• Introducing WebPros Cloud - a fully managed infrastructure platform purpose-built to simplify the deployment of WebPros products !  WebPros Cloud enables you to easily deliver WebPros solutions — without the complexity of managing the infrastructure.
    Join the pilot program today!
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.

Plesk failed to protect from email spoofing

itexpertnow

New Pleskian
Username:

TITLE

Plesk failed to protect from email spoofing

PRODUCT, VERSION, OPERATING SYSTEM, ARCHITECTURE

Ubuntu 22.4
Plesk Version 18.0.53

PROBLEM DESCRIPTION

Email Header Analyzer, RFC822 Parser - MxToolbox

STEPS TO REPRODUCE

SPF.png


ACTUAL RESULT

the email was not blocked

email copy

EXPECTED RESULT

the email should be blocked because SPF softfail and the sender is not permitted sender

ANY ADDITIONAL INFORMATION

I added more restrictions in the postfix config but it didn't help much

# SMTP recipient restrictions
smtpd_recipient_restrictions =
permit_mynetworks,
permit_sasl_authenticated,
reject_unauth_destination,
reject_authenticated_sender_login_mismatch,
reject_invalid_hostname,
reject_non_fqdn_hostname,
reject_non_fqdn_sender,
reject_non_fqdn_recipient,
reject_unknown_sender_domain,
reject_unknown_recipient_domain,
reject_unlisted_recipient,
permit

YOUR EXPECTATIONS FROM PLESK SERVICE TEAM

Help with sorting out
 
Set the SPF checking mode to "Reject mail if SPF resolves to “softfail" if you want your server to reject incoming emails on which the SPF check softfails.
 
Back
Top