from what i no ipsec does nothing to what iptables is capable of doing so
thats out of the picture completely. the sudpipe udp proxy program requires
i suppose a background knowledge of C, only know php/sql myself :) i see
plenty of bright people around here that have solutions for linux lol :)
wrong mailing list :P maybe some for windows? :)

anyways im ready to put down $65 to any plugin/program for windows that
manages these UDP floods specifically for source servers. i think a few
others said they would be willing to put money in the pot too.

On Sat, Sep 5, 2009 at 9:37 PM, Kenny Loggins <kenny.logg...@clanao.com>wrote:

> Anyone know of any hardware solutions to this problem?
>
> ClanAO.com
>
> On Sep 5, 2009, at 8:09 PM, Kaspars <kasp...@micro.lv> wrote:
>
> > Actually I got inspired by the word "daemon" and I realized that the
> > key to
> > the problem is a daemon... a proxy daemon... a caching proxy
> > daemon :) I
> > didn't have much time to check the incoming packet pattern, however
> > I'm not
> > sure that they all were 53 bytes long, actually the number was
> > something
> > like 33 that showed up a LOT of times in iptables logs (but I might be
> > wrong... and I'm sure the fault lies in drinking too much beer).
> > Nevertheless I went for the 100% match with the -m string and it works
> > really good. I'm having about 300r/s and I don't see any CPU usage
> > with this
> > method. Anyways you are free to modify the source or iptables filter
> > command
> > :)
> >
> > 2009/9/6 Nephyrin Zey <nephy...@doublezen.net>
> >
> >> As an alternative to using -m string, you can just filter length 53
> >> packets - no packets aside from the query packet end up being that
> >> length. Not super elegant, but a lot less overhead.
> >>
> >> And, as I said, my daemon works differently and could be used to
> >> easily
> >> start thousands of fake servers on a single box, which would screw
> >> more
> >> things over than it would help.
> >>
> >> - Neph
> >>
> >> On 09/05/2009 05:20 PM, Kaspars wrote:
> >>> God dammit... this is really fucked up... sorry for my language, I
> >>> just
> >> got
> >>> too many beers today...
> >>> Anyways, I just wanted to give something to the community as Neph
> >>> is not
> >>> willing to do it. This will fix the ddos attack for *nix however
> >>> if you
> >> are
> >>> using it, I'm not giving any warranty :)
> >>>
> >>> Here goes:
> >>> first, get the source and compile: http://www.gign.lv/tmp/test.c
> >>> run it in the screen like ./test 21015 YOUR_EXTERNAL_TF2_SERVER_IP
> >>> YOUR_SERVER_PORT
> >>> 21015 is some random port for the udp proxy :) it must be opened in
> >> firewall
> >>>
> >>> then some iptables magic:
> >>> iptables -t nat -A PREROUTING -p udp -d YOUR_EXTERNAL_TF2_SERVER_IP
> >> --dport
> >>> YOUR_SERVER_PORT -m string --algo kmp --string 'TSource Engine
> >>> Query' -j
> >>> REDIRECT --to-port 21015
> >>>
> >>> thats about it...
> >>>
> >>> 2009/9/6 Nephyrin Zey<nephy...@doublezen.net>
> >>>
> >>>
> >>>> The problem with my solution is the daemon would be really really
> >>>> abusive in the wrong hands. We dont need someone using it to easily
> >>>> start 100 fake servers at 255/255 slots and polluting the server
> >>>> list.
> >>>> It's not some super complex feat, but releasing an easy compiled
> >>>> prepackaged version is just asking for it - and the real solution
> >>>> needs
> >>>> to be valve. Plus, it's not very easy to configure and I'm not
> >>>> even sure
> >>>> windows ipsec is capable of that level of packet interception.
> >>>>
> >>>> Something on the lines of tony's plugin would be a much better
> >>>> solution,
> >>>> but you'll have to hound him about that
> >>>>
> >>>> - Neph
> >>>>
> >>>> On 09/05/2009 03:14 PM, Kenny Loggins wrote:
> >>>>
> >>>>> I don't think either you or Neph have released your plugins to the
> >> public
> >>>>>
> >>>> so
> >>>>
> >>>>> this solution works great for you guys. Maybe we can have some
> >>>>> into or
> >>>>> direction from you so the general public can do something about
> >>>>> this?
> >>>>>
> >>>>> As long as they get away with this it's going to keep happening
> >>>>> if a
> >>>>>
> >>>> plugin
> >>>>
> >>>>> was available to stop this it is not long "fun" or productive to
> >>>>> DOS
> >>>>>
> >>>> servers
> >>>>
> >>>>> anymore.
> >>>>>
> >>>>>
> >>>>
> >>>> _______________________________________________
> >>>> To unsubscribe, edit your list preferences, or view the list
> >>>> archives,
> >>>> please visit:
> >>>> http://list.valvesoftware.com/mailman/listinfo/hlds
> >>>>
> >>>>
> >>> _______________________________________________
> >>> To unsubscribe, edit your list preferences, or view the list
> >>> archives,
> >> please visit:
> >>> http://list.valvesoftware.com/mailman/listinfo/hlds
> >>>
> >>
> >>
> >> _______________________________________________
> >> To unsubscribe, edit your list preferences, or view the list
> >> archives,
> >> please visit:
> >> http://list.valvesoftware.com/mailman/listinfo/hlds
> >>
> > _______________________________________________
> > To unsubscribe, edit your list preferences, or view the list
> > archives, please visit:
> > http://list.valvesoftware.com/mailman/listinfo/hlds
>
>
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives,
> please visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds
>
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds

Reply via email to