So, I was able to make the IPSec thing work to allow certain IPs also. You
just set up a separate pass rule for the IPs you want to let in. Works fine.
I used it to block all RCON except for those sent from HLStatsX and myself.

This line blocks all access to TCP port 27015:
ipseccmd.exe -w REG -p "Block TCP 27015 Filter" -r "Block Inbound TCP 27015
Rule" -f *=0:27015:TCP -n BLOCK -x

Then use this line to allow those you trust at the rcon port (shown with
216.40.218.146):
ipseccmd.exe -w REG -p "Block TCP 27015 Filter" -r "Allow TCP 27015 From
216.40.218.146" -f 216.40.218.146=0:27015:TCP -n PASS -x

I hope this helps someone. I've seen no adverse side effects to blocking TCP
27015 except for blocking RCON. It seems that all game data goes to UDP
27015.

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Tony Paloma
Sent: Monday, April 28, 2008 10:43 PM
To: 'Half-Life dedicated Win32 server mailing list'
Subject: Re: [hlds] Nuke Exploit Info and Prevention

You can block TCP/IP port 27015 on Windows Server using IPSec policies.

IPSeccmd.exe -W REG -p "Block TCP 27015 Filter" -r "Block Inbound 27015
Rule" -f *=0:27015:TCP -n BLOCK -x

This will of course prevent RCON connections. Allowing certain IP addresses
is probably possible but I'm unsure of how to do it.

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Nephyrin Zey
Sent: Monday, April 28, 2008 10:26 PM
To: Half-Life dedicated Win32 server mailing list; Half-Life dedicated Linux
server mailing list
Subject: [hlds] Nuke Exploit Info and Prevention

The nuke exploit works as follows:

Connect to a server via TCP (rcon, does anything else use TCP? I have
no idea.) on its port.
Send a million garbage packets
???
Profit

The server goes insane handling them.
Solution:
Limit incoming TCP packets to ~1/second from any given IP on that port, *OR*
Block TCP access to the server's port except from trusted people.

Linux IPtables rules:
iptables -A INPUT -p tcp --dport 27015 -m hashlimit --hashlimit-mode
srcip,dstip,dstport --hashlimit 1/sec --hashlimit-burst 1
--hashlimit-name TF_PACKET_LIMIT -j ACCEPT
iptables -A INPUT -p tcp --dport 27015 -j DROP

/etc/init.d/iptables save
/etc/init.d/iptables start

(Note: you probably shouldn't enable iptables blindly if you don't
know what you're doing)

Windows:
Block TCP to 27015 except for trusted people. Or something. Someone
who admins window servers will need to guide you!

- Neph
(sv_benchmark_force_start fix coming in a few minutes)

_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives,
please visit:
http://list.valvesoftware.com/mailman/listinfo/hlds


_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives,
please visit:
http://list.valvesoftware.com/mailman/listinfo/hlds


_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds

Reply via email to