Exchange Server Sending Spam.... Need assistance
DNS Black list, i.e. organizations that list your server as being bad and therefore others that pull information from those black list will not allow your email be sent to their systems. here is some additional info http://en.wikipedia.org/wiki/DNSBL You mentioned early on that "you contacted the admins of some of these offending IPs and they are infected machines" and that you disconnected them. Where were these machines located? If you have stopped the problems machines from spamming on your network then you can see what list you are on use this site http://www.mxtoolbox.com/blacklists.aspx and then depending upon who's list your on you can write an email to the appropriate party to tell them what you did to overcome the problem and then beg forgiveness. Be prepared to be chastised by them since that seems to be par for the course, just bite be sincere with your apology and usually sometime within 24-72 hours they will de-list you. NOTE: if you have not taken care of all the offending machines do so before you contact the list holders, else they will not have mercy upon you and instead will rip you up one side and down the other...Troy Werelius www.Lucid8.com Search, Recover, & Extract Mailboxes, Folders, & Email Items from Offline EDB's and Live Exchange Servers with Lucid8's DigiScope
January 10th, 2012 3:43am

On Tue, 10 Jan 2012 00:07:15 +0000, HankVatJr wrote: >The offending IPs are not within our small network. Okay, so no tell us how your machine is sending the spam. Is it because you don't do recipient filtering and your server is accepting e-mail it can't deliver and then sending a NDR to the (forged) e-mail address of the sender? If that's the case, enable recipient filtering and stop accepting e-mail you can't deliver. >I have changed all users passwords, What about passwords that don't belng to "users"? Postmaster, webmaster, hostmaster, admin, administrator, IWAM_<server>, IUSR_<server>, ASPNET, etc. Is the guest account enabled? If you think the spammers are using AUTH then jack up the diagnostics logging level on the MSExchangeTransport object's "SMTP protocol" and "Authentication" categories. That'll log authentication in the application log (the SMTP protocol log should also be logging those AUTH command *and* the base64-encoded user and password they're using). >swept the entire network for virus infection Well, if the stuff is coming from outside your organization that's not a bad thing to do, but it's not going to help. >and ran several tests to determine if we are an open relay (no). Did those tests try AUTH with common attack vectors? >I would like to set it up so only our users can send mail through the server. I dont know quite how to do this but is it a good idea? No, it's not -- if by "send mail" you mean "user POP/IMAP clients". Use RPC-over-HTTPS from Outlook or OWA. Drop the ability for anyone outside your own LAN to use your server as a SMTP relay. --- Rich Matheisen MCSE+I, Exchange MVP --- Rich Matheisen MCSE+I, Exchange MVP
Free Windows Admin Tool Kit Click here and download it now
January 10th, 2012 7:42am

Hi, You can post this thread to SBS forum to get more: http://social.technet.microsoft.com/Forums/en-US/smallbusinessserver/threads Hope it helps. ThanksSophia Xu TechNet Community Support
January 16th, 2012 11:32am

Have an exchange server running on SBS 2003. We have had an issue with spam being sent from this server. It is always from different IP Addresses. I have contacted the admins of some of these offending IPs and they are infected machines. I have blocked their connections on a one-by-one basis but this is a recurring problem. What can I do to stop this from happening. We are getting gray and blacklisted because of this problem. Really stuck here..... Late to the party, yet hope to be of some help; start by ensuring that your server is only allowing relay to authenticated connections, proceed by forcing a password reset for ALL your user accounts (enforce the password complexity rules to avoid short or too simple passwords); done that, check that your server isn't an open relay by using this online tool (just enter your server IP or name and click the "test" button) and, in case the checks fail, proceed fixing the configuration; done that, go on reading here and here (including the links found at both URLs) and configuring the exchange spam filter to reject junk messages; once completed, check if the problem is solved, if not, enable the SMTP full logging and look at the generated logfiles to see "how" those external IPs are able to relay through your server (in case of doubt, feel free to post log snippets here - use the "insert code block" button to do so, please); if all ok, open this site, enter your IP address and check if your IP is blacklisted and, if so, proceed removing it from the relevant blacklists (notice that, as already suggested, this should be the LAST step and you must ensure that you solved the issue BEFORE attempting to remove your IP from blacklists)
Free Windows Admin Tool Kit Click here and download it now
January 28th, 2012 10:43am

Have an exchange server running on SBS 2003. We have had an issue with spam being sent from this server. It is always from different IP Addresses. I have contacted the admins of some of these offending IPs and they are infected machines. I have blocked their connections on a one-by-one basis but this is a recurring problem. What can I do to stop this from happening. We are getting gray and blacklisted because of this problem. Really stuck here.....
January 28th, 2012 11:34am

Deploy AV on the client machines. Deploy AV/AS product on your exch server (SBS). Sukh
Free Windows Admin Tool Kit Click here and download it now
January 28th, 2012 1:27pm

Sukh provided you some excellent information and for the client machines Microsoft Security Essentials works great and its free! You may also want to; 1. Change the passwords for all users since they may be compromised 2. Check to ensure your exchange server is not set as an open relay http://support.microsoft.com/kb/324958 Troy Werelius www.Lucid8.com Search, Recover, & Extract Mailboxes, Folders, & Email Items from Offline EDB's and Live Exchange Servers with Lucid8's DigiScope
January 28th, 2012 2:29pm

