Well at least Alfred's been notified of the issue. He told me he's 
investigating the report.

Brian D'Arcy wrote:
> I'm afraid that this type of attack has been around since the late 90's, if
> not earlier.
>
> It's basically pounding random UDP data (or maybe now-days more structured
> data) at raw listen ports.  The application listening does what it's
> programmed to do, parse the input and use up available resources in order to
> do so.
>
> There's not a whole lot any individual can do about this.  The only thing I
> can see resolving this, assuming it becomes a widespread problem, is valve
> updating the query/response code to ignore the random data spewed at it in a
> much more efficient manner so that the only thing which occurs is a loss of
> some available bandwidth instead of the "melt" effect you see as servers
> start to choke out.
>
> In a nutshell, it's a DDOS tool, minus the distributed part.
>
> On Mon, Apr 28, 2008 at 6:17 PM, Ian Shaffer <[EMAIL PROTECTED]>
> wrote:
>
>   
>> I just noticed that. Pity my hastiness.
>>
>> Daron Dodd wrote:
>>     
>>> you already did when u told everyone the name of the program in the
>>> first email. google is a very powerful tool.
>>>
>>> On Mon, Apr 28, 2008 at 6:07 PM, Ian Shaffer
>>> <[EMAIL PROTECTED]> wrote:
>>>
>>>       
>>>> My big problem here is that I do not have root access to any of my
>>>> servers. We used to have all our servers on our own dedi, but BECAUSE
>>>>         
>> of
>>     
>>>> these attacks, we decided to scrap the dedi and spread our servers
>>>> across different IP ranges by paying per slot in different locations.
>>>> Even though we can still be attacked, the attack is limited to one
>>>> server at a time. That server is usually our Windows 50 man ZombieMod
>>>> server in Chicago. I'm currently working with the host to see if the
>>>> attack can be detected and blocked automatically.
>>>>
>>>> I've had a couple people email me asking for this "Nuker" program, or
>>>> the link to where to download it. I've notified Alfred of the issue and
>>>> sent him the link to the program, however he recommends that I be
>>>> careful at how I present my report to the non-moderated HLDS mailing
>>>> list. Hence, I will not give this program to ANYBODY unless on Alfred's
>>>> approval.
>>>>
>>>>
>>>> Chad Austin wrote:
>>>>
>>>>         
>>>>> Post a dump of packets please, or just link to program so it can be
>>>>> analyzed.
>>>>>
>>>>> Ian Shaffer wrote:
>>>>>
>>>>>
>>>>>           
>>>>>> Dear Network Administrator,
>>>>>>
>>>>>> Over the past few months my servers have been brought to their knees
>>>>>> dozens of times through "nuke" style Denial of Service attacks.
>>>>>>             
>> Simple
>>     
>>>>>> put, players start teleporting around, pings gradually start
>>>>>>             
>> increasing
>>     
>>>>>> for all players and the timer slows down. After a couple minutes of
>>>>>> being attacked, you are early frozen from movement and the timer
>>>>>>             
>> takes a
>>     
>>>>>> decade to tick down, and pings are skyrocketed. Players then leave
>>>>>>             
>> the
>>     
>>>>>> server.
>>>>>>
>>>>>> Well earlier this week I "interrogated," pardon the pun, a member of
>>>>>>             
>> my
>>     
>>>>>> community who had made an exclamation that it would start to get real
>>>>>> laggy in one of our servers earlier in the day. That server, our
>>>>>>             
>> Zombie
>>     
>>>>>> Server, started getting nuked just a couple minutes after. I was
>>>>>>             
>> fairly
>>     
>>>>>> certain it was him who started the attack. In the evening, I talked
>>>>>>             
>> to
>>     
>>>>>> this guy, his alias is "ST. GEORGE," and explained to him that I
>>>>>> believed it was him who was "nuking" our servers. I acted very
>>>>>>             
>> sincere
>>     
>>>>>> when I told him that I had logged his IP address and was planning on
>>>>>> filing a formal abuse complaint to his ISP, Road Runner. He somewhat
>>>>>> panicked at hearing this, and confessed as to what he was doing.
>>>>>>
>>>>>> He sent me a link to download the same hacking tool he said he was
>>>>>> using. Hackers Assistant is the program. I scanned the program for
>>>>>>             
>> any
>>     
>>>>>> trojans or viruses it might have, it was clean. I ran it and
>>>>>>             
>> discovered
>>     
>>>>>> a feature called "Nuker." In there it prompted for a server IP
>>>>>>             
>> address
>>     
>>>>>> and port and a box to input a message. One would simply put a
>>>>>>             
>> server's
>>     
>>>>>> info in there, type some random stuff in the message box, and click
>>>>>>             
>> "Nuke."
>>     
>>>>>> A former member of our community and admitted nuker "ST. GEORGE"
>>>>>>             
>> tested
>>     
>>>>>> the software. I was shocked. It was working, The server was being
>>>>>> attacked just as described above. I held a sense of accomplishment
>>>>>> knowing that I had found the cause of my problems. I therefore began
>>>>>> looking for a way to block this programs abilities. Now I needed to
>>>>>>             
>> know
>>     
>>>>>> what types of servers this program could attack. ST. GEORGE then
>>>>>>             
>> showed
>>     
>>>>>> off nuke attacks on dozens of popular servers in the US and UK,
>>>>>>             
>> highly
>>     
>>>>>> popular servers like 24/7 Office Noob Galore and Zombiemod |
>>>>>> XFactorGaming, and the program worked to bring down each and every
>>>>>>             
>> one
>>     
>>>>>> of them to their knees. There was only one server he was not able to
>>>>>> nuke attack, evidently the #1 CSS server in the United States,
>>>>>> CantStopGaming CS:S.
>>>>>>
>>>>>> This program affects practically every single server in CS:S. The
>>>>>> interesting part of it is that this program doesn't advise usage
>>>>>>             
>> towards
>>     
>>>>>> any particular genre of online infrastructure. ST. GEORGE tried
>>>>>>             
>> running
>>     
>>>>>> this program on CoD servers, BF2 and BF2142 servers, Halo PC servers,
>>>>>> SA:MP servers, and Quake 4 servers. It didn't work on any of those
>>>>>> games. However, it worked on the other popular Source-based game out
>>>>>> today, Team Fortress 2. Every TF2 server ST. GEORGE checked was
>>>>>> nuke-able, with the same effects felt in-game. This leads me to the
>>>>>> conclusion that there must be an exploit in the source engine
>>>>>>             
>> allowing
>>     
>>>>>> this program to nuke all servers using the source engine.
>>>>>>
>>>>>> While our server was getting attacked last time, I gathered critical
>>>>>> data. I've determined that the program does not eat up the server's
>>>>>> bandwidth. Instead, it seems to flood the server with
>>>>>>             
>> messages/commands,
>>     
>>>>>> so much that it tops out CPU usage. Below is a sample of my console
>>>>>>             
>> as
>>     
>>>>>> our server was undergoing a recent attack with the program. Midway
>>>>>> through the data, the perpetrator aborted the nuke attack. You can
>>>>>>             
>> see
>>     
>>>>>> the server recovering as the cpu usage goes down and server FPS comes
>>>>>> back to normal. This data was gathered with 8 others in-game.
>>>>>>
>>>>>> ===========================================
>>>>>>
>>>>>> CPU In Out Uptime Users FPS Players
>>>>>> 96.59 16841.92 3909.91 110 4 10.00 9
>>>>>> L 04/27/2008 - 01:23:04: rcon from "72.251.244.233:2020": command
>>>>>>             
>> "stats"
>>     
>>>>>> ] rcon stats
>>>>>> CPU In Out Uptime Users FPS Players
>>>>>> 96.04 17937.41 3958.69 110 4 10.00 9
>>>>>> L 04/27/2008 - 01:23:09: rcon from "72.251.244.233:2020": command
>>>>>>             
>> "stats"
>>     
>>>>>> ] rcon stats
>>>>>> CPU In Out Uptime Users FPS Players
>>>>>> 95.54 17590.70 3970.64 110
>>>>>> ] rcon stats
>>>>>> CPU In Out Uptime Users FPS Players
>>>>>> 100.00 17354.72 3966.19 110 4 523.25 9
>>>>>> L 04/27/2008 - 01:23:10: rcon from "72.251.244.233:2020": command
>>>>>>             
>> "stats"
>>     
>>>>>> ======== HERE THE ATTACK WAS ABORTED =========
>>>>>>
>>>>>> ] rcon stats
>>>>>> CPU In Out Uptime Users FPS Players
>>>>>> 75.57 16933.90 4148.69 110 4 508.36 9
>>>>>> L 04/27/2008 - 01:23:11: rcon from "72.251.244.233:2020": command
>>>>>>             
>> "stats"
>>     
>>>>>> ] rcon stats
>>>>>> CPU In Out Uptime Users FPS Players
>>>>>> 75.57 16750.93 4596.00 110 4 509.13 9
>>>>>> L 04/27/2008 - 01:23:12: rcon from "72.251.244.233:2020": command
>>>>>>             
>> "stats"
>>     
>>>>>> ] rcon stats
>>>>>> CPU In Out Uptime Users FPS Players
>>>>>> 52.55 16518.30 6391.86 110 4 509.97 9
>>>>>> L 04/27/2008 - 01:23:13: rcon from "72.251.244.233:2020": command
>>>>>>             
>> "stats"
>>     
>>>>>> ] rcon stats
>>>>>> CPU In Out Uptime Users FPS Players
>>>>>> 40.46 16520.83 9229.05 110 4 511.77 9
>>>>>> L 04/27/2008 - 01:23:13: rcon from "72.251.244.233:2020": command
>>>>>>             
>> "stats"
>>     
>>>>>> ] rcon stats
>>>>>> CPU In Out Uptime Users FPS Players
>>>>>> 40.46 16452.49 11473.37 110 4 514.49 9
>>>>>> L 04/27/2008 - 01:23:14: rcon from "72.251.244.233:2020": command
>>>>>>             
>> "stats"
>>     
>>>>>> ============================================
>>>>>>
>>>>>>
>>>>>> I very much hope that this exploit can be stomped out. My community
>>>>>>             
>> has
>>     
>>>>>> suffered all too much to the hands of the kiddies that run these
>>>>>>             
>> types
>>     
>>>>>> of programs for their own vain pleasure. I speak for server operators
>>>>>> everywhere when I say, this issue must be fixed!
>>>>>>
>>>>>> Thank you very much for taking the time to read my post. I hope some
>>>>>> good will come out of it!
>>>>>>
>>>>>> Sincerely,
>>>>>> David "Eaglewonj" Gaipa
>>>>>>
>>>>>> _______________________________________________
>>>>>> To unsubscribe, edit your list preferences, or view the list
>>>>>>             
>> archives, please visit:
>>     
>>>>>> http://list.valvesoftware.com/mailman/listinfo/hlds
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>             
>>>>> _______________________________________________
>>>>> To unsubscribe, edit your list preferences, or view the list archives,
>>>>>           
>> please visit:
>>     
>>>>> http://list.valvesoftware.com/mailman/listinfo/hlds
>>>>>
>>>>>
>>>>>
>>>>>           
>>>> _______________________________________________
>>>> To unsubscribe, edit your list preferences, or view the list archives,
>>>>         
>> please visit:
>>     
>>>> http://list.valvesoftware.com/mailman/listinfo/hlds
>>>>
>>>>
>>>>         
>>> _______________________________________________
>>> To unsubscribe, edit your list preferences, or view the list archives,
>>>       
>> please visit:
>>     
>>> http://list.valvesoftware.com/mailman/listinfo/hlds
>>>
>>>
>>>       
>> _______________________________________________
>> To unsubscribe, edit your list preferences, or view the list archives,
>> please visit:
>> http://list.valvesoftware.com/mailman/listinfo/hlds
>>
>>     
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives, please 
> visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds
>
>   

_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds

Reply via email to