7
|
Linux секция за начинаещи / Настройка на програми / iptables ban spam ip
|
-: Feb 15, 2021, 18:57
|
Здравейте, вчера баннах една мрежа, защото идва спам всеки ден от различно ай-пи от тази мрежа. така: iptables -A INPUT -s 104.206.200.0/24 -j DROP
iptables -L го виждам че го има DROP all -- 104.206.200.0/24 anywhere
но днес пак имам спам от тях
Delivery-date: Mon, 15 Feb 2021 10:11:29 -0600 Received: from mail.deltamailexchange.com ([104.206.200.64] helo=mail.bddigitalphoto.com)
какво да правя ?
Благодаря
|
|
|
10
|
Linux секция за начинаещи / Настройка на програми / защо трябва да преинсталирам Debian wheezy ?
|
-: Oct 18, 2019, 18:42
|
И така на въпроса, защо след като преди години бях зарибен че като сложа линукс няма повече да се налага да преинсталирам сега това идва на дневен ред репозиторитата за wheezy са изключени и какво следва ?
Да се махам ли от Дебиан за да не повтарям това след още пет години или какво ? И какво друго да ползвам за сървър ?
Благодаря
|
|
|
13
|
Linux секция за начинаещи / Настройка на програми / apache2 mailman проблем
|
-: Oct 22, 2017, 20:54
|
Здравейте, имам проблем с конфигурирането на apache2 / mailman в директорията /etc/apache2/conf.d имам и други, като например phpmyadmin.conf squirrelmail.conf които си работят като ги викна в браузъра така: http://IP_address/phpmyadmin mailman.conf обаче неще, моля разгледайте conf файла и ми помогнете благодаря # Sample configuration for Debian mailman with Apache
# We can find mailman here: ScriptAlias /cgi-bin/mailman/ /usr/lib/cgi-bin/mailman/ # And the public archives: Alias /pipermail/ /var/lib/mailman/archives/public/ # Logos: Alias /images/mailman/ /usr/share/images/mailman/
# Use this if you don't want the "cgi-bin" component in your URL: # In case you want to access mailman through a shorter URL you should enable # this: # ScriptAlias /mailman/ /usr/lib/cgi-bin/mailman/ # In this case you need to set the DEFAULT_URL_PATTERN in # /etc/mailman/mm_cfg.py to http://%s/mailman/ for the cookie # authentication code to work. Note that you need to change the base # URL for all the already-created lists as well.
<Directory /usr/lib/cgi-bin/mailman/> AllowOverride None Options ExecCGI AddHandler cgi-script .cgi Order allow,deny Allow from all </Directory> <Directory /var/lib/mailman/archives/public/> Options FollowSymlinks AllowOverride None Order allow,deny Allow from all </Directory> <Directory /usr/share/images/mailman/> AllowOverride None Order allow,deny Allow from all </Directory>
## The following describes how to configure mailman on ## a dedicated virtual host, courtesy Marco d'Itri.
# Add these lines in /etc/mailman/mm_cfg.py: #DEFAULT_EMAIL_HOST = 'lists.example.net' #DEFAULT_URL_HOST = 'lists.example.net' #DEFAULT_URL_PATTERN = 'http://%s/'
#<VirtualHost *> #ServerName lists.example.net #DocumentRoot /var/www/lists #ErrorLog /var/log/apache2/lists-error.log #CustomLog /var/log/apache2/lists-access.log combined # #<Directory /var/lib/mailman/archives/> # Options FollowSymLinks # AllowOverride None #</Directory> # #Alias /pipermail/ /var/lib/mailman/archives/public/ #Alias /images/mailman/ /usr/share/images/mailman/ #ScriptAlias /admin /usr/lib/cgi-bin/mailman/admin #ScriptAlias /admindb /usr/lib/cgi-bin/mailman/admindb #ScriptAlias /confirm /usr/lib/cgi-bin/mailman/confirm #ScriptAlias /create /usr/lib/cgi-bin/mailman/create #ScriptAlias /edithtml /usr/lib/cgi-bin/mailman/edithtml #ScriptAlias /listinfo /usr/lib/cgi-bin/mailman/listinfo #ScriptAlias /options /usr/lib/cgi-bin/mailman/options #ScriptAlias /private /usr/lib/cgi-bin/mailman/private #ScriptAlias /rmlist /usr/lib/cgi-bin/mailman/rmlist #ScriptAlias /roster /usr/lib/cgi-bin/mailman/roster #ScriptAlias /subscribe /usr/lib/cgi-bin/mailman/subscribe #ScriptAlias /mailman/ /usr/lib/cgi-bin/mailman/ #</VirtualHost>
|
|
|
14
|
Linux секция за начинаещи / Настройка на програми / exim4 / имейлите ми отиват в джънк на yahoo и google
|
-: Jan 25, 2017, 18:34
|
здравейте колеги, имам личен-фирмен сървър за собствени мой няколко домейна дайте ми някакви идей какво да направя за да не ме третират като спамер, или почти спамер google и yahoo взимат имейлите ми, но ги слагат в джънк папката на получателя или в моя exim4 лог се вижда че мейла го взимат, но така и не го доставят на потребителя сървъра ми е core.fleetsys.net
Благодаря
|
|
|
15
|
Сигурност / Системна Сигурност / Dirty Cow
|
-: Oct 30, 2016, 16:49
|
Ползвам услугите на ко-локейшън, и преди три дена получих от тях имейл, съдържанието съм постнал по-долу. Става въпрос за открит пропуск, проблем в ядрото. Dear Customer,
Are you running a Linux based operating system? If you are running an oper ating system such as CentOS, Red Hat, Debian, or Ubuntu you are most likely vulnerable to a recent security exploit found in the Linux kernel.
We are always following the latest news and events when it comes to server security, and we wanted to alert you to the presence of a p articularly serious vulnerability in Linux based operating systems called D irty Cow. Dirty Cow is a privilege escalation vulnerability, which means i t can be used to gain higher levels of access on your server without permis sion.
You can find more information about the vulnerability online, for example t his article is fairly comprehensive: https://www.linux.com/blog/how-bad-dir ty-cow
Provided your distribution has released an updated kernel to fix Dirty Cow, fixing this issue is as simple as installing all of your available updates and rebooting your server in order to load the new kernel.
--- How Can I Tell If I Am Vulnerable? ---
To tell if you are vulnerable to Dirty Cow, simply check your kernel versio n.
** CentOS Red Hat **
On CentOS, you can run this command to use the script provided by Red Hat f or RHEL to test if you are vulnerable. The output from the command will te ll you if you are vulnerable or not.
curl -sq https://access.redhat.com/sites/default/files/rh-cve-2016-5195_1.s h | bash
** Debian Ubuntu **
You can obtain your kernel version by running this command:
uname -rv
Then compare it to this list of kernel versions. If your kernel version is earlier than the version listed below (a lower number), you are vulnerable .
3.16.36-1+deb8u2 for Debian 8
3.2.82-1 for Debian 7
4.7.8-1 for Debian unstable
4.8.0-26.28 for Ubuntu 16.10
4.4.0-45.66 for Ubuntu 16.04 LTS
3.13.0-100.147 for Ubuntu 14.04 LTS
3.2.0-113.155 for Ubuntu 12.04 LTS
--- How Do I Patch My System? ---
The below commands will help you to upgrade all software on your server. P lease note that these commands will upgrade everything - if you only want t o patch for Dirty Cow but you do not want to upgrade other software on your server, you will only need to update the Linux kernel packages.
If you are running a Red Hat based Linux distribution such as CentOS, you c an update your system by running these commands:
sudo yum update -y
reboot
If you are running a Debian based Linux distribution such as Ubuntu, you ca n update your system by running these commands:
sudo apt-get update
sudo apt-get dist-upgrade -y
reboot
|
|
|
|