Acceptable Use Policy

Simplified policy

Illegal or malicious activities +

We don't allow our services to be used for illegal activities.

If not illegal in the server location, we include the following malicious activities:

  • Phishing.
  • Spam or Distribution of unconsented communication. (via ANY medium)
  • Malware, Ransomware or RAT distribution. (For non research purposes)
  • Real (or near indistingushable to real) Sexual Material involving minors.
  • Large scale port or vulnerability scanning.
  • Botnet Activity. (Command & Control and/or DDoS)

  • We define illegal activities based on the server or service location, either by written or court tested law.

Security and Moderation +

We expect you to secure your services adequately, we may temporarily suspend compromised services.

Should you host a service that allows uploads from users that are published before moderation, we expect you to display prominent contact information directly on your site so that any abusive content can be reported directly to you.

Abuse of resources +

We allow you to use all Cores, RAM, Disk Space, Bandwidth and Network Speed that is provisioned to you.

Disk Performance (IOPs, Transfer) is unrestricted but fair use, if you are using enough to affect other users we may impose restrictions on you. We have generally configured our nodes in such a way that it is unlikely you will affect others so it's unlikely that you should need any restrictions, but if you do we are more likely to impose restrictions for heavy IOPs usage since this has a far higher performance cost towards others than sequential transfer.

Although we allow you to use the full speed of your network port up to your bandwidth limit, it is shared with other users so you may not always be able to achieve the maximum transfer speed, we aim to upgrade our network over time to reduce the possibility of this happening.

Additional Information

Defined abuse of services:

  • Unsolicited communications
    • Communications sent without consent (implied or otherwise) via email or any other communication medium.
  • Malicious use
    • Any site, page, or download intended to defraud users by impersonating another service in order to gain unauthorized access to accounts or information (phishing).
    • Any type of software, script, code, or file intended to harm systems or users, or to improperly benefit from them, including Malware, RATs, Ransomware, Port Scanning or DDoS tools.
  • Illegal use
    • Hosting content that is illegal in the country where the service is operated.
  • Resource abuse
    • Intentionally or unintentionally consuming more than your fair share of resources on the node where the service resides.

Action

  • Intentional abuse
    • Intentional abuse is grounds for immediate service suspension or termination.
    • No refunds or compensation will be provided.
    • Data may be disclosed to law enforcement if required by a valid court order or warrant.
    • The user will be permanently prohibited from holding services with Ko-Net. Any attempt to evade this restriction, even with non-abusive services, will result in termination.
  • Unintentional abuse
    • Unintentional resource abuse typically results in rate limits being applied. Except for bandwidth, no rate limits are enforced by default.
    • Depending on severity, the service operator may be contacted and given 24–72 hours to resolve the issue.
    • In rare cases, services may be immediately null-routed, such as during detected botnet activity.
    • Failure to resolve unintentional abuse may result in service suspension.

We generally give benefit of the doubt towards deeming intentional and unintentional abuse and we aim to cooperate with our customers to resolve any cases of abuse.

TOR Policy

Please note that we are currently not permitting any exit nodes, this is temporary until we have our own IP space, below is the future TOR policy and will apply when customers are moved onto our IP space. Relays are still permitted.


Our policy on TOR nodes is as follows:


Rules for both Relays and Exits:
  • Contact us before any setup, we may suspend any tor nodes that are set up without making us aware.
  • Configure torrc to stay within your traffic allowance.
  • Let us know your domain so we can set Reverse DNS for the IP, we follow the set standard of tor-exit.yourdomain.tld
  • Keep your software up to date.
  • Ensure you have a functional landing page for your hostname and reverse dns which explains you are a tor node.
  • Setup a local DNS cache with Bind9 or Unbound to handle DNS efficiently.
Rules for Exits:
We require you to implement an exit policy which blocks at minimum all of the following:
  • 22 (SSH)
  • 25 (SMTP)
  • 465 (SMTP over SSL)
  • 587 (SMTP over TLS/Submission)
We recommend you also block:
  • Ports 6660-6667 (IRC - Kerbs DDoS)
  • 6697 (IRC over SSL - Kerbs DDoS)
  • We may request you block further ports if we are experiencing a high number of abuse complaints from them.

We welcome TOR nodes on our services, thank you for contributing to the TOR network!

Please also consider running a Bridge or Snowflake instance instead, these help too.

Please note that although we permit exit nodes and are more lenient towards reports involving services hosting one, we do still check abuse reports for them, so please do not attempt to hide behind hosting one if you are otherwise acting maliciously.

We reserve the right to refuse consent for any TOR node, we typically would only exercise this in the unlikely case of a shortage of network resources on the node or our network that can be allocated towards it.
Contact icon

Contact Us

Let us know if you have any further questions

Contact Support