Jump to content

player can use GM code how i stop that


Recommended Posts

Hi guys its first time i have this problem when the player enter to the server he can use all GM commands and i try with DIF not working and i change all the CMD files on the file and same problem i try most thing is anyone have idea about how i can sort

game vre 40250

this problem with my thanks 

 

 

 

 

Link to comment
Share on other sites

Block the P2P ports with a firewall script..

 

For example..

ext_if="em0"
int_if="lo0"
 
service_ports="{ 22, 3306, 31094 }"
game_ports="{ 11002, 13070, 13071, 14070, 14071, 15070, 15071, 13099, 13100 }" #auth/c1c1/c1c2/c2c1/c2c2/c3c1/c3c2/c99c1/c99c2
api_ports="{ 15000, 65000, 65001, 65010, 65011, 65020, 65021, 65040, 65041, 65500 }" #P2P Ports c1c1/c1c2/c2c1/c2c2/c3c1/c3c2/c99c1/c99c2/auth
 
table <trusted_hosts> const { 181.224.129.13, 199.27.128.0/21, 173.245.48.0/20, 103.21.244.0/22, 103.22.200.0/22, 103.31.4.0/22, 141.101.64.0/18, 
 108.162.192.0/18, 190.93.240.0/20, 188.114.96.0/20, 197.234.240.0/22, 198.41.128.0/17, 162.158.0.0/15, 2400:cb00::/32, 
 2606:4700::/32, 2803:f800::/32, 2405:b500::/32, 2405:8100::/32 }
 
table <abusive_hosts> persist
 
# options
set block-policy drop
set loginterface $ext_if
set skip on lo
 
# Normalizes packets and masks the OS's shortcomings such as SYN/FIN packets
# [scrub reassemble tcp](BID 10183) and sequence number approximation
# bugs (BID 7487).
scrub on $ext_if reassemble tcp no-df random-id
 
# Filters
antispoof quick for { lo0 $ext_if }
 
block in
 
pass out on $ext_if all modulate state
pass out all keep state
 

pass in quick from <trusted_hosts>
block in quick from <abusive_hosts>

pass in quick on 46.28.203.102 proto tcp to any port $api_ports
pass in quick on $int_if proto tcp to any port $api_ports
block in quick on $ext_if proto tcp to any port $api_ports 


pass in on $ext_if proto tcp to any port $game_ports flags S/SA keep state 
        (max-src-conn 35, max-src-conn-rate 25/5, overload <abusive_hosts> flush)
 
pass in on $ext_if proto tcp to any port $service_ports flags S/SA keep state 
        (max-src-conn 25, max-src-conn-rate 20/5, overload <abusive_hosts> flush)

  • Love 2
Link to comment
Share on other sites

  • 3 weeks later...
  • 2 weeks later...

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now

Announcements



×
×
  • Create New...

Important Information

Terms of Use / Privacy Policy / Guidelines / We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.