On Tue, 14 Jan 2003, Capriotti wrote:

> I've posted this here before, but as a reply to another thread, and maybe
> because of that it was slightly ignored. But the problem happened again, so
> I am bringing this back IN BIG BOLD LETTERS !
>
> for the third time I've found that my hlds service coredumped without a
> plausible reason.
>
> I was at the server room showing things around to a friend of mine when I
> noticed that the system kernel was reducing the response to net queries to
> 200 packets per second (bold letters on the console to show you that there
> is something wrong). this only happens when there is something wrong.
> Tipically a port scan or something alike.
>
> The only "detail" is that this server is behind a firewall that masquerades
> that server and reroutes (NATs) only the UDP/27015 traffic from the public
> address to the HLDS dedicated server, that has a reserverd IP 10.x.y.z.
>
> There is nobody else on the LAN, which means this is not an internal work.
>
> A supposed general DoS attack would be affecting the firewall computer, and
> not the HLDS machine behind it; In other words, the firewall computer
> should be screaming about a DoS/portscan type attack, but it did not, while
> the HLDS machine did.
>
> As I see, this proves that the HLDS server is probably being attacked by
> people that knows what they are doing. Whenever this happens (the kernel
> message stating the reduction in the reply rate) my hlds process cores, and
> a new server instance is brought up by the hlds_run script.
>
> So far I was not able to reproduce it myself, but am looking for means to
> do it.
>
> I attempted using standard portscan programs on the server with
> above-the-average solicitation rates, on the udp/27015 port only, and it
> did not cause the problem.
>
> The next logical step it submitting this to the group and asking for help.
> If this turns out to be a problem/vulnerability (as I think it is) then
> VALVe should be warned, so that this can be corrected on 1.6.
>
> By now I will be reducing the reply rate from my server to the minimum
> acceptable by the hlds server, so that I can assure playability and prompt
> response from the outside world, hoping that this minimum, combined with
> the OSs built in protections will stop this (net.inet.icmp.icmplim).
>

Could this be coused by disconnecting users or if the port suddenly is
unavailable for a second?

If you want to reprocuce it... have a full server.. and press crtl-c in
the hlds console.. you will see the same result.. at least you get it if
the server is on a "real" network...

could it be that the NAT or firewall is suddenly unavailable, the server
tries to send all the data and gets a lot of icmp-hostunreach?

!!! log everything that the kern.* and security.* is reporting !!!
the limit responce is logged in kern.*

Jan  4 20:22:21 myhost /kernel: Limiting icmp unreach response from 54 to 20 packets 
per second

/Bjorn

Favourite Comment:
Programming is an art form that fights back.

_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux

Reply via email to