You should use the "rcon lock" sourcemod plugin
http://forums.alliedmods.net/showthread.php?t=93934
and ensure that sv_rcon_minfailures and sv_rcon_maxfailures are set to very
high values (check your config).

Another alternative is to block the 27015 tcp port (assuming your gameserver
is run on that port).



On Fri, Jan 22, 2010 at 7:09 AM, <[email protected]> wrote:

> Hello,
>
> we have an big problem on our DOD:S Gameserver.
> Someone attack our Server with "rcon hacking attempts" (thats in the
> screenlog)
>
> rcon from "91.148.94.233:51401": Bad Password
> Banning 91.148.94.233 for rcon hacking attempts
> L 01/22/2010 - 03:51:02: Addip: "<><><>" was banned by IP "for 20000000.00
> minutes" by "Console" (IP "91.148.94.233")
> Banning 91.148.94.233 for rcon hacking attempts
> L 01/22/2010 - 03:51:02: Addip: "<><><>" was banned by IP "for 20000000.00
> minutes" by "Console" (IP "91.148.94.233")
> ./srcds_run: line 335: 14016 Speicherzugriffsfehler  $HL_CMD
> Add "-debug" to the ./srcds_run command line to generate a debug.log to
> help with solving this problem
> Fr 22. Jan 03:51:02 CET 2010: Server restart in 10 seconds
>
>
>
> Know Valve that there is an exploit like that and do they something ?  ?
> Or what can we do ?
> The Ip from where the attacks come, are every time an other IP. We think
> they use the "TOR Project"
>
> And no, it is NO RAM Failure... When the Server runs on an other Port, then
> there are no attacks :(
>
> I hope someone can help me
>
>
> --
> Jetzt kostenlos herunterladen: Internet Explorer 8 und Mozilla Firefox 3.5
> -
> sicherer, schneller und einfacher! http://portal.gmx.net/de/go/chbrowser
>
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives,
> please visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds_linux
>
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux

Reply via email to