[cod] infostring exceeded
*DST* hurricane
hurricane at devilssniperteam.com
Thu Aug 22 06:29:15 EDT 2013
Burgholte.de - Ing.-Büro für Informationstechnikagain about infostring :)
some updated information you ll find here
Amplification DDoS Attack With Quake3 Servers: An Analysis
part 1
http://blog.alejandronolla.com/2013/06/24/amplification-ddos-attack-with-quake3-servers-an-analysis-1-slash-2/
part 2
http://blog.alejandronolla.com/2013/08/05/amplification-ddos-attack-with-quake3-servers-an-analysis-2-slash-2/#disqus_thread
thx fabrice for your fast answer
is there a similar patch / solution for cod2 or coduo ?
seems we got on some list of those DDoS Booters as we have a lot logged attacks since monday morning (2013-08-19).
greetz
sven
----- Original Message -----
From: Fabrice
To: Call of Duty server admin list.
Sent: Saturday, February 09, 2013 12:05 AM
Subject: Re: [cod] infostring exceeded
Le 08/02/2013 20:56, *DST* hurricane a écrit :
Hello dear members of the icculus mailing list
since our linux cod4 server has a brandnew mod and entered rank 133 on gametracker it gets more and more abused by getinfo attacks and oversized infostring shutdowns of 1025 byte long infostring packets
this is a little outtake from our console.log
Info string length exceeded
key: 'hc'
value: '1'
Info string:
\challenge\xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\protocol\6\hostname\^3Devils^1Sniper^3Team ^2Sniper ^1Hell\mapname\mp_tlotd_suez\clients\11\sv_maxclients\50\gametype\war\pure\1\game\mods/dst_ultimate_l2\ff\2
shortly after those messages the servers crashes very often.
is someone able to help on this issue ?
at luigi auriemma i read about a patch for older cod to limit packets to 512 byte.
another solution would be to drop packages by firewall rule, but i have to say im not that skilled in developing a rule for it.
thx a lot
sven
:
_______________________________________________
cod mailing list
cod at icculus.org
http://icculus.org/mailman/listinfo/cod
Hi
Have a look here :
http://icculus.org/pipermail/cod/2011-August/015397.html
and have a look at Boyd's solution :
http://icculus.org/pipermail/cod/2012-April/016041.html
Greets.
------------------------------------------------------------------------------
_______________________________________________
cod mailing list
cod at icculus.org
http://icculus.org/mailman/listinfo/cod
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://icculus.org/pipermail/cod/attachments/20130822/f6362566/attachment.html>
More information about the cod
mailing list