From owner-freebsd-stable@FreeBSD.ORG Wed Feb 19 20:53:26 2014 Return-Path: Delivered-To: freebsd-stable@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 38768FB4 for ; Wed, 19 Feb 2014 20:53:26 +0000 (UTC) Received: from smtp1.bway.net (smtp1.v6.bway.net [IPv6:2607:d300:1::27]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 0FF721317 for ; Wed, 19 Feb 2014 20:53:26 +0000 (UTC) Received: from [10.3.2.41] (foon.sporktines.com [96.57.144.66]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: spork@bway.net) by smtp1.bway.net (Postfix) with ESMTPSA id 3F628959EE; Wed, 19 Feb 2014 15:53:18 -0500 (EST) References: <5303B8F3.8090709@vangyzen.net> <5303E549.8020106@bluerosetech.com> In-Reply-To: Mime-Version: 1.0 (Apple Message framework v1085) Content-Type: text/plain; charset=us-ascii Message-Id: <98B6A42D-9A63-4E59-BEEB-C82B497B4AA1@bway.net> Content-Transfer-Encoding: 7bit From: Charles Sprickman Subject: Re: Recommend FreeBSD VPS Date: Wed, 19 Feb 2014 15:53:17 -0500 To: Pete French X-Mailer: Apple Mail (2.1085) Cc: freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 19 Feb 2014 20:53:26 -0000 On Feb 19, 2014, at 6:34 AM, Pete French wrote: > Not sure if what you are after is ajils, but I have had excellent > experience with Exonetric in the UK. They are the only people I now > use for FreeBSD hosting, both real hardware and jails. Slightly OT (and NOT related to Exonetric!) but relevant to some when shopping for a VPS/colo provider. Recently I've seen a bit of a spike in spam that sails through our filtering. In many cases, the sender was someone running a VPS or dedicated box that was handling the whole spam chain - sending the email, hosting the tracking links, and in some cases hosting whatever crap was being spamvertised. Everything was setup correctly - HELO was right, DNS was right, html mail was properly formatted with only a bit of bayes-busting gibberish at the bottom in a white font; it basically looked legit except for the part where they are spammers. In other words, it reminded me of the bad old days when you had spam-friendly hosters - these people seem quite comfortable paying for a VPS or dedicated box in the US and spamming away. Most of these were coming from ColoCrossing IP space. I suggest googling that company and looking up their blocks on your favorite RBLs, as there is a bit of drama there, but do note that many of the very low-cost VPS operations seem to be using this company. Be aware of who your neighbors are if your VPS needs to send email, or if you feel icky about getting a cheap VPS by moving into a shady neighborhood. Charles > > cheers, > > -pete. > > _______________________________________________ > freebsd-stable@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-stable > To unsubscribe, send any mail to "freebsd-stable-unsubscribe@freebsd.org"