This is pretty much useless.  Hundreds more people have this exploit and 
removing one form the pool really does nothing.

You can rcon without being connected to the server, so banning his 
steamid wont help.  It also looks like he has a dynamic IP which means 
banning his IP will stop him for ~day.

It would be better to intercept all his commands and report those.

[email protected] wrote:
> Hey Guys,
>
> I had a player who got offended for some unknown reason on our TF2 server
> and decided to crash it a few times for revenge. I thought I would throw
> his info out there in case anyone else wanted to ban him.
>
>
> Server logs
> ------------------------
> L 08/26/2009 - 17:08:39: rcon from "68.4.235.49:2781": Bad Password
> L 08/26/2009 - 17:08:39: rcon from "68.4.235.49:2781": Bad Password
> L 08/26/2009 - 17:08:39: rcon from "68.4.235.49:2781": Bad Password
> L 08/
> ------------------------
> Right before the fourth entry which is what i am guessing would be another
> bad rcon, the server crashed.
>
> Log entry from earlier in the day that matches the IP of the attacker.
> ------------------------
> L 08/26/2009 - 15:43:01: "doughboy [///_-]<569><STEAM_0:0:1783695><>"
> connected, address "68.4.235.49:27005"
> ------------------------
>
> http://www.noobsticks.com/home.php?pageid=lookup
>
> STEAM_0:0:1783695
>
> http://steamcommunity.com/profiles/76561197963833118
>
> Overall he was pretty sloppy about it.. but still managed to crash us
> twice before we noticed. I have since enabled the rcon min and max
> failures which I am hoping will deter this kind of attack in the future.
>
>
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives, please 
> visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds_linux
>   


_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux

Reply via email to