如何保护垃圾邮件发送者到apache?

问题描述:

我对www.domain.com和login.domain.com有以下内容。但垃圾邮件发送者转发网站login.domain.com,它的工作原理。我怎样才能阻止他们?如何保护垃圾邮件发送者到apache?

例如:http://spammerexmaple.sex.com打开http://login.domain.com(我想阻止这种)

<VirtualHost *:80> 
ServerName login.domain.com 
ServerAlias login.domain.com 
DocumentRoot /var/www/html/com/public 
<Directory /var/www/html/com/public> 
     #AddDefaultCharset utf-8 
     DirectoryIndex index.php 
     AllowOverride All 
     Order allow,deny 
     Allow from all 
</Directory> 

</VirtualHost> 


<VirtualHost *:80> 
ServerName www.domain.com 
ServerAlias domain.com 
DocumentRoot /var/www/html/www/public 
<Directory /var/www/html/www/public> 
    # Compress output 
    AddOutputFilterByType DEFLATE text/html text/css text/plain text/xml application/x-javascript 
    BrowserMatch ^Mozilla/4 gzip-only-text/html 
    BrowserMatch ^Mozilla/4.0[678] no-gzip 
    BrowserMatch bMSIE !no-gzip !gzip-only-text/html 

     #AddDefaultCharset utf-8 
     DirectoryIndex index.php 
     AllowOverride All 
     Order allow,deny 
     Allow from all 
</Directory> 

</VirtualHost> 

追问:

垃圾邮件发送者前进www.spammer.com到login.domain.com或www.spammer。 sex.com任何人都可以转发到login.domain.com,它的工作原理。

我怎样才能阻止这个>?

[[email protected] dd.dd.com]# httpd -S 
VirtualHost configuration: 
wildcard NameVirtualHosts and _default_ servers: 
_default_:443   d (/etc/httpd/conf.d/ssl.conf:81) 
*:80     is a NameVirtualHost 
     default server dummy.com (/etc/httpd/conf/httpd.conf:1028) 
     port 80 namevhost dummy.com (/etc/httpd/conf/httpd.conf:1028) 
     port 80 namevhost dd.dd.com (/etc/httpd/conf/httpd.conf:1039) 
     port 80 namevhost aa.aa.com (/etc/httpd/conf/httpd.conf:1058) 
Syntax OK 





<VirtualHost *:80> 
ServerName dummy.com 
DocumentRoot /tmp 
<Directory /tmp> 
     deny from all 
</Directory> 

</VirtualHost> 

<VirtualHost *:80> 
ServerName dd.dd.com 
#ServerAlias dd.dd.com 
DocumentRoot /var/www/html/dd.dd.com/public 
<Directory /var/www/html/dd.dd.com/public> 
     #AddDefaultCharset utf-8 
     DirectoryIndex index.php 
     AllowOverride All 
     Order allow,deny 
     Allow from all 
</Directory> 

</VirtualHost> 


<VirtualHost *:80> 
ServerName aa.aa.com 
ServerAlias aa.com 
DocumentRoot /var/www/html/aa.aa.com/public 
<Directory /var/www/html/aa.aa.com/public> 
    # Compress output 
    AddOutputFilterByType DEFLATE text/html text/css text/plain text/xml application/x-javascript 
    BrowserMatch ^Mozilla/4 gzip-only-text/html 
    BrowserMatch ^Mozilla/4.0[678] no-gzip 
    BrowserMatch bMSIE !no-gzip !gzip-only-text/html 

     #AddDefaultCharset utf-8 
     DirectoryIndex index.php 
     AllowOverride All 
     Order allow,deny 
     Allow from all 
</Directory> 
+0

认为,这可能是对ServerFault更好。 – slugster 2010-11-23 00:24:03

动作1:iptables的是最好的+物理路由器,如CISCO PIX或其他路由器,使黑名单+检查与列入黑名单的IP网络传入的源IP,并暂停在那里我们的网络访问。

行动2:把一些版主,谁筛选传入流量,并尽快反弹它们并将其标记垃圾邮件发送者,并报告那些到其他网络

行动3:上帝保佑我们,希望我们能更多的信息.​​.它的无限游戏,永无止境。

希望它能够帮助他人,至少要知道的可能性。