Dear user,
We hope this e-mail finds you well.
With this e-mail, we are providing a final update on what will happen at the Houston, Texas location with the Zeta.10 server you are in.
First, remembering the original context
A plethora of DDoS attacks occurred to the server in Houston, Texas, between March 17/18th and March 24/25th at least, and such a server had some punctual networking issues over IPv4, which, due to DDoS, were not the direct responsibility of C-Servers.
The upstream for this server, DartNode, has offered C-Servers the possibility of having DDoS protection in this regard, which we did accept.
However, the exact same provider also suspended the server shortly after, and continues suspended at present, citing alleged IP scanning, malicious scripting and alleged denial of service issues on the particular server - but, contrary to what other providers do (for example Hetzner), hasn't allowed us both a time window to take a look at the issue and fix it; nor has provided us with any technical log or evidence of the corresponding allegation, which would help in this regard.
For more details, please report yourself to the previous e-mail we've sent on March 29th.
And now, for the news
After insisting several times over the following days, but most especially six times on March 31st through various channels, including one overseas call to the United States, DartNode has finally answered our request.
As usual on these matters, and since that wasn't provided to us, we had requested a technical log on the shown abnormal activity, so we could curb the bad traffic at hand.
The response provided from DartNode after insisting six times came without any technical log and was the following (that's a direct quote):
Hello,
We have 67 different reports of port scanning from the IPv4 (149.112.84.49).
The responsibility of 149.112.84.49 is solely up to you.
Thank you
Nothing else. No technical proof of evidence nor details. No detail over IPv6 (which had been questioned as well). Not one simple allowance on solving the issue with who has the service.
Just a mention at a number of reports for port scanning, which is 67, in this case, but could be 5 or 300 - or the provider not saying the truth at all. On the number, or... on the mere existence of them. No one would ever know.
However, the number is still quite high, and will not be ignored by Centerfield Ltd on the resolution of this issue, as you'll see below.
Centerfield Ltd's position on the matter
Centerfield Ltd considers that such a posture from Snaju Inc, trading as DartNode is not only unnecessarily radical - it was handled in an incorrect way. For us, and most especially for you, as a customer.
From a third-party provider we expect cooperation when these matters arise, reasonability on the taken actions. We expect a technical log with what has gone wrong, like Hetzner and other hosting providers do. We expect a swift answer, direct reasons with the seen proof of evidence, so we can act upon the issue and fix it accordingly, as fast and as soon as possible. But most especially - we expect not to insist 10+ (ten plus) times, over close to a week, just to get a 21-word response that could have been an SMS text. That's unacceptable. We gave more technical details to suspended/cancelled VPS services than Snaju has given to a bare-metal customer.
Considering the present posture from DartNode, we consider Snaju Inc. has soft-exited from the present contract, by suspending the services without ever terminating them directly. As such, Centerfield Ltd did the same, rendering to a close the present business relationship, and blacklisted Snaju Inc as a third-party for present or future cooperation, as well as their agents.
We sincerely apologize for the possible frustration reading this text may be causing you - but it's the truth.
Moving forward
Centerfield Ltd hereby applies, for the first time, the 1.4, 2.1 and 2.2 articles from the Terms and Conditions which you've explicitly agreed to upon your purchase, available at: https://web.c-servers.co.uk/terms-and-conditions-tcs.html. This means that, while temporarily still presenting itself as active, any service you have at Zeta.10 Houston is terminated, on the reason of:
» Massificated Customer-Held Illegal Activity Reported By Third-Party Ending Third-Party Services - Sole Third-Party Action
This means that the action is not directly attributed to Centerfield Ltd, but to the upstream, which unilaterally ceased to provide networking and access to Centerfield Ltd. Therefore, since this was entirely customer-generated, the Provider excludes any responsibility on the matter.
We know that nevertheless you still had a contract with us, and we know we've written on March 29th that we would provide you with a refund to account credit. We do intend to honor that - however, there is still a relevant risk: from the collected report, there were abusers subscribing to the service, and there's a very high risk these would enter our own system at other servers. Which is unacceptable. And this demands appropriate actions to be taken.
Everyone Does KYC
In 24/48h after this e-mail was sent and the userbase e-mail list for Zeta.10 Houston is collected, and prior to any refund to account credit being processed, we will send to every customer that was at Zeta.10 Houston a special one-off e-mail with a KYC request, which will be absolutely mandatory even if you have other services with C-Servers. KYC will be held by a reputed company in partnership with C-Servers for this matter, so you are not submitting any data to us, but to that company, which we'll disclose soon.
This is essential in order to filter the good from the bad, as potential abusers will obviously either refuse to comply with KYC or attempt to game the system. It's a question of trust. Causing a server to end is no small deal.
Failure to pass KYC: will render all services you have at C-Servers terminated without any possible refund anywhere - not only Zeta.10 Houston servers but the other servers as well, due to natural propagation risk - and KYC compliance failure on part of the customer will be explicitly mentioned on any potential disputes or chargeback attempts as a direct reason for termination, which is a common reasons banks reject chargebacks for.
We will not request any extra data nor details - we'll solely govern our Company with the pre-existing data provided by the Customer. Only the original data present at the original issued invoice and original account details will be considered for this purpose, so any changes at the Client Area will have no effect. It's the customer's responsibility to have it correctly provided.
If KYC is successful: no services nor accounts are terminated and, as promised, a refund will be held to the account credit, even for customers that have paid with crypto. C-Servers doesn't exclude crypto customers just because they've paid with crypto. All refunds to account credit will be processed on maximum 7 days after KYC has been passed.
On both circumstances: manual analysis will always exist as a second layer to exclude false positives that may arise from this procedure, and if we think there is reasonable information to trust a customer, we'll go ahead and bypass the KYC automatic mechanism. KYC results are automatic, handling will always be manual, and we'll be fair and neutral on our analysis. All will be analyzed, one by one. Therefore, don't panic if for some reason your KYC has failed but you've submitted correct details - we'll still get to you.
We sincerely apologize for the inconvenience and we ensure we'll do our utmost to handle this new process as quickly and efficiently as possible for you.
Thank you for choosing C-Servers. Especially if you are among the affected customers that have provided correct details and didn't actually abuse the system, we deeply apologize for the added downtime and KYC requirements, but these are absolutely necessary, for sustainability reasons.
Best regards,
C-Servers by Centerfield Ltd
|