Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Anti-spam techniques
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Tarpits=== {{Main|Tarpit (networking)}} A ''tarpit'' is any server software which intentionally responds extremely slowly to client commands. By running a tarpit which treats acceptable mail normally and known spam slowly or which appears to be an open mail relay, a site can slow down the rate at which spammers can inject messages into the mail facility. Depending on the server and internet speed, a tarpit can slow an attack by a factor of around 500.<ref>{{Cite book|title=Mastering Microsoft Exchange Server 2016|last1=Leonard|first1=Clifton|last2=Svidergol|first2=Brian|last3=Wright|first3=Byron|last4=Meloski|first4=Vladimir|date=2016|publisher=John Wiley & Sons|isbn=9781119232056|location=Hoboken, NJ|pages=630}}</ref> Many systems will simply disconnect if the server doesn't respond quickly, which will eliminate the spam. However, a few legitimate email systems will also not deal correctly with these delays. The fundamental idea is to slow the attack so that the perpetrator has to waste time without any significant success.<ref>{{Cite book|url=https://books.google.com/books?id=YQmWtsqlvfMC&q=tarpit&pg=PT199|title=Virtual Honeypots: From Botnet Tracking to Intrusion Detection|last1=Provos|first1=Niels|last2=Holz|first2=Thorsten|date=2007-07-16|publisher=Pearson Education|isbn=9780132702058|language=en}}</ref> An organization can successfully deploy a tarpit if it is able to define the range of addresses, protocols, and ports for deception.<ref name=":0">{{Cite book|title=Introduction to Information Security: A Strategic-Based Approach|last1=Shimeall|first1=Timothy|last2=Spring|first2=Jonathan|date=2013|publisher=Syngress|isbn=9781597499699|location=Waltham, MA|pages=74}}</ref> The process involves a router passing the supported traffic to the appropriate server while those sent by other contacts are sent to the tarpit.<ref name=":0" /> Examples of tarpits include the Labrea tarpit, Honeyd,<ref>{{Cite book|title=Honeypots: A New Paradigm to Information Security|last1=Joshi|first1=R. C.|last2=Sardana|first2=Anjali|date=2011|publisher=CRC Press|isbn=9781439869994|location=Boca Raton, FL|pages=252}}</ref> SMTP tarpits, and IP-level tarpits.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)