Folks:
I'm currently running an experiment with backup MX's.
I've always been of the opinion that some spammers will target a backup
MX if one is available, with the assumption that the backup is less
protected against spam & viruses than the primary.
As such, I've setup a backup MX for midrange.com and am running
'smtptrapd' (
http://smtptrapd.sourceforge.net/) on it.
smtptrapd is a very small C program that listens on port 25 and always
returns a 4xx soft error to the RCPT TO verb.
I setup the backup MX record in DNS about 2 hours ago ... and already
I'm getting hit on it. So far I haven't seen a single legit email show
up on it.
Theoretically I could just have nothing listening at all on the backup
MX system, but I want to see what tries to deliver to it.
david
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact
[javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.