maddy/man/maddy-checks.5.scd
fox.cpp ab1fdac45d
Remove check scoring system
It fits poorly with limited amount of checks that are (and will be)
implemented in maddy.

Advanced filtering that requires "spam score" logic should be performed
by external software such as rspamd. At this point duplicating that
logic in maddy makes no sense, since it is highly problematic to
integrate it with external software.
2019-10-19 19:12:44 +03:00

156 lines
4 KiB
Markdown

maddy.conf(5) "maddy mail server - message checks"
# INTRODUCTION
This man page lists "message check" modules. "Checks" are meant to be used to reject
or quarantine messages that are unwanted, such as potential spam or messages with spoofed
sender address.
As a convention, most of modules listed here don't require a separate
configuration block explicitly and have implicit configuration block defined
with the name as a module itself. That is, you don't have to write this:
```
check {
verify_dkim { }
}
```
or this:
```
verify_dkim {
# empty
}
somewhere {
check {
verify_dkim
}
}
```
If default check behavior works fine for you. You can just use module name to reference
its default config:
```
check {
verify_dkim
}
```
# SEE ALSO
*maddy.conf*(5) for main man page.
# ACTIONS
When a certain check module thinks the message is "bad", it takes some actions depending
on its configuration. Most checks follow the same configuration structure and allow
following actions to be taken on check failure:
- Do nothing ('action ignore')
Useful for testing deployment of new checks. Check failures are still logged
but they have no effect on message delivery.
- Reject the message ('action reject')
Reject the message at connection time. No bounce is generated locally.
- Quarantine the message ('action quarantine')
Mark message as 'quarantined'. If message is then delivered to the local storage, the storage
backend can place the message in the 'Junk' mailbox. Another thing to keep in mind that
'remote' module (see maddy-targets(5)) will refuse to send quarantined messages.
# COMMON DIRECTIVES
All check modules have 'debug' directive to enable debug logging, just like most of maddy modules.
Here is the exact syntax of 'action'-like directives:
- action ignore
Ignore the check failure, useful for testing deployments to see
how useful it is.
- action reject
Reject the message instead of quarantining it.
- action quarantine
Quarantine the message, this is the default for most checks.
# DNS CHECKS
## require_matching_ehlo
Check that source server hostname (from EHLO/HELO command) resolves to source
server IP.
By default, quarantines messages coming from servers with mismatched
EHLO hostname, use fail_action to change that.
## require_mx_record
Check that domain in MAIL FROM command does have a MX record.
By default, quarantines messages coming from servers missing MX records,
use fail_action to change that.
## require_matching_rdns
Check that source server IP does have a PTR record point to the domain
specified in EHLO/HELO command.
By default, quarantines messages coming from servers with mismatched or missing PTR record,
use fail_action to change that.
# VERIFY_DKIM MODULE
This is the check module that performs verification of the DKIM signatures
present on the incoming messages.
It got an implicit configuration block defined like DNS checks above.
Example, to quarantine messages with invalid signatures (not a good idea, DKIM breaks
sometimes for weird reasons):
```
check {
...
verify_dkim {
broken_sig_action qurantine
}
}
```
Valid directives:
## debug [yes/no]
Toggle debug logging only for this module.
## required_fields <fields...>
Header fields that should be included in each signature. If signature
lacks any field listed in that directive, it will be considered invalid ("broken").
Default is 'From Subject'.
Note that From is always required to be signed, even if it is not
included in this directive.
## allow_body_subset
By default signatures that cover only body subset (using l= "body limit" tag)
are considered invalid ("broken"). This directive allows such signatures.
It should be noted that allowing use of "body limit" allows arbitrary
data to be appended to the message body.
## no_sig_action ...
Action to take when message without any signature is received.
Default is 'ignore', as recommended by RFC 6376.
## broken_sig_action ...
Action to take when message with invalid signature is received.
Default is 'ignore', as recommended by RFC 6376.