this is windows, iptables is nonexistant. i no people have suggested plenty
of linux solutions for this problem in different ways to solve it :) but i
dont think something that easy exists for windows. ipsec doesnt do anything
like that nor does any normal software firewall for windows, seems the only
thing that could help is a UDP proxy but requires c programming.

On Sun, Sep 6, 2009 at 1:29 AM, Kyle Sanderson <kyle.l...@gmail.com> wrote:

> Um... I'm going out on a limb here that no one has read the other topics
> that have discussed this. Since it has yet to be posted here... has anyone
> tried what Tony suggested by limiting the amount of queries via iptables
> then logging the blocked ips? This rule was made by Tony, as simple as it
> is
> I would still like to give him credit as I didn't think of it.
>
> -A INPUT -p udp -m udp --dport 27015:27016 -m length --length 53 -m
> hashlimit --hashlimit 15/sec --hashlimit-burst 30 --hashlimit-mode
> dstip,dstport --hashlimit-name a2sspam -j ACCEPT
> -A INPUT -p udp -m udp --dport 27015:27016 -m length --length 53 -j DROP
>
> But yeah... Not sure if this did it or not but I haven't been "lagged out"
> since. If this is something completely different, I'm sorry.
> Kyle.
>
> On Sat, Sep 5, 2009 at 9:06 PM, Kenny Loggins <kenny.logg...@clanao.com
> >wrote:
>
> > I have an open request on a fix for this problem. I'm willing to
> completely
> > pay for a programmers time and I'm willing to bet other people would also
> > chip in on this. Anyone willing to work this let me know
> >
> > http://forums.alliedmods.net/showthread.php?t=102779
> >
> >
> >
> > -----Original Message-----
> > From: hlds-boun...@list.valvesoftware.com
> > [mailto:hlds-boun...@list.valvesoftware.com] On Behalf Of Shizzle Nizzle
> > Sent: Saturday, September 05, 2009 11:00 PM
> > To: Half-Life dedicated Win32 server mailing list
> > Subject: Re: [hlds] TF2 DDOS AS2_INFO attack
> >
> > from what i no ipsec does nothing to what iptables is capable of doing so
> > thats out of the picture completely. the sudpipe udp proxy program
> requires
> > i suppose a background knowledge of C, only know php/sql myself :) i see
> > plenty of bright people around here that have solutions for linux lol :)
> > wrong mailing list :P maybe some for windows? :)
> >
> > anyways im ready to put down $65 to any plugin/program for windows that
> > manages these UDP floods specifically for source servers. i think a few
> > others said they would be willing to put money in the pot too.
> >
> > On Sat, Sep 5, 2009 at 9:37 PM, Kenny Loggins
> > <kenny.logg...@clanao.com>wrote:
> >
> > > Anyone know of any hardware solutions to this problem?
> > >
> > > ClanAO.com
> > >
> > > On Sep 5, 2009, at 8:09 PM, Kaspars <kasp...@micro.lv> wrote:
> > >
> > > > Actually I got inspired by the word "daemon" and I realized that the
> > > > key to
> > > > the problem is a daemon... a proxy daemon... a caching proxy
> > > > daemon :) I
> > > > didn't have much time to check the incoming packet pattern, however
> > > > I'm not
> > > > sure that they all were 53 bytes long, actually the number was
> > > > something
> > > > like 33 that showed up a LOT of times in iptables logs (but I might
> be
> > > > wrong... and I'm sure the fault lies in drinking too much beer).
> > > > Nevertheless I went for the 100% match with the -m string and it
> works
> > > > really good. I'm having about 300r/s and I don't see any CPU usage
> > > > with this
> > > > method. Anyways you are free to modify the source or iptables filter
> > > > command
> > > > :)
> > > >
> > > > 2009/9/6 Nephyrin Zey <nephy...@doublezen.net>
> > > >
> > > >> As an alternative to using -m string, you can just filter length 53
> > > >> packets - no packets aside from the query packet end up being that
> > > >> length. Not super elegant, but a lot less overhead.
> > > >>
> > > >> And, as I said, my daemon works differently and could be used to
> > > >> easily
> > > >> start thousands of fake servers on a single box, which would screw
> > > >> more
> > > >> things over than it would help.
> > > >>
> > > >> - Neph
> > > >>
> > > >> On 09/05/2009 05:20 PM, Kaspars wrote:
> > > >>> God dammit... this is really fucked up... sorry for my language, I
> > > >>> just
> > > >> got
> > > >>> too many beers today...
> > > >>> Anyways, I just wanted to give something to the community as Neph
> > > >>> is not
> > > >>> willing to do it. This will fix the ddos attack for *nix however
> > > >>> if you
> > > >> are
> > > >>> using it, I'm not giving any warranty :)
> > > >>>
> > > >>> Here goes:
> > > >>> first, get the source and compile: http://www.gign.lv/tmp/test.c
> > > >>> run it in the screen like ./test 21015 YOUR_EXTERNAL_TF2_SERVER_IP
> > > >>> YOUR_SERVER_PORT
> > > >>> 21015 is some random port for the udp proxy :) it must be opened in
> > > >> firewall
> > > >>>
> > > >>> then some iptables magic:
> > > >>> iptables -t nat -A PREROUTING -p udp -d YOUR_EXTERNAL_TF2_SERVER_IP
> > > >> --dport
> > > >>> YOUR_SERVER_PORT -m string --algo kmp --string 'TSource Engine
> > > >>> Query' -j
> > > >>> REDIRECT --to-port 21015
> > > >>>
> > > >>> thats about it...
> > > >>>
> > > >>> 2009/9/6 Nephyrin Zey<nephy...@doublezen.net>
> > > >>>
> > > >>>
> > > >>>> The problem with my solution is the daemon would be really really
> > > >>>> abusive in the wrong hands. We dont need someone using it to
> easily
> > > >>>> start 100 fake servers at 255/255 slots and polluting the server
> > > >>>> list.
> > > >>>> It's not some super complex feat, but releasing an easy compiled
> > > >>>> prepackaged version is just asking for it - and the real solution
> > > >>>> needs
> > > >>>> to be valve. Plus, it's not very easy to configure and I'm not
> > > >>>> even sure
> > > >>>> windows ipsec is capable of that level of packet interception.
> > > >>>>
> > > >>>> Something on the lines of tony's plugin would be a much better
> > > >>>> solution,
> > > >>>> but you'll have to hound him about that
> > > >>>>
> > > >>>> - Neph
> > > >>>>
> > > >>>> On 09/05/2009 03:14 PM, Kenny Loggins wrote:
> > > >>>>
> > > >>>>> I don't think either you or Neph have released your plugins to
> the
> > > >> public
> > > >>>>>
> > > >>>> so
> > > >>>>
> > > >>>>> this solution works great for you guys. Maybe we can have some
> > > >>>>> into or
> > > >>>>> direction from you so the general public can do something about
> > > >>>>> this?
> > > >>>>>
> > > >>>>> As long as they get away with this it's going to keep happening
> > > >>>>> if a
> > > >>>>>
> > > >>>> plugin
> > > >>>>
> > > >>>>> was available to stop this it is not long "fun" or productive to
> > > >>>>> DOS
> > > >>>>>
> > > >>>> servers
> > > >>>>
> > > >>>>> anymore.
> > > >>>>>
> > > >>>>>
> > > >>>>
> > > >>>> _______________________________________________
> > > >>>> To unsubscribe, edit your list preferences, or view the list
> > > >>>> archives,
> > > >>>> please visit:
> > > >>>> http://list.valvesoftware.com/mailman/listinfo/hlds
> > > >>>>
> > > >>>>
> > > >>> _______________________________________________
> > > >>> To unsubscribe, edit your list preferences, or view the list
> > > >>> archives,
> > > >> please visit:
> > > >>> http://list.valvesoftware.com/mailman/listinfo/hlds
> > > >>>
> > > >>
> > > >>
> > > >> _______________________________________________
> > > >> To unsubscribe, edit your list preferences, or view the list
> > > >> archives,
> > > >> please visit:
> > > >> http://list.valvesoftware.com/mailman/listinfo/hlds
> > > >>
> > > > _______________________________________________
> > > > To unsubscribe, edit your list preferences, or view the list
> > > > archives, please visit:
> > > > http://list.valvesoftware.com/mailman/listinfo/hlds
> > >
> > >
> > > _______________________________________________
> > > To unsubscribe, edit your list preferences, or view the list archives,
> > > please visit:
> > > http://list.valvesoftware.com/mailman/listinfo/hlds
> > >
> > _______________________________________________
> > To unsubscribe, edit your list preferences, or view the list archives,
> > please visit:
> > http://list.valvesoftware.com/mailman/listinfo/hlds
> >
> >
> >
> > _______________________________________________
> > To unsubscribe, edit your list preferences, or view the list archives,
> > please visit:
> > http://list.valvesoftware.com/mailman/listinfo/hlds
> >
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives,
> please visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds
>
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds

Reply via email to