206,7 @@
int smtp_checks_gotmessage(int client) {
int numparts;
+ int score = 0;
/*
* clear dnsdcc queries for client
@@ -263,6 +264,14 @@
}
/*
+ * check for "faked big host"
+ */
+ if ((score = paranoia_fakedbighost_check(&clients[client].parts[0].message, clients[client].profile->fakedbighost_reject, &clients[client].from)) != 0) {
+ if (smtp_reject(client,"PARANOIA","%e: no matching host of domain from sending address found in mail trace header",SMTP_FROM_RECEIVED,score,0,&clients[client].from,NULL) != 0)
+ return(0);
+ }
+
+ /*
* header rejection checks
*/
if (rfc822_header_reject_check(client) == 1 || rfc822_header_rejecti_check(client) == 1)
--- smtp.h.orig 2002-09-28 19:21:02.000000000 +0200
+++ smtp.h 2003-01-26 13:33:27.000000000 +0100
@@ -63,6 +63,7 @@
#define SMTP_7BIT "501 MessageWall: SMTP/FATAL: Server sent an 8bit character to a 7bit server\r\n"
#define SMTP_TO_CC "552 MessageWall: RFC822/REJECT: %e: Target address must be in To or CC headers\r\n"
#define SMTP_FROM "552 MessageWall: RFC822/REJECT: %e: Source address must be in From header\r\n"
+#define SMTP_FROM_RECEIVED "552 MessageWall: PARANOIA/REJECT: %e: no matching host of domain from sending address found in mail trace header\r\n"
#define SMTP_REALNAME "552 MessageWall: RFC822/REJECT: From address must contain a real name\r\n"
#define SMTP_HEADER "552 MessageWall: RFC822/REJECT: Message contained banned header fields: %e%e\r\n"
#define SMTP_ERRORS "554 MessageWall: SMTP/REJECT: Too many errors, goodbye\r\n"

View File

@ -0,0 +1,86 @@
--- messagewallstats.c.orig Fri Oct 18 17:24:16 2002
+++ messagewallstats.c Sun May 2 18:30:47 2004
@@ -48,6 +48,8 @@
struct counter *virus = NULL;
struct counter *encoding = NULL;
struct counter *illegal_multipart = NULL;
+struct counter *dnsbl_domain_spam_score = NULL;
+struct counter *dnsbl_spam_score = NULL;
void increment(struct counter **head, char *name) {
struct counter *temp;
@@ -96,9 +98,9 @@
int quit = 0;
int disconnect = 0;
int disconnect_data = 0;
- long bytes_total = 0;
- long bytes_delivered = 0;
- long bytes_received =0;
+ long bytes_total = 0;
+ long bytes_delivered = 0;
+ long bytes_received =0;
int idle = 0;
int errors = 0;
int bare_lf = 0;
@@ -275,6 +277,15 @@
*end = '\0';
increment(&dnsbl,start);
}
+
+ if (end != NULL) {
+ start = end + 1;
+ end = strchr(start, ':');
+ *end = '\0';
+
+ increment(&dnsbl_spam_score,start);
+ }
+
continue;
}
@@ -286,6 +297,21 @@
*end = '\0';
increment(&dnsbl_domain,start);
}
+
+ if (end != NULL) {
+ end++;
+ start = strchr(end, ':');
+ *start = '\0';
+ start = strchr(end, '.');
+ if (strchr(start+1, '.') != NULL) {
+ start++;
+ }
+ else {
+ start = end;
+ }
+ increment(&dnsbl_domain_spam_score,start);
+ }
+
continue;
}
@@ -607,11 +633,18 @@
print(encoding,"\t\t");
fprintf(stdout,"\tInvalid QP encoding: %d\n",filter_qp);
fprintf(stdout,"\tInvalid base64 encoding: %d\n",filter_base64);
- fprintf(stdout,"\n");
+ fprintf(stdout,"\n");
- fprintf(stdout,"Mail Traffic\n");
- fprintf(stdout,"\tBytes received: %ld\n",bytes_total);
- fprintf(stdout,"\tBytes rejected: %ld\n",bytes_total - bytes_delivered);
- fprintf(stdout,"\tBytes accepted: %ld\n",bytes_delivered);
+ fprintf(stdout,"Mail Traffic\n");
+ fprintf(stdout,"\tBytes received: %ld\n",bytes_total);
+ fprintf(stdout,"\tBytes rejected: %ld\n",bytes_total - bytes_delivered);
+ fprintf(stdout,"\tBytes accepted: %ld\n",bytes_delivered);
+
+ fprintf(stdout, "\nSpammers");
+ fprintf(stdout, "\n\tDomain based:\n");
+ print(dnsbl_domain_spam_score,"\t\t");
+ fprintf(stdout, "\n\tIP based:\n");
+ print(dnsbl_spam_score,"\t\t");
+
exit(0);
}