The kernel drops the packets with invalid length ("short packet") or for
which checksum validation fails ("bad checksum"), so you don't have to add
any rules for them (I verified the source code long time ago, so I'm quite
sure about this). Also I doubt that your server is attacked, probably you
receive few invalid packets per day, like everybody else.

-----Original Message-----
From: hlds_linux-boun...@list.valvesoftware.com
[mailto:hlds_linux-boun...@list.valvesoftware.com] On Behalf Of Mico
Sent: Saturday, January 19, 2013 2:08 AM
To: hlds_linux@list.valvesoftware.com
Subject: Re: [hlds_linux] DMESG LOG / Message: UDP: short packet

Sorry for omitting data, I'm running servers Counter-Strike 1.6.

SO: Ubuntu Server 12.04

On Vie 18 Ene 2013 20:39:04 Mico escribió:
> Hi folks, I have a question about the logs attached below:
> 
> [8687918.348720] UDP: short packet: From 200.117.220.244:27005 50/44 to
> 200.58.97.121:27029
> [8688154.114667] UDP: short packet: From 200.117.220.244:27005 51/40 to
> 200.58.97.121:27029
> [8688193.390630] UDP: short packet: From 200.117.220.244:27005 44/43 to
> 200.58.97.121:27029
> [8688297.085966] UDP: short packet: From 200.117.220.244:27005 49/44 to
> 200.58.97.121:27029
> [8688354.986654] UDP: short packet: From 200.117.220.244:27005 49/39 to
> 200.58.97.121:27029
> [8688537.877283] UDP: short packet: From 200.117.220.244:27005 51/49 to
> 200.58.97.121:27024
> [8688662.819592] UDP: short packet: From 200.117.220.244:27005 42/41 to
> 200.58.97.121:27029
> [8679718.078109] UDP: short packet: From 190.18.153.48:15623 49320/48 to
> 200.58.97.121:27029
> [8679741.662004] UDP: short packet: From 190.18.153.48:15623 308/54 to
> 200.58.97.121:27029
> [8679760.842512] UDP: short packet: From 190.18.153.48:15623 308/76 to
> 200.58.97.121:27029
> [8680347.573463] UDP: short packet: From 181.166.32.20:5380 318/46 to
> 200.58.97.121:27029
> [8680358.973280] UDP: short packet: From 181.166.32.20:5380 318/48 to
> 200.58.97.121:27029
> [8680426.952825] UDP: short packet: From 181.166.32.20:5380 308/49 to
> 200.58.97.121:27029
> [8680672.948758] UDP: short packet: From 181.166.32.20:5380 318/39 to
> 200.58.97.121:27029
> 
> Always stop the attack denying IP with iptables, but every day I see many
> different IPs appear to attack the server, have some iptables rule to
block
> the package?

_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives,
please visit:
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux


_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux

Reply via email to