Services

chroot_execvp()

Execute an external command (or start an daemon).

This service can be used to start external daemons used by sagator.

Usage: chroot_execvp('daemon_name',args=[],pid_file='')

Where: daemon_name is a string, which defines command name
       args are strings, which defines command line arguments
       pid_file is an string to filename with PID of started daemon
       pgrp_file is an string to a process group filename

Example: chroot_execvp('/usr/sbin/clamd','-c','/etc/clamav.conf')

New in version 0.7.0.

chroot_execvpe()

Execute an external command (or start an daemon) and update variables.

This service can be used to start external daemons used by sagator.
You also can set environment varibles.

Usage: chroot_execvpe('daemon_name',args=[],env={})

Where: daemon_name is a string, which defines command name
       args are strings, which defines command line arguments
       env is an dictionary of environment variables
       pid_file is an string to filename with PID of started daemon
       pgrp_file is an string to a process group filename

Example: chroot_execvpe('/usr/sbin/clamd',['-c','/etc/clamav.conf'],
                        {'LANG': 'C'})

New in version 0.7.0.

collector()

Statistics collector service.

This service can be used to collect some data for statistics.

Usage: collector(ip_or_hostname='', port=-1,
                 statfile='/var/lib/sagator/status')

Where: ip_or_hostname is an string, which defines IP to bind to
       port is an integer, which defines port number to bind to.
         If port<0 (default), no tcp socket will listen and only
         statistics from file will be processed. It is effective
         for large servers.
       statfile is an string, which defines where to store status

Examples: collector()
      or: collector('0.0.0.0',28)

fusefs()

Fuse filesystem with antivirus checking.

This service can be used to check filesystem access for viruses.

Usage: fusefs(SCANNERS, mountpoint, root_path='/')

Where: mountpoint is a string, which defines an directory, where files
         will be accessed.
       root_path is a path, which files will real files.

Example: fusefs(SCANNERS, '/home', '/realhome')

New in version 0.8.0.

http_proxy()

HTTP proxy service (experimental).

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!  WARNING! This service is experimental! Use at your risk!  !!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

This service can be used as filtering HTTP proxy.

Usage: http_proxy(scanners, host, port, prefork=2)

Where: scanners is an array of scanners (see README.scanners for more info)
       host is a an ip address to bind
       port is a port to bind
       prefork is a number, which defines preforked process count

Example: http_proxy(SCANNERS, '127.0.0.1', 3128)

Warning! Do not forget to block access to this port for non-local users.

lmtpd()

LMTP daemon service.

This service can be used to start sagator as separate filtering LMTP
daemon. Is is useful for postfix and any other LMTP client, which
can use these filters.
LMTP protocol is useful, if you want to set different filters for
different users.

Usage: lmtpd(scanners, host, port, prefork=2)

Where: scanners is an array of scanners (see README.scanners for more info)
       host is a an ip address to bind
       port is a port to bind
       prefork is a number, which defines preforked process count.
         Set this parameter to actual processor count + 1
         or leave it's default (2).

Example: lmtpd(SCANNERS, '127.0.0.1', 27)

New in version 0.7.0.

milter()

Milter support service.

This service can be used to start sagator as milter filter.

Usage: milter(scanners, name, connection, umask)

Where: scanners is an array of scanners (see README.scanners for more info)
       name is an string, milter service name
       connection in an string, which defines, where should milter service
         listen
       umask is an integer, which defines which umask should be set before
         creating local socket

Example: milter(SCANNERS, "sagator", "inet:3333@127.0.0.1")

For more information about milter's parameters see milter documentation.

You need python's milter module to run this service:
  http://www.bmsi.com/python/milter.html

recipient_policy()

Virtual recipient policy.

This policy check is invoked after an "RCPT TO:" smtp command is received.
You can use an policy scanner combination as scanner. It is useable for
postfix's before-queue policy filter or an policy filter for milter.
This service must be defined before service, which want to use it.

Usage: recipient_policy(scanners, dbc)

Where: scanners is an array of policy scanners
         (see README.scanners for more info)
       dbc is an database connection

Example: recipient_policy(POLICY_SCANNERS, db.sqlite())

New in version 0.8.0.

reporter()

Reporter virtual service.

This service is only a virtual service to configure parameters for
reporter script.

Usage: reporter(...parameters...)

There you can define some parameters:
"begin", "body", "end", "include", "exclude", "include_fx", "exclude_fx"
and "groups".

First three parameters are email templates. "begin" is report header.
It must contain RFC2822 headers. "body" is message part displayed for each
rejected/dropped message. "end" is report's tailer, added to message
after all "body"s. See srv/reporter.py file for example.

"webq" parameter must define base URL to webq() service. This parameter
is autodetected as your server hostname + standard webq() root directory.
A row with this URL is added to your standard body, if no user body
defined.

"groups" parameter can be used to define email groups, for example you
can define to send reports only to admin for each domain on you server:
  reporter(groups=[
                   ['@mydomain1.com$', 'admin@mydomain1.com'],
                   ['@domain2.sk$', 'admin@domain2.sk'],
                   ['.', 'root@localhost'] # send other to root
                  ])
It is possible to define empty string as target to ignore some records.

Example: reporter(include='@mydomain.sk$')

Groups are new in version 0.9.0.

rlimit()

Resource limit virtual service.

This service can be used to set resource limits for sagator.

Usage: rlimit(PARAM1=value1, PARAM2=value1, ...)

Where: PARAM1,... are resource parameter names
       value1,... are resource values

For example you can use there resource parameter names:
  AS for the maximum area (in bytes) of address space which may be
      taken by the process.
  NOFILE for the maximum number of open file descriptors for the
      current process.
  VMEM for the largest area of mapped memory which the process may occupy.
  DATA for the maximum size (in bytes) of the process's heap.
  RSS for the maximum resident set size that should be made available
      to the process.
  STACK for the maximum size (in bytes) of the call stack for the current
      process.
  FSIZE for the maximum size of a file which the process may create.
      This only affects the stack of the main thread in a multi-threaded
      process.
  CPU for the maximum amount of processor time (in seconds) that a process
      can use

Aprox. 100 MB address space is required only for libclamav database.

Example: rlimit(AS=30000000)

scand()

Scanner daemon with a preload library ability.

This service can be used to scan for viruses with an library, which
can be "preloaded" as LD_PRELOAD library.

Usage: scand(scanner,ld_preload='',
             sock='/tmp/scand.sock',
             pid_file='/var/run/scand.pid',
             as_root=False)

Where: scanner is a scand scanner
       ld_preload is an library name, which can be preloaded with
         LD_PRELOAD parameter. By default by library will be preloaded.
       sock is path to communicate with scanner
       pid_file is a path to store daemon's pid file. This will be loaded
         at exit and this process will be killed.
       as_root is an boolean. Set it to True if you want to run scanners
         in scand as root.

Example: scand(nod2pac(),ld_preload='/usr/lib/libnod32pac.so')
     or: scand(usrquota('mydomain.sk'),as_root=True)

New in version 0.8.0.

sgfilterd()

A service to filter data sent by sgfilter command.

This service can be used to filter an email through sagator.
Some headers should be added to filtered email. A client for this
service is the sgfilter script. See man sgfilter for more information.

Usage: sgfilterd(scanners,host='127.0.0.1',port=27,prefork=2)

Where: scanners is an array of scanners (see README.scanners for more info)
       host is a hostname to bind
       port is a tcp port to bind
       prefork is a number, which defines preforked process count.
         Set this parameter to actual processor count + 1
         or leave it's default (2).

Example: sgfilterd(SCANNERS)

Input protocol description:
  MAIL FROM: sender_email
  RCPT TO: recipient_email
  DATA length
  ...

Where: sender_email is sender's email address
       recipient_email is recipient's email address. You can send more
         RCPT TO: lines.
       length is whole data length in bytes (including control characters,
         as newlines, ...)

Output protocol description:
  XXX L.LL VIRNAME
  ...
  ^D
  
Where: XXX is three digit status, one from these:
           250 - clean
           251 - not clean, but sending forced
           451 - an internal error occured during scanning
           550 - reject
           551 - drop
       L.LL is an floating number of virus/spam level status
       VIRNAME is an short description (like virus name, 'SPAM' string
           or other one line short description
       ... is modified email message (if some scanners are defined
           to modify scanned message)
       ^D is an EOF character, after message the communication is closed

New in version 0.7.0.

smtpd()

SMTP daemon service.

This service can be used to start sagator as separate filtering SMTP
daemon. Is is useful for postfix and any other SMTP daemon, which
can use these filters.

Usage: smtpd(scanners, host, port, prefork=2)

Where: scanners is an array of scanners (see README.scanners for more info)
       host is a an ip address to bind
       port is a port to bind
       prefork is a number, which defines preforked process count.
         Set this parameter to actual processor count + 1
         or leave it's default (2). For multicore servers you can use
         core_count() function to use autodetection.

Example: smtpd(SCANNERS, '127.0.0.1', 27)

smtpd_policy()

SMTP policy service.

This service can be used as smtpd policy service for postfix.

Usage: smtpd_polixy(scanners, dbc, host, port, max_children=200)

Where: scanners is an array of policy scanners
         (see README.scanners for more info)
       dbc is an database connection
       host is a an ip address to bind
       port is a port to bind
       max_children is a number defining maximal number of childrens
         for this service

Example: smtpd_policy(SCANNERS, db.sqlite(), '127.0.0.1', 29)

Postfix configuration example:
  /etc/postfix/main.cf:
    smtpd_recipient_restrictions=
            ...
            check_policy_service inet:127.0.0.1:29
            ...

New in version 0.8.0.

webq_jinja()

Web service for sagator's quaratine access.

This service can be used to access email collected by sagator via
web interface.

Requirements: python-jinja2 or python-jinja

Usage: webq_jinja(host='0.0.0.0', port=8008, db,
                  log='/var/log/sagator/webq.log',
                  scanner, userconv)

Where: host is an string, which defines IP address to bind,
         default: 0.0.0.0
       port is an integer, which defines tcp port to listen, default: 8008
       db is a database connection. For description see Databases.txt.
       log is defining a log file name, by default /var/log/sagator/webq.log
       scanner is a scanner to use for checking (only one scanner
         can be used here and it must be a buffer scanner!)
       userconv is an array, which defines regular expression
         and substitution strings. Usernames from login prompt
         are matched against this regular expression and substitued
         by substitution string.
       request_handler is an SimpleHTTPRequestHandler class.
         By default webq_jinja_request_handler is used.
         Use this class as parent if you need to override some functions.
         This parameter was introduced in sagator 1.3.

It is recommended to use apache mod_proxy module to redirect standard
web traffic from port 80 to webq()'s 8008. For example:
    ProxyPass /webq http://localhost:8008
    ProxyPassReverse /webq http://localhost:8008

Example: See default config file for example.

New in version 1.3.0.