On 3 Sep 2013, at 21:52, Moritz Bartl <[email protected]> wrote:

> On 09/03/2013 10:39 PM, Elrippo wrote:
>> I have to disagree with you on behalf of SPAM.
>> I opened Port 25 on one of my exits. In a week I got blacklisted by Google 
>> and some DNSBL's for sending spam.
>> It took me quite a time to erase my IP from these lists...
>> I can live with port 587 for submission, but I will never open port 25 again.
> 
> Seconded. While we try not to restrict anything and have an "everything
> goes" policy on most of our relays, port 25 is sadly not a good idea to
> keep open.


I have been running a reduced exit policy, a slight variation on the mentioned 
approach here. [1]

Up until this week I've had no major issues, apart from one notice from the 
ISP, which was dealt with reasonably effectively.

My issue my is keeping the exit node online.

To answer the OP: how can we tell "malicious users" from "valid users". I 
understand your POV, but surely we can't discriminate? Or can we?

regards,
Bernard

[1] https://blog.torproject.org/running-exit-node

--------------------------------------
Bernard / bluboxthief / ei8fdb

IO91XM / www.ei8fdb.org

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

-- 
tor-talk mailing list - [email protected]
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to