[tor-relays] non-encrypted connections from Tor exit relays

Camie Hethcote snuffluau at mailbox.org
Thu Sep 10 17:15:58 UTC 2020


Hi !

SMTP ports are often used for spamming so that's why most exit relay operators blocking them.

Spamming from your machine = abuse reports = potential suspension of your service by provider


> On 09/10/2020 4:52 PM kirgali at riseup.net wrote:
> 
>  
> hi, generalized question about Tor exit relays and exit relay operators.
> do some exit relay operators have a policy to prevent connections
> leaving their exit node via non-encrypted ports (e.g. port 25)?
> 
> this could be a philosophical position - not even wanting to be in a
> position to observe users' data passing through the exit node in clear
> text. or a pragmatic position - hoping that encrypted connections
> provide some level (even very weak) of plausible deniability in the
> event that a connection attracts the attention of law enforcement. this
> is just my thoughts.
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


More information about the tor-relays mailing list