Posts by TheCry

    You problem is the source.list

    In your list you will find this

    Code
    1. deb http://deb.debian.org/debian/ stable main contrib non-free
    2. deb-src http://deb.debian.org/debian/ stable main contrib non-free

    Now "Debian 10" is stable and your "Debian 9" got the packages to upgrade.

    If you don't want to upgrade change the lines

    Code
    1. deb http://deb.debian.org/debian/ oldstable main contrib non-free
    2. deb-src http://deb.debian.org/debian/ oldstable main contrib non-free


    The same problem is under Debian 8

    Code
    1. deb http://deb.debian.org/debian/ oldoldstable main contrib non-free
    2. deb-src http://deb.debian.org/debian/ oldoldstable main contrib non-free

    The word "oldstable" is now "oldoldstable"

    I don't really understand why it would be so tedious to make use of a listener in that specific case. The i-MSCP Postfix server implementation provide a routine that make edition of the main.cf file very easy. As a sysadmin, editing a single file to remove or adding RBL servers is not so hard, isn't it?

    It isn't hard. ;)

    I understand now why it is not so easy to implement. So i will do it with a listener

    Hi Laurent,

    it will be a nice feature if you implement in the admin level a section to add, activate, deactivate differnt RBL servers.

    At the moment the spam are horrible and if the customers add some forwarder to GMX, Hotmail, Web.de a.s.o. your server wil be added to the blacklist.


    I did add the RBL servers manually to the main.cf (smtpd_recipient_restrictions)

    Code
    1. reject_rbl_client zen.spamhaus.org,
    2. reject_rbl_client bl.spamcop.net,
    3. reject_rbl_client dnsbl.sorbs.net,
    4. reject_rbl_client cbl.abuseat.org,
    5. reject_rbl_client b.barracudacentral.org,
    6. reject_rbl_client dnsbl-1.uceprotect.net,


    This helped me a lot.

    Yes i know i can use a listener, but i think this is a nice feature for the panel.


    Regards

    Sascha

    Ja 2FA ist eine gute Sache, aber man kann es mit der Sicherheit auch übertreiben.

    Man sollte immer abschätzen was für Kunden auf dem System betrieben wedren. Davon macht man es abhängig ob so etwas überhaupt benötigt wird.

    Wenn Du auf Deinem System nur simple Webkunden hast ist 2FA mit Kanonen auf Spatzen geschossen.

    Ändere das SSH Port, Richte Fail2Ban ordentlich ein und schon ist Dein Server auch sicher.

    Just my 2 Cent

    Hi Laurent,

    here is the content of the script

    THe version ist 3.5.0