K
kevincam
Guest
Hey... I've been dealing with a major problem concearning spam being sent from my server. Relaying has always been disabled and the logs don't really give you much information on where the e-mail originated..
I supposed that the spam me be a php scripts or something that someone is using or is being exploited.
the problem is I have over 75 domains in my system.. most of my clients aren't knowledgeable enough to write their own mailing routines....
I figured that since outgoing mail is only enabled for the server.... why not have qmail check to make sure that there is a valid user in the FROM part of the header....
I found a qmail patch called SPAMCONTROL at http://www.fehcom.de/qmail/spamcontrol.html
this patch has a feature called LOCALMFCHECK where it checks the FROM header in the outgoing email and makes sure that the host is a domain that it hosts.... they call it a Reverse Split-Horizon Check....
this qmail patch requires that you build qmail from the source to apply this patch....
my question is does anyone know if you can apply patches and rebuild qmail from its source and it still work with Plesk?
and to the plesk engineers I would kindly ask that you include this patch in the future version of plesk....
and does anyone know another way to stop outgoing spam. I recently purchased spamassassin for plesk and it does not look like spamassassin is even checking outgoing email....
Thank You...
I supposed that the spam me be a php scripts or something that someone is using or is being exploited.
the problem is I have over 75 domains in my system.. most of my clients aren't knowledgeable enough to write their own mailing routines....
I figured that since outgoing mail is only enabled for the server.... why not have qmail check to make sure that there is a valid user in the FROM part of the header....
I found a qmail patch called SPAMCONTROL at http://www.fehcom.de/qmail/spamcontrol.html
this patch has a feature called LOCALMFCHECK where it checks the FROM header in the outgoing email and makes sure that the host is a domain that it hosts.... they call it a Reverse Split-Horizon Check....
this qmail patch requires that you build qmail from the source to apply this patch....
my question is does anyone know if you can apply patches and rebuild qmail from its source and it still work with Plesk?
and to the plesk engineers I would kindly ask that you include this patch in the future version of plesk....
and does anyone know another way to stop outgoing spam. I recently purchased spamassassin for plesk and it does not look like spamassassin is even checking outgoing email....
Thank You...