Solved

Sendmail Authentication Log

Posted on 2004-09-15
3
188 Views
Last Modified: 2010-05-18
I have a RedHat 9 server with about 200 users using pop3 and smtp. Sendmail requires authentication to send through (naturally). But I beleive that someone might have guessed one of my users password and is using my server to send mail. Log files show a very high number of messages being sent from Asian IPs and we do not do any business with Asian networks.

Essentially, I need to figure out what user this culprit is authenticating as. Can this info be added to the sendmail log? Or can I sniff this traffic somehow?

Help me stop this spammer! Thank you in advance!
0
Comment
Question by:colinbartlett
3 Comments
 
LVL 40

Accepted Solution

by:
jlevie earned 500 total points
ID: 12069260
> Sendmail requires authentication to send through (naturally).

Only if you've specifically configured Sendmail to do SMTP auth and the access map or a sendmail.mc definition doesn't allow the sending IP relay permission.

Do you have lines in /var/log/maillog similar to:

...mta[9098]: AUTH=server, relay=wilowisp.domain.tld [111.222.333.444], authid=jim, mech=PLAIN,...

If Sendmail is requiring AUTH to relay you'll have messages like that being logged, and obviously you'll be able to tell who is logging in and sending the message that follows in the maillog. The absence of any lines like that imply that SMTP AUTH isn't configured or that an entry in the access map or a sendmail.mc definition is overriding the SMTP AUTH requirement. Also don't discount the possibility that the mail is being sent from the server itself.

And the last possibility is that your server is unintentionally operating as a promiscous relay. There are web sites you can use to test for this. Or, if you'll post the server's host name I can test it for you.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Migrating to Microsoft Office 365 is becoming increasingly popular for organizations both large and small. If you have made the leap to Microsoft’s cloud platform, you know that you will need to create a corporate email signature for your Office 365…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now