On Wed, 2011-07-27 at 23:21 +0200, Jeroen Geilman wrote:
> On 2011-07-27 23:10, Julian Opificius wrote:
> > When I connect to my Postfix server using ssh from a remote location,
> > postings show up as something like (suitably modified for security):
> >
> > Jul 27 15:50:35 winston postfix/smtpd[28303]: connect from
> > localhost[127.0.0.1]
> > Jul 27 15:50:36 winston postfix/smtpd[28303]: 57A5A220BA:
> > client=localhost[127.0.0.1]
> > Jul 27 15:50:36 winston postfix/cleanup[28315]: 57A5A220BA:
> > message-id=<1311799778.2531.33.camel@progbox>
> > Jul 27 15:50:36 winston postfix/qmgr[3964]: 57A5A220BA:
> > from=<jo397...@example1.com>, size=517, nrcpt=1 (queue active)
> > Jul 27 15:50:37 winston postfix/smtpd[28303]: disconnect from
> > localhost[127.0.0.1]
> > Jul 27 15:50:37 winston postfix/smtp[28319]: 57A5A220BA:
> > to=<j_opific...@example2.org>,
> > relay=mail.example2.org[aaa.bb.cc.ddd]:25, delay=1.7,
> > delays=0.53/0.04/0.67/0.45, dsn=2.0.0, status=sent (250 2.0.0 Ok: qu
> > eued as D5F07162B43)
> > Jul 27 15:50:37 winston postfix/qmgr[3964]: 57A5A220BA: removed
> >
> > All that is good, works fine.
> >
> > The point to note is the:
> >
> > "connect from localhost[127.0.0.1]" part.
> >
> > Is there any other legitimate situation in which "connect from
> > localhost[127.0.0.1]" is legitimate? I suspect my system is compromised
> > (as opposed to my simply not having appropriate spam protections, etc in
> > place).
> >
> > Here's an example of a "connect from localhost..." that I cannot justify
> > or explain:
> >
> > Jul 27 15:46:54 winston postfix/smtpd[28230]: connect from
> > localhost[127.0.0.1]
> > Jul 27 15:46:54 winston postfix/smtpd[28230]: warning: Illegal address
> > syntax from localhost[127.0.0.1] in MAIL command:
> > <anntaylorloft@mhttps://app.cheetahmail.com/m/mailers/mailinail.anntaylorloft.com>
> > Jul 27 15:46:55 winston postfix/smtpd[28230]: disconnect from
> > localhost[127.0.0.1]
> 
> SENDING SMTP mail to port 25 is not a privileged operation, so it could 
> be any user on the system running any kind of malware.
> 
> That said, it is most often HTTP+PHP and/or FTP accounts that are 
> exploited to upload malicious code and run it locally; check your system 
> and daemon logs carefully!
> 
> For example, exploited apache/PHP apps often leave tracks of executed 
> code in the apache error log (because they just don't care, and that's 
> where stdout goes) - that might give you a hint.
> 
> On the other hand, if somebody compromised the system via SSH you should 
> audit the auth log for breakin attempts.
> 
> I would strongly advise you to disconnect this system from the internet 
> until you can verify that you're not sending out spam - or worse.
> 
> 
> > I confess I'm running Suse 9.1 and Postfix 2.5.5, so I'm looking for a
> > justification to tear the system down and rebuild from scratch (as if I
> > needed it), but a compromised system is much more serious.
> >


Thanks, that's just the guidance I needed. I'm shutting the system down
now until I can get to the bottom of this.

Thanks also to Wietse - per your recommendation I'll look into web logs
too.

Going down for repairs :-(

J.


Reply via email to