You are here: Home > Participate > Join a Discussion > Mailman Archives
<<< Chronological >>> Author Index    Subject Index <<< Threads >>>

Re: sprint

  • To:
  • From: amar < >
  • Date: Mon, 11 Feb 2002 15:57:38 +0100
  • Organization: Telia Net

Hi,

I have noticed an increasing number of domains that have been
used for spam and are pointing back to 127.0.0.1. Eg:

dig mx ministre.net @ns.bsdhost.net

; <<>> DiG 8.3 <<>> mx ministre.net @ns.bsdhost.net

;; ANSWER SECTION:
ministre.net.           2D IN MX        10 localhost.ministre.net.

;; AUTHORITY SECTION:
ministre.net.           2D IN NS        ns2.ulimit.com.
ministre.net.           2D IN NS        ns.bsdhost.net.

;; ADDITIONAL SECTION:
localhost.ministre.net.  2D IN A  127.0.0.1


dig mx arf.org @ns1.nill.net

; <<>> DiG 8.3 <<>> mx arf.org @ns1.nill.net

;; ANSWER SECTION:
arf.org.                1D IN MX        20 backup.visual.com.
arf.org.                1D IN MX        10 127.0.0.1.

;; AUTHORITY SECTION:
arf.org.                1D IN NS        ns1.nill.net.
arf.org.                1D IN NS        ns2.nill.net.


Besides that is a violation of RFC:s to have a IP-address
togheter with MX record, it's also creates some problems
when the user tries to resolve the hostname.

Comments?

-- amar




  • Post To The List:
<<< Chronological >>> Author    Subject <<< Threads >>>