At this point the isp is clearly the victim! This guy doesn't have his own ips and ipv4 is rare, so risking a complete ip range to get on blacklists will be unacceptable for any company. I can fully understand them, because dealing with spamhaus mafia is a nightmare. Lets hope they wont getting tor unfriendly because of this, i run there exits for 2 years on some vps's without a problem and i hope they don't start killing them now
tor@xxxxxxx:
> You somewhat made a mistake here - you've got to have an exit policy that
> (minimally) rejects ports 25 and 465, or else your relay becomes a giant
> abuse tool for spammers, scammers, and phishers instead of what you intended
> it to be (which was a standard-functioning Tor relay).
Please don't blame the victim. If this ISP acted differently than what
they initially promised, then they are the problem.
--
Lunar                       <lunar@xxxxxxxxxxxxxx>
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays