actually, over all those years, i've only seen a spam complaint using one of those free webmailers from tor -once-...
compared to the fucktons of complaints about the MAFIAA seeding their own crap over tor and then complaining about it on the other end to look important, thats nothing :P
plus, who still cares about smtp anyway, its pretty much dead, 300 spam mails per day and just 1 or 2 real emails a week, anything important is handled over skype and other transports which have "friends lists" nowadays. if they don't fix their protocol to have friends lists, they have no right to complain.. we're gonna completely shut down smtp soon enough, its old, dusty, not peer 2 peer (hardly any open relays left),insecure (no pre-approved senders/friends list) slow (graylisting), unreliable (spamhaus idiots), and pretty much, dead (number of real emails per week vs the number of junk per hour ;).
even more dead than that other piece of crap from the past, ftp and gopher :P
anyway, an access lists which allows http and https but -not- to hotmail/gmail/rest of that crap would not be too hard to make.
On Fri, 3 Jun 2011, Andy Isaacson wrote:
On Thu, Jun 02, 2011 at 05:47:17PM -0400, Roger Dingledine wrote:
On Thu, Jun 02, 2011 at 05:22:13PM +0000, George Gemelos wrote:
Is there a further reduced set that might be better, in the sense of avoiding complaints, and still remain useful as an exit node?
You could get your toes wet by "accept *:80, accept *:443, reject *:*". That would let people browse the web through you, which is very useful, while somewhat reducing the variety of abuse complaints you might get.
Then if it goes well for a while, you could open up a few more ports.
Also, if later your ISP decides that it's getting too much mail and asks you to quit it, you can tell them about the time you allowed only web browsing and they didn't mind -- then you have something to fall back to that isn't just being a non-exit.
Note that *:80, *:443 will still get a trickle of spam complaints, since some webmail hosts (Yahoo in particular) include a "Received: from $IP via HTTP" or equivalent, in their outbound email. Depending on the ISP, that may be enough for them to shut down your exit node.
If you can get reverse DNS and SWIP for your exit node, you'll reduce (though not eliminate) the load on your ISP's abuse address. Please do respond to complaints submitted to your whois abuse address; it's to nobody's benefit for Tor to be associated exclusively with malefactors in the minds of spamfighters.
-andy _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays