The Community Forums

Interact with an entire community of cPanel & WHM users!
  1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Spamming problem...

Discussion in 'General Discussion' started by gordypordy, Apr 5, 2006.

  1. gordypordy

    gordypordy Active Member

    Joined:
    Jan 6, 2004
    Messages:
    30
    Likes Received:
    0
    Trophy Points:
    0
    Hi,

    I've been getting problems with my server mail over the last few days, and am at a loss to see where the problem is coming from. Nothing appears in my exim_mainlog file. It's blank!

    In the maillog file it gives me troubling info, like the following:

    I don't know if it's me reading incorrectly or what, but the above appears to indicate transfer of over 10 MILLION mail messages!! Is this correct ?

    This has been happening for days now. My mail queue has been jammed full, and at the last clear, there was over 49,000 messages cloggin up the mail queue. The mail messages are all mail delivery failures. It has caused 2 crashes of the server in 3 days.
    I have AFP installed, brute force, roothunter kits and more, and am currently installing (or trying to install !!) mod_security rules .

    But I have no idea where these problems are originating. The usernames identified in the maillog and the Ip address include many email addresses that are actually MY OWN ! Including the one which I posted above.

    I can download and upload megabytes of data to and from my server in minutes, such is my connection, so certainly it could cater for the suggested volume. But these events are happening AFTER whenever I LOG OFF from my server, and close my pc down for the night, and I always disconnect it from the mains supply.

    Does anybody have any idea what might be going on here, and how I might find a solution to it?

    Thanx
     
    #1 gordypordy, Apr 5, 2006
    Last edited: Apr 5, 2006
  2. webignition

    webignition Well-Known Member

    Joined:
    Jan 22, 2005
    Messages:
    1,880
    Likes Received:
    0
    Trophy Points:
    36
    No, that's more likely the number of bytes transferred in the given session.
     
  3. AndyReed

    AndyReed Well-Known Member
    PartnerNOC

    Joined:
    May 29, 2004
    Messages:
    2,222
    Likes Received:
    3
    Trophy Points:
    38
    Location:
    Minneapolis, MN
    This issue has been covered many times and searing these forums will yield many results. It is possible that the SPAM is delieverd by a client or through an insecure/bad script. Activate crond and syslogd to monitor exim log files. You also need to convert entries from :blackhole: to :fail:
     
  4. gordypordy

    gordypordy Active Member

    Joined:
    Jan 6, 2004
    Messages:
    30
    Likes Received:
    0
    Trophy Points:
    0
    Hi andy,

    tahnx for the points. I did search, but it throws up some weired and divergent results from what I had spent ages trawling through.

    My server company is going to have a look at it for me just now (not saying they shall fix it, but at least they offered to look at it!! which is pretty good for them, lol), if they provide any further insight that might help direct me better.

    I know it's a script or something, finding it has been my problem. The various logs are appended with many of my OWN Ip's, and the others are legitimate users with no unusual activity. In fact the unusual activity appears to be identifying me as the perpetrator!

    Incidentally, my mail is set for fail instead of blackhole by default. I read stuff on that longer ago, and I believe one of the mods has stuff about this on his site that was helful, explaining the difference between blackhole and fail, so that is a good point, but fortunately I have it set that way.

    The server is pretty well locked down ( or at least it was !! ), the only thing I didn't have up and on was a non cpanle mod_security ruleset, and Im toying over various options for this, from posts and advice on here and others.

    Regards
     
Loading...

Share This Page