| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
# <@LICENSE> |
|
2
|
|
|
|
|
|
|
# Licensed to the Apache Software Foundation (ASF) under one or more |
|
3
|
|
|
|
|
|
|
# contributor license agreements. See the NOTICE file distributed with |
|
4
|
|
|
|
|
|
|
# this work for additional information regarding copyright ownership. |
|
5
|
|
|
|
|
|
|
# The ASF licenses this file to you under the Apache License, Version 2.0 |
|
6
|
|
|
|
|
|
|
# (the "License"); you may not use this file except in compliance with |
|
7
|
|
|
|
|
|
|
# the License. You may obtain a copy of the License at: |
|
8
|
|
|
|
|
|
|
# |
|
9
|
|
|
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0 |
|
10
|
|
|
|
|
|
|
# |
|
11
|
|
|
|
|
|
|
# Unless required by applicable law or agreed to in writing, software |
|
12
|
|
|
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS, |
|
13
|
|
|
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
|
14
|
|
|
|
|
|
|
# See the License for the specific language governing permissions and |
|
15
|
|
|
|
|
|
|
# limitations under the License. |
|
16
|
|
|
|
|
|
|
# </@LICENSE> |
|
17
|
|
|
|
|
|
|
|
|
18
|
|
|
|
|
|
|
=head1 NAME |
|
19
|
|
|
|
|
|
|
|
|
20
|
|
|
|
|
|
|
URILocalBL - blacklist URIs using local information (ISP names, address lists, and country codes) |
|
21
|
|
|
|
|
|
|
|
|
22
|
|
|
|
|
|
|
=head1 SYNOPSIS |
|
23
|
|
|
|
|
|
|
|
|
24
|
|
|
|
|
|
|
This plugin creates some new rule test types, such as "uri_block_cc", |
|
25
|
|
|
|
|
|
|
"uri_block_cidr", and "uri_block_isp". These rules apply to the URIs |
|
26
|
|
|
|
|
|
|
found in the HTML portion of a message, i.e. <a href=...> markup. |
|
27
|
|
|
|
|
|
|
|
|
28
|
|
|
|
|
|
|
loadplugin Mail::SpamAssassin::Plugin::URILocalBL |
|
29
|
|
|
|
|
|
|
|
|
30
|
|
|
|
|
|
|
Why local blacklisting? There are a few excellent, effective, and |
|
31
|
|
|
|
|
|
|
well-maintained DNSBL's out there. But they have several drawbacks: |
|
32
|
|
|
|
|
|
|
|
|
33
|
|
|
|
|
|
|
=over 2 |
|
34
|
|
|
|
|
|
|
|
|
35
|
|
|
|
|
|
|
=item * blacklists can cover tens of thousands of entries, and you can't select which ones you use; |
|
36
|
|
|
|
|
|
|
|
|
37
|
|
|
|
|
|
|
=item * verifying that it's correctly configured can be non-trivial; |
|
38
|
|
|
|
|
|
|
|
|
39
|
|
|
|
|
|
|
=item * new blacklisting entries may take a while to be detected and entered, so it's not instantaneous. |
|
40
|
|
|
|
|
|
|
|
|
41
|
|
|
|
|
|
|
=back |
|
42
|
|
|
|
|
|
|
|
|
43
|
|
|
|
|
|
|
Sometimes all you want is a quick, easy, and very surgical blacklisting of |
|
44
|
|
|
|
|
|
|
a particular site or a particular ISP. This plugin is defined for that |
|
45
|
|
|
|
|
|
|
exact usage case. |
|
46
|
|
|
|
|
|
|
|
|
47
|
|
|
|
|
|
|
=head1 RULE DEFINITIONS AND PRIVILEGED SETTINGS |
|
48
|
|
|
|
|
|
|
|
|
49
|
|
|
|
|
|
|
The format for defining a rule is as follows: |
|
50
|
|
|
|
|
|
|
|
|
51
|
|
|
|
|
|
|
uri_block_cc SYMBOLIC_TEST_NAME cc1 cc2 cc3 cc4 |
|
52
|
|
|
|
|
|
|
|
|
53
|
|
|
|
|
|
|
or: |
|
54
|
|
|
|
|
|
|
|
|
55
|
|
|
|
|
|
|
uri_block_cont SYMBOLIC_TEST_NAME co1 co2 co3 co4 |
|
56
|
|
|
|
|
|
|
|
|
57
|
|
|
|
|
|
|
or: |
|
58
|
|
|
|
|
|
|
|
|
59
|
|
|
|
|
|
|
uri_block_cidr SYMBOLIC_TEST_NAME a.a.a.a b.b.b.b/cc d.d.d.d-e.e.e.e |
|
60
|
|
|
|
|
|
|
|
|
61
|
|
|
|
|
|
|
or: |
|
62
|
|
|
|
|
|
|
|
|
63
|
|
|
|
|
|
|
uri_block_isp SYMBOLIC_TEST_NAME "DataRancid" "McCarrier" "Phishers-r-Us" |
|
64
|
|
|
|
|
|
|
|
|
65
|
|
|
|
|
|
|
Example rule for matching a URI in China: |
|
66
|
|
|
|
|
|
|
|
|
67
|
|
|
|
|
|
|
uri_block_cc TEST1 cn |
|
68
|
|
|
|
|
|
|
|
|
69
|
|
|
|
|
|
|
This would block the URL http://www.baidu.com/index.htm. Similarly, to |
|
70
|
|
|
|
|
|
|
match a Spam-haven netblock: |
|
71
|
|
|
|
|
|
|
|
|
72
|
|
|
|
|
|
|
uri_block_cidr TEST2 65.181.64.0/18 |
|
73
|
|
|
|
|
|
|
|
|
74
|
|
|
|
|
|
|
would match a netblock where several phishing sites were recently hosted. |
|
75
|
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
And to block all CIDR blocks registered to an ISP, one might use: |
|
77
|
|
|
|
|
|
|
|
|
78
|
|
|
|
|
|
|
uri_block_isp TEST3 "ColoCrossing" |
|
79
|
|
|
|
|
|
|
|
|
80
|
|
|
|
|
|
|
if one didn't trust URL's pointing to that organization's clients. Lastly, |
|
81
|
|
|
|
|
|
|
if there's a country that you want to block but there's an explicit host |
|
82
|
|
|
|
|
|
|
you wish to exempt from that blacklist, you can use: |
|
83
|
|
|
|
|
|
|
|
|
84
|
|
|
|
|
|
|
uri_block_exclude TEST1 www.baidu.com |
|
85
|
|
|
|
|
|
|
|
|
86
|
|
|
|
|
|
|
