But someone managed to use my postfix to send malicious emails through virtualmin. Funny that I created the server less than 40 days ago and simply a being of darkness managed to exploit some vulnerability in my server and start sending mass spam to several people.
All my work was lost, as Contabo simply deactivated my server and is charging me 35 euros to reactivate.
It’s already the second complaint I receive, and because of that, I gave up working with virtualmin. To make matters worse, I will have to hire another server and install a panel that is more secure.
I have other servers and this never really happened, until the day I decided to install virtualmin and “BANG” I took a ban from the account for “supposedly sending phishing” using my postfix.
Soon the problem is in virtualmin yes sir. Ignoring this is tremendously stupid. So it is necessary to review virtualmin security and try to find any vulnerabilities.
If you have vulnerability to report, please do so. We welcome vulnerability reports. and consistently fix them in a timely manner. Our security history is public.
It’s sad to see people who, instead of trying to help, just comment with irony and mockery.
I could really stay here wasting my time, and I would even try to make an effort to try an effective solution for this virtualmin vulnerability.
I’ve been searching the internet and it’s not hard to find several posts related to hacking in virtualmin’s postfix. Most posts are right here, just look for them.
But you prefer to mock my face. Thank you for giving me more impetus not to use this platform again. I know it won’t make any difference. However, it serves as an example for other people not to use. Thanks for the debauchery you really are amazing congratulations.
Firstly, why would anyone want to help you, when your first instinct is to start bashing the devs and blaming Virtualmin here?
It’s not “Virtualmins Postfix”, Postfix is Postfix no matter what control panel you are using.
I took the 2 minutes to view the video and if you even bothered so yourself you’d see that the actual issue here isn’t surrounding Postfix at all, rather a compromised shell account (most likely a simple password).
This is most likely what’s the fault in your case as well, you have an account (be it shell or mail) with a password that has been compromised.
It happens all the time in the world of shared hosting, which is why it’s so important to be vigilant when it comes to both password security regimes and actually checking your mail queue from time to time, and to have a proper spam filtering solution in place.
Virtualmin configures a safe system by default, with no open relay in Postfix.
I finally found that the problem wasn’t with my Postfix configuration. I had a shell account which was compromised that allowed the intruder to send the mails directly from commandline.
And the other was inconclusive and provided no evidence of a weakness in either postfix or Virtualmin.
The provided documentation is quite compelling. Oh, wait…
Seriously @readyserver ANY documentation would be helpful. Accusations? Not so much. If you can’t even provide the relevant log sections then maybe you shouldn’t be running a server. I say this with all seriousness. How is it you seem to be the only person reporting a supposed Virtualmin vulnerability of this magnitude?
It could be the case that it may be difficult to understand the principles involved when you host mail if you are a novice… but we never know if the is a rival panel just trying to dis vmin …
I guess the flack will hit me for this
Well, Contabo does offer a Ubuntu 18. Not sure why you would put this on a 40 day old server. Would that account for the older software versions the OP is using? Reinforces the ‘shouldn’t be running a server’ theory.