Am 08.11.2011 08:13, schrieb Geert Mak: > Hi, > > We had a user account hacked (weak password) and our SMTP server was used for > sending spam. We discovered it after our mail server IP began to show up in > RBLs. We improved the passwords, however the question is how best to watch > the server in case a similar thing happens again. > > We created a small regex based log analyzer and received the following result > (see below) - > > The question is: is there somewhere a description what each entry means? > > If not: which number shows the number of e-mails sent by the mail server? Or > should we dig deeper into some of the entries or combine some or both? Our > current idea is that if we watch this number for unusual increase, we will be > able to discover abuse this way before we discover it by the means of RBL. > > Geert > > RESULT: > ------- > > LINES TOTAL: 4328247 > > LINES_LOGIN: 20353 > LINES_LOGOUT: 0 > LINES_AMAVIS: 0 > LINES_CYRUS_CTL_CYRUSDB: 749 > LINES_CYRUS_CYR_EXPIRE: 11397 > LINES_CYRUS_IMAP: 6874 > LINES_CYRUS_LMTPUNIX: 8711 > LINES_CYRUS_MASTER: 2182 > LINES_CYRUS_TLS_PRUNE: 4 > LINES_DOVECOT: 960 > LINES_IMAPPROXYD: 0 > LINES_POSTFIX_ANVIL: 999 > LINES_POSTFIX_BOUNCE: 193 > LINES_POSTFIX_CLEANUP: 1446 > LINES_POSTFIX_ERROR: 974 > LINES_POSTFIX_LMTP: 902 > LINES_POSTFIX_LOCAL: 221 > LINES_POSTFIX_PICKUP: 443 > LINES_POSTFIX_QMGR: 3096601 > LINES_POSTFIX_VERIFY: 0 > LINES_POSTFIX_POSTMAP: 0 > LINES_POSTFIX_TLSMGR: 0 > LINES_POSTFIX_MASTER: 0 > LINES_POSTFIX_SCACHE: 261 > LINES_POSTFIX_SMTP: 20346 > LINES_POSTFIX_SMTPD: 1154379 > LINES_SPAMD: 0 > LINES_POSTFIX: 0 > LINES_POSTFIX_POSTFIX_SCRIPT: 0 > LINES_POSTFIX_TRIVIAL_REWRITE: 252 > > LINES NOT PROCESSED: 0 > > > > Hi, there is lees you can do about pirating accounts check your password mechs and other stuff which is involved at account/password creation/changing, monitor this, monitor and ban brute force attacks to your accounts ( i.e. fail2ban ) perhaps slow down outgoing deliver rates, as workaround use clamav-milter with sanesecurity antispam/pish signatures with hold, so you get aware be deliver out spam, at last what is needed is some "intruder detection" based on monitoring anomalies at outgoing smtp traffic , we are working on some milter which does this, but we are not in production stage yet however looking at log is daily work, so no magical software will help you get out of this in total, anyway good log parsers will help ( i.e pflogsumm etc ) for understanding log stuff, read postfix faqs and search list archives for log entries you dont understand, and/or ask here
-- Best Regards MfG Robert Schetterer Germany/Munich/Bavaria