Well, thank you friends!

Ics - you helped a lot to find the source utility.

Now I'm trying to create iptables rules, and wrote this:

=================================================
# DROP and ban
    iptables -N REJECT_RCON_FLOOD
    iptables -A REJECT_RCON_FLOOD -j LOG --log-prefix 'IPTABLES-RCON-FLOOD:'
--log-level info
    iptables -A REJECT_RCON_FLOOD -j DROP

    iptables -A INPUT -p tcp --dport 27000:28900 -m connlimit
--connlimit-above 1 --connlimit-mask 32 -j REJECT_RCON_FLOOD
    iptables -A INPUT -p tcp --dport 27000:28900 -m hashlimit
--hashlimit-upto 1/sec \
        --hashlimit-burst 1 --hashlimit-mode srcip,dstip,dstport
--hashlimit-name rcon_flood \
        --hashlimit-htable-gcinterval 30000 -j ACCEPT
    iptables -A INPUT -p tcp --dport 27000:28900 -j REJECT_RCON_FLOOD

=================================================

One by one, as I thought, that is:
1) DROP more then one connections to SRCDS TCP: that is lowering an attack
very much
2) ACCEPT only one packet in second
3) DROP more then one packet

So the problem is that packets are not droped. And I'm really confused. I
really do not understand why. Just like the rule wont work at all!

I can't block rcon at all. So the only way is to limit connections and ban
the source ip of an attacker.

Ideas?

2011/10/18 <[email protected]>

> Looks much like some-prog-that-i-wont-say-out-loud-from-4chan-sute
> output, with just modified message. Looks like idiots have found it and
> started using it.
>
> -ics
>
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux

Reply via email to