By the way, I forgot to mention what does this *fix* do... this is a simple UDP proxy that caches a request, so if you have 300 request/second, it will just query the server once in a five seconds and give back to the client cached data.
2009/9/6 Kaspars <[email protected]> > God dammit... this is really fucked up... sorry for my language, I just got > too many beers today... > Anyways, I just wanted to give something to the community as Neph is not > willing to do it. This will fix the ddos attack for *nix however if you are > using it, I'm not giving any warranty :) > > Here goes: > first, get the source and compile: http://www.gign.lv/tmp/test.c > run it in the screen like ./test 21015 YOUR_EXTERNAL_TF2_SERVER_IP > YOUR_SERVER_PORT > 21015 is some random port for the udp proxy :) it must be opened in > firewall > > then some iptables magic: > iptables -t nat -A PREROUTING -p udp -d YOUR_EXTERNAL_TF2_SERVER_IP --dport > YOUR_SERVER_PORT -m string --algo kmp --string 'TSource Engine Query' -j > REDIRECT --to-port 21015 > > thats about it... > _______________________________________________ To unsubscribe, edit your list preferences, or view the list archives, please visit: http://list.valvesoftware.com/mailman/listinfo/hlds

