2010-11-23 72 views
0

我對www.domain.com和login.domain.com有以下內容。但垃圾郵件發送者轉發網站login.domain.com,它的工作原理。我怎樣才能阻止他們?如何保護垃圾郵件發送者到apache?

例如:http://spammerexmaple.sex.com打開http://login.domain.com(我想阻止這種)

<VirtualHost *:80> 
ServerName login.domain.com 
ServerAlias login.domain.com 
DocumentRoot /var/www/html/com/public 
<Directory /var/www/html/com/public> 
     #AddDefaultCharset utf-8 
     DirectoryIndex index.php 
     AllowOverride All 
     Order allow,deny 
     Allow from all 
</Directory> 

</VirtualHost> 


<VirtualHost *:80> 
ServerName www.domain.com 
ServerAlias domain.com 
DocumentRoot /var/www/html/www/public 
<Directory /var/www/html/www/public> 
    # Compress output 
    AddOutputFilterByType DEFLATE text/html text/css text/plain text/xml application/x-javascript 
    BrowserMatch ^Mozilla/4 gzip-only-text/html 
    BrowserMatch ^Mozilla/4.0[678] no-gzip 
    BrowserMatch bMSIE !no-gzip !gzip-only-text/html 

     #AddDefaultCharset utf-8 
     DirectoryIndex index.php 
     AllowOverride All 
     Order allow,deny 
     Allow from all 
</Directory> 

</VirtualHost> 

追問:

垃圾郵件發送者前進www.spammer.com到login.domain.com或www.spammer。 sex.com任何人都可以轉發到login.domain.com,它的工作原理。

我怎樣才能阻止這個>?

[[email protected] dd.dd.com]# httpd -S 
VirtualHost configuration: 
wildcard NameVirtualHosts and _default_ servers: 
_default_:443   d (/etc/httpd/conf.d/ssl.conf:81) 
*:80     is a NameVirtualHost 
     default server dummy.com (/etc/httpd/conf/httpd.conf:1028) 
     port 80 namevhost dummy.com (/etc/httpd/conf/httpd.conf:1028) 
     port 80 namevhost dd.dd.com (/etc/httpd/conf/httpd.conf:1039) 
     port 80 namevhost aa.aa.com (/etc/httpd/conf/httpd.conf:1058) 
Syntax OK 





<VirtualHost *:80> 
ServerName dummy.com 
DocumentRoot /tmp 
<Directory /tmp> 
     deny from all 
</Directory> 

</VirtualHost> 

<VirtualHost *:80> 
ServerName dd.dd.com 
#ServerAlias dd.dd.com 
DocumentRoot /var/www/html/dd.dd.com/public 
<Directory /var/www/html/dd.dd.com/public> 
     #AddDefaultCharset utf-8 
     DirectoryIndex index.php 
     AllowOverride All 
     Order allow,deny 
     Allow from all 
</Directory> 

</VirtualHost> 


<VirtualHost *:80> 
ServerName aa.aa.com 
ServerAlias aa.com 
DocumentRoot /var/www/html/aa.aa.com/public 
<Directory /var/www/html/aa.aa.com/public> 
    # Compress output 
    AddOutputFilterByType DEFLATE text/html text/css text/plain text/xml application/x-javascript 
    BrowserMatch ^Mozilla/4 gzip-only-text/html 
    BrowserMatch ^Mozilla/4.0[678] no-gzip 
    BrowserMatch bMSIE !no-gzip !gzip-only-text/html 

     #AddDefaultCharset utf-8 
     DirectoryIndex index.php 
     AllowOverride All 
     Order allow,deny 
     Allow from all 
</Directory> 
+0

認爲,這可能是對ServerFault更好。 – slugster 2010-11-23 00:24:03

回答

0

動作1:iptables的是最好的+物理路由器,如CISCO PIX或其他路由器,使黑名單+檢查與列入黑名單的IP網絡傳入的源IP,並暫停在那裏我們的網絡訪問。

行動2:把一些版主,誰篩選傳入流量,並儘快反彈它們並將其標記垃圾郵件發送者,並報告那些到其他網絡

行動3:上帝保佑我們,希望我們能更多的信息.​​.它的無限遊戲,永無止境。

希望它能夠幫助他人,至少要知道的可能性。