Normally, the packets that are send in other byte sizes, because srcds can't handle those bytesizes (i think).
All the DoS-attacks i had used the packet size of either 24 or 46. I solved this by blocking this byte size on the port (27015). I haven't had any DoS'es since. Regards. Chris Sendt fra min iPhone 4 Den 05/01/2011 kl. 23.42 skrev Marco Padovan <evolutioncr...@gmail.com>: > I'm hosting many tf2 servers and lately we are getting a lot of denial of > services... > > basically we got our machservers spammed with query requests till the point > they time out (the machine is running properly, it's just the gameserver > slowly dieing) > > an effective way to stop this kind of behaviour is: > http://www.vanillatf2.org/2011/01/fighting-dos-attacks/ > > but that cannot be handled properly on boxes as busy as ours... > > basically with just little effort anybody is able to take down a single > gameserver spamming it with query requests :( > > What can we do to stop that? > Is there a decent plugin/official fix to get rid of this problem instead of > doing packet inspection via iptables on boxes handling 10000+ packets/second? > _______________________________________________ > To unsubscribe, edit your list preferences, or view the list archives, please > visit: > http://list.valvesoftware.com/mailman/listinfo/hlds_linux _______________________________________________ To unsubscribe, edit your list preferences, or view the list archives, please visit: http://list.valvesoftware.com/mailman/listinfo/hlds_linux