Jump to content
Forgot your email address? ×
×
×
  • Create New...
  • 0

player can use GM code how i stop that


MaGisterX

Question

Hi guys its first time i have this problem when the player enter to the server he can use all GM commands and i try with DIF not working and i change all the CMD files on the file and same problem i try most thing is anyone have idea about how i can sort

game vre 40250

this problem with my thanks 

 

 

 

 

Link to comment

7 answers to this question

Recommended Posts

  • 0

Block the P2P ports with a firewall script..

 

For example..

ext_if="em0"
int_if="lo0"
 
service_ports="{ 22, 3306, 31094 }"
game_ports="{ 11002, 13070, 13071, 14070, 14071, 15070, 15071, 13099, 13100 }" #auth/c1c1/c1c2/c2c1/c2c2/c3c1/c3c2/c99c1/c99c2
api_ports="{ 15000, 65000, 65001, 65010, 65011, 65020, 65021, 65040, 65041, 65500 }" #P2P Ports c1c1/c1c2/c2c1/c2c2/c3c1/c3c2/c99c1/c99c2/auth
 
table <trusted_hosts> const { 181.224.129.13, 199.27.128.0/21, 173.245.48.0/20, 103.21.244.0/22, 103.22.200.0/22, 103.31.4.0/22, 141.101.64.0/18, 
 108.162.192.0/18, 190.93.240.0/20, 188.114.96.0/20, 197.234.240.0/22, 198.41.128.0/17, 162.158.0.0/15, 2400:cb00::/32, 
 2606:4700::/32, 2803:f800::/32, 2405:b500::/32, 2405:8100::/32 }
 
table <abusive_hosts> persist
 
# options
set block-policy drop
set loginterface $ext_if
set skip on lo
 
# Normalizes packets and masks the OS's shortcomings such as SYN/FIN packets
# [scrub reassemble tcp](BID 10183) and sequence number approximation
# bugs (BID 7487).
scrub on $ext_if reassemble tcp no-df random-id
 
# Filters
antispoof quick for { lo0 $ext_if }
 
block in
 
pass out on $ext_if all modulate state
pass out all keep state
 

pass in quick from <trusted_hosts>
block in quick from <abusive_hosts>

pass in quick on 46.28.203.102 proto tcp to any port $api_ports
pass in quick on $int_if proto tcp to any port $api_ports
block in quick on $ext_if proto tcp to any port $api_ports 


pass in on $ext_if proto tcp to any port $game_ports flags S/SA keep state 
        (max-src-conn 35, max-src-conn-rate 25/5, overload <abusive_hosts> flush)
 
pass in on $ext_if proto tcp to any port $service_ports flags S/SA keep state 
        (max-src-conn 25, max-src-conn-rate 20/5, overload <abusive_hosts> flush)

  • Love 2
Link to comment

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

Announcements

  • -15% Discount in Metin2 Dev Store (01/10/2021 => 31/12/2021) => Code => 15_PCT_OCT_TO_DEC_2021


  • Read our Rules
  • Activity

    1. 7

      PHOENIX2 !OLDSCHOOL SERVER, PAYTOWIN REMOVED!

    2. 0

      special_item_group and chest apprentice

    3. 2

      Alternative Alternative Zodiac Suit - Ninja M

    4. 0

      character details negative bonus

    5. 0

      Questlib mysql_query function problem

  • Recently Browsing

    • No registered users viewing this page.

Important Information

Terms of Use / Privacy Policy / Guidelines / We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.