• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EST 02:14
CET 08:14
KST 16:14
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
RSL Revival - 2025 Season Finals Preview8RSL Season 3 - Playoffs Preview0RSL Season 3 - RO16 Groups C & D Preview0RSL Season 3 - RO16 Groups A & B Preview2TL.net Map Contest #21: Winners12
Community News
ComeBackTV's documentary on Byun's Career !8Weekly Cups (Dec 8-14): MaxPax, Clem, Cure win4Weekly Cups (Dec 1-7): Clem doubles, Solar gets over the hump1Weekly Cups (Nov 24-30): MaxPax, Clem, herO win2BGE Stara Zagora 2026 announced15
StarCraft 2
General
When will we find out if there are more tournament ComeBackTV's documentary on Byun's Career ! Weekly Cups (Dec 8-14): MaxPax, Clem, Cure win RSL Revival - 2025 Season Finals Preview Weekly Cups (Dec 1-7): Clem doubles, Solar gets over the hump
Tourneys
Winter Warp Gate Amateur Showdown #1: Sparkling Tuna Cup - Weekly Open Tournament $5,000+ WardiTV 2025 Championship RSL Offline Finals Info - Dec 13 and 14! Master Swan Open (Global Bronze-Master 2)
Strategy
Custom Maps
Map Editor closed ?
External Content
Mutation # 504 Retribution Mutation # 503 Fowl Play Mutation # 502 Negative Reinforcement Mutation # 501 Price of Progress
Brood War
General
How Rain Became ProGamer in Just 3 Months BGH Auto Balance -> http://bghmmr.eu/ FlaSh on: Biggest Problem With SnOw's Playstyle screp: Command line app to parse SC rep files [BSL21] RO8 Bracket & Prediction Contest
Tourneys
Small VOD Thread 2.0 [Megathread] Daily Proleagues [BSL21] WB SEMIFINALS - Saturday 21:00 CET [BSL21] RO8 - Day 2 - Sunday 21:00 CET
Strategy
Simple Questions, Simple Answers Game Theory for Starcraft Current Meta Fighting Spirit mining rates
Other Games
General Games
Nintendo Switch Thread Mechabellum Stormgate/Frost Giant Megathread PC Games Sales Thread Path of Exile
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
Mafia Game Mode Feedback/Ideas Survivor II: The Amazon Sengoku Mafia TL Mafia Community Thread
Community
General
US Politics Mega-thread Russo-Ukrainian War Thread Things Aren’t Peaceful in Palestine The Games Industry And ATVI YouTube Thread
Fan Clubs
White-Ra Fan Club
Media & Entertainment
Anime Discussion Thread [Manga] One Piece Movie Discussion!
Sports
2024 - 2026 Football Thread Formula 1 Discussion
World Cup 2022
Tech Support
Computer Build, Upgrade & Buying Resource Thread
TL Community
TL+ Announced Where to ask questions and add stream?
Blogs
The (Hidden) Drug Problem in…
TrAiDoS
I decided to write a webnov…
DjKniteX
James Bond movies ranking - pa…
Topin
Thanks for the RSL
Hildegard
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1258 users

Solution to DDoS issues for streamers and players - Page 2

Forum Index > SC2 General
Post a Reply
Prev 1 2 3 4 5 6 Next All
Moderator note: The instructions in this thread will do nothing to protect you from a DDoS attack. The only way to prevent an attack is to avoid your IP address becoming public.
pmp10
Profile Joined April 2012
3372 Posts
September 03 2012 20:47 GMT
#21
On September 04 2012 05:41 LunaSea wrote:
Show nested quote +
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 20:51 GMT
#22
On September 04 2012 05:46 Pumplekin wrote:
Sadly, while you are using technical words, I don't think you really know exactly what they mean.

I'd suggest stopping digging a bigger hole for yourself and be thankful TL is a relatively nice and friendly place


1) - Look at the code.
2) - Come back latter

When your best advice is : "be nice to your ISP", I don't think you can consider yourself qualified.
Nice contribution btw.
"Your f*cking wrong, but I respect your opinion" --Day[9]
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
Last Edited: 2012-09-03 20:52:39
September 03 2012 20:51 GMT
#23
On September 04 2012 05:47 pmp10 wrote:
Show nested quote +
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.

And your router definetly gets A LOT of packets in a DDoS situation.
"Your f*cking wrong, but I respect your opinion" --Day[9]
karpo
Profile Joined October 2010
Sweden1998 Posts
Last Edited: 2012-09-03 20:57:50
September 03 2012 20:54 GMT
#24
On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:46 Pumplekin wrote:
Sadly, while you are using technical words, I don't think you really know exactly what they mean.

I'd suggest stopping digging a bigger hole for yourself and be thankful TL is a relatively nice and friendly place


1) - Look at the code.
2) - Come back latter

When your best advice is : "be nice to your ISP", I don't think you can consider yourself qualified.
Nice contribution btw.


I've seen this before in so many threads. People post long OP's about an issue and how to solve it yet when they're shot down by people with more knowledge they get very defensive.


I'm sorry but this isn't a solution to the problem, dude.


On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:47 pmp10 wrote:
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.

And your router definetly gets A LOT of packets in a DDoS situation.


He's talking about the transmit buffers on network equipment, not TCP bufffers. Your TCP window won't even get much of anything as equipment ISP side will drop packets before they even reach the router.
Nightwatch
Profile Joined March 2011
13 Posts
Last Edited: 2012-09-03 21:00:26
September 03 2012 20:56 GMT
#25
I don't really get the point of this solution, any normal "home" router will block wan requests by default. All you do is setup a whitelist so all other requests are discarded. ...correct?

You say normally the router will inspect the complete packet and test against any protocol but there is no point in that. (and no router does that <.<) Unless you started the session the firewall should just bock the packet, so you won't need to do more than to check the session table.
tl;dr spi?
KrazyTrumpet
Profile Joined April 2010
United States2520 Posts
Last Edited: 2012-09-03 20:59:43
September 03 2012 20:59 GMT
#26
Not really sure how this helps the actual problem...
www.twitch.tv/krazy Best Stream Quality NA @KClarkSC2
Pumplekin
Profile Blog Joined April 2011
United Kingdom50 Posts
Last Edited: 2012-09-03 21:02:08
September 03 2012 21:00 GMT
#27
On September 04 2012 05:56 Nightwatch wrote:
I don't really get the point of this solution, any normal "home" router will block wan requests by default. All you do is setup a whitelist so all other requests are discarded. ...correct?

You say normally the router will inspect the complete packet and test against any protocol but there is no point in that. (and no router does that <.<) Unless you started the session the firewall should just bock the packet, so you won't need to do more than to check the session table.
tl;dr; spi?


Yup, it won't be in the NAT table, so it will go in the bin by default. ACL'ing it MAY save a tiny bit of CPU (it might not, it depends on how the CPE is designed).

If you are talking IPv6, or a non-NAT'ing connection, things would be different, but I think we can safely assume almost everyone is using IPv4 and NAT on the CPE (and mostly I have been in this thread).

I'm also starting to suspect this may be a massive troll thread. At least I'm hoping it is
Loves Cows
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 21:01 GMT
#28
On September 04 2012 05:56 Nightwatch wrote:
I don't really get the point of this solution, any normal "home" router will block wan requests by default. All you do is setup a whitelist so all other requests are discarded. ...correct?

You say normally the router will inspect the complete packet and test against any protocol but there is no point in that. (and no router does that <.<) Unless you started the session the firewall should just bock the packet, so you won't need to do more than to check the session table.
tl;dr; spi?


Yes, but how does the firewall know if this packet isn't starting a session ?
The router has to look at the packet and see if this is a valid packet that is actually starting a session in one of the supported protocols.
"Your f*cking wrong, but I respect your opinion" --Day[9]
pmp10
Profile Joined April 2012
3372 Posts
September 03 2012 21:06 GMT
#29
On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:47 pmp10 wrote:
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.

Pretty sure it isn't.
Last I recall buffer was a kind of a memory while a window a part of TCP packet but maybe things have changed.
Nightwatch
Profile Joined March 2011
13 Posts
September 03 2012 21:08 GMT
#30
On September 04 2012 06:01 LunaSea wrote:
Show nested quote +
On September 04 2012 05:56 Nightwatch wrote:
I don't really get the point of this solution, any normal "home" router will block wan requests by default. All you do is setup a whitelist so all other requests are discarded. ...correct?

You say normally the router will inspect the complete packet and test against any protocol but there is no point in that. (and no router does that <.<) Unless you started the session the firewall should just bock the packet, so you won't need to do more than to check the session table.
tl;dr; spi?


Yes, but how does the firewall know if this packet isn't starting a session ?
The router has to look at the packet and see if this is a valid packet that is actually starting a session in one of the supported protocols.


Simple, you don't start a new session from outside of the network.
Pumplekin
Profile Blog Joined April 2011
United Kingdom50 Posts
September 03 2012 21:09 GMT
#31
By default (without any port forwarding, DMZ setup, or UPNP or anything like that), a typical home CPE will not allow anything to setup an inbound connection. It will simply look at the NAT table, check if an entry matches, if it does it will NAT and forward it, if it doesn't, it will discard it. Port Forwarding, DMZ's + UPNP basically are just other methods of setting up NAT rules.

Still, your ISP's access kit has a full TX buffer, and you still haven't fixed that.
Loves Cows
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 21:10 GMT
#32
On September 04 2012 06:06 pmp10 wrote:
+ Show Spoiler +
On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:47 pmp10 wrote:
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.


Pretty sure it isn't.
Last I recall buffer was a kind of a memory while a window a part of TCP packet but maybe things have changed.



The simplest way of considering the window size is that it indicates the size of the device's receive buffer for the particular connection.


-- http://www.tcpipguide.com/free/t_TCPWindowSizeAdjustmentandFlowControl.htm

plz ...
"Your f*cking wrong, but I respect your opinion" --Day[9]
Hryul
Profile Blog Joined March 2011
Austria2609 Posts
September 03 2012 21:11 GMT
#33
I think the arguments may be easily settled if somebody would run a test.
Countdown to victory: 1 200!
trGKakarot
Profile Joined October 2011
United States129 Posts
September 03 2012 21:13 GMT
#34
I will admit I only skimmed this thread (since it seems like if somebody solved DDoS attacks they would be getting a lot more traction than a random thread on TL), but from what I gather the OP is assuming that an ISP will send an infinite amount of data to your router and filtering out bad IP addresses at your router level will solve the problem since then you only accept "x" amount of data?
hihi glgl
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 21:15 GMT
#35
On September 04 2012 06:13 trGKakarot wrote:
I will admit I only skimmed this thread (since it seems like if somebody solved DDoS attacks they would be getting a lot more traction than a random thread on TL), but from what I gather the OP is assuming that an ISP will send an infinite amount of data to your router and filtering out bad IP addresses at your router level will solve the problem since then you only accept "x" amount of data?


Yes, except it's not your ISP sending the data originally, but a bunch of hacked computers rented by a random kid.
"Your f*cking wrong, but I respect your opinion" --Day[9]
nemonic
Profile Joined November 2011
132 Posts
September 03 2012 21:15 GMT
#36
Sorry to say it this staight, but what the OP says is definitely wrong to a large degree. There's no way you can defend against DDoS by filtering packets on your router. The network bandwidth will still be blocked no matter if you filter or not, it makes almost no difference. The only thing that saves you is hiding your IP address.
Pumplekin
Profile Blog Joined April 2011
United Kingdom50 Posts
Last Edited: 2012-09-03 21:17:38
September 03 2012 21:16 GMT
#37
TCP windowing is part of how TCP does flow control. You can find plenty of good guides to it on the internet, and this is reasonable starting point (http://packetlife.net/blog/2010/aug/4/tcp-windows-and-window-scaling/).

There is quite a lot to know about TCP really, I'm far from an expert in the real ins and outs of it, it is a surprisingly deep topic for something that mostly "just works" (although I'm more than happy to answer any questions up to my knowledge level).
Loves Cows
trGKakarot
Profile Joined October 2011
United States129 Posts
September 03 2012 21:17 GMT
#38
On September 04 2012 06:15 LunaSea wrote:
Show nested quote +
On September 04 2012 06:13 trGKakarot wrote:
I will admit I only skimmed this thread (since it seems like if somebody solved DDoS attacks they would be getting a lot more traction than a random thread on TL), but from what I gather the OP is assuming that an ISP will send an infinite amount of data to your router and filtering out bad IP addresses at your router level will solve the problem since then you only accept "x" amount of data?


Yes, except it's not your ISP sending the data originally, but a bunch of hacked computers rented by a random kid.


Right, but you are only connected to the outside world through your ISP (unless they are somehow on your intranet, which means you have a bigger problem).

Maybe I am missing something...
hihi glgl
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 21:25 GMT
#39
On September 04 2012 06:17 trGKakarot wrote:
Show nested quote +
On September 04 2012 06:15 LunaSea wrote:
On September 04 2012 06:13 trGKakarot wrote:
I will admit I only skimmed this thread (since it seems like if somebody solved DDoS attacks they would be getting a lot more traction than a random thread on TL), but from what I gather the OP is assuming that an ISP will send an infinite amount of data to your router and filtering out bad IP addresses at your router level will solve the problem since then you only accept "x" amount of data?


Yes, except it's not your ISP sending the data originally, but a bunch of hacked computers rented by a random kid.


Right, but you are only connected to the outside world through your ISP (unless they are somehow on your intranet, which means you have a bigger problem).

Maybe I am missing something...


Yes but what I meant is this :

A --> sends a packet to B --> who forwards it to C

Where :

A is the attacker,
B your ISP,
and C is you.

A is the one the packets originate from and B only forwards it to the destination indicated in the packet.
"Your f*cking wrong, but I respect your opinion" --Day[9]
pmp10
Profile Joined April 2012
3372 Posts
Last Edited: 2012-09-03 21:29:19
September 03 2012 21:28 GMT
#40
On September 04 2012 06:10 LunaSea wrote:
Show nested quote +
On September 04 2012 06:06 pmp10 wrote:
+ Show Spoiler +
On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:47 pmp10 wrote:
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.


Pretty sure it isn't.
Last I recall buffer was a kind of a memory while a window a part of TCP packet but maybe things have changed.



Show nested quote +
The simplest way of considering the window size is that it indicates the size of the device's receive buffer for the particular connection.


-- http://www.tcpipguide.com/free/t_TCPWindowSizeAdjustmentandFlowControl.htm

plz ...

Please look up those terms somewhere more reputable,
Gross oversimplification and completely mismatched definitions won't help your education.
Buffer is about as much a TCP window as operating system is a RAM.
TCP window can set buffer size but they are completely different things.
Prev 1 2 3 4 5 6 Next All
Please log in or register to reply.
Live Events Refresh
Next event in 2h 46m
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
RuFF_SC2 226
StarCraft: Brood War
Calm 9343
Leta 968
Light 120
Larva 86
Nal_rA 54
Mong 53
ZergMaN 40
Bale 27
League of Legends
JimRising 632
C9.Mang0250
Counter-Strike
summit1g9334
Other Games
WinterStarcraft520
Trikslyr26
ToD25
Organizations
Other Games
gamesdonequick1047
StarCraft: Brood War
UltimateBattle 54
lovetv 2
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 12 non-featured ]
StarCraft 2
• practicex 43
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
League of Legends
• HappyZerGling84
Upcoming Events
CranKy Ducklings
2h 46m
WardiTV 2025
3h 46m
Spirit vs Cure
Reynor vs MaxPax
SHIN vs TBD
Solar vs herO
Classic vs TBD
SC Evo League
5h 16m
Ladder Legends
11h 46m
BSL 21
12h 46m
Sziky vs Dewalt
eOnzErG vs Cross
Sparkling Tuna Cup
1d 2h
Ladder Legends
1d 9h
BSL 21
1d 12h
StRyKeR vs TBD
Bonyth vs TBD
Replay Cast
2 days
Wardi Open
2 days
[ Show More ]
Monday Night Weeklies
2 days
WardiTV Invitational
4 days
Replay Cast
5 days
WardiTV Invitational
5 days
ByuN vs Solar
Clem vs Classic
Cure vs herO
Reynor vs MaxPax
Liquipedia Results

Completed

Acropolis #4 - TS3
RSL Offline Finals
Kuram Kup

Ongoing

C-Race Season 1
IPSL Winter 2025-26
KCM Race Survival 2025 Season 4
YSL S2
BSL Season 21
Slon