Private
Server IP : 195.201.23.43  /  Your IP : 3.144.46.149
Web Server : Apache
System : Linux webserver2.vercom.be 5.4.0-192-generic #212-Ubuntu SMP Fri Jul 5 09:47:39 UTC 2024 x86_64
User : kdecoratie ( 1041)
PHP Version : 7.1.33-63+ubuntu20.04.1+deb.sury.org+1
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : ON
Directory :  /usr/share/webmin/virtual-server/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /usr/share/webmin/virtual-server/spamtrap.pl
#!/usr/bin/perl
# Blacklist email in spamtrap files, and whitelist mail in hamtraps, for all
# domains with spam emailed.

package virtual_server;
$main::no_acl_check++;
$no_virtualmin_plugins = 1;
require './virtual-server-lib.pl';
&foreign_require("mailboxes");
&foreign_require("spam");

# Find the sa-learn command
$salearn = &has_command($spam::config{'sa_learn'} || "sa-learn");

# Parse command line
while(@ARGV) {
	$a = shift(@ARGV);
	if ($a eq "--debug") {
		$debug = 1;
		}
	elsif ($a eq "--no-delete") {
		$nodelete = 1;
		}
	else {
		$dnames{$a} = 1;
		}
	}

# Build list of local hostnames and IPs
%local_src = ( 'localhost' => 1,
	       'localhost.localdomain' => 1,
	       '127.0.0.1' => 1,
	       '::1' => 1,
	       &get_system_hostname(0, 0) => 1,
	       &get_system_hostname(1, 0) => 1,
	       &get_system_hostname(0, 1) => 1,
	       &get_system_hostname(1, 1) => 1,
	     );
%local_src = ( %local_src, &interface_ip_addresses() );

# For each domain with spam enabled and with the aliases, process the files
foreach $d (&list_domains()) {
	# Skip if this domain wasn't on the list given
	next if (%dnames && !$dnames{$d->{'dom'}});

	# Is this domain suitable
	if (!$d->{'spam'}) {
		print STDERR "$d->{'dom'}: spam filtering is not enabled\n"
			if ($debug);
		next;
		}
	$st = &get_spamtrap_aliases($d);
	if ($st != 1) {
		print STDERR "$d->{'dom'}: missing spamtrap aliases\n"
			if ($debug);
		next;
		}

	if (!$salearn) {
		print STDERR "The sa-learn command was not found ",
			     "on your system\n";
		exit(1);
		}

	# Get users and alias domains for the domain
	@users = &list_domain_users($d, 0, 0, 1, 1);
	@aliasdoms = &get_domain_by("alias", $d->{'id'});

	# Find and read the spam folder and ham folder
	print STDERR "$d->{'dom'}: processing spam file\n" if ($debug);
	$spamf = { 'file' => &spam_alias_file($d),
		   'type' => 0 };
	&clear_index_file($spamf->{'file'});
	@spammails = -r $spamf->{'file'} ? 
		&mailboxes::mailbox_list_mails(undef, undef, $spamf) : ( );
	print STDERR "$d->{'dom'}: ",scalar(@spammails)," messages in ",
		     $spamf->{'file'},"\n" if ($debug);
	foreach $m (@spammails) {
		$m->{'spamtrap'} = 1;
		}
	@mails = @spammails;
	print STDERR "$d->{'dom'}: processing ham file\n" if ($debug);
	$hamf = { 'file' => &ham_alias_file($d),
		  'type' => 0 };
	&clear_index_file($hamf->{'file'});
	@hammails = -r $hamf->{'file'} ?
		&mailboxes::mailbox_list_mails(undef, undef, $hamf) : ( );
	print STDERR "$d->{'dom'}: ",scalar(@hammails)," messages in ",
		     $hamf->{'file'},"\n" if ($debug);
	push(@mails, @hammails);

	foreach $m (@mails) {
		# Find the Virtualmin user for the sender or recipient
		print STDERR "$d->{'dom'}: id=",
			     "$m->{'header'}->{'message-id'}\n" if ($debug);
		$user = undef;
		foreach $h ('from', 'to', 'cc', 'resent-from','delivered-to') {
			@sp = &mailboxes::split_addresses($m->{'header'}->{$h});
			foreach $e (map { $_->[0] } @sp) {
				$user ||= &find_user_by_email(
						$e, \@users, \@aliasdoms);
				last if ($user);
				}
			if ($user) {
				$what = $h eq 'from' ? 'from' : 'to';
				last;
				}
			}
		print STDERR "$d->{'dom'}: user=",
		    ($user ? $user->{'user'} : "")," what=$what\n" if ($debug);
		next if (!$user);

		# Check the Return-Path: header to see if it was sent by
		# a user in this domain. This is only set by Postfix on SMTP
		# authenticated messages.
		my @rp = map { $_->[1] } grep { lc($_->[0]) eq 'return-path' }
					      @{$m->{'headers'}};
		my $returnpath = 0;
		foreach my $rp (@rp) {
			if ($rp =~ /<\S+\@(\S+)>/ &&
			    lc($1) eq lc($d->{'dom'})) {
				print STDERR "$d->{'dom'}: $user->{'user'}: ",
					"Good return path $rp\n" if ($debug);
				$returnpath = 1;
				}
			else {
				print STDERR "$d->{'dom'}: $user->{'user'}: ",
					"Bad return path $rp\n" if ($debug);
				}
			}

		# Check the received headers to see if it was sent locally
		# or via SMTP auth. Walk the headers in order and fail if
		# a non-local header is found. Or if an SMTP auth header is
		# found, succeed.
		my @rh = map { $_->[1] } grep { lc($_->[0]) eq 'received' }
					      @{$m->{'headers'}};
		my $invalid = 0;
		foreach my $rh (@rh) {
			my ($src, $uname) = &parse_received_header($rh);
			if ($local_src{$src}) {
				print STDERR "$d->{'dom'}: $user->{'user'}: ",
					"Local received $rh\n" if ($debug);
				next;
				}
			elsif ($uname) {
				print STDERR "$d->{'dom'}: $user->{'user'}: ",
					"Auth received $rh\n" if ($debug);
				last;
				}
			else {
				print STDERR "$d->{'dom'}: $user->{'user'}: ",
					"Invalid received $rh\n" if ($debug);
				$invalid = 1;
				last;
				}
			}
		next if ($invalid && !$returnpath);

		# For each message, find the attached mail if there is one and
		# if this email was forwarded by a Virtualmin user.
		&mailboxes::parse_mail($m, undef, 1);
		@learnm = ( );
		if ($what eq 'from') {
			foreach $a (@{$m->{'attach'}}) {
				if ($a->{'type'} eq 'message/rfc822') {
					$lm = &mailboxes::extract_mail(
						$a->{'data'});
					push(@learnm, $lm);
					}
				}
			}
		@learnm = ( $m ) if (!@learnm);

		# Feed to sa-learn --spam or --ham, run as the sender
		@senders = ( );
		foreach $lm (@learnm) {
			print STDERR "$d->{'dom'}: $user->{'user'}: subject=",
				   "$lm->{'header'}->{'subject'}\n" if ($debug);
			local $cmd = $m->{'spamtrap'} ? "$salearn --spam"
						      : "$salearn --ham";
			$cmd = &command_as_user($user->{'user'}, 0, $cmd);
			$temp = &transname();
			&mailboxes::send_mail($lm, $temp);
			&set_ownership_permissions(
				$user->{'uid'}, $user->{'gid'}, 0700, $temp);
			$out = &backquote_command("$cmd <$temp 2>&1");
			$ex = $?;
			&unlink_file($temp);
			if ($debug) {
				$out =~ s/\r?\n/ /g;
				print STDERR "$d->{'dom'}: $user->{'user'}: ",
					($ex ? "ERROR" : "OK")," $out","\n";
				}
			push(@senders, map { $_->[0] }
					&mailboxes::split_addresses(
					  $lm->{'header'}->{'from'}));
			}

