Still having problems with another orangebox exploit:

Log example:
Flooded with :

14:52:33.609202 IP xxxxxxxxx.tde.net.25019 > xx.xxx.xx.27115: S 4271149929:4271149929(0) win 8192 <mss 1452,nop,nop,sackOK>

All of the with the same win size (8192)
Any advice without having to block dinamic ips?


Best regards
Andres Pozos wrote:
Theres an old exploit used to lag orangebox servers sending packets
with size 0 that can be fixed with 
http://www.sourceop.com/modules.php?name=Downloads&d_op=viewdownload&cid=9.
But since a week or so, im not only getting lag, im getting CRASHES
in my server and seems its the same exploit:

Example of flood:

19:44:03.747611 IP xxx.dynamicIP.rima-tde.net.58723>  xxx.xxx: UDP, length 0

Without ddosfixer, it used to lag the server but now it also crash.
The only way i manage  to fix it was blocking the ip but its a
dinamic ip so its not a solution. Any advice?
You can also filter by packet size with udp using iptables.

iptables -A INPUT -p udp -m length --length 8 -j DROP

(which should drop all udp packets with a zero length payload).  IF you
have a NAT to your server then you may need this on the FORWARD chain
instead).



Note we pass --length 8 to account for the mandatory udp header fields.
(UDP headers have 4 fields, each sixteen bits long or 8 bytes).

Regards

D.

_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux



_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux

Reply via email to