Child pages
  • Dedicated Server Security
Skip to end of metadata
Go to start of metadata

Introduction

All dedicated servers are physically located at our high-security data center in Copenhagen, Denmark. Only trained and certified EasySpeedy on-site technical staff has physical access to this location.

Firewalls

We do not believe in filtering data traffic to our customers. Any traffic filtering has to be performed on your dedicated server. This allows you to chose your own preferred firewall software and configure your services as you like.

Mail Servers

Many hosting providers block SMTP access to their customers, and requires them to use a specific SMTP relay server for outgoing - and in extreme cases - ingoing e-mails as well. Back in the "old" days, most SMTP servers were configured out-of-the-box to allow for open relaying. This was indeed a security risk and was effectively used by spammers to directly send e-mails through remote mail servers.

Things have changed and now SMTP servers are by default configured to only allow relaying of e-mails sent by the local machine/server. Keep in mind, that allowing only local-relay can still not be considered as the silver bullet to the security risk involved with open relaying.

Today, many websites utilize e-mail forms, or other ways of sending e-mails through the web servers local or remote authenticated SMTP service.

Consider the following scenario; a website with an e-mail form with no or poor input validation. These are commonly used by spammers, crafting malicious GET requests to manipulate the e-mail header, changing recipient, subject and content, to send spam e-mails remotely, effectively bypassing the SMTP server security through the web server.

E-mails sent from your Dedicated Server is your responsibility. Following good practices can help reduce or prevent abuse;

  • Add your domain names and abuse e-mail contact details to the abuse.net contact lookup. This enables you to be informed on possible complaints, directly.
  • Keep track of e-mails sent from your server by checking mail server queues and logs.
  • Check website source codes for input validation, and keep any 3rd party software (e.g. CMS, forums, blogs) up to date.

If e-mails are sent from different websites, set up tracking of e-mails for instance by adding an additional mail header field with the website address. This will greatly ease up future troubleshooting.

Sending spam e-mails will eventually cause your server to be blacklisted at different blacklist providers, letting other mail servers either reject e-mails from your server or mark them as spam. In case your server is caught sending spam, our Abuse department will contact you, and flag your account.

You are at all time required to operate your server within our  Acceptable Use Policy.

Operating Systems

Our automated installation system provided in your Control Center leaves a completely default operating system installation. Basically this is a unattended installation, meaning that we do not use installation disk images, only fresh installations. No additional programs or back-doors are installed on your server. We have no means of managing your servers operating system.

  • No labels