[BlueOnyx:12625] Re: Maximum number of RCPTs for Vhost
Ken Marcus
kenlists at precisionweb.net
Wed Mar 27 11:16:50 -05 2013
On 3/27/2013 7:21 AM, (NSD) Thomas Petersen wrote:
>
> Anyone ?
>
> *Fra:*blueonyx-bounces at mail.blueonyx.it
> [mailto:blueonyx-bounces at mail.blueonyx.it] *På vegne af *Marcello Torchio
> *Sendt:* 23. marts 2013 07:09
> *Til:* BlueOnyx General Mailing List
> *Emne:* [BlueOnyx:12606] Maximum number of RCPTs for Vhost
>
> Good morning sirs (+1 GMT),
>
> i've a few question about sendmail settings.
>
> Recently i have been subject of a spam attack. A mailbox password was
> stolen and a bot sends spam through my BO 5108R server.
>
> Honestly I have not noticed the issue until the server has not been
> put in some blacklists.
>
> First question, is it possible to have a monitor tool to understand if
> there is a spamming activity on the mail server?
>
> For example a threshold number of RCPTs in outgoing messages that can
> alert the administrator when exceeded, or the content of messages or i
> don't know...
> One of the wrong setting was that the outgoing mail were not analyzed
> by AvSPAM, but only the incoming mail.
>
> I've reduced the maximum number oc RCPTs to 5. But one of our customer
> need to write up to 40 RCPTs.
>
> Second question: Is it possible to setup Vhost dedicated maximum
> number of RCPTS?
>
> Have someone of you tips&tricks to monitor and prevent this spam
> mailing and blacklisting?
>
> Thanks
>
> Marcello Torchio
>
>
>
> _______________________________________________
> Blueonyx mailing list
> Blueonyx at mail.blueonyx.it
> http://mail.blueonyx.it/mailman/listinfo/blueonyx
Marcelo
Here is a perl script that you could run that will tell you is the mailq
is large
#!/usr/bin/perl
##################################################################
# This script will check the mailq and email if it is over 200
#################################################################
use MIME::Lite;
$mailq = `ls /var/spool/mqueue | grep df -c`;
chomp ($mailq);
$serverdomain = "someserver.com";
$alertsto = "123456789\@txt.att.net t";
if ($mailq > 200) {
print "mailq count is $mailq";
#email me
$emailbody = "The mailq count is $mailq on the $serverdomain server.
<BR> Check for spamming issues.<BR>";
$emailbody .= "The mailq command on the server is: mailq <BR>
Generally the method I use to find the culprit is:<BR>
-Type mailq and note one of the mail id numbers, eg. oBLJkG8L005990 <BR>
That id will correspond to 2 files in the /var/lpool/mqueue/ <BR>
e.g. dfoBLJkG8L005990 and qfoBLJkG8L005990 <BR> <BR>
- Then to see if it is spam, look at the content of that file by typing
<BR>
cat /var/spool/mqueue/*oBLJkG8L005990<BR>
or<BR>
cat /var/spool/mqueue/*oBLJkG8L005990 | more <BR><BR>
- Then you can cat the maillog and grep for the IP address or email
address. <BR>
That should show you the authid that they are using so send with; e.g.
elisa <BR><BR>
- To see which site elisa belings to you can type cd ~elisa <BR>
Then ls -al and note the site number. <BR>
Then ls -la /home/sites/ | grep site[thesitenumberhere] <BR> <BR>
Then change the pass for that user. <BR>
Then delete the outgoing spam files <BR> <BR>
Or, if the sender of the spam is apache, then a php script is sending
the spam. <BR>
In that case, check the maillog for the send times. Then crosscheck the
times with the the command<BR>
cat /var/log/httpd/access_log | grep php | grep [thetime]<BR>
e.g. cat /var/log/httpd/access_log | grep php | grep 12:40<BR>
Then move the compromised script. <BR>
";
my $msg = MIME::Lite->new
(
Subject => "Large mailq for $serverdomain",
>From => "$alertsto",
To => $alertsto,
Cc => "$alertsto",
Type => 'text/html',
Data => "$emailbody"
);
$msg->send();
}
Ken Marcus
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.blueonyx.it/pipermail/blueonyx/attachments/20130327/2d928af2/attachment.html>
More information about the Blueonyx
mailing list