SMTP and ESMPT Error Codes

SMTP Error Codes

Here is a list of the standard SMTP error codes you will find in most email bounces.

200 Codes

  • 211 – System status / system help reply
  • 214 – Help message
  • 220 – Domain service ready
  • 221 – Domain service closing transmission channel
  • 250 – Requested mail action completed and OK
  • 251 – Not Local User, forward email to forward path
  • 252 – Cannot Verify user, will attempt delivery later
  • 253 – Pending messages for node started

(more…)

Continue ReadingSMTP and ESMPT Error Codes

Vivaldi

I recently downloaded and installed Vivaldi on multiple systems to test it out (linux and win7). What I found was that although it is blazingly fast, the functionality of the…

Continue ReadingVivaldi

Logwatch

Logwatch is the classic log file email utility that emails a daily status of activity from Linux logs. On CentOS, the default install of logwatch does not have many fancy features enabled. I’ll show you how to configure logwatch!


First, install logwatch:

$ sudo yum install logwatch

 

(more…)

Continue ReadingLogwatch

FCGI w/ SuExec and Mod_Userdir Issues

Howdy,
 
  
With the recent push for servers to use FCGI as opposed to dso, cgi or suphp, we are seeing some issues regarding mod_userdir. With FCGI and SuExec, mod_userdir will not function as per cPanel’s documentation.

https://documentation.cpanel.net/display/ALD/Apache+mod_userdir+Tweak#Apachemod_userdirTweak-Enabledmod_userdirprotection

According to cPanel:

Enabled mod_userdir protection
Before you enable the mod_userdir module, be aware of the following information:

  • When you use FCGI as your PHP handler, you must disable suEXEC in order to run PHP scripts via the mod_userdir module.
  •  

    Warning: We strongly recommend that you do not disable suEXEC. 
    It is extremely insecure to disable suEXEC.

  • Java servlets do not work with mod_userdir-based URLs. This is because Tomcat requires that you add additional directives to the virtual host.
  •  

  • open_basedir protection restricts PHP’s access to the home directory of the user who owns the base domain, not the home directory of the user account that a visitor accesses. If you enable open_basedir protection in WHM’s PHP open_basedir Tweak interface (Home >> Security Center >> PHP open_basedir Tweak) visitors cannot access some sites via the mod_userdir module.
  •  

  • Under certain conditions, a user can attack another user’s account if they access a malicious script through a mod_userdir URL.
  •  
    Websites that use the mod_rewrite or other directives in their .htaccess files will not function correctly when visitors view them through mod_userdir URLs.

    (more…)

    Continue ReadingFCGI w/ SuExec and Mod_Userdir Issues