<html><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><br><div><div>On Jun 3, 2008, at 3:10 AM, Rudi Bruchez wrote:</div><br class="Apple-interchange-newline"><blockquote type="cite"><div>Hello,<br><br>I'm using Cyrus on a Debian box, with pop3s. I found some time ago that <br>someone was able to place a spamming tool in the /var/spool/cyrus/ <br>directory. I cleaned it and changed all my passwords. All seemed ok.</div></blockquote><div><br></div><div>Hopefully you are keeping up to date with these security issues with Debian SSL and OpenSSH:</div><div><br></div><div><a href="http://www.debian.org/security/2008/dsa-1571">http://www.debian.org/security/2008/dsa-1571</a></div><div><a href="http://www.debian.org/security/2008/dsa-1576">http://www.debian.org/security/2008/dsa-1576</a></div><div><br></div><div><br></div><blockquote type="cite"><div>I figured out this week that an IRC bot was at the same place. I changed <br>my passwords again, and upgraded to the last Cyrus Debian package.<br>It looks like the cracker gained root access. I don't have the time and <br>window to reinstall my system. My question would be : have you already <br>heard of such breaks ?<br>The Cyrus account has shell access in passwd. Is it necessary ? Could I <br>put it to /bin/false, and change it when I want to su to it for changing <br>smth ?<br><br>Thanks !<br><br>Rudi<br><br>----<br>Cyrus Home Page: <a href="http://cyrusimap.web.cmu.edu/">http://cyrusimap.web.cmu.edu/</a><br>Cyrus Wiki/FAQ: <a href="http://cyrusimap.web.cmu.edu/twiki">http://cyrusimap.web.cmu.edu/twiki</a><br>List Archives/Info: <a href="http://asg.web.cmu.edu/cyrus/mailing-list.html">http://asg.web.cmu.edu/cyrus/mailing-list.html</a><br><br><br><br></div></blockquote></div><br></body></html>