> -----Original Message-----
> From: owner-postfix-us...@postfix.org [mailto:owner-postfix-
> us...@postfix.org] On Behalf Of Noel Jones
> Sent: Thursday, February 19, 2009 10:34 AM
> To: Tait Grove; 'postfix users list'
> Subject: Re: Hacking activity
> 
> Tait Grove wrote:
> > I did open a few of the messages. The user has taken over the dovecot
> > account. So all the emails are coming from dove...@local.servername.net
> > through postfix. I thought for sure an account had been compromised.
> Dovecot
> > is a local, unix user, with nologin and the account is locked out as far
> as
> > the OS is concerned. I looked at my webmail, thinking that could be the
> > case, but they are not getting in through there. Somehow they are piping
> > commands into my mail to get it send email out - tons of stuff to/from
> > Brazil.
> 
> You need to examine the logs related to one of the unwanted
> messages.
> 
> 
> >
> >
> > My CONF file:
> >
> > mynetworks = 127.0.0.0/8, {EXTERNAL_IP_RANGE}/8, {INTERNAL_IP_RANGE}/25,
> > $myhostname
> 
> I hope the /8 and /25 got reversed during your munging-fest.
> 
> I don't see any other glaring errors.  Your log will have the
> interesting information.
> 
> Pick a QUEUEID from a suspect message and grep the log for it.
> 
>    -- Noel Jones

Thanks Noel, after looking further into my issue it turned out to be a back
scatter problem from some abnormal activity. I saw a few posts about that
earlier so I will just apply that.


> I hope the /8 and /25 got reversed during your munging-fest.

You have sharp eyes, yes that is reversed.

----

Here is the post that I was going to follow to cure the back scatter
problem.


> On Thu, Feb 19, 2009 at 09:39:42AM -0600, Noel Jones wrote:
>> You can use the ips.backscatterer.org to reject bounces (*NOT* all 
>> mail) from known backscatter sources.  Do this in 
>> smtpd_data_restrictions for compatibility with sender address
verification.
>> # main.cf
>> smtpd_data_restrictions =
>>   check_sender_access hash:/etc/postfix/backscatterer
>>
>> # backscatterer
>> <>  reject_rbl_client ips.backscatterer.org
> 
> 
> 
> Just wondering; why do you apply this in smtpd_data_restrictions and 
> not in smtpd_sender_restrictions?

> Some sender verification tools use the null sender address. 
> Some sites doing such verification are listed as backscatter sources - and
> may be the reason they are listed.
> At any rate, you must allow their probes if you want to communicate with >
> them.  Delaying the rbl check until the DATA stage allows address probes,
> but blocks real mail.


Reply via email to