Re: Spam Sent From WebMail

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hallo, Paul,

Du (paul) meintest am 09.10.07:

> On 10/9/07, Paul Lesniewski <paul@xxxxxxxxxxxxxxxx> wrote:
>> On 10/9/07, Nick Bright <nick.bright@xxxxxxxxxxxxxx> wrote:
>>> Paul Lesniewski wrote:
>>>> Please do NOT top-post and try to use correct reply quoting.
>>>>
>>>> On 10/9/07, Brent <brent@xxxxxxxxxxx> wrote:
>>>>> I had this exact issue.  It ended up being one exploited account.
>>>>>  The IP addresses connecting to the account were from various
>>>>> APNIC blocks.  I would block one IP and it would move to
>>>>> another... suggesting that it was some kind of bot - however, I
>>>>> added the captcha plugin and they kept logging in! I changed the
>>>>> password on the exploited account and so far it hasn't
>>>>> resurfaced.
>>>>
>>>> You might have chosen a weak CAPTCHA mechanism.  It might be
>>>> useful for others if you mention which CAPTCHA backend you used
>>>> (and if you tried any others).
>>>
>>> What mechanism do you suggest, I am looking at using this plugin,
>>> but there is quite the array of options for mechanisms to use.
>>
>> My first suggestion is to use it as part of the Restrict Senders
>> plugin.  It only needs to show itself when there is a problem.

> Sorry, I meant the Lockout plugin.  Restrict Senders should be used
> to cap the amount of junk that goes out once an attacker has gained
> access to your SM installation.  Lockout in combination with CAPTCHA
> will provide some security against automated login attacks.

>>  After
>> that, please read the comments about each mechanism in the config
>> file, research them online and look at each of them in operation
>> yourself.  Some are obviously very weak - you'll probably want to
>> avoid those that are notated as such.  Please report back your
>> findings to share with others.
>>
>>
>>>>>>>>> Per some suggestions in the thread I was able to determine
>>>>>>>>> that they
>>>>> are
>>>>>>>>> not using "mailto.php", but rather compose.php:
>>>>>>>>>
>>>>>>>>> /var/log/httpd/access_log:196.1.179.183 - -
>>>>>>>>> [07/Oct/2007:21:54:10
>>>>> -0500]
>>>>>>>>> "GET /webmail/src/compose.php?mail_sent=yes HTTP/1.1" 200
>>>>>>>>> 37102
>>>>>>>>>
>>>>> "http://webmail.terraworld.net/webmail/src/compose.php?mailbox=No
>>>>> ne&startMes sage=0"
>>>>>>>>> "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)"
>>>>>>>> Are you saying that was the only entry in the log from that
>>>>>>>> IP? They only hit compose.php? If not, what was the sequence
>>>>>>>> of events?
>>>>>>> There were many hits from quite a few different IP addresses,
>>>>>>> and they all looked simmilar to that. I've extracted log
>>>>>>> entries from that IP address, and attached the file to this
>>>>>>> message.
>>>>>>>
>>>>>>>  From what I can tell it logs in, then hits compose.php
>>>>>>>  repeatedly.
>>>>>> That's odd. It really doesn't look like a bot. Perhaps it's
>>>>>> using an IE toolbar of some sort to control the browser. There
>>>>>> is a CAPTCHA plugin, and a "Password Forget" plugin, but when a
>>>>>> bot behaves like a user, it's hard to block without
>>>>>> inconveniencing the user. :-\
>>>>> Yes that was my take as well, it really looks like a user using
>>>>> webmail but when I go through my AOL mail loop messages they show
>>>>> headers such as:
>>>>>
>>>>> from 81.199.179.36 (proxying for 10.250.50.255)
>>>>> (SquirrelMail authenticated user exploiteduser)        by
>>>>> webmail.terraworld.net with HTTP;        Thu, 4 Oct 2007 18:57:06
>>>>> -0500 (CDT)
>>>>>
>>>>> IP Addresses from AOL mail loop:
>>>>> 196.1.179.183
>>>>> 78.138.2.196
>>>>> 41.219.220.2
>>>>> 81.199.179.36
>>>>> 84.254.188.2
>>>>> 88.202.124.6
>>>>>
>>>>> Where the IP address connecting as user "exploiteduser" varies
>>>>> widely, and the attached message is always the same 'lottry'
>>>>> phishing scam. I suppose it's possible that it's coming from the
>>>>> users' PC (they are on dialup after all), but the IP addresses
>>>>> vary so widely that I seriously doubt that it's one PC. The list
>>>>> is relatively short because I would expect most of the botnet to
>>>>> be listed on RBL's, and my web server blocks based on RBL
>>>>> lookups.
>>>>>
>>>>>   - Nick
>>>>>
>>>>>> Ken
>>>>>>
>>>>>>
>>>>>>>  - Nick
>>>>>>>
>>>>>>>> Ken
>>>>>>>>
>>>>>>>>
>>>>>>>>> Nobody can reasonably expect an ISP to keep every single
>>>>>>>>> users' PC
>>>>> clean
>>>>>>>>> of trashware constantly, so accordingly there needs to be
>>>>>>>>> some way to mitigate the impact of this type of issue at the
>>>>>>>>> common point - the SquirrelMail installation. It doesn't seem
>>>>>>>>> to me like this is a bug or a security vulnerability in SM
>>>>>>>>> since a valid users' password was compromised, but is there
>>>>>>>>> any way to mitigate this type of thing?
>>>>>>>>>
>>>>>>>>> I would appreciate any feedback regarding this topic and
>>>>>>>>> methods of mitigating damage done by compromised accounts. I
>>>>>>>>> will also answer any questions that may help develop a method
>>>>>>>>> of mitigation.
>>>>>>>>>
>>>>>>>>> - Nick Bright

Why do you full quote?

Viele Gruesse!
Helmut

-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
--
squirrelmail-users mailing list
Posting Guidelines: http://www.squirrelmail.org/wiki/MailingListPostingGuidelines
List Address: squirrelmail-users@xxxxxxxxxxxxxxxxxxxxx
List Archives: http://news.gmane.org/thread.php?group=gmane.mail.squirrelmail.user
List Archives:  http://sourceforge.net/mailarchive/forum.php?forum_id=2995
List Info: https://lists.sourceforge.net/lists/listinfo/squirrelmail-users

[Index of Archives]     [Video For Linux]     [Yosemite News]     [Yosemite Photos]     [gtk]     [KDE]     [Cyrus SASL]     [Gimp on Windows]     [Steve's Art]     [Webcams]

  Powered by Linux