On Fri, Oct 23, 2020 at 12:57:06PM -0700, Rich Wales wrote:

> > But note also "dovecot" showing up here.  It looks like the spammer is
> > using some feature of Dovecot to originate a connection to the Postfix
> > SMTP server.
> 
> Actually, it's most likely a log entry from a periodic probe of my
> server's functions (including its IMAP service) by Nagios.

Yes, I noted that Dovecot could have been a red-herring.

> I captured another incident last night, and there was no mention of
> Dovecot in the log.  I'm not attaching the log for this second incident
> right now (I had "smtpd -v" in effect and the log data is really long),
> but I can share it if people really want to see it.

I don't recall whether you have as yet posted the requested (sans any
reformatting of line breaks) outputs of:

    $ postconf -Mf
    $ postconf -nf

More Postfix log data is not going to help.  Somehow the attacker is
managing to create an apparent connection from 127.0.0.1.  This is
either a bad rule in your iptables, some interesting abuse of your
TCP stack, or an as yet unreported proxy process on your system.

> I've made another change to my Postfix configuration -- I changed the
> value of postscreen_blacklist_action to "drop".

That won't change anything.  What would be helpful is a full packet
capture, which may mean recording everything coming in/out of your
machine for some hours, if you have the space to store full network
recordings.

> I'm still waiting to
> see if I have any more instances of open relay attempts from localhost
> after having made this change.  If the earlier open relay attempts are
> in fact somehow (still unsure how?) being generated as a consequence of
> the blacklisted connection, then maybe having postscreen drop right away
> will nip the open relay attempts in the bud.

The logic of this escapes me.  Dropping the Postscreen connection
slightly more quickly is unlikely to change anything.  Also instead
of rejecting email from 127.0.0.1, it would be more useful to accept
and quarantine it (put it on HOLD).

   smtpd_client_restrictions =
    check_client_access inline:{ { 127.0.0.1 = HOLD } }

    smtpd_relay_restrictions =
       permit_mynetworks
       reject_unauth_destination

-- 
    Viktor.

Reply via email to