Warning: the CA certificate does not sign the certificate.

When installing an SSL certificate in Parallels Panel (Plesk) along with an intermediate certificate you receive the error message

Warning: the CA certificate does not sign the certificate.

Generally it is safe to ignore this error. It is just Parallels Panel not being able to follow the complete CA root path. However, I have found that if you append the intermediate certificate to the CA certificate (instead of putting it in the intermediate certificate box), you do not get the error.

Here is the intermediate and root DomainSSL cert for globalsign:

—–BEGIN CERTIFICATE—–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—–END CERTIFICATE—–
—–BEGIN CERTIFICATE—–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—–END CERTIFICATE—–

How to upgrade PHP to PHP 5.4 on CentOS 6 from a remi repository

Parallels Article ID: 115875

1. Install epel and remi repositories:
# wget http://dl.fedoraproject.org/pub/epel/6/x86_64/epel-release-6-8.noarch.rpm
# wget http://rpms.famillecollet.com/enterprise/remi-release-6.rpm
# sudo rpm -Uvh remi-release-6*.rpm epel-release-6*.rpm

2. Enable remi repository:
# sudo vi /etc/yum.repos.d/remi.repo
In the [remi] section of the file, set the “enabled” option to 1.

3. Upgrade PHP with this command:
# yum install php

4. Set remi section back to 0.

Enable Spamassassin for all existing mailboxes

In order to enable Spamassassin for all existing mailboxes you can use the following script:
#!/bin/sh

#Get the list of mailboxes registered in PPA

mysql -uadmin -p`cat /etc/psa/.psa.shadow` psa -sNe “select mail.mail_name, domains.name from mail left join domains on mail.dom_id=domains.id” | sed -E ‘s/[[:space:]]+/@/g’ > /tmp/mailboxes_list

#Enable spamassassin for mailboxes

while read mailbox
do
/usr/local/psa/bin/spamassassin -u $mailbox -status true
done < /tmp/mailboxes_list

delete email on plesk server

One of our customers had checked the “leave message on server” box, by accident in Outlook and over 8 months accumulated over 20,000 messages (mostly spam) on the server. The mailbox was close to 1.5GB in size.

Its a Qmail mail server.

First, find out exactly how many messages are in the box and sort by the largest message

ls -Slh | – less

The | less will allow you to go page by page. To exit type :q

He requested that we delete all the emails that were over 30 days old.

Then stop the server

/etc/init.d/qmail stop

Command to remove all the old messages:

find /var/qmail/mailnames///Maildir/curr -mtime +X -print | xargs rm

replace +X with the number of days (so in our case it was +30)

the Maildir/new folder contains messages in the queue.

Depending on how many messages are in the folder the above command can take a few minutes – do not cancel until you get back to the prompt $.

/etc/init.d/qmail start