Expiring Today—Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Sendmail Authentication Log

Posted on 2004-09-15
3
Medium Priority
?
198 Views
Last Modified: 2010-05-18
I have a RedHat 9 server with about 200 users using pop3 and smtp. Sendmail requires authentication to send through (naturally). But I beleive that someone might have guessed one of my users password and is using my server to send mail. Log files show a very high number of messages being sent from Asian IPs and we do not do any business with Asian networks.

Essentially, I need to figure out what user this culprit is authenticating as. Can this info be added to the sendmail log? Or can I sniff this traffic somehow?

Help me stop this spammer! Thank you in advance!
0
Comment
Question by:colinbartlett
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 40

Accepted Solution

by:
jlevie earned 2000 total points
ID: 12069260
> Sendmail requires authentication to send through (naturally).

Only if you've specifically configured Sendmail to do SMTP auth and the access map or a sendmail.mc definition doesn't allow the sending IP relay permission.

Do you have lines in /var/log/maillog similar to:

...mta[9098]: AUTH=server, relay=wilowisp.domain.tld [111.222.333.444], authid=jim, mech=PLAIN,...

If Sendmail is requiring AUTH to relay you'll have messages like that being logged, and obviously you'll be able to tell who is logging in and sending the message that follows in the maillog. The absence of any lines like that imply that SMTP AUTH isn't configured or that an entry in the access map or a sendmail.mc definition is overriding the SMTP AUTH requirement. Also don't discount the possibility that the mail is being sent from the server itself.

And the last possibility is that your server is unintentionally operating as a promiscous relay. There are web sites you can use to test for this. Or, if you'll post the server's host name I can test it for you.
0

Featured Post

Command Line Tips and Tricks

The command line is a powerful tool at the disposal of every Linux user. Although Linux distros come with beautiful user interfaces, it's worthwhile to learn the command line because it allows you to do a number of things that you otherwise cannot do from the GUI.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

718 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question