Linux server.kiran-academy.com 3.10.0-1160.108.1.el7.x86_64 #1 SMP Thu Jan 25 16:17:31 UTC 2024 x86_64
Apache/2.4.57 (Unix) OpenSSL/1.0.2k-fips
: 194.233.91.196 | : 216.73.216.172
Cant Read [ /etc/named.conf ]
7.4.32
finalho
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
spamassassin /
[ HOME SHELL ]
Name
Size
Permission
Action
10_default_prefs.cf
8.48
KB
-rw-r--r--
10_hasbase.cf
2.37
KB
-rw-r--r--
20_advance_fee.cf
7.43
KB
-rw-r--r--
20_aux_tlds.cf
8.8
KB
-rw-r--r--
20_body_tests.cf
6.84
KB
-rw-r--r--
20_compensate.cf
1.85
KB
-rw-r--r--
20_dnsbl_tests.cf
9.5
KB
-rw-r--r--
20_drugs.cf
14.7
KB
-rw-r--r--
20_dynrdns.cf
11.22
KB
-rw-r--r--
20_fake_helo_tests.cf
8.31
KB
-rw-r--r--
20_freemail.cf
2.94
KB
-rw-r--r--
20_freemail_domains.cf
41.82
KB
-rw-r--r--
20_head_tests.cf
25.74
KB
-rw-r--r--
20_html_tests.cf
10.27
KB
-rw-r--r--
20_imageinfo.cf
5.16
KB
-rw-r--r--
20_mailspike.cf
2.6
KB
-rw-r--r--
20_meta_tests.cf
3.25
KB
-rw-r--r--
20_net_tests.cf
1.83
KB
-rw-r--r--
20_phrases.cf
7.98
KB
-rw-r--r--
20_porn.cf
2.01
KB
-rw-r--r--
20_ratware.cf
15.59
KB
-rw-r--r--
20_uri_tests.cf
5.54
KB
-rw-r--r--
20_vbounce.cf
18.82
KB
-rw-r--r--
23_bayes.cf
2.49
KB
-rw-r--r--
25_accessdb.cf
1.51
KB
-rw-r--r--
25_antivirus.cf
1.5
KB
-rw-r--r--
25_asn.cf
1.51
KB
-rw-r--r--
25_dcc.cf
2.27
KB
-rw-r--r--
25_dkim.cf
4.3
KB
-rw-r--r--
25_hashcash.cf
2.86
KB
-rw-r--r--
25_pyzor.cf
1.28
KB
-rw-r--r--
25_razor2.cf
3.31
KB
-rw-r--r--
25_replace.cf
7.57
KB
-rw-r--r--
25_spf.cf
3.35
KB
-rw-r--r--
25_textcat.cf
1.73
KB
-rw-r--r--
25_uribl.cf
10.14
KB
-rw-r--r--
30_text_de.cf
27.12
KB
-rw-r--r--
30_text_fr.cf
19.89
KB
-rw-r--r--
30_text_it.cf
1.81
KB
-rw-r--r--
30_text_nl.cf
20.94
KB
-rw-r--r--
30_text_pl.cf
17.34
KB
-rw-r--r--
30_text_pt_br.cf
44.46
KB
-rw-r--r--
50_scores.cf
36.92
KB
-rw-r--r--
60_adsp_override_dkim.cf
9.02
KB
-rw-r--r--
60_awl.cf
1.27
KB
-rw-r--r--
60_shortcircuit.cf
2.13
KB
-rw-r--r--
60_whitelist.cf
4.87
KB
-rw-r--r--
60_whitelist_dkim.cf
6.05
KB
-rw-r--r--
60_whitelist_spf.cf
3.5
KB
-rw-r--r--
60_whitelist_subject.cf
1.87
KB
-rw-r--r--
72_active.cf
199.42
KB
-rw-r--r--
72_scores.cf
9.65
KB
-rw-r--r--
73_sandbox_manual_scores.cf
2.61
KB
-rw-r--r--
STATISTICS-set0-72_scores.cf.t...
1.46
KB
-rw-r--r--
STATISTICS-set1-72_scores.cf.t...
1.46
KB
-rw-r--r--
STATISTICS-set2-72_scores.cf.t...
0
B
-rw-r--r--
STATISTICS-set3-72_scores.cf.t...
0
B
-rw-r--r--
languages
99.1
KB
-rw-r--r--
local.cf
2.16
KB
-rw-r--r--
regression_tests.cf
2.71
KB
-rw-r--r--
sa-update-pubkey.txt
4.67
KB
-rw-r--r--
sa-update.cron
3.07
KB
-rwxr--r--
user_prefs.template
1.83
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : 20_dnsbl_tests.cf
# SpamAssassin rules file: DNS blacklist and whitelist tests # # Please don't modify this file as your changes will be overwritten with # the next update. Use @@LOCAL_RULES_DIR@@/local.cf instead. # See 'perldoc Mail::SpamAssassin::Conf' for details. # # <@LICENSE> # Licensed to the Apache Software Foundation (ASF) under one or more # contributor license agreements. See the NOTICE file distributed with # this work for additional information regarding copyright ownership. # The ASF licenses this file to you under the Apache License, Version 2.0 # (the "License"); you may not use this file except in compliance with # the License. You may obtain a copy of the License at: # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # </@LICENSE> # ########################################################################### require_version 3.004000 ########################################################################### ifplugin Mail::SpamAssassin::Plugin::DNSEval # See the Mail::SpamAssassin::Conf manual page for details of how to use # check_rbl(). # --------------------------------------------------------------------------- # Multizone / Multi meaning BLs first. # # Note that currently TXT queries cannot be used for these, since the # DNSBLs do not return the A type (127.0.0.x) as part of the TXT reply. # --------------------------------------------------------------------------- # SORBS # transfers: both axfr and ixfr available # URL: http://www.dnsbl.sorbs.net/ # pay-to-use: no # delist: $50 fee for RCVD_IN_SORBS_SPAM, others have free retest on request header __RCVD_IN_SORBS eval:check_rbl('sorbs', 'dnsbl.sorbs.net.') describe __RCVD_IN_SORBS SORBS: sender is listed in SORBS tflags __RCVD_IN_SORBS net reuse __RCVD_IN_SORBS header RCVD_IN_SORBS_HTTP eval:check_rbl_sub('sorbs', '127.0.0.2') describe RCVD_IN_SORBS_HTTP SORBS: sender is open HTTP proxy server tflags RCVD_IN_SORBS_HTTP net reuse RCVD_IN_SORBS_HTTP header RCVD_IN_SORBS_SOCKS eval:check_rbl_sub('sorbs', '127.0.0.3') describe RCVD_IN_SORBS_SOCKS SORBS: sender is open SOCKS proxy server tflags RCVD_IN_SORBS_SOCKS net reuse RCVD_IN_SORBS_SOCKS header RCVD_IN_SORBS_MISC eval:check_rbl_sub('sorbs', '127.0.0.4') describe RCVD_IN_SORBS_MISC SORBS: sender is open proxy server tflags RCVD_IN_SORBS_MISC net reuse RCVD_IN_SORBS_MISC header RCVD_IN_SORBS_SMTP eval:check_rbl_sub('sorbs', '127.0.0.5') describe RCVD_IN_SORBS_SMTP SORBS: sender is open SMTP relay tflags RCVD_IN_SORBS_SMTP net reuse RCVD_IN_SORBS_SMTP # delist: $50 fee #header RCVD_IN_SORBS_SPAM eval:check_rbl_sub('sorbs', '127.0.0.6') #describe RCVD_IN_SORBS_SPAM SORBS: sender is a spam source #tflags RCVD_IN_SORBS_SPAM net #reuse RCVD_IN_SORBS_SPAM RCVD_IN_SORBS_SPAM header RCVD_IN_SORBS_WEB eval:check_rbl_sub('sorbs', '127.0.0.7') describe RCVD_IN_SORBS_WEB SORBS: sender is an abusable web server tflags RCVD_IN_SORBS_WEB net reuse RCVD_IN_SORBS_WEB header RCVD_IN_SORBS_BLOCK eval:check_rbl_sub('sorbs', '127.0.0.8') describe RCVD_IN_SORBS_BLOCK SORBS: sender demands to never be tested tflags RCVD_IN_SORBS_BLOCK net reuse RCVD_IN_SORBS_BLOCK header RCVD_IN_SORBS_ZOMBIE eval:check_rbl_sub('sorbs', '127.0.0.9') describe RCVD_IN_SORBS_ZOMBIE SORBS: sender is on a hijacked network tflags RCVD_IN_SORBS_ZOMBIE net reuse RCVD_IN_SORBS_ZOMBIE header RCVD_IN_SORBS_DUL eval:check_rbl('sorbs-lastexternal', 'dnsbl.sorbs.net.', '127.0.0.10') describe RCVD_IN_SORBS_DUL SORBS: sent directly from dynamic IP address tflags RCVD_IN_SORBS_DUL net reuse RCVD_IN_SORBS_DUL # --------------------------------------------------------------------------- # Spamhaus ZEN includes SBL+CSS+XBL+PBL # # Spamhaus XBL contains both the Abuseat CBL (cbl.abuseat.org) and Blitzed # OPM (opm.blitzed.org) lists so it's not necessary to query those as well. header __RCVD_IN_ZEN eval:check_rbl('zen', 'zen.spamhaus.org.') describe __RCVD_IN_ZEN Received via a relay in Spamhaus Zen tflags __RCVD_IN_ZEN net reuse __RCVD_IN_ZEN # SBL is the Spamhaus Block List: http://www.spamhaus.org/sbl/ header RCVD_IN_SBL eval:check_rbl_sub('zen', '127.0.0.2') describe RCVD_IN_SBL Received via a relay in Spamhaus SBL tflags RCVD_IN_SBL net reuse RCVD_IN_SBL # XBL is the Exploits Block List: http://www.spamhaus.org/xbl/ header RCVD_IN_XBL eval:check_rbl('zen-lastexternal', 'zen.spamhaus.org.', '^127\.0\.0\.[45678]$') describe RCVD_IN_XBL Received via a relay in Spamhaus XBL tflags RCVD_IN_XBL net reuse RCVD_IN_XBL # PBL is the Policy Block List: http://www.spamhaus.org/pbl/ header RCVD_IN_PBL eval:check_rbl('zen-lastexternal', 'zen.spamhaus.org.', '^127\.0\.0\.1[01]$') describe RCVD_IN_PBL Received via a relay in Spamhaus PBL tflags RCVD_IN_PBL net reuse RCVD_IN_PBL # --------------------------------------------------------------------------- # Now, single zone BLs follow: # another domain-based blacklist header DNS_FROM_AHBL_RHSBL eval:check_rbl_envfrom('ahbl', 'rhsbl.ahbl.org.') describe DNS_FROM_AHBL_RHSBL Envelope sender listed in dnsbl.ahbl.org tflags DNS_FROM_AHBL_RHSBL net reuse DNS_FROM_AHBL_RHSBL # --------------------------------------------------------------------------- # NOTE: donation tests, see README file for details header RCVD_IN_BL_SPAMCOP_NET eval:check_rbl_txt('spamcop', 'bl.spamcop.net.', '(?i:spamcop)') describe RCVD_IN_BL_SPAMCOP_NET Received via a relay in bl.spamcop.net tflags RCVD_IN_BL_SPAMCOP_NET net reuse RCVD_IN_BL_SPAMCOP_NET # --------------------------------------------------------------------------- # NOTE: commercial tests, see README file for details header RCVD_IN_MAPS_RBL eval:check_rbl('rblplus', 'activationcode.r.mail-abuse.com.', '1') describe RCVD_IN_MAPS_RBL Relay in RBL, http://www.mail-abuse.com/enduserinfo_rbl.html tflags RCVD_IN_MAPS_RBL net header RCVD_IN_MAPS_DUL eval:check_rbl('rblplus-lastexternal', 'activationcode.r.mail-abuse.com.', '2') describe RCVD_IN_MAPS_DUL Relay in DUL, http://www.mail-abuse.com/enduserinfo_dul.html tflags RCVD_IN_MAPS_DUL net header RCVD_IN_MAPS_RSS eval:check_rbl_sub('rblplus', '4') describe RCVD_IN_MAPS_RSS Relay in RSS, http://www.mail-abuse.com/enduserinfo_rss.html tflags RCVD_IN_MAPS_RSS net header RCVD_IN_MAPS_OPS eval:check_rbl_sub('rblplus', '8') describe RCVD_IN_MAPS_OPS Relay in OPS, http://www.mail-abuse.com/enduserinfo_ops.html tflags RCVD_IN_MAPS_OPS net # The NML isn't part of the RBL+ and I find any documentation for it - is it dead? header RCVD_IN_MAPS_NML eval:check_rbl('nml', 'nonconfirm.mail-abuse.com.') describe RCVD_IN_MAPS_NML Relay in NML, http://www.mail-abuse.com/enduserinfo_nml.html tflags RCVD_IN_MAPS_NML net # --------------------------------------------------------------------------- # Section for DNS WL related lookups below. # IADB support ... header __RCVD_IN_IADB eval:check_rbl('iadb-firsttrusted', 'iadb.isipp.com.') tflags __RCVD_IN_IADB net nice header RCVD_IN_IADB_VOUCHED eval:check_rbl_sub('iadb-firsttrusted', '127.0.1.255') describe RCVD_IN_IADB_VOUCHED ISIPP IADB lists as vouched-for sender tflags RCVD_IN_IADB_VOUCHED net nice # --------------------------------------------------------------------------- # Return Path Certified: # http://www.returnpath.net/internetserviceprovider/certification/ # (replaces RCVD_IN_BSP_TRUSTED, RCVD_IN_BSP_OTHER, RCVD_IN_SSC_TRUSTED_COI) header RCVD_IN_RP_CERTIFIED eval:check_rbl_txt('ssc-firsttrusted', 'sa-trusted.bondedsender.org.') describe RCVD_IN_RP_CERTIFIED Sender in ReturnPath Certified - Contact cert-sa@returnpath.net tflags RCVD_IN_RP_CERTIFIED net nice # Return Path Safe: # http://www.returnpath.net/internetserviceprovider/certification/ # (replaces HABEAS_ACCREDITED_COI, HABEAS_ACCREDITED_SOI, HABEAS_CHECKED) header RCVD_IN_RP_SAFE eval:check_rbl_txt('ssc-firsttrusted','sa-accredit.habeas.com.') describe RCVD_IN_RP_SAFE Sender in ReturnPath Safe - Contact safe-sa@returnpath.net tflags RCVD_IN_RP_SAFE net nice # Return Path Reputation Network Blacklist (RNBL): # https://senderscore.org/blacklistlookup/ header RCVD_IN_RP_RNBL eval:check_rbl('rnbl-lastexternal','bl.score.senderscore.com.') describe RCVD_IN_RP_RNBL Relay in RNBL, https://senderscore.org/blacklistlookup/ tflags RCVD_IN_RP_RNBL net endif ifplugin Mail::SpamAssassin::Plugin::AskDNS askdns DKIMDOMAIN_IN_DWL _DKIMDOMAIN_._vouch.dwl.spamhaus.org TXT /^([a-z]+ )*(transaction|list|all)( [a-z]+)*$/ tflags DKIMDOMAIN_IN_DWL net nice describe DKIMDOMAIN_IN_DWL Signing domain listed in Spamhaus DWL askdns __DKIMDOMAIN_IN_DWL_ANY _DKIMDOMAIN_._vouch.dwl.spamhaus.org TXT tflags __DKIMDOMAIN_IN_DWL_ANY net nice describe __DKIMDOMAIN_IN_DWL_ANY Any TXT response received from a Spamhaus DWL meta DKIMDOMAIN_IN_DWL_UNKNOWN __DKIMDOMAIN_IN_DWL_ANY && !DKIMDOMAIN_IN_DWL tflags DKIMDOMAIN_IN_DWL_UNKNOWN net nice describe DKIMDOMAIN_IN_DWL_UNKNOWN Unrecognized response from Spamhaus DWL endif
Close