On Mon, 9 Jan 2012 16:21:44 +0000, HankVatJr wrote: >Have an exchange server running on SBS 2003. We have had an issue with spam being sent from this server. It is always from different IP Addresses. I have contacted the admins of some of these offending IPs and they are infected machines. I have blocked their connections on a one-by-one basis but this is a recurring problem. Are those IP address in YOUR network? The way that you describe the problem makes it sound as if you're accepting e-mail sent to addresses that don't exist in your directory. YOu shuld be able to fix that pretty easily by enabling recipient filtering and refusing to accept e-mail you can't deliver to local mailboxes. Of course, this being SBS, there's probably some sort of wizard that you'll have to use rather than the Exchange System Manager -- so you should move your question to the SBS forum whenre you should get an suitable answer for your environment. >What can I do to stop this from happening. We are getting gray and blacklisted because of this problem. If you're not already using any DNSBLs (I'm not a big fan of them), consider using one or two. Again, asking how to do this in the SBS forum would get you a more accurate answer. If you're not using the Exchange Intelligent Mail Filter, enable it. Again, asking in the SBS forum for instruction rather than using the ESM and risking causing problems that a "wizard" would know how to avoid. --- Rich Matheisen MCSE+I, Exchange MVP --- Rich Matheisen MCSE+I, Exchange MVP
Free Windows Admin Tool Kit Click here and download it now
January 28th, 2012 6:03pm

Thanks, The offending IPs are not within our small network. I have changed all users passwords, swept the entire network for virus infection and ran several tests to determine if we are an open relay (no). I would like to set it up so only our users can send mail through the server. I dont know quite how to do this but is it a good idea?
January 28th, 2012 7:20pm

I have done both of these recently and has not made a difference. (not an open relay)
Free Windows Admin Tool Kit Click here and download it now
January 28th, 2012 7:20pm

This deployment has been done and all is infection free
January 28th, 2012 7:21pm

Whate are DNSBLs?
Free Windows Admin Tool Kit Click here and download it now
January 28th, 2012 7:29pm

DNS Black list, i.e. organizations that list your server as being bad and therefore others that pull information from those black list will not allow your email be sent to their systems. here is some additional info http://en.wikipedia.org/wiki/DNSBL You mentioned early on that "you contacted the admins of some of these offending IPs and they are infected machines" and that you disconnected them. Where were these machines located? If you have stopped the problems machines from spamming on your network then you can see what list you are on use this site http://www.mxtoolbox.com/blacklists.aspx and then depending upon who's list your on you can write an email to the appropriate party to tell them what you did to overcome the problem and then beg forgiveness. Be prepared to be chastised by them since that seems to be par for the course, just bite be sincere with your apology and usually sometime within 24-72 hours they will de-list you. NOTE: if you have not taken care of all the offending machines do so before you contact the list holders, else they will not have mercy upon you and instead will rip you up one side and down the other...Troy Werelius www.Lucid8.com Search, Recover, & Extract Mailboxes, Folders, & Email Items from Offline EDB's and Live Exchange Servers with Lucid8's DigiScope
January 28th, 2012 7:55pm

On Tue, 10 Jan 2012 00:07:15 +0000, HankVatJr wrote: >The offending IPs are not within our small network. Okay, so no tell us how your machine is sending the spam. Is it because you don't do recipient filtering and your server is accepting e-mail it can't deliver and then sending a NDR to the (forged) e-mail address of the sender? If that's the case, enable recipient filtering and stop accepting e-mail you can't deliver. >I have changed all users passwords, What about passwords that don't belng to "users"? Postmaster, webmaster, hostmaster, admin, administrator, IWAM_<server>, IUSR_<server>, ASPNET, etc. Is the guest account enabled? If you think the spammers are using AUTH then jack up the diagnostics logging level on the MSExchangeTransport object's "SMTP protocol" and "Authentication" categories. That'll log authentication in the application log (the SMTP protocol log should also be logging those AUTH command *and* the base64-encoded user and password they're using). >swept the entire network for virus infection Well, if the stuff is coming from outside your organization that's not a bad thing to do, but it's not going to help. >and ran several tests to determine if we are an open relay (no). Did those tests try AUTH with common attack vectors? >I would like to set it up so only our users can send mail through the server. I dont know quite how to do this but is it a good idea? No, it's not -- if by "send mail" you mean "user POP/IMAP clients". Use RPC-over-HTTPS from Outlook or OWA. Drop the ability for anyone outside your own LAN to use your server as a SMTP relay. --- Rich Matheisen MCSE+I, Exchange MVP --- Rich Matheisen MCSE+I, Exchange MVP
Free Windows Admin Tool Kit Click here and download it now
January 28th, 2012 11:55pm

Hi, You can post this thread to SBS forum to get more: http://social.technet.microsoft.com/Forums/en-US/smallbusinessserver/threads Hope it helps. ThanksSophia Xu TechNet Community Support
January 29th, 2012 3:43am

Cab you give an example of a message which is sent out? Can you show the from and to headers?Sukh
Free Windows Admin Tool Kit Click here and download it now
January 29th, 2012 4:43am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics