I was looking at the output from logdigest on my egress mail server (smtp.ci.juneau.ak.us) and came across these:
System Error Messages: aboutres.net. config error: mail loops back to me (MX problem?): 1 Time(s) flylib.net. config error: mail loops back to me (MX problem?): 1 Time(s) agesub.net. config error: mail loops back to me (MX problem?): 1 Time(s) midpoint.agesub.net. config error: mail loops back to me (MX problem?): 1 Time(s) despoina.flylib.net. config error: mail loops back to me (MX problem?): 1 Time(s) lectisternium.aboutres.net. config error: mail loops back to me (MX problem?): 1 Time(s) And sure enough, the sleazy spammers are putting a loopback address in their DNS for the domain, mkm@mxg:/etc/mail> host lectisternium.aboutres.net lectisternium.aboutres.net has address 127.0.0.1 Is anyone else seeing these? What's the best way to block a server for which DNS returns a loopback address? I'd think at the MTA, but a rule might be effective too. Interestingly, the headers (with minor munging on the recipient name) on my inbound server show an actual IP address: Return-Path: <g> Received: from lectisternium.aboutres.net (lectisternium.aboutres.net [138.128.10.69]) by mxg.ci.juneau.ak.us (8.13.6/8.13.6/SuSE Linux 0.8) with ESMTP id s7FHufc5018797 for <my_user@ci.juneau.**.us>; Fri, 15 Aug 2014 09:56:51 -0800 Content-Type: text/html; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Subject: Hot Summer Rewards - Costco Connection Date: Fri, 15 Aug 2014 10:56:41 -0700 From: Member Rewards <co...@lectisternium.aboutres.net> Message-ID: <4357.server-1325d972c7b4c47020930095928b359f7...@aboutres.net> To: < my_user@ci.juneau.**.us> Reply-to: <co...@aboutres.net> X-SPF-Scan-By: smf-spf v2.0.2 - http://smfs.sf.net/ Received-SPF: Pass (mxg.ci.juneau.ak.us: domain of colinshel...@lectisternium.aboutres.net designates 138.128.10.69 as permitted sender) receiver=mxg.ci.juneau.ak.us; client-ip=138.128.10.69; envelope-from=<colinshel...@lectisternium.aboutres.net>; helo=lectisternium.aboutres.net; I'm wondering if they didn't have valid forward and PTR recoords for the duration of the spam run, then changed it. Obviously they would need a valid IP for a TCP/IP session and when doing the Forward Confirmed reverse DNS. But maybe 127.0.0.1 works for the FCrDNS - is that configurable? ...Kevin *(Just to be clear, the messages that were sitting in the outbound queue were out of office messages, not bounced spam). -- Kevin Miller Network/email Administrator, CBJ MIS Dept. 155 South Seward Street Juneau, Alaska 99801 Phone: (907) 586-0242, Fax: (907) 586-4500 Registered Linux User No: 307357