Re: [hlds_linux] How to crash everyone on a TF2 Server the simple way

2012-04-04 Thread Tony Paloma
Yes, if anybody has details in regards to how this exploit is performed, please 
reply directly to me (to...@valvesoftware.com).

Thanks,
Tony

-Original Message-
From: hlds_linux-boun...@list.valvesoftware.com 
[mailto:hlds_linux-boun...@list.valvesoftware.com] On Behalf Of dan
Sent: Tuesday, April 03, 2012 9:07 AM
To: Half-Life dedicated Linux server mailing list
Subject: Re: [hlds_linux] How to crash everyone on a TF2 Server the simple way

On 03/04/2012 16:58, BrokenCode Pro wrote:
> sami try this vid http://youtu.be/B7Gr3kc1jwg

Why do we care about this? It isn't telling us anything informative.

You either post details  about the packet and bug (or send them to Valve)

But I'd suggest reddit et al are probably a better places to grab views and 
attention for your video.

--
Dan.

___
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux

___
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux


[hlds_linux] Mandatory Nuclear Dawn Update Released

2012-04-04 Thread Nicholas Hastings
We've released a mandatory update to Nuclear Dawn. The notes for the ND 
Update 6.2a are below.


Nuclear Dawn Update 6.2a
Balance changes
 - Reworked ammo pack earned xp to not be based on actual ammo amount, 
unfairly weighting some weapons.
 - Research in-progress when last armory is sold/destroyed is now lost 
without refund.

 - Rebalanced Homewrecker and Siege Support gizmo effects.

Other enhancements
 - Play Now is now a little quicker at finding servers.
 - Added mention of backstab reticle change to Stealth tutorial.
 - Updated localizations

Various fixes
 - Fixed commander heal ability not healing.
 - Fixed crash in Commander Intermediate tutorial.
 - Fixed research not being recognized in Commander Advanced tutorial.
 - Fixed compass not displaying properly on tutorial training map.
 - Fixed a server and client crash relating to armory research.
 - Fixed commander orders staying on team change.
 - Fixed radar kit requiring line of sight to expose enemies.
 - Fixed being able to damage own radar kits.
 - Fixed radar structure still functioning without power.
 - Fixed in-armory class changes not always changing gizmo.
 - Fixed case where What's New panel would spew console errors when 
Steam site is down.
 - Fixed some oddities with commander chat (some notifications not 
displaying).

 - Fixed getting stuck near helicopter in Oilfield.

--
Nicholas "psychonic" Hastings
Developer
InterWave Studios
www.interwavestudios.com 
___
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux


Re: [hlds_linux] LOIC and UDP flood. How to protect?

2012-04-04 Thread Andrew DeMerse
You can use tcpdump or Wireshark to identify extraneous traffic. It can be
a bit complicated if you don't have any guidance, though. Just look for a
lot of traffic that isn't coming from your typical client port (27005).

On Wed, Apr 4, 2012 at 12:20 PM, Erik-jan Riemers  wrote:

> I think what people would want is a simple and effective tool to check it
> in a easy way. Sure you can check your bandwith and see more incoming, but
> what then? What would a person do to identify the ip or packets to quickly
> diagnose and block that person.
>
> Usually by the time i want to investigate they stop, or my isp sends me an
> email that they blocked certain ips because of a attack (they do as long as
> it doesn't impact the segment)
>
> Op 4 april 2012 17:38 schreef Emil Larsson  het
> volgende:
>
> > Severeal ways, unuseal high ingoing bandwidth usage, extreme server
> > lag and/or flood of repetive/strange packets (use a packet
> > analyzer/sniffer like Ethereal). A few years ago I identified someone
> > DOS'ing our servers by simple looking for strange packets (the old but
> > now fixed zero data exploit). To our amusement, we managed to identify
> > the DOS'er with some help, and it turned out to be a server admin from
> > another community :|.
> >
> > On 4/4/12, Tyler Davies  wrote:
> > > How are you able to tell you're being attacked? I have a feeling my
> > servers
> > > are being attacked as well, but I'm not sure how to be sure.
> > >
> > > On Tue, Apr 3, 2012 at 2:34 PM, Mihály Rácz  wrote:
> > >
> > >> Hi.
> > >>
> > >> Its maybe helpfull.
> > >>
> > >> http://www.wolffiles.de/index.php?forum-showposts-44-p1#131
> > >>
> > >> 2012. április 3. 19:26 Oskar Levin írta, :
> > >>
> > >> > I can confirm this as a big problem. I'm getting attacked by various
> > >> > Call
> > >> > of Duty 4 servers with big UDP packets. Someone spoofs my IP address
> > and
> > >> > the reply of getstatus (or something similar) is sent to me. The
> > packet
> > >> > which requests the info isn't big, but the reply is very large as
> this
> > >> > contains player information etc.
> > >> >
> > >> > Best regards
> > >> > Oskar Levin
> > >> > os...@dataviruset.com
> > >> >
> > >> > -Ursprungligt meddelande-
> > >> > Från: hlds_linux-boun...@list.valvesoftware.com [mailto:
> > >> > hlds_linux-boun...@list.valvesoftware.com] För Kyle Sanderson
> > >> > Skickat: den 3 april 2012 19:10
> > >> > Till: Half-Life dedicated Linux server mailing list
> > >> > Ämne: Re: [hlds_linux] LOIC and UDP flood. How to protect?
> > >> >
> > >> > http://www.securityfocus.com/archive/1/522076
> > >> >
> > >> > Isn't just LOIC... But yes, it's a bit ridiculous that you can take
> > down
> > >> a
> > >> > server with just 1Mbit/s of traffic. Not much that can be done about
> > it
> > >> > either.
> > >> >
> > >> > Hope for TCP, at least that way it's slightly more difficult to hide
> > the
> > >> > spoofed sender from the destination.
> > >> > Kyle.
> > >> >
> > >> > 2012/4/3 Никита Булаев [Nikita Bulaev] 
> > >> >
> > >> > > The problem NOT in bandwidth. It's possible to kill server just in
> > >> 1Mbit.
> > >> > >
> > >> > > 3 апреля 2012 г. 20:05 пользователь
> > >> > >  написал:
> > >> > > > Message: 5
> > >> > > > Date: Tue, 3 Apr 2012 10:07:09 +0200
> > >> > > > From: lwf 
> > >> > > > To: Half-Life dedicated Linux server mailing list
> > >> > > >
> > >> > > > Subject: Re: [hlds_linux] LOIC and UDP flood. How to protect?
> > >> > > > Message-ID:
> > >> > > ><
> > >> > >
> ca++kgkr9cot1d7f+ddsfsrt9jwcs2gw+oitscblsikmzuqc...@mail.gmail.com>
> > >> > > > Content-Type: text/plain; charset=KOI8-R
> > >> > > >
> > >> > > > Without any help from your ISP there is nothing you can do
> about a
> > >> > > > bandwidth attack.
> > >> > > >
> > >> > > > 2012/4/3  [Nikita Bulaev] :
> > >> > > >> In fact - no. Hoster, where we plase our root servers, wont
> > filter
> > >> > > >> DoS and Flood, it just can do this for money. But this kind of
> > >> > > >> service is very expensive.
> > >> > > >>
> > >> > > >> 
> > >> > > >>> Message: 8
> > >> > > >>> Date: Tue, 3 Apr 2012 13:22:49 +0800
> > >> > > >>> From: "dmex" 
> > >> > > >>> To: "'Half-Life dedicated Linux server mailing list'"
> > >> > > >>> ? ? ? ?
> > >> > > >>> Subject: Re: [hlds_linux] LOIC and UDP flood. How to protect?
> > >> > > >>> Message-ID: <000601cd1159$d2a73f30$77f5bd90$@gmail.com
> > >> > > >
> > >> > > >
> > >> > > >>>
> > >> > > 
> > >> > > >>> Content-Type: text/plain; ? ? ? charset="us-ascii"
> > >> > > >>>
> > >> > > >>> DoS protection is the responsibility of your service provider,
> > >> > > >>> there's
> > >> > > not
> > >> > > >>> much Valve or even you can do to prevent attacks.
> > >> > > >>>
> > >> > > >>> -Original Message-
> > >> > > >>> From: hlds_linux-boun...@list.valvesoftware.com
> > >> > > >>> [mailto:hlds_linux-boun...@list.valvesoftware.com] On Behalf
> Of
> > >> > > >>> [Nikita Bulaev]
> > >> > > >>> Sent: Tuesday, April 03, 2012 12:32 

Re: [hlds_linux] LOIC and UDP flood. How to protect?

