email:email_firewall
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
email:email_firewall [2017/03/31 15:38] – created peter | email:email_firewall [2019/11/27 21:51] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Email - Email firewall ====== | ||
- | |||
- | Use fake MX records to combat spam. | ||
- | |||
- | Set a bogus server as the lowest and highest MX records with the working server' | ||
- | |||
- | For example: | ||
- | |||
- | < | ||
- | fake.example.com | ||
- | realmx.example.com | ||
- | fake2.example.com | ||
- | </ | ||
- | |||
- | The theory is, since majority of the spam will query for the the highest MX record to spam since usually they' | ||
- | |||
- | |||
- | Risks: | ||
- | |||
- | * **High retry times** - Most servers will retry the next MX after the first one timeouts, others will try in the next few minutes, but some servers will only retry after one hour or one day. They are very rare and are often misconfigured. | ||
- | * **Delays in delivering emails** - All emails will have a delay - but this should not be much. Almost all real mailservers will retry to the next MX after the the first timeout, so we are talking about 30s delay. | ||
- | * **Broken sites** - Some webservers send emails for passwords, notifications, | ||
- | * **No logs** - As the fake MX is unconnected to a proper IP, there will be no logs of what tried to be delivered. | ||
- | * **No whitelist** - This applies to all servers via DNS, so you can not whitelist one server... actually is just half-true, but is harder. the whitelist solution is that the lowest MX points to a IP where a SMTP is running, but filtered by firewall for everyone. | ||
- | |||
email/email_firewall.1490974729.txt.gz · Last modified: 2020/07/15 09:30 (external edit)