There is no pickup process so I believe that the server is OK. Thank you for your warning and I'm sorry for not pasting logs.
2009/9/7 /dev/rob0 <r...@gmx.co.uk>: > On Monday 07 September 2009 07:25:52 Martina Tomisova wrote: >> I'm analyzing logs to find the spam source and I've understood >> that if someone sends the message, one of the first lines written >> to the log file is a line containing the queue id and >> 'client=IP_ADDRESS'. > > This is only true if the mail came in through smtpd(8). > >> But not every time. Actually this line is missing just in cases >> the spam is sent. :) How's that possible? Any ideas how can I get >> the IP address of the sender in such case? > > It's possible, and common in the case of server compromises, for > malware running on your own machine to be spewing spam using > sendmail(1) submission. In that case, the first log you would see is > like this: > Sep 6 11:17:42 chestnut postfix/pickup[10567]: 974581C02EF9: > uid=1000 from=<r...@gmx.co.uk> > > In many of these that I have seen, the machine itself is not under > control of the attacker; it is merely an exploited PHP Web script > being used for spam. If you were rooted, your logs would typically > have no evidence of the abuse which is taking place. > > Do note, all this is mere speculation in your case, since you > failed to follow the list guidelines (in the welcome message and > DEBUG_README) by not posting the logging in question. > > If, however, my guess was right, I highly recommend that you stop > Postfix and your httpd+PHP immediately, before any more damage is > done. You might already be blacklisted. > -- > Offlist mail to this address is discarded unless > "/dev/rob0" or "not-spam" is in Subject: header >