| ▲ | zamadatix 2 days ago | |||||||||||||||||||||||||||||||||||||
TECHNICAL.md lays it out a bit more, but it claims to be RFC 5321 compliant with a realistic initiation sequence so it should somewhat look like a real SMTP server for the first bit. Ending up on any DNSBLs shouldn't be a problem unless you have a static home IP you plan on running an actual SMTP server from after this though. | ||||||||||||||||||||||||||||||||||||||
| ▲ | pogue 2 days ago | parent [-] | |||||||||||||||||||||||||||||||||||||
>SMTP traffic on port 587 (submission) is expected and normal Any residential dynamic or static IP with this port opened is definitely going to get flagged. Most ISPs already prevent these ports from being open, either by policy or by residential routers. It would probably very quickly end up on something like SpamHaus's PBL, which looks for this kind of thing.[1] I would imagine you would also find yourself on Shodan pretty quickly getting hit with constant nmap & login attempts from malicious actors. Spam bots are always looking for insecure servers to send emails from. I feel like ssh, SFTP, or even a secure DNS server would probably make more sense as something to hide traffic from DPI than an SMTP server. | ||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||