I'm a new RouterBoard user. I've configured uncountable standard web interface NAT routers, Tomato based routers etc over the years as an IT contractor and a few ciscos (Just some basic nat portfw stuff).
I recently installed for myself a RouterBoard RB750GL. Configured it behind a Draytek ADSL router that supports PPPoE/PPPoA passthrough and configured a PPPoE connection and basic NAT etc. I had a bit of fun getting the PPPoE connection to work initially and then setup the various NAT forwarding rules I needed (We run a MS SBS 2003 Server so needed 80, 443, 25, 1723 etc). Its been running now for a few weeks ok until I was notified by my ISP they had blocked my IP from connecting to their smart host due to spam relaying. I checked all the normal things re Virus's, Relay security on server etc and found nothing. I logged into my Routerboard and viewed the log and discovered someone had been logging in via SSH - Stupid me left the password blank as I wasn't aware remote access would be available "out of the box". I've since changed the password and added some firewall filter rules to drop 22,23 and 8291 on the PPPoE interface (80 and 21 are Nat Forwarding so they are already dealt with).
My concern is I have no idea what the user was doing while they were in - I expected to see some sort of Port Forwarding allowing them to relay spam via my ISP's SMTP/Smarthost but the only rules there were mine. So my questions are
If the RouterOS is Linux based does that mean someone could install additional services on the device to relay spam - At a glance it looks like a closed system with no command line access to the underlying OS (If there is one??) but I want to check if there could be additional processes running on the device.
Will any rules added to the Firewall show in the Winbox interface or should I be checking things out in the SSH interface?
What else should I be looking for that they may have compromised.
Any help here greatly appreciated.