Jump to: navigation, search


410 bytes added, 26 days ago
no edit summary
With the advent of email, email administrators began creating and sharing blocklists, which gave rise to some cases of false positives, which led to their creating a list of exceptions, known as allowlists.<ref>[ RBL Background, Computer World]</ref> In the early days, in some circles today, these lists were called blacklists and whitelists, but the racial implications of those terms, among many others, have led people to switch to block/allow.<ref>[ IETF Is Trying to Move Away From Racists Computer Engineering Terms, NY Times]</ref>
 Then, in 1997 [[Paul Rand]] and [[Paul Vixie]] used the DNS protocol to access a blocklist to see whether a sending IP address had sent spam recently, and trademarked "Real-time Blackhole List" to refer to the blocklist. [[ISP]]s followed suit, which led to finer-tuned descriptions of the legitimacy of an IP address.<ref>[ RBL Background, Computer World]</ref>  In 2010, the [[IRTF|Internet Research Task Force]] released [[RFC|Request for Comments]] 5782 in acknowledgment of network managers worldwide using DNSxLs (DNS block or allow lists) to filter traffic and to make sure such managers were on the same page as to the structure and usage of DNSxLs and the protocol to query them.<ref>[ RFC 5782, IETF]</ref>

Navigation menu