Hi Jasper

I have found one of the remaining problems - and it isn't postfix related. See below.


On 13/09/2010 11:39 PM, Richard Chapman wrote:


On 13/09/2010 9:35 PM, Jasper Jongmans wrote:
On 2010-09-13 13:03, Richard Chapman wrote:
Hi again Jasper... I think we are in the home straight, but I still
It looks like a virus somewhere - but I'm not sure where. All the
windows boxes here look well protected - but it almost looks like a
virus on the centos box.. Seems very weird. Or have I seriously broke
something?

Sep 13 17:56:22 C5 postfix/postfix-script: starting the Postfix mail system
>  Sep 13 17:56:22 C5 postfix/master[12586]: daemon started -- version 2.3.3, 
configuration /etc/postfix
>  Sep 13 18:00:07 C5 postfix/smtpd[12802]: connect from localhost[127.0.0.1]
>  Sep 13 18:00:07 C5 postfix/smtpd[12802]: warning: Illegal address syntax from 
localhost[127.0.0.1] in MAIL command:<vice...@123.24.198.232>
>  Sep 13 18:00:07 C5 postfix/smtpd[12802]: warning: Illegal address syntax from 
localhost[127.0.0.1] in MAIL command:<cy...@116.118.47.120>
>  Sep 13 18:00:07 C5 postfix/smtpd[12802]: warning: Illegal address syntax from 
localhost[127.0.0.1] in MAIL command:<ja...@59.99.152.46>
>  Sep 13 18:00:08 C5 postfix/smtpd[12802]: 12E981D22332: 
client=localhost[127.0.0.1]
>  Sep 13 18:00:08 C5 postfix/cleanup[12806]: 12E981D22332: 
message-id=<4c8e029b.c076b...@avaya.com>
>  Sep 13 18:00:08 C5 postfix/qmgr[12588]: 12E981D22332: 
from=<angeline_jeric...@avaya.com>, size=2464, nrcpt=1 (queue active)
>  Sep 13 18:00:08 C5 spamd[2532]: spamd: connection from localhost [127.0.0.1] 
at port 43970
>  Sep 13 18:00:08 C5 spamd[2532]: spamd: setuid to richard succeeded
>  Sep 13 18:00:08 C5 spamd[2532]: spamd: processing 
message<4c8e029b.c076b...@avaya.com>  for richard:500
>  Sep 13 18:00:08 C5 postfix/smtpd[12802]: disconnect from localhost[127.0.0.1]
>  Sep 13 18:00:12 C5 spamd[2532]: spamd: identified spam (17.8/5.0) for 
richard:500 in 4.8 seconds, 2592 bytes.
>  Sep 13 18:00:12 C5 spamd[2532]: spamd: result: Y 17 - 
BAYES_99,HTML_MESSAGE,RCVD_IN_BL_SPAMCOP_NET,RCVD_IN_PBL,RCVD_IN_XBL,RDNS_NONE,URIBL_AB_SURBL,URIBL_JP_SURBL,URIBL_OB_SURBL,URIBL_SBL,URIBL_SC_SURBL,URIBL_WS_SURBL
 
scantime=4.8,size=2592,user=richard,uid=500,required_score=5.0,rhost=localhost,raddr=127.0.0.1,rport=43970,mid=<4c8e029b.c076b...@avaya.com>,bayes=1.000000,autolearn=spam
>  Sep 13 18:00:13 C5 postfix/local[12807]: 12E981D22332: 
to=<rich...@localhost.aardvark.com.au>, orig_to=<rich...@localhost>, relay=local, 
delay=4.9, delays=0.06/0.01/0/4.9, dsn=2.0.0, status=sent (delivered to command: procmail)
>  Sep 13 18:00:13 C5 postfix/qmgr[12588]: 12E981D22332: removed
>
I have noticed a few of those malformed addresses in my own logs, but
not from localhost. Do you run a content_filter or something similar
that would reinject mails to localhost? This definitely looks
suspicious; judging by the fact you run Postfix 2.3.3, there may be old
(and vulnerable) software on that machine. You should look into this.
I am running both spammassassin and clamd through procmail. I'm not sure whether these could cause entries like this in the logs. Do you think they could? The malformed addresses consistently seem to mention "Vincent", "Cyrus" and "Jemal" which looks highly suspicious to me. It is a little hard to imagine a genuine infection of a Centos box since I almost never install applications other than trough the update channel. I guess an exploit of some serious vulnerability is possible but seems unlikely. Postfix 2.3.3 is still the current release for RHEL 5.5 - which is the curent centos release.

2) You may recall that rchapman is an alias to richard on the local
server. If I send email from a local client with rchap...@aardvark...
as the from address - it arrives back with "rich...@aardvark... as the
from address. I'm pretty sure this is new behaviour (rewriting the
user-name) - and not ideal from my purposes. For reference - here is
postconf -n:
Are you talking about envelope-from, header-from or both?
What do you mean with "arrives back"? A bounce?
Send a test mail to some remote account not handled by your mailserver,
and check the raw message on that end to see how it arrives. Also check
your own logs to see if any rewriting happens when sending the message.

I'm really not sure whether I am talking about envelope from or header from. I mean the from address as seen in the email clients. Probably "header from"? By arrives back - I was not talking about a bounce but rather an intended forward. As you suggested - I have since sent an email from my client machine to a totally independent machine. The sending client used the "from address" "rchap...@..." and the receiving client (an independent gmail in this case) received the from address "rich...@..." I think this is the relevant bit of the logs - and it is hard to see any obvious rewrite. Hmmm... Not sure what this all means.

This issue is (almost certainly) caused be my relay through smtp.google.com - which is replacing the from address with my primary google apps email address.

Sep 13 23:18:48 C5 postfix/smtpd[15614]: connect from unknown[192.168.0.166]
Sep 13 23:18:48 C5 postfix/smtpd[15614]: 2CA8A1D2145A: 
client=unknown[192.168.0.166], sasl_method=PLAIN, sasl_username=richard
Sep 13 23:18:48 C5 postfix/cleanup[15617]: 2CA8A1D2145A: 
message-id=<4c8e40d7.6050...@aardvark.com.au>
Sep 13 23:18:48 C5 postfix/qmgr[12588]: 2CA8A1D2145A: 
from=<rchap...@aardvark.com.au>, size=665, nrcpt=1 (queue active)
Sep 13 23:18:48 C5 postfix/smtpd[15614]: disconnect from unknown[192.168.0.166]
Sep 13 23:18:51 C5 postfix/smtp[15618]: certificate verification failed for 
smtp.gmail.com: num=20:unable to get local issuer certificate
Sep 13 23:18:51 C5 postfix/smtp[15618]: certificate verification failed for 
smtp.gmail.com: num=27:certificate not trusted
Sep 13 23:18:58 C5 postfix/smtp[15618]: 2CA8A1D2145A: 
to=<chapman.rich...@gmail.com>, relay=smtp.gmail.com[74.125.155.109]:587, 
delay=10, delays=0.06/0.02/5.5/4.5, dsn=2.0.0, status=sent (250 2.0.0 OK 1284391138 
x9sm12249437waj.15)
Sep 13 23:18:58 C5 postfix/qmgr[12588]: 2CA8A1D2145A: removed

BTW: Do you know how to fix the "Certificate verification failed" warnings above - though they don't seem to have any averse affect on mail delivery? I assume I need to establish some root certificate trust somehow.

Richard.



--
Richard Chapman

Reply via email to