We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author: @rafal1137 (RaFaL) Date: 2014-12-15 Redmine Issue: 728, https://dev.etlegacy.com/issues/728
It keep spamming server console or normal one depends which way you are hosting a server with this
/sv_protect 1 SVC_Status: rate limit from 178.32.41.213:2980 exceeded, dropping request SVC_Status: rate limit from 178.32.41.213:2980 exceeded, dropping request SVC_Status: rate limit from 178.32.41.213:2980 exceeded, dropping request SVC_Status: rate limit from 178.32.41.213:2980 exceeded, dropping request SVC_Status: rate limit from 178.32.41.213:2980 exceeded, dropping request SVC_Status: rate limit from 178.32.41.213:2980 exceeded, dropping request SVC_Status: rate limit from 178.32.41.213:2980 exceeded, dropping request .... ]\sv_protect 2 Possible DRDoS attack to address 178.32.41.213:2980, ignoring getinfo/getstatus connectionless packet Possible DRDoS attack to address 178.32.41.213:2980, ignoring getinfo/getstatus connectionless packet Possible DRDoS attack to address 178.32.41.213:2980, ignoring getinfo/getstatus connectionless packet Possible DRDoS attack to address 178.32.41.213:2980, ignoring getinfo/getstatus connectionless packet Possible DRDoS attack to address 178.32.41.213:2980, ignoring getinfo/getstatus connectionless packet ...
Related issue(s): #541
The text was updated successfully, but these errors were encountered:
From: @saukko28 (Saukko) Date: 2014-12-16T13:46:41Z
Can't reproduce. Possibly Windows 7 related issue again?
-*S
Sorry, something went wrong.
From: @rmarquis (Spyhawk) Date: 2014-12-16T19:16:29Z
Cannot reproduce either on Win7.
From: @IR4T4 (IR4T4) Date: 2014-12-16T20:07:01Z
Toggling both ways at runtime might cause side effects. sv_protect should be latched,
From: @rafal1137 (RaFaL) Date: 2014-12-17T16:25:00Z
Attack on my router caused it
From: @JanSimek (Radegast) Date: 2014-12-17T16:34:01Z
sv_protect is indeed broken. See #541
From: @IR4T4 (IR4T4) Date: 2014-12-17T16:39:39Z
In this case sv_protect did a good job. See affected port.
No branches or pull requests
Author: @rafal1137 (RaFaL)
Date: 2014-12-15
Redmine Issue: 728, https://dev.etlegacy.com/issues/728
It keep spamming server console or normal one depends which way you are hosting a server with this
/sv_protect 1
SVC_Status: rate limit from 178.32.41.213:2980 exceeded, dropping request
SVC_Status: rate limit from 178.32.41.213:2980 exceeded, dropping request
SVC_Status: rate limit from 178.32.41.213:2980 exceeded, dropping request
SVC_Status: rate limit from 178.32.41.213:2980 exceeded, dropping request
SVC_Status: rate limit from 178.32.41.213:2980 exceeded, dropping request
SVC_Status: rate limit from 178.32.41.213:2980 exceeded, dropping request
SVC_Status: rate limit from 178.32.41.213:2980 exceeded, dropping request
....
]\sv_protect 2
Possible DRDoS attack to address 178.32.41.213:2980, ignoring getinfo/getstatus connectionless packet
Possible DRDoS attack to address 178.32.41.213:2980, ignoring getinfo/getstatus connectionless packet
Possible DRDoS attack to address 178.32.41.213:2980, ignoring getinfo/getstatus connectionless packet
Possible DRDoS attack to address 178.32.41.213:2980, ignoring getinfo/getstatus connectionless packet
Possible DRDoS attack to address 178.32.41.213:2980, ignoring getinfo/getstatus connectionless packet
...
Related issue(s): #541
The text was updated successfully, but these errors were encountered: