[tor-relays] Tor Exit: Complaints of IP being used for "spam" despite exit policy
lists at for-privacy.net
lists at for-privacy.net
Thu May 5 16:48:43 UTC 2022
On Thursday, May 5, 2022 3:57:02 PM CEST The Doctor wrote:
> ------- Original Message -------
>
> On Wednesday, May 4th, 2022 at 11:16, Neel Chauhan <neel at neelc.org> wrote:
> > If you need to send emails, you could:
> >
> > a. use Sendgrid or Mailgun or whatever to send emails if they don't
> > block exit IPs from connecting to their SMTP relays
> >
> > b. Run your own SMTP relay on a $3.5 VPS to forward emails
>
> You could also run an SMTP-to-something else protocol bridge to work around
> it. I use a fake SMTP server that relays every message it gets over XMPP
> to work around that problem.
>
> The Doctor [412/724/301/703/415/510]
Thanks, Neel and yl had already messaged me privately. I replied to them
yesterday. I had already solved the problem, unattended-upgrades and logcheck
mails reach me again.
Actually, I should know that we should avoid exit IPs for DNS, mail and other
things. I configured nullmailer as usual, then it takes the first IP and
interface it finds. I was sending mail as a client through|to my DNS
provider's SMTP server 'easydns.com'. They recently started using abusix
before smtpauth as well. Only a /27 are exit IP's per server. Now the mail
goes out on a completely different subnet and network card.
Well I could have pinged Mark Jeftovic @ easyDNS too, please whitelist _my_ IP
for _my_ mailbox. Or sending mail out via the SMTP server from IN-Berlin, like
my iRMC (BMC) do.
--
╰_╯ Ciao Marco!
Debian GNU/Linux
It's free software and it gives you freedom!
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20220505/e205a5ed/attachment.sig>
More information about the tor-relays
mailing list