• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • We are looking for U.S.-based freelancer or agency working with SEO or WordPress for a quick 30-min interviews to gather feedback on XOVI, a successful German SEO tool we’re looking to launch in the U.S.
    If you qualify and participate, you’ll receive a $30 Amazon gift card as a thank-you. Please apply here. Thanks for helping shape a better SEO product for agencies!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

Issue Mail from non-existant user of a local domain

tkalfaoglu

Silver Pleskian
Server operating system version
AlmaLinux
Plesk version and microupdate number
Obsidian
Interesting thing.. I'm seeing this in the logs:

Code:
Oct 01 16:31:53 storm postfix/smtpd[30855]: disconnect from r31.mail.safisalons.fr[192.243.255.31] ehlo=1 starttls=0/1 commands=1/2
Oct 01 16:32:02 storm postfix/pickup[63938]: 2A76841426BB: uid=10181 from=<[email protected]>
Oct 01 16:32:02 storm postfix/cleanup[30875]: 2A76841426BB: message-id=<[email protected]>
Oct 01 16:32:02 storm postfix/qmgr[6297]: 2A76841426BB: from=<[email protected]>, size=12360, nrcpt=1 (queue active)
Oct 01 16:32:03 storm postfix/smtp[31440]: 2A76841426BB: to=<[email protected]>, relay=mxin5.ziggo.nl[212.54.42.8]:25, delay=1.1, delays=0.14/0.01/0.27/0.66, dsn=2.
0.0, status=sent (250 2.0.0 MXIN650 mail accepted for delivery ;id=ecb4oYyqRIVwNecb4offlg;sid=ecb4oYyqRIVwN;mta=mx5.tb;dt=2022-10-01T15:32:03+02:00;ipsrc=176.9.1.
236;)
Oct 01 16:32:03 storm postfix/qmgr[6297]: 2A76841426BB: removed

The domain "ucyildizltd.com.tr" exists and has email service enabled.. But it has NO email addresses defined.. So, the [email protected] is NOT a user that exists. So, why is the mail "from" that user is accepted, and how can I prevent it?

Many thanks, -t
 
Do you have this email in the output of the command:

# postmap -s /var/spool/postfix/plesk/virtual | grep @ucyildizltd.com.tr

?
 
The first line of your code sample is misleading. It is not part of the transaction. The transaction starts with the second line, the "pickup". This indicates that the mail is transmitted to your local mail server from an authorized system that does not need to login using a user name or password. This is the web server. So what you are seeing there is a website using the PHP mail() function to submit mail to the mail server.

In most cases this is caused by either insecure forms (forms without captchas) that are abused by spambots to send spam. Second comes insecure website scripts that give way to malware or are malware themselves. The best practice is to first secure all website forms with captchas, then check if the problem persists.
 
The first line of your code sample is misleading. It is not part of the transaction. The transaction starts with the second line, the "pickup". This indicates that the mail is transmitted to your local mail server from an authorized system that does not need to login using a user name or password. This is the web server. So what you are seeing there is a website using the PHP mail() function to submit mail to the mail server.

In most cases this is caused by either insecure forms (forms without captchas) that are abused by spambots to send spam. Second comes insecure website scripts that give way to malware or are malware themselves. The best practice is to first secure all website forms with captchas, then check if the problem persists.
Wonderful -- many thanks.. I will disable their access to "sendmail" in mail settings. Hopefully this will help. I'll also inspect their web site now..
 
Back
Top