• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 16:09
CEST 22:09
KST 05:09
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
[ASL19] Finals Recap: Standing Tall9HomeStory Cup 27 - Info & Preview18Classic wins Code S Season 2 (2025)16Code S RO4 & Finals Preview: herO, Rogue, Classic, GuMiho0TL Team Map Contest #5: Presented by Monster Energy6
Community News
Flash Announces Hiatus From ASL56Weekly Cups (June 23-29): Reynor in world title form?13FEL Cracov 2025 (July 27) - $8000 live event19Esports World Cup 2025 - Final Player Roster16Weekly Cups (June 16-22): Clem strikes back1
StarCraft 2
General
Statistics for vetoed/disliked maps The SCII GOAT: A statistical Evaluation Weekly Cups (June 23-29): Reynor in world title form? PiG Sty Festival #5: Playoffs Preview + Groups Recap The GOAT ranking of GOAT rankings
Tourneys
FEL Cracov 2025 (July 27) - $8000 live event RSL: Revival, a new crowdfunded tournament series Korean Starcraft League Week 77 Master Swan Open (Global Bronze-Master 2) [GSL 2025] Code S: Season 2 - Semi Finals & Finals
Strategy
How did i lose this ZvP, whats the proper response Simple Questions Simple Answers
Custom Maps
[UMS] Zillion Zerglings
External Content
Mutation # 480 Moths to the Flame Mutation # 479 Worn Out Welcome Mutation # 478 Instant Karma Mutation # 477 Slow and Steady
Brood War
General
SC uni coach streams logging into betting site BGH Mineral Boosts Tutorial Video Flash Announces Hiatus From ASL Player “Jedi” cheat on CSL Replays question
Tourneys
[Megathread] Daily Proleagues [BSL20] Grand Finals - Sunday 20:00 CET Small VOD Thread 2.0 [BSL20] GosuLeague RO16 - Tue & Wed 20:00+CET
Strategy
Simple Questions, Simple Answers I am doing this better than progamers do.
Other Games
General Games
Stormgate/Frost Giant Megathread Nintendo Switch Thread Path of Exile What do you want from future RTS games? Beyond All Reason
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread Vanilla Mini Mafia
Community
General
Russo-Ukrainian War Thread US Politics Mega-thread Trading/Investing Thread Things Aren’t Peaceful in Palestine The Games Industry And ATVI
Fan Clubs
SKT1 Classic Fan Club! Maru Fan Club
Media & Entertainment
Anime Discussion Thread [Manga] One Piece [\m/] Heavy Metal Thread
Sports
2024 - 2025 Football Thread Formula 1 Discussion NBA General Discussion TeamLiquid Health and Fitness Initiative For 2023 NHL Playoffs 2024
World Cup 2022
Tech Support
Computer Build, Upgrade & Buying Resource Thread
TL Community
Blogs
Culture Clash in Video Games…
TrAiDoS
from making sc maps to makin…
Husyelt
Blog #2
tankgirl
StarCraft improvement
iopq
Trip to the Zoo
micronesia
Customize Sidebar...

Website Feedback

Closed Threads



Active: 571 users

Solution to DDoS issues for streamers and players - Page 2

Forum Index > SC2 General
Post a Reply
Prev 1 2 3 4 5 6 Next All
Moderator note: The instructions in this thread will do nothing to protect you from a DDoS attack. The only way to prevent an attack is to avoid your IP address becoming public.
pmp10
Profile Joined April 2012
3315 Posts
September 03 2012 20:47 GMT
#21
On September 04 2012 05:41 LunaSea wrote:
Show nested quote +
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 20:51 GMT
#22
On September 04 2012 05:46 Pumplekin wrote:
Sadly, while you are using technical words, I don't think you really know exactly what they mean.

I'd suggest stopping digging a bigger hole for yourself and be thankful TL is a relatively nice and friendly place


1) - Look at the code.
2) - Come back latter

When your best advice is : "be nice to your ISP", I don't think you can consider yourself qualified.
Nice contribution btw.
"Your f*cking wrong, but I respect your opinion" --Day[9]
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
Last Edited: 2012-09-03 20:52:39
September 03 2012 20:51 GMT
#23
On September 04 2012 05:47 pmp10 wrote:
Show nested quote +
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.

And your router definetly gets A LOT of packets in a DDoS situation.
"Your f*cking wrong, but I respect your opinion" --Day[9]
karpo
Profile Joined October 2010
Sweden1998 Posts
Last Edited: 2012-09-03 20:57:50
September 03 2012 20:54 GMT
#24
On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:46 Pumplekin wrote:
Sadly, while you are using technical words, I don't think you really know exactly what they mean.

I'd suggest stopping digging a bigger hole for yourself and be thankful TL is a relatively nice and friendly place


1) - Look at the code.
2) - Come back latter

When your best advice is : "be nice to your ISP", I don't think you can consider yourself qualified.
Nice contribution btw.


I've seen this before in so many threads. People post long OP's about an issue and how to solve it yet when they're shot down by people with more knowledge they get very defensive.


I'm sorry but this isn't a solution to the problem, dude.


On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:47 pmp10 wrote:
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.

And your router definetly gets A LOT of packets in a DDoS situation.


He's talking about the transmit buffers on network equipment, not TCP bufffers. Your TCP window won't even get much of anything as equipment ISP side will drop packets before they even reach the router.
Nightwatch
Profile Joined March 2011
13 Posts
Last Edited: 2012-09-03 21:00:26
September 03 2012 20:56 GMT
#25
I don't really get the point of this solution, any normal "home" router will block wan requests by default. All you do is setup a whitelist so all other requests are discarded. ...correct?

You say normally the router will inspect the complete packet and test against any protocol but there is no point in that. (and no router does that <.<) Unless you started the session the firewall should just bock the packet, so you won't need to do more than to check the session table.
tl;dr spi?
KrazyTrumpet
Profile Joined April 2010
United States2520 Posts
Last Edited: 2012-09-03 20:59:43
September 03 2012 20:59 GMT
#26
Not really sure how this helps the actual problem...
www.twitch.tv/krazy Best Stream Quality NA @KClarkSC2
Pumplekin
Profile Blog Joined April 2011
United Kingdom50 Posts
Last Edited: 2012-09-03 21:02:08
September 03 2012 21:00 GMT
#27
On September 04 2012 05:56 Nightwatch wrote:
I don't really get the point of this solution, any normal "home" router will block wan requests by default. All you do is setup a whitelist so all other requests are discarded. ...correct?

You say normally the router will inspect the complete packet and test against any protocol but there is no point in that. (and no router does that <.<) Unless you started the session the firewall should just bock the packet, so you won't need to do more than to check the session table.
tl;dr; spi?


Yup, it won't be in the NAT table, so it will go in the bin by default. ACL'ing it MAY save a tiny bit of CPU (it might not, it depends on how the CPE is designed).

If you are talking IPv6, or a non-NAT'ing connection, things would be different, but I think we can safely assume almost everyone is using IPv4 and NAT on the CPE (and mostly I have been in this thread).

I'm also starting to suspect this may be a massive troll thread. At least I'm hoping it is
Loves Cows
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 21:01 GMT
#28
On September 04 2012 05:56 Nightwatch wrote:
I don't really get the point of this solution, any normal "home" router will block wan requests by default. All you do is setup a whitelist so all other requests are discarded. ...correct?

You say normally the router will inspect the complete packet and test against any protocol but there is no point in that. (and no router does that <.<) Unless you started the session the firewall should just bock the packet, so you won't need to do more than to check the session table.
tl;dr; spi?


Yes, but how does the firewall know if this packet isn't starting a session ?
The router has to look at the packet and see if this is a valid packet that is actually starting a session in one of the supported protocols.
"Your f*cking wrong, but I respect your opinion" --Day[9]
pmp10
Profile Joined April 2012
3315 Posts
September 03 2012 21:06 GMT
#29
On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:47 pmp10 wrote:
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.

Pretty sure it isn't.
Last I recall buffer was a kind of a memory while a window a part of TCP packet but maybe things have changed.
Nightwatch
Profile Joined March 2011
13 Posts
September 03 2012 21:08 GMT
#30
On September 04 2012 06:01 LunaSea wrote:
Show nested quote +
On September 04 2012 05:56 Nightwatch wrote:
I don't really get the point of this solution, any normal "home" router will block wan requests by default. All you do is setup a whitelist so all other requests are discarded. ...correct?

You say normally the router will inspect the complete packet and test against any protocol but there is no point in that. (and no router does that <.<) Unless you started the session the firewall should just bock the packet, so you won't need to do more than to check the session table.
tl;dr; spi?


Yes, but how does the firewall know if this packet isn't starting a session ?
The router has to look at the packet and see if this is a valid packet that is actually starting a session in one of the supported protocols.


Simple, you don't start a new session from outside of the network.
Pumplekin
Profile Blog Joined April 2011
United Kingdom50 Posts
September 03 2012 21:09 GMT
#31
By default (without any port forwarding, DMZ setup, or UPNP or anything like that), a typical home CPE will not allow anything to setup an inbound connection. It will simply look at the NAT table, check if an entry matches, if it does it will NAT and forward it, if it doesn't, it will discard it. Port Forwarding, DMZ's + UPNP basically are just other methods of setting up NAT rules.

Still, your ISP's access kit has a full TX buffer, and you still haven't fixed that.
Loves Cows
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 21:10 GMT
#32
On September 04 2012 06:06 pmp10 wrote:
+ Show Spoiler +
On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:47 pmp10 wrote:
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.


Pretty sure it isn't.
Last I recall buffer was a kind of a memory while a window a part of TCP packet but maybe things have changed.



The simplest way of considering the window size is that it indicates the size of the device's receive buffer for the particular connection.


-- http://www.tcpipguide.com/free/t_TCPWindowSizeAdjustmentandFlowControl.htm

plz ...
"Your f*cking wrong, but I respect your opinion" --Day[9]
Hryul
Profile Blog Joined March 2011
Austria2609 Posts
September 03 2012 21:11 GMT
#33
I think the arguments may be easily settled if somebody would run a test.
Countdown to victory: 1 200!
trGKakarot
Profile Joined October 2011
United States129 Posts
September 03 2012 21:13 GMT
#34
I will admit I only skimmed this thread (since it seems like if somebody solved DDoS attacks they would be getting a lot more traction than a random thread on TL), but from what I gather the OP is assuming that an ISP will send an infinite amount of data to your router and filtering out bad IP addresses at your router level will solve the problem since then you only accept "x" amount of data?
hihi glgl
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 21:15 GMT
#35
On September 04 2012 06:13 trGKakarot wrote:
I will admit I only skimmed this thread (since it seems like if somebody solved DDoS attacks they would be getting a lot more traction than a random thread on TL), but from what I gather the OP is assuming that an ISP will send an infinite amount of data to your router and filtering out bad IP addresses at your router level will solve the problem since then you only accept "x" amount of data?


Yes, except it's not your ISP sending the data originally, but a bunch of hacked computers rented by a random kid.
"Your f*cking wrong, but I respect your opinion" --Day[9]
nemonic
Profile Joined November 2011
132 Posts
September 03 2012 21:15 GMT
#36
Sorry to say it this staight, but what the OP says is definitely wrong to a large degree. There's no way you can defend against DDoS by filtering packets on your router. The network bandwidth will still be blocked no matter if you filter or not, it makes almost no difference. The only thing that saves you is hiding your IP address.
Pumplekin
Profile Blog Joined April 2011
United Kingdom50 Posts
Last Edited: 2012-09-03 21:17:38
September 03 2012 21:16 GMT
#37
TCP windowing is part of how TCP does flow control. You can find plenty of good guides to it on the internet, and this is reasonable starting point (http://packetlife.net/blog/2010/aug/4/tcp-windows-and-window-scaling/).

There is quite a lot to know about TCP really, I'm far from an expert in the real ins and outs of it, it is a surprisingly deep topic for something that mostly "just works" (although I'm more than happy to answer any questions up to my knowledge level).
Loves Cows
trGKakarot
Profile Joined October 2011
United States129 Posts
September 03 2012 21:17 GMT
#38
On September 04 2012 06:15 LunaSea wrote:
Show nested quote +
On September 04 2012 06:13 trGKakarot wrote:
I will admit I only skimmed this thread (since it seems like if somebody solved DDoS attacks they would be getting a lot more traction than a random thread on TL), but from what I gather the OP is assuming that an ISP will send an infinite amount of data to your router and filtering out bad IP addresses at your router level will solve the problem since then you only accept "x" amount of data?


Yes, except it's not your ISP sending the data originally, but a bunch of hacked computers rented by a random kid.


Right, but you are only connected to the outside world through your ISP (unless they are somehow on your intranet, which means you have a bigger problem).

Maybe I am missing something...
hihi glgl
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 21:25 GMT
#39
On September 04 2012 06:17 trGKakarot wrote:
Show nested quote +
On September 04 2012 06:15 LunaSea wrote:
On September 04 2012 06:13 trGKakarot wrote:
I will admit I only skimmed this thread (since it seems like if somebody solved DDoS attacks they would be getting a lot more traction than a random thread on TL), but from what I gather the OP is assuming that an ISP will send an infinite amount of data to your router and filtering out bad IP addresses at your router level will solve the problem since then you only accept "x" amount of data?


Yes, except it's not your ISP sending the data originally, but a bunch of hacked computers rented by a random kid.


Right, but you are only connected to the outside world through your ISP (unless they are somehow on your intranet, which means you have a bigger problem).

Maybe I am missing something...


Yes but what I meant is this :

A --> sends a packet to B --> who forwards it to C

Where :

A is the attacker,
B your ISP,
and C is you.

A is the one the packets originate from and B only forwards it to the destination indicated in the packet.
"Your f*cking wrong, but I respect your opinion" --Day[9]
pmp10
Profile Joined April 2012
3315 Posts
Last Edited: 2012-09-03 21:29:19
September 03 2012 21:28 GMT
#40
On September 04 2012 06:10 LunaSea wrote:
Show nested quote +
On September 04 2012 06:06 pmp10 wrote:
+ Show Spoiler +
On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:47 pmp10 wrote:
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.


Pretty sure it isn't.
Last I recall buffer was a kind of a memory while a window a part of TCP packet but maybe things have changed.



Show nested quote +
The simplest way of considering the window size is that it indicates the size of the device's receive buffer for the particular connection.


-- http://www.tcpipguide.com/free/t_TCPWindowSizeAdjustmentandFlowControl.htm

plz ...

Please look up those terms somewhere more reputable,
Gross oversimplification and completely mismatched definitions won't help your education.
Buffer is about as much a TCP window as operating system is a RAM.
TCP window can set buffer size but they are completely different things.
Prev 1 2 3 4 5 6 Next All
Please log in or register to reply.
Live Events Refresh
FEL
16:00
Cracov 2025: Qualifier #1
RotterdaM969
IndyStarCraft 347
CranKy Ducklings224
Liquipedia
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
RotterdaM 969
IndyStarCraft 347
ProTech75
JuggernautJason70
StarCraft: Brood War
Calm 4386
firebathero 242
JulyZerg 152
Rock 34
LancerX 28
Stormgate
Nathanias72
Dota 2
monkeys_forever307
League of Legends
Grubby3128
Dendi1434
Heroes of the Storm
Liquid`Hasu360
Khaldor277
Other Games
FrodaN2408
fl0m1161
Mlord648
KnowMe123
Sick66
Trikslyr48
Organizations
Other Games
EGCTV1659
StarCraft 2
angryscii 23
Other Games
BasetradeTV22
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 23 non-featured ]
StarCraft 2
• Berry_CruncH176
• printf 60
• iHatsuTV 49
• tFFMrPink 20
• davetesta18
• Kozan
• LaughNgamezSOOP
• sooper7s
• AfreecaTV YouTube
• intothetv
• Migwel
• IndyKCrew
StarCraft: Brood War
• Pr0nogo 3
• STPLYoutube
• ZZZeroYoutube
• BSLYoutube
Dota 2
• masondota2404
• Ler87
League of Legends
• Doublelift2687
• Jankos2096
Other Games
• imaqtpie1037
• WagamamaTV570
• Shiphtur288
Upcoming Events
RSL Revival
13h 51m
Clem vs Classic
SHIN vs Cure
FEL
15h 51m
WardiTV European League
15h 51m
BSL: ProLeague
21h 51m
Dewalt vs Bonyth
Replay Cast
2 days
Sparkling Tuna Cup
2 days
WardiTV European League
2 days
The PondCast
3 days
Replay Cast
4 days
RSL Revival
4 days
[ Show More ]
Replay Cast
5 days
RSL Revival
5 days
FEL
5 days
RSL Revival
6 days
FEL
6 days
FEL
6 days
Liquipedia Results

Completed

BSL 2v2 Season 3
HSC XXVII
Heroes 10 EU

Ongoing

JPL Season 2
BSL Season 20
Acropolis #3
KCM Race Survival 2025 Season 2
CSL 17: 2025 SUMMER
Copa Latinoamericana 4
Championship of Russia 2025
RSL Revival: Season 1
Murky Cup #2
BLAST.tv Austin Major 2025
ESL Impact League Season 7
IEM Dallas 2025
PGL Astana 2025
Asian Champions League '25
BLAST Rivals Spring 2025
MESA Nomadic Masters
CCT Season 2 Global Finals
IEM Melbourne 2025

Upcoming

2025 ACS Season 2: Qualifier
CSLPRO Last Chance 2025
2025 ACS Season 2
CSLPRO Chat StarLAN 3
K-Championship
uThermal 2v2 Main Event
SEL Season 2 Championship
FEL Cracov 2025
Esports World Cup 2025
StarSeries Fall 2025
FISSURE Playground #2
BLAST Open Fall 2025
BLAST Open Fall Qual
Esports World Cup 2025
BLAST Bounty Fall 2025
BLAST Bounty Fall Qual
IEM Cologne 2025
FISSURE Playground #1
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.