There were bots spoofing their IPs doing the stupid packet length
attack (The one that you can preform with ease on Dialup). I stopped
checking my kern.log files a while ago as none of the IPs matched up
with any players. The fix for this is simple, install DAF, or filter
the port with IPTables.

However, if they're using some of the newer, more fun tools. You're
forced to use IPTables to filter the traffic since SRCDS cannot handle
it for some asinine reason. You can also install ServerSecure2,
however it creates visibility issues (even under non-attack cases).

This should have been fixed over two years ago, but it's still an
issue today. Hopefully it's nothing like the Rcon crash where it took
the ETF2L Servers to go down :/
Kyle.


On Thu, Jan 6, 2011 at 4:19 PM, frostschutz <frostsch...@metamorpher.de> wrote:
> On Fri, Jan 07, 2011 at 12:36:10AM +0100, Marco Padovan wrote:
>> hashlimit was exactly what I needed!
>>
>> Set it up correctly ... will see tomorrow what will happen :)
>
> Great... :)
>
> My own box runs without iptables and TF2 servers without mods.
> No problems so far - I'm not running anything well known
> (small clan and idle servers) so it seems the DoS is directed
> to specific servers only... then again I probably wouldn't notice
> as the clan servers are empty most of the time and the idlers
> don't complain much.
>
> Regards
> frostschutz
>
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives, please 
> visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds_linux
>

_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux

Reply via email to