Please tell me you didn't waste US-CERT's time on this. I find that hard to believe and a really bad idea. Although I bet they would get a huge laugh out of it.
GS wrote: > Hi all, > > I'm a member of a gaming community that runs a few dozen TF2 and L4D > servers. Today one of our most popular TF2 servers was and continues to be > attacked by someone who holds some unknown grudge against our community. > This person has claimed credit for the attacks through a posting on our > message board. > > It appears that the method which this attacker or group of attackers is > using is limited to an in game exploit. No other server instances, or other > server services are affected other than a single game server using a single > core of a quad core win32 server hosted in a datacenter. Bandwidth use is > normal during attacks. > > Are there any unpatched game exploits that anyone in the HLDS list community > is aware of that can cause a server to increasingly lag up to the point of > unplayability? The effects are similar to previous exploits that Valve > patched earlier this year. > > We have contacted our ISP, the ISP of the poster who took credit for the > attack (a whois lookup appears to lead to a proxy server in Chicago, IL), > and the US Dept of Homeland Security (US-CERT). However we would like to be > able to prevent these attacks as the investigation by the authorities > progresses. > > If there are any suggestions, no matter how unlikely, we would be forever > grateful for any help with this problem. > > Best Regards, > Jason > _______________________________________________ > To unsubscribe, edit your list preferences, or view the list archives, please > visit: > http://list.valvesoftware.com/mailman/listinfo/hlds > > _______________________________________________ To unsubscribe, edit your list preferences, or view the list archives, please visit: http://list.valvesoftware.com/mailman/listinfo/hlds

