nixos-config/config/services/rspamd.nix

201 lines
5.7 KiB
Nix

{
config,
lib,
pkgs,
...
}: {
services = {
# TODO: Antivirus
rspamd = {
enable = true;
locals = {
"dkim_signing.conf".text = ''
domain {
"darkkirb.de" {
selector = "dkim";
path = "${config.sops.secrets."services/rspamd/dkim/darkkirb.de".path}";
}
"miifox.net" {
selector = "dkim";
path = "${config.sops.secrets."services/rspamd/dkim/miifox.net".path}";
}
"chir.rs" {
selector = "dkim";
path = "${config.sops.secrets."services/rspamd/dkim/chir.rs".path}";
}
}
'';
"dmarc.conf".text = ''
actions {
reject = "reject";
quarantine = "quarantine";
softfail = "add_header";
}
'';
"greylist.conf".text = ''
greylist_min_score = 0;
'';
"hfilter.conf".text = ''
helo_enabled = true;
hostname_enabled = true;
url_enabled = true;
from_enabled = true;
rcpt_enabled = true;
mid_enabled = true;
'';
"history.conf".text = ''
nrows = 1000;
subject_privacy = true;
'';
"milter.conf".text = ''
use = [
"authentication-results"
"fuzzy-hashes"
"spam-header"
"stat-signature"
"x-rspamd-queue-id"
"x-rspamd-result"
"x-rspamd-server"
"x-rspamd-bar"
"x-spam-status"
];
'';
"mx_check.conf".text = ''
enabled = true;
'';
"neural.conf".text = ''
enabled = true;
rules {
LONG {
train {
max_trains = 5000;
max_usages = 200;
max_iterations = 25;
learning_rate = 0.01;
}
symbol_spam = "NEURAL_SPAM_LONG";
symbol_ham = "NEURAL_HAM_LONG";
ann_expire = "365d";
}
SHORT {
train {
max_trains = 5000;
max_usages = 2;
max_iterations = 25;
learning_rate = 0.01;
}
symbol_spam = "NEURAL_SPAM_SHORT";
symbol_ham = "NEURAL_HAM_SHORT";
ann_expire = "30d";
}
}
'';
"neural_group.conf".text = ''
symbols {
NEURAL_SPAM_LONG {
weight = 3.0; # sample weight
description = "Neural network spam (long)";
}
NEURAL_HAM_LONG {
weight = -3.0; # sample weight
description = "Neural network ham (long)";
}
NEURAL_SPAM_SHORT {
weight = 2.0; # sample weight
description = "Neural network spam (short)";
}
NEURAL_HAM_SHORT {
weight = -1.0; # sample weight
description = "Neural network ham (short)";
}
}
'';
"phishing.conf".text = ''
openphish_enabled = true;
'';
"reputation.conf".text = ''
rules {
ip_reputation {
selector.type = "ip";
backend.type = "redis";
symbol = "IP_REPUTATION";
}
spf_reputation {
selector.type = "spf";
backend.type = "redis";
symbol = "SPF_REPUTATION";
}
dkim_reputation {
selector.type = "dkim";
backend.type = "redis";
symbol = "DKIM_REPUTATION";
}
asn_reputation {
selector.type = "generic";
selector.selector = "asn";
backend.type = "redis";
symbol = "ASN_REPUTATION";
}
country_reputation {
selector.type = "generic";
selector.selector = "country";
backend.type = "redis";
symbol = "COUNTRY_REPUTATION";
}
}
'';
"replies.conf".text = ''
expire = "7d";
symbol = "REPLY";
'';
"redis.conf".text = ''
servers = "${config.services.redis.servers.rspamd.bind}:${toString config.services.redis.servers.rspamd.port}";
'';
"worker-controller.inc".text = ''
password = "$2$xkox1hi3so3y61no8ps1enx7p56nh51s$tp8fjciao1goswpcze6g9bb9sbx3mf3kbik1iznybgia36d78jnb";
'';
};
workers = {
rspamd_proxy = {
includes = ["$CONFDIR/worker-proxy.inc"];
bindSockets = ["*:11332"];
};
normal = {
includes = ["$CONFDIR/worker-normal.inc"];
bindSockets = ["*:11333"];
};
controller = {
includes = ["$CONFDIR/worker-controller.inc"];
bindSockets = ["*:11334"];
};
};
};
redis.servers.rspamd = {
enable = true;
bind = "127.0.0.1";
databases = 1;
port = 6380;
settings = {
maxmemory = "500mb";
maxmemory-policy = "volatile-ttl";
};
};
caddy.virtualHosts."rspamd.int.chir.rs" = {
useACMEHost = "int.chir.rs";
logFormat = pkgs.lib.mkForce "";
extraConfig = ''
import baseConfig
reverse_proxy http://127.0.0.1:11334
'';
};
};
sops.secrets."services/rspamd/dkim/darkkirb.de" = {owner = "rspamd";};
sops.secrets."services/rspamd/dkim/miifox.net" = {owner = "rspamd";};
sops.secrets."services/rspamd/dkim/chir.rs" = {owner = "rspamd";};
services.prometheus.exporters.rspamd = {
enable = true;
port = 58636;
};
}