Urban Terror Forums: DRDoS - Urban Terror Forums

Jump to content

 Login | Register 
Advertisement
  • (27 Pages)
  • +
  • « First
  • 12
  • 13
  • 14
  • 15
  • 16
  • Last »
  • You cannot start a new topic
  • This topic is locked

DRDoS Rate Topic: ***** 1 Votes

Server used as reflector fro DRDoS

#131 User is offline   Drizzt Icon

  • Account: drizzt
  • Country:
  • Joined: 22-March 10
  • Posts: 164

Posted 22 January 2012 - 07:54 PM

View PostBarbatos, on 20 January 2012 - 07:39 PM, said:

You can now download the official patched builds:
http://www.urbanterr...loads/security/

Here is the source code:
https://github.com/B...r-UrbanTerror-4

A news post will be posted soon.


Then, with this security update, the problem is fixed?

#132 User is offline   looza Icon

  • Account: looza
  • Main tag: gXS.
  • Country:
  • Joined: 21-September 10
  • Posts: 56

Posted 22 January 2012 - 08:29 PM

Quote

Then, with this security update, the problem is fixed?


im not sure... there are still lots of incoming requests, i still ban the incoming ips in iptables.
im not sure if this is necessary, but i feel better when the requests dont even touch my gameserver :D

i try to ban much targest as possible... i have 100 ips now but always new ips show up,
maybe its useless because i dont know how much victims the atacker has. i hope its not endless?

This post has been edited by looza: 22 January 2012 - 09:13 PM



#134 User is offline   rfx Icon

  • Account: rfx
  • Country:
  • Joined: 01-March 10
  • Posts: 576

Posted 22 January 2012 - 10:07 PM

Absolutely right, it just needs a big fat news message now.


bullet_loaderAdvertisement

#136 User is offline   undead Icon

  • Account: undead
  • Joined: 06-June 10
  • Posts: 199

Posted 22 January 2012 - 11:05 PM

Can you merge the security updates into the main download page? I don't see a reason why you would want to advertise the vulnerable binaries and bury the fix into a separate page that's not linked to the main header. Everyone should have one download link that they use.

The github project is a mess. Can you remove the build directory, object files, subversion directories and other junk? Those changes obviously came from newer ioquake3 revisions (I can't see you updating the Irix target) and the commit logs don't mention anything.

This post has been edited by undead: 22 January 2012 - 11:07 PM


#137 User is offline   Rambetter Icon

  •   community dev   
  • Account: rambetter
  • Joined: 28-February 10
  • Posts: 1,140

Posted 23 January 2012 - 07:42 PM

Two things.

Barbatos - In my opinion I think you should compile the "official" server binary on Debian Lenny 5.0, which is an older system. Binaries compiled here will likely work on the largest number of other systems, including new ones.

As far as iptables scripts go, I would say that once you update your binary, it's pretty fruitless to have iptables block stuff also. Regardless of whether or not you use iptables, those incoming getstatus+getinfo requests will still be coming to your server machine. Also, the IP addresses being attacked are constantly changing, so attempting to maintain iptables with those IP addresses is not a worthwhile endeavor. The patched binary will only allow a very slow trickle of traffic through to the IP addresses being attacked.

#138 User is offline   looza Icon

  • Account: looza
  • Main tag: gXS.
  • Country:
  • Joined: 21-September 10
  • Posts: 56

Posted 23 January 2012 - 09:32 PM

Quote

Barbatos - In my opinion I think you should compile the "official" server binary on Debian Lenny 5.0, which is an older system. Binaries compiled here will likely work on the largest number of other systems, including new ones.


i compiled the "official" source on lenny, ok since i did that it isnt "official" anymore but if it helps someone here we go ->

http://gamexs.de/ioUrTded.i386

This post has been edited by looza: 05 March 2012 - 08:14 AM


#139 User is offline   Nitro Icon

  •   QA member   
  • Account: nitro
  • Main tag: |P|
  • Country:
  • Joined: 15-March 10
  • Posts: 1,133

Posted 23 January 2012 - 10:17 PM

View PostRambetter, on 23 January 2012 - 07:42 PM, said:

Two things.

Barbatos - In my opinion I think you should compile the "official" server binary on Debian Lenny 5.0, which is an older system. Binaries compiled here will likely work on the largest number of other systems, including new ones.

As far as iptables scripts go, I would say that once you update your binary, it's pretty fruitless to have iptables block stuff also. Regardless of whether or not you use iptables, those incoming getstatus+getinfo requests will still be coming to your server machine. Also, the IP addresses being attacked are constantly changing, so attempting to maintain iptables with those IP addresses is not a worthwhile endeavor. The patched binary will only allow a very slow trickle of traffic through to the IP addresses being attacked.



well it would depend solely on wether or not you are hosting other games, I host a Call of Duty 2 server which has the same problem but support for that game is long gone so the only way to protect it is to use the iptables.
Lian Li pc-o11dw Der 8auer Edition · Gigabyte x570 Aorus Xtreme · AMD Ryzen 9 5950x 16-Core
32GB DDR4 3800MHz CL16 · 2x 1TB Samsung NVMe RAID 0 · 16GB Radeon RX 6900XT Liquid Cooled

#140 User is offline   Pussnboots Icon

  • Account: pussnboots
  • Joined: 01-March 10
  • Posts: 556

Posted 23 January 2012 - 11:56 PM

Well, this is quite easy to do. I have a script I made myself for troublesome players that change their IP and GUID to evade bans.. I just became aware of this issue myself via another clan that may be having the same problems (Granted from what I have seen, there are no floods UDP or TCP that I have seen directly via TCP and UDP packets with this particular instance.)

I'd suggest also modifying your firewall to dump/block/reject excessive requests.

If you are getting flooded with packets, it's easy to find who the culprit is easily by monitoring packet traffic. If anyone who is affected, has the ability to detect this, I'd surely like to know the IP address of the offender. I can take it from there >:D

I won't give instructions because such a thing should not be left to a novice to determine. But for those of you that can.. Give me the info please.. I would like your proof and I'll take it from there.

This type of scripting is INCREDIBLY easy and is likely the work of some n00b. (Yes, I'll start another war >:D One tried, and one failed.. Who's next!? :D )
Let's get rid of this tool!

Thanks! :D

  • (27 Pages)
  • +
  • « First
  • 12
  • 13
  • 14
  • 15
  • 16
  • Last »
  • You cannot start a new topic
  • This topic is locked

1 User(s) are reading this topic
0 members, 1 guests, 0 anonymous users

Advertisement


Copyright © 1999-2024 Frozensand Games Limited  |  All rights reserved  |  Urban Terror™ and FrozenSand™ are trademarks of Frozensand Games Limited

Frozensand Games is a Limited company registered in England and Wales. Company Reg No: 10343942