1.7.5.7 (0.0.07) ------ Network Setup ----------------------------------------------- -listenPort (SMTP Listen Port ) The port number on which ASSP will listen for incoming SMTP connections (normally 25). You can specify both an IP address and port number to limit connections to a specific interface. Multiple ports (interface:port) are possible separated by a pipe (|).Examples: 25 123.123.123.1:25|123.123.123.5:25 Default: 25 -smtpDestination (SMTP Destination) The IP address and port number of the MTA you want ASSP to proxy the messages to. If multiple servers are listed and the first listed MTA does not respond, each additional MTA will be tried. If only a port number is entered, or the dynamic keyword INBOUND is used with a port number, then the connection will be established to the local IP address on which the connection was received. This is useful when you have several IP addresses with different domains or profiles in your MTA. If INBOUND:PORT is used you need to set up EmailReportDestination (for Email-Interface, Blockreporting and Notifies) and sendAllDestination (Copy Spam )Examples:125123.123.123.1:125 123.123.123.1:125|123.123.123.5:125 Default: 125 -EmailReportDestination (ASSP Internal Mail Destination) Port to connect to when ASSP sends replies to email-interface mails, notifications and block reports. Must be set when smtpDestination contains INBOUND. For example "10.0.1.3:1025", etc. -listenPort2 (Second SMTP Listen Port) A secondary port number on which ASSP can accept SMTP connections. This is useful as a dedicated port for VPN clients or for those who cannot directly send mail to a mail server outside of their ISP's network because the ISP is blocking port 25. You may also specify an IP address to limit connections to a specific interface. Multiple ports (interface:port) are possible separated by a pipe (|).Examples: 587465|587192.168.0.100:587192.168.0.100:587|192.168.0.101:587 -smtpAuthServer (Second SMTP Destination) The IP address! and port number to connect to when mail is received on the second SMTP listen port. If the field is blank, the primary SMTP destination will be used. The purpose of this setting is to allow remote users to make authenticated connections and transmit their email without encountering SPF failures.Examples:127.0.0.1:687, [::1]:687 -EnforceAuth (Force SMTP AUTH on Second SMTP Listen Port) Force clients connecting to the second listen port to authenticate before transferring mail. To use this setting, both listenPort2 (Second SMTP Listen Port) and smtpAuthServer (Second SMTP Destination) must be configured. -DisableAuth (Disable SMTP AUTH for External Clients) If you have enabled SMTP AUTH on your MTA and you do not want external clients to use SMTP AUTH - select this option. -ConnectionLog (Connections Logging) -enableINET6 (Enable IPv6 support) For IPv6 to be enabled, check this box. NOTE: Changing this requires a restart of ASSP. -smtpDestinationRT (SMTP Destination Routing Table ) If INBOUND is used in the SMTP Destination field, the rules specified here are used to route the inbound IP address to a different outbound IP address. You must specify a port number with the outbound IP address. This feature works by assigning as many IP numbers to ASSP as you have different receiving Mailservers. This can be avoided by using the advanced flow we recommend: Example:141.120.110.1=>141.120.110.129:25|141.120.110.2=>141.120.110.130:125|141.120.110.3=>141.120.110.130:125 requires ASSP restart Notes On Network Setup ------ SMTP Session Limits ----------------------------------------------- -MaxErrors (Maximum Errors Per Session) The maximum number of SMTP session errors encountered before the connection is dropped. Scoring is done with meValencePB. Default: 5 -maxSMTPSessions (Maximum Sessions) The maximum number of simultaneous SMTP sessions. This can prevent server overloading and DoS attacks. 64 simultaneous sessions are typically enough. No entry or zero means no limit. Default: 64 -noMaxSMTPSessions (No Maximum Sessions IP numbers*) Mail from any of these IP numbers will pass through without checking maximum number of simultaneous SMTP sessions. For example: 145.145.145.145 -maxSMTPipSessions (Maximum Sessions Per IP Number) The maximum number of SMTP sessions allowed per IP number. Use this setting to prevent server overloading and DoS attacks. 5 sessions are typically enough. If left blank or set to 0 there is no limit imposed by ASSP. ispip (ISP/Secondary MX Servers) and acceptAllMail (Accept All Mail) matches are excluded from SMTP session limiting. Scoring is done with iplValencePB. Default: 5 -maxSMTPipSessionsISPIP (ispip is included in Maximum Sessions Per IP Check) ispip (ISP/Secondary MX Servers) matches are not excluded from SMTP session limiting -SessionLog (Session Limit Logging) Default: standard -HeaderMaxLength (Maximum Header Size) The maximum allowed header length, in bytes. At each mail hop header information is added by the mail server. A large mail header can indicate a mail loop. If the value is blank or 0 the header size will not be checked. Default: 100000 -MaxEqualXHeader (Maximum Equal Header Lines) The maximum allowed equal X-header lines - eg. "X-SubscriberID:". "Content-Transfer-Encoding" is also checked. the value is set to 0 the header will not be checked for equal X-header lines. Default: 10 -detectMailLoop (Detect Possible Mailloop) If set to a value higher than 0, ASSP count its own Received-header in the header of the mail. If this count exceeds the defined value, the transmission of the message will be canceled. Default: 3 -maxSize (Max Size of Local Message) If the value of ([message size]) exceeds maxSize in bytes the transmission of the local message will be canceled. No limit is imposed by ASSP if the field is left blank or set to 0. This option allows admins to limit useless bandwidth wasting based on the transmit size. -maxSizeExternal (Max Size of External Message) If the value of ([message size]) exceeds maxSizeExternal in bytes the transmission of the external message will be canceled. No limit is imposed by ASSP if the field is left blank or set to 0. This option allows admins to limit useless bandwidth wasting based on the transmit size. -maxSizeError (Max Message Size Error) SMTP error message to reject maxSize / maxSizeExternal exceeding mails. For example:552 message exceeds MAXSIZE byte (size)! MAXSIZE will be replaced by the value of maxSize / maxSizeExternal. Default: 552 message exceeds MAXSIZE byte (size) -maxRealSize (Max Real Size of Local Message) If the value of (number of [rcpt to] * [message size]) exceeds maxRealSize in bytes the transmission of the local message will be canceled. No limit is imposed by ASSP if the field is left blank or set to 0. This option allows admins to limit useless bandwidth wasting based on the total transmit size. -maxRealSizeExternal (Max Real Size of External Message) If the value of (number of [rcpt to] * [message size]) exceeds maxRealSizeExternal in bytes the transmission of the external message will be canceled. No limit is imposed by ASSP if the field is left blank or set to 0. This option allows admins to limit useless bandwidth wasting based on the total transmit size. -maxRealSizeError (Max Real Size Error Message) SMTP error message to reject maxRealSize exceeding mails. For example:552 message exceeds MAXREALSIZE byte (size * rcpt)! MAXREALSIZE will be replaced by the value of maxRealSize. Default: 552 message exceeds MAXREALSIZE byte (size * rcpt) -smtpIdleTimeout (SMTP Idle Timeout) The number of seconds a session is allowed to be idle before being forcibly disconnected. The default is 300 seconds. No limit is imposed by ASSP if the field is left blank or set to 0. If you have not defined an IdleTimeout on your MTA, this value should not be set to 0, because then a connection will never be timed out! Scoring is done with toValencePB. Default: 300 -CheckEarlyTalker (Check for Misbehaving SMTP session) -smtpNOOPIdleTimeout (SMTP Idle Timeout after NOOP) The number of seconds a session is allowed to be idle after a "NOOP" command is received, before being forcibly disconnected. The default is 0 seconds. No limit is imposed by ASSP if the field is left blank or set to 0. This should prevent hackers to hold and block connections by sending "NOOP" commands short before the "smtpIdleTimeout" is reached. -smtpNOOPIdleTimeoutCount (SMTP Idle Timeout after NOOP Count) The number of counts a session is allowed send "NOOP" commands following on each other, before being forcibly disconnected. The default is 0. No limit is imposed by ASSP if the field is left blank or set to 0. This in cooperation with "smtpNOOPIdleTimeout" should prevent hackers to hold and block connections by sending repeatedly "NOOP" commands short before the "smtpNOOPIdleTimeout" is reached. If "smtpNOOPIdleTimeout" is not defined or 0, this value will be ignored!Notes On SMTP Session Limits ------ TestMode/Spam Control ----------------------------------------------- -blockTestModeExtreme (Block when Scoring is in Extreme range) If set, TestMode will be ignored when the total score from DoPenaltyMessage surpasses MessageScoringExtremeLimit or the total score from DoPenalty surpasses PenaltyExtreme. -allTestMode (All TestModes ON ) Set all filters to TestMode -attachTestMode (Bad Attachment TestMode) -> DoBlockExes -baysTestMode (Bayesian TestMode) -> DoBayesian Default: On -blTestMode (BlackDomain TestMode) -> DoBlackDomain -bombheaderTestMode (Bomb Header Regex TestMode) -> DoBombHeaderRe -bombTestMode (Bomb Regex TestMode) -> DoBombRe -blackTestMode (Black Regex TestMode) -> DoBlackRe -fhTestMode (Forged Helo TestMode) -> DoFakedLocalHelo -fromTestMode (No From TestMode) -> DoNoFrom -flsTestMode (No Spoofing TestMode) -> DoNoValidLocalSender, DoNoSpoofing -hlTestMode (Helo Blacklist TestMode) -> useHeloBlacklist -ihTestMode (Invalid Helo TestMode) -> DoInvalidFormatHelo -msTestMode (Message Scoring TestMode) -> DoPenaltyMessage -mxaTestMode (Missing MX Record TestMode) -> DoMXACheck -pbTestMode (Penalty Box TestMode) -> DoPenalty, DoPenaltyExtreme -ptrTestMode (Reversed Lookup TestMode) -> DoReversed -rblTestMode (DNSBL TestMode) -> ValidateRBL -scriptTestMode (Script Regex TestMode) -> DoScriptRe -sbTestMode (SenderBase TestMode) -> DoSenderBase DoCountryBlocking DoOrgBlocking -sigTestMode (Message-ID Signing TestMode) -> DoMSGIDsig -spfTestMode (SPF TestMode) -> ValidateSPF -srsTestMode (SRS TestMode) -> EnableSRS -uriblTestMode (URIBL TestMode) -> ValidateURIBL -spamSubject (Prepend Spam Subject ) Setting a filter to testmode will tell ASSP not to reject the mail but rather build up the whitelist and spam and notspam collections. This can go on for some time without disturbing normal operation. After this very important phase TestMode can be used to tag the message: if TestMode and the message is spam Spam Subject gets prepended to the subject of the email. For example: [SPAM] -spamTag (Prepend Spam Tag) ASSP uses many methods. The method which caught the spam will be prepended to the subject of the email. For example: [DNSBL]Notes On Testmode -SpamError (Spam Error) SMTP error message to reject spam. The literal LOCALDOMAIN will be replaced by the recipient domain or defaultLocalHost. SESSIONID will be replaced by the unique ASSP identifier. REASON will be replaced by the actual reason. Default: 554 5.7.1 Mail (SESSIONID) appears to be unsolicited - REASON - contact postmaster@LOCALDOMAIN for resolution -redRe (Regular Expression to Identify Redlisted Mail*) If an email matches this Perl regular expression it will be considered redlisted. The Redlist serves two purposes: 1) the Redlist is a list of addresses that cannot contribute to the whitelist and which are not considered local even if their mail is from a local computer. For example, if someone goes on a vacation and turns on their autoresponder, put them on the redlist until they return. Then as they reply to every spam they receive they won't corrupt your non-spam collection or whitelist: \[autoreply\] 2) Redlisted addresses will not be added to the Whitelist. 3) Redlisted messages will not be stored in the SPAM/NOTSPAM-collection if DoNotCollectRedList and/or DoNotCollectRedRe is set. As all fields marked by * this field accepts a list separated by | or a plain ASCII file one address per line: 'file:files/redre.txt'. Default: file:files/redre.txt -send250OK (Send 250 OK ) Set this checkbox if you want ASSP to reply with '250 OK' instead of SMTP error code '554 5.7.1'. -AddSpamHeader (Add Spam Header) Adds a line to the email header "X-Assp-Spam: YES" if the message is spam. Default: On -AddCustomHeader (Add Custom Header) Adds a line to the email header if the message is spam. For example: Default: X-Spam-Status:yes -AddLevelHeader (Add Graphical Level Header) Adds a line to the email header "X-Assp-Spam-Level:**** " showing the totalscore represented by stars. -AddSubjectHeader (Add X-ASSP-Original-Subject Header) Adds a line to the email header "X-ASSP-Original-Subject: the subject". Default: On -AddIPHeader (Add IP Match Header) Add X-Assp- header for all IP matches. Default: On -AddRegexHeader (Add RegEx Match Header) Default: On -AddSpamReasonHeader (Add Spam Reason Header) Adds a line to the email header "X-Assp-Spam-Reason: " explaining why the message is spam.Notes On Spam Control Default: On ------ SPAM Lover/Hater ----------------------------------------------- -spamSubjectSL (Suppress SpamSubject to SpamLover-Messages) If set spamSubject does NOT get prepended to the subject of any SpamLover-Message. -spamLoverSubjectSelected (Suppress SpamSubject For Selected Recipients*) spamSubject does NOT get prepended to the subject for these recipients. To enable the selection you need to uncheck spamSubjectSL. Default: ALL -SpamLoverTag (SpamLover Tag) Default: [sl] -spamTagSL (Suppress spamTags to SpamLover-Messages) If set, spamTags does NOT get prepended to the subject of the SpamLover-Message. Default: On -baysSpamLovers (Bayesian SpamLover*) -spamLovers (All SpamLover*) spamLovers are lists of criteria that when matched will allow a SMTP session through ASSP's filter process, regardless of what blocking functions match and would otherwise cause the message to be rejected. However, there is an exception to this when there are multiple recipients that do not all match the criteria of the spam Lovers match. In this exception the message will be processed normally and will be subjected to all blocking criteria. This can be specified per filter or for all messages. Messages to SpamLovers are processed and filtered by ASSP, but get tagged with spamSubject and are not blocked ( spamSubjectSL will suppress this. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). Wildcards are supported (fribo*@example.com). Default: abuse -SpamLoversRe (Regular Expression to Identify SpamLover*) If a message matches this regular expression it will be considered a SpamLover message. -blockSpamLoversExtreme (Block SpamLovers when Scoring is Extreme ) If set, spamlovers will be blocked when the total score from DoPenaltyMessage surpasses MessageScoringExtremeLimit or the total score from DoPenalty surpasses PenaltyExtreme. -strictSpamLovers (Strict SpamLover*) Ignore MessageScoringExtremeLimit for these recipients -baysSpamLovers (Bayesian SpamLover*) -baysSpamLoversRe (Regular Expression to Identify Bayesian SpamLover*) If a message matches this regular expression it will be considered a Bayesian SpamLover message. For example: passwor|news -baysSpamLoversRed (Do not store Bayesian SpamLover in SpamDB) If set, prevents mail to Bayesian SpamLover from being stored in Spam/Notspam folder. -blSpamLovers (SpamLover Blacklisted Domains Check*) -blackSpamLovers (SpamLover Black Regex Check*) -bombSpamLovers (SpamLover Bomb Check*) -hlSpamLovers (SpamLover Blacklisted HELO Check*) -hiSpamLovers (SpamLover Valid/Invalid Helo Check*) -atSpamLovers (SpamLover Bad Attachment & Virusscan Check*) -spfSpamLovers (SpamLover SPF Check*) -rblSpamLovers (SpamLover DNSBL Check*) -uriblSpamLovers (SpamLover URIBL Check*) -srsSpamLovers (SpamLover SRS Signed Bounces Check*) -delaySpamLovers (SpamLover Greylisting/Delaying*) These Recipients will not be delayed/greylisted. -isSpamLovers (SpamLover Invalid Sender Check*) -mxaSpamLovers (SpamLover Missing MX Check*) -ptrSpamLovers (SpamLover Invalid/Missing PTR Check*) -pbSpamLovers (SpamLover PenaltyBox Check*) -sbSpamLovers (SpamLover Country Check*) -spamHaters (All SpamHaters*) SpamHaters are used to override SpamLovers / Testmodes / Tagmodes. If a recipient is set as as SpamHater, all spam-messages are blocked, no tagging only will work. Example: If you have set your entire domain as a SpamLover(s), but there are still some addresses you still wish to block spam for. The message will only be blocked if all recipients are SpamHaters. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). Wildcards are supported (fribo*@example.com).For example: *fribo@example.com|jhanna|@example.org -baysSpamHaters (Bayesian SpamHater*) -rblSpamHaters (DNSBL Failures SpamHater*) -hlSpamHaters (HELO Blacklisted SpamHater*) -pbSpamHaters (PenaltyBox Blocking SpamHater*) Notes On SpamLover ------ NoProcessing ----------------------------------------------- -npSizeIncoming (Incoming Messages NoProcessing Size) This limit ensures that only incoming messages smaller than this limit are processed by ASSP. Most spam isn't bigger than a few k. ASSP will treat incoming messages larger than this SIZE (in bytes) as 'NoProcessing' mail. Empty or 0 disables the feature. Default: 256000 -noProcessingIPs (NoProcessing IPs*) Mail from any of these IP numbers will pass through without processing. For example: 145.145.145.145|146.145. All fields marked by '*' accept a filepath/filename : 'file:files/ipnp.txt'. Default: file:files/ipnp.txt -noProcessing (NoProcessing Addresses*) Mail solely to or from any of these addresses are proxied without processing. Like a more efficient version of SpamLovers and redlist combined. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). Wildcards are supported (fribo*@example.com). -noProcessingFrom (NoProcessing Addresses From*) Mail solely from any of these addresses are proxied without processing. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). Wildcards are supported (fribo*@example.com). -noProcessingDomains (NoProcessing Domains*) Domains from which you want to receive all mail and proxy without processing. Your ISP, domain registration, mail list servers, stock broker, or other key business partners might be good candidates. Note this matches the end of the address, so if you don't want to match subdomains then include the @. Note that buy.com would also match spambuy.com but .buy.com won't match buy.com. For example: sourceforge.net|@google.com|.buy.com Default: sourceforge.net -noNoProcessing (Do not mark these Addresses as Noprocessing*) Enter senders email addresses that you want to be processed, even if they are in noprocessing lists. You can list specific addresses (user@anydomain.com), addresses at any domain (user), or entire domains (@anydomain.com). Wildcards are supported (fribo*@domain.com).For example: fribo@anydomain.com|jhanna|@sillyguys.org or place them in a plain ASCII file one address per line: 'file:files/nodelayuser.txt'. -npRe (Regular Expression to Identify NoProcessing External Mails*) If a message matches this Perl regular expression ASSP will treat the message as a 'NoProcessing' mail. For example: aspecialpassingkey -processOnlyAddresses (Process Only These Addresses*) Mail solely to or from any of these addresses will be processed by ASSP. All others will be proxied without processing. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). Wildcards are supported (fribo*@example.com). Note that if an address matches both the NoProcessing and the OnlyTheseProcessing lists, the NoProcessing rules take precedence. -poTestMode (Enable Process Only Addresses) Notes On NoProcessing ------ Whitelisting/RWL ----------------------------------------------- -whiteListedIPs (Whitelisted IPs*) They contribute to the Whitelist and to Notspam. For example: 145.145.145.145|146.145. All fields marked by '*' accept a filepath/filename : 'file:files/ipwl.txt'. -whiteRe (Regular Expression to Identify Non-Spam** ) If an incoming email matches this Perl regular expression it will be considered non-spam.For example: Secret Ham Password|307\D{0,3}730\D{0,3}4[12]\d\d -whiteReMaxHits (Maximum Hits in whiteRe) Number of matches to be max scored. If the total sum of matches is >= whiteValencePB the message will be considered 'whitelisted'. Default: 1 -whiteListedDomains (Whitelisted Domains and Addresses*) Domains and addresses from which you want to receive all mail. Your ISP, domain registration, mail list servers, stock broker, or other key business partners might be good candidates. Be careful not to put widely used domains here like google.com or hotmail.com. Our recommended approach is to put whitelisted domains into whiteSenderBase. Note this matches the end of the address, so if you don't want to match subdomains then include the @. Note that example.com would also match spamexample.com but .example.com won't match example.com. Wildcards are supported. For example: sourceforge.net|group*@google.com|.example.com. *You may place them in a plain ASCII file one address per line:'file:files/whitedomains.txt' Default: sourceforge.net -whiteListedDomainsPassSPF (Use SPF to validate whiteListedDomains) Check this if you don't want ASSP to use whiteListedDomains without a corresponding SPF record. -wildcardUser (Wildcard User to Whitelist a Domain ) If you add this user (eg: *@example.com) via email-interface ( EmailWhitelistAdd ), the whole domain will be whitelisted. Default: * -WhitelistOnly (Reject All But Whitelisted Mail) Check this if you don't want Bayesian filtering and want to reject all mail from anyone not whitelisted. -NoAutoWhite (Only Email-Interface Addition to Whitelist.) Check this box to allow additions to the whitelist by EmailWhitelistAdd only. -NotGreedyWhitelist (Only the envelope-sender is added/compared to the whitelist) Normal operation includes addresses in the FROM, SENDER, REPLY-TO, ERRORS-TO, or LIST-* header fields.This allows nearly all list email to be whitelisted. Check this option to disable this. Will not apply if you add/remove whitelist entries via email-interface. -WhitelistLocalOnly (Only local or authenticated users contribute to the whitelist.) Normal operation allows all local, authenticated, or whitelisted users to contribute to the whitelist.Check this box to not allow whitelisted users to add to the whitelist. -WhitelistLocalFromOnly (Only users with a local domain in mailfrom contribute to the whitelist.) Check this box to prevent sender with non-local domains ( not in localDomains) from contributing to the whitelist. (for example: redirected messages). Default: On -WhitelistAuth (Whitelist authenticated users.) -UpdateWhitelist (Save Whitelist) Save a copy of the white list every this many seconds. Empty or Zero will prevent any saving.Note: the current timeout must expire before the new setting is loaded, or you can restart.Notes On Whitelist Default: 3600 -MaxWhitelistDays (Max Whitelist Days) This is the number of days an address will be kept on the whitelist without any email to/from this address. Default: 999 -DoOKCaching (Enable OKAddress Cache) OKAddress: If a message is marked 'Message OK' the sender addresses are called 'OK Addresses'. These are addresses which are not whitelisted but the sender did not send spam and did send notspam several times . Whitelisting and/or Exporting is done according to OKminhits and OKtoWhitelistAge. Scoring is done with okaValencePB. Default: export -NoOKCachingRe (Regular Expression to Identify NoCaching Addresses*) If an address matches this Perl regular expression ASSP will not cache them in OKAddress Cache. For example: reply|bounce|www|daemon|master|\.info|\.biz|^prvs Default: reply|bounce|www|daemon|master|\\.info|\\.biz|^prvs -OKCacheExp (OK Cache Refresh Interval) OK Adresses in cache will be removed after this interval in days. 0 will disable the cache. Default: 90 -OKminhits (Minimum Hits in OK Cache) If a message is marked 'Message OK' the sender addresses are stored in the OK cache. The address will be exported / added to the whitelist if the number of hits in the cache reaches OKminhits. Default: 3 -OKexportFile (Exported OK Adresses ) OK adresses in cache reaching OKminhits will be regularly stored into this file. Default: file:files/okexport.txt -OKtoWhitelistAge (OK Cache Age for Exporting/Whitelisting) OK Adresses in cache can be exported and/or whitelisted after reaching this age in hours. 0 will allow export regardless of age. OK Adresses are removed from cache by Spam coming from them. Default: 48 -ValidateRWL (Enable Realtime Whitelist Validation) RWL: Real-time white list. These are lists of IP addresses that have somehow been verified to be from a known good host. Senders that pass RWL validation will pass IP-based filters. Scoring is done with rwlValencePB for 'pass' and rwlnValencePB for 'neutral' results. -RWLtoWhitelist (Add MailFrom to Whitelist) If ValidateRWL is set to 'whiting' and the trustworthiness is medium/high , the MailFrom address will be added to the whitelistdb. Trustworthiness : (127.0.x.T): 0 = none 1 = low 2 = medium 3 = high Default: On -RWLServiceProvider (RWL Service Providers*) Hostnames of RWLs to use separated by "|".Examples are: list.dnswl.org|query.bondedsender.org Default: list.dnswl.org|query.bondedsender.org -RWLmaxreplies (Maximum Replies) A reply is affirmative or negative reply from a RWL. The RWL module will wait for this number of replies (negative or positive) from the RWLs listed under Service Provider for up to the Maximum Time below. This number should be equal to or less than the number of RWL Service Providers listed to allow for randomly unavailable RWLs. Default: 1 -RWLminhits (Minimum Hits) A hit is an affirmative response from a RWL. The RWL module will check all of the RWLs listed under Service Provider, and flag the email with a RWL 'pass' flag if equal to or more than this number of RWLs return a postive whitelisted response. If the number is less but not zero the email is marked 'neutral' Default: 1 -RWLmaxtime (Maximum Time) This sets the maximum time to spend on each message performing RWL checks Default: 5 -noRWL (Dont Validate RWL for these IPs*) Enter IP addresses that you don't want to be RWL validated, separated by pipes (|). For example: 145.145.145.145|146.145. -AddRWLHeader (Add X-Assp-Received-RWL Header) Add X-Assp-Received-RWL header to header of all emails processed by RWL. Default: On -RWLCacheExp (RWL Cache Expiration Time) IPs in cache will be removed after this interval in hours. 0 will disable the cache. Default: 72 -RWLLog (Enable RWL logging) Notes On RWL Default: standard ------ Relaying ----------------------------------------------- -acceptAllMail (Accept All Mail*) Relaying is allowed for these IPs. They contribute also to the whitelist. This can take either a directly entered list of IP numbers separated by pipes or place them in a plain ASCII file one address per line: 'file:files/acceptall.txt'.An IP range is defined e.g. '182.82.10.'. CIDR notation is accepted (182.82.10.0/24). Hyphenated ranges can be used (182.82.10.0-182.82.10.255) -relayHostFile (Relay Host File ) Similar to acceptAllMail, but this is a file with an ABSOLUTE path, not relative to base. No IP-blocks supported. For example: /usr/local/assp/relayhosts -localDomains (Local Domains*) Check local domains against these addresses. Separate addresses with | or place them in a plain ASCII file one address per line: 'file:files/localdomains.txt'. Wildcards are supported. For example: example.org|*example.com You can use the syntax: mydomain.com=>smtp.mydomain.com|other.com=>mx.other.com:port to verify the recipient addresses with the SMTP-VRFY (if VRFY is not supported 'MAIL FROM:' and 'RCPT TO:' will be used) command on other SMTP servers. The entry behind => must be the hostname:port or ip-address:port of the MTA which is used to verify 'RCPT TO' addresses with a VRFY command! If :port is not defined, port :25 will be used. You have to enable the SMTP 'VRFY' command on your MTA - the 'EXPN' command should be enabled! This requires an installed module in PERL. If you have configured LDAP and enabled DoLDAP and ASSP finds a VRFY entry for a domain, LDAP search will be done first and if this fails, the VRFY will be used. It is recommended to configure ldaplistdb in the 'File Paths and Database' section when using this verify extension - so ASSP can store all verified recipient addresses to minimize the querys on MTA's. There is no need to configure LDAP, but both VRFY and LDAP are using ldaplistdb. Default: file:files/localdomains.txt -localDomainsFile (Local Domains File) Similar to localDomains, but with absolute path to the file. Wildcards are not supported. For access to MTA generated files. -DoLocalIMailDomains (Local IMail domains) Consider domains in the IMail registry to be local -nolocalDomains (Skip Local Domain Check) Do not check relaying for invalid domains - let the MTA do it. This can be set to prevent "Relaying not allowed" errors during setup and testing. Attention: Checking this will make ASSP an open relay. -ldLDAP (Do LDAP lookup for local domains) Check local domains against an LDAP database.Note: Checking this requires filling in LDAP DomainFilter ( ldLDAPFilter ).This requires an installed module in Perl. -ldLDAPFilter (LDAP Filter for Local Domains) This filter is used to query the LDAP database. This strongly depends on the LDAP structure.The filter must return an entry if the domain must be relayed.The literal DOMAIN (case sensitive) will be replaced by the domain name during the search. -ispip (ISP/Secondary MX Servers*) Enter any addresses that are your ISP or backup MX servers, separated by pipes (|). These addresses will (necessarily) bypass Griplist, IP Limiting, Delaying, PenaltyBox, SPF, DNSBL and SRS checks unless the IP can be determined by ispHostnames (ISP Connecting IP). For example: 145.145.145.145|145.145.145.146. -contentOnlyRe (Regular Expression to Identify Forwarded Messages*) Put anything here to identify messages which should bypass all IP based filter like PB, Sender Validation, Griplist, IP Limiting, Delaying, SPF, DNSBL and SRS. For example: email addresses of people who are forwarding from other accounts to their mailbox on your server. -ispHostnames (Regular Expression to Identify Originating IP*) If ASSP runs behind another server(s), no IP/HELO based filter will work. If you put here the receiving Host(s) of the frontend server(s) ASSP will use the originating IP to perform IP and HELO checks.For example: mx1.yourisp.com or mx1.yourisp.net|mx2.yoursecondary.com. This hostnames are found in the 'Received:' header, like 'Received: from ...123.123.123.123... by mx1.yourisp.com'. -OriginatingIP (Text to Identify Originating IP Header*) If ASSP runs behind another server(s), no IP/HELO based filter will work. If a special header with the originating IP is inserted from the frontend serber ASSP will use the originating IP to perform IP and HELO checks.For example: X-Forwarded-For|X-Originating-IP Default: X-Forwarded-For|X-Originating-IP -reply250OKtoISP (Send 250 OK To ISP/Secondary MX Servers) Set this checkbox if you want ASSP to reply to IP numbers in ispip with '250 OK' instead of SMTP error code '554 5.7.1'. -ispgripvalue (ISP/Secondary MX Grip Value) It is recommended to set it to 0.5 (Completely GReyIP) for ISP and Secondary MX servers. If left blank the Griplist X value is used (percentage of spam messages in relation to total). Note: value should be greater than 0 and less than 1, where 0 = never spam and 1 = always spam Default: 0.5 -BounceSenders (Bounce Senders*) Envelope sender addresses treated as bounce origins. Null sender (\) is always included. Accepts specific addresses (postmaster@example.com), usernames (mailer-daemon), or entire domains (@bounces.domain.com)Separate entries with pipes: |. For example: postmaster|mailer-daemon Default: postmaster|mailer-daemon -PopB4SMTPFile (Pop Before SMTP DB File) Enter the DB database filename of your POP before SMTP implementation with records stored for dotted-quad IP addresses.For example: /etc/mail/popip.db -PopB4SMTPMerak (Pop Before SMTP Merak Style) If set Merak 7.5.2 is supported. -relayHost (Relay Host) Your isp's mail relayhost (smarthost). For example: mail.isp.com:25if you run Exchange/Notes and you want assp to update the nonspam database and the whitelist, then enter your isp's smtp relay host here. Blank means no relayhost. -relayAuthUser (User to Authenticate to Relay Host) The username used for SMTP AUTH authentication to the relayhost - for example, if your ISP need authentication on the SMTP port! Supported authentication methodes are PLAIN, LOGIN, CRAM-MD5 and DIGEST-MD5 . If the relayhost offers multiple methodes, the one with highest security option will be used. The Perl module must be installed to use this feature! The usage of this feature will be skipped, if the sending MTA uses the AUTH command. Leave this blank, if you do not want use this feature. -relayAuthPass (Password to Authenticate to Relay Host) The password used for SMTP AUTH authentication to the relayhost ! Leave this blank, if you do not want use this feature. -relayPort (Relay Port) Tell your mail server to connect to this port as its smarthost/relayhost. For example: 225 Note that you'll want to keep the relayPort protected from external access by your firewall.You can supply an interface:port to limit connections. -allowRelayCon (Allow Relay Connection from these IPs*) Enter any addresses that are allowed to use the relayPort , separated by pipes (|). If empty, any ip address is allowed to connect to the relayPort. If this option is defined, keep in mind : Addresses defined in acceptAllMail are NOT automaticly included and have to be also defined here, if they should be allowed to use the relayPort. For example: 127.0.0.1|172.16.. -RelayLog (Enable Relay logging) Default: standard -NoRelaying (Relaying Error ) SMTP error message to deny relaying. Default: 530 Relaying not allowed -NoRelayingStrict (Drop Connection if Relaying Error) Set this checkbox if you want ASSP to drop the connection immediately after an Relaying Error is encountered. -defaultLocalHost (Default Local Domain) If you want to be able to send mail to local users without a domain name then put the default local domain here. Blank disables this feature. For example: example.comNotes On Relaying Default: assp.local ------ Control Outgoing ----------------------------------------------- -NoExternalSpamProb (No Outgoing Spam-Prob header) Check this box if you don't want your X-Assp-Spam-Prob header on outgoing mail Note this means mail from local users to local users will also be missing the header. Default: On -npLocalRe (Regular Expression to Identify NoProcessing Local Mails*) If a external message matches this Perl regular expression ASSP will treat the message as a 'NoProcessing' mail. For example: autoreply -LocalFrequencyInt (Local Frequency Interval) The time interval in seconds in which the number of envelope recipients per sending address has not to exceed a specific number ( LocalFrequencyNumRcpt ). Use this in combination with LocalFrequencyNumRcpt to limit the number of recipients in a given interval, to prevent local abuse - for example from highjacked local accounts. A value of 0 (default) will disable this feature and clean the cache within five minutes. It is recommended to enable DoLocalSenderAddress and/or DoLocalSenderDomain, if you want to use this feature. To give users the chance to inform an admin about such blocked mails, local mails to EmailAdmins are never blocked because of that feature. -LocalFrequencyNumRcpt (Local Frequency Recipient Number) The number of envelope recipients per sending address that has not to exceed in a specific time interval ( LocalFrequencyInt ). Use this in combination with LocalFrequencyInt to limit the number of recipients in a given interval, to prevent local abuse - for example from highjacked local accounts. A value of 0 (default) will disable this feature and clean the cache within five minutes. It is recommended to enable DoLocalSenderAddress and/or DoLocalSenderDomain, if you want to use this feature. To give users the chance to inform an admin about such blocked mails, local mails to EmailAdmins are never blocked because of that feature. -LocalFrequencyOnly (Check local Frequency for this Users only*) A list of local addresses, for which the 'local frequency check' should be done. Leave this field blank (default), to do the check for every address. Accepts specific addresses (user@domain.com), user parts (user) or entire domains (@domain.com). Wildcards are supported (fribo*@domain.com). For example: fribo*@thisdomain.com|jhanna|@sillyguys.org -NoLocalFrequency (Check local Frequency NOT for this Users*) A list of local addresses, for which the 'local frequency check' should not be done. Noprocessing messages will skip this check. Accepts specific addresses (user@domain.com), user parts (user) or entire domains (@domain.com). Wildcards are supported (fribo*@domain.com). For example: fribo*@thisdomain.com|jhanna|@sillyguys.org -DoLocalSenderDomain (Do Local Domain Check for Local Sender) If activated, each local sender address must have a valid Local Domain - needs localDomains or localDomainsFile or ldLDAP or DoLocalIMailDomains. -DoLocalSenderAddress (Do Local Address Check for Local Sender) If activated, each local sender must have a valid Local Address - needs DoVRFY or DoLDAP or LocalAddresses_Flat. -LocalSender2NULL (Move Local Connection with wrong Sender Address to NULL) If set, ASSP will move all Local connections where the sender failed DoLocalSenderDomain or DoLocalSenderAddress to a NULL-connection. The sender will receive "250 OK".Notes On Control Outgoing ------ Validate Recipients ----------------------------------------------- -ValidateUserLog (Enable User Validation logging) Default: standard -LocalAddresses_Flat (Lookup Local Addresses from Here*) This is an optional list of local addresses for all MTAs behind ASSP. If it is empty ASSP will look for other methods of verification (DoLDAP, DoVRFY). All verifications need a localDomains list to work properly. If no ASSP-verification is used, the MTA behind ASSP will do it. You can list specific addresses (user@example.com), addresses at any local domain (user), or entire domains (@example.com). Wildcards are supported (fribo*@example.com). Separate entries with a pipe (|).For example: fribo@example.com|jhanna|@example.org . You may use a plain ASCII file 'file:files/localuser.txt'. -LocalAddresses_Flat_Domains (Use Entries without leading @ as Domains) If set entries in LocalAddresses_Flat without leading '@' are handled as domains,for example 'example.com' means an entire domain. -LocalAddressesNP (Do Not Validate Local Addresses if in NoProcessing List) If a recipient is found in NoProcessing, the user validation is skipped. -RejectTheseLocalAddresses (Bounce These Local Addresses*) If ANY recipient is on reject list, the message will not be delivered. Used for disabled legitimate accounts, where a user may have left the company. This stops wildcard mailboxes from getting these messages. You can list specific addresses (user@example.com), addresses at any local domain (user), or entire domains (@example.com). Wildcards are supported (fribo*@example.com). The field (indicated by the '*') accepts a list separated by '|' (for example: fribo*@example.com|@example.com|user) or a file designated as follows (path relative to the ASSP directory): 'file:files/filename.txt'. Putting in the file: will prompt ASSP to put up a button to edit that file. files is the subdirectory for files. The file must not exist, you can create it by saving it. The file must have one entry per line; anything on a line following a numbersign or a semicolon ( # is ignored (a comment) -BlockLocalAddressesRe (Block Local Addresses Regular Expression*) Block all addresses which match this RegEx. Note: if you want to block the pipe char '|' it must be masked with the mask character '\' . You may also use metacharacter brackets ([]) for this purpose. Default: [|] -AllowLocalAddressesRe (Allow Local Addresses Regular Expression*) Allow only addresses which match this RegEx. -TrapLog (Enable Trap logging) -spamtrapaddresses (Trap Addresses* ) Mail to any of these addresses will be blocked and the scoring value is added. These addresses are not checked for validity. Entries are separated by '|' where '*' can be used as a match anything wildcard. Entries that start with '@' indicate that all addresses with that domain should match. Entries without '@' indicate the user part of email addresses with any domain. Valid entries are: john.doe@example.tld|jane.doe|@example.tld|*.department@example.tld Default: put|your@penaltytrap.com|addresses|@example.org -SpamTrap2NULL (Move Connection with Trap Addresses to NULL) If set, ASSP will move connections with spamtrapaddresses to a NULL-connection. The sender will receive "250 OK". Default: On -TrapReply (Trap Reply) SMTP reply for trapaddresses. Default: '550 5.1.1 User unknown: EMAILADDRESS' The literal EMAILADDRESS (case sensitive) is replaced by the fully qualified SMTP recipient (e.g., thisuser@example.com). Make this empty if you do not want to be polite. Default: 550 5.1.1 User unknown: EMAILADDRESS -DoPenaltyMakeTraps (Cache Unknown Addresses) If enabled, unknown addresses are cached. If set to 'use for spamtrapaddresses' very activ addresses will be used like spamtrapaddresses. If set to 'use for spamaddresses' they will work like spamaddresses. If set to 'use for validation' all entries regardless of their frequency will be used to validate incoming addresses. Note: LocalAddresses_Flat or DoLDAP or DoVRFY must be enabled. Default: use for spamaddresses -PenaltyMakeTraps (Unknown Address Frequency Limit) Minimum number of times an address must appear during PBTrapCacheExp before it will be used as spamaddress/spamtrapaddress. For example: 10. Default: 10 -noPenaltyMakeTraps (Exceptionlist for Address Cache*) Addresses which should not be cached. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). Wildcards are supported (fribo*@example.com). -PBTrapCacheExp (Address Cache Expiration) Addresses will be removed after this interval in hours if the 'Invalid Addresses Frequency Limit' is not reached. For example 3. Default: 3 -DoVRFY (Verify Recipients with SMTP-VRFY) If activated and the format 'Domain=>MTA' is encountered in localDomains recipient addresses will be verified with SMTP-VRFY (if VRFY is not supported 'MAIL FROM:' and 'RCPT TO:' will be used). If you know that VRFY is not supported with a MTA, you may put the MTA into VRFYforceRCPTTO. Default: On -VRFYQueryTimeOut (SMTP VRFY-Query Timeout) The number of seconds ASSP will wait for an answer of the MTA that is queryed with the VRFY command to verify a recipient address. See description of localDomains for the necessary modification to localDomains to run this feature Default: 5 -VRFYforceRCPTTO (Force the usage of RCPT TO*) Define local MTAs here for which you want ASSP to force the usage of 'MAIL FROM:' and 'RCPT TO:' instead of the VRFY command. The definition of the MTA(s) has to be exactly the same as already defined in localDomains (after the '=>') for example: smtp.mydomain.com|mx.other.com:port|10.1.1.1|10.1.1.2:125 . -DisableVRFY (Disable VRFY for External Clients) If you have enabled VRFY on your MTA to allow ASSP to verify addresses and you do not want external clients to use VRFY/EXPN - select this option. Default: On -MaxVRFYErrors (Maximum recipient verification Errors) The maximum number of failed 'RCPT TO' or 'VRFY' commands encountered before the connection is dropped. ASSP will drop the connection, if the count of '550 unknown user' errors, received from your 'smtpDestination'(MTA), reached this value! Default: 5 -VRFYFail (VRFY failures return false) VRFY failures return false when an error occurs in VRFY lookups. -VRFYLog (Enable VRFY logging) Default: standard -DoMaxDupRcpt (Block Max Duplicate Recipients) Block remote servers that uses the same recipient address more times, than the number defined in MaxDupRcpt in the RCPT TO: command. Scoring is done with mdrValencePB . This check is skipped for outgoing, noprocessing, whitelisted and spamlovers mails. If a message has to be delayed, this check will score before the delay if set to block or score - and score and/or block on the next server request. Default: score -MaxDupRcpt (Maximum Allowed Duplicate Recipient Adresses) The maximum number of duplicate recipient addresses that are allowed in the sequence of the RCPT TO: commands! The number per mail is calculated by 'number of RCPT TO: commands - number of unique recipient addresses'. For example: if one address is used three times or two addresses are used each two times, will result in the same count - 2. Or if both is the case in one mail, the count will be 4. -sendAllPostmaster (Catchall Address for Messages to Postmaster) ASSP will deliver messages addressed to all postmasters of your local domains to this address. For example: postmaster@example.com -sendAllPostmasterNP (Skip Spam Checks for Postmaster Catchall) -sendAllAbuse (Catchall Address for Messages to Abuse) ASSP will deliver messages to all abuse addresses of your local domains to this address. For example: abuse@example.com -sendAllAbuseNP (Skip Spam Checks for Abuse Catchall) -DoRFC822 (Validate Recipient Address to Conform with RFC5322 ) If activated, each local address is checked to conform with the email format defined in RFC5322 .This requires an installed module in PERL. Default: On -CatchAll (Catchall per Domain*) ASSP will send to these addresses if no valid user is found in LocalAddresses_Flat or LDAP. For example: catchall@domain1.com|catchall@domain2.com -CatchallallISP2NULL (Move ISP Connection with wrong Recipient Address to NULL) If set, ASSP will move all ISP connections with wrong recipient addresses to a NULL-connection. The ISP will receive "250 OK" until the mail has passed, but the mail will not be sent to your MTA. This is done after CatchAll but before CatchAllAll is checked. -CatchAllAll (Catchall for All Domains) ASSP will send to this address if no valid user is found in LocalAddresses_Flat or LDAP and no match is found in Catchall per Domain. For example: catchall@example.com -NullAddresses (NULL Connection Addresses*) ASSP will dump a message silently when encountering such an address. Accepts specific addresses (null@example.com), user parts (nobody) or entire domains (@example.com). -InternalAddresses (Accept Mail from Local Domains only*) These local addresses do not accept mail externally. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). Wildcards are supported (fribo*@example.com). Scoring is done with iaValencePB. -SepChar (Separation Character for Subaddressing) RFC 3598 describes subaddressing with a Separation Character. A star ('*') is not allowed as Separation Character. Everything between Separation Character and @ is ignored (including Separation Character). For Example = '+' will allow user+subaddress@example.com. Default: + -EnableBangPath (Support Bang Path) If set, ASSP will support addresses like domainx!user@domainy and will convert them to user@domainx . -NoValidRecipient (No-Valid-Local-User Reply) SMTP reply for invalid Users. Default: '550 5.1.1 User unknown: EMAILADDRESS' The literal EMAILADDRESS (case sensitive) is replaced by the fully qualified SMTP recipient (e.g., thisuser@example.com).Notes On Local Addresses Default: 550 5.1.1 User unknown: EMAILADDRESS ------ Validate Helo ----------------------------------------------- -useHeloBlacklist (Use the Helo Blacklist) Use the list of blacklisted-helo hosts built by rebuildspamdb. Scoring is done with hlValencePB, testmode with hlTestMode. Default: score -ValidateHeloLog (Enable Validate Helo Logging) Default: standard -DoSucpiciousHelo (Score Suspicious HELOs) Score servers with SuspiciousHeloRe in Helo. Scoring is done with shValencePB Default: score -SuspiciousHeloRe (Regular Expression to Score Suspicious HELO**) Score Suspicious HELOs will check incoming HELOs for this. For example: 'dsl|br(e|oa)dband|ppp|pppoe|dynamic|dynip|ADSL|dial(up|in)|pool|dhcp|leased)' Default: dsl|br(e|oa)dband|ppp|pppoe|dynamic|dynip|ADSL|dial(up|in)|pool|dhcp|leased -DoFakedLocalHelo (Block Forged Helos) Block remote servers that claim to come from our Local Domain/Local IPs/Local Host. Scoring with fhValencePB, testmode with fhTestMode. Default: block -ForceFakedLocalHelo (Enforce Check of Forged Helos Before User Validation) If set and DoFakedLocalHelo is enabled, ASSP will check faked Helos before Delaying. Note: fhTestMode or allTestMode will disable the early execution. -DoFakedUseLocalDomain (Use Local Domain List for Blocking Forged Helos) If set, DoFakedLocalHelo will use localDomains. Default: On -DoFakedWL (Do Not Block Whitelisted Forged Helos) Disable "Block Forged Helo's" for whitelisted addresses (not recommended). -DoFakedNP (Do Not Block Noprocessing Forged Helos) Disable "Block Forged Helo's" for addresses identified as noprocessing (not recommended). -myServerRe (Local Domains,IPs and Hostnames*) Local Domains, IP numbers and Hostnames are often use to fake (forge) the Helo. Include all IP addresses and hostnames for your server here, localhost is already included. Include Local Domains of your choice here, if you deactivated the automatic use of the localDomains list. For example: 11.22.33.44|mx.example.com|example.org -noHelo (Dont Validate HELO for these IPs*) Enter IP addresses that you don't want to be HELO validated. For example: 145.145.145.145|146.145 -heloBlacklistIgnore (Dont block these HELOs*) HELO / EHLO greetings on this list will be excluded from the HELO checks. For example: host123.isp.com|host456.*.com -ForceValidateHelo (Enforce Early Helo Checks) If set and DoInvalidFormatHelo is enabled, ASSP will do DoInvalidFormatHelo before Delaying. Note: ihTestMode or allTestMode will disable the early execution. -DoInvalidFormatHelo (Validate Format of HELO) If activated, the HELO is checked against the expression below. If the Regular Expression matches, the HELO is not ok. Scoring is done with ihValencePB, set testmode with ihTestMode. Default: block -invalidFormatHeloRe (Regular Expression to Validate Format of HELO**) Invalidate Format HELO will check incoming HELOs for this. Each regex can be assigned a weight. If the score which results from weight is less than ihValencePB, the message will not be blocked (even if 'block' is set) but scored. For example: \.user=>0.5|^\d+\.\d+\.\d+\.\d+$|^[^\.]+\.?$ or place them in a plain ASCII file one address per line: file:files/invalidhelo.txt Default: file:files/invalidhelo.txt -validFormatHeloRe (Regular Expression to Validate Format of HELO*) Validate Format HELO will check incoming HELOs according to rfc1123. For example: ^(([a-z\d][a-z\d-]*)?[a-z\d]\.)+[a-z]{2,6}$ Default: ^(([a-z\\d][a-z\\d-]*)?[a-z\\d]\\.)+[a-z]{2,6}$ -DoHeloWL (Do Validate Helo for Whitelisted) Do validate Helo for whitelisted addresses. Default: On -DoHeloNP (Do Validate Helo for Noprocessing) Do validate Helo for messages marked 'noprocessing'. Notes On Validate Helo Default: On ------ Validate Sender ----------------------------------------------- -DoBlackDomain (Do Blacklisted Addresses and Domains) Scoring is done with blValencePB, testmode with blTestMode. Default: block -NotGreedyBlackDomain (Only the envelope-sender is added/compared to the BlackDomainlist) Normal operation includes addresses in the FROM, SENDER, REPLY-TO, ERRORS-TO, or LIST-* header fields.Check this option to disable this. -DoBlackDomainWL (Blacklisting Addresses/Domains will overwrite White) Do blacklisting addresses & domains in messages which are marked whitelisted by whiteRe, whiteListedDomains, whiteListedIP or whitelistdb. Default: On -DoBlackDomainNP (Blacklisting Addresses/Domains will overwrite NoProcessing) Do blacklisting addresses & domains in messages marked 'noprocessing' by npRe, npSize, noProcessingDomains, noProcessingIPs or noProcessing. -blackAddresses (Blackish & Whitish Addresses** ) Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). Wildcards are supported. A positive weight will make the address 'blackish'. A negative weight will make the address into 'whitish'. For example: fribo*@example.com|@*.gov=>-0.5|@*.biz=>0.5 . Default: file:files/blackaddresses.txt -blackListedDomains (Blacklisted Domains*) Addresses and Domains from which you always want to reject mail, they only send you spam. Note this matches the end of the address, so if you don't want to match subdomains then include the @. Note that example.com would also match spamexample.com but .example.com won't match example.com. abc@example.com will match abc@example.com but won't match bbc@example.com. Wildcards are supported. For example: biz|seller@bayer.com Default: file:files/blackdomains.txt -noBlackDomain (Dont do Blacklisted for these Addresses and Domains* ) Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). Wildcards are supported (fribo*@example.com). -DoMsgID (Check Message IDs) Score messages with missing/suspicious/invalid Message-ID (midmValencePB, midsValencePB, midiValencePB). Default: score -noMsgID (Dont Validate Message-IDs for these IPs*) Enter IP addresses that you don't want to be Message-ID validated, separated by pipes (|). For example: 127.0.0.1|192.168. Default: 127.0.0.|192.168.|10. -validMsgIDRe (Regular Expression to Validate Format of Message-ID*) Check Message IDs will check incoming messages for valid Message-IDs. For example: ^.*@.*\..*$ Default: ^.*@.*\\..*$ -invalidMsgIDRe (Regular Expression to Invalidate Format of Message-ID**) Check Message IDs will check incoming messages for invalid Message-IDs. -DoNoValidLocalSender (Check External Sender for Valid Local Address ) If activated, each external sender with a domain in localDomains is checked against LocalAddresses_Flat, LDAP or is verified using VRFY. Scoring is done with flValencePB, testmode with flsTestMode. Default: block -ForceNoValidLocalSender (Enforce Early Checking of External Sender with Local Address ) If set and DoNoValidLocalSender is enabled, ASSP will do DoNoValidLocalSender before Delaying. Note: flsTestMode or allTestMode will disable the early execution. -DoNoSpoofing (Block Local Address from External Sender Alltogether) If activated, each external sender address built with a domain in localDomains is regarded a spoofed address. An external sender is a sender from an IP not in acceptAllMail, not authenticated and not coming from relayPort. flValencePB is used for scoring, testmode is set with flsTestMode. Default: score -noSpoofingCheckIP (Dont do Spoofing Check for these IPs* ) Enter IP numbers that you don't want to be checked for spoofing. For example:145.145.145.145|145.146. -noSpoofingCheckDomain (Dont do Spoofing Check for these Addresses/Domains* ) Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). Wildcards are supported (fribo*@example.com). -DoRFC822Sender (Validate Sender Address to conform with RFC5322) Sender must be a valid address to conform with RFC5322. -DoPTRCheck (Reversed Lookup) If activated, each sender IP is checked for a PTR record. This requires an installed module in PERL. Scoring is done with ptmValencePB, testmode is set with ptrTestMode. -DoPTRCheckWL (Do Reversed Lookup for Whitelisted) Do reversed lookup for whitelisted addresses. -DoPTRCheckNP (Do Reversed Lookup for Noprocessing) Do reversed lookup for noprocessing addresses. -DoPTRCheckInvalid (Reversed Lookup FQDN Validation) If activated - and Reversed Lookup is activated -, the PTR-FQDN record is checked against the Regex. Scoring is done with ptiValencePB Default: On -invalidPTRRe (Regular Expression to Invalidate Format of PTR**) Validate Format PTR will check PTR records for this. For example: ^\d+\.\d+\.\d+\.\d+$|^[^\.]+\.?$ or place them in a plain ASCII file one address per line: file:files/invalidptr.txt Default: file:files/invalidptr.txt -validPTRRe (Regular Expression to Validate Format of PTR*) Validate Format PTR will check PTR records for this. If found, the PTR will be considered valid For example: 'static' or place them in a plain ASCII file one address per line: file:files/validptr.txt Default: file:files/validptr.txt -PTRCacheExp (Reversed Lookup Cache Refresh Interval) IPs in cache will be removed after this interval in hours. 0 will disable the cache. Default: 72 -DoMXACheck (Validate MX or A Record) If activated, each sender address is checked for a valid MX or A record. Scoring is done with mxValencePB for missing MX-record, mxaValencePB for missing A & MX records. Testmode is set with mxaTestMode. -MXACacheExp (Validate Domain MX Cache Refresh Interval) IPs in cache will be removed after this interval in hours. 0 will disable the cache. Default: 72 -DoNoFrom (Check For Existing From Header ) Scoring is done with fromValencePB, testmode is set with fromTestMode. Default: score -ValidateSenderLog (Enable Validate Sender Logging) Default: standard -SenderInvalidError (Sender Validation Error) SMTP error message to reject invalid senders. The literal REASON is replaced by (missing MX, missing PTR, invalid Helo, invalid user) depending on the check. If this is empty SpamError will be used. The literal LOCALDOMAIN will be replaced by the recipient domain or defaultLocalHost. SESSIONID will be replaced by the unique ASSP identifier. REASON will be replaced by the actual reason. Notes On Validate Sender Default: 554 5.7.1 Mail (SESSIONID) appears to be unsolicited - REASON - contact postmaster@LOCALDOMAIN for resolution ------ IP Blocking ----------------------------------------------- -DelayIP (Simple IP Greylisting) Enable simple delaying for IP's in black penalty box. -DelayIPTime (Simple IP Greylisting Embargo Time) Enter the number of minutes for which delivery, related with IP address of the sending host, is refused with a temporary failure. Default is 5 minutes. Default: 5 -noBlockingIPs (Do not block Connections from these IPs*) Manually maintained list of IP numbers which should not be blocked. An IP range is defined e.g. '182.82.10.'. CIDR notation is accepted (182.82.10.0/24). Hyphenated ranges can be used (182.82.10.0-182.82.10.255) -DoDropList (Do Deny Connections from these IPs) If activated, the IP is checked against the Droplist . The droplist is downloaded if a new one is available and contains the Spamhaus DROP List. See "http://www.spamhaus.org/drop/drop.lasso". Default: block -DropList (Drop Connections from these IPs*) Automatically downloaded (http://www.spamhaus.org/drop/drop.lasso) list of IP numbers which should be blocked right away. Default: file:files/droplist.txt -DoDenySMTP (Do Deny Connections from these IPs) If activated, the IP is checked against denySMTPConnectionsFrom (Deny Connections from these IPs). Default: block -denySMTPConnectionsFrom (Deny Connections from these IPs*) Manually maintained list of IP numbers which should be blocked. IP numbers in noPB, noDelay, acceptAllMail, ispip, whiteListedIPs, noProcessingIPs, penalty-whitebox will pass. For example: 145.145.145.145|145.146. -DoDenySMTPstrict (Do Deny Connections from these IP numbers Early) If activated, the IP is checked against denySMTPConnectionsFromAlways. It is posiible to use an automated approach to fill denySMTPConnectionsFromAlways. Use exportExtremeBlack for this, make sure DoExtremeExport and DoExtremeExportAppend are enabled. You can then export into the denySMTPConnectionsFromAlways file. However it may be easier to enable ForcePBExtreme, which will block then automatically right after the connection based on the (extreme) value of the PenaltyBox entry. Default: block -denySMTPConnectionsFromAlways (Deny Connections from these IP numbers Early*) Manually maintained list of IP numbers which should be blocked imediately after connection. IP numbers in noDelay, acceptAllMail, ispip, whiteListedIPs, noProcessingIPs will pass. Place them in a plain ASCII file one address per line: file:files/denyalways.txt -denySMTPLog (Enables Logging for Deny SMTP Connections From) Default: standard -DenyError (Deny Error) SMTP error message to reject connections. Will be used from and denySMTPConnectionsFromAlways and DoPenaltyExtreme. For example: 554 5.7.2 Service denied, closing transmission channel. Default: 554 5.7.2 Service denied, closing transmission channel -DoCheckFrequencyIP (Check Frequency - Maximum Connections Per IP) Scoring is done with ifreqValencePB. -maxSMTPipConnects (Maximum Frequency of Connections Per IP ) The maximum number of SMTP connections an IP Address can make during the maxSMTPipDuration (IP Address Frequency Duration). If a server makes more than this many connections to ASSP within the maxSMTPipDuration (IP Address Frequency Duration) it will be banned from future connections until the maxSMTPipExpiration (IP Address Frequency Expiration) is reached. This can be used to prevent server overloading and DoS attacks. 10 connections are typically enough. If left blank or 0, there is no limit imposed by ASSP. IP numbers in noPB, noDelay, acceptAllMail, ispip, whiteListedIPs, noProcessingIPs, PB-whitebox are excluded from SMTP session limiting, whitelisted and noprocessing addresses are honored. Default: 10 -maxSMTPipDuration (Maximum Frequency of Connections Per IP Duration) The window (in seconds) during which the maxSMTPipConnects (IP Frequency) (see above for more details) will be scrutinized for each IP. The default is 90 seconds. Default: 90 -maxSMTPipExpiration (Expiration of Maximum Frequency) The number of seconds that must pass before an IP address blocked by the maxSMTPipConnects (IP Address Frequency) setting is allowed to connect again. The default is 3600 (seconds) . Default: 3600 -DoNumberDomainIP (Check Number of IP numbers Per Domain) Scoring is done with idomValencePB. -maxSMTPdomainIP (Limit Number of IP numbers Per Domain) The number of IP(subnet) switches a domain may have during the maxSMTPdomainIPExpiration (Limit Different IP numbers Per Domain Expiration). If a domain switches more often than this it will be banned from future connections until the Expiration is reached. This is NOT a spam blocking filter, it is a tool to fight dictionary attacks, server overloading and DoS attacks. 10 connections are typically enough. If left blank or 0, there is no limit imposed by ASSP. IP numbers in noPB, noDelay, acceptAllMail, ispip, whiteListedIPs, noProcessingIPs, PB-whitebox are excluded, whitelisted and noprocessing addresses are honored. Default: 10 -maxSMTPdomainIPExpiration (Expiration of Limit Number) The number of seconds that must pass before a domain blocked by the maxSMTPdomainIP (Limit Subnet IP numbers Per Domain) setting (see above for more details) is allowed to connect again. The default is 1800 (seconds). Default: 1800 -maxSMTPdomainIPWL (Do Not Limit Different IP numbers For These Domains*) This prevents specific domains from limiting. For example: yahoo.com|hotmail.*.com|gmail.com Notes On IP Blocking Default: gmx.de|t-online.de|yahoo.com|hotmail.com|gmail.com ------ SenderBase ----------------------------------------------- -SBtimeout (Net::SenderBase Timeout) Net::SenderBase will timeout after this many seconds. Default: 10 -DoOrgWhiting (Do Organization Whiting ) If activated, each sending IP address has its assigned organization looked up. This requires an installed module in PERL. Scoring is done with sworgValencePB. Default: whiting -whiteSenderBase (White Organizations and Domains in SenderBase** ) If the organization or domain in the IP description matches this Perl regular expression the message will be considered non-spam, the total messagescore will be decreased by sworgValencePB. Place them in a plain ASCII file one address per line: file:files/whiteorg.txt Default: file:files/whiteorg.txt -DoOrgBlocking (Do Organization Blocking) If activated, each sending IP address has its assigned organization looked up . This requires an installed module in PERL. Scoring is done with sborgValencePB, Testmode is set with sbTestMode. Default: monitor -blackSenderBase (Blacklisted Organizations and Domains in SenderBase** ) If the organization or domain in the IP description matches this Perl regular expression the message will be considered spam. -DoCountryBlocking (Do Country Blocking) If activated, each sending IP address has it's assigned country looked up and compared to CountryCodeBlockedRe. This requires an installed module in PERL. Testmode is set with sbTestMode, Messages from these countries will increase the total MessageScore using bccValencePB. Default: monitor 0 - disabled 1 - Block 2 - monitor 3 - score -CountryCodeBlockedRe (Blocked Countries**) Messages from IP numbers based in these countries will be blocked if DoCountryBlocking is set accordingly. For example: CN|KR|RU|JP|TR|TH|PL|LT|CL|RO. "all" will block all foreign countrycodes which are not in 'Suspicious Country Codes' or 'Ignore Country Codes'. See: . -DoCountryBlockingWL (Do Country Blocking for Whitelisted ) Enable Country Blocking for whitelisted messages. -DoCountryBlockingNP (Do Country Blocking for NoProcessing) Enable Country Blocking for noprocessing messages. -DoSenderBase (Do Suspicious Country Scoring) If activated, each sending IP address has it's assigned country looked up and compared to CountryCodeRe. This requires an installed module in PERL. Testmode is set with sbTestMode. Default: score -CountryCodeRe (Suspicious Countries**) Messages from IP numbers based in these countries will increase the MessageScore. For example: UA|GR|HU|SA|IN|IE|PT|MD|PE|CZ|TW|BR|CL|ID|PH. Messages from these countries will increase the total MessageScore using sbsccValencePB. -NoCountryCodeRe (Ignore Country Codes from these Countries*) Messages from IP numbers based in these countries will not be blocked. For example: US|CA|DE Default: US|CA|DE -MyCountryCodeRe (Home Countries**) Put here your own country code(s) (for example: US). Messages from IP numbers based in these countries will decrease the total MessageScore using sbhccValencePB, messages from other countries will increase the total MessageScore using sbfccValencePB if ScoreForeignCountries is set. -ScoreForeignCountries (Score Foreign Countries) Messages from countries not in MyCountryCodeRe will increase the total messageScore using sbfccValencePB. Default: On -SenderBaseLog (Enable SenderBase Logging) Default: standard -SBCacheExp (Country Cache Refresh Interval) IPs in cache will be removed after this interval in hours. 0 will disable the cache. Country Codes Default: 240 ------ Message Scoring ----------------------------------------------- -DoPenaltyMessage (Message Scoring) If this feature is selected, the total score for all checks during a message is used to determine if the email should be considered Spam. If the combined score is greater than MessageScoringLowerLimit (MessageLimit for Tagging) and less than or equal MessageScoringUpperLimit (MessageLimit for Blocking) the message will not be blocked but tagged. If the combined score is greater than the MessageScoringUpperLimit, the message will be blocked. Testmode is set with msTestMode. Default: block -MessageLog (Enable Message Scoring logging) Default: standard -MessageScoringWL (MessageScoring on Whitelisted Senders) -MessageScoringNP (MessageScoring on NoProcessing Messages) -MessageScoringLocal (MessageScoring on Local Senders) -MessageScoringLowerLimit (MessageScoring Lower Limit ) MessageScoring will tag messages with totalscore higher than this limit and not higher than MessageScoringUpperLimit. For example: 47 Default: 47 -MessageScoringWarningTag (Warning Tag) Used if totalscore is higher than MessageScoringLowerLimit and not higher than MessageScoringUpperLimit. For example: [?] -MessageScoringUpperLimit (MessageScoring Upper Limit) If MessageScoring is done to block, it will block messages whose totalscore is higher than this threshold. For example: 50 Default: 50 -MessageScoringExtremeLimit (MessageScoring Extreme Limit) Spamlover messages whose totalscore is higher than this threshold will not pass but will be blocked. A value of 0 here or the recipient listed in strictSpamLovers will disable this option. For example: 75 Default: 75 -ConnectionScoringLimit (ConnectionScoring Limit) If this feature is selected, the total score for all checks of all messages during a connection is used to determine if the email should be considered Spam. A value of 0 here will disable this option. Scoring value is conValencePB. For example: 150 ------ PenaltyBox ----------------------------------------------- -DoPenalty (IP Scoring) The PenaltyBox is a temporary position of low esteem awarded for a perceived misdeed. It scores IP numbers based on some events ( ) and writes them into a BlackBox. If the score per specified time interval (PenaltyDuration) surpasses the warning threshold (PenaltyWarning) the message is marked with PenaltyWarningTag but not blocked. The next level is the PenaltyLimit Threshold. It can be used to block the message. There is also an extreme level, those 'top performers' can get a special treatment: PenaltyExtreme when DoPenaltyExtreme is enabled. The WhiteBox stores IP numbers which should not be put into the BlackBox. The WhiteBox is always enabled. If an address is in the whitelist or whitedomain, the IP goes into the WhiteBox too. The WhiteBox is one of the sources Delaying/Greylisting uses to determine when delaying should not be done. Entries in noPB (Don't do penalties for these IP numbers ) or ispip (ISP/Secondary MX Servers) will prevent from penalties. Select 'monitor' to fill WhiteBox and BlackBox. 'monitor' is also the right choice if you do not want to block IP numbers but rather score messages with DoPenaltyMessage (Message Scoring Mode). Testmode is set with pbTestMode. Default: monitor -PenaltyDuration (Penalty Interval) IP numbers will be kept in the BlackBox if their score exceeds the Penalty Limit during this interval in minutes. Default: 60 -PenaltyWarning (Penalty Warning) PB will tag messages from IP numbers whose totalscore exceeds this threshold during PenaltyDuration. For example: 45 Default: 45 -PenaltyWarningTag (Penalty Warning Tag) For example: [??] Default: [??] -PenaltyLimit (Penalty Limit) PB will block messages from IP numbers whose totalscore exceeds this threshold during PenaltyDuration. For example: 50 Default: 50 -PenaltyExpiration (Expiration Time) Penalties with a score lower than PenaltyExtreme will expire after this number of minutes. If set to Zero the Penalty BlackBox will be deleted and started from scratch. Default: 360 -PenaltyLog (Enable PenaltyBox logging) Default: standard -AddScoringHeader (Add IP/Message Scoring Header) Adds a line to the email header "X-Assp-XXX-Score: ", where XXX may be IP, Message or both. Default: On -pbdb (PenaltyBox Database) The directory/file with the penaltybox database files. For removal of entries from PenaltyBlackBox use . For removal of entries from WhiteBox use . For whitelisting IP numbers use whiteListedIPs or noProcessingIPs. For blacklisting IP numbers use denySMTPConnectionsFrom and denySMTPConnectionsFromAlways. Default: pb/pbdb -noPB (Dont do BlackBox for these IPs* ) Enter IP numbers that you don't want to be profiled. These IP numbers will also be automatically removed from PB-BlackBox. For example:145.145.145.145|145.146. -noPBwhite (Dont do WhiteBox for these IPs* ) Enter IP numbers that you don't want to be NOT profiled. These IP numbers will also be automatically removed from PB-WhiteBox. Default: nowhite.txt -WhiteExpiration (Expiration Time for WhiteBox Entries) The WhiteBox is always activated. The WhiteBox is similar to the Whitelist - but it is not a whitelist: content-related checks like Bayesian, URIBL, Bomb will be done, IP-related checks will be skipped. WhiteBox entries will expire after this specified number of days. For example: 30 Default: 30 -PenaltyUseNetblocks (Use IP Netblocks) Perform the IP address checks of the sending host based on the /24 subnet rather than on the specific IP. Part of DoPenalty Default: On -PenaltyError (Penalty Reply) If set SMTP reply for Penalty Denial. The literal LOCALDOMAIN will be replaced by the recipient domain or defaultLocalHost. SESSIONID will be replaced by the unique ASSP identifier. REASON will be replaced by the actual reason. Default: 554 5.7.1 Mail (SESSIONID) appears to be unsolicited - REASON - contact postmaster@LOCALDOMAIN for resolution -CleanPBInterval (Clean Up PB Databases) Delete outdated entries from blackbox and whitebox databases every this many hours. Note: the current timeout must expire before the new setting is loaded, or you can restart. Defaults to 6 hours. Default: 6 -DoPenaltyExtreme (PenaltyBox Extreme IP Profiling) If set PBextreme will block IP numbers whose score meet or exceed Extreme Scoring Threshold. DoPenaltyExtreme blocks after the header is done, based on the IP numbers score from previous and current SMTP session, testmode is set with pbTestMode. Default: block -PenaltyExtreme (Extreme Scoring Threshold) PBextreme will use this to determine candidates for special treatment. For example: 500. Default: 500 -ExtremeExpiration (Expiration Time for Extreme Penalties) Penalties with score higher than PenaltyExtreme will expire after this number of days. If set to Zero nothing will be deleted. For example: 7 -ForcePBExtreme (Enforce Early PenaltyBox Extreme Blocking) If set and DoPenaltyExtreme is enabled, ASSP will do DoPenaltyExtreme immediately after connection. -ExtremeWL (Penalize Whitelisted) Enable extreme penalties for whitelisted addresses. -ExtremeNP (Penalize NoProcessing) Enable extreme penalties for noprocessing addresses. -DoExtremeExport (Do Export Penalty BlackBox Extreme) -DoExtremeExportAppend (Append Export File) Do not overwrite the export file but append to it. -exportInterval (Export BlackBox Extreme File Interval) Exported Penalty Black Box Extreme File every this hours. Defaults to 6 hours. Default: 6 -exportExtremeBlack (Exported BlackBox Extreme File ) IPs in Penalty BlackBox which surpassed the extreme level will be regularly stored into this file. Default: file:files/exportedextreme.txt -PenaltyExtremeLog (Enable PenaltyBox Extreme logging) Default: standard ------ Scoring Settings ----------------------------------------------- -DoNotPenalizeRed (Do Not Score IP numbers in Redlisted Messages) IPs matching Red Regex or Redlist will not collect scoring values from PenaltyBox. -DoNotPenalizeNull (Do Not Score IP numbers From Bounce/Null-Senders) IPs matching BounceSenders (Bounce Senders) will not be profiled. -baValencePB (Bad Attachment) For Message & IP scoring in DoBlockExes. Default: 20 -baysValencePB (Bayesian) For Message scoring in DoBayesian. Default: 49 -bccValencePB (Blocked Country Code) For Message & IP scoring in DoCountryBlocking. Default: 25 -blValencePB (Blacklisted Domain) For Message & IP scoring in DoBlackDomain Default: 20 -bombSuspiciousValencePB (Matching Suspicious Expression) message scoring in bombSuspiciousRe Default: 10 -blackValencePB (Black Expression Matching) For Message & IP scoring in DoBlackRe Default: 40 -bombValencePB (Bomb Expression Matching) For Message & IP scoring in DoBombRe, DoBombHeaderRe, DoBombSenderRe Default: 30 -scriptValencePB (Script Expression Matching) For Message & IP scoring in DoScriptRe Default: 20 -etValencePB (Early Talker Scoring) IP scoring for clients who talk before server's greeting is sent. Default: 25 -fhValencePB (Forged HELO Scoring) For Message & IP scoring in DoFakedLocalHelo. Default: 150 -flValencePB (Invalid Local Sender Score) For Message & IP scoring in DoNoValidLocalSender. Default: 20 -fromValencePB (No From Score) For Message & IP scoring in DoNoFrom Default: 50 -gripValencePB (Score for GRIPvalues) For Message scoring with griplist values. The final score for an IP is basically the gripvalue * gripValencePB. If the gripvalue is less 0.5 it will be negative. Default: 30 -hlValencePB (Blacklisted HELO Score) For Message & IP scoring in useHeloBlacklist. Default: 20 -idomValencePB (Number of IP numbers Per Domain Violation Score) For IP scoring in DoNumberDomainIP. Default: 40 -ifreqValencePB (IP Frequency Violation Score) For IP scoring in DoCheckFrequencyIP. Default: 40 -ihValencePB (Invalid HELO Score) For Message & IP scoring in DoInvalidFormatHelo & DoValidFormatHelo. Default: 20 -shValencePB (Suspicious HELO Score) For Message & IP scoring with SuspiciousHeloRe. Default: 10 -iplValencePB (IP Maximum Parallel Sessions Violation Score) For IP scoring in maxSMTPipSessions. Default: 5 -meValencePB (Max Errors Exceeded Score) IP scoring in MaxErrors. Default: 10 -conValencePB (ConnectionScoring Limit Exceeded ) Message scoring in ConnectionScoringLimit. Default: 10 -mdrValencePB (Duplicate Recipient) Message/IP scoring in DoMaxDupRcpt Default: 10 -midmValencePB (Missing Message-ID Score) For Message & IP scoring in DoMsgID. Default: 19 -midsValencePB (Suspicious Message-ID) For Message & IP scoring in DoMsgID. Default: 5 -midiValencePB (Invalid Message-ID) For Message & IP scoring in DoMsgID. Default: 5 -msigValencePB (Invalid MSGID-signature) For Message scoring Default: 25 -msValencePB (Message Scoring Limit Exceeded) For IP scoring with DoPenaltyMessage Default: 10 -mxValencePB (Missing MX Record) For Message & IP scoring in DoMXACheck. Default: 10 -mxaValencePB (Missing MX and A Record) For Message & IP scoring in DoMXACheck. Default: 15 -nopbwValencePB (noPBwhite) For Message scoring if mail comes from noPBwhite IP numbers. Default: 10 -pbwValencePB (<span class="positive"> PBwhite</span>) Bonus for Message scoring if mail comes from an IP in PBwhite. Default: -10 -okValencePB (<span class="positive">Message OK</span>) IP Bonus for passing message Default: -25 -okaValencePB (<span class="positive"> OK Address found</span>) Bonus for finding sender address in DoOKCaching Default: -25 -pbValencePB (Bad IP History, TotalScore larger than PenaltyLimit) message scoring in PenaltyBox ( DoPenaltyMessage ) Default: 10 -pbeValencePB (Extreme Bad IP History, TotalScore larger than PenaltyExtreme) message scoring in PenaltyBox ( DoPenaltyMessage ) Default: 15 -ptiValencePB (Invalid PTR Record) For Message & IP scoring in DoPTRCheckInvalid Default: 10 -ptmValencePB (Missing PTR Record) For Message & IP scoring in DoPTRCheck Default: 5 -rblValencePB (DNSBL Failed) For Message & IP scoring in ValidateRBL Default: 45 -rblnValencePB (DNSBL Neutral) For Message & IP scoring in ValidateRBL Default: 25 -reValencePB (Recipients Empty Score) For IP scoring in Recipient Section. Default: 5 -riValencePB (Recipient Invalid) For Message & IP scoring in Recipient Section. Default: 5 -rwlValencePB (RWL Pass) Bonus for Message & IP scoring in ValidateRWL Default: -25 -rwlnValencePB (RWL Neutral) Bonus for Message & IP scoring in ValidateRWL Default: -15 -rlValencePB (Failed Relay Attempt) For Message & IP scoring in Relaying Section. Default: 25 -saValencePB (Spam Collect Address) For IP scoring with spamaddresses Default: 25 -sbfccValencePB (Foreign Country Code) message scoring in MyCountryCodeRe Default: 10 -sbhccValencePB (<span class="positive">Home Country Code</span>) Bonus for Message & IP Scoring with MyCountryCodeRe Default: -10 -sborgValencePB (Blocked Organizations) For Message & IP scoring in DoOrgBlocking Default: 25 -sbnValencePB (No Organization and No CountryCode) For Message & IP scoring in DoOrgBlocking and DoCountryBlocking Default: 10 -sworgValencePB (White Organizations) Bonus for Message & IP scoring in DoOrgWhiting Default: -25 -sbsccValencePB (Suspicious Country Code) message scoring in CountryCodeRe Default: 10 -spfValencePB (SPF Failed) For Message & IP scoring in ValidateSPF Default: 10 -spfpValencePB (SPF Pass) Bonus for Message & IP scoring with SPF Default: -5 -spfnValencePB (SPF Neutral) For Message & IP scoring with SPFneutral Default: 5 -spfsValencePB (SPF Softfailed) For Message & IP scoring with SPFsoftfail Default: 5 -spfnonValencePB (SPF None) For Message & IP scoring with SPFnone -spfuValencePB (SPF Unknown) For Message & IP scoring in SPFunknown -spfeValencePB (SPF Error) For Message & IP scoring in ValidateSPF Default: 10 -srsValencePB (SRS Validate Bounce Failed) For Message & IP scoring in SRSValidateBounce Default: 10 -stValencePB (Penalty Trap Address) For IP scoring in with spamtrapaddresses Default: 50 -teValencePB (TestRe Valence) For testmode with testRe Default: 20 -vsValencePB (Virus Suspicious) message scoring in SuspiciousVirus Default: 25 -tlsValencePB (OK, Is a SSL/TLS connection,) Message Scoring & IP scoring Bonus for SSL/TLS connections Default: -10 -vdValencePB (Virus Detected) Message & IP scoring in UseAvClamd Default: 50 -uriblnValencePB (URIBL Neutral) Message & IP scoring in ValidateURIBL Default: 20 -uriblValencePB (URIBL Failed) For Message & IP scoring in ValidateURIBL Default: 40 -uribleValencePB (URIBL Extras) For Message & IP scoring in URIBLNoObfuscated, URIBLmaxdomains, URIBLmaxuris, Default: 5 -whiteValencePB (<span class="positive">White Expression Matching</span>) For Message & IP scoring with whiteReNotes On PenaltyBox Default: -50 ------ Delaying/Greylisting ----------------------------------------------- -EnableDelaying (Enable Delaying/Greylisting) Enable Greylisting as described at . Greylisting involves sending a temporary 451 SMTP error code to the sending server when a message is received, along with sending this error code ASSP creates a Triplet and stores this. On the second delivery attempt if the Embargo Time set by the ASSP admin for the Triplet has been surpassed the message will be accepted and a Tuplet will be created and not delayed again for an Expiry Time set by the ASSP admin. Default: On -DelayLog (Enable Greylisting/Delaying logging) -DelayGripvalue (Do Greylisting/Delaying above this Gripvalue) This will restrict Delaying/Greylisting to IP numbers with a a Gripvalue above this value. For example 0.4. You may set it higher to 0.5 if you want to delay only IP numbers with a higher probability to send Spam. The local griplist is build during rebuildspamdb and uploaded to a global database. In return the global griplist is downloaded. The Gripvalue is calculated from the "spamminess" , where 0 means the IP-Block never sends spam and 1 it always send spam. Default: 0.4 -DelayWL (Whitelisted Greylisting) Enable Greylisting for whitelisted users. -DelayNP (NoProcessing Greylisting) Enable Greylisting for noprocessing users. -DelaySL (SpamLovers Greylisting) Enable Greylisting for SpamLovers. -DelaySPF (SPF Pass Greylisting) Enable Greylisting for SPF=pass results. Default: On -DelayHC (HomeCountry Pass Greylisting) Enable Greylisting for HomeCountry based IPs. Default: On -DelayAddHeader (Add X-Assp-Delay Header) Add X-Assp-Delay header to all emails. Default: On -DelayEmbargoTime (Embargo Time) Enter the number of minutes for which delivery, related with new 'triplet' (IP address of the sending host + mail from + rcpt to), is refused with a temporary failure. Default is 5 minutes. Default: 5 -DelayWaitTime (Wait Time) Enter the number of hours to wait for delivery attempts related with recognised 'triplet'; delivery is accepted immediately and the 'tuplet' (IP address of the sending host + sender's domain) is safelisted. Default is 28 hours. Default: 28 -DelayExpiryTime (Expiry Time) Enter the number of days for which whitelisted 'tuplet' is considered valid. Default is 36 days. Default: 36 -DelayUseNetblocks (Use IP Netblocks) Perform the IP address checks of the sending host based on the /24 subnet it is at rather than the specific IP. This feature may be useful for legitimate mail systems that shuffle messages among SMTP clients between retransmissions. Default: On -DelayNormalizeVERPs (Normalize VERP Addresses) Some mailing lists (such as Ezmlm) try to track bounces to individual mails, rather than just individual recipients, which creates a variation on the VERP method where each email has its own unique envelope sender. Since the automatic whitelisting (called savelisting to make a difference to the standard whitelisting) that is built into Greylisting depends on the envelope addresses for subsequent emails being the same, the greylisting filter will attempt to normalize the unique sender addresses, when this option is checked. Default: On -DelayMD5 (Use MD5 for DelayDB) Message-Digest algorithm 5 is a cryptographic hash function and adds some level of security to the delay database. Must be set to off if you want to list the database with DelayShowDB/DelayShowDBwhite. Default: On -DelayShowDB (Show Delay/Greylisting Database) The directory/file with the delay local file. Obsolete if you use 'mysql' in delaydb. Default: file:delaydb -DelayShowDBwhite (Show Delay/Greylisting Save Database) The directory/file with the white-delay local file. Obsolete if you use 'mysql' in delaydb. Default: file:delaydb.white -DelayExpireOnSpam (Expire Spamming Safelisted Tuplets) If a safelisted 'tuplet' is ever associated with spam, viri, failed rbl, spf etc, it is deleted from the safelist. This renews the temporary embargo for subsequent mail involving the tuplet. Default: On -CleanDelayDBInterval (Clean Up Delaying Database) Delete outdated entries from triplets and safelisted tuplets databases every this many seconds. Note: the current timeout must expire before the new setting is loaded, or you can restart. Defaults to 3 hours. Default: 10800 -noDelay (Dont Delay these IPs*) Enter IP addresses that you don't want to be delayed, separated by pipes (|). There are misbehaving MTAs that will not be able to get a legitimate email through a Greylisting server because they do not try again later. For example: 145.145.145.145|145.146. or place them in a plain ASCII file one address per line: 'file:files/nodelay.txt' Default: file:files/nodelay.txt -noDelayAddresses (Do not Delay these Addresses*) Enter senders email addresses that you don't want to be delayed, separated by pipes (|). You can list specific addresses (user@anydomain.com), addresses at any domain (user), or entire domains (@anydomain.com). Wildcards are supported (fribo*@domain.com).For example: fribo@anydomain.com|jhanna|@sillyguys.org or place them in a plain ASCII file one address per line: 'file:files/nodelayuser.txt'. -noDelayHelosRe (Regular Expression to Identify noDelay Helos *) Put anything here to identify Helos which should be not delayed. Default: ^(mail|smtp|mout|mx) -DelayError (Reply Code to Refuse Delayed Messages) SMTP reply code to refuse delayed messages. Default: 451 4.7.1 Please try again later Notes On Delaying Default: 451 4.7.1 Please try again later ------ SPF/SRS ----------------------------------------------- -ValidateSPF (Enable SPF Validation ) Enable Sender Policy Framework Validation as described at . This requires an installed module in PERL. Testmode is set with spfTestMode, Scoring is done with spfValencePB. Default: score -SPFLog (Enable SPF logging) Default: standard -SPFWL (Whitelisted SPF Validation) Enable Sender Policy Framework Validation for whitelisted users also. -SPFNP (noProcessing SPF Validation) Enable Sender Policy Framework Validation for nonprocessed messages also. -AddSPFHeader (Add Received-SPF Header) Add Received-SPF header to header of all emails processed by SPF. Default: On -SPFError (SPF Failed Reply) SMTP reply for SPF failed messages. Default: '554 5.7.1 failed SPF: SPFRESULT' The literal SPFRESULT is replaced by the actual result. Default: 554 5.7.1 failed SPF: SPFRESULT -noSPFRe (Regular Expression to Skip SPF Processing*) Put anything here to identify these messages in mailfrom or header -strictSPFRe (Strict SPF Processing Regex*) Softfail/Neutral/None will be failed for these sending addresses. Put anything here to identify the addresses. For example: '@gmail.com|@msn.com|@live.com|@ebay.com|@ebay.nl|@bbt.com|@paypal.com|@einsundeins.de|@microsoft.com' Default: @gmail.com|@msn.com|@live.com|@ebay.com|@ebay.nl|@bbt.com|@paypal.com|@einsundeins.de|@microsoft.com -blockstrictSPFRe (Strict SPF Blocking Regex*) All failed messages will be blocked for these sending addresses. Put anything here to identify the addresses. Default: @ebay.com|@paypal.com -SPFsoftfail (Fail SPF Softfail Validations) Intentionally fail SPF softfail status responses. The possible results of a query are: pass:The client IP address is an authorized mailer for the sender. The mail should be accepted subject to local policy regarding the sender. fail:The client IP address is not an authorized mailer, and the sender wants you to reject the transaction for fear of forgery. softfail:The client IP address is not an authorized mailer, but the sender prefers that you accept the transaction because it isn't absolutely sure all its users are mailing through approved servers. The softfail status is often used during initial deployment of SPF records by a domain. neutral:The sender makes no assertion about the status of the client IP. none:There is no SPF record for this domain. permerror&temperror:The DNS lookup encountered an error during processing. unknown:The domain has a configuration error in the published data or defines a mechanism that this library does not understand. -SPFneutral (Fail SPF Neutral Validations) Intentionally fail SPF neutral status responses -SPFqueryerror (Fail SPF Error Responses) Intentionally fail SPF 'error' status responses -SPFnone (Fail SPF None Responses) Intentionally fail SPF 'none' status responses -SPFunknown (Fail SPF Unknown Responses) Intentionally fail SPF 'unknown' status responses -SPFCacheExp (SPF Cache Refresh Interval) SPF records in cache will be removed after this interval in hours. 0 will disable the cache. Default: 72 -DebugSPF (Enable SPF Debug output to ASSP Logfile) Enables verbose debugging of SPF queries within the Mail::SPF::Query module. Notes On SPF -EnableSRS (Enable Sender Rewriting Scheme) Enable Sender Rewriting Scheme as described at . This requires an installed module in PERL. You should use SRS if your message handling system forwards email for domains with published spf records. Note that you have to setup the outgoing path (Relay Host and Port) to let ASSP see and rewrite your outgoing traffic. -SRSAliasDomain (Alias Domain) SPF requires the SMTP client IP to match the envelope sender (return-path). When a message is forwarded through an intermediate server, that intermediate server may need to rewrite the return-path to remain SPF compliant. For example: example.com Default: example.com -SRSSecretKey (Secret Key) A key for the cryptographic algorithms -- Must be at least 5 characters long. -SRSTimestampMaxAge (Maximum Timestamp Age) Enter the maximum number of days for which a timestamp is considered valid. Default is 21 days. Default: 21 -SRSHashLength (Hash Length) The number of bytes of base64 encoded data to use for the cryptographic hash. More is better, but makes for longer addresses which might exceed the 64 character length suggested by RFC5321. This defaults to 4, which gives 4 x 6 = 24 bits of cryptographic information, which means that a spammer will have to make 2^24 attempts to guarantee forging an SRS address. Default: 4 -SRSValidateBounce (Enable Bounce Recipient Validation) Bounce messages that fail reverse SRS validation (but not a valid SMTP probe) will receive a 554 5.7.5 [Bounce address not SRS signed] SMTP error code. Testmode is set with srsTestMode, Scoring is done with srsValencePB. -SRSno (Dont Rewrite These Addresses*) Don't rewrite addresses when messages come from/to these addresses. Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). For example: fribo@example.com|jhanna|@example.org -noSRS (Dont Validate Bounces From these IPs*) Enter IP addresses that you don't want to validate bounces from, separated by pipes (|). For example: 145.145.145.145|145.146. Notes On SRS ------ DNSBL ----------------------------------------------- -ValidateRBL (Enable DNS Blacklist Validation) This requires an installed module in PERL. Scoring is done with rblValencePB for 'fail' and rblnValencePB for 'neutral' results. Testmode is set with rblTestMode. Default: block -RBLLog (Enable DNSBL logging) Default: standard -noRBL (Dont do DNSBL for these IPs*) Enter IP addresses that you don't want to be DNSBL validated, separated by pipes (|). For example: 145.145.145.145|145.146. -RBLWL (Whitelisted DNSBL Validation) Enable DNSBL for whitelisted messages -RBLNP (NoProcessing DNSBL Validation) Enable DNSBL for noprocessing messages -AddRBLHeader (Add X-Assp-Received-DNSBL Header) Add X-Assp-Received-DNSBL header to messages with positive reply from DNSBL. Default: On -RBLError (DNSBL Failed Reply) SMTP reply for messages failed by DNSBL. The literal RBLLISTED (case sensitive) is replaced by the matching serviceprovider(s). Default: 554 5.7.1 DNS Blacklisted in RBLLISTED - contact postmaster@LOCALDOMAIN for resolution -RBLServiceProvider (RBL Service Providers* ) Names of DNSBLs to use separated by "|" or name of list 'file:files/dnsbls.txt'. Defaults are: zen.spamhaus.org=>1|bl.spamcop.net=>1|bb.barracudacentral.org=>1|combined.njabl.org=>1|safe.dnsbl.sorbs.net=>1|psbl.surriel.com=>2|ix.dnsbl.manitu.net=>2|dnsbl-1.uceprotect.net=>2|dnsbl-2.uceprotect.net=>4. DNSBL providers can be classified like bl.spamcop.net=>1. '1' is the most trustworthy class. '6' is the least trustworthy class. Numbers above 6 will be used as score directly. The value of the class acts as a divisor of rblValencePB. So if rblValencePB = 50 bl.spamcop.net=>1 would be the same as bl.spamcop.net=>50, bl.spamcop.net=>2 would be the same as bl.spamcop.net=>25. If the sum of scores surpasses rblValencePB, the DNSBL check fails. If not the DNSBL hit is scored. Default: file:files/dnsbls.txt -RBLmaxreplies (Maximum Replies) A reply is affirmative or negative reply from a DNSBL. The DNSBL module will wait for this number of replies (negative or positive) from the DNSBLs listed under Service Provider for up to the Maximum Time(RBLmaxtime). This number should be equal to or less than the number of DNSBL Service Providers listed to allow for randomly unavailable DNSBLs. Default: 13 -RBLmaxhits (Maximum Hits) A hit is an affirmative response from a DNSBL. The DNSBL module will check all of the DNSBLs listed under Service Provider. If the number of hits is greater or equal Maximum Hits, the email is flagged Failed. If the number of hits is greater 0 and less Maximum Hits, the email is flagged Neutral. Note: This is legacy and not used when the Service Providers are classified. Default: 2 -RBLmaxtime (Maximum Time) This sets the maximum time in seconds to spend on each message performing DNSBL checks. Default is 10. Default: 10 -RBLsocktime (Socket Timeout) This sets the DNSBL socket read timeout in seconds. Default: 1 -ForceRBLCache (Early DNSBL Cache Blocking) If set and ValidateRBL is enabled, ASSP will use cached DNSBL hits to block messages before Delaying. Note: rblTestMode or allTestMode will disable the early execution. -RBLCacheExp (DNSBL Expiration Time) IPs in cache will be removed after this interval in hours. 0 will disable the cache. Notes On DNSBL Default: 24 ------ URIBL ----------------------------------------------- -ValidateURIBL (Enable URI Blocklist Validation ) Enable URI Blocklist. Messages that fail URIBL validation will receive URIBLError SMTP error code. This requires an installed module in PERL. Scoring is done with uriblValencePB, testmode is set with uriblTestMode. Default: block -URIBLLog (Enable URIBL logging) Default: standard -URIBLWL (Do URI Blocklist Validation for Whitelisted) URIBL check is done ignoring all spamlovers and testmodes! -URIBLNP (Do URI Blocklist Validation for NoProcessing) URIBL check is done ignoring all spamlovers and testmodes! -URIBLLocal (Do URI Blocklist Validation for Local Mails) -URIBLISP (Do URI Blocklist Validation for ISP/Secondary) Default: On -URIBLCCTLDS (URIBL Country Code TLDs*) List of used to determine the base domain of the uri. Two level TLDs will be checked on third level, third level TLDs will be checked on fourth level. Any not listed domain will be checked in level two. Default: file:files/URIBLCCTLDS.txt -URIBLmaxuris (Maximum URIs) More than this number of URIs in the body will increase scoring with uribleValencePB. Enter 0 to disable feature. -URIBLmaxdomains (Maximum Unique Domain URIs) More than this number of unique domain URIs in the body will increase scoring with uribleValencePB. Enter 0 to disable feature. -URIBLServiceProvider (URIBL Service Providers*) Domain Names of URIBLs to use. It is possible to specify a weight value after '=>' , in this case this value will be used as hit value (see URIBLmaxhits ) for this service provider, for example multi.surbl.org=>1.5 . Default is: multi.surbl.org|black.uribl.com|uribl.swinog.ch Default: multi.surbl.org|black.uribl.com|uribl.swinog.ch -URIBLmaxreplies (Maximum Replies) A reply is affirmative or negative reply from a URIBL. The URIBL module will wait for this number of replies (negative or positive) from the URIBLs listed under Service Provider for up to URIBLmaxtime. This number should be equal to or less than the number of URIBL Service Providers listed to allow for randomly unavailable URIBLs. Default: 3 -URIBLmaxhits (Maximum Hits) A hit is an affirmative response from a URIBL. The URIBL module will check all of the URIBLs listed under Service Provider, and flag the email with a URIBL failure flag if more than this number of URIBLs return a postive blacklisted response. This number should be less than or equal to URIBLmaxreplies and greater than 0. If the number of hits is greater or equal URIBLmaxhits, the email is flagged failed. If the number of hits is greater 0 and less URIBLmaxhits, the email is flagged neutral. Default: 1 -URIBLmaxtime (Maximum Time) This sets the maximum time in seconds to spend on each message performing URIBL checks. Default: 10 -URIBLsocktime (Socket Timeout) This sets the URIBL socket read timeout in seconds. Default: 1 -URIBLwhitelist (Whitelisted URIBL Domains*) This prevents specific domains from being checked by URIBL module. For example:files/uriblwhite.txt. Default: file:files/uriblwhite.txt -noURIBL (Dont Check Messages from these Addresses*) Don't validate URIBL when messages come from these addresses. Accepts specific addresses (user@domain.com), user parts (user) or entire domains (@domain.com). For example: fribo@thisdomain.com|jhanna|@sillyguys.org -AddURIBLHeader (Add X-Assp-Received-URIBL Header) Add X-Assp-Received-URIBL header to messages with positive reply from URIBL. Default: On -URIBLCacheExp (URIBL Cache Refresh Interval for Hits) Domains in cache will be removed after this interval in hours. Empty or 0 will disable the cache. Default: 24 -URIBLCacheExpMiss (URIBL Cache Refresh Interval for Misses) Domains in cache with status=2 (miss) will be removed after this interval in hours. Empty or 0 will prevent caching of non-hits. Default: 12 -URIBLError (Reply Code to Refuse Messages Failed by URIBL ) SMTP reply code to refuse failed URIBL message. The literal URIBLNAME (case sensitive) is replaced by the names of URIBLs with negative response.Notes On URIBL Default: 554 5.7.1 Blacklisted by URIBLNAME - contact postmaster@LOCALDOMAIN for resolution. ------ Attachment Blocking ----------------------------------------------- -DoBlockExes (Attachment Blocking ) Note:Attachment checking will only be done if Email::MIME::Modifier is installed. Scoring is done with baValencePB, testmode is set with attachTestMode. -AttachmentLog (Enable Attachment logging) Default: standard -BlockExes (External Attachment Blocking Level ) Set the level of Attachment Blocking to 1-3 for attachments that should be blocked, set level to 4 for attachments that should be allowed. Choose 0 for no attachment blocking. -BlockWLExes (Whitelisted Attachment Blocking) Set the level of Attachment Blocking to 0-4 for whitelisted senders. Choose 0 for no attachment blocking. -BlockLCExes (Local Attachment Blocking) Set the level of Attachment Blocking to 0-4 for local senders. Choose 0 for no attachment blocking. -BlockNPExes (NoProcessing Attachment Blocking) Set the level of Attachment Blocking to 0-4 for noprocessing messages. Choose 0 for no attachment blocking. -BadAttachL1 (Level 1 rejected File Extensions) This regular expression is used to identify Level 1 attachments that should be blocked. Separate entries with a pipe |. The dot . is assumed to precede these, so don't include it. For example: ad[ep]|asx|ba[st]|chm|cmd|com|cpl|crt|dbx|exe|hlp|ht[ab]|in[fs]|isp|js|jse|lnk|md[abez]|mht|ms[cipt]|nch|pcd|pif|prf|reg|sc[frt]|sh[bs]|vb|vb[es]|wms|ws[cfh] Default: exe|scr|pif|vb[es]|js|jse|ws[fh]|sh[sb]|lnk|bat|cmd|com|ht[ab] -BadAttachL2 (Level 2 rejected File Extensions) This regular expression is used to identify Level 2 attachments that should be blocked. Level 2 already includes all rejected extensions from Level 1. For example: (ad[ep]|asx|ba[st]|chm|cmd|com|cpl|crt|dbx|exe|hlp|ht[ab]|in[fs]|isp|js|jse|lnk|md[abez]|mht|ms[cipt]|nch|pcd|pif|prf|reg|sc[frt]|sh[bs]|vb|vb[es]|wms|ws[cfh]).zip -BadAttachL3 (Level 3 rejected File Extensions) This regular expression is used to identify Level 3 attachments that should be blocked. Level 3 includes Level 2 and Level 1. For example: zip|url -GoodAttach (Level 4 Allowed File Extensions) This regular expression is used to identify attachments that should be allowed. All others are blocked. Separate entries with a pipe |. The dot . is assumed to precede these, so don't include it. For example: ai|asc|bhx|dat|doc|docx|eps|gif|htm|html|ics|jpg|jpeg|hqx|od[tsp]|pdf|ppt|rar|rpt|rtf|snp|txt|xls|zip -AttachmentError (Reply Code to Refuse Rejected Attachments) The literal FILENAME (case sensitive) will be replaced with the name of the blocked attachment! Default: 550 5.7.1 These attachments are not allowed -- Compress before mailing. -BlockUuencoded (Refuse Uuencoded Mails) Default: On -UuencodedError (Reply to Refuse Uuencoded Mails) For example: 554 5.7.1 This mail is uuencoded and will be blocked Notes On Attachment Blocking Default: 554 5.7.1 This message is uuencoded and will be blocked. ------ ClamAV and FileScan ----------------------------------------------- -ScanLog (Enable Virus Check logging) Default: standard -noScan (Do Not Scan Messages from/to these Addresses*) Accepts specific addresses (user@example.com), user parts (user) or entire domains (@example.com). -noScanIP (Do Not Scan Messages from these IPs*) Enter IP addresses that you don't want to be scanned for virus , separated by pipes (|). For example: 145.145.145.145|145.146. -ScanWL (Scan Whitelisted Senders) Default: On -ScanNP (Scan NoProcessing Messages) -ScanLocal (Scan Local Senders) -ScanCC (Scan Copied Spam Mails) -AvError (Reply Code to Refuse Infected Messages) Reply code to refuse infected messages. The string INFECTION is replaced with the name of the detected virus. For example: 554 5.7.1 Mail appears infected with INFECTION -- disinfect and resend. Default: 554 5.7.1 Mail appears infected with INFECTION. -EmailVirusReportsTo (Send Virus Report To This Address) If set an email containing the Message ID, Remote IP, Message Subject, Sender email address, Recipient email address, and the virus detected will be sent to this address. For example: admin@example.com -EmailVirusReportsHeader (Add Full Header To Virus Report To Mail Address Above) If set the full message headers will also be added to Virus Reports. -EmailVirusReportsToRCPT (Send Virus Report To Recipient) If set the intended recipient of the message will be sent a copy of the Virus Report. -UseAvClamd (Use ClamAV) If activated, the message is checked by ClamAV, this requires an installed File::Scan::ClamAV Perl module and a running Clamd . The viruses will be stored in a special folder if the SpamVirusLog is set to 'quarantine' and the filepath to the viruslog is set. Scoring is done using vdValencePB. -modifyClamAV (Modify ClamAV Module) If set ClamAV modules ping and streamscan are modified. This may be disabled to use the original modules. NOTE: Changing this requires ASSP restart Default: On -AvClamdPort (Port or file socket for ClamAV) A socket specified in the clamav.conf file (located for example in /etc/clamav/clamd.conf) - LocalSocket. For example tmp/clamd.socket, tmp/clamd or /var/run/clamav/clamd.ctl. If the socket has been setup as a TCP/IP socket (see the TCPSocket option in the clamav.conf file), then specify the TCP socket. For example: 3310 Default: tmp/clamd.socket -ClamAVBytes (Scan Bytes) The number of bytes per message that will be scanned for virus and attachment blocking. Normally ASSP looks only at MaxBytes of a message. Values of 100000 or larger are not recommended. Default: 50000 -ClamAVtimeout (ClamAV Timeout) ClamAV will timeout after this many seconds. default: 10 seconds. Default: 10 -NoScanRe (Skip ClamAV Regular Expression*) Put anything here to identify messages which should not be checked for viruses. -SuspiciousVirus (No-Blocking Virus Scan Scoring Regex**) If a ClamAV or FileScan result matches this expression it will be scored with the suspicious virus score (vsValencePB) and the message will not be blocked. For example: UNOFFICIAL It is possible to weight such results. Every weighted regex that contains at least one '|' has to begin and end with a '~' - inside such regexes it is not allowed to use a '~', even it is escaped - for example: ~abc\~|def~=>23 or ~abc~|def~=>23. Every weighted regex has to be followed by '=>' and the weight value. For example: Phishing\.=>1.45The multiplication result of the weight and vsValencePB will be used for scoring, if the absolute value of weight is less or equal 6. Otherwise the value of weight is used for scoring. -DoFileScan (Use File System Virus Scanner) If activated, the message is written to a file inside the 'FileScanDir' with an extension of 'maillogExt'. After that ASSP will call 'FileScanCMD' to detect if the temporary file is infected or not. The temporary created file(s) will be removed. The viruses will be stored in a special folder if the SpamVirusLog is set to 'quarantine' and the filepath to the viruslog is set. -FileScanWL (Scan Whitelisted Senders) Default: On -FileScanNP (Scan NoProcessing Messages) Default: On -FileScanLocal (Scan Local Senders) -FileScanDir (File Scan Directory) Define the full path to the directory where the messages are temporary stored for the file system virus scanner. This could be any directory inside your file system. The running ASSP process must have full permission to this directory and the files inside! For defining any full filepathes, always use slashes ("/") not backslashes. Default: /Applications/assp/virusscan -FileScanCMD (File Scan Command) ASSP will call this system command and expects a returned string from this command. This returned string is checked against 'FileScanBad' and/or 'FileScanGood' to detect if the message is OK or not! If the file does not exists after the command call, the message is consider infected. ASSP expects, that the file scan is finished when the command returns! The literal 'FILENAME' will be replaced by the full qualified file name of the temporary file. The literal 'FILESCANDIR' will be replaced with the value of FileScanDir. All outputs of this command to STDERR are automatic redirected to STDOUT. FileScan will not run, if FileScanCMD is not specified. If you have your online/autoprotect file scanner configured to delete infected files inside the 'FileScanDir', define 'NORUN' in this field! In this case FileScanGood and FileScanBad are ignored. If there is a need to wait some time for the autoprotect scanner, write 'NORUN-dddd', where dddd are the milliseconds to wait! Depending on your operating system it may possible that you have to quote (' or ") the command, if it contains whitespaces. The replaced file name will be quoted by ASSP if needed. For example: 'd:\utility\touch.exe FILENAME' Default: NORUN -FileScanBad (RegEx to Detect BAD in Returned String*) Put anything here to identify bad messages by the string returned from the FileScanCMD. If this regular expression matches, the message is considered infected. -FileScanGood (RegEx to Detect GOOD in Returned String*) Put anything here to identify good messages by the string returned from the FileScanCMD. If this regular expression matches and 'FileScanBad' does not, the message is considered not infected. -FileScanRespRe (FileScan Reponds Regex) A regular expression that will be used over the text returned from the FileScanCMD. The result of this regex is used as virus name ($infection) in AvError. For example: infected by (.+) Notes On Virus Checks ------ Regex / Bombs ----------------------------------------------- -BombLog (Enable Bomb logging) Default: standard -DoBlackRe (Use Black Regular Expression to Identify Spam) Each incoming message is checked against the BlackRe. Scoring is done with blackValencePB - the scoring value is the sum of all valences(weights) of all found blackRe(s), testmode is set with blackTestMode. Default: block -blackRe (BlackRe - Regular Expression to Identify Spam ** ) If an incoming email matches this Perl regular expression it will be considered spam depending of blackReMaxHits or total weighted score. As all fields marked with two asterisk (**) this regular expressions (regex) can accept a second weight value. Every weighted regex has to be followed by '=>' and the weigth value. If a weighted regex contains at least one '|' it has to be escaped with a '~' - inside such regexes it is not allowed to use a '~', even it is escaped - for example: ~pre\-?qualif(y|ied)~=>0.5. Default: file:files/blackre.txt -blackReMaxHits (Maximum Hits in blackRe) The matching stops after this many hits and the total score will be used to determine if the message will be blocked or scored. The message will be scored if the total score is below bombValencePB. Default: 1 -blackReWL (Do Black Regular Expressions Checks for Whitelisted) -blackReNP (Do Black Regular Expressions Checks for NoProcessing) Default: On -blackReLocal (Do Black Regular Expressions Checks for Local Messages) -blackReISPIP (Do Black Regular Expressions Checks for ISPIP) Default: On -DoBombSenderRe (Use BombSender Regular Expressions on Envelope) If activated, each message-envelope (IP,Helo,Mail From) is checked against bombSenderRe. Scoring is done with bombValencePB, testmode is set with bombheaderTestMode. Default: block -bombSenderRe (Regular Expression to Identify Spam in Envelope *) Expression to identify mailfrom,ip and helo. Default: emailserver3.com -DoBombHeaderRe (Use Header Regular Expressions ) If activated, each message-header is checked against bombHeaderRe. Scoring is done with bombValencePB, testmode is set with bombheaderTestMode. Default: block -bombHeaderReMaxHits (Maximum Hits in bombHeaderRe(s)) The matching stops after this many hits and the total score will be used to determine if the message will be blocked or scored. The message will be scored if the total score is below bombValencePB. Default: 2 -bombHeaderRe (Regular Expression to Identify Spam in Header Part**) Header will be checked against this Regex if DoBombHeaderRe is enabled. Default: \\d\\s+(Jan|Feb|Mar|Apr|May|Jun|Jul|Aug|Sep|Oct|Nov|Dec)\\s+\\d\\d\\d\\d\\s+\\d\\d:\\d\\d(:\\d\\d)?\\s+[+\\-]\\d\\d[6-9]\\d -DoBombSubjectRe (Use Subject Regular Expression on Subject) If activated, each message subject is checked against bombSubjectRe. Scoring is done with bombValencePB, testmode is set with bombheaderTestMode. Default: block -bombSubjectRe (Regular Expression to Identify Spam in Subject**) Subject will be checked against this Regex if DoBombSubjectRe is enabled. Default: file:files/subjectre.txt -bombSubjectReMaxHits (Maximum Hits in bombRe) The matching stops after this many hits and the total score will be used to determine if the message will be blocked or scored. The message will be scored if the total score is below bombValencePB. Default: 3 -DoBombCharSets (Check Header with Foreign Charsets RegEx) If activated, each message header is checked against bombCharSets. Default: score -bombCharSets (Regular Expression to Identify Foreign Charsets** ) Header will be checked against this Regex if DoBombCharSets is enabled. A weight can be assigned. For example: charset=.?BIG5|charset=.?CHINESEBIG|charset=.?GB2312|charset=.?KS_C_5601|charset=.?KOI8=>0.5|charset=.?EUC-KR|charset=.?ISO-2022|charset=.?CP1251. Default: charset=.?BIG5|charset=.?CHINESEBIG|charset=.?GB2312|charset=.?KS_C_5601|charset=.?KOI8 =>0.5|charset=.?EUC-KR|charset=.?ISO-2022|charset=.?CP1251 -bombSuspiciousRe (Regular Expression to Score Blackish and/or Whitish Expressions**) Put here anything which might be suspicious (blackish) or trustworthy (whitish). bombSuspiciousValencePB will be used to increase/decrease the total score. Trustworthiness (whitish) will be assigned by using a negative weight. For example:news=>-1|no-?reply=>-0.5|passwor=>-0.7 Default: news=>-1|no-?reply=>-0.5|passwor=>-0.7 -bombSuspiciousReMaxHits (Maximum Hits in Suspicious Regular Expression) Number of matches to be scored. Default: 2 -DoBombRe (Use Bomb Regular Expressions) If activated, each message is checked against BombRaw and BombData Regular Expressions. Scoring is done with bombValencePB - the scoring value is the sum of all valences(weights) of all found bombRe(s), testmode is set with bombTestMode. Default: block -bombRe (BombRaw Regular Expression for Header and Data Part**) Header and Data will be checked against this Regular Expression if DoBombRe is enabled. For example:IMG [^>]*src=['"]cid|
]*>(<[^>]+>|\n|\r)*