Re: [imp] Spam Problem ... close to a solution ... may be you could help? - Kowtow Strike! :-)

2011-05-25 Thread Götz Reinicke - IT-Koordinator
Am 24.05.11 21:40, schrieb Andrew Morgan:
 On Tue, 24 May 2011, Götz Reinicke - IT-Koordinator wrote:
...

 One thing I forgot to mention about identifying compromised accounts -
 the spammers like to put the content of their message (the spam) into
 the user's signature block.  That simplifies the creation and sending of
 the spam because IMP will automatically include the signature block in
 any message.  You could search your preferences backend (MySQL or
 whatever) for the signature preference, possibly qualifying your search
 by looking for strings longer/larger than a certain amount.
 
 You'll also see the reply-to and identity preferences are frequently
 changed by spammers.
 
 Once you see the preferences of a compromised account, you'll know what
 to look for in the future.  It's very obvious.
 
 Andy



100*100 Kowtow !

searching the horde db for some message strings revealed one account :-)

THANKS A LOT TO ALL SUGGESTIONS! :-D


Best regards . back to normal . Götz

-- 
Götz Reinicke
IT-Koordinator

Tel. +49 7141 969 420
Fax  +49 7141 969 55 420
E-Mail goetz.reini...@filmakademie.de

Filmakademie Baden-Württemberg GmbH
Akademiehof 10
71638 Ludwigsburg
www.filmakademie.de

Eintragung Amtsgericht Stuttgart HRB 205016
Vorsitzende des Aufsichtsrats:
Prof. Dr. Claudia Hübner

Geschäftsführer:
Prof. Thomas Schadt



smime.p7s
Description: S/MIME Cryptographic Signature
-- 
IMP mailing list
Frequently Asked Questions: http://horde.org/faq/
To unsubscribe, mail: imp-unsubscr...@lists.horde.org


Re: [imp] Spam Problem ... close to a solution ... may be you could help?

2011-05-25 Thread Michael Menge

Quoting Götz Reinicke - IT-Koordinator goetz.reini...@filmakademie.de:


Am 24.05.11 21:40, schrieb Andrew Morgan:

On Tue, 24 May 2011, Götz Reinicke - IT-Koordinator wrote:


Hi,

I did not find the compromised account yet, but I see a lot off messages
like the following one in our logs:

/var/log/httpd/ssl_request_log.1:[21/May/2011:01:10:54 +0200]
74.82.171.30 TLSv1 RC4-MD5 POST
/horde/imp/compose.php?uniq=721hskg326yc HTTP/1.1 92

/var/log/httpd/ssl_request_log.1:[21/May/2011:01:14:38 +0200]
74.82.171.30 TLSv1 RC4-MD5 POST
/horde/imp/compose.php?uniq=6khanz8ousab HTTP/1.1 92

/var/log/httpd/ssl_request_log.1:[21/May/2011:01:24:41 +0200]
74.82.171.30 TLSv1 RC4-MD5 POST
/horde/imp/compose.php?uniq=2bcbqsb503hi HTTP/1.1 92


May be anyone has an idea how to protect against such direct postings...
if it is possible anyway?


I'm not sure what you mean by direct postings.  There is nothing
inherently evil about calling compose.php multiple times.


By 'direct posting' I thought about, that the spammer is not logged on
to the HORDE webpage using a webbrowser.



If the spammer is not logged in, they should not be able to send
mails at all.


I was thinking, that he uses some tool, which call
/horde/imp/compose.php


yes, but there is no way to distinguish this tool from a normal webbrowser.
Both connect to the Webserver, and send a POST-Request



In the webserver log I do have about 1.600 POST messages from that IP
... and checking some message IDs in the mailserverlog shows that there
are 100 or 200 recepiens.

And I don't think, that a spammer is sitting in Front of his webbrowser
entering such an amount of e-mail addresses.


No, this is done by script, but as Horde only sees the result
there is no way to distinguish a normal browser from a script.

Therefor limit the number of recipients per message in Horde,
and limit the number of recipients per timeframe.





M.MengeTel.: (49) 7071/29-70316
Universität Tübingen   Fax.: (49) 7071/29-5912
Zentrum für Datenverarbeitung  mail:  
michael.me...@zdv.uni-tuebingen.de

Wächterstraße 76
72074 Tübingen

smime.p7s
Description: S/MIME Signatur
-- 
IMP mailing list
Frequently Asked Questions: http://horde.org/faq/
To unsubscribe, mail: imp-unsubscr...@lists.horde.org


Re: [imp] Spam Problem ... close to a solution ... may be you could help?

2011-05-25 Thread Andy Dorman

On 05/24/2011 01:05 PM, Arjen de Korte wrote:


Something very similar is already available in Horde through the Permission
system where you can add IMP, specify the number of recipients per message
(max_recipients) and total recipients per time unit (max_timelimit). You need to
have the Outgoing Email Logging enabled for this to work though.

Best regards, Arjen



Arjen, thank you.  I had forgotten about that feature.  We did not use it 
because we do not use MySQL and I believe it requires the SQL db, no?.


--
Andy Dorman
Ironic Design, Inc.
AnteSpam.com, HomeFreeMail.com, ComeHome.net
--
IMP mailing list
Frequently Asked Questions: http://horde.org/faq/
To unsubscribe, mail: imp-unsubscr...@lists.horde.org


[imp] Spam Problem ... close to a solution ... may be you could help?

2011-05-24 Thread Götz Reinicke - IT-Koordinator
Hi,

I did not find the compromised account yet, but I see a lot off messages
like the following one in our logs:

/var/log/httpd/ssl_request_log.1:[21/May/2011:01:10:54 +0200]
74.82.171.30 TLSv1 RC4-MD5 POST
/horde/imp/compose.php?uniq=721hskg326yc HTTP/1.1 92

/var/log/httpd/ssl_request_log.1:[21/May/2011:01:14:38 +0200]
74.82.171.30 TLSv1 RC4-MD5 POST
/horde/imp/compose.php?uniq=6khanz8ousab HTTP/1.1 92

/var/log/httpd/ssl_request_log.1:[21/May/2011:01:24:41 +0200]
74.82.171.30 TLSv1 RC4-MD5 POST
/horde/imp/compose.php?uniq=2bcbqsb503hi HTTP/1.1 92


May be anyone has an idea how to protect against such direct postings...
if it is possible anyway?



Any suggestion is welcome

-- 
Götz Reinicke
IT-Koordinator

Tel. +49 7141 969 420
Fax  +49 7141 969 55 420
E-Mail goetz.reini...@filmakademie.de

Filmakademie Baden-Württemberg GmbH
Akademiehof 10
71638 Ludwigsburg
www.filmakademie.de

Eintragung Amtsgericht Stuttgart HRB 205016
Vorsitzende des Aufsichtsrats:
Prof. Dr. Claudia Hübner

Geschäftsführer:
Prof. Thomas Schadt



smime.p7s
Description: S/MIME Cryptographic Signature
-- 
IMP mailing list
Frequently Asked Questions: http://horde.org/faq/
To unsubscribe, mail: imp-unsubscr...@lists.horde.org


Re: [imp] Spam Problem ... close to a solution ... may be you could help?

2011-05-24 Thread Andy Dorman

On 05/24/2011 07:53 AM, � wrote:

Hi,

I did not find the compromised account yet, but I see a lot off messages
like the following one in our logs:

/var/log/httpd/ssl_request_log.1:[21/May/2011:01:10:54 +0200]
74.82.171.30 TLSv1 RC4-MD5 POST
/horde/imp/compose.php?uniq=721hskg326yc HTTP/1.1 92

/var/log/httpd/ssl_request_log.1:[21/May/2011:01:14:38 +0200]
74.82.171.30 TLSv1 RC4-MD5 POST
/horde/imp/compose.php?uniq=6khanz8ousab HTTP/1.1 92

/var/log/httpd/ssl_request_log.1:[21/May/2011:01:24:41 +0200]
74.82.171.30 TLSv1 RC4-MD5 POST
/horde/imp/compose.php?uniq=2bcbqsb503hi HTTP/1.1 92


May be anyone has an idea how to protect against such direct postings...
if it is possible anyway?

Any suggestion is welcome



OK, you said any suggestion...

We use two techniques to stop outgoing spam.  The first is pretty complex and 
not for everyone.  You must use version control like Git or Bazaar to keep your 
local code changes safe when you do upstream updates (and using PEAR is out). 
The second technique is simple but not free.


1. We run memcache on the horde servers.  We then added local code to 
horde/imp/lib/Compose.php to save and update a 24 hour count of recipients in 
memcache for a sender.


Then when a sender hits the 24 hr limit or a limit for the number of addresses 
in a single email (spammers love to send to 40 or 50 BCC addresses), we 
deactivate the sender (so they can not send any more until an admin has taken 
action) and send a note to an admin so someone can follow up and decide if this 
is a spammer OR a valid user whose account was stolen.


I am sure someone like Chuck or Jan could write a patch for you on a consulting 
basis.  I have been trying to get our code organized and clean enough that we 
could submit it as something just about anyone could use.  But right now it is 
tied pretty closely to our LDAP user store which is pretty complicated.


2. This is not free...For the horde mailer config item we use smtp and point it 
to antespam.com.  AnteSpam checks the outgoing email for spam and viruses.  When 
it finds either, it quarantines the email and sends a note to the user and the 
domain admin.  The user can manually free the email from quarantine.  But since 
a spammer needs to send a large quantity of spam, needing to release emails from 
quarantine quickly kills his/her profits.  Also, the domain admin can also look 
at the email and if it is really spam, they can quickly shut down the spammer.


I wish I had a better idea to suggest.  But we have found that spammers are 
clever and persistent and hard to stop.


Good luck,

--
Andy Dorman
FanMail.com
--
IMP mailing list
Frequently Asked Questions: http://horde.org/faq/
To unsubscribe, mail: imp-unsubscr...@lists.horde.org


Re: [imp] Spam Problem ... close to a solution ... may be you could help?

2011-05-24 Thread Rick Romero


Quoting Andy Dorman ador...@ironicdesign.com:

Also, the domain admin can also look at the email and if it is  
really spam, they can quickly shut down the spammer.



Off-topic - I like to know how much spam they would have sent, so when  
I verify it's spam I redirect their outgoing mail to /dev/null but  
continue to count the recipients.  It blows your mind sometimes...


I also apply the same 'counting' to my entire outgoing queue.  I've  
found that while the per-user limits are helpful, those smarter  
spammers will just create more accounts.   By monitoring the entire  
mail flow for traffic spikes, I can shut down the entire outgoing  
queue and remove the abuser(s).


I use qmail, but any SMTP server should work.  Essentially:
1. Route all 'non-verified' users mail from the incoming SMTP server  
to 192.168.1.1.

2. Route all mail from 192.168.1.1 to 192.168.1.2.
3. 192.168.1.2 runs smtp-delay to 'pause' traffic on 192.168.1.1
4. Run a cronjob that counts the number of emails in queue on  
192.168.1.1 every minute.  You will need to tweak both the counts and  
delay times for your environment (and as you environment scales up).
So for example, if you consistently have 20 emails in queue, and spike  
to 60 under normal operations, set your program to shut the queue down  
at 70 and alert the admin.  You will obviously need staff to manage  
the alert (if you're swamped with spammers) and/or understanding from  
your users that this will occur.


Rick

--
IMP mailing list
Frequently Asked Questions: http://horde.org/faq/
To unsubscribe, mail: imp-unsubscr...@lists.horde.org


Re: [imp] Spam Problem ... close to a solution ... may be you could help?

2011-05-24 Thread Andrew Morgan

On Tue, 24 May 2011, Götz Reinicke - IT-Koordinator wrote:


Hi,

I did not find the compromised account yet, but I see a lot off messages
like the following one in our logs:

/var/log/httpd/ssl_request_log.1:[21/May/2011:01:10:54 +0200]
74.82.171.30 TLSv1 RC4-MD5 POST
/horde/imp/compose.php?uniq=721hskg326yc HTTP/1.1 92

/var/log/httpd/ssl_request_log.1:[21/May/2011:01:14:38 +0200]
74.82.171.30 TLSv1 RC4-MD5 POST
/horde/imp/compose.php?uniq=6khanz8ousab HTTP/1.1 92

/var/log/httpd/ssl_request_log.1:[21/May/2011:01:24:41 +0200]
74.82.171.30 TLSv1 RC4-MD5 POST
/horde/imp/compose.php?uniq=2bcbqsb503hi HTTP/1.1 92


May be anyone has an idea how to protect against such direct postings...
if it is possible anyway?


I'm not sure what you mean by direct postings.  There is nothing 
inherently evil about calling compose.php multiple times.


One thing I forgot to mention about identifying compromised accounts - the 
spammers like to put the content of their message (the spam) into the 
user's signature block.  That simplifies the creation and sending of the 
spam because IMP will automatically include the signature block in any 
message.  You could search your preferences backend (MySQL or whatever) 
for the signature preference, possibly qualifying your search by looking 
for strings longer/larger than a certain amount.


You'll also see the reply-to and identity preferences are frequently 
changed by spammers.


Once you see the preferences of a compromised account, you'll know what to 
look for in the future.  It's very obvious.


Andy-- 
IMP mailing list
Frequently Asked Questions: http://horde.org/faq/
To unsubscribe, mail: imp-unsubscr...@lists.horde.org