M
mediashaker
Guest
Spammers are brute forcing plesk email passwords then authenticating using base 64 encoding on the username. The built in qmail logging can't handle this and will just show (null) instead if the username used. This makes it almost impossible to find out which account has been compromised (without using wireshark)..
Example of spammer using base64 encoding on plesk box:
maillog.processed.3:Aug 7 13:34:26 plesk-web0 smtp_auth: SMTP connect from (null)@hrif-east-flr1.med.ualberta.ca [142.244.23.58]
maillog.processed.3:Aug 7 13:34:26 plesk-web0 smtp_auth: smtp_auth: SMTP user : logged in from (null)@hrif-east-flr1.med.ualberta.ca [142.244.23.58]
maillog.processed.3:Aug 7 13:35:31 plesk-web0 smtp_auth: SMTP connect from (null)@hrif-east-flr1.med.ualberta.ca [142.244.23.58]
maillog.processed.3:Aug 7 13:35:31 plesk-web0 smtp_auth: smtp_auth: SMTP user : logged in from (null)@hrif-east-flr1.med.ualberta.ca [142.244.23.58]
Can you please patch qmail so we can at least see the base64 encoding instead of (null) ?
Example of spammer using base64 encoding on plesk box:
maillog.processed.3:Aug 7 13:34:26 plesk-web0 smtp_auth: SMTP connect from (null)@hrif-east-flr1.med.ualberta.ca [142.244.23.58]
maillog.processed.3:Aug 7 13:34:26 plesk-web0 smtp_auth: smtp_auth: SMTP user : logged in from (null)@hrif-east-flr1.med.ualberta.ca [142.244.23.58]
maillog.processed.3:Aug 7 13:35:31 plesk-web0 smtp_auth: SMTP connect from (null)@hrif-east-flr1.med.ualberta.ca [142.244.23.58]
maillog.processed.3:Aug 7 13:35:31 plesk-web0 smtp_auth: smtp_auth: SMTP user : logged in from (null)@hrif-east-flr1.med.ualberta.ca [142.244.23.58]
Can you please patch qmail so we can at least see the base64 encoding instead of (null) ?