I've posted this here before, but as a reply to another thread, and maybe
because of that it was slightly ignored. But the problem happened again, so
I am bringing this back IN BIG BOLD LETTERS !

for the third time I've found that my hlds service coredumped without a
plausible reason.

I was at the server room showing things around to a friend of mine when I
noticed that the system kernel was reducing the response to net queries to
200 packets per second (bold letters on the console to show you that there
is something wrong). this only happens when there is something wrong.
Tipically a port scan or something alike.

The only "detail" is that this server is behind a firewall that masquerades
that server and reroutes (NATs) only the UDP/27015 traffic from the public
address to the HLDS dedicated server, that has a reserverd IP 10.x.y.z.

There is nobody else on the LAN, which means this is not an internal work.

A supposed general DoS attack would be affecting the firewall computer, and
not the HLDS machine behind it; In other words, the firewall computer
should be screaming about a DoS/portscan type attack, but it did not, while
the HLDS machine did.

As I see, this proves that the HLDS server is probably being attacked by
people that knows what they are doing. Whenever this happens (the kernel
message stating the reduction in the reply rate) my hlds process cores, and
a new server instance is brought up by the hlds_run script.

So far I was not able to reproduce it myself, but am looking for means to
do it.

I attempted using standard portscan programs on the server with
above-the-average solicitation rates, on the udp/27015 port only, and it
did not cause the problem.

The next logical step it submitting this to the group and asking for help.
If this turns out to be a problem/vulnerability (as I think it is) then
VALVe should be warned, so that this can be corrected on 1.6.

By now I will be reducing the reply rate from my server to the minimum
acceptable by the hlds server, so that I can assure playability and prompt
response from the outside world, hoping that this minimum, combined with
the OSs built in protections will stop this (net.inet.icmp.icmplim).



_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux

Reply via email to