Posts: 117
Threads: 34
Joined: Nov 2014
Reputation:
0
Up i use linux and i will pay for it if someone can solve this problem
Posts: 3,793
Threads: 196
Joined: Jan 2010
Reputation:
0
I want to help but to me it feels very vague what you are saying...
Is your server unable to be pinged during the attack?
If yes, can players connect to the server?
If it is unable to be pinged, to me it seems straight out of the bat like a DDoS attack of some sort. I would follow up with the host, personally.
Or is this some new uprising hack I am unaware of?
Posts: 67
Threads: 4
Joined: Dec 2011
Reputation:
0
>The attacks are mostly using UDP Flood and UDP Fragmentation methods to spam the server process.
Where did you get that quote from? Your hosting provider?
Posts: 3,133
Threads: 71
Joined: Dec 2013
Reputation:
0
First of all, why would you set conncookies to 0? This disables a system that prevents the "Server Full" attack, not a very wise move there.
To me it seems like an issue with your firewall not being set up properly. It's more likely an issue with your host not properly setting up firewall and or not having any protection against network attacks whatsoever.
Posts: 117
Threads: 34
Joined: Nov 2014
Reputation:
0
as i said my solution is nitrado.net and they had very good protection.. i had never got attack like this before updating new version.. i think the only thing that can solve problem is anti server full attack plugin but for new version..
Posts: 113
Threads: 10
Joined: Nov 2011
Reputation:
0
What host are you currently using?