Whitelist

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 67.219.254.84 (talk) at 23:01, 18 December 2009. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

A whitelist or approved list is a list or register of entities that, for one reason or another, are being provided a particular privilege, service, mobility, access or recognition. As a verb, to whitelist can mean to authorize access or grant membership. Conversely, a blacklist is a list or compilation that identifies entities that are denied, unrecognized, or ostracized.

E-mail whitelists

An e-mail whitelist is a list of contacts that the user deems are acceptable to receive email from and should not be sent to the trash folder.

Spam filters that come with e-mail clients have both white and black lists of senders and keywords to look for in e-mails. If a spam filter keeps a whitelist, mail from the listed e-mail addresses, domains, and/or IP address will always be allowed.

Some Internet service providers have whitelists that they use to filter e-mail to be delivered to their customers. ISPs receive requests from legitimate companies to add them to the ISP whitelist of companies. Companies either pay for a time period to be allowed to e-mail their customers or the companies pay per complaint received by the ISP from their customers. These payments per complaint increase incrementally: ie. The first 10 complaints are $10 each. The next 10 are $20 each. These funds are then used by the ISPs to fund anti-spam programs to prevent unwanted e-mail.[citation needed]

If a white list is exclusive, only e-mail from those on the white list will get through. If it is not exclusive, it prevents e-mail from being deleted or sent to the junk mail folder by the spam filter. Usually, only end-users would set a spam filter to delete all e-mails from sources not on the white list, not internet service providers or e-mail services.

Using whitelists and blacklists can assist in blocking unwanted messages and allowing wanted messages to get through, but they are not perfect. E-mail whitelists are used to reduce the incidence of false positives, often based on the assumption that most legitimate mail will be from a relatively small and fixed set of senders. To block a high percentage of spam, e-mail filters have to be continuously updated as e-mail spam senders create new email addresses to e-mail from or new keywords to use in their e-mail which allows the e-mail to slip through.

Noncommercial whitelists

Noncommercial whitelists are operated by various non-profit organisations, ISPs and other entities interested in blocking spam. Rather than paying fees the sender must pass a series of tests; for example, his email server must not be an open relay and have a Static IP address. The operator of the whitelist may remove a server from the list if complaints are received.

Commercial whitelists

Commercial whitelists are a system by which an internet service provider allows someone to bypass spam filters when sending e-mail messages to its subscribers, in return for a pre-paid fee, either an annual fee or a per-message fee. A sender can then be more confident that his messages have reached their recipients without being blocked, or having links or images stripped out of them, by spam filters. The purpose of commercial whitelists is to allow companies to reliably reach their customers by e-mail.

Commercial providers include GoodMailSystems's Certified Email, Return Path Certification, and eco's Certified Senders Alliance.

LAN whitelists

Another use for whitelists is local area network (LAN) security. Many network admins setup MAC address whitelists or a MAC address filter to control who is on their networks. This is used when encryption is not a practical solution or in tandem with encryption. However, it's sometimes ineffective because a MAC address can be faked.

Some firewalls can be configured to only allow data-traffic from/ to certain (ranges of) IP-addresses.

Program whitelists

If an organization keeps a white list of software, only titles on the list will be accepted for use. The benefits of whitelisting in this instance are that the school administration can ensure itself that students will not be able to download and/or use programs that have not been deemed appropriate for use.

Application whitelists

An emerging approach in combating viruses and malware is to whitelist software which is considered safe to run, blocking all others. Some deem this as superior to the standard signature-based, anti-virus approach of blocking/removing known harmful software (essentially blacklisting), as the standard approach generally means that exploits are already in the wild.[1][2]

Some examples of software products that employ application whitelist policies are BOUNCER by Coretrace, Bit9 Parity, Comodo Internet Security Suite, DriveSentry, Faronics Anti-Executable, Green Border Technologies' GreenBorder Pro, ISS Blackice, Lumension Security's Sanctuary Applications Control, Savant Protection, SE46, SignaCert's Enterprise Trust Server, Solidcore S3 Control (acquired by McAfee and now called McAfee Application Control[1]) and Winternals Software's Protection Manager (acquired by Microsoft).

These products may provide administrative control over program whitelists in addition to preventing malware. [3] [4]

References

External links