![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() - please write in English which sounds sense (orthography should be recognizable) - no rumours, no clan-news (except larger events) - always with list of reference/originator - please create compact news, 4-10 lines, colors, bold and cursive fontype is allowed (*) We decide finally which news will be published or not. Not published news remains here only if it is acceptable. |
![]() - bitte vernünftiges Deutsch mit erkennbarer Rechtschreibung ;) - keine Gerüchte, keine Clannews (ausgenommen größere Veranstaltungen) - immer mit Quellen- oder Urheberangabe - bitte kompakte News, 4-10 Zeilen, Farbe, fett, kursiv möglich (*) Wir entscheiden letztlich, welche News veröffentlicht wird und welche nicht. Nicht veröffentlichte News bleiben hier in diesem Forum bestehen, es sei denn sie sind für uns inakzeptabel. |
![]() - lisible et sans fautes ;) - pas de "on dit", pa de news des clans (sauf les grandes manifs) - toujours citer les sources - essaies de faire compact, 4 - 10 lignes, couleur, gras possible (*) On decide a la fin, laquelle des news va etre publie und laquelle non. News non publies restent dans ce forum, sauf si elle est inacceptable! |
![]() |
Guest_Dutchman_* |
![]()
Post
#1
|
Guests ![]() |
Hi,
since a few months there is a exploit floating around abusing the getstatus requests to launch dos attacks against random targets and as a side effect creating massive lags on clients and the server. Cause of this Yada from Staatsschutz.org made a patch for linux wich reduces the effectivity of this exploit. QUOTE etfix_getstatus 0.2 by yada / staatsschutz.org / jan. 2011 ------ This patch will ratelimit etded.x86 2.60b getstatus requests to 1 per IP every 4 seconds. This approach is not ideal as the real fix would be to change the protocol to require some kind of handshake but this would break compatibility with existing clients so its not really practical. The worst part is that the patch is (in theory) vulnerable to a dos where legitimate clients could be denied access to the getstatus command but i feel this is less of a headache than kiddies using the server to flood random targets and thereby lagging the server and pushing bandwith usage through the roof (master server is excluded from ratelimit so no need to worry about it being denied using spoofed packets). Download the file right here. A readme.txt, the sourcecode and a small howto are included. Your free to distribute this file. This post has been edited by Dutchman: Jan 6 2011, 11:33 AM |
|
|
![]() |
![]()
Post
#2
|
|
![]() ![]() Group: Members Joined: 4-January 09 From: Hinterm Mond :P Member No.: 80261 ![]() |
cpu is on 21 - 22 %
network is now ok rx: 130.66 kB/s 2191 p/s tx: 14.47 kB/s 74 p/s ^^ Danke :) Ich weiß nicht ob du ihn noch kennst aber Opa hat nach dir gefragt ^^ PS : old network usage ^^ rx: 102.67 kB/s 1729 p/s tx: 698.75 kB/s 551 p/s lG This post has been edited by AmericanPie1979: Oct 19 2011, 06:32 PM -------------------- |
|
|
Guest_Dutchman_* |
![]()
Post
#3
|
Guests ![]() |
cpu is on 21 - 22 % network is now ok rx: 130.66 kB/s 2191 p/s tx: 14.47 kB/s 74 p/s ^^ Danke :) Ich weiß nicht ob du ihn noch kennst aber Opa hat nach dir gefragt ^^ PS : old network usage ^^ rx: 102.67 kB/s 1729 p/s tx: 698.75 kB/s 551 p/s lG OPA hehe...yes and his fellow "MOERDER" ....offcourse i know them, they were a while on our server.....4 years ago? ...crazy people :-D We can PM about this but please say hello to him :) Well, glad it worked for ya dude :-) and ps. with the linux command 'top' you can check wich process uses most of the cpu. |
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 1st July 2025 - 04:58 PM |