Contributed by jose on from the spamland-security dept.
If the network allows, you could nest another dns server behind your real one. This server would have all of your 'real' zones replicated, but only be serving queries that come from the blacklist (as redirected by your real dns server).
Now, set up some mx records for the zones on the false machine to point to 127.0.0.1, 192.168.1.1, 10.0.0.1, etc.
I'm not sure if this would be as disruptive as spamd would be, but it would have messages ricocheting around the inside for a while!" This idea is sort of interesting. Anyone work with something like this to potentially propogate invalid information back to spammers (ie false MX records)?
(Comments are closed)