Fact-checked by Grok 2 weeks ago

Greylisting

Greylisting is an anti-spam filtering method that temporarily rejects messages from previously unseen sender , envelope sender addresses, and recipient addresses, relying on the SMTP protocol's retry mechanism to distinguish legitimate mail transfer agents—which typically retry after a 4xx temporary failure code—from spam-sending bots that often do not. Proposed by software developer in a 2003 whitepaper, the technique records a "triplet" of the sender's , envelope sender , and recipient upon initial connection; subsequent retries from the same triplet within a short window (often minutes to hours) are whitelisted, allowing delivery, while non-retries are effectively blocked. Empirical studies have demonstrated greylisting's effectiveness in reducing inbound volumes by 50-90% in early implementations, as it exploits behavioral differences without requiring or blacklists, though its impact has diminished over time as spammers adapted with retry-capable bots and distributed sending. Integrated into mail servers like Postfix, , and via plugins or built-in features, greylisting serves as a lightweight, stateless complement to other defenses such as , DKIM, and , processing millions of messages daily with minimal computational overhead. Notable drawbacks include initial delivery delays of up to several hours for legitimate emails, potential false positives for senders with dynamic IPs or load-balanced servers that alter on retry, and reduced efficacy against persistent campaigns that mimic compliant retry behavior. Despite these limitations, greylisting remains in use for its simplicity and low false negative rate, particularly in resource-constrained environments, and continues to block transient sources that abandon single attempts.

History

Invention and Early Adoption

Greylisting was proposed by as a technique exploiting the retry behavior differences between legitimate mail transfer agents (MTAs) and spam bots. Harris detailed the method in his whitepaper "The Next Step in the Spam Control War: Greylisting," initially tested in mid-2003 and revised for publication on August 21, 2003. The core idea involves temporarily rejecting initial SMTP connections from unfamiliar sender IP-sender envelope recipient-receiver domain triplets with a 4xx , prompting retries after a delay (typically 5-30 minutes); compliant MTAs retry, while many spammers do not. Harris reported early tests on small-scale hosts handling over 10,000 attempts daily achieved greater than 95% spam reduction without permanently blocking legitimate mail, attributing success to the observation that spam software often lacks robust retry logic. Harris provided an open-source prototype implementation as a Perl-based milter for Sendmail 8.12.9, facilitating immediate experimentation among system administrators. This Sendmail integration marked the first practical deployment, with source code released alongside the whitepaper for broader adaptation. By late 2003, the technique spread via community discussions on mailing lists and forums, prompting custom scripts and patches for other MTAs. Early adoption accelerated in 2004-2005 as dedicated tools emerged for dominant open-source MTAs. For Postfix, postgrey—a PostgreSQL-backed policy daemon—gained traction for its lightweight greylisting support, enabling server-side triplet tracking without modifying core Postfix code. users adopted greylisting through built-in configurations or add-ons like greylistd, a standalone daemon handling triplet validation for multiple MTAs. Sendmail's milter ecosystem expanded with graymilter, refining Harris's original for production use. Administrators reported volumes dropping 50-90% in initial rollouts, though delays for first-time legitimate senders (up to 30 minutes) prompted whitelisting tweaks for critical domains. By mid-2005, greylisting was deployed on servers processing millions of messages daily, as noted in Harris's updates, reflecting its appeal for resource-constrained environments over compute-intensive alternatives like Bayesian filtering.

Evolution and Standardization Efforts

Greylisting, initially proposed by in 2003, evolved through community-driven implementations in mail transfer agents such as Postfix and , with early reports documenting reductions in volumes by 50-90% in deployed systems by 2005. These implementations introduced variations, including database-backed triplet tracking for sender , envelope sender, and recipient addresses, alongside mechanisms to shorten retry delays for high-volume legitimate traffic to minimize user-perceived latency. Subsequent refinements addressed limitations like false positives from non-compliant legitimate servers, leading to hybrid approaches integrating greylisting with reputation-based filtering and DNS blacklists; for instance, by , operators reported adapting policies to whitelist major providers such as and to preserve delivery rates above 99%. Patent filings around 2008 further advanced optimizations, such as predictive whitelisting based on reverse DNS records and partial triplet matching to reduce initial rejections for recurring senders. Standardization efforts gained traction within the IETF's Applications Area Working Group (APPSAWG), culminating in 6647, "Email Greylisting: An Applicability Statement for SMTP," published as a Proposed Standard on June 25, 2012. Authored by Michael Levine and Scott Kitterman, the formalizes greylisting's operational principles, emphasizing its reliance on SMTP's temporary failure codes (4xx) and providing guidance on deployment to avoid issues, such as excessive delays or conflicts with extended SMTP (ESMTP) extensions. It affirms greylisting's standards compliance under 5321 while cautioning against overuse in environments with high legitimate mail volumes, drawing on empirical data from production systems to recommend triplet expiration times of 5-15 minutes. Post-RFC developments have focused on integration with modern protocols like and , with ongoing discussions in IETF forums highlighting greylisting's role in countering botnet-driven spam waves, though without subsequent updates to elevate it beyond Proposed Standard status as of 2025. Empirical evaluations continue to validate its efficacy, with studies showing sustained spam rejection rates of 70-95% when combined with other defenses, albeit with evolving challenges from persistent spammers implementing retry logic.

Technical Mechanism

Core Operation Principle

Greylisting functions by temporarily rejecting SMTP connections from unrecognized sending hosts, leveraging the protocol's requirement for legitimate mail transfer agents (MTAs) to retry deliveries after temporary failures, as specified in RFC 5321, while many spam-sending systems lack such retry mechanisms. The receiving server evaluates incoming connections against a database of prior interactions, typically using a "triplet" comprising the client's , the envelope sender address (MAIL FROM), and the envelope recipient address (RCPT TO). If the triplet is absent or its record lacks a minimum age threshold—often 30 minutes—the server issues a 4xx SMTP response code, such as ("Requested mail action not taken: try again later") or 421 (service unavailable), and terminates the session without accepting the message. Upon retry, compliant MTAs reattempt delivery, with standard practice involving initial delays of at least 30 minutes followed by up to several days. The greylisting server accepts the message if the retry occurs within a defined , defaulting to 1 minute to 24 hours, and the triplet matches the prior rejection; it then whitelists the triplet for an extended duration, typically at least one week, to bypass future checks. Known legitimate sources, such as whitelisted ranges or domains verified via DNS-based blacklists, are exempted from greylisting to prevent unnecessary delays. This approach incurs minimal ongoing computational overhead, as successful deliveries populate the , reducing database queries over time, but it relies on the empirical observation that operations prioritize volume over compliance, often forgoing retries from disposable or high-volume setups. Implementations may vary in triplet granularity or incorporate additional signals, such as HELO/EHLO validation, but the core deferral-and-retry remains invariant. Initial legitimate emails may experience delays of up to the retry window, though non-compliant MTAs risk permanent message loss, underscoring the technique's alignment with SMTP standards rather than universal accommodation.

Key Parameters and Variations

Greylisting implementations rely on a core lookup key known as the triplet, consisting of the sending server's , the envelope sender address from the SMTP MAIL FROM command, and the first envelope recipient address from the RCPT TO command. Upon receiving matching an unknown triplet, the receiving server issues a temporary rejection using SMTP codes such as (Requested action not taken: unavailable) or 421 (Service not available), prompting the sender to retry after a delay. The system then accepts the message on retry if the triplet matches and occurs within an expected window, typically 1 minute to 24 hours, after which the triplet is whitelisted for a duration of at least 1 week to several months to avoid repeated challenges. Configurable parameters include the initial delay before (e.g., 60 seconds in some Postfix setups or 1 hour in early designs), the retry (e.g., 3 hours following the delay), and expiration (e.g., 36 days with renewal on success). can also incorporate manual exceptions for trusted addresses, domains, or null senders, stored in or configuration files, with recommendations to avoid sender-based whitelists due to spoofing risks. Variations in triplet handling include using CIDR blocks (e.g., /24 subnets) instead of exact IP addresses to accommodate senders behind shared infrastructure or load balancers, reducing false positives from dynamic IPs. Some systems apply greylisting on a per-domain basis for recipients, sharing databases across multiple records to ensure consistency, or skip it for authenticated SMTP sessions to prioritize legitimate bulk mail. Advanced options feature auto-whitelisting after multiple successful retries (e.g., 10 deliveries) or delaying rejection until the phase for callbacks with null envelopes, though these increase resource use and are not universally recommended.

Integration with Other Filtering Methods

Greylisting functions effectively within multi-layered architectures, typically positioned after initial and evaluations to balance rejection with legitimate mail delivery. Whitelisted entities, including trusted addresses, domains, or sender-recipient pairs maintained in lists, bypass greylisting entirely, ensuring undelayed acceptance for verified sources such as internal networks or approved partners. Blacklisted sources, identified via blackhole lists (RBLs) or local deny rules, trigger immediate SMTP rejections (e.g., 5xx errors) prior to greylisting invocation, preventing resource expenditure on confirmed threats. This sequencing minimizes false positives and computational overhead, as greylisting targets only unclassified unknowns. Post-retry processing after a greylisting temporary deferral (e.g., error) integrates authentication mechanisms like (), which verifies authorizing IP addresses against domain records; DomainKeys Identified Mail (DKIM), which cryptographically signs messages for integrity; and (), which enforces SPF/DKIM alignment policies. These checks occur before or alongside content-based scanning, leveraging greylisting's volume reduction—often 50-90% initial drop—to enhance efficiency of resource-intensive filters like Bayesian classifiers or matching in tools such as SpamAssassin. Failure in these authentication layers can still result in rejection or quarantine, providing defense-in-depth against forged or compromised senders that evade behavioral greylisting. Advanced configurations, as in policy servers like Postgrey for Postfix or Rspamd integrations, apply greylisting selectively based on preliminary scoring from heuristics or lightweight scans, reserving delays for medium-to-high risk mails while accepting low-risk ones promptly. This adaptive layering counters spamming adaptations, such as retry-capable bots, by combining greylisting's temporary hurdles with ongoing blacklist updates and refinements, though it requires careful tuning to avoid excessive legitimate mail delays reported in high-volume environments. Empirical deployments, such as those documented in milter setups, demonstrate sustained efficacy when greylisting precedes but does not supplant these complementary methods.

Implementation

Software and Server Support

Greylisting is supported in major open-source mail transfer agents (MTAs) through dedicated policy servers, filters, or configurable access controls. Postfix implements greylisting via external policy daemons like postgrey, which queries a database of sender triplets (, sender , recipient ) and instructs Postfix to temporarily defer unknown connections using SMTP error code during the policy service check. This integration leverages Postfix's smtpd(8) policy delegation feature, available since version 2.0 in 2004, allowing administrators to enable it by configuring the smtpd_recipient_restrictions parameter to invoke the greylisting service. Exim supports greylisting natively through its Access Control Lists (ACLs), where custom conditions can check sender history against a database and issue temporary rejections, or via third-party daemons such as greylistd, which maintains state in DBM files or SQL backends and integrates via 's transport filters. Implementations often use scripts or for storage, with ACLs defined in the Exim configuration file to apply greylisting at the RCPT TO stage, deferring with a 4xx response for first-time senders. Sendmail employs greylisting primarily through milter-greylist, a libmilter-based that intercepts SMTP sessions and applies triplet-based deferrals, configurable via a dedicated greylist.conf file specifying patterns, delay intervals ( 5 minutes), and backend storage like . This milter operates at the RCPT stage, rejecting unknown senders with a 451 error, and has been available since its initial release in 2003, compatible with versions supporting milters (8.12+). Commercial and proprietary servers vary in support; for instance, MailEnable includes built-in greylisting in its SMTP service, configurable under server options to delay emails from new addresses for compliance with retry logic in RFC 5321. and lack native greylisting as a receiving , relying instead on third-party gateways or add-ins for similar functionality, as confirmed by ongoing requests for without official adoption. Specialized anti-spam appliances and services, such as ORF or , embed greylisting as a core feature with policy-based exceptions and database-driven whitelisting.

Configuration Best Practices

Effective configuration of greylisting requires balancing spam rejection with minimal disruption to legitimate delivery, typically achieved by tuning delay intervals, selecting appropriate triplet keys, and maintaining dynamic whitelists. Administrators should begin with short initial delays of 30 to 300 seconds to allow rapid retries from compliant mail transfer agents (MTAs), as many legitimate servers attempt redelivery within one minute, reducing end-user perceived . Longer delays, such as 5-15 minutes, enhance effectiveness against bots but increase risk of delivery failures for misconfigured senders. The core triplet—combining sender (often class C for robustness against minor IP changes), envelope sender , and recipient —should be used to identify sessions, avoiding overly permissive single-IP keys that spammers can evade via rotation. Expiration of greylist entries after 63 days (or two months plus one day) prevents indefinite storage bloat while accommodating infrequent legitimate senders. For implementations like Postgrey in Postfix, configure the daemon to listen on port 10030 and integrate via smtpd_recipient_restrictions with check_policy_service. Whitelisting is essential to exempt trusted sources and mitigate false positives; include major providers (e.g., gmail.com, outlook.com), local networks, authenticated SMTP submissions, and reverse DNS-verified hosts in files like /etc/postgrey/whitelist_clients or conditions. Auto-whitelisting after successful deliveries (e.g., 3-5 retries) or via policy servers checking /DKIM prior to greylisting further refines accuracy. In setups using , define defer conditions in the RCPT after relay host accepts, with daily jobs to purge entries older than 30 days. Exemptions should cover high-volume scenarios like mailing lists or notifications, where initial retries may fail due to limits; test configurations in environments to quantify success rates. Integrate greylisting after initial SMTP checks (e.g., HELO validation, RBL lookups) but before content scanning to optimize resource use. Ongoing monitoring involves reviewing mail logs (e.g., /var/log/mail.log) for 451 deferrals and retry patterns, enabling verbose logging initially, and adjusting parameters based on false positive rates—aiming for under 1% impact on legitimate traffic through iterative updates. Tools like Postgrey's query counters or Exim's / queries help track efficacy, with restarts post-configuration changes to apply updates without downtime.

Challenges in Deployment

Deploying greylisting requires careful integration with mail transfer agents (MTAs) such as Postfix or , often via milters like milter-greylist, which involves configuring lists, delay parameters, and backend databases for storing triplets of sender , envelope sender, and recipient address. Misconfigurations can lead to excessive rejections or failure to apply greylisting, as seen in cases where policy delegation or handling is not properly tuned. Administrators must select and maintain a storage mechanism, such as SQL databases or flat files, with appropriate pruning to manage entry expiration, adding to setup complexity on high-volume servers. A significant challenge arises when legitimate senders operate from multiple or rotating IP addresses, such as large providers like or 365 using load-balanced server farms. In standard greylisting, the sender IP is part of the triplet; retries from a different IP invalidate the match, causing repeated temporary rejections and potential delivery failures if the sender's retry logic does not align. This issue is exacerbated by cloud-based or dynamic IP environments, necessitating variants like sender/recipient-only greylisting or preemptive whitelisting of IP ranges, which undermine the technique's simplicity. Ongoing management includes maintaining whitelists for trusted senders to bypass delays, particularly for transactional emails, mailing lists, or services prone to variability, as unwhitelisted legitimate mail faces initial deferrals of 5 to 15 minutes. Failure to update whitelists promptly can result in user complaints over delayed urgent communications, while over-whitelisting reduces effectiveness against . Additionally, in clustered receiver environments, ensuring consistent greylist state across nodes requires synchronized databases, further complicating .

Effectiveness and Evidence

Empirical Studies and Data

A 2022 study analyzing email delivery practices across 436 regular email providers and 6,772 unsolicited emails found that greylisting reduced spam delivery success from a baseline of 100% to 63.1%, achieving a 36.9% reduction in spam volume, while exhibiting minimal impact on legitimate mail, with only 0.9% of regular IPv4 providers failing to retransmit after temporary rejection. The same analysis reported that 97.9% of regular providers successfully retransmitted over IPv4, compared to lower compliance (44.0%) over IPv6, highlighting protocol-specific variations in retry behavior. Earlier empirical evaluation from 2016, based on traces from major families responsible for over 93% of (70.69% of global volume), demonstrated that greylisting effectively blocked deliveries from Cutwail and Darkmailer —accounting for over 43% of global —across delay thresholds of 5 seconds to 21,600 seconds, as these spammers did not implement retries. However, it proved ineffective against the Kelihos (36.33% of ), which incorporated adaptive retry delays peaking at 300–600 seconds, allowing eventual delivery even at longer thresholds. Real-world deployment data from a mail server with a 300-second greylisting threshold indicated delays for benign emails, with 50% experiencing postponements beyond 10 minutes and some exceeding 50 minutes, though ultimate delivery rates for legitimate mail remained high due to compliant MTA retry schedules aligned with RFC standards (typically 4–7 days TTL). These findings underscore greylisting's reliance on spammer non-compliance with SMTP retry norms, yielding spam catch rates of 70–80% in non-adaptive scenarios but diminishing against evolved botnets.

Factors Influencing Success Rates

The success of greylisting in reducing depends primarily on the retry of sending transfer agents (MTAs), with legitimate servers adhering to SMTP standards by retrying deferred messages (typically 4xx temporary failures) over periods of minutes to hours, while many spam-sending bots and scripts fail to retry or do so inconsistently. Empirical of 715,000 delivery attempts over seven weeks showed that 20% of attempts were greylisted, but only 16% retried successfully, implying an 80% block rate among greylisted traffic dominated by . A 2022 study confirmed greylisting halves volume without affecting legitimate delivery rates, attributing this to persistent non-compliance among sources like families, where over 50% of popular variants were blocked due to failed retries. Configuration parameters, such as the deferral delay (often 5 minutes) and the triplet key (combining sender , envelope sender, and recipient), significantly influence outcomes by balancing spam rejection against legitimate throughput. Shorter may allow more bots to retry, reducing , while variations like loosening the triplet for bounces or using sender /HELO pairs mitigate false but can permit if spammers mimic compliant patterns. Implementations on Postfix with Postgrey demonstrated consistent across servers, with no observed over time when filtering occurs early in the SMTP session, though custom variations in server software can yield up to 10-20% differences in session rejection rates. Whitelisting practices and exemptions for known trusted sources enhance reliability by minimizing delays for legitimate , but overly aggressive erode spam reduction by bypassing checks on suspicious . In deployments, extending durations from 7 to 30 days for previously successful retries increased acceptance of repeat senders to 62%, indirectly boosting overall success by reducing administrative overhead, though this risks entrenching adapted . False positive rates remain low (under 0.01% with adjunct DNS checks), as most and MTAs comply, but factors like software generating unique per-recipient envelopes or non-standard clients can elevate temporary rejections to 1-5% of legitimate attempts without proper exemptions. Spammer adaptations, including retry-capable bots and rotation, progressively diminish returns, with early deployments achieving 80-90% cuts but later ones closer to 50% as bots evolve to handle 4xx responses. Environments with high volumes benefit more proportionally, as greylisting's stateless nature scales without added compute, but integration with blacklists or systems amplifies by pre-rejecting known bad actors, preventing greylist entry altogether.

Adaptations by Spammers

Spammers initially evaded detection by greylisting through reliance on non-compliant, high-volume "" delivery systems that abandoned messages upon any rejection, including temporary 4xx SMTP errors. To counter this, some have incorporated retry logic into their bots, enabling automatic resends after delays matching typical greylisting windows of 5 to 30 minutes, thereby complying just enough to pass the initial deferral. This shift demands queuing undelivered messages, escalating storage and bandwidth requirements, which can multiply operational costs by factors of 2 to 10 for persistent campaigns, as each (sender IP, envelope sender, recipient) triggers independent delays. Advanced variants use distributed IP rotation across botnets to generate fresh triplets per attempt, attempting to reset delays and avoid whitelisting thresholds, though this exposes more endpoints to DNS-based blacklists during retries. Others leverage third-party open relays or hijacked legitimate MTAs that natively retry failures per 5321, outsourcing compliance without modifying core spam tools; however, such relays face rapid shutdowns or listings once patterns emerge. These adaptations remain niche, as bulk spammers prioritize speed over persistence, limiting their scale against resource-constrained operations.

Advantages

Spam Reduction Benefits

Greylisting mitigates by temporarily deferring connections from unrecognized sender (IP address, envelope sender, and recipient), prompting compliant MTAs to retry after a delay—typically 5 to 30 minutes—while many automated tools, which prioritize volume over persistence, fail to do so and are thereby discarded. This approach exploits empirical non-conformance to SMTP retry protocols ( 5321) prevalent among botnets and disposable infrastructure, which constitute the majority of global volume exceeding 90% of SMTP traffic. Deployments yield measurable spam reductions, with a 2022 of unsolicited streams reporting a 36.9% decrease in received volume under greylisting via Postgrey, without elevating legitimate delivery failures beyond 0.9% for standard providers. Evaluations against families demonstrate blocking efficacy against non-retrying like Cutwail (46.9% of tested ) and Darkmailer (7.2%), though less so against retry-capable ones like Kelihos (36.3%), collectively thwarting over 50% of from prominent families. In a month-long institutional gateway experiment, greylisting combined with dynamic DNS-based checks blocked 70.3% of confirmed sessions, underscoring its role in preempting high-volume campaigns. These reductions extend beyond direct blocking by offloading initial SMTP handshakes, curbing resource-intensive spam floods that could otherwise saturate filters or expose servers to exploits in attachments and , thereby enhancing overall system without relying on content scanning prone to evasion. Such benefits are particularly pronounced in environments with diverse inbound traffic, where greylisting serves as a low-compute frontline , filtering transient spammers before they adapt or themselves.

Resource Efficiency

Greylisting improves resource efficiency in email servers by eschewing resource-intensive operations such as , , or machine learning-based typically required in traditional filters. Instead, it performs lightweight checks on a triplet consisting of the sender's , envelope sender address, and envelope recipient address, storing these temporarily in a database or to issue a temporary rejection (e.g., SMTP ) for first-time connections. This process demands minimal CPU cycles, as it avoids or scanning the email body, headers beyond the envelope, or attachments, thereby reducing processing overhead per incoming connection. The temporary nature of greylisting records—often expiring after 5 to 15 minutes if no retry occurs—further limits and demands, preventing indefinite accumulation of for known spammers or legitimate senders that fail to retry. Empirical implementations, such as those in open-source mail transfer agents like Postfix or , report that greylisting adds negligible load compared to content-based filters, which can consume significant computational resources for scoring or matching on high-volume . For instance, servers handling millions of daily messages benefit from greylisting's ability to reject invalid attempts early in the SMTP , conserving and I/O operations that would otherwise be expended on full message acceptance and subsequent filtering. In comparative terms, greylisting's efficiency stems from leveraging SMTP protocol behaviors rather than post-acceptance processing, shifting minor retry costs to compliant sending servers while keeping receiver-side operations simple and scalable even on modest . Studies evaluating greylisting across SMTP servers have quantified its low overhead, noting effectiveness in reduction with far less resource footprint than alternatives like SpamAssassin, which require ongoing training and evaluation cycles. This makes greylisting particularly suitable for resource-constrained environments, such as or VPS-hosted mail servers, where full-spectrum filtering might strain available CPU or .

Autonomy for Administrators

Greylisting empowers email administrators with substantial control over spam mitigation by operating entirely within the local mail transfer agent (MTA), eschewing reliance on external DNS-based blacklists (DNSBLs) or third-party reputation services that can introduce delays, inaccuracies, or external policy influences. Administrators implement greylisting through simple rules that temporarily reject initial connections from unknown triplets (sender IP, envelope sender, and recipient), enforcing SMTP retry protocols to differentiate compliant legitimate servers from non-compliant spammers. This server-side mechanism, introduced by Evan Harris in September 2003, requires no subscriptions to centralized lists, allowing admins to define and adjust parameters like grey period duration (typically 5-10 minutes) and exemption criteria independently. Customization options further enhance autonomy, as administrators can maintain domain-specific whitelists for trusted senders, such as internal systems or frequent business partners, preventing unnecessary delays for high-volume legitimate traffic. For instance, tools like Postfix's postgrey or integrations permit SQL-backed shared databases across clustered servers, enabling scalable, self-managed greylisting without or data sharing with external entities. This contrasts with blacklist-dependent filters, where admins must defer to list maintainers' judgments on IP reputations, potentially exposing systems to outdated entries or from shared abuse. Minimal ongoing maintenance—primarily periodic tuning—facilitates rapid deployment and adaptation to evolving threats, with low computational overhead that preserves server resources for core operations. By prioritizing protocol compliance over or external verdicts, greylisting grants administrators verifiable, deterministic control rooted in SMTP standards ( 5321), reducing vulnerability to manipulations common in ecosystems. Empirical implementations report catch rates of 50-90% for initial volumes with negligible false positives after retries, affirming its efficacy under direct oversight. This self-contained approach aligns with causal principles of economics, where non-retrying bots represent low-effort attackers, allowing admins to enforce policies without compromising on empirical outcomes or ceding authority to opaque intermediaries.

Disadvantages and Criticisms

Delivery Delays for Legitimate Email

Greylisting inherently delays the delivery of legitimate from unfamiliar sender-recipient-IP combinations by issuing a temporary rejection—typically a 4xx SMTP error code—prompting the sending to retry after a configurable interval, often 5 to . This mechanism exploits the retry behavior of compliant as specified in RFC 821, but introduces a mandatory postponement for initial attempts, with empirical implementations showing delays up to 1 hour or more depending on the greylisting policy and MTA backoff algorithms. In practice, these delays vary by sending MTA; for example, common configurations like Postfix initiate retries at intervals starting from 5 minutes and escalating, potentially extending total delivery time beyond 50 minutes for some legitimate messages under a 300-second greylisting , where only 50% arrive within 10 minutes. Large-scale measurements across hundreds of providers report low outright failure rates for legitimate mail—around 0.9% for IPv4 and 0.5% for —but confirm consistent initial delays for new triplets, with early deployments observing 4.1% of non-trivial legitimate emails affected after excluding one-off sends. Compounding factors include multi-hop email paths with sequential greylisting servers, variable IP pools from senders, or mailing lists using unique addresses like VERP, which can trigger repeated rejections and amplify postponements to hours. Time-critical applications, such as confirmations or real-time notifications, suffer most, as even brief lags disrupt expected immediacy and user workflows, prompting criticisms that greylisting prioritizes spam defense over reliable, low-latency delivery. While webmail providers like demonstrate robust retry persistence—up to 94 attempts over 6 hours—the dependency on sender compliance risks inconsistent performance across diverse MTAs.

Compatibility Issues

Greylisting depends on compliant mail transfer agents (MTAs) that retry delivery after temporary rejections via SMTP 4xx codes, but non-standard or legacy MTAs often fail to implement proper retry logic, leading to permanent delivery failures for legitimate messages. Poorly configured servers, including those used by devices like or systems, may send one-time notifications without retry capabilities, exacerbating these failures as they treat the rejection as final. A further complication occurs when the originating changes between the initial delivery attempt and retry, invalidating the greylist entry, which is typically keyed on a triplet of sender address, recipient address, and source . This issue is prevalent in environments with dynamic IP pools, load-balanced clusters, or mechanisms, where retries may originate from different servers, prompting repeated temporary rejections. Greylisting can also disrupt email workflows involving protocol extensions or federated systems that do not anticipate delays from temporary failures, such as certain automated alerts or time-sensitive transactional emails, potentially causing or perceived unreliability in hybrid setups. Administrators must often maintain exemptions or custom configurations for affected MTAs, underscoring the technique's reliance on widespread SMTP , which remains incomplete across diverse implementations.

Diminishing Returns Over Time

Greylisting initially achieves high spam rejection rates, often exceeding 90% in early deployments, by exploiting the lack of retry mechanisms in rudimentary spam bots. However, as spam operations evolved, many incorporated automated logic compliant with SMTP standards, such as delaying resends by 5-30 minutes to match the typical greylisting deferral period. This adaptation allows spammers to succeed on subsequent attempts, effectively bypassing the temporary rejection for those campaigns. Over time, the prevalence of retry-capable software has eroded greylisting's standalone efficacy, with reports indicating that persistent spammers now mimic legitimate mail transfer agents (MTAs) by honoring retry directives. For instance, advanced kits distributed in underground markets since the mid-2000s include built-in and retry scheduling, transforming what was once a near-impenetrable barrier into a mere delay for determined senders. While the original proposal in anticipated resistance to such changes due to increased operational costs for spammers, real-world deployment data shows these costs have been mitigated by in operations, leading to progressively lower block rates in unmaintained systems. To counter , administrators often pair greylisting with dynamic or periodic triplet resets, but without such enhancements, long-term reliance results in saturation of the by adapted spammers, reducing the novelty filter's impact. Empirical observations from server logs confirm that initial volume drops sharply upon enabling greylisting but stabilize at 50-70% reduction after 6-12 months, as adaptive traffic normalizes. This trend underscores greylisting's role as a transitional rather than perpetual defense, necessitating integration with content-based or reputation filters for sustained performance.

