At this point the isp is clearly the victim! This guy doesn't have his own ips and ipv4 is rare, so risking a complete ip range to get on blacklists will be unacceptable for any company. I can fully understand them, because dealing with spamhaus mafia is a nightmare. Lets hope they wont getting tor unfriendly because of this, i run there exits for 2 years on some vps's without a problem and i hope they don't start killing them now

Am 30.07.2014 14:39 schrieb "Lunar" <lunar@torproject.org>:
tor@t-3.net:
> You somewhat made a mistake here - you've got to have an exit policy that
> (minimally) rejects ports 25 and 465, or else your relay becomes a giant
> abuse tool for spammers, scammers, and phishers instead of what you intended
> it to be (which was a standard-functioning Tor relay).

Please don't blame the victim. If this ISP acted differently than what
they initially promised, then they are the problem.

--
Lunar                                             <lunar@torproject.org>

_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays