Plesk 11.x / Linux :: Anti-virus And Anti-spam Enabled By Default On Mailbox Creation?
May 27, 2013
It is possible to have anti-virus and anti-spam enabled by default when we go to "CREATE E-MAIL ADRESS" -> "SPAM FILTER" / "ANTI-VIRUS" is always disabled.
"What anti-virus do you use on your postfix email server powered by Plesk?".Is there an anti-virus program that can be installed on Plesk version 12.0.18 as an extension or component? I need it primarily for protection of incoming email from malware.I've seen in Add or Remove Components in the Mail hosting features that I have installed Kaspersky antivirus, but I didn't seen anywhere that it actually can be configured from within Plesk. It also, as far as I can see, doesn't do anything. what is Kaspersky antivirus used for in Plesk and how can I configure it?
We have 2 servers, one running Windows 2003 Enterprise that hosts a ColdFusion app, and one running Windows 2003 Standard that hosts our SQL database that is used by the CF app. Nothing else runs on them.
Does anyone have any suggestions for anti-virus products that we could use on these? I don't want one of those elaborate and expensive "suite" programs. I just need to protect the boxes.
I use Kaspersky on our individual machines, and I really don't care much for Norton anymore.
for a server-wide anti-spam solution I can implement on a Linux server. The mail queues are constantly getting backlogged with thousands of messages which bring the servers to a crawl. There are really two issues the solution needs to address.
1) Spam 2) Spam sent to other people that have the from address forged with our clients' email addresses.
We have spam assassin installed for individuals to use, but there's got to be some sort of solution that can clear out the vast majority of the junk before it even gets to the queue.
It probably goes without saying, but the solution needs to be open-source or have a very inexpensive license.
Seems like I'm having considerable problems with APF's antidos feature. I keep getting legit users banned from my site, and don't know how to stop it (other than disabling antidos altogether, but I guess there should be another way).
I've already set: TRIG="100" SF_TRIG="100"
...in the antidos configuration file but I'm still seeing more and more legit IPs getting added to ad.rules. I've read that raising or lowering LN="100" is the other tweak I should try, but there simply is no such value defined in my conf.antidos file.
Another thing I noticed that, although I only got two notification mails telling me about "attackers" blocked by antidos, there are roughly 40 entries in ad.rules. As a matter of fact, I don't understand what antidos is doing there in the first place. Seems like iptables doesn't log to var/log/messages anyway, at least not on my machine - so where is antidos getting those ips from?
I am running Win2003 server with Plesk 8.3. Antivirus running is F-Prot. Me and my clients have been getting a lot of spam emails and I am looking for suggestions on how to stop them. Plesk seems to provide some options for checking blacklisted spam servers but I was not too satisfied with the result. Maybe I was not looking up the right urls?
So, any suggestions on blocking the spam would be welcome. I am ready to pay for it too...but I am on a very tight budget. A free solution would be the best for me at the moment.
I also used SpamAssasin for a time being but it did not work out to any of my client's satisfaction even after a month's "training" of SpamAssasin.
I am interested in ASSP as a anti-spam tool and have heard good things, but I have 1 question I can't seem to find an answer too.
With ASSP is there a way to screen image spam like you can with FuzzyOCR? With ASSP do you even need to scan images at all? Because it waits for the sending server to respond for authentication?
I was running MailScanner / SpamAssasin / FuzzyOCR combo with a couple of chron jobs (to sweep fake bounce email out of the mail que for example) with very effective results, but it took forever to tweak all three to reduce server load. MailScanner was breaking webmail randomly so I have it disabled currently so I get a lot more spam.
We recently had a problem with a mail spammer. He sent over 90,000 emails and had 20,000 in the queue. Is there anyway to possibly stop this as it was really lagging the server bad. So bad the softlayer took it offline for a while...
where i can buy some cheap spam protection appliance. Right now, we are buying from mailfoundry, but it is a little bit expensive. I send an email to can spam, but i was quoted 18 K anually, to protect 25K emails. Anyone, have a way to buy some cheap anti-spam appliances.
