• Inviting everyone who uses WordPress management tools in Plesk
    The Plesk team is conducting a 60-minute research session that includes an interview and a moderated usability test.
    To participate, please use this link .
    Your experience will help shape product decisions and ensure the tools better support real-world use cases.

Question Are you using "DNS Blackhole Lists" ?

tanasis

Regular Pleskian
Hello everyone,

I am currently reviewing the email security and anti-spam settings on my Plesk server and I am looking into the "Spam protection based on DNS blackhole lists" feature.

I would love to get some insights from the community's experience:

Do you generally keep this specific DNSBL feature enabled for your spam filtering, or do you rely on other tools/methods?

If you do use it, which specific DNS blackhole lists do you configure in this field?

Are the lists you recommend completely free to use?

I am looking for reliable options that effectively block spam but have a low rate of false positives, as avoiding the block of legitimate emails is a priority.

Thank you in advance for your time and recommendations!
 
Thank you for the answer... Lately on my server that has several websites, I have been receiving mass incoming emails on several domains.
e.g. from the email [email protected] , emails to 50 websites that I have on my server.
from the email [email protected], emails to 50 websites that I have on my server.
from the email [email protected], emails to 50 websites that I have on my server.

These emails are sent simultaneously. They stop for 1-2 days and then they change emails and send them again....

They do not have fixed homepages, but they are on 3-4 random ones on my server.
 
There are several layers you can add to reduce spam on a Plesk server. Here's what has worked well for us:

Postfix main.cf hardening
Add HELO restrictions and sender validation. This catches a surprising amount of bot traffic before SpamAssassin even sees it:

Code:
smtpd_helo_required = yes
smtpd_helo_restrictions = permit_mynetworks, permit_sasl_authenticated, reject_invalid_helo_hostname, reject_non_fqdn_helo_hostname
smtpd_sender_restrictions = check_sender_access hash:/var/spool/postfix/plesk/blacklists, permit_sasl_authenticated, reject_non_fqdn_sender, reject_unknown_sender_domain

Postscreen
This sits in front of smtpd and handles the bulk of bot connections with minimal resources. It tests connections before spawning a full smtpd process. Highly recommended but requires master.cf changes.

Collaborative spam filtering
Install Razor2, Pyzor and/or DCC alongside SpamAssassin. These check message fingerprints against distributed spam databases. They're especially effective against bulk spam campaigns.

SpamAssassin tuning
The default config is very basic on Plesk. Consider adding KAM rules via sa-update channels and look into the Spamhaus DQS free tier for better DNSBL coverage within SpamAssassin.

Important note on DNSBLs
Be careful with aggressive blocklists (SpamCop, 0spam) at the SMTP reject level - they can block legitimate mail from large providers like Gmail. Barracuda (b.barracudacentral.org) is the safest choice for hard rejections. Keep aggressive lists inside SpamAssassin where they contribute to the score but don't hard-reject.

Start with the main.cf tweaks, they're low risk and high impact.
==> Always create a backup of the config files before changing them! <==
 
Last edited:
Back
Top