*BSDThis forum is for the discussion of all BSD variants.
FreeBSD, OpenBSD, NetBSD, etc.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I'm not sure if this is a problem I can fix or not, but it appears that someone is able to spam through some of the general email addresses on my FreeBSD server. I received an email from the webmaster@mydomain.com, saying basically that my account was going to be suspended, etc... No one else would be using this account, but I have noticed the problem with other general accounts such as sales@mydomain.com, support@mydomain.com, etc... The emails are all bogus and come with attachments that have supposedly been scanned by a bogus virus company. Any suggestions to track down the problem and/or fix it would be appreciated. I am running FreeBSD 4.9 with SpamAssassin for spam filtering.
Which MTA are you using: sendmail, postfix, qmail? In short, you need to make sure that no one from inside your network is using your network to spam, but mor important, you need to see to it that no one can relay messages through your site. A google search will give way more information that you care to read on how to solve this situation.
Sorry, I am running exim 4.X. I have inherited most of the configuration done on this server from the previous admin, so I am learning most of these things for the first time. In the config file for the exim, it has a line for the "hostlist relay_from_hosts" that contains the ip addresses of our customers, plus it also contains "*.def.com" and "def.com". Would these two entries cause the spoofing/relaying problem, that was mentioned before? The way I would understand it, is that those last two entries would allow anyone who says they are *@def.com to send mail through our server. Is this correct or am I barking up the wrong tree?
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.