Whitelist

Last updated

A whitelist or allowlist is a list or register of entities that are being provided a particular privilege, service, mobility, access or recognition. Entities on the list will be accepted, approved and/or recognized. Whitelisting is the reverse of blacklisting, the practice of identifying entities that are denied, unrecognized, or ostracized.[ citation needed ]

Contents

Email whitelists

Spam filters often include the ability to "whitelist" certain sender IP addresses, email addresses or domain names to protect their email from being rejected or sent to a junk mail folder. These can be manually maintained by the user [1] or system administrator - but can also refer to externally maintained whitelist services.[ citation needed ] [2]

Non-commercial whitelists

Non-commercial whitelists are operated by various non-profit organizations, ISPs, and others interested in blocking spam. Rather than paying fees, the sender must pass a series of tests; for example, their email server must not be an open relay and have a static IP address. The operator of the whitelist may remove a server from the list if complaints are received.[ citation needed ] [3]

Commercial whitelists

Commercial whitelists are a system by which an Internet service provider allows someone to bypass spam filters when sending email messages to its subscribers, in return for a pre-paid fee, either an annual or a per-message fee. A sender can then be more confident that their messages have reached recipients without being blocked, or having links or images stripped out of them, by spam filters. The purpose of commercial whitelists is to allow companies to reliably reach their customers by email.[ citation needed ]

Advertising whitelists

Many websites rely on ads as a source of revenue, but the use of ad blockers is increasingly common.[ citation needed ] Websites that detect an adblocker in use often ask for it to be disabled - or their site to be "added to the whitelist" [4] - a standard feature of most adblockers.[ citation needed ]

Network whitelists

LAN whitelists

A use for whitelists is in local area network (LAN) security. Many network admins set up MAC address whitelists, or a MAC address filter, to control who is allowed on their networks. This is used when encryption is not a practical solution or in tandem with encryption. However, it's sometimes ineffective because a MAC address can be faked.[ citation needed ]

IP whitelist

Firewalls can usually be configured to only allow data-traffic from/to certain (ranges of) IP-addresses.[ citation needed ]

Application whitelists

One approach in combating viruses and malware is to whitelist software which is considered safe to run, blocking all others. [5] [6] [7] [8] This is particularly attractive in a corporate environment, where there are typically already restrictions on what software is approved.[ citation needed ]

Leading providers of application whitelisting technology include Bit9, Velox, McAfee, Lumension, ThreatLocker, Airlock Digital and SMAC. [9] [10] [11]

On Microsoft Windows, recent versions include AppLocker, which allows administrators to control which executable files are denied or allowed to execute. With AppLocker, administrators are able to create rules based on file names, publishers or file location that will allow certain files to execute. Rules can apply to individuals or groups. Policies are used to group users into different enforcement levels. For example, some users can be added to a report-only policy that will allow administrators to understand the impact before moving that user to a higher enforcement level.[ citation needed ]

Linux systems typically have AppArmor and SE Linux features available which can be used to effectively block all applications which are not explicitly whitelisted, and commercial products are also available. [12]

On HP-UX introduced a feature called "HP-UX Whitelisting" on 11iv3 version. [13]

See also

Related Research Articles

<span class="mw-page-title-main">Open mail relay</span> SMTP server that allows anyone to send e-mail through it

An open mail relay is a Simple Mail Transfer Protocol (SMTP) server configured in such a way that it allows anyone on the Internet to send e-mail through it, not just mail destined to or originating from known users. This used to be the default configuration in many mail servers; indeed, it was the way the Internet was initially set up, but open mail relays have become unpopular because of their exploitation by spammers and worms. Many relays were closed, or were placed on blacklists by other servers.

A Domain Name System blocklist, Domain Name System-based blackhole list, Domain Name System blacklist (DNSBL) or real-time blackhole list (RBL) is a service for operation of mail servers to perform a check via a Domain Name System (DNS) query whether a sending host's IP address is blacklisted for email spam. Most mail server software can be configured to check such lists, typically rejecting or flagging messages from such sites.

A tarpit is a service on a computer system that purposely delays incoming connections. The technique was developed as a defense against a computer worm, and the idea is that network abuses such as spamming or broad scanning are less effective, and therefore less attractive, if they take too long. The concept is analogous with a tar pit, in which animals can get bogged down and slowly sink under the surface, like in a swamp.

Various anti-spam techniques are used to prevent email spam.

Tagged Message Delivery Agent (TMDA) is an open-source software application designed to reduce the amount of junk email a user receives. TMDA's main difference from other anti-spam systems is the use of a challenge/response system that bulk mailing machines and programs are either unwilling or unable to answer.

<span class="mw-page-title-main">Email spam</span> Unsolicited electronic advertising by email

Email spam, also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email (spamming). The name comes from a Monty Python sketch in which the name of the canned pork product Spam is ubiquitous, unavoidable, and repetitive. Email spam has steadily grown since the early 1990s, and by 2014 was estimated to account for around 90% of total email traffic.

Greylisting is a method of defending e-mail users against spam. A mail transfer agent (MTA) using greylisting will "temporarily reject" any email from a sender it does not recognize. If the mail is legitimate, the originating server will try again after a delay, and if sufficient time has elapsed, the email will be accepted.

<span class="mw-page-title-main">The Spamhaus Project</span> Organization targetting email spammers

The Spamhaus Project is an international organisation based in the Principality of Andorra, founded in 1998 by Steve Linford to track email spammers and spam-related activity. The name spamhaus, a pseudo-German expression, was coined by Linford to refer to an internet service provider, or other firm, which spams or knowingly provides service to spammers.

Email authentication, or validation, is a collection of techniques aimed at providing verifiable information about the origin of email messages by validating the domain ownership of any message transfer agents (MTA) who participated in transferring and possibly modifying a message.

Forward-confirmed reverse DNS (FCrDNS), also known as full-circle reverse DNS, double-reverse DNS, or iprev, is a networking parameter configuration in which a given IP address has both forward (name-to-address) and reverse (address-to-name) Domain Name System (DNS) entries that match each other. This is the standard configuration expected by the Internet standards supporting many DNS-reliant protocols. David Barr published an opinion in RFC 1912 (Informational) recommending it as best practice for DNS administrators, but there are no formal requirements for it codified within the DNS standard itself.

Disposable email addressing, also known as DEA, dark mail or masked email, refers to an approach that involves using a unique email address for each contact or entity, or using it for a limited number of times or uses. The benefit to the owner is that if anyone compromises the address or utilizes it in connection with email abuse, the address owner can easily cancel it without affecting any of their other contacts.

SpamCop is an email spam reporting service, allowing recipients of unsolicited bulk or commercial email to report IP addresses found by SpamCop's analysis to be senders of the spam to the abuse reporting addresses of those IP addresses. SpamCop uses these reports to compile a list of computers sending spam called the "SpamCop Blocking List" or "SpamCop Blacklist" (SCBL).

SORBS was a list of e-mail servers suspected of sending or relaying spam. It had been augmented with complementary lists that include various other classes of hosts, allowing for customized email rejection by its users.

<span class="mw-page-title-main">Bulletproof hosting</span> Internet service for use by cyber-criminals

Bulletproof hosting (BPH) is technical infrastructure service provided by an Internet hosting service that is resilient to complaints of illicit activities, which serves criminal actors as a basic building block for streamlining various cyberattacks. BPH providers allow online gambling, illegal pornography, botnet command and control servers, spam, copyrighted materials, hate speech and misinformation, despite takedown court orders and law enforcement subpoenas, allowing such material in their acceptable use policies.

A challenge–response system is a type of that automatically sends a reply with a challenge to the (alleged) sender of an incoming e-mail. It was originally designed in 1997 by Stan Weatherby, and was called Email Verification. In this reply, the purported sender is asked to perform some action to assure delivery of the original message, which would otherwise not be delivered. The action to perform typically takes relatively little effort to do once, but great effort to perform in large numbers. This effectively filters out spammers. Challenge–response systems only need to send challenges to unknown senders. Senders that have previously performed the challenging action, or who have previously been sent e-mail(s) to, would be automatically receive a challenge.

The Mail Abuse Prevention System (MAPS) is an organization that provides anti-spam support by maintaining a DNSBL. They provide five black lists, categorising why an address or an IP block is listed:

In computer networking, MAC address filtering is a network access control method whereby the MAC address assigned to each network interface controller is used to determine access to the network.

<span class="mw-page-title-main">Blacklist (computing)</span> Criteria to control computer access

In computing, a blacklist, disallowlist, blocklist, or denylist is a basic access control mechanism that allows through all elements, except those explicitly mentioned. Those items on the list are denied access. The opposite is a whitelist, allowlist, or passlist, in which only items on the list are let through whatever gate is being used. A greylist contains items that are temporarily blocked until an additional step is performed.

Vouch by Reference (VBR) is a protocol used in Internet mail systems for implementing sender certification by third-party entities. Independent certification providers vouch for the reputation of senders by verifying the domain name that is associated with transmitted electronic mail. VBR information can be used by a message transfer agent, a mail delivery agent or by an email client.

SmartScreen is a cloud-based anti-phishing and anti-malware component included in several Microsoft products:

References

  1. e.g. Kindle users control the whitelist for email access. Besides Amazon itself, only e-mail addresses whitelisted by the device's registered owner can send content ("personal documents") to that device.
  2. "IP and domain reputation". Spamhaus Project.
  3. "Spamhaus' Blocklists".
  4. "Adblock Instructions". Forbes. Retrieved 2017-12-09.
  5. John Harrison, Enhancing Network Security By Preventing User-Initiated Malware Execution, Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) (Wireless Ad Hoc/Sensor Networks and Network Security Track), Volume II - Volume 02; pages 597-602; IEEE Computer Society Washington, DC, USA 2005.
  6. "SANS Institute: Reading Room - Analyst Papers" (PDF). www.sans.org. Archived from the original (PDF) on 2012-03-02. Retrieved 27 August 2018.
  7. "Dark Reading - Security - Protect The Business - Enable Access". Dark Reading. Archived from the original on 2019-12-12. Retrieved 2008-10-02.
  8. "Application Whitelisting Gains Traction". eweek.com. 25 September 2008.
  9. Blum, Dan (February 8, 2014). "Lessons Learned from Target Breach". Security-Architect Blog. Dan Blum. Retrieved July 18, 2014.
  10. Vamosi, Robert (2008-07-21). "Will you be ditching your antivirus app anytime soon?". CNET. Archived from the original on 2012-10-24. Retrieved 2010-03-22.
  11. Korobov, EVGENIY (2020-07-27). "SMAC - application whitelist platform". iqp . Retrieved 2020-07-27.
  12. Cooprider, Nathan (2016-02-03). "Live Whitelisting!". Threat Stack. Retrieved 20 December 2018.
  13. "HP-UX Whitelisting". HP. Retrieved 20 December 2018.