• Introducing WebPros Cloud - a fully managed infrastructure platform purpose-built to simplify the deployment of WebPros products !  WebPros Cloud enables you to easily deliver WebPros solutions — without the complexity of managing the infrastructure.
    Join the pilot program today!
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.

Resolved Spam relayed through local server without authorisation

tonydsza

New Pleskian
Server operating system version
Centos 7.9
Plesk version and microupdate number
18.0.43 Update #1
Hello

Our users are complaining about receiving spam email saying their PC has been compromised and bitcoin has to be paid. I have received these emails myself.

The irony of this is that all email coming into the network is scanned by another server and then passed onto the Plesk mail server.

It seems that the culprits have a script that connects directly to the server hosting users email accounts, sets their from address to be the same domain as the user and then send email to them. The emails are delivered even if they do not authenticate.

SPF is set to hard fail but the emails still arrive.

Does anybody know how this can be resolved?
 
Managed to solve this. I enabled spf in mail server settings to block spf failures and I included the IP address of my gateway mail scanner so that emails from the gateway scanner arrive on the plesk server.
 
Back
Top