I was wondering what other people did to prevent their networks from being used as platforms for network abuse. I just setup an inward facing snort server, myself- But I was wondering what other providers (especially other low-cost VPS providers)
I've got a e-mail notification problem since i upgraded from Plesk 11.5 to Plesk 12: One specific Application Update for customer X is being sent to all my customers.
Last week we did have a problem with a busted customer portal. ( not customer X, plus still on Plesk 11.5 ) I fixed this by using this procedure: [URL] ..... Restored two records and problem solved.
As a temporary resolution we disabled Application Updates for our customers, but I do want that my customers receive Application Updates, but just the one where they are the recipient.
If I have a php page with no errors, everything works fine. If I remove a semicolon so it should give me an error, it displays nothing but a white page... Also, there is no error_log created.
php.ini error config:
Code: ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; ; Error handling and logging ; ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
; error_reporting is a bit-field. Or each number up to get desired error ; reporting level ; E_ALL - All errors and warnings ; E_ERROR - fatal run-time errors ; E_WARNING - run-time warnings (non-fatal errors) ; E_PARSE - compile-time parse errors ; E_NOTICE - run-time notices (these are warnings which often result ; from a bug in your code, but it's possible that it was ; intentional (e.g., using an uninitialized variable and ; relying on the fact it's automatically initialized to an ; empty string) ; E_CORE_ERROR - fatal errors that occur during PHP's initial startup ; E_CORE_WARNING - warnings (non-fatal errors) that occur during PHP's ; initial startup ; E_COMPILE_ERROR - fatal compile-time errors ; E_COMPILE_WARNING - compile-time warnings (non-fatal errors) ; E_USER_ERROR - user-generated error message ; E_USER_WARNING - user-generated warning message ; E_USER_NOTICE - user-generated notice message ; ; Examples: ; ; - Show all errors, except for notices ; ;error_reporting = "E_ALL" ; ; - Show only errors ; ;error_reporting = E_COMPILE_ERROR|E_ERROR|E_CORE_ERROR ; ; - Show all errors except for notices ; error_reporting = E_ALL & ~E_NOTICE
; Print out errors (as a part of the output). For production web sites, ; you're strongly encouraged to turn this feature off, and use error logging ; instead (see below). Keeping display_errors enabled on a production web site ; may reveal security information to end users, such as file paths on your Web ; server, your database schema or other information. display_errors = On
; Even when display_errors is on, errors that occur during PHP's startup ; sequence are not displayed. It's strongly recommended to keep ; display_startup_errors off, except for when debugging. display_startup_errors = Off
; Log errors into a log file (server-specific log, stderr, or error_log (below)) ; As stated above, you're strongly advised to use error logging in place of ; error displaying on production web sites. log_errors = On
; Set maximum length of log_errors. In error_log information about the source is ; added. The default is 1024 and 0 allows to not apply any maximum length at all. ;log_errors = On;
; Do not log repeated messages. Repeated errors must occur in same file on same ; line until ignore_repeated_source is set true. ignore_repeated_errors = Off
; Ignore source of message when ignoring repeated messages. When this setting ; is On you will not log errors with repeated messages from different files or ; sourcelines. ignore_repeated_source = Off
; If this parameter is set to Off, then memory leaks will not be shown (on ; stdout or in the log). This has only effect in a debug compile, and if ; error reporting includes E_WARNING in the allowed list report_memleaks = On
; Store the last error/warning message in $php_errormsg (boolean). track_errors = Off
; Disable the inclusion of HTML tags in error messages. ;html_errors = Off
; If html_errors is set On PHP produces clickable error messages that direct ; to a page describing the error or function causing the error in detail. ; You can download a copy of the PHP manual from http://www.php.net/docs.php ; and change docref_root to the base URL of your local copy including the ; leading '/'. You must also specify the file extension being used including ; the dot. ;docref_root = "/phpmanual/" ;docref_ext = .html
; String to output before an error message. ;error_prepend_string = "<font color=ff0000>"
; String to output after an error message. ;error_append_string = "</font>"
; Log errors to specified file. error_log = "error_log"
; Log errors to syslog (Event Log on NT, not valid in Windows 95). ;error_log = error_log;
We have about 100 servers using CSF, and CSF is generating A LOT of mail alerts.. which is causing us to receive over 1000 mails daily, just from CSF alerts.. this doesn't include support emails or others.
My question..
How do you handle mail alerts when you have lot of servers? See... i can not waste 5 hours reading every mail.. even if I start deleting those mails a lot of important and critical alerts can be erased in the process..
i'm wanting my users to be able to upload pictures to their accounts via email by sending the picture to a central email address (pics@mysite.com, for example).
from there, i'd like to take that incoming email and parse it how i see fit. (matching the email address to the user account, inserting the subject as the photo title, etc...)
I've been with NPSIS as a host for 8 years. They started out with 2 guys and their wives doing the billing. Many changes/expansions over the years and all went well till they sold out in 2007. I didn't even realize they sold it until recently when the problems kept increasing and the solutions didn't. It ended today when NPS threatened to turn me in for collections. I in turn will be filing BBB and Attorney General. They lost track of my payment for 2 years thru the school I teach at. I had a grant that paid for a domain name and some hosting for the 2 years for the kids to create their own sites. I called to confirm payment before the grant expired last spring. Now they suddenly say it was never paid. They did slip up and mention that they were in the process of converting to a new billing software package. Good Luck at turning the school in to collections.
Anyway, I am in the market for a new host. I have a couple of other accounts that will follow me. I have been searching for 2 days now and I am finding more bad hosts than good ones. I'm not looking for a McDonalds approach like godaddy or hostgator. I'd prefer something more than a 1 man operation. My typical approach with any new business is to google "NewBusinessName complaint" or "NewBusinessName sucks". This only works for places that have been in business for a year or more though. I am coming up with a lot of hosts on my "NOT" list and the few I find on the good list don't quite have what I want either.
My main concern for my primary account is email/span handling. I like to use horde and squirrelmail, and boxtrapper as part of cpanel. I can deal with something other than boxtrapper if it has white list/ response challenge. I am not sure what the next 8 years will bring as far as needs/changes are concerned but I want a host willing to change with the times. Dealing with spam is a big deal to me.
Any suggestions? Like I say I've been searching for 2 days so far and it seems like finding a needle in a hay stack. I'm still reading lots of info on this site but I am in a hurry to switch hosts.
I created a SQL Server database that need sto be setup for the customer on their hosting account. The hosting company wanted the sql statemens, ok so I gave it to them to setup my tables and stored procedures. I also mentioned that if they gave me a username and password with database location and catalog name for the connection string and as long as I had create rights for that database I could run my own sql statements via SQL Server Enterprise Manager to set it up. They sent an excuse about how insecure that wasy and that they couldn't send any usernames or passwords for the database to me t set this up.
They also said it's becomming more common for Hosting Companies to not allow access to the databases for thatpurpose. Ok... uh how in the world do they expect to have a programmer create and run their data driven website without that information? I'm confused on what these guys are doing.
So.. is this true? Are more hosting companies hording their database infromation and customer usernames and passwords from the developers?
a question on mod_proxy. We're using mod_proxy as a simple reverse proxy (ProxyPass & ProxyPassReverse) to reverse-proxy various back-end PHP and Mono/.NET apps.
One problem we see is that when the back-end PHP app suffers an error (e.g. a 404 or 500) , then mod_proxy ignores the nicely-formatted custom error page served up by our PHP app, and instead serves a very plain generic mod_proxy 404 or 500 error page back to the client. Is there a way to configure mod_proxy to serve up the 500/404 error page content which is created by the back-end app ?
(We thought ProxyErrorOverride might work, but it seems to be intended for the opposite scenario, where I want to *ignore* the 404 page content from the back-end and show a mod_proxy-defined error page instead.We're using apache 2.2 on 64-bit CentOS 6.5 ( httpd-2.2.15-31.el6.centos.x86_64 )
Last week my VPS hosting provider has suspended my server because of a SPAM petition made by spamcop.com.
The problem is that the incriminated spam message was not sent from any IP adress of my VPS, or a domain hosted on my VPS. Still this, my ISP has suspended my server without sending me any warning e-mail.
Only guilt that i have is that the spammer found some e-mail adresses in one webportal hosted by my server and he mentioned this on the last 2 lines of the message: "This message was sent to you be cause we found your e-mail adress on a public website and this website is....www.somewebsite.com.
The admins of my ISP didn't asked me about the potential fraud and closed my VPS for almost 24 hours without warning me. I was in vacantion for 10 days and i didn't know about the fact that my clients are in trouble.
Now i'm asking you: Does the ISP made a right thing suspending my VPS only because on of my hosted domains was mentioned in the spam message, and no IP adresses or domains names of my VPS were in the X-Originating-IP header lines?
Apparently smtp servers from other countries are using our email addresses in the 'reply to'. Because of this much failed messages replies (message is blocked; user doesn't exist) are returned to our email accounts. Is there a way to handle abuse like this? We aren't an open relay but for some reason all the mail is coming back to us. Is there a way to combat this?
I'm a web programmer with little knowledge of server maintenace, tasks, configurations, etc.
I run a website hosted a dedicated box with godaddy. It appears my MAX SMTP limit (25,000) is reached at times. I know for a fact my subscribers are not generating this many emails.
1) Is there a way I can see a log file all of the email messages that were sent using my SMTP qmail account?
2) I've entertained the possibility that someone has "hijacked" my qmail account and is using it send out spam messages?
Any help in being able to get to a log for qmail or to run some other kind of diagnosis to figure out what's exactly going on with my server and why my max smtp limit is reached constantly.
I got Abuse issue Tickets from FDC today, Which i have install new OS few days ago, only have 2 website i know they would not send out any spam email or anything..
Due to the below email, their is an abuse issue with your server. You have 24hrs to respond on how you will correct this issue before we null route the ip. Further complaints, without action may result in deactivation of your server.
Thanks for your cooperation.
--begin disclaimer You are receiving this message because you are listed as contact of one of the networks or domains involved in this incident. If you are not the correct contact please ignore this message. --end
Dear Mr,
Please investigate the incident described in the following partial log, giving the treatment as your AUP permit, reporting the measures to all recipients of this message.
In case of non acceptable treatment or reincidence, it will be taken restrictive measures to protect .BR registry.
The port in question was 10000 - registered in IANA[2] for: Network Data Management Protocol
The e-mail contact it was gotten by the following consultation: whois -h whois.lacnic.net 66.90.101.xxx Whois-----------------------------------------------------------------------
% Joint Whois - whois.lacnic.net % This server accepts single ASN, IPv4 or IPv6 queries
OrgName: FDC Servers.net, LLC OrgID: FDCSE Address: 141 West Jackson Blvd, Suite 1135 City: Chicago StateProv: IL PostalCode: 60604 Country: US
OrgAbuseHandle: ABUSE438-ARIN OrgAbuseName: ABUSE department OrgAbusePhone: +1-312-913-9304 OrgAbuseEmail: abuse@fdcservers.net
OrgNOCHandle: NOC1402-ARIN OrgNOCName: Network Operations Center OrgNOCPhone: +1-312-913-9304 OrgNOCEmail: abuse@fdcservers.net
OrgTechHandle: PKR5-ARIN OrgTechName: Kral, Petr OrgTechPhone: +1-630-729-0228 OrgTechEmail: abuse@fdcservers.net
# ARIN WHOIS database, last updated 2008-01-22 19:10 # Enter ? for additional hints on searching ARIN's WHOIS database. Logs----------------------------------------------------------------------- Jan 22 11:51:08.961984 66.90.101.xxx.59733 > xxx.xxx.2.8.10000: S [tcp sum ok] 1684154077:1684154077(0) win 65535 <mss 1460,nop,nop,sackOK> (ttl 117, id 47077, len 48) Jan 22 11:51:08.962002 66.90.101.xxx.59733 > xxx.xxx.2.15.10000: S [tcp sum ok] 2112584473:2112584473(0) win 65535 <mss 1460,nop,nop,sackOK> (ttl 116, id 54111, len 48) Jan 22 11:51:08.962018 66.90.101.xxx.59733 > xxx.xxx.2.11.10000: S [tcp sum ok] 784051742:784051742(0) win 65535 <mss 1460,nop,nop,sackOK> (ttl 117, id 34960, len 48) Jan 22 11:51:08.962043 66.90.101.xxx.59733 > xxx.xxx.2.16.10000: S [tcp sum ok] 188686613:188686613(0) win 65535 <mss 1460,nop,nop,sackOK> (ttl 117, id 8194, len 48) Jan 22 11:51:08.962057 66.90.101.xxx.59733 > xxx.xxx.2.10.10000: S [tcp sum ok] 1829533742:1829533742(0) win 65535 <mss 1460,nop,nop,sackOK> (ttl 117, id 26158, len 48) Jan 22 11:51:08.962080 66.90.101.xxx.59733 > xxx.xxx.2.12.10000: S [tcp sum ok] 1559560773:1559560773(0) win 65535 <mss 1460,nop,nop,sackOK> (ttl 116, id 4558, len 48) Jan 22 11:51:08.962093 66.90.101.xxx.59733 > xxx.xxx.2.9.10000: S [tcp sum ok] 60930635:60930635(0) win 65535 <mss 1460,nop,nop,sackOK> (ttl 117, id 551, len 48) Jan 22 11:51:08.965238 66.90.101.xxx.59733 > xxx.xxx.2.3.10000: S [tcp sum ok] 1935758257:1935758257(0) win 65535 <mss 1460,nop,nop,sackOK> (ttl
How do you handle your postmaster and abuse addesses for each of your shared hosting accounts? I obviously dont want to receive them all as root and i dont have catchall accounts enabled. I was thinking about setting up aliases to point to their cpanel username account, but i dont know about you, but i hate those accounts and i highly doubt my clients are going to ever check them. These addresses seem to be high targets for spam as well. I have an anti-spam solution, but high volume targets still let a bit of spam through.
One of the sites I help run has 1.5 million pages of parts that can be ordered and information about those parts. We started seeing a ton of hits at around 20-30 pages per second over the past couple days.
There is no information about them on the internet and they are also masking as GoogleBot.
Be on the lookout as I am pretty sure they are trying to steal content and post it up for search results. They are using Amazon EC2 servers to do it also.
This is how they are identifying themselves: Mozilla/5.0 (compatible; Adtuitionbot/1.0; +http://www.google.com/bot.html)"
Offending IPs: 174.129.155.59, 72.44.52.93
In a 24 hour period, we blocked 408,821 requests from them.
Recently we received reports of spam being sent out in massive amounts from an old IP address we had with DedicatedNow/FortressITX, apparently the IP still has reverse DNS setup for our domain name for some reason and we are still receiving spam reports.
I have sent them two emails/tickets, which were logged into their ticket system and have had no response from them in regards to this. They have not taken any action because I am still receiving spam reports from the same IP address, surprising they have not taken any action towards spam on their servers.
I have also requested that they remove the reverse DNS entry, no response to that as well.
Emails were sent with the spam reports from junkemailfilter.com.
Perhaps this will get their attention and they will look into the problem and put a stop into the spam issue.
how i can get in touch with the abuse dept of layeredtech.com and theplanet.com's abuse dept as IPs from these seem to be making a suspected DDoS attack on my server?
I have a client on my server from ThePlanet. That client sends a newsletter once a week to about 50,000 recipients with a program that i built. The list was purchased from a company that sells targeted directory listings.
Each email has a very clear opt out link, and one click takes them off the list. There is also a direct link to the contact form, as well as the information of the company sending the mass emails (me). This should satisfy all regulatory requirements to comply with existing laws.
Now, these emails have been sent once a week for about a month now. Today, ThePlanet issued a support ticket entitled "Abuse: Spam Source". It seems that there was a problem from aol, and one of the emails was redacted.
Reading through ThePlanet terms of service, it seems that they only allow closed system mass mailings. So now I am faced with a problem, because I have a client who expects to send out emails next week with a system i built, and I have a hosting provider that is demanding some sort of "proof" that these emails are solicited.
For the record, this newsletter isn't junk spam like selling viagra or pumping a stock. It is a free weekly summary of significant new york appellate cases, and it has been very well received by the attorneys on the mailing list. There have been ridiculously few opt outs ( < 2%), and there have been literally *hundreds* of emails coming back to show their gratitude for the free service. Not even one comment has been negative.
So what can I do now? A significant number of attorneys on this list are expecting the newsletter, but it cant be sent due to this problem.
The best that I could come up with so far is to send an "Opt in" mass email, where users must click the link to opt in, and everyone else would be removed from the mass email. I could then use the unique keys used for opt ins as "proof" for ThePlanet that the emails are solicited.
We have server in limestonenetwork for couple months, everything good until several abuse issues to our IP for several times recently. Based on instruction from Ryan A., Abuse Department Manager, I have suspend/terminate the suspected accounts in timely manner, each time there's abuse issue.
But today surprisingly, they terminate our server immediately without prior notification. I fully understand that this is my fault not to watch our hosting client for abuse issues.
I only need to get the data back for several hours so I can move the data to other server. Based on their tos limestonenetworks.com/service_info/tos.html I did not see any about temporary data restore so I think we still have right to get our data back.
question
is it true that I can not have my data back at all based on their tos ? since I can not find this matter mentioned on their tos.
I am trying to get a hold of the abuse department of Layered Technologies. They host a splog which is continually ripping my content - takes the content down after a complaint - just to publish it again after a few hours.
I only have sales@layeredtech.com - and even so they promise to forward the request - the latest rip is from yesterday evening and still on the other site.
Usually, I won't start a thread. But this time, I think I will share my 1-year experience, so people will know how Singtel EXPAN (HK) network/abuse department works.
Firstly, their network is extremely good most of the time. I only made a few complaints about network (3-4 minor problems... except the one caused by the earthquake)
So, I am a happy customer for first 10 months. However, my nightmare starts 2 months ago:
1. Early Feb, the abuse/network team received a phising scam (AOL) complaints against a site on a dedicated server customer (which sold hosting as a part time job). So, a technican has forward us the email and then phoned me about that. I immediately forwarded it to my customer.... After 30 minutes, the technican phoned me again and told me that they had blocked the IP since I didn't fix it. Finally, this customer cancelled next month. [EWM ticket #3143589]
2. After 10-20 days, we got a new customer that want to send mailing list. I said as long as you responded to all complaints and the rate isn't high, you can use the server for mailing list. Within 20 days, we got few complaints via email (in standard template) ... so I forward them to my customers and they removed them promptly. Then, one day, a technician phoned me and told me they will block the IP at 5:00pm... but they phoned me at 2:00pm... So, I begged them to extend the deadline to 24-48 hours because the customer come from US... After a day, another spam complaint (from this customer's previous HK provider )... so, I turned off the switch port of his server immediately.
This time, I really appreciate the extended deadline. However, after this incident, their patient were all gone.
3. Last week, Microsoft privacy team reported that one of the site is linking to privated copy of Windows Vista (which is hosted in Radidshare.de) and providing license key/ key generator.
So, the technician phoned me and give me 30 minutes. I said the site is a popular forum with 130K+ members and 10K+ members online... sometimes, somethings may be overlooked. This time, no extended time.... Luckily, the forum owner is online in MSN. So, he deleted the thread immediately and I reported it to Microsoft and Singtel. Microsoft Anti-privacy team did reply and thank us while Singtel kept silent. [MS Ref. 878XX]
4. 2 days ago, someone "complained" about "Spam Activities" on 1 server. The complains are about 2 URLs in a server were redirecting to a sites that was infected by virus/ was hosting virus. Again they phoned me and told me to fix within 30 minutes or they suspend my network.... This time, I can't contact the owner and we don't have access to the server... so I suspended this server. [??No email ticket reference??]
5. Yesterday, a technician phoned me again and told me to fix a spam complaint within 30 minutes. But, this time, the complain is so short that I can paste it here: -------------------------------------------- Subject: UNDER ASSAULT BY SPAM!
XXX.XXX.XXX.XXX has been assaulting my formmail script for
days. Please make it stop! --------------------------------------------
Since my skill level is too low, I can only think of 1 solution..... [EWM ticket # 3188660]
---- personal opinion ----- Singtel EXPAN DC (Shatin) has a good infra-structure and helpful onsite technicians. But, their abuse/ network department is a joke. (Just like an over-budget police department in SimCity. ) That make, their colocation is not suitable for any hostings/ dedicated server providers. It is not recommended to anyone that doesn't sit next to the phone 24 hours a day.
So we have a single Layered Tech box hitting our server with around 90 MBit/s for almost 12 hours straight now, resulting in over 400 GB excess traffic so far. An abuse report was sent about 4 hours ago (Ticket-ID: XZP-97559-339) with evidence included, but so far there was 0 reaction besides the auto-reply.
A phone call to the number listed on their website resulted only in a message that there is no one available at extension XYZ. I didn't try repeat calls since playing international phone tag is not quite my idea of fun.
I realise that it was/still is early in the morning at their location, but nonetheless, I'd expect a company their size to respond a lot faster to reports such as this.