Re: spam from chrooted CMSes

2009-04-13 Thread Dan Harnett
On Fri, Apr 10, 2009 at 09:42:21AM +0800, Uwe Dippel wrote: I'm running postfix as MTA on a machine with several CMS, on a chrooted Apache. Recently, there is a huge number of spam being sent from there, alas. When I scan the postfix-logs, all those come from 'root', meaning they don't

Re: spam from chrooted CMSes

2009-04-12 Thread Vadim Zhukov
On 10 April 2009 c. 05:42:21 Uwe Dippel wrote: I'm running postfix as MTA on a machine with several CMS, on a chrooted Apache. Recently, there is a huge number of spam being sent from there, alas. When I scan the postfix-logs, all those come from 'root', meaning they don't come through port

Re: spam from chrooted CMSes

2009-04-12 Thread Uwe Dippel
Matthew Weigel unique at idempot.net writes: Huh? I'm talking about the CMS itself authenticating to the SMTP server, and giving each application a single set of credentials. chroot is the name, and isolation is the game. This should be set in the CMS's config files, much like database

Re: spam from chrooted CMSes

2009-04-12 Thread Uwe Dippel
Vadim Zhukov wrote: Do your clients have ability to connect to external hosts? If yes then you should not even bother logging PHP mail() calls or such. If outgoing connections are closed then you should have different system users (i.e., different UIDs) for each client; otherwise it'll be

Re: spam from chrooted CMSes

2009-04-12 Thread Stuart Henderson
On 2009-04-12, Uwe Dippel udip...@uniten.edu.my wrote: chroot is the name, and isolation is the game. it's not all that unusual for PHP hosts to disable mail(); most of the main CMS have some way to send mail without it, and these usually do allow smtp-auth. so you could install pear-Mail and

Re: spam from chrooted CMSes

2009-04-11 Thread Uwe Dippel
When dealing with web based submission, the best thing I have found is to make sure the web based submission adds its own headers like what it is and where the user came from and such so when diagnosing the problem one can easily block based on that information. If there is an account involved,

Re: spam from chrooted CMSes

2009-04-11 Thread Matthew Weigel
Uwe Dippel wrote: I'm sorry, but I lack the experience to understand what you mean. I have 200+ users, several of them having set up (sorry, yes, written!), who can install any CMS of their liking, using ftp; or any other script that sends mail. Some of them are official websites, so I can

Re: spam from chrooted CMSes

2009-04-11 Thread Chris Bennett
Uwe Dippel wrote: When dealing with web based submission, the best thing I have found is to make sure the web based submission adds its own headers like what it is and where the user came from and such so when diagnosing the problem one can easily block based on that information. If there is an

Re: spam from chrooted CMSes

2009-04-11 Thread Uwe Dippel
Matthew Weigel unique at idempot.net writes: Then you have grown your userbase too fast with a terrible setup, and now you're caught in the middle of fixing the problem or avoiding downtime. Are you sure this is not a misunderstanding? When you host user accounts, on a tight, default, setup of

Re: spam from chrooted CMSes

2009-04-11 Thread Uwe Dippel
Chris Bennett wrote: This could be helpful, possibly. First, you can maintain a functional mini_sendmail by putting a nother script at /bin/mini_sendmail, this script could do some sort of logging and then pass things on to the real mini_sendmail, located somewhere else, different (hidden)

Re: spam from chrooted CMSes

2009-04-11 Thread Matthew Weigel
Uwe Dippel wrote: Matthew Weigel unique at idempot.net writes: Then you have grown your userbase too fast with a terrible setup, and now you're caught in the middle of fixing the problem or avoiding downtime. Are you sure this is not a misunderstanding? When you host user accounts, on a

Re: spam from chrooted CMSes

2009-04-10 Thread Toni Mueller
Hi, On Fri, 10.04.2009 at 09:42:21 +0800, Uwe Dippel udip...@uniten.edu.my wrote: I'm running postfix as MTA on a machine with several CMS, on a chrooted Apache. Recently, there is a huge number of spam being sent from there, alas. When I scan the postfix-logs, all those come from 'root',

spam from chrooted CMSes

2009-04-09 Thread Uwe Dippel
I'm running postfix as MTA on a machine with several CMS, on a chrooted Apache. Recently, there is a huge number of spam being sent from there, alas. When I scan the postfix-logs, all those come from 'root', meaning they don't come through port 25. I run OpenBSD with mini-sendmail, and now I

Re: spam from chrooted CMSes

2009-04-09 Thread Todd T. Fries
When dealing with web based submission, the best thing I have found is to make sure the web based submission adds its own headers like what it is and where the user came from and such so when diagnosing the problem one can easily block based on that information. If there is an account involved,