Earlier today, we got a ticket from a customer requesting a reverse DNS being set.
We checked the domain name associated with the RDNS and saw that it was registered with fake information.
We then checked the forward record, and noticed an MX record pointing back to the same forward record associated with the forward record. This is a typical tactic used by spammers in order to allegedly increase deliverability.
We then connected to port 25 on the VPS and saw PowerMTA running. PowerMTA, is of course, a software commonly used for mass-mailing...
This gave us probable cause to ask the user what they are planning to do with their server, as well as an opportunity to point out that mass-mailing is a violation of our TOS/AUP. Unsurprisingly, we haven't heard back. I suspect we will get a charge-back on the order.
If setting RDNS was automated, and no people were in the loop, we would have failed to catch this. Therefore, the system works.
We checked the domain name associated with the RDNS and saw that it was registered with fake information.
We then checked the forward record, and noticed an MX record pointing back to the same forward record associated with the forward record. This is a typical tactic used by spammers in order to allegedly increase deliverability.
We then connected to port 25 on the VPS and saw PowerMTA running. PowerMTA, is of course, a software commonly used for mass-mailing...
This gave us probable cause to ask the user what they are planning to do with their server, as well as an opportunity to point out that mass-mailing is a violation of our TOS/AUP. Unsurprisingly, we haven't heard back. I suspect we will get a charge-back on the order.
If setting RDNS was automated, and no people were in the loop, we would have failed to catch this. Therefore, the system works.