[cod] ServerArk: A UDP flood attack analyzer and adaptive blocker for gaming servers
Mavrick
mavrick.master at gmail.com
Tue Mar 13 10:50:23 EDT 2012
This is the output:
[root at game1 source]# iptables -L -v -n
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
707 47868 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT all -- lo * 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp dpt:22
40044 1881K REJECT all -- * * 0.0.0.0/0
0.0.0.0/0 reject-with icmp-host-prohibited
0 0 LIMITSTAT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:27960:28980 STRING match "getstatus" ALGO
name bm FROM 32 TO 33
0 0 LIMITINFO udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:27960:28980 STRING match "getinfo" ALGO
name bm FROM 32 TO 33
0 0 LIMITCHLG udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:27960:28980 STRING match "getchallenge"
ALGO name bm FROM 32 TO 33
0 0 LIMITCONN udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:27960:28980 STRING match "connect" ALGO
name bm FROM 32 TO 33
0 0 LIMITPLRS udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:27960:28980
0 0 LIMITPLRS udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:25565
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:25565
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 REJECT all -- * * 0.0.0.0/0
0.0.0.0/0 reject-with icmp-host-prohibited
Chain OUTPUT (policy ACCEPT 332 packets, 72567 bytes)
pkts bytes target prot opt in out source
destination
Chain LIMITCHLG (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 limit: avg 5/sec burst 5
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0
Chain LIMITCONN (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 limit: avg 5/sec burst 5
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0
Chain LIMITINFO (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 limit: avg 10/sec burst 10
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0
Chain LIMITPLRS (2 references)
pkts bytes target prot opt in out source
destination
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 limit: above 70/sec burst 70 mode srcip-srcport
htable-size 128 htable-max 128
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0
Chain LIMITSTAT (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 limit: avg 10/sec burst 10
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0
[root at game1 source]#
Now that I have applied the rules, I am unable to get connections to any
of the game servers :( Any ideas?
More information about the cod
mailing list