Re: [exim] Content scanning and non-MIME messages

2019-09-24 Thread Heiko Schlittermann via Exim-users
Ian Zimmerman via Exim-users (Di 24 Sep 2019 15:53:27 EDT): > > Ok, never mind. I'll just enhance my module to read the body from > $message_body if necessary. Even now, I never read the entire MIME The message_body does not contain the full message body. I believe, there is a related option.

Re: [exim] Content scanning and non-MIME messages

2019-09-24 Thread Heiko Schlittermann via Exim-users
Ian Zimmerman via Exim-users (Di 24 Sep 2019 14:43:52 EDT): > On 2019-09-24 13:51, Heiko Schlittermann wrote: > > > Isn't that well defined enough? > > /scan//.eml > > > > It gets created on the first malware condition. > Are you sure? No, as always, I'm not sure :) > I have no malware=

Re: [exim] Content scanning and non-MIME messages

2019-09-24 Thread Ian Zimmerman via Exim-users
On 2019-09-24 11:43, Ian Zimmerman wrote: > I have no malware= condition in my configuration now. I had one until > yesterday, but for a different and unrelated purpose, and I removed > it. Nevertheless, my dlexpand module, which is called from the MIME > acl with $mime_decoded_filename is an

Re: [exim] Content scanning and non-MIME messages

2019-09-24 Thread Ian Zimmerman via Exim-users
On 2019-09-24 13:51, Heiko Schlittermann wrote: > Isn't that well defined enough? > /scan//.eml > > It gets created on the first malware condition. Are you sure? I have no malware= condition in my configuration now. I had one until yesterday, but for a different and unrelated purpose, and I

Re: [exim] Content scanning and non-MIME messages

2019-09-24 Thread Heiko Schlittermann via Exim-users
Ian Zimmerman via Exim-users (Di 24 Sep 2019 13:25:54 EDT): > > [1] In the case of the MIME acl, the file name is in > $mime_decoded_filename. But how can I have the _body_ in a file with a > well defined name in data acl? That is the "Pudels Kern". Isn't that well defined enough? /scan//.eml

Re: [exim] Content scanning and non-MIME messages

2019-09-24 Thread Ian Zimmerman via Exim-users
On 2019-09-24 09:08, Jeremy Harris wrote: > Don't try to be too clever, it'll break later. Use the interfaces > provided. If I use the malware condition, I have to write a whole program to handle the other end. I have a choice: - Write in in C, and deal with the usual memory management

Re: [exim] Content scanning and non-MIME messages

2019-09-24 Thread Ian Zimmerman via Exim-users
On 2019-09-24 07:10, Heiko Schlittermann wrote: > > * Additional ACL conditions and modifiers: decode, malware, > > mime_regex, regex , and spam. These can be used in the ACL that is > > run at the end of message reception (the acl_smtp_data ACL). > > I'll change this, removing the latter

Re: [exim] Unstoppable spam

2019-09-24 Thread Odhiambo Washington via Exim-users
On Tue, 24 Sep 2019 at 14:43, Cyborg via Exim-users wrote: > Am 24.09.19 um 11:07 schrieb Odhiambo Washington via Exim-users: > > 2019-09-23 19:05:01 1iCQpf-0002zI-7B <= benson.ku...@ourdomain.tld > > H=([127.0.0.1]) [5.61.42.174] I=[41.57.X.X]:587 P=esmtpsa > >

Re: [exim] Unstoppable spam

2019-09-24 Thread Cyborg via Exim-users
Am 24.09.19 um 11:07 schrieb Odhiambo Washington via Exim-users: > 2019-09-23 19:05:01 1iCQpf-0002zI-7B <= benson.ku...@ourdomain.tld > H=([127.0.0.1]) [5.61.42.174] I=[41.57.X.X]:587 P=esmtpsa > X=TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128 CV=no > A=plain:benson.ku...@ourdomain.tld S=153471

Re: [exim] Content scanning and non-MIME messages

2019-09-24 Thread Heiko Schlittermann via Exim-users
Ian Zimmerman via Exim-users (Mo 23 Sep 2019 21:29:30 EDT): > > Additional ACL conditions and modifiers: decode, malware, mime_regex, > regex, and spam. These can be used in the ACL that is run at the end > of message reception (the acl_smtp_data ACL). Hm. I didn't check the code either.

Re: [exim] Unstoppable spam

2019-09-24 Thread Jeremy Harris via Exim-users
On 24/09/2019 09:40, Jasen Betts via Exim-users wrote: > On 2019-09-24, Odhiambo Washington via Exim-users wrote: > >> Authentication-Results: gw.ourdomain.tld;iprev=fail >> smtp.remote-ip=5.61.42.174;auth=pass (PLAIN) >> smtp.auth=benson.ku...@ourdomain.tld;dmarc=skipped >>

Re: [exim] Unstoppable spam

2019-09-24 Thread Odhiambo Washington via Exim-users
On Tue, 24 Sep 2019 at 11:48, Jasen Betts via Exim-users < exim-users@exim.org> wrote: > On 2019-09-24, Odhiambo Washington via Exim-users > wrote: > > > Authentication-Results: gw.ourdomain.tld;iprev=fail > > smtp.remote-ip=5.61.42.174;auth=pass (PLAIN) > >

Re: [exim] Unstoppable spam

2019-09-24 Thread Jasen Betts via Exim-users
On 2019-09-24, Odhiambo Washington via Exim-users wrote: > Authentication-Results: gw.ourdomain.tld;iprev=fail > smtp.remote-ip=5.61.42.174;auth=pass (PLAIN) > smtp.auth=benson.ku...@ourdomain.tld;dmarc=skipped > header.from=ourdomain.tld Is that a standard header? I've not seen exim

Re: [exim] Content scanning and non-MIME messages

2019-09-24 Thread Jeremy Harris via Exim-users
On 24/09/2019 02:29, Ian Zimmerman via Exim-users wrote: > The text of the spec says: ... > The .eml extension is a friendly hint to virus scanners that they can > expect an MBOX-like structure inside that file. The file is created > when the first content scanning facility is called. > But

Re: [exim] Unstoppable spam

2019-09-24 Thread Marius Schwarz via Exim-users
Looks like "5.61.42.174" gets spammed via webmail (127.0.0.1) or got hacked and spams via script. Check that system. Am September 24, 2019 7:40:07 AM UTC schrieb Odhiambo Washington via Exim-users : >Hi all, > >One particular account on my server has been used to send spam >repeatedly. >I have

Re: [exim] Unstoppable spam

2019-09-24 Thread Sebastian Nielsen via Exim-users
If the gw.ourdomain.tld is listed as authorized relayer in exim4 config, authentication isn't needed. Check the configuration that relaying is not authorized for gw.ourdomain.tld Best thing you can do is to restrict so BOTH an authorized IP *AND* a password is required to be authorized to relay,

[exim] Unstoppable spam

2019-09-24 Thread Odhiambo Washington via Exim-users
Hi all, One particular account on my server has been used to send spam repeatedly. I have changed the account's password so many times now that I believe this spam is not actually using their password for ASMTP, but probably a hole on the system which I am not able to detect. I am requesting for