When inspecting the DNS configuration for example with dnsinspect.com, the following shows up sometimes (note I used example.com
):
Accepts Abuse Address
WARNING: Found mail servers which are not accepting emails to abuse@example.com address:
primary.mail.example.com
>> MAIL FROM: <dnsreport@dnsinspect.com>
<< 250 OK
>> RCPT TO: <abuse@example.com>
<< 550 5.1.1 User unknown
fallback.mail.example.com
>> MAIL FROM: <dnsreport@dnsinspect.com>
<< 250 OK
>> RCPT TO: <abuse@example.com>
<< 550 5.1.1 User unknown
Now I figured, if you can't receive abuse emails, you won't be able to get notified by external parties (eventually automatically with services like fail2ban
) because you'll never receive those emails. This way if your server is infected and is for example busy brute-forcing a innocent server that is desperately trying to notify the infected server owner, the owner of the infected server will never get notified.
Is this considered a security risk in general, in terms of a disability to detect and react in such case?
In other words I'm seeking for a way to detect abuse of my own servers, in case one is compromised. I understand that just waiting till other servers start to send abuse messages won't be sufficient and is reactive while you'd prefer a proactive method. But it will surely help in case other (proactive) measures like rootkit detection etc. failed. Now, I'm wondering if "not being able to receive that abuse emails" in case of a compromised server is a risk (read; possibly not detecting that your server is compromised)?