Please tell me you didn't waste US-CERT's time on this. I find that hard 
to believe and a really bad idea.  Although I bet they would get a huge 
laugh out of it.


GS wrote:
> Hi all,
>
> I'm a member of a gaming community that runs a few dozen TF2 and L4D
> servers.  Today one of our most popular TF2 servers was and continues to be
> attacked by someone who holds some unknown grudge against our community.
> This person has claimed credit for the attacks through a posting on our
> message board.
>
> It appears that the method which this attacker or group of attackers is
> using is limited to an in game exploit.  No other server instances, or other
> server services are affected other than a single game server using a single
> core of a quad core win32 server hosted in a datacenter.  Bandwidth use is
> normal during attacks.
>
> Are there any unpatched game exploits that anyone in the HLDS list community
> is aware of that can cause a server to increasingly lag up to the point of
> unplayability?  The effects are similar to previous exploits that Valve
> patched earlier this year.
>
> We have contacted our ISP, the ISP of the poster who took credit for the
> attack (a whois lookup appears to lead to a proxy server in Chicago, IL),
> and the US Dept of Homeland Security (US-CERT).  However we would like to be
> able to prevent these attacks as the investigation by the authorities
> progresses.
>
> If there are any suggestions, no matter how unlikely, we would be forever
> grateful for any help with this problem.
>
> Best Regards,
> Jason
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives, please 
> visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds
>
>   
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds

Reply via email to