SRCDS Steam group


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
IP Hack
#1
Hey gutter.

Jeg har tre servere kørende, og på to af consollerne, år jeg en linie, der siger:
Banning xx.xxx.xxx.xxx for rcon hacking attempts.

jeg trackede ip'en, og fandt hackeren i frankrig.

er der noget sted, hvor jeg kan sikre mig, at han ikke kan hacke sig ind ?
Reply
#2
(07-28-2011, 12:00 AM)LightmaxD Wrote:  Banning xx.xxx.xxx.xxx for rcon hacking attempts.
Er bare en sikkerheds mekanisme, indbygget i source motoren
http://developer.valvesoftware.com/wiki/Source_RCON_Protocol#Additional_Comments
Quote:These are accurate and recommended (and in some cases required) for proper implementation of the RCON protocol in Source.

Request ID is mirrored back properly
CS:Source server sends one junk packet during the authentication step, before it responds with the correct authentication response.
It seems this junk packet is also valid under HL2Big GrinM, not just CS:Source, so probably applies to all Source games (unless Rcon stuff is done differently in other Source powered games by 3rd parties). --Bartk 12:13, 2 Oct 2006 (PDT)
It's not a junk packet, it contains "Banning 192.168.1.42 for rcon hacking attempts" (if you happen to get banned from your server while authenticating). Dangan 05:27, 5 Feb 2008 (PST)

It sends junk packet. If you receive SERVERDATA_RESPONSE_VALUE first, you need to Read data from socket one more time to get correct auth packet.
The packet size field does NOT include the size of the packet size field itself. That is why the minimum length is 10 -- four bytes for the two integers (request ID and command) plus two bytes for the potentially empty ASCIIZ strings.
Make sure that you code the ability to handle multiple response "packets". With a 32-player server, it will use these commonly for status commands (for instance), just as HLDS often did. Also, keep in mind that you won't be able to read the whole "packet" at one time -- you need to keep reading in a loop until you receive the entire packet before processing it.
[Image: b_350_20_692108_381007_FFFFFF_000000.png]
I only have 1 server Sad
Attack2
Reply
#3
Han prøvede bare at opnå rcon-adgang. Han skrev rcon passwordet forkert for mange gange og derfor blev han skrevet ind i ban-listen. Smile
Slå den med jeres fiberforbindelser...

[Image: 1308107839.png]
Reply
#4
Tak gutter d: så jeg har ikke mulighed or at gøre sådan, at han ikke kan *EDIT* prøve at hacke den ?
Reply
#5
(07-28-2011, 09:29 PM)LightmaxD Wrote:  Tak gutter d: så jeg har ikke mulighed or at gøre sådan, at han ikke kan *EDIT* prøve at hacke den ?

Det eneste du sådan set kan gøre er at sætte en advanceret firewall-regel om at din gameserverport (kun TCP-delen) kan tilgåes fra de ip-adresser du tillader. :-)
Slå den med jeres fiberforbindelser...

[Image: 1308107839.png]
Reply


Forum Jump:


Users browsing this thread: 2 Guest(s)