List poisoning
From Wikipedia, the free encyclopedia
The term list poisoning as related to electronic mail (e-mail), refers to poisoning a mailing list with invalid e-mail addresses.
[edit] Industry uses
Once a mailing list has been poisoned with a number of invalid e-mail addresses, the resources required to send a message to this list has increased, even though the number of valid recipients has not. If one can poison a spammer's mailing list, one can force the spammer to exhaust more resources to send e-mail, in theory costing the spammer money and time.
Poisoning spammer's mailing lists is usually done by posting invalid email addresses in a Usenet forum or on a web page, where spammers are believed to harvest email addresses for their mailing lists. If using a dynamically generated web site for poisoning, the web site could link to itself infinitely, theoretically causing a spammer's mailing list to be substantially poisoned.
[edit] Vulnerabilities
- Syntactically invalid email addresses used to poison a mailing list could be easily filtered out by the spammers, while using email addresses that are syntactically correct could cause problems for the mail server responsible for the email address.
- Implementations of spam poisoning systems can be avoided, if spammers learn of their location.
- Spammers often steal resources so that the efficiency of a mailing places little financial burden on the spammer.
[edit] Implementations
List poisoning code written in Perl is available [1].
List poisoning code written in PHP is available [2].
An example of list poisoining using a shared CGI at a public URL is available [3]. Spammers can easily avoid this implementation by simply avoiding the public URL.