The msg*.rec log entry always contains the account name used to authenticate an email just find the 'Received' entry for the outgoing spam and then look for the 'relay=' string... Received 60.234.149.210 .... "Body has arrived, Relay=smtpauth=USER@DOMAIN.NAME, ChrisP. On Thursday 25/11/2010 at 4:16 pm, surgemailHIDDEN@etwinsite.com wrote: I've looked at this as well. Nothing in the status advanced view shows me which user accounts are authenticating when these spam messages are slipping through. The only thing I can think to do now is to manually reset the passwords for all of the accounts on this box. It's a few hundred addresses across about 40-50 domains... Douglas WardIT DirectorNC Methodist ConferenceOn Wed, Nov 24, 2010 at 9:28 PM, Lyle Giese <lyle@lcrcomputer.info> wrote: The headers should show the orginating IP address. Use that to track down connections under the advanced view in Status. Should help narrow it down. Lyle Giesedward@nccumc.org wrote: Additional information: After finding a legitimate e-mail in the queue I found an X-Authenticated-User field in the message header. The spam messages do not have this field in their header records. Any thoughts on how I can track this down? Douglas WardIT DirectorNC Methodist Conference ---------- Forwarded message ----------From: <dward@nccumc.org> Date: Wed, Nov 24, 2010 at 4:54 PMSubject: Compromised mailbox allowing spam relayTo: surgemailHIDDEN@etwinsite.com Happy Thanksgiving! I have discovered today that one of the accounts on my surgemail server has been compromised. It appears that a spammer has brute forced a password to relay authenticated mail through our mail server. Unfortunately, I cannot find any trace within the surgemail logs which account is compromised. I have checked all of the log files and all I see is the spoofed to/from fields. The account used to authenticate to the surgemail server is nowhere to be found. How can I find this? Once I change this password all is well and I can go back to my vacation. Any help you might offer would be most appreciated. Thank you in advance! Douglas WardIT DirectorNC Methodist Conference
Received 60.234.149.210 .... "Body has arrived, Relay=smtpauth=USER@DOMAIN.NAME,
ChrisP.
I've looked at this as well. Nothing in the status advanced view shows me which user accounts are authenticating when these spam messages are slipping through. The only thing I can think to do now is to manually reset the passwords for all of the accounts on this box. It's a few hundred addresses across about 40-50 domains... Douglas WardIT DirectorNC Methodist ConferenceOn Wed, Nov 24, 2010 at 9:28 PM, Lyle Giese <lyle@lcrcomputer.info> wrote: The headers should show the orginating IP address. Use that to track down connections under the advanced view in Status. Should help narrow it down. Lyle Giesedward@nccumc.org wrote: Additional information: After finding a legitimate e-mail in the queue I found an X-Authenticated-User field in the message header. The spam messages do not have this field in their header records. Any thoughts on how I can track this down? Douglas WardIT DirectorNC Methodist Conference ---------- Forwarded message ----------From: <dward@nccumc.org> Date: Wed, Nov 24, 2010 at 4:54 PMSubject: Compromised mailbox allowing spam relayTo: surgemailHIDDEN@etwinsite.com Happy Thanksgiving! I have discovered today that one of the accounts on my surgemail server has been compromised. It appears that a spammer has brute forced a password to relay authenticated mail through our mail server. Unfortunately, I cannot find any trace within the surgemail logs which account is compromised. I have checked all of the log files and all I see is the spoofed to/from fields. The account used to authenticate to the surgemail server is nowhere to be found. How can I find this? Once I change this password all is well and I can go back to my vacation. Any help you might offer would be most appreciated. Thank you in advance! Douglas WardIT DirectorNC Methodist Conference
The headers should show the orginating IP address. Use that to track down connections under the advanced view in Status. Should help narrow it down. Lyle Giesedward@nccumc.org wrote: Additional information: After finding a legitimate e-mail in the queue I found an X-Authenticated-User field in the message header. The spam messages do not have this field in their header records. Any thoughts on how I can track this down? Douglas WardIT DirectorNC Methodist Conference ---------- Forwarded message ----------From: <dward@nccumc.org> Date: Wed, Nov 24, 2010 at 4:54 PMSubject: Compromised mailbox allowing spam relayTo: surgemailHIDDEN@etwinsite.com Happy Thanksgiving! I have discovered today that one of the accounts on my surgemail server has been compromised. It appears that a spammer has brute forced a password to relay authenticated mail through our mail server. Unfortunately, I cannot find any trace within the surgemail logs which account is compromised. I have checked all of the log files and all I see is the spoofed to/from fields. The account used to authenticate to the surgemail server is nowhere to be found. How can I find this? Once I change this password all is well and I can go back to my vacation. Any help you might offer would be most appreciated. Thank you in advance! Douglas WardIT DirectorNC Methodist Conference
Additional information: After finding a legitimate e-mail in the queue I found an X-Authenticated-User field in the message header. The spam messages do not have this field in their header records. Any thoughts on how I can track this down? Douglas WardIT DirectorNC Methodist Conference ---------- Forwarded message ----------From: <dward@nccumc.org> Date: Wed, Nov 24, 2010 at 4:54 PMSubject: Compromised mailbox allowing spam relayTo: surgemailHIDDEN@etwinsite.com Happy Thanksgiving! I have discovered today that one of the accounts on my surgemail server has been compromised. It appears that a spammer has brute forced a password to relay authenticated mail through our mail server. Unfortunately, I cannot find any trace within the surgemail logs which account is compromised. I have checked all of the log files and all I see is the spoofed to/from fields. The account used to authenticate to the surgemail server is nowhere to be found. How can I find this? Once I change this password all is well and I can go back to my vacation. Any help you might offer would be most appreciated. Thank you in advance! Douglas WardIT DirectorNC Methodist Conference
Last Message | Next Message