[imp] Spam Problem ... close to a solution ... may be you could help?
Andrew Morgan
morgan at orst.edu
Tue May 24 19:40:54 UTC 2011
On Tue, 24 May 2011, Götz Reinicke - IT-Koordinator wrote:
> Hi,
>
> I did not find the compromised account yet, but I see a lot off messages
> like the following one in our logs:
>
> /var/log/httpd/ssl_request_log.1:[21/May/2011:01:10:54 +0200]
> 74.82.171.30 TLSv1 RC4-MD5 "POST
> /horde/imp/compose.php?uniq=721hskg326yc HTTP/1.1" 92
>
> /var/log/httpd/ssl_request_log.1:[21/May/2011:01:14:38 +0200]
> 74.82.171.30 TLSv1 RC4-MD5 "POST
> /horde/imp/compose.php?uniq=6khanz8ousab HTTP/1.1" 92
>
> /var/log/httpd/ssl_request_log.1:[21/May/2011:01:24:41 +0200]
> 74.82.171.30 TLSv1 RC4-MD5 "POST
> /horde/imp/compose.php?uniq=2bcbqsb503hi HTTP/1.1" 92
>
>
> May be anyone has an idea how to protect against such direct postings...
> if it is possible anyway?
I'm not sure what you mean by "direct postings". There is nothing
inherently evil about calling compose.php multiple times.
One thing I forgot to mention about identifying compromised accounts - the
spammers like to put the content of their message (the spam) into the
user's signature block. That simplifies the creation and sending of the
spam because IMP will automatically include the signature block in any
message. You could search your preferences backend (MySQL or whatever)
for the signature preference, possibly qualifying your search by looking
for strings longer/larger than a certain amount.
You'll also see the reply-to and identity preferences are frequently
changed by spammers.
Once you see the preferences of a compromised account, you'll know what to
look for in the future. It's very obvious.
Andy
More information about the imp
mailing list