Azerothcore-wotlk: Closed

Created on 14 Apr 2017  路  8Comments  路  Source: azerothcore/azerothcore-wotlk

CLOSE MY WRONG!!

AC hash/commit: Latest AC

Operating system: se7en

Modules: Are you using modules? anticheat - transmog

Other Customizations: Are you using any core/db patches or other customizations?NO!

All 8 comments

@starrheld Yea i found that but we not have authsession to fix this problem need change codes . if we know which line make this problem i can help to fix it . but i really don't know which line make this flood!

@Franklampardst True.
AuthSocket.cpp (AC) / AuthSession.cpp (TC)

https://gist.github.com/JunkyBulgaria/eb38f794f3af2e7795a3c71f4dc5a25b some might be removed/tuned in order to prevent false positives, structure may be different with azerothcore's but you get the idea

@JunkyBulgaria Tnx but Not Working :(

what opcode do they spam, if it's tcp flood you can't protect your self without a firewall

@JunkyBulgaria i set firewall such as hardware and software but we must update codes from https://github.com/TrinityCore/TrinityCore/commit/5bf90b33388bfabb3f7a434980021083d9911a36 to AC for fix this problem latest trinitycore resolved this issue

i use Mangos Algorithm to fix this issue . we need save Flooder ip in database and block that ip . if next time that ip connecting without flood we need to unblock that ip . i scripted that for AC but only same time working good. when flood over 12-15k packet not working.

this really simple with ignore in firewall . my fault

Was this page helpful?
0 / 5 - 0 ratings

Related issues

wetbrownsauce picture wetbrownsauce  路  3Comments

Franklampardst picture Franklampardst  路  4Comments

wowissues picture wowissues  路  3Comments

Wokwer picture Wokwer  路  4Comments

fragcamp picture fragcamp  路  4Comments