D
disvirtual
Guest
Hi.
I have a serious problem with my web/mail server.
The problem is that Qmail queue fills of Spam at certain day periods.
The spam attack begins and queue grows VERY fast. You can imagine the problems that it’s causing: mails delayed for hours, mailboxes full of spam, sever processing load, and of course, clients phoning and complaining about that.
I noticed that when I stop the web server (httpdd) the spam incoming ceases instantaneously, so conclusion is immediate: the attack comes from my own server, a web, a PHP script or any other kind of scrip susceptible of having any kind of exploit.
Almost all spam messages are ONE SENDER TO ONE RECIPIENT, so qmail-qread doesn’t help to locate sender-victim.
Spamassassin does NOTHING but mark messages as spam (TOTALLY USELESS THING), so server loads and mailboxes fulls of –marked- spam.
I’m sure open relay is off (http://kb.odin.com/en/1394)
I created wrapper for sendmail to log all mail sending from web scripts (http://kb.swsoft.com/en/1711). Result = NOTHING.
I followed article http://kb.odin.com/en/766 and nothing.
The command line in the same article:
# lsof +r 1 -p `ps axww | grep httpd | grep -v grep | awk ' { if(!str) { str=$1 } else { str=str","$1}}END{print str}'` | grep vhosts | grep php
Shows NOTHING, even if I launch a PHP script for intensive mail test.
The only thing I achieved with that procedure is the following:
Viewing queue messages in Plesk, I took the sender and “cat /usr/local/psa/var/log/maillog |grep USERNAMEâ€.
Obtained: qmail: 1211215564.841050 info msg XXXXXXX: bytes 1713 from <[email protected]> qp 19251 uid 2020
Then find /var/qmail/queue/mess/ -name XXXXXXX
Then cat /var/qmail/queue/mess/YY/XXXXXXX
Some show: (qmail 9355 invoked from network)
others show: (qmail 9355 invoked from 110)
if “grep 110 /etc/passwd†It shows: “popuser:x:110:31OP3 service user:/var/qmail/popuser:/sbin/nologinâ€
In an external link (http://www.atomicorp.com/wiki/index.php/Spam) I found: “If the userid is popuser, the source is a compromised smtp_auth accountâ€,
And now the question: HOW CAN I FIND THE USER/SCRIPT/WEB/IP OR WHATEVER IS SPAMMING MY SERVER ????????????
I have read all those forum posts:
http://forum.swsoft.com/showthread.php?t=16774
http://forum.swsoft.com/showthread.php?t=47861
http://forum.swsoft.com/showthread.php?t=48999
http://forum.swsoft.com/showthread.php?t=44012
http://forum.swsoft.com/showthread.php?t=52018
http://forum.swsoft.com/showthread.php?t=52759
http://forum.swsoft.com/showthread.php?t=52550
http://forum.swsoft.com/showthread.php?t=3791
http://forum.swsoft.com/showthread.php?t=52113
http://forum.swsoft.com/showthread.php?t=51738
http://forum.swsoft.com/showthread.php?t=51577
http://forum.swsoft.com/showthread.php?t=51466
http://forum.swsoft.com/showthread.php?t=48264
http://forum.swsoft.com/showthread.php?t=49750
And many others, and lots of KB articles, but none helped me.
Please, I NEED VERY URGENT HELP !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Thanks a lot.
I have a serious problem with my web/mail server.
The problem is that Qmail queue fills of Spam at certain day periods.
The spam attack begins and queue grows VERY fast. You can imagine the problems that it’s causing: mails delayed for hours, mailboxes full of spam, sever processing load, and of course, clients phoning and complaining about that.
I noticed that when I stop the web server (httpdd) the spam incoming ceases instantaneously, so conclusion is immediate: the attack comes from my own server, a web, a PHP script or any other kind of scrip susceptible of having any kind of exploit.
Almost all spam messages are ONE SENDER TO ONE RECIPIENT, so qmail-qread doesn’t help to locate sender-victim.
Spamassassin does NOTHING but mark messages as spam (TOTALLY USELESS THING), so server loads and mailboxes fulls of –marked- spam.
I’m sure open relay is off (http://kb.odin.com/en/1394)
I created wrapper for sendmail to log all mail sending from web scripts (http://kb.swsoft.com/en/1711). Result = NOTHING.
I followed article http://kb.odin.com/en/766 and nothing.
The command line in the same article:
# lsof +r 1 -p `ps axww | grep httpd | grep -v grep | awk ' { if(!str) { str=$1 } else { str=str","$1}}END{print str}'` | grep vhosts | grep php
Shows NOTHING, even if I launch a PHP script for intensive mail test.
The only thing I achieved with that procedure is the following:
Viewing queue messages in Plesk, I took the sender and “cat /usr/local/psa/var/log/maillog |grep USERNAMEâ€.
Obtained: qmail: 1211215564.841050 info msg XXXXXXX: bytes 1713 from <[email protected]> qp 19251 uid 2020
Then find /var/qmail/queue/mess/ -name XXXXXXX
Then cat /var/qmail/queue/mess/YY/XXXXXXX
Some show: (qmail 9355 invoked from network)
others show: (qmail 9355 invoked from 110)
if “grep 110 /etc/passwd†It shows: “popuser:x:110:31OP3 service user:/var/qmail/popuser:/sbin/nologinâ€
In an external link (http://www.atomicorp.com/wiki/index.php/Spam) I found: “If the userid is popuser, the source is a compromised smtp_auth accountâ€,
And now the question: HOW CAN I FIND THE USER/SCRIPT/WEB/IP OR WHATEVER IS SPAMMING MY SERVER ????????????
I have read all those forum posts:
http://forum.swsoft.com/showthread.php?t=16774
http://forum.swsoft.com/showthread.php?t=47861
http://forum.swsoft.com/showthread.php?t=48999
http://forum.swsoft.com/showthread.php?t=44012
http://forum.swsoft.com/showthread.php?t=52018
http://forum.swsoft.com/showthread.php?t=52759
http://forum.swsoft.com/showthread.php?t=52550
http://forum.swsoft.com/showthread.php?t=3791
http://forum.swsoft.com/showthread.php?t=52113
http://forum.swsoft.com/showthread.php?t=51738
http://forum.swsoft.com/showthread.php?t=51577
http://forum.swsoft.com/showthread.php?t=51466
http://forum.swsoft.com/showthread.php?t=48264
http://forum.swsoft.com/showthread.php?t=49750
And many others, and lots of KB articles, but none helped me.
Please, I NEED VERY URGENT HELP !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Thanks a lot.