[qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Eric Shubert
There are bit flags associated with each user account which can be set with the /home/vpopmail/bin/vmoduser command. There is no other (gui) way I know of to set these flags. # ./vmoduser vmoduser: usage: [options] email_addr or domain (for each user in domain) options: -v ( display the

RE: [qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Wicus Roets
Thanks Eric. Steps I took upon noticing: 1.) qmailctl stop 2.)qmHandle -SYOUR BLAH BLAH... 3.) Reviewed bounce messages and deleted them with qmHandle upon review qmail-qstat qmail-qread qmHandle -mxxx quick check on mail message as listed with qmail-qread

[qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Eric Shubert
On 02/16/2014 09:27 AM, Wicus Roets wrote: Thanks Eric. Steps I took upon noticing: 1.) qmailctl stop 2.)qmHandle -SYOUR BLAH BLAH... 3.) Reviewed bounce messages and deleted them with qmHandle upon review qmail-qstat qmail-qread qmHandle -mxxx quick check on mail

RE: [qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Wicus Roets
I do understand that qmail is not the reason the IP is being blacklisted. In favour of myself and some else referring to this mail list in future, would you mind elaborating on qmail-remote throttling? (until the offending/spamming user feature gets implemented) -Original Message- From:

RE: [qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Wicus Roets
As mine is set to 60 for concurrencyremote and 100 for concurrencyincoming. What would you advise ? -Original Message- From: Wicus Roets [mailto:wi...@r4c.co.za] Sent: 16 February 2014 07:21 PM To: qmailtoaster-list@qmailtoaster.com Subject: RE: [qmailtoaster] Re: Spamming via valid

Re: [qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Eric Broch
If someone has hacked a vpopmail account password and is using it to spam, you can check the send, smtp, or submission logs and it will expose the account. I did have this problem in the past. It may very well be a PC in your network with malware on it. Eric B. On 2/16/2014 10:20 AM, Wicus

[qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Eric Shubert
On 02/16/2014 10:20 AM, Wicus Roets wrote: In favour of myself and some else referring to this mail list in future, would you mind elaborating on qmail-remote throttling? (until the offending/spamming user feature gets implemented) Presently, qmail-remote has no throttle other than the

RE: [qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Wicus Roets
That explains is quite nicely. One more question though ;) Quoting from http://gmane.org/post.php; - People who do not have valid email addresses in their From or Reply-To headers can't use Gmane to post to mailing lists. From my earlier mail, qmail accepts mail based only on the rcpt to: of

Re: [qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Dan McAllister
Wicus' issues are not uncommon: An attacker gains a password (through guesswork or other means) of a user on your system, then proceeds to spam the hell out of the world from your system. Alternatively, some user gets a malware infection on their system that uses their mail program (usually

RE: [qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Wicus Roets
Dan, By default (and I'm not currently aware of any other situation warranting it differently) users' mail clients are configured to POP3 on port 110 IMAP on port 143 SMTP on port 587 Since the incidents, I've configured SSL for POP3 (993), IMAP(995) and SMTP(465). However, my understanding

Re: [qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread LHTek
Could you please share your script for detecting failed massages with us? It sounds like a good stop-gap treatment for this insidious issue. From: Dan McAllister q...@it4soho.com To: qmailtoaster-list@qmailtoaster.com Sent: Sunday, February 16, 2014 12:33

Re: [qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Finn Buhelt
Hi. Wouldn't it be possible to block port 25 outgoing and let fail2ban check submission logs ? Regards, Finn Den 16-02-2014 19:33, Dan McAllister skrev: Wicus' issues are not uncommon: An attacker gains a password (through guesswork or other means) of a user on your system, then

[qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Eric Shubert
On 02/16/2014 11:32 AM, Wicus Roets wrote: That explains is quite nicely. One more question though ;) Quoting from http://gmane.org/post.php; - People who do not have valid email addresses in their From or Reply-To headers can't use Gmane to post to mailing lists. That's (primarily) because

[qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Eric Shubert
On 02/16/2014 12:01 PM, Wicus Roets wrote: Dan, By default (and I'm not currently aware of any other situation warranting it differently) users' mail clients are configured to POP3 on port 110 IMAP on port 143 SMTP on port 587 Since the incidents, I've configured SSL for POP3 (993), IMAP(995)

[qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Eric Shubert
I don't see how fail2ban would be of any help with this. Can you elaborate? -- -Eric 'shubes' On 02/16/2014 12:11 PM, Finn Buhelt wrote: Hi. Wouldn't it be possible to block port 25 outgoing and let fail2ban check submission logs ? Regards, Finn Den 16-02-2014 19:33, Dan McAllister skrev:

RE: [qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Wicus Roets
Eric, This is where I'm confused. If qmail accepts mail for relay based on authentication of a valid account/pw pair, how could I have send mail via telnet on port 25 by only supplying a valid account (without a password)? -Original Message- From: Eric Shubert [mailto:e...@shubes.net]

[qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Eric Shubert
On 02/16/2014 11:33 AM, Dan McAllister wrote: Wicus' issues are not uncommon: An attacker gains a password (through guesswork or other means) of a user on your system, then proceeds to spam the hell out of the world from your system. Alternatively, some user gets a malware infection on their

Re: [qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Finn Buhelt
Hi Eric. You can have Fail2ban check Your logs for bad entries that happens within a given period of time and then ban the IP address (Ip tables). Let Fail2ban check on the LAN ip address that is submitting the email in the submit log and then take action when Your tresholds are triggered -

Re: [qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Dan McAllister
Wicus - On port 25 CURRENTLY: - If the connection is for a LOCAL address (that is: the RECIPIENT address is one that is local to the server), the message is accepted -- regardless of whether you are authenticated or not - If the connection is for a REMOTE address (that is: the RECIPIENT

Re: [qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Dan McAllister
I have every intention of sharing both the message tracking system AND the failure detection scripts once I've completed (to a certain degree) debugging them. Dan IT4SOHO On 2/16/2014 2:04 PM, LHTek wrote: Could you please share your script for detecting failed massages with us? It sounds

RE: [qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Wicus Roets
Open Relay was one of the first things I double checked. So, for inbound mail, qmail only checks whether the user is available on the system (chkuser) before accepting the mail. (UNAUTHENTICATED) However, for outbound mail (being a domain not hosted on the machine), authentication of the user is

[qmailtoaster] root / daemon system generated mail forwarding

2014-02-16 Thread Wicus Roets
To forward system generated mail to a qmail account, is it a requirement to first create a similar vpop account prior to forwarding ? ***Note - Mail DNS is hosted on the machine. Under /var/qmail/alias I created the following files: .qmail-anonymous .qmail-mailer-daemon

Re: [qmailtoaster] root / daemon system generated mail forwarding

2014-02-16 Thread Eric Broch
Use '/home/vpopmail/bin/valias' On 2/16/2014 4:48 PM, Wicus Roets wrote: To forward system generated mail to a qmail account, is it a requirement to first create a similar vpop account prior to forwarding ? ***Note - Mail DNS is hosted on the machine. Under /var/qmail/alias I

[qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Eric Shubert
Yes, but in this case there are no bad entries. The spammer has the password. I suppose F2B might check for a number of submissions in a given time period, but blocking and unblocking could get to be cumbersome. I suppose a throttle could be put on qmail-smtp to limit submissions. The

[qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Eric Shubert
On 02/16/2014 04:17 PM, Wicus Roets wrote: Therefore, my confusion relates to using Telnet, whereby no authentication is implemented prior to sending the test message? Like Dan said, messages are only accepted (on port 25) with no authentication when the message is for local (rcpthost)

[qmailtoaster] Re: root / daemon system generated mail forwarding

2014-02-16 Thread Eric Shubert
Or qmailadmin. On 02/16/2014 06:42 PM, Eric Broch wrote: Use '/home/vpopmail/bin/valias' On 2/16/2014 4:48 PM, Wicus Roets wrote: To forward system generated mail to a qmail account, is it a requirement to first create a similar vpop account prior to forwarding ? ***Note - Mail DNS is

[qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Eric Shubert
On 02/16/2014 02:59 PM, Dan McAllister wrote: Again, the CORRECT use of port 25 is SOLELY for the receipt of inbound messages for the local server. Users (who authenticate) should be using ports 587 or 465 -- which, after they authenticate, will allow them to relay to other servers. I agree

RE: [qmailtoaster] Re: root / daemon system generated mail forwarding

2014-02-16 Thread Wicus Roets
It would therefore be as simple as # /home/vpopmail/bin/valias -I r...@server.com j...@server.com #/home/vpopmail/bin/valias -I postmas...@server.com j...@server.com #/home/vpopmail/bin/valias -I mailer-dae...@server.com j...@server.com #/home/vpopmail/bin/valias -I anonym...@server.com

RE: [qmailtoaster] Re: root / daemon system generated mail forwarding

2014-02-16 Thread Wicus Roets
However, the mail queue still has messages from mailer-dae...@ns.server.com to postmas...@ns.server.com which simply tends to bounce. ** note that I am aliasing mailer-dae...@server.com and postmas...@server.com to j...@server.com whereas the messages in the queue is user@fqdn rather than

RE: [qmailtoaster] Re: root / daemon system generated mail forwarding

2014-02-16 Thread Wicus Roets
Even adding an alias for mailer-dae...@ns.server.com and r...@ns.server.com to j...@server.com has no effect - To unsubscribe, e-mail: qmailtoaster-list-unsubscr...@qmailtoaster.com For additional commands, e-mail:

[qmailtoaster] Re: root / daemon system generated mail forwarding

2014-02-16 Thread Eric Shubert
On 02/16/2014 11:31 PM, Wicus Roets wrote: Even adding an alias for mailer-dae...@ns.server.com and r...@ns.server.com to j...@server.com has no effect - I haven't looked at this in detail, but I've come across what I think

RE: [qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Wicus Roets
Quick update on this scenario. The user's email account that got compromised has been in the hospital for the last two weeks for a back operation. His account is only configured on his desktop machine of which the machine has not been switched on. A thorough malware/virus scan on all machines

[qmailtoaster] Re: Spamming via valid vpopmail account

2014-02-16 Thread Eric Shubert
Thanks, Wicus. Sorry to hear about this person's back. I'll pray for recovery. In the meantime, has the person used webmail at all? Just wondering. Thanks again. -- -Eric 'shubes' On 02/17/2014 12:12 AM, Wicus Roets wrote: Quick update on this scenario. The user's email account that got