21.03.2019, 16:21
(
Last edited by denNorske; 21/03/2019 at 06:46 PM.
)
Quote:
First consider don't answer the packets with wrong UDP datagram for query mechanism, I mean the packets with wrong bytes for IP and port, the SA-MP Server responds to every 39-43 packet where is written "SAMP" and the opcode.
|
(https://sampforum.blast.hk/showthread.php?tid=642085)
What do you mean by 39-43 here?
Four first bytes of the payload are signed with SAMP.
anyway,
I am trying to filter the packages but I have managed to block out the pings that happen when players try to establish a connetion ingame with almost empty packets.. The following screenshot shows internal package handling (7850) and external (port 7778).

Seems like the pings start with Port bytes here (+ something else which i am not sure what is for)
So I'll go ahead and adjust so the code only blocks packets that are containing "SAMP" so i don't catch all other sorts of packages which i can't find documentation on.
Also, I can rate-limit requests to not pass through my python UDP proxy faster than x ms per spoofed IP, lowering the amounts of requests by _alot_ towards the server. Even disabling certain OP-codes could help for a start.
If someone is good with python, and could contribute for the community, hit me up. I'll put it on Git when done under the WTFPL license.