By the way, I forgot to mention what does this *fix* do... this is a simple
UDP proxy that caches a request, so if you have 300 request/second, it will
just query the server once in a five seconds and give back to the client
cached data.

2009/9/6 Kaspars <[email protected]>

> God dammit... this is really fucked up... sorry for my language, I just got
> too many beers today...
> Anyways, I just wanted to give something to the community as Neph is not
> willing to do it. This will fix the ddos attack for *nix however if you are
> using it, I'm not giving any warranty :)
>
> Here goes:
> first, get the source and compile: http://www.gign.lv/tmp/test.c
> run it in the screen like ./test 21015 YOUR_EXTERNAL_TF2_SERVER_IP
> YOUR_SERVER_PORT
> 21015 is some random port for the udp proxy :) it must be opened in
> firewall
>
> then some iptables magic:
> iptables -t nat -A PREROUTING -p udp -d YOUR_EXTERNAL_TF2_SERVER_IP --dport
> YOUR_SERVER_PORT -m string --algo kmp --string 'TSource Engine Query' -j
> REDIRECT --to-port 21015
>
> thats about it...
>
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds

Reply via email to