I did few tests using a TF2 Linux server:

a) The anti-spam protection from engine works: a client receives back only
one response every few seconds.
b) The source for "status" command, at least from SourceMod's point of view,
is always the server (client's index is always 0).

I connected two clients to a server and one executed a script with 457
status commands. The server and the second client were ok, but the one who
executed the script died with "send reliable stream overflow" error. For a
script with 456 status commands the client receives back one reply and
doesn't die.

Probably you have something that disables engine's protection. Try to remove
all plugins (metamod, sourcemod etc...) and see if the server is still
vulnerable. Then add back the plugins, one by one...

-----Original Message-----
From: hlds_linux-boun...@list.valvesoftware.com
[mailto:hlds_linux-boun...@list.valvesoftware.com] On Behalf Of Alvaro
Gutierrez Lorenzo
Sent: Wednesday, June 13, 2012 2:50 AM
To: Half-Life dedicated Linux server mailing list
Subject: Re: [hlds_linux] Overflow attack to Source servers

Sorry for the "double mail", I just though that if the fix for that 
removed the cooldown time for status, there would be no protection over 
this command, making possible this attack.
Invalid Protocol mentionned this protection on an earlier mail.

Is it a silly idea? I've never experienced such cooldown protection, 
that would explain why.


_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux

Reply via email to