how-to block ads
|reply to thedragonmas |
Re: SMTP Blocks
said by thedragonmas:As an 'access' provider, the electric company does not query the brand, model, or use of my clothes dryer.
actually id tell you to get a business class account for your business. 99% of home users have no need for their own mail server, and isp's can easyly claim SPAM controll for blocking use of mail and webservers on residential accounts.
If the original intention was to give everyone 'neutral access' to the Internet (similar to a utility, as some online have mentioned), it should be across all protocols and ports, not some for the 'rich business folks' and some for the 'little residential people'.
I'm not talking about speed tiers or 'extras' (like hosting, Static IP, rDNS, etc.) here, I'm talking specifically about access.
said by thedragonmas:I think your concept of Skype not being used to send spam is incorrect. I get spam from any 'instant message' based service, including AIM, ICQ, MSN, etc. Skype isn't unique in this regard.
as for smtp or http being different than skype or bittorrent thats a simple one for the isp's. skype isnt used to send spam, and theyd LOVE to kill off bittorrent if givin the chance.
Bittorrent has a sufficient amount of 'illegal' activity and can generate havoc on a network. Why wouldn't 'reasonable network management' apply there?
I would expect the ratio of legal/illegal content flying around the Internet is somewhere in the ballpark of (or worse than) the ratio of ham/spam on Port 25.
said by droobie:No, but if you want to run a laundromat and you need the appropriate juice to power that many driers, you will be forced to get a commercial electric account. said by thedragonmas:
actually id tell you to get a business class account for your business.
As an 'access' provider, the electric company does not query the brand, model, or use of my clothes dryer.
Running a mail server should also require a business class account, as you are doing something that is more advanced than the average consumer needs, and therefore also should understand how to prevent the abuse of port 25 in the first place.