Re: Ports 465/587 in exit policy (was Re: Update to default exit policy)

2008-09-09 Thread Bill Weiss
F. Fox([EMAIL PROTECTED])@Sun, Sep 07, 2008 at 06:27:08PM -0700: Bill Weiss wrote: (snip) My Tor node runs a medium-load mail server as well, and I've never been blacklisted for spam stuff [1]. That seems like a decent indication of it not causing problems given how rabid the anti-spam

Re: Ports 465/587 in exit policy (was Re: Update to default exit policy)

2008-09-07 Thread Bill Weiss
[EMAIL PROTECTED]([EMAIL PROTECTED])@Thu, Sep 04, 2008 at 04:14:17PM -0400: On Thu, Sep 04, 2008 at 08:25:20AM -0700, [EMAIL PROTECTED] wrote 1.5K bytes in 37 lines about: : -BEGIN PGP SIGNED MESSAGE- : Supposedly, one of the exit node operators is going to try opening : 465/587

Re: Ports 465/587 in exit policy (was Re: Update to default exit policy)

2008-09-07 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Bill Weiss wrote: (snip) My Tor node runs a medium-load mail server as well, and I've never been blacklisted for spam stuff [1]. That seems like a decent indication of it not causing problems given how rabid the anti-spam people can get. 1:

Re: Ports 465/587 in exit policy (was Re: Update to default exit policy)

2008-09-04 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Supposedly, one of the exit node operators is going to try opening 465/587 where he hasn't done so before. I'm all for opening 465/587 by default, but I also understand the concern of exit operators that there may be a significant number of

Re: Ports 465/587 in exit policy (was Re: Update to default exit policy)

2008-09-04 Thread Dawney Smith
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Roger Dingledine wrote: I know this has been discussed before, but I thought I'd bring it up again. The following rules are in the default exit policy and I can't see any reason why they would be: reject *:465 reject *:587 So is there going

Re: Ports 465/587 in exit policy (was Re: Update to default exit policy)

2008-09-04 Thread phobos
On Thu, Sep 04, 2008 at 08:25:20AM -0700, [EMAIL PROTECTED] wrote 1.5K bytes in 37 lines about: : -BEGIN PGP SIGNED MESSAGE- : Supposedly, one of the exit node operators is going to try opening : 465/587 where he hasn't done so before. I've done it. So far, no complaints. -- Andrew

Re: Update to default exit policy

2008-08-20 Thread Dawney Smith
administration on a very large scale, I know what I'm talking about. Thanks for pursuing this! No problem. Hopefully the relevant people are taking note. Who exactly is responsible for setting the default exit policy, and what is their opinion on this matter? 1. Your arguments make good technical

Re: Update to default exit policy

2008-08-20 Thread anonym
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 19/08/08 17:46, Dawney Smith wrote: I have a *lot* of experience with email administration on a very large scale, I know what I'm talking about. I'm sure you do. I'd love to have email work flawlessly and securly with Tor, so opening ports 465

Re: Update to default exit policy

2008-08-20 Thread Dawney Smith
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 anonym wrote: I have a *lot* of experience with email administration on a very large scale, I know what I'm talking about. I'm sure you do. I'd love to have email work flawlessly and securly with Tor, so opening ports 465 and 587 would be great

Re: Update to default exit policy

2008-08-20 Thread Scott Bennett
omit, there was a very dedicated secretary down the hall who dealt with things like forgotten passwords in between all her regular duties. :-) Thanks for pursuing this! No problem. Hopefully the relevant people are taking note. Who exactly is responsible for setting the default exit policy

Re: Update to default exit policy

2008-08-20 Thread anonym
/host from the EHLO/HELO messages. Any way, this is getting pretty off topic. I for one hope that the default exit policy will be updated as you suggest as I'm tired of having to rebuild circuits etc. all the time when SMTP times out due to the scarcity of usable exit nodes. -BEGIN PGP SIGNATURE

Re: Update to default exit policy

2008-08-20 Thread 7v5w7go9ub0o
anonym wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 20/08/08 15:42, 7v5w7go9ub0o wrote: anonym wrote: Email clients leak tons of information, the most critical I know of being your IP address and/or host in the EHLO/HELO in the beginning of the SMTP(S) transaction. Nope. The

Re: Update to default exit policy

2008-08-20 Thread 7v5w7go9ub0o
anonym wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 20/08/08 15:42, 7v5w7go9ub0o wrote: anonym wrote: Email clients leak tons of information, the most critical I know of being your IP address and/or host in the EHLO/HELO in the beginning of the SMTP(S) transaction. Nope. The

Re: Update to default exit policy

2008-08-20 Thread idefix
Quoting 7v5w7go9ub0o [EMAIL PROTECTED]: anonym wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 20/08/08 15:42, 7v5w7go9ub0o wrote: anonym wrote: Email clients leak tons of information, the most critical I know of being your IP address and/or host in the EHLO/HELO in the beginning of

Re: Update to default exit policy

2008-08-20 Thread Sven Anderson
Am 20.08.2008 um 19:04 schrieb [EMAIL PROTECTED]: Sorry, I didn't get it: in case I'm using Thunderbird and Torbutton, and connect to the smtp server trough tor. Will my real ip adress occur in the mail headers, or the ip of the exit node? I'm guessing the ip of the exit node, right?

Re: Update to default exit policy

2008-08-20 Thread Dawney Smith
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Sven Anderson wrote: Sorry, I didn't get it: in case I'm using Thunderbird and Torbutton, and connect to the smtp server trough tor. Will my real ip adress occur in the mail headers, or the ip of the exit node? I'm guessing the ip of the exit

Re: Update to default exit policy

2008-08-20 Thread anonym
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 20/08/08 19:04, [EMAIL PROTECTED] wrote: Sorry, I didn't get it: in case I'm using Thunderbird and Torbutton, and connect to the smtp server trough tor. Will my real ip adress occur in the mail headers, or the ip of the exit node? I'm

Re: Update to default exit policy

2008-08-19 Thread Dawney Smith
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Dominik Schaefer wrote: Those are ports used for mail submission, not for mail relay. They wont be abused by spammers. ISPs often block their consumer broadband users from connecting to port 25 on servers outside of their network, to prevent

Re: Update to default exit policy

2008-08-19 Thread 7v5w7go9ub0o
Dawney Smith wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 krishna e bera wrote: I'm not clear on how authentication (on any port) stops spam, other than the ISP cutting off a given userid after complaints. A lot of spam already comes from malware infected computers via their

Re: Update to default exit policy

2008-08-19 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 For what it's worth, I second Dawn's position on this issue - it could be very useful to allow 465 and 587 by default. Indeed, many users have stopped using Gmail because of the privacy policies; however depending on the purpose of a particular

mixmaster policies (was Re: Update to default exit policy)

2008-08-17 Thread kr
Hi, one question related to the port 465/587 thread. Could it be useful to open at least the ports for mixmaster remailers, capable of submission via TLS, SSL connections or SMTP (2525)? reject private:* # drooper.mixmin.net (banana) accept 88.198.22.131:587 accept 88.198.22.131:2525 accept

Re: Update to default exit policy

2008-08-17 Thread Dominik Schaefer
Dawney Smith schrieb: Those are ports used for mail submission, not for mail relay. They wont be abused by spammers. ISPs often block their consumer broadband users from connecting to port 25 on servers outside of their network, to prevent spam. They don't block 465 and 587, because they're

Update to default exit policy

2008-08-16 Thread Dawney Smith
Hi, I know this has been discussed before, but I thought I'd bring it up again. The following rules are in the default exit policy and I can't see any reason why they would be: reject *:465 reject *:587 Those are ports used for mail submission, not for mail relay. They wont be abused

Re: Update to default exit policy

2008-08-16 Thread xiando
I know this has been discussed before, but I thought I'd bring it up again. The following rules are in the default exit policy and I can't see any reason why they would be: reject *:465 reject *:587 Are you absolutely positivily sure that you can not misconfigure e-mail MTAs who use smtps

Re: Default Exit Policy

2008-05-26 Thread Juliusz Chroboczek
Just as with SMTP, security [with SMTP-submit] is optional. See RFC 4409 for details on the protocol. 4.3. Require Authentication The MSA MUST by default issue an error response to the MAIL command if the session has not been authenticated using [SMTP-AUTH], unless it has already

Re: Default Exit Policy

2008-05-26 Thread Nathaniel Dube
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 What about creating a white list/black list for domains in Tor. That way Tor could allow certain domains (such as google.com) to bypass the default blocks. This way you would be maintaining security while adding functionality. -BEGIN PGP

Re: Default Exit Policy

2008-05-26 Thread Roger Dingledine
On Mon, May 26, 2008 at 08:04:16PM -0500, Nathaniel Dube wrote: What about creating a white list/black list for domains in Tor. That way Tor could allow certain domains (such as google.com) to bypass the default blocks. This way you would be maintaining security while adding

Re: Default Exit Policy

2008-05-26 Thread Scott Bennett
On Mon, 26 May 2008 20:04:16 -0500 Nathaniel Dube [EMAIL PROTECTED] wrote: What about creating a white list/black list for domains in Tor. That way Tor could allow certain domains (such as google.com) to bypass the default blocks. This way you would be maintaining security while adding

Re: Default Exit Policy

2008-05-25 Thread Bill Weiss
Nathaniel Dube([EMAIL PROTECTED])@Thu, May 22, 2008 at 11:59:28PM -0500: The only part of that I have in my config file is [accept *:*]. Is the rest some kind of defaults? I noticed one of the defaults is [reject *:587] which I'm wondering why that would be in the defaults. That ports is

Re: Default Exit Policy

2008-05-25 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Bill Weiss wrote: (snip) As part of that, I allow 587, because it's supposed to be authenticated, right? It turns out that a lot of sites out there treat 587 just like 25: optional authentication, optional encryption, maybe some relaying,

Re: Default Exit Policy

2008-05-23 Thread Ansgar -59cobalt- Wiechers
On 2008-05-22 Nathaniel Dube wrote: I noticed one of the defaults is [reject *:587] which I'm wondering why that would be in the defaults. That ports is used for sending secure email. Port 25 I can understand but 587?! No, port 587/tcp is not used for secure e-mail (whatever that's supposed

Re: Default Exit Policy

2008-05-23 Thread BarkerJr
The first seven are set by ExitPolicyRejectPrivate 1. Set it to 1 to allow these addresses (I do) if you are not concerned with security problems associated, or wish to be more selective blocking networks.

Default Exit Policy

2008-05-22 Thread Nathaniel Dube
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I was looking at my server's stats at https://torstatus.kgprog.com and noticed that it has an exit policy that I didn't put in my config file. For example... reject 0.0.0.0/8:* reject 169.254.0.0/16:* reject 127.0.0.0/8:* reject 192.168.0.0/16:*

default exit policy (was Re: CN's nodes lookin' uncool, do they?)

2007-09-17 Thread Roger Dingledine
requested might actually be blocked by the ISP, but also it would help to protect novice Tor users who want to contribute some bandwidth but who are unaware of the potential pitfalls of running an exit node. There are two reasons that Tor's default exit policy allows some common ports rather than