-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy path.env.example
More file actions
55 lines (44 loc) · 1.79 KB
/
.env.example
File metadata and controls
55 lines (44 loc) · 1.79 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
# /etc/spamhaus-dqs-milter.env
# Sample environment file for spamhaus-dqs-milter
# Recommended permissions:
# chown root:spamhausmilter /etc/spamhaus-dqs-milter.env
# chmod 0640 /etc/spamhaus-dqs-milter.env
# --- Required ---
# Your Spamhaus DQS key (inserted into the DQS query name)
SPAMHAUS_DQS_API_KEY=REPLACE_ME_WITH_YOUR_DQS_KEY
# --- Listener (pymilter socket spec) ---
# Default: inet:11332@localhost
SPAMHAUS_DQS_LISTEN=inet:11332@localhost
# --- Logging ---
# DEBUG, INFO, WARNING, ERROR
SPAMHAUS_DQS_LOG_LEVEL=INFO
# --- DNS resolver settings ---
# Comma-separated IPs of resolvers to use. Defaults assume a local resolver (e.g. unbound).
SPAMHAUS_DQS_NAMESERVERS=127.0.0.1,::1
# --- Timeouts (seconds) ---
# Overall milter stage timeout
SPAMHAUS_DQS_MILTER_TIMEOUT=2
# DNS total lifetime (must be < MILTER_TIMEOUT with headroom)
SPAMHAUS_DQS_DNS_LIFETIME=1.8
# Per-try timeout (dnspython)
SPAMHAUS_DQS_DNS_PER_TRY=0.7
# --- Cache ---
# Maximum cached entries
SPAMHAUS_DQS_CACHE_MAX=20000
# TTL (seconds) for positive hits
SPAMHAUS_DQS_CACHE_TTL_LISTED=600
# TTL (seconds) for negative results
SPAMHAUS_DQS_CACHE_TTL_UNLISTED=300
# --- ZEN (IP reputation) check at CONNECT ---
SPAMHAUS_DQS_ZEN_ENABLE=1
# Comma-separated ZEN return codes (127.0.0.X) to reject on
SPAMHAUS_DQS_ZEN_REJECT_CODES=2,3,4,9,10,11
# --- Whitelisting ---
# Exact IP matches (comma-separated)
#SPAMHAUS_DQS_IP_WHITELIST=192.0.2.10,2001:db8::1
# Exact domain matches (comma-separated) for HELO and MAIL FROM domains
#SPAMHAUS_DQS_DOMAIN_WHITELIST=example.com,example.net
# Domain suffix matches (comma-separated) — matches example.com and *.example.com
#SPAMHAUS_DQS_DOMAIN_SUFFIX_WHITELIST=example.edu,example.org
# If 1 and the connecting IP is whitelisted, skip all checks for that connection
SPAMHAUS_DQS_WHITELIST_SKIP_ALL=0