So, I've installed 6.01-01, cause the older 5.6 version was hacked too, and now that same spammer has managed to hack twice. I was hoping I'd just needed some updates so, I installed a fresh copy of the "Custom ISO" copy discussed in these forums.
It appears he's using some buffer-overflow method (I'm no log expert). Here's a bit of the HTTP access log log entry:
www.pasadenalaw.com 209.78.208.93 - - [19/Apr/2004:17:29:23 -0700] "SEARCH /\x90\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\....(pages of this stuff then ends with ...90\x90\x90" 414 271 "-" "-"
Shortly after this it seems the spam starts to flow. Sender UIDS log shows:
mess    bytes   sbytes   rbytes  recips  tries       xdelay  uid
   1      527      527      527       1      1     0.196170  0
   1      764      764      764       1      1     0.184620  101
 320  2862293  2809208  2862293     320    320    52.695518  400
 296  3134897  3224730  3224730     332    332   219.798642  401
   1     2064     2064     2064       1      1  2893.484848  406
About 700 messages since the hack around 5.29pm PDT.
Last time, it was thousands...
Here's some samples of stuff in the Outgoing mail log:
20 Apr 2004 01:07:11 GMT  #914357  3216  <> 
   remote   schuckfam@biz4hits.biz
20 Apr 2004 01:06:49 GMT  #914358  3282  <> 
   remote   schrismas@bettahits.biz
20 Apr 2004 01:07:00 GMT  #914359  3204  <> 
   remote   dealerro@biz4hits.biz
20 Apr 2004 01:07:11 GMT  #914360  3222  <> 
   remote   schuckfam@biz4hits.biz
20 Apr 2004 01:06:22 GMT  #914317  3304  <> 
   remote   bradae@biz4hits.biz
I've tried several things...abuse.net shows no open relay...
Anybody know what's going on? Is the hack via webmail? Cause it was enabled, but most everything else was not; no SSH, FTP, atalk, squid, smb, lpd or ldap.
Setup as server-gateway.
Thanks.