At 00:57 10-04-2009, Ondřej Surý wrote:
I have just encountered strange thing:

> > > <http://security.eu.debian.org>security.eu.debian.org mail is handled by 0 .
> >
> > I am not sure if pointing MX record to other peoples zone is good idea.
> > And the root zone has it's own deal of DoS attack even without random
> > MXes pointing into it.
>
> "MX 0 ." is the standard way of saying "we don't do email".

It's called NULL MX. There is an expired I-D about it at http://www.ietf.org/proceedings/05aug/IDs/draft-delany-nullmx-00.txt The attempt to standardize the practice was viewed as a bad idea by the DNSEXT WG.

Does anybody have an experience with that? How different MTAs behave?

The MX RR will be ignored. There will be an AAAA DNS request and a fallback to the A RR for security.eu.debian.org. Newer versions of sendmail and Postfix will treat that MX RR as a bad MX and reject the message instead of retrying.

Regards,
-sm
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to