I think i am experiencing the same thing atm - since yesterday evening
my server gets hits.

I used tcpdump and in my case they'Re flooding the 27015 with :

11:31:13.305474 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305476 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305479 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305481 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305484 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305525 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305528 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305530 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305532 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305534 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305537 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305539 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305541 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305568 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305571 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305573 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305575 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305578 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305580 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305582 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305584 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305626 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305629 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305631 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305633 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305635 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5
11:31:13.305637 IP 66-7-210-223.gamezservers.org.9355 >
my.server.hostename.27015: UDP, length 5

11:31:20.798319 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798351 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798354 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798356 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798358 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798360 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798362 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798364 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798367 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798401 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798404 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798410 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798413 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798415 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798417 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798420 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798422 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798424 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798427 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798504 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798507 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798509 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798511 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798513 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5
11:31:20.798515 IP 223.25.244.205.10101 > my.server.hostename.27015:
UDP, length 5

11:31:50.514987 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.514989 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.514992 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.514995 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.514997 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515000 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515003 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515046 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515049 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515051 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515053 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515056 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515059 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515061 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515064 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515067 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515069 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515083 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515086 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515088 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515091 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515094 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515096 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515128 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515131 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515133 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515136 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515138 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515140 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515142 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515145 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515147 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515149 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515152 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515155 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515157 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515160 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515163 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515169 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515172 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515175 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515178 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515273 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515276 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515279 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5
11:31:50.515282 IP cpe-75-186-43-2.cinci.res.rr.com.3074 >
my.server.hostename.27015: UDP, length 5

And so on - i tried with iptables-rules like:

iptables -I INPUT -p udp -m length --length 5 -j DROP
iptables -A INPUT -p udp -m length --length 5 -j DROP

But no luck :*(

Am 04.08.2012 04:50, schrieb LocalStrike | Live your game!:
> i read this from a forum and at this time we have the same situation here! 
> please we need a fix asap!
>
> --
>
> I am writing to inform you about a new very dangerous exploit in the HLDS 
> engine. Briefly, the exploit allows the attacker to send packets over every 
> hlds server to a predefined destination. This way all HLDS servers make an 
> unstoppable "botnet" which can attack the destination which is chosen.
>
> The attack originally started a month and a half ago in Bulgaria, and since 
> then many big server chains are attacked and still no solution is found. The 
> attack is so strong that even Internet Service Providers say that it harms 
> the connection of their users near the hlds server location.
>
> Explaination of the attack:
> We know that the attack is made through the UDP protocol from hundreds of 
> IPs that are real counter strike 1.6 servers (hlds). It comes from the 
> server port, and almost always hits port 27005.
> The most common length of the packets is 1400, but there are also less 
> packets with different length. However, there is no point in dropping the 
> packets with this length because the whole international and inbound 
> channels are filled and the server still cannot be reached.
> Also the HEX of the packets contains a part of the server configuration. 
> I've noticed a packet which HEX prints "You have been banned from this 
> server!". This makes me think that some bot connects to a chosen server and 
> makes the server send a UDP packet to the predefined destination.
>
> We've managed to log full information of the attack. I have 15 gigabytes of 
> logs with this attack which are made for only 10 minutes. I will attach a 
> short part of my logs, and some other logs from other server administrators 
> who have experienced the same attack.
>
> One of the server administrators says:
> "I am writing to say that I have received the same attack against my 
> machines and since I work as a system administrator in coorporate hosting 
> company, my machines are colocated in the company's server room, with this I 
> want to say that my resources are a lot bigger than my mate @talibana's and 
> I managed to localize the attack or at least I think so.
>
> The flood was directed to UDP port 27005, after a while the enourmous flood 
> managed to fill my international channel and I had to work jointly with our 
> ISP, after I asked them to block port 27005 only 4 ip addresses started to 
> show on my machine, 3 of which were Russian and 1 Greek, which didn't make a 
> lot of traffic or big number of packets, just to say they were "listening" 
> to the final point - my IP address. After I have blocked these IPs from the 
> routing machine (Gateway) the flood totally dissapeared."
> And also:
> "We talk about a vurnarability in the Engine, which allows the generation of 
> packets from unauthorized people, which are being sent where the 'bad guy' 
> wants."
>
> The above "story" was sent to Valve, with a view of finding a solution to 
> the problem. Since the attack reached its peak we can't just wait, watching 
> our servers getting ruined. I post this topic so that more experienced 
> people can say what they think and to figure out what kind of attack it is 
> together so that a fix could be implemented. You can dowload logs and other 
> things at the end of the post.
>
> I will update this post with the most recent information about the attack.
>
> A small discovery: A system administrator noticed that HLSW is receiving 
> exactly the same packets, as the flooder sends from other HL1 servers to the 
> "victim". This packet cotains information about the server vars and mod 
> information. We think that this is the same packet which can be send to 
> every server to request the info. (A2S_INFO) The question that appears is 
> how the attacker manages to request this information from the infected 
> servers and forward it to a specified ip adress?
>
> What we tried ?
> We tried to stop the international traffic which "solved" the problem with 
> 1400 length packets, but another flood appeared which attacks the server 
> ports (27015/6/7..):
>
> Logs and pics:
> A very short part of the flood attack (40 mb) - 
> http://www.multiupload.nl/7ECR925FM2
> Traffic extreme:
> http://desmond.imageshack.us/Himg228/scale...amp;res=landing
>
> I really hope that here we will find solution! If you have any questions I 
> will tell you what you want. 
>
>
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives, please 
> visit:
> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux
>


_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux

Reply via email to