I am having trouble figuring out how to do do this.  Hopefully someone
here can help me figure it out.  The problem is email coming from my
web server.  I use "permit_mynetworks" in all of the restrictions
entries but that's a bit too liberal.

In particular I have a web server where many clients are running PHP
scripts such as Wordpress, Moodle, Joomla, etc.  Because of the way
most of these are written there is no way I can run PHP as a CGI so I
have to use the Apache plugin.  This causes every script to send mail
as the web user (nobody) instead of as themselves.

So now I have all sorts of users running PHP scripts that are riddled
with security holes and sometimes a site is compromised and is used to
send spam.  However, when it is reported back I can't tell which user
actually sent it.

My first idea was to simply block nobody but that basically stops them
from running a useful site.  I tried making a rule that all mail has to
come from a legitimate address on the assumption that users aren't
spamming on purpose but they can't change the Sender, only the From.

So, I need some way to examine the headers on email coming from
internal servers, at least the web server, and allow email that has a
From or a To of a valid user on my system.  I can also allow Senders
which are legitimate users since not everyone runs PHP.  The theory for
each is;
 - Sender: No matter what the rest looks like I can follow who sent it
   as long as it is a legitimate user.
 - From: Ditto.  I assume that users aren't purposely using a fellow
   user's login.
 - To: If they are sending email to themselves I don't have to worry
   about spam.

I don't want to force them to authenticate from our own web server
because that would mean storing their system password on the web server
for all to read.

So has anyone else had to deal with this issue?

-- 
D'Arcy J.M. Cain
System Administrator, Vex.Net
http://www.Vex.Net/ IM:da...@vex.net
VoIP: sip:da...@vex.net

Reply via email to