09:05 < ChillerDragon> wot jxsl xd 09:07 < jxsl13> remove the DreamBerd star D: 09:22 < ChillerDragon> hrhrhr 11:33 < jxsl13> remove it! 11:45 < bridge> Has anyone stats how bad the ddos situation is in teeworlds currently? 11:46 < bridge> ddnet servers are regularly DoSed 11:46 < bridge> stats: bad 11:46 < bridge> thx, means no server from me πŸ™‚ 11:46 < bridge> is this an attempt to fill concurrent non-ddnet servers? 11:47 < bridge> I have a server at home, but if I expose it to teeworlds, a ddos attack would be a disaster 11:47 < bridge> I don't mean for you 11:50 < bridge> I can't follow you 11:50 < bridge> I meant, the motivation behind the ddos 11:51 < bridge> ahh! 11:51 < bridge> sometimes promoting non-ddnet servers, sometimes expressing anger about decisions e.g. bans, sometimes purely malicious 11:52 < bridge> ok ty 11:52 < bridge> how do you know the motiviation? Aren't the individual dos-ip sending DNS tables or something? 11:53 < bridge> because sometimes you can talk to the person behind the attack 11:54 < bridge> Hope one day they forget to turn on their VPN 11:56 < bridge> The only motivation I know of, was a server with a password, and since they can't enter, ddos 11:56 < bridge> Server Name was something like "Map testing server" where I was just mapping and you don't want to be as a regular player 11:58 < bridge> DDNet doesn't do geoip filtering or does it? A player with a possible ping > 600 connecting from china shouldn't have much business on DDNet brazil 12:02 < bridge> But thx for the feedback 12:02 < bridge> ddnet doesn't do geoip filtering 12:03 < bridge> and it would be not nice if it did, why should a player from china not be able to chat with peopel from brazil 12:16 < bridge> Because you are hosting gameservers and not chat-servers. But I fully understand your point. Technically they can still connect to a server in the middle, EU or US (idk). I am just tired of banning IPs from the same 3 countries, why should I let connections from countries through, which keeps attacking me and have no business on the server in the first place? I am not nice, i am angry about the world 12:20 < bridge> does banning these countries even help protect your server though? 12:20 < bridge> if not, you're just making a nuisance for these people without any gain in return 12:23 < bridge> If the banning would happen on a network level, it would certainly help against dos attacks. In my case I am banning people who try to ssh into it, which nobody except me should have business with 12:24 < bridge> the ssh thing is not useful btw 12:24 < bridge> unless you like clean-looking logs 12:24 < bridge> you want to disable password authentication and then you're good 12:24 < bridge> banning IP addresses that try to authenticate does nothing 12:25 < bridge> the banning IP addresses on the network level against DoS attacks only helps if the problem is that the game servers themselves are overwhelmed 12:25 < bridge> unfortunately, sometimes it's the linux kernel or the network interface that gets overwhelmed 12:25 < bridge> it protects you from bruteforce attempts, and password authentication isn't disabled, that's the point. Otherwise I'd need to have my private key on multiple machines 12:26 < bridge> you can add multiple private keys 12:26 < bridge> you should never do password authentication 12:26 < bridge> if you do want to have password authentication, choose a secure password 12:26 < bridge> then you also don't have to worry about brute force attempts 12:26 < bridge> if you choose a bad password, then banning might help somewhat. but why do you do that? 12:26 < bridge> if you want to have clean logs, change the SSH port 12:32 < bridge> I am happy with my setup now, ofc my password is secure, I don't care (too much) about the logs, I like (and need) the ability to login into my server from anywhere, because I travel a lot. I already logged into it from my parents home, switzerland, finnland, all on different machines. I already thought about changing the port tho. I use the same tool an other services as well, the ssh banning is just the main cause of banned IP adresses 12:33 < bridge> the ssh banning is just a false sense of security 12:33 < bridge> (in fact, it was a security vulnerability on its own in the past, with some tool. ssh had no such vulnerability AFAIK( 12:33 < bridge> (in fact, it was a security vulnerability on its own in the past, with some tool. ssh had no such vulnerability AFAIK) 12:34 < bridge> huh, can you elaborate on this? 12:36 < bridge> https://research.securitum.com/fail2ban-remote-code-execution/ 12:36 < bridge> thx 12:36 < bridge> each piece of code that runs is a piece of code that's vulnerable 12:36 < bridge> ssh has a good security story 12:36 < bridge> some random other tool probably does not 12:37 < bridge> hmm. that one needs a MITM for the server though 12:37 < bridge> I thought it was worse, let me retry searching 12:38 < bridge> I found much more, but they usually lead to arbitrary IP bans 12:38 < bridge> which is also bad because you could get locked out 12:42 < bridge> Thanks, this is a valuable info ^^ In my view the tool only modified ip tables in order to block connections, but I guess there is more to it 12:50 < bridge> You are right, the benefit is small, and it would be bad if it would be the only security measurement (which it isn't). But it keeps the simple stupid bots out, which is a plus side for me 12:53 < bridge> You can use a ssh tarpit on the default port then lol, it's funny to annoy chinese bots 12:55 < bridge> https://github.com/skeeto/endlessh 12:55 < bridge> simple stupid bots are also kept out by changing the default port btw 12:56 < bridge> that's also extra software you run πŸ˜‰ 12:56 < bridge> true, well I don't use it at all but it's cool that it exists 12:56 < bridge> ye 12:57 < bridge> instead I deploy a ssh key per computer 12:58 < bridge> you can run the tarpit in a docker container, if you have docker already running, then it's not even extra code 12:59 < bridge> docker isn't a security boundary 13:02 < bridge> e.g. https://cloud.google.com/blog/products/gcp/exploring-container-security-an-overview 13:03 < bridge> > A container isn’t a strong security boundary 13:03 < bridge> I suppose it says "strong" 13:03 < bridge> so maybe it is a weak one πŸ™‚ 13:04 < jxsl13> sombody tell ChillerDragon to un-star the DreamBerd programming language. 13:04 < bridge> I found this exact link already, at least it prevents direct access to shared resources, I guess it's still better than nothing 13:06 < bridge> > Use the const const const keyword to make a constant constant constant 13:06 < bridge> Ah yes, the constant constant constant 13:09 < bridge> Nice shitpost, but why?