You will find many Anti spam blocker tools available in market. I recently come to know about[url] . It’s an excellent tool to encrypt your email account if you use to display it on your website.
Generally, spammers uses robots (some kind of crawler) to get email accounts from websites. Once they get it they start selling it to other spammers and will start sending spoofing emails.
This tool will help you to encrypt your email address and stop spam coming from your website
Does anyone have any experience to share concerning these devices?
I'm having some serious spam issues and would like to look into a better approach to preventing this than the typical SpamAssasin solution bundled with cPanel, Plesk and so on. SA seems rather inefficient, needs a lot of training, can get a lot of false positives, tends to break now and then, and so on.
Have any of you used either the Barracuda or the MailFoundry applicances, or even better - compared them first hand? Are there any similar solutions out there, perhaps cheaper/more cost effective in the long run?
$2000-3000+ for the hardware and around $500 a year for an anti-spam solution is a little steep in my opinion. Especially considering the old and cheap hardware for an example MailFoundry uses. How accurate they actually are in terms of false positives is also seemingly debated. MailFoundry promises a near 0 false positive rate, while some user-experiences suggest somewhere between 6-10% - which could represent an issue just as problematic as spam itself. Nobody wants to lose out on important email. To spend such an amount on a device and updates, it certainly needs to be worth it. Is it?
Are there any equally good or better software based solutions out there, that one could for an example use to set up a custom anti-spam server using existing hardware at the DC?
When I create Mailbox for customer, spamassassin have status (default):
HTML: Status false The score that a message must receive to qualify as spam What to do with spam mail move Add the following text to the true beginning of subject of each message recognized as spam Modify spam mail subject text ***SPAM***
Black list ================================ Server-wide black list:
User's black list:
White list ================================ Server-wide white list:
User's white list:
But i want it:
HTML:
Status false The score that a message must 7 receive to qualify as spam What to do with spam mail text Add the following text to the true beginning of subject of each message recognized as spam Modify spam mail subject text ***SPAM***
Black list ================================ Server-wide black list:
User's black list:
White list ================================ Server-wide white list:
User's white list:
Not Move, it only text at "What to do with spam mail text"
One of my potential client is getting DDOS occassionally. According to the DCs-PCCW and Singtel, the attacks come from China mainly and the DDOS used up all the available bandwidth.
I have asked many DC in Hong Kong. Most of them said they will only null route their IPs and wait the DDOS gone. It seems that none of the DC in HK offer any sort of Anti-DDOS solution.
My client don't want their site completely offline every time they got attacked. So, could any professional suggest what we can do?
What I am thinking of is: 1. Getting 2 connection from different bandwidth providers 2. Using Geo DNS: [url]
Then, I can separate all China users by forcing them to use 1 connection. Will this work? Is there any potential problem here?
Also, I am also thinking of using BGP. Will that make us partially visible as well?
Is there not a way to change the default for the spam assassin level when creating a new mail account and still have the ability to change it individually if needed?
I changed it in the spamassassin config file /etc/mail/spamassassin/local.cf and in the server mail settings, but it still reads 7 when I create a new account and go to turn on the spam filtering. Does this value come from the db?
I can write a script making api calls? but surely there is a way to change the defaults and still have the ability to change these from the default for each account if needed?
it seems people tell Dos Deflate is the best basic antiddos script and tons of webhosts use it.
I think its ratter old and it doesnt work for anything these days. Why do hosts still run it? And why isnt there a better alternative?
I used Deflate some years ago and I got problems. And tried then after some years again and nothing changed, the same basic old script which counts connections and ban IPs.
The think with Deflate is that if you have a high limit, lets say ban with 150 connections per IPs, its absolutely worthless for attacks, since you are letting already 150 connections per IP.
And if you lower it at least me got with tons of problems banning real visitors. Even over 150 I had complaints about real visitors on a server telling the server blocks him. Dont ask me how someone has 150 connections to a servers but I got complaints from multiples people over the world the 1 month i had it running over a 2 years ago.
I also see a really big problem with it. Allot of ISP share IPs between users. So its really possible you get 200 connections from the same IP and they are different users. Banning an IP based on the connections you can probably shutdown a full IPS and their visitors. I wish there was a better solution but using a high value like 300 or 500 doesnt make sense in a Dos attack. And if you use a low value you start to get into problems.
We agree it will not work with distributed attacks but I dont think it can even work with single attacks since besides connection count it doesnt seem to be any more analisys behaviour.
The way I would make a script like that. Is to check all traffic and IPS all the time. And mark IPs that always access a server ass good ones. The newer the IP the more suspicious. On a attack this way real visitors would still pass but attackers will not as they are new ips. You can also match then the number of times its connecting, how long, etc.
Over the past number of years there has been an obvious increase in credit card fraud and identity theft.
Our policies have always tried to stay a step ahead but it seems no matter what is done the occasional fraudster manages to squeeze through, costing us a lot of money. At one some point in early 2009, it got as bad as 60% of the orders we received. It ended up eating a LOT of our time just to go through each order and verify them as best we could.
What methods do you use to fight fraud?
I'll start with some of the things we do.
- Require CVV code on the credit card - We call the customer's telephone number and verify with them. - Verify the telephone number matches the region of the address they provide - Require the CC issuing Bank's name and number - We often require the customer to fax a signed credit card authorization form - GeoIP matches location of the address in the order
Obviously the big challenge is proving that the person placing the order is the actual owner of the card. I've received the correct CVV, spoken with the customer on the phone number, had the phone number match the region... non-US so I wasn't able to verify their telephone details with the issuing bank. Had the GeoIP match and still found out it was fraud.
On a side note: Am I the only one that feels banks and those issuing credit cards need to take more responsibility for a system that's clearly broken? Even after going through the process above, it can still be fraud with a chargeback issued. In those cases, the company loses the money they made, pay a fee to the payment provider, lost time for Sales Reps and Tech Reps, and of course they lose money on hardware, electricity and bandwidth.
Best Dedicated Hosting for Anti DDOS - Please Help!
Our website has been coming under attack for the last 6 months. Usually every weekend for 3 days. We are currently hosting at ThePlanet and they do nothing more than turn on Cysco Guard which blocks the bad traffic and the good traffic as well. They don't do anything on their level to block the ddos attack.
I contacted the guys at ProxyShield and they want $1244 a month to route the traffic for us. That's a bit high for someone with a small business not making more than $500 a week online. EDIT: Just got back in touch with them and the $1244 is only for 20mb if you need 100mb it's $2400! that's just insane for a small business.
My question to you guys is who can host us or what services can I use to get rid of these ddos attacks? The Planet has horrible support and I'm not sure where to go or look. Unless we sit at the computer and block every inbound attack all day we simply can't beat it.
Any suggestions?? Currently they are sending SYN_FLOODs in the amount of 93MBit/s and our hosting only includes 100MBit/s, so you can guess how difficult it is to maintain reach ability.
I am trying to purchase either a anti-ddos or firewall machine. My main objective is to prevent from ddos attack.
Do i purchase a anti-ddos hardware (please recommend), or firewall hardware (please recommend)?
anti-ddos and firewall is the same right? is about ip analyse and filter right?
After using the ddoss/firewall , i may also want to subscribe to those third party doss prevention which has big bandwidth, if i have a good hardware anti-ddos/firewall already, do i still need to have subscribe to these services?
trying to secure my new server that will be opening for shared hosting.
So far I've found:
CHKRootKit, RKHunter, and ClamAV
As for Firewall, I've setup CSF but my question is, what is a good setting for blocking SYN Floods without blocking clients who might be browsing their site and, using DA, and FTP.
In the past I've used:
iptables -A INPUT -p tcp --syn -m limit --limit 1/s --limit-burst 3 -j DROP iptables -A INPUT -p tcp --syn -m limit --limit 3/s --limit-burst 5 -j DROP and took down some pretty big attacks, but it was very touchy.
i have a dedicated server that i use for stream flv files. In this server i have apache.
Do you know any apache solution for prevent streaming of flv files to others domain name ? I want to stop leeching and permit stream of files only for my domain name. The htaccess solution in my case don't works...