Alternatives and Complementary Techniques

Other Spam Filtering Approaches

Bayesian filtering represents a statistical content-analysis approach that classifies emails by calculating the probability of spam using applied to word or token frequencies derived from training corpora of labeled messages. This method, implemented in tools like SpamAssassin, adapts over time as users provide feedback on misclassifications, with evaluations showing false positive rates below 0.1% and overall accuracies often surpassing 99% in benchmark datasets from the early . However, its effectiveness can degrade against adversarial "poisoning" tactics where spammers insert unique or obfuscated content to skew probabilities. Reputation-based systems, such as DNS-based blackhole lists (DNSBLs), enable receiving servers to query distributed DNS zones for addresses or domains reported as sources by volunteer networks and commercial operators. These lists aggregate data from trap accounts and user reports, blocking or scoring messages from listed origins; for instance, the Spamhaus DNSBL processes billions of queries daily and claims to block over two-thirds of global volume at participating networks. Drawbacks include false positives from shared and the need for frequent updates to counter spammers' IP rotation. Email authentication protocols verify sender legitimacy to combat forgery, a precursor to many spam campaigns. The Sender Policy Framework (SPF), defined in RFC 7208, allows domain owners to publish TXT DNS records specifying authorized IP addresses or hosts for outbound mail, enabling receivers to reject or flag mismatches. (DKIM), per RFC 6376, appends cryptographic signatures to messages, verifiable against the sender's public key in DNS, ensuring message integrity and origin accountability even after relay. (DMARC), outlined in RFC 7489, integrates SPF and DKIM results with domain-level policies (e.g., quarantine or reject on failure) and aggregate reporting to monitor abuse. Adoption of these has grown, with over 90% of domains implementing DMARC by 2023, though incomplete deployment limits full efficacy against sophisticated bypasses. Heuristic and rule-based filters apply predefined patterns, such as regex matches for suspicious headers, URLs, or attachments, often combined with sender analysis like volume thresholds. Advanced variants, including support vector machines and neural networks, extend beyond Bayesian methods by handling non-text features and evolving threats, as surveyed in content-based filtering literature. These approaches complement each other in layered defenses but require ongoing tuning to maintain precision amid spammers' adaptations.

Hybrid Strategies

Hybrid strategies combine greylisting with complementary to address its limitations, such as potential delays for legitimate emails and evasion by sophisticated spammers, while amplifying overall filtering efficacy. By layering greylisting's behavioral challenge—temporary rejection prompting retries—with authentication and , systems achieve broader coverage against vectors including forged origins and persistent bulk senders. A prevalent hybrid approach integrates greylisting with email authentication protocols like (SPF), (DKIM), and (DMARC). These protocols verify sender identity and domain alignment, allowing greylisted emails that pass retries to undergo cryptographic checks; failures in authentication can trigger permanent rejection even after retry, reducing false negatives from retry-compliant malware. For instance, in setups, greylisting acts as an initial for unverified IPs, while SPF/DKIM/DMARC ensure authenticated retries proceed, reportedly enhancing deliverability for compliant senders by up to 99% in tested configurations. Another effective combination pairs greylisting with content-based filters, such as Bayesian probabilistic classifiers or models trained on email features like headers, body text, and attachments. Greylisting filters out non-retrying spammers upfront, easing computational load on downstream classifiers, which then score retried emails for semantic spam indicators; this hybrid has been shown to boost detection rates beyond 95% in hybrid frameworks by leveraging greylisting's low-overhead triage. In environments, greylisting bridges IP blocklists and -driven , capturing that evades signature-based detection. Tiered list-based hybrids incorporate greylisting with whitelisting and for dynamic . Whitelists bypass greylisting for trusted domains, blacklists preemptively block known abusers, and greylisting challenges the remainder; this setup minimizes delays for high-volume legitimate traffic while maintaining scrutiny on unknowns, as implemented in gateway appliances that process over 1 billion emails daily with reduced false positives. Such integrations are configurable in open-source tools like Postfix or commercial filters, where administrators tune thresholds based on traffic patterns to balance security and .

Current Usage and Future Outlook

Adoption in Modern Email Ecosystems

Greylisting maintains relevance in contemporary email infrastructures, particularly among self-hosted and open-source deployments. Mail transfer agents like Postfix commonly integrate greylisting through extensions such as postgrey, enabling administrators to enforce temporary rejections for initial connections from unfamiliar IP-sender-recipient triplets, thereby filtering transient bots that fail to retry. This approach persists in 2025 for its minimal computational demands, with adoption driven by sysadmins seeking lightweight defenses against volume-based attacks. Commercial and cloud-based ecosystems also incorporate greylisting variants. Microsoft's Exchange Online applies greylisting policies that can extend delays to 1-5 days for unverified sender , even when domains are explicitly allowed, as a precautionary measure against abuse. Similarly, and implement delay tactics akin to greylisting for suspicious inbound traffic from novel sources, temporarily slowing deliveries to assess legitimacy without outright blocks, which has been documented in cases of IP reputation probation lasting hours to days. Adoption varies by scale and provider priorities, with smaller organizations and specialized anti-spam gateways like SpamTitan favoring it for baseline protection alongside real-time blacklists. Larger platforms, however, often limit its scope to avoid user-perceived , pairing it with classifiers that adapt faster to persistent threats. As of 2025, greylisting's deployment reflects a balance between efficacy against opportunistic —reducing unsolicited volumes by exploiting retry compliance—and the need for seamless delivery in high-volume environments.

Recent Developments and Limitations

In August 2025, Vamsoft released version 6.10 of its ORF anti-spam software, incorporating enhancements to greylisting that minimize delivery delays specifically for interactions with major email providers like and . These updates aim to preserve the technique's spam-rejection efficacy while addressing compatibility friction in high-volume environments. Despite such refinements, greylisting continues to be deployed in 2025 as a baseline spam mitigation layer, particularly in infrastructure platforms where simplicity outweighs advanced authentication overhead. However, greylisting's effectiveness has waned against sophisticated campaigns, as many automated bots now incorporate retry logic compliant with SMTP standards, reducing its discriminatory power over time. In contemporary email ecosystems dominated by protocols like , , and , greylisting is increasingly viewed as supplementary or even counterproductive, potentially exacerbating deliverability issues for legitimate bulk senders amid stricter ISP scrutiny. Key limitations include inherent delivery delays of 5–15 minutes for initial emails from unestablished senders, which disrupt time-sensitive communications such as resets or transactional alerts. The method assumes static sender addresses; any rotation or NAT-induced change triggers repeated greylisting, perpetuating delays and risking sender reputation damage through perceived unreliability. Additionally, non-compliant mail transfer agents that fail to retry—though rare among enterprise systems—result in permanent message loss, underscoring greylisting's reliance on universal SMTP adherence.

References

  1. [1]
    Greylisting: Whitepaper - PureMagic Sofware - Projects
    Aug 21, 2003 · The Greylisting method proposed in this paper is a complementary method to other existing and yet-to-be-designed spam control systems, and is ...Missing: origin | Show results with:origin
  2. [2]
    [PDF] Measuring the Role of Greylisting and Nolisting in Fighting Spam
    The author noticed that the effectiveness of greylisting remained constant over the two years of experiments. However, he also suggested that greylisting is ...
  3. [3]
    (PDF) Experiences with greylisting - Academia.edu
    Greylisting effectively reduces spam by temporarily rejecting mail from unknown sources, relying on retries for validation. The analysis shows 20% of delivery ...
  4. [4]
    (PDF) Efficiency comparison of greylisting at several SMTP servers
    Greylisting has become one of efficient tools for SPAM elimination since its proposing in 2003. So far only few studies focusing to greylisting efficiency were ...
  5. [5]
    What is greylisting? Definition, advantages and disadvantages
    Nov 17, 2022 · Greylisting is an effective method for preventing spam emails from being sent out. It runs on the email recipient's mail server.
  6. [6]
    [PDF] IETF 82 APPSAWG Greylisting
    Why do we care? • The practice has been around for a long time. – Seminal white paper written by Evan Harris in 2003. • We're discovering that lots of people ...
  7. [7]
    HowTos/postgrey - CentOS Wiki
    Postgrey is a policy server implementing greylisting to filter spam on Postfix mail servers. The principle of greylisting works on the basis that much spam ...
  8. [8]
    [PDF] Fighting spammers with Exim and SA-Exim - Marc MERLIN's
    Basic greylisting suffers from a few problems, the biggest ones being all new mail being delayed, and mail from broken senders like legit send only websites, ...
  9. [9]
    Graymilter - Mail Filtering
    Graylisting is an idea invented by Evan Harris in 2003. Basically, the first time someone tries to send you mail, you send back a temporary failure response ...
  10. [10]
    Grey List Experiment: Spam Grand Slam (Fourmilog - Fourmilab
    Jun 30, 2005 · This filter, using a technique called "greylisting" originally described by Evan Harris in 2003, exploits the fact that most spam-sending ...
  11. [11]
    Experiences with Greylisting. - ResearchGate
    The assumption is that temporary failures are defined in SMTP and the server will re-send it and at that time it will be cleared for the inbox [Levine (2005) ].<|separator|>
  12. [12]
    A simple, configurable SMTP anti-spam filter: Greylists - ScienceDirect
    This paper addresses methods for combating spam, focusing especially on those based on the economic motivations of unsolicited commercial e-mail.
  13. [13]
    Greylisting optimizations for electronic mail filtering - Google Patents
    The original greylisting (OGL) method is a behavioral filter that takes advantage of SMTP procedures defined in RFC 2821 by temporarily rejecting email from an ...Missing: origin | Show results with:origin
  14. [14]
    RFC 6647 - Email Greylisting: An Applicability Statement for SMTP
    This document describes the art of email greylisting, the practice of providing temporarily degraded service to unknown email clients as an anti-abuse ...
  15. [15]
    RFC 6647 - Email Greylisting - » RFC Editor
    This document describes the art of email greylisting, the practice of providing temporarily degraded service to unknown email clients as an anti-abuse mechanism ...
  16. [16]
    [PDF] Email Spam Filtering: A Systematic Review - Now Publishers
    Spam has evolved so as to defeat countermeasures; countermeasures have evolved so as to thwart evasion. We generalize the TREC definition of spam to capture the ...
  17. [17]
    RFC 5321 - Simple Mail Transfer Protocol - IETF Datatracker
    This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous ...
  18. [18]
    Greylisting: The Next Step in the Spam Control War
    Greylisting is a new method of blocking significant amounts of spam at the mailserver level, but without resorting to heavyweight statistical analysis.
  19. [19]
    Postfix SMTP Access Policy Delegation
    With this policy delegation mechanism, a simple greylist policy can be implemented with only a dozen lines of Perl, as is shown at the end of this document. A ...
  20. [20]
    Greylisting: How It Fights Spam Emails Effectively - LinkedIn
    Sep 26, 2024 · Greylists aren't exactly novel. Evan Harris originally presented it back in 2003. Like many of us, Evan came up with this creative answer after ...
  21. [21]
    What are Blacklisting, Whitelisting, and Greylisting? - zenarmor.com
    Oct 13, 2023 · Whitelisting and blacklisting are two techniques for controlling network access to websites, emails, applications, and IP addresses.
  22. [22]
    Email Greylisting for Infrastructure Platforms: 2025 Guide
    Rating 4.7 (2,055) Jun 27, 2025 · Greylisting vs SPF, DKIM, and DMARC. SPF, DKIM, and DMARC validate a sender's identity. Greylisting watches how that identity behaves.
  23. [23]
    fight Spam with Postgrey and Postfix on Debian and Ubuntu
    Greylisting will not replace spam filtering software like SA but it will serve as a powerful first hurdle for spam thus reducing the amount of spam entering ...
  24. [24]
    Is greylisting still an efficient method for preventing spam?
    Oct 9, 2012 · It adds load to the spammer and not to your receiving mailserver. So even though the spammers may make it through your greylisting, you forced ...Missing: core | Show results with:core<|separator|>
  25. [25]
    Postgrey - Postfix Greylisting Policy Server
    Postgrey is a Postfix policy server implementing greylisting developed by David Schweikert. When a request for delivery of a mail is received by Postfix via ...<|separator|>
  26. [26]
    Postfix/Greylisting - Gentoo Wiki
    Nov 11, 2019 · Greylisting is a process in which systems attempting to connect to your server to deliver mail for the first time are treated differently to known peers.
  27. [27]
    Access Control Lists (ACLs) are defined in a ... - Exim Internet Mailer
    The ACL test specified by acl_smtp_helo happens when the client issues an EHLO or HELO command, after the tests specified by helo_accept_junk_hosts, ...<|control11|><|separator|>
  28. [28]
    greylistd-setup-exim4(8) - Debian Manpages
    May 4, 2025 · This utility configures, deconfigures, or tests for greylistd support in the given Exim 4 configuration file and Access Control List (ACL). If ...
  29. [29]
    HOWTO: Implement Greylisting with Exim
    This HOWTO explains one way of greylisting with the Exim MTA. This has been in use since early 2010 and there are no known problems with the implementation.
  30. [30]
    milter-greylist(8) - Linux man page
    milter-greylist is a mail filter for sendmail that implements grey listing, a spam filtering technique proposed by Evan Harris.Missing: integration | Show results with:integration
  31. [31]
    How to Setup milter-greylist Spam Blocking in Sendmail
    Sep 3, 2010 · Greylisting is the process by which all email (unless specifically whitelisted) gets initially rejected yet works within the parameters of the various RFCs.
  32. [32]
    SMTP - Greylisting - MailEnable
    Greylisting is configured under the SMTP options and works by initially delaying an incoming email from a particular IP address. Since mail servers would ...
  33. [33]
    Why does Microsoft's Hosted Exchange greylisting last for 5 days?
    Greylisting is a reasonable approach, but not when it's in place for days upon days. This is called "not providing service to customers". Here's a ...
  34. [34]
    Will Microsoft 365 Spam Filtering Ever Implement Greylists? - Reddit
    Jun 10, 2022 · I'm assuming that either greylisting will never be a feature, or if it does arrive it won't be for a very long time yet.Exchange 2013 and greylisting problems : r/exchangeserver - RedditThoughts on Mimecast vs Microsoft's EOP? Is greylisting important?More results from www.reddit.com
  35. [35]
    Greylisting - ORF Online Help
    Triplets. Greylisting works with so-called triplets (combinations of the sender IP, the sender email address and the recipient email address).
  36. [36]
    Configuring Greylisting Policies - Mimecast Support Center - Zendesk
    Aug 22, 2025 · This article contains information on greylisting, a compliance check to reduce spam by temporarily rejecting emails from unknown senders.
  37. [37]
    email - Greylisting with Postfix - Is it possible to not ... - Server Fault
    Jun 10, 2009 · Postgrey isn't going to support that, however there is nothing stopping you from creating or finding a policy server that will do that.Is greylisting still an efficient method for preventing spam?Use greylisting only if SPF fails - Server FaultMore results from serverfault.com
  38. [38]
    How to configure Greylisting to reduce spam on Postfix
    Greylisting is a spam-prevention technique that temporarily rejects emails from unknown senders. ... Temporary Rejection: The message is temporarily rejected with ...Missing: variations | Show results with:variations<|control11|><|separator|>
  39. [39]
    milter-greylist home page - HCP Networks
    Milter-greylist enables you to specify what messages should be whitelisted and what message should be greylisted using access-lists (ACL). You can specify ...
  40. [40]
    greylist.conf - milter-greylist configuration file - Ubuntu Manpage
    By default, milter-greylist(8) will add a X-Greylist header to any message it handles. The header shows what happened to the message: delayed or not delayed, ...
  41. [41]
    e-Mail greylisting; Why including IP address? - Server Fault
    Jul 27, 2023 · The source IP can make problems because large mail services use multiple IP addresses (possibly from complete different IP ranges) to re-send blocked e-mails.Is it possible to use multiple load balancers to redirect traffic to my ...Multiple DNS names and IP address to make load balancing more ...More results from serverfault.comMissing: balancer | Show results with:balancer
  42. [42]
    What is Greylisting and How Does it Work? - InstaSafe
    Dec 24, 2023 · If an early email gets greylisted while a subsequent one passes whitelisting, the later message could appear first. Users may find this ...<|separator|>
  43. [43]
    Greylisting defers emails from senders that use multiple IP addresses
    Mar 23, 2023 · Messages from senders that use different IP addresses (eg Office365 email accounts) are deferred by greylisting handler with the following messages in /var/log ...
  44. [44]
    Greylisting problem with wide range ip senders
    Mar 11, 2020 · The one issue I see with this, is that the large cloud providers (e.g. google, office 365) do add and remove IP-ranges more often, and caching ...Missing: load balancer
  45. [45]
    Multiple greylisted emails send from different IPs · Issue #435 - GitHub
    Nov 26, 2015 · Aliexpress tend to send mails from different IPs. And because their mails are triggering some antispam checks they are always greylisted.Missing: balancer | Show results with:balancer
  46. [46]
    How to avoid greylisting - Paubox
    Jul 12, 2024 · Greylisting is a technique used by email servers to fight off spam. When an email server uses greylisting, it temporarily rejects emails from ...
  47. [47]
    Whitelisting vs Greylisting: Let's Break It Down - DEV Community
    Apr 14, 2025 · You'll see greylisting mostly in email servers trying to reduce spam without too much overhead. It's not ideal for real-time communication or ...
  48. [48]
    Gray listing: Failed if sender use different IP's - hMailServer forum
    Jun 16, 2024 · The problem with this solution is that you are Whitelisting all Anti-spam processing which includes Greylisting. If you don't know what the IP Range is you can ...SMTP HELO/EHLO with multiple ISPs (Load Balanced) - hMailServerGreylisting behavior - hMailServer forumMore results from hmailserver.comMissing: balancer | Show results with:balancer
  49. [49]
    [PDF] Not that Simple: Email Delivery in the 21st Century - USENIX
    Jul 11, 2022 · We found that greylisting is effective, reducing the SPAM volume by roughly half while not impacting regular delivery. However, and ...Missing: peer- | Show results with:peer-
  50. [50]
    [PDF] Measuring the Role of Greylisting and Nolisting in Fighting Spam
    Sendmail, Exim and postfix follow the same time to live suggested in RFC-822, while Qmail and Courier are even more conservative and use a threshold of 7 days.
  51. [51]
  52. [52]
  53. [53]
    What is greylisting? - sathyainfo.com
    Greylisting is a very effective anti-spam tool (our tests show a decrease in spam of 80% to 90% when greylisting is implemented), but it can cause delivery ...
  54. [54]
    Spam reduction with greylisting - LWN.net
    Oct 12, 2016 · Although most greylisting implementations will print a human-readable message indicating how long the sending server must wait before redelivery ...
  55. [55]
    What is Greylisting? - SonicWall
    Mar 26, 2020 · (Or graylisting) is a method of defending e-mail users against spam. A mail transfer agent (MTA) using greylisting will "temporarily reject" ...
  56. [56]
    Efficiency comparison of greylisting at several SMTP servers
    SPAM represents more than 90% of SMTP traffic in the Internet. Greylisting has become one of efficient tools for SPAM elimination since its proposing in ...Missing: success rates
  57. [57]
    [PDF] Not that Simple: Email Delivery in the 21st Century - SBA Research
    However, greylisting reduces the number of received. SPAM emails by 36.9%. Interestingly, this makes greylisting a less effective anti-SPAM measure than ...
  58. [58]
    Measuring the Role of Greylisting and Nolisting in Fighting Spam
    Spam comprises approximately 90 to 95 percent of all e-mail traffic on the Internet nowadays, and it is a problem far from being solved. The losses caused by ...
  59. [59]
    What is Greylist? - Friendly Captcha
    Greylisting is a method used in spam filtering to temporarily reject any email from a sender it does not recognize. If the mail is legitimate, ...Missing: core | Show results with:core
  60. [60]
    What is greylisting and how does it work? | Scrubby.io
    Feb 3, 2024 · Greylisting is a method used in email management to prevent spam. It temporarily blocks emails from unknown senders and waits for them to be ...<|separator|>
  61. [61]
    Understanding Greylisting: Benefits & Limits - Wired Messenger
    While greylisting offers considerable benefits, it's important to acknowledge certain drawbacks inherent to this method. The most immediate is the initial email ...Missing: controversies | Show results with:controversies<|control11|><|separator|>
  62. [62]
    What Is Greylisting: Effective Email Spam Protection
    Aug 5, 2024 · Greylisting is a method of avoiding spam emails by protecting incoming messages at the SMTP protocol level from unwanted spam traffic. When ...
  63. [63]
    What is Greylisting? - StormerHost Support
    Sep 18, 2024 · Low Resource Consumption: Compared to some other spam filtering strategies, greylisting uses fewer resources because it solely affects the ...
  64. [64]
    Understanding Greylisting & how to handle It - Knowledge Base
