MX
INFO MX Record Your 2 MX records are:
20 mxbackup.griffin.com. [TTL=3600] IP=83.148.189.24 (No Glue) [TTL=3600] [GB]
10 mail.magfern.com. [TTL=3600] IP=85.189.37.132 [TTL=3600] [GB]
PASS Low port test OK. Our local DNS server that uses a low port number can get your MX record. Some DNS servers are behind firewalls that block low port numbers. This does not guarantee that your DNS server does not block low ports (this specific lookup must be cached), but is a good indication that it does not.
PASS Invalid characters OK. All of your MX records appear to use valid hostnames, without any invalid characters.
PASS All MX IPs public OK. All of your MX records appear to use public IPs. If there were any private IPs, they would not be reachable, causing slight mail delays, extra resource usage, and possibly bounced mail.
PASS MX records are not CNAMEs OK. Looking up your MX record did not just return a CNAME. If an MX record query returns a CNAME, extra processing is required, and some mail servers may not be able to handle it.
PASS MX A lookups have no CNAMEs OK. There appear to be no CNAMEs returned for A records lookups from your MX records (CNAMEs are prohibited in MX records, according to RFC974, RFC1034 3.6.2, RFC1912 2.4, and RFC2181 10.3).
PASS MX is host name, not IP OK. All of your MX records are host names (as opposed to IP addresses, which are not allowed in MX records).
PASS Multiple MX records OK. You have multiple MX records. This means that if one is down or unreachable, the other(s) will be able to accept mail for you.
PASS Differing MX-A records OK. I did not detect differing IPs for your MX records (this would happen if your DNS servers return different IPs than the DNS servers that are authoritative for the hostname in your MX records).
PASS Duplicate MX records OK. You do not have any duplicate MX records (pointing to the same IP). Although technically valid, duplicate MX records can cause a lot of confusion, and waste resources.
PASS Reverse DNS entries for MX records OK. The IPs of all of your mail server(s) have reverse DNS (PTR) entries. RFC1912 2.1 says you should have a reverse DNS for all your mail servers. It is strongly urged that you have them, as many mailservers will not accept mail from mailservers with no reverse DNS entry. Note that this information is cached, so if you changed it recently, it will not be reflected here (see the
www.DNSstuff.com Reverse
DNS Tool for the current data). The reverse DNS entries are:
24.189.148.83.in-addr.arpa mxbackup.griffin.com. [TTL=21600]
132.37.189.85.in-addr.arpa 85.189.37.132.griffin.managedbroadband.co.uk. [TTL=3600]
MAIL
FAIL Connect to mail servers ERROR: I could not complete a connection to one or more of your mailservers:
mail.magfern.com: Timed out [Last data sent: [Did not connect]]
PASS Mail server host name in greeting OK: All of your mailservers have their host name in the greeting:
mxbackup.griffin.com:
220 mxbackup.griffin.com NO UCE ESMTP
PASS Acceptance of NULL <> sender OK: All of your mailservers accept mail from "<>". You are required (RFC1123 5.2.9) to receive this type of mail (which includes reject/bounce messages and return receipts).
PASS Acceptance of postmaster address OK: All of your mailservers accept mail to
[email protected] (as required by RFC822 6.3, RFC1123 5.2.7, and RFC2821 4.5.1).
PASS Acceptance of abuse address OK: All of your mailservers accept mail to
[email protected].
PASS Acceptance of domain literals OK: All of your mailservers accept mail in the domain literal format (user@[83.148.189.24]).
PASS Open relay test OK: All of your mailservers appear to be closed to relaying. This is not a thorough check, you can get a thorough one here.
mxbackup.griffin.com OK: 554 <
Not.abuse.see.www.DNSreport.com.from.IP.85.189.73.16@DNSreport.com>: Relay access denied
WARN SPF record Your domain does not have an SPF record. This means that spammers can easily send out E-mail that looks like it came from your domain, which can make your domain look bad (if the recipient thinks you really sent it), and can cost you money (when people complain to you, rather than the spammer). You may want to add an SPF record ASAP, as 01 Oct 2004 was the target date for domains to have SPF records in place (Hotmail, for example, started checking SPF records on 01 Oct 2004).