The next step in the spam control war: greylisting
This paper proposes a new and currently very effective method of enhancing the abilities of mail systems to limit the amount of spam that they receive and deliver to their users. For the purposes of this paper, we will call this new method "Greylisting". The reason for choosing this name should become obvious as we progress.
Greylisting has been designed from the start to satisfy certain criteria:
- Have minimal impact on users
- Limit spammers ability to circumvent the blocking
- Require minimal maintenance at both the user and administrator level
User-level spam blocking, while somewhat effective has a few key drawbacks that make its use in the continuing spam war undesirable. A few of these are:
- It provides no notice to the senders of legitimate email that is falsely identified as spam.
- It places most of the costs of processing the spam on the receivers side rather than the spammers side.
- It provides no real disincentive to spammers to stop wasting our time and resources.
By Evan Harris at puremagic.com
[ Read more ]
- News: Why Bill Gates' antispam plan won't work (2 February 2004)
- News: We'll kill spam in two years - Gates (26 January 2004)
- Article: Spam Might Be Your Biggest Headache, But It's Not Your Biggest Threat (22 January 2004)
- Article: Spam Prevention Tips for Small Businesses (19 September 2003)
- Article: Iraq Dragged Into The Infamous 419 Scam (7 April 2003)
- Article: Spam Checklist - April Fool's Day is Approaching (27 March 2003)
- Article: Spam Wars - Rise of the Spam (16 May 2002)
- Article: Spam: The problems with junk e-mail (8 April 2002)
- Article: Mail Abuse Prevention Organization stands up to giant Harris Interactive (4 April 2002)
- Article: The six headed spam monster (1 April 2002)
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.