At this point the isp is clearly the victim! This guy doesn't have his own
ips and ipv4 is rare, so risking a complete ip range to get on blacklists
will be unacceptable for any company. I can fully understand them, because
dealing with spamhaus mafia is a nightmare. Lets hope they wont getting tor
unfriendly because of this, i run there exits for 2 years on some vps's
without a problem and i hope they don't start killing them now
Am 30.07.2014 14:39 schrieb "Lunar" <[email protected]>:

> [email protected]:
> > You somewhat made a mistake here - you've got to have an exit policy that
> > (minimally) rejects ports 25 and 465, or else your relay becomes a giant
> > abuse tool for spammers, scammers, and phishers instead of what you
> intended
> > it to be (which was a standard-functioning Tor relay).
>
> Please don't blame the victim. If this ISP acted differently than what
> they initially promised, then they are the problem.
>
> --
> Lunar                                             <[email protected]>
>
> _______________________________________________
> tor-relays mailing list
> [email protected]
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
>
_______________________________________________
tor-relays mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to