1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
|
#!/usr/bin/php
<?php
/**
* This script bounces a message back to the sender and can be used with IMP's
* spam reporting feature to bounce spam.
*
* It takes the orginal message from standard input and requires the bounce
* message in the file imp/config/bounce.txt. Important: the bounce message
* must be a complete message including headers!
*
* $Horde: imp/scripts/bounce_spam.php,v 1.4.2.2 2008/01/02 11:32:08 jan Exp $
*
* Copyright 2005-2008 The Horde Project (http://www.horde.org/)
*
* See the enclosed file COPYING for license information (GPL). If you
* did not receive this file, see http://www.fsf.org/copyleft/gpl.html.
*
* @author Jan Schneider <jan@horde.org>
*/
define('IMP_CONFIG', dirname(__FILE__) . '/../config');
require_once 'Horde/CLI.php';
/* Make sure no one runs this from the web. */
if (!Horde_CLI::runningFromCLI()) {
fwrite(STDERR, "Must be run from the command line\n");
exit(1);
}
/* If there's no bounce template file then abort */
if (!file_exists(IMP_CONFIG . '/bounce.txt')) {
exit(0);
}
/* Load the CLI environment - make sure there's no time limit, init some
* variables, etc. */
Horde_CLI::init();
/* Read the message content. */
$data = Horde_CLI::readStdin();
/* Who's the spammer? */
preg_match('/return-path: <(.*?)>\r?\n/i', $data, $matches);
$return_path = $matches[1];
/* Who's the target? */
preg_match_all('/delivered-to: (.*?)\r?\n/is', $data, $matches);
$delivered_to = $matches[1][count($matches[1])-1];
/* Read the bounce template and construct the mail */
$bounce = file_get_contents(IMP_CONFIG . '/bounce.txt');
$bounce = str_replace(array('%TO%', '%TARGET%'),
array($return_path, $delivered_to),
$bounce);
/* Send the mail */
$sendmail = "/usr/sbin/sendmail -t -f ''";
$fd = popen($sendmail, 'w');
fputs($fd, preg_replace("/\n$/", "\r\n", $bounce . $data));
pclose($fd);
|