Results 1 to 10 of 50

Thread: server Attack

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Private CaptainSlow's Avatar
    Join Date
    Nov 2014
    Posts
    76
    Thanks
    38
    Thanked 28 Times in 23 Posts
    We're being extorted. I received this message today:

    "if u want your COD2 servers online without Troubles ,,
    Send cod2mp_s.exe which u already use it ,
    send to this mail : [removed]
    i will check my mail , if nothing .... forget ur servers then
    but if u send , i will leave ur servers"

    I have the IP of the sender, originates from Iran.

    Since there are no guarantees the attacks will stop after I send him our binaries, I'd rather have the problem fixed instead of paying 'protection money'.
    Therefore, I'm doubling the bounty to 20 euros for someone that can patch/fix the COD2 1.0 executable for Windows that stops these attacks, unless it's technically not possible. Then we'll just have to sit and wait.
    Slow and Steady wins the race

  2. The Following User Says Thank You to CaptainSlow For This Useful Post:

    valens (10th February 2017)

  3. #2
    Assadministrator IzNoGoD's Avatar
    Join Date
    Aug 2012
    Posts
    1,718
    Thanks
    17
    Thanked 1,068 Times in 674 Posts
    Quote Originally Posted by CaptainSlow View Post
    We're being extorted. I received this message today:

    "if u want your COD2 servers online without Troubles ,,
    Send cod2mp_s.exe which u already use it ,
    send to this mail : [removed]
    i will check my mail , if nothing .... forget ur servers then
    but if u send , i will leave ur servers"

    I have the IP of the sender, originates from Iran.

    Since there are no guarantees the attacks will stop after I send him our binaries, I'd rather have the problem fixed instead of paying 'protection money'.
    Therefore, I'm doubling the bounty to 20 euros for someone that can patch/fix the COD2 1.0 executable for Windows that stops these attacks, unless it's technically not possible. Then we'll just have to sit and wait.
    Use libcod on linux, it's not that hard.
    "Does not work" is an error report for a bug between keyboard and chair.

    All hail Artie Effem

  4. The Following 2 Users Say Thank You to IzNoGoD For This Useful Post:

    CaptainSlow (10th February 2017),valens (10th February 2017)

  5. #3
    Private CaptainSlow's Avatar
    Join Date
    Nov 2014
    Posts
    76
    Thanks
    38
    Thanked 28 Times in 23 Posts
    Quote Originally Posted by Whiskas View Post
    What about blocking whole Iran with your firewall? Yes I know that it can be bypassed.
    That could be an option yes. True, it can be bypassed via VPN or a proxy, but then he must be really dedicated to crash our servers.

    Quote Originally Posted by IzNoGoD View Post
    Use libcod on linux, it's not that hard.
    You're right, it's not hard to use, but we run more than just COD2 servers on our Windows machine. We run ARK, Sniper Elite 3, TeamSpeak etc. I know some of those will also have a Linux variant available, but not all.
    The most important reason we run Windows is because of Statsgen2. Now I could make Statsgen2 work with a Linux COD2 server, but that would require FTPing over logfiles etc and to be honest, I don't quite feel investing all that time and effort because some scriptkiddy is annoying is. But yes, you're right. Libcod would fix it, but again, I would be very grateful if someone could patch this exploit for Windows as well

    PS. We've ran COD2 servers on Linux in the past. Headless, so Ubuntu Server (commandline only). After /boot got full with old kernels (100MB) and I accidentally deleted the wrong one (yes you're allowed to laugh), I gave up and switched to Windows Server.
    Slow and Steady wins the race

  6. The Following User Says Thank You to CaptainSlow For This Useful Post:

    valens (10th February 2017)

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •