I've also noticed UDP flooding with packets of length 28. This corresponds to the IP and UDP headers, but no (0-length) actual payload As flooding goes, it worked quite well, until I blocked it, at least
> -----Original Message----- > From: [email protected] [mailto:hlds_linux- > [email protected]] On Behalf Of Daniel Nilsson > Sent: 03 June 2010 11:22 > To: Half-Life dedicated Linux server mailing list > Subject: Re: [hlds_linux] Iptables Rule list > > This perhaps if noone has any better: > > > |iptables -N logattacker > $IPT -A INPUT -p udp -m udp --dport 27015 -m length --length 0:32 -j > logattacker > $IPT -A logattacker -j LOG --log-prefix "SRCDS:ATTACK: " > --log-ip-options -m limit --limit 2/sec > $IPT -A logattacker -j DROP| > > > > ///Daniel > > > > > > Philipp Reddigau skrev 2010-06-03 12:10: > > Hi, > > i was wondering about many new flood attacks to our CSS Servers > today. > > each 3rd time banning someone the server will be flooded... > > > > Have someone a list of iptables rules? > > > > best regards, > > Philipp > > > > > > > > _______________________________________________ > > To unsubscribe, edit your list preferences, or view the list > archives, please visit: > > http://list.valvesoftware.com/mailman/listinfo/hlds_linux > > > > _______________________________________________ > To unsubscribe, edit your list preferences, or view the list archives, > please visit: > http://list.valvesoftware.com/mailman/listinfo/hlds_linux _______________________________________________ To unsubscribe, edit your list preferences, or view the list archives, please visit: http://list.valvesoftware.com/mailman/listinfo/hlds_linux

