Kai Schaetzl wrote:
Rense Buijen wrote on Wed, 22 Aug 2007 16:43:19 +0200:

I didn't know that a backup MX can lead to more trouble then having just one

Unfortunately, backup MXes attract spammers :-(. You could at least add some more backup MXs (that don't exist) on top of that, that may help to reduce the influx on the real one.


Using bogus MX records is a very bad idea. Google for bogusmx and for check_sender_mx_access.

Using a valid MX that always tempfails (either using a 4xx or blocking/droping packets at IP level or using a non existing IP) is not yet considered harsh, but if this becomes widely used, we'll find ways to detect such "poisoned MX" sites. Using a poisoned MX during a spam strike is ok, but using it all the time and for all client connections is bad for our resources. Spammers don't pay for resources, they have enough clients to send to all your MXes.

If you want to stay on the right side, don't break the rules.

Notes:
- If you only tempfail "suspected" clients (faraway countries, dynamic-like clients, "new" clients), this may be acceptable. - if you whitelist clients that already sent you (enough) good mail, this may be acceptable.

(when I say tempfail here, this includes blocking/droping IP packets).

Reply via email to