i wasnt able to get this to work on any of my servers. if i read the source
file correctly. if the src port isnt 27005/27006 it will drop them aswell? i
no some people who dont seem to use that port that is legit traffic would it
drop them too?

On Sun, Sep 6, 2009 at 5:29 AM, Donnie Newlove <[email protected]>wrote:

> >I know this isn't the most elegant solution, but windows firewall sucks,
> ipsec doesn't seem to allow fine grained filtering and I never coded MMS
> plugins before. This tool should be used only during attacks (since new
> players might add the server running on the new port to their favorites).
>
> Well, you could just change the port of the server and then let the
> query cache listen on that port and it would make no difference except
> you would have to take the server offline for a moment, but after that
> it would be business as usual.
>
> On Sun, Sep 6, 2009 at 10:35 AM, Claudio
> Beretta<[email protected]> wrote:
> > here it is
> > http://www.wantedgov.it/page/62-srcds-query-cache/
> >
> > more info on that page
> >
> >
> >
> > On Sun, Sep 6, 2009 at 12:44 AM, Claudio
> > Beretta<[email protected]> wrote:
> >> I'm doing it right now, should be ready tomorrow.
> >>
> >> On Sun, Sep 6, 2009 at 12:32 AM, Kenny Loggins<[email protected]>
> wrote:
> >>> I'm willing to pay someone to write a windows version of a query proxy.
> >>>
> >>> -----Original Message-----
> >>> From: [email protected]
> >>> [mailto:[email protected]] On Behalf Of Saul
> Rennison
> >>> Sent: Saturday, September 05, 2009 4:36 PM
> >>> To: Half-Life dedicated Win32 server mailing list
> >>> Subject: Re: [hlds] TF2 DDOS AS2_INFO attack
> >>>
> >>> This is why A2S_INFO requires a challenge :|
> >>>
> >>> Thanks,
> >>> - Saul.
> >>>
> >>>
> >>> 2009/9/5 Matt Stanton <[email protected]>
> >>>
> >>>> If these attacks are coming from ips that are outside of the range of
> >>>> your standard users' network range, then it's possible you could
> filter
> >>>> out requests from unallocated ip blocks and ip blocks from areas of
> the
> >>>> internet that are gnerally too far away to have decent latency on your
> >>>> server.  Unfortunately, this would mean building a database of ip
> blocks
> >>>> that are allocated to networks that are within a reasonable distance
> of
> >>>> your server's network and checking every A2S_INFO packet that comes in
> >>>> against this database, which would likely eat a decent amount of CPU.
> >>>>
> >>>> Nephyrin Zey wrote:
> >>>> > The bandwidth involved in this attack is tiny. The issue is srcds
> chokes
> >>>> > on large numbers of A2S_INFO packets, its not the traffic that's
> doing
> >>>> > machines in. I'd reckon a single residential connection could take
> down
> >>>> > a server this way. Once you fix the srcds issue, the problem stops.
> I
> >>>> > have a daemon that intercepts server queries and handles them
> itself.
> >>>> > It's currently handling this attacker hammering on two servers
> without
> >>>> > breaking 1% CPU or making a single-pixel dent in my bandwidth
> graphs,
> >>>> > and my tf2 servers continue to run just fine.
> >>>> >
> >>>> > And if you actually examine the attack, it's very obviously a single
> >>>> > source with spoofed IPs. I rather doubt someone has a million-strong
> >>>> > botnet containing nearly 30% unallocated IP ranges, that all happen
> to
> >>>> > have the same exact path length.
> >>>> >
> >>>> > - Neph
> >>>> >
> >>>> > On 09/05/2009 12:50 PM, [email protected] wrote:
> >>>> >
> >>>> >> This... actually isn't a bad idea.  It's a pain to implement,
> though,
> >>>> for a
> >>>> >> couple of reasons.
> >>>> >>
> >>>> >> First, the assumption by most on this thread is that it's a single
> guy
> >>>> >> operating from a single (or just a handful) of computers.  They
> further
> >>>> >> assume that he's forging the source IP addresses so the requests
> look
> >>>> like
> >>>> >> they're coming from many many different machines.  If this is true,
> >>>> there's
> >>>> >> no way to trace or block him based upon the information included in
> the
> >>>> >> packets he's creating.  I think this assumption is wrong, as I'll
> >>>> explain
> >>>> >> below.
> >>>> >>
> >>>> >> Second, if this assumption is incorrect you need to find a way to
> >>>> identify
> >>>> >> each and every source and block them one at a time.  Netblocks are
> at
> >>>> best a
> >>>> >> crude measure which risks blocking many legitimate clients.  Such a
> >>>> process
> >>>> >> needs to be automated as much as possible or it's not effective.
> >>>> >>
> >>>> >> Now, why do I think that this is probably not coming from just a
> >>> handful
> >>>> of
> >>>> >> sources?  Simple.  DDoS stands for Distributed Denial of Service,
> after
> >>>> >> all.  Botnets are reaching incredible proportions.  It's easy to
> rent
> >>> as
> >>>> >> many as a quarter million compromised machines if you want to and
> you
> >>>> have
> >>>> >> the cash.
> >>>> >>
> >>>> >> Too cheap or too poor to rent someone else's network of infected
> PCs?
> >>>>  No
> >>>> >> problem.  Tools exist to build new malware and they're easy to come
> by
> >>>> if
> >>>> >> you're willing to start looking in the right places.  All you have
> to
> >>> do
> >>>> is
> >>>> >> build your bot code and figure out a way to get it loaded on 5,000,
> >>>> 10,000,
> >>>> >> or more PCs.  After that, DDoS to your heart's content.  Script
> kiddies
> >>>> do
> >>>> >> this _all_ _the_ _time_.
> >>>> >>
> >>>> >> So, when under attack your choices are:
> >>>> >>
> >>>> >> *  Wait it out.
> >>>> >>
> >>>> >> *  Work with your vendor to figure out a way block the attack in
> the
> >>>> first
> >>>> >> place.  (Valve, obviously, in this case.)
> >>>> >>
> >>>> >> *  Automate the process of identifying sources and filtering them
> out.
> >>>> >>
> >>>> >> *  Cry a lot.
> >>>> >>
> >>>> >> Generally, I settle for a combination of the first and second
> options.
> >>>>  If
> >>>> >> an attack gets bad enough, I work with my local ISP to implement
> the
> >>>> third.
> >>>> >> (My server is co-located in their datacenter and they're really
> good
> >>>> guys to
> >>>> >> work with.)  Generally, some combination of tcpwrapper, netfilter,
> and
> >>>> >> iptables will do the job on my Linux server.  Sometimes we find it
> >>>> easier to
> >>>> >> just block it at one of their routers so they don't have to deal
> with
> >>>> the
> >>>> >> traffic on their network.
> >>>> >>
> >>>> >> Every now and again, I find myself following the fourth option
> until I
> >>>> >> figure out what's going on and fall back on some combination of the
> >>>> first
> >>>> >> three options.  :-)
> >>>> >>
> >>>> >> HTH.
> >>>> >>
> >>>> >> =JpS=SgtRock
> >>>> >>
> >>>> >>
> >>>> >
> >>>> > _______________________________________________
> >>>> > To unsubscribe, edit your list preferences, or view the list
> archives,
> >>>> please visit:
> >>>> > http://list.valvesoftware.com/mailman/listinfo/hlds
> >>>> >
> >>>> >
> >>>>
> >>>>
> >>>> _______________________________________________
> >>>> To unsubscribe, edit your list preferences, or view the list archives,
> >>>> please visit:
> >>>> http://list.valvesoftware.com/mailman/listinfo/hlds
> >>>>
> >>> _______________________________________________
> >>> To unsubscribe, edit your list preferences, or view the list archives,
> >>> please visit:
> >>> http://list.valvesoftware.com/mailman/listinfo/hlds
> >>>
> >>>
> >>>
> >>> _______________________________________________
> >>> To unsubscribe, edit your list preferences, or view the list archives,
> please visit:
> >>> http://list.valvesoftware.com/mailman/listinfo/hlds
> >>>
> >>
> >
> > _______________________________________________
> > To unsubscribe, edit your list preferences, or view the list archives,
> please visit:
> > http://list.valvesoftware.com/mailman/listinfo/hlds
> >
>
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives,
> please visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds
>
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds

Reply via email to