-
Notifications
You must be signed in to change notification settings - Fork 167
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DdoS / Query Flood Waiting Reunion devs #427
Comments
|
It's unrelated to rehlds. Report to the reunion devs. Official topic. |
|
It's Ok. But the Secondary Problem? How can i kill oversize packet sending on rehlds without orpheu? I have a plugin for this attack. But that need orpheu... |
|
Plugin that you wrote is useless, you need to send the original Orpheu plugin source code. |
|
It's a simple dos attack maybe i have a problem without reunion. https://github.com/Arkshine/Orpheu/releases Here u can find the orpheu source code... |
|
I want plugin source code, not module. |
|
|
On GitHub you can edit and delete messages. |
|
Where can i contact with him fastest? |
|
@In-line can you rescript it for ReAPI until the ReUnion devs do something about it please? |
|
If you captured some UDP packets during attack using tcpdump then paste them here i'll be able to analyze them to help in this situation. And furthermore we can block data if it contains something like |
|
The method to punish NET Packet Spammers is easy and efficient. It will be good to be added in the engine with new cvar. For example |
|
We can add |
|
Will be better to add needed hookchains in ReAPI and to rewrite Arkshine's plugin, because i'm not very familiar |
|
Bump |
|
sv_rehlds_netpacket_spammer_punish |
|
It's useless to implement such protection in application layer, if the packet count is high enough the process will go 99% and freeze regardless of the implementation. If you have access to the OS and are on Linux, install CSF and add a port flood limit. (max 5 in 10 seconds with 10 second ban works fine for me, set only for UDP). CSF runs on iptables, but makes everything much easier and adds protection against lots of small crap automatically. @WPMGPRoSToTeMa please do so, it is useful for other cases as well |
|
ish12321, What works for me is to stick with good hosting provider that provide a UDP protection for games. Right now i'm using OVH and i never get attacks with them. I tried to block using IPTables but it's too late to handle the attack in most cases. I'm not sure if i simulate same packet as legit one, it will pass through OVH anit-ddos system or not. Soon i'll try this. Resellers: If you need cheap vps with OVH anti-ddos game: Extra-VM, Infinity-Hosting and you can search for more. If someone search for OVH anti-ddos game vps in asia read this: https://www.lowendtalk.com/discussion/124436/vps-with-anti-ddos-for-games-in-asia |
The Server is freezing because somebody flooding query... Reunion cant block all of attack... And the server cpu was going 100% How can i block Query Flood. Ip tables or plugin?
Second:
On normal hlds is fixed whit a simple plugin. But that plugin needed orpheu... No orpheu on rehlds.
This attack can be fixed a little plugin. But this plugin just checking the port connection... So when attack coming from another port can't block it.
#include amxmodx
public client_connect(id) {
new ip[32]; get_user_ip(id, ip, charsmax(ip), 0);
if(contain(ip, ":19") != -1) {
server_cmd("addip 0.0 ^"%s^", ip);
}
The text was updated successfully, but these errors were encountered: