[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Exit policy question



actually, over all those years, i've only seen a spam complaint using one of those free webmailers from tor -once-...

compared to the fucktons of complaints about the MAFIAA seeding their own crap over tor and then complaining about it on the other end to look important, thats nothing :P

plus, who still cares about smtp anyway, its pretty much dead, 300 spam mails per day and just 1 or 2 real emails a week, anything important is handled over skype and other transports which have "friends lists" nowadays. if they don't fix their protocol to have friends lists, they have no right to complain.. we're gonna completely shut down smtp soon enough, its old, dusty, not peer 2 peer (hardly any open relays left),insecure (no pre-approved senders/friends list) slow (graylisting), unreliable (spamhaus idiots), and pretty much, dead (number of real emails per week vs the number of junk per hour ;).

even more dead than that other piece of crap from the past, ftp and gopher :P

anyway, an access lists which allows http and https but -not- to hotmail/gmail/rest of that crap would not be too hard to make.

On Fri, 3 Jun 2011, Andy Isaacson wrote:

On Thu, Jun 02, 2011 at 05:47:17PM -0400, Roger Dingledine wrote:
On Thu, Jun 02, 2011 at 05:22:13PM +0000, George Gemelos wrote:
 Is there a further reduced set that might be better, in the sense
of avoiding complaints, and still remain useful as an exit node?

You could get your toes wet by "accept *:80, accept *:443, reject *:*".
That would let people browse the web through you, which is very useful,
while somewhat reducing the variety of abuse complaints you might get.

Then if it goes well for a while, you could open up a few more ports.

Also, if later your ISP decides that it's getting too much mail and asks
you to quit it, you can tell them about the time you allowed only web
browsing and they didn't mind -- then you have something to fall back
to that isn't just being a non-exit.

Note that *:80, *:443 will still get a trickle of spam complaints, since
some webmail hosts (Yahoo in particular) include a "Received: from $IP
via HTTP" or equivalent, in their outbound email.  Depending on the ISP,
that may be enough for them to shut down your exit node.

If you can get reverse DNS and SWIP for your exit node, you'll reduce
(though not eliminate) the load on your ISP's abuse address.  Please do
respond to complaints submitted to your whois abuse address; it's to
nobody's benefit for Tor to be associated exclusively with malefactors
in the minds of spamfighters.

-andy
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays