Badly enough not all my clients want to install such a plugin or they have infected files. There are also other websites that are not running on Wordpress but send email. I want to filter all that email.I think No. You should use Akismet 3.1.1 or similar wp plugin.
How/where to set the default to chmod the spamming file to 0 ?
- BlockCracking for vastly better outbound spam detection and blocking. It counts the number of failed recipients to block a User or script, without affecting other Users or other scripts.
- DA will give much more detailed reports on the offending script, and even parses the /home/user/.php/php-mail.log to tell you which script is the likely offender (ability to automatically chmod to 0, disabled by default)
So BC actually checks if a script is sending out spam (by counting the amount of non-existing destination email addresses)
1) Does BC run this check before it sends out the email, or does it count destination-mail-server responses saying "this email address doesn't exist" when it sends the email ?
2) And what happens when the amount of no-existing email addresses hit the BC_LIM limit ?
does the script gets ignored by exim, like the DA-blockscript does ?
or do we need to add extra code, like this post suggested in the past ?
3) And DA has a block script that purely counts the amount of emails being sent from it, regardless of the emails being spam or a mailing ?
(untill it integrates with BC)
4) I don't see a way to unblock the script in DA panel (see attached image: View attachment 2049)
1) Not at this time.. but you could manually add another variable to the BC variables.conf, and swap out the limit check in the related conf files.I have a problem with BlockCracking.
On 1 side, I would like to anticipate on spam-scripts that should be killed a.s.a.p. So I would like to use a BC_LIM == 10.
Now I have a client who wants to send out a mailing, and has no idea which email addresses are invalid...
I also think that somehow Exim tries to send it again and again, as I've seen the same invalid email address in the mainlog multiple times..
1: is there an option to treat (block-leven & unblock-level) scripts different from auth-users ?
2: how can the client know (s)he has been blocked if (s)he's been blocked from the email box ?
(I got a question from a client that couldn't log into her email box anymore)
3: Is there a different way to get deblocked, as most of my clients don't tend to remember their email-address-passwords.
(I know we are supposed to educate & change our customers to fit our systems, but...)
4: Can I add a username to the BC_UNLIMITED_USERNAMES ?
will that whitelist auth-users sending through exim ?
will that also allow all spam-scripts to not get blocked ?
BC_UNLIMITED_USERNAMES = root : cron : mail : diradmin
cd /etc/virtual ls -la *whitelist*
If that is the case, most probably either more then 1 script or php file is infected so the hackers can start over again every time, or the password is known by the hackers.What can I do / test ?
I have 2 user accounts which are hacked every few days with spam scripts..
A message that you sent could not be delivered to one or more of its recipients. This is a permanent error. The following address(es) failed: pipe to |/home/user/domains/domain.nl/public_html/pipe.php generated by email@example.com local delivery failed The following text was generated during the delivery attempt: ------ pipe to |/home/user/domains/domain.nl/public_html/pipe.php generated by firstname.lastname@example.org ------ Usage: cagefs_enter <command> <command_arguments>...
2015-04-04 16:00:31 1YeOch-001Jtf-Ch ** |/home/user/domains/domain.nl/public_html/pipe.php (email@example.com) <firstname.lastname@example.org> F=<email@example.com> R=virtual_aliases_nostar T=virtual_address_pipe: Child process of virtual_address_pipe transport returned 255 (could mean shell command ended by signal 127 (Unknown signal 127)) from command: /bin/cagefs_enter