• The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

User email compromised

M

merkelt

Guest
I have over 1200 pending outgoing messages in my queue to various domains in Russia. I set each of the 10 domains I host to "reject nonexistant user", cleared the queue, and still messages seem to be queueing up!

I think I have found the IP(s) address the messages are comming from useing /var/log/secure. However, I have not able to see "who" is sending them as I have SMTP auth enabled as well. My guess is that one of my users username and password has been compromised.

Can anybody tell me how to disocver what username and password where used to send an email?

Thanks in advance for the help!
 
You should check for exploitable scripts (formmail, phpBB, etc) and for any strange files (or hidden dir's/files) in /tmp

More than likely it may not be an actual mail user account that has been compromised, but rather one of the above.

Install RKHunter and CHKRootkit, update them and run them. Post the results.

Install mod_security (gotroot.com) and their rulesets.

(This is just the beginning steps you should take)
 
Back
Top