TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: Help with spam "originating" from my website

9 点作者 sendos超过 11 年前
Several spammers are sending email from fake email addresses from my domain (e.g. bob@mydomain.com, where bob is not a valid email address).<p>Not sure if they are 1) Sending them from other computers and just spoofing the headers to make it appear that it&#x27;s from bob@mydomain.com<p>or<p>2) Somehow hacked into my VPS and sending them from my actual server.<p>Below are some emails I get from websites that bounce the spam that is being sent: http:&#x2F;&#x2F;pastebin.com&#x2F;Tb4Th8kM<p>The two problems that arise from this are that my mail folder gets full from all the bounced email, and also that my domain is now on several spam lists and I can&#x27;t send email from any legitimate address on my domain.<p>Can you guys help with suggestions on how I can go about: a) Determining whether (1) or (2) above is happening b) Stopping it if possible c) If not possible to do (b), at least minimize the damage<p>Thanks

3 条评论

cheald超过 11 年前
First, look at the headers to see where the message originated. If it didn&#x27;t originate from your VPS or mail server, you&#x27;re probably okay.<p>You should google and implement SPF and DKIM for your domain. SPF is just a DNS change that says what hosts are allowed to send email for your domain, and DKIM is a DNS + mailserver change that will sign legit outbound email with a key that MTAs can verify to make sure that the email is legit (and bounce it if it&#x27;s not). That will stop the vast majority of fraudulent email in its tracks.<p>Looking at the email you provided:<p><pre><code> Received: from __MY_USERNAME__ by __MY_WEBSITE__.com with local (Exim 4.80.1) X-PHP-Script: __MY_WEBSITE__.com&#x2F; for 127.0.0.1 </code></pre> I&#x27;d bet good money that you have a compromised or vulnerable mailer script on your machine somewhere and it&#x27;s being exploited in an automated fashion. Check all of your mailers for known vulnerabilities and patches.<p>It may be wise to assume that the box is compromised, save your known good data and code, torch the whole thing and rebuild it piece by piece, validating the pieces as you go. That&#x27;s extreme, but when dealing with a potential machine breach, you can&#x27;t really ever be sure that you&#x27;re clean without nuking it from orbit.
评论 #6828733 未加载
gus_massa超过 11 年前
How does the headers of a real massage (from your server) looks like? It’s strange that the bounced messages in Pastebin only have one “Received” header, without IP information.<p>I just looked at the last message I got and it has 10 headers with Received, X-Received or Received-SPF, with a lot of IP information.<p>If they are spoofing the email, then “DomainKeys Identified Mail (DKIM)” may help <a href="http://www.dkim.org/" rel="nofollow">http:&#x2F;&#x2F;www.dkim.org&#x2F;</a> . I never deployed it to a server, so you must seek advice from someone with real word experience.
ijl超过 11 年前
You should implement at least Sender Policy Framework to endorse only email from your own servers. Better yet implement DomainKeys Identified Mail.