Thanks a lot. I'm going to try it! :)

> Date: Tue, 31 Jan 2012 16:46:43 +0100
> From: [email protected]
> To: [email protected]
> Subject: Re: [hlds_linux] No Steam Logon - massive lag
> 
> On 2012-01-31 16:31, Michael Johansen wrote:
> > The rcon exploit is not being used here, and since I don't know so much 
> > about iptables I just left it open.
> 
> iptables -A INPUT -i eth0 -p tcp -d SERVERIP --dport 27015 -j DROP
> 
> > Well, I've been reading a lot about this issue since no-body wants to help, 
> > and out of the threads i've read 28 and 46 are the most used sizes for 
> > these attacks.
> 
> iptables -A INPUT ! --fragment -p udp -d SERVERIP --dport 27015 -m u32 
> --u32 "0 >> 22 & 0x3C @ 8 = 0x33424521 && 0 >> 22 & 0x3C @ 12 = 
> 0x6f647936" -j DROP
> iptables -A INPUT -p udp -d SERVERIP --dport 27015 -m length --length 28 
> -j DROP
> 
> this blocks one very specific program used to attack the servers - may 
> not be necesary now but iptables should be able to drop them in less cpu 
> cycles than srcds
> 
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives, please 
> visit:
> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux
                                          
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux

Reply via email to