Code: Select all
$conf['mailer']['type'] = 'smtp';
$conf['mailer']['params']['host'] = 'localhost';
$conf['mailer']['params']['port'] = 587;
$conf['mailer']['params']['auth'] = true;
Code: Select all
$conf['mailer']['type'] = 'smtp';
$conf['mailer']['params']['host'] = 'localhost';
$conf['mailer']['params']['port'] = 587;
$conf['mailer']['params']['auth'] = true;
Code: Select all
--0fdf3967-A--
[04/Jun/2010:16:12:58 --0400] 8wZp2ErQb4EAABAwNM0AAAAC 80.226.241.158 40017 74.208.111.129 80
--0fdf3967-B--
GET /horde/admin/cmdshell.php HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-ms-application, application/vnd.ms-xpsdocument, application/xaml+xml, application/x-ms-xbap, application/x-shockwave-flash, */*
Referer: http://74.208.xxx.xxx/horde/services/portal/sidebar.php
Accept-Language: en-us
UA-CPU: x86
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SIMBAR={5D7737AD-CBE5-4C8E-9462-A73592DCAFA0}; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.30618; .NET CLR 3.5.30729)
Cookie: Horde=ks1iuefqjkoa06nrkh55hkanm7; auth_key=28325484d3fe96d732809829fe020fb7; horde_menu_expanded=expadministration
Host: 74.208.xxx.xxx
Cache-Control: max-age=43200
Connection: keep-alive
--0fdf3967-F--
HTTP/1.1 403 Forbidden
Last-Modified: Sat, 23 Feb 2008 18:17:16 GMT
ETag: "183151b1-3c0-446d7593e2300"
Accept-Ranges: bytes
Content-Length: 960
Connection: close
Content-Type: text/html
--0fdf3967-H--
Message: [file "/etc/httpd/modsecurity.d/50_asl_rootkits.conf"] [line "60"] [id "390148"] [rev "16"] [msg "Atomicorp.com WAF Rules: Possible malware attack: Generic Attempt to run malware"] [data "/cmdshell.php"] [severity "CRITICAL"] Access denied with code 403 (phase 2). Pattern match "/(?:(?:linuxdaybot|suntzu|shell_vup|l_backuptoster|(?:php|sql|cmd)?shell|(?:o|0|p)wn(?:e|3)d|xpl|ssh2?|too20|backdoor|terminatorx-?exp)\.(?:dat|gif|jpe?g|png|sh|txt|bmp|dat|txt|js|s?html?|tmp|php(?:3|4|5)?|asp)|(?:r57|fx29|c(?:99|100)\.(?:txt|php))|/(? ..." at REQUEST_URI.
Action: Intercepted (phase 2)
Stopwatch: 1275682378639832 137583 (116119 118399 -)
Producer: ModSecurity for Apache/2.5.12 (http://www.modsecurity.org/); 201006031910.
Server: Apache/2.2.8 (CentOS)
--0fdf3967-Z--
Code: Select all
// $conf['mailer']['params']['sendmail_path'] = '/usr/sbin/sendmail';
// $conf['mailer']['params']['sendmail_args'] = '-oi';
$conf['mailer']['type'] = 'smtp';
$conf['mailer']['params']['host'] = 'localhost';
$conf['mailer']['params']['port'] = 587;
$conf['mailer']['params']['auth'] = true;
The emails send just fine as long as I enable popen and exec so the SMTP is working ok.mikeshinn wrote:Port 587 is authenticated SMTP, do you have webmail setup to use authenicated SMTP? Also, if you do not have Submission enabled in Plesk port 587 will not be available.