WARNING.TXT 37 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587
  1. THE IMPORTANT NOTICES ABOUT SOFTETHER VPN
  2. FUNCTIONS OF VPN COMMUNICATIONS EMBEDDED ON THIS SOFTWARE ARE VERY POWERFUL
  3. THAN EVER. THIS STRONG VPN ABILITY WILL BRING YOU HUGE BENEFITS. HOWEVER, IF
  4. YOU MISUSE THIS SOFTWARE, IT MIGHT DAMAGE YOURSELF. IN ORDER TO AVOID SUCH
  5. RISKS, THIS DOCUMENT ACCOUNTS IMPORTANT NOTICES FOR CUSTOMERS WHO ARE WILLING
  6. TO USE THIS SOFTWARE. THE FOLLOWING INSTRUCTIONS ARE VERY IMPORTANT. READ AND
  7. UNDERSTAND IT CAREFULLY. ADDITIONALLY, IF YOU ARE PLANNING TO USE THE DYNAMIC
  8. DNS, THE NAT TRAVERSAL OR THE VPN AZURE FUNCTIONS, READ THE SECTION 3.5
  9. CAREFULLY. THESE FUNCTIONS ARE FREE SERVICES PROVIDED VIA THE INTERNET, ARE
  10. NOT GUARANTEED, AND ARE NOT INTENDED TO BE USED FOR BUSINESS OR COMMERCIAL
  11. USE. DO NOT USE THESE SERVICES FOR YOUR BUSINESS OR COMMERCIAL USE.
  12. 1. VPN Communication Protocols
  13. 1.1. SoftEther VPN Protocol
  14. SoftEther VPN can perform VPN communication. Unlike traditional VPN protocols,
  15. SoftEther VPN has an implementation of the newly-designed "SoftEther VPN
  16. Protocol (SE-VPN Protocol)" . SE-VPN protocol encapsulates any Ethernet
  17. packets into a HTTPS (HTTP over SSL) connection. Therefore SE-VPN protocol can
  18. communicate beyond firewalls even if the firewall is configured to block
  19. traditional VPN packets by network administrator. SE-VPN protocol is designed
  20. and implemented to comply TLS (RFC 5246) and HTTPS (RFC 2818). However, it
  21. sometimes have different behavior to RFCs. If you are a network administrator
  22. and want to block SE-VPN protocols on the firewall, you can adopt a
  23. "white-list" policy on the firewall to filter any TCP or UDP packets on the
  24. border except explicitly allowed packets towards specific web sites and
  25. servers.
  26. 1.2. NAT Traversal Function
  27. Generally, if you use traditional VPN systems you have to request a network
  28. administrator to make the NAT or firewall to "open" or "relay" specific TCP or
  29. UDP ports. However, there are demands somehow to eliminate such working costs
  30. on network administrators. In order to satisfy such demands, SoftEther VPN has
  31. the newly-implemented "NAT Traversal" function. NAT Traversal is enabled by
  32. default. A SoftEther VPN Server running on the computer behind NAT or firewall
  33. can accept VPN connections from the Internet, without any special
  34. configurations on firewalls or NATs. If you want to disable the NAT Traversal
  35. function, modify the "DisableNatTraversal" to "true" on the configuration file
  36. of SoftEther VPN Server. In order to disable it on the client-side, append
  37. "/tcp" suffix on the destination hostname.
  38. 1.3. Dynamic DNS Function
  39. Traditional legacy VPN system requires a static global IP address on the VPN
  40. server. In consideration of shortage of global IP addresses, SoftEther
  41. Corporation implements the "Dynamic DNS Function" on SoftEther VPN Server.
  42. Dynamic DNS is enabled by default. Dynamic DNS function notify the current
  43. global IP address of the PC to the Dynamic DNS Servers which are operated by
  44. SoftEther Corporation. A globally-unique hostname (FQDN) such as
  45. "abc.softether.net" ( "abc" varies as unique per a user) will be assigned on
  46. the VPN Server. If you tell this unique hostname to a VPN user, the user can
  47. specify it as the destination VPN Sever hostname on the VPN Client and will be
  48. able to connect the VPN Server. No IP addresses are required to know
  49. beforehand. If the IP address of the VPN Server varies, the registered IP
  50. address related to the hostname of Dynamic DNS service will be changed
  51. automatically. By this mechanism, no longer need a static global IP address
  52. which costs monthly to ISPs. You can use consumer-level inexpensive Internet
  53. connection with dynamic IP address in order to operate an enterprise-level VPN
  54. system. If you want to disable Dynamic DNS, specify "true" on the "Disabled"
  55. items of the "DDnsClient" directive on the SoftEther VPN Server configuration
  56. file. * Note for residents in People's Republic of China: If your VPN Server
  57. is running on the People's Republic of China, the DNS suffix will be replaced
  58. to "sedns.cn" domain. The "sedns.cn" domain is the service possessed and
  59. operated by "Beijing Daiyuu SoftEther Technology Co., Ltd" which is a
  60. Chinese-local enterprise.
  61. 1.4. VPN over ICMP / VPN over DNS functions
  62. If you want to make a VPN connection between SoftEther VPN Client / Bridge and
  63. SoftEther VPN Server, but if TCP and UDP packets are prohibited by the
  64. firewall, then you can encapsulates payloads into "ICMP" (as known as Ping) or
  65. "DNS" packets. This function can realize a VPN connection by using ICMP or DNS
  66. even if the firewall or router blocks every TCP or UDP connections. VPN over
  67. ICMP / VPN over DNS functions are designed to comply standard ICMP and DNS
  68. specifications as possible, however it sometimes has a behavior not to fully
  69. comply them. Therefore, few poor-quality routers may be caused a
  70. memory-overflow or something troubles when a lot of ICMP or DNS packets are
  71. passed, and such routers sometimes freezes or reboots. It might affects other
  72. users on the same network. To avoid such risks, append the suffix "/tcp" on
  73. the destination hostname which is specified on the VPN-client side to disable
  74. VPN over ICMP / DNS functions.
  75. 1.5. VPN Azure Cloud Service
  76. If your SoftEther VPN Server is placed behind the NAT or firwall, and by some
  77. reason you cannot use NAT Traversal function, Dynamic DNS function or VPN over
  78. ICMP/DNS function, you can use VPN Azure Clouse Service. SoftEther Corporation
  79. operates VPN Azure Cloud on Internet. After the VPN Server makes a connection
  80. to the VPN Azure Cloud, the hostname "abc.vpnazure.net" ( "abc" is a unique
  81. hostname) can be specified to connect to the VPN Server via the VPN Azure
  82. Cloud. Practically, such a hostname is pointing a global IP address of one of
  83. cloud servers which are operated by SoftEther Corporation. If A VPN Client
  84. connects to such a VPN Azure host, then the VPN Azure host will relay all
  85. traffics between the VPN Client and the VPN Server. VPN Azure is disabled by
  86. default. You can activate it easily by using VPN Server Configuration Tool.
  87. 1.6. UDP Acceleration
  88. SoftEther VPN has the UDP Acceleration Function. If a VPN consists of two
  89. sites detects that UDP channel can be established, UDP will be automatically
  90. used. By this function, throughput of UDP increases. If direct UDP channel can
  91. be established, direct UDP packets will be used. However, if there is
  92. something obstacles such as firewalls or NATs, the "UDP Hole Punching"
  93. technology will be used, instead. The "UDP Hole Punching" uses the cloud
  94. servers which SoftEther Corporation operates on Internet. UDP Acceleration can
  95. be disabled anytime by setting up so on the VPN-client side.
  96. 2. VPN Software
  97. The notes in this section are not specific to SoftEther VPN or VPN Gate, but
  98. apply to general system software. SoftEther VPN Client, SoftEther VPN Server,
  99. SoftEther VPN Bridge, and VPN Gate Relay Service will be installed on your
  100. computer as system services. System services always run in the background.
  101. System services usually do not appear on the computer display. Then your
  102. computer system is booted, system services automatically start in the
  103. background even before you or other users log in. To check whether
  104. PacketiX-related system service is running, check the process list or the
  105. background service list of your OS (called as "Services" in Windows, or
  106. "Daemons" in UNIX.) You can activate, deactivate, start, or stop system
  107. services using the functions of the OS anytime. PacketiX-related GUI tools for
  108. managing system services communicate with these system services. After you
  109. terminate these management GUI tools, PacketiX-related system services will
  110. continue to run in the background. System services consume CPU time, computer
  111. power, memory and disk space. Because system services consume power, your
  112. electricity charges and amount of thermal of your computer increase as result.
  113. In addition, there is a possibility that the mechanical parts of the life of
  114. your computer is reduced.
  115. 2.1. SoftEther VPN Client
  116. If you use SoftEther VPN Client on Windows, the Virtual Network Adapter device
  117. driver will be installed on Windows. The Virtual Network Adapter is
  118. implemented as a kernel-mode driver for Windows. The driver is
  119. digitally-signed by a certificate issued by VeriSign, Inc. and also sub-signed
  120. by Symantec Corporation. A message to ask you want to sure install the driver
  121. might be popped up on the screen. SoftEther VPN Client may response the
  122. message if possible. SoftEther VPN Client also optimizes the configuration of
  123. MMCSS (Multimedia Class Scheduler Service) on Windows. You can undo the
  124. optimizations of MMCSS afterwards.
  125. 2.2. SoftEther VPN Server / Bridge
  126. If you use SoftEther VPN Server / Bridge on Windows with "Local Bridge"
  127. functions, you have to install the low-level Ethernet packet processing driver
  128. on the computer. The driver is digitally-signed by a certificate issued by
  129. VeriSign, Inc. and also sub-signed by Symantec Corporation. SoftEther VPN
  130. Server / Bridge may disable the TCP/IP offloading features on the physical
  131. network adapter for Local Bridge function. In Windows Vista / 2008 or greater
  132. version, VPN Server may inject a packet-filter driver which complies Windows
  133. Filter Platform (WPF) specification into the kernel in order to provide IPsec
  134. function. The packet-filter driver will be loaded available only if IPsec
  135. function is enabled. Once you enables IPsec function of SoftEther VPN Server,
  136. the built-in IPsec function of Windows will be disabled. After you disabled
  137. IPsec function of SoftEther VPN Server, then the built-in IPsec function of
  138. Windows will revive. In order to provide the Local Bridge function, SoftEther
  139. VPN Server / Bridge disables the TCP/IP offloading function on the operating
  140. system.
  141. 2.3. User-mode Installation
  142. You can install SoftEther VPN Server and SoftEther VPN Bridge as "User-mode"
  143. on Windows. In other words, even if you don't have Windows system
  144. administrator's privileges, you can install SoftEther VPN as a normal user.
  145. User-mode install will disable a few functions, however other most functions
  146. work well. Therefore, for example, an employee can install SoftEther VPN
  147. Server on the computer in the office network, and he will be able to connect
  148. to the server from his home. In order to realize such a system by user-self,
  149. no system administrative privileges are required in the view-point of
  150. technical. However, breaking rules of the company to install software on the
  151. computer without authority might be regarded as an unfavorable behavior. If
  152. you are an employee and belong to the company, and the company-policy
  153. prohibits installing software or making communications towards Internet
  154. without permission, you have to obtain a permission from the network
  155. administrator or the executive officer of your company in advance to install
  156. SoftEther VPN. If you install VPN Server / Bridge as User-mode, an icon will
  157. be appeared on the Windows task-tray. If you feel that the icon disturbs you,
  158. you can hide it by your operation. However, you must not exploit this hiding
  159. function to install VPN Server on other person's computer as a spyware. Such
  160. behavior might be an offence against the criminal law.
  161. 2.4. Keep Alive Function
  162. SoftEther VPN Server and SoftEther VPN Bridge has Keep Alive Function by
  163. default. The purpose of this function is to sustain the Internet line active.
  164. The function transmits UDP packets with a random-byte-array-payload
  165. periodically. This function is useful to avoid automatic disconnection on
  166. mobile or dial-up connections. You can disable Keep Alive Function anytime.
  167. 2.5. Uninstallation
  168. The uninstallation process of SoftEther VPN software will delete all program
  169. files. However, non-program files (such as files and data which are generated
  170. by running of programs) ) will not be deleted. For technical reason, the exe
  171. and resource files of uninstaller might remain. Such remaining files never
  172. affects to use the computer, however you can delete it manually. Kernel-mode
  173. drivers might not be deleted, however such drivers will not be loaded after
  174. the next boot of Windows. You can use "sc" command of Windows to delete
  175. kernel-mode drivers manually.
  176. 2.6. Security
  177. You should set the administrator's password on SoftEther VPN Server / Bridge
  178. after installation. If you neglect to do it, another person can access to
  179. SoftEther VPN Server / Bridge and can set the password without your
  180. permission. This caution might be also applied on SoftEther VPN Client for
  181. Linux.
  182. 2.7. Automatic Update Notification
  183. SoftEther VPN software for Windows has an automatic update notification
  184. function. It accesses to the SoftEther Update server periodically to check
  185. whether or not the latest version of software is released. If the latest
  186. version is released, the notification message will be popped up on the screen.
  187. In order to achieve this purpose, the version, language settings, the unique
  188. identifier, the IP address of your computer and the hostname of VPN Server
  189. which is connected to will be sent to the SoftEther Update server. No personal
  190. information will be sent. Automatic Update Notification is enabled by default,
  191. however you can disable it on the configuration screen. The setting whether
  192. turned on or turned off will be saved individually corresponding to each
  193. destination VPN server, by VPN Server Manager.
  194. 2.8. Virtual NAT Function
  195. A Virtual Hub on SoftEther VPN Server / Bridge has "Virtual NAT Function" .
  196. Virtual NAT Function can share a single IP address on the physical network by
  197. multiple private IP address of VPN Clients. There are two operation mode of
  198. Virtual NAT: User-mode and Kernel-mode. In the user-mode operation, Virtual
  199. NAT shares an IP address which is assigned on the host operating system.
  200. Unlike user-mode, the kernel-mode operation attempts to find DHCP servers on
  201. the physical network. If there are two or more physical networks, a DHCP
  202. server will be sought automatically for each segments serially. If a DHCP
  203. server found, and an IP address is acquired, the IP address will be used by
  204. the Virtual NAT. In this case, an IP entry as a DHCP client will be registered
  205. on the IP pool of the physical DHCP Server. The physical default gateway and
  206. the DNS server will be used by the Virtual NAT in order to communicate with
  207. hosts in Internet. In kernel-mode operation, a Virtual Hub has a virtual MAC
  208. address which is operating on the physical Ethernet segment. In order to check
  209. the connectivity to Internet, SoftEther VPN periodically sends DNS query
  210. packet to resolve the IP address of host "www.yahoo.com" or "www.baidu.com" ,
  211. and attempts to connect to the TCP port 80 of such a resulted IP address for
  212. connectivity check.
  213. 2.9. Unattended Installation of Kernel-mode Components
  214. When SoftEther VPN will detect a necessity to install the kernel-mode
  215. components on Windows, a confirmation message will be appeared by Windows
  216. system. In this occasion, SoftEther VPN software will switch to the Unattended
  217. Installation mode in order to respond "Yes" to Windows. This is a solution to
  218. prevent dead-locks when a remote-administration is performed from remote
  219. place.
  220. 2.10. Windows Firewall
  221. SoftEther VPN software will register itself as a safe-program. Such an entry
  222. will be remain after the uninstallation. You can remove it manually from the
  223. Control Panel of Windows.
  224. 3. Internet Services
  225. 3.1. Internet Services which are provided by SoftEther Corporation
  226. SoftEther Corporation provides Dynamic DNS, NAT Traversal and VPN Azure server
  227. services on the Internet. These services are free of charge. Customers can
  228. access to the services by using SoftEther VPN software, via Internet. These
  229. service will be planned to be available from Open-Source version of "SoftEther
  230. VPN" which will be released in the future.
  231. 3.2. Sent Information and Privacy Protection
  232. SoftEther VPN software may send an IP address, hostname, the version of VPN
  233. software on the customer's computer to the cloud service operated by SoftEther
  234. Corporation, in order to use the above services. These sending of information
  235. are minimal necessary to use the services. No personal information will be
  236. sent. SoftEther Corporation records log files of the cloud service servers for
  237. 90 days at least with the received information. Such logs will be used for
  238. troubleshooting and other legitimate activities. SoftEther Corporation may
  239. provide logs to a public servant of Japanese government who are belonging to
  240. courts, police stations and the prosecutor's office, in order to comply such
  241. authorities' order. (Every Japanese public servants are liable by law to keep
  242. the information close.) Moreover, the IP addresses or other information will
  243. be processed statistically and provided to the public, not to expose the each
  244. concrete IP address, in order to release the release of research activities.
  245. 3.3. Communication Data via VPN Azure Service
  246. Regardless of the above 3.2 rule, if the customer sends or receives VPN
  247. packets using VPN Azure Cloud Service, the actual payloads will stored and
  248. forwarded via the volatile memory of the servers for very short period. Such a
  249. behavior is naturally needed to provide the "VPN relay service" . No payloads
  250. will be recorded on "fixed" storages such as hard-drives. However, the
  251. "Wiretapping for Criminals Procedures Act" (The 137th legislation ruled on
  252. August 18, 1999 in Japan) requires telecommunication companies to allow the
  253. Japanese government authority to conduct a wire-tapping on the line. VPN Azure
  254. Servers which are physically placed on Japan are subjects of this law.
  255. 3.4. Comply to Japanese Telecommunication Laws
  256. SoftEther Corporation complies with Japanese Telecommunication Laws as
  257. necessary to provide online services via Internet.
  258. 3.5. Free and Academic Experiment Services
  259. SoftEther provides Dynamic DNS, NAT Traversal and VPN Azure as academic
  260. experiment services. Therefore, there services can be used for free of charge.
  261. These services are not parts of "SoftEther VPN Software Products" . These
  262. services are provided without any warranty. The services may be suspended or
  263. discontinued by technical or operational matters. In such occasions, users
  264. will not be able to use the services. A user have to understand such risks,
  265. and to acknowledge that such risks are borne by a user-self. SoftEther will
  266. never be liable to results or damages of use or unable-to-use of the service.
  267. Even if the user has already paid the license-fee of the commercial version of
  268. SoftEther VPN, such paid fees don't include any fees of these services.
  269. Therefore, if the online services will stop or be discontinued, no refunds or
  270. recoveries of damages will be provided by SoftEther Corporation.
  271. 3.6. DNS Proxy Cloud Servers
  272. In some regions, when a user uses Internet, a DNS query sometimes broken or
  273. lost when it is passing through the ISP line. If SoftEther VPN Server, Client
  274. or Bridge detects a possibility that the accessing to the actual VPN server
  275. might be unstable, then DNS queries will be also transferred to the DNS proxy
  276. cloud servers which are operated by SoftEther Corporation. A DNS proxy cloud
  277. server will respond DNS queries with answering correct a IP address.
  278. 4. General Cautions
  279. 4.1. Needs an Approval from Network Administrator
  280. SoftEther VPN has powerful functions which don't require special settings by
  281. network administrators. For example, you need not to ask the administrator to
  282. configure the existing firewall in order to "open" a TCP/UDP port. Such
  283. characteristic features are for the purpose to eliminate working times and
  284. costs of network administrators, and avoid misconfiguration-risks around the
  285. tasks to open specific exception ports on the firewall. However, any employees
  286. belong to the company have to obtain an approval from the network
  287. administrator before installs SoftEther VPN. If your network administrator
  288. neglects to provide such an approval, you can consider to take an approval
  289. from an upper authority. (For example, executive officer of the company.) If
  290. you use SoftEther VPN without any approvals from the authority of your
  291. company, you might have disadvantage. SoftEther Corporation will be never
  292. liable for results or damages of using SoftEther VPN.
  293. 4.2. Observe Laws of Your Country
  294. If your country's law prohibits the use of encryption, you have to disable the
  295. encryption function of SoftEther VPN by yourself. Similarly, in some countries
  296. or regions, some functions of SoftEther VPN might be prohibited to use by
  297. laws. Other countries' laws are none of SoftEther Corporation's concern
  298. because SoftEther Corporation is an enterprise which is located and registered
  299. in Japan physically. For example, there might be a risk that a part of
  300. SoftEther VPN conflicts an existing patent which is valid only on the specific
  301. region. SoftEther Corporation has no interests in such specific region outside
  302. Japan's territory. Therefore, if you want to use SoftEther VPN in regions
  303. outside Japan, you have to be careful not to violate third-person's rights.
  304. You have to verify the legitimacy of the use of SoftEther VPN in the specific
  305. region before you actually use it in such region. By nature, there are almost
  306. 200 countries in the World, and each country's law is different each other. It
  307. is practically impossible to verify every countries' laws and regulations and
  308. make the software comply with all countries' laws in advance to release the
  309. software. Therefore SoftEther Corporation has verified the legitimacy of
  310. SoftEther VPN against the laws and regulations of only Japan. If a user uses
  311. SoftEther VPN in a specific country, and damaged by public servants of the
  312. government authority, SoftEther Corporation will never be liable to recover or
  313. compensate such damages or criminal responsibilities.
  314. 5. VPN Gate Academic Experiment Project
  315. (This chapter applies only on SoftEther VPN software package which contains
  316. the extension plug-in for VPN Gate Academic Experiment Project.)
  317. 5.1. About VPN Gate Academic Experiment Project
  318. VPN Gate Academic Experiment Project is an online service operated for just
  319. the academic research purpose at the graduate school of University of Tsukuba,
  320. Japan. The purpose of this research is to expend our knowledge about the
  321. "Global Distributed Public VPN Relay Server" (GDPVRS) technology. For details,
  322. please visit http://www.vpngate.net/.
  323. 5.2. About VPN Gate Service
  324. SoftEther VPN Server and SoftEther VPN Client may contain "VPN Gate Service"
  325. program. However, VPN Gate Service is disabled by default.
  326. VPN Gate Service should be activated and enabled by the voluntary intention of
  327. the owner of the computer which SoftEther VPN Server or SoftEther VPN Client
  328. is installed on. After you activate VPN Gate Service, the computer will be
  329. start to serve as a part of the Global Distributed Public VPN Relay Servers.
  330. The IP address, hostname and related information of the computer will be sent
  331. and registered to the directory server of VPN Gate Academic Experiment
  332. Project, and they will be published and disclosed to the public. This
  333. mechanism will allow any VPN Gate Client software's user to connect to the VPN
  334. Gate Service running on your computer. While the VPN session between a VPN
  335. Gate Client and your VPN Gate Service is established, the VPN Gate Client's
  336. user can send/receive any IP packets towards the Internet via the VPN Gate
  337. Service. The global IP address of the VPN Gate Service's hosing computer will
  338. be used as the source IP address of such communications which a VPN Gate
  339. Client initiates.
  340. VPN Gate Service will send some information to the VPN Gate Academic
  341. Experiment Service Directory Server. The information includes the operator's
  342. information which described in section 5.5, logging settings, uptime,
  343. operating system version, type of protocol, port numbers, quality information,
  344. statistical information, VPN Gate clients' log history data (includes dates,
  345. IP addresses, version numbers and IDs), log records of destination HTTP/HTTPS
  346. hostnames or IP addresses and port numbers of VPN Gate communications, and the
  347. version of the software. These information may be exposed on the directory.
  348. VPN Gate Service also receives a key for encoding which is described on the
  349. chapter 5.9 from the directory server.
  350. 5.3. Details of VPN Gate Service's Behavior
  351. If you enable VPN Gate Service manually, which is disabled by default, the
  352. "VPNGATE" Virtual Hub will be created on the SoftEther VPN Server. If you are
  353. using SoftEther VPN Client and attempt to active VPN Gate Service on it, an
  354. equivalent program to SoftEther VPN Server will be invoked on the same process
  355. of SoftEther VPN Client, and the "VPNGATE" Virtual Hub will be created. The
  356. "VPNGATE" Virtual Hub contains a user named "VPN" by default which permits
  357. anyone on the Internet to make a VPN connection to the Virtual Hub. Once a VPN
  358. Client connects to the "VPNGATE" Virtual Hub, any communication between the
  359. user and the Internet will pass through the Virtual Hub, and
  360. transmitted/received using the physical network interface on the computer
  361. which SoftEther VPN Server (or SoftEther VPN Client) is running on. This will
  362. cause the result that a destination host specified by the VPN Client will
  363. identify that the source of the communication has initiated from the VPN Gate
  364. Service's hosting computer's IP address. However, for safety, any packets
  365. which destinations are within 192.168.0.0/255.255.0.0, 172.16.0.0/255.240.0.0
  366. or 10.0.0.0/255.0.0.0 will be blocked by the "VPNGATE" Virtual Hub in order to
  367. protect your local network. Any packets which destinations are within
  368. 169.254.0.0/16, 224.0.0.0/4 or 100.64.0.0/10 will also be blocked for just in
  369. case. These packet filters except DNS, ICMP and ARP packets. Therefore, if you
  370. run VPN Gate Service on your corporate network or private network, it is safe
  371. because anonymous VPN Client users will not be permitted to access such
  372. private networks. VPN Gate Service also serves as relay for accessing to the
  373. VPN Gate Directory Server.
  374. In order to make VPN Gate Service familiar with firewalls and NATs, it opens
  375. an UDP port by using the NAT Traversal function which is described on the
  376. section 1.2. It also opens and listens on some TCP ports, and some TCP and UDP
  377. ports will be specified as the target port of Universal Plug and Play (UPnP)
  378. Port Transfer entries which are requested to your local routers. UPnP request
  379. packets will be sent periodically. Some routers keep such an opened TCP/UDP
  380. port permanently on the device. If you wish to close them, do it manually.
  381. VPN Gate Service also provides the mirror-site function for www.vpngate.net.
  382. This is a mechanism that a copy of the latest contents from www.vpngate.net
  383. will be hosted by the mirror-site tiny HTTP server which is running on the VPN
  384. Gate Service program. It will register itself on the mirror-sites list in
  385. www.vpngate.net. However, it never relays any other communications which are
  386. not towards www.vpngate.net.
  387. 5.4. Communication between Internet via VPN Gate Service
  388. VPN Gate Service provides a routing between users and the Internet, by using
  389. the Virtual NAT Function which is described on the section 2.8. VPN Gate
  390. Service sends polling Ping packets to the server which is located on
  391. University of Tsukuba, and the Google Public DNS Server which is identified as
  392. 8.8.8.8, in order to check the latest quality of your Internet line. VPN Gate
  393. Service also sends and receives a lot of random packets to/from the Speed Test
  394. Server on University of Tsukuba. These quality data will be reported to VPN
  395. Gate Directory Server, automatically and periodically. The result will be
  396. saved and disclosed to the public. These periodical polling communication are
  397. adjusted not to occupy the Internet line, however in some circumstances they
  398. might occupy the line.
  399. 5.5. Operator's Information of VPN Gate Service
  400. If you activate VPN Gate Service on your computer, the computer will be a part
  401. of the Global Distributed Public VPN Relay Servers. Therefore, the Operator's
  402. administrative information of your VPN Gate Service should be reported and
  403. registered on the VPN Gate Service Directory. Operator's information contains
  404. the name of the operator and the abuse-reporting contact e-mail address. These
  405. information can be inputted on the screen if the VPN Gate configuration.
  406. Inputted information will be transmitted to the VPN Gate Directory Server,
  407. stored and disclosed to the public. So you have to be careful to input
  408. information. By the way, until you specify something as the operator's
  409. information, the computer's hostname will be used automatically as the field
  410. of the name of the operator, by appending the "'s owner" string after the
  411. hostname.
  412. 5.6. Observe Laws to Operate VPN Gate Service
  413. In some countries or regions, a user who is planning to activate and operate
  414. VPN Gate Service, he are mandated to obtain a license or register a service
  415. from/to the government. If your region has such a regulation, you must fulfill
  416. mandated process before activating VPN Gate Service in advance. Neither the
  417. developers nor operators of the VPN Gate Academic Experiment Project will be
  418. liable for legal/criminal responsibilities or damages which are occurred from
  419. failure to comply your local laws.
  420. 5.7. Protect Privacy of Communication
  421. Most of countries have a law which requires communication service's operators,
  422. including VPN Gate Service operators, to protect the privacy of communication
  423. of third-persons. When you operate VPN Gate Service, you must always protect
  424. user's privacy.
  425. 5.8. Packet Logs
  426. The packet logging function is implemented on VPN Gate Service. It records
  427. essential headers of major TCP/IP packets which are transmitted via the
  428. Virtual Hub. This function will be helpful to investigate the "original IP
  429. address" of the initiator of communication who was a connected user of your
  430. VPN Gate Service, by checking the packet logs and the connection logs. The
  431. packet logs are recorded only for such legitimate investigates purpose. Do not
  432. peek nor leak packet logs except the rightful purpose. Such act will be
  433. violate the section 5.7.
  434. 5.9. Packet Logs Automatic Archiving and Encoding Function
  435. The VPN Gate Academic Experiment Service is operated and running under the
  436. Japanese constitution and laws. The Japanese constitution laws demand strictly
  437. protection over the privacy of communication. Because this service is under
  438. Japanese rules, the program of VPN Gate Service implements this "Automatic Log
  439. File Encoding" protection mechanism, and enabled by default.
  440. The VPN Gate Service is currently configured to encode packet log files which
  441. has passed two or more weeks automatically, by default. In order to protect
  442. privacy of communication, if a packet log file is once encoded, even the
  443. administrator of the local computer cannot censor the packet log file. This
  444. mechanism protects privacy of end-users of VPN Gate Service.
  445. You can change the VPN Gate Service setting to disable this automatic encoding
  446. function. Then packet log files will never be encoded even after two weeks
  447. passed. In such a configuration, all packet logs will remain as plain-text on
  448. the disk. Therefore you have to take care not to violate user's privacy.
  449. If you are liable to decode an encoded packet log files (for example: a VPN
  450. Gate Service's user illegally abused your VPN Gate Service and you have to
  451. decode the packet logs in order to comply the laws), contact the administrator
  452. of the VPN Gate Academic Experiment Service at Graduate School of University
  453. of Tsukuba, Japan. You can find the contact address at
  454. http://www.vpngate.net/. The administrator of VPN Gate Service will respond to
  455. decode the packet logs if there is an appropriate and legal request from court
  456. or other judicial authorities, according to laws.
  457. The Packet Logs Automatic Archiving and Encoding Function may be disabled
  458. according to technical or administrative reason.
  459. 5.10. Caution if You Operate VPN Gate Service in the Japan's Territories
  460. When a user operates VPN Gate Service in the Japan's territories, such an act
  461. may be regulated under the Japanese Telecommunication Laws if the operation is
  462. a subject to the law. However, in such a circumstance, according to the
  463. "Japanese Telecommunication Business Compete Manual [supplemental version]" ,
  464. non- profitable operations of communications are not identified as a
  465. "telecommunication business" . So usual operators of VPN Gate Service are not
  466. subjects to "telecommunication business operators" , and not be mandated to
  467. register to the government.
  468. 5.11. VPN Gate Client
  469. If SoftEther VPN Client contains the VPN Gate Client plug-in, you can use it
  470. to obtain the list of current operating VPN Gate Service servers in the
  471. Internet, and make a VPN connection to a specific server on the list.
  472. VPN Gate Client always keeps the latest list of the VPN Gate Services
  473. periodically. Be careful if you are using a pay-per-use Internet line.
  474. When you start the VPN Gate Client software, the screen which asks you
  475. activate or not VPN Gate Service will be appeared. For details of VPN Gate
  476. Service, read the above sections.
  477. 5.12. Caution before Joining or Exploiting VPN Gate Academic Experiment
  478. Project
  479. The VPN Gate Academic Experiment Service is operated as a research project at
  480. the graduate school on University of Tsukuba, Japan. The service is governed
  481. under the Japanese laws. Other countries' laws are none of our concerns nor
  482. responsibilities.
  483. By nature, there are almost 200 countries in the World, with different laws.
  484. It is impossible to verify every countries' laws and regulations and make the
  485. software comply with all countries' laws in advance to release the software.
  486. If a user uses VPN Gate service in a specific country, and damaged by public
  487. servants of the authority, the developer of either the service or software
  488. will never be liable to recover or compensate such damages or criminal
  489. responsibilities.
  490. By using this software and service, the user must observe all concerned laws
  491. and rules with user's own responsibility. The user will be completely liable
  492. to any damages and responsibilities which are results of using this software
  493. and service, regardless of either inside or outside of Japan's territory.
  494. If you don't agree nor understand the above warnings, do not use any of VPN
  495. Gate Academic Experiment Service functions.
  496. VPN Gate is a research project for just academic purpose only. VPN Gate was
  497. developed as a plug-in for SoftEther VPN and UT-VPN. However, all parts of VPN
  498. Gate were developed on this research project at University of Tsukuba. Any
  499. parts of VPN Gate are not developed by SoftEther Corporation. The VPN Gate
  500. Research Project is not a subject to be led, operated, promoted nor guaranteed
  501. by SoftEther Corporation.
  502. 5.13. The P2P Relay Function in the VPN Gate Client to strengthen the
  503. capability of circumvention of censorship firewalls
  504. VPN Gate Clients, which are published since January 2015, include the P2P
  505. Relay Function. The P2P Relay Function is implemented in order to strengthen
  506. the capability of circumvention of censorship firewalls. If the P2P Relay
  507. Function in your VPN Gate Client is enabled, then the P2P Relay Function will
  508. accept the incoming VPN connections from the VPN Gate users, which are located
  509. on mainly same regions around you, and will provide the relay function to the
  510. external remote VPN Gate Servers, which are hosted by third parties in the
  511. free Internet environment. This P2P Relay Function never provides the shared
  512. NAT functions nor replaces the outgoing IP address of the VPN Gate users to
  513. your IP addresses because this P2P Relay Function only provides the
  514. "reflection service" (hair-pin relaying), relaying from incoming VPN Gate
  515. users to an external VPN Gate Server. In this situation, VPN tunnels via your
  516. P2P Relay Function will be finally terminated on the external VPN Gate Server,
  517. not your VPN Gate Client. However, the VPN Gate Server as the final
  518. destination will record your IP address as the source IP address of VPN
  519. tunnels which will be initiated by your P2P Relay Function. Additionally, user
  520. packets which are transmitted via your P2P Relay Function will be recorded on
  521. your computer as packet logs as described on the section 5.8. After you
  522. installed the VPN Gate Client, and if the P2P Relay Function will be enabled
  523. automatically, then all matters on the 5.2, 5.3, 5.4, 5.5, 5.6, 5.7, 5.8, 5.9,
  524. 5.10, 5.11 and 5.12 sections will be applied to you and your computer, as same
  525. to the situation when you enabled the VPN Gate Service (the VPN Gate Server
  526. function). If your P2P Function is enabled, then your computer's IP address
  527. and the default operator's name which is described on the section 5.5 will be
  528. listed on the VPN Gate Server List which is provided by the VPN Gate Project.
  529. You can change these strings by editing the "vpn_gate_relay.config" file
  530. manually. Note that you need to stop the VPN Client service before editing it.
  531. The VPN Gate Client will automatically enable the P2P Relay Function on your
  532. computer if the VPN Gate Client detects that your computer might be located in
  533. regions where there are existing censorship firewalls. If you want to disable
  534. the P2P Relay Function, you must set the "DisableRelayServer" flag to "true"
  535. on the "vpn_client.config" file which is the configuration file of the VPN
  536. Client. Note that you need to stop the VPN Client service before editing it.
  537. The VPN Gate Client does not recognize the particular regulation of your
  538. country or your region. The VPN Gate Client activates the P2P Relay Function
  539. even if your country or your region has the law to restrict running P2P relay
  540. functions. Therefore, in such a case, you must disable the P2P Relay Function
  541. on the VPN Gate Client manually by setting the "DisableRelayServer" flag if
  542. you reside in such a restricted area, in your own responsibility.