IPB

Welcome Guest ( Log In | Register )

> Rules / Regeln

- no copy 'n paste, only your own words (quoting is possible)
- please write in English which sounds sense (orthography should be recognizable)
- no rumours, no clan-news (except larger events)
- always with list of reference/originator
- please create compact news, 4-10 lines, colors, bold and cursive fontype is allowed

(*) We decide finally which news will be published or not. Not published news remains here only if it is acceptable.
- kein Copy&Paste, nur eigene Worte (Zitat möglich)
- bitte vernünftiges Deutsch mit erkennbarer Rechtschreibung ;)
- keine Gerüchte, keine Clannews (ausgenommen größere Veranstaltungen)
- immer mit Quellen- oder Urheberangabe
- bitte kompakte News, 4-10 Zeilen, Farbe, fett, kursiv möglich

(*) Wir entscheiden letztlich, welche News veröffentlicht wird und welche nicht. Nicht veröffentlichte News bleiben hier in diesem Forum bestehen, es sei denn sie sind für uns inakzeptabel.
- pas de copier coller, vos propres mots (citations possible)
- lisible et sans fautes ;)
- pas de "on dit", pa de news des clans (sauf les grandes manifs)
- toujours citer les sources
- essaies de faire compact, 4 - 10 lignes, couleur, gras possible

(*) On decide a la fin, laquelle des news va etre publie und laquelle non. News non publies restent dans ce forum, sauf si elle est inacceptable!
4 Pages V  < 1 2 3 4 >  
Reply to this topicStart new topic
> POTENTIONAL FIX: etded.x86 getstatus exploit
-sunkist-
post Oct 15 2011, 02:45 AM
Post #16


Group Icon Sergeant

Group: Members

Joined: 21-September 07
Member No.: 59775



I didn't see any getstatus floods since april 2011! Anyway...

For whom this may be interesting, please have a look at http://www.vollspack.org/ and see the linked script.

With best regards, Sunkist
Go to the top of the page
 
+Quote Post
$mart
post Oct 15 2011, 10:02 AM
Post #17


Group Icon Major

Group: Members

Joined: 19-September 07
From: South of France xDDDDD
Member No.: 59683



Still attacks 10/10/11 : http://www.hirntot.org/distribution/viewto...f8577789#p14936
My hoster 87.98.168.156 is down still yesterday ... maybe same reason.
And when I run home-server (windows), after some minutes, my bandwith goes to 100% busy even with no players ...

So no, ddos always present, like hacks, like virus, ... grrrrrrrr bash.gif bash.gif


(anyway thanks man to share your script-shell with community)


This post has been edited by $mart: Oct 15 2011, 10:03 AM


--------------------
Go to the top of the page
 
+Quote Post
schnoog
post Oct 15 2011, 10:24 AM
Post #18


Group Icon Master of Desaster

Group: Management

Joined: 7-March 06
From: Wehr
Member No.: 23716



The getstatus exploit is more active than ever.

I talked to some admins and more than 10 000 incoming packets per seconds are not very rare.

OldMan posted a modified version of the q3_getstatus_ddos script here: http://wolffiles.de/index.php?forum-showposts-44-p5#

This one not only spoil plaintext getstatus attacks, it also handles zoneRef getstatus attacks.


That is like it looks after the script finnished his work:
CODE
rx: 6,1 Mbit/s 13862 p/s tx: 12 kbit/s 2 p/s


OldMan integrated some very nice features (delayed unban for example)

Unfortunality I`m not familar with the windows powershell, but there should also be a possibility to do such things.


--------------------



Go to the top of the page
 
+Quote Post
-sunkist-
post Oct 17 2011, 06:51 PM
Post #19


Group Icon Sergeant

Group: Members

Joined: 21-September 07
Member No.: 59775



QUOTE (schnoog @ Oct 15 2011, 11:24 AM) *
The getstatus exploit is more active than ever.

I talked to some admins and more than 10 000 incoming packets per seconds are not very rare.


Oh WOW! That's true! Holy shit!

I didn't see any attacks because I didn't list my ET servers in the Masterlist. Since I listed one of my ET servers again, the attacks are back - more then before!

Thank's for the hint!

Now I know where the attackers get the targets from: The Master Browser List!

When you use:

seta sv_master1 ""
seta sv_master2 ""
seta sv_master3 ""
seta sv_master4 ""
seta sv_master5 ""

in your server.cfg, your servers will not get listed in the Master Browser List and therefor they will not get attacked.
Go to the top of the page
 
+Quote Post
Guest_Dutchman_*
post Oct 17 2011, 10:52 PM
Post #20




Guests






QUOTE (-sunkist- @ Oct 17 2011, 07:51 PM) *
blabla

this has nothing to do with the topic about a patch for linux servers.
Is there a possibility you communicate in a normal way? thnx.
Go to the top of the page
 
+Quote Post
-sunkist-
post Oct 17 2011, 11:03 PM
Post #21


Group Icon Sergeant

Group: Members

Joined: 21-September 07
Member No.: 59775



QUOTE (Dutchman @ Oct 17 2011, 11:52 PM) *
QUOTE (-sunkist- @ Oct 17 2011, 07:51 PM) *
blabla

this has nothing to do with the topic about a patch for linux servers.
Is there a possibility you communicate in a normal way? thnx.


Well, I regret to communicate in a higher level.

There will be no patch for linux servers from the vendor. But you may use one of the iptables scripts offered by me (http://www.vollspack.org/) or by others. These scripts will block these attacks. But you still will receive the traffic. There is nothing you can do against it.

This post has been edited by -sunkist-: Oct 17 2011, 11:05 PM
Go to the top of the page
 
+Quote Post
Guest_Dutchman_*
post Oct 17 2011, 11:16 PM
Post #22




Guests






QUOTE (-sunkist- @ Oct 18 2011, 12:03 AM) *
QUOTE (Dutchman @ Oct 17 2011, 11:52 PM) *
QUOTE (-sunkist- @ Oct 17 2011, 07:51 PM) *
blabla

this has nothing to do with the topic about a patch for linux servers.
Is there a possibility you communicate in a normal way? thnx.


Well, I regret to communicate in a higher level.

There will be no patch for linux servers from the vendor. But you may use one of the iptables scripts offered by me (http://www.vollspack.org/) or by others. These scripts will block these attacks. But you still will receive the traffic. There is nothing you can do against it.

The fix i posted for linux servers as stated from yada in the readme file if fine.
Your post has nothing to do with solving it if you wan't to get your server(s) listed.
Go to the top of the page
 
+Quote Post
-sunkist-
post Oct 17 2011, 11:21 PM
Post #23


Group Icon Sergeant

Group: Members

Joined: 21-September 07
Member No.: 59775



QUOTE (Dutchman @ Oct 18 2011, 12:16 AM) *
QUOTE (-sunkist- @ Oct 18 2011, 12:03 AM) *
QUOTE (Dutchman @ Oct 17 2011, 11:52 PM) *
QUOTE (-sunkist- @ Oct 17 2011, 07:51 PM) *
blabla

this has nothing to do with the topic about a patch for linux servers.
Is there a possibility you communicate in a normal way? thnx.


Well, I regret to communicate in a higher level.

There will be no patch for linux servers from the vendor. But you may use one of the iptables scripts offered by me (http://www.vollspack.org/) or by others. These scripts will block these attacks. But you still will receive the traffic. There is nothing you can do against it.

The fix i posted for linux servers as stated from yada in the readme file if fine.
Your post has nothing to do with solving it if you wan't to get your server(s) listed.


Wrong!

The "fix" will not just drop the attackers traffic, it will let the traffic go to your servers ET software (server side) and will cause lag! Iptables will prevent the software from receiving the attackers traffic and will cause much less lag.

The listed cvars will prevent you from receiving the traffic at all!

This post has been edited by -sunkist-: Oct 17 2011, 11:21 PM
Go to the top of the page
 
+Quote Post
Guest_Dutchman_*
post Oct 17 2011, 11:50 PM
Post #24




Guests






ok:)
Go to the top of the page
 
+Quote Post
AmericanPie1979
post Oct 18 2011, 08:21 AM
Post #25


Group Icon Master Sergeant

Group: Members

Joined: 4-January 09
From: Hinterm Mond :P
Member No.: 80261



good morning :)


i found maybe a solution for this problem ^^

i look for it now :P maybe it works ^^

i was on server to play so it works :)

we dont let us flood :P but why it woks now ?? 01lol.gif

i used many fixes.....from schnoog........i updated the Kernel and getted flooded again ^^

and now i have cpu usage from 13 % ^^ befor it was 50 % :)



This post has been edited by AmericanPie1979: Oct 18 2011, 08:31 AM


--------------------





Go to the top of the page
 
+Quote Post
-sunkist-
post Oct 18 2011, 08:49 PM
Post #26


Group Icon Sergeant

Group: Members

Joined: 21-September 07
Member No.: 59775



QUOTE (AmericanPie1979 @ Oct 18 2011, 09:21 AM) *
good morning :)


i found maybe a solution for this problem ^^

i look for it now :P maybe it works ^^

i was on server to play so it works :)

we dont let us flood :P but why it woks now ?? 01lol.gif

i used many fixes.....from schnoog........i updated the Kernel and getted flooded again ^^

and now i have cpu usage from 13 % ^^ befor it was 50 % :)



Kannst Du bitte mal in Deiner Muttersprache sagen, was Du sagen willst? Ich kann zwar Deinen englischen Text uebersetzen, aber dabei kommt irgendwie nichts sinnvolles raus.
Go to the top of the page
 
+Quote Post
TomDome
post Oct 18 2011, 09:44 PM
Post #27


Group Icon Tastenklimperer

Group: Management

Joined: 4-August 06
From: "Toscana of Germany" (Dreieck KA-LU-NW)
Member No.: 31172



Ich denke es ist rauslesbar was er sagen will und daß er in englisch schreibt ist eher von Vorteil, da dann mehr Leute daran teilhaben können.


--------------------
cheers Tom
...providing service for the sl since 2006.

Dont forget, this site is about games, friends and fun. Keep it all nice and friendly.



Go to the top of the page
 
+Quote Post
AmericanPie1979
post Oct 18 2011, 10:29 PM
Post #28


Group Icon Master Sergeant

Group: Members

Joined: 4-January 09
From: Hinterm Mond :P
Member No.: 80261



Ich würde mal sagen wer lesen kann ist klar im Vorteil ^^

ich habe eine gepatchte Gameserver Kernel installiert und noch paar sachen geändert

ist aber bis jetz nur ein test ^^

hab gemerkt das es besser wurde als ich die Masterserver aus der cfg rausgenommen habe.....

sind einige Sachen die ich geändert habe ^^

PS : werde denk ich mal wieder angegriffen.......cpu auslastung steigt wieder stetig.......man wasn kack ey sadd.gif frag mich was die deppen davon haben

32 % cpu usage.....nich soooo viel aber naja man sehen wie es sich entwickelt

This post has been edited by AmericanPie1979: Oct 18 2011, 10:43 PM


--------------------





Go to the top of the page
 
+Quote Post
$mart
post Oct 19 2011, 08:01 AM
Post #29


Group Icon Major

Group: Members

Joined: 19-September 07
From: South of France xDDDDD
Member No.: 59683



Hello

32% CPU => with how many players and/or bots ?

Because when my home-server is "attacked", I don't notice CPU increase. ( I just see, with "NetMeter.exe" my Upload traffic growing to 110-120 kB/s (the maximum!), and confirmation is given by "CommView.exe" )

So are you sure your 32% CPU is due to an "attack", maybe another problem ?

GoodLuck crash.gif

This post has been edited by $mart: Oct 19 2011, 08:02 AM


--------------------
Go to the top of the page
 
+Quote Post
Ligustah
post Oct 19 2011, 08:23 AM
Post #30


Group Icon Corporal

Group: Members

Joined: 25-December 09
Member No.: 89191



ZITAT($mart @ Oct 19 2011, 09:01 AM) *
Hello

32% CPU => with how many players and/or bots ?

Because when my home-server is "attacked", I don't notice CPU increase. ( I just see, with "NetMeter.exe" my Upload traffic growing to 110-120 kB/s (the maximum!), and confirmation is given by "CommView.exe" )

So are you sure your 32% CPU is due to an "attack", maybe another problem ?

GoodLuck crash.gif


It might be due to the fact the the upload rate of servers is much greater than just 120 kB/s. When the attacks first started on my server it reached
upload rates of up to 80 Mbps, which caused high CPU utilization (mostly due to I/O waits)
Go to the top of the page
 
+Quote Post

4 Pages V  < 1 2 3 4 >
Reply to this topicStart new topic
1 User(s) are reading this topic (1 Guests and 0 Anonymous Users)
0 Members:

 



RSS Lo-Fi Version Time is now: 1st July 2025 - 06:05 AM