		# Update black or white list, for senders who are not local
		$cf = $m->{'spamtrap'} ? 'spam_trap_black' : 'ham_trap_white';
		$dir = $m->{'spamtrap'} ? 'blacklist_from' : 'whitelist_from';
		print STDERR "$d->{'dom'}: ${cf}: $config{$cf}\n"
			if ($debug);
		if ($config{$cf}) {
			$spamcfile = "$spam_config_dir/$d->{'id'}/".
				     "virtualmin.cf";
			print STDERR "$d->{'dom'}: config: $spamcfile\n"
				if ($debug);
			$conf = &spam::get_config($config{$cf} == 2 ? undef :
						   $spamcfile);
			@from = map { @{$_->{'words'}} }
				    &spam::find($dir, $conf);
			%already = map { $_, 1 } @from;
			$added = 0;
			foreach $e (&unique(@senders)) {
				$euser = &find_user_by_email(
					$e, \@users, \@aliases);
				print STDERR "$d->{'dom'}: sender: $e\n"
					if ($debug);
				if (!$euser && !$already{$e}) {
					push(@from, $e);
					print STDERR "$d->{'dom'}: Adding $e",
					  " to $dir\n" if ($debug);
					$added++;
					}
				}
			if ($added) {
				if ($config{$cf} == 1) {
					# So adding is to right file
					$spam::add_cf = $spamcfile;
					}
				&spam::save_directives($conf, $dir, \@from, 1);
				}
			}
		}
	&flush_file_lines();

	# Delete both folders
	if (!$nodelete) {
		&mailboxes::mailbox_empty_folder($spamf);
		&mailboxes::mailbox_empty_folder($hamf);
		}
	&clear_index_file($spamf->{'file'});
	&clear_index_file($hamf->{'file'});
	}

# find_user_by_email(email, &users, &aliases)
sub find_user_by_email
{
local ($e, $users, $aliasdoms) = @_;
$e = lc($e);
foreach my $u (@$users) {
	foreach my $ee ($u->{'email'}, @{$u->{'extraemail'}}) {
		if ($ee eq $e) {
			return $u;
			}
		# Check for same email address in alias domain
		local ($mb, $dname) = split(/\@/, $ee);
		foreach my $ad (@aliasdoms) {
			if ($e eq $mb."\@".$ad->{'dom'}) {
				return $u;
				}
			}
		}
	}
return undef;
}

# parse_received_header(string)
# Given a received header string, extract the sending system's IP and SMTP
# authencation username.
sub parse_received_header
{
my ($str) = @_;
my $sender;
my $uname;
if ($str =~ /from\s+\S+\s+\((\S+)\s+\[(\S+)\]\)/i) {
	# from fudu.home (localhost.localdomain [127.0.0.1])
	$sender = $2;
	}
elsif ($str =~ /from\s+\[(\S+)\]/i) {
	# from [98.138.90.52]
	$sender = $1;
	}
elsif ($str =~ /by\s+(\S+)\s+\(Postfix, from userid (\S+)\)/i) {
	# by my.dom.ain (Postfix, from userid 1022)
	$uname = getpwuid($2);
	}
if ($str =~ /Authenticated\s+sender:\s+(\S+)/i) {
	$uname = $1;
	}
return ($sender, $uname);
}

# clear_index_file(mailfile)
# Delete all indexes for a mail file
sub clear_index_file
{
my ($mailfile) = @_;
my $ifile = &mailboxes::user_index_file($mailfile);
foreach my $ext (".dir", ".pag", ".db", ".ids", "") {
	&unlink_file($ifile.$ext);
	}
}
Private