<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <font size="-1"><font face="Verdana">The <br>
        <br>
      </font></font>"Chain already exists." error should appear...<br>
    <br>
    iptables --flush<br>
    <br>
    then run the script...<br>
    <br>
    eventually run all the rules one by one and see which one is giving
    you the error...<br>
    <br>
    you can monitor the number of blocked packets issuing:<br>
    <br>
    iptables -nvx -L QUERY-BLOCK<br>
    <br>
    and<br>
    <br>
    iptables -nvx -L QUERY-CHECK<br>
    <br>
    Il 23/02/2012 15:53, escapedturkey ha scritto:
    <blockquote
cite="mid:CALCvV0z_3_Mv5ybyYFtqXY4DKN6LLQY2FfeZg3RyPXpu975taQ@mail.gmail.com"
      type="cite"># These commands, for instance, would block external
      IPs that send queries <br>
      # at a rate of 2/second or higher:<br>
      # add a host to the banlist and then drop the packet.<br>
      /sbin/iptables -N QUERY-BLOCK<br>
      /sbin/iptables -A QUERY-BLOCK -m recent --set --name blocked-hosts
      -j DROP<br>
      # is this a query packet? if so, block commonly attacked ports
      outright,<br>
      # then see if it's a known attacking IP, then see if it is sending
      at a high<br>
      # rate and should be added to the list of known attacking IPs.<br>
      /sbin/iptables -N QUERY-CHECK<br>
      /sbin/iptables -A QUERY-CHECK -p udp -m string ! --string
      "getstatus" --algo bm --from 32 --to 41 -j RETURN<br>
      /sbin/iptables -A QUERY-CHECK -p udp --sport 0:1025 -j DROP<br>
      /sbin/iptables -A QUERY-CHECK -p udp --sport 3074 -j DROP<br>
      /sbin/iptables -A QUERY-CHECK -p udp --sport 7777 -j DROP<br>
      /sbin/iptables -A QUERY-CHECK -p udp --sport 27015:27100 -j DROP<br>
      /sbin/iptables -A QUERY-CHECK -p udp --sport 25200 -j DROP<br>
      /sbin/iptables -A QUERY-CHECK -p udp --sport 25565 -j DROP<br>
      # is it already blocked? continue blocking it and update the
      counter so it<br>
      # gets blocked for at least another 30 seconds.<br>
      /sbin/iptables -A QUERY-CHECK -m recent --update --name
      blocked-hosts --seconds 30 --hitcount 1 -j DROP<br>
      # check to see if it exceeds our rate threshold,<br>
      # and add it to the list if it does.<br>
      # /sbin/iptables -A QUERY-CHECK -m hashlimit --hashlimit-mode
      srcip --hashlimit-name getstatus --hashlimit-above 2/second -j
      QUERY-BLOCK<br>
      # CentOS 5 or CentOS 6 compatible<br>
      /sbin/iptables -A QUERY-CHECK -m hashlimit --hashlimit-mode srcip
      --hashlimit-name getstatus --hashlimit 2/s -j RETURN<br>
      /sbin/iptables -A QUERY-CHECK -j QUERY-BLOCK<br>
      # look at all the packets going to q3/cod*/et/etc servers <br>
      # /sbin/iptables -A INPUT -p udp --dport 27960:29000 -j
      QUERY-CHECK<br>
      <div>/sbin/iptables -A INPUT -p udp --dport 27000:30000 -j
        QUERY-CHECK<br>
      </div>
      <div><br>
      </div>
      <div> ./spamblock.bsh<br>
        iptables: Chain already exists.<br>
        iptables: Chain already exists.<br>
      </div>
      <div><br>
      </div>
      <div>iptables -L -n<br>
        Chain INPUT (policy ACCEPT)<br>
        target prot opt source destination<br>
        QUERY-CHECK udp -- <a moz-do-not-send="true"
          href="http://0.0.0.0/0">0.0.0.0/0</a> <a
          moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        udp dpts:27000:30000<br>
        <br>
        Chain FORWARD (policy ACCEPT)<br>
        target prot opt source destination<br>
        <br>
        Chain OUTPUT (policy ACCEPT)<br>
        target prot opt source destination<br>
        <br>
        Chain QUERY-BLOCK (1 references)<br>
        target prot opt source destination<br>
        DROP all -- <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        recent: SET name: blocked-hosts side: source<br>
        <br>
        Chain QUERY-CHECK (1 references)<br>
        target prot opt source destination<br>
        RETURN udp -- <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        STRING match !"getstatus" ALGO name bm FROM 32 TO 41<br>
        DROP udp -- <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        udp spts:0:1025<br>
        DROP udp -- <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        udp spt:3074<br>
        DROP udp -- <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        udp spt:7777<br>
        DROP udp -- <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        udp spts:27015:27100<br>
        DROP udp -- <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        udp spt:25200<br>
        DROP udp -- <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        udp spt:25565<br>
        DROP all -- <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        recent: UPDATE seconds: 30 hit_count: 1 name: blocked-hosts
        side: source<br>
        RETURN all -- <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        <a moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a>
        limit: up to 2/sec burst 5 mode srcip<br>
        QUERY-BLOCK all -- <a moz-do-not-send="true"
          href="http://0.0.0.0/0">0.0.0.0/0</a> <a
          moz-do-not-send="true" href="http://0.0.0.0/0">0.0.0.0/0</a><br>
      </div>
      <div><br>
      </div>
      <div>Should I be concerned with " iptables: Chain already
        exists."?&nbsp;</div>
      <br>
      <br>
      <div class="gmail_quote">On Thu, Feb 23, 2012 at 9:44 AM, Marco
        Padovan <span dir="ltr">&lt;<a moz-do-not-send="true"
            href="mailto:evcz@evcz.tk">evcz@evcz.tk</a>&gt;</span>
        wrote:<br>
        <blockquote class="gmail_quote" style="margin:0 0 0
          .8ex;border-left:1px #ccc solid;padding-left:1ex">
          <div bgcolor="#FFFFFF" text="#000000"> <font size="-1"><font
                face="Verdana">sure, do it :)</font></font><br>
            <br>
            Il 23/02/2012 15:44, escapedturkey ha scritto:
            <div>
              <div class="h5">
                <blockquote type="cite">
                  <div>I support most Q3 engine games. Some go beyond
                    the range specified in the original post.<br>
                  </div>
                  <div><br>
                  </div>
                  <div>Can I change:</div>
                  <div><br>
                  </div>
