On 2012-01-31 16:31, Michael Johansen wrote:
The rcon exploit is not being used here, and since I don't know so much about 
iptables I just left it open.

iptables -A INPUT -i eth0 -p tcp -d SERVERIP --dport 27015 -j DROP

Well, I've been reading a lot about this issue since no-body wants to help, and 
out of the threads i've read 28 and 46 are the most used sizes for these 
attacks.

iptables -A INPUT ! --fragment -p udp -d SERVERIP --dport 27015 -m u32 --u32 "0 >> 22 & 0x3C @ 8 = 0x33424521 && 0 >> 22 & 0x3C @ 12 = 0x6f647936" -j DROP iptables -A INPUT -p udp -d SERVERIP --dport 27015 -m length --length 28 -j DROP

this blocks one very specific program used to attack the servers - may not be necesary now but iptables should be able to drop them in less cpu cycles than srcds

_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux

Reply via email to