SA-MP Forums Archive
Blocking [x] due to a 'server full' attack - Printable Version

+- SA-MP Forums Archive (https://sampforum.blast.hk)
+-- Forum: SA-MP Scripting and Plugins (https://sampforum.blast.hk/forumdisplay.php?fid=8)
+--- Forum: Scripting Help (https://sampforum.blast.hk/forumdisplay.php?fid=12)
+--- Thread: Blocking [x] due to a 'server full' attack (/showthread.php?tid=333955)



Blocking [x] due to a 'server full' attack - Jay_ - 13.04.2012

I was testing for an issue on my server and needed to connect 70 NPCs to trace a bug for debugging purposes.

I successfully connected the first 30 NPCs until a message occurred displaying the following:
"Blocking 127.0.0.1 due to a 'server full' attack (2)"

Log:

Code:
[13:18:16] Incoming connection: 127.0.0.1:52979
[13:18:16] Incoming connection: 127.0.0.1:52980
[...]
[13:18:21] Blocking 127.0.0.1 due to a 'server full' attack (2)
If this is a protection tool against server flood attacks, perhaps an exception could be added for local IP addresses?

Thanks.


Re: Blocking [x] due to a 'server full' attack - Amit_B - 13.04.2012

This have been already reported. I'm wondering how they'll handle it.


Re: Blocking [x] due to a 'server full' attack - linuxthefish - 13.04.2012

Don't connect them all at once, connect maby 10 at a time.


Re: Blocking [x] due to a 'server full' attack - Jochemd - 13.04.2012

Quote:
Originally Posted by linuxthefish
View Post
Don't connect them all at once, connect maby 10 at a time.
Or 5, because 10 got also blocked for me once


Re: Blocking [x] due to a 'server full' attack - niCe - 13.04.2012

Connecting one NPC each 100ms works too (for unlimited amount of NPCs).


AW: Blocking [x] due to a 'server full' attack - Meta - 13.04.2012

Guys, this has been added in some 0.3b/c version. I never knew a correct delay tho.


Re: Blocking [x] due to a 'server full' attack - Jochemd - 13.04.2012

I bet Kalcor won't tell because bot spammers can make an easy workaround knowing that.


Re: Blocking [x] due to a 'server full' attack - Norrin - 16.01.2013

Quote:
Originally Posted by niCe
View Post
Connecting one NPC each 100ms works too (for unlimited amount of NPCs).
Tried 2000ms, won't work.


Re: Blocking [x] due to a 'server full' attack - CodyCummings - 16.01.2013

It seems there's some obvious security issues regarding NPC's that haven't been addressed yet, anyone with a prompt and the samp-npc file can fill up the NPC slots as he wishes on any server, to be honest NPC's should only be allowed to connect from the server's local network...


Re: Blocking [x] due to a 'server full' attack - aleck - 06.02.2013

I just put 0.3x on my server , and i saw i have that problem too , any solution for that? only got 14npc.