dnsstore is a proof-of-concept tool which can store arbitrary data in a standard recursive resolver's cache with no special server software by abusing wildcard domains. It's egregiously slow and inefficient, but it works. Keep in mind that at best the data will survive only as long as the TTL of the base domain and in the worst case not at all. The password serves as both a key for encryption and, combined with the domain, a unique identifier for the data stored. Using the same domain and password to save different data will cause corruption.
dnsstore.pl ip-of-recursive-resolver base-domain password [some string of data]
Storing data:
dnsstore.pl 8.8.8.8 ph swordfish 'all your cache are belong to us'
Retreiving that data:
dnsstore.pl 8.8.8.8 ph swordfish
While the data is MAC'd with the password to prevent modification, anybody who knows (or is able to guess) any of the hostnames used to store the data can corrupt it by making lookups.
The password is protected with 100k iteration PBKDF2, which should somewhat deter efforts to crack passwords used.
Data is encrypted with Blowfish-CBC-256 and a static IV and authenticated with HMAC-SHA256. I expect it to be vunlerable to decryption via CPA, and reuse of keys with a static IV is a terrible idea. Using this for something serious would be insane.