-
Notifications
You must be signed in to change notification settings - Fork 15
Conversation
Please note that there are some security issues with my old banmaster system, especially with spoofed IP packets. |
Do you mean that someone could just send bogus banmaster packets to a server at the moment someone connects to it to get him banned? At least this shouldn't happen when using localhost as banmaster, which I made default. I'd fix this by adding a random sequence number to requests to the banmaster, which the banmaster has to return, otherwise the packet is ignored. Also, there is no IPV6 support. |
I think that one reason why it wasn't used so much (and thus removed for lack of will to maintain it) is that there's no easy way to add bans. |
Note that you should adapt to the surrounding coding style (for example where to place the curly braces and also variable naming conventions). :)
This could even happen with localhost I guess. Also he doesn't need to send them the moment the clients connect - bans from the banmaster are accepted all the time. |
As suggested in issue #240 I added the old banmaster code again and made it work. I've also added a readme-banmaster.txt that explains how it works.