saving uncommitted changes in /etc prior to dnf run
This commit is contained in:
@@ -1,16 +1,16 @@
|
||||
# Please don't modify this file as your changes might be overwritten with
|
||||
# the next update.
|
||||
#
|
||||
# You can modify 'local.d/asn.conf' to add and merge
|
||||
# You can modify 'local.d/aws_s3.conf' to add and merge
|
||||
# parameters defined inside this section
|
||||
#
|
||||
# You can modify 'override.d/asn.conf' to strictly override all
|
||||
# You can modify 'override.d/aws_s3.conf' to strictly override all
|
||||
# parameters defined inside this section
|
||||
#
|
||||
# See https://rspamd.com/doc/faq.html#what-are-the-locald-and-overrided-directories
|
||||
# for details
|
||||
#
|
||||
# Module documentation can be found at https://rspamd.com/doc/modules/asn.html
|
||||
# Module documentation can be found at https://rspamd.com/doc/modules/aws_s3.html
|
||||
|
||||
aws_s3 {
|
||||
# Required attributes
|
||||
|
||||
31
rspamd/modules.d/known_senders.conf
Normal file
31
rspamd/modules.d/known_senders.conf
Normal file
@@ -0,0 +1,31 @@
|
||||
# Please don't modify this file as your changes might be overwritten with
|
||||
# the next update.
|
||||
#
|
||||
# You can modify 'local.d/known_senders.conf' to add and merge
|
||||
# parameters defined inside this section
|
||||
#
|
||||
# You can modify 'override.d/known_senders.conf' to strictly override all
|
||||
# parameters defined inside this section
|
||||
#
|
||||
# See https://rspamd.com/doc/faq.html#what-are-the-locald-and-overrided-directories
|
||||
# for details
|
||||
#
|
||||
# Module documentation can be found at https://rspamd.com/doc/modules/known_senders.html
|
||||
|
||||
known_senders {
|
||||
# This module is default-disabled
|
||||
enabled = false;
|
||||
|
||||
# Domains to track senders
|
||||
domains = "https://maps.rspamd.com/freemail/free.txt.zst";
|
||||
# Maximum number of elements
|
||||
max_senders = 100000;
|
||||
# Maximum time to live (when not using bloom filters)
|
||||
max_ttl = 30d;
|
||||
# Use bloom filters (must be enabled in Redis as a plugin)
|
||||
use_bloom = false;
|
||||
|
||||
.include(try=true,priority=5) "${DBDIR}/dynamic/known_senders.conf"
|
||||
.include(try=true,priority=1,duplicate=merge) "$LOCAL_CONFDIR/local.d/known_senders.conf"
|
||||
.include(try=true,priority=10) "$LOCAL_CONFDIR/override.d/known_senders.conf"
|
||||
}
|
||||
@@ -21,6 +21,12 @@ phishing {
|
||||
# Phishtank is disabled by default in the module, so let's enable it here explicitly
|
||||
phishtank_enabled = true;
|
||||
|
||||
# List of excluded hosts from checks over openphish, phishtank and generic_service
|
||||
phishing_feed_exclusion_symbol = "PHISHED_EXCLUDED";
|
||||
# Disabled by default
|
||||
phishing_feed_exclusion_enabled = false;
|
||||
phishing_feed_exclusion_map = "$LOCAL_CONFDIR/local.d/maps.d/phishing_feed_exclusion.inc";
|
||||
|
||||
# Make exclusions for known redirectors and domains
|
||||
exceptions = {
|
||||
REDIRECTOR_FALSE = [
|
||||
|
||||
@@ -110,11 +110,11 @@ rbl {
|
||||
whitelist_exception = "RCVD_IN_DNSWL_LOW";
|
||||
whitelist_exception = "DNSWL_BLOCKED";
|
||||
returncodes {
|
||||
RCVD_IN_DNSWL_NONE = "127.0.%d+.0";
|
||||
RCVD_IN_DNSWL_LOW = "127.0.%d+.1";
|
||||
RCVD_IN_DNSWL_MED = "127.0.%d+.2";
|
||||
RCVD_IN_DNSWL_HI = "127.0.%d+.3";
|
||||
DNSWL_BLOCKED = "127.0.0.255";
|
||||
RCVD_IN_DNSWL_NONE = ["127%.0%.%d%.0", "127%.0%.[02-9]%d%.0", "127%.0%.1[1-9]%.0", "127%.0%.[12]%d%d%.0"];
|
||||
RCVD_IN_DNSWL_LOW = ["127%.0%.%d%.1", "127%.0%.[02-9]%d%.1", "127%.0%.1[1-9]%.1", "127%.0%.[12]%d%d%.1"];
|
||||
RCVD_IN_DNSWL_MED = ["127%.0%.%d%.2", "127%.0%.[02-9]%d%.2", "127%.0%.1[1-9]%.2", "127%.0%.[12]%d%d%.2"];
|
||||
RCVD_IN_DNSWL_HI = ["127%.0%.%d%.3", "127%.0%.[02-9]%d%.3", "127%.0%.1[1-9]%.3", "127%.0%.[12]%d%d%.3"];
|
||||
DNSWL_BLOCKED = ["127%.0%.0%.255", "127%.0%.10%.%d+"];
|
||||
}
|
||||
}
|
||||
|
||||
@@ -155,11 +155,11 @@ rbl {
|
||||
unknown = false;
|
||||
|
||||
returncodes {
|
||||
DWL_DNSWL_NONE = "127.0.%d+.0";
|
||||
DWL_DNSWL_LOW = "127.0.%d+.1";
|
||||
DWL_DNSWL_MED = "127.0.%d+.2";
|
||||
DWL_DNSWL_HI = "127.0.%d+.3";
|
||||
DWL_DNSWL_BLOCKED = "127.0.0.255";
|
||||
DWL_DNSWL_NONE = ["127%.0%.%d%.0", "127%.0%.[02-9]%d%.0", "127%.0%.1[1-9]%.0", "127%.0%.[12]%d%d%.0"];
|
||||
DWL_DNSWL_LOW = ["127%.0%.%d%.1", "127%.0%.[02-9]%d%.1", "127%.0%.1[1-9]%.1", "127%.0%.[12]%d%d%.1"];
|
||||
DWL_DNSWL_MED = ["127%.0%.%d%.2", "127%.0%.[02-9]%d%.2", "127%.0%.1[1-9]%.2", "127%.0%.[12]%d%d%.2"];
|
||||
DWL_DNSWL_HI = ["127%.0%.%d%.3", "127%.0%.[02-9]%d%.3", "127%.0%.1[1-9]%.3", "127%.0%.[12]%d%d%.3"];
|
||||
DWL_DNSWL_BLOCKED = ["127%.0%.0%.255", "127%.0%.10%.%d+"];
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
@@ -19,6 +19,7 @@ redis {
|
||||
#disabled_modules = ["ratelimit"]; # List of modules that should not use redis from this section
|
||||
#timeout = 1s;
|
||||
#db = "0";
|
||||
#username = "some_username";
|
||||
#password = "some_password";
|
||||
.include(try=true,priority=5) "${DBDIR}/dynamic/redis.conf"
|
||||
.include(try=true,priority=1,duplicate=merge) "$LOCAL_CONFDIR/local.d/redis.conf"
|
||||
|
||||
@@ -25,6 +25,10 @@ symbols = {
|
||||
description = "Phished URL";
|
||||
one_shot = true;
|
||||
}
|
||||
"PHISHED_EXCLUDED" {
|
||||
weight = 0.0;
|
||||
description = "Phished URL found in exclusions list";
|
||||
}
|
||||
"PHISHED_OPENPHISH" {
|
||||
weight = 7.0;
|
||||
description = "Phished URL found in openphish.com";
|
||||
|
||||
@@ -27,25 +27,25 @@ symbols = {
|
||||
groups = ["surblorg", "blocked"];
|
||||
}
|
||||
"PH_SURBL_MULTI" {
|
||||
weight = 5.5;
|
||||
weight = 7.5;
|
||||
description = "A domain in the message is listed in SURBL as phishing";
|
||||
one_shot = true;
|
||||
groups = ["surblorg", "phishing"];
|
||||
}
|
||||
"MW_SURBL_MULTI" {
|
||||
weight = 5.5;
|
||||
weight = 7.5;
|
||||
description = "A domain in the message is listed in SURBL as malware";
|
||||
one_shot = true;
|
||||
groups = ["surblorg"];
|
||||
}
|
||||
"ABUSE_SURBL" {
|
||||
weight = 5.5;
|
||||
weight = 5.0;
|
||||
description = "A domain in the message is listed in SURBL as abused";
|
||||
one_shot = true;
|
||||
groups = ["surblorg"];
|
||||
}
|
||||
"CRACKED_SURBL" {
|
||||
weight = 4.0;
|
||||
weight = 5.0;
|
||||
description = "A domain in the message is listed in SURBL as cracked";
|
||||
one_shot = true;
|
||||
groups = ["surblorg"];
|
||||
@@ -117,49 +117,49 @@ symbols = {
|
||||
groups = ["spamhaus"];
|
||||
}
|
||||
"DBL_PHISH" {
|
||||
weight = 6.5;
|
||||
weight = 7.5;
|
||||
description = "A domain in the message is listed in Spamhaus DBL as phishing";
|
||||
one_shot = true;
|
||||
groups = ["spamhaus"];
|
||||
}
|
||||
"DBL_MALWARE" {
|
||||
weight = 6.5;
|
||||
weight = 7.5;
|
||||
description = "A domain in the message is listed in Spamhaus DBL as malware";
|
||||
one_shot = true;
|
||||
groups = ["spamhaus"];
|
||||
}
|
||||
"DBL_BOTNET" {
|
||||
weight = 5.5;
|
||||
weight = 7.5;
|
||||
description = "A domain in the message is listed in Spamhaus DBL as botnet C&C";
|
||||
one_shot = true;
|
||||
groups = ["spamhaus"];
|
||||
}
|
||||
"DBL_ABUSE" {
|
||||
weight = 6.5;
|
||||
weight = 5.0;
|
||||
description = "A domain in the message is listed in Spamhaus DBL as abused legit spam";
|
||||
one_shot = true;
|
||||
groups = ["spamhaus"];
|
||||
}
|
||||
"DBL_ABUSE_REDIR" {
|
||||
weight = 1.5;
|
||||
weight = 5.0;
|
||||
description = "A domain in the message is listed in Spamhaus DBL as spammed redirector domain";
|
||||
one_shot = true;
|
||||
groups = ["spamhaus"];
|
||||
}
|
||||
"DBL_ABUSE_PHISH" {
|
||||
weight = 7.5;
|
||||
weight = 6.5;
|
||||
description = "A domain in the message is listed in Spamhaus DBL as abused legit phish";
|
||||
one_shot = true;
|
||||
groups = ["spamhaus"];
|
||||
}
|
||||
"DBL_ABUSE_MALWARE" {
|
||||
weight = 7.5;
|
||||
weight = 6.5;
|
||||
description = "A domain in the message is listed in Spamhaus DBL as abused legit malware";
|
||||
one_shot = true;
|
||||
groups = ["spamhaus"];
|
||||
}
|
||||
"DBL_ABUSE_BOTNET" {
|
||||
weight = 5.5;
|
||||
weight = 6.5;
|
||||
description = "A domain in the message is listed in Spamhaus DBL as abused legit botnet C&C";
|
||||
one_shot = true;
|
||||
groups = ["spamhaus"];
|
||||
@@ -230,14 +230,14 @@ symbols = {
|
||||
}
|
||||
"URIBL_SBL_CSS" {
|
||||
ignore = true;
|
||||
weight = 6.5;
|
||||
weight = 5.0;
|
||||
description = "A domain in the message body resolves to an IP listed in Spamhaus CSS";
|
||||
one_shot = true;
|
||||
groups = ["spamhaus"];
|
||||
}
|
||||
"URIBL_XBL" {
|
||||
ignore = true;
|
||||
weight = 1.5;
|
||||
weight = 3.0;
|
||||
description = "A domain in the message body resolves to an IP listed in Spamhaus XBL";
|
||||
one_shot = true;
|
||||
groups = ["spamhaus"];
|
||||
|
||||
Reference in New Issue
Block a user