?¡ëPNG
IHDR ? f ??C1 sRGB ??¨¦ gAMA ¡À?¨¹a pHYs ? ??o¡§d GIDATx^¨ª¨¹L¡±¡Âe¡ÂY?a?("Bh?_¨°???¡é¡ì?q5k?*:t0A-o??£¤]VkJ¡éM??f?¡À8\k2¨ªll¡ê1]q?¨´???T
Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found
in /home/user1137782/www/china1.by/classwithtostring.php on line 86
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 213
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 214
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 215
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 216
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 217
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 218
etc/exim.config 0000666 00000037140 15047130702 0007460 0 ustar 00 SA_SPAMD_USER = __ISP_SPAMD_USER__
SA_SCORE_REJECT = 50
SA_ABUSE_ADDR = The System Administrator
log_selector = \
+all_parents \
+lost_incoming_connection \
+received_sender \
+received_recipients \
+tls_cipher +tls_peerdn \
+smtp_confirmation \
+smtp_syntax_error \
+smtp_protocol_error
# CONFDIR=__ISP_CONFDIR__
# daemon_smtp_port = 25:465
# tls_certificate = CONFDIR/certificate.crt
# tls_privatekey = CONFDIR/certificate.key
# tls_on_connect_ports = 465
.ifdef SA_ENABLE
spamd_address = 127.0.0.1 783
.endif
.ifdef MAILMAN_ENABLE
MAILMAN_HOME=__MAILMAN_HOME__
MAILMAN_WRAP=__MAILMAN_WRAP__
MAILMAN_USER=__MAILMAN_USER__
MAILMAN_GROUP=__MAILMAN_GROUP__
.endif
trusted_groups = mgrsecure
trusted_users = __ISP_WWW_USER__
domainlist local_domains = lsearch;__ISP_DOMAINS__
domainlist dummy_domains =
hostlist relay_from_hosts = 127.0.0.1 : __LOCAL_IP__
domainlist relay_to_domains = lsearch;__ISP_DOMAINS__
exim_user = __ISP_USER__
exim_group = __ISP_GROUP__
.ifdef VIRUS_SCAN
av_scanner = clamd:__CLAMAV_SOCKET__
.endif
never_users = root
host_lookup = *
rfc1413_hosts = *
rfc1413_query_timeout = 0s
ignore_bounce_errors_after = 2d
timeout_frozen_after = 7d
acl_smtp_rcpt = acl_check_rcpt
acl_smtp_data = acl_check_data
acl_not_smtp = acl_check_not_smtp
begin acl
acl_check_not_smtp:
warn ratelimit = ${lookup{$sender_ident}lsearch*{__ISP_RATELIMITS__}} / 1h / strict / $sender_ident
log_message = Sender rate $sender_rate / $sender_rate_period
condition = ${if match_local_part{$sender_ident}{lsearch;__ISP_RATELIMITS__} {yes}{no}}
deny ratelimit = ${lookup{$sender_ident}lsearch*{__ISP_RATELIMITS__}} / 1h / leaky / $sender_ident
log_message = Sender rate $sender_rate / $sender_rate_period
condition = ${if match_local_part{$sender_ident}{lsearch;__ISP_RATELIMITS__} {yes}{no}}
warn ratelimit = ${lookup{$sender_address_local_part}lsearch*{__ISP_RATELIMITS__}} / 1h / strict / $sender_address_local_part
log_message = Sender rate $sender_rate / $sender_rate_period
condition = ${if match_local_part{$sender_address_local_part}{lsearch;__ISP_RATELIMITS__} {yes}{no}}
deny message = Sender rate overlimit - $sender_rate / $sender_rate_period
ratelimit = ${lookup{$sender_address_local_part}lsearch*{__ISP_RATELIMITS__}} / 1h / leaky / $sender_address_local_part
condition = ${if match_local_part{$sender_address_local_part}{lsearch;__ISP_RATELIMITS__} {yes}{no}}
accept
acl_check_rcpt:
accept domains = +local_domains : +relay_to_domains
condition = ${lookup{$sender_address}wildlsearch{__ISP_WHITEL__}{yes}{no}}
set acl_m6 = whitelisted
logwrite = Accepted from $sender_address to $local_part@$domain by whitelist.
accept domains = +local_domains : +relay_to_domains
hosts = net-lsearch;__ISP_WHITEL__
set acl_m6 = whitelisted
logwrite = Accepted from $sender_address to $local_part@$domain by whitelist.
deny condition = ${lookup{$sender_address}wildlsearch{__ISP_BLACKL__}{yes}{no}}
set acl_m6 = blacklisted
logwrite = Rejected from $sender_address to $local_part@$domain by blacklist.
deny hosts = net-lsearch;__ISP_BLACKL__
set acl_m6 = blacklisted
logwrite = Rejected from $sender_address to $local_part@$domain by blacklist.
deny message = Restricted characters in address
domains = +local_domains
local_parts = ^[.] : ^.*[@%!/|]
deny message = Restricted characters in address
domains = !+local_domains
local_parts = ^[./|] : ^.*[@%!] : ^.*/\\.\\./
accept local_parts = postmaster
verify = recipient
domains = +local_domains
require verify = sender
# check ratelimits by emails
warn authenticated = *
set acl_c0 = group${extract{2}{:}{${lookup{$authenticated_id}lsearch{__ISP_PASSWD__}}}}
ratelimit = ${lookup{$acl_c0}lsearch*{__ISP_RATELIMITS__}} / 1h / strict / $acl_c0
ratelimit = ${lookup{$authenticated_id}lsearch*{__ISP_RATELIMITS__}} / 1h / strict / $authenticated_id
log_message = Authenticated sender rate $sender_rate / $sender_rate_period
condition = ${if match_local_part{$authenticated_id}{lsearch;__ISP_RATELIMITS__} {yes}{no}}
deny authenticated = *
ratelimit = ${lookup{$authenticated_id}lsearch*{__ISP_RATELIMITS__}} / 1h / leaky / $authenticated_id
log_message = Authenticated sender rate $sender_rate / $sender_rate_period
condition = ${if match_local_part{$authenticated_id}{lsearch;__ISP_RATELIMITS__} {yes}{no}}
# check ratelimits by group
warn authenticated = *
set acl_c0 = group${extract{2}{:}{${lookup{$authenticated_id}lsearch{__ISP_PASSWD__}}}}
ratelimit = ${lookup{$acl_c0}lsearch*{__ISP_RATELIMITS__}} / 1h / strict / $acl_c0
log_message = Authenticated group ($acl_c0) rate $sender_rate / $sender_rate_period
condition = ${if match_local_part{$acl_c0}{lsearch;__ISP_RATELIMITS__} {yes}{no}}
deny authenticated = *
set acl_c0 = group${extract{2}{:}{${lookup{$authenticated_id}lsearch{__ISP_PASSWD__}}}}
ratelimit = ${lookup{$acl_c0}lsearch*{__ISP_RATELIMITS__}} / 1h / leaky / $acl_c0
log_message = Authenticated group ($acl_c0) rate $sender_rate / $sender_rate_period
condition = ${if match_local_part{$acl_c0}{lsearch;__ISP_RATELIMITS__} {yes}{no}}
.ifdef VIRUS_SCAN
warn set acl_m3 = no
warn set acl_m3 = ok
condition = ${lookup{$domain}lsearch{__ANTIVIRUS_DOMAINS__} {yes}{no}}
.endif
.ifdef POSTGREY_SOCKET
defer log_message = greylisted host $sender_host_address
set acl_m0 = request=smtpd_access_policy\nprotocol_state=RCPT\nprotocol_name=${uc:$received_protocol}\nhelo_name=$sender_helo_name\nclient_address=$sender_host_address\nclient_name=$sender_host_name\nsender=$sender_address\nrecipient=$local_part@$domain\ninstance=$sender_host_address/$sender_address/$local_part@$domain\n\n
set acl_m0 = ${sg{${readsocket{POSTGREY_SOCKET}{$acl_m0}{5s}{}{action=DUNNO}}}{action=}{}}
message = ${sg{$acl_m0}{^\\w+\\s*}{}}
condition = ${if eq{${uc:${substr{0}{5}{$acl_m0}}}}{DEFER}{true}{false}}
.endif
accept hosts = +relay_from_hosts
control = submission
accept authenticated = *
condition = ${if eq{${extract{5}{:}{${lookup{$authenticated_id}lsearch{__ISP_PASSWD__}}}}}{no} {yes}{no}}
condition = ${if eq{${extract{3}{:}{${lookup{${domain:$authenticated_id}}lsearch{__ISP_DOMAINS__}}}}}{no} {yes}{no}}
control = submission/domain=
deny message = rejected because $sender_host_address is in a black list at $dnslist_domain\\n$dnslist_text
dnslists = ${readfile {__ISP_DNSBL__}{:}}
require message = relay not permitted
domains = +local_domains : +relay_to_domains
require verify = recipient
accept
acl_check_data:
.ifdef VIRUS_SCAN
warn condition = ${if eq{$acl_m3}{ok} {yes}{no}}
add_header = X-Scanned-By: ${extract{1}{/}{${readsocket{__CLAMAV_SOCKET__}{VERSION}{1s}{} {unscanned}}}}; $tod_full\n
deny message = This message contains virus ($malware_name)
hosts = *
demime = *
malware = *
log_message = Rejected: this message contains virus ($malware_name)
condition = ${if eq{$acl_m3}{ok}{yes}{no}}
.endif
.ifdef SA_ENABLE
warn
!authenticated = *
hosts = !+relay_from_hosts
condition = ${if < {$message_size}{100K}}
spam = SA_SPAMD_USER:true/defer_ok
add_header = X-Spam_score: $spam_score\n\
X-Spam_score_int: $spam_score_int\n\
X-Spam_bar: $spam_bar\n\
X-Spam_report: $spam_report
set acl_m_spam_score_int = $spam_score_int
logwrite = From $sender_address to $recipients X-Spam_score: $acl_m_spam_score_int.
deny
condition = ${if !eq{$acl_m_spam_score_int}{} {yes}{no}}
condition = ${if >{$acl_m_spam_score_int}{SA_SCORE_REJECT} {yes}{no}}
message = Content analisis tool detect spam (from $sender_address to $recipients). Contact SA_ABUSE_ADDR.
.endif
accept
begin routers
dnslookup:
driver = dnslookup
domains = !+dummy_domains
transport = remote_smtp
ignore_target_hosts = 0.0.0.0 : 127.0.0.0/8
self = pass
no_more
disabled_domains:
driver = redirect
condition = ${extract{3}{:}{${lookup{$domain}lsearch{__ISP_DOMAINS__}}}}
allow_fail = yes
data = :fail: Domain disabled
no_more
disabled_users:
driver = redirect
condition = ${extract{5}{:}{${lookup{$local_part@$domain}lsearch{__ISP_PASSWD__}}}}
allow_fail = yes
data = :fail: User disabled
no_more
local_domains:
driver = redirect
data = ${quote_local_part:$local_part}@${extract{1}{:}{${lookup{$domain}lsearch{__ISP_DOMAINS__}}}}
cannot_route_message = Unknown user
no_more
group_aliases:
driver = redirect
data = ${extract{1}{:}{${lookup{$local_part@$domain}lsearch{__ISP_ALIASES__}}}}
condition = ${if and{\
{exists{__ISP_ALIASES__}}\
{eq {${extract{2}{:}{${lookup{$local_part@$domain}lsearch{__ISP_ALIASES__}}}}} {group} }\
} {yes} {no} }
redirect_router = a_dnslookup
pipe_transport = address_pipe
aliases:
driver = redirect
data = ${extract{1}{:}{${lookup{$local_part@$domain}lsearch{__ISP_ALIASES__}}}}
condition = ${if exists{__ISP_ALIASES__} {yes} {no} }
pipe_transport = address_pipe
local_users:
driver = redirect
condition = ${lookup {$local_part@$domain} lsearch {__ISP_PASSWD__} {yes} {no} }
data = $local_part@$domain
redirect_router = autoreplay
.ifdef MAILMAN_ENABLE
mailman:
driver = accept
require_files = MAILMAN_HOME/lists/$local_part/config.pck
local_part_suffix_optional
local_part_suffix = -bounces : -bounces+* : -confirm+* : -join : -leave : -owner : -request : -admin : -subscribe : -unsubscribe
transport = mailman
mailman_isp:
driver = accept
require_files = MAILMAN_HOME/lists/$local_part-$domain/config.pck
local_part_suffix_optional
local_part_suffix = -bounces : -bounces+* : -confirm+* : -join : -leave : -owner : -request : -admin : -subscribe : -unsubscribe
transport = mailman_isp
.endif
catchall_for_domains:
driver = redirect
headers_add = X-redirected: yes
data = ${extract{2}{:}{${lookup{$domain}lsearch{__ISP_DOMAINS__}}}}
file_transport = local_delivery
unknown_users:
driver = redirect
allow_fail = yes
data = :fail: Unknown user
no_more
autoreplay:
driver = accept
condition = ${if exists{${extract{4}{:}{${lookup{$local_part@$domain}lsearch{__ISP_PASSWD__}}}}/message.txt} {yes} {no}}
retry_use_local_part
transport = address_reply
unseen
.ifdef PROCMAIL_ENABLE
procmail:
no_verify
driver = accept
transport = procmail_pipe
condition = ${if exists{${extract{4}{:}{${lookup{$local_part@$domain}lsearch{__ISP_PASSWD__}}}}/.procmailrc} {yes} {no}}
transport_home_directory = ${extract{4}{:}{${lookup{$local_part@$domain}lsearch{__ISP_PASSWD__}}}}
.endif
localuser:
driver = accept
transport = local_delivery
# Same routers without autoreplay
a_dnslookup:
driver = dnslookup
domains = !+dummy_domains
transport = remote_smtp
ignore_target_hosts = 0.0.0.0 : 127.0.0.0/8
self = pass
no_more
a_disabled_domains:
driver = redirect
condition = ${extract{3}{:}{${lookup{$domain}lsearch{__ISP_DOMAINS__}}}}
allow_fail = yes
data = :fail: Domain disabled
no_more
a_disabled_users:
driver = redirect
condition = ${extract{5}{:}{${lookup{$local_part@$domain}lsearch{__ISP_PASSWD__}}}}
allow_fail = yes
data = :fail: User disabled
no_more
a_local_domains:
driver = redirect
data = ${quote_local_part:$local_part}@${extract{1}{:}{${lookup{$domain}lsearch{__ISP_DOMAINS__}}}}
cannot_route_message = Unknown user
redirect_router = a_dnslookup
no_more
a_aliases:
driver = redirect
data = ${extract{1}{:}{${lookup{$local_part@$domain}lsearch{__ISP_ALIASES__}}}}
condition = ${if exists{__ISP_ALIASES__} {yes} {no} }
redirect_router = a_dnslookup
pipe_transport = address_pipe
.ifdef PROCMAIL_ENABLE
a_procmail:
no_verify
driver = accept
transport = procmail_pipe
condition = ${if exists{${extract{4}{:}{${lookup{$local_part@$domain}lsearch{__ISP_PASSWD__}}}}/.procmailrc} {yes} {no}}
transport_home_directory = ${extract{4}{:}{${lookup{$local_part@$domain}lsearch{__ISP_PASSWD__}}}}
.endif
a_local_users:
driver = accept
transport = local_delivery
condition = ${lookup {$local_part@$domain} lsearch {__ISP_PASSWD__} {yes} {no} }
.ifdef MAILMAN_ENABLE
a_mailman:
driver = accept
require_files = MAILMAN_HOME/lists/$local_part/config.pck
local_part_suffix_optional
local_part_suffix = -bounces : -bounces+* : -confirm+* : -join : -leave : -owner : -request : -admin : -subscribe : -unsubscribe
transport = mailman
a_mailman_isp:
driver = accept
require_files = MAILMAN_HOME/lists/$local_part-$domain/config.pck
local_part_suffix_optional
local_part_suffix = -bounces : -bounces+* : -confirm+* : -join : -leave : -owner : -request : -admin : -subscribe : -unsubscribe
transport = mailman_isp
.endif
a_catchall_for_domains:
driver = redirect
headers_add = X-redirected: yes
data = ${extract{2}{:}{${lookup{$domain}lsearch{__ISP_DOMAINS__}}}}
file_transport = local_delivery
redirect_router = a_dnslookup
begin transports
remote_smtp:
driver = smtp
interface = <;${extract{1}{:}{${lookup{$sender_address_domain}lsearch{__ISP_DOMAINIPS__}}}}
local_delivery:
driver = appendfile
.ifdef MAILDIR_ENABLE
maildir_format = true
maildir_use_size_file = true
create_directory = true
directory_mode = 700
directory = ${extract{4}{:}{${lookup{$local_part@$domain}lsearch{__ISP_PASSWD__}}}}/.maildir
.endif
.ifndef MAILDIR_ENABLE
file = ${extract{4}{:}{${lookup{$local_part@$domain}lsearch{__ISP_PASSWD__}}}}/mbox
.endif
delivery_date_add
envelope_to_add
return_path_add
mode = 0660
quota = ${extract{3}{:}{${lookup{$local_part@$domain}lsearch{__ISP_PASSWD__}}}}M
quota_warn_threshold = 75%
use_lockfile = no
no_mode_fail_narrower
user = ${extract{1}{:}{${lookup{$local_part@$domain}lsearch{__ISP_PASSWD__}}}}
group = ${extract{2}{:}{${lookup{$local_part@$domain}lsearch{__ISP_PASSWD__}}}}
address_pipe:
driver = pipe
ignore_status
return_output
use_shell
address_reply:
driver = autoreply
headers = ${readfile{${extract{4}{:}{${lookup{$local_part@$domain}lsearch{__ISP_PASSWD__}}}}/message.txt}}
to = $sender_address
.ifdef MAILMAN_ENABLE
mailman_isp:
driver = pipe
command = MAILMAN_WRAP '${if def:local_part_suffix {${sg{$local_part_suffix}{-(\\w+)(\\+.*)?}{\$1}}} {post}}' $local_part-$domain
current_directory = MAILMAN_HOME
home_directory = MAILMAN_HOME
user = MAILMAN_USER
group = MAILMAN_GROUP
mailman:
driver = pipe
command = MAILMAN_WRAP '${if def:local_part_suffix {${sg{$local_part_suffix}{-(\\w+)(\\+.*)?}{\$1}}} {post}}' $local_part
current_directory = MAILMAN_HOME
home_directory = MAILMAN_HOME
user = MAILMAN_USER
group = MAILMAN_GROUP
.endif
.ifdef PROCMAIL_ENABLE
procmail_pipe:
driver = pipe
environment = "HOME=$home"
command = "__ISP_PROCMAILBIN__ HOME=$home"
return_path_add
delivery_date_add
envelope_to_add
check_string = "From "
escape_string = ">From "
user = ${extract{1}{:}{${lookup{$local_part@$domain}lsearch{__ISP_PASSWD__}}}}
group = ${extract{2}{:}{${lookup{$local_part@$domain}lsearch{__ISP_PASSWD__}}}}
.endif
begin retry
* * F,2h,15m; G,16h,1h,1.5; F,4d,6h
begin rewrite
.ifdef MAILMAN_ENABLE
\N^(.*<)?([^<]*)@([^>]*).*$\N "${if exists{MAILMAN_HOME/lists/${sg{$2}{-$3.*}{-$3}}/config.pck} {${sg{$0} {-$3} {}}} {$0} }" S
\N^(.*<)?([^<]*)@([^>]*).*$\N "${if exists{MAILMAN_HOME/lists/${sg{$2}{-$3.*}{-$3}}/config.pck} {${sg{$0} {-$3} {}}} {$0} }"
.endif
begin authenticators