0
我对www.domain.com和login.domain.com有以下内容。但垃圾邮件发送者转发网站login.domain.com,它的工作原理。我怎样才能阻止他们?如何保护垃圾邮件发送者到apache?
例如:http://spammerexmaple.sex.com打开http://login.domain.com(我想阻止这种)
<VirtualHost *:80>
ServerName login.domain.com
ServerAlias login.domain.com
DocumentRoot /var/www/html/com/public
<Directory /var/www/html/com/public>
#AddDefaultCharset utf-8
DirectoryIndex index.php
AllowOverride All
Order allow,deny
Allow from all
</Directory>
</VirtualHost>
<VirtualHost *:80>
ServerName www.domain.com
ServerAlias domain.com
DocumentRoot /var/www/html/www/public
<Directory /var/www/html/www/public>
# Compress output
AddOutputFilterByType DEFLATE text/html text/css text/plain text/xml application/x-javascript
BrowserMatch ^Mozilla/4 gzip-only-text/html
BrowserMatch ^Mozilla/4.0[678] no-gzip
BrowserMatch bMSIE !no-gzip !gzip-only-text/html
#AddDefaultCharset utf-8
DirectoryIndex index.php
AllowOverride All
Order allow,deny
Allow from all
</Directory>
</VirtualHost>
追问:
垃圾邮件发送者前进www.spammer.com到login.domain.com或www.spammer。 sex.com任何人都可以转发到login.domain.com,它的工作原理。
我怎样才能阻止这个>?
[[email protected] dd.dd.com]# httpd -S
VirtualHost configuration:
wildcard NameVirtualHosts and _default_ servers:
_default_:443 d (/etc/httpd/conf.d/ssl.conf:81)
*:80 is a NameVirtualHost
default server dummy.com (/etc/httpd/conf/httpd.conf:1028)
port 80 namevhost dummy.com (/etc/httpd/conf/httpd.conf:1028)
port 80 namevhost dd.dd.com (/etc/httpd/conf/httpd.conf:1039)
port 80 namevhost aa.aa.com (/etc/httpd/conf/httpd.conf:1058)
Syntax OK
<VirtualHost *:80>
ServerName dummy.com
DocumentRoot /tmp
<Directory /tmp>
deny from all
</Directory>
</VirtualHost>
<VirtualHost *:80>
ServerName dd.dd.com
#ServerAlias dd.dd.com
DocumentRoot /var/www/html/dd.dd.com/public
<Directory /var/www/html/dd.dd.com/public>
#AddDefaultCharset utf-8
DirectoryIndex index.php
AllowOverride All
Order allow,deny
Allow from all
</Directory>
</VirtualHost>
<VirtualHost *:80>
ServerName aa.aa.com
ServerAlias aa.com
DocumentRoot /var/www/html/aa.aa.com/public
<Directory /var/www/html/aa.aa.com/public>
# Compress output
AddOutputFilterByType DEFLATE text/html text/css text/plain text/xml application/x-javascript
BrowserMatch ^Mozilla/4 gzip-only-text/html
BrowserMatch ^Mozilla/4.0[678] no-gzip
BrowserMatch bMSIE !no-gzip !gzip-only-text/html
#AddDefaultCharset utf-8
DirectoryIndex index.php
AllowOverride All
Order allow,deny
Allow from all
</Directory>
认为,这可能是对ServerFault更好。 – slugster 2010-11-23 00:24:03