This commit is contained in:
2022-09-20 01:23:54 +02:00
parent 68e7e0e174
commit f80772ed42
98 changed files with 4127 additions and 89 deletions

View File

@ -0,0 +1,22 @@
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
# ---
# hosts blocked by postfwd
#
# This file is called with '=~'. This means perl regexp is possible
#
#
# To increase performance use ^ and/or $ in regular expressions
#
# Example:
#
# # block all hosts of domain 'oopen.de'
# \.oopen\.de$
#
# # block host a.mx.oopen.de
# ^a\.mx\.oopen\.de$
#
# ---
# give hostnames to blocke here

View File

@ -0,0 +1,16 @@
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
# ---
# Networks blocked by postfwd
#
# Example:
#
# # web0.warenform.de
# #83.223.86.76
# #2a01:30:0:505:286:96ff:fe4a:6ee
# #2a01:30:0:13:286:96ff:fe4a:6eee
#
# ---
# give networks to block here

View File

@ -0,0 +1,38 @@
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
# ---
# Sender addresses blocked by postfwd
#
# This file is called with '=~'. This means perl regexp is possible
#
#
# To increase performance use ^ and/or $ in regular expressions
#
# @acieu\.co\.uk$
# ^error@mailfrom.com$
#
# instedt of
#
# @acieu.co.uk
# error@mailfrom.com
#
#
# Example:
#
# # # annoying spammer domains
# # block all senders of maildomaindomain 'oopen.de'
# @acieu\.co\.uk$
#
# # annoying spammer addresses
# # block sender address
# error@mailfrom.com
# sqek@eike\.se$
#
# ---
# annoying spammer domains
@acieu\.co\.uk$
# annoying spammer addresses
^error@mailfrom\.com$
^sqek@eike\.se$

View File

@ -0,0 +1,13 @@
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
# ---
# SASL Users blocked by postfwd
#
# Example:
#
# # give SASL usernames to block here
# ckubu@oopen.de
#
# ---
# give SASL usernames to block here

View File

@ -0,0 +1,172 @@
#======= Definitions ============
# Match messages with an associated SASL username
&&SASL_AUTH {
sasl_username!~^$
}
# Trusted networks
&&TRUSTED_NETS {
client_address==file:/etc/postfix/postfwd.wl-nets
}
# Trusted hostnames
# client_name~=.warenform.de$
&&TRUSTED_HOSTS {
client_name=~file:/etc/postfix/postfwd.wl-hosts
}
# Trusted users
&&TRUSTED_USERS {
sasl_username==file:/etc/postfix/postfwd.wl-user
}
# Trusted senders
&&TRUSTED_SENDERS {
sender=~file:/etc/postfix/postfwd.wl-sender
}
# Blacklist networks
&&BLOCK_NETS {
client_address==file:/etc/postfix/postfwd.bl-nets
}
# Blacklist hostnames
&&BLOCK_HOSTS {
client_name=~file:/etc/postfix/postfwd.bl-hosts
}
# Blacklist users
&&BLOCK_USERS {
sasl_username==file:/etc/postfix/postfwd.bl-user
}
# Blacklist sender adresses
&&BLOCK_SENDER {
# =~
# using '=~' allows also matching entries for domains (i.e. @acieu.co.uk)
sender=~file:/etc/postfix/postfwd.bl-sender
}
# Inbound emails only
&&INCOMING {
client_address!=127.0.0.1
}
#======= Rule Sets ============
# ---
#
# Processing of the Rule Sets
#
# The parser checks the elements of a policy delegation request against the postfwd set
# of rules and, if necessary, triggers the configured action (action=). Similar to a
# classic firewall, a rule is considered true if every element of the set of rules (or
# one from every element list) applies to the comparison. I.e. the following rule:
#
# client_address=1.1.1.1, 1.1.1.2; client_name==unknown; action=REJECT
#
# triggers a REJECT if the
#
# Client address is equal (1.1.1.1 OR 1.1.1.2) AND the client name 'unknown'
#
#
# Note:
# If an element occurs more than once, an element list is formed:
#
# The following rule set is equivalent to the above:
#
# client_address=1.1.1.1; client_address=1.1.1.2; client_name==unknown; action=REJECT
#
#
# triggers a REJECT if (as above) the
#
# Client address (1.1.1.1 OR 1.1.1.2) AND the client name 'unknown'
#
# ---
# Whitelists
# Whitelist trusted networks
id=WHL_NETS
&&TRUSTED_NETS
action=DUNNO
# Whitelist trusted hostnames
id=WHL_HOSTS
&&TRUSTED_HOSTS
action=DUNNO
# Whitelist sasl users
id=WHL_USERS
&&TRUSTED_USERS
action=DUNNO
# Whitelist senders
id=WHL_SENDERS
&&INCOMING
&&TRUSTED_SENDERS
action=DUNNO
# Blacklists
# Block networks
id=BL_NETS
&&BLOCK_NETS
action=REJECT Network Address $$client_address blocked by Mailserver admins. Error: BL_NETS
# Block hostname
id=BL_HOSTS
&&BLOCK_HOSTS
action=REJECT $$client_name blocked by Mailserver admins. Error: BL_HOSTS
# Block users
id=BL_USERS
&&BLOCK_USERS
action=REJECT User is blocked by Mailserver admins. Error: BL_USERS
# Blacklist sender
#
# Claim successful delivery and silently discard the message.
#
id=BL_SENDER
&&BLOCK_SENDER
#action=DISCARD
action=REJECT Sender address is blocked by Mailserver admins. Error: BL_SENDER
# Rate Limits
# Throttle unknown clients to 5 recipients per 5 minutes:
id=RATE_UNKNOWN_CLIENT_ADDR
sasl_username =~ /^$/
client_name==unknown
action=rate(client_address/5/300/450 4.7.1 only 5 recipients per 5 minutes allowed)
# Block clients (ip-addresses) sending more than 50 messages per minute exceeded. Error:RATE_CLIENT)
id=RATE_CLIENT_ADDR
&&INCOMING
action=rate($$client_address/50/60/421 421 4.7.0 Too many connections from $$client_address)
# Block messages with more than 50 recipients
id=BLOCK_MSG_RCPT
&&INCOMING
&&SASL_AUTH
recipient_count=50
action=REJECT Too many recipients, please reduce to less than 50 or consider using a mailing list. Error: BLOCK_MSG_RCPT
# Block users sending more than 50 messages/hour
id=RATE_MSG
&&INCOMING
&&SASL_AUTH
action=rate($$sasl_username/50/3600/450 4.7.1 Number messages per hour exceeded. Error:RATE_MSG)
# Block users sending more than 250 recipients total/hour
id=RATE_RCPT
&&INCOMING
&&SASL_AUTH
action=rcpt($$sasl_username/250/3600/450 4.7.1 Number recipients per hour exceeded. Error:RATE_RCPT)

View File

@ -0,0 +1,22 @@
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
# ---
# Trusted hosts whitelisted by postfwd
#
# This file is called with '=~'. This means perl regexp is possible
#
#
# To increase performance use ^ and/or $ in regular expressions
#
# Example:
#
# # all hosts of domain 'oopen.de'
# \.oopen\.de$
#
# # host a.mx.oopen.de
# ^a\.mx\.oopen\.de$
#
# ---
# give truested hostnames here

View File

@ -0,0 +1,15 @@
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
# ---
# Trusted networks whitelisted by postfwd
#
# Example:
#
# # web0.warenform.de
# #83.223.86.76
# #2a01:30:0:505:286:96ff:fe4a:6ee
# #2a01:30:0:13:286:96ff:fe4a:6eee
#
# ---
# give truested networrk adresses here

View File

@ -0,0 +1,22 @@
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
# ---
# Trusted senders whitelisted by postfwd
#
# This file is called with '=~'. This means perl regexp is possible
#
#
# To increase performance use ^ and/or $ in regular expressions
#
# Example:
#
# # all senders of maildomaindomain 'oopen.de'
# @oopen\.de$
#
# # sender address ckubu@oopen.de
# ^ckubu@oopen\.de$
#
# ---
# give trusted sender addresses here

View File

@ -0,0 +1,15 @@
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
# ---
# SASL Users whitelisted by postfwd
#
# example:
#
# # give trusted sasl usernames here
# ckubu@oopen.de
# vertrieb@akweb.de
#
# ---
# give trusted sasl usernames here

View File

@ -0,0 +1,49 @@
-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAACFwAAAAdzc2gtcn
NhAAAAAwEAAQAAAgEA7Sc91UspRVsl8iTDPPolc2stWad9O27ohFYK1yYp08oGDDB4h+Ju
JbA90Rn7nSXZInLH4d1VzbeB6bvsRgV2P9T5+I6jPXXT4tBEhEgtnBI+96ALlywJO6Eivq
kEWApS2YEvhGbPlIBqZaUedN2CdqNK5yo8hfRFWU5/h2ri1bNehkOUuZWCLJq/YD1iIuRD
rPvSo0lk4sn7/0j8QKCe/D6oJzU0dwd6rIxn9lmmpykX7lkSUjJvLBZ0MPgmRbFyIlrVz/
pyQzowMjbHiT9yQ+hoZqhlAZFozL0KYc3JpF6ZG+V3ZHxz5j5fYU9IrA5KF9auBTqvZCuX
XTHPaZdX8tmwZ2A1ECVKxo/+HvjKrg4L82VZc+trvnxR4Q64MSvBBletVxaUdZ6xIw5wpq
JzhZViGLC4dway+Cwb5FEFXbdjm9XowJw93FD0fJ9x15KkIK58s67yakyaE9o5MvbqbNdj
ZSKyW9Lfc900TdvFyC2lCT3jDMjZFgpb1uNUsjDbjTDUd2nXEzwAoC79+aRNgNuo8uCJxR
x01H+Zm9cqHcuYl+mppKp70Fe9i0y69WEd+6KuudCh67ZMMqgFCAbGXcNtFiSJChgMMsMx
1P7TmahjkblvdwQK6+KgiHBT70SDwC9ibeIKm8x2TAAxCQV176y54cbg/f5cxR0GbfB6bl
0AAAdA4BwyZOAcMmQAAAAHc3NoLXJzYQAAAgEA7Sc91UspRVsl8iTDPPolc2stWad9O27o
hFYK1yYp08oGDDB4h+JuJbA90Rn7nSXZInLH4d1VzbeB6bvsRgV2P9T5+I6jPXXT4tBEhE
gtnBI+96ALlywJO6EivqkEWApS2YEvhGbPlIBqZaUedN2CdqNK5yo8hfRFWU5/h2ri1bNe
hkOUuZWCLJq/YD1iIuRDrPvSo0lk4sn7/0j8QKCe/D6oJzU0dwd6rIxn9lmmpykX7lkSUj
JvLBZ0MPgmRbFyIlrVz/pyQzowMjbHiT9yQ+hoZqhlAZFozL0KYc3JpF6ZG+V3ZHxz5j5f
YU9IrA5KF9auBTqvZCuXXTHPaZdX8tmwZ2A1ECVKxo/+HvjKrg4L82VZc+trvnxR4Q64MS
vBBletVxaUdZ6xIw5wpqJzhZViGLC4dway+Cwb5FEFXbdjm9XowJw93FD0fJ9x15KkIK58
s67yakyaE9o5MvbqbNdjZSKyW9Lfc900TdvFyC2lCT3jDMjZFgpb1uNUsjDbjTDUd2nXEz
wAoC79+aRNgNuo8uCJxRx01H+Zm9cqHcuYl+mppKp70Fe9i0y69WEd+6KuudCh67ZMMqgF
CAbGXcNtFiSJChgMMsMx1P7TmahjkblvdwQK6+KgiHBT70SDwC9ibeIKm8x2TAAxCQV176
y54cbg/f5cxR0GbfB6bl0AAAADAQABAAACAQCfv1lFfjW0xGtRKzZgstfbYYzQ4aPYDyON
UTBIMSrnwSRFvbjTP9GWjZt2aRw2hTI4pDzEhoWv5zcZrT7BBBjdcqdXqS2IzwAFvukIel
5OzXOg9iwYjs9BXY+8ArosW/fnD8BkXaTikYYaJhnX+wZQyDpCcQ8H5L16JQh+vZ9C+Gpp
4sgiIvXm+e6D85VRj5WOxqri1yOgKRMYqZ9SIWA25jX7AznuHBmkdYfqSAWcgG/gXBudRt
/gQNfPzLhrJdaOEcYJLNkfM+kXShMq/pQH7lu1GyW+4qZHk+eUbjyv/hEA25eLFtIzfDxf
njqDu7RpTnE2kIto3Hw/iLgAlrPkVI8nEoEL7GkWmpm9EyyHL+OgGjEa/PQ4VK9w+WY+Iw
iwFORpyFA2uDpuiPYsLkNto//85o2IrBCSx/KMaGhx/INL+4CcKGLjXu/OBFok29vRm44+
U8HwNbStN+iyGLqEdH/hbc3Gu6dre8MRRd4h+9aaCncRh5y59mEKNeGwOMmfO6mzu4G1Tq
ywuoN6MYqGNpB1TMVN4xS0hLk9m1hfg1WHUeOTqlobRUmZT+ObqJBGIQ45valZSOoHLFLZ
p6cw0XasEfl6MWNwHngroi209g71gLL9QzBhK8dJbYd48CtuK9sA7yT6iQ5UlLBueAkpuG
RBnoGSVACRhHen+OuUQQAAAQAFWpaNWlPWSNZABzyHSLI76ztgYpY36tix9YfCtXz6IZS5
3RFTTkhVgOS+9Z26K7V1jcvTGCo0sEmJPkrChPhtXQhPRJEaNqX3LWAknPDA2Aj2/LUhs4
OtygE+todFLOxMi/Sk60BrXHG10xsgHVERN+41G3+K0X+sn7DwBzksO30CSqssRrHe2bgq
U5ga/Jos6pPBgqhcTAZWinvgDRzoCfCSdzLXjK5l1pbpV8wlgmlgyEkFyJcXqE4XSz9tS7
iJ9E2+L8DwR9b/QorosvEQmlFV1uRFGdZQ/qsBGYAiT5wW232r/5+X3YlaGCD2tFEr0FDL
A+MZDe4pz/oswgNoAAABAQD21D98tn3/3B9wtC3ynatTuJnYZI6lgkyiDVbteMYZ22bK7I
TZrkfrypc4TW8Hb+e2y/gEUTwQ6zfBHtv9f4yss2vmYfy4dKmCaD2TZg38kAYmFItQSKpI
1dFy6+GByqQaZ5ziYXjQM1qpX35Y9EDTuLHWwZfNfuNtc0Jt/Zu5l1Nc0QqHmf8AZWFo5H
BMqcFYkBjPfddO/+DDoCy32vBlrPFcr6/zNKESCnaTDopuWqpV9NRWcjOmF+JbNY9CdIDn
jp1+mYRsGs26DuoLIqFt26/K2PNI7XyHUocFzHUSmiLZdRAazsK3fYOgKfsEJLkUhlYW52
KT0REZ9MSIUHgpAAABAQD19vXtTjeDDlmIwgoX7EHyCX6bXaQL2Iz/fJUeqnsgJV7NIVLC
6aPp2DrjBMoSly1TtDgKQDJDlU67hDExD3sqXb8kQjBb5ivfT8H/cC7quj8R3aUX5yNIdK
tcZogt/aULr05k5nkdDnoGvExbVMVsXEX0FbtFzDIbmRKyKPlXQdwcH6KHTYgd253tbU3K
/Oz1N2DTqsgAukZiUvq4+zcebNXogGygd2M7+bhc3Kftz6Fo/+5ud1qGXha261dxeKG3rM
zeROefUKOqLtENRLhTX7i9ARCEPGM8Z8Hmwq6JzJVHfh1ovxF4egImW2Y9NfikKK2qLkei
tYQtI6i7GlsVAAAACXJvb3RAZS5teAE=
-----END OPENSSH PRIVATE KEY-----

View File

@ -0,0 +1 @@
ssh-rsa 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 root@e.mx-dehydrated

View File

@ -0,0 +1,49 @@
-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----

View File

@ -0,0 +1 @@
ssh-rsa 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 root@e.mx-opendkim

View File

@ -1,3 +1,5 @@
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
#---------------------------------------
#-----------------------------
# Settings for script check_cert_for_dovecot.sh

View File

@ -1,3 +1,5 @@
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
#---------------------------------------
#-----------------------------
# Settings

View File

@ -1,3 +1,5 @@
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
# ---------------------------------------------------------
# - Parameter Settings for script 'create_opendkim_key.sh'.
# ---------------------------------------------------------

View File

@ -1,3 +1,5 @@
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
# ----------------------------------------------------
# ---
# - Parameter Settings for script 'postfix_add_mailboxes.sh'.

View File

@ -1,3 +1,5 @@
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
# ----------------------------------------------------
# ---
# - Parameter Settings for script 'sent_userinfo_postfix.sh'.

View File

@ -1,3 +1,5 @@
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
# ======================================================
# ---
# Parameter Settings for Script 'whitelist_mb_sigs.conf'