Timo,

Yes postfix is configured for SASL so the spammer ip was able to relay email
after it obtained the account info. 
My concern is how the spammer got the user/pass in the 1st place since
nowhere on the dovecot logs do I see that particular user attempting to
login with the wrong/correct password etc. I should be able to see all login
attempts correct if the user/pass was obtained through a dict. attack? Is
that's the case then most likely the user/password was obtained from the
user's PC and not guessed on the mail server. I am trying to make sense of
what happened and to make sure im not overlooking something on dovecot. 

-----Original Message-----
From: Timo Sirainen [mailto:t...@iki.fi] 
Sent: Wednesday, November 10, 2010 8:22 PM
To: PA
Cc: dovecot@dovecot.org
Subject: Re: [Dovecot] dovecot dictionary attacks


On 10.11.2010, at 23.03, PA wrote:

> However on my smtp mail server that ip is already sending out all sorts of
> spam with the sasl username of Paramus. This username Paramus never shows
up
> on the dovevot dictionary attack, as a matter of fact the user Paramus is
> nowhere to be found on the dovecot log at all and I have logs going back
> months. 
> 
> I'm just not sure how they guess the username/password as its not on any
> logs that goes back months and I don't have a dovecot record for that
user. 

Well, probably obvious, but since you didn't explicitly say: You have
configured Postfix to use Dovecot for authentication, not Cyrus SASL,
right?..

Reply via email to