<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: security / sendmail / spam in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879566#M935916</link>
    <description>Ok - I'm running HP-UX 11.0, and Sendmail 8.9.3 (PHNE_24419)&lt;BR /&gt;&lt;BR /&gt;It's obvious to me now we are being compromised.  If I create a new user, within a few days he starts getting junk mail.  Someone on the outside clearly has access to our list of users.&lt;BR /&gt;&lt;BR /&gt;I do not believe we've been accessed directly via a unix login, or a virus from an internal host.  If I'm right there then I need to ask:&lt;BR /&gt;&lt;BR /&gt;Is there any way possible with this version of sendmail, that someone can log into it and query for a complete list of addressees?&lt;BR /&gt;</description>
    <pubDate>Tue, 11 Feb 2003 17:38:40 GMT</pubDate>
    <dc:creator>Fred Martin_1</dc:creator>
    <dc:date>2003-02-11T17:38:40Z</dc:date>
    <item>
      <title>security / sendmail / spam</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879560#M935910</link>
      <description>Grab a coffee.&lt;BR /&gt;&lt;BR /&gt;I had a user, dave.  He had a login account but wanted no email.  So, I put an alias in for him:&lt;BR /&gt;&lt;BR /&gt;dave:  nomail&lt;BR /&gt;&lt;BR /&gt;Since there isn't a real "nomail" user, it causes any mail -to- dave to bounce back to sender.  I have 15 or so accounts set up this way.&lt;BR /&gt;&lt;BR /&gt;Some time after that, postmaster for my sendmail server started getting a returned-mail message.  Basically it said:&lt;BR /&gt;&lt;BR /&gt; mail from dave to spam.com.de was refused&lt;BR /&gt;&lt;BR /&gt;It seemed to me that some spammer was sending mail to dave, and my server was simply bouncing it back.  The receiver of the bounce was bogus.  Hence, the message above.&lt;BR /&gt;&lt;BR /&gt;Make sense?&lt;BR /&gt;&lt;BR /&gt;About the same time that started, all users start getting more spam than ever, like a floodgate had opened.  Even system accounts like adm and sys, which had in four years _never_ got mail, started getting spam.&lt;BR /&gt;&lt;BR /&gt;Back to dave.  dave was spending the winter in Florida and was not logging in.&lt;BR /&gt;&lt;BR /&gt;After a while I got tired of all the postmaster messages regarding dave, so as a kind of test since we was gone, I renamed user dave to david on my system.&lt;BR /&gt;&lt;BR /&gt;A few weeks later I start getting the same postmaster mail, saying:&lt;BR /&gt;&lt;BR /&gt; mail from david to spam.com.de was refused&lt;BR /&gt;&lt;BR /&gt;During this time, dave (david) never logged in, and no one at all, not even david, was aware that I renamed the account.&lt;BR /&gt;&lt;BR /&gt;And!  No more postmaster messages about dave.  He doesn't get mail any more, where before he was regularly getting junk, which david now seems to be getting.&lt;BR /&gt;&lt;BR /&gt;My sendmail is not relaying; I tested that.&lt;BR /&gt;&lt;BR /&gt;I'm baffled by this; whatever is doing this seems to be using the password file, or at least it seems to me that's the case.&lt;BR /&gt;&lt;BR /&gt;I don't see any unusual processes running; no system files have been modified lately that I can see; only five users on my system have any unix access at all.&lt;BR /&gt;&lt;BR /&gt;Any ideas?&lt;BR /&gt;</description>
      <pubDate>Fri, 10 Jan 2003 21:18:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879560#M935910</guid>
      <dc:creator>Fred Martin_1</dc:creator>
      <dc:date>2003-01-10T21:18:41Z</dc:date>
    </item>
    <item>
      <title>Re: security / sendmail / spam</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879561#M935911</link>
      <description>It occurs to me now, that I am relaying mail, for PCs on my local network.  They all run NAV and should be safe, but perhaps it's from the inside after all?&lt;BR /&gt;&lt;BR /&gt;Most PC hosts on my network use Eudora, with a couple using Outlook 97 as a mailer (no Exchange server).&lt;BR /&gt;</description>
      <pubDate>Fri, 10 Jan 2003 21:31:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879561#M935911</guid>
      <dc:creator>Fred Martin_1</dc:creator>
      <dc:date>2003-01-10T21:31:43Z</dc:date>
    </item>
    <item>
      <title>Re: security / sendmail / spam</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879562#M935912</link>
      <description>Look to see if those Outlook clients had an address book that could have been "harvested".&lt;BR /&gt;&lt;BR /&gt;I would seriously consider implementing the RBL on the sendmail server so that bogus mail is simple never accepted in the first place.&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;Paul</description>
      <pubDate>Fri, 10 Jan 2003 21:39:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879562#M935912</guid>
      <dc:creator>Paul R. Dittrich</dc:creator>
      <dc:date>2003-01-10T21:39:03Z</dc:date>
    </item>
    <item>
      <title>Re: security / sendmail / spam</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879563#M935913</link>
      <description>The problem with your bounce technique is that sendmail will accept the mail.  If the mail is spam, when the mail goes to bounce, the spamming server will likely not be present or won't accept mail, resulting in a bounce to postmaster.  Here's how to fix it:&lt;BR /&gt;&lt;BR /&gt;The trick is rejecting the mail altogether:&lt;BR /&gt;&lt;BR /&gt;1) enable the virtusertable feature in sendmail by uncommenting these rulesets in /etc/mail/sendmail.cf&lt;BR /&gt;&lt;BR /&gt;# Virtual user table (maps incoming users)&lt;BR /&gt;Kvirtuser dbm /etc/mail/virtusertable&lt;BR /&gt;&lt;BR /&gt;SParse1&lt;BR /&gt;# handle virtual users&lt;BR /&gt;R$+ &amp;lt; @ $=w . &amp;gt;         $: &amp;lt; $(virtuser $1 @ $2 $@ $1 $: @ $) &amp;gt; $1 &amp;lt; @ $2 . &amp;gt;&lt;BR /&gt;R&amp;lt;@&amp;gt; $+ + $* &amp;lt; @ $* . &amp;gt;&lt;BR /&gt;                        $: &amp;lt; $(virtuser $1 + * @ $3 $@ $1 $: @ $) &amp;gt; $1 + $2 &amp;lt; @&lt;BR /&gt;$3 . &amp;gt;&lt;BR /&gt;R&amp;lt;@&amp;gt; $+ + $* &amp;lt; @ $* . &amp;gt;&lt;BR /&gt;                        $: &amp;lt; $(virtuser $1 @ $3 $@ $1 $: @ $) &amp;gt; $1 + $2 &amp;lt; @ $3 .&lt;BR /&gt; &amp;gt;&lt;BR /&gt;R&amp;lt;@&amp;gt; $+ &amp;lt; @ $+ . &amp;gt;      $: &amp;lt; $(virtuser @ $2 $@ $1 $: @ $) &amp;gt; $1 &amp;lt; @ $2 . &amp;gt;&lt;BR /&gt;R&amp;lt;@&amp;gt; $+                 $: $1&lt;BR /&gt;R&amp;lt; error : $- $+ &amp;gt; $*   $#error $@ $( dequote $1 $) $: $2&lt;BR /&gt;R&amp;lt; $+ &amp;gt; $+ &amp;lt; @ $+ &amp;gt;     $: $&amp;gt;97 $1&lt;BR /&gt;&lt;BR /&gt;restart sendmail&lt;BR /&gt;&lt;BR /&gt;for each user that wants to reject mail outright, add an entry to /etc/mail/virtusertable like this:&lt;BR /&gt;&lt;BR /&gt;dave@yourdomain.com error:nouser No such user&lt;BR /&gt;&lt;BR /&gt;type&lt;BR /&gt;makemap dbm /etc/mail/virtusertable &amp;lt; /etc/mail/virtusertable&lt;BR /&gt;(run makemap everytime you modify /etc/mail/virtusertable)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Now try to send mail to dave@yourdomain.com.&lt;BR /&gt;&lt;BR /&gt;If you want to get really serious about controlling mail, take the contrarian standpoint.  Put an entry in virtusertable for each person that _should_ recieve mail.  At the end of virtusertable, add an entry like&lt;BR /&gt;@yourdomain.com error:nouser No such user&lt;BR /&gt;to reject everything else.&lt;BR /&gt;&lt;BR /&gt;This technique in conjunction with the RBL technique referenced in the other post does a great job of dealing with spam.&lt;BR /&gt;</description>
      <pubDate>Fri, 10 Jan 2003 23:17:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879563#M935913</guid>
      <dc:creator>Christopher Caldwell</dc:creator>
      <dc:date>2003-01-10T23:17:33Z</dc:date>
    </item>
    <item>
      <title>Re: security / sendmail / spam</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879564#M935914</link>
      <description>Paul, thanks.  Since we only have a few Outlook users, I did check that.  Since the rename to "david" was not known, no one has the "david" name referenced.&lt;BR /&gt;&lt;BR /&gt;This leads me to think that somehow the password file is accessable to someone outside, or is being sent outside.  The "david" email began right away after renaming the unix user from "dave" to "david".&lt;BR /&gt;</description>
      <pubDate>Mon, 13 Jan 2003 21:54:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879564#M935914</guid>
      <dc:creator>Fred Martin_1</dc:creator>
      <dc:date>2003-01-13T21:54:19Z</dc:date>
    </item>
    <item>
      <title>Re: security / sendmail / spam</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879565#M935915</link>
      <description>Christopher,&lt;BR /&gt;&lt;BR /&gt;Thanks.  I was going to ask about the details and you've provided them.&lt;BR /&gt;&lt;BR /&gt;---&lt;BR /&gt;I would like to hear from others as well.  The fact that "david" appeared as a known user for incoming mail is particularly annoying.  Unless some spammer is sending email to:&lt;BR /&gt;&lt;BR /&gt;david@every_domain_in_the_book.com&lt;BR /&gt;&lt;BR /&gt;And hit us that way, which is I suppose, possible.  I do myself occasionally get mail that is CC'd to "fmartin@manydomains" including mine.&lt;BR /&gt;</description>
      <pubDate>Mon, 13 Jan 2003 21:59:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879565#M935915</guid>
      <dc:creator>Fred Martin_1</dc:creator>
      <dc:date>2003-01-13T21:59:03Z</dc:date>
    </item>
    <item>
      <title>Re: security / sendmail / spam</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879566#M935916</link>
      <description>Ok - I'm running HP-UX 11.0, and Sendmail 8.9.3 (PHNE_24419)&lt;BR /&gt;&lt;BR /&gt;It's obvious to me now we are being compromised.  If I create a new user, within a few days he starts getting junk mail.  Someone on the outside clearly has access to our list of users.&lt;BR /&gt;&lt;BR /&gt;I do not believe we've been accessed directly via a unix login, or a virus from an internal host.  If I'm right there then I need to ask:&lt;BR /&gt;&lt;BR /&gt;Is there any way possible with this version of sendmail, that someone can log into it and query for a complete list of addressees?&lt;BR /&gt;</description>
      <pubDate>Tue, 11 Feb 2003 17:38:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879566#M935916</guid>
      <dc:creator>Fred Martin_1</dc:creator>
      <dc:date>2003-02-11T17:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: security / sendmail / spam</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879567#M935917</link>
      <description>Here's another technique.&lt;BR /&gt;&lt;BR /&gt;In /etc/mail/accesss&lt;BR /&gt;&lt;BR /&gt;AcriHotline@aol.com             500 Spam reject. We charge $500/spam message.&lt;BR /&gt;brenda72@newmail.com            500 Spam reject. We charge $500/spam message.&lt;BR /&gt;Cash4Free@aol.com               500 Spam reject. We charge $500/spam message.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;A few reject messages for known spammers.&lt;BR /&gt;&lt;BR /&gt;Its not that hard to give the users a little interface that lets you collect data for known spammers.&lt;BR /&gt;&lt;BR /&gt;If in the access file you are stingy about what machines you relay for, you won't accidently become a spam relay point.&lt;BR /&gt;&lt;BR /&gt;Attached is a script that can be modified to let you customize your mail setup including sendmail.mc and then rebuild the hast databases when you have more data in your configuration.&lt;BR /&gt;&lt;BR /&gt;It originated on Linux but has been successfully adapted to HP-UX.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;You can also use /etc/aliases to forward dave's mail to his aol account so long as your mail server has a valid domain name that resolves.&lt;BR /&gt;&lt;BR /&gt;Spam killing can be fun.&lt;BR /&gt;&lt;BR /&gt;Its important to look at headers and see where the mail is being relayed, you can block mail from certain IP addresses and really cut your spam volume a lot.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 11 Feb 2003 18:15:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879567#M935917</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-02-11T18:15:46Z</dc:date>
    </item>
    <item>
      <title>Re: security / sendmail / spam</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879568#M935918</link>
      <description>&lt;BR /&gt;I don't believe your password or alias files are being harvested.&lt;BR /&gt;&lt;BR /&gt;I believe that your mail server has fallen prey to the most popular and annoying spamming method: bomb every possible first name.&lt;BR /&gt;&lt;BR /&gt;Check your mail log, I'm sure you'll find hundreds of entires from A to Z, most of them immediate failures that you wouldn't see since the weren't accepted in the first place.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 11 Feb 2003 23:39:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879568#M935918</guid>
      <dc:creator>Jordan Bean</dc:creator>
      <dc:date>2003-02-11T23:39:29Z</dc:date>
    </item>
    <item>
      <title>Re: security / sendmail / spam</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879569#M935919</link>
      <description>&lt;BR /&gt;Hi Fred,&lt;BR /&gt;&lt;BR /&gt;I thought this post was familiar... I responded to your first one, but didn't think of this until now... Sorry, bud. Here's a link to it:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0xaf7a85079106d71190050090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0xaf7a85079106d71190050090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 11 Feb 2003 23:43:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-sendmail-spam/m-p/2879569#M935919</guid>
      <dc:creator>Jordan Bean</dc:creator>
      <dc:date>2003-02-11T23:43:13Z</dc:date>
    </item>
  </channel>
</rss>

