????JFIF??x?x????'
Server IP : 79.136.114.73 / Your IP : 3.144.28.166 Web Server : Apache/2.4.7 (Ubuntu) PHP/5.5.9-1ubuntu4.29 OpenSSL/1.0.1f System : Linux b8009 3.13.0-170-generic #220-Ubuntu SMP Thu May 9 12:40:49 UTC 2019 x86_64 User : www-data ( 33) PHP Version : 5.5.9-1ubuntu4.29 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority, MySQL : ON | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /usr/share/sendmail/cf/hack/ |
Upload File : |
divert(-1)dnl #----------------------------------------------------------------------------- # $Sendmail: ./spamtrap.m4,v 8.12.0 2001/09/24 12:00:00 cowboy Exp $ # # hack(spamtrap) config file for building Sendmail # # Courtesy of jeff@sdsc.edu (Jeff Makey) # via c.m.s posting Sat, 8 Sep 2001 07:44:26 +0000 (UTC) # # Spamtrap addresses go into the access file like this: # # To:spamtrap@pandora.orbl.org POISON # To:Friend@public.com POISON # #----------------------------------------------------------------------------- # divert(0)dnl LOCAL_CONFIG # provide access to macros as a map Kmacro macro LOCAL_RULESETS ###################################################################### ### spamtrap: handle spamtrap(POISON) users ### ###################################################################### # # This is not only redundant, but fails with feature(`delay_checks') # #SLocal_check_mail # Clear the "poison recipient" indicator macro for this message. #R$* $: $(macro {PoisonRecipient} $) $1 SLocal_check_rcpt # # Spamtrap addresses go into the access file like this: # To:spamtrap@pandora.orbl.org POISON # # Certain recipients are "poison" and cause the # message to be rejected for all recipients. R$* $: $1 $| $1 create workspace to right of $| R$* $| $* <$+> $* $1 $| $3 focus on part in angle brackets R$* $| $+ $: $1 $| $>SearchList <!To> $| <E:$2> <> R$* $| <POISON> $: $1 $| $(macro {PoisonRecipient} $@ POISON $) R$* $| $* $: $1 delete workspace Scheck_eoh R$* $: $&{PoisonRecipient} RPOISON $#error $@ 5.7.1 $: 550 Mail sent to spam lists is not accepted here # # With a "To:Friend@public.com POISON" entry in the access file the # following ruleset will block certain types of spam too: # # Certain To headers are sure-fire spam signatures. HTo: $>CheckTo SCheckTo R$+ , $+ $@ $1 , $2 do not try to verify complex addresses R$* $: $1 $| $>SearchList <!To> $| <E:$1> <> R$* $| <POISON> $#error $@ 5.7.1 $: 550 Mail sent by spamware is not accepted here R$* $| $* $: $1 delete lookup result