toml
Verified User
I assume you also have the following in all your users httpd.conf files:
SuexecUserGroup USER USER
php_admin_value sendmail_path '/usr/sbin/sendmail -t -i -f USER@DOMAIN'
The SuexecUserGroup should set the user/group for any CGI scripts being executed, and the other line tells PHP to user this command to for sendmail. USER should be the real unix userid of the user and the DOMAIN should be replaced with their domain. Directadmin should have automatically put them in your /usr/local/directadmin/data/users/*/httpd.conf files, but if you have some really old accounts, they may not have been updated. These were put in place to help trace this type of problem.
Assuming your Directadmin is up to date and you don't have similar lines in all of your customers httpd.conf files, then you should be able to use this command to update them:
echo "action=rewrite&value=httpd" >> /usr/local/directadmin/data/task.queue
/usr/local/directadmin/dataskq d
Once that completes, restart apache and any new spammer processes, should show which account was sending the spam.
SuexecUserGroup USER USER
php_admin_value sendmail_path '/usr/sbin/sendmail -t -i -f USER@DOMAIN'
The SuexecUserGroup should set the user/group for any CGI scripts being executed, and the other line tells PHP to user this command to for sendmail. USER should be the real unix userid of the user and the DOMAIN should be replaced with their domain. Directadmin should have automatically put them in your /usr/local/directadmin/data/users/*/httpd.conf files, but if you have some really old accounts, they may not have been updated. These were put in place to help trace this type of problem.
Assuming your Directadmin is up to date and you don't have similar lines in all of your customers httpd.conf files, then you should be able to use this command to update them:
echo "action=rewrite&value=httpd" >> /usr/local/directadmin/data/task.queue
/usr/local/directadmin/dataskq d
Once that completes, restart apache and any new spammer processes, should show which account was sending the spam.