It appears that MSN / Hotmail have recently began blocking an awful lot of servers I manage. Several of them (for a company I work for) are in a few blacklists however a number of the IP addresses I manage are 100% clean.
Anyone know of something MSN/Hotmail recently began enforcing?
The blocks began at around 6 PM EST on Thursday of last week.
The error message is as follows:
Your e-mail was rejected for policy reasons on this
gateway. Reasons for rejection may be related to content such as obscene
language, graphics, or spam-like characteristics (or) other reputation
problems. For sender troubleshooting information, please go to
http://postmaster.msn.com. Please note: if you are an end-user please
contact your E-mail/Internet Service Provider for assistance.
I feel like a pawn for asking this on WHT but from what I can see
it's fairly widespread.
The domains in question do have basic SPF implemented as well.
not limited to a contact at hotmail / msn that would enjoy a phonebeating.
Code: Hi. This is the qmail-send program at m1370.contabo. I'm afraid I wasn't able to deliver your message to the following addresses. This is a permanent error; I've given up. It didn't work out.
<emailhere@gmail.com>: 2a00:1450:4013:0c00:0000:0000:0000:001b failed after I sent the message.
[Code] .....
Centos 6.6 + Plesk 12 Web Pro Edition
My server certainly did not spam Gmail servers, (my old server works fine sending email t gmail) I fear this has something to do with my "Postfix" configuration.
I have just noticed that for several days I'm constantly receiving these infos in /var/log/messages. I haven't done anything that would invoke them. How can I disable these messages? Are they anything to worry about?
Code: Feb 6 14:28:18 server kernel: [<c014f600>] find_extend_vma+0x12/0x4f Feb 6 14:28:18 server kernel: [<c0134383>] get_futex_key+0x39/0x108 Feb 6 14:28:18 server kernel: [<c011d305>] finish_task_switch+0x30/0x66 Feb 6 14:28:18 server kernel: [<c02cf618>] schedule+0x844/0x87a Feb 6 14:28:18 server kernel: [<c027734b>] sys_socketcall+0x1df/0x1fb Feb 6 14:28:18 server kernel: [<c0125bc5>] sys_gettimeofday+0x53/0xac Feb 6 14:28:18 server kernel: [<c02d137f>] syscall_call+0x7/0xb Feb 6 14:28:18 server kernel: [<c02d007b>] _read_lock_irq+0x4/0x1e Feb 6 14:28:18 server kernel: Badness in dst_release at include/net/dst.h:149 Feb 6 14:28:18 server kernel: [<f8d8a555>] ip6_push_pending_frames+0x340/0x369 [ipv6] Feb 6 14:28:18 server kernel: [<f8d9883f>] udp_v6_push_pending_frames+0x169/0x185 [ipv6]Badness in dst_release at include/net/dst.h:149 Feb 6 14:28:18 server kernel: [<c0278fa8>] Feb 6 14:28:18 server kernel: [<f8d98e7d>] udpv6_sendmsg+0x622/0x770 [ipv6] Feb 6 14:28:18 server kernel: [<c027a498>] __kfree_skb+0x55/0xf7 Feb 6 14:28:18 server kernel: [<c027e1b8>] skb_dequeue+0x40/0x46 Feb 6 14:28:18 server kernel: [<c027b009>] net_tx_action+0x60/0xfc Feb 6 14:28:18 server kernel: [<c0126354>] skb_recv_datagram+0x61/0x9b Feb 6 14:28:18 server kernel: [<c02b1ed7>] __do_softirq+0x4c/0xb1 Feb 6 14:28:18 server kernel: [<c010814b>] do_softirq+0x4f/0x56 Feb 6 14:28:18 server kernel: ======================= Feb 6 14:28:18 server kernel: [<c0107a60>] do_IRQ+0x1a2/0x1ae Feb 6 14:28:18 server kernel: [<c02d1d3c>] udp_recvmsg+0x5f/0x271 Feb 6 14:28:18 server kernel: [<c02b7b35>] common_interrupt+0x18/0x20 Feb 6 14:28:18 server kernel: [<c02d007b>] inet_sendmsg+0x38/0x42 Feb 6 14:28:18 server kernel: [<c02757f5>] _read_lock_irq+0x4/0x1e Feb 6 14:28:18 server kernel: sock_sendmsg+0xdb/0xf7 Feb 6 14:28:18 server kernel: [<c02757f5>] sock_sendmsg+0xdb/0xf7 Feb 6 14:28:18 server kernel: [<c011fee1>] autoremove_wake_function+0x0/0x2d Feb 6 14:28:18 server kernel: [<c027a89e>] verify_iovec+0x76/0xc2 Feb 6 14:28:18 server kernel: [<c0276f44>] sys_sendmsg+0x1ee/0x23b Feb 6 14:28:18 server kernel: [<c011cb7d>] activate_task+0x88/0x95 Feb 6 14:28:18 server kernel: [<c011d00a>] try_to_wake_up+0x225/0x230 Feb 6 14:28:18 server kernel: [<c011d00a>] try_to_wake_up+0x225/0x230 Feb 6 14:28:18 server kernel: [<c0170776>] inode_update_time+0x80/0x87 Feb 6 14:28:18 server kernel: [<c0164748>] pipe_writev+0x310/0x31c Feb 6 14:28:18 server kernel: [<c02cf622>] schedule+0x84e/0x87a Feb 6 14:28:18 server kernel: [<c027734b>] sys_socketcall+0x1df/0x1fb Feb 6 14:28:18 server kernel: [<c0125bc5>] sys_gettimeofday+0x53/0xac Feb 6 14:28:18 server kernel: [<c02d137f>] syscall_call+0x7/0xb Feb 6 14:28:18 server kernel: [<c02d007b>] _read_lock_irq+0x4/0x1e Feb 6 14:28:18 server kernel: Badness in dst_release at include/net/dst.h:149 Feb 6 14:28:18 server kernel: [<f8d98ef7>] udpv6_sendmsg+0x69c/0x770 [ipv6] Feb 6 14:28:18 server kernel: [<c027a498>] skb_dequeue+0x40/0x46 Feb 6 14:28:18 server kernel: [<c027b009>] skb_recv_datagram+0x61/0x9b Feb 6 14:28:18 server kernel: [<c02b1ed7>] udp_recvmsg+0x5f/0x271 Feb 6 14:28:18 server kernel: [<c02b7b35>] inet_sendmsg+0x38/0x42 Feb 6 14:28:18 server kernel: [<c02757f5>] sock_sendmsg+0xdb/0xf7 Feb 6 14:28:18 server kernel: [<c02757f5>] sock_sendmsg+0xdb/0xf7 Feb 6 14:28:18 server kernel: [<c011fee1>] autoremove_wake_function+0x0/0x2d Feb 6 14:28:18 server kernel: [<c027a89e>] verify_iovec+0x76/0xc2 Feb 6 14:28:18 server kernel: [<c0276f44>] sys_sendmsg+0x1ee/0x23b Feb 6 14:28:18 server kernel: [<c011cb7d>] activate_task+0x88/0x95 Feb 6 14:28:18 server kernel: [<c011d00a>] try_to_wake_up+0x225/0x230 Feb 6 14:28:18 server kernel: [<c011d00a>] try_to_wake_up+0x225/0x230 Feb 6 14:28:18 server kernel: [<c0170776>] inode_update_time+0x80/0x87 Feb 6 14:28:18 server kernel: [<c0164748>] pipe_writev+0x310/0x31c Feb 6 14:28:18 server kernel: [<c02cf622>] schedule+0x84e/0x87a Feb 6 14:28:18 server kernel: [<c027734b>] sys_socketcall+0x1df/0x1fb Feb 6 14:28:18 server kernel: [<c0125bc5>] sys_gettimeofday+0x53/0xac Feb 6 14:28:18 server kernel: [<c02d137f>] syscall_call+0x7/0xb Feb 6 14:28:18 server kernel: [<c02d007b>] _read_lock_irq+0x4/0x1e
I've had it with EV1. On any given day we get 30-50 BFD attacks from their servers. That doesn't include the dozens of other types of attempts per day our IPS/IDS catch. We've also traced back client servers that were hacked directly via EV1 servers.
It's obvious that EV1 does little or nothing to stop these issues. We spoke to the FBI about these issues and their comments lead me to believe that EV1 is one of the major sources of these issues and that EV1 has shown little or no effort to curb the problem or cooperate in stopping the issue.
We have elected to now block all all EV1 IPS.
Drastic measures, not really. If they won't take care of their own problems I no longer want them dumped at my door step. I think other hosts might want to think about this.
I am hitting a limit on number of POP signons per hour imposed by my host. I host maybe 10 domains on this account and have 4 or 5 email addresses to monitor for each domain. If I check once every 15 minutes I run up against a limit on the number of POP3 signons permitted by my ip. Add this to having multiple mail clients behind a NAT router and I am beginning to have real problems.
Does anyone else have this issue? Is my only workaround to forward all email to a single account or install a local mail server? Does 100 POP signons an hour from a single IP sound like a lot to anyone? Any advice?
Let's say you want to protect againts hacking,and using method with simply blocking loading url.So let's say someone hacked your index.html and changed links to lead to his domain.com.Is it possible to block what would be loaded on site ?(to prevent possible future hacking intrusions)
I have 2 server one is Linux server+Cpanel+CSF firewall where my site is running and one is windows server where my exchange mail server is running .Now thing is that when anyone send mail through my web site (after filling contact form) to me it doesn't come to my email id but when i stop my firewall and then i check contact form and fill it the mail goes to my mail id.
I have php script with SMTP authentication.
which port is blocked in my firewall and after disabling firewall it work.how can i check when firewall is on that time why mails are not coming in my email id that time which port is blocked by firewall.
Allow Port in firewall:-- 25,80,20,21,465,443,110,143
seems one of my sites has been added to some mega "toplist" site thats bringing in fake traffic to my site which is basically like a DOS attack - over 1000 connections.
coming from [url] [url] [url]
linking to a php file in one of my accounts which has since been removed. however still getting a heck of a lot of hits, they probably all see 404 messages which still causes load on my server.
any suggestions how to fix this? the traffic is referred from above urls but hundreds of ip addresses. is there anyway to blacklist the referrer so people are just blocked, period?
I had a few sites hacked today. I'm using phpbb (all updates) and, apparently, the only thing they did was to drop the database and replace it with one featuring a single post "advertising" their hacker group. I tried bringing everything back on-line, but they would just attack again and take it down quickly... I'm thinking it's probably just some script kiddies.
They announce themselves as "turkish hackers". Browsing around for their message, I found they attacked quite a few sites. What I was thinking, to help preventing this from happening again, is to ban all visitors from Turkey (none of these sites has a need for them, as they're aimed at a local audience).
Can I do this simply by using "deny from .tr" in htaccess? Or are there any more steps to be taken?
I have my server set up with the smtp daemon running on port 125, and assp listening on ports 25 and 26, and forwarding to port 125 if the mail passes. This setup has been working for months and months. Already today I've received several emails.
I just attempted to send an email, however, and thunderbird could not connect to port 26. (I use an alternate port because my ISP blocks port 25 except to their mail servers)
So I thought that assp had stopped running. Attempted to go to myip:55555, but the page would not load. Now I really thought assp was broken. SSH'd into server and was able to telnet to localhost, port 26 without an issue. Was also able to lynx [url] without an issue.
Since I'm able to log in to all of these weird ports via SSH but not from my local computer, I'm apt to think that they are blocking the ports (for some reason).
Is there any way I can test this theory? Nothing has changed on my side firewall-wise, and the poor girl at the ISP company didn't even know what a port was. I would like to be 100% sure before I give them another call demanding to speak to someone higher up...
My IP in clean from any blacklist/RBL databases but hotmail is blocking with the error message below:-
Remote host said: 550 Your e-mail was rejected for policy reasons on this gateway.
Reasons for rejection may be related to content such as obscene language, graphics, or spam-like characteristics (or) other reputation problems. For sender troubleshooting information, please go to [url]. Please note: if you are an end-user please contact your E-mail/Internet Service Provider for assistance.
i have a very strange problem with hotmail service i can't send any email from my domains to any hotmail account and i can't send any email from hotmail account to any domain use my IP
when i send email using my mail server i got this reply
SMTP error from remote mail server after MAIL FROM:<myemail@mydomain.com> SIZE=2402: host mx1.hotmail.com [65.54.244.136]: 550 DY-002 Mail rejected by Windows Live Hotmail for policy reasons. The likely cause is a compromised or virus infected server/personal computer. If you are not an email/network admin please contact your E-mail/Internet Service Provider for help. Email/network admins, please visit [url]for email delivery information and support
i contact hotmail and they only reply my with AUTOMATIC EMAIL Asking my if i can update my MSN SOFTWARE
I have a virtuozzo VPS with CSF. People can't connect to ftp because the firewall is conflicting with iptables. I looked at the csf guide:
[url]
To correct it, the ftp issues states:
Quote:
For example, with pure-ftpd you could add the port range 30000:35000 to TCP_IN and add the following line to /etc/pure-ftpd.conf and then restart pure-ftpd: PassivePortRange30000 35000
Where is pure-ftpd.conf? Do I have to install it or something?
I have a client who needs to block IP range on a windows server. However, he is using Cloud hosting from Rackspace. I guess they are not being corporative in doing so. Anyway to do this without root? Perhaps from the control panel?
ive got a flash music player that gets its tracks from a dedicated directory on my server. there's about 10GB of music in there (we own it) and i want to stop people getting at the files (they can see the path in the source of the page that has the flash player).
i tried an htaccess directive that stops listing the directory contents but that obviously wont work. what is the best & most secure strategy to achieve this, blocking all ip addresses apart from my server's?
I have come across an issue where traffic from India is hurting my business. What I have is a number of job boards. Realistically, the only issue I am having is with IT and Engineering positions being applied for heavily by people in India. Since my customer base is all in the USA, I would like to just block India.
While I know this is easy with Apache using a .htaccess file, I am using IIS on server 2007. Does anyone have any idea on how to do this easily with the large number of IPs that India uses?
I recently signed up a new client to my dedicated server - The minute they switched over to my server, it seems that all hell broke loose. (I'm going to refer to them as "Company A")
Company A called me up and said that one of their employees was getting a huge amount of SPAM and that after a day or two, they were having issues with their E-mail.
I looked at my logs and it showed something unusual-
When I explained this to Company A, they ran some virus checks on their computers and 3 out of 5 computers had viruses on them.
They claim to have fixed the viruses but now, they cannot send e-mails to specific clients.
I checked their I.P. against blacklists and they are using Comcast cable internet at their location and I cleared their only blacklisting (spamhaus.org).
I'm still getting calls that Company A cannot e-mail a few of their clients and just to make sure it's not JUST them, I tried to send a test e-mail to the same clients as Company A.
The e-mails from me were rejected due to time-out.
HERE IS MY QUESTION:
Is this an issue on MY end that must be taken care of *OR* is it due to the fact that they had viruses on their computers and now they are blocked because the virus tried to attack everybody in THEIR e-mail address book?
None of my other clients are complaining of e-mail issues or that e-mails are getting kicked back. Just Company A.
I have a client who was sending email to another server with Cpanel, all of a sudden all emails are in the queue for a few days and we checked everything was ok on our side even the logs are able to find the domain name, just that it drops from there.
Took me a while I finally telnet their port 25 and found it block, but somehow a few minutes later it was unblocked. Is there any mechanism in Cpanel that auto block port 25? I know the client uses a catchall so all rubbish went there, I cleared the catchall for him.