New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Message spamming in console #247
Comments
Flood packets. Server on Linux? firewall (iptables) has access to? |
Linux: CentOS release 6.8 (Final) Yes, i have access to the firewall |
I think we should move all messages of this sort to debugged printf ( |
// add rules iptables iptables -A INPUT -p udp -m udp --dport 27015 -m state --state ESTABLISHED -j ACCEPT |
Why only up to 250? |
Because the "new" requests valid to such threshold |
Really? It's a dump of valid client connection: |
…for flood (related to dreamstalker#247) Added player name and print to client for some net messages (not for all, need finish this in future) echo -> svc_print
В данном скрине, соединение попадет на 1 правило, так как у него состояние "ESTABLISHED", потому что до этого был пакет "NEW" длинной в "51" с содержанием "get challenge steam" после и поменялось состояние соединения на "ESTABLISHED". Вообще для клиента тут валидное значение длинны для пакетов "new" 51 (getchallenge steam P.s пересмотрел логи, правило которое дропает пакет "NEW" длинной выше "150" за 2 года ни разу не сработало. |
Great, thanks. |
I have this spamming all over the console:
What could be the reason?
The text was updated successfully, but these errors were encountered: