<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: smtp accept request in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676557#M59817</link>
    <description>&lt;!--!*#--&gt;Of course, if you just want the noise to&lt;BR /&gt;stop, and your influence with the sender is&lt;BR /&gt;slight, then you could add:&lt;BR /&gt;&lt;BR /&gt;Bad-Clients: 10.252.19.122&lt;BR /&gt;&lt;BR /&gt;to "SYS$SPECIFIC:[TCPIP$SMTP]SMTP.CONFIG".</description>
    <pubDate>Wed, 18 Aug 2010 16:36:05 GMT</pubDate>
    <dc:creator>Steven Schweda</dc:creator>
    <dc:date>2010-08-18T16:36:05Z</dc:date>
    <item>
      <title>smtp accept request</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676555#M59815</link>
      <description>&lt;!--!*#--&gt;I have a couple of systems that are producing the following opcom message every minute or so, filling up the operator.log...I'm not sure what this message is telling me, or where to look to stop it!  I'm not sure if this is some configuration issue on the vms side or something on the email server side (I think that's what that ip address is, an email server - but not the one I'm configured to use in smtp config.)  I don't really have access to the email server side of things.&lt;BR /&gt;I don't have any users on one of the systems (it's a test system) and I'm pretty sure no one is sending or receiving email other than me.  There is a tcpip$smtp_recv_run.log file created every time one of these opcom messages comes in, but it doesn't have anything unusual in it.  (I can post it here if needed.)&lt;BR /&gt;&lt;BR /&gt;The port shown changes every time, and this comes out about (but not exactly) every minute.  No other opcom messages (that would be related) come out at the same time.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;%%%%%%%%%%%  OPCOM  18-AUG-2010 11:28:27.72  %%%%%%%%%%%&lt;BR /&gt;Message from user INTERnet on HNATST&lt;BR /&gt;INTERnet ACP SMTP Accept Request from Host: 10.252.19.122 Port: 3351&lt;BR /&gt;&lt;BR /&gt;Any hints as to what I should look at - assuming it's something I need to fix on the vms side?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Ron</description>
      <pubDate>Wed, 18 Aug 2010 14:46:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676555#M59815</guid>
      <dc:creator>Ron Kaledas</dc:creator>
      <dc:date>2010-08-18T14:46:22Z</dc:date>
    </item>
    <item>
      <title>Re: smtp accept request</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676556#M59816</link>
      <description>&lt;!--!*#--&gt;Almost always interesting:&lt;BR /&gt;&lt;BR /&gt;      TCPIP SHOW VERSION&lt;BR /&gt;&lt;BR /&gt;&amp;gt; INTERnet ACP SMTP Accept Request [...]&lt;BR /&gt;&lt;BR /&gt;It is what it says.  Someone (at Host:&lt;BR /&gt;10.252.19.122) is trying to send e-mail to&lt;BR /&gt;someone at this system.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; There is a tcpip$smtp_recv_run.log file&lt;BR /&gt;&amp;gt; created every time one of these opcom&lt;BR /&gt;&amp;gt; messages comes in, but it doesn't have&lt;BR /&gt;&amp;gt; anything unusual in it.&lt;BR /&gt;&lt;BR /&gt;Define "unusual".  Defining (/system)&lt;BR /&gt;TCPIP$SMTP_RECV_TRACE = 1 might add some&lt;BR /&gt;interest.  I do that here, and it shows&lt;BR /&gt;things like the "MAIL From:" and "RCPT To:",&lt;BR /&gt;which might offer some hints as to who's&lt;BR /&gt;trying to do what to whom.&lt;BR /&gt;&lt;BR /&gt;&amp;gt;   (I can post it here if needed.)&lt;BR /&gt;&lt;BR /&gt;With my weak psychic powers, it's hard to say&lt;BR /&gt;what might be useful.&lt;BR /&gt;&lt;BR /&gt;When those .LOG files hit ;32767, you may&lt;BR /&gt;need to intervene.</description>
      <pubDate>Wed, 18 Aug 2010 16:32:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676556#M59816</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2010-08-18T16:32:59Z</dc:date>
    </item>
    <item>
      <title>Re: smtp accept request</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676557#M59817</link>
      <description>&lt;!--!*#--&gt;Of course, if you just want the noise to&lt;BR /&gt;stop, and your influence with the sender is&lt;BR /&gt;slight, then you could add:&lt;BR /&gt;&lt;BR /&gt;Bad-Clients: 10.252.19.122&lt;BR /&gt;&lt;BR /&gt;to "SYS$SPECIFIC:[TCPIP$SMTP]SMTP.CONFIG".</description>
      <pubDate>Wed, 18 Aug 2010 16:36:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676557#M59817</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2010-08-18T16:36:05Z</dc:date>
    </item>
    <item>
      <title>Re: smtp accept request</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676558#M59818</link>
      <description>Reading a kilometer or three beyond the details that were included, this could well be an infected Windows box sending out spam; I've met a few bits of malware over the years that sought out open SMTP relays, and that found and used (insecurely-configured) VMS boxes.</description>
      <pubDate>Wed, 18 Aug 2010 17:33:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676558#M59818</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2010-08-18T17:33:25Z</dc:date>
    </item>
    <item>
      <title>Re: smtp accept request</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676559#M59819</link>
      <description>&lt;!--!*#--&gt;I've since found out it was some type of "network monitor" that they are "trying out"!  (at least that's what they say is running on the machine at that ip address.)&lt;BR /&gt;&lt;BR /&gt;Wonder why it's trying to send email, or how it's "monitoring" via smtp, but...&lt;BR /&gt;&lt;BR /&gt;anyway, this is tcpip v5.6 eco 5, fwiw.&lt;BR /&gt;&lt;BR /&gt;I did turn on the tcpip trace and debug logicals earlier, attached is the recv_run log from that time.&lt;BR /&gt;&lt;BR /&gt;I did already hit the 32767 limit, hoping to avoid having to worry about that again...&lt;BR /&gt;&lt;BR /&gt;the "bad clients" idea sounds like it might work for me - any negative effects I should be concerned about in doing that?  i.e. what does it do, on my end and his?&lt;BR /&gt;&lt;BR /&gt;and Hoff, didn't know what to include without making the problem description overly lengthy...figured to get the discussion rolling and go from there.&lt;BR /&gt;&lt;BR /&gt;Ron</description>
      <pubDate>Wed, 18 Aug 2010 17:49:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676559#M59819</guid>
      <dc:creator>Ron Kaledas</dc:creator>
      <dc:date>2010-08-18T17:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: smtp accept request</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676560#M59820</link>
      <description>&amp;gt; it was some type of "network monitor"&lt;BR /&gt;&lt;BR /&gt;Many organizations run port scanning software to see which systems are listening on which ports (and therefore may be vulnerable to attack). On well known ports (as is SMTP's 25) they'll often engage in a conversation with that well known application - with SMTP, for example, not to prove they can send mail, but to determine which of the other features of SMTP might be active as some are potentially revealing with respect to the OS or users of the system. Often the folks who engage in this sort of scanning come calling later telling you that there are risks that require mitigation... :)</description>
      <pubDate>Wed, 18 Aug 2010 17:59:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676560#M59820</guid>
      <dc:creator>Jim_McKinney</dc:creator>
      <dc:date>2010-08-18T17:59:44Z</dc:date>
    </item>
    <item>
      <title>Re: smtp accept request</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676561#M59821</link>
      <description>And yet other folks intercept the scans and return, um, creatively formatted data.  :-)&lt;BR /&gt;&lt;BR /&gt;Though an entirely more serious note, these sort of network tools are a neglected area of security; they're potentially juicy targets, too.</description>
      <pubDate>Wed, 18 Aug 2010 18:31:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676561#M59821</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2010-08-18T18:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: smtp accept request</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676562#M59822</link>
      <description>&lt;!--!*#--&gt;&amp;gt; the "bad clients" idea sounds like it might&lt;BR /&gt;&amp;gt; work for me - any negative effects I should&lt;BR /&gt;&amp;gt; be concerned about in doing that?  i.e.&lt;BR /&gt;&amp;gt; what does it do, on my end and his?&lt;BR /&gt;&lt;BR /&gt;ALP $&lt;BR /&gt;%%%%%%%%%%%  OPCOM  18-AUG-2010 13:07:24.55  %%%%%%%%%%%&lt;BR /&gt;Message from user INTERnet on ALP&lt;BR /&gt;INTERnet ACP SMTP Accept Request from Host: 41.140.98.126 Port: 4130&lt;BR /&gt;&lt;BR /&gt;ALP $&lt;BR /&gt;%%%%%%%%%%%  OPCOM  18-AUG-2010 13:07:34.15  %%%%%%%%%%%&lt;BR /&gt;Message from user TCPIP$SMTP on ALP&lt;BR /&gt;%TCPIP-W-SMTP_BADCLNT, client IP address 41.140.98.126 matched Bad Clients list&lt;BR /&gt;&lt;BR /&gt;Stops junk e-mail delivery, but doesn't do&lt;BR /&gt;much for OPERATOR.LOG.  Possibly more useful&lt;BR /&gt;in this situation:&lt;BR /&gt;&lt;BR /&gt;TCPIP set service SMTP /reject = host = 10.252.19.122&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;gt; I did already hit the 32767 limit, hoping&lt;BR /&gt;&amp;gt; to avoid having to worry about that&lt;BR /&gt;&amp;gt; again...&lt;BR /&gt;&lt;BR /&gt;I have added a (messy, potentially&lt;BR /&gt;embarrassing) piece of DCL to&lt;BR /&gt;TCPIP$SMTP_RECV_RUN.COM which does a&lt;BR /&gt;purge-and-renumber operation from time to&lt;BR /&gt;time.  (It may be ugly, but it does seem to&lt;BR /&gt;work around here, at least until the latest&lt;BR /&gt;TCPIP patch installation overwrites it&lt;BR /&gt;(again).)</description>
      <pubDate>Wed, 18 Aug 2010 18:45:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676562#M59822</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2010-08-18T18:45:37Z</dc:date>
    </item>
    <item>
      <title>Re: smtp accept request</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676563#M59823</link>
      <description>&lt;!--!*#--&gt;&amp;gt; Reject-Unbacktranslatable-IP  : FALSE&lt;BR /&gt;&lt;BR /&gt;Probably not important here, but for&lt;BR /&gt;annoyances which originate in the outside&lt;BR /&gt;world, setting this to TRUE can stop&lt;BR /&gt;considerable junk.&lt;BR /&gt;&lt;BR /&gt;ALP $&lt;BR /&gt;%%%%%%%%%%%  OPCOM  18-AUG-2010 09:22:34.94  %%%%%%%%%%%&lt;BR /&gt;Message from user INTERnet on ALP&lt;BR /&gt;INTERnet ACP SMTP Accept Request from Host: 113.22.236.153 Port: 23708&lt;BR /&gt;&lt;BR /&gt;ALP $&lt;BR /&gt;%%%%%%%%%%%  OPCOM  18-AUG-2010 09:22:42.27  %%%%%%%%%%%&lt;BR /&gt;Message from user TCPIP$SMTP on ALP&lt;BR /&gt;%TCPIP-W-SMTP_UNBKTRNSIP, client IP address 113.22.236.153 is not backtranslatable to a host name&lt;BR /&gt;&lt;BR /&gt;Again, doesn't do much for OPERATOR.LOG, but&lt;BR /&gt;a valid sender without a working&lt;BR /&gt;address-to-name look-up is pretty rare.</description>
      <pubDate>Wed, 18 Aug 2010 18:55:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676563#M59823</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2010-08-18T18:55:49Z</dc:date>
    </item>
    <item>
      <title>Re: smtp accept request</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676564#M59824</link>
      <description>If the address 10.252.19.122 is not faked to hide the real address in the public forum, then it is some node inside the local domain (10. is not "the internet", but a private IP address). &lt;BR /&gt;So it should be possible to resolve the issue by human interaction - unless the organization is too big to find the people responsible for the systems involved :-)</description>
      <pubDate>Wed, 18 Aug 2010 19:14:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676564#M59824</guid>
      <dc:creator>Joseph Huber_1</dc:creator>
      <dc:date>2010-08-18T19:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: smtp accept request</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676565#M59825</link>
      <description>Ron,&lt;BR /&gt;&lt;BR /&gt;Why not just turn off the SMTP logging?&lt;BR /&gt;&lt;BR /&gt;$ TCPIP&lt;BR /&gt;TCPIP&amp;gt; SET SERVICE SMTP /LOG_OPTION=NOACCEPT&lt;BR /&gt;TCPIP&amp;gt; DISABLE SERVICE SMTP&lt;BR /&gt;TCPIP&amp;gt; ENABLE SERVICE SMTP&lt;BR /&gt;TCPIP&amp;gt; EXIT&lt;BR /&gt;$&lt;BR /&gt;&lt;BR /&gt;This will stop the annoying OPCOM messages.&lt;BR /&gt;&lt;BR /&gt;You might also ask your co-workers why their monitoring software is pinging your machine every minute.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Jeremy Begg</description>
      <pubDate>Thu, 19 Aug 2010 04:55:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676565#M59825</guid>
      <dc:creator>Jeremy Begg</dc:creator>
      <dc:date>2010-08-19T04:55:16Z</dc:date>
    </item>
    <item>
      <title>Re: smtp accept request</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676566#M59826</link>
      <description>Jeremy - because I was only looking at SHOW CONFIG SMTP and forgot about SHOW SERV SMTP!!!  D'oh!!&lt;BR /&gt;&lt;BR /&gt;Thanks for the reminder.  I will look at doing that, though I will also look at the suggestion for the reject=host=..., which might be the "less-sledge-hammer-ish" approach.&lt;BR /&gt;&lt;BR /&gt;As for the monitoring, that's how this particular package works, I suppose...I don't really have any say at that site, I just have to deal with whatever they're doing.&lt;BR /&gt;</description>
      <pubDate>Thu, 19 Aug 2010 12:32:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676566#M59826</guid>
      <dc:creator>Ron Kaledas</dc:creator>
      <dc:date>2010-08-19T12:32:43Z</dc:date>
    </item>
    <item>
      <title>Re: smtp accept request</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676567#M59827</link>
      <description>Okay, looks like turning off the logging was what I'll do.  I did try the reject host idea, but that still logged in opcom - yes, I know I could turn off rejects in the same way as the accepts.  But, I wasn't positive that they wouldn't notice being rejected at that host/monitor, so this addresses it without that concern.&lt;BR /&gt;&lt;BR /&gt;Thanks for everyone's help.&lt;BR /&gt;</description>
      <pubDate>Thu, 19 Aug 2010 14:06:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676567#M59827</guid>
      <dc:creator>Ron Kaledas</dc:creator>
      <dc:date>2010-08-19T14:06:25Z</dc:date>
    </item>
    <item>
      <title>Re: smtp accept request</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676568#M59828</link>
      <description>I usually tell folks not to connect VMS to the Internet without a firewall, and it looks like your internal network is sufficiently complex that you need to do that, or to VLAN your network.&lt;BR /&gt;&lt;BR /&gt;Check the ratings of the firewalls versus your typical maximum bandwidth; you may be able to operate with a mid-grade firewall.  &lt;BR /&gt;&lt;BR /&gt;Or have the IT folks VLAN your stuff.&lt;BR /&gt;&lt;BR /&gt;Or have the probes stopped.  VMS mail isn't very secure, so they're not going to prove anything here.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 19 Aug 2010 14:13:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/smtp-accept-request/m-p/4676568#M59828</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2010-08-19T14:13:38Z</dc:date>
    </item>
  </channel>
</rss>

