Whitelisting

Whitelisting is the practice of explicitly allowing some identified entities access to a particular privilege, service, mobility, access or recognition. It is the reverse of blacklisting.

Email whitelists

Spam filters often include the ability to "whitelist" certain sender IP addresses, email addresses or domain names to protect their email from being rejected or sent to a junk mail folder. These can be manually maintained by the user[1] or system administrator - but can also refer to externally maintained whitelist services.

Non-commercial whitelists

Non-commercial whitelists are operated by various non-profit organisations, ISPs and others interested in blocking spam. Rather than paying fees, the sender must pass a series of tests; for example, his email server must not be an open relay and have a static IP address. The operator of the whitelist may remove a server from the list if complaints are received.

Commercial whitelists

Commercial whitelists are a system by which an Internet service provider allows someone to bypass spam filters when sending email messages to its subscribers, in return for a pre-paid fee, either an annual or a per-message fee. A sender can then be more confident that his messages have reached their recipients without being blocked, or having links or images stripped out of them, by spam filters. The purpose of commercial whitelists is to allow companies to reliably reach their customers by email.

Commercial providers include Return Path Certification,[2] eco's Certified Senders Alliance, and the Spamhaus Whitelist.[3]

Advertising whitelists

Many websites rely on ads as a source of revenue,[4] but the use of ad blockers is increasingly common. Websites that detect an adblocker in use often ask for it to be disabled - or their site to be "added to the whitelist"[5] - a standard feature of most adblockers.

Network whitelists

Network Whitelisting can occur at different layers of the OSI model.

LAN whitelists

LAN whitelists are enforced at layer 2 of the OSI model. Another use for whitelists is in local area network (LAN) security. Many network admins set up MAC address whitelists, or a MAC address filter, to control who is allowed on their networks. This is used when encryption is not a practical solution or in tandem with encryption. However, it's sometimes ineffective because a MAC address can be faked.

Firewall whitelists

Some firewalls can be configured to only allow data-traffic from/ to certain (ranges of) IP-addresses. A firewall generally works at layer 3 and 4 of the OSI model. Layer 3 is the Network Layer where IP works and Layer 4 is the Transport Layer, where TCP and UDP function.

Application whitelists

The application layer is layer 7 in the Open Systems Interconnection (OSI) seven-layer model and in the TCP/IP protocol suite. Whitelisting is commonly enforced by applications at this level.

One approach in combating viruses and malware is to whitelist software which is considered safe to run, blocking all others.[6][7][8][9] This is particularly attractive in a corporate environment, where there are typically already restrictions on what software is approved.

Leading providers of application whitelisting technology include Bit9, Velox, McAfee, Lumension and Airlock Digital.[10][11]

On Microsoft Windows, recent versions include AppLocker, which allows administrators to control which executable files are denied or allowed to execute. With AppLocker, administrators are able to create rules based on file names, publishers or file location that will allow certain files to execute. Rules can apply to individuals or groups. Policies are used to group users into different enforcement levels. For example, some users can be added to report only policy that will allow administrators to understand the impact before moving that user to a higher enforcement level.

Linux system typically have AppArmor and SE Linux features available which can be used to effectively block all applications which are not explicitly whitelisted, and commercial products are also available.[12]

On HP-UX introduced a feature called "HP-UX Whitelisting" on 11iv3 version.[13]

See also

  • DNSWL, whitelisting based on DNS
  • Walled garden (technology), a whitelist that a device's owner cannot control

References

  1. e.g. Kindle users control the whitelist for email access. Besides Amazon itself, only e-mail addresses whitelisted by the device's registered owner can send content ("personal documents") to that device.
  2. "Email Certification – Email Sender Certification – Return Path - Return Path". returnpath.net.
  3. "The Spamhaus Whitelist". spamhauswhitelist.com.
  4. "Pros and cons of relying only on advertising revenue | AdSpeed AdServer". www.adspeed.com. Retrieved 2017-12-09.
  5. "Adblock Instructions". Forbes. Retrieved 2017-12-09.
  6. John Harrison, Enhancing Network Security By Preventing User-Initiated Malware Execution, Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) (Wireless Ad Hoc/Sensor Networks and Network Security Track), Volume II - Volume 02; pages 597-602; IEEE Computer Society Washington, DC, USA 2005.
  7. "SANS Institute: Reading Room - Analyst Papers" (PDF). www.sans.org. Retrieved 27 August 2018.
  8. "Dark Reading - Security - Protect The Business - Enable Access". Dark Reading.
  9. "Application Whitelisting Gains Traction". eweek.com.
  10. Blum, Dan (February 8, 2014). "Lessons Learned from Target Breach". Security-Architect Blog. Dan Blum. Retrieved July 18, 2014.
  11. Vamosi, Robert (2008-07-21). "Will you be ditching your antivirus app anytime soon?". CNET. Retrieved 2010-03-22.
  12. Cooprider, Nathan (2016-02-03). "Live Whitelisting!". Threat Stack. Retrieved 20 December 2018.
  13. "HP-UX Whitelisting". HP. Retrieved 20 December 2018.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.