2012-04-04 Thread Erik-jan Riemers
I think what people would want is a simple and effective tool to check it
in a easy way. Sure you can check your bandwith and see more incoming, but
what then? What would a person do to identify the ip or packets to quickly
diagnose and block that person.

Usually by the time i want to investigate they stop, or my isp sends me an
email that they blocked certain ips because of a attack (they do as long as
it doesn't impact the segment)

Op 4 april 2012 17:38 schreef Emil Larsson  het volgende:

> Severeal ways, unuseal high ingoing bandwidth usage, extreme server
> lag and/or flood of repetive/strange packets (use a packet
> analyzer/sniffer like Ethereal). A few years ago I identified someone
> DOS'ing our servers by simple looking for strange packets (the old but
> now fixed zero data exploit). To our amusement, we managed to identify
> the DOS'er with some help, and it turned out to be a server admin from
> another community :|.
>
> On 4/4/12, Tyler Davies  wrote:
> > How are you able to tell you're being attacked? I have a feeling my
> servers
> > are being attacked as well, but I'm not sure how to be sure.
> >
> > On Tue, Apr 3, 2012 at 2:34 PM, Mihály Rácz  wrote:
> >
> >> Hi.
> >>
> >> Its maybe helpfull.
> >>
> >> http://www.wolffiles.de/index.php?forum-showposts-44-p1#131
> >>
> >> 2012. április 3. 19:26 Oskar Levin írta, :
> >>
> >> > I can confirm this as a big problem. I'm getting attacked by various
> >> > Call
> >> > of Duty 4 servers with big UDP packets. Someone spoofs my IP address
> and
> >> > the reply of getstatus (or something similar) is sent to me. The
> packet
> >> > which requests the info isn't big, but the reply is very large as this
> >> > contains player information etc.
> >> >
> >> > Best regards
> >> > Oskar Levin
> >> > os...@dataviruset.com
> >> >
> >> > -Ursprungligt meddelande-
> >> > Från: hlds_linux-boun...@list.valvesoftware.com [mailto:
> >> > hlds_linux-boun...@list.valvesoftware.com] För Kyle Sanderson
> >> > Skickat: den 3 april 2012 19:10
> >> > Till: Half-Life dedicated Linux server mailing list
> >> > Ämne: Re: [hlds_linux] LOIC and UDP flood. How to protect?
> >> >
> >> > http://www.securityfocus.com/archive/1/522076
> >> >
> >> > Isn't just LOIC... But yes, it's a bit ridiculous that you can take
> down
> >> a
> >> > server with just 1Mbit/s of traffic. Not much that can be done about
> it
> >> > either.
> >> >
> >> > Hope for TCP, at least that way it's slightly more difficult to hide
> the
> >> > spoofed sender from the destination.
> >> > Kyle.
> >> >
> >> > 2012/4/3 Никита Булаев [Nikita Bulaev] 
> >> >
> >> > > The problem NOT in bandwidth. It's possible to kill server just in
> >> 1Mbit.
> >> > >
> >> > > 3 апреля 2012 г. 20:05 пользователь
> >> > >  написал:
> >> > > > Message: 5
> >> > > > Date: Tue, 3 Apr 2012 10:07:09 +0200
> >> > > > From: lwf 
> >> > > > To: Half-Life dedicated Linux server mailing list
> >> > > >
> >> > > > Subject: Re: [hlds_linux] LOIC and UDP flood. How to protect?
> >> > > > Message-ID:
> >> > > ><
> >> > > ca++kgkr9cot1d7f+ddsfsrt9jwcs2gw+oitscblsikmzuqc...@mail.gmail.com>
> >> > > > Content-Type: text/plain; charset=KOI8-R
> >> > > >
> >> > > > Without any help from your ISP there is nothing you can do about a
> >> > > > bandwidth attack.
> >> > > >
> >> > > > 2012/4/3  [Nikita Bulaev] :
> >> > > >> In fact - no. Hoster, where we plase our root servers, wont
> filter
> >> > > >> DoS and Flood, it just can do this for money. But this kind of
> >> > > >> service is very expensive.
> >> > > >>
> >> > > >> 
> >> > > >>> Message: 8
> >> > > >>> Date: Tue, 3 Apr 2012 13:22:49 +0800
> >> > > >>> From: "dmex" 
> >> > > >>> To: "'Half-Life dedicated Linux server mailing list'"
> >> > > >>> ? ? ? ?
> >> > > >>> Subject: Re: [hlds_linux] LOIC and UDP flood. How to protect?
> >> > > >>> Message-ID: <000601cd1159$d2a73f30$77f5bd90$@gmail.com
> >> > > >
> >> > > >
> >> > > >>>
> >> > > 
> >> > > >>> Content-Type: text/plain; ? ? ? charset="us-ascii"
> >> > > >>>
> >> > > >>> DoS protection is the responsibility of your service provider,
> >> > > >>> there's
> >> > > not
> >> > > >>> much Valve or even you can do to prevent attacks.
> >> > > >>>
> >> > > >>> -Original Message-
> >> > > >>> From: hlds_linux-boun...@list.valvesoftware.com
> >> > > >>> [mailto:hlds_linux-boun...@list.valvesoftware.com] On Behalf Of
> >> > > >>> [Nikita Bulaev]
> >> > > >>> Sent: Tuesday, April 03, 2012 12:32 PM
> >> > > >>> To: hlds_linux@list.valvesoftware.com
> >> > > >>> Subject: [hlds_linux] LOIC and UDP flood. How to protect?
> >> > > >>>
> >> > > >>> Well, for now DoSers are using LOIC in UDP-mode. There is no use
> >> > > >>> to
> >> > > silent
> >> > > >>> this.
> >> > > >>>
> >> > > >>> The problem is that L4D1/2 servers are lagging while sending to
> >> > > >>> them
> >> > > UDP
> >> > > >>> packets at 32-bit lengh by LOIC.
> >> > > >>> This utility is using now almost by every DoSer and as for now
> >> > > >>> the

Re: [hlds_linux] LOIC and UDP flood. How to protect?

2012-04-04 Thread Emil Larsson
Severeal ways, unuseal high ingoing bandwidth usage, extreme server
lag and/or flood of repetive/strange packets (use a packet
analyzer/sniffer like Ethereal). A few years ago I identified someone
DOS'ing our servers by simple looking for strange packets (the old but
now fixed zero data exploit). To our amusement, we managed to identify
the DOS'er with some help, and it turned out to be a server admin from
another community :|.

On 4/4/12, Tyler Davies  wrote:
> How are you able to tell you're being attacked? I have a feeling my servers
> are being attacked as well, but I'm not sure how to be sure.
>
> On Tue, Apr 3, 2012 at 2:34 PM, Mihály Rácz  wrote:
>
>> Hi.
>>
>> Its maybe helpfull.
>>
>> http://www.wolffiles.de/index.php?forum-showposts-44-p1#131
>>
>> 2012. április 3. 19:26 Oskar Levin írta, :
>>
>> > I can confirm this as a big problem. I'm getting attacked by various
>> > Call
>> > of Duty 4 servers with big UDP packets. Someone spoofs my IP address and
>> > the reply of getstatus (or something similar) is sent to me. The packet
>> > which requests the info isn't big, but the reply is very large as this
>> > contains player information etc.
>> >
>> > Best regards
>> > Oskar Levin
>> > os...@dataviruset.com
>> >
>> > -Ursprungligt meddelande-
>> > Från: hlds_linux-boun...@list.valvesoftware.com [mailto:
>> > hlds_linux-boun...@list.valvesoftware.com] För Kyle Sanderson
>> > Skickat: den 3 april 2012 19:10
>> > Till: Half-Life dedicated Linux server mailing list
>> > Ämne: Re: [hlds_linux] LOIC and UDP flood. How to protect?
>> >
>> > http://www.securityfocus.com/archive/1/522076
>> >
>> > Isn't just LOIC... But yes, it's a bit ridiculous that you can take down
>> a
>> > server with just 1Mbit/s of traffic. Not much that can be done about it
>> > either.
>> >
>> > Hope for TCP, at least that way it's slightly more difficult to hide the
>> > spoofed sender from the destination.
>> > Kyle.
>> >
>> > 2012/4/3 Никита Булаев [Nikita Bulaev] 
>> >
>> > > The problem NOT in bandwidth. It's possible to kill server just in
>> 1Mbit.
>> > >
>> > > 3 апреля 2012 г. 20:05 пользователь
>> > >  написал:
>> > > > Message: 5
>> > > > Date: Tue, 3 Apr 2012 10:07:09 +0200
>> > > > From: lwf 
>> > > > To: Half-Life dedicated Linux server mailing list
>> > > >
>> > > > Subject: Re: [hlds_linux] LOIC and UDP flood. How to protect?
>> > > > Message-ID:
>> > > ><
>> > > ca++kgkr9cot1d7f+ddsfsrt9jwcs2gw+oitscblsikmzuqc...@mail.gmail.com>
>> > > > Content-Type: text/plain; charset=KOI8-R
>> > > >
>> > > > Without any help from your ISP there is nothing you can do about a
>> > > > bandwidth attack.
>> > > >
>> > > > 2012/4/3  [Nikita Bulaev] :
>> > > >> In fact - no. Hoster, where we plase our root servers, wont filter
>> > > >> DoS and Flood, it just can do this for money. But this kind of
>> > > >> service is very expensive.
>> > > >>
>> > > >> 
>> > > >>> Message: 8
>> > > >>> Date: Tue, 3 Apr 2012 13:22:49 +0800
>> > > >>> From: "dmex" 
>> > > >>> To: "'Half-Life dedicated Linux server mailing list'"
>> > > >>> ? ? ? ?
>> > > >>> Subject: Re: [hlds_linux] LOIC and UDP flood. How to protect?
>> > > >>> Message-ID: <000601cd1159$d2a73f30$77f5bd90$@gmail.com
>> > > >
>> > > >
>> > > >>>
>> > > 
>> > > >>> Content-Type: text/plain; ? ? ? charset="us-ascii"
>> > > >>>
>> > > >>> DoS protection is the responsibility of your service provider,
>> > > >>> there's
>> > > not
>> > > >>> much Valve or even you can do to prevent attacks.
>> > > >>>
>> > > >>> -Original Message-
>> > > >>> From: hlds_linux-boun...@list.valvesoftware.com
>> > > >>> [mailto:hlds_linux-boun...@list.valvesoftware.com] On Behalf Of
>> > > >>> [Nikita Bulaev]
>> > > >>> Sent: Tuesday, April 03, 2012 12:32 PM
>> > > >>> To: hlds_linux@list.valvesoftware.com
>> > > >>> Subject: [hlds_linux] LOIC and UDP flood. How to protect?
>> > > >>>
>> > > >>> Well, for now DoSers are using LOIC in UDP-mode. There is no use
>> > > >>> to
>> > > silent
>> > > >>> this.
>> > > >>>
>> > > >>> The problem is that L4D1/2 servers are lagging while sending to
>> > > >>> them
>> > > UDP
>> > > >>> packets at 32-bit lengh by LOIC.
>> > > >>> This utility is using now almost by every DoSer and as for now
>> > > >>> there
>> > > is no
>> > > >>> defense from this, even by IPTABLES. The only way is using
>> > > >>> firewall
>> > > before
>> > > >>> root game servers.
>> > > >>>
>> > > >>> Friends! I'd like to be wrong! So is there a real working desigion
>> > > >>> to protect from LOIC UDP?
>> > > >>>
>> > > >>> Best regards,
>> > > >>> Nikita Bulaev
>> > >
>> > > ___
>> > > To unsubscribe, edit your list preferences, or view the list archives,
>> > > please visit:
>> > > https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux
>> > >
>> > ___
>> > To unsubscribe, edit your list preferences, or view the list archives,
>> > please visit:
>> > https://li

Re: [hlds_linux] LOIC and UDP flood. How to protect?

2012-04-04 Thread Tyler Davies
How are you able to tell you're being attacked? I have a feeling my servers
are being attacked as well, but I'm not sure how to be sure.

On Tue, Apr 3, 2012 at 2:34 PM, Mihály Rácz  wrote:

> Hi.
>
> Its maybe helpfull.
>
> http://www.wolffiles.de/index.php?forum-showposts-44-p1#131
>
> 2012. április 3. 19:26 Oskar Levin írta, :
>
> > I can confirm this as a big problem. I'm getting attacked by various Call
> > of Duty 4 servers with big UDP packets. Someone spoofs my IP address and
> > the reply of getstatus (or something similar) is sent to me. The packet
> > which requests the info isn't big, but the reply is very large as this
> > contains player information etc.
> >
> > Best regards
> > Oskar Levin
> > os...@dataviruset.com
> >
> > -Ursprungligt meddelande-
> > Från: hlds_linux-boun...@list.valvesoftware.com [mailto:
> > hlds_linux-boun...@list.valvesoftware.com] För Kyle Sanderson
> > Skickat: den 3 april 2012 19:10
> > Till: Half-Life dedicated Linux server mailing list
> > Ämne: Re: [hlds_linux] LOIC and UDP flood. How to protect?
> >
> > http://www.securityfocus.com/archive/1/522076
> >
> > Isn't just LOIC... But yes, it's a bit ridiculous that you can take down
> a
> > server with just 1Mbit/s of traffic. Not much that can be done about it
> > either.
> >
> > Hope for TCP, at least that way it's slightly more difficult to hide the
> > spoofed sender from the destination.
> > Kyle.
> >
> > 2012/4/3 Никита Булаев [Nikita Bulaev] 
> >
> > > The problem NOT in bandwidth. It's possible to kill server just in
> 1Mbit.
> > >
> > > 3 апреля 2012 г. 20:05 пользователь
> > >  написал:
> > > > Message: 5
> > > > Date: Tue, 3 Apr 2012 10:07:09 +0200
> > > > From: lwf 
> > > > To: Half-Life dedicated Linux server mailing list
> > > >
> > > > Subject: Re: [hlds_linux] LOIC and UDP flood. How to protect?
> > > > Message-ID:
> > > ><
> > > ca++kgkr9cot1d7f+ddsfsrt9jwcs2gw+oitscblsikmzuqc...@mail.gmail.com>
> > > > Content-Type: text/plain; charset=KOI8-R
> > > >
> > > > Without any help from your ISP there is nothing you can do about a
> > > > bandwidth attack.
> > > >
> > > > 2012/4/3  [Nikita Bulaev] :
> > > >> In fact - no. Hoster, where we plase our root servers, wont filter
> > > >> DoS and Flood, it just can do this for money. But this kind of
> > > >> service is very expensive.
> > > >>
> > > >> 
> > > >>> Message: 8
> > > >>> Date: Tue, 3 Apr 2012 13:22:49 +0800
> > > >>> From: "dmex" 
> > > >>> To: "'Half-Life dedicated Linux server mailing list'"
> > > >>> ? ? ? ?
> > > >>> Subject: Re: [hlds_linux] LOIC and UDP flood. How to protect?
> > > >>> Message-ID: <000601cd1159$d2a73f30$77f5bd90$@gmail.com
> > > >
> > > >
> > > >>>
> > > 
> > > >>> Content-Type: text/plain; ? ? ? charset="us-ascii"
> > > >>>
> > > >>> DoS protection is the responsibility of your service provider,
> > > >>> there's
> > > not
> > > >>> much Valve or even you can do to prevent attacks.
> > > >>>
> > > >>> -Original Message-
> > > >>> From: hlds_linux-boun...@list.valvesoftware.com
> > > >>> [mailto:hlds_linux-boun...@list.valvesoftware.com] On Behalf Of
> > > >>> [Nikita Bulaev]
> > > >>> Sent: Tuesday, April 03, 2012 12:32 PM
> > > >>> To: hlds_linux@list.valvesoftware.com
> > > >>> Subject: [hlds_linux] LOIC and UDP flood. How to protect?
> > > >>>
> > > >>> Well, for now DoSers are using LOIC in UDP-mode. There is no use
> > > >>> to
> > > silent
> > > >>> this.
> > > >>>
> > > >>> The problem is that L4D1/2 servers are lagging while sending to
> > > >>> them
> > > UDP
> > > >>> packets at 32-bit lengh by LOIC.
> > > >>> This utility is using now almost by every DoSer and as for now
> > > >>> there
> > > is no
> > > >>> defense from this, even by IPTABLES. The only way is using
> > > >>> firewall
> > > before
> > > >>> root game servers.
> > > >>>
> > > >>> Friends! I'd like to be wrong! So is there a real working desigion
> > > >>> to protect from LOIC UDP?
> > > >>>
> > > >>> Best regards,
> > > >>> Nikita Bulaev
> > >
> > > ___
> > > To unsubscribe, edit your list preferences, or view the list archives,
> > > please visit:
> > > https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux
> > >
> > ___
> > To unsubscribe, edit your list preferences, or view the list archives,
> > please visit:
> > https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux
> >
> >
> > ___
> > To unsubscribe, edit your list preferences, or view the list archives,
> > please visit:
> > https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux
> >
> ___
> To unsubscribe, edit your list preferences, or view the list archives,
> please visit:
> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux
>
___
To unsubscribe, edit your list preferences, or view the