[cod] infostring exceeded

escapedturkey escapedturkey at escapedturkey.com
Fri Aug 23 14:33:48 EDT 2013


A good article. Thank you for sharing!

We are taking steps toward a prevention via the OpenJK and ioQuake3
projects. Unfortunately, since COD is not open source, there isn't
much you can do outside of firewall tweaks or insufficient patches.

On Thu, Aug 22, 2013 at 3:29 AM, *DST* hurricane
<hurricane at devilssniperteam.com> wrote:
> again about infostring :)
>
> some updated information you ll find here
>
> Amplification DDoS Attack With Quake3 Servers: An Analysis
>
> part 1
>
> http://blog.alejandronolla.com/2013/06/24/amplification-ddos-attack-with-quake3-servers-an-analysis-1-slash-2/
>
> part 2
>
> http://blog.alejandronolla.com/2013/08/05/amplification-ddos-attack-with-quake3-servers-an-analysis-2-slash-2/#disqus_thread
>
> thx fabrice for your fast answer
>
> is there a similar patch / solution for cod2 or coduo ?
>
> seems we got on some list of those DDoS Booters as we have a lot logged
> attacks since monday morning (2013-08-19).
>
>
> greetz
>
> sven
>
> ----- Original Message -----
> From: Fabrice
> To: Call of Duty server admin list.
> Sent: Saturday, February 09, 2013 12:05 AM
> Subject: Re: [cod] infostring exceeded
>
> Le 08/02/2013 20:56, *DST* hurricane a écrit :
>
> Hello dear members of the icculus mailing list
>
> since our linux cod4 server has a brandnew mod and entered rank 133 on
> gametracker it gets more and more abused by getinfo attacks and oversized
> infostring shutdowns of 1025 byte long infostring packets
>
> this is a little outtake from our console.log
>
>
> Info string length exceeded
> key: 'hc'
> value: '1'
> Info string:
> \challenge\xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\protocol\6\hostname\^3Devils^1Sniper^3Team
> ^2Sniper
> ^1Hell\mapname\mp_tlotd_suez\clients\11\sv_maxclients\50\gametype\war\pure\1\game\mods/dst_ultimate_l2\ff\2
>
>
>
> shortly after those messages the servers crashes very often.
>
> is someone able to help on this issue ?
>
> at luigi auriemma i read about a patch for older cod to limit packets to 512
> byte.
>
> another solution would be to drop packages by firewall rule, but i have to
> say im not that skilled in developing a rule for it.
>
>  thx a lot
>
> sven
>
> :
>
> _______________________________________________
> cod mailing list
> cod at icculus.org
> http://icculus.org/mailman/listinfo/cod
>
> Hi
> Have a look here :
> http://icculus.org/pipermail/cod/2011-August/015397.html
>
> and have a look at Boyd's solution :
> http://icculus.org/pipermail/cod/2012-April/016041.html
>
> Greets.
>
> ________________________________
>
> _______________________________________________
> cod mailing list
> cod at icculus.org
> http://icculus.org/mailman/listinfo/cod
>
>
> _______________________________________________
> cod mailing list
> cod at icculus.org
> http://icculus.org/mailman/listinfo/cod
>



-- 
EscapedTurkey.com Billing and Support
https://www.escapedturkey.com/helpdesk


More information about the cod mailing list