I've also noticed UDP flooding with packets of length 28.
This corresponds to the IP and UDP headers, but no (0-length) actual payload
As flooding goes, it worked quite well, until I blocked it, at least

> -----Original Message-----
> From: [email protected] [mailto:hlds_linux-
> [email protected]] On Behalf Of Daniel Nilsson
> Sent: 03 June 2010 11:22
> To: Half-Life dedicated Linux server mailing list
> Subject: Re: [hlds_linux] Iptables Rule list
> 
> This perhaps if noone has any better:
> 
> 
> |iptables -N logattacker
> $IPT -A INPUT -p udp -m udp --dport 27015 -m length --length 0:32 -j
> logattacker
> $IPT -A logattacker -j LOG --log-prefix "SRCDS:ATTACK: "
> --log-ip-options -m limit --limit 2/sec
> $IPT -A logattacker -j DROP|
> 
> 
> 
> ///Daniel
> 
> 
> 
> 
> 
> Philipp Reddigau skrev 2010-06-03 12:10:
> > Hi,
> > i was wondering about many new flood attacks to our CSS Servers
> today.
> > each 3rd time banning someone the server will be flooded...
> >
> > Have someone a list of iptables rules?
> >
> > best regards,
> > Philipp
> >
> >
> >
> > _______________________________________________
> > To unsubscribe, edit your list preferences, or view the list
> archives, please visit:
> > http://list.valvesoftware.com/mailman/listinfo/hlds_linux
> >
> 
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives,
> please visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds_linux


_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux

Reply via email to