如何保护垃圾邮件发送者到apache?
问题描述:
我对www.domain.com和login.domain.com有以下内容。但垃圾邮件发送者转发网站login.domain.com,它的工作原理。我怎样才能阻止他们?如何保护垃圾邮件发送者到apache?
例如:http://spammerexmaple.sex.com打开http://login.domain.com(我想阻止这种)
<VirtualHost *:80>
ServerName login.domain.com
ServerAlias login.domain.com
DocumentRoot /var/www/html/com/public
<Directory /var/www/html/com/public>
#AddDefaultCharset utf-8
DirectoryIndex index.php
AllowOverride All
Order allow,deny
Allow from all
</Directory>
</VirtualHost>
<VirtualHost *:80>
ServerName www.domain.com
ServerAlias domain.com
DocumentRoot /var/www/html/www/public
<Directory /var/www/html/www/public>
# Compress output
AddOutputFilterByType DEFLATE text/html text/css text/plain text/xml application/x-javascript
BrowserMatch ^Mozilla/4 gzip-only-text/html
BrowserMatch ^Mozilla/4.0[678] no-gzip
BrowserMatch bMSIE !no-gzip !gzip-only-text/html
#AddDefaultCharset utf-8
DirectoryIndex index.php
AllowOverride All
Order allow,deny
Allow from all
</Directory>
</VirtualHost>
追问:
垃圾邮件发送者前进www.spammer.com到login.domain.com或www.spammer。 sex.com任何人都可以转发到login.domain.com,它的工作原理。
我怎样才能阻止这个>?
[[email protected] dd.dd.com]# httpd -S
VirtualHost configuration:
wildcard NameVirtualHosts and _default_ servers:
_default_:443 d (/etc/httpd/conf.d/ssl.conf:81)
*:80 is a NameVirtualHost
default server dummy.com (/etc/httpd/conf/httpd.conf:1028)
port 80 namevhost dummy.com (/etc/httpd/conf/httpd.conf:1028)
port 80 namevhost dd.dd.com (/etc/httpd/conf/httpd.conf:1039)
port 80 namevhost aa.aa.com (/etc/httpd/conf/httpd.conf:1058)
Syntax OK
<VirtualHost *:80>
ServerName dummy.com
DocumentRoot /tmp
<Directory /tmp>
deny from all
</Directory>
</VirtualHost>
<VirtualHost *:80>
ServerName dd.dd.com
#ServerAlias dd.dd.com
DocumentRoot /var/www/html/dd.dd.com/public
<Directory /var/www/html/dd.dd.com/public>
#AddDefaultCharset utf-8
DirectoryIndex index.php
AllowOverride All
Order allow,deny
Allow from all
</Directory>
</VirtualHost>
<VirtualHost *:80>
ServerName aa.aa.com
ServerAlias aa.com
DocumentRoot /var/www/html/aa.aa.com/public
<Directory /var/www/html/aa.aa.com/public>
# Compress output
AddOutputFilterByType DEFLATE text/html text/css text/plain text/xml application/x-javascript
BrowserMatch ^Mozilla/4 gzip-only-text/html
BrowserMatch ^Mozilla/4.0[678] no-gzip
BrowserMatch bMSIE !no-gzip !gzip-only-text/html
#AddDefaultCharset utf-8
DirectoryIndex index.php
AllowOverride All
Order allow,deny
Allow from all
</Directory>
答
动作1:iptables的是最好的+物理路由器,如CISCO PIX或其他路由器,使黑名单+检查与列入黑名单的IP网络传入的源IP,并暂停在那里我们的网络访问。
行动2:把一些版主,谁筛选传入流量,并尽快反弹它们并将其标记垃圾邮件发送者,并报告那些到其他网络
行动3:上帝保佑我们,希望我们能更多的信息..它的无限游戏,永无止境。
希望它能够帮助他人,至少要知道的可能性。
认为,这可能是对ServerFault更好。 – slugster 2010-11-23 00:24:03