Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Mike Lewis on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Queue grotth out of hand

Status
Not open for further replies.

jbozman

IS-IT--Management
Jan 4, 2007
3
0
0
US
I'm running Exch. 2003. and over the past 2 month, the queue folder size and in min. is up to 1432. There are alot of emails that when opened mostly say "undeliverable". Some I can delete if there there for days, but a bunch of them I can't delte. It give me the old "file is in use" message.
I'm pretty new to this so any help is grealty appreceated.
 
Is your exchange hit by spam? Because its not usual to so many undelivered messages. You can delete these in bad mail folder, under your exchange server folder.
 
Here is a copy of an email I sent to my IT staff when I arrived at my job. We had the same issues and our ESM queues were just like yours...... Too bad i couldnt get the screen shots in here too.....hope it helps.....




During my relentless battle with Mail Security, I keep stumbling upon more things to check on the exchange server side. Today I came across a few things, which I will describe here:



RBL’s:



Known as real-time blacklists. These are databases maintained to keep a list of known spammers, by ip addresses, DNS, etc. These lists are then distributed either though a subscription service or some are even offered by open-source. Symantec suggested a few ones to check out.



In email security, under policies, then under anti-spam, there is an option for whitelist-blacklist. Here, for whitelist, you can enter in email addresses that will bypass our SCL (spam confidence level) heuristic detection. Blacklist, which I originally though was where you entered in email addresses of people you want to block, is actually not for that. In here is where you enter in a DNS record to connect to an open-source RBL. This adds a huge layer of security because it checks all incoming mail against huge databases maintained by SpamCops.



However today on the phone with Symantec, they said that RBL’s are not working in our version 5.0.3. A new 5.0.4 is due next month and they hope to fix that. However, I found a MS technote describing how to add these RBL DNSBL dns entries directly in exchange.



In exchange system manager, go to global settings, then message delivery, right click, properties, and click on message filtering tab.





When you add a new one, you just name the rule, and enter in the dns entry. (sbl-xbl.spamhaus.org, dnsbl.sorbs.net, etc…) Feel free to check these website out to learn more. Spamhaus.net --sorbs.net.



Since adding these, I’ve seen quite a change in our Symantec event logs.







NDR and Open-Relay



Open Relay is a setting and configuration setup done on exchange servers. It allows your mail servers to send mail for anyone, anywhere, at any time. If this is enabled, obviously spammers can you us to send spam. From what I can tell we are not configured as open-relay, which is good. There is one final test tonight I need to try from home to ensure.



We are, however, victims of a NDR attack. NDR stands for non-delivery report. Spammers send email to bogus accounts on our end. Exchange, by default, accepts all SMTP connections in good faith, and when it realizes that the account does no exist, will send a non-delivery report, along with the original message and attachments, back to the sender. However, spammers are smart enough to spoof their email addresses so that when mail gets bounced back, it doesn’t go to them but yet it goes to another spam victim, but FROM OUR SYSTEM AND POSTMASTER account. The screenshot below is the mail queue from chmail, and its listing all of the bounce emails that its trying to send out. Not good….











I found another article describing how to filter out Non-existent Users where exchange will filter messages if the email address doesn’t exist in active directory. This is stop spammers from sending messages to non-valid addressed, and in turn, cease the bogus mail queues. In system Mgr, right click on msg delivery, properties, then the recipient filtering tab. Enable the checkbox “filter recipients who are not in the directory”.







You then need to enable the Recipient Filter on the SMTP Server.

Still in ESM, Expand Admin Groups, <your admin groups>, Server, <your server>, Protocols, SMTP.
Right click on SMTP Virtual Server and choose Properties.
Click on "Advanced" next to the IP address on the first tab.



With the IP address selected, choose "Edit".



Enable "Apply Recipient Filter".



Click Apply/OK until clear.




The only downside to any of what I did today is that this last feature makes your server vulnerable to directory harvest attacks - which is where the attacker sends commands to your server to find valid addresses. This can be avoided by using a feature known as tar pitting, which slows down the response of your server to these commands making it unviable for the attacker to scan your server.

Tar pitting was previously only available as a hotfix, but is now part of Windows 2003 Service Pack 1.

Here is a KB article on MS and here is the MS security advisory


I just cant seem to find something for best practices on how long to make the server tarpit timeout settings for…maybe you guys can find something.





I have cleaned out the CHMAIL Queue to get rid of all the bogus stuff, which is done by clicking on each connector’s properties, and then, hit the find now button, then delete ( no NDR) any mails coming from postmaster. There will be legit stuff in here so need to be careful.













Spam should be severly cut down now with these changes, and with mail security running properly.



I’m sure a few things will still be coming through, such as picture and image spam. If we want almost 99.9999% protection, we need to purchase the premium anti-spam add-on through symantec. But what we have going now is definitely a hands-down quantified leap improvement.
 
There where no messages in the bad mail folder, But I did what MRoberto recomended, thanks. I'm alittle unclear on the Tarpitting thing, but the rest made sence.
 
Well it look like I had to disable the recipiant filtering because as I look at the spam filter we have, I see someone trying to spoof one of the e-mails, but the dns blacklist is catching it. Shouldn't the spam filter we have be blocking the NDR attack? Could it be that somthing got inside out network and is sending the fake emails from indide? Does anyone have any Idea why there are e-mail in the queue folder that I can't delete? there are tons of them now.


Thanks
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top