In case you indeed use Windows, you can use IPSec to block packets from selected IPs. It is possible to write a server plugin that automatically adds an IP filter using the netsh tool when there is a flood coming from a certain IP. A seperate tool would run daily to remove any expired filters (usually a blocking for 24 hours is sufficient). I built such a system but actually for the zero-length packet exploit - I never had issues with people spamming the info query. But I have no idea what the effect would be at such high data rates. The good thing is, as soon as someone starts flooding you, the server will appear dead to them for the next 24 hours, so the attackers might actually think the server has crashed and move on or celebrate their success.

----- Original Message ----- From: "Adam Piatek" <[email protected]>
To: <[email protected]>
Sent: Thursday, November 04, 2010 03:12
Subject: [hlds] TSource Engine Query Issue


Hello all,


With regards to this thread:
http://list.valvesoftware.com/mailman/private/hlds/2010-October/067454.html

We have seen a very massive increase in attacks lately due to this, pretty
much random servers on random days. The spoofed attacks are coming at about
2.5-3.5mbps constant for periods of 10-72 hours in the form of the TSource
Engine Query packet to destination ips.   So far none of the available
plugins/patches or addons can seem to mitigate this issue. All have been
tested multiple times.

We maintain popular public servers, and obviously this is malicious in
nature and kills the server immediately. Has anyone found a decent solution
to this issue?  If not...keeping light on the subject as it is still an
ongoing problem.

Thanks!
--
Adam N Piatek
https://www.GaloreGameServers.Com
[email protected]
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please visit:
http://list.valvesoftware.com/mailman/listinfo/hlds




_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds

Reply via email to