Posts: 117
	Threads: 34
	Joined: Nov 2014
	
Reputation: 
0
	 
 
	
	
		Up i use linux and i will pay for it if someone can solve this problem
	
	
	
	
		
	
 
 
	
	
	
		
	Posts: 3,793
	Threads: 196
	Joined: Jan 2010
	
Reputation: 
0
	 
 
	
	
		I want to help but to me it feels very vague what you are saying... 
Is your server unable to be pinged during the attack?
If yes, can players connect to the server?
If it is unable to be pinged, to me it seems straight out of the bat like a DDoS attack of some sort. I would follow up with the host, personally.
Or is this some new uprising hack I am unaware of?
	
	
	
	
		
	
 
 
	
	
	
		
	Posts: 67
	Threads: 4
	Joined: Dec 2011
	
Reputation: 
0
	 
 
	
	
		>The attacks are mostly using UDP Flood and UDP Fragmentation methods to spam the server process.
Where did you get that quote from? Your hosting provider?
	
	
	
	
		
	
 
 
	
	
	
		
	Posts: 3,133
	Threads: 71
	Joined: Dec 2013
	
Reputation: 
0
	 
 
	
	
		First of all, why would you set conncookies to 0? This disables a system that prevents the "Server Full" attack, not a very wise move there.
To me it seems like an issue with your firewall not being set up properly. It's more likely an issue with your host not properly setting up firewall and or not having any protection against network attacks whatsoever.
	
	
	
	
		
	
 
 
	
	
	
		
	Posts: 117
	Threads: 34
	Joined: Nov 2014
	
Reputation: 
0
	 
 
	
	
		as i said my solution is nitrado.net and they had very good protection.. i had never got attack like this before updating new version.. i think the only thing that can solve problem is anti server full attack plugin but for new version..
	
	
	
	
		
	
 
 
	
	
	
		
	Posts: 113
	Threads: 10
	Joined: Nov 2011
	
Reputation: 
0
	 
 
	
	
		What host are you currently using?