if you wish to exempt URL's referring to this host. The same syntax is |
|
87
|
|
|
|
|
|
|
applicable to CIDR and ISP blocks as well. |
|
88
|
|
|
|
|
|
|
|
|
89
|
|
|
|
|
|
|
=head1 DEPENDENCIES |
|
90
|
|
|
|
|
|
|
|
|
91
|
|
|
|
|
|
|
The Country-Code based filtering requires the Geo::IP or GeoIP2 module, |
|
92
|
|
|
|
|
|
|
which uses either the fremium GeoLiteCountry database, or the commercial |
|
93
|
|
|
|
|
|
|
version of it called GeoIP from MaxMind.com. |
|
94
|
|
|
|
|
|
|
|
|
95
|
|
|
|
|
|
|
The ISP based filtering requires the same module, plus the GeoIPISP database. |
|
96
|
|
|
|
|
|
|
There is no fremium version of this database, so commercial licensing is |
|
97
|
|
|
|
|
|
|
required. |
|
98
|
|
|
|
|
|
|
|
|
99
|
|
|
|
|
|
|
=cut |
|
100
|
|
|
|
|
|
|
|
|
101
|
|
|
|
|
|
|
use Mail::SpamAssassin::Plugin; |
|
102
|
20
|
|
|
20
|
|
142
|
use Mail::SpamAssassin::Logger; |
|
|
20
|
|
|
|
|
48
|
|
|
|
20
|
|
|
|
|
562
|
|
|
103
|
20
|
|
|
20
|
|
138
|
use Mail::SpamAssassin::Constants qw(:ip); |
|
|
20
|
|
|
|
|
38
|
|
|
|
20
|
|
|
|
|
1122
|
|
|
104
|
20
|
|
|
20
|
|
154
|
use Mail::SpamAssassin::Util qw(untaint_var); |
|
|
20
|
|
|
|
|
49
|
|
|
|
20
|
|
|
|
|
2289
|
|
|
105
|
20
|
|
|
20
|
|
138
|
|
|
|
20
|
|
|
|
|
40
|
|
|
|
20
|
|
|
|
|
866
|
|
|
106
|
|
|
|
|
|
|
use Socket; |
|
107
|
20
|
|
|
20
|
|
145
|
|
|
|
20
|
|
|
|
|
34
|
|
|
|
20
|
|
|
|
|
10756
|
|
|
108
|
|
|
|
|
|
|
use strict; |
|
109
|
20
|
|
|
20
|
|
141
|
use warnings; |
|
|
20
|
|
|
|
|
36
|
|
|
|
20
|
|
|
|
|
467
|
|
|
110
|
20
|
|
|
20
|
|
95
|
# use bytes; |
|
|
20
|
|
|
|
|
48
|
|
|
|
20
|
|
|
|
|
647
|
|
|
111
|
|
|
|
|
|
|
use re 'taint'; |
|
112
|
20
|
|
|
20
|
|
107
|
use version; |
|
|
20
|
|
|
|
|
44
|
|
|
|
20
|
|
|
|
|
679
|
|
|
113
|
20
|
|
|
20
|
|
110
|
|
|
|
20
|
|
|
|
|
32
|
|
|
|
20
|
|
|
|
|
138
|
|
|
114
|
|
|
|
|
|
|
our @ISA = qw(Mail::SpamAssassin::Plugin); |
|
115
|
|
|
|
|
|
|
|
|
116
|
|
|
|
|
|
|
use constant HAS_GEOIP => eval { require Geo::IP; }; |
|
117
|
20
|
|
|
20
|
|
1915
|
use constant HAS_GEOIP2 => eval { require GeoIP2::Database::Reader; }; |
|
|
20
|
|
|
|
|
37
|
|
|
|
20
|
|
|
|
|
43
|
|
|
|
20
|
|
|
|
|
3905
|
|
|
118
|
20
|
|
|
20
|
|
106
|
use constant HAS_CIDR => eval { require Net::CIDR::Lite; }; |
|
|
20
|
|
|
|
|
36
|
|
|
|
20
|
|
|
|
|
34
|
|
|
|
20
|
|
|
|
|
3680
|
|
|
119
|
20
|
|
|
20
|
|
122
|
|
|
|
20
|
|
|
|
|
35
|
|
|
|
20
|
|
|
|
|
39
|
|
|
|
20
|
|
|
|
|
41564
|
|
|
120
|
|
|
|
|
|
|
# constructor |
|
121
|
|
|
|
|
|
|
my $class = shift; |
|
122
|
|
|
|
|
|
|
my $mailsaobject = shift; |
|
123
|
61
|
|
|
61
|
1
|
177
|
|
|
124
|
61
|
|
|
|
|
164
|
# some boilerplate... |
|
125
|
|
|
|
|
|
|
$class = ref($class) || $class; |
|
126
|
|
|
|
|
|
|
my $self = $class->SUPER::new($mailsaobject); |
|
127
|
61
|
|
33
|
|
|
427
|
bless ($self, $class); |
|
128
|
61
|
|
|
|
|
339
|
|
|
129
|
61
|
|
|
|
|
158
|
# how to handle failure to get the database handle? |
|
130
|
|
|
|
|
|
|
# and we don't really have a valid return value... |
|
131
|
|
|
|
|
|
|
# can we defer getting this handle until we actually see |
|
132
|
|
|
|
|
|
|
# a uri_block_cc rule? |
|
133
|
|
|
|
|
|
|
|
|
134
|
|
|
|
|
|
|
$self->register_eval_rule("check_uri_local_bl"); |
|
135
|
|
|
|
|
|
|
|
|
136
|
61
|
|
|
|
|
267
|
$self->set_config($mailsaobject->{conf}); |
|
137
|
|
|
|
|
|
|
|
|
138
|
61
|
|
|
|
|
322
|
return $self; |
|
139
|
|
|
|
|
|
|
} |
|
140
|
61
|
|
|
|
|
526
|
|
|
141
|
|
|
|
|
|
|
my ($self, $conf) = @_; |
|
142
|
|
|
|
|
|
|
my @cmds; |
|
143
|
|
|
|
|
|
|
|
|
144
|
61
|
|
|
61
|
0
|
178
|
my $pluginobj = $self; # allow use inside the closure below |
|
145
|
61
|
|
|
|
|
124
|
|
|
146
|
|
|
|
|
|
|
push (@cmds, { |
|
147
|
61
|
|
|
|
|
96
|
setting => 'uri_block_cc', |
|
148
|
|
|
|
|
|
|
type => $Mail::SpamAssassin::Conf::CONF_TYPE_HASH_KEY_VALUE, |
|
149
|
|
|
|
|
|
|
is_priv => 1, |
|
150
|
|
|
|
|
|
|
code => sub { |
|
151
|
|
|
|
|
|
|
my ($self, $key, $value, $line) = @_; |
|
152
|
|
|
|
|
|
|
|
|
153
|
|
|
|
|
|
|
if ($value !~ /^(\S+)\s+(.+)$/) { |
|
154
|
0
|
|
|
0
|
|
0
|
return $Mail::SpamAssassin::Conf::INVALID_VALUE; |
|
155
|
|
|
|
|
|
|
} |
|
156
|
0
|
0
|
|
|
|
0
|
my $name = $1; |
|
157
|
0
|
|
|
|
|
0
|
my $def = $2; |
|
158
|
|
|
|
|
|
|
my $added_criteria = 0; |
|
159
|
0
|
|
|
|
|
0
|
|
|
160
|
0
|
|
|
|
|
0
|
$conf->{parser}->{conf}->{uri_local_bl}->{$name}->{countries} = {}; |
|
161
|
0
|
|
|
|
|
0
|
|
|
162
|
|
|
|
|
|
|
# this should match all country codes including satellite providers |
|
163
|
0
|
|
|
|
|
0
|
while ($def =~ m/^\s*([a-z][a-z0-9])(\s+(.*)|)$/) { |
|
164
|
|
|
|
|
|
|
my $cc = $1; |
|
165
|
|
|
|
|
|
|
my $rest = $2; |
|
166
|
0
|
|
|
|
|
0
|
|
|
167
|
0
|
|
|
|
|
0
|
#dbg("config: uri_block_cc adding %s to %s\n", $cc, $name); |
|
168
|
0
|
|
|
|
|
0
|
$conf->{parser}->{conf}->{uri_local_bl}->{$name}->{countries}->{uc($cc)} = 1; |
|
169
|
|
|
|
|
|
|
$added_criteria = 1; |
|
170
|
|
|
|
|
|
|
|
|
171
|
0
|
|
|
|
|
0
|
$def = $rest; |
|
172
|
0
|
|
|
|
|
0
|
} |
|
173
|
|
|
|
|
|
|
|
|
174
|
0
|
|
|
|
|
0
|
if ($added_criteria == 0) { |
|
175
|
|
|
|
|
|
|
warn "config: no arguments"; |
|
176
|
|
|
|
|
|
|
return $Mail::SpamAssassin::Conf::MISSING_REQUIRED_VALUE; |
|
177
|
0
|
0
|
|
|
|
0
|
} elsif ($def ne '') { |
|
|
|
0
|
|
|
|
|
|
|
178
|
0
|
|
|
|
|
0
|
warn "config: failed to add invalid rule $name"; |
|
179
|
0
|
|
|
|
|
0
|
return $Mail::SpamAssassin::Conf::INVALID_VALUE; |
|
180
|
|
|
|
|
|
|
} |
|
181
|
0
|
|
|
|
|
0
|
|
|
182
|
0
|
|
|
|
|
0
|
dbg("config: uri_block_cc added %s\n", $name); |
|
183
|
|
|
|
|
|
|
|
|
184
|
|
|
|
|
|
|
$conf->{parser}->add_test($name, 'check_uri_local_bl()', $Mail::SpamAssassin::Conf::TYPE_BODY_EVALS); |
|
185
|
0
|
|
|
|
|
0
|
} |
|
186
|
|
|
|
|
|
|
}); |
|
187
|
0
|
|
|
|
|
0
|
|
|
188
|
|
|
|
|
|
|
push (@cmds, { |
|
189
|
61
|
|
|
|
|
626
|
setting => 'uri_block_cont', |
|
190
|
|
|
|
|
|
|
type => $Mail::SpamAssassin::Conf::CONF_TYPE_HASH_KEY_VALUE, |
|
191
|
|
|
|
|
|
|
is_priv => 1, |
|
192
|
|
|
|
|
|
|
code => sub { |
|
193
|
|
|
|
|
|
|
my ($self, $key, $value, $line) = @_; |
|
194
|
|
|
|
|
|
|
|
|
195
|
|
|
|
|
|
|
if ($value !~ /^(\S+)\s+(.+)$/) { |
|
196
|
0
|
|
|
0
|
|
0
|
return $Mail::SpamAssassin::Conf::INVALID_VALUE; |
|
197
|
|
|
|
|
|
|
} |
|
198
|
0
|
0
|
|
|
|
0
|
my $name = $1; |
|
199
|
0
|
|
|
|
|
0
|
my $def = $2; |
|
200
|
|
|
|
|
|
|
my $added_criteria = 0; |
|
201
|
0
|
|
|
|
|
0
|
|
|
202
|
0
|
|
|
|
|
0
|
$conf->{parser}->{conf}->{uri_local_bl}->{$name}->{continents} = {}; |
|
203
|
0
|
|
|
|
|
0
|
|
|
204
|
|
|
|
|
|
|
# this should match all continent codes |
|
205
|
0
|
|
|
|
|
0
|
while ($def =~ m/^\s*([a-z]{2})(\s+(.*)|)$/) { |
|
206
|
|
|
|
|
|
|
my $cont = $1; |
|
207
|
|
|
|
|
|
|
my $rest = $2; |
|
208
|
0
|
|
|
|
|
0
|
|
|
209
|
0
|
|
|
|
|
0
|
# dbg("config: uri_block_cont adding %s to %s\n", $cont, $name); |
|
210
|
0
|
|
|
|
|
0
|
$conf->{parser}->{conf}->{uri_local_bl}->{$name}->{continents}->{uc($cont)} = 1; |
|
211
|
|
|
|
|
|
|
$added_criteria = 1; |
|
212
|
|
|
|
|
|
|
|
|
213
|
0
|
|
|
|
|
0
|
$def = $rest; |
|
214
|
0
|
|
|
|
|
0
|
} |
|
215
|
|
|
|
|
|
|
|
|
216
|
0
|
|
|
|
|
0
|
if ($added_criteria == 0) { |
|
217
|
|
|
|
|
|
|
warn "config: no arguments"; |
|
218
|
|
|
|
|
|
|
return $Mail::SpamAssassin::Conf::MISSING_REQUIRED_VALUE; |
|
219
|
0
|
0
|
|
|
|
0
|
} elsif ($def ne '') { |
|
|
|
0
|
|
|
|
|
|
|
220
|
0
|
|
|
|
|
0
|
warn "config: failed to add invalid rule $name"; |
|
221
|
0
|
|
|
|
|
0
|
return $Mail::SpamAssassin::Conf::INVALID_VALUE; |
|
222
|
|
|
|
|
|
|
} |
|
223
|
0
|
|
|
|
|
0
|
|
|
224
|
0
|
|
|
|
|
0
|
dbg("config: uri_block_cont added %s\n", $name); |
|
225
|
|
|
|
|
|
|
|
|
226
|
|
|
|
|
|
|
$conf->{parser}->add_test($name, 'check_uri_local_bl()', $Mail::SpamAssassin::Conf::TYPE_BODY_EVALS); |
|
227
|
0
|
|
|
|
|
0
|
} |
|
228
|
|
|
|
|
|
|
}); |
|
229
|
0
|
|
|
|
|
0
|
|
|
230
|
|
|
|
|
|
|
push (@cmds, { |
|
231
|
61
|
|
|
|
|
507
|
setting => 'uri_block_isp', |
|
232
|
|
|
|
|
|
|
type => $Mail::SpamAssassin::Conf::CONF_TYPE_HASH_KEY_VALUE, |
|
233
|
|
|
|
|
|
|
is_priv => 1, |
|
234
|
|
|
|
|
|
|
code => sub { |
|
235
|
|
|
|
|
|
|
my ($self, $key, $value, $line) = @_; |
|
236
|
|
|
|
|
|
|
|
|
237
|
|
|
|
|
|
|
if ($value !~ /^(\S+)\s+(.+)$/) { |
|
238
|
0
|
|
|
0
|
|
0
|
return $Mail::SpamAssassin::Conf::INVALID_VALUE; |
|
239
|
|
|
|
|
|
|
} |
|
240
|
0
|
0
|
|
|
|
0
|
my $name = $1; |
|
241
|
0
|
|
|
|
|
0
|
my $def = $2; |
|
242
|
|
|
|
|
|
|
my $added_criteria = 0; |
|
243
|
0
|
|
|
|
|
0
|
|
|
244
|
0
|
|
|
|
|
0
|
$conf->{parser}->{conf}->{uri_local_bl}->{$name}->{isps} = {}; |
|
245
|
0
|
|
|
|
|
0
|
|
|
246
|
|
|
|
|
|
|
# gather up quoted strings |
|
247
|
0
|
|
|
|
|
0
|
while ($def =~ m/^\s*"([^"]*)"(\s+(.*)|)$/) { |
|
248
|
|
|
|
|
|
|
my $isp = $1; |
|
249
|
|
|
|
|
|
|
my $rest = $2; |
|
250
|
0
|
|
|
|
|
0
|
|
|
251
|
0
|
|
|
|
|
0
|
dbg("config: uri_block_isp adding \"%s\" to %s\n", $isp, $name); |
|
252
|
0
|
|
|
|
|
0
|
$conf->{parser}->{conf}->{uri_local_bl}->{$name}->{isps}->{$isp} = 1; |
|
253
|
|
|
|
|
|
|
$added_criteria = 1; |
|
254
|
0
|
|
|
|
|
0
|
|
|
255
|
0
|
|
|
|
|
0
|
$def = $rest; |
|
256
|
0
|
|
|
|
|
0
|
} |
|
257
|
|
|
|
|
|
|
|
|
258
|
0
|
|
|
|
|
0
|
if ($added_criteria == 0) { |
|
259
|
|
|
|
|
|
|
warn "config: no arguments"; |
|
260
|
|
|
|
|
|
|
return $Mail::SpamAssassin::Conf::MISSING_REQUIRED_VALUE; |
|
261
|
0
|
0
|
|
|
|
0
|
} elsif ($def ne '') { |
|
|
|
0
|
|
|
|
|
|
|
262
|
0
|
|
|
|
|
0
|
warn "config: failed to add invalid rule $name"; |
|
263
|
0
|
|
|
|
|
0
|
return $Mail::SpamAssassin::Conf::INVALID_VALUE; |
|
264
|
|
|
|
|
|
|
} |
|
265
|
0
|
|
|
|
|
0
|
|
|
266
|
0
|
|
|
|
|
0
|
$conf->{parser}->add_test($name, 'check_uri_local_bl()', $Mail::SpamAssassin::Conf::TYPE_BODY_EVALS); |
|
267
|
|
|
|
|
|
|
} |
|
268
|
|
|
|
|
|
|
}); |
|
269
|
0
|
|
|
|
|
0
|
|
|
270
|
|
|
|
|
|
|
push (@cmds, { |
|
271
|
61
|
|
|
|
|
488
|
setting => 'uri_block_cidr', |
|
272
|
|
|
|
|
|
|
type => $Mail::SpamAssassin::Conf::CONF_TYPE_HASH_KEY_VALUE, |
|
273
|
|
|
|
|
|
|
is_priv => 1, |
|
274
|
|
|
|
|
|
|
code => sub { |
|
275
|
|
|
|
|
|
|
my ($self, $key, $value, $line) = @_; |
|
276
|
|
|
|
|
|
|
|
|
277
|
|
|
|
|
|
|
if (!HAS_CIDR) { |
|
278
|
0
|
|
|
0
|
|
0
|
warn "config: uri_block_cidr not supported, required module Net::CIDR::Lite missing\n"; |
|
279
|
|
|
|
|
|
|
return $Mail::SpamAssassin::Conf::INVALID_VALUE; |
|
280
|
0
|
0
|
|
|
|
0
|
} |
|
281
|
0
|
|
|
|
|
0
|
|
|
282
|
0
|
|
|
|
|
0
|
if ($value !~ /^(\S+)\s+(.+)$/) { |
|
283
|
|
|
|
|
|
|
return $Mail::SpamAssassin::Conf::INVALID_VALUE; |
|
284
|
|
|
|
|
|
|
} |
|
285
|
0
|
0
|
|
|
|
0
|
my $name = $1; |
|
286
|
0
|
|
|
|
|
0
|
my $def = $2; |
|
287
|
|
|
|
|
|
|
my $added_criteria = 0; |
|
288
|
0
|
|
|
|
|
0
|
|
|
289
|
0
|
|
|
|
|
0
|
$conf->{parser}->{conf}->{uri_local_bl}->{$name}->{cidr} = new Net::CIDR::Lite; |
|
290
|
0
|
|
|
|
|
0
|
|
|
291
|
|
|
|
|
|
|
# match individual IP's, subnets, and ranges |
|
292
|
0
|
|
|
|
|
0
|
while ($def =~ m/^\s*(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}(\/\d{1,2}|-\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})?)(\s+(.*)|)$/) { |
|
293
|
|
|
|
|
|
|
my $addr = $1; |
|
294
|
|
|
|
|
|
|
my $rest = $3; |
|
295
|
0
|
|
|
|
|
0
|
|
|
296
|
0
|
|
|
|
|
0
|
dbg("config: uri_block_cidr adding %s to %s\n", $addr, $name); |
|
297
|
0
|
|
|
|
|
0
|
|
|
298
|
|
|
|
|
|
|
eval { $conf->{parser}->{conf}->{uri_local_bl}->{$name}->{cidr}->add_any($addr) }; |
|
299
|
0
|
|
|
|
|
0
|
last if ($@); |
|
300
|
|
|
|
|
|
|
|
|
301
|
0
|
|
|
|
|
0
|
$added_criteria = 1; |
|
|
0
|
|
|
|
|
0
|
|
|
302
|
0
|
0
|
|
|
|
0
|
|
|
303
|
|
|
|
|
|
|
$def = $rest; |
|
304
|
0
|
|
|
|
|
0
|
} |
|
305
|
|
|
|
|
|
|
|
|
306
|
0
|
|
|
|
|
0
|
if ($added_criteria == 0) { |
|
307
|
|
|
|
|
|
|
warn "config: no arguments"; |
|
308
|
|
|
|
|
|
|
return $Mail::SpamAssassin::Conf::MISSING_REQUIRED_VALUE; |
|
309
|
0
|
0
|
|
|
|
0
|
} elsif ($def ne '') { |
|
|
|
0
|
|
|
|
|
|
|
310
|
0
|
|
|
|
|
0
|
warn "config: failed to add invalid rule $name"; |
|
311
|
0
|
|
|
|
|
0
|
return $Mail::SpamAssassin::Conf::INVALID_VALUE; |
|
312
|
|
|
|
|
|
|
} |
|
313
|
0
|
|
|
|
|
0
|
|
|
314
|
0
|
|
|
|
|
0
|
# optimize the ranges |
|
315
|
|
|
|
|
|
|
$conf->{parser}->{conf}->{uri_local_bl}->{$name}->{cidr}->clean(); |
|
316
|
|
|
|
|
|
|
|
|
317
|
|
|
|
|
|
|
$conf->{parser}->add_test($name, 'check_uri_local_bl()', $Mail::SpamAssassin::Conf::TYPE_BODY_EVALS); |
|
318
|
0
|
|
|
|
|
0
|
} |
|
319
|
|
|
|
|
|
|
}); |
|
320
|
0
|
|
|
|
|
0
|
|
|
321
|
|
|
|
|
|
|
push (@cmds, { |
|
322
|
61
|
|
|
|
|
490
|
setting => 'uri_block_exclude', |
|
323
|
|
|
|
|
|
|
type => $Mail::SpamAssassin::Conf::CONF_TYPE_HASH_KEY_VALUE, |
|
324
|
|
|
|
|
|
|
is_priv => 1, |
|
325
|
|
|
|
|
|
|
code => sub { |
|
326
|
|
|
|
|
|
|
my ($self, $key, $value, $line) = @_; |
|
327
|
|
|
|
|
|
|
|
|
328
|
|
|
|
|
|
|
if ($value !~ /^(\S+)\s+(.+)$/) { |
|
329
|
0
|
|
|
0
|
|
0
|
return $Mail::SpamAssassin::Conf::INVALID_VALUE; |
|
330
|
|
|
|
|
|
|
} |
|
331
|
0
|
0
|
|
|
|
0
|
my $name = $1; |
|
332
|
0
|
|
|
|
|
0
|
my $def = $2; |
|
333
|
|
|
|
|
|
|
my $added_criteria = 0; |
|
334
|
0
|
|
|
|
|
0
|
|
|
335
|
0
|
|
|
|
|
0
|
$conf->{parser}->{conf}->{uri_local_bl}->{$name}->{exclusions} = {}; |
|
336
|
0
|
|
|
|
|
0
|
|
|
337
|
|
|
|
|
|
|
# match individual IP's, or domain names |
|
338
|
0
|
|
|
|
|
0
|
while ($def =~ m/^\s*((\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})|(([a-z0-9][-a-z0-9]*[a-z0-9](\.[a-z0-9][-a-z0-9]*[a-z0-9]){1,})))(\s+(.*)|)$/) { |
|
339
|
|
|
|
|
|
|
my $addr = $1; |
|
340
|
|
|
|
|
|
|
my $rest = $6; |
|
341
|
0
|
|
|
|
|
0
|
|
|
342
|
0
|
|
|
|
|
0
|
dbg("config: uri_block_exclude adding %s to %s\n", $addr, $name); |
|
343
|
0
|
|
|
|
|
0
|
|
|
344
|
|
|
|
|
|
|
$conf->{parser}->{conf}->{uri_local_bl}->{$name}->{exclusions}->{$addr} = 1; |
|
345
|
0
|
|
|
|
|
0
|
|
|
346
|
|
|
|
|
|
|
$added_criteria = 1; |
|
347
|
0
|
|
|
|
|
0
|
|
|
348
|
|
|
|
|
|
|
$def = $rest; |
|
349
|
0
|
|
|
|
|
0
|
} |
|
350
|
|
|
|
|
|
|
|
|
351
|
0
|
|
|
|
|
0
|
if ($added_criteria == 0) { |
|
352
|
|
|
|
|
|
|
warn "config: no arguments"; |
|
353
|
|
|
|
|
|
|
return $Mail::SpamAssassin::Conf::MISSING_REQUIRED_VALUE; |
|
354
|
0
|
0
|
|
|
|
0
|
} elsif ($def ne '') { |
|
|
|
0
|
|
|
|
|
|
|
355
|
0
|
|
|
|
|
0
|
warn "config: failed to add invalid rule $name"; |
|
356
|
0
|
|
|
|
|
0
|
return $Mail::SpamAssassin::Conf::INVALID_VALUE; |
|
357
|
|
|
|
|
|
|
} |
|
358
|
0
|
|
|
|
|
0
|
|
|
359
|
0
|
|
|
|
|
0
|
$conf->{parser}->add_test($name, 'check_uri_local_bl()', $Mail::SpamAssassin::Conf::TYPE_BODY_EVALS); |
|
360
|
|
|
|
|
|
|
} |
|
361
|
|
|
|
|
|
|
}); |
|
362
|
0
|
|
|
|
|
0
|
|
|
363
|
|
|
|
|
|
|
=over 2 |
|
364
|
61
|
|
|
|
|
456
|
|
|
365
|
|
|
|
|
|
|
=item uri_country_db_path STRING |
|
366
|
|
|
|
|
|
|
|
|
367
|
|
|
|
|
|
|
This option tells SpamAssassin where to find the MaxMind country GeoIP2 |
|
368
|
|
|
|
|
|
|
database. Country or City database are both supported. |
|
369
|
|
|
|
|
|
|
|
|
370
|
|
|
|
|
|
|
=back |
|
371
|
|
|
|
|
|
|
|
|
372
|
|
|
|
|
|
|
=cut |
|
373
|
|
|
|
|
|
|
|
|
374
|
|
|
|
|
|
|
push (@cmds, { |
|
375
|
|
|
|
|
|
|
setting => 'uri_country_db_path', |
|
376
|
|
|
|
|
|
|
is_priv => 1, |
|
377
|
|
|
|
|
|
|
default => undef, |
|
378
|
|
|
|
|
|
|
type => $Mail::SpamAssassin::Conf::CONF_TYPE_STRING, |
|
379
|
|
|
|
|
|
|
code => sub { |
|
380
|
|
|
|
|
|
|
my ($self, $key, $value, $line) = @_; |
|
381
|
|
|
|
|
|
|
if (!defined $value || !length $value) { |
|
382
|
|
|
|
|
|
|
return $Mail::SpamAssassin::Conf::MISSING_REQUIRED_VALUE; |
|
383
|
0
|
|
|
0
|
|
0
|
} |
|
384
|
0
|
0
|
0
|
|
|
0
|
if (!-f $value) { |
|
385
|
0
|
|
|
|
|
0
|
info("config: uri_country_db_path \"$value\" is not accessible"); |
|
386
|
|
|
|
|
|
|
$self->{uri_country_db_path} = $value; |
|
387
|
0
|
0
|
|
|
|
0
|
return $Mail::SpamAssassin::Conf::INVALID_VALUE; |
|
388
|
0
|
|
|
|
|
0
|
} |
|
389
|
0
|
|
|
|
|
0
|
|
|
390
|
0
|
|
|
|
|
0
|
$self->{uri_country_db_path} = $value; |
|
391
|
|
|
|
|
|
|
} |
|
392
|
|
|
|
|
|
|
}); |
|
393
|
0
|
|
|
|
|
0
|
|
|
394
|
|
|
|
|
|
|
=over 2 |
|
395
|
61
|
|
|
|
|
514
|
|
|
396
|
|
|
|
|
|
|
=item uri_country_db_isp_path STRING |
|
397
|
|
|
|
|
|
|
|
|
398
|
|
|
|
|
|
|
This option tells SpamAssassin where to find the MaxMind isp GeoIP2 database. |
|
399
|
|
|
|
|
|
|
|
|
400
|
|
|
|
|
|
|
=back |
|
401
|
|
|
|
|
|
|
|
|
402
|
|
|
|
|
|
|
=cut |
|
403
|
|
|
|
|
|
|
|
|
404
|
|
|
|
|
|
|
push (@cmds, { |
|
405
|
|
|
|
|
|
|
setting => 'uri_country_db_isp_path', |
|
406
|
|
|
|
|
|
|
is_priv => 1, |
|
407
|
|
|
|
|
|
|
default => undef, |
|
408
|
|
|
|
|
|
|
type => $Mail::SpamAssassin::Conf::CONF_TYPE_STRING, |
|
409
|
|
|
|
|
|
|
code => sub { |
|
410
|
|
|
|
|
|
|
my ($self, $key, $value, $line) = @_; |
|
411
|
|
|
|
|
|
|
if (!defined $value || !length $value) { |
|
412
|
|
|
|
|
|
|
return $Mail::SpamAssassin::Conf::MISSING_REQUIRED_VALUE; |
|
413
|
0
|
|
|
0
|
|
0
|
} |
|
414
|
0
|
0
|
0
|
|
|
0
|
if (!-f $value) { |
|
415
|
0
|
|
|
|
|
0
|
info("config: uri_country_db_isp_path \"$value\" is not accessible"); |
|
416
|
|
|
|
|
|
|
$self->{uri_country_db_isp_path} = $value; |
|
417
|
0
|
0
|
|
|
|
0
|
return $Mail::SpamAssassin::Conf::INVALID_VALUE; |
|
418
|
0
|
|
|
|
|
0
|
} |
|
419
|
0
|
|
|
|
|
0
|
|
|
420
|
0
|
|
|
|
|
0
|
$self->{uri_country_db_isp_path} = $value; |
|
421
|
|
|
|
|
|
|
} |
|
422
|
|
|
|
|
|
|
}); |
|
423
|
0
|
|
|
|
|
0
|
|
|
424
|
|
|
|
|
|
|
$conf->{parser}->register_commands(\@cmds); |
|
425
|
61
|
|
|
|
|
478
|
} |
|
426
|
|
|
|
|
|
|
|
|
427
|
61
|
|
|
|
|
277
|
my ($self, $permsg) = @_; |
|
428
|
|
|
|
|
|
|
|
|
429
|
|
|
|
|
|
|
my $cc; |
|
430
|
|
|
|
|
|
|
my $cont; |
|
431
|
0
|
|
|
0
|
0
|
|
my $db_info; |
|
432
|
|
|
|
|
|
|
my $isp; |
|
433
|
0
|
|
|
|
|
|
|
|
434
|
|
|
|
|
|
|
my $conf_country_db_path = $self->{'main'}{'resolver'}{'conf'}->{uri_country_db_path}; |
|
435
|
0
|
|
|
|
|
|
my $conf_country_db_isp_path = $self->{'main'}{'resolver'}{'conf'}->{uri_country_db_isp_path}; |
|
436
|
0
|
|
|
|
|
|
# If country_db_path is set I am using GeoIP2 api |
|
437
|
|
|
|
|
|
|
if ( HAS_GEOIP2 and ( ( defined $conf_country_db_path ) or ( defined $conf_country_db_isp_path ) ) ) { |
|
438
|
0
|
|
|
|
|
|
|
|
439
|
0
|
|
|
|
|
|
eval { |
|
440
|
|
|
|
|
|
|
$self->{geoip} = GeoIP2::Database::Reader->new( |
|
441
|
0
|
0
|
0
|
|
|
|
file => $conf_country_db_path, |
|
|
|
0
|
0
|
|
|
|
|
|
442
|
|
|
|
|
|
|
locales => [ 'en' ] |
|
443
|
0
|
|
|
|
|
|
) if (( defined $conf_country_db_path ) && ( -f $conf_country_db_path)); |
|
444
|
0
|
0
|
0
|
|
|
|
if ( defined ($conf_country_db_path) ) { |
|
445
|
|
|
|
|
|
|
$db_info = sub { return "GeoIP2 " . ($self->{geoip}->metadata()->description()->{en} || '?') }; |
|
446
|
|
|
|
|
|
|
warn "$conf_country_db_path not found" unless $self->{geoip}; |
|
447
|
|
|
|
|
|
|
} |
|
448
|
0
|
0
|
|
|
|
|
|
|
449
|
0
|
|
0
|
0
|
|
|
$self->{geoisp} = GeoIP2::Database::Reader->new( |
|
|
0
|
|
|
|
|
|
|
|
450
|
0
|
0
|
|
|
|
|
file => $conf_country_db_isp_path, |
|
451
|
|
|
|
|
|
|
locales => [ 'en' ] |
|
452
|
|
|
|
|
|
|
) if (( defined $conf_country_db_isp_path ) && ( -f $conf_country_db_isp_path)); |
|
453
|
0
|
0
|
0
|
|
|
|
if ( defined ($conf_country_db_isp_path) ) { |
|
454
|
|
|
|
|
|
|
warn "$conf_country_db_isp_path not found" unless $self->{geoisp}; |
|
455
|
|
|
|
|
|
|
} |
|
456
|
|
|
|
|
|
|
$self->{use_geoip2} = 1; |
|
457
|
0
|
0
|
|
|
|
|
}; |
|
458
|
0
|
0
|
|
|
|
|
if ($@ || !($self->{geoip} || $self->{geoisp})) { |
|
459
|
|
|
|
|
|
|
$@ =~ s/\s+Trace begun.*//s; |
|
460
|
0
|
|
|
|
|
|
warn "URILocalBL: GeoIP2 load failed: $@\n"; |
|
461
|
|
|
|
|
|
|
return 0; |
|
462
|
0
|
0
|
0
|
|
|
|
} |
|
|
|
|
0
|
|
|
|
|
|
463
|
0
|
|
|
|
|
|
|
|
464
|
0
|
|
|
|
|
|
} elsif ( HAS_GEOIP ) { |
|
465
|
0
|
|
|
|
|
|
BEGIN { |
|
466
|
|
|
|
|
|
|
Geo::IP->import( qw(GEOIP_MEMORY_CACHE GEOIP_CHECK_CACHE GEOIP_ISP_EDITION) ); |
|
467
|
|
|
|
|
|
|
} |
|
468
|
|
|
|
|
|
|
$self->{use_geoip2} = 0; |
|
469
|
|
|
|
|
|
|
# need GeoIP C library 1.6.3 and GeoIP perl API 1.4.4 or later to avoid messages leaking - Bug 7153 |
|
470
|
20
|
|
|
20
|
|
26084
|
my $gic_wanted = version->parse('v1.6.3'); |
|
471
|
|
|
|
|
|
|
my $gic_have = version->parse(Geo::IP->lib_version()); |
|
472
|
0
|
|
|
|
|
|
my $gip_wanted = version->parse('v1.4.4'); |
|
473
|
|
|
|
|
|
|
my $gip_have = version->parse($Geo::IP::VERSION); |
|
474
|
0
|
|
|
|
|
|
|
|
475
|
0
|
|
|
|
|
|
# this code burps an ugly message if it fails, but that's redirected elsewhere |
|
476
|
0
|
|
|
|
|
|
my $flags = 0; |
|
477
|
0
|
|
|
|
|
|
my $flag_isp = 0; |
|
478
|
|
|
|
|
|
|
my $flag_silent = 0; |
|
479
|
|
|
|
|
|
|
eval '$flags = GEOIP_MEMORY_CACHE | GEOIP_CHECK_CACHE' if ($gip_have >= $gip_wanted); |
|
480
|
0
|
|
|
|
|
|
eval '$flag_silent = GEOIP_SILENCE' if ($gip_have >= $gip_wanted); |
|
481
|
0
|
|
|
|
|
|
eval '$flag_isp = GEOIP_ISP_EDITION' if ($gip_have >= $gip_wanted); |
|
482
|
0
|
|
|
|
|
|
|
|
483
|
0
|
0
|
|
|
|
|
eval { |
|
484
|
0
|
0
|
|
|
|
|
if ($flag_silent && $gic_have >= $gic_wanted) { |
|
485
|
0
|
0
|
|
|
|
|
$self->{geoip} = Geo::IP->new($flags | $flag_silent); |
|
486
|
|
|
|
|
|
|
$self->{geoisp} = Geo::IP->open_type($flag_isp, $flag_silent | $flags); |
|
487
|
0
|
|
|
|
|
|
} else { |
|
488
|
0
|
0
|
0
|
|
|
|
open(OLDERR, ">&STDERR"); |
|
489
|
0
|
|
|
|
|
|
open(STDERR, ">", "/dev/null"); |
|
490
|
0
|
|
|
|
|
|
$self->{geoip} = Geo::IP->new($flags); |
|
491
|
|
|
|
|
|
|
$self->{geoisp} = Geo::IP->open_type($flag_isp); |
|
492
|
0
|
|
|
|
|
|
open(STDERR, ">&OLDERR"); |
|
493
|
0
|
|
|
|
|
|
close(OLDERR); |
|
494
|
0
|
|
|
|
|
|
} |
|
495
|
0
|
|
|
|
|
|
}; |
|
496
|
0
|
|
|
|
|
|
if ($@ || !($self->{geoip} || $self->{geoisp})) { |
|
497
|
0
|
|
|
|
|
|
$@ =~ s/\s+Trace begun.*//s; |
|
498
|
|
|
|
|
|
|
warn "URILocalBL: GeoIP load failed: $@\n"; |
|
499
|
|
|
|
|
|
|
return 0; |
|
500
|
0
|
0
|
0
|
|
|
|
} |
|
|
|
|
0
|
|
|
|
|
|
501
|
0
|
|
|
|
|
|
|
|
502
|
0
|
|
|
|
|
|
$db_info = sub { return "Geo::IP " . ($self->{geoip}->database_info || '?') }; |
|
503
|
0
|
|
|
|
|
|
} else { |
|
504
|
|
|
|
|
|
|
dbg("No GeoIP module available"); |
|
505
|
|
|
|
|
|
|
return 0; |
|
506
|
0
|
|
0
|
0
|
|
|
} |
|
|
0
|
|
|
|
|
|
|
|
507
|
|
|
|
|
|
|
|
|
508
|
0
|
|
|
|
|
|
my %uri_detail = %{ $permsg->get_uri_detail_list() }; |
|
509
|
0
|
|
|
|
|
|
my $test = $permsg->{current_rule_name}; |
|
510
|
|
|
|
|
|
|
my $rule = $permsg->{conf}->{uri_local_bl}->{$test}; |
|
511
|
|
|
|
|
|
|
|
|
512
|
0
|
|
|
|
|
|
my %hit_tests; |
|
|
0
|
|
|
|
|
|
|
|
513
|
0
|
|
|
|
|
|
my $got_hit = 0; |
|
514
|
0
|
|
|
|
|
|
my @addrs; |
|
515
|
|
|
|
|
|
|
my $IP_ADDRESS = IP_ADDRESS; |
|
516
|
0
|
|
|
|
|
|
|
|
517
|
0
|
|
|
|
|
|
if ( defined $self->{geoip} ) { |
|
518
|
0
|
|
|
|
|
|
dbg("check: uri_local_bl evaluating rule %s using database %s\n", $test, $db_info->()); |
|
519
|
0
|
|
|
|
|
|
} else { |
|
520
|
|
|
|
|
|
|
dbg("check: uri_local_bl evaluating rule %s\n", $test); |
|
521
|
0
|
0
|
|
|
|
|
} |
|
522
|
0
|
|
|
|
|
|
|
|
523
|
|
|
|
|
|
|
my $dns_available = $permsg->is_dns_available(); |
|
524
|
0
|
|
|
|
|
|
|
|
525
|
|
|
|
|
|
|
while (my ($raw, $info) = each %uri_detail) { |
|
526
|
|
|
|
|
|
|
|
|
527
|
0
|
|
|
|
|
|
next unless $info->{hosts}; |
|
528
|
|
|
|
|
|
|
|
|
529
|
0
|
|
|
|
|
|
# look for W3 links only |
|
530
|
|
|
|
|
|
|
next unless (defined $info->{types}->{a} || defined $info->{types}->{parsed}); |
|
531
|
0
|
0
|
|
|
|
|
|
|
532
|
|
|
|
|
|
|
while (my($host, $domain) = each %{$info->{hosts}}) { |
|
533
|
|
|
|
|
|
|
|
|
534
|
0
|
0
|
0
|
|
|
|
# skip if the domain name was matched |
|
535
|
|
|
|
|
|
|
if (exists $rule->{exclusions} && exists $rule->{exclusions}->{$domain}) { |
|
536
|
0
|
|
|
|
|
|
dbg("check: uri_local_bl excludes %s as *.%s\n", $host, $domain); |
|
|
0
|
|
|
|
|
|
|
|
537
|
|
|
|
|
|
|
next; |
|
538
|
|
|
|
|
|
|
} |
|
539
|
0
|
0
|
0
|
|
|
|
|
|
540
|
0
|
|
|
|
|
|
if($host !~ /^$IP_ADDRESS$/) { |
|
541
|
0
|
|
|
|
|
|
if (!$dns_available) { |
|
542
|
|
|
|
|
|
|
dbg("check: uri_local_bl skipping $host, dns not available"); |
|
543
|
|
|
|
|
|
|
next; |
|
544
|
0
|
0
|
|
|
|
|
} |
|
545
|
0
|
0
|
|
|
|
|
# this would be best cached from prior lookups |
|
546
|
0
|
|
|
|
|
|
@addrs = gethostbyname($host); |
|
547
|
0
|
|
|
|
|
|
# convert to string values address list |
|
548
|
|
|
|
|
|
|
@addrs = map { inet_ntoa($_); } @addrs[4..$#addrs]; |
|
549
|
|
|
|
|
|
|
} else { |
|
550
|
0
|
|
|
|
|
|
@addrs = ($host); |
|
551
|
|
|
|
|
|
|
} |
|
552
|
0
|
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
553
|
|
|
|
|
|
|
dbg("check: uri_local_bl %s addrs %s\n", $host, join(', ', @addrs)); |
|
554
|
0
|
|
|
|
|
|
|
|
555
|
|
|
|
|
|
|
for my $ip (@addrs) { |
|
556
|
|
|
|
|
|
|
# skip if the address was matched |
|
557
|
0
|
|
|
|
|
|
if (exists $rule->{exclusions} && exists $rule->{exclusions}->{$ip}) { |
|
558
|
|
|
|
|
|
|
dbg("check: uri_local_bl excludes %s(%s)\n", $host, $ip); |
|
559
|
0
|
|
|
|
|
|
next; |
|
560
|
|
|
|
|
|
|
} |
|
561
|
0
|
0
|
0
|
|
|
|
|
|
562
|
0
|
|
|
|
|
|
if (exists $rule->{countries}) { |
|
563
|
0
|
|
|
|
|
|
dbg("check: uri_local_bl countries %s\n", join(' ', sort keys %{$rule->{countries}})); |
|
564
|
|
|
|
|
|
|
|
|
565
|
|
|
|
|
|
|
if ( $self->{use_geoip2} == 1 ) { |
|
566
|
0
|
0
|
|
|
|
|
my $country; |
|
567
|
0
|
|
|
|
|
|
if (index($self->{geoip}->metadata()->description()->{en}, 'City') != -1) { |
|
|
0
|
|
|
|
|
|
|
|
568
|
|
|
|
|
|
|
$country = $self->{geoip}->city( ip => $ip ); |
|
569
|
0
|
0
|
|
|
|
|
} else { |
|
570
|
0
|
|
|
|
|
|
$country = $self->{geoip}->country( ip => $ip ); |
|
571
|
0
|
0
|
|
|
|
|
} |
|
572
|
0
|
|
|
|
|
|
my $country_rec = $country->country(); |
|
573
|
|
|
|
|
|
|
$cc = $country_rec->iso_code(); |
|
574
|
0
|
|
|
|
|
|
} else { |
|
575
|
|
|
|
|
|
|
$cc = $self->{geoip}->country_code_by_addr($ip); |
|
576
|
0
|
|
|
|
|
|
} |
|
577
|
0
|
|
|
|
|
|
|
|
578
|
|
|
|
|
|
|
dbg("check: uri_local_bl host %s(%s) maps to %s\n", $host, $ip, (defined $cc ? $cc : "(undef)")); |
|
579
|
0
|
|
|
|
|
|
|
|
580
|
|
|
|
|
|
|
# handle there being no associated country (yes, there are holes in |
|
581
|
|
|
|
|
|
|
# the database). |
|
582
|
0
|
0
|
|
|
|
|
next unless defined $cc; |
|
583
|
|
|
|
|
|
|
|
|
584
|
|
|
|
|
|
|
# not in blacklist |
|
585
|
|
|
|
|
|
|
next unless (exists $rule->{countries}->{$cc}); |
|
586
|
0
|
0
|
|
|
|
|
|
|
587
|
|
|
|
|
|
|
dbg("check: uri_block_cc host %s(%s) matched\n", $host, $ip); |
|
588
|
|
|
|
|
|
|
|
|
589
|
0
|
0
|
|
|
|
|
if (would_log('dbg', 'rules') > 1) { |
|
590
|
|
|
|
|
|
|
dbg("check: uri_block_cc criteria for $test met"); |
|
591
|
0
|
|
|
|
|
|
} |
|
592
|
|
|
|
|
|
|
|
|
593
|
0
|
0
|
|
|
|
|
$permsg->test_log("Host: $host in $cc"); |
|
594
|
0
|
|
|
|
|
|
$hit_tests{$test} = 1; |
|
595
|
|
|
|
|
|
|
|
|
596
|
|
|
|
|
|
|
# reset hash |
|
597
|
0
|
|
|
|
|
|
keys %uri_detail; |
|
598
|
0
|
|
|
|
|
|
} |
|
599
|
|
|
|
|
|
|
|
|
600
|
|
|
|
|
|
|
if (exists $rule->{continents}) { |
|
601
|
0
|
|
|
|
|
|
dbg("check: uri_local_bl continents %s\n", join(' ', sort keys %{$rule->{continents}})); |
|
602
|
|
|
|
|
|
|
|
|
603
|
|
|
|
|
|
|
if ( $self->{use_geoip2} == 1 ) { |
