Is there not a way to change the default for the spam assassin level when creating a new mail account and still have the ability to change it individually if needed?
I changed it in the spamassassin config file /etc/mail/spamassassin/local.cf and in the server mail settings, but it still reads 7 when I create a new account and go to turn on the spam filtering. Does this value come from the db?
I can write a script making api calls? but surely there is a way to change the defaults and still have the ability to change these from the default for each account if needed?
I am trying to install Spam assassin on Plesk 12.0.18 on windows server 2012 r2 . I am getting error:
Error: Unable to set Plesk SpamAssassin 3.3.2 as the default Spam Filter: defpackagemng failed: Execute spammng.exe --check failed with error code 1: Unable generate the unique file name by template D:Program Files (x86)ParallelsPleskAdditionalPerlsiteetcmailspamassassinlocal.cf[*].bak: directory D:Program Files (x86)ParallelsPleskAdditionalPerlsiteetcmailspamassassin does not exist
I have tried re-installing and installing spam assassin from command and as per the solution given in below KB: URL....But I an still not able to install in on the server. I have checked all directory paths are correctly located.
Hey, how many of you guys are using Plesks Spam Assassin, if so how do you update it or give it a new list of places to block? I see no difference with it enabled or not and get about 20 spam messages per night and 40 total a day.
My webhost says that I can enable "spam assassin" on my email account for free. But if I want "Postini", then I will have to pay extra. I need spam protection on my email account. But I don't want any false positives because I don't even bother scanning through my spam box.
How much better is Postini than spam assassin? I know Google is trying to buy Postini. So I figure it must be pretty good. But is it so much better than than free one?
Rather than just tagging the subject with ***SPAM***. Am I going to have to recompile spam assassin in order to get that working? I have a client of mine who wants all spam just removed before it hits his inbox. Is there a setting somewhere in cpanel that I am missing for this? Possible just to apply it to one domain name?
Error when trying to set atomic subscription rule:
Failed to install the ModSecurity rule set: SecReadStateLimit is depricated, use SecConnReadStateLimit instead. Syntax error on line 70 of /etc/httpd/conf/modsecurity.d/rules/atomic/modsec/00_asl_zz_strict.conf: Error creating rule: Could not add entry "127.0.0.0/8" from: 127.0.0.0/8.
In directory /etc/httpd/conf/modsecurity.d/rules I have only: atomic.new modsecurity_crs-plesk tortix tortix.backup
On attempting to select the configuration->filter option on RoundCube, we got the error message:
SERVICE CURRENTLY NOT AVAILABLE! Error No. [501]
On /var/log/plesk-roundcube/errors we can see the following logs:
[06-Jun-2015 14:57:17 -0300]: PHP Error: SieveRules plugin: Unable to open default rule file in /usr/share/psa-roundcube/plugins/sieverules/sieverules.php on line 1523 (GET /roundcube/?_task=settings&_action=plugin.sieverules) ... [06-Jun-2015 14:57:17 -0300]: PHP Error: SieveRules plugin: Unable to open example rule file in /usr/share/psa-roundcube/plugins/sieverules/sieverules.php on line 1560 (GET /roundcube/?_task=settings&_action=plugin.sieverules) ... [06-Jun-2015 14:57:17 -0300]: PHP Error: Error loading template for sieverules.sieverules in /usr/share/psa-roundcube/program/include/rcmail_output_html.php on line 496 (GET /roundcube/?_task=settings&_action=plugin.sieverules)
I purchased an ssl certificate and installed it in plesk via server->ssl certificates. I then followed the following guide to set up imap and pop to use my cert (instead of using the default i used my cert into) URL... Now I'm getting an issue with sending emails, something about SSLHandshakeException, and some clients can't even log in. MTs support mentioned this might have something to do with POODLE.
When adding a subscription with a certain plan, I get this error"Error: The plan was not applied: Custom changes in PHP settings" almost instantly after I initiated the creation of the new subscription. Another service plan doesn't have the issue, and though I tried finding the reason why one works while the other doesn't I simply wasn't able to. The service plan in question is used for over 40 others without a problem just when I select it for a new subscription, I get the mentioned error message.I am using Plesk 12 on Linux, all latest updates installed.
Would like to know how to implement css and images to work with custom error documents. For some reason the folders are ignored even with the correct path being entered within the html. Only plain text appears.
I have the web pro edition panel 12 on centos 6.5 64bit, and i have made some custom firewall rules in order to be able to run a teamspeak server. The problem is that the firewall randomly blocks the teamspeak port and keeps it blocked unless i restart the firewall.
We are successfully using fail2ban on our server (CentOS 6.6, Plesk 12.0.18), that is, jails running and blocking potential intruders
However, we tried to create a custom jail for the CMS that is being used by most of our clients.
I followed the instructions (Tools & Settings > IP Address Banning (Fail2Ban) > Jails > Manage Filters > Add Filter) and created the filter I wanted, but then it does not appear in the list, even though it displays a message reading that the filter was created successfully. Then, if I try to create a new Jail, the filter is not available from the list.
Looking at the directory /etc/fail2ban/filter.d/ I can find a file that has the same name as the filter I created, with a .local extension (the file name does not contain whitespaces or other special characters)...
Have some very important questions regarding changing plesk ports and creating full backups.
1. When changing plesks port number, what exactly will it effect? Will it effect auto updates, etc.?
2. When creating a backup, I'd like to backup the entire server to rollback at anytime when changes are made to core files, is this possible?
3. With backups, somehow I'd like to schedule backups to possibly make nightly copies to an external hard drive on my computer for a fail safe method just in case the server happens to crash and I'd need to restore to another server/service. How would this be possible?
As the admin user, change the setting for a particular email account called "The maximum number of outgoing email messages" to a value beyond the default. For example if the default is 35, set it to 75. This is common -- often we have customers who send larger quantities of messages than the average user.
Login as a reseller with access to manage the email account and attempt to change any *other* value. For example, you could completely ignore the outgoing mail messages value and change just the Auto-Reply value
Plesk refuses to allow the change and kicks me back to the first tab with the following error:
The value must be in the range 0..35. Only the Plesk administrator can adjust this setting.Click to expand...
I have 5 Linux Plesk 12 servers, and I use Spamassassin, usually at a sensitivity of 2 or 3, I also use the following DNS
Blackhole lists: zen. spamhaus. org;b. barracudacentral.org;abuse.rfc-ignorant.org;cbl.abuseat.org;bl.spamcop.net;nomail.rhsbl.sorbs.net
But all of this seems to have minimal effect. I examine spam that comes through which looks very obviously like spam, but Spamassassin gives it a very low score, usually in the negative numbers.
Is SA just not as effective as I thought? Seems like if Gmail, etc can filter spam so effectively, then why can't SA? If there's something I'm not doing right, or what you all do to combat spam with Plesk 12.
My server is saturated in SPAM e-mails being sent from it, however I am struggling in tracing the root of this problem. I have now exhausted 4 IP addresses and our provider is blocking port 25 automatically on a number of occasions now.
I have used the KB article: [URL] .... to trace the highest senders of e-mail, however this has proved to be unsuccessful in finding "all" of the offending domains.
I have suspended e-mail and domains on a number of subscriptions due to the high number of e-mails being sent from the system. I have also enabled outbound mail control and set limits to 10/hr however there are domains attempting to exceed this on an hourly basis. I have investigated these subscriptions but am not able to find anything offending. Is there any feature within plesk that can show me exactly where the spam is coming from...
I am dealing with a situation which i cannot understand. I am running an website for a resort and occasionally i am sending e-mail stop the people who book villas using the website. By occasionally i mean last year i sent 2 e-mail campaigns with a proper spam score.
However, at this moment, even the e-mails that i receive from the website's contact form arrive as Junk into Gmail for example.
Domain abc.com is hosted on our server, it has a hosted e-mail 123@abc.com. This e-mail adress keeps getting SPAM messages from an address abc@srv2.xyz.com (where srv2.xyz.com is our server FQDN). What we understood by reading the headers (posted below) is that someone is sending an e-mail to support@abc.com. This e-mail adress, as configured in Plesk, redirects e-mails to 123@abc.com. But we don't understand how someone managed to send an e-mail from an unexistent abc@srv2.xyz.com to it.
Here are the headers:
DomainKey-Status: no signature Return-Path: <Coulter_Faustinoa1@aspli.com> X-Original-To: 123@abc.com
I just did the update to 12.0.18 #6 and everything seemed to go pretty well. One feature we were really interested in was the Outgoing Spam Filter. Unfortunately, the error I see when I go to that feature reads, "Protection : Not active. There are some problems that prevent the service from being started."
When I Google that error, I'm brought to some KB articles but they are all for the older Outgoing Spam Filter that you need a license key for. I don't believe that is the case any more - if it is, I don't know where to get the key. I will say point out I'm a bit of a Linux novice (we are running CentOS 6.5 on this server), so I'm not really sure where to look....
From 1 week until now I got 4 spam attacks. The attacker is the same, because the emails sent are iqual.
The technique is also the same, they use an email account (compromissed password) and send emails through smtp server.
When I detect the attack, i do:
1. identify the compromised account 2. Change password from the compromised account 3. Stop qmail 4. Clear queue with qmail-remove 5. Start qmail
The problem is that they already used 4 diferent domains since the first attack. So, here is my problem, how do they discover the passwords?! How can I solve this problem? I have hundreds of emails accounts and can't change it all.