25.08.2017, 21:31
Quote:
Well.. It's not exploited. There is some "requests per second limit" hardcoded in sa-mp executable and that's all. The attackers are reaching the limit and that's why it's not responding.
|
It's possible that RakNet has a connection limit in place, that may refuse a connections made within a set period of time, I believe most are if you have more then 30 connections within 1ms - 15ms then it would refuse the connection. I know a lot of third party multi-player add-ons follow the same pattern.
Which is why it then becomes easier for these people to attack, since they can make delays between connections and just have the server send useless packets. UDP is a bitch to work against, there no real way to identify or even analyses the host, which makes it so much harder to protect against DDos attacks.