23.10.2012, 16:22
Well you need to re-read the iptables manual. That rule will drop 10 packets every second to the samp server. Remember each player will be sending a lot of packets to the server per second.
For rate limiting you are better off looking at the ipt_recent module as this can be used to rate limit per ip address. You can also match specific packets with the u32 module.
I noticed an up spike on my server recently caused by a player list query flood. I solved it with rules matching the attack.
You really need to capture some of the packets first, then you can write appropriate rate limiting rules, or even a simple ip block if its only caused by a single ip.
For rate limiting you are better off looking at the ipt_recent module as this can be used to rate limit per ip address. You can also match specific packets with the u32 module.
I noticed an up spike on my server recently caused by a player list query flood. I solved it with rules matching the attack.
You really need to capture some of the packets first, then you can write appropriate rate limiting rules, or even a simple ip block if its only caused by a single ip.

