On 02/13/2012 04:27 PM, Robert Van Dresar wrote:
On Mon, Feb 13, 2012 at 5:19 PM, Robert Van Dresar
<[email protected] <mailto:[email protected]>> wrote:
On Mon, Feb 13, 2012 at 5:09 PM, Eric Shubert <[email protected]
<mailto:[email protected]>> wrote:
On 02/13/2012 03:47 PM, Robert Van Dresar wrote:
You are right, all of our users have to authenticate to send
email, I
believe that's the default behavior of a stock QMT, so does
that mean I
can add our domains to the blacklist-senders file??
Yes, by all means. Records in that file should look like:
@mydomain.com <http://mydomain.com>
I've tested for open relay, and that test returns OK. The
failure
notices I receive in the postmaster account point to one of
our users,
but it says the offending email is from
"[email protected]@__some-random-ip-address", and
bounces back
to about 50 other email addresses.
I'm not quite sure what you mean here. A specific example with
headers would help. Try to leave as much data intact as you can,
but user and domain names can be substituted consistently if you
want to.
Her computer was off all weekend,
and we virus scanned it this morning and nothing. I really
didn't think
of her password being compromised that's easy enough to
change. I guess
I'll try that, especially since we're listed on five block
lists now.
Sounds as though that's the culprit then. You should attempt to
find out how her password was compromised.
It can (and does occasionally) happen by network traffic
sniffing if her configuration sends a password in clear text
anywhere (I've seen it happen, once). This could be via webmail
w/out https (the stock QMT unfortunately allows this), or via a
client program that's not using TLS, such as a remote Outlook03
client. If you have remote clients using Outlook03, you should
set up QMT to handle smtps (port 465), and configure those
clients to use SSL accordingly.
If possible, all clients should use TLS for their smtp
submissions, whether on port 25 or 587. Unfortunately, QMT
cannot yet enforce use of TLS. Such a feature has been requested
to be added to spamdyke, and may (if we're lucky) be included in
the next spamdyke release.
Please keep us posted.
--
-Eric 'shubes'
Here's the "evidence" from one of the block lists:
Return-Path: <[email protected] <mailto:[email protected]>>
X-Original-To: [email protected]
Received: frommail.airplexus.com <http://mail.airplexus.com>
(mail.airplexus.com <http://mail.airplexus.com> [65.245.57.15])
bymail.ixlab.de <http://mail.ixlab.de> (Spamtrap) with ESMTP
for [email protected]; Mon, 13 Feb 2012 21:38:50 +0100 (CET)
Received: (qmail 9460 invoked by uid 89); 13 Feb 2012 18:16:22 -0000
Received: by simscan 1.4.0 ppid: 8048, pid: 9438, t: 0.7778s
scanners: attach: 1.4.0 clamav: 0.97.3
/m:54/d:14401
Received: from184-82-61-166.static.hostnoc.net <http://184-82-61-166.static.hostnoc.net>
(HELO User) ("email address removed"@[email protected]
<mailto:[email protected]>)
bymail.airplexus.com <http://mail.airplexus.com> with ESMTPA; 13 Feb
2012 18:16:22 -0000
Reply-To:<[email protected] <mailto:[email protected]>>
From:"Rose Brown"<[email protected] <mailto:[email protected]>>
Subject: Offers : Marks& Spencer
Date: Mon, 13 Feb 2012 19:16:18 -0800
MIME-Version: 1.0
Content-Type: text/plain;
charset="Windows-1251"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
X-NiX-Spam-Hash2: d36eed170eb389bf1a5ab832cf972a4b
X-NiX-Spam-Source-IP:65.245.57.15
X-NiX-Spam-MX:mail.ixlab.de <http://mail.ixlab.de>
X-NiX-Spam-Listed: yes
I've left our mail server stuff intact, but removed her email address
---------------------------------------------------------------------------------
Qmailtoaster is sponsored by Vickers Consulting Group
(www.vickersconsulting.com <http://www.vickersconsulting.com>)
Vickers Consulting Group offers Qmailtoaster support and
installations.
If you need professional help with your setup, contact them
today!
------------------------------__------------------------------__---------------------
Please visit qmailtoaster.com <http://qmailtoaster.com> for
the latest news, updates, and packages.
To unsubscribe, e-mail:
qmailtoaster-list-unsubscribe@__qmailtoaster.com
<mailto:[email protected]>
For additional commands, e-mail:
qmailtoaster-list-help@__qmailtoaster.com
<mailto:[email protected]>
Sorry, I meant /var/log/qmail/send/current:
Here's a snippet from tail -f
/www.google.com/mail/help/bulk_mail.html/421_4.7.0_to_review_our_Bulk_Email_Senders_Guidelines._x3si1699355oeb.22/
<http://www.google.com/mail/help/bulk_mail.html/421_4.7.0_to_review_our_Bulk_Email_Senders_Guidelines._x3si1699355oeb.22/>
@400000004f399b773829fbac status: local 0/10 remote 59/60
@400000004f399b77382a037c starting delivery 6158346: msg 111052977 to
remote [email protected] <mailto:[email protected]>
@400000004f399b77382a0764 status: local 0/10 remote 60/60
<snip>
You appear to have a backlog in your remote (outbound) queue.
# qmHandle -l
will give you a count.
If you still have a lot of messages there, you'll want to stop qmail and
clean them out manually. You can use qmHandle for that. Hopefully
there's a constant in the subject or from string that you can use with
the -tX option of qmHandle to delete the junk messages. If you run the
qmHandle command with no options, it will show you what the options are.
Looks like you'll have a few blacklists to get removed from once you get
things squared away. Let us know how you make out.
--
-Eric 'shubes'
---------------------------------------------------------------------------------
Qmailtoaster is sponsored by Vickers Consulting Group
(www.vickersconsulting.com)
Vickers Consulting Group offers Qmailtoaster support and installations.
If you need professional help with your setup, contact them today!
---------------------------------------------------------------------------------
Please visit qmailtoaster.com for the latest news, updates, and packages.
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]