On 04/03/2013 02:30 PM, Eric Peabody wrote:
Frank,

I'll suggest doing the following:

 1. Stop sendmail for a moment while you do the next two steps
 2. Add a line in /etc/mail/access to block the outgoing email address
like, "From:bus...@sad.com REJECT". Then run make in /etc/mail. That will stop any further outgoing messages while you work on the
    problem.

        I believe you need to run this when changing access
        run makemap hash /etc/mail/access < /etc/mail/access

 1. Clear the outgoing mail queue of spam from that sender. Run mailq
    to get the stuff in the queue and delete the nasty files.  Note
    there are two files for each message, one starting with "df" and
    one with "qf".
 2. Start sendmail and watch the log to be sure that mail from that
    account does not go out
 3. Change the user name and password for the account.  I suggest
    changing the user name because the spammers are likely to continue
    to try sending with that account and pam_abl will block the
    account, preventing the valid user from accessing mail.  Also
    suggest picking a user name that is somewhat unusual and different
    from the email address. For example, for "fr...@happyplace.com", a
    user name of "happyfrank" would be much better than just "frank"
    and makes guessing more difficult.
 4. Remove the line from /etc/mail/access and run make and restart
    sendmail

We too have seen a large increase in attacks through sendmail AUTH recently. The accounts compromised did not use encrypted connections and I recommend that you require users to use encrypted connections as soon as possible. Of course, getting folks to change settings like this is a challenge.

Since sendmail uses saslauthd for authentication and the API between them does not include the IP address, error messages are limited. I've been matching on the "did not issue MAIL/EXPN/VRFY/ETRN during connection to MSA" message which sendmail produces when an authentication fails and includes an IP address. Messages in /var/log/secure are not especially helpful and there is some delay between the logging in secure and maillog so matching the events is difficult.

I also cranked down the number of allowed recipients to limit the damage and wrote an informal script to send a text message to me if that limit is exceeded. If I find the time to solidify it, I'll post it. The spammers usually try to send to a fairly large number of recipients, perhaps 25, and if that fails, reduce the number until they get through. By monitoring for the "Too many" messages in maillog, I get an early warning of a compromised account.

We installed fail2ban on our servers and continue to tweak the configuration. It has been a lot of work but it has significantly reduced the activity from the spammers since it blocks them pretty quickly. However, the absence of any user interface and the need for some programming skills makes it difficult to use.

We also use fail2ban to monitor for attacks against Wordpress sites and have had a number of detections from that filter so this is good for more than mail.

While fail2ban is a good tool, it needs some improvements such as being able to restart it without loosing track of what it has done, a way to remove a banned address and better status and reporting tools in addition to an improved user interface. I guess if you like iptables, you'll love fail2ban ;).

Eric

On 4/3/13 1:46 PM, Ken Marcus wrote:
On 4/3/2013 9:37 AM,fra...@iaw.on.ca  wrote:
Hi,

I am running BlueOnyx 3.20110922 .  We have had a lot of unauthorized
relaying only for a certain user.  We even changed her password but it's
still doing it.

In the eMail section of Network services I have it checked off to Enable
SMTP Auth and POP Authenticated relaying.

It's only happening to the one user which is confusing me.  What else can
i set to tighten up the relaying?

Thanks.

Here is a log entry:

Apr  3 10:58:56 raq2 sendmail[9296]: AUTH=server,
relay=ip-176.105.131.241.tvsat364.lodz.pl [176.105.131.241],
authid=mmagno, mech=LOGIN, bits=0

Apr  3 11:02:05 raq2 sendmail[12291]: AUTH=server,
relay=host-81-190-162-132.gorzow.mm.pl [81.190.162.132], authid=mmagno,
mech=LOGIN, bits=0

Apr  3 11:02:20 raq2 sendmail[12306]: AUTH=server,
relay=124-218-75-60.cm.dynamic.apol.com.tw [124.218.75.60] (may be
forged), authid=mmagno, mech=LOGIN, bits=0

Apr  3 11:03:14 raq2 sendmail[13029]: AUTH=server,
relay=triband-mum-59.183.21.118.mtnl.net.in [59.183.21.118],
authid=mmagno, mech=LOGIN, bits=0

Apr  3 11:06:20 raq2 sendmail[15029]: AUTH=server, relay=[212.5.32.239],
authid=mmagno, mech=LOGIN, bits=0


_______________________________________________
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx
Spammers have the mmagno password.
It seems like restarting sendmail and dovecot would be enough.  But for
some reason I have seen successful authids after doing that. Maybe they
are cached somewhere.

If you  reboot the server after the password change. That will do it.

Ken Marcus



_______________________________________________
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx



_______________________________________________
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


--
Gerald Waugh
Front Street Networks
(318) 734-4779
(318) 401-0428
_______________________________________________
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx

Reply via email to