[cod] infostring exceeded

*DST* hurricane hurricane at devilssniperteam.com
Thu Aug 22 06:29:15 EDT 2013


Burgholte.de - Ing.-Büro für Informationstechnikagain about infostring :)

some updated information you ll find here 

Amplification DDoS Attack With Quake3 Servers: An Analysis

part 1

http://blog.alejandronolla.com/2013/06/24/amplification-ddos-attack-with-quake3-servers-an-analysis-1-slash-2/

part 2

http://blog.alejandronolla.com/2013/08/05/amplification-ddos-attack-with-quake3-servers-an-analysis-2-slash-2/#disqus_thread

thx fabrice for your fast answer

is there a similar patch / solution for cod2 or coduo ?

seems we got on some list of those DDoS Booters as we have a lot logged attacks since monday morning (2013-08-19).


greetz 

sven
  ----- Original Message ----- 
  From: Fabrice 
  To: Call of Duty server admin list. 
  Sent: Saturday, February 09, 2013 12:05 AM
  Subject: Re: [cod] infostring exceeded


  Le 08/02/2013 20:56, *DST* hurricane a écrit :

    Hello dear members of the icculus mailing list
    since our linux cod4 server has a brandnew mod and entered rank 133 on gametracker it gets more and more abused by getinfo attacks and oversized infostring shutdowns of 1025 byte long infostring packets

    this is a little outtake from our console.log


    Info string length exceeded
    key: 'hc'
    value: '1'
    Info string:
    \challenge\xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\protocol\6\hostname\^3Devils^1Sniper^3Team ^2Sniper ^1Hell\mapname\mp_tlotd_suez\clients\11\sv_maxclients\50\gametype\war\pure\1\game\mods/dst_ultimate_l2\ff\2




    shortly after those messages the servers crashes very often.

    is someone able to help on this issue ?

    at luigi auriemma i read about a patch for older cod to limit packets to 512 byte. 

    another solution would be to drop packages by firewall rule, but i have to say im not that skilled in developing a rule for it.

     thx a lot 


    sven


    : 
     

_______________________________________________
cod mailing list
cod at icculus.org
http://icculus.org/mailman/listinfo/cod
Hi
  Have a look here : 
  http://icculus.org/pipermail/cod/2011-August/015397.html

  and have a look at Boyd's solution :
  http://icculus.org/pipermail/cod/2012-April/016041.html

  Greets.



------------------------------------------------------------------------------


  _______________________________________________
  cod mailing list
  cod at icculus.org
  http://icculus.org/mailman/listinfo/cod
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://icculus.org/pipermail/cod/attachments/20130822/f6362566/attachment.html>


More information about the cod mailing list