• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

Search results

  1. D

    DNSBL/RBL stopped working altogether

    It sounds like you do have it setup correctly. I believe you just put your spamhaus URL into the form under "Mail Server Settings:DNS zones for DNSBL service" and submit. Obviously, make sure the checkbox to use DNSBL is ticked "on". That's how it used to work anyway. Apparantly, what's...
  2. D

    DNSBL/RBL stopped working altogether

    About 2 months ago, the DNSBL stopped working and email accounts began getting "normal" SPAM floods. Turning the DNSBL on/off seems to make zero difference. Results from testing an RBL server more direcly seem okay: [root@www ~]# dig +short 2.0.0.127.zen.spamhaus.org 127.0.0.4...
  3. D

    PCI compliance still fails due to SSL Renegotiation DoS vulnerability in Qmail/IMAP

    Thanks for the feedback VinnyT (your site is now bookmarked for the decision makers around here). So far, I plan to keep using ipfilter rule(s) to block any such attack attempts. Unfortunately, we're "not allowed" to block the IP address of our PCI scanner's server, but I could send'em the...
  4. D

    PCI compliance still fails due to SSL Renegotiation DoS vulnerability in Qmail/IMAP

    For over 6 months now, PCI scanners have been failing us for being vulnerable (via Qmail and Courier IMAP only --> other daemons ok) with regards to the following issue... SSL renegotiation DoS CVE-2011-1473 which is very similar to CVE-2011-5094. Both of these also say they're *DISPUTED*...
  5. D

    Mail: DNSBL before AUTH after update to 10.1

    Add one more to the pot - suspect same issue Some clients are experiencing this: when DNSBL is enabled, they can no longer use SMTP. Server drops the connection before the attempts are even logged. I tried the "mailmng.zip" quick fix for Debian but it caused some Exceptions on the mail...
Back
Top