Re: [Declude.JunkMail] OT - iMail 7.x and Windows 2003

2005-09-08 Thread Don Brown
I don't see that as a big issue.

They can't Auth when 'Account Access Disabled' is checked in the user
gui.

If the user has a POP box, uncheck 'Account Access Disabled' and use
their unique password.

If the user is for forwarding, then make sure that 'Account Access
Disabled' is checked.  They can't Auth, so they can't send.


Thursday, September 8, 2005, 8:15:20 AM, Matt <[EMAIL PROTECTED]> wrote:
M>
M>  One other thing to add to this.  Ipswitch in their brilliance,
M> decided to make a default password of "password" for any newly
M> created account including root.  One must take great care to change
M> these otherwise they can become susceptible to AUTH hacking with a
M> great deal of ease, and you then become essentially an open relay
M> even though you are configured not to be.
M>  
M>  Matt
M>  
M>  
M>  
M>  Dan Horne wrote: 
M>   
M> Orin Wells <> wrote on Thursday, September 08, 2005 1:15 AM: 
M>   
M>   
M> Regarding telnet - apparently there is a problem with windows 2003
M> and iMail.  If my source is correct one can telnet into a Windows
M> 2003 system running iMail (pick a version) on port 25 and get by the
M> authentication.  Again, my source told me that neither Micosoft nor
M> Ipswitch has come up with a way to stop this.  It appears only to be
M> a problem on Windows 2003, not Windows 2000. 
M>   
M>   
M> This is FUD and is patently false.  Telnetting on port 25 is not true
M> "telnet" which runs on port 23.  When you connect on port 25 you are
M> connecting to an SMTP session just like any other SMTP server.  It is
M> not possible to bypass Authentication in this manner.  If your source is
M> trying to do this from your network, and you have your network in the
M> "relay mail for addresses" list, then no authentication is necessary.
M> The proper way to test this would be to make the attempt from an outside
M> network.  If you have your relay settings set to anything other than "No
M> mail relay" or "relay for addresses", then no authentication is
M> necessary from any network and you ARE an open relay.  Your source has
M> his facts wrong.  The OS (windows 2003/2000) has nothing to do with
M> Imail's SMTP service and whether it requires auth.

M> Dan Horne  
M> ---
M> This E-mail came from the Declude.JunkMail mailing list.  To
M> unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
M> type "unsubscribe Declude.JunkMail".  The archives can be found
M> at http://www.mail-archive.com. 
M>  
M>  
M>



Don Brown - Dallas, Texas USA Internet Concepts, Inc.
[EMAIL PROTECTED]   http://www.inetconcepts.net
(972) 788-2364Fax: (972) 788-5049


---
This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  The archives can be found
at http://www.mail-archive.com.


Re: [Declude.JunkMail] OT - iMail 7.x and Windows 2003

2005-09-08 Thread Darrell \([EMAIL PROTECTED])
I have seen some root kits be able to hide from tools like F-Port and such. 
As you have suggested using a packet capture tool usually always helps 
identify which port they are exploiting.  However, with that said the one 
thing that I keep as a golden rule is once a box has been comprimised is 
that its going to be scratched.  You just never know what else the left on 
the machine.


Darrell
---
DLAnalyzer - Comprehensive reporting on Declude Junkmail and Virus. Download 
it today - http://www.invariantsystems.com


- Original Message - 
From: "Russ Lists" <[EMAIL PROTECTED]>

To: 
Sent: Thursday, September 08, 2005 9:24 AM
Subject: Re: [Declude.JunkMail] OT - iMail 7.x and Windows 2003



Orin Wells wrote:

OK, I see it.  The question is how do you KILL the stuff that has gotten 
into the server?  We shut down the IMAP yesterday primarily because we 
really don't have anyone we are aware of who does not use POP3.  But the 
problem persists and seems to avoid every attempt to find it.  I see a 
lot of code on the examples of how they are using the exploit.  I am 
afraid it does not mean a lot to me and my brain is too tired to try to 
make any sense of this and figure out how to catch it.  Surely someone 
has found a solution.


They *have* to connect to a network port.  If you can't find the port that 
shouldn't be open using something like Foundstone's Vision 
(http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/proddesc/vision.htm) 
... watch wrap .. Then the only option you have is to setup a packet 
capture like ethereal (http://www.ethereal.com/) and looking at the raw 
data.
My guess is they have been able to plant something they are now using 
against us.  According to the tech if he disconnects the server from the 
network, the problem stops.  It is only when the cable is hooked up that 
it starts in again.


They've definitely installed a root kit.  Windows root kit's are become 
obscenely popular.  Your only option is to capture the raw data with 
ethereal if it's a good root kit.


I suppose if it is coming in on a specific IP address we could disconnect 
them all and then add them back one at a time until we find the one they 
are coming in on, but that sounds like a LOT of work.  Is there some 
other way to find this?  Right now we have a lot of unhappy clients.


If you block their IP, they will just come in on another IP.  You must 
find the program and get rid of it, or rebuild...


If I can be of any more assistance, let me know.

Thanks,
Russ
---
[This E-mail scanned for viruses by Declude Virus]

---
This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  The archives can be found
at http://www.mail-archive.com.



---
This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  The archives can be found
at http://www.mail-archive.com.


Re: [Declude.JunkMail] OT - iMail 7.x and Windows 2003

2005-09-08 Thread Russ Lists

Orin Wells wrote:

OK, I see it.  The question is how do you KILL the stuff that has 
gotten into the server?  We shut down the IMAP yesterday primarily 
because we really don't have anyone we are aware of who does not use 
POP3.  But the problem persists and seems to avoid every attempt to 
find it.  I see a lot of code on the examples of how they are using 
the exploit.  I am afraid it does not mean a lot to me and my brain is 
too tired to try to make any sense of this and figure out how to catch 
it.  Surely someone has found a solution.


They *have* to connect to a network port.  If you can't find the port 
that shouldn't be open using something like Foundstone's Vision 
(http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/proddesc/vision.htm) 
... watch wrap .. Then the only option you have is to setup a packet 
capture like ethereal (http://www.ethereal.com/) and looking at the raw 
data. 

My guess is they have been able to plant something they are now using 
against us.  According to the tech if he disconnects the server from 
the network, the problem stops.  It is only when the cable is hooked 
up that it starts in again.


They've definitely installed a root kit.  Windows root kit's are become 
obscenely popular.  Your only option is to capture the raw data with 
ethereal if it's a good root kit.


I suppose if it is coming in on a specific IP address we could 
disconnect them all and then add them back one at a time until we find 
the one they are coming in on, but that sounds like a LOT of work.  Is 
there some other way to find this?  Right now we have a lot of unhappy 
clients.


If you block their IP, they will just come in on another IP.  You must 
find the program and get rid of it, or rebuild...


If I can be of any more assistance, let me know.

Thanks,
Russ
---
[This E-mail scanned for viruses by Declude Virus]

---
This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  The archives can be found
at http://www.mail-archive.com.


Re: [Declude.JunkMail] OT - iMail 7.x and Windows 2003

2005-09-08 Thread Matt




One other thing to add to this.  Ipswitch in their brilliance, decided
to make a default password of "password" for any newly created account
including root.  One must take great care to change these otherwise
they can become susceptible to AUTH hacking with a great deal of ease,
and you then become essentially an open relay even though you are
configured not to be.

Matt



Dan Horne wrote:

  Orin Wells <> wrote on Thursday, September 08, 2005 1:15 AM:

 
  
  
Regarding telnet - apparently there is a problem with windows 2003
and iMail.  If my source is correct one can telnet into a Windows
2003 system running iMail (pick a version) on port 25 and get by the
authentication.  Again, my source told me that neither Micosoft nor
Ipswitch has come up with a way to stop this.  It appears only to be
a problem on Windows 2003, not Windows 2000. 

  
  
This is FUD and is patently false.  Telnetting on port 25 is not true
"telnet" which runs on port 23.  When you connect on port 25 you are
connecting to an SMTP session just like any other SMTP server.  It is
not possible to bypass Authentication in this manner.  If your source is
trying to do this from your network, and you have your network in the
"relay mail for addresses" list, then no authentication is necessary.
The proper way to test this would be to make the attempt from an outside
network.  If you have your relay settings set to anything other than "No
mail relay" or "relay for addresses", then no authentication is
necessary from any network and you ARE an open relay.  Your source has
his facts wrong.  The OS (windows 2003/2000) has nothing to do with
Imail's SMTP service and whether it requires auth.

Dan Horne  
---
This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  The archives can be found
at http://www.mail-archive.com.


  





RE: [Declude.JunkMail] OT - iMail 7.x and Windows 2003

2005-09-08 Thread Dan Horne
Orin Wells <> wrote on Thursday, September 08, 2005 1:15 AM:

 
> Regarding telnet - apparently there is a problem with windows 2003
> and iMail.  If my source is correct one can telnet into a Windows
> 2003 system running iMail (pick a version) on port 25 and get by the
> authentication.  Again, my source told me that neither Micosoft nor
> Ipswitch has come up with a way to stop this.  It appears only to be
> a problem on Windows 2003, not Windows 2000. 

This is FUD and is patently false.  Telnetting on port 25 is not true
"telnet" which runs on port 23.  When you connect on port 25 you are
connecting to an SMTP session just like any other SMTP server.  It is
not possible to bypass Authentication in this manner.  If your source is
trying to do this from your network, and you have your network in the
"relay mail for addresses" list, then no authentication is necessary.
The proper way to test this would be to make the attempt from an outside
network.  If you have your relay settings set to anything other than "No
mail relay" or "relay for addresses", then no authentication is
necessary from any network and you ARE an open relay.  Your source has
his facts wrong.  The OS (windows 2003/2000) has nothing to do with
Imail's SMTP service and whether it requires auth.

Dan Horne  
---
This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  The archives can be found
at http://www.mail-archive.com.


RE: [Declude.JunkMail] OT - iMail 7.x and Windows 2003

2005-09-08 Thread Orin Wells
Actually, we have tried both but have not found the culprit(s) 
yet.  Although my partner believes he saw a spike in traffic coming in as a 
Telenet session from an unexpected origin - 
rrcs-74-39-200-122.nys.biz.rr.com which on searching with google appears 
not too uncommon - that is hacks, spam and spyware from users of biz.rr.com.


This has us planning to try to isolate which IP address(es) attacks may be 
coming in on and shut them down.


Regarding telnet - apparently there is a problem with windows 2003 and 
iMail.  If my source is correct one can telnet into a Windows 2003 system 
running iMail (pick a version) on port 25 and get by the 
authentication.  Again, my source told me that neither Micosoft nor 
Ipswitch has come up with a way to stop this.  It appears only to be a 
problem on Windows 2003, not Windows 2000.


At 04:05 PM 9/7/2005, Kevin Bilbee wrote:

Start with TCPView From sysinternals to view open ports on the server find
the ports and programs that should not be running and kill then remove them
from the system.

Also use Process Explorer from sysinternals and look at all the running
processes. If you find one that does not belong then kill and remove it.


Kevin Bilbee



---
This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  The archives can be found
at http://www.mail-archive.com.


RE: [Declude.JunkMail] OT - iMail 7.x and Windows 2003

2005-09-07 Thread Kevin Bilbee
Start with TCPView From sysinternals to view open ports on the server find
the ports and programs that should not be running and kill then remove them
from the system.

Also use Process Explorer from sysinternals and look at all the running
processes. If you find one that does not belong then kill and remove it.


Kevin Bilbee

> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] Behalf Of Orin Wells
> Sent: Wednesday, September 07, 2005 3:32 PM
> To: Declude.JunkMail@declude.com
> Subject: Re: [Declude.JunkMail] OT - iMail 7.x and Windows 2003
>
>
> At 01:43 PM 9/7/2005, Ncl Admin wrote:
> >I think that the exploit is in imail 7.07 and not in your server do a
> >google on
> >imail 7.07 exploit.
>
> OK, I see it.  The question is how do you KILL the stuff that has gotten
> into the server?  We shut down the IMAP yesterday primarily because we
> really don't have anyone we are aware of who does not use POP3.  But the
> problem persists and seems to avoid every attempt to find it.  I
> see a lot
> of code on the examples of how they are using the exploit.  I am
> afraid it
> does not mean a lot to me and my brain is too tired to try to make any
> sense of this and figure out how to catch it.  Surely someone has found a
> solution.
>
> My guess is they have been able to plant something they are now using
> against us.  According to the tech if he disconnects the server from the
> network, the problem stops.  It is only when the cable is hooked
> up that it
> starts in again.
>
> I suppose if it is coming in on a specific IP address we could disconnect
> them all and then add them back one at a time until we find the one they
> are coming in on, but that sounds like a LOT of work.  Is there
> some other
> way to find this?  Right now we have a lot of unhappy clients.
>
>
>
> >So you most likely would need to upgrade to 8.2 series. Tho the exploit
> >isn't in 8.15 I don't believe. BTW they do seem to have some interesting
> >pricing going on if you google imail deals depending on your number of
> >domains and users.
> >
> >
> >At 12:43 PM 9/7/2005 -0700, you wrote:
> > >We are about to build a new server using Windows 2003.  The
> reason is that
> > >we were apparently attacked through the iMail IMAPI exploit.
> The last of
> > >whatever got in seems to be running in a very effective stealth mode
> > >because nothing seems to be able to find it and kill it.  As a
> consequence,
> > >our sever reboots anywhere from every 10 minutes to every 45 minutes.
> > >
> > >So = new server.
> > >
> > >We have been running iMail 7.07 under windows 2000.  We had
> some input that
> > >there may be some problems in this environment.  We are not keen on
> > >upgrading to 8.x since IPSwitch is walking away from iMail the product.
> > >
> > >Can anyone comment on this possible incompatibility?
> > >
> > >
> > >---
> > >This E-mail came from the Declude.JunkMail mailing list.  To
> > >unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
> > >type "unsubscribe Declude.JunkMail".  The archives can be found
> > >at http://www.mail-archive.com.
> > >[This E-mail scanned for viruses by F-Prot]
> > >
> > >
> > >
> >[This E-mail scanned for viruses by F-Prot]
> >
> >---
> >This E-mail came from the Declude.JunkMail mailing list.  To
> >unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
> >type "unsubscribe Declude.JunkMail".  The archives can be found
> >at http://www.mail-archive.com.
>
> ---
> This E-mail came from the Declude.JunkMail mailing list.  To
> unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
> type "unsubscribe Declude.JunkMail".  The archives can be found
> at http://www.mail-archive.com.
> ---
> [This E-mail scanned for viruses by Declude Virus]
>
>

---
[This E-mail scanned for viruses by Declude Virus]

---
This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  The archives can be found
at http://www.mail-archive.com.


Re: [Declude.JunkMail] OT - iMail 7.x and Windows 2003

2005-09-07 Thread Orin Wells

At 01:43 PM 9/7/2005, Ncl Admin wrote:

I think that the exploit is in imail 7.07 and not in your server do a
google on
imail 7.07 exploit.


OK, I see it.  The question is how do you KILL the stuff that has gotten 
into the server?  We shut down the IMAP yesterday primarily because we 
really don't have anyone we are aware of who does not use POP3.  But the 
problem persists and seems to avoid every attempt to find it.  I see a lot 
of code on the examples of how they are using the exploit.  I am afraid it 
does not mean a lot to me and my brain is too tired to try to make any 
sense of this and figure out how to catch it.  Surely someone has found a 
solution.


My guess is they have been able to plant something they are now using 
against us.  According to the tech if he disconnects the server from the 
network, the problem stops.  It is only when the cable is hooked up that it 
starts in again.


I suppose if it is coming in on a specific IP address we could disconnect 
them all and then add them back one at a time until we find the one they 
are coming in on, but that sounds like a LOT of work.  Is there some other 
way to find this?  Right now we have a lot of unhappy clients.





So you most likely would need to upgrade to 8.2 series. Tho the exploit
isn't in 8.15 I don't believe. BTW they do seem to have some interesting
pricing going on if you google imail deals depending on your number of
domains and users.


At 12:43 PM 9/7/2005 -0700, you wrote:
>We are about to build a new server using Windows 2003.  The reason is that
>we were apparently attacked through the iMail IMAPI exploit.  The last of
>whatever got in seems to be running in a very effective stealth mode
>because nothing seems to be able to find it and kill it.  As a consequence,
>our sever reboots anywhere from every 10 minutes to every 45 minutes.
>
>So = new server.
>
>We have been running iMail 7.07 under windows 2000.  We had some input that
>there may be some problems in this environment.  We are not keen on
>upgrading to 8.x since IPSwitch is walking away from iMail the product.
>
>Can anyone comment on this possible incompatibility?
>
>
>---
>This E-mail came from the Declude.JunkMail mailing list.  To
>unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
>type "unsubscribe Declude.JunkMail".  The archives can be found
>at http://www.mail-archive.com.
>[This E-mail scanned for viruses by F-Prot]
>
>
>
[This E-mail scanned for viruses by F-Prot]

---
This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  The archives can be found
at http://www.mail-archive.com.


---
This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  The archives can be found
at http://www.mail-archive.com.


Re: [Declude.JunkMail] OT - iMail 7.x and Windows 2003

2005-09-07 Thread Ncl Admin
I think that the exploit is in imail 7.07 and not in your server do a
google on
imail 7.07 exploit.

So you most likely would need to upgrade to 8.2 series. Tho the exploit
isn't in 8.15 I don't believe. BTW they do seem to have some interesting
pricing going on if you google imail deals depending on your number of
domains and users.


At 12:43 PM 9/7/2005 -0700, you wrote:
>We are about to build a new server using Windows 2003.  The reason is that 
>we were apparently attacked through the iMail IMAPI exploit.  The last of 
>whatever got in seems to be running in a very effective stealth mode 
>because nothing seems to be able to find it and kill it.  As a consequence, 
>our sever reboots anywhere from every 10 minutes to every 45 minutes.
>
>So = new server.
>
>We have been running iMail 7.07 under windows 2000.  We had some input that 
>there may be some problems in this environment.  We are not keen on 
>upgrading to 8.x since IPSwitch is walking away from iMail the product.
>
>Can anyone comment on this possible incompatibility?
>
>
>---
>This E-mail came from the Declude.JunkMail mailing list.  To
>unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
>type "unsubscribe Declude.JunkMail".  The archives can be found
>at http://www.mail-archive.com.
>[This E-mail scanned for viruses by F-Prot]
>
>
>
[This E-mail scanned for viruses by F-Prot]

---
This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  The archives can be found
at http://www.mail-archive.com.


RE: [Declude.JunkMail] OT - iMail 7.x and Windows 2003

2005-09-07 Thread John Tolmachoff \(Lists\)
> We have been running iMail 7.07 under windows 2000.  We had some input
that
> there may be some problems in this environment.  We are not keen on
> upgrading to 8.x since IPSwitch is walking away from iMail the product.

Ipswitch is not walking away from Imail. It is still alive and well, and in
fact continues to be improved and upgraded. The next version is in active
beta as we speak. The only thing that has happened is Ipswitch no longer
sells Imail as a stand alone product. SA are still available for it.

John T
eServices For You


---
This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  The archives can be found
at http://www.mail-archive.com.