Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


fileMEDIA accuses me of hacking and illegal activity, suspends server, denies refund - Page 3
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

fileMEDIA accuses me of hacking and illegal activity, suspends server, denies refund

13567

Comments

  • AnthonySmith said: A better way of answering this and as I have myself in the past is: You are quite correct we have mot made it explicitly clear we do not allow XXX so I am happy to refund you for the remainder of your service, I will get the TOS/AUP updated to avoid further confusion.

    Good point, XXX requires in germany special child protection and this is already not discussed in the ToS. Because it is not our problem if customer violates against the german laws. We will get a police request and take down the web page and delivery all requested data.

    That's the same as with port scanning and not allowed as a part of hacking mechanism. Not §202, it is a part of called "Computersabotage" described in §303b! But you should know it because you a german lawyer, nice try.

    And next point, any service which the customer provides damage to us will cause also a suspension Tos §12.4 and port scanning cause a damage to us because subnets and ip addresses will be reported to blacklist. Search one of this point and a suspension is justified.

    But when you will support hackers, spamming, port scans and so on, you can get this customers we don't want it.

  • wychwych Member

    There is also a Law in Germany regarding refunds that is related to unfair material gain, I will dig it out when I get a minute.

    Ant is on one.

  • Cool kids here on LET.

    I would have suspended the client if I saw this, especially since it's explicitly for the purpose of scanning for a known and released exploit; with the malicious intent of abusing the exploit. There's hardly any other way to construe it, if the facts are as they are stated above (where one specific port was scanned in one specific way across multiple subnets of IP addresses.)

    Unless you have permission from their networks, it's generally not going to fly with many hosts once they've found out, or received notifications thereof and regarding. The fact that you continued to port scan (and argue the point) after the host asked you to stop, would explain why they went and suspended the service.


    That being said, @fileMEDIA is not handling this situation very well either.

  • Nyr said: Plenty of legitimate hosts allow this.

    probably not german ones...

  • You know that port scanning will generate abuse reports towards the IP owner. If you are doing it, it would have been courteous to explicitly get permission before starting activity that would generate an abuse report.

    I don't think a host necessarily needs to write down every single possible activity that may generate abuse reports to forbid them. It should be common sense not to perform activities like port scanning without giving your host a heads up first.

  • AnthonySmithAnthonySmith Member, Patron Provider
    edited August 2014

    fileMEDIA said: Good point, XXX requires in germany special child protection

    Sorry for the mix up, I should have said XYZ not XXX meaning 'insert something of relevance here", not porn.

    Just to be clear I think @Nyr really should have asked first, but he has a valid point it is not against your terms/ AUP so that part of the communication failure is your fault, as such you should refund.

    Thanked by 1zombiekiller753
  • fileMEDIAfileMEDIA Member
    edited August 2014

    AnthonySmith said: Sorry for the mix up, I should have said XYZ not XXX meaning 'insert something of relevance here", not porn.

    No problem, my fault for mixing.

    For explanation of abuse process, we do not terminate the service. We only suspend such a service and request a justification that the do not new attacks/spamming. After a response the service will be reactivated. But in this case the customer do not want any explanation why they did, if they have any justification of the owner or they will stop it.

  • FlorisFloris Member
    edited August 2014

    @Mark_R said:
    Why do people keep referring to Wikipedia articles? Isn't it possible for everyone to edit them? Personally I wouldn't attach any value to those.

    Well, as fileMEDIA apperently does attach value to them

    I quote

    fileMEDIA said: Sure, malicious port scanning is also a part of hacking and cause a suspension. It is also included § 303b StGB and is easily described in wiki (http://de.wikipedia.org/wiki/Portscanner).

    It is understandable that others refer to them (the same article) aswell to prive him wrong.

    I personally believe that it is only fair that @Nyr should get a refund and that @fileMEDIA specifically blocks this from their ToS, port scanning on itself meight be a greyish area, but @Nyr did check your ToS and the german law to see if it was allowed or not, his research concluded it was allowed. You would be violating your own part of the agreement if you wouldn't give him a refund.

  • It's people like @Nyr that get all these IPs on blacklists because they want to portscan other networks without permission from the receiver "just for the fun of it". Dude, confess to your lies. You were portscanning caltech.edu. That's a university for engineering and you were portscanning for a specific vulnerability. You obviously had bad intentions if you're trying to hack into a university. As far as I'm concerned, @fileMEDIA had every right to suspend you as soon as they got reports of your malicious activities.

    For those of you who justify @Nyr please tell me, would it also be okay for him to stress-test you guys "for the fun of it" too? Scanning for security vulnerabilities is nowhere near harmless and should be viewed as a criminal activity. If he really wasn't trying to do anything malicious, he wouldn't have purchased a VPS and could have done it all from his home connection.

  • FlorisFloris Member
    edited August 2014

    Pwner said: would it also be okay for him to stress-test you guys

    No, as this would do DIRECT DAMAGE to my network. He has not done any direct damage to their network. That was one shitty comparison.

    Pwner said: You obviously had bad intentions

    That is only speculation. Won't stand a chance in court.

    Pwner said: @fileMEDIA had every right to suspend you

    Not according to their own ToS, nor according to the german law.

  • fileMEDIAfileMEDIA Member
    edited August 2014

    Floris said: You would be violating your own part of the agreement if you wouldn't give him a refund.

    No, we don't offer any refund policy. And as long as the abuses are not explained and stop we cannot reactivate the service. If he stops this scans the instance will be enabled and he can use it again.

    Floris said: Not according to their own ToS, nor according to the german law.

    And this is not true. Currently the general term is that port scanning is also included in §303b called "Computersabotage". But there is currently no court decision if is included or not.

    Thanked by 1sz1hosting
  • @Pwner said:
    It's people like Nyr that get all these IPs on blacklists because they want to portscan other networks without permission from the receiver "just for the fun of it". Dude, confess to your lies. You were portscanning caltech.edu. That's a university for engineering and you were portscanning for a specific vulnerability. You obviously had bad intentions if you're trying to hack into a university. As far as I'm concerned, fileMEDIA had every right to suspend you as soon as they got reports of your malicious activities.

    For those of you who justify Nyr please tell me, would it also be okay for him to stress-test you guys "for the fun of it" too? Scanning for security vulnerabilities is nowhere near harmless and should be viewed as a criminal activity. If he really wasn't trying to do anything malicious, he wouldn't have purchased a VPS and could have done it all from his home connection.

    you are implying that @nyr was scanning for vulnerabilities or had any malicious intend, which is not the case here (not proven at least.) the real problem here is that @filemedia didn't state anything about portscanning in the TOS to begin with, it can be used for non-malicious activities so adding it to the TOS will make clear to the customer that regardless of the intention it is not allowed.

  • @Mark_R Apparently he was... apparently

    @fileMEDIA said:
    That you done massive ports scans isn't true? I think you didn't deny it. You also don't said why you do that. Any explanation?

    Sure, you caused blocked ip addresses which affects other customers:

    62.113.205.219 was observed probing caltech.edu for security holes. It has been blocked at our border routers. It may be compromised.

    We have blocked someone from your IP space for abuse. Reason: Port Scanning. Log lines are below. Time zone is UTC.

    That is the last comment to that point. We don't support any illegal actions: We can reactivate the vps when you don't do any port scanning or the account will be suspended until the end of the contract time and no refund is possible.

    Thanked by 2Pwner marrco
  • FlorisFloris Member
    edited August 2014

    fileMEDIA said: But there is currently no court decision if is included or not.

    As long as this is not determined in court, it is simply not illegal, and you had no right to suspend the customer in this case.
    He didn't break your ToS, you did by not providing the service paid for, by doing that, he is entitled to a refund.

    I suggest you read up on the actual paragraph §303b.
    http://www.iuscomp.org/gla/statutes/StGB.htm#303b

    He did not damage, or alter any data, therefore this article is not applicable to this situation.

  • @zombiekiller753 said:
    Mark_R Apparently he was... apparently

    All I read from that is the port scanning, no other action. Its just a description from how the target IP administrator sees it. Theres nothing that clearly shows malicious intend.

  • fileMEDIAfileMEDIA Member
    edited August 2014

    Floris said: As long as this is not determined in court, it is simply not illegal, and you had no right to suspend the customer in this case.

    He didn't break your ToS, you did by not providing the service paid for, by doing that, he is entitled to a refund.

    You do not understand it, currently it is included as general term. This law do not listen any explicit mechanism like exploiting, scanning,.. And this can only be clarify from a court if it is not included.

    The suspension is NOT the problem. There are serval points in the ToS which includes the suspension. Example: Any damage from a customer to us can affect a suspension. It is clearly described in the ToS and his port scans cause a damage because his address and subnet are listen in blacklist.

  • edanedan Member
    any service which the customer provides damage to us will cause also a suspension Tos §12.4

    Blacklisted IP is a damage isn't it?

  • FlorisFloris Member
    edited August 2014

    @edan said:

    any service which the customer provides damage to us will cause also a suspension Tos §12.4

    Blacklisted IP is a damage isn't it?

    I hardly consider the ip being blacklisted in 2-3 lists actual damage.

    The listing in v4bl shouldn't even be there, since he didn't send any spam mail.

    It is not listed in the CBL of spamhaus and was only listed in it due to:

    "This IP is infected with, or is NATting for a machine infected with Win32/Dorkbot"

    It could've been the case that he was scanning for a IP, but to simply warn them if their machines are infected, for all we know he could be a security researcher.

  • perennateperennate Member, Host Rep
    edited August 2014

    edan said: Blacklisted IP is a damage isn't it?

    Causing abuse reports which the hosting provider has to deal with can also be considered damage. I don't see how anyone can expect their host to process multiple abuse reports daily and deal with IP blacklisting that come as a result of possibly illegal activity on their VM, for a few dollars a month.

    Edit: and ditto for anything that requires host to defend activities that fall in a legal gray area / depend on user's motives.

    Edit2: and either way, if you are running something which is going to cause your hosting provider trouble with abuse emails / IP blacklisting, even if you don't think it violates terms of service, it is incredibly stupid to not let your hosting provider know, or ask for a clarification, before proceeding with the activities. Sure, maybe filemedia.de shouldn't have suspended if it doesn't violate terms of service at all; but considering all of the abuse reports and other issues they had, and the various generic clauses in terms of service, it's impossible to argue that none of those generic clauses (like damage) apply.

    Thanked by 1sz1hosting
  • Not sure how some people are thinking this is ok? Black list a hosts ip's clearly it is not ok, also clearly he was trying to hack something and do something malicious if you disagree you have clearly lost your mind.

  • FlorisFloris Member
    edited August 2014

    @sz1hosting said:
    Not sure how some people are thinking this is ok? Black list a hosts ip's clearly it is not ok, also clearly he was trying to hack something and do something malicious if you disagree you have clearly lost your mind.

    This has not been proven, and you can't prove it aswell. He could've been scanning (as a good guy) aswell, as I stated in my previous post, but then again, I can't prove that either. Please don't jump to conclusions. His motives can't be used as an argument.

    As per your first point, It is not listed in any major blacklists like spamhaus, that could've caused damage to the host.

  • Floris said: This has not be proven, and you can't prove it aswell. He could've been scanning (as a good guy) aswell.

    IP was added to blacklists and also blocked from scanned networks. This cause trouble, the ip or subnet will be used from us or other customer and that's the damage. Someone of us must remove the ip address / and or subnet from all blocks.

  • perennateperennate Member, Host Rep

    Floris said: This has not be proven, and you can't prove it aswell. He could've been scanning (as a good guy) aswell.

    The only way to port scan as a good guy is to obtain permission from both your network and the target network to conduct the port scanning.

  • @sz1hosting said:
    Not sure how some people are thinking this is ok? Black list a hosts ip's clearly it is not ok, also clearly he was trying to hack something and do something malicious if you disagree you have clearly lost your mind.

    Come back if you have read the entire thread + have anything to backup the malicious intend assumptions, something more than just a simple port scan.

    Thanked by 1akz
  • Floris said: He could've been scanning (as a good guy) aswell.

    He has permission to '' scan as a good guy? from the targets he was trying to exploit and hack and cause malicious acts too?"

  • sz1hosting said: he was trying to exploit and hack

    This is not proven, and has not happened.

    Thanked by 1akz
  • perennateperennate Member, Host Rep
    edited August 2014

    There seem to be two arguments here. First, that it was illegal for filemedia to suspend because no terms of service clause was violated; but the terms of service has generic clauses where pretty much any activity can be squeezed in that make this argument invalid. Second, that it was immoral for them to do so. But I can't agree with that, given that they suspended only in response to the multiple abuse reports, you cannot expect your host to defend you unless you have their permission first. And they also claim that they were willing to unsuspend if the activity was stopped.

    Edit: as far as damage goes, their last response is reasonable IMO. Eventually a subnet may be blocked rather than just a single IP, and another client assigned an IP in the same subnet would not be able to reach part of the Internet as a result. That would really be unacceptable.

    Thanked by 1Faizi
  • FlorisFloris Member
    edited August 2014

    Sorry, but I don't think he was sending any chilean spam, was he?
    In that case, this listing was ungrounded:

    http://www.dnsblchile.org/



    And being listed on a smtp blocklist is not what he caused, and that is all the current ip is on, he was not spamming.

  • @Mark_R You complained about other people not reading the entire thread, however you didn't seem to notice (or chose to ignore) the evidence of Nyr scanning into CalTech and getting the IP blacklisted. It is abusive and damaging to the provider since the IP is now on a blacklist. Also, he didn't obtain permission from his provider and his target of the scan whether he is allowed to scan or not.

    @Floris Enjoy the evidence you've asked for! If you read the previous posts, I wouldn't have had to re-post it.

    @fileMEDIA said:
    We got serval abuse messages about open VNC port scanning. We suspended the customer and informed about this case. That is not normal port scanning, it is scanning for open VNC ports which are affected.

    date.time srcIP srcPort dstIP dstPort proto #pkts 0813.17:37:03.722 62.113.205.219 46059 134.4.231.3 5900 6 1 0813.17:37:03.914 62.113.205.219 60990 131.215.21.209 5900 6 1 0813.17:37:05.667 62.113.205.219 56491 131.215.254.74 5900 6 2 0813.18:26:26.652 62.113.205.219 38325 134.4.106.130 5900 6 1 0813.18:26:11.420 62.113.205.219 42568 131.215.49.61 5900 6 1 0813.18:29:05.393 62.113.205.219 45619 134.4.101.105 5900 6 1 0813.18:41:07.173 62.113.205.219 43653 134.4.232.78 5900 6 1 0813.18:41:05.766 62.113.205.219 58867 134.4.13.32 5900 6 1 0813.18:41:07.110 62.113.205.219 52850 131.215.95.41 5900 6 1 0813.19:11:59.429 62.113.205.219 53550 134.4.219.163 5900 6 1 0813.19:11:59.875 62.113.205.219 52690 131.215.10.85 5900 6 1 0813.19:12:29.248 62.113.205.219 39086 134.4.238.134 5900 6 1 0813.19:12:36.867 62.113.205.219 57649 131.215.38.93 5900 6 1 0813.19:14:47.580 62.113.205.219 39467 131.215.254.194 5900 6 2 0813.19:14:34.881 62.113.205.219 51671 131.215.15.237 5900 6 1 0813.19:14:34.878 62.113.205.219 41932 131.215.216.30 5900 6 1 0813.19:14:41.601 62.113.205.219 55949 131.215.185.191 5900 6 1 0813.19:14:42.815 62.113.205.219 46754 134.4.21.217 5900 6 1 0813.19:14:44.353 62.113.205.219 52501 134.4.228.221 5900 6 1 0813.19:14:44.929 62.113.205.219 42027 134.4.217.72 5900 6 1

    @fileMEDIA said:
    That you done massive ports scans isn't true? I think you didn't deny it. You also don't said why you do that. Any explanation?

    Sure, you caused blocked ip addresses which affects other customers:

    62.113.205.219 was observed probing caltech.edu for security holes. It has been blocked at our border routers. It may be compromised.

    We have blocked someone from your IP space for abuse. Reason: Port Scanning. Log lines are below. Time zone is UTC.

    That is the last comment to that point. We don't support any illegal actions: We can reactivate the vps when you don't do any port scanning or the account will be suspended until the end of the contract time and no refund is possible.

    Thanked by 1marrco
  • Mark_R said: Come back if you have read the entire thread + have anything to backup the malicious intend assumptions, something more than just a simple port scan.

    I read the post, read what i put.

    sz1hosting said: Not sure how some people are thinking this is ok? Black list a hosts ip's clearly it is not ok, also clearly he was trying to hack something and do something malicious if you disagree you have clearly lost your mind.

Sign In or Register to comment.