Servers are getting attacked
#21

Here is the source code: https://ubi.livs.pl/samp/samp_prot_ver2_s.zip
Reply
#22

Quote:
Originally Posted by Ubi
View Post
is compatible 0 3 x and 0 3 z ?
Reply
#23

Quote:
Originally Posted by nbx2000
View Post
is compatible 0 3 x and 0 3 z ?
This is a very old and irrelevant version, please upgrade to 0.3.7.
Reply
#24

0.3.7 R2-2 version: https://ubi.livs.pl/samp/samp_prot_ver3_s.zip
Reply
#25

Quote:
Originally Posted by Ubi
View Post
it not working
Reply
#26

Quote:
Originally Posted by labiyebu
View Post
it not working
http://ubi.livs.pl/samp/samp_prot_ver2.zip
Try to install this version.
Reply
#27

Hey hello!

I thought I could help here but you have to configure it by yourself so this is not a tutorial
I give you a tip: Don't route the address ranges of the RFC1918. That will solve your flooding issues. No Bogon-Filtering or something similar. How can I proof that it's working? Why the mastertable was down is not a matter of my since I didn't have access or time for it to think about it (I'm just inquisitive now, time to put that back into the cache and think/inform about it later again, whenever).
I'm only able to help you out with that little useful information!
Please also don't throw this tip away. I really didn't get much time but I got this message from a samp member and that it had affected more than only one samp members. I thought about it and this was my result for you. I also had opened my server log and network logs and I scrolled 10 days back and checked their contents. That's a work of 30 minutes approx. and that's much currently.

Have a nice day!

-Doddinger.

(I think I mentioned the RFC1918 once already in a thread)

Ah and I forgot one thing: I don't question the other solutions! It's just a support from my side!
Reply
#28

Quote:
Originally Posted by labiyebu
View Post
it not working
it work,judging by the log
Quote:

[21:02:03] Loading plugin: samp_prot.so
[21:02:03] ### samp_prot by Ubinoob loaded (ver 3)
[21:02:03] ### Professional game hosting: https://LiveServer.pl
[21:02:03] ### Memory segments unprotected
[21:02:03] ### Query system patched
[21:02:03] ### Cookie logging disabled
[21:02:03] ### Query logging disabled
[21:02:03] Loaded

but nothing has changed.
still not visible.
Need plugin settings? (****** translate sorry)
Reply
#29

Quote:
Originally Posted by Gettopro
View Post
it work,judging by the log


but nothing has changed.
still not visible.
Need plugin settings? (****** translate sorry)
And again, try to install http://ubi.livs.pl/samp/samp_prot_ver2.zip rather than last version.
This works fine.
Reply
#30

Quote:
Originally Posted by Ubi
View Post
Thank you. This decision helped a lot.
Reply
#31

I have tried to use sleep 1 and the above plugin, however the server still fails to respond to data requests from the client, it also refuses if i do a PHP socket query for the data.

any further info from last post on resolving it?
Reply
#32

This is getting worse.
Reply
#33

Actually the plugin is working well but it's not a magic solution. It just removes SOME(!) internal query limits and that's all. If you are still facing some problems, be sure to check if you (or your hosting provider) are not limiting traffic incoming to your server.

We have some customers with this plugin installed and after disabling specific rate-limits on firewalls, it's working fine.
Reply
#34

https://sampforum.blast.hk/showthread.php?tid=665085

Here is a python script that works as a cache on top of your client, only for the samp query packages. Its written in python.

Feel free to contribute
Reply
#35

Any final solution to this? I was waiting for some server update to resolve this
Reply
#36

We are seriously in need of an update as soon as possible.
Reply
#37

The IP list of the attackers in sa:mp servers is static. The attacker is adding sa:mp servers one by one. He hasn't updated his list for the last 2 weeks. So the IP address of the attackers in the sa: mp server list is two weeks ago. Server owners get rid of the attack by buying a new server(new ip). Because the attacker has long been not updating the IP list of sa: mp servers. You can also get rid of the attack by buying a new server.
Reply
#38

Quote:
Originally Posted by Mutemadiyen
View Post
The IP list of the attackers in sa:mp servers is static. The attacker is adding sa:mp servers one by one. He hasn't updated his list for the last 2 weeks. So the IP address of the attackers in the sa: mp server list is two weeks ago. Server owners get rid of the attack by buying a new server(new ip). Because the attacker has long been not updating the IP list of sa: mp servers. You can also get rid of the attack by buying a new server.
How to lose your playerbase:
Reply
#39

Quote:
Originally Posted by RogueDrifter
View Post
How to lose your playerbase:
As if it didn't appear on the Internet list or Hosted list for weeks, it would be very different. If you have a better suggestion, stage is yours.
Reply
#40

Quote:
Originally Posted by Mutemadiyen
View Post
The IP list of the attackers in sa:mp servers is static. The attacker is adding sa:mp servers one by one. He hasn't updated his list for the last 2 weeks. So the IP address of the attackers in the sa: mp server list is two weeks ago. Server owners get rid of the attack by buying a new server(new ip). Because the attacker has long been not updating the IP list of sa: mp servers. You can also get rid of the attack by buying a new server.
or by Just ... Updating the Port?
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)