Does this fix actually work?
Does this fix actually work?
On that note, I was able to get into my server just fine without any lag.
Maybe things are now fixed? Try it out yourselves.
I ran the update on my server as well, but haven't been able to test yet and haven't received word from anyone whether it's working or not...
But damn I sure hope it works xD
Lol the laypeople just hearing the buzzword DDOS and applying it to everything and arguing on the internet about how to solve it between two interfaces they don't know :|
This doesn't have anything to do with the OP and doesn't help anyone. Why post this just to bash ppl?
It doesn't effing matter what it's called, DDoS or exploit or "stupid french ppl" (which i disagree with but w/e) everyone knows that they're talking about so it's not a big deal.
Unless it has changed in the last day then im pretty sure, many people have reported it to being a zero packet
Edited:
Not all server seem ok? Maybe some need restarting
Come at me.
The guys behind the attacks are preparing something, they will make an announcement in 10 minutes.
Edit: It's gonna take a bit more time, there was an unexpected update to Rust.
Where are you hearing that?
On their TeamSpeak; I can speak French so I understand everything they're saying.
They've apparently tricked Garry into thinking he could fix the exploit, when he actually couldn't; and now they've brought the servers down again. Some servers may not be down, because they weren't updated.
if u are on their teamspeak why dont u tell us how they do it. maybe that would help fix the exploit....
Lol laypeople. DDoS for laypeople - preventing access to something with the attack coming from >= 2 sources. If 500 people turn up at your bank asking for free gold that is - by definition - a DDoS. The thing is it *does* apply to everything.
Source: I build software to manage entire datacenters and deal with this garbage all the time.
Btw filtering out 0-byte UDP packets is a little bit nonsense because they'll just start flinging 1-byte packets at you instead.
Not for nothing but I've been telling game devs for at least a decade to put their UDP down SSL'ed TCP pipes but nobody ever listens.
For one, I don't know anything about hacking or coding or whatever. For two, they're not going to tell me how exactly they're doing it, even if I ask nicely.
It's a public TeamSpeak; hundreds of people have gone there to see what's up in the last few days.
If there's 1 exploit in uLink that brings servers down, there are likely others. They probably have some sort of "bank" of known exploits - when one is fixed, they move on to the next.
Yes, they said something along those lines. There are many exploits to bring servers down, and Garry only fixed one; and they apparently made Garry think it was the only one. But not anymore.
It appears to be back...
If uLink didn't obfuscate their sodding binaries, I could have at least taken a look through it to find some obvious exploits, or learnt how the protocol works and built a proxy that protects from exploits.
Garry has previously recognized there are multiple bugs with ulink:
ahahaahahaha you guys essentially ignore every point i make to continue to talk shit
try actually researching what you are talking about
Actually DoS is denial of service. DDoS is a type of DoS. This is a DoS but not a DDoS.