mailcow-dockerized-docs/docs/u_e-rspamd.md

89 Zeilen
3,4 KiB
Markdown

2018-02-28 22:08:40 +01:00
Rspamd is used for AV handling, DKIM signing and SPAM handling. It's a powerful and fast filter system. For a more in-depth documentation on Rspamd please visit its [own documentation](https://rspamd.com/doc/index.html).
2017-05-06 16:50:21 +02:00
## Learn Spam & Ham
2017-05-06 00:22:26 +02:00
Rspamd learns mail as spam or ham when you move a message in or out of the junk folder to any mailbox besides trash.
2018-02-08 23:00:33 +01:00
This is achieved by using the Dovecot plugin "antispam" and a simple parser script.
2017-05-06 00:22:26 +02:00
Rspamd also auto-learns mail when a high or low score is detected (see https://rspamd.com/doc/configuration/statistic.html#autolearning)
The bayes statistics are written to Redis as keys `BAYES_HAM` and `BAYES_SPAM`.
2017-05-09 17:43:26 +02:00
You can also use Rspamd's web UI to learn ham and / or spam or to adjust certain settings of Rspamd.
2017-05-06 00:22:26 +02:00
2017-05-06 16:50:21 +02:00
### Learn Spam or Ham from existing directory
2017-05-06 00:22:26 +02:00
You can use a one-liner to learn mail in plain-text (uncompressed) format:
```
# Ham
for file in /my/folder/cur/*; do docker exec -i $(docker-compose ps -q rspamd-mailcow) rspamc learn_ham < $file; done
# Spam
for file in /my/folder/.Junk/cur/*; do docker exec -i $(docker-compose ps -q rspamd-mailcow) rspamc learn_spam < $file; done
```
Consider attaching a local folder as new volume to `rspamd-mailcow` in `docker-compose.yml` and learn given files inside the container. This can be used as workaround to parse compressed data with zcat. Example:
```
for file in /data/old_mail/.Junk/cur/*; do rspamc learn_spam < zcat $file; done
```
2019-07-17 09:21:57 +02:00
### Reset learned data
You need to delete keys in Redis to reset learned mail, so create a copy of your Redis database now:
**Backup database**
```
# It is better to stop Redis before you copy the file.
cp /var/lib/docker/volumes/mailcowdockerized_redis-vol-1/_data/dump.rdb /root/
```
**Reset Bayes data**
```
docker-compose exec redis-mailcow sh -c 'redis-cli --scan --pattern BAYES_* | xargs redis-cli del'
docker-compose exec redis-mailcow sh -c 'redis-cli --scan --pattern RS* | xargs redis-cli del'
```
If it complains about...
```
(error) ERR wrong number of arguments for 'del' command
```
...the key pattern was not found and thus no data is available to delete.
2017-05-06 16:50:21 +02:00
## CLI tools
2017-05-06 00:22:26 +02:00
```
docker-compose exec rspamd-mailcow rspamc --help
docker-compose exec rspamd-mailcow rspamadm --help
```
## Disable Greylisting
You can disable rspamd's greylisting server-wide by editing:
`{mailcow-dir}/data/conf/rspamd/local.d/greylist.conf`
Simply add the line:
`enabled = false;`
Save the file and then restart the rspamd container.
2017-05-06 00:22:26 +02:00
See [Rspamd documentation](https://rspamd.com/doc/index.html)
## Whitelist specific ClamAV signatures
You may find that legitimate (clean) mail is being blocked by ClamAV (Rspamd will flag the mail with `VIRUS_FOUND`). For instance, interactive PDF form attachments are blocked by default because the embedded Javascript code may be used for nefarious purposes. Confirm by looking at the clamd logs, e.g.:
`docker-compose logs clamd-mailcow | grep FOUND`
This line confirms that such was identified:
`clamd-mailcow_1 | Sat Sep 28 07:43:24 2019 -> instream(local): PUA.Pdf.Trojan.EmbeddedJavaScript-1(e887d2ac324ce90750768b86b63d0749:363325) FOUND`
To whitelist this particular signature (and enable sending this type of file attached), add it to the ClamAV signature whitelist file:
`echo 'PUA.Pdf.Trojan.EmbeddedJavaScript-1' >> data/conf/clamav/whitelist.ign2`
Then restart the clamd-mailcow service.