Hello.
We've a standard node for web hosting with a linked mail node. From one of the distributed mail accounts some spammer is using standard node SMTP in order to send spam. We've changed passwords and restarted Exim and Dovecot but immediately continues sending.
As their are using standard node SMTP directly I think the problem could be password change is not applied to standard node SMTP, only in the linked mail node. Could it be?
I'm thinking this because /home/%user%/etc/%domain%/shadow are different between servers. Not only the hash, ase there are lines in the file for new accounts created after distribution that are in the linked mail node but not in the standard, and this make me think about an unmantained file open for spammers.
Any thought? It's safe to delete shadow file in the standard node?
We've a standard node for web hosting with a linked mail node. From one of the distributed mail accounts some spammer is using standard node SMTP in order to send spam. We've changed passwords and restarted Exim and Dovecot but immediately continues sending.
As their are using standard node SMTP directly I think the problem could be password change is not applied to standard node SMTP, only in the linked mail node. Could it be?
I'm thinking this because /home/%user%/etc/%domain%/shadow are different between servers. Not only the hash, ase there are lines in the file for new accounts created after distribution that are in the linked mail node but not in the standard, and this make me think about an unmantained file open for spammers.
Any thought? It's safe to delete shadow file in the standard node?
Last edited: