Table of Contents
1Scope
2References
3Definitions
4Abbreviationsandacronyms
5Conventions
6Introductiontocounteringe-mailspam
6.1ConceptandCharacteristicsofspam
6.2Approachestocounteringe-mailspam
7Anti-spamtechnologies
7.1Overview
7.2Theimportanceoftool/technologycontext
7.3Combiningtests
7.4Typesofanti-spamtechnologies
7.5Existenceofthesender'sdomainandeliciting
aresponse
7.6Existenceofapointerrecord(PTR)
7.7Blacklists/whitelists
7.8Addressofthesendingservertreatedaseither
"dynamic"or"residential"
7.9Filtering
7.10HELO/CSV
7.11Greylisting
7.12Tokens/passwords
7.13Varioustechniques
7.14Howtousethisreviewoftechnologiesandfactors
toconsider
7.15RejectionintheSMTPsession
7.16Silentrejection
7.17RejectionbysendingaDSN(deliverystatusnotification
or"bouncing")
7.18Deliverytoaspambox
7.19Marking
AppendixI-Activitiesoncounteringe-mailspam
I.1Introduction
I.2Internationalactivitiesoncounteringspam
I.3Developmentoftechnicalspecificationsforcountering
spam
I.4Listofindustryalliancesandinitiativesforcountering
spam
Bibliography Abstract
Describes basic concepts, characteristics and effects of e-mail spam, and technologies involved in countering e-mail spam.