0

我有以下www.domain.comlogin.domain.com。但是垃圾邮件发送者将网站转发到那里login.domain.com并且它有效。我怎样才能阻止他们?

例如:http://spammerexmaple.sex.com打开http://login.domain.com(我想阻止它)

<VirtualHost *:80>
 ServerName login.domain.com
 ServerAlias login.domain.com
 DocumentRoot /var/www/html/com/public
 <Directory /var/www/html/com/public>
        #AddDefaultCharset utf-8
        DirectoryIndex index.php
        AllowOverride All
        Order allow,deny
        Allow from all
 </Directory>

</VirtualHost>


<VirtualHost *:80>
 ServerName www.domain.com
 ServerAlias domain.com
 DocumentRoot /var/www/html/www/public
 <Directory /var/www/html/www/public>
    # Compress output
    AddOutputFilterByType DEFLATE text/html text/css text/plain text/xml application/x-javascript
    BrowserMatch ^Mozilla/4 gzip-only-text/html
    BrowserMatch ^Mozilla/4.0[678] no-gzip
    BrowserMatch bMSIE !no-gzip !gzip-only-text/html

        #AddDefaultCharset utf-8
        DirectoryIndex index.php
        AllowOverride All
        Order allow,deny
        Allow from all
 </Directory>

</VirtualHost>

跟进:

垃圾邮件发送者转发或任何人可以转发的东西www.spammer.com,它都有效。login.domain.comwww.spammer.sex.comlogin.domain.com

我怎样才能阻止这个?

[root@d dd.dd.com]# httpd -S
VirtualHost configuration:
wildcard NameVirtualHosts and _default_ servers:
_default_:443          d (/etc/httpd/conf.d/ssl.conf:81)
*:80                   is a NameVirtualHost
         default server dummy.com (/etc/httpd/conf/httpd.conf:1028)
         port 80 namevhost dummy.com (/etc/httpd/conf/httpd.conf:1028)
         port 80 namevhost dd.dd.com (/etc/httpd/conf/httpd.conf:1039)
         port 80 namevhost aa.aa.com (/etc/httpd/conf/httpd.conf:1058)
Syntax OK





<VirtualHost *:80>
 ServerName dummy.com
 DocumentRoot /tmp
 <Directory /tmp>
        deny from all
 </Directory>

</VirtualHost>

<VirtualHost *:80>
 ServerName dd.dd.com
 #ServerAlias dd.dd.com
 DocumentRoot /var/www/html/dd.dd.com/public
 <Directory /var/www/html/dd.dd.com/public>
        #AddDefaultCharset utf-8
        DirectoryIndex index.php
        AllowOverride All
        Order allow,deny
        Allow from all
 </Directory>

</VirtualHost>


<VirtualHost *:80>
 ServerName aa.aa.com
 ServerAlias aa.com
 DocumentRoot /var/www/html/aa.aa.com/public
 <Directory /var/www/html/aa.aa.com/public>
    # Compress output
    AddOutputFilterByType DEFLATE text/html text/css text/plain text/xml application/x-javascript
    BrowserMatch ^Mozilla/4 gzip-only-text/html
    BrowserMatch ^Mozilla/4.0[678] no-gzip
    BrowserMatch bMSIE !no-gzip !gzip-only-text/html

        #AddDefaultCharset utf-8
        DirectoryIndex index.php
        AllowOverride All
        Order allow,deny
        Allow from all
 </Directory>
4

1 回答 1

0

行动 1:最好使用 iptables + 物理路由器(如 Cisco Pix 或其他路由器)并制作黑名单 + 检查传入源 ip 与列入黑名单的 ip 网络,并暂停对我们网络的访问。

行动 2:设置一些版主,他们会筛选传入的流量并尽快将其退回并将其标记为垃圾邮件发送者,并将其报告给其他网络

Action 3: god bless us, and hope we get more informations.. its a unlimited game, never ends.

Hope it help others at-least to know possibilities.

于 2011-04-06T15:29:56.813 回答