Hello Pleskians!
I hope somebody can point me into the right direction.
As mentioned we got a server with plesk obsidian (latest micro update) on CentOS 7 with Postfix as mailserver.
We setup SPF, DKIM and DMARC to get our e-mail deliverability up. But unfortunaly we keep getting blacklisted.
According to this article: Many email messages are sent from PHP scripts on a Plesk server. How to find domains on which these scripts are running if Postfix is used? we verified that no php script is sending spam.
Also we reached out to Spamhaus Zen. They told us that the server is sending helo/ehlo with multiple domains that are NOT hosted by us.
We fighting this issue for nearly 2 months now and running out of ideas.
Edit:
Since this post got approved i want to share additional infos:
We checked via mxtoolbox.com the email deliverability, rDNS Records, and HELO / EHLO names. Everything seems fine.
We are also part of the SDNS and JMRP (Microsofts Deliverability Center) and also it seems fine (green). No unusual data.
On this hosts is a single online shop which sends not more then 20 mails in an hour.
We activated the outgoing mail limit (30 per hour) and no mail address reaches this limit.
We still getting relisted every 2 days.
Edit 2: (edited cause Peter Debik mentioned a possible fix that i forgot to mention)
We followed the instructions on https://www.abuseat.org/PleskAvoid.html and set Mail Server Settings to "send from domain ip addresses".
We took this a step further according to the plesk documentation and set this option to "send from specified ip address" and used the only ipv4 address for this server. Still doesn't fix the issue.
"Send from the specified IP address. You might want to use certain IPv4 and IPv6 addresses for all outgoing mail. Sending all mail from the specified address might be useful, for example, if the IP address of the mail server was added to a public black list, such as the Spamhaus or OpenBL lists. If you select None, outgoing mail will not be sent. "
Any help is appreciated.
Best wishes,
Daniel.
I hope somebody can point me into the right direction.
As mentioned we got a server with plesk obsidian (latest micro update) on CentOS 7 with Postfix as mailserver.
We setup SPF, DKIM and DMARC to get our e-mail deliverability up. But unfortunaly we keep getting blacklisted.
According to this article: Many email messages are sent from PHP scripts on a Plesk server. How to find domains on which these scripts are running if Postfix is used? we verified that no php script is sending spam.
Also we reached out to Spamhaus Zen. They told us that the server is sending helo/ehlo with multiple domains that are NOT hosted by us.
We fighting this issue for nearly 2 months now and running out of ideas.
Edit:
Since this post got approved i want to share additional infos:
We checked via mxtoolbox.com the email deliverability, rDNS Records, and HELO / EHLO names. Everything seems fine.
We are also part of the SDNS and JMRP (Microsofts Deliverability Center) and also it seems fine (green). No unusual data.
On this hosts is a single online shop which sends not more then 20 mails in an hour.
We activated the outgoing mail limit (30 per hour) and no mail address reaches this limit.
We still getting relisted every 2 days.
Edit 2: (edited cause Peter Debik mentioned a possible fix that i forgot to mention)
We followed the instructions on https://www.abuseat.org/PleskAvoid.html and set Mail Server Settings to "send from domain ip addresses".
We took this a step further according to the plesk documentation and set this option to "send from specified ip address" and used the only ipv4 address for this server. Still doesn't fix the issue.
"Send from the specified IP address. You might want to use certain IPv4 and IPv6 addresses for all outgoing mail. Sending all mail from the specified address might be useful, for example, if the IP address of the mail server was added to a public black list, such as the Spamhaus or OpenBL lists. If you select None, outgoing mail will not be sent. "
Any help is appreciated.
Best wishes,
Daniel.
Last edited: