Forum

Page 2 of 4 FirstFirst 1234 LastLast
Results 16 to 30 of 47
  1. #16
    Join Date
    December 2015
    Location
    Canada
    Posts
    76
    Quote Originally Posted by MaxDev View Post
    I don't think they will help:

    http://forum.teamspeak.com/threads/1...mspeak-Servers

    We are by ourselves basically, the only option is maybe going to Discord...
    You do know that discord' "Ddos protection" is protection for users right? They're infrastructure can't withstand a medium sized attack..


    Just marketing, top grade Bull Sh*t

  2. #17
    Join Date
    October 2015
    Posts
    34

    Sticky

    Quote Originally Posted by Randinator View Post
    You do know that discord' "Ddos protection" is protection for users right? They're infrastructure can't withstand a medium sized attack..


    Just marketing, top grade Bull Sh*t
    It is currently better than what is happening with teamspeak, a few hosts I work with, even wanted to speak with teamspeak developers to fix the problem, but they do not reply anybody.

    So if we don't have any reply, we have to check for alternatives, it is all what is left for us.

  3. #18
    Join Date
    December 2015
    Location
    Canada
    Posts
    76
    I think you have someone specifically targeting you, and I bet they won't stop with just ddosing, but pursue other methods. Try to find out who it is and take action.


    I wrote about me and my clan experiences with discord, the voice delay/cutting is unbearable as well as the long loading screen. We were on TS first then moved to discord and now are back with TeamSpeak. It's just discord has had they're moments of being unable to connect to their servers. It's a whole other mess.

  4. #19
    Join Date
    August 2013
    Posts
    56
    You can't use Cloudflare because Cloudflare only allows TCP packets through. They are primarily for protecting websites not real-time applications.

    If you were to use another DDoS protection service that allows UDP through it would work, providing you buy the correct plan for the size of attack you are having. You could also purchase hosting from a hosting company that has DDoS protected servers.

  5. #20
    Join Date
    October 2015
    Posts
    34
    Quote Originally Posted by H3LLFIRE View Post
    You can't use Cloudflare because Cloudflare only allows TCP packets through. They are primarily for protecting websites not real-time applications.

    If you were to use another DDoS protection service that allows UDP through it would work, providing you buy the correct plan for the size of attack you are having. You could also purchase hosting from a hosting company that has DDoS protected servers.
    Once you find out that UDP Protection is not this simple, it will be too late.

  6. #21
    Join Date
    October 2003
    Location
    Germany
    Posts
    2,527
    When you're hosting the TeamSpeak 3 Server on your own machine, protecting it agains DDoS attacks is your responsibility. Whereas it's the responsibility of the host provider to do so when you're using TeamSpeak as a managed service (e.g. renting from an ATHP).

    As mentioned before, Cloudflare is a reverse proxy, cache, firewall and global content delivery network fore websites... that means HTTP/HTTPS only. Ergo, it can't be used to protect TeamSpeak servers.

    In the past, we've done quite a lot to protect our software from specific types of DDoS attacks (an we'll continue to do so), but that is only possible up to a certain limit.



    Also, while we removed the servers IP address from the UI with one of our recent client releases, please note that this is not protecting you in any way... it's simply a filter for the really (really really) stupid script-kiddies.

  7. #22
    Join Date
    August 2013
    Posts
    56
    Quote Originally Posted by MaxDev View Post
    Once you find out that UDP Protection is not this simple, it will be too late.
    It's not overly complicated just expensive. I've set it up in the past and it really wasn't that hard. However if your current hoster can't give you the size of the attack then it's a bit hard to judge the amount of protection you would need.

    I'm not talking about setting up and configuring your own equipment, that would be far more complicated, I'm talking about setting up protection probably via a GRE tunnel. Also if your talking about DDoS protection for a hosting company then yes it does get harder to implement.

    The DDoS protected hosting is probably the best/cheaper option however.

    And as ScP said before this isn't a Teamspeak problem. If people are just blasting your IP with garbage traffic it doesn't really matter what service your running on your server.
    Last edited by H3LLFIRE; August 22nd, 2016 at 01:01 AM.

  8. #23
    Join Date
    October 2015
    Posts
    34

    Solved

    Quote Originally Posted by ScP View Post
    When you're hosting the TeamSpeak 3 Server on your own machine, protecting it agains DDoS attacks is your responsibility. Whereas it's the responsibility of the host provider to do so when you're using TeamSpeak as a managed service (e.g. renting from an ATHP).

    As mentioned before, Cloudflare is a reverse proxy, cache, firewall and global content delivery network fore websites... that means HTTP/HTTPS only. Ergo, it can't be used to protect TeamSpeak servers.

    In the past, we've done quite a lot to protect our software from specific types of DDoS attacks (an we'll continue to do so), but that is only possible up to a certain limit.



    Also, while we removed the servers IP address from the UI with one of our recent client releases, please note that this is not protecting you in any way... it's simply a filter for the really (really really) stupid script-kiddies.
    One of the hosts we work with, had a good idea which consisted in you making the login procedure of teamspeak as TCP and triggering some sort of bash-script in the server-side with the user IP, this way we could use firewall APIs in order to "fully secure" the teamspeak server, is it so hard to be done ? Because, as soon you do it, you'll see all these complaints decreasing massively.

  9. #24
    Join Date
    October 2015
    Posts
    34

    Sticky

    Quote Originally Posted by H3LLFIRE View Post
    It's not overly complicated just expensive. I've set it up in the past and it really wasn't that hard. However if your current hoster can't give you the size of the attack then it's a bit hard to judge the amount of protection you would need.

    I'm not talking about setting up and configuring your own equipment, that would be far more complicated, I'm talking about setting up protection probably via a GRE tunnel. Also if your talking about DDoS protection for a hosting company then yes it does get harder to implement.

    The hosting DDoS protected hosting is probably the best/cheaper option however.

    And as ScP said before this isn't a Teamspeak problem. If people are just blasting your IP with garbage traffic it doesn't really matter what service your running on your server.
    You think it is a matter of money ? Not for us, we've paid a lot of money to all sorts of companies and failed greatly, budget isn't our issue, a consistent and stable server is, for sure, mainly when "hackers" are working 24x7 testing our servers, trying to find ways to crash/down it at all costs. (And most of the attacks causing these issues, are really small ones, at rates like 50~100 Mbps, the large ones up to 50~100~200Gbps aren't an issue at all).

    So while this is not a "TeamSpeak issue", it would be great if they could "help us" with these issues, in order to circumvent it for good. After all it's all a group work, the hosts that implement DoS/DDoS Protection methods, also requires colaboration of the software developers, mainly when speaking about UDP Protocol which has no connection/state control at all, making it really hard to mitigate application/targetted attacks.

  10. #25
    Join Date
    April 2013
    Posts
    5
    The best way to protect anything against DDoS is to find a provider that offers such protection. OVH has been good for this type of protection for us. Just last night our TS3 was DDoSed and no one even knew it except the one that receives the email notification. Of course with any such provider you need to take advantage of ACL rules that you can define. OVH calls this their "Firewall". But the system is the same.

    The one thing TS3 needs to provide us is the ability to configure outbound ports so that we can make allowances for them in our ACL rules. That way we can control all UDP that reaches our box.

    https://support.teamspeakusa.com/ind...k-3-server-use

    In addition to that, packets originating from or sent to accounting.teamspeak.com:2008 (TCP) and weblist.teamspeak.com:2010 (UDP) must not be blocked. The local port for these connections is randomly assigned by the operating system when the connection is established.
    Those are the two connections we need to be able to configure which ports they use. Or be able to configure which outbound IP they use.

    Quote Originally Posted by MaxDev View Post
    (And most of the attacks causing these issues, are really small ones, at rates like 50~100 Mbps, the large ones up to 50~100~200Gbps aren't an issue at all).
    Sounds like a type of attack I had made a program to filter out. TS3 handles it badly so that results in TS3 freezing up dealing with the attack.
    Last edited by Kigen; August 22nd, 2016 at 07:28 PM.

  11. #26
    Join Date
    October 2015
    Posts
    34

    Sticky

    Quote Originally Posted by Kigen View Post
    The best way to protect anything against DDoS is to find a provider that offers such protection. OVH has been good for this type of protection for us. Just last night our TS3 was DDoSed and no one even knew it except the one that receives the email notification. Of course with any such provider you need to take advantage of ACL rules that you can define. OVH calls this their "Firewall". But the system is the same.

    The one thing TS3 needs to provide us is the ability to configure outbound ports so that we can make allowances for them in our ACL rules. That way we can control all UDP that reaches our box.

    https://support.teamspeakusa.com/ind...k-3-server-use



    Those are the two connections we need to be able to configure which ports they use. Or be able to configure which outbound IP they use.
    These will not fix application targetted attacks, fooling the software with invalid/random packets unfortunately. (If you check the link to another thread of mine, I've tried alot of companies including OVH and none of them could fix those, using APIs or not, using Firewalls or not, since it just can't solve these attack types).

  12. #27
    Join Date
    April 2013
    Posts
    5
    If you have a packet capture of the attack I could tell you more about how to block it.

    As I edited to add to my post it sounds like a type of attack I had to deal with. I made an application that filters it out. But we use a Windows box. With Linux it should be easy enough to add an iptables rule to block the type of attack I dealt with. But I don't know if the attack I dealt with is the same as the one you have. A packet capture of the attack would tell me much about this.

  13. #28
    Join Date
    October 2015
    Posts
    34

    Sticky

    Quote Originally Posted by Kigen View Post
    If you have a packet capture of the attack I could tell you more about how to block it.

    As I edited to add to my post it sounds like a type of attack I had to deal with. I made an application that filters it out. But we use a Windows box. With Linux it should be easy enough to add an iptables rule to block the type of attack I dealt with. But I don't know if the attack I dealt with is the same as the one you have. A packet capture of the attack would tell me much about this.
    - Random Src IP, Random Src Port, TS Dst Port, TS IP as DST.
    - Payload complely random.
    - Size completely random.

    10.000.000 packets per second / 7.60 Gbps getting in.

    Tell me how to filter this out please.

  14. #29
    Join Date
    April 2013
    Posts
    5
    Protocol authentication.

    OVH's game range is suppose to be able to do this somewhat. You just configure the "Game firewall" correctly.

  15. #30
    Join Date
    October 2015
    Posts
    34

    Sticky

    Quote Originally Posted by Kigen View Post
    Protocol authentication.

    OVH's game range is suppose to be able to do this somewhat. You just configure the "Game firewall" correctly.
    It doesn't do that, and their support told me they aren't able to protect against it, neither them or any other company I have tried, such as :

    OVH, Koddos, Voxility, Staminus, NFO, Psychz, Limestone, BlackLotus, Javapipe and so on, all them have issues filtering these attacks and whether speaking to their support or not, they always give up when the attack is customized like that. I'm just saying, this is not easy as you think.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Question about DDos attacks...
    By Barrybe in forum Permission System
    Replies: 3
    Last Post: December 5th, 2013, 05:00 PM
  2. [Not possible] TeamSpeak can be used for outgoing DDoS attacks??? (is it true?)
    By Ahmed in forum Linux / FreeBSD
    Replies: 11
    Last Post: September 9th, 2013, 07:15 PM
  3. Replies: 9
    Last Post: October 28th, 2010, 08:39 AM

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •