RJM62
Touchdown! Greaser!
- Joined
- Jun 15, 2007
- Messages
- 13,157
- Location
- Upstate New York
- Display Name
Display name:
Geek on the Hill
They were many different addresses, almost all of which were addressed to muiltiple recipients. All of the senders and recipients were in [many domains].tw or hinet.net.
I got in touch with the senior sysadmin at the hosting company, and he believes that the attacks actually started before I assumed possession of the IP addresses on December 31. Apparently the previous user of the IPs on the VPS had an open relay, and every spammer in Taiwan was using it. (This is the second time in a month that I inherited the problems of the previous user of an IP; the first was on another server when I was assigned an IP that had been used by a spammer who had been blacklisted by EVERYONE.)
As far as I can determine, when I set up the VPS, I changed the hostname from the hosting company's temporary one to one of my own domains, which borked the cPanel license, which wouldn't reactivate because of a firewall issue, which was mishandled by VPS support. (In fairness, mirrored systems are usually handled by dedicated support, so he didn't know that the firewalling was done differently. He was just trying to expeditiously correct the problem.)
Once I got cPanel back, I hardened the Exim configuration and did a few other security-related tweaks, but the result was that Exim and spamd were now consuming vast resources trapping the spam, which should have gotten that far to begin with. Classic "error chain" sort of thing.
In any case, I contacted the sysadmin this morning, and he looked at the setup and made a few tweaks; and everything seems fine now except for lfd, which keeps crashing and beeping me. That will probably be corrected by a system reboot later on.
Just to make things interesting, however, once the system was secured, there were also a series of successive failed SSH logins from an IP address in India. I don't know if there is any relation...
-Rich
I got in touch with the senior sysadmin at the hosting company, and he believes that the attacks actually started before I assumed possession of the IP addresses on December 31. Apparently the previous user of the IPs on the VPS had an open relay, and every spammer in Taiwan was using it. (This is the second time in a month that I inherited the problems of the previous user of an IP; the first was on another server when I was assigned an IP that had been used by a spammer who had been blacklisted by EVERYONE.)
As far as I can determine, when I set up the VPS, I changed the hostname from the hosting company's temporary one to one of my own domains, which borked the cPanel license, which wouldn't reactivate because of a firewall issue, which was mishandled by VPS support. (In fairness, mirrored systems are usually handled by dedicated support, so he didn't know that the firewalling was done differently. He was just trying to expeditiously correct the problem.)
Once I got cPanel back, I hardened the Exim configuration and did a few other security-related tweaks, but the result was that Exim and spamd were now consuming vast resources trapping the spam, which should have gotten that far to begin with. Classic "error chain" sort of thing.
In any case, I contacted the sysadmin this morning, and he looked at the setup and made a few tweaks; and everything seems fine now except for lfd, which keeps crashing and beeping me. That will probably be corrected by a system reboot later on.
Just to make things interesting, however, once the system was secured, there were also a series of successive failed SSH logins from an IP address in India. I don't know if there is any relation...
-Rich