Re: [hlds_linux] CSS Server flooding or attack?

2011-01-28 Thread Harry Strongburg
On Fri, Jan 28, 2011 at 04:27:21PM +1030, PryMaL wrote:
 They've got soemthing in the region of 300 megabit at their disposal...
 not too many single sources (outside data centers) have that kind of
 bandwidth.
 So my guess still lies at DDoS
 Todays update seems to have helped a bit.

Are you implying that it's hard or expensive to get a 300Mbit+ box? Any 
skid could easily get that for less than 40 Euro. I doubt someone would 
use a botnet for attacking a server with the bug, instead of doing 
trivial UDP spoofing on a single box. :)

___
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux


Re: [hlds_linux] CSS Server flooding or attack?

2011-01-28 Thread PryMaL

On 28/01/2011 10:48 PM, Harry Strongburg wrote:

Are you implying that it's hard or expensive to get a 300Mbit+ box? Any
skid could easily get that for less than 40 Euro. I doubt someone would
use a botnet for attacking a server with the bug, instead of doing
trivial UDP spoofing on a single box.:)
anything more than a 100mb connection is difficult to obtain let alone 
expensive in Australia.
I guess I'm still in the mindset of bandwidth costs $$ thanks to our 
major infrastructure failings.


--
PryMaL

Email: pry...@geekout.info
Twitter: prymal81


___
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux


Re: [hlds_linux] CSS Server flooding or attack?

2011-01-28 Thread frostschutz
On Fri, Jan 28, 2011 at 11:01:56PM +1030, PryMaL wrote:
 anything more than a 100mb connection is difficult to obtain let alone 
 expensive in Australia.

It's less than 100 euro per month in ... Europe.

However that doesn't mean you can use it for attacks. You can try but 
it will be a rather short lived fun. Your server will be shut down 
with the first abuse report or even before that.

It's easier to write a small Windows program and upload it somewhere, 
you wouldn't believe the number of idiots who download and execute 
.exe files that do funny things... put it on 4chan with an unrelated 
image next to it and you have a botnet with a million clients.

Bandwidth: unlimited
Price: free

That's unfortunately pretty much how it works...

Regards
frostschutz

___
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux


Re: [hlds_linux] CSS Server flooding or attack?

2011-01-28 Thread Simon Gunton
You will find that it will be ordered through some kiddy host offering 
gig ports and then paid for with a bent credit card will use if for a 
week till it gets yanked and by which time they are long gone.


Also if they have spoofed the IP then unlieky anyone can submit an abuse 
report about it to the right people .


Simon
Simon Gunton
Support Analyst
INX-Gaming.com
Phone: 01733 687699
EMail: si...@inx-gaming.co.uk mailto:si...@inx-gaming.co.uk

Support: http://support.inx-network.com http://support.inx-network.com/
This e-mail and any attachments are confidential. If you are not the 
intended recipient, please contact the sender. Please then delete the 
email and do not disclose the contents to anyone.


Any views or opinions presented in this email or its attachments are 
solely those of the author and do not necessarily represent those of 
INX-Network Limited


On 28/01/2011 12:53, frostschutz wrote:

On Fri, Jan 28, 2011 at 11:01:56PM +1030, PryMaL wrote:

anything more than a 100mb connection is difficult to obtain let alone
expensive in Australia.

It's less than 100 euro per month in ... Europe.

However that doesn't mean you can use it for attacks. You can try but
it will be a rather short lived fun. Your server will be shut down
with the first abuse report or even before that.

It's easier to write a small Windows program and upload it somewhere,
you wouldn't believe the number of idiots who download and execute
.exe files that do funny things... put it on 4chan with an unrelated
image next to it and you have a botnet with a million clients.

Bandwidth: unlimited
Price: free

That's unfortunately pretty much how it works...

Regards
frostschutz

___
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux

___
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux


Re: [hlds_linux] CSS Server flooding or attack?

2011-01-28 Thread Marco Padovan

there are big attacks (gbit?) dos coming from gameservers hosters too...

People exploiting Q3 based games and hoster letting them abuse their 
hosted services... ( 
http://www.lemuria.org/security/application-drdos.html )


Unfortunatly it's not just kids with gbit ports :(

Il 28/01/2011 14:04, Simon Gunton ha scritto:
You will find that it will be ordered through some kiddy host offering 
gig ports and then paid for with a bent credit card will use if for a 
week till it gets yanked and by which time they are long gone.


Also if they have spoofed the IP then unlieky anyone can submit an 
abuse report about it to the right people .


Simon
Simon Gunton
Support Analyst
INX-Gaming.com
Phone: 01733 687699
EMail: si...@inx-gaming.co.uk mailto:si...@inx-gaming.co.uk

Support: http://support.inx-network.com http://support.inx-network.com/
This e-mail and any attachments are confidential. If you are not the 
intended recipient, please contact the sender. Please then delete the 
email and do not disclose the contents to anyone.


Any views or opinions presented in this email or its attachments are 
solely those of the author and do not necessarily represent those of 
INX-Network Limited


On 28/01/2011 12:53, frostschutz wrote:

On Fri, Jan 28, 2011 at 11:01:56PM +1030, PryMaL wrote:

anything more than a 100mb connection is difficult to obtain let alone
expensive in Australia.

It's less than 100 euro per month in ... Europe.

However that doesn't mean you can use it for attacks. You can try but
it will be a rather short lived fun. Your server will be shut down
with the first abuse report or even before that.

It's easier to write a small Windows program and upload it somewhere,
you wouldn't believe the number of idiots who download and execute
.exe files that do funny things... put it on 4chan with an unrelated
image next to it and you have a botnet with a million clients.

Bandwidth: unlimited
Price: free

That's unfortunately pretty much how it works...

Regards
frostschutz

___
To unsubscribe, edit your list preferences, or view the list 
archives, please visit:

http://list.valvesoftware.com/mailman/listinfo/hlds_linux

___
To unsubscribe, edit your list preferences, or view the list archives, 
please visit:

http://list.valvesoftware.com/mailman/listinfo/hlds_linux

___
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux


Re: [hlds_linux] CSS Server flooding or attack?

2011-01-27 Thread Arie
These recent attacks all work by overloading the server with UDP packets.
Most effective are the A2S_INFO and similar attacks using valid packets.
It's very cheap in terms of CPU and bandwidth to craft a packet that asks a
gameserver for it's information. It takes a number of times more CPU power
to generate the response.
It only takes a simple connection with about 3Mbit upstream to take down any
OrangeBox gameserver.

The A2S_INFO attack has been known for quite a while, and that's why
querycache was developed. This caches the response to A2S_INFO, so only one
A2S_INFO request will hit the gameserver, the rest will be served from
cache.

Because querycache was very effective in blocking the A2S_INFO attacks, the
attackers switched the kind of packet they used and started sending
A2S_PLAYER and other valid A2S_ packets.
After writing a firewall script specifically limiting these known A2S
packets, the attackers changed their tactic again, and started using invalid
A2S packets. They're similar to A2S packets, as they start with ff, but
are followed by a random number instead of one of the known ones.
The gameserver still spends time working on these invalid packets, causing
the lag.

The only effective solution I know of is rate-limiting the amount of ff
packets that get to your server. We've experimented with a few values and
found a limit of 60/sec has no side-effects and can withstand the DoS
attacks.

Also, these attacks seem to be semi-automated. Attacking passworded servers
with players on it. If you're not running a public server you can set
hide_server 1 in your server.cfg to not be shown on the master server
list. This is effective unless something knows your server ip:port and
attacks it manually.



On 27 January 2011 07:44, Rodrigo Peña yo@korrupzion.com wrote:

 Hello,

 Many server admins are reporting to have their servers attacked. There are
 several methods used to attack a srcds servers:

 -UDP Flood: A packet specially crafted could make pings raise in the
 server. Search SRCDS DoS Fix in google, I don't remember the exact names
 now, but I currently use one from sourceop.com

 -A2S Queries flood: an A2S Query UDP packet with random source ip is
 flooded making the server freeze  for not being able to handle that large
 amount of queries. This attack must be done with a high bandwidth connection
 (not sure). This can be partially fixed using 'A2S Query Cache' or IPTables

 I suggest you to look to the simmilar threads in this mailing list

 -Rodrigo



 El 27-01-2011 3:24, PryMaL escribió:

  Afternoon (at least for me it is at the moment) all,

 We've had some issues on CSS servers the last 2 days with what appears to
 be targeted attacks (ie. DDoS) on our servers.  Approximately the same time,
 for a few minutes and the attack is based on the IP.

 Just wondering if anyone's aware of anything that may be causing this from
 the game server side?  or if we're actually being attacked...
 I suspect/believe the latter.



 ___
 To unsubscribe, edit your list preferences, or view the list archives,
 please visit:
 http://list.valvesoftware.com/mailman/listinfo/hlds_linux

___
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux


Re: [hlds_linux] CSS Server flooding or attack?

2011-01-27 Thread PryMaL

On 27/01/2011 8:25 PM, Arie wrote:

These recent attacks all work by overloading the server with UDP packets.
Most effective are the A2S_INFO and similar attacks using valid packets.
It's very cheap in terms of CPU and bandwidth to craft a packet that asks a
gameserver for it's information. It takes a number of times more CPU power
to generate the response.
It only takes a simple connection with about 3Mbit upstream to take down any
OrangeBox gameserver.


does this form of attack use the game ports?
or just hammer the IP?

Reason I ask is the attacks appear to be simply hammering many different 
ports and coming from hundreds of IP's simultaneously.  For all I can 
see, it's a DDoS...


--
PryMaL

Email: pry...@geekout.info
Twitter: prymal81


___
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux


Re: [hlds_linux] CSS Server flooding or attack?

2011-01-27 Thread Arie
Gameserver port.

The attack appearing to come from hundreds of IPs means nothing as it's
trivial to spoof the source IP with UDP.


On 27 January 2011 11:12, PryMaL pry...@geekout.info wrote:

 On 27/01/2011 8:25 PM, Arie wrote:

 These recent attacks all work by overloading the server with UDP packets.
 Most effective are the A2S_INFO and similar attacks using valid packets.
 It's very cheap in terms of CPU and bandwidth to craft a packet that asks
 a
 gameserver for it's information. It takes a number of times more CPU power
 to generate the response.
 It only takes a simple connection with about 3Mbit upstream to take down
 any
 OrangeBox gameserver.

  does this form of attack use the game ports?
 or just hammer the IP?

 Reason I ask is the attacks appear to be simply hammering many different
 ports and coming from hundreds of IP's simultaneously.  For all I can see,
 it's a DDoS...

 --
 PryMaL

 Email: pry...@geekout.info
 Twitter: prymal81



 ___
 To unsubscribe, edit your list preferences, or view the list archives,
 please visit:
 http://list.valvesoftware.com/mailman/listinfo/hlds_linux

___
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux


Re: [hlds_linux] CSS Server flooding or attack?

2011-01-27 Thread PryMaL

On 27/01/2011 8:48 PM, Arie wrote:

The attack appearing to come from hundreds of IPs means nothing as it's
trivial to spoof the source IP with UDP.

They've got soemthing in the region of 300 megabit at their disposal...
not too many single sources (outside data centers) have that kind of 
bandwidth.


So my guess still lies at DDoS
Todays update seems to have helped a bit.

--
PryMaL

email: pry...@geekout.info
twitter: prymal1981


___
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux


Re: [hlds_linux] CSS Server flooding or attack?

2011-01-26 Thread Rodrigo Peña

Hello,

Many server admins are reporting to have their servers attacked. There 
are several methods used to attack a srcds servers:


-UDP Flood: A packet specially crafted could make pings raise in the 
server. Search SRCDS DoS Fix in google, I don't remember the exact names 
now, but I currently use one from sourceop.com


-A2S Queries flood: an A2S Query UDP packet with random source ip is 
flooded making the server freeze  for not being able to handle that 
large amount of queries. This attack must be done with a high bandwidth 
connection (not sure). This can be partially fixed using 'A2S Query 
Cache' or IPTables


I suggest you to look to the simmilar threads in this mailing list

-Rodrigo



El 27-01-2011 3:24, PryMaL escribió:

Afternoon (at least for me it is at the moment) all,

We've had some issues on CSS servers the last 2 days with what appears 
to be targeted attacks (ie. DDoS) on our servers.  Approximately the 
same time, for a few minutes and the attack is based on the IP.


Just wondering if anyone's aware of anything that may be causing this 
from the game server side?  or if we're actually being attacked...

I suspect/believe the latter.




___
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux