Taxonomy of anti-spam techniques: Difference between revisions
From ASRG
Jump to navigationJump to search
mNo edit summary |
(→Administrative techniques: Added retaliation) |
||
(24 intermediate revisions by 6 users not shown) | |||
Line 6: | Line 6: | ||
* [[Adaptive filters]] | * [[Adaptive filters]] | ||
** [[Bayesian filters]] | |||
** [[Collaborative filters]] | |||
* [[URL filtering]] | |||
==SMTP techniques== | ==SMTP techniques== | ||
Line 12: | Line 16: | ||
* [[Greylisting]] | * [[Greylisting]] | ||
* [[Callbacks]] | |||
* [[Rate limits]] | |||
* [[SMTP pull]] | |||
==Address management== | |||
* [[Tagged addresses]] | |||
* [[Code words]] | |||
* [[Disposable addresses]] | |||
==Network techniques== | ==Network techniques== | ||
* [[DNS blacklists]] | * [[DNS blacklists]] | ||
* [[DNS validation]] | |||
* [[HELO/EHLO Pattern Matching]] | |||
* [[Tarpitting and other timing techniques]] | * [[Tarpitting and other timing techniques]] | ||
Line 23: | Line 45: | ||
* [[Recognizing known correspondents]] | * [[Recognizing known correspondents]] | ||
* [[ | * [[Path validation]] | ||
** [[Path validation manual techniques]] | |||
** [[SPF]] (Sender permitted from) | |||
** [[Sender-ID]] | |||
** [[SRS]] (Sender Rewriting Scheme) | |||
==Introduction techniques== | * [[Marking valid mail client hosts]] | ||
* [[Signatures]] | |||
* [[Subject keywords]] | |||
==[[Message validation techniques]]== | |||
* [[Cryptographic signatures]] | |||
* [[Signature callback]] | |||
==[[Introduction techniques]]== | |||
* [[Challenges]] | * [[Challenges]] | ||
Line 32: | Line 70: | ||
* [[Postage]] | * [[Postage]] | ||
* [[Attention bonds]] | |||
* [[Captchas]] | |||
==Administrative techniques== | |||
* [[No spam notices]] | |||
* [[Do not spam lists]] | |||
* [[Abuse Reporting]] | |||
* [[Retaliation]] |
Latest revision as of 10:57, 30 September 2010
Many people have invented many anti-spam techniques over the past decade. And a lot of the techniques keep being reinvented. Our goal here is to list all the anti-spam techniques we know, both the good ones and the bad ones.
Message content techniques
SMTP techniques
Address management
Network techniques
Whitelist techniques
- Path validation
- Path validation manual techniques
- SPF (Sender permitted from)
- Sender-ID
- SRS (Sender Rewriting Scheme)