The story begins in March 2025, the first steps was to check if the car would fire up. Obviously the battery was totally dead and had to be replaced.
First thing first, replace the battery and try to start it. Result: lights came up in the car and upon trying to start the car, smoke started to billow out of the engine bay.
Suspect No 1: alternator, proceeded to disconnect it and the smoke stopped.
After replacing the alternator, the long process to clear all the DTC (Diagnostic Trouble Codes) started. As the car had sat for 9 years in all sorts of weather, luckily under a partial roof, it was not too bad, however the level of corrosion, especially in the ECU box located in the plenum at the back of the engine firewall, was major.
The main error was linked to the transmission and brakes system. Mainly caused by water ingress and connectors corrosion, I checked and dried the ECU box, protected it somehow from further water ingress – on a a side note – why would the engineers at Audi design a system that is right where most of the water coming from the windsrceen would end up flooding this plenum is difficult to understand. If so, make sure that the box is providing a very good seal, which is not the case; it merely is splash proof at best.
Other items that were found not working well or at all:
Alternator shorted
Windscreen wipers motors dead
Wing mirrors folding not proper operation (since stopped working all together)
Transmission (mainly contacts and ABS fault related)
Rear brakes calipers seized
First Start
The first start was epic. But I was far from “start up and go”, the next few months would be quite challenging, the first major step was to move the car from the car port as I needed to repair the roof. So I hired a trailer and moved it to my home.
You know, sometimes in life, opportunities come your way, and you just can’t let them slip by. This is one of those stories.
When an old luxury limousine that had been sitting idle for nearly 10 years due to its owner’s health issues comes into view, it’s tough to say no. This car belonged to a valued customer, and I had my eye on it ever since I first saw it back in 2015 when I started working for him. Even though it looked a bit outdated, I didn’t realise just how special this rare vehicle was at the bottom of its depreciation curve.
Originally purchased in 2001, a car that would be worth £100,000 today seemed like a steal, especially since I knew I could fix it up and restore it to its former glory, 25 years later.
In 2024, his widow reached out to me for some additional work on the property, one of which was to renovate the deteriorating carport roof. When it came time to move the car to get the job done, I asked if they had any plans for it, and they said it “had to go.”
I expressed my interest in taking the vehicle off their hands and asked what they wanted for it. They told me to make an offer, so I did, and they accepted it right away.
Then began a saga of smoke, corroded wiring, and parts replacements over the next five months… and it’s still ongoing. My partner was not pleased at all, as she was really upset that I prioritised this project over other commitments we had supposedly agreed to tackle that year.
I just couldn’t bear the thought of letting this “ugly” car go to scrap, especially since it had a 3.7-litre V8 engine with only 60,000 miles on it, all for the low price of £500.00.
How to install Lets encrypt certificate on Cpanel (Namecheap Stellar Shared Hosting) when the main domain is hosted elsewhere?
For the last year or so, I have been using Namecheap Shared Hosting as a test bed, mostly to have a redundancy in case my VPS goes woosh, and secondly because I suffer huge problem with email delivery from my VPS, so for the last year I also used Zoho Mail to manage my handful of clients’s emails.
Zoho is great for emails, less so for simplicity; it is an overly complicated system to navigate. Trying to change the main user admin emails is a nightmare and my wife was less than impressed when she was getting emails from zoho about the admin account, she was the first user on the zoho mail service and I never ever managed to be able to change the config to reflect this.
Anyway, I ramble on.
Namecheap Shared Hosting
Due to the fact that over the last few years I have had less and less websites to manage and more and more email problems to deal with, I decided to give them a shot as I already use them to managed my Domains.
The Stellar package offers “unlimited” space (but it comes with a caveat). for a reasonnable cost and hosted in the EU so why not.
It was my first dab at using Cpanel and I can’t say I hate it. As you may know I am a Virtualmin user on my VPS.
In 2024 I used it mainly for testing and emails management only. Which was fine.
SSL certificates
Namecheap have a sneaky way to add value to their offering by throwing in a “free” SSL certificate for each domain you host on their servers, bit only for the first 12 months, after that, it’s no longer free.
As a user of Lets Encrypt on the VPS which Virtualmin pretty much automates, I was not going to renew their certificates at any costs?!
Where “{folder}” is the document root of your website
But! My website is hosted on another server, and letsencrypt can do that, I simply have to issue a certificate for each servers, as it checks the location of a file to validate the domain, I cannot issue a certificate for a subdomain that is not present on the main server with poor email reputation.
Step one:
Namecheap DNS setup is very convenient when using the Shared hosting’s Cpanel Zone editor. All I need to do is tell the zone the IP of my website!
The top domain point to the VPS, the rest to Cpanel
Step two:
Physically create a subdomain on the Cpanel, to allow the certificate to be installed ONLY for this sub domains (here it is mail.serex.me)
In Cpanel, go to the “Domains” section and click on Create A New Domain. Enter the subdomain name (here “mail.serex.me”) and provide the document root to be the same as a TLD (e.g., “/home/{user}/serex.me”). where {user} is the Cpanel username, which also is the folder name where all the stuff is stored for your hosting.
Step three:
Once the certificate is issued and present on the Cpanel:
(if the certificate is not showing repeat the last acme.sh command above once again it seems that the certificate is not showing up unless the command “acme.sh –deploy” is given twice)
Select the sub domain certificate in the pop up
select the right one.
The domain field will be pre populated with the mail.serex.me domain already.
Click on “Install Certificate”
To verify that the certificate is correctly installed:
Click on the “certificate details” on the “Manage SSL Sites” page. if the certificate is not issued by “Zero SSl”, but rather by Namecheap default “Sectigo” you get for free for a year:
Scroll to identify the correct certifcate for your site and click “install”. Verify the Form is correctly allocated with the right domain etc, and click “Install Certificate”.
This will install and replace the Namecheap “default “free for a year only” Certificate with the Zero SSL (Lets Encrypt) one. No need to worry
Also note that the mail.serex.me sub domain will show the content of the site root added when creating the domain, so a redirect may be necessary unless you don’t mind having a folder listing.
All good and no errors when hooking up your mail client!
The one thing I have always been struggling with for the past decade: Sending emails from my own servers
This never ending saga is the result of the openness of the email sending protocol; it is based on trust and is transparent, because of this, it has become the number one method to reach anyone, very easily and quickly, as it was intended.
The idea was genius and obvious, so obvious in fact that now, anyone can send anything to everyone, very fast without consequences and at virtually no cost.
If you don’t understand where I am getting with this I shall make it plain and simple to understand: SPAMMERS
This has created a monumental problem, and spammers don’t care as long as they can sell to one in a million, send to 500’000’000 emails, get 500 responses, sell for $100.00, get it?
That is a problem the industry has been facing for the last 30 years and showing no signs of abating, therefore using various tools to identify the originator of an email message is the only way to at least mitigate the great flood of electrons down the great internet, these tools are checking that the:
Sender of the email is who they say they are (SPF)
Server sending the message is belonging to said sender (DKIM)
Message header contains the two things listed above in the correct way combined with a valid DNS on said server and domain (DMARC)
Message is not junk (SPAM or no SPAM?)
As far as I can tell, I think this is how it is supposed to work. But I never had any luck with successfully implementing the whole thing. For example, I have enormous problem trying to send emails to the Microsoft network comprising, outlook.com, live.com and hotmail.com. Yet when I report the issue to Microsoft Ticketing system, I always get a response basically telling me that there’s nothing “off hand” as they call it to prevent my messages getting through (more on this later).
The other problem I also have started to discover is that the rejected emails one is getting from the recipient’s mail server is pretty generic and does not seem to tell much of what exactly is the problem if at all. It’s just “a problem” and one needs to “figure it out”.
The other thorny aspect is IPV6, which is another problem altogether! So I have turned off IPV6 on my servers until I have time and resources to debug this problem also.
Lucky break
Only just recently I stumbled upon a very useful website that allows me to send an email and check what is going on with it and potentially why I struggle to send it to MSDN (the Microsoft network), so much so that, after many, many tweaks, I finally managed to send an email through to MSDN (albeit flagged as spam) nevertheless IT WENT THROUGH, HURRAY!!
My Savior in the sea ocean of spam
Send them an email (free to send 5 messages per day, which was almost sufficient), see what wrong, fix and there you have it, 10/10 message quality!
The steps
Once you know what you need to do to fix your email sending problems, as long as your IP is not Blacklisted, bob’s your uncle.
Below are the required elements to ascertain your email sending cleanliness.
This Howto is for my own system which is made of Linux (Ubuntu) LAMP webservers managed via Webmin/Virtualmin and I outsource all my DNS with my Registrar (Namecheap).
Other setups will invariably be somewhat different, however I am suspecting that, should you be using Plesk or other similar Control panel systems, most of these issues might be already setup by default ( I know by experience at least with Cpanel it was less a problem) especially when you get a complete package from, say a registrar like Namecheap, as you’d expect them to have done it for you.
In my case, I like to go commando, by not relying on others to do the leg work, the onus is then on you to get it working, something that Virutalmin on an un-managed server gives you plenty of reasons to walk miles. But, as I said, once you know what to do it is relatively simple to enable your server to send clean emails to most networks.
Starting situation
This is the test result when setting up a mail box on one of my servers, it gives an idea of the sort of score you can expect from a default config on a Virtualmin Server
Not a shining report
In more details in the screenshot below, one can see one of the main issue; DKIM, the other negative scoring is related to the MX record, as I just set it up for this test it might need to be propagated before the error is fixed.
DKIM is at a loss here…
So let’s get DKIM fixed for this domain by loading the website configuration and making the necessary changes to make DKIM work.
In the screenshot below it is already put in place by default for the whole server, we can therefore leave it as is, unless one wants to change the key…
The current default DKIM is all good to be used
So the next step is to edit the domain DNS record appropriately, by going on the registrar’s website of the domain and add the correct entry to the DNS record.
add and save DKIM public key
Lastly, it is also necessary to add the SPF and possibly the DMARC record for this domain, the default value is usually okay, depending if DNS is enabled or not, Virtualmin will provide a list of recommended DNS records under the “Server Configuration -> DNS records” for that domain :
{domain}. IN TXT "v=spf1 a mx a:{domain} ip4:{xxx.xxx.xxx.xxx} ?all"
Where {domain} and {xxx.xxx.xxx.xxx} are the values to edit for the specific domain/IP
Once this is in place, validate the DNS, wait a little and re-test.
Much better
I almost got it right, there is just a little issue with the MX record, but I think that It will get resolved pretty quickly, whilst I was at it I also edited the DMARC record:
_dmarc{domain}. IN TXT "v=DMARC1; p=quarantine; pct=100; ruf=mailto:postmaster@{domain}; rua=mailto:postmaster@{domain}"
Last test
Once all these records are correctly set up. it is time to re-run the test, and, lo and behold!
Perfection.
The final hurdle is to test if the emails are making it through the dreaded OUTLOOK.COM address?
Nope :-P, oh well, apparently it is down to my Provider IP range being black listed, they tried to help but it has never worked, ultimately they recommended me to use SMTP2GO, I tried it and it works, but the point remains that I have a problem sending from one of my servers.
Use it if you cannot send emails after all these efforts
Conclusion
To conclude, I have actually learned something useful and am now confident that email deliver-ability issues I was facing without any clue as to why and simply gave up, are now easily fixable! Thank you Mail tester!
For more resources regarding setting up your own Web server using Virtualmin and what you need to check before starting, read my older post here more particularly the “Next Steps” section…
Addendum
I recently received an emaile regarding this post from Janis von Bleichert over at experte.com, they have developed a upgraded version of the mail-tester system, as he put it :
Like the original, it uses well-known spam filters and blacklists to check the spam score of a mail. But in addition, it also checks whether Gmail classifies the email as spam and into which inbox the mail is placed. Since Gmail is the world’s most used email provider, a positive assessment is critical for deliverability. In the last step, the tool also checks the correct configuration of the SPF and DKIM records.
A screenshot of Janis’s system in action
Thanks to Janis to bring this useful tool to my attention,
Even though I have not just been diagnosed with COVID-19 (some kind of influenza, speak to you in 10 years time), I am pleased to report that now more than 10 years after my initial Posting about this matter, I now do have a life.
And a Nice one for that matter 🙂
It was quite fun to read back what I wrote then, the state of the web, what was going on around it and my state of mind, today though, it is quite different: I don’t get involved much about what is going on on the web, except I still am on Facebook, only on the PC though, I rarely comment but likea lot of stuff… I removed it from my phone, like a lot of people seem to be doing these days:
I have also decided to screenshot articles, as link rot is very prevalent nowadays.
Funnily, I had completely forgotten about PLAXO, which is totally rotten dead.
So is Google Buzz (knew it, didn’t like it), Twitter, on the other hand, seems to do quite well, and there is Tik Tok (tried it, useless c**p if you ask me, but hey, your call). Will it stay? Jury’s out!
Instagram, also done it, no longer, I don’t see the point really… But my wife, uses it, as she’s (still) a marketing guru, but instead of big animals it is rather smaller furry (or shall I say hairy) ones now.
Which is also my life now, in my lovely renovated Perthshire Cottage at the edge of the stunning Scottish Highlands.
My keyboard is trying to tell me that I should also use #hashtags these days. Never saw this coming, but it kind of makes sense, if only some folks could spell, there is one thing I HATE above all, that is news reports (soon to be dead I also hear), littering their “report” with Twitter and other Instagram links.
If I want to read twitter, I blooming well will go on twitter to read them, which I don’t so don’t spam my reading pleasures with these ugly snippets of badly spelled nonsense, please! Another thing I would not miss at all.
The children are now in their late 20’s, one is working, one is on the dole (as a career) and I am desperately trying to boot my last one out of the house, left, came back, left came back and so on for the last 10 years. What is is with this generation? They blame me for all their bad choices, not me sorry, it YOUR life, all I will say is that gaming at home when you’re nearly 30 is not natural… we’ll see in 2035 perhaps it might have changed and I will be near retirement.
Apparently in 2036 there could have been a planetary disaster but it seems that fake newssss was the culprit. #99942Apophis here it comes aargh. but it may get my 40 something out of his room and look up, just maybe.
so enough for the once in a decade rant, see you in ten years I guess.
You already have one server with a dkim key pair and use virtualmin “DomainKeys Identified Mail”:
Edit the dkim option on the source server and add the new domain (I personally use sub domains for all my servers) so for example if your initial mail server is s1.domain.com and your new server (the one you will copy the dkim key on) is s2.domain.com your “Domains to sign for” section must contain:
s1.domain.com
s1
s2.domain.com
s2
Save this on the source server. The key will be updated….
The private key on my ubuntu server is filed under: /etc/dkim.key
If your target server is the same [OS], first of all proceed to enable DKIM on the virtualmin “DomainKeys Identified Mail”, you may want to use the same details than the source server in the “Domains to sign for” section & “Save”, this will create the key pairs.
I personally then disabled dkim on the TARGET server before doing the next step, but it might not be required(!?).
When complete, edit the /etc/dkim.key on the TARGET server with vi or otherwise replace the private key with the one from the SOURCE server (you should make a backup of the file first, always do a backup!).
Go back to the virtualmin “DomainKeys Identified Mail” in the TARGET server page and enable the dkim outgoing email but with the option “Force generation of new private key?” to “NO” and “Save”
The private key will then be read from the /etc/dkim.key and used to generate the exact same public and DKIM DNS records for domains as the source server together with all the required settings to make it work.
You’re all set and the DNS can be edited if the DKIM DNS records for domains has changed, mine does not seem to have.
When, like me, you get paranoid to losing your data or web server functionality…
I have created a little perl script to allow the synchronization of MySQL databases and /home between my Webservers.
The master server (where the script runs from) is the main production server, the salve server is on standby just in case.
I can appreciate that the passwords are clearly inserted in the script and it is a security issue. Nonetheless, I am the only admin and no other users have ftp or other privileges on both servers. I am sure that there is a way to prevent this but I am happy with the current situation and, obviously I am also making a regular backup of the master server on an external backup provider (I use rsync.net).
#!/usr/bin/perl
# Performs a synchronisation of home folder and dumps sql databases
# from one Virtual server to another using rsync and secure shell
#
# Written by G.Serex Sharpnet UK (c) 03.12.2020
# Var definitions
############### SQL Config #############
# SQL root username
$username = "root";
# Local SQL root password
$password = "localmysqlpassword";
# Remote SQL root password
$rpassword = "remotemysqlpassword";
# The dumped files path . (absolute path + trailing / please)
$dumped_dbs_path = "/root/mysql/";
# The dumped file name
$dumped_db = "dump.sql";
# Name of the database to exclude from the dump (here the mysql and sys are obviously dedicated to each server, so don't dump them!)
$exclude_database = "mysql,sys,information_schema,performance_schema";
################ SSH Config #################
# The remote host name
$remotehost = "ipaddress";
#The ssh username
$sshusername = "root";
#The ssh port
$sshport = "xx";
#____ E N D _ V A R _ D E F S. ________________
# First check and optimise the lot.
# A little house keeping
system("/usr/bin/mysqlcheck --optimize --all-databases --auto-repair -u $username -p$password");
# Dump the dbs
system("/usr/bin/mysqlpump -u $username -p$password --exclude-databases=$exclude_database --add-drop-table --result-file=$dumped_dbs_path$dumped_db");
# Transfer them abroad
system("/usr/bin/rsync -avz -e 'ssh -p $sshport' $dumped_dbs_path $sshusername\@$remotehost:$dumped_dbs_path");
# Restore the dump abroad
system("/usr/bin/ssh -p $sshport $sshusername\@$remotehost 'mysql -u root -p$rpassword < $dumped_dbs_path$dumped_db'");
# rsync the home directory
system("/usr/bin/rsync -avz --delete -e 'ssh -p $sshport' /home/ $sshusername\@$remotehost:/home");
exit;
After that, be prepared to get a lot of emails about the blocked IPs for the set time (default is 3600 seconds or 1 hour). They eventually taper out with the most offending IP’s getting permanently blocked 🙂
Came across the challenge of having to customise the WordPress Twentyseventeen theme to cater for header images that match content of specific pages, let’s say, for example that one has a WP site with portraits of different animals in various pages of the site, whilst twenty seventeen theme allows you to upload a serie of header images that can be randomly rotated on the pages as the are loaded by the end user it does not specifically allow to have the same system dedicated to each pages. The following example remedies this.
After digging a bit and following some other posts on the web, here are the steps required to enable this feat.
Note that you must be able to edit the PHP files and thus be proficient in editing PHP and be familiar with WP inner workings…
First edit the wp-content/themes/twentyseventeen/header.php
Remove or comment out the orange line and replace with the following code.
...
<div id="page" class="site">
<a class="skip-link screen-reader-text" href="#content"><?php _e( 'Skip to content', 'twentyseventeen' ); ?></a>
<header id="masthead" class="site-header" role="banner">
<?php// start simply copy header-image.php to header-dog.php and mod the file accordinglyif(is_page("dog-paintings-and-dog-portraits")) {get_template_part( 'template-parts/header/header', 'dog' );}else{get_template_part( 'template-parts/header/header', 'image' );}// end mod ?>
<?php if ( has_nav_menu( 'top' ) ) : ?>
<div class="navigation-top">
<div class="wrap">
<?php get_template_part( 'template-parts/navigation/navigation', 'top' ); ?>
</div><!-- .wrap -->
</div><!-- .navigation-top -->
<?php endif; ?>
...
in the example above the page is called
dog-paintings-and-dog-portraits
The header file called is called header-dog.php under the wp-content/themes/twentyseventeen/template-parts/header/ folder (which is a copy of the header-image.php and edited to deal with the other images)
if there are more than one page, simply add more conditionals ifs for each individual pages and copy header-image.php to match like above.
Windows 10 definitely sucks big time on a HDD, so I have just bought a Crucial MX500 1TB SSD and after hooking it up to my rig am simply using ddrescue from a Linux box to do the copy, ah Linux, what would I do without it? certainly live a much shorter life. Happy days…