just getting a bunch of T request nothing forwarded though. server is actually running on port 27016 so my commandline is -X xx.xx.xx.xx 27016 27015
On Sun, Sep 6, 2009 at 10:10 AM, Claudio Beretta <[email protected]>wrote: > no, the code that filters requests based on the source port is never > executed when launching with the arguments specified on the tool page. > The code that is executed is from line 419 ( if (len > 5) ) to line > 496 ( c = check_sd(&peerl, 0); ). The other if / else branches are > executed with other launch arguments. I just left it in since I'm > lazy. > > Try running it without the -q argument (quiet), you should see something > like > - got a T request FROM 191.83.51.210:17073 (25 bytes) > - forwarding request to 194.177.96.192:27300 (25 bytes) > - done (25 bytes) > - got a I reply FROM 194.177.96.192:27300 (84 bytes) > - got a T request FROM 31.52.173.97:48316 (25 bytes) > - replying from cache to 31.52.173.97:48316 (84 bytes) > - reply from cache done (84 bytes) > - got a T request FROM 89.32.56.194:14628 (25 bytes) > - replying from cache to 89.32.56.194:14628 (84 bytes) > - reply from cache done (84 bytes) > - got a T request FROM 116.108.191.75:20483 (25 bytes) > - replying from cache to 116.108.191.75:20483 (84 bytes) > - reply from cache done (84 bytes) > - got a T request FROM 35.38.228.9:9249 (25 bytes) > - replying from cache to 35.38.228.9:9249 (84 bytes) > - reply from cache done (84 bytes) > > getting something different? > > On Sun, Sep 6, 2009 at 4:38 PM, Shizzle Nizzle<[email protected]> wrote: > > i wasnt able to get this to work on any of my servers. if i read the > source > > file correctly. if the src port isnt 27005/27006 it will drop them > aswell? i > > no some people who dont seem to use that port that is legit traffic would > it > > drop them too? > > > > On Sun, Sep 6, 2009 at 5:29 AM, Donnie Newlove <[email protected] > >wrote: > > > >> >I know this isn't the most elegant solution, but windows firewall > sucks, > >> ipsec doesn't seem to allow fine grained filtering and I never coded MMS > >> plugins before. This tool should be used only during attacks (since new > >> players might add the server running on the new port to their > favorites). > >> > >> Well, you could just change the port of the server and then let the > >> query cache listen on that port and it would make no difference except > >> you would have to take the server offline for a moment, but after that > >> it would be business as usual. > >> > >> On Sun, Sep 6, 2009 at 10:35 AM, Claudio > >> Beretta<[email protected]> wrote: > >> > here it is > >> > http://www.wantedgov.it/page/62-srcds-query-cache/ > >> > > >> > more info on that page > >> > > >> > > >> > > >> > On Sun, Sep 6, 2009 at 12:44 AM, Claudio > >> > Beretta<[email protected]> wrote: > >> >> I'm doing it right now, should be ready tomorrow. > >> >> > >> >> On Sun, Sep 6, 2009 at 12:32 AM, Kenny Loggins< > [email protected]> > >> wrote: > >> >>> I'm willing to pay someone to write a windows version of a query > proxy. > >> >>> > >> >>> -----Original Message----- > >> >>> From: [email protected] > >> >>> [mailto:[email protected]] On Behalf Of Saul > >> Rennison > >> >>> Sent: Saturday, September 05, 2009 4:36 PM > >> >>> To: Half-Life dedicated Win32 server mailing list > >> >>> Subject: Re: [hlds] TF2 DDOS AS2_INFO attack > >> >>> > >> >>> This is why A2S_INFO requires a challenge :| > >> >>> > >> >>> Thanks, > >> >>> - Saul. > >> >>> > >> >>> > >> >>> 2009/9/5 Matt Stanton <[email protected]> > >> >>> > >> >>>> If these attacks are coming from ips that are outside of the range > of > >> >>>> your standard users' network range, then it's possible you could > >> filter > >> >>>> out requests from unallocated ip blocks and ip blocks from areas of > >> the > >> >>>> internet that are gnerally too far away to have decent latency on > your > >> >>>> server. Unfortunately, this would mean building a database of ip > >> blocks > >> >>>> that are allocated to networks that are within a reasonable > distance > >> of > >> >>>> your server's network and checking every A2S_INFO packet that comes > in > >> >>>> against this database, which would likely eat a decent amount of > CPU. > >> >>>> > >> >>>> Nephyrin Zey wrote: > >> >>>> > The bandwidth involved in this attack is tiny. The issue is srcds > >> chokes > >> >>>> > on large numbers of A2S_INFO packets, its not the traffic that's > >> doing > >> >>>> > machines in. I'd reckon a single residential connection could > take > >> down > >> >>>> > a server this way. Once you fix the srcds issue, the problem > stops. > >> I > >> >>>> > have a daemon that intercepts server queries and handles them > >> itself. > >> >>>> > It's currently handling this attacker hammering on two servers > >> without > >> >>>> > breaking 1% CPU or making a single-pixel dent in my bandwidth > >> graphs, > >> >>>> > and my tf2 servers continue to run just fine. > >> >>>> > > > _______________________________________________ > To unsubscribe, edit your list preferences, or view the list archives, > please visit: > http://list.valvesoftware.com/mailman/listinfo/hlds > _______________________________________________ To unsubscribe, edit your list preferences, or view the list archives, please visit: http://list.valvesoftware.com/mailman/listinfo/hlds

