[WEBINAR] Application Acceleration: Faster Performance for End Users

Open Relay

Definition - What does Open Relay mean?

An open relay is an Simple Mail Transfer Protocol (SMTP) email server that allows anyone on the Internet to send messages through it while hiding or obscuring the source of the messages being sent.

Open relays do nothing to identify the original sender of email messages, making them very vulnerable to address spoofing, a technique that alters email headers to appear as though they originated from a source other than the actual source. Although this is how email was initially set up, this type of system is often exploited by spammers.

Open relay is also known as an open relay server, insecure relay, third-party relay, open mail relay and spam relay.

Techopedia explains Open Relay

Until the 1990s, open relays were simply SMTP email servers that facilitated email relay between closed email systems. They allowed system administrators to debug email connectivity issues, often by routing email around known problems.

The Internet was originally set up to use open relays. It employed a store-and-forward method of getting email to the intended destination, usually from one computer or server to the next, through the Internet and beyond into local area networks, other networks and eventually to the intended individual users. The computers or servers that functioned as open relays were core parts of the networks. Examples of such early networks were UUCPNET, FidoNet and BITNET.

In the 1990s, unscrupulous senders or spammers rerouted large volumes of email through third-party email servers to avoid detection. Server owners or administrators typically were not even aware of the problem until the system crashed and business was lost. Spammers located vulnerable servers by using automated tools that were readily available for download on the Internet. In effect, these senders hijacked the server, took over the network and computer resources and laundered their spam by making the messages appear to come from legitimate sources. Actually, they were stealing services from unknowing server owners.

Eventually, Internet service providers (ISPs) prohibited their email from going through open relays by using domain-name-system-based blocking lists. Over several years the percentage of mail senders using open relays was reduced from 90 percent to less than one percent. But spammers developed other techniques such as botnets (Internet agents or robots) or zombie computers.

Techopedia Deals

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
"Techopedia" on Twitter

Sign up for Techopedia's Free Newsletter!

Email Newsletter

Join thousands of others with our weekly newsletter

Free Whitepaper: The Path to Hybrid Cloud
Free Whitepaper: The Path to Hybrid Cloud:
The Path to Hybrid Cloud: Intelligent Bursting To Amazon Web Services & Microsoft Azure
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.