So, I've installed 6.01-01, cause the older 5.6 version was hacked too, and now that same spammer has managed to hack twice. I was hoping I'd just needed some updates so, I installed a fresh copy of the "Custom ISO" copy discussed in these forums.
It appears he's using some buffer-overflow method (I'm no log expert). Here's a bit of the HTTP access log log entry:
www.pasadenalaw.com 209.78.208.93 - - [19/Apr/2004:17:29:23 -0700] "SEARCH /\x90\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\....(pages of this stuff then ends with ...90\x90\x90" 414 271 "-" "-"
Shortly after this it seems the spam starts to flow. Sender UIDS log shows:
mess bytes sbytes rbytes recips tries xdelay uid
1 527 527 527 1 1 0.196170 0
1 764 764 764 1 1 0.184620 101
320 2862293 2809208 2862293 320 320 52.695518 400
296 3134897 3224730 3224730 332 332 219.798642 401
1 2064 2064 2064 1 1 2893.484848 406
About 700 messages since the hack around 5.29pm PDT.
Last time, it was thousands...
Here's some samples of stuff in the Outgoing mail log:
20 Apr 2004 01:07:11 GMT #914357 3216 <>
remote schuckfam@biz4hits.biz
20 Apr 2004 01:06:49 GMT #914358 3282 <>
remote schrismas@bettahits.biz
20 Apr 2004 01:07:00 GMT #914359 3204 <>
remote dealerro@biz4hits.biz
20 Apr 2004 01:07:11 GMT #914360 3222 <>
remote schuckfam@biz4hits.biz
20 Apr 2004 01:06:22 GMT #914317 3304 <>
remote bradae@biz4hits.biz
I've tried several things...abuse.net shows no open relay...
Anybody know what's going on? Is the hack via webmail? Cause it was enabled, but most everything else was not; no SSH, FTP, atalk, squid, smb, lpd or ldap.
Setup as server-gateway.
Thanks.