> I would suggest that you fix the exploited script. Look for time
> stamps that appear in both web server logging and Postfix logging.

Thanks, Wietse.  That would obviously be the best approach, if it
worked, but I tried it and (so far at least) haven't been able to find
any matching entries.

I did find some generally suspicious things in my web server logs --
including lots of clients looking for the following item:

        /nette.micro?callback=shell_exec&cmd=ifconfig

but there isn't any /nette.micro anywhere on my server, and all these
GET requests failed with 404 or 302 SMTP response codes.  I don't
currently think these have anything to do with the recent attacks on my
server, and I'm mentioning them just in case anyone on this list might
recognize this kind of thing.

As I said earlier, I did clean out a bunch of old, obsolete, possibly
buggy content from my web server's directories, and I rebooted the box
just for good measure.  I haven't seen any more occurrences of the
problem so far, but I am keeping a close eye on the server, and if I do
see another flood of apparent open-relay messages, I hope I can capture
more (and more useful) information about the problem this time.

In the meantime, I would still like to know if there is any way to make
Postfix check for and reject messages which are coming from localhost
but which are falsely claiming (in the HELO / EHLO) to be originating
from some outside host.  I realize this wouldn't solve every problem,
but it seems to me like a very useful thing for Postfix to be able to
do.  If this option is intentionally not and most likely never will be
part of Postfix, I would be grateful for an explanation of why it is not
actually helpful, even if it might appear to be at first glance.

Rich Wales
ri...@richw.org

Reply via email to