In this article

  • Bulk Email Sending Without SES
  • Penetration Testing Without Approval
  • Cryptocurrency Mining
  • Mass SMS and Voice Campaigns
  • Network Security Research
  • Bulk IP Address Scanning
  • DNS Query Testing and Benchmarking
  • Load Testing Against External Sites
  • Tor Exit Nodes
  • SMTP Open Relays
  • Additional Restricted Workloads Worth Mentioning
  • The OpenMetal Difference: Your Infrastructure, Your Rules

Every day, legitimate businesses discover their innovative workload violates some obscure AWS policy, requires special approval, or hits an arbitrary limit that brings their operations to a grinding halt.

You’re not doing anything illegal. You’re not sending spam. You’re just trying to run your business, but AWS’s restrictions treat your legitimate workload like a potential threat.

Here are 10 completely legal, business-critical workloads that AWS makes unnecessarily difficult, along with the actual policies that restrict them and a simpler alternative.

1. Bulk Email Sending Without SES

The AWS Reality

By default, AWS blocks outbound traffic on port 25 for all EC2 instances. Want to send email directly from your servers? You’ll need to request removal of port 25 restrictions, which AWS may deny without explanation.

Even if approved, you’re pushed toward Amazon SES, which comes with its own limitations:

  • Starting limit of 200 emails per day
  • Maximum sending rate of 1 email per second
  • Gradual “reputation building” that can take months
  • Immediate suspension for bounce rates over 5%

Why It’s Frustrating

Imagine running a legitimate newsletter with 100,000 subscribers. A 5.1% bounce rate (completely normal after a list cleaning) could shut down your entire email operation. Your business communication stops while you plead your case to AWS support.

The OpenMetal Alternative

Run your own mail servers with dedicated IP blocks. No port restrictions, no sending limits, no arbitrary suspension. Full control over your IP reputation, SPF records, and sending patterns. You can scale from 1 to 1 million emails without asking permission.

2. Penetration Testing Without Approval

The AWS Reality

According to AWS’s Penetration Testing Policy, you need prior written approval for security testing. Prohibited activities include:

  • DNS zone walking
  • Denial of Service (DoS) testing
  • Port flooding
  • Protocol flooding
  • Request flooding (API or login requests)

Why It’s Frustrating

You’re a security firm hired to test a client’s infrastructure. Before you can start, you need AWS approval. The approval process can take days. Certain critical tests are completely forbidden, leaving security gaps you can’t properly assess. One mistaken test without approval? Account suspension.

The OpenMetal Alternative

Your bare metal, your rules. Run full penetration tests, vulnerability scans, and security research without restrictions. Set up isolated networks for honeypots, malware analysis, and security training environments. No approval needed, no techniques forbidden. Check out our cybersecurity customer running their ClickHouse deployment on OpenMetal infrastructure. It’s their hardware and their rules!

3. Cryptocurrency Mining

The AWS Reality

The AWS Customer Agreement explicitly states that cryptocurrency mining requires prior written approval. Without approval, your account faces immediate termination.

Why It’s Frustrating

While mining might be restricted, what about running blockchain nodes? Validators? The line isn’t always clear. Many legitimate blockchain operations have faced suspension because AWS flagged their activity as “mining-related”. The approval process is opaque, and denials don’t include explanations.

The OpenMetal Alternative

Run validators, nodes, and blockchain infrastructure without seeking permission. Your hardware, your choice. Whether you’re validating Ethereum transactions or running a Bitcoin full node, there are no restrictions or approval processes.

4. Mass SMS and Voice Campaigns

The AWS Reality

Amazon SNS starts with strict limits:

  • SMS spending limit of $1.00 per month
  • Voice calling requires Amazon Connect with complex approval
  • Promotional SMS requires additional registration
  • 160-character limit counting toward your quota

Amazon SNS documentation details extensive registration requirements for different countries, with some taking weeks for approval.

Why It’s Frustrating

Running a legitimate alert system for 10,000 customers? Hope you enjoy the approval process for every country, carrier registration requirements, and spending limit increase requests! Emergency notification system? Better hope you’ve pre-approved everything months in advance.

The OpenMetal Alternative

Deploy your own SMS gateways and SIP infrastructure. Connect directly with carriers or aggregators of your choice. No spending limits, no character counting, no geographic restrictions. Full control over your communication infrastructure.

5. Network Security Research

The AWS Reality

AWS explicitly prohibits:

  • Running open proxies
  • Operating network honeypots
  • Packet sniffing or network monitoring
  • Operating “any form of network monitors or packet sniffers”

Why It’s Frustrating

You’re a cybersecurity researcher studying attack patterns. Your honeypot collects valuable threat intelligence. But to AWS, you’re indistinguishable from a malicious actor. Your legitimate research could end with account termination.

The OpenMetal Alternative

Deploy honeypots, run packet capture, analyze network traffic all without restrictions. Create isolated environments for malware analysis, threat research, and security training. It’s your infrastructure!

6. Bulk IP Address Scanning

The AWS Reality

The AWS Acceptable Use Policy prohibits “unauthorized port scans or network discovery tools.” Even scanning your own allocated IP ranges at scale can trigger automatic suspension.

Why It’s Frustrating

You’re managing a large infrastructure and need to audit your assets. Or you’re a security company providing vulnerability scanning services. AWS’s automated systems can’t distinguish between legitimate scanning and malicious activity, leading to sudden account suspension.

The OpenMetal Alternative

Scan your networks, audit your infrastructure, run network discovery tools without fear of suspension. Deploy Nmap, Masscan, or custom scanning tools at any scale.

7. DNS Query Testing and Benchmarking

The AWS Reality

AWS explicitly prohibits DNS query flooding and “benchmarking tests” against their infrastructure. Even testing your own Route 53 configurations at scale can violate terms.

Why It’s Frustrating

You’re developing a DNS-based service that needs load testing. Or you’re benchmarking failover configurations. AWS’s restrictions mean you can’t properly test your architecture’s limits before production deployment.

The OpenMetal Alternative

Run DNS benchmarks, load tests, and query flooding against your own infrastructure. Test failover scenarios, benchmark response times, and validate your architecture’s limits without restrictions.

8. Load Testing Against External Sites

The AWS Reality

AWS prohibits load testing without explicit consent from target sites. This includes testing your own external infrastructure or APIs hosted elsewhere.

Why It’s Frustrating

Your company runs infrastructure across multiple providers. Testing disaster recovery requires load testing failover between environments. But AWS’s policy means you need written permission to test your own systems if they’re external to AWS.

The OpenMetal Alternative

Load test any infrastructure you have permission to test. No AWS approval needed for testing your own external systems. Full freedom to validate your disaster recovery and failover procedures.

9. Tor Exit Nodes

The AWS Reality

While not explicitly banned in the AUP, running Tor exit nodes on AWS consistently results in account suspension. AWS treats Tor traffic as suspicious activity, regardless of your legitimate privacy-focused use case.

Why It’s Frustrating

You’re providing privacy infrastructure for journalists in oppressive regimes or running privacy research. To AWS’s automated systems, you’re a security threat. Your humanitarian or research project gets shut down without warning.

The OpenMetal Alternative

Run Tor nodes, VPN services, or any privacy infrastructure without restrictions. Support internet freedom, privacy research, or anonymous communication platforms without fear of suspension.

10. SMTP Open Relays

The AWS Reality

AWS explicitly prohibits running open SMTP relays, even for legitimate email forwarding services. The AWS Service Terms treat any open relay as a violation.

Why It’s Frustrating

You’re running a legitimate email forwarding service, backup MX service, or email gateway for multiple domains. AWS’s blanket prohibition means you can’t offer services that require relay functionality, even with proper authentication and anti-spam measures.

The OpenMetal Alternative

Configure your mail servers however your business requires. Run relay services, backup MX, or email gateways with your own security controls. Implement authentication, rate limiting, and anti-spam measures on your terms.

Additional Restricted Workloads Worth Mentioning

Proxy and VPN Services

AWS regularly suspends accounts running proxy or VPN services, even legitimate business VPNs or privacy services. Their automated systems can’t distinguish between corporate VPNs and malicious proxies.

Distributed Computing Projects

Running Folding@home or other distributed computing projects violates AWS’s resource usage policies. Your contribution to scientific research could result in account termination.

Automated Trading Systems

High-frequency trading systems that make rapid API calls trigger AWS’s rate limiting and abuse detection. Your legitimate trading algorithm gets throttled just when market conditions are most favorable.

Phishing and Security Training Infrastructure

Even legitimate security awareness training that simulates phishing attacks violates AWS policies. Your employee security training platform could be suspended for doing exactly what it’s designed to do.

Network Monitoring Tools

Running tools like Wireshark, tcpdump, or custom packet analysis violates AWS’s network monitoring prohibition. Your legitimate network troubleshooting becomes a terms violation.

The Pattern Is Clear

AWS’s restrictions make sense for a shared, multi-tenant environment where one customer’s activity can affect thousands of others. But these same restrictions strangle innovation and make legitimate business operations unnecessarily difficult.

Every approval process adds delay. Every restriction requires workarounds. Every false positive suspension costs money and reputation.

The OpenMetal Difference: Your Infrastructure, Your Rules

OpenMetal Hosted Private Cloud CoreOpenMetal provides dedicated bare metal servers and private clouds where you have complete control:

  • No approval processes – Deploy what you need, when you need it
  • No arbitrary limits – Scale based on your hardware, not policy restrictions
  • No suspensions – Your legitimate workload won’t trigger automated bans
  • Full root access – Complete control over your infrastructure
  • Dedicated resources – No noisy neighbors, no shared restrictions
  • Your IP blocks – Manage your own IP reputation and allocation

When Restrictions Become Business Barriers

If you’ve ever:

  • Waited days for AWS approval to run basic operations
  • Been suspended for legitimate business activity
  • Hit arbitrary limits that stopped your service
  • Spent more time working around restrictions than building your product
  • Had to explain to customers why AWS won’t let you serve them

Then it’s time to consider infrastructure without limits.

Make the Switch to Unrestricted Infrastructure

Your workload shouldn’t be subject to arbitrary restrictions. Whether you’re sending millions of emails, running security research, operating blockchain infrastructure, or building the next innovation that doesn’t fit neatly into AWS’s policies you need infrastructure that adapts to your needs, not the other way around.

OpenMetal provides the same API-driven, on-demand infrastructure experience as AWS, but on dedicated hardware where you make the rules. Deploy in seconds, scale on-demand, and never worry about your legitimate workload.

Ready to remove restrictions from your infrastructure?

Calculate Your Savings | Start Your Free Trial | Talk to an Engineer


Have you been restricted, throttled, or suspended by AWS for legitimate workloads? We’d love to hear your story. Contact us at marketing@openmetal.io to share your experience.

Chat With Our Team

We’re available to answer questions and provide information.

Reach Out

Schedule a Consultation

Get a deeper assessment and discuss your unique requirements.

Schedule Consultation

Try It Out

Take a peek under the hood of our cloud platform or launch a trial.

Trial Options

 

 

 Read More on the OpenMetal Blog

10 Workloads AWS Makes Frustratingly Difficult

Nov 19, 2025

AWS blocks or restricts legitimate workloads like bulk email, security research, and blockchain nodes. These arbitrary limits force businesses to seek approval for basic operations. OpenMetal provides unrestricted bare metal infrastructure where your legitimate workload won’t face suspension.

Choosing Between Ceph Dual and Triple Replication for Production Workloads

Nov 17, 2025

Replica 2 or replica 3? The answer may not affect you as much as you think. Neither protects against the data loss scenarios that actually happen in production. Learn why you need a separate backup cluster regardless of replica count and how OpenMetal’s fixed pricing makes it affordable where hyperscalers make it cost-prohibitive.

Build a Secure Penetration Testing Lab with On-Demand Private Cloud Infrastructure

Nov 11, 2025

Public cloud providers like AWS and GCP will suspend your account for running honeypots, malware analysis, or penetration testing. Security researchers need dedicated infrastructure with nested isolation. Learn how to build a “sandbox-within-a-sandbox” lab using infrastructure VLANs and OpenStack VPCs.

Why Hyperscalers Won’t Let You Build an Email Service on Their Infrastructure

Nov 10, 2025

Hyperscalers like AWS and GCP block custom email services, pushing you to their metered APIs. Learn why this conflict of interest hurts your business and how to build a scalable, high-volume email platform on OpenMetal’s dedicated hardware with BYOIP, private networking, and no sending limits.

Why Enterprise Workloads Need BYOIP Support That Hyperscalers Can’t Provide

Nov 06, 2025

Hyperscalers lock you in by owning your IP addresses. Moving infrastructure means updating firewall rules, losing email reputation, and coordinating DNS changes across partners. BYOIP gives you control over your network identity. Learn why this matters for multi-region, hybrid, and enterprise workloads.

Why Run Proxmox VE on OpenMetal Bare Metal Infrastructure?

Nov 04, 2025

Deploying Proxmox VE on OpenMetal bare metal eliminates virtualization licensing costs while providing enterprise features like HA clustering and live migration. Organizations achieve 50%+ savings versus public cloud with predictable monthly pricing. Dedicated hardware delivers consistent performance without resource contention, making this combination ideal for production workloads, database consolidation, and VMware migrations.

Optimizing Latency and Egress Costs for Globally Distributed Workloads

Oct 07, 2025

Discover how OpenMetal’s strategically positioned data centers eliminate the “data tax” on globally distributed applications. Free east-west traffic between regions plus predictable 95th percentile bandwidth billing lets you architect for performance instead of cost avoidance, with typical savings of 30-60% versus public cloud.

Performance Consistency: The Overlooked KPI of Cloud Strategy

Sep 27, 2025

Most enterprises focus on uptime and peak performance when choosing cloud providers, but performance consistency—stable, predictable performance without noisy neighbors or throttling—is the real game-changer for cloud strategy success.

Why Singapore SaaS Leaders Are Embracing Open Source Private Cloud

Sep 27, 2025

Discover why Singapore SaaS companies are embracing open source private cloud infrastructure as a strategic alternative to hyperscaler dependence. Learn how OpenMetal’s hosted OpenStack solution delivers predictable costs, data sovereignty, and vendor independence for growing businesses across ASEAN.

Why Mature Cloud Infrastructure Needs the Discipline of Capacity Planning

Sep 15, 2025

Public cloud’s infinite shelf promise masked the need for capacity discipline, creating unpredictable costs and architectural debt. Discover how predictable infrastructure models like OpenMetal’s hosted private cloud transform capacity planning from reactive firefighting into proactive strategic advantage for CTOs.