[tor-relays] Exit policy question
Sven Olaf Kamphuis
sven at cb3rob.net
Fri Jun 3 12:27:08 UTC 2011
actually, over all those years, i've only seen a spam complaint using one
of those free webmailers from tor -once-...
compared to the fucktons of complaints about the MAFIAA seeding their own
crap over tor and then complaining about it on the other end to look
important, thats nothing :P
plus, who still cares about smtp anyway, its pretty much dead, 300 spam
mails per day and just 1 or 2 real emails a week, anything important is
handled over skype and other transports which have "friends lists"
nowadays. if they don't fix their protocol to have friends lists, they
have no right to complain.. we're gonna completely shut down smtp soon
enough, its old, dusty, not peer 2 peer (hardly any open relays
left),insecure (no pre-approved senders/friends list) slow (graylisting),
unreliable (spamhaus idiots), and pretty much, dead (number of real
emails per week vs the number of junk per hour ;).
even more dead than that other piece of crap from the past, ftp and
anyway, an access lists which allows http and https but -not- to
hotmail/gmail/rest of that crap would not be too hard to make.
On Fri, 3 Jun 2011, Andy Isaacson wrote:
> On Thu, Jun 02, 2011 at 05:47:17PM -0400, Roger Dingledine wrote:
>> On Thu, Jun 02, 2011 at 05:22:13PM +0000, George Gemelos wrote:
>>> Is there a further reduced set that might be better, in the sense
>>> of avoiding complaints, and still remain useful as an exit node?
>> You could get your toes wet by "accept *:80, accept *:443, reject *:*".
>> That would let people browse the web through you, which is very useful,
>> while somewhat reducing the variety of abuse complaints you might get.
>> Then if it goes well for a while, you could open up a few more ports.
>> Also, if later your ISP decides that it's getting too much mail and asks
>> you to quit it, you can tell them about the time you allowed only web
>> browsing and they didn't mind -- then you have something to fall back
>> to that isn't just being a non-exit.
> Note that *:80, *:443 will still get a trickle of spam complaints, since
> some webmail hosts (Yahoo in particular) include a "Received: from $IP
> via HTTP" or equivalent, in their outbound email. Depending on the ISP,
> that may be enough for them to shut down your exit node.
> If you can get reverse DNS and SWIP for your exit node, you'll reduce
> (though not eliminate) the load on your ISP's abuse address. Please do
> respond to complaints submitted to your whois abuse address; it's to
> nobody's benefit for Tor to be associated exclusively with malefactors
> in the minds of spamfighters.
> tor-relays mailing list
> tor-relays at lists.torproject.org
More information about the tor-relays