Dialog exploits, packet modifications and other alerts (before 0.3x)
#1

Well, seeing that some people (such as me) get a massive log filesize from just constant spam with these alerts, I reckon it should be toggled or have a callback once it is detected. Yeah, hackers cause this constantly.

I know there's fixes2 but as far as I know, it disables the server_log (could be untrue).

Thanks.
Reply
#2

I have experienced that too - logs over 100 MB because of some hacker using the dialog exploit. Also "the packet was modified" message shows sometimes very often and increase the log size (which could be problem for someone who is for example using a PHP script to copy the logs each day through FTP etc.).
Reply
#3

Quote:
Originally Posted by niCe
Посмотреть сообщение
I have experienced that too - logs over 100 MB because of some hacker using the dialog exploit. Also "the packet was modified" message shows sometimes very often and increase the log size (which could be problem for someone who is for example using a PHP script to copy the logs each day through FTP etc.).
Highest I had was 498mb lol, and a pain in the ass it was when I had to find a crash in that file.
Reply
#4

Yep, even up to ~500MB here. Definitely needs attention.
Reply
#5

0.3x adds some security fixes. i think (or hope ) it already includes this issues
Reply
#6

Quote:
Originally Posted by hub4
Посмотреть сообщение
0.3x adds some security fixes. i think (or hope ) it already includes this issues
In the new version (which I usually test once R7 is out) he mentioned addressing which I think it means that it will send another couple of alerts. Though read carefully, I was talking about the constant spam these alerts output.

Quote:
Originally Posted by Kalcor
Посмотреть сообщение
0.3x contains some important netcode changes, including general security updates that address potential Denial of Service attacks against servers.

- A low-level netcode problem has been addressed that will lower the number of packets that need to be sent from the client and server.
- The potential for a player to send a 0-length command has been addressed.
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)