The Perl Toolchain Summit needs more sponsors. If your company depends on Perl, please support this very important event.
NAME
     SyslogScan::Daemon::BlacklistDetector - notice when a mail server has been blacklisted

SYNOPSIS
     plugin SyslogScan::Daemon::BlacklistDetector
            debug           0

     bld_plugin SyslogScan::Daemon::BlacklistDetector::Postfix
            debug           0
            rx_ourIP        127\.0\.0\.1
            logpath         /var/log/mail.log

     bld_plugin SyslogScan::Daemon::BlacklistDetector::EmailNotify
            debug           0
            notify          your@email.here
            renotify_time   7200
            forget_time     3600
            sendfrom        root
            clean_time      1800
            maxkeep         100

DESCRIPTION
    SyslogScan::Daemon::BlacklistDetector watches the mail log for SMTP
    reject messages that indicate that your mail server has been blacklisted
    by another site.

    SyslogScan::Daemon::BlacklistDetector is a plugin for
    SyslogScan::Daemon. The SYNOPSIS shows the configuration lines you might
    use in "/etc/syslogscand.conf" to turn on the blacklist detector.

CONFIGURATION PREFIX
    The configuration prefix for plugins for
    SyslogScan::Daemon::BlacklistDetector is "bld_". Use "bld_plugin" to
    load plugins.

CONFIGURATION PARAMETERS
    SyslogScan::Daemon::BlacklistDetector defines the following
    configuration parameters which may be given in indented lines that
    follow "plugin SyslogScan::Daemon::BlacklistDetector" or with the
    confuration prefix ("bld_") anywhere in the configuration file after the
    "plugin SyslogScan::Daemon::BlacklistDetector" line.

    debug          (default 0) Turn on debugging.

WRITING PLUGINS
    Plugins for SyslogScan::Daemon::BlacklistDetector should subclass
    "SyslogScan::Daemon::BlacklistDetector::Plugin". Except for "new()" and
    "preconfig()", all of these methods are optional.

    SyslogScan::Daemon::BlacklistDetector will invoke the following methods
    on its plugins:

    new()          See notes for plugins for SyslogScan::Daemon.

    preconfig()    See notes for plugins for SyslogScan::Daemon.

    get_logs()     See notes for plugins for SyslogScan::Daemon.

    parse_logs()   Called after one of the regular expressions returned by
                   "get_logs()" matched a log line. The arguments are the
                   log filename where the match was found and the regular
                   expression that matched. Passed implicitly are the line
                   that was matched ($_) and any of the numbered regular
                   expression submatches ($1, $2, etc).

                   The return value is a %hash of information. The hash
                   should be completely empty if the log line is not a SMPT
                   rejection.

                   The following keys are required:

                   status         This should be "deferred" for a 4XX
                                  rejection and "bounced" for a 5XX
                                  rejection.

                   logline        This should be the whole log line ($_).

                   sourceip       The IP address used by the MTA for sending
                                  email. This may be "unknown".

                   destdomain     The domain of the recipient that bounced.

                   to_address     The recipient that bounced.

                   The return value is the %info hash passed to exactly one
                   of the following: "grelisted()", "recipient_reject()",
                   "sender_reject()", "content_reject()"
                   "realtime_reject()", and "blacklisted()".

    greylisted(%info)
                   This is called if the "logline" returned by
                   "parse_logs()" contatins the word "greylisted".

    recipient_reject(%info)
                   This is called if the "logline" returned by
                   "parse_logs()" matches a regular expression that
                   indicates that the rejection was due to being sent to a
                   particular recipient.

                   The regular expression is hard-coded to encourage
                   everyone to share any changes with the author.

    sender_reject(%info)
                   This is called if the "logline" returned by
                   "parse_logs()" matches a regular expression that
                   indicates that the rejection was due to being sent from a
                   particular sender.

                   The regular expression is hard-coded to encourage
                   everyone to share any changes with the author.

    content_reject(%info)
                   This is called if the "logline" returned by
                   "parse_logs()" matches a regular expression that
                   indicates that the rejection was due to the content of
                   the message sent.

                   The regular expression is hard-coded to encourage
                   everyone to share any changes with the author.

    realtime_reject(%info)
                   This is called if the "logline" returned by
                   "parse_logs()" matches a regular expression that
                   indicates that the rejection was due to a transitory
                   blacklist.

                   The regular expression is hard-coded to encourage
                   everyone to share any changes with the author.

    blacklisted(%info)
                   This is called for lines that don't match the regular
                   expressions for "grelisted()", "realtime_reject()",
                   "sender_reject()", or "recipient_reject()" or
                   "content_reject()".

    periodic()     See notes for plugins for SyslogScan::Daemon.

LICENSE
    Copyright (C) 2006, David Muir Sharnoff <muir@idiom.com>

    This module may be used and copied on the same terms as Perl itself.

    If you need help writing additional modules for BlacklistDetector.pm,
    I'm usually available to do so. Inquire for rates.

SEE ALSO
    The context for the blacklist detector: SyslogScan::Daemon, Plugins,
    Plugins::API.

    Plugins for the blacklist detector:
    SyslogScan::Daemon::BlacklistDetector::Postfix,
    SyslogScan::Daemon::BlacklistDetector::EmailNotify.