Hi Eric - was that for Andy or me

I'm on

   - qmail-1.03-3.1.1.qt.el7.x86_64
   - qmailadmin-1.2.16-2.qt.el7.x86_64
   - qmailmrtg-4.2-3.qt.el7.x86_64


David Bray
0418 745334
2 ∞ & <


On Tue, 21 Apr 2020 at 23:34, Eric Broch <ebr...@whitehorsetc.com> wrote:

> Andy,
>
> May I ask what version of qmail you're on?
>
> Eric
> On 4/20/2020 10:15 PM, David Bray wrote:
>
> Hi Andy - you have grasped the problem accurately
>
> As I understand it, the transaction does not leave a great deal of scope -
> negotiate the encryption, send a password successfully or unsuccessfully -
> (at that point it's logged)
>
> So it has to be the negotiation phase ...
> but:
>
>    - I've only just built this server
>    - stuck to a standard install using a CentOS 7 VM - 4GB: 2 CPU, 80GB
>       - I think this adequate I've seen no OOM events - and the size is
>       what I've used before
>
> The only thing I'm really seeing here that could be an issue is - the
> newer machines are stricter on SSL - the TLS 1/1.2 deprecation thing
> I see lots of broken servers, and have to *make allowances*, I do this by:
>
> touch /var/qmail/control/notlshosts/<the host name>
>
>
> Noting - that is an outbound thing ... (see
> https://www.qmailtoaster.org/notls.html)
>
> So ...... is it possible that a broken client is hitting the port, not
> being able to make the necessary handshake and causing this CPU load ....
> It's reported in the logs when the server makes an outbound transaction
> like that ...
>
> deferral:
> TLS_connect_failed:_error:14077410:SSL_routines:SSL23_GET_SERVER_HELLO:sslv3_alert_handshake_failure;_connected_to_103.27.32.20./
>
>
> What would it look like in my logs if they where to have the reverse issue
>
>
>
>
>
> David Bray
> 0418 745334
> 2 ∞ & <
>
>
> On Tue, 21 Apr 2020 at 02:54, Andrew Swartz <awswa...@acsalaska.net>
> wrote:
>
>> Port 465 should be SMTP over SSL/TLS.  Therefore the sequence of events
>> is:
>>
>> 1.  Establish TCP connection
>> 2.  Negotiate SSL/TLS session
>> 3.  Begin SMTP session
>>
>> Of these, the SSL/TLS negotiation is by far the most CPU-intensive.
>>
>> Consider trying to see what is happening with the SSL/TLS negotiation.
>> It may be failing in a way which is slamming the CPU but not showing up
>> in the SMTP logs because it never completes and thus an SMTP session is
>> never initiated.
>>
>> I'm unsure the best way to debug the incoming SSL/TLS negotiation.  You
>> might set a firewall rule where incoming port 465 from that single IP is
>> forwarded to stunnel (on another machine) which is set to output verbose
>> debug info???
>>
>> It would be interesting to know the cause.  This could be some clever
>> DOS attack where a single connection accomplishes the DOS by slamming
>> the CPU by submitting something invalid to openSSL.  But it might just
>> be that some spammer is using a home-brewed script which is buggy and is
>> unintentionally causing this problem.
>>
>> There seems no efficient way to block this without figuring out the
>> cause and doing something to make that cause be logged into some log
>> file.  Once that is accomplished, fail2ban (or something similar) can
>> easily add firewall rules to block individual IP's which exhibit this
>> behavior.
>>
>> -Andy
>>
>>
>>
>>
>>
>> On 4/19/2020 10:12 PM, David Bray wrote:
>> > Hey thanks Remo
>> > smtps is an inbound port, they are contacting me - this IP is in Russia
>> > somewhere - so do I want to engage (perhaps, probably not but ..)
>> >
>> > I could of course block that IP - but that doesn't help, I'd have to
>> > block endless IPs
>> >
>> > I'd like to know what's taking the CPU load, in theory they should be
>> > connecting, supplying a password (perhaps) and sending data
>> > but, there are sometimes bad passwords (2 for the 20th recorded in
>> maillog)
>> >
>> > So..
>> > What are they doing the other times and why is it taking so much CPU -
>> > if it is just a port knock, why the CPU
>> >
>> > I need to be able to say, they are bad because ... *what is the
>> because* ?
>> >
>> > David Bray
>> > 0418 745334
>> > 2 ∞ & <
>> >
>> >
>> > On Mon, 20 Apr 2020 at 15:32, Remo Mattei <r...@mattei.org
>> > <mailto:r...@mattei.org>> wrote:
>> >
>> >     Hi,
>> >     Can you reach the server?  It maybe blocking you. So what does your
>> >     queue looks like?
>> >
>> >     Here is mine for example:
>> >
>> >     # qmHandle -L
>> >     Messages in local queue: 0
>> >     Messages in remote queue: 0
>> >
>> >     My other server
>> >
>> >     # qmHandle -L
>> >     10355792 (19, L)
>> >        Return-path: r...@qmailxxxxx.com <mailto:r...@qmailxxxxx.com>
>> >        From: Anacron <r...@qmailxxxx.com <mailto:r...@qmailxxxx.com>>
>> >        To: r...@qmailxxxxx.com <mailto:r...@qmailxxxxx.com>
>> >        Subject: Anacron job 'cron.daily' on qmailxxxxx.com
>> >     <http://qmailxxxxx.com>
>> >        Date: 19 Apr 2020 10:28:28 -0000
>> >        Size: 509 bytes
>> >
>> >     10358746 (6, L)
>> >        Return-path:
>> >        From: mailer-dae...@qmailxxxxxx.com
>> >     <mailto:mailer-dae...@qmailxxxxxx.com>
>> >        To: r...@qmailxxxxxxxx.com <mailto:r...@qmailxxxxxxxx.com>
>> >        Subject: failure notice
>> >        Date: 19 Apr 2020 11:30:30 -0000
>> >        Size: 1089 bytes
>> >
>> >     Messages in local queue: 2
>> >     Messages in remote queue: 0
>> >
>> >     Just wonder it looks that you are using the SMTPs 465, did you try
>> >     the 587 Submission that address and see if it goes?
>> >     Just wonder if this is tight to that service.
>> >
>> >     Maybe none of the above but just for troubleshooting steps, I would
>> >     try that.
>> >
>> >     Remo
>> >
>> >
>> >>     On Apr 19, 2020, at 22:11, David Bray <da...@brayworth.com.au
>> >>     <mailto:da...@brayworth.com.au>> wrote:
>> >>
>> >>     Ok - but after all the investigation etc, this is actually the
>> >>     trigger which caught my eye in the first place
>> >>
>> >>     How this comes about is:
>> >>
>> >>      1. User say hey I can't send
>> >>      2. I look and see this high CPU load and intermittent failures
>> >>         for client to send
>> >>
>> >>     Any thoughts on where to start looking ..
>> >>
>> >>
>> >>     <image.png>
>> >>
>> >>     my smtp/smtps are currently *10*/11 connections
>> >>
>> >>
>> >>     ==> /var/log/qmail/smtp/current <==
>> >>     2020-04-20 05:07:50.207299500 tcpserver: end 29699 status 0
>> >>     2020-04-20 05:07:50.207300500 tcpserver: status: 0/60
>> >>
>> >>     ==> /var/log/qmail/smtps/current <==
>> >>     2020-04-20 05:07:54.903665500 tcpserver: status: 9/60
>> >>     2020-04-20 05:07:54.936654500 tcpserver: pid 29725 from
>> 185.50.149.5
>> >>     2020-04-20 05:07:54.936655500 tcpserver: ok 29725
>> >>     dev.brayworth.com <http://dev.brayworth.com>:172.105.181.18:465
>> >>     <http://172.105.181.18:465> :185.50.149.5::5622
>> >>     2020-04-20 05:08:00.108657500 tcpserver: status: 10/60
>> >>     2020-04-20 05:08:00.152909500 tcpserver: pid 29734 from
>> 185.50.149.5
>> >>     2020-04-20 05:08:00.152910500 tcpserver: ok 29734
>> >>     dev.brayworth.com <http://dev.brayworth.com>:172.105.181.18:465
>> >>     <http://172.105.181.18:465> :185.50.149.5::62006
>> >>     2020-04-20 05:08:05.172650500 tcpserver: status: *11*/60
>> >>     2020-04-20 05:08:05.208983500 tcpserver: pid 29740 from
>> 185.50.149.5
>> >>     2020-04-20 05:08:05.208984500 tcpserver: ok 29740
>> >>     dev.brayworth.com <http://dev.brayworth.com>:172.105.181.18:465
>> >>     <http://172.105.181.18:465> :185.50.149.5::19686
>> >>     2020-04-20 05:08:13.601336500 tcpserver: end 29690 status 256
>> >>     2020-04-20 05:08:13.601337500 tcpserver: status: 10/60
>> >>
>> >>     David Bray
>> >>     0418 745334
>> >>     2 ∞ & <
>> >>
>> >>
>> >>     On Sun, 19 Apr 2020 at 10:04, David Bray <da...@brayworth.com.au
>> >>     <mailto:da...@brayworth.com.au>> wrote:
>> >>
>> >>         Thanks Eric
>> >>
>> >>         It's hard to track things but I think I have had success
>> >>         monitoring the /var/log/maillog
>> >>
>> >>         I'm not sure why I didn't pick this up earlier, I'm
>> >>         already using the fail2ban suggestion of the older
>> >>         qmailtoaster wiki
>> >>         (http://wiki.qmailtoaster.com/index.php/Fail2Ban), actually
>> >>         had a rule to process it and have expanded on this now
>> >>
>> >>         I've been running email servers most of my working life and
>> >>         still get tripped up by simple stuff
>> >>
>> >>         Thank for your efforts in this area, it helps to talk things
>> out
>> >>
>> >>         cheers
>> >>
>> >>         David Bray
>> >>         0418 745334
>> >>         2 ∞ & <
>> >>
>> >>
>> >>         On Sun, 19 Apr 2020 at 01:12, Eric Broch
>> >>         <ebr...@whitehorsetc.com <mailto:ebr...@whitehorsetc.com>>
>> wrote:
>> >>
>> >>             It looks like a connect and disconnect. If there was
>> >>             authentication you'd see it. I don't think you have
>> >>             anything to worry about here. I'm not saying there's not
>> >>             some jerk out there messing with your smtps...just saying
>> >>             it may be harmless. That said, do you have a good firewall
>> >>             in place that prevents DOS attacks. I use Sonicwall myself
>> >>             but you can do the same thing as others have shown with
>> >>             iptables.
>> >>
>> >>             Does anyone know how to do the same with the stock
>> >>             firewalld on COS7/8?
>> >>
>> >>             On 4/17/2020 11:49 PM, David Bray wrote:
>> >>>             sure - thanks for replying, this comes in waves taking
>> >>>             the server to it's maximum at times
>> >>>
>> >>>             as far as I can see this only logs are this:
>> >>>
>> >>>             ==> /var/log/qmail/smtps/current <==
>> >>>             2020-04-18 05:04:48.450871500 tcpserver: status: 6/60
>> >>>             2020-04-18 05:04:48.480785500 tcpserver: pid 13339 from
>> >>>             141.98.80.30
>> >>>             2020-04-18 05:04:48.480787500 tcpserver: ok 13339
>> >>>             dev.brayworth.com
>> >>>             <http://dev.brayworth.com>:172.105.181.18:465
>> >>>             <http://172.105.181.18:465> :141.98.80.30::25638
>> >>>             2020-04-18 05:04:52.797644500 tcpserver: status: 7/60
>> >>>             2020-04-18 05:04:52.830767500 tcpserver: pid 13340 from
>> >>>             141.98.80.30
>> >>>             2020-04-18 05:04:52.830768500 tcpserver: ok 13340
>> >>>             dev.brayworth.com
>> >>>             <http://dev.brayworth.com>:172.105.181.18:465
>> >>>             <http://172.105.181.18:465> :141.98.80.30::14862
>> >>>             2020-04-18 05:04:57.248902500 tcpserver: status: 8/60
>> >>>             2020-04-18 05:04:57.304003500 tcpserver: pid 13342 from
>> >>>             141.98.80.30
>> >>>             2020-04-18 05:04:57.304006500 tcpserver: ok 13342
>> >>>             dev.brayworth.com
>> >>>             <http://dev.brayworth.com>:172.105.181.18:465
>> >>>             <http://172.105.181.18:465> :141.98.80.30::9646
>> >>>             2020-04-18 05:05:01.854790500 tcpserver: status: 9/60
>> >>>             2020-04-18 05:05:01.902265500 tcpserver: pid 13345 from
>> >>>             141.98.80.30
>> >>>             2020-04-18 05:05:01.902266500 tcpserver: ok 13345
>> >>>             dev.brayworth.com
>> >>>             <http://dev.brayworth.com>:172.105.181.18:465
>> >>>             <http://172.105.181.18:465> :141.98.80.30::54058
>> >>>             2020-04-18 05:05:09.729711500 tcpserver: end 13338 status
>> 256
>> >>>             2020-04-18 05:05:09.729713500 tcpserver: status: 8/60
>> >>>             2020-04-18 05:06:05.965715500 tcpserver: end 13342 status
>> 256
>> >>>             2020-04-18 05:06:05.965716500 tcpserver: status: 7/60
>> >>>             2020-04-18 05:06:06.141272500 tcpserver: end 13340 status
>> 256
>> >>>             2020-04-18 05:06:06.141273500 tcpserver: status: 6/60
>> >>>
>> >>>             David Bray
>> >>>             0418 745334
>> >>>             2 ∞ & <
>> >>>
>> >>>
>> >>>             On Sat, 18 Apr 2020 at 15:41, Eric Broch
>> >>>             <ebr...@whitehorsetc.com
>> >>>             <mailto:ebr...@whitehorsetc.com>> wrote:
>> >>>
>> >>>                 Can you send the log of one of the "bad" connections?
>> >>>
>> >>>                 On 4/17/2020 10:59 PM, David Bray wrote:
>> >>>
>> >>>>                 I can see I'm getting hammered on my smtps port
>> >>>>
>> >>>>                 How can I mitigate this?
>> >>>>
>> >>>>                 I can see the IP's in /var/log/qmail/smtps/current
>> >>>>
>> >>>>                 *but where do I actually see that the smtp auth
>> >>>>                 actually fails ?*
>> >>>>
>> >>>>                 or do I need to increase the logging somewhere ?
>> >>>>
>> >>>>                 if I tail -f /var/log/dovecot.log
>> >>>>
>> >>>>                 I can see the imap and pop failures
>> >>>>
>> >>>>                 thanks in advance
>> >>>>
>> >>>>                 David Bray
>> >>>>                 0418 745334
>> >>>>                 2 ∞ & <
>> >>>
>> >
>>
>> ---------------------------------------------------------------------
>> To unsubscribe, e-mail: qmailtoaster-list-unsubscr...@qmailtoaster.com
>> For additional commands, e-mail: qmailtoaster-list-h...@qmailtoaster.com
>>
>>

Reply via email to