Solved

Lotus Domino 7  Inbound mail server

Posted on 2014-01-21
5
663 Views
Last Modified: 2014-01-31
I have been getting a lot of spammers using my
Domino 7 mail server.

I am unable to tell what user they are logging in as.

I have a fear that they are login  with out a password.

How can I check to be sure the server is only allowing
Authenticated users to use the system.
0
Comment
Question by:yahoolane
  • 3
  • 2
5 Comments
 
LVL 46

Accepted Solution

by:
Sjef Bosman earned 500 total points
ID: 39798411
If your server is a so-called open relay, they don't even have to log in. You can test it using http://mxtoolbox.com/diagnostic.aspx

You probably have to close the open relay, by reconfiguring the Domino server (which should have been done years ago, really...). Read this page from the Admin Help database or search that database for "Preventing unauthorized SMTP hosts from using Domino as a relay".

PS And may I suggest you upgrade your server, Domino R9.0.1 is available already!
0
 
LVL 1

Author Comment

by:yahoolane
ID: 39798452
Well seems I was wrong
I ran your test

      SMTP Open Relay      OK - Not an open relay.

and I am not an open relay

But I guess it is a poor username password combo.

I captured some network traffice hope I can find it.

Any other suggestions.
0
 
LVL 46

Expert Comment

by:Sjef Bosman
ID: 39798761
How do you know they use your server? Can you show us some extracts from your server's log.nsf database, especially from the Miscellaneous and Mail sections?

If they use POP3 or IMAP, you can see them in domlog.nsf, if you activated http logging in that database.
0
 
LVL 1

Author Comment

by:yahoolane
ID: 39798829
I opened a new question after looking at the firewall dumps
0
 
LVL 46

Expert Comment

by:Sjef Bosman
ID: 39799353
Sorry, but you cannot close a question like that, and with a "C". Why didn't you supply us the information I asked for? It'll help you (ans us) to investigate the problem a lot further.

I'm going to ask for this question to be reopened.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Article by: Rob
Notes 8.5 Archiving Steps and Tips This article covers setting up a Notes archive, and helps understand some of the menu choices making setting up and maintaining a Notes archive file easier.
This process describes the steps required to Import and Export data from and to .pst files using Exchange 2010. We can use these steps to export data from a user to a .pst file, import data back to the same or a different user, or even import data t…
In this video we show how to create a Distribution Group in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >>…
To show how to create a transport rule in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Mail Flow >> Rules tab.:  To cr…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now