[BlueOnyx:19737] Re: prevent user from sending e-mail in /etc/mail/access
Meaulnes Legler
bluelist at waveweb.ch
Sat Jun 18 21:12:25 -05 2016
On 16/06/16 01:27, Rodrigo Ordoñez Licona wrote:
>
> HI Meaulnes Legler
>
> We use this script to cleanup the mqueue When this kind of infecttions
> happen,
>
> You have to identify a string of text on the offending messages, It
> could be the ip of the sender or a line inside the subject something
> inside the qf File of any of the emails sent. In our cases mos of the
> time Viagra or mortgage was enogh to identify bad emails from good ones
>
> /usr/bin/find /var/spool/mqueue/ -name 'qf*' -exec echo grep -i
> /'IDENTIFIED_TEXT_ON_QFFILE'/ {} \> /dev/null \&\& echo {} \; | sh |
> awk '{s=$0;sub("qf", "df", s); print "rm " $0 " " s;}' | sh
>
> Hope that helps
>
> Rodrigo O
>
it did, indeed. I'm waiting a while, then will set up that script as a
cron job and enable the account again. Let's see if that works.
I'm wondering why iptables doesn't block that incoming mail with the
spoofed address. I wrote a script that digs out all IPs in
/var/logs/maillog that had the spoofed address entry (about 5'000!) and
DROPped them in iptables. Maybe I have to drop IP blocks instead of
single entries, but that needs a more refined script...
Thank you and best regards
Meaulnes Legler
~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
~ www.WaveWeb.ch ~
~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
~ Zurich, Switzerland ~
~ tel: +41 44 2601660 ~
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.blueonyx.it/pipermail/blueonyx/attachments/20160619/93ece692/attachment.html>
More information about the Blueonyx
mailing list