Ok I have what looks like spam been submitted over tcp 127.0.0.1:25 to exim smtp server.
I suspect is a rogue web/php script of which there is 100s of accounts on the server.
So I can either manually check 100s of apache access logs and look for matching timestamp to email submission or what seems more logical is somehow monitor 127.0.0.1:25 connections.
so it seems I need to if possible monitor for localhost:25 connections and then have the system tell me what file is doing that access. Is this possible and if so how do I do this?
Ideally I need to lock this down to a file, if I just lock it down to a uid it will probably be the apache user as its a mod_php installation so no unique uid's running scripts.
exim logs on max verbosity simply tell me the email is submitted over 127.0.0.1:25 tcp, if it was done over sendmail then it would show the script but it wasnt it was done over tcp.
I think I am looking at either a server root compromise or rogue script on server.
the obvious places such as /tmp are clean.
thanks.
I suspect is a rogue web/php script of which there is 100s of accounts on the server.
So I can either manually check 100s of apache access logs and look for matching timestamp to email submission or what seems more logical is somehow monitor 127.0.0.1:25 connections.
so it seems I need to if possible monitor for localhost:25 connections and then have the system tell me what file is doing that access. Is this possible and if so how do I do this?
Ideally I need to lock this down to a file, if I just lock it down to a uid it will probably be the apache user as its a mod_php installation so no unique uid's running scripts.
exim logs on max verbosity simply tell me the email is submitted over 127.0.0.1:25 tcp, if it was done over sendmail then it would show the script but it wasnt it was done over tcp.
I think I am looking at either a server root compromise or rogue script on server.
the obvious places such as /tmp are clean.
thanks.