OXIESEC PANEL
- Current Dir:
/
/
opt
/
alt
/
python27
/
lib
/
python2.7
/
site-packages
/
postomaat
/
conf
/
conf.d
Server IP: 2a02:4780:11:1084:0:327f:3464:10
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
12/18/2024 09:49:00 AM
rwxr-xr-x
📄
call-ahead.conf.dist
3.5 KB
03/16/2023 02:20:00 PM
rw-r--r--
📄
dbwriter.conf.dist
275 bytes
03/16/2023 02:20:00 PM
rw-r--r--
📄
enforcemx.txt.dist
226 bytes
03/16/2023 02:20:00 PM
rw-r--r--
📄
fakespf.txt.dist
219 bytes
03/16/2023 02:20:00 PM
rw-r--r--
📄
fluentwriter.conf.dist
207 bytes
03/16/2023 02:20:00 PM
rw-r--r--
📄
geoip.conf.dist
469 bytes
03/16/2023 02:20:00 PM
rw-r--r--
📄
originpolicy.conf.dist
161 bytes
03/16/2023 02:20:00 PM
rw-r--r--
📄
ratelimit.conf.dist
143 bytes
03/16/2023 02:20:00 PM
rw-r--r--
📄
ratelimit.rules.dist
144 bytes
03/16/2023 02:20:00 PM
rw-r--r--
📄
spfcheck.conf.dist
782 bytes
03/16/2023 02:20:00 PM
rw-r--r--
📄
suspectcollect.conf.dist
141 bytes
03/16/2023 02:20:00 PM
rw-r--r--
📄
suspectcollect.queries.dist
145 bytes
03/16/2023 02:20:00 PM
rw-r--r--
Editing: spfcheck.conf.dist
Close
[SPFPlugin] # which sending hosts/networks should be excluded from SPF checks, one ip per line. supports CIDR notation if netaddr module is installed ip_whitelist_file= # which sender domains should be checked for SPF. if this is empty, all domains are checked # one domain per line domain_selective_spf_file= # reject/defer template, ${result} is the spf code (neutral,fail,softfail,softerror, ...) , ${explanation} is a human readable explanation messagetemplate=SPF ${result} for domain ${from_domain} from ${client_address} : ${explanation} # what to do on softfail (eg. ~all) on_softfail=DUNNO # what to do on hard fail (eg. -all) on_fail=DUNNO #you can also use on_softerror / on_permerror etc if you want to defer messages with invalid spf records , lookup problems, ...