|
604
|
0
|
0
|
|
|
|
|
my $country = $self->{geoip}->country( ip => $ip ); |
|
605
|
0
|
|
|
|
|
|
my $cont_rec = $country->continent(); |
|
|
0
|
|
|
|
|
|
|
|
606
|
|
|
|
|
|
|
$cont = $cont_rec->{code}; |
|
607
|
0
|
0
|
|
|
|
|
} else { |
|
608
|
0
|
|
|
|
|
|
$cc = $self->{geoip}->country_code_by_addr($ip); |
|
609
|
0
|
|
|
|
|
|
$cont = $self->{geoip}->continent_code_by_country_code($cc); |
|
610
|
0
|
|
|
|
|
|
} |
|
611
|
|
|
|
|
|
|
|
|
612
|
0
|
|
|
|
|
|
dbg("check: uri_local_bl host %s(%s) maps to %s\n", $host, $ip, (defined $cont ? $cont : "(undef)")); |
|
613
|
0
|
|
|
|
|
|
|
|
614
|
|
|
|
|
|
|
# handle there being no associated continent (yes, there are holes in |
|
615
|
|
|
|
|
|
|
# the database). |
|
616
|
0
|
0
|
|
|
|
|
next unless defined $cont; |
|
617
|
|
|
|
|
|
|
|
|
618
|
|
|
|
|
|
|
# not in blacklist |
|
619
|
|
|
|
|
|
|
next unless (exists $rule->{continents}->{$cont}); |
|
620
|
0
|
0
|
|
|
|
|
|
|
621
|
|
|
|
|
|
|
dbg("check: uri_block_cont host %s(%s) matched\n", $host, $ip); |
|
622
|
|
|
|
|
|
|
|
|
623
|
0
|
0
|
|
|
|
|
if (would_log('dbg', 'rules') > 1) { |
|
624
|
|
|
|
|
|
|
dbg("check: uri_block_cont criteria for $test met"); |
|
625
|
0
|
|
|
|
|
|
} |
|
626
|
|
|
|
|
|
|
|
|
627
|
0
|
0
|
|
|
|
|
$permsg->test_log("Host: $host in $cont"); |
|
628
|
0
|
|
|
|
|
|
$hit_tests{$test} = 1; |
|
629
|
|
|
|
|
|
|
|
|
630
|
|
|
|
|
|
|
# reset hash |
|
631
|
0
|
|
|
|
|
|
keys %uri_detail; |
|
632
|
0
|
|
|
|
|
|
} |
|
633
|
|
|
|
|
|
|
|
|
634
|
|
|
|
|
|
|
if (exists $rule->{isps}) { |
|
635
|
0
|
|
|
|
|
|
dbg("check: uri_local_bl isps %s\n", join(' ', map { '"' . $_ . '"'; } sort keys %{$rule->{isps}})); |
|
636
|
|
|
|
|
|
|
|
|
637
|
|
|
|
|
|
|
if ( $self->{use_geoip2} == 1 ) { |
|
638
|
0
|
0
|
|
|
|
|
$isp = $self->{geoisp}->isp(ip => $ip); |
|
639
|
0
|
|
|
|
|
|
} else { |
|
|
0
|
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
640
|
|
|
|
|
|
|
$isp = $self->{geoisp}->isp_by_name($ip); |
|
641
|
0
|
0
|
|
|
|
|
} |
|
642
|
0
|
|
|
|
|
|
|
|
643
|
|
|
|
|
|
|
dbg("check: uri_local_bl isp %s(%s) maps to %s\n", $host, $ip, (defined $isp ? '"' . $isp . '"' : "(undef)")); |
|
644
|
0
|
|
|
|
|
|
|
|
645
|
|
|
|
|
|
|
# handle there being no associated country |
|
646
|
|
|
|
|
|
|
next unless defined $isp; |
|
647
|
0
|
0
|
|
|
|
|
|
|
648
|
|
|
|
|
|
|
# not in blacklist |
|
649
|
|
|
|
|
|
|
next unless (exists $rule->{isps}->{$isp}); |
|
650
|
0
|
0
|
|
|
|
|
|
|
651
|
|
|
|
|
|
|
dbg("check: uri_block_isp host %s(%s) matched\n", $host, $ip); |
|
652
|
|
|
|
|
|
|
|
|
653
|
0
|
0
|
|
|
|
|
if (would_log('dbg', 'rules') > 1) { |
|
654
|
|
|
|
|
|
|
dbg("check: uri_block_isp criteria for $test met"); |
|
655
|
0
|
|
|
|
|
|
} |
|
656
|
|
|
|
|
|
|
|
|
657
|
0
|
0
|
|
|
|
|
$permsg->test_log("Host: $host in \"$isp\""); |
|
658
|
0
|
|
|
|
|
|
$hit_tests{$test} = 1; |
|
659
|
|
|
|
|
|
|
|
|
660
|
|
|
|
|
|
|
# reset hash |
|
661
|
0
|
|
|
|
|
|
keys %uri_detail; |
|
662
|
0
|
|
|
|
|
|
} |
|
663
|
|
|
|
|
|
|
|
|
664
|
|
|
|
|
|
|
if (exists $rule->{cidr}) { |
|
665
|
0
|
|
|
|
|
|
dbg("check: uri_block_cidr list %s\n", join(' ', $rule->{cidr}->list_range())); |
|
666
|
|
|
|
|
|
|
|
|
667
|
|
|
|
|
|
|
next unless ($rule->{cidr}->find($ip)); |
|
668
|
0
|
0
|
|
|
|
|
|
|
669
|
0
|
|
|
|
|
|
dbg("check: uri_block_cidr host %s(%s) matched\n", $host, $ip); |
|
670
|
|
|
|
|
|
|
|
|
671
|
0
|
0
|
|
|
|
|
if (would_log('dbg', 'rules') > 1) { |
|
672
|
|
|
|
|
|
|
dbg("check: uri_block_cidr criteria for $test met"); |
|
673
|
0
|
|
|
|
|
|
} |
|
674
|
|
|
|
|
|
|
|
|
675
|
0
|
0
|
|
|
|
|
$permsg->test_log("Host: $host as $ip"); |
|
676
|
0
|
|
|
|
|
|
$hit_tests{$test} = 1; |
|
677
|
|
|
|
|
|
|
|
|
678
|
|
|
|
|
|
|
# reset hash |
|
679
|
0
|
|
|
|
|
|
keys %uri_detail; |
|
680
|
0
|
|
|
|
|
|
} |
|
681
|
|
|
|
|
|
|
} |
|
682
|
|
|
|
|
|
|
} |
|
683
|
0
|
|
|
|
|
|
# cycle through all tests hitted by the uri |
|
684
|
|
|
|
|
|
|
while((my $test_ok) = each %hit_tests) { |
|
685
|
|
|
|
|
|
|
$permsg->got_hit($test_ok); |
|
686
|
|
|
|
|
|
|
$got_hit = 1; |
|
687
|
|
|
|
|
|
|
} |
|
688
|
0
|
|
|
|
|
|
if($got_hit == 1) { |
|
689
|
0
|
|
|
|
|
|
return 1; |
|
690
|
0
|
|
|
|
|
|
} else { |
|
691
|
|
|
|
|
|
|
keys %hit_tests; |
|
692
|
0
|
0
|
|
|
|
|
} |
|
693
|
0
|
|
|
|
|
|
} |
|
694
|
|
|
|
|
|
|
|
|
695
|
0
|
|
|
|
|
|
dbg("check: uri_local_bl %s no match\n", $test); |
|
696
|
|
|
|
|
|
|
|
|
697
|
|
|
|
|
|
|
return 0; |
|
698
|
|
|
|
|
|
|
} |
|
699
|
0
|
|
|
|
|
|
|
|
700
|
|
|
|
|
|
|
1; |
|
701
|
0
|
|
|
|
|
|
|