By Chris Chase on Friday, 21 December 2018
Posted in General Issues
Replies 3
Likes 0
Views 1.1K
Votes 0
Hi Support,

We're having issues publishing some content on networkmgmt.com.

Here's the name of the post in question: HOW CYBER CRIMINALS CAN BYPASS YOUR REPUTATION MANAGEMENT

The content is as follows:

The original email reputation management system began with the Realtime Blackhole List (RBL). The very first RBL was developed in 1997 by Paul Vixie for the Mail Abuse Prevention System (MAPS). Referring to a network link that drops rather than forwards incoming traffic, Vixie intended the “blackhole” in this case to drop email traffic from sites that directly sent or enabled spam. The original RBL consisted of a list of suspect sites transmitted to subscribing systems administrators over Border Gateway Protocol (BGP). Subscribers could then apply the list to block TCP/IP traffic from those sites. While RBL reputations presented a significant step forward in managing spam, it also presented inherent challenges. MAPS meticulously worked to verify sites for accuracy before publishing them to the list. While this helped reduce false positives, it also significantly delayed subscribers’ ability to respond to attacks quickly. Over time, MAPS developed RBL clients that integrated with email software to enable administrators to customize their own RBL to reject incoming email on a per-server basis. The MAPS RBL laid the groundwork for the development of the DNS-based Blackhole List (DNSBL) format. The Domain Name System (DNS) Internet service translates domain names/ hostnames to IP addresses (forward DNS) and IP addresses to their associated domain names/hostnames (reverse DNS) with the help of a DNS server. Rather than being simply a discreet list, a DNSBL added multiple standards for dynamically listing and delisting IP addresses. DNSBL service providers could then distribute updated lists via the Internet Domain Name Service (IDNS) using a standardized format. Early developers of DNSBLs added such criteria as whether a sending mail server used potentially exploitable open relays or proxies, or whether a mail server sent spam to a “honey pot” system designed to attract and gather spam for identification and analysis. Today, there are dozens of DNSBL services available and most email servers can query these services to verify the reputations of IP addresses. However, these services apply different standards for adding, removing or retaining IP addresses on their lists. Subsequently, some service lists may not contain potentially dangerous IP addresses, or erroneously include valid ones.

I've rooted out a specific set of characters, (MAPS), as being part of the problem here, however there's more in there that's causing a problem. I also tested publishing this to a standard Joomla article and it went up fine, which leads me to believe the issue is specifically with Easyblog.

I've attached some credentials for the site. Could you take a look and see if anything's amiss?

Thanks,
Hi there,

Currently, that might be some restrictions done your server currently as for security measurement. I did done some finding on the internet and found same issues as yours as you can see here https://www.litespeedtech.com/support/forum/threads/solved-403-forbidden.6189/

To find this on my own, will take a while as i will need to strip them words by words and remove plus put them on the content. Maybe you can try to consult them regarding this first and see how it goes.

Keep us updated once you found out them. Please advice.
·
Friday, 21 December 2018 12:05
·
0 Likes
·
0 Votes
·
0 Comments
·
Thanks Abdul,

We'll look into this with our host and see what we can come up with.
·
Saturday, 22 December 2018 03:06
·
0 Likes
·
0 Votes
·
0 Comments
·
Hi there,

Do keep us updated once you got any news from them
·
Saturday, 22 December 2018 10:42
·
0 Likes
·
0 Votes
·
0 Comments
·
View Full Post