• The APS Catalog has been deprecated and removed from all Plesk Obsidian versions.
    Applications already installed from the APS Catalog will continue working. However, Plesk will no longer provide support for APS applications.
  • Please be aware: with the Plesk Obsidian 18.0.78 release, the support for the ngx_pagespeed.so module will be deprecated and removed from the sw-nginx package.

Feature request: SMTP Relay setup for plesk notifications

R

rackset

Guest
FACT: To prevent UNSOLICITED BULK E-MAIL sending from hacked sites on windows, we have to disable local relay (to remote) from unauthenticated email account.

This will cause Plesk to not be able sending it's notifications to domain owners/ resellers/ clients ...
There should be a setting to send plesk emails with SMTP authentication, from local or remote server.

This issue caused many customers being angry of why they do not receive notices for over usage, etc...
 
SMTP is still not an option for notifications in Plesk....

FACT: To prevent UNSOLICITED BULK E-MAIL sending from hacked sites on windows, we have to disable local relay (to remote) from unauthenticated email account.

This will cause Plesk to not be able sending it's notifications to domain owners/ resellers/ clients ...
There should be a setting to send plesk emails with SMTP authentication, from local or remote server.

This issue caused many customers being angry of why they do not receive notices for over usage, etc...


Now - almost 2 years later this major problem hasn´t been properly addressed...?

Nowadays, it is against common sense to make a controlpanel that is unable to be configured to NOT use localhost/127.0.0.1 when sending cp notifications to clients!
Naturally a controlpanel NEEDS to be able to be configured properly with SMTP/authentication for all mails.

Hackers has indeed got their eyes up for Plesk and abuse the fact that the cp is not able to use other settings than localhost for cp notifications - Parallels, get this done ASAP to assist your clients in maintaining a proper cp with less chance possible for abuse...

Actually all the hackers needs to do is autosearch for Plesk installations and then also autocheck if it is possible to abuse the localhost setting and the - also automatically - start the abuse big style...

This is a bug in Plesk and needs immediate attention.
 
Back
Top