SecPoint - Best IT Security
The best Innovative and powerful IT Security products

Encyclopedia / Encyclopedia Part 3 /

What is Grey Listing?

Dark posting is another strategy for blocking critical measures of spam at the mail server level, however without falling back on heavyweight measurement examination or other heuristic (and mistake inclined) approaches. Hence, usage are genuinely lightweight, and may even reduction system movement and processor stack on your mail server.

The term grey listing is meant to describe a general method of blocking spam based on the behavior of the sending server, rather than the content of the messages. Grey listing does not refer to any particular implementation of these methods. Consequently, there is no single grey listing product. Instead, there are many products that incorporate some or all of the methods described here.

The SecPoint® Protector ( comes fully loaded with the grey listing functionality that provides the customers with the best anti-spam solution.

Grey Listing has been outlined from the begin to fulfill certain criteria:

Have negligible effect on clients

Farthest point spammers' capacity to dodge the blocking

Require negligible upkeep at both the client and overseer level

While fairly successful, client level spam blocking has a couple key disadvantages that make its utilization in the proceeding with spam war undesirable. A couple of these are:

It gives no notification to the senders of authentic email that is erroneously recognized as spam.

It puts the vast majority of the expenses of handling the spam on the beneficiaries' side as opposed to the spammers' side.

It gives no genuine disincentive to spammers to quit squandering our time and assets.

Subsequently, dim posting is intended to be actualized at the MTA level, where we can bring about the spammers the most measure of anguish.


High Level Overview



From this, we now have an extraordinary triplet for recognizing a mail "relationship". With this information, we basically take after an essential guideline, which is, "Whether we have never seen this triplet, then reject this conveyance and any others that may come quite close to time with a makeshift disappointment."

Since SMTP is viewed as an inconsistent transport, the likelihood of makeshift disappointments is incorporated with the center spec. In that capacity, any all around acted message exchange specialists (MTA) ought to endeavor retries if given a suitable makeshift disappointment code for a conveyance endeavor (see underneath for dialog of issues concerning non-adjusting MTA's).

Amid the introductory testing of dark posting in mid-2003, it was watched that the larger part of spam seems, by all accounts, to be sent from applications planned particularly for spamming. These applications seem to receive the "flame and-overlook" philosophy. That is, they endeavor to send the spam to one or a few MX has for a space, however then never endeavor a genuine retry as a genuine MTA would.

The previously stated tests affirmed that in the test environment, in view of a genuinely preservationist elucidation of testing information, a viability of more than 95% was accomplished, and that is with no honest to goodness mail steadily being forever blocked.

Furthermore, with the late widespread expansion of email-based infections, dark posting has been demonstrated to be greatly compelling in blocking such malware, as they likewise don't have a tendency to retry conveyances. Also, since they have a tendency to be genuinely expansive, transmission capacity and preparing investment funds are critical contrasted with the standard system for tolerating conveyance and neighborhood infection filtering.



➤ Related pages
Anti-Spam Firewall
Appliance VS Software
Cloud Security
What is a Man in the Middle Attack?
What is a Routing Table?
What is CISSP?
What is Data Leak Prevention?
What is Dumpster Diving?
What is Grey Listing?
What is GSM Encryption?
What is Instant Messaging?
What is Port Knocking?
What is search engine hacking?
What is Spyware?
What is TCP?
What is UDP?
What is UTM?
What is Virus?
What is VoIP?
What is Whitelisting?
WiFi Pen Test

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef