VPN Gate Anti-Abuse Policy

Anyone can hide their IP addresses by using VPN Gate Public VPN Relay Servers.

Most of users are expected to utilize this function for rightful purpose. However, a few users might abuse this function for wrong purpose. To counter such abuses, the VPN Gate Project defines the anti-abuse policy as followings.

 

The following VPN Gate aggregated log servers are owned, operated, and managed by SoftEther Corporation, our joint research partner. The University of Tsukuba does not possess this information. Decisions regarding disclosure of the logs are, in principle, made by SoftEther Corporation.

 

Custody and Disclosure Policy of VPN Connection Logs

We always keep VPN Connections Logs of VPN Gate Public VPN Relay Servers for three or more months

An access log entry will be recorded when an anonymous user connects to / disconnects from one of VPN Gate Public VPN Servers. An access log entry will be stored on the log file of the VPN Gate Public VPN Server. The same information will be transmitted to our logging server, by syslog-like protocol with SSL-encrypted communication. Similarly, accesses to the Public VPN Relay Servers list on the VPN Gate web server will be logged as same as below.

A VPN Connection Log entry contains:

  • Date and time
  • ID, IP address and hostname of destination VPN Server
  • Type of action (connect or disconnect)
  • Raw IP address and hostname of the source VPN client computer
  • Type of VPN protocols (SSL-VPN, L2TP, OpenVPN or SSTP)
  • VPN Client software-name, version and id (If available)
  • Number of packets and bytes during a VPN connection, and debug information of communication errors
  • Log records of destination HTTP/HTTPS hostnames (FQDNs), IP addresses, host names and port numbers of VPN Gate communications through VPN sessions

No other information will be transmitted to us nor be recorded on our logging server.

Disclosure to Police, Prosecutors, Lawyers or Courts

It is necessary to avoid abusing users who exploit VPN Gate to hide their IP address for wrongdoing. An in case of such abusing were occurred, it is necessary to trace the source IP address of such illegal user. Analyzing VPN Connection Log is helpful to investigate the source global IP address of him.

We will disclosure the VPN Connection Logs to a policeman, a prosecutor, a lawyer or a court who is authorized by applicable laws.

If you are a policeman, a prosecutor, a lawyer or a court who is authorized to and wants to request the disclosure of VPN Connection Logs, contact us with the following e-mail address. You need to attach the information which describes the date and time of the target logs, concerned VPN Server's IP address and other materials for reference.

 

Custody and Disclosure of VPN Packet Logs

Each VPN Gate Public VPN Relay Server keeps Packet Logs

In VPN Gate Experiment Service, a lot of volunteers (who are joining to this experiment) provides the VPN relaying functions on their computers. On each computer of each volunteer, the VPN Server Program always records packet-headers for every VPN users. You can see the packet log in order to know what kind of communications were established via the VPN server by a specific VPN user.

Packet Logs on each VPN servers will be kept for two or more weeks at least on the disk. They contains all TCP/IP headers of all communication initiated by VPN users. After two weeks pass, log files might be compressed or deleted to save the disk free space.

When a VPN Gate user communicates with an HTTP server via a VPN Gate Public VPN Relay Server, a part of the VPN Session ID will be appended on the User-Agent value on the HTTP request header. This partial Session ID will be used to identify the VPN Session which was related to the abuse incident.

How to request disclosing Packet Logs?

If you are a policeman, a prosecutor, a lawyer or a court who is authorized to and wants to request the disclosure of VPN Packet Logs, you must contact to the operator of the target VPN server. The contact address is listed on the VPN Severs List page. If your target VPN server is not on the list, or you cannot find the contact address, instead you have to contact the ISP who is responsible to manage the IP address. You can reach the appropriate administrator of the target VPN server via ISP if you are authorized by laws.

We don't have any VPN Packet Logs which are saved on each volunteer's VPN Gate Servers. No packet logs are to be submitted to us from each Public VPN Relay Servers. Do not request us to disclose a specific VPN Packet Log which is stored on a specific relay server. We do not hold such a log in our facility, so we cannot respond such a request.

We can help to analyze Packet Logs if requested by authorities

If you are a policeman, a prosecutor, a lawyer or a court who is authorized to and wants to analyze the contents of obtained Packet Log files, we can help you to analyze the Packet Logs within rational and practical efforts if we can afford.

If you are a policeman, a prosecutor, a lawyer or a court who is authorized to and wants to request the analyzing of VPN Connection Logs, contact us with the following e-mail address.

 

Disclosure of Logs in Accordance with the Act on Measures against Infringement of Rights, etc. Arising from the Distribution of Information by Specified Telecommunications (Japanese law)

If any posting or other transmission of information is made via VPN Gate, a person seeking relief under the Act on Measures against Infringement of Rights, etc. Arising from the Distribution of Information by Specified Telecommunications (a person claiming to be a victim) may need information such as the source IP address and port number at the provider with which the sender directly has a contract, in order to make a disclosure request under that Act or to initiate legal proceedings to obtain a court order or judgment under that Act against the provider with which the sender directly has a contract.

Where such a posting has been made through VPN Gate, and where, based on the necessity described above, it becomes necessary to obtain information such as the source IP address and port number from the connection logs of the VPN Gate relay server through which the communication passed, such information may be obtained. For example, this may occur when a person claiming to be a victim needs the source IP address, port number, or similar information in order to carry out procedures under the Act. In such a case, a disclosure request to obtain information from the aggregated logs described above cannot, in principle, be made under that Act. This is because the communication did not pass through VPN Gate's central log server, and VPN Gate's central log server does not fall under "specified telecommunications facilities" (Article 2, item 2). In principle, the computer of the VPN Gate relay server through which the communication passed must be treated as the "specified telecommunications facilities," and the administrator of that server must be treated as the "specified telecommunications service provider" (Article 2, item 4), and the disclosure request must therefore be made to that administrator.

However, this method takes a great deal of time. It is not uncommon for it to take considerable time to obtain the source IP address, port number, and similar information from the provider with which the sender directly has a contract, and in some cases this may make effective relief of rights difficult in practice.

Accordingly, in cases such as those described above, the administrators of VPN Gate may provide, to a person claiming to be a victim, information such as the source IP address and port number at the original provider from which the relevant transmission was made, as recorded on VPN Gate's central log server, in accordance with standards analogous to those of the Act, provided that the following two conditions are satisfied:

(1) The person claiming to be a victim has a reasonable ground to need to obtain the source IP address and port number at the provider with which the sender directly has a contract, for the purpose of obtaining relief of rights under the Act, and this is prima facie shown by supporting materials (materials equivalent in content and standard to those that must be submitted when making a disclosure request or initiating court proceedings under the Act).
(2) The source IP address and port number in question are one of a large number of IP addresses used by the ISP operating that IP address for assignment to users, and from the IP address itself, its reverse DNS hostname, or Whois information, it is impossible or extremely difficult for either the administrators of VPN Gate or the person claiming to be a victim to identify the individual or organization that was using that IP address at the relevant date and time. In other words, in order ultimately to identify the sender, the person claiming to be a victim is in a situation where, both theoretically and practically, they are compelled to newly undertake disclosure request procedures or court procedures under the Act.

If you believe that your case falls under (1) above, please contact us at the email address below. If, as a result, the IP address or similar information is found to fall under (2), we may provide information such as the source IP address and port number at the original provider from which the relevant transmission was made, as recorded on VPN Gate's central log server.

 

 

How to block any using of VPN Gate Service by your employees?

If you are a network administrator of the company and you want to prohibit using VPN Gate of each employee, you can block VPN Gate with the following steps.

  1. Block accesses to the URL https://www.vpngate.net/ by your firewall.
  2. Block accesses to all URLs on the Mirrors Sites List by your firewall.
  3. If you conducted the above steps, an employee can still use VPN Gate by bringing the VPN Gate Client from outside somehow.
    In order to avoid such a use, block any packets of TCP or UDP on your firewall except necessary communication for your company's business.
    (Advanced firewall products can do that. For example, some firewalls can decrypt SSL communication to apply white-lists.)
  4. If you conducted all the above steps, your employees can use 3G or LTE wireless-provider devices to bypass your firewall's restriction to use VPN Gate Service.
    It is very difficult to block such using. If you want to block this, you have to purchase an anechoic chamber.

 

Any Suggestions?

It is our difficult challenge to promote rightful uses of VPN Gate and to avoid wrongful abuses of VPN Gate at the same time.

If you have any suggestions, please feedback us on the forum.