Re: sprint
- Date: Mon, 11 Feb 2002 15:57:38 +0100
- Organization: Telia Net
Hi,
I have noticed an increasing number of domains that have been
used for spam and are pointing back to 127.0.0.1. Eg:
dig mx ministre.net @ns.bsdhost.net
; <<>> DiG 8.3 <<>> mx ministre.net @ns.bsdhost.net
;; ANSWER SECTION:
ministre.net. 2D IN MX 10 localhost.ministre.net.
;; AUTHORITY SECTION:
ministre.net. 2D IN NS ns2.ulimit.com.
ministre.net. 2D IN NS ns.bsdhost.net.
;; ADDITIONAL SECTION:
localhost.ministre.net. 2D IN A 127.0.0.1
dig mx arf.org @ns1.nill.net
; <<>> DiG 8.3 <<>> mx arf.org @ns1.nill.net
;; ANSWER SECTION:
arf.org. 1D IN MX 20 backup.visual.com.
arf.org. 1D IN MX 10 127.0.0.1.
;; AUTHORITY SECTION:
arf.org. 1D IN NS ns1.nill.net.
arf.org. 1D IN NS ns2.nill.net.
Besides that is a violation of RFC:s to have a IP-address
togheter with MX record, it's also creates some problems
when the user tries to resolve the hostname.
Comments?
-- amar