csf SMTP_BLOCK option

This option will help prevent the most common form of spam abuse on a server that bypasses exim and sends spam directly out through port 25. Enabling this option will prevent any web script from sending out using socket connection, such scripts should use the exim or sendmail binary instead

Block outgoing SMTP except for root, exim and mailman (forces scripts/users to use the exim/sendmail binary instead of sockets access).

This replaces the protection as WHM > Tweak Settings > SMTP Tweaks

This option uses the iptables ipt_owner module and must be loaded for it to work. It may not be available on some VPS platforms

Note:
Run /etc/csf/csftest.pl to check whether this option will function on this server

SMTP_BLOCK = “0″

If SMTP_BLOCK is enabled but you want to allow local connections to port 25 on the server (e.g. for webmail or web scripts) then enable this option to allow outgoing SMTP connections to the loopback device

SMTP_ALLOWLOCAL = “1″

One Response to “csf SMTP_BLOCK option”

  1. 2candidateon 13 Jan 2022 at 2:11 am

    1lesions…

Trackback URI | Comments RSS

Leave a Reply

You must be logged in to post a comment.