• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

Issue email spoofing & spam

stas styler

Basic Pleskian
Dear pleskers,

I need your help. I'm providing shared hosting over a server with approx 250 domains most of them are wordpress websites.
The server has 1 IP.
We are connected to MailChannels and this month we got huge bill of exceeding the plan with houndred thousands of spam mail (SPOOFED).

I've been googling and trying to block it but with not much luck. Eventually I limited outgoing mail to 20 per hour.
I know that in these cases I need to use SPF + DKIM + DMARC which I did.
My question is, what are the best practices for a shared hosting provider that has alot of domains and only 1 IP (all services are on the same server).

What I did was:
DMARC on each domain in DNS template - v=DMARC1;p=reject;pct=100;rua=mailto:contact@vangus-support.co.il
DKIM signing, tried doing it but there are too many domains, how do I enable it server wide?
SPF on each domain in DNS template - v=spf1 ip4:<my-server-ip-address-here> +a +mx +a:<my-servers-domain-name-here> -all

Am I doing something wrong? I really need some advice and help because currently somehow bots can spoof my clients domains.
 
Back
Top