On 12/17/2015 4:16 PM, Ben Greenfield wrote:
> I reset rgarrity’s password and things have been quiet. 
> 
> In my effort to understand what was happening let me describe what I think 
> happened.
> 
> Someone got ahold of rgarrity’s password.

Yes.  (or rgarrity went rogue)

> With that password they were able to craft emails with forged headers that 
> appeared to spawn new messages to different recipients when being processed.

With password in hand, spammer was able to send out payload using
different MAIL FROM sender names since you don't restrict this.  No
magic spawning going on, just "normal" email traffic from an
unauthorized/malicious source.

Preventive actions to consider:

- consider using a rate limiter such as postfwd to slow down and
notify the admin if a user sends an unusual amount of mail.  This is
a pretty standard thing to do these days, and doesn't usually cause
disruption as long as you set the limits way higher (eg. 10x) than
any normal traffic.  This probably would have slowed this attack and
alerted you sooner.

- consider using
http://www.postfix.org/postconf.5.html#reject_sender_login_mismatch
to reject messages where the MAIL FROM address doesn't match the
SASL username.  This won't prevent the user/spammer from using a
different From: display header name, but does make debugging easier.
 This would have stopped this attack, or (more likely?) made the
attacker change tactics.

- consider using a dnsbl that rejects known spamming IPs before
permit_sasl_authenticated, such as sbl.spamhaus.org or
cbl.abuseat.org.  Careful with this one; it's impolite to reject
real users' email and it's very possible a real user will get
infected and listed, generating a support call to you.  In
particular, do not use a dnsbl that lists all home/dynamic/dialup IP
addresses.  The IP you reported is listed in both cbl and sbl and
would be rejected (listed now, maybe it wasn't then).



  -- Noel Jones

Reply via email to