IBM AH0QXML User Guide - Page 17

spammer can create. They can deliberately send empty attachments, bad, headers, looping addresses

Page 17 highlights

Mail trying to entice you to visit certain sites, often pornographic, or of very questionable nature. - Mail of this nature is often directly to the point. "Wanna see more of me? Click here." or "I can't believe it, you have to see this! Click here." This type of spam is often paid for by the site in question. Advertising rates for big commercial sites are very high, for the simple reason that a great many people will see them. - If an unscrupulous site can demonstrate through an independent source that they have a very large hit rate, they will entice advertisers hoping to sell products or services via their site. The more people who innocently click on the link, the higher the hit counter will soar. Many spammers also take advantage of the fact that HTML mail can contain moving images. For instance, "Click on the Monkey to win $10,000" and when you click on the monkey then you are sent to the site the spammer intended. Malicious mail designed to interrupt regular Internet traffic or flood mailboxes or mail routers. - This last category is the type of spam the average person will be least likely to come across. It consists of malformed messages designed to disrupt mail services, often by attempting to crash SMTP routers. There are an infinite number of possible combinations of mail messages that a spammer can create. They can deliberately send empty attachments, bad headers, looping addresses, incorrect control characters within critical routing fields, or any of a myriad of other things to attempt to cause mail blockages. - Mail routing applications such as Lotus Domino have very robust SMTP defenses in place to avoid and prevent these types of attacks. Defensive code included in the product will reject malformed messages which could have provoked error conditions. Normally, mail needs to conform to a strict standard in order to be accepted. If not, the SMTP router will simply reject it. However, hackers, crackers, and malicious spammers are constantly changing the methods they use to attempt to disrupt services. Inevitably, an unprotected system will eventually fall prey to this type of message. For more information about what constitutes spam, see the publicly available RFCs located here: RFC2505 (http://www.ietf.org/rfc/rfc2505.txt?number=2505) RFC2635 (http://www.ietf.org/rfc/rfc2635.txt?number=2635) Chapter 1. Introduction 5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

Chapter 1. Introduction
5
±
Mail trying to entice you to visit certain sites, often pornographic, or of very
questionable nature.
Mail of this nature is often directly to the point.
Wanna see more of me?
Click here.
or
I can't believe it, you have to see this! Click here.
This type
of spam is often paid for by the site in question. Advertising rates for big
commercial sites are very high, for the simple reason that a great many
people will see them.
If an unscrupulous site can demonstrate through an independent source
that they have a very large hit rate, they will entice advertisers hoping to
sell products or services via their site. The more people who innocently
click on the link, the higher the hit counter will soar. Many spammers also
take advantage of the fact that HTML mail can contain moving images. For
instance,
Click on the Monkey to win $10,000
and when you click on the
monkey then you are sent to the site the spammer intended.
±
Malicious mail designed to interrupt regular Internet traffic or flood mailboxes
or mail routers.
This last category is the type of spam the average person will be least
likely to come across. It consists of malformed messages designed to
disrupt mail services, often by attempting to crash SMTP routers. There
are an infinite number of possible combinations of mail messages that a
spammer can create. They can deliberately send empty attachments, bad
headers, looping addresses, incorrect control characters within critical
routing fields, or any of a myriad of other things to attempt to cause mail
blockages.
Mail routing applications such as Lotus Domino have very robust SMTP
defenses in place to avoid and prevent these types of attacks. Defensive
code included in the product will reject malformed messages which could
have provoked error conditions. Normally, mail needs to conform to a strict
standard in order to be accepted. If not, the SMTP router will simply reject
it. However, hackers, crackers, and malicious spammers are constantly
changing the methods they use to attempt to disrupt services. Inevitably,
an unprotected system will eventually fall prey to this type of message.
For more information about what constitutes spam, see the publicly available
RFCs located here:
±
RFC2505 (
)
±
RFC2635 (
)