Jump to content

DoctorB0NG

Former Developers
  • Posts

    751
  • Joined

  • Last visited

Everything posted by DoctorB0NG

  1. On the official servers, beacons are disabled until 24 players are in the match.
  2. The nostalgia is what brought me to Ren-X but the community is what kept me around. Thank you to all who have stuck around and continued to play the game!
  3. I'll make some adjustments tonight. Let me know if you still can't connect tomorrow
  4. I appreciate the kind words from @MintLemonade but nobody is perfect and I used to have quite the toxic side as well in the community. FPI (the artist formerly known as EKT) and I have definitely had a rough patch in the past and most of it was my fault unfortunately. Renegade-X has a very unique community and I had found that investing too much time had caused me to get very burnt out and get frustrated at things that I really should not have been. I was originally of the opinion that team switching should be allowed so that friends can play together but I've now been swayed and agree that even just a small group of veteran players can dictate the entire outcome of a game. I understand what FPI is trying to accomplish and I can see why it has caused a rift in the community. Even with disabling team switching though, there are clever ways to still manage to end up on the same team and even without players switching, teams can end up lopsided. I don't really have any suggestions for how to fix the team stacking issue but if I could offer one piece of advice it would be this: If you're getting burnt out and frustrated with Renegade-X, take a bit of time off and come back with a fresh outlook. It really can make a big difference. PS: I'd also like to formally apologize to @Goku , @Skeeze , @ObeliskTheTormentor and many others from EKT/TmX back in the day. I was very burnt out and it had a toxic effect on the community. I wish you all the best of luck!
  5. I added two European mirrors. One in Amsterdam and one in Frankfurt. Your launcher likely connected to one of the new mirrors.
  6. There already is a solution, it just needs to be implemented.
  7. http://tyrant.gg/showthread.php?tid=437 ... 90#pid2390
  8. I'll probably start working on it on lunch break but the part that's gonna take the longest is updating windoze server so that I can install visual c++ 2015 for Agent's bot.
  9. My OVH server is deployed so now I just need to configure it. Hopefully I have time tonight but I might not.
  10. It's not too late because the attacks do not get close to saturating the NIC interface on the server. The attacks are easily filtered through targeted iptables rules. This is how I blocked them in the fall and it works very well. No need to reinvent the wheel here, folks. I'm just waiting for my OVH box to get set up and well be up and running.
  11. Wouldn't work. Some ISPs have insanely short DHCP leases *Looks at all those weird German DSL providers using PPPoE
  12. I just through it together quick to do a packet limit parameter, figured out about how much runs in a minute. I think when I calculated I had like 1-3 months to clear old pcaps. I think I only had 100GB free at the time. So its a great quick solution to get the pcaps, just check disk space every month or two heh I just checked my old logs, and for 3 days ish work of pcaps it was 6GB The only problem with that is if we run the dump every X seconds with the duration parameter specified in total packets, there's a high probability that we'll either miss some packets or run overlapping dumps. How did you work around this?
  13. its impossible, and knowing who it is isn't going to solve anything. all of you need to know is that the guy's only goal in mind is to watch people suffer and rage, and the best thing we can we can do to make him feel stupid for wasting money is to wait patiently until the server owners find a solution. talking smack about him on the forums is exactly what he hoped to see, and is exactly why he's willing to pay money for ddos. smartest thing to do is to talk about the matter rationally with realistic solutions in mind. if you don't have anything productive to say towards helping mitigate this issue, i'd highly recommend keeping any negative thoughts to yourself on this topic. Listen to Jeff. Don't feed the troll. I already have a solution, I just need to implement it. In the meantime just relax a bit and watch some TV or play overwatch with me
  14. End of June \ Early July when I actually go on leave and having nothing by to do but use working on Ren as an excuse to ignore everything in my home town. And to visit me
  15. RenX exclusively uses UDP. The attacks are targeted at the UDP port that the game server is bound to. @cronus How big did the caps end up being after a day? Did you have TCP dump running with a time parameter instead of a packet limit parameter?
  16. He's using more than one location, he has a botnet from what I understand No. It's all spoofed UDP floods originating from one server/a small group of servers. And before anyone asks, no, you cannot just track the attack back because if you look up the reverse DNS on the spoofed IPs, it will give you random people's IPs across the world because they're spoofed. @sterps I might just give you full access to the box and well have to talk details some night in teamspeak @itweek The Cisco ASA routers that OVH offers have too low of a spec for PPS and even proper and efficient rules will still makes the firewall choke and sputter.
  17. There's a thread that I made that you have access to that describes (step by step) how to implement the anti DDoS solution that I used in the fall. For some reason every server owner keeps ignoring it...
  18. People need to step and say they're willing to help. So far I have freak and crowsey who are willing to help. If you'd like to help, please explicitly state so in this thread and I'll make sure I PM the details to you after I figure out some semantics. PS: the new server is already ordered, just waiting for it to be delivered. After I get the server, the setup will take a few hours. If donations don't pan out during the first month, I will not renew the server so keep that in mind, folks.
  19. The main problem is that even if a program has the ability to differentiate malicious vs real player packets (which UDK does a terrible job/doesn't do at all) the program would still have to accept the packet, analyze it, then drop it. When you get up into 50K+ PPS range, that's still far too much data to process and even drop for a program that isn't optimized for it. This is where iptables shines. iptables is the userspace extension of a kernel module called netfilter. Because netfilter is written into the kernel and was designed from the ground up to be as efficient as possible, it can filter the traffic much better than any user space program ever could. Luckily I already have a solid list of iptables rules that will likely block 98% of the attacks however, a few stragglers will likely make it through and that's why I'm gonna need other members to help me capture those few that may get through.
  20. All I really need is people to "watch" the server and run tcpdump during an attack and then send me a message with the time they captured the attack. I will be able to analyze the attacks very quickly as I've been doing this for a while. The tough part is just getting the captures which is what I need people for. The other option is setting the packet captures to run automatically via a cron script of some other means. I would need to have some sort of logrotate though to prevent the captures from completely filling up the hard drive. If anyone in the community is a shell scripting/automation wizard, please let me know.
  21. freak said he would be willing to. Glacious will have no interest in this (we're still pretty burnt out from Ren-X issues in the fall). I'd actually likely need 3-5 people so we have so redundancy and a solid crew to help.
  22. Current status: DDoS protected server costs twice as much as the current server and I'm worried about funding for it. I'd also need to recruit someone to help manage the capture of TCP dump files to analyze attacks and make sure the current iptables rules are still blocking the malicious traffic. I unfortunately don't have the time to monitor the server nearly to the level I used to as I have a new job. And actually part of the reason I have my new job is because of my Linux skills I gained from handling the DDoS attacks last fall. Tldr: afraid of funding, need to train 1-2 people to run tcpdump during attacks so I can later analyze the logs with wireshark
  23. The rage quitters are very annoying. It makes it very difficult for the coordinators of the PUG and sours the mood. PS: sorry I wasn't there yesterday, I'm up at my folks' place for memorial day weekend.
  24. The fact that all the best players in ren still have to discuss how to mine years after the game has been out shows how fucked up the mining system is in this game.
×
×
  • Create New...