• Introducing WebPros Cloud - a fully managed infrastructure platform purpose-built to simplify the deployment of WebPros products !  WebPros Cloud enables you to easily deliver WebPros solutions — without the complexity of managing the infrastructure.
    Join the pilot program today!
  • Support for BIND DNS has been removed from Plesk for Windows due to security and maintenance risks.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS.

Qmail Hack

paco68

New Pleskian
Can anyone explain how they can send emails with my server ?
Here is the mailheader :
--------------------------------------------------------------
Received: (qmail 10036 invoked by uid 10078); 3 Sep 2007 13:14:49 +0300
Received: from 127.0.0.1 by vps1.mydomain.net (envelope-from <[email protected]>, uid 48) with qmail-scanner-2.01st
(clamdscan: 0.88.7/4133. spamassassin: 3.1.3. perlscan: 2.01st.
Clear:RC:1(127.0.0.1):.
Processed in 0.021966 secs); 03 Sep 2007 10:14:49 -0000
Date: 3 Sep 2007 13:14:49 +0300
Message-ID: <[email protected]>
To: [email protected]
Subject: Welcome to my world (10.000)
From: [email protected]
--------------------------------------------------------------

No real IP , no other clue , like a mailler or somthing ...
 
Use google for "sendmail wrapper". this will tell you absolute path to the file sending the emails!
 
This has been working for me:
http://forum.swsoft.com/showthread.php?s=&threadid=29226

Also, add something like this to all your vhost.conf files:
Code:
<Directory /usr/local/psa/home/vhosts/domain.com/httpdocs>
php_admin_value sendmail_path "/some_path/fake_sendmail.php -t -i -fdomain.com"
</Directory>
-fdomain.com must be unique for each domain

If you do not care to log all email and just want to know what domain the mail is being sent from, use the actual semdmail rather than fake_sendmail.php.

TD
 
Back
Top