open relay
Home > Networking Definitions - Open relay
SearchNetworking.com Definitions (Powered by WhatIs.com)
EMAIL THIS
LOOK UP TECH TERMS Powered by: WhatIs.com
Search listings for thousands of IT terms:
Browse tech terms alphabetically:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z #

open relay


DEFINITION - An open relay (sometimes called an insecure relay or a third-party relay) is an SMTP e-mail server that allows third-party relay of e-mail messages. By processing mail that is neither for nor from a local user, an open relay makes it possible for an unscrupulous sender to route large volumes of spam. In effect, the owner of the server -- who is typically unaware of the problem -- donates network and computer resources to the sender's purpose. In addition to the financial costs incurred when a spammer hijacks a server, an organization may also suffer system crashes, equipment damage, and loss of business.

In the past, open relays were used intentionally, for example, to facilitate mail relay between the separate closed e-mail systems (such as UUCP or FidoNet) or to allow network administrators to debug mail connectivity issues and route mail around known problems. However, the Internet has expanded enormously since then, and the potential for abuse has expanded accordingly. Spammers have learned that by hijacking open relays, they can in effect "launder" their spam, delivering their unsolicited e-mail while spoofing their identity to make their messages appear to come from a legitimate source.

Spammers are able to locate accessible third-party mail relay servers by using automated tools that are readily available on the Internet. By relaying mail through several open relay mail servers at the same time, it is possible to flood the Internet with large amounts of junk mail in a very short period of time before being detected. Spammers who use third-party mail relays not only damage the reputation of those whose servers they have hijacked, clog networks with junk mail, and frequently crash servers -- they are guilty of breaking the law because technically, they are stealing services.

The Mail Abuse Prevention System (MAPS) is one of several organizations that seeks to control the problem of open relays, though educating the public about the danger, and through publishing a blacklist of organizations whose mail hosts allow third-party relays. The relay feature is a part of all SMTP-based servers, which means that most modern e-mail servers, if unprotected, are vulnerable. According to MAPS, because spammers use automated tools to search the Internet for vulnerable servers, an open relay will eventually be found and used. To avoid allowing spammers free access to their resources -- and to help stem the Internet's flow of spam -- MAPS urges administrators to turn off the relay option on their servers.

LAST UPDATED: 19 Jul 2004

Read more about open relay:
- MAPS offers an article, "What is Third-Party Mail Relay?"
- Ohio State University provides a "Frequently-Asked Questions about Open Relays."
- Abuse.net provides a relay test to see if your server is vulnerable.
- Men and Mice explains the basics of third-party mail relays.
- SearchExchange.com offers a selection of Best Web Links for Hardware Administration.


Do you have something to add to this definition? Let us know.
Send your comments to techterms@whatis.com


Share -  Digg This!   Bookmark with Delicious Bookmark with Del.icio.us

RELATED CONTENT
Disabling IPv6 in Windows Vista -- Pros and cons
Disabling IPv6 in Windows Vista could prevent performance and security problems, but there are pros and cons.
Network navigation -- Chapter 6 of 'Microsoft Windows Vista Administration'
Microsoft introduced a new way to view and navigate a network with Windows Vista. This chapter examines new network navigation tools and managing...
What licenses allow user access to applications on the server?
What licenses allow user access to the GP application on the server? Find out from infrastructure and project management expert Carrie Higbie.

RELATED GLOSSARY TERMS
Terms from Whatis.com − the technology online dictionary
common short code  (SearchMobileComputing.com)
Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular...
grawlix  (WhatIs.com)
A grawlix is a sequence of typographical symbols used to represent a non-specific, profane word or phrase.


HomeNewsTopicsITKnowledge ExchangeTipsAsk the ExpertsWebcastsWhite PapersNetworking Product TrialsCareers
About Us  |  Contact Us  |  For Advertisers  |  For Business Partners  |  Site Index  |  RSS
SEARCH 
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints  |  Site Map




All Rights Reserved, Copyright 2000 - 2007, TechTarget | Read our Privacy Policy
  TechTarget - The Most Targeted IT Media