From owner-freebsd-questions@freebsd.org Sun Feb 28 21:05:27 2021 Return-Path: Delivered-To: freebsd-questions@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 51C6754B6D8 for ; Sun, 28 Feb 2021 21:05:27 +0000 (UTC) (envelope-from merlyn@geeks.org) Received: from mail.geeks.org (jacobs.geeks.org [204.153.247.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4DpbWp4fSLz3CZ3 for ; Sun, 28 Feb 2021 21:05:26 +0000 (UTC) (envelope-from merlyn@geeks.org) Received: from mail.geeks.org (localhost [127.0.0.1]) by after-clamsmtpd.geeks.org (Postfix) with ESMTP id 023294B52 for ; Sun, 28 Feb 2021 15:05:19 -0600 (CST) Received: by mail.geeks.org (Postfix, from userid 1003) id E065D4B51; Sun, 28 Feb 2021 15:05:18 -0600 (CST) Date: Sun, 28 Feb 2021 15:05:18 -0600 From: Doug McIntyre To: freebsd-questions@freebsd.org Subject: Re: Somewhat OT: Mail Relay Services Message-ID: References: <877d08ef-d533-69f6-4c44-f2cbbe39ba31@tundraware.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Virus-Scanned: ClamAV using ClamSMTP X-Rspamd-Queue-Id: 4DpbWp4fSLz3CZ3 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of merlyn@geeks.org designates 204.153.247.1 as permitted sender) smtp.mailfrom=merlyn@geeks.org X-Spamd-Result: default: False [-3.30 / 15.00]; MID_RHS_MATCH_FROM(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; FROM_HAS_DN(0.00)[]; RBL_DBL_DONT_QUERY_IPS(0.00)[204.153.247.1:from]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+ptr]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-questions@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; SPAMHAUS_ZRD(0.00)[204.153.247.1:from:127.0.2.255]; RCVD_COUNT_THREE(0.00)[3]; DMARC_NA(0.00)[geeks.org]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-1.000]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:7753, ipnet:204.153.244.0/22, country:US]; RCVD_TLS_LAST(0.00)[]; MAILMAN_DEST(0.00)[freebsd-questions] X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 28 Feb 2021 21:05:27 -0000 On Sun, Feb 28, 2021 at 12:17:02PM -0700, Russell L. Carter wrote: > But I hadn't thought that my co-tenants might cause me a problem with > blacklisted subnets! Don't go with OVH, I and many other mailop will just outright block OVH. AWS isn't too bad, but you'll have to jump through some hoops to get their SMTP blocks lifted. I still see some abuse from AWS ranges though. I haven't had a problem with Vultr. Basicly, avoid the cheapest VPS providers, as that is what the SPAMers are targeting. Or the ones that do nothing for abuse reports, but that is mostly OVH, Tencent, some DO.