traffic network (flood attack)
#7

Well you need to re-read the iptables manual. That rule will drop 10 packets every second to the samp server. Remember each player will be sending a lot of packets to the server per second.

For rate limiting you are better off looking at the ipt_recent module as this can be used to rate limit per ip address. You can also match specific packets with the u32 module.

I noticed an up spike on my server recently caused by a player list query flood. I solved it with rules matching the attack.

You really need to capture some of the packets first, then you can write appropriate rate limiting rules, or even a simple ip block if its only caused by a single ip.
Reply


Messages In This Thread
traffic network (flood attack) - by guesto - 17.10.2012, 16:00
Re: traffic network (flood attack) - by Lightning[SV] - 17.10.2012, 17:02
Re: traffic network (flood attack) - by kaisersouse - 18.10.2012, 21:37
Re : traffic network (flood attack) - by ombre - 18.10.2012, 22:18
Re : traffic network (flood attack) - by guesto - 18.10.2012, 22:27
Re : traffic network (flood attack) - by guesto - 23.10.2012, 15:35
Re: traffic network (flood attack) - by Lightning[SV] - 23.10.2012, 16:22
Re : Re: traffic network (flood attack) - by guesto - 23.10.2012, 16:35

Forum Jump:


Users browsing this thread: 1 Guest(s)