Naming trick opens mail servers
A number of Vietnamese spam sources are currently attracting attention because the spammers have equipped the relevant hosts with DNS pointer records called "localhost". As a result, IP addresses like 220.127.116.11, 18.104.22.168 or 22.214.171.124 produce this name when a reverse look-up occurs. The problem is caused by badly configured Domain Name Systems, as "localhost" should generally translate to a single IP address – 127.0.0.1 – which is reserved for local system loopback.
Some mail servers are configured in such a way that they don't even accept emails from clients that exhibit a name that returns an obviously incorrect reverse lookup. However other mail servers give preferential treatment to "localhost" and grant the Far-Eastern clients a special privilege, namely the "relaying" of emails to arbitrary recipients even outside the local network, because the servers or administrators have assumed that "localhost" is part of the local network.
Mail server operators must make sure they avoid falling victim to this trick. For example, they can make relays only available from local IP addresses and not identify clients by reverse look-up DNS names. Normal open relay tests don't produce an alert in this case, because the test client usually isn't called "localhost". Several vulnerable mail servers have already been added to the iX blacklist. In addition to blacklisting, the operators of open relays potentially face having to pay damages to spam or malware recipients.