I've got a report that my tool doesn't work on multihomed machines where
there is more then one server running on the same port but on different IPs.To
fix add the -b IPAddress argument to sudppipe2

I've updated the tool description page to reflect this.
http://www.wantedgov.it/page/62-srcds-query-cache/


On Sun, Sep 6, 2009 at 5:56 PM, Claudio Beretta
<[email protected]>wrote:

> try with this one
> http://www.wantedgov.it/gov/SrcdsQueryCache.7z?v2.1
> in the previous version i left uninitialized a variable that tracks
> time, so that might be the cause of you not seeing any forwarding.
> This version also fixes a minor logic bug, which could prevent the
> tool to reply to some T requests.
>
> On Sun, Sep 6, 2009 at 5:22 PM, Shizzle Nizzle<[email protected]> wrote:
> > just getting a bunch of T request nothing forwarded though.
> > server is actually running on port 27016
> > so my commandline is
> >  -X xx.xx.xx.xx 27016 27015
> >
> >
> > On Sun, Sep 6, 2009 at 10:10 AM, Claudio Beretta
> > <[email protected]>wrote:
> >
> >> no, the code that filters requests based on the source port is never
> >> executed when launching with the arguments specified on the tool page.
> >> The code that is executed is from line 419 ( if (len > 5) ) to line
> >> 496 ( c = check_sd(&peerl, 0); ). The other if / else branches are
> >> executed with other launch arguments. I just left it in since I'm
> >> lazy.
> >>
> >> Try running it without the -q argument (quiet), you should see something
> >> like
> >> - got a T request FROM 191.83.51.210:17073 (25 bytes)
> >> - forwarding request to 194.177.96.192:27300 (25 bytes)
> >> - done (25 bytes)
> >> - got a I reply FROM 194.177.96.192:27300 (84 bytes)
> >> - got a T request FROM 31.52.173.97:48316 (25 bytes)
> >> - replying from cache to 31.52.173.97:48316 (84 bytes)
> >> - reply from cache done (84 bytes)
> >> - got a T request FROM 89.32.56.194:14628 (25 bytes)
> >> - replying from cache to 89.32.56.194:14628 (84 bytes)
> >> - reply from cache done (84 bytes)
> >> - got a T request FROM 116.108.191.75:20483 (25 bytes)
> >> - replying from cache to 116.108.191.75:20483 (84 bytes)
> >> - reply from cache done (84 bytes)
> >> - got a T request FROM 35.38.228.9:9249 (25 bytes)
> >> - replying from cache to 35.38.228.9:9249 (84 bytes)
> >> - reply from cache done (84 bytes)
> >>
> >> getting something different?
> >>
> >> On Sun, Sep 6, 2009 at 4:38 PM, Shizzle Nizzle<[email protected]>
> wrote:
> >> > i wasnt able to get this to work on any of my servers. if i read the
> >> source
> >> > file correctly. if the src port isnt 27005/27006 it will drop them
> >> aswell? i
> >> > no some people who dont seem to use that port that is legit traffic
> would
> >> it
> >> > drop them too?
> >> >
> >> > On Sun, Sep 6, 2009 at 5:29 AM, Donnie Newlove <
> [email protected]
> >> >wrote:
> >> >
> >> >> >I know this isn't the most elegant solution, but windows firewall
> >> sucks,
> >> >> ipsec doesn't seem to allow fine grained filtering and I never coded
> MMS
> >> >> plugins before. This tool should be used only during attacks (since
> new
> >> >> players might add the server running on the new port to their
> >> favorites).
> >> >>
> >> >> Well, you could just change the port of the server and then let the
> >> >> query cache listen on that port and it would make no difference
> except
> >> >> you would have to take the server offline for a moment, but after
> that
> >> >> it would be business as usual.
> >> >>
> >> >> On Sun, Sep 6, 2009 at 10:35 AM, Claudio
> >> >> Beretta<[email protected]> wrote:
> >> >> > here it is
> >> >> > http://www.wantedgov.it/page/62-srcds-query-cache/
> >> >> >
> >> >> > more info on that page
> >> >> >
> >> >> >
> >> >> >
> >> >> > On Sun, Sep 6, 2009 at 12:44 AM, Claudio
> >> >> > Beretta<[email protected]> wrote:
> >> >> >> I'm doing it right now, should be ready tomorrow.
> >> >> >>
> >> >> >> On Sun, Sep 6, 2009 at 12:32 AM, Kenny Loggins<
> >> [email protected]>
> >> >> wrote:
> >> >> >>> I'm willing to pay someone to write a windows version of a query
> >> proxy.
> >> >> >>>
> >> >> >>> -----Original Message-----
> >> >> >>> From: [email protected]
> >> >> >>> [mailto:[email protected]] On Behalf Of Saul
> >> >> Rennison
> >> >> >>> Sent: Saturday, September 05, 2009 4:36 PM
> >> >> >>> To: Half-Life dedicated Win32 server mailing list
> >> >> >>> Subject: Re: [hlds] TF2 DDOS AS2_INFO attack
> >> >> >>>
> >> >> >>> This is why A2S_INFO requires a challenge :|
> >> >> >>>
> >> >> >>> Thanks,
> >> >> >>> - Saul.
> >> >> >>>
> >> >> >>>
> >> >> >>> 2009/9/5 Matt Stanton <[email protected]>
> >> >> >>>
> >> >> >>>> If these attacks are coming from ips that are outside of the
> range
> >> of
> >> >> >>>> your standard users' network range, then it's possible you could
> >> >> filter
> >> >> >>>> out requests from unallocated ip blocks and ip blocks from areas
> of
> >> >> the
> >> >> >>>> internet that are gnerally too far away to have decent latency
> on
> >> your
> >> >> >>>> server.  Unfortunately, this would mean building a database of
> ip
> >> >> blocks
> >> >> >>>> that are allocated to networks that are within a reasonable
> >> distance
> >> >> of
> >> >> >>>> your server's network and checking every A2S_INFO packet that
> comes
> >> in
> >> >> >>>> against this database, which would likely eat a decent amount of
> >> CPU.
> >> >> >>>>
> >> >> >>>> Nephyrin Zey wrote:
> >> >> >>>> > The bandwidth involved in this attack is tiny. The issue is
> srcds
> >> >> chokes
> >> >> >>>> > on large numbers of A2S_INFO packets, its not the traffic
> that's
> >> >> doing
> >> >> >>>> > machines in. I'd reckon a single residential connection could
> >> take
> >> >> down
> >> >> >>>> > a server this way. Once you fix the srcds issue, the problem
> >> stops.
> >> >> I
> >> >> >>>> > have a daemon that intercepts server queries and handles them
> >> >> itself.
> >> >> >>>> > It's currently handling this attacker hammering on two servers
> >> >> without
> >> >> >>>> > breaking 1% CPU or making a single-pixel dent in my bandwidth
> >> >> graphs,
> >> >> >>>> > and my tf2 servers continue to run just fine.
> >> >> >>>> >
> >>
> >> _______________________________________________
> >> To unsubscribe, edit your list preferences, or view the list archives,
> >> please visit:
> >> http://list.valvesoftware.com/mailman/listinfo/hlds
> >>
> > _______________________________________________
> > To unsubscribe, edit your list preferences, or view the list archives,
> please visit:
> > http://list.valvesoftware.com/mailman/listinfo/hlds
> >
>
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds

Reply via email to