Hi all,
I've been running two exit relays, [1] and [2], at the German company
Webtropia [3] for the past two weeks. Things went quite nice and smoothly,
the speed of the server was decent and the network great, pushing quite
some terabyte.
Before renting the server, I told them what I wanted to d
You somewhat made a mistake here - you've got to have an exit policy
that (minimally) rejects ports 25 and 465, or else your relay becomes
a giant abuse tool for spammers, scammers, and phishers instead of
what you intended it to be (which was a standard-functioning Tor
relay).
You might tr
On 14-07-30 05:11 AM, t...@t-3.net wrote:
>
> You somewhat made a mistake here - you've got to have an exit policy
> that (minimally) rejects ports 25 and 465, or else your relay becomes a
> giant abuse tool for spammers, scammers, and phishers instead of what
> you intended it to be (which was a
t...@t-3.net:
> You somewhat made a mistake here - you've got to have an exit policy that
> (minimally) rejects ports 25 and 465, or else your relay becomes a giant
> abuse tool for spammers, scammers, and phishers instead of what you intended
> it to be (which was a standard-functioning Tor relay)
IMO, even relaying SMTP-like for the email which typically requires
auth first isn't a great idea if there is any concern about an
upstream getting abuse complaints about a relay (such as a leased
box).
A frequent way that spammers get their garbage out these days is to
compromise a user ac
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 7/30/2014 10:34 AM, u...@riseup.net wrote:
> Hi all,
>
> I've been running two exit relays, [1] and [2], at the German
> company Webtropia [3] for the past two weeks. Things went quite
> nice and smoothly, the speed of the server was decent and the
Let's not confuse two things, here. The customer wanting to host a Tor
exit relay is a different service request than wanting to run a
wide-open SMTP relay. No reputable ISP would agree to host an open
SMTP relay and I'm sure this one did not knowingly do so.
It would be unfortunate for ISPs
At this point the isp is clearly the victim! This guy doesn't have his own
ips and ipv4 is rare, so risking a complete ip range to get on blacklists
will be unacceptable for any company. I can fully understand them, because
dealing with spamhaus mafia is a nightmare. Lets hope they wont getting tor