Hy In an older mail from this list (thath i can#39;t find right now), there
was a mail thath cointain some IP tables rules agains DDOS attact. If somebody
can find it or still has it please send it to me (szoke(at)synhosting.eu).
Thanks in advance. ps. Valve could you do something about this?
which kind of attacks are we talking about?
please share some packet samples
Il 25/06/2011 13:26, molnár lászló ha scritto:
Hy In an older mail from this list (thath i can#39;t find right now), there
was a mail thath cointain some IP tables rules agains DDOS attact. If
somebody can find it
We have machines with both Debian and Fedora srcds-servers running and
all is showing high spu usage.
Its both TF2 and DoD:S running on them and we monitor all with munin.
This is a pic from a debian 64-bit server with 4 cores running 2 dods
servers.
I guess hes talking about UDP-flooding.
You can block the exact size of the packets in iptables (i think its 24 46
bytes on the ports.
/Chris
Sent from my iPhone 4
Den 25/06/2011 kl. 14.01 skrev Marco Padovan e...@evcz.tk:
which kind of attacks are we talking about?
please share some
I found out my problem was within a kernel (running rt31 pachets)
which kernel are you using?
reverting to a non rt kernel solved the problem..
strange thing is: after the last update basically the servers always
consumes the same amount of cpu when empty or when full...
Il 24/06/2011 21:00,
the problem are the preempt rt kernels...
this is VERY problematic :|
had to revert to a non preempt/rt kernel... but performance and game
smoothes is bad now :(
Il 25/06/2011 14:02, Svensk Ljud Ljus Produktion ha scritto:
We have machines with both Debian and Fedora srcds-servers running and
Hy! Thanks for the answer.I am not so good at this tings so could you please
specify what information do you need, and how can i get it?
___
To unsubscribe, edit your list preferences, or view the list archives, please
visit:
This is our rule to drop zero-length UDP packets:
#Ban zero-length UDP
/sbin/iptables -A INPUT -p udp -m length --length 28 -j DROP
There are more sophisticated flooding attacks, but blocking that one is a
good start
-Original Message-
From: hlds_linux-boun...@list.valvesoftware.com
install tcpdump on your box and run it on the server while it's being
ddossed:
tcpdump -nnvvXS dst port 27005
(supposing the server under attack is listening on 27005)
Il 25/06/2011 14:58, molnár lászló ha scritto:
Hy! Thanks for the answer.I am not so good at this tings so could you please
Very good tutorial:
https://forums.alliedmods.net/showthread.php?t=151551
-Oryginalna wiadomość-
From: molnár lászló
Sent: Saturday, June 25, 2011 1:26 PM
To: hlds_linux@list.valvesoftware.com
Subject: [hlds_linux] IP Tables rules against DDOS attacts
Hy In an older mail from this
Hi:
For 0 size udp flood you only need
http://www.sourceop.com/modules.php?name=Downloadsd_op=viewdownloadcid=9
(dont know if work with last update)
And for rcon exploits, block the tcp query port, for example: IPTABLES
-A INPUT -p tcp --dport 27015-j DROP
Best regards
Is anyone else experiencing ghosting players on their servers again?
I just had to restart both my servers, I had 5 ghosts on my 24man and 1ghost
on my 32 man.
Chris
___
To unsubscribe, edit your list preferences, or view the list archives, please
I'm not using RT kernels.
On Sat, Jun 25, 2011 at 8:53 AM, Marco Padovan e...@evcz.tk wrote:
the problem are the preempt rt kernels...
this is VERY problematic :|
had to revert to a non preempt/rt kernel... but performance and game
smoothes is bad now :(
Il 25/06/2011 14:02, Svensk Ljud
I see them on css and dods servers too.
Am 25.06.2011 17:12, schrieb Chris Oryschak:
Is anyone else experiencing ghosting players on their servers again?
I just had to restart both my servers, I had 5 ghosts on my 24man and 1ghost
on my 32 man.
Chris
yes, on CSS
On Sat, Jun 25, 2011 at 5:12 PM, Chris Oryschak ch...@oryschak.com wrote:
Is anyone else experiencing ghosting players on their servers again?
I just had to restart both my servers, I had 5 ghosts on my 24man and
1ghost
on my 32 man.
Chris
anyone else experiencing this?
players aren't getting their items and apparently gets disconnected from
steam?!
--
//Rikard 'Zapy' Bremark
ComHem AB - http://www.comhem.se
Warzone.nu - http://www.warzone.nu
Warzone Short Valley
rikard.brem...@warzone.nu
z...@warzone.nu
How are your servers when empty?
with rt preempt kernels they uses the same amount of cpu as when full
(50% in my case)
Il 25/06/2011 17:21, 1nsane ha scritto:
I'm not using RT kernels.
On Sat, Jun 25, 2011 at 8:53 AM, Marco Padovan e...@evcz.tk wrote:
the problem are the preempt rt
Tried on 2.6.33.7-rt29 and there it appear to be working fine...
some compile flags... something's wrong somewhere :/
Il 25/06/2011 14:02, Svensk Ljud Ljus Produktion ha scritto:
We have machines with both Debian and Fedora srcds-servers running and
all is showing high spu usage.
Its both
Yes, I sent an email to Robin, and I think they know of the problem, but
they don't know how to replicate it. If anyone knows how to reliably make it
happen to their server, send someone on the TF2 team an email about it.
A server restart is the only thing that fixes them.
Some threads with more
Nearly 90 000 players playing TF2. Doesn't surprise me at all. Just
wait, that'll fix it. Items will drop eventually, even if they don't
come out immediately.
-ics
25.6.2011 21:35, Rikard Bremark kirjoitti:
anyone else experiencing this?
players aren't getting their items and apparently gets
Yes, I do confirm this for CS:S and TF2.
About 50% CPU usage when server is empty.
THIS IS VERY BIG PAIN IN OUR ASS.
Valve, please do something! Using non-RT kernel is impossible.
2011/6/24 hlds_linux-requ...@list.valvesoftware.com:
Message: 5
Date: Fri, 24 Jun 2011 16:50:57 +0200
From:
I suspect that once server has 1 slot free and couple of players connect
at the same time, the other receives a message that the server is full
and the other gets in. If someone disconnects at exactly the same
timeframe as these 2 connected, there will be a ghost player born.
I have 6 ghost
Yeah... please fix it! :|
anyway from what I can see 2.6.33.9 with patch rt29 appears to not be
affected by this bug
Il 25/06/2011 22:28, Никита Булаев [Nikita Bulaev] ha scritto:
Yes, I do confirm this for CS:S and TF2.
About 50% CPU usage when server is empty.
THIS IS VERY BIG PAIN IN OUR
I'm guessing this has to do with the new thing it does on server startup
where it tries to figure out what clock speed the CPU is running at. Start
up the server and read what it says in console. I know it mentions some way
to disable it. See if that helps.
2011/6/25 Marco Padovan e...@evcz.tk
It#39;s easy to reproduce the ghost players on CSS server. Just enable the TV
and connect to it, press cancel and repeat it.Someone hade managed to make the
server show 52/12 whit this method. ps: thanks for all of the IP tables tips,
it#39;s working :) Greets
You can disable it by setting the environment variable
RDTSC_FREQUENCY=disabled
On 6/25/2011 5:43 PM, J M wrote:
I'm guessing this has to do with the new thing it does on server startup
where it tries to figure out what clock speed the CPU is running at. Start
up the server and read what it
-Original Message-
From: hlds_linux-boun...@list.valvesoftware.com [mailto:hlds_linux-
boun...@list.valvesoftware.com] On Behalf Of Ross Bemrose
Sent: 25 June 2011 23:05
To: Half-Life dedicated Linux server mailing list
Subject: Re: [hlds_linux] TF2 ultra high cpu usage after the
You can also rate-limit in iptables since a new module was introduced not
too long ago. I use it for SSH and a few other ports as well. Here's an
example for those that care. The below will rate limit ssh connections to no
more than 4 every 60 seconds. Anything over that, iptables drops for a
On one of my servers everything is bugged in some sort of speedhack effect
if RDTSC_FREQUENCY isn't set to disabled.
2011/6/26 gamead...@127001.org
-Original Message-
From: hlds_linux-boun...@list.valvesoftware.com [mailto:hlds_linux-
boun...@list.valvesoftware.com] On Behalf Of
You can still use DBlocker against cheaters, even if it won't detect all of
them, it will detect some.
http://dblocker.didrole.com/
2011/6/24 msleeper mslee...@ismsleeperwrong.com
I would pay top dollar* for a SM plugin that disables shit like voice
chat and sprays for free accounts. Or a
I can confirm that the load when full appear to be the same as when empty.
The problem is that not everyone has their machines able to sustain
24h/24h a cpu usage as all the slots where in use
Il 26/06/2011 00:33, gamead...@127001.org ha scritto:
-Original Message-
From:
did some tests:
+fps_max 300 = constant 10% cpu usagewhen empty
+fps_max 500 = constant 50% cpu usagewhen empty
+fps_max 1000 = server working fine, 1% cpu usage when empty
+fps_max 0 = server working fine, 1% cpu usage when empty
what the hell is that?
Il 25/06/2011 22:28, Никита Булаев
32 matches
Mail list logo