Raised This Month: $12 Target: $400
 3% 

A2S Attacks


Post New Thread Reply   
 
Thread Tools Display Modes
Author Message
bestmeth0ds
SourceMod Donor
Join Date: Jul 2010
Old 02-12-2011 , 20:57   A2S Attacks
Reply With Quote #1

Hello, I was wondering if anyone knows how to block people from attacking my servers with A2S packets. I have blocked A2S_INFO packets with addons such as DAF, but it seems the attackers are using other forms of A2S to hit my servers. Any information would be deeply appreciated and if anyone could "code" some sort of fix I could pay them.
__________________
www.NitrateInteractive.com
bestmeth0ds is offline
Send a message via Skype™ to bestmeth0ds
bestmeth0ds
SourceMod Donor
Join Date: Jul 2010
Old 02-13-2011 , 13:02   Re: A2S Attacks
Reply With Quote #2

Does anyone have any useful information? I know I'm not the only one being hit with these attacks.


Edit: I believe they are using these types of packets.

A2S_PLAYER
A2S_RULES
__________________
www.NitrateInteractive.com

Last edited by bestmeth0ds; 03-16-2011 at 23:28.
bestmeth0ds is offline
Send a message via Skype™ to bestmeth0ds
secu2
Junior Member
Join Date: Dec 2010
Old 02-21-2011 , 17:48   Re: A2S Attacks
Reply With Quote #3

DAF?
secu2 is offline
nightrider
SourceMod Donor
Join Date: Dec 2008
Old 02-21-2011 , 18:27   Re: A2S Attacks
Reply With Quote #4

DAF
http://www.sourceop.com/modules.php?...download&cid=9
__________________
[SIGPIC][/SIGPIC] the pantless
I am the Night Rider!, I'm a fuel-injected suicide machine.
I am a rocker! I am a roller!, I am an out-of-controller!


nightrider is offline
ojmdk476oj
AlliedModders Donor
Join Date: Dec 2009
Old 02-22-2011 , 01:27   Re: A2S Attacks
Reply With Quote #5

I don't know how to fix it, but be glad they are not attacking your hole ip... Have tried that.. Not fun at all.
ojmdk476oj is offline
tigerox
AlliedModders Donor
Join Date: Oct 2008
Location: Canada
Old 03-01-2011 , 21:49   Re: A2S Attacks
Reply With Quote #6

If you use linux check out connection tracking using iptables. Unless it is a spoofed attack this should fix your problem.
__________________
tigerox is offline
Samantha
SourceMod Donor
Join Date: Feb 2010
Location: Madagascar
Old 03-01-2011 , 22:44   Re: A2S Attacks
Reply With Quote #7

DAF doesn't block A2S_INFO packets afaik, DAF blocks A2C_PRINT, use querycache, but load it late, meaning "sm exts load query_cache" when an attack is occurring and see if it does anything.
__________________
"I give sopport and knolage in making extractions"
"MASTER(D) - dun0: are you mocing me?" -Master the grate

Plugins
Godmode Until Attack | No Block Team Filter
Extensions
Rcon Hooks
Samantha is offline
bestmeth0ds
SourceMod Donor
Join Date: Jul 2010
Old 03-16-2011 , 23:26   Re: A2S Attacks
Reply With Quote #8

For anyone still stressing on this issue I have found a solution. Here is a ruby script I use to block A2S attacks.

PHP Code:
#!/usr/bin/env ruby

#Path to iptables
iptables 'sudo /sbin/iptables'
#Servers we want to enter in to the firewall
servers = [
          {:
ip => '127.0.0.1',
          :
ports => [ 2701327014270152701627017270182701927025 ]},
          {:
ip => '127.0.0.1',
          :
ports => [ 2701327014270152701627017270182701927025 ]}
          ]
#clear old stuff
`#{iptables} -F`

### default rule for established connections
`#{iptables} -A OUTPUT -m state --state established,related -j ACCEPT`
`
#{iptables} -A INPUT -m state --state established,related -j ACCEPT`
###

### put ips you want to allow bypassing all these rules here
#`#{iptables} -A INPUT -s myip       -j ACCEPT`
#`#{iptables} -A INPUT -s my_ip       -j ACCEPT`
##

### local connections
`#{iptables} -A INPUT -s 127.0.0.1 -j ACCEPT`
#
#
servers.each do |server|
  
ip server[:ip]
  
server[:ports].each do |port|
    `
#{iptables} -A INPUT -p udp -m udp --dport #{port} -m string --algo bm --hex-string '|ffffffff54|' -m limit --limit 15/s --limit-burst 10 -j ACCEPT`
    `
#{iptables} -A INPUT -p udp -m udp --dport #{port} -m string --algo bm --hex-string '|ffffffff|' -m limit --limit 15/s --limit-burst 10 -j ACCEPT`
    `
#{iptables} -A INPUT -p udp -m udp --dport #{port} -m string --algo bm --hex-string '|ffffffff|' -m limit --limit 1/s  --limit-burst 1 -j ULOG --ulog-nlgroup 1 --ulog-prefix \"SOURCE UDP FLOOD #{port}\"`
    `
#{iptables} -A INPUT -p udp -m udp --dport #{port} -m string --algo bm --hex-string '|ffffffff54|' -m limit --limit 1/s  --limit-burst 1 -j ULOG --ulog-nlgroup 1 --ulog-prefix \"SOURCE UDP FLOOD #{port}\"`
    `
#{iptables} -A INPUT -p udp -m udp --dport #{port} -m string --algo bm --hex-string '|ffffffff54|' -j DROP`
    `
#{iptables} -A INPUT -p udp -m udp --dport #{port} -m string --algo bm --hex-string '|ffffffff|' -j DROP`
  
end
end 
__________________
www.NitrateInteractive.com
bestmeth0ds is offline
Send a message via Skype™ to bestmeth0ds
Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -4. The time now is 05:41.


Powered by vBulletin®
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Theme made by Freecode