export PKG_PATH=http://ftp.OpenBSD.org/pub/OpenBSD/`uname -r`/packages/`uname -m`/
pkg_add git
cd /var
git clone git://github.com/dagn/mailserv.git
cd /var/mailserv/install
./install.sh --devel
(install with php5.3, myslq 5.3)
[17-Jan-2013 15:59:10] NOTICE: fpm is running, pid 22008[17-Jan-2013 15:59:10] NOTICE: ready to handle connections[17-Jan-2013 15:59:28] ERROR: unable to bind listening socket for address '127.0.0.1:9000': Address already in use (48)[17-Jan-2013 15:59:28] ERROR: FPM initialization failed[17-Jan-2013 15:59:48] ERROR: unable to bind listening socket for address '127.0.0.1:9000': Address already in use (48)[17-Jan-2013 15:59:48] ERROR: FPM initialization failed
--
You received this message because you are subscribed to the Google Groups "mailserv" group.
To unsubscribe from this group and stop receiving emails from it, send an email to mailserv+u...@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
--
Marcus
I'm running OpenBSD/FreeBSD/Ubuntu/Centos with a very small scale on my own webhosting.Now I got a problem of mail system HACK possibly some scripts on my cms files systems which I found later and removed.but I'm not sure for 100%. The issue is:I'm getting mass mails with forged user account which i do not have on user database with my @domain.com!These mails get naturally rejcted and goes as Bounced, this makes as many as hundreds of emails per Minute from the mailserv through my ISP which blocks my outgoing connections of Internet!
But I would like to know as howto: not to bounce all rejected mails, instead redirecting to spam/trash directory etc. with this, I'm dead sure that not a single spam mail is slipping through my mailserv!
I got a feedback from my isp support saying that mails were sent throgh a link which was a "adu8.html" text file in my WP Theme) files folder.The contents are: in metata tags has link to
a webpage and then on Body Tag<body>loading... </body>Beyond that, I found much more with "index.php, wp-xxx.php" etc text files!I had only 3 users in my blog, but i'm suspecting one user ( a WP prof) who accessed it had put these files on the system, because directly after his login dates occured this mass ( massive!) mail user generating and sending phenomen.Now I have corrected the file permision accordingly which was also not correctly inserted.I cant't analyse these php scripts, but it'll be absolutely interesting for the mailserv developmet team!If you are interested, I'll zip it and send these files for security analysis.
I've had a quick look into the nginx issue. It's not quite as simple as switching /usr/local/sbin/nginx to /usr/sbin/nginx (what's in my devel fork right now) because the built-in nginx runs chrooted, so we need to have a think about the paths and where things are installed. It may be fixable with few symlinks.
Marcus
Now I have removed thos scripts but the lesson I learned here is: there is no chance against from users adding malware in to their files which activates such actions!
Are intersed to see these script?
Is there any possibility in the mailserv system to stop sending non user account ( which sre not in the mailserv-database ), i.e.: ESMTP or similar way?What I would like to know is also, to authentify before sending emails etc.
--