    Oct 11, 2024 · Compatibility Issues: Some poorly configured mail servers may not retry the email, resulting in delivery failures. Increased Server Load ...
  65. [65]
    Greylisting issue - Google Groups
    Apparently when the sending server retries to send mail because of greylisting, it may come from a different source IP, which breaks the triplet of information.<|separator|>
  66. [66]
    Blacklisting vs Whitelisting vs Greylisting | Access Control Guide 2024
    Sep 23, 2024 · By delaying the delivery of untrusted traffic, greylisting offers extra security against unknown dangers and is effective against spam and ...
  67. [67]
    What is Greylisting? - SonicWall
    Mar 26, 2020 · Greylisting delays much of the mail from non-whitelisted mail servers - not just spam - until typical patterns of communication are recorded by ...Missing: consumption | Show results with:consumption
  68. [68]
    Greylisting | Stalwart Labs
    Greylisting is a method where an email server temporarily rejects emails from unknown senders. In essence, when an email from an unfamiliar source arrives, ...
  69. [69]
    [PDF] Learning to Filter Spam E-Mail: A Comparison of a Naive Bayesian ...
    We address the issue of anti-spam filtering with the aid of machine learning. We examine supervised learning methods, which learn to identify spam e-mail after ...<|separator|>
  70. [70]
    An evaluation of statistical spam filtering techniques
    This paper evaluates five supervised learning methods in the context of statistical spam filtering. We study the impact of different feature pruning methods ...
  71. [71]
    (PDF) The Spam-Filtering Accuracy Plateau at 99.9 percent ...
    any of these filters is more effective than a human “correspondence secretary”. The extreme effectiveness ... Improving Statistical Bayesian Spam Filtering ...<|control11|><|separator|>
  72. [72]
  73. [73]
    DNSBL Explained: Benefits of Using DNS Blacklists - MonoVM
    Jul 19, 2024 · Domain Name System Blacklists (DNSBL) are spam blocking lists that allow system moderators to block messages from specific systems that have a ...
  74. [74]
    Email Spam Filtering: A Systematic Review - ACM Digital Library
    We survey current and proposed spam filtering techniques with particular emphasis on how well they work. Our primary focus is spam filtering in email.
  75. [75]
    RFC 7208 - Sender Policy Framework (SPF) for Authorizing Use of ...
    This document describes version 1 of the Sender Policy Framework (SPF) protocol, whereby ADministrative Management Domains (ADMDs) can explicitly authorize the ...
  76. [76]
    RFC 6376 - DomainKeys Identified Mail (DKIM) Signatures
    DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message.
  77. [77]
    RFC 7489 - Domain-based Message Authentication, Reporting, and ...
    DMARC is a mechanism for email operators to express domain-level policies for message validation, disposition, and reporting, using existing authentication ...
  78. [78]
    [PDF] Email Authentication Mechanisms: DMARC, SPF and DKIM
    This is a Spam filter that uses Bayesian classification together with configurable static rules, to filter Spam. Individually scored, each rule may have a ...Missing: DNSBL | Show results with:DNSBL
  79. [79]
    [PDF] Machine Learning for E-mail Spam Filtering
    Jun 3, 2016 · Abstract We present a comprehensive review of the most effective content-based e-mail spam filtering tech- niques.
  80. [80]
    [PDF] Effectiveness and Limitations of Statistical Spam Filters - arXiv
    In this paper we discuss the techniques involved in the design of the famous statistical spam filters that include Naïve Bayes, Term Frequency-Inverse Document ...
  81. [81]
    How to Improve Office 365 Spam Filter - SpamTitan
    Rating 4.5 (80) Greylisting fills the gap in the Microsoft 365 spam filtering process between IP block lists of known sources of spam and machine learning technologies to ...How Microsoft 365 Email Spam... · What Microsoft 365 Spam... · How Spamtitan Improves The...Missing: strategies | Show results with:strategies
  82. [82]
    [PDF] A Hybrid approach for enhancing the capability of Spam Filter
    This hybrid approach has defined the best features like Whitelisting, Blacklisting, Greylisting, Bayesian filtering, eXpurgate technology, Social closeness that ...
  83. [83]
    [PDF] Hybrid Soft Computing Approach For Spam Filtering - IJRAR
    The basic purpose of this activity is to increase their target base for wider reach by recognizing and collecting legitimate/invalid email addresses under a ...
  84. [84]
    Spam Filter Gateway: Complete Email Security Implementation Guide
    Jun 15, 2025 · A spam filter gateway operates as a specialized security appliance designed to inspect, analyze, and filter email traffic based on sophisticated detection ...Deployment Models And... · Advanced Security Features · Implementation Best...<|separator|>
  85. [85]
    Understanding Greylisting: An Effective Email Spam Filter
    Sep 3, 2024 · Greylisting is a technique used by some mail servers, a little like a filter, in order to fight against the spam, and thus allows to know whether the sender of ...What Does Greylisting And... · The Main Advantage Of... · What A Difference Between...
  86. [86]
    7 Effective Tips for Blocking Email Spam with Postfix SMTP Server
    This tutorial shares 6 tips for blocking email spam with Postfix SMTP server. Here are the best Postfix spam filters and how to use postfix log analyzer.My Postfix Spam Filters · Postfix Log Report · How To Stop Smtp Auth Flood...Missing: integration | Show results with:integration
  87. [87]
    gmail is delaying or temporarily rejecting / greylisting emails from my ...
    Jun 2, 2024 · I have fully configured DMARC, DKIM, SPF, and made sure my emails are compliant with gmail's sender guidelines. I have ran spam tests from ...
  88. [88]
    Fixing Google Greylisting: Stop Email Delays and Restore IP ...
    Grey-listing (also known as "tarpitting") is Google's method of slowing down suspicious mail traffic instead of outright blocking it.
  89. [89]
    The Best Anti-Spam Software in 2025 | TitanHQ - SpamTitan
    Rating 4.5 (80) Real-Time Blocklists (RBLs) and graylists: set a baseline to identify and block spam from recognized spam-supporting ISPs. Harvesting/dictionary attack ...
  90. [90]
    Why RBLs and greylisting can't stop modern email threats - TechRadar
    Apr 16, 2024 · The dawn of generative AI is only exacerbating this issue, with AI-powered phishing seeing a 222% increase in the second half of 2023. This in ...
  91. [91]
    What is greylisting? - Paubox
    Aug 15, 2025 · Greylisting is a method used in email management to combat spam. It operates by temporarily rejecting emails from unknown senders.
  92. [92]
    News - ORF 6.10 Now Available
    Aug 6, 2025 · Greylisting has been improved to reduce delays with major mail providers. The update also adds support for Exchange Server SE and Windows Server ...
  93. [93]
    Evolution of Email Security: Navigating the Complex Landscape
    1. The Decline of RBLs and Greylisting. Traditionally, Real-time Blackhole Lists (RBLs) and greylisting were stalwarts in the fight against spam and ...
  94. [94]
    What Is Email Greylisting? How It Works and Why It Matters
    Jun 4, 2025 · Greylisting is an anti-spam technique used by email servers to temporarily reject messages from unknown or suspicious sources. Think of it as ...
  95. [95]
    How Does Email Greylisting Keep Your Emails Away From ... - Nestify
    Jun 11, 2024 · Email greylisting is an anti-spam technique used by mail servers. When an email pops in the inbox, the receiving server asks the sender to retry sending the ...Missing: variations HELO