Re: [hlds_linux] LOIC and UDP flood. How to protect?

2012-04-04 Thread Tyler Davies
How are you able to tell you're being attacked? I have a feeling my servers are being attacked as well, but I'm not sure how to be sure. On Tue, Apr 3, 2012 at 2:34 PM, Mihály Rácz racz...@gmail.com wrote: Hi. Its maybe helpfull. http://www.wolffiles.de/index.php?forum-showposts-44-p1#131

Re: [hlds_linux] LOIC and UDP flood. How to protect?

2012-04-04 Thread Emil Larsson
Severeal ways, unuseal high ingoing bandwidth usage, extreme server lag and/or flood of repetive/strange packets (use a packet analyzer/sniffer like Ethereal). A few years ago I identified someone DOS'ing our servers by simple looking for strange packets (the old but now fixed zero data exploit).

Re: [hlds_linux] LOIC and UDP flood. How to protect?

2012-04-04 Thread Erik-jan Riemers
I think what people would want is a simple and effective tool to check it in a easy way. Sure you can check your bandwith and see more incoming, but what then? What would a person do to identify the ip or packets to quickly diagnose and block that person. Usually by the time i want to investigate

Re: [hlds_linux] LOIC and UDP flood. How to protect?

2012-04-04 Thread Andrew DeMerse
You can use tcpdump or Wireshark to identify extraneous traffic. It can be a bit complicated if you don't have any guidance, though. Just look for a lot of traffic that isn't coming from your typical client port (27005). On Wed, Apr 4, 2012 at 12:20 PM, Erik-jan Riemers riem...@binkey.nl wrote:

[hlds_linux] Mandatory Nuclear Dawn Update Released

2012-04-04 Thread Nicholas Hastings
We've released a mandatory update to Nuclear Dawn. The notes for the ND Update 6.2a are below. Nuclear Dawn Update 6.2a Balance changes - Reworked ammo pack earned xp to not be based on actual ammo amount, unfairly weighting some weapons. - Research in-progress when last armory is

Re: [hlds_linux] How to crash everyone on a TF2 Server the simple way

2012-04-04 Thread Tony Paloma
Yes, if anybody has details in regards to how this exploit is performed, please reply directly to me (to...@valvesoftware.com). Thanks, Tony -Original Message- From: hlds_linux-boun...@list.valvesoftware.com [mailto:hlds_linux-boun...@list.valvesoftware.com] On Behalf Of dan Sent: