Are you sure it wasn't just the offending player spamming a sound over
voicechat?

It doesn't seem likely someone with rcon access would have to resort
to using the force benchmark exploit to crash it..

- Neph

On Tue, Apr 29, 2008 at 3:42 PM, James McKenna <[EMAIL PROTECTED]> wrote:
> Normally I'd assume that my rcon was compromised, change it, and move on. I
>  can't tell if this is related to the latest influx of exploits for source
>  games, but basically my community members informed me today that:
>
>  "Twice today The Tempest servers were flooded with Bot players. Everyone
>  would be recalled to their battlement resupply while these Bots (of the
>  opposing team) would kill them and a wav of "niggers" looped repeatedly.
>  Eventually the continuous stream of Bots hammering the server would cause it
>  to freeze/crash. Pretty annoying and it doesn't look good for the server
>  either. I'd think that a group using Tux the penguin (or some variation of
>  him) as their logo would be a little more concerned with server security. I
>  know you guys run this as a free service to other gamers etc., but I'm just
>  saying it how it is... it looks really bad on your part and discourages the
>  average player from using your servers or even considering donating."
>
>  Now this sounds like the benchmark exploit, but the looping wav sound
>  disturbs me. Even if the rcon was compromised, how would everyone be able to
>  hear a sound that we don't have on our servers? Unless it's been renamed
>  that is, but even then it would have to be on the http webserver, and it's
>  not.
>
>  Any ideas?
>  _______________________________________________
>  To unsubscribe, edit your list preferences, or view the list archives, 
> please visit:
>  http://list.valvesoftware.com/mailman/listinfo/hlds
>

_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds

Reply via email to