#include "policyd.h"


/*
 *
 *
 *                           Policy Daemon
 *
 *  policy daemon is used in conjuction with postfix to combat spam.
 *
 *  Copyright (C) 2004 Cami Sardinha (cami@mweb.co.za)
 *
 *
 *  This program is free software; you can redistribute it and/or modify it
 *  under the terms of the  GNU General  Public License as published by the
 *  Free Software Foundation;  either version 2 of the License, or (at your
 *  option) any later version.
 *
 *  This program  is  distributed  in the hope that  it will be useful, but
 *  WITHOUT  WARRANTY; without even the implied warranty of MERCHANTABILITY
 *  or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
 *  for more details.
 *
 *  You should have received a copy of the GNU General Public License along
 *  with this program; if not, write to the Free  Software Foundation Inc.,
 *  59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
 *
 *
 *
 */


/*
 * function: spamtrap_check
 *  purpose: check if there is a delivery attempt to a spamtrap
 *   return: 1=yes, 0=no
 */
int
spamtrap_check(unsigned int fd)
{
  
  if(DEBUG > 0)
    logmessage("DEBUG: fd: %d checking spamtrap\n", fd);

  /* reset value */
  mysql_optarray[fd][0] = 0;
    
  /* build up & execute query */
  snprintf(mysqlquery_array[fd], 512,
    "SELECT _active FROM spamtrap WHERE _rcpt='%s' AND _active=1", triplet_array[fd][2]);
  if(db_optquery(fd) == -1) return(db_failure(fd, "spamtrap"));

  /* we have a delivery attempt to a spamtrap */
  if(mysql_optarray[fd][0] == 1)
  {
    int expire=0;
    if(DEBUG > 0)
      logmessage("DEBUG: fd: %d spamtrap found: %s from: %s\n", fd, 
        triplet_array[fd][2],   /* rcpt */
        host_array[fd][2]);     /* host */

    /* never auto expire blacklist? */
    if(SPAMTRAP_AUTO_EXPIRE > 0)
      expire=timenow+SPAMTRAP_AUTO_EXPIRE;

    /* blacklist netblock /24 */
    if(BLACKLIST_NETBLOCK==1)
    {
      /* build up query */
      snprintf(mysqlquery_array[fd], 512,
        "INSERT DELAYED INTO blacklist (_blacklist,_description,_expire) VALUES ('%s','# spamtrap delivery: (%s)',%d)",
       host_array[fd][3], triplet_array[fd][2], expire);
    } else { /* blacklist host ip */
      /* build up query */
      snprintf(mysqlquery_array[fd], 512,
        "INSERT DELAYED INTO blacklist (_blacklist,_description,_expire) VALUES ('%s','# spamtrap delivery: (%s)',%d)",
      host_array[fd][2], triplet_array[fd][2], expire);
    }
    /* execute query */
    if(db_doquery(fd) == -1) return(db_failure(fd, "spamtrap"));
    
    logmessage("rcpt=%lu, spamtrap=new, host=%s (%s), from=%s, to=%s, size=%s, expire=%d\n",
      rcpt_count,                       /* recipient count      */
      host_array[fd][2],                /* host                 */
      host_array[fd][0],                /* hostname             */
      triplet_array[fd][1],             /* from                 */
      triplet_array[fd][2],             /* rcpt                 */
      triplet_array[fd][3],             /* size                 */
      expire                            /* expiry               */
    );

    return (1);
  }

  if(DEBUG > 0)
    logmessage("DEBUG: fd: %d spamtrap not found: %s\n", fd, triplet_array[fd][2]);

  /* no delivery attempted to spamtrap */
  return (0);
}
 
/* EOF */


syntax highlighted by Code2HTML, v. 0.9.1