                  <div>iptables -A INPUT -p udp --dport 27960:29000 -j
                    QUERY-CHECK<br>
                  </div>
                  <div><br>
                  </div>
                  <div>To:</div>
                  <div><br>
                  </div>
                  <div>iptables -A INPUT -p udp --dport 27000:30000 -j
                    QUERY-CHECK<br>
                  </div>
                  <div><br>
                  </div>
                  <div>Or will that cause problems? </div>
                  <div><br>
                  </div>
                  <div>Ex: JK2 =28070 JA = 29070&nbsp;</div>
                  <br>
                  <div class="gmail_quote">On Thu, Feb 23, 2012 at 9:30
                    AM, Marco Padovan <span dir="ltr">&lt;<a
                        moz-do-not-send="true"
                        href="mailto:evcz@evcz.tk" target="_blank">evcz@evcz.tk</a>&gt;</span>
                    wrote:<br>
                    <blockquote class="gmail_quote" style="margin:0 0 0
                      .8ex;border-left:1px #ccc solid;padding-left:1ex">
                      <div bgcolor="#FFFFFF" text="#000000"> <font
                          size="-1"><font face="Verdana">Let us know if
                            that works ;)</font></font><br>
                        <br>
                        Il 23/02/2012 15:20, escapedturkey ha scritto:
                        <div>
                          <div>
                            <blockquote type="cite">Thank you. Much
                              appreciated. =)<br>
                              <br>
                              <div class="gmail_quote">On Thu, Feb 23,
                                2012 at 7:33 AM, Marco Padovan <span
                                  dir="ltr">&lt;<a
                                    moz-do-not-send="true"
                                    href="mailto:evcz@evcz.tk"
                                    target="_blank">evcz@evcz.tk</a>&gt;</span>
                                wrote:<br>
                                <blockquote class="gmail_quote"
                                  style="margin:0 0 0
                                  .8ex;border-left:1px #ccc
                                  solid;padding-left:1ex">
                                  <div bgcolor="#FFFFFF" text="#000000">
                                    <font size="-1"><font face="Verdana">Ehm,<br>
                                        nope :D<br>
                                        <br>
                                        You need all the lines John
                                        posted:<br>
                                        <br>
                                      </font></font><a
                                      moz-do-not-send="true"
                                      href="http://icculus.org/pipermail/cod/2012-January/015861.html"
                                      target="_blank">http://icculus.org/pipermail/cod/2012-January/015861.html</a><br>
                                    <br>
                                    To make it works in centos5 / 6
                                    change into that ruleset:
                                    <div><br>
                                      iptables -A QUERY-CHECK -m
                                      hashlimit --hashlimit-mode srcip
                                      --hashlimit-name getstatus
                                      --hashlimit-above 2/second -j
                                      QUERY-BLOCK<br>
                                      <font size="-1"><font
                                          face="Verdana"><br>
                                          in this way (two different
                                          lines):<br>
                                          iptables -A QUERY-CHECK -m
                                          hashlimit --hashlimit-mode
                                          srcip --hashlimit-name
                                          getstatus --hashlimit 2/s -j
                                          RETURN<br>
                                          iptables -A QUERY-CHECK -j
                                          QUERY-BLOCK<br>
                                        </font></font><br>
                                    </div>
                                    <font size="-1"><font face="Verdana">all
                                        the other rules should be kept
                                        as they are :)<br>
                                      </font></font><br>
                                    Il 23/02/2012 13:10, escapedturkey
                                    ha scritto:
                                    <div>
                                      <div>
                                        <blockquote type="cite">
                                          <div>Thank you. I missed those
                                            lines.<br>
                                          </div>
                                          <div><br>
                                          </div>
                                          <div>Here is what I have so
                                            far:</div>
                                          <div><br>
                                          </div>
                                          <div>/sbin/iptables -N
                                            QUERY-BLOCK<br>
                                            /sbin/iptables -A
                                            QUERY-BLOCK -m recent --set
                                            --name blocked-hosts -j DROP<br>
                                            /sbin/iptables -A
                                            QUERY-CHECK -m hashlimit
                                            --hashlimit-mode srcip
                                            --hashlimit-name getstatus
                                            --hashlimit 2/s -j RETURN<br>
                                            /sbin/iptables -A
                                            QUERY-CHECK -j QUERY-BLOCK</div>
                                          <div><br>
                                          </div>
                                          <div>Is this correct?&nbsp;</div>
                                          <div><br>
                                          </div>
                                          <div>Thank you again. =)</div>
                                          <br>
                                          <div class="gmail_quote">On
                                            Thu, Feb 23, 2012 at 5:32
                                            AM, Marco Padovan <span
                                              dir="ltr">&lt;<a
                                                moz-do-not-send="true"
                                                href="mailto:evcz@evcz.tk"
                                                target="_blank">evcz@evcz.tk</a>&gt;</span>
                                            wrote:<br>
                                            <blockquote
                                              class="gmail_quote"
                                              style="margin:0 0 0
                                              .8ex;border-left:1px #ccc
                                              solid;padding-left:1ex">
                                              <div bgcolor="#FFFFFF"
                                                text="#000000"> <font
                                                  size="-1"><font
                                                    face="Verdana">did
                                                    you issued all the
                                                    other commands?<br>
                                                    <br>
                                                    like:<br>
                                                    <br>
                                                  </font></font>
                                                <div>iptables -N
                                                  QUERY-BLOCK<br>
                                                  iptables -A
                                                  QUERY-BLOCK -m recent
                                                  --set --name
                                                  blocked-hosts -j DROP<br>
                                                  <br>
                                                </div>
                                                ?<br>
                                                <br>
                                                Il 23/02/2012 03:54,
                                                escapedturkey ha
                                                scritto:
                                                <div>
                                                  <div>
                                                    <blockquote
                                                      type="cite">
                                                      <div>iptables
                                                        v1.4.7: Couldn't
                                                        load target
                                                        `QUERY-BLOCK':/lib64/xtables/libipt_QUERY-BLOCK.so:
                                                        cannot open
                                                        shared object
                                                        file: No such
                                                        file or
                                                        directory<br>
                                                      </div>
                                                      <div><br>
                                                      </div>
                                                      <div>Any ideas?</div>
                                                      <br>
                                                      <br>
                                                      <div
                                                        class="gmail_quote">
                                                        On Wed, Feb 22,
                                                        2012 at 4:51 PM,
                                                        Marco Padovan <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:evcz@evcz.tk" target="_blank">evcz@evcz.tk</a>&gt;</span>
                                                        wrote:<br>
                                                        <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          <font
                                                          size="-1"><font
                                                          face="Verdana">on

                                                          centos5 and
                                                          centos6<br>
                                                          <br>
                                                          modifying this
                                                          line:<br>
                                                          </font></font>
                                                          <div>iptables
                                                          -A QUERY-CHECK
                                                          -m hashlimit
                                                          --hashlimit-mode
                                                          srcip
                                                          --hashlimit-name
                                                          getstatus
                                                          --hashlimit-above
                                                          2/second -j
                                                          QUERY-BLOCK<br>
                                                          </div>
                                                          <font
                                                          size="-1"><font
                                                          face="Verdana"><br>
                                                          in this way
                                                          (two different
                                                          lines):<br>
                                                          iptables -A
                                                          QUERY-CHECK -m
                                                          hashlimit
                                                          --hashlimit-mode
                                                          srcip
                                                          --hashlimit-name
                                                          getstatus
                                                          --hashlimit
                                                          2/s -j RETURN<br>
                                                          iptables -A
                                                          QUERY-CHECK -j
                                                          QUERY-BLOCK<br>
                                                          <br>
                                                          should mimic
                                                          the same
                                                          behaviour<br>
                                                          </font></font><br>
                                                          Il 22/02/2012
                                                          18:43, Geoff
                                                          Goas ha
                                                          scritto:
                                                          <div>
                                                          <div>
                                                          <blockquote
                                                          type="cite">Hi,<br>
                                                          <br>
                                                          On CentOS 5.5,
                                                          <i
                                                          style="font-family:courier
                                                          new,monospace">--hashlimit-above</i>
                                                          is not a valid
                                                          option for the
                                                          "hashlimit"
                                                          match. Which
                                                          version of
                                                          iptables
                                                          introduces
                                                          this, and how
                                                          can I mimic
                                                          that same
                                                          ruleset with
                                                          the options
                                                          available to
                                                          me in version
                                                          1.3.5 of
                                                          iptables?<br>
                                                          <br>
                                                          Thanks,<br>
                                                          <br>
                                                          <div
                                                          class="gmail_quote">On


                                                          Fri, Jan 20,
                                                          2012 at 7:51
                                                          PM, John <span
                                                          dir="ltr">&lt;<a
moz-do-not-send="true" href="mailto:lists.cod@nuclearfallout.net"
                                                          target="_blank">lists.cod@nuclearfallout.net</a>&gt;</span>
                                                          wrote:<br>
                                                          <blockquote
                                                          class="gmail_quote"
                                                          style="margin:0
                                                          0 0
                                                          .8ex;border-left:1px
                                                          #ccc
                                                          solid;padding-left:1ex">
                                                          <div
                                                          bgcolor="#FFFFFF"
                                                          text="#000000">
                                                          <div> On
                                                          1/20/2012 3:27
                                                          PM, Marco
                                                          Padovan wrote:
                                                          </div>
                                                          <blockquote
                                                          type="cite"><font
                                                          size="-1"><font
                                                          face="Verdana">
                                                          <div>I was
                                                          referring to
                                                          dynamic
                                                          filtering
                                                          using -m
                                                          recent<br>
                                                          <br>
                                                          </div>
                                                          [not] to
                                                          manually
                                                          adding IPs O.o</font></font></blockquote>
                                                          <br>
                                                          Marco's right
                                                          about this.
                                                          The most
                                                          effective way
                                                          to prevent
                                                          effects from
                                                          these attacks
                                                          on Linux is to
                                                          use a
                                                          combination of
                                                          the "string",
                                                          "hashlimit",
                                                          and "recent"
                                                          modules. Done
                                                          right, the
                                                          solution is
                                                          mostly
                                                          automatic, so
                                                          you shouldn't
                                                          need to
                                                          manually add
                                                          IPs.<br>
                                                          <br>
                                                          These
                                                          commands, for
                                                          instance,
                                                          would block
                                                          external IPs
                                                          that send
                                                          queries at a
                                                          rate of
                                                          2/second or
                                                          higher:<br>
                                                          <br>
                                                          # add a host
                                                          to the banlist
                                                          and then drop
                                                          the packet.<br>
                                                          iptables -N
                                                          QUERY-BLOCK<br>
                                                          iptables -A
                                                          QUERY-BLOCK -m
                                                          recent --set
                                                          --name
                                                          blocked-hosts
                                                          -j DROP<br>
                                                          <br>
                                                          # is this a
                                                          query packet?
                                                          if so, block
                                                          commonly
                                                          attacked ports
                                                          outright, <br>
                                                          # then see if
                                                          it's a known
                                                          attacking IP,
                                                          then see if it
                                                          is sending at
                                                          a high<br>
                                                          # rate and
                                                          should be
                                                          added to the
                                                          list of known
                                                          attacking IPs.<br>
                                                          iptables -N
                                                          QUERY-CHECK<br>
                                                          iptables -A
                                                          QUERY-CHECK -p
                                                          udp -m string
                                                          ! --string
                                                          "getstatus"
                                                          --algo bm
                                                          --from 32 --to
                                                          41 -j RETURN<br>
                                                          iptables -A
                                                          QUERY-CHECK -p
                                                          udp --sport
                                                          0:1025 -j DROP<br>
                                                          iptables -A
                                                          QUERY-CHECK -p
                                                          udp --sport
                                                          3074 -j DROP<br>
                                                          iptables -A
                                                          QUERY-CHECK -p
                                                          udp --sport
                                                          7777 -j DROP<br>
                                                          iptables -A
                                                          QUERY-CHECK -p
                                                          udp --sport
                                                          27015:27100 -j
                                                          DROP<br>
                                                          iptables -A
                                                          QUERY-CHECK -p
                                                          udp --sport
                                                          25200 -j DROP<br>
                                                          iptables -A
                                                          QUERY-CHECK -p
                                                          udp --sport
                                                          25565 -j DROP<br>
                                                          # is it
                                                          already
                                                          blocked?
                                                          continue
                                                          blocking it
                                                          and update the
                                                          counter so it<br>
                                                          # gets blocked
                                                          for at least
                                                          another 30
                                                          seconds.<br>
                                                          iptables -A
                                                          QUERY-CHECK -m
                                                          recent
                                                          --update
                                                          --name
                                                          blocked-hosts
                                                          --seconds 30
                                                          --hitcount 1
                                                          -j DROP<br>
                                                          # check to see
                                                          if it exceeds
                                                          our rate
                                                          threshold,<br>
                                                          # and add it
                                                          to the list if
                                                          it does.<br>
                                                          iptables -A
                                                          QUERY-CHECK -m
                                                          hashlimit
                                                          --hashlimit-mode
                                                          srcip
                                                          --hashlimit-name
                                                          getstatus
                                                          --hashlimit-above
                                                          2/second -j
                                                          QUERY-BLOCK<br>
                                                          <br>
                                                          # look at all
                                                          the packets
                                                          going to
                                                          q3/cod*/et/etc
                                                          servers<br>
                                                          iptables -A
                                                          INPUT -p udp
                                                          --dport
                                                          27960:29000 -j
                                                          QUERY-CHECK<br>
                                                          <br>
                                                          The "recent"
                                                          module makes
                                                          it possible to
                                                          block up to
                                                          100 IPs at
                                                          once with this
                                                          method (any
                                                          attackers
                                                          beyond this
                                                          would only be
                                                          rate-limited).
                                                          That number
                                                          can be raised
                                                          when the
                                                          module is
                                                          loaded, but I
                                                          haven't seen
                                                          100 attacks
                                                          happening at
                                                          once yet
                                                          (typically
                                                          it's maybe
                                                          5-20 at once).
                                                          You can see
                                                          blocked hosts
                                                          later by
                                                          looking at
                                                          /proc/net/xt_recent/blocked-hosts.<br>
                                                          <br>
                                                          (If you don't
                                                          have "recent",
                                                          you could get
                                                          away without
                                                          it -- just be
                                                          aware that
                                                          some of the
                                                          packets will
                                                          get through,
                                                          increasing
                                                          load on the
                                                          game server.
                                                          Without
                                                          "hashlimit",
                                                          you'd still
                                                          see an
                                                          advantage from
                                                          the port
                                                          checks, but
                                                          you'd need to
                                                          manually block
                                                          IPs that are
                                                          being hit on
                                                          other ports.
                                                          Without
                                                          "string",
                                                          you'd
                                                          similarly be
                                                          down to just
                                                          port checks,
                                                          and need to
                                                          take out the
                                                          other rules.)<span><font
color="#888888"><br>
                                                          <br>
                                                          -John<br>
                                                          </font></span></div>
                                                          <br>
_______________________________________________<br>
                                                          cod mailing
                                                          list<br>
                                                          <a
                                                          moz-do-not-send="true"
href="mailto:cod@icculus.org" target="_blank">cod@icculus.org</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://icculus.org/mailman/listinfo/cod" target="_blank">http://icculus.org/mailman/listinfo/cod</a><br>
                                                          <br>
                                                          </blockquote>
                                                          </div>
                                                          <br>
                                                          <br
                                                          clear="all">
                                                          <br>
                                                          -- <br>
                                                          <i><b><font
                                                          size="1"><span
style="font-family:tahoma,sans-serif">Geoff Goas</span><br
                                                          style="font-family:tahoma,sans-serif">
                                                          <span
                                                          style="font-family:tahoma,sans-serif">Systems




                                                          Engineer</span></font></b></i><br>
                                                          <br>
                                                          <br>
                                                          <br>
                                                          <pre>_______________________________________________
cod mailing list
<a moz-do-not-send="true" href="mailto:cod@icculus.org" target="_blank">cod@icculus.org</a>
<a moz-do-not-send="true" href="http://icculus.org/mailman/listinfo/cod" target="_blank">http://icculus.org/mailman/listinfo/cod</a>
</pre>
                                                          </blockquote>
                                                          </div>
                                                          </div>
                                                          </div>
                                                          <br>
_______________________________________________<br>
                                                          cod mailing
                                                          list<br>
                                                          <a
                                                          moz-do-not-send="true"
href="mailto:cod@icculus.org" target="_blank">cod@icculus.org</a><br>
                                                          <a
                                                          moz-do-not-send="true"
href="http://icculus.org/mailman/listinfo/cod" target="_blank">http://icculus.org/mailman/listinfo/cod</a><br>
                                                          <br>
                                                        </blockquote>
                                                      </div>
                                                      <br>
                                                      <br clear="all">
                                                      <br>
                                                      -- <br>
                                                      <div>EscapedTurkey.com
                                                        Billing and
                                                        Support<br>
                                                      </div>
                                                      <div><a
                                                          moz-do-not-send="true"
href="https://www.escapedturkey.com/helpdesk" target="_blank">https://www.escapedturkey.com/helpdesk</a></div>
                                                      <br>
                                                      <br>
                                                      <br>
                                                      <pre>_______________________________________________
cod mailing list
<a moz-do-not-send="true" href="mailto:cod@icculus.org" target="_blank">cod@icculus.org</a>
<a moz-do-not-send="true" href="http://icculus.org/mailman/listinfo/cod" target="_blank">http://icculus.org/mailman/listinfo/cod</a>
</pre>
                                                    </blockquote>
                                                  </div>
                                                </div>
                                              </div>
                                              <br>
_______________________________________________<br>
                                              cod mailing list<br>
                                              <a moz-do-not-send="true"
href="mailto:cod@icculus.org" target="_blank">cod@icculus.org</a><br>
                                              <a moz-do-not-send="true"
href="http://icculus.org/mailman/listinfo/cod" target="_blank">http://icculus.org/mailman/listinfo/cod</a><br>
                                              <br>
                                            </blockquote>
                                          </div>
                                          <br>
                                          <br clear="all">
                                          <br>
                                          -- <br>
                                          <div>EscapedTurkey.com Billing
                                            and Support<br>
                                          </div>
                                          <div><a moz-do-not-send="true"
href="https://www.escapedturkey.com/helpdesk" target="_blank">https://www.escapedturkey.com/helpdesk</a></div>
                                          <br>
                                          <br>
                                          <br>
                                          <pre>_______________________________________________
cod mailing list
<a moz-do-not-send="true" href="mailto:cod@icculus.org" target="_blank">cod@icculus.org</a>
<a moz-do-not-send="true" href="http://icculus.org/mailman/listinfo/cod" target="_blank">http://icculus.org/mailman/listinfo/cod</a>
</pre>
                                        </blockquote>
                                      </div>
                                    </div>
                                  </div>
                                  <br>
_______________________________________________<br>
                                  cod mailing list<br>
                                  <a moz-do-not-send="true"
                                    href="mailto:cod@icculus.org"
                                    target="_blank">cod@icculus.org</a><br>
                                  <a moz-do-not-send="true"
                                    href="http://icculus.org/mailman/listinfo/cod"
                                    target="_blank">http://icculus.org/mailman/listinfo/cod</a><br>
                                  <br>
                                </blockquote>
                              </div>
                              <br>
                              <br clear="all">
                              <br>
                              -- <br>
                              <div>EscapedTurkey.com Billing and Support<br>
                              </div>
                              <div><a moz-do-not-send="true"
                                  href="https://www.escapedturkey.com/helpdesk"
                                  target="_blank">https://www.escapedturkey.com/helpdesk</a></div>
                              <br>
                              <br>
                              <br>
                              <pre>_______________________________________________
cod mailing list
<a moz-do-not-send="true" href="mailto:cod@icculus.org" target="_blank">cod@icculus.org</a>
<a moz-do-not-send="true" href="http://icculus.org/mailman/listinfo/cod" target="_blank">http://icculus.org/mailman/listinfo/cod</a>
</pre>
                            </blockquote>
                          </div>
                        </div>
                      </div>
                      <br>
                      _______________________________________________<br>
                      cod mailing list<br>
                      <a moz-do-not-send="true"
                        href="mailto:cod@icculus.org" target="_blank">cod@icculus.org</a><br>
                      <a moz-do-not-send="true"
                        href="http://icculus.org/mailman/listinfo/cod"
                        target="_blank">http://icculus.org/mailman/listinfo/cod</a><br>
                      <br>
                    </blockquote>
                  </div>
                  <br>
                  <br clear="all">
                  <br>
                  -- <br>
                  <div>EscapedTurkey.com Billing and Support<br>
                  </div>
                  <div><a moz-do-not-send="true"
                      href="https://www.escapedturkey.com/helpdesk"
                      target="_blank">https://www.escapedturkey.com/helpdesk</a></div>
                  <br>
                  <br>
                  <br>
                  <pre>_______________________________________________
cod mailing list
<a moz-do-not-send="true" href="mailto:cod@icculus.org" target="_blank">cod@icculus.org</a>
<a moz-do-not-send="true" href="http://icculus.org/mailman/listinfo/cod" target="_blank">http://icculus.org/mailman/listinfo/cod</a>
</pre>
                </blockquote>
              </div>
            </div>
          </div>
          <br>
          _______________________________________________<br>
          cod mailing list<br>
          <a moz-do-not-send="true" href="mailto:cod@icculus.org">cod@icculus.org</a><br>
          <a moz-do-not-send="true"
            href="http://icculus.org/mailman/listinfo/cod"
            target="_blank">http://icculus.org/mailman/listinfo/cod</a><br>
          <br>
        </blockquote>
      </div>
      <br>
      <br clear="all">
      <br>
      -- <br>
      <div>EscapedTurkey.com Billing and Support<br>
      </div>
      <div><a moz-do-not-send="true"
          href="https://www.escapedturkey.com/helpdesk" target="_blank">https://www.escapedturkey.com/helpdesk</a></div>
      <br>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
cod mailing list
<a class="moz-txt-link-abbreviated" href="mailto:cod@icculus.org">cod@icculus.org</a>
<a class="moz-txt-link-freetext" href="http://icculus.org/mailman/listinfo/cod">http://icculus.org/mailman/listinfo/cod</a>
</pre>
    </blockquote>
  </body>
</html>