Community Discussions and Support
MercuryS. Which username used for Authentication?

Your session log should show something like:

[quote]

FOR CRAM-MD5

13:48:28.243: >> EHLO [192.168.0.3]<cr><lf>
13:48:28.246: << 250-mail.mydomain Hello [192.168.0.3]; ESMTPs are:<cr><lf>250-TIME<cr><lf>
13:48:28.249: << 250-AUTH CRAM-MD5 LOGIN<cr><lf>
13:48:28.251: << 250-AUTH=LOGIN<cr><lf>
13:48:28.253: << 250 HELP<cr><lf>
13:48:28.265: >> AUTH CRAM-MD5<cr><lf>
13:48:28.268: << 334 -munged challenge hash-<cr><lf>
13:48:28.282: >> -munged response hash-<cr><lf>      << Base64 decode this line to get the username + morehash
13:48:28.282: << 235 Authentication successful.<cr><lf>
13:48:28.295: >> MAIL FROM:<user@mydomain><cr><lf>

 

FOR FOR AUTH=LOGIN

14:08:19.268: >> AUTH LOGIN<cr><lf>
14:08:19.275: << 334 VXNlcm5hbWU6<cr><lf>
14:08:19.369: >> -munged base64 username<cr><lf>
14:08:19.369: << 334 UGFzc3dvcmQ6<cr><lf>
14:08:20.461: >> munged base64 password<cr><lf>
14:08:20.461: << 235 Authentication successful.<cr><lf>

 [/quote]

If you get no AUTH lines in your session log, then Thomas is right, and you are a (partially) open relay  [:O]

&lt;p&gt;Your session log should show something like:&lt;/p&gt;&lt;p&gt;[quote]&lt;/p&gt;&lt;p&gt;&lt;b&gt;FOR CRAM-MD5&lt;/b&gt; &lt;/p&gt;&lt;p&gt;13:48:28.243: &amp;gt;&amp;gt; EHLO [192.168.0.3]&amp;lt;cr&amp;gt;&amp;lt;lf&amp;gt; 13:48:28.246: &amp;lt;&amp;lt; 250-mail.mydomain Hello [192.168.0.3]; ESMTPs are:&amp;lt;cr&amp;gt;&amp;lt;lf&amp;gt;250-TIME&amp;lt;cr&amp;gt;&amp;lt;lf&amp;gt; 13:48:28.249: &amp;lt;&amp;lt; 250-AUTH CRAM-MD5 LOGIN&amp;lt;cr&amp;gt;&amp;lt;lf&amp;gt; 13:48:28.251: &amp;lt;&amp;lt; 250-AUTH=LOGIN&amp;lt;cr&amp;gt;&amp;lt;lf&amp;gt; 13:48:28.253: &amp;lt;&amp;lt; 250 HELP&amp;lt;cr&amp;gt;&amp;lt;lf&amp;gt; 13:48:28.265: &amp;gt;&amp;gt; AUTH CRAM-MD5&amp;lt;cr&amp;gt;&amp;lt;lf&amp;gt; 13:48:28.268: &amp;lt;&amp;lt; 334 -munged challenge hash-&amp;lt;cr&amp;gt;&amp;lt;lf&amp;gt; 13:48:28.282: &amp;gt;&amp;gt; -munged response hash-&amp;lt;cr&amp;gt;&amp;lt;lf&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;&amp;lt;&amp;lt; Base64 decode this line to get the username + morehash&lt;/b&gt; 13:48:28.282: &amp;lt;&amp;lt; 235 Authentication successful.&amp;lt;cr&amp;gt;&amp;lt;lf&amp;gt; 13:48:28.295: &amp;gt;&amp;gt; MAIL FROM:&amp;lt;user@mydomain&amp;gt;&amp;lt;cr&amp;gt;&amp;lt;lf&amp;gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;b&gt;FOR FOR AUTH=LOGIN&lt;/b&gt;&lt;/p&gt;&lt;p&gt;14:08:19.268: &amp;gt;&amp;gt; AUTH LOGIN&amp;lt;cr&amp;gt;&amp;lt;lf&amp;gt; 14:08:19.275: &amp;lt;&amp;lt; 334 VXNlcm5hbWU6&amp;lt;cr&amp;gt;&amp;lt;lf&amp;gt; 14:08:19.369: &amp;gt;&amp;gt; -munged base64 username&amp;lt;cr&amp;gt;&amp;lt;lf&amp;gt; 14:08:19.369: &amp;lt;&amp;lt; 334 UGFzc3dvcmQ6&amp;lt;cr&amp;gt;&amp;lt;lf&amp;gt; 14:08:20.461: &amp;gt;&amp;gt; munged base64 password&amp;lt;cr&amp;gt;&amp;lt;lf&amp;gt; 14:08:20.461: &amp;lt;&amp;lt; 235 Authentication successful.&amp;lt;cr&amp;gt;&amp;lt;lf&amp;gt; &amp;nbsp;[/quote]&lt;/p&gt;&lt;p&gt;If you get no AUTH lines in your session log, then Thomas is right, and you are a (partially) open relay &amp;nbsp;[:O]&lt;/p&gt;

Hi,

 Under my MercuryS Connection Control. I checked

- Authenticated SMTP connections may relay mail
- Only Authenticated SMTP connections may relay mail.

So, every users need to have a correct username/password pair before able to relay a mail.

I have been using this setting for 2 years.Recently I noticed something strange.

My MercuryS accepted relaying coming from an unknown ip address sending junk to multiple email address.
- the from email address is admin@mydomain.com
- the to email address consist of multiple unknown email addresses.
- the connection from ip address is different every time.

My guess is that one of my client notebook connecting to my server is infected with a virus or something.
Is there a way to find out which username/password was used for authentication since MercuryS allowed it to relay?
So, I can quickly identify the culprit user and I dun think it is admin@mydomain.com

&lt;P&gt;Hi,&lt;/P&gt; &lt;P&gt;&amp;nbsp;Under my MercuryS Connection Control. I checked&lt;/P&gt; &lt;P&gt;- Authenticated SMTP connections may relay mail - Only Authenticated SMTP connections may relay mail. So, every users need to have a correct username/password pair before able to relay a mail.&lt;/P&gt; &lt;P&gt;I have been using this setting for 2 years.Recently I noticed something strange. My MercuryS &lt;U&gt;accepted&lt;/U&gt; relaying coming from an unknown ip address sending junk to multiple email address. - the from email address is &lt;A href=&quot;mailto:admin@mydomain.com&quot;&gt;admin@mydomain.com&lt;/A&gt; - the to email address consist of multiple unknown email addresses. - the connection from ip address is different every time. My guess is that one of my client notebook connecting to my server is infected with a virus or something. Is there a way to find out which username/password was used for authentication since MercuryS allowed it to relay? So, I can quickly identify the culprit user and I dun think it is &lt;A href=&quot;mailto:admin@mydomain.com&quot;&gt;admin@mydomain.com&lt;/A&gt; &lt;/P&gt;

A mercS session log should tell you.

Could be any user/pass combo in your smtp auth file.

Maybe a brute force / dictionary attack has succeeded, and the info been passed to the bots. [8o|] 

FWIW I have some transflt.mer rules that reject (and blacklist) any attempts to send mail from admin@mydomain, postmaster or any other local-only (or static ip) addresses. The local & static ranges/ip's are exempted from trans filtering.

[quote]

M, "*admin@mydomain*", BS, "554 Fraudulent MAIL FROM"

[/quote]
 

&lt;p&gt;A mercS session log should tell you.&lt;/p&gt;&lt;p&gt;Could be any user/pass combo in your smtp auth file.&lt;/p&gt;&lt;p&gt;Maybe a brute force / dictionary attack has succeeded, and the info been passed to the bots. [8o|]&amp;nbsp;&lt;/p&gt;&lt;p&gt;FWIW I have some transflt.mer rules that reject (and blacklist) any attempts to send mail from admin@mydomain, postmaster or any other local-only (or static ip) addresses. The local &amp;amp; static ranges/ip&#039;s are exempted from trans filtering. &lt;/p&gt;&lt;p&gt;[quote]&lt;/p&gt;&lt;p&gt;M, &quot;*admin@mydomain*&quot;, BS, &quot;554 Fraudulent MAIL FROM&quot;&lt;/p&gt;&lt;p&gt;[/quote] &amp;nbsp;&lt;/p&gt;

[quote user="kb1811"]

Hi,

 Under my MercuryS Connection Control. I checked

- Authenticated SMTP connections may relay mail
- Only Authenticated SMTP connections may relay mail.

So, every users need to have a correct username/password pair before able to relay a mail.

I have been using this setting for 2 years.Recently I noticed something strange.

My MercuryS accepted relaying coming from an unknown ip address sending junk to multiple email address.
- the from email address is admin@mydomain.com
- the to email address consist of multiple unknown email addresses.
- the connection from ip address is different every time.

My guess is that one of my client notebook connecting to my server is infected with a virus or something.
Is there a way to find out which username/password was used for authentication since MercuryS allowed it to relay?
So, I can quickly identify the culprit user and I dun think it is admin@mydomain.com

[/quote]

 This almost looks like relaying is either not turn off or strict is not set.  Verify that the top two options about strict and relay are in fact checked and not just greyed out.


 

[quote user=&quot;kb1811&quot;]&lt;p&gt;Hi,&lt;/p&gt; &lt;p&gt;&amp;nbsp;Under my MercuryS Connection Control. I checked&lt;/p&gt; &lt;p&gt;- Authenticated SMTP connections may relay mail - Only Authenticated SMTP connections may relay mail. So, every users need to have a correct username/password pair before able to relay a mail.&lt;/p&gt; &lt;p&gt;I have been using this setting for 2 years.Recently I noticed something strange. My MercuryS &lt;u&gt;accepted&lt;/u&gt; relaying coming from an unknown ip address sending junk to multiple email address. - the from email address is &lt;a href=&quot;mailto:admin@mydomain.com&quot; mce_href=&quot;mailto:admin@mydomain.com&quot;&gt;admin@mydomain.com&lt;/a&gt; - the to email address consist of multiple unknown email addresses. - the connection from ip address is different every time. My guess is that one of my client notebook connecting to my server is infected with a virus or something. Is there a way to find out which username/password was used for authentication since MercuryS allowed it to relay? So, I can quickly identify the culprit user and I dun think it is &lt;a href=&quot;mailto:admin@mydomain.com&quot; mce_href=&quot;mailto:admin@mydomain.com&quot;&gt;admin@mydomain.com&lt;/a&gt; &lt;/p&gt;&lt;p&gt;[/quote]&lt;/p&gt;&lt;p&gt;&amp;nbsp;This almost looks like relaying is either not turn off or strict is not set.&amp;nbsp; Verify that the top two options about strict and relay are in fact checked and not just greyed out.&lt;/p&gt;&lt;p&gt; &amp;nbsp;&lt;/p&gt;

Dil, Session logging do not show which user/pass used. I will try the trans filter.

Thomas, strange but worth a try.

Thanks.

&lt;P&gt;Dil, Session logging do not show which user/pass used. I will try the trans filter. Thomas, strange but worth a try.&lt;/P&gt; &lt;P&gt;Thanks.&lt;/P&gt;
live preview
enter atleast 10 characters
WARNING: You mentioned %MENTIONS%, but they cannot see this message and will not be notified
Saving...
Saved
With selected deselect posts show selected posts
All posts under this topic will be deleted ?
Pending draft ... Click to resume editing
Discard draft