Hi,

you should ratelimit that traffic

On Thu, Mar 23, 2017 at 10:44 PM, John <lists.va...@nuclearfallout.net>
wrote:

> If you're seeing packets from port 28960, you're most likely seeing a
> reflected query DDoS that is coming from CoDx servers (you can tell for
> certain by looking at the contents of captured packets -- look for the
> string 'statusResponse') -- not a direct query/connection flood, and likely
> not spoofed. You can safely block traffic from port 28960, or do a more
> thorough filter to block that traffic. This is an example rule to just
> block the port.
>
> iptables -I INPUT -p udp --sport 28960 -j DROP
>
> -John
>
>
> On 3/23/2017 2:33 PM, Mathias wrote:
>
> Thanks John.
>
> Could you guide/send me the Iptables?
>
> My server is on port 27115 and the attack comes in on port 28960 - But it
> wont work block the port (Have tried)
>
> "IP rate limit sustained 79085 distributed packets at 2636.2 pps (1246
> buckets).
>
> IP rate limit under distributed packet load (1205 buckets, 15001 global 
> count), rejecting 8.59.18.221:28960.
>
> IP rate limit sustained 78411 distributed packets at 2613.7 pps (943 buckets).
>
> IP rate limit under distributed packet load (1210 buckets, 15001 global 
> count), rejecting 154.112.126.3:28960.
>
> IP rate limit sustained 104375 distributed packets at 3479.2 pps (968 
> buckets).
>
> IP rate limit under distributed packet load (1152 buckets, 15001 global 
> count), rejecting 84.3.222.161:28960.
>
> IP rate limit sustained 78941 distributed packets at 2631.4 pps (795 buckets).
>
> IP rate limit under distributed packet load (1176 buckets, 16663 global 
> count), rejecting 88.131.51.148:28960."
>
>
> 2017-03-23 22:27 GMT+01:00 John <lists.va...@nuclearfallout.net>:
>
>> On 3/23/2017 1:34 PM, Mathias wrote:
>>
>>> My server's getting flood with VSE DDoS Attack. My server have DDoS
>>> Protection but it wont take it. any other DDoS Attack does it takes so what
>>> can i do? i'm on Linux Ubuntu 16.04.
>>>
>>> Here is server logs - http://pastebin.com/Q2dbcEMt
>>>
>>> I also got how the script works (VSE DDoS Attack) - Found on a forum via
>>> Google
>>>
>>> Any idea to stop it with Iptables? Packet limit?
>>>
>>
>> The term "VSE" ("Valve Source Exploit") that the attackers like to use is
>> a misnomer because there isn't an exploit involved. These attacks just
>> flood a server with spoofed queries and/or connection attempts from random
>> sources, and Source can't handle the volume.
>>
>> Currently the most effective general-purpose way to deal with these is to
>> whitelist real player IPs and rate-limit queries and connection attempts
>> from all other sources (down to around 1000/s). This can be done with
>> iptables using a combination of the ipset, hashlimit, and bpf/u32/string
>> modules.
>>
>> Ideally, the game would be redesigned to using TCP for queries and the
>> very first part of the connection, offloading the first-contact tasks to
>> the OS, which has established methods for combating high-rate spoofed TCP
>> SYN floods. Internally, it could then straight drop all UDP packets that
>> don't correspond to a currently connected player.
>>
>> -John
>>
>> _______________________________________________
>> Csgo_servers mailing list
>> Csgo_servers@list.valvesoftware.com
>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>
>
>
>
> _______________________________________________
> Csgo_servers mailing 
> listCsgo_servers@list.valvesoftware.comhttps://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>
>
>
> _______________________________________________
> Csgo_servers mailing list
> Csgo_servers@list.valvesoftware.com
> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>
_______________________________________________
Csgo_servers mailing list
Csgo_servers@list.valvesoftware.com
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers

Reply via email to