Knowledge (XXG)

Mail Abuse Prevention System

Source 📝

22: 548: 279:, is significantly different from the others. The DUL was supposed to list addresses which are dynamically assigned to end-users (but in practice it also includes statically-allocated ones), which are not directly related to spam, and there is no evidence in MAPS archives of any such address having been used to relay spam. 318:
Looking at more current results, over the last 10 years shows that the DUL is responsible for blocking the majority of spam messages. The DUL mostly stops compromised end-user machines (and routers) from being abused to send spam. The following table shows these results, as percentage of spam
282:
DUL's purpose was to educate users to relay mail through an acknowledged ISP, rather than running their own mail servers. Doing this would bring various advantages and disadvantages; Acknowledged ISPs can, in general, afford to monitor their systems more thoroughly in order to avoid viruses,
250:
acquired Kelkea, which brought substantial improvement to the subscription mechanism, including a fully automated method for getting temporary subscriptions. In addition, subscribers were provided with personalised web pages where they can view reports, and also set up
314:
It generates an amount of false positives much higher than MAPS claims to be aware of, blocking many legitimate websites and end users, and yet catching only an estimated 2% of spam. This study, however, was done in 2002, and involved only the RBL, not the DUL.
227:
response. MAPS explained as their expectation to get enough funds from free support failed, they were forced to make this decision. However, the spirit of the company remained as that of a non-profit organization. Their subscription page was quite hidden in their
306:
with a formal definition. While it may be relatively straightforward to recognize ISPs who are network providers, mailbox providers are easily confused with end-users of different kinds. When coupled with the ability to easily whitelist IPs by
295:. But it also prevents users of their own domain to publish a proper SPF policy. In addition, ISP email relays are incompatible with fine-grained IP address blocking: if they relay spam and get blocked, it affects all users. 193:, well known Internet software engineers, started keeping a list of IP addresses which had sent out spam or engaged in other objectionable behavior. The list became known as the 197:(RBL). Many network managers wanted to use the RBL to block unwanted e-mail. Thus, Rand and Vixie created a DNS-based distribution scheme which quickly became popular. 311:/region to correct obvious shortcomings, using the DUL to block mail may result in an obscure policy that jeopardizes the global reliability of email delivery. 39: 204:, inviting spammers to sue them and help them create case law. In 2000 MAPS was the named defendant in no fewer than three lawsuits, being sued by 86: 58: 105: 65: 275:
is not clear, so postmasters may just conclude that the more lists they use, the more spam they block. However, one of MAPS lists,
267:
Proposing so many lists can confuse a MAPS subscriber; postmasters may hurriedly subscribe to all lists. The difference between an
569: 72: 43: 259:
options (whitelisting is particularly convenient, as it allows to whitelist thousands of IP addresses with a few clicks).
179: 54: 223:
In 2001 the company started to require a subscription for accessing their lists. Non-subscribed users received a dummy
558: 32: 201: 138: 308: 284: 175: 79: 256: 283:
hijackers and similar threats. Furthermore, it paves the way for effectively exploiting policies like
476: 598: 200:
Being certain there was an absolute right to publish an anti-spam blacklist, MAPS published a
235:
In 2004 MAPS became a division of Kelkea, Inc, moved from Redwood City to San Jose, and from
495: 217: 130:. They provide five black lists, categorising why an address or an IP block is listed: 592: 499: 247: 163: 21: 471: 190: 134:
Real-time Blackhole List (RBL), the one for which MAPS is probably best known.
512: 252: 547: 232:
web site, and their fax-based subscription mechanism was rather awkward.
209: 158:
Non-confirming Mailing List (NML), marketers who use opt-out strategy.
126:) is an organization that provides anti-spam support by maintaining a 213: 186: 127: 288: 152: 137:
Dialup Users List (DUL), blocks of addresses that include many
541: 15: 536: 243:. Dave Rand was the founder and CEO of Kelkea at the time. 205: 565: 572:
to it so that it can be listed with similar articles.
513:"Study finds filters catch only a fraction of spam" 46:. Unsourced material may be challenged and removed. 216:. As the first lawsuit came in, MAPS brought in 220:as their Director of Legal and Public Affairs. 8: 144:Relay Spam Stopper (RSS), spam relays, e.g. 298:MAPS fails to disambiguate the concepts of 106:Learn how and when to remove this message 321: 271:which relays spam and a 'somehow open', 488: 151:Open Proxy Servers (OPS), naively open 7: 44:adding citations to reliable sources 557:needs additional or more specific 14: 291:authentication in order to block 185:The early history of MAPS is the 546: 511:Gwendolyn Mariano (2000-06-15). 20: 31:needs additional citations for 174:MAPS was founded in 1996 as a 55:"Mail Abuse Prevention System" 1: 180:anti-spam techniques (e-mail) 120:Mail Abuse Prevention System 287:, which rely upon end-user 615: 304:end-users of IP addresses 195:Real-time Blackhole List 309:local Internet registry 176:non-profit organization 189:itself. Dave Rand and 178:to pioneer innovative 477:Anti-spam techniques 202:"How to Sue Us" page 162:The acronym MAPS is 40:improve this article 293:email address abuse 212:, and survey giant 166:spelled backwards. 214:Harris Interactive 587: 586: 570:adding categories 463: 462: 248:Trend Micro, Inc. 187:History of DNSBLs 116: 115: 108: 90: 606: 582: 579: 573: 550: 542: 524: 523: 521: 520: 508: 502: 493: 322: 300:acknowledged ISP 218:Anne P. Mitchell 111: 104: 100: 97: 91: 89: 48: 24: 16: 614: 613: 609: 608: 607: 605: 604: 603: 589: 588: 583: 577: 574: 563: 551: 533: 528: 527: 518: 516: 510: 509: 505: 494: 490: 485: 468: 265: 172: 112: 101: 95: 92: 49: 47: 37: 25: 12: 11: 5: 612: 610: 602: 601: 591: 590: 585: 584: 554: 552: 545: 540: 539: 537:Main MAPS page 532: 531:External links 529: 526: 525: 503: 487: 486: 484: 481: 480: 479: 474: 467: 464: 461: 460: 457: 454: 451: 448: 445: 442: 439: 436: 433: 430: 426: 425: 422: 419: 416: 413: 410: 407: 404: 401: 398: 395: 391: 390: 387: 384: 381: 378: 375: 372: 369: 366: 363: 360: 356: 355: 352: 349: 346: 343: 340: 337: 334: 331: 328: 325: 264: 261: 246:In June 2005, 171: 168: 160: 159: 156: 149: 142: 135: 114: 113: 28: 26: 19: 13: 10: 9: 6: 4: 3: 2: 611: 600: 597: 596: 594: 581: 571: 567: 561: 560: 555:This article 553: 549: 544: 543: 538: 535: 534: 530: 514: 507: 504: 501: 497: 492: 489: 482: 478: 475: 473: 470: 469: 465: 458: 455: 452: 449: 446: 443: 440: 437: 434: 431: 428: 427: 423: 420: 417: 414: 411: 408: 405: 402: 399: 396: 393: 392: 388: 385: 382: 379: 376: 373: 370: 367: 364: 361: 358: 357: 353: 350: 347: 344: 341: 338: 335: 332: 329: 326: 324: 323: 320: 316: 312: 310: 305: 301: 296: 294: 290: 286: 280: 278: 274: 270: 262: 260: 258: 254: 249: 244: 242: 238: 233: 231: 226: 221: 219: 215: 211: 207: 203: 198: 196: 192: 188: 183: 181: 177: 169: 167: 165: 157: 154: 150: 147: 143: 140: 136: 133: 132: 131: 129: 125: 121: 110: 107: 99: 88: 85: 81: 78: 74: 71: 67: 64: 60: 57: –  56: 52: 51:Find sources: 45: 41: 35: 34: 29:This article 27: 23: 18: 17: 575: 556: 517:. Retrieved 506: 491: 317: 313: 303: 299: 297: 292: 281: 276: 272: 268: 266: 257:blacklisting 253:whitelisting 245: 240: 236: 234: 229: 224: 222: 199: 194: 184: 173: 161: 145: 123: 119: 117: 102: 93: 83: 76: 69: 62: 50: 38:Please help 33:verification 30: 515:. CNET News 559:categories 519:2010-03-23 483:References 472:Email spam 273:spam relay 269:open proxy 191:Paul Vixie 66:newspapers 599:Anti-spam 319:blocked. 263:Criticism 96:June 2011 593:Category 578:May 2024 566:help out 466:See also 225:unlisted 155:servers. 148:servers. 146:hijacked 564:Please 302:versus 277:the DUL 206:Yesmail 170:History 80:scholar 498:  459:19.4% 453:15.4% 450:32.3% 447:41.2% 444:23.7% 441:16.2% 438:13.8% 435:11.7% 418:29.2% 415:10.8% 412:17.3% 409:51.5% 406:48.8% 403:28.5% 400:21.4% 397:21.8% 389:65.1% 386:87.2% 383:55.2% 380:56.8% 377:41.4% 374:24.6% 371:35.0% 368:57.5% 365:66.7% 362:71.6% 210:Media3 141:users. 82:  75:  68:  61:  53:  456:8.4% 432:6.0% 424:6.2% 421:4.1% 354:2020 351:2019 348:2018 345:2017 342:2016 339:2015 336:2014 333:2013 330:2012 327:2011 128:DNSBL 87:JSTOR 73:books 500:5782 429:RBL 394:QIL 359:DUL 289:SMTP 255:and 241:.com 237:.org 230:.org 164:spam 153:SMTP 139:SOHO 124:MAPS 118:The 59:news 568:by 496:RFC 285:SPF 239:to 42:by 595:: 208:, 182:. 580:) 576:( 562:. 522:. 122:( 109:) 103:( 98:) 94:( 84:· 77:· 70:· 63:· 36:.

Index


verification
improve this article
adding citations to reliable sources
"Mail Abuse Prevention System"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
DNSBL
SOHO
SMTP
spam
non-profit organization
anti-spam techniques (e-mail)
History of DNSBLs
Paul Vixie
"How to Sue Us" page
Yesmail
Media3
Harris Interactive
Anne P. Mitchell
Trend Micro, Inc.
whitelisting
blacklisting
SPF
SMTP
local Internet registry

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.