Search

Language:  
Search for:

Available article translations:

Many email messages are sent from PHP scripts on the server. How can I find the domains on which these scripts are running?

Article ID: 1711, created on Feb 21, 2007, last review on Nov 17, 2014

APPLIES TO:
  • Plesk for Linux/Unix

Resolution

Note: This article is for Qmail. If you are using the Postfix mail server, see:

114845 Many email messages are sent from PHP scripts on the server. How can I find the domains on which these scripts are running if I am using Postfix?

Warning: using this method may increase server load due to the additional steps of processing for each message submitted to the local mail server. If you experience problems with high server load after applying the instructions in step #2, revert them using the instructions in step #3.

There is a way to determine from which folder the PHP script that sends mail was run.

Note: Depending on your operating system (OS) and Parallels Plesk version, the paths may differ from those listed below.

  1. Create a /var/qmail/bin/sendmail-wrapper script with the following content:

    #touch /var/qmail/bin/sendmail-wrapper
    #vi /var/qmail/bin/sendmail-wrapper
    

    Copy the content below and paste it into the file created above:

    #!/bin/sh
    (echo X-Additional-Header: $PWD ;cat) | tee -a /var/tmp/mail.send|/var/qmail/bin/sendmail-qmail "$@"
    

    Note that this script should be two lines including #!/bin/sh

  2. Create a log file called /var/tmp/mail.send and grant it "a+rw" rights. Make the wrapper executable, rename the old sendmail, and link it to the new wrapper:

    ~# touch /var/tmp/mail.send
    ~# chmod a+rw /var/tmp/mail.send
    ~# chmod a+x /var/qmail/bin/sendmail-wrapper
    ~# mv /var/qmail/bin/sendmail /var/qmail/bin/sendmail-qmail
    ~# ln -s /var/qmail/bin/sendmail-wrapper /var/qmail/bin/sendmail
    
  3. Wait for at least two hours, then change sendmail back:

    ~# rm -f /var/qmail/bin/sendmail
    ~# mv /var/qmail/bin/sendmail-qmail /var/qmail/bin/sendmail
    

Examine the /var/tmp/mail.send file. There should be lines starting with "X-Additional-Header:", pointing to the domain folders where the scripts which sent the mail are located.

You can see all the folders from where mail PHP scripts were run with the following command:

    ~# grep X-Additional /var/tmp/mail.send | grep `cat /etc/psa/psa.conf | grep HTTPD_VHOSTS_D | sed -e 's/HTTPD_VHOSTS_D//' `

If you see no output from the above command, no mail was sent using the PHP mail() function from the Plesk virtual hosts directory.

If the /var/tmp/mail.send file only contains:

    X-Additional-Header: /var/www

... without pointing to a particular domains folder, change permissions for the Perl binary:

    ~# chmod 700 /usr/bin/perl 

Search words:

plesk postfix sending spam




a914db3fdc7a53ddcfd1b2db8f5a1b9c 56797cefb1efc9130f7c48a7d1db0f0c 29d1e90fd304f01e6420fbe60f66f838

FEEDBACK
Was this article helpful?
Tell us how we may improve it.
Yes No
 
 
 
 
 
 
Server Virtualization
- Odin Cloud Server
- Odin Containers for Windows 6.0
- Odin Virtuozzo Containers
Automation
- Odin Automation
- Odin Automation for Cloud Infrastructure
- Odin Business Automation Standard
- Odin Virtual Automation
- Odin Plesk Panel Suite
- Web Presence Builder
- Odin Plesk Automation
- Odin Small Business Panel
- Value-added Services for Hosters
- Odin Partner Storefront
Services & Resources
- Cloud Acceleration Services
- Professional Services
- Support Services
- Training & Certification