[tor-relays] 7 relays gone because of spammers
zefir at bluforce.net
Tue Mar 3 14:02:42 UTC 2015
On 2015-02-25 14:20, Speak Freely wrote:
> Oh yes, my money is gone already. They have no interest in talking to
> anymore, as the decision was final. The Abuse department won't talk to
> the Support department, and the abuse department won't talk to me.
The idea of initiating chargeback is great. I did this couple times
when vendor was everything but honest. If that's what you're going to
I'd definitely like to hear what was OVH excuse for not following their
policy as they have to explain and prove to the bank why the charge is
Hopefully you'll get your money back.
> I'd be more inclined to think these spam assassin fellas/"evil doer
> finders" just parsed the exit-node files and decide WHOOPIDY-DO I did
> job! Over-zealous punks trying to get their lists larger than their
> OVH appears to have based these accusations on what other websites have
> said about my IP addresses, and not a single actual complaint against
> the relays I run.
I haven't thought about it that way. I run mailserver myself and
spam is daunting task. To avoid situation of automagically reporting
to SBLs providers I'd like to implement solution that'll do both
whitelisting (have neither). Is someone familiar or have already in
(or need - I'll try to write one myself) a script/config module to
or postfix milter that will do two following tasks. One would be
periodical download of
a public list of tor exit relays. Second would involve "spammy email"
If an email passes through all filters and is deemed spam/malware/ebola,
be dropped, yet if it is received from exit relay (ip on the list
downloaded on step 1)
it wouldn't do anything in terms of reporting anywhere. Otherwise
forward for spam
I'm also thinking about second possible solution, but I'm not sure if
On the host that's an exit relay, one would also have installed some
of postfix (or other MTA) and not encrypted tor exit traffic directed to
reroute to localhost's MTA for virus/spam scanning and then either
dropping. Rerouting is doable in moments using iptables. I'm not sure
that would have on the tor network and security though.
More information about the tor-relays