Are you sure it wasn't just the offending player spamming a sound over voicechat?
It doesn't seem likely someone with rcon access would have to resort to using the force benchmark exploit to crash it.. - Neph On Tue, Apr 29, 2008 at 3:42 PM, James McKenna <[EMAIL PROTECTED]> wrote: > Normally I'd assume that my rcon was compromised, change it, and move on. I > can't tell if this is related to the latest influx of exploits for source > games, but basically my community members informed me today that: > > "Twice today The Tempest servers were flooded with Bot players. Everyone > would be recalled to their battlement resupply while these Bots (of the > opposing team) would kill them and a wav of "niggers" looped repeatedly. > Eventually the continuous stream of Bots hammering the server would cause it > to freeze/crash. Pretty annoying and it doesn't look good for the server > either. I'd think that a group using Tux the penguin (or some variation of > him) as their logo would be a little more concerned with server security. I > know you guys run this as a free service to other gamers etc., but I'm just > saying it how it is... it looks really bad on your part and discourages the > average player from using your servers or even considering donating." > > Now this sounds like the benchmark exploit, but the looping wav sound > disturbs me. Even if the rcon was compromised, how would everyone be able to > hear a sound that we don't have on our servers? Unless it's been renamed > that is, but even then it would have to be on the http webserver, and it's > not. > > Any ideas? > _______________________________________________ > To unsubscribe, edit your list preferences, or view the list archives, > please visit: > http://list.valvesoftware.com/mailman/listinfo/hlds > _______________________________________________ To unsubscribe, edit your list preferences, or view the list archives, please visit: http://list.valvesoftware.com/mailman/listinfo/hlds

