B
Bogdan
Guest
Does anyone know why all domains created in Plesk that don't have a catch-all address specified are being created with default catch-all called trash50534137@domain.com with password trash50534137?
This behavior is also present in Plesk 7.6.1,not only in 8.1. In Plesk 7.6.1 it used to fill out with all sorts of mails (usually spam sent to inexistent) and cause the client's disk usage to go sky high.
But the security problem is mainly caused by that common password for all the mailboxes which anyone can use to log on the mailbox, see it's contents and even use to authenticate and send SPAM through the server.
If anyone wants to recreate this it's easy:
1. set up a domain in Plesk (mytest.com for example)
2. open webmail (http://IP:8425, where IP is the IP you used to set up hosting for it)
3. Login using the trash50534137 account (trash50534137@mytest.com)
4. Send an email.
You can also log on to trash50534137@mydomain.com with a mail client by specifying server's IP as the mail server in your mail client config.
So, my question now, also asked in http://forum.swsoft.com/showthread.php?threadid=37058 several months ago, is what is this catch-all address used for? I'm sure it's not created by MailEnable (http://www.mailenable.com/forum/vie...previous&sid=cd119fef0cab0ae45856f8eb024a0b8d) but it also doesn't show up in my client's Control Panel either, so I wonder what's its purpose and if it's so important that it really needs to make my servers vulnerable!
As a temporary and partial solution, I disabled catch-all emails on the entire server from MailEanble and I used MailEnable's Catchall Reporter and Remover (http://mailenable.com/addons_Diagnostic.asp) to remove all trash50534137 catch-alls, but that is far from being an answer to the problem.
This behavior is also present in Plesk 7.6.1,not only in 8.1. In Plesk 7.6.1 it used to fill out with all sorts of mails (usually spam sent to inexistent) and cause the client's disk usage to go sky high.
But the security problem is mainly caused by that common password for all the mailboxes which anyone can use to log on the mailbox, see it's contents and even use to authenticate and send SPAM through the server.
If anyone wants to recreate this it's easy:
1. set up a domain in Plesk (mytest.com for example)
2. open webmail (http://IP:8425, where IP is the IP you used to set up hosting for it)
3. Login using the trash50534137 account (trash50534137@mytest.com)
4. Send an email.
You can also log on to trash50534137@mydomain.com with a mail client by specifying server's IP as the mail server in your mail client config.
So, my question now, also asked in http://forum.swsoft.com/showthread.php?threadid=37058 several months ago, is what is this catch-all address used for? I'm sure it's not created by MailEnable (http://www.mailenable.com/forum/vie...previous&sid=cd119fef0cab0ae45856f8eb024a0b8d) but it also doesn't show up in my client's Control Panel either, so I wonder what's its purpose and if it's so important that it really needs to make my servers vulnerable!
As a temporary and partial solution, I disabled catch-all emails on the entire server from MailEanble and I used MailEnable's Catchall Reporter and Remover (http://mailenable.com/addons_Diagnostic.asp) to remove all trash50534137 catch-alls, but that is far from being an answer to the problem.