Anyone know of any hardware solutions to this problem?

ClanAO.com

On Sep 5, 2009, at 8:09 PM, Kaspars <[email protected]> wrote:

> Actually I got inspired by the word "daemon" and I realized that the  
> key to
> the problem is a daemon... a proxy daemon... a caching proxy  
> daemon :) I
> didn't have much time to check the incoming packet pattern, however  
> I'm not
> sure that they all were 53 bytes long, actually the number was  
> something
> like 33 that showed up a LOT of times in iptables logs (but I might be
> wrong... and I'm sure the fault lies in drinking too much beer).
> Nevertheless I went for the 100% match with the -m string and it works
> really good. I'm having about 300r/s and I don't see any CPU usage  
> with this
> method. Anyways you are free to modify the source or iptables filter  
> command
> :)
>
> 2009/9/6 Nephyrin Zey <[email protected]>
>
>> As an alternative to using -m string, you can just filter length 53
>> packets - no packets aside from the query packet end up being that
>> length. Not super elegant, but a lot less overhead.
>>
>> And, as I said, my daemon works differently and could be used to  
>> easily
>> start thousands of fake servers on a single box, which would screw  
>> more
>> things over than it would help.
>>
>> - Neph
>>
>> On 09/05/2009 05:20 PM, Kaspars wrote:
>>> God dammit... this is really fucked up... sorry for my language, I  
>>> just
>> got
>>> too many beers today...
>>> Anyways, I just wanted to give something to the community as Neph  
>>> is not
>>> willing to do it. This will fix the ddos attack for *nix however  
>>> if you
>> are
>>> using it, I'm not giving any warranty :)
>>>
>>> Here goes:
>>> first, get the source and compile: http://www.gign.lv/tmp/test.c
>>> run it in the screen like ./test 21015 YOUR_EXTERNAL_TF2_SERVER_IP
>>> YOUR_SERVER_PORT
>>> 21015 is some random port for the udp proxy :) it must be opened in
>> firewall
>>>
>>> then some iptables magic:
>>> iptables -t nat -A PREROUTING -p udp -d YOUR_EXTERNAL_TF2_SERVER_IP
>> --dport
>>> YOUR_SERVER_PORT -m string --algo kmp --string 'TSource Engine  
>>> Query' -j
>>> REDIRECT --to-port 21015
>>>
>>> thats about it...
>>>
>>> 2009/9/6 Nephyrin Zey<[email protected]>
>>>
>>>
>>>> The problem with my solution is the daemon would be really really
>>>> abusive in the wrong hands. We dont need someone using it to easily
>>>> start 100 fake servers at 255/255 slots and polluting the server  
>>>> list.
>>>> It's not some super complex feat, but releasing an easy compiled
>>>> prepackaged version is just asking for it - and the real solution  
>>>> needs
>>>> to be valve. Plus, it's not very easy to configure and I'm not  
>>>> even sure
>>>> windows ipsec is capable of that level of packet interception.
>>>>
>>>> Something on the lines of tony's plugin would be a much better  
>>>> solution,
>>>> but you'll have to hound him about that
>>>>
>>>> - Neph
>>>>
>>>> On 09/05/2009 03:14 PM, Kenny Loggins wrote:
>>>>
>>>>> I don't think either you or Neph have released your plugins to the
>> public
>>>>>
>>>> so
>>>>
>>>>> this solution works great for you guys. Maybe we can have some  
>>>>> into or
>>>>> direction from you so the general public can do something about  
>>>>> this?
>>>>>
>>>>> As long as they get away with this it's going to keep happening  
>>>>> if a
>>>>>
>>>> plugin
>>>>
>>>>> was available to stop this it is not long "fun" or productive to  
>>>>> DOS
>>>>>
>>>> servers
>>>>
>>>>> anymore.
>>>>>
>>>>>
>>>>
>>>> _______________________________________________
>>>> To unsubscribe, edit your list preferences, or view the list  
>>>> archives,
>>>> please visit:
>>>> http://list.valvesoftware.com/mailman/listinfo/hlds
>>>>
>>>>
>>> _______________________________________________
>>> To unsubscribe, edit your list preferences, or view the list  
>>> archives,
>> please visit:
>>> http://list.valvesoftware.com/mailman/listinfo/hlds
>>>
>>
>>
>> _______________________________________________
>> To unsubscribe, edit your list preferences, or view the list  
>> archives,
>> please visit:
>> http://list.valvesoftware.com/mailman/listinfo/hlds
>>
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list  
> archives, please visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds


_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds

Reply via email to