Jump to content

Help Handshake phase does not handle packet 80


Recommended Posts

  • Active Member
SYSERR: Mar  1 20:12:45 :: Analyze: Handshake phase does not handle packet 80 (fd 50)
SYSERR: Mar  1 20:12:45 :: Process: SEQUENCE_LOG [UNKNOWN]-------------
	[080 : 0xaf]
SYSERR: Mar  1 20:12:45 :: Analyze: Handshake phase does not handle packet 80 (fd 42)
SYSERR: Mar  1 20:12:45 :: Process: SEQUENCE_LOG [UNKNOWN]-------------
	[080 : 0xaf]

SYSERR: Mar  1 20:12:45 :: Analyze: Handshake phase does not handle packet 80 (fd 50)
SYSERR: Mar  1 20:12:45 :: Process: SEQUENCE_LOG [UNKNOWN]-------------
	[080 : 0xaf]
SYSERR: Mar  1 20:12:45 :: Analyze: Handshake phase does not handle packet 80 (fd 42)
SYSERR: Mar  1 20:12:45 :: Analyze: Handshake phase does not handle packet 80 (fd 50)
SYSERR: Mar  1 20:12:45 :: Analyze: Handshake phase does not handle packet 80 (fd 42)
SYSERR: Mar  1 20:12:45 :: Process: SEQUENCE_LOG [UNKNOWN]-------------
	[080 : 0xaf]

Client:

0301 20:05:34250 :: invalid idx 0
0301 20:08:43366 :: invalid idx 0

Good evening! This error started from nothing and whenever you select the character or teleport, it is disconnected. Does anyone have any idea if it is a flaw or vulnerability that someone is using? (At first, it started after 200 ~~ 250 online, now with 20 ~~ 50 online the errors start, out of nowhere)

I thank you for your attention! = D

 

Fix: 

 

Edited by Klaus
  • Love 1
Link to comment
Share on other sites

  • Active Member
14 hours ago, IceShiva said:

Essas são apenas informações sobre falta de informações sobre o que fazer com o pacote de identificação 80 e o manipulador não pode processar esse pacote, portanto ele é ignorado. Às vezes acontecia quando alguém tentava enviar dados do wreid para o servidor. Provavelmente você tem incompatibilidade de pacotes no protocolo e, claro, não é uma vulnerabilidade.


Hello,

At first, I believed it was really a problem in the source / packet, however, after analyzing the syslog of the channels, I noticed several attempts at the same IP address, after installing pf.conf, such IP was blocked and the problem did not return to occur, we can conclude that yes, it was attacks on the channels. We can conclude that not always errors like this, which initially indicates problems / flaws in the packets / functions, are not always!

Link to comment
Share on other sites

You can solve this problem by creating blacklist map which includes ip address as key and unhandled connections count as data in specific time, then define "connection threshold" if exceesed you just reject futherer connection from this ip. This mehod theoretically solve all problems with dos and other unwanded shieet. Of course all should be implemented in server source due "raw pf" is l3/4 firewall

Cheers.

Edited by IceShiva
  • Love 1
Link to comment
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now

Announcements



×
×
  • Create New...

Important Information

Terms of Use / Privacy Policy / Guidelines / We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.