Home

The mail/rspamd port

rspamd-3.8.4 – event-driven spam filtering system in C/Lua (cvsweb github mirror)

Description

Rspamd is an advanced spam filtering system that allows evaluation of messages
by a number of rules including regular expressions, statistical analysis and
custom services such as URL black lists. Each message is analysed by rspamd and
given a spam score.

According to this spam score and the user's settings rspamd recommends an action
for the MTA to apply to the message- for example to pass, reject or add a
header. Rspamd is designed to process hundreds of messages per second
simultaneously and has a number of features available.

Some flavours are available, depending on the machine architecture:

	no_luajit	Disable luajit, available on all architectures
	(unflavoured)	Enable luajit, available on amd64/i386
	hyperscan	Use Intel's hyperscan library, available on amd64,
			requires certain CPU features.
WWW: https://rspamd.com/

Readme

+-------------------------------------------------------------------------------
| Running ${PKGSTEM} on OpenBSD
+-------------------------------------------------------------------------------

Configuration
=============

rspamd is very flexible and as a result configuration can be complex
if you feel like tweaking - you should certainly read the upstream
documentation rather than just trying to figure it out from the provided
configuration files! However the defaults are reasonable and in many
cases can be used as-is.

Unusually for OpenBSD packages, you should not normally edit the existing
files under /etc/rspamd. Instead, as directed by the headings at the
top of each file, files should be created under /etc/rspamd/local.d or
/etc/rspamd/override.d with your local changes. This will avoid the
chance of future package updates failing to update the standard system
configuration files with required changes.

https://rspamd.com/doc/faq.html#what-are-the-locald-and-overrided-directories

Redis
-----
The standard rspamd configuration has a certain spam score threshold
defined in actions.conf above which emails are greylisted. (Non-spammy
messages make it through without greylist; highly spammy messages are
blocked; medium-scoring messages are greylisted).

rspamd's greylisting requires a backend to store information about
attempts in order that senders can be whitelisted and the mail allowed
through. As some users had problems in the past if they didn't configure
rspamd to use redis themselves, this OpenBSD package provides
${SYSCONFDIR}/rspamd/local.d/redis.conf setup to use a redis server on
the local host by default to provide this store (so you will need
to have redis running as well as rspamd: "rcctl enable redis rspamd").
You are free to edit local.d/redis.conf to make changes as necessary
(i.e. the above warning about editing existing files doesn't apply
here).

Integration with MTAs and using sockets
---------------------------------------
For OpenSMTPd, you can either use the opensmtpd-filter-rspamd package which
has its own pkg-readme file, or use rspamd as an external mda (mail delivery
agent) which then hands the message over to another mda to deliver to the
mailbox.

For most other MTAs, see https://rspamd.com/doc/integration.html for details.
At least for Sendmail and Postfix, configure rspamd's proxy worker in Milter.
It's recommended to use unix sockets rather than the default TCP sockets -
if you use Postfix with chroot you will need to place the proxy socket in
that chroot - try configuration like this:

- in ${SYSCONFDIR}/rspamd/local.d/worker-controller.inc

    bind_socket = "/var/run/rspamd/controller_socket mode=0600 owner=_rspamd";

- in ${SYSCONFDIR}/rspamd/local.d/worker-normal.inc

    bind_socket = "/var/run/rspamd/normal_socket mode=0600 owner=_rspamd";

- in ${SYSCONFDIR}/rspamd/local.d/worker-proxy.inc
  (you will also need to mkdir -p /var/spool/postfix/var/run)

    bind_socket = "/var/spool/postfix/var/run/rspamd-milter.sock mode=0600 owner=_postfix";
    upstream "local" {
      default = yes;
      hosts = "/var/run/rspamd/normal_socket";
    }

- and in ${SYSCONFDIR}/postfix/main.cf use the chroot-relative path:

    smtpd_milters = unix:/var/run/rspamd-milter.sock
    non_smtpd_milters = unix:/var/run/rspamd-milter.sock
    milter_default_action = accept

Maintainer

Stuart Henderson

Only for arches

aarch64 alpha amd64 arm hppa i386 mips64 mips64el powerpc powerpc64 riscv64 sparc64

Categories

lang/python mail

Library dependencies

Build dependencies

Run dependencies

Test dependencies

Reverse dependencies

Files

Search