My guess is the person that is doing the attack is on this reading the little 
discussion. :p

Sent from my iPhone 4

On Jan 6, 2011, at 7:47 AM, frostschutz <[email protected]> wrote:

> On Thu, Jan 06, 2011 at 04:16:23PM +0100, Marco Padovan wrote:
>> as suspected that appear to keep a single bucket and allowing 20/sec on 
>> the whole server... not on every single port :(
> 
> Yes, it's a single bucket. Does it really have to be per server? 
> I'd just use a sane value for limit and a large burst here (1000), 
> so short spikes will work but continuous DoS won't.
> 
> After all even if just one gameserver gets DoSed, in the end 
> it's the whole server that has to cope with the network and CPU. 
> And as long as there is no DoS it will work normally, even 
> with just one bucket.
> 
> Of course you could still add a separate bucket for each port 
> in the querylimit chain (no need for a drop rule for each port, 
> just put a single drop rule at the end). But if you do that 
> you'll likely run into performance problems again.
> 
> So I think single bucket is preferable.
> 
> Also consider combining this with fail2ban or similar, 
> so you can block IPs who are spamming you completely. 
> This will ease load both on your server, and the bucket.
> 
> Regards
> frostschutz
> 
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives, please 
> visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds_linux

_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux

Reply via email to