Hey, we just uninstalled Plesk Email Security and upgraded / reinstalled Plesk Email Security Pro.
Now my customers get lots of spam and I can confirm this. For example: I've set a local Windows Email Server and I'm sending from a domain that has spf set to
This is the easiest email spoofing, how does Plesk Email Security not filter this?
Another line:
I obviously censored the domains and IP addresses, I changed my external IP address in the example to 1.1.1.1.
Now my customers get lots of spam and I can confirm this. For example: I've set a local Windows Email Server and I'm sending from a domain that has spf set to
v=spf1 include:spf.protection.outlook.com -all
and dmarc set to v=DMARC1; p=quarantine; pct=100
, the MX is pointed to Outlook (Office 365) and still the Mail gets accepted.This is the easiest email spoofing, how does Plesk Email Security not filter this?
Code:
X-Virus-Scanned: Debian amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: 1.405
X-Spam-Level: *
X-Spam-Status: No, score=1.405 tagged_above=-9999 required=3
tests=[FSL_HELO_NON_FQDN_1=0.001, HELO_NO_DOMAIN=0.001,
KHOP_HELO_FCRDNS=0.121, RDNS_DYNAMIC=0.363, SPF_FAIL=0.919]
autolearn=no autolearn_force=no
Code:
Received-SPF: fail (plesk.server.tld: domain of sender.tld does not designate 1.1.1.1 as permitted sender) client-ip=1.1.1.1; [email protected]; helo=LUCA-PC;
Received: from [127.0.0.1] (Luca-PC [127.0.0.1])
by LUCA-PC with ESMTPA
; Tue, 28 Jul 2020 09:54:41 +0200