On Thursday, May 5, 2022 3:57:02 PM CEST The Doctor wrote: > ------- Original Message ------- > > On Wednesday, May 4th, 2022 at 11:16, Neel Chauhan <neel@xxxxxxxxx> wrote: > > If you need to send emails, you could: > > > > a. use Sendgrid or Mailgun or whatever to send emails if they don't > > block exit IPs from connecting to their SMTP relays > > > > b. Run your own SMTP relay on a $3.5 VPS to forward emails > > You could also run an SMTP-to-something else protocol bridge to work around > it. I use a fake SMTP server that relays every message it gets over XMPP > to work around that problem. > > The Doctor [412/724/301/703/415/510] Thanks, Neel and yl had already messaged me privately. I replied to them yesterday. I had already solved the problem, unattended-upgrades and logcheck mails reach me again. Actually, I should know that we should avoid exit IPs for DNS, mail and other things. I configured nullmailer as usual, then it takes the first IP and interface it finds. I was sending mail as a client through|to my DNS provider's SMTP server 'easydns.com'. They recently started using abusix before smtpauth as well. Only a /27 are exit IP's per server. Now the mail goes out on a completely different subnet and network card. Well I could have pinged Mark Jeftovic @ easyDNS too, please whitelist _my_ IP for _my_ mailbox. Or sending mail out via the SMTP server from IN-Berlin, like my iRMC (BMC) do. -- ╰_╯ Ciao Marco! Debian GNU/Linux It's free software and it gives you freedom!
Attachment:
signature.asc
Description: This is a digitally signed message part.
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays