On Thu, June 14, 2012 05:34, Giuseppe Perna wrote:
> Good morning, I noticed that postmaster connects IMAP4 whit webmail
> and I generated spam.
> I can reset the password for postmaster?
>  give me the info?
> thanks
>
> Content-Tr48:09 nameserver imapd[16380]: imap service init from
> 127.0.0.1
> Jun 14 07:48:09 nameserver imapd[16380]: Login user=postmaster
> host=localhost [127.0.0.1]
> puoi reset48:09 nameserver imapd[16380]: Logout user=postmaster
> host=localhost [127.0.0.1]

These entries tell you that the postmaster user id logged into their
IMAP account from the localhost and then logged out.  If you are using
Cyrus-imapd then possibly you use the rimap option to saslauth to
authenticate smtp relays?  Or perhaps you just permit relaying from
the local host from your webmail setup without further authentication.

>From the log entries it appears that the webmail host is the same host
as your smtp server and imap server.  I infer that your imap and smtp
authentication mechanisms are also on the same host and that these are
probably /etc/passwd.

If the subsequent log entries are spam email sent by postmaster and
postmaster was used to authenticate for smtp relaying via your server,
either via imap or simply by gaining access to the webmail
application, then the postmaster userid credentials have been
compromised.

If you use /etc/passwd for imap authentication then change the
password for postmaster.  That will require that you either have root
access or possess the current (compromised) postmaster credentials
yourself.  If you use ldap or some other centralized authentication
for imap/smtp then the credentials need to be changed there.

In any case, postmaster is a system account.  The likelihood is that
it had a weak password and that a dictionary attack via your webmail
interface was the source of the compromise.  However, if this user id
has had its credentials compromised on one of my systems then I would
suspect the presence of a rootkit. As a matter of prudence you need to
check very carefully for this. If a rootkit is discovered or
reasonably suspected then never again can your system be considered
secure and it will need to be rebuilt.

> 48:10 nameserver postfix/smtp[16403]: 23094B81BD7:
> to=<Ayaz@ayaz.lezgin>, relay=none, delay=2, status=bounced (Host or
> domain n$
> Jun 14 07:48:10 nameserver postfix/smtp[16402]: 23094B81BD7:
> to=<brian.stew...@avovent.com>, relay=none, delay=2, status=bounced
> (Host or$
> Jun 14 07:48:10 nameserver postfix/smtp[16472]: 23094B81BD7:
> to=<CialisAndV45@gmail.comomar2010ahmed>, relay=none, delay=2,
> status=bounce$
> Jun 14 07:48:10 nameserver postfix/smtp[16451]: warning:
> valid_hostname: empty hostname
> Jun 14 07:48:10 nameserver postfix/smtp[16451]: warning: malformed
> domain name in resource data of MX record for DontEmail.com:
> Jun 14 07:48:10 nameserver postfix/smtp[16451]: 23094B81BD7:
> to=<callorsmsmedirec...@dontemail.com>, relay=none, delay=2,
> status=deferred$
> New mail f48:10 nameserver postfix/smtp[16438]: warning:
> valid_hostname: empty hostname
> ----14 07:48:10 nameserver postfix/smtp[16438]: warning: malformed
> domain name in resource data of MX record for consensus.com:
>
> Thanks
>




-- 
***          E-Mail is NOT a SECURE channel          ***
James B. Byrne                mailto:byrn...@harte-lyne.ca
Harte & Lyne Limited          http://www.harte-lyne.ca
9 Brockley Drive              vox: +1 905 561 1241
Hamilton, Ontario             fax: +1 905 561 0757
Canada  L8E 3C3

Reply via email to