Jump to content

Recommended Posts

Edit: Yeah, it's the API tool.

Make sure your firewall blocks every connection incoming to your p2p ports except for localhost!

If you need help, then please send me your firewall rules via pm and I can help you with that.

 

Example for pf:

block in on $if FROM any to 127.0.0.1 port $P2P_PORT

I guess that should do it. It's better to block everything by default and let certain defined ports pass through so you won't get in trouble with that anymore. But be careful with that since you'd block ssh access when working with firewalls!

Edited by Alina
Link to comment
Share on other sites

Add those things in your config file.

adminpage_ip: your ip-address
adminpage_password: your password

If target is not know your adminpage password, he can not login your system. Default password is SHOWMETHEMONEY.

 

Kind Regards

Ken

​password root server?

 

adminpage_ip: myip
adminpage_password: SHOWMETHEMONEY

THIS?

Link to comment
Share on other sites

Add those things in your config file.

adminpage_ip: your ip-address
adminpage_password: your password

If target is not know your adminpage password, he can not login your system. Default password is SHOWMETHEMONEY.

 

Kind Regards

Ken

​I Have this:

adminpage_password: 364357485686869
ADMINPAGE_IP: MYIP

 

 

Maybe you use a game with a special command than can used by  a player.

​no!:/ only gm.

 

Edit: Yeah, it's the API tool.

Make sure your firewall blocks every connection incoming to your p2p ports except for localhost!

If you need help, then please send me your firewall rules via pm and I can help you with that.

 

Example for pf:

block in on $if FROM any to 127.0.0.1 port $P2P_PORT

I guess that should do it. It's better to block everything by default and let certain defined ports pass through so you won't get in trouble with that anymore. But be careful with that since you'd block ssh access when working with firewalls!

I have not done Firewall installation: /
It can be had by itself.
Link to comment
Share on other sites

Guys it's a p2p command. He didn't set up a firewall and that's the point behind that.

Set up a firewall and block those p2p ports (and db cache port) and you'll be safe from this attack ;)

 

adminpage_ip: 127.0.0.1

This should also work for you.

Note:

The attack can be from p2p ports and from normal ports. Against normal ports, you can use adminpage_ip to bind your API to localhost, so it'll only accept connections from localhost!

Against p2p ports it's more difficult. You need to shut down access to them via firewall. That's gonna fix your problem and the attack you're getting there is through the p2p ports. So you may look at that ;)

Edited by Alina
Link to comment
Share on other sites

  • Former Staff

Guys it's a p2p command. He didn't set up a firewall and that's the point behind that.

Set up a firewall and block those p2p ports (and db cache port) and you'll be safe from this attack ;)

 

adminpage_ip: 127.0.0.1

This should also work for you.

Note:

The attack can be from p2p ports and from normal ports. Against normal ports, you can use adminpage_ip to bind your API to localhost, so it'll only accept connections from localhost!

Against p2p ports it's more difficult. You need to shut down access to them via firewall. That's gonna fix your problem and the attack you're getting there is through the p2p ports. So you may look at that ;)

​admin page ip and password are can block everything that can affect the server except the player count api and some log related stuff. But i think youre right with the db cache port. If this ones open one of the worst "hacks" (not further discribed here cause of possible chaos) is possible

Link to comment
Share on other sites

  • Premium

You can block the p2p ports with a firewall or disable the p2p commands into the game.

For example this is my pf rule, just replace the ports by those you are using, and dont forget to replace "em0".

 

ports = "{12000, 14000, 14001, 14002, 14003, 14004, 14006, 14010, 14011, 14012, 14013, 14014, 14015, 14020, 14021, 14022, 14023, 14024, 14025, 14099, 15000}"
block out log quick on em0 inet proto tcp from any port $ports

Note : the last line of the pf.conf must be empty

You can show logs of attempts by using this command :

tcpdump -n -e -ttt -r /var/log/pflog
 

ucckQMO.png

Edited by Metin2 Dev
Core X - External 2 Internal
Link to comment
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now

Announcements



  • Similar Content

  • Activity

    1. 0

      We are looking for a C++ and Python programmer

    2. 0

      [Quest Scheduler Request] Is there a way to make a quest run independet of player events? Lets say start quest automatically at server startup?

    3. 111

      Ulthar SF V2 (TMP4 Base)

    4. 0

      Quest function when 102.kill definition whereabouts help

    5. 5

      [M2 FILTER] Customized Client Filter

    6. 0

      [INGAME] RGB Color on chat broken

  • Recently Browsing

    • No registered users viewing this page.
×
×
  • Create New...

Important Information

Terms of Use / Privacy Policy / Guidelines / We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.