thanks a lot claudio if this fixes the problem. you will be for sure handsomely rewarded :)
On Sat, Sep 5, 2009 at 5:44 PM, Claudio Beretta <[email protected]>wrote: > I'm doing it right now, should be ready tomorrow. > > On Sun, Sep 6, 2009 at 12:32 AM, Kenny Loggins<[email protected]> > wrote: > > I'm willing to pay someone to write a windows version of a query proxy. > > > > -----Original Message----- > > From: [email protected] > > [mailto:[email protected]] On Behalf Of Saul Rennison > > Sent: Saturday, September 05, 2009 4:36 PM > > To: Half-Life dedicated Win32 server mailing list > > Subject: Re: [hlds] TF2 DDOS AS2_INFO attack > > > > This is why A2S_INFO requires a challenge :| > > > > Thanks, > > - Saul. > > > > > > 2009/9/5 Matt Stanton <[email protected]> > > > >> If these attacks are coming from ips that are outside of the range of > >> your standard users' network range, then it's possible you could filter > >> out requests from unallocated ip blocks and ip blocks from areas of the > >> internet that are gnerally too far away to have decent latency on your > >> server. Unfortunately, this would mean building a database of ip blocks > >> that are allocated to networks that are within a reasonable distance of > >> your server's network and checking every A2S_INFO packet that comes in > >> against this database, which would likely eat a decent amount of CPU. > >> > >> Nephyrin Zey wrote: > >> > The bandwidth involved in this attack is tiny. The issue is srcds > chokes > >> > on large numbers of A2S_INFO packets, its not the traffic that's doing > >> > machines in. I'd reckon a single residential connection could take > down > >> > a server this way. Once you fix the srcds issue, the problem stops. I > >> > have a daemon that intercepts server queries and handles them itself. > >> > It's currently handling this attacker hammering on two servers without > >> > breaking 1% CPU or making a single-pixel dent in my bandwidth graphs, > >> > and my tf2 servers continue to run just fine. > >> > > >> > And if you actually examine the attack, it's very obviously a single > >> > source with spoofed IPs. I rather doubt someone has a million-strong > >> > botnet containing nearly 30% unallocated IP ranges, that all happen to > >> > have the same exact path length. > >> > > >> > - Neph > >> > > >> > On 09/05/2009 12:50 PM, [email protected] wrote: > >> > > >> >> This... actually isn't a bad idea. It's a pain to implement, though, > >> for a > >> >> couple of reasons. > >> >> > >> >> First, the assumption by most on this thread is that it's a single > guy > >> >> operating from a single (or just a handful) of computers. They > further > >> >> assume that he's forging the source IP addresses so the requests look > >> like > >> >> they're coming from many many different machines. If this is true, > >> there's > >> >> no way to trace or block him based upon the information included in > the > >> >> packets he's creating. I think this assumption is wrong, as I'll > >> explain > >> >> below. > >> >> > >> >> Second, if this assumption is incorrect you need to find a way to > >> identify > >> >> each and every source and block them one at a time. Netblocks are at > >> best a > >> >> crude measure which risks blocking many legitimate clients. Such a > >> process > >> >> needs to be automated as much as possible or it's not effective. > >> >> > >> >> Now, why do I think that this is probably not coming from just a > > handful > >> of > >> >> sources? Simple. DDoS stands for Distributed Denial of Service, > after > >> >> all. Botnets are reaching incredible proportions. It's easy to rent > > as > >> >> many as a quarter million compromised machines if you want to and you > >> have > >> >> the cash. > >> >> > >> >> Too cheap or too poor to rent someone else's network of infected PCs? > >> No > >> >> problem. Tools exist to build new malware and they're easy to come > by > >> if > >> >> you're willing to start looking in the right places. All you have to > > do > >> is > >> >> build your bot code and figure out a way to get it loaded on 5,000, > >> 10,000, > >> >> or more PCs. After that, DDoS to your heart's content. Script > kiddies > >> do > >> >> this _all_ _the_ _time_. > >> >> > >> >> So, when under attack your choices are: > >> >> > >> >> * Wait it out. > >> >> > >> >> * Work with your vendor to figure out a way block the attack in the > >> first > >> >> place. (Valve, obviously, in this case.) > >> >> > >> >> * Automate the process of identifying sources and filtering them > out. > >> >> > >> >> * Cry a lot. > >> >> > >> >> Generally, I settle for a combination of the first and second > options. > >> If > >> >> an attack gets bad enough, I work with my local ISP to implement the > >> third. > >> >> (My server is co-located in their datacenter and they're really good > >> guys to > >> >> work with.) Generally, some combination of tcpwrapper, netfilter, > and > >> >> iptables will do the job on my Linux server. Sometimes we find it > >> easier to > >> >> just block it at one of their routers so they don't have to deal with > >> the > >> >> traffic on their network. > >> >> > >> >> Every now and again, I find myself following the fourth option until > I > >> >> figure out what's going on and fall back on some combination of the > >> first > >> >> three options. :-) > >> >> > >> >> HTH. > >> >> > >> >> =JpS=SgtRock > >> >> > >> >> > >> > > >> > _______________________________________________ > >> > To unsubscribe, edit your list preferences, or view the list archives, > >> please visit: > >> > http://list.valvesoftware.com/mailman/listinfo/hlds > >> > > >> > > >> > >> > >> _______________________________________________ > >> To unsubscribe, edit your list preferences, or view the list archives, > >> please visit: > >> http://list.valvesoftware.com/mailman/listinfo/hlds > >> > > _______________________________________________ > > To unsubscribe, edit your list preferences, or view the list archives, > > please visit: > > http://list.valvesoftware.com/mailman/listinfo/hlds > > > > > > > > _______________________________________________ > > To unsubscribe, edit your list preferences, or view the list archives, > please visit: > > http://list.valvesoftware.com/mailman/listinfo/hlds > > > > _______________________________________________ > To unsubscribe, edit your list preferences, or view the list archives, > please visit: > http://list.valvesoftware.com/mailman/listinfo/hlds > _______________________________________________ To unsubscribe, edit your list preferences, or view the list archives, please visit: http://list.valvesoftware.com/mailman/listinfo/hlds

