mirror of
https://github.com/mail-in-a-box/mailinabox.git
synced 2024-11-23 02:27:05 +00:00
19a47fc5d4
Improves from default the score assigned to Spamhaus Zen blacklisted emails by creating miab_spamhaus_zen_scores.cf file with higher score values.
216 lines
8.5 KiB
Bash
Executable File
216 lines
8.5 KiB
Bash
Executable File
#!/bin/bash
|
|
# Spam filtering with spamassassin via spampd
|
|
# -------------------------------------------
|
|
#
|
|
# spampd sits between postfix and dovecot. It takes mail from postfix
|
|
# over the LMTP protocol, runs spamassassin on it, and then passes the
|
|
# message over LMTP to dovecot for local delivery.
|
|
#
|
|
# In order to move spam automatically into the Spam folder we use the dovecot sieve
|
|
# plugin.
|
|
|
|
source /etc/mailinabox.conf # get global vars
|
|
source setup/functions.sh # load our functions
|
|
|
|
# Install packages and basic configuration
|
|
# ----------------------------------------
|
|
|
|
# Install packages.
|
|
# libmail-dkim-perl is needed to make the spamassassin DKIM module work.
|
|
# For more information see Debian Bug #689414:
|
|
# https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689414
|
|
echo "Installing SpamAssassin..."
|
|
apt_install spampd razor pyzor dovecot-antispam libmail-dkim-perl
|
|
|
|
# Allow spamassassin to download new rules.
|
|
tools/editconf.py /etc/default/spamassassin \
|
|
CRON=1
|
|
|
|
# Configure pyzor, which is a client to a live database of hashes of
|
|
# spam emails. Set the pyzor configuration directory to something sane.
|
|
# The default is ~/.pyzor. We used to use that, so we'll kill that old
|
|
# directory. Then write the public pyzor server to its servers file.
|
|
# That will prevent an automatic download on first use, and also means
|
|
# we can skip 'pyzor discover', both of which are currently broken by
|
|
# something happening on Sourceforge (#496).
|
|
rm -rf ~/.pyzor
|
|
tools/editconf.py /etc/spamassassin/local.cf -s \
|
|
pyzor_options="--homedir /etc/spamassassin/pyzor"
|
|
mkdir -p /etc/spamassassin/pyzor
|
|
echo "public.pyzor.org:24441" > /etc/spamassassin/pyzor/servers
|
|
# check with: pyzor --homedir /etc/mail/spamassassin/pyzor ping
|
|
|
|
# Configure spampd:
|
|
# * Pass messages on to docevot on port 10026. This is actually the default setting but we don't
|
|
# want to lose track of it. (We've configured Dovecot to listen on this port elsewhere.)
|
|
# * Increase the maximum message size of scanned messages from the default of 64KB to 500KB, which
|
|
# is Spamassassin (spamc)'s own default. Specified in KBytes.
|
|
# * Disable localmode so Pyzor, DKIM and DNS checks can be used.
|
|
tools/editconf.py /etc/default/spampd \
|
|
DESTPORT=10026 \
|
|
ADDOPTS="\"--maxsize=2000\"" \
|
|
LOCALONLY=0
|
|
|
|
# Spamassassin normally wraps spam as an attachment inside a fresh
|
|
# email with a report about the message. This also protects the user
|
|
# from accidentally openening a message with embedded malware.
|
|
#
|
|
# It's nice to see what rules caused the message to be marked as spam,
|
|
# but it's also annoying to get to the original message when it is an
|
|
# attachment, modern mail clients are safer now and don't load remote
|
|
# content or execute scripts, and it is probably confusing to most users.
|
|
#
|
|
# Tell Spamassassin not to modify the original message except for adding
|
|
# the X-Spam-Status & X-Spam-Score mail headers and related headers.
|
|
tools/editconf.py /etc/spamassassin/local.cf -s \
|
|
report_safe=0 \
|
|
"add_header all Report"=_REPORT_ \
|
|
"add_header all Score"=_SCORE_
|
|
|
|
|
|
# Authentication-Results SPF/Dmarc checks
|
|
# ---------------------------------------
|
|
# OpenDKIM and OpenDMARC are configured to validate and add "Authentication-Results: ..."
|
|
# headers by checking the sender's SPF & DMARC policies. Instead of blocking mail that fails
|
|
# these checks, we can use these headers to evaluate the mail as spam.
|
|
#
|
|
# Our custom rules are added to their own file so that an update to the deb package config
|
|
# does not remove our changes.
|
|
#
|
|
# We need to escape period's in $PRIMARY_HOSTNAME since spamassassin config uses regex.
|
|
|
|
escapedprimaryhostname="${PRIMARY_HOSTNAME//./\\.}"
|
|
|
|
cat > /etc/spamassassin/miab_spf_dmarc.cf << EOF
|
|
# Evaluate DMARC Authentication-Results
|
|
header DMARC_PASS Authentication-Results =~ /$escapedprimaryhostname; dmarc=pass/
|
|
describe DMARC_PASS DMARC check passed
|
|
score DMARC_PASS -0.1
|
|
|
|
header DMARC_NONE Authentication-Results =~ /$escapedprimaryhostname; dmarc=none/
|
|
describe DMARC_NONE DMARC record not found
|
|
score DMARC_NONE 0.1
|
|
|
|
header DMARC_FAIL_NONE Authentication-Results =~ /$escapedprimaryhostname; dmarc=fail \(p=none/
|
|
describe DMARC_FAIL_NONE DMARC check failed (p=none)
|
|
score DMARC_FAIL_NONE 2.0
|
|
|
|
header DMARC_FAIL_QUARANTINE Authentication-Results =~ /$escapedprimaryhostname; dmarc=fail \(p=quarantine/
|
|
describe DMARC_FAIL_QUARANTINE DMARC check failed (p=quarantine)
|
|
score DMARC_FAIL_QUARANTINE 5.0
|
|
|
|
header DMARC_FAIL_REJECT Authentication-Results =~ /$escapedprimaryhostname; dmarc=fail \(p=reject/
|
|
describe DMARC_FAIL_REJECT DMARC check failed (p=reject)
|
|
score DMARC_FAIL_REJECT 10.0
|
|
|
|
# Evaluate SPF Authentication-Results
|
|
header SPF_PASS Authentication-Results =~ /$escapedprimaryhostname; spf=pass/
|
|
describe SPF_PASS SPF check passed
|
|
score SPF_PASS -0.1
|
|
|
|
header SPF_NONE Authentication-Results =~ /$escapedprimaryhostname; spf=none/
|
|
describe SPF_NONE SPF record not found
|
|
score SPF_NONE 2.0
|
|
|
|
header SPF_FAIL Authentication-Results =~ /$escapedprimaryhostname; spf=fail/
|
|
describe SPF_FAIL SPF check failed
|
|
score SPF_FAIL 5.0
|
|
EOF
|
|
|
|
# SpamAssassin Spamhaus Zen blacklist scores
|
|
# ------------------------------------------
|
|
# MiaB installs spamassassin configured to check against Spamhaus Zen
|
|
# blacklists, but the default score is too low to guarantee blacklisted
|
|
# email as spam. The below score is intended to send all Spamhaus Zen blacklist
|
|
# email received to the spam folder.
|
|
|
|
cat > /etc/spamassassin/miab_spamhaus_zen_scores.cf << EOF
|
|
score RCVD_IN_PBL 10.0
|
|
score RCVD_IN_SBL 10.0
|
|
score RCVD_IN_SBL_CSS 10.0
|
|
score RCVD_IN_XBL 10.0
|
|
score URIBL_CSS 10.0
|
|
score URIBL_CSS_A 10.0
|
|
score URIBL_SBL 10.0
|
|
score URIBL_SBL_A 10.0
|
|
EOF
|
|
|
|
# Bayesean learning
|
|
# -----------------
|
|
#
|
|
# Spamassassin can learn from mail marked as spam or ham, but it needs to be
|
|
# configured. We'll store the learning data in our storage area.
|
|
#
|
|
# These files must be:
|
|
#
|
|
# * Writable by sa-learn-pipe script below, which run as the 'mail' user, for manual tagging of mail as spam/ham.
|
|
# * Readable by the spampd process ('spampd' user) during mail filtering.
|
|
# * Writable by the debian-spamd user, which runs /etc/cron.daily/spamassassin.
|
|
#
|
|
# We'll have these files owned by spampd and grant access to the other two processes.
|
|
#
|
|
# Spamassassin will change the access rights back to the defaults, so we must also configure
|
|
# the filemode in the config file.
|
|
|
|
tools/editconf.py /etc/spamassassin/local.cf -s \
|
|
bayes_path=$STORAGE_ROOT/mail/spamassassin/bayes \
|
|
bayes_file_mode=0666
|
|
|
|
mkdir -p $STORAGE_ROOT/mail/spamassassin
|
|
chown -R spampd:spampd $STORAGE_ROOT/mail/spamassassin
|
|
|
|
# To mark mail as spam or ham, just drag it in or out of the Spam folder. We'll
|
|
# use the Dovecot antispam plugin to detect the message move operation and execute
|
|
# a shell script that invokes learning.
|
|
|
|
# Enable the Dovecot antispam plugin.
|
|
# (Be careful if we use multiple plugins later.) #NODOC
|
|
sed -i "s/#mail_plugins = .*/mail_plugins = \$mail_plugins antispam/" /etc/dovecot/conf.d/20-imap.conf
|
|
sed -i "s/#mail_plugins = .*/mail_plugins = \$mail_plugins antispam/" /etc/dovecot/conf.d/20-pop3.conf
|
|
|
|
# Configure the antispam plugin to call sa-learn-pipe.sh.
|
|
cat > /etc/dovecot/conf.d/99-local-spampd.conf << EOF;
|
|
plugin {
|
|
antispam_backend = pipe
|
|
antispam_spam_pattern_ignorecase = SPAM
|
|
antispam_trash_pattern_ignorecase = trash;Deleted *
|
|
antispam_allow_append_to_spam = yes
|
|
antispam_pipe_program_spam_args = /usr/local/bin/sa-learn-pipe.sh;--spam
|
|
antispam_pipe_program_notspam_args = /usr/local/bin/sa-learn-pipe.sh;--ham
|
|
antispam_pipe_program = /bin/bash
|
|
}
|
|
EOF
|
|
|
|
# Have Dovecot run its mail process with a supplementary group (the spampd group)
|
|
# so that it can access the learning files.
|
|
|
|
tools/editconf.py /etc/dovecot/conf.d/10-mail.conf \
|
|
mail_access_groups=spampd
|
|
|
|
# Here's the script that the antispam plugin executes. It spools the message into
|
|
# a temporary file and then runs sa-learn on it.
|
|
# from http://wiki2.dovecot.org/Plugins/Antispam
|
|
rm -f /usr/bin/sa-learn-pipe.sh # legacy location #NODOC
|
|
cat > /usr/local/bin/sa-learn-pipe.sh << EOF;
|
|
cat<&0 >> /tmp/sendmail-msg-\$\$.txt
|
|
/usr/bin/sa-learn \$* /tmp/sendmail-msg-\$\$.txt > /dev/null
|
|
rm -f /tmp/sendmail-msg-\$\$.txt
|
|
exit 0
|
|
EOF
|
|
chmod a+x /usr/local/bin/sa-learn-pipe.sh
|
|
|
|
# Create empty bayes training data (if it doesn't exist). Once the files exist,
|
|
# ensure they are group-writable so that the Dovecot process has access.
|
|
sudo -u spampd /usr/bin/sa-learn --sync 2>/dev/null
|
|
chmod -R 660 $STORAGE_ROOT/mail/spamassassin
|
|
chmod 770 $STORAGE_ROOT/mail/spamassassin
|
|
|
|
# Initial training?
|
|
# sa-learn --ham storage/mail/mailboxes/*/*/cur/
|
|
# sa-learn --spam storage/mail/mailboxes/*/*/.Spam/cur/
|
|
|
|
# Kick services.
|
|
restart_service spampd
|
|
restart_service dovecot
|
|
|