On 8/3/2012 7:50 PM, LocalStrike | Live your game! wrote:
i read this from a forum and at this time we have the same situation here!
please we need a fix asap!

Valve fixed this attack in the most recent Goldsrc engine release (July 31):

"... This update fixes a potential vulnerability in the challenge/response protocol uses for out of band queries (in particular A2S_RULES and A2S_PLAYERS responses)... "

Since it's not a required release, many server operators are not running it yet.

In terms of what you can do to block the reflected attack on your end without waiting for others to update, you could use string-based rules that look for common cvars that will show in most output, or you could have a script that generates a list of IPs to block from tcpdump output and pushes that list into an "ipset" set, to be blocked with a single iptables rule.

-John

_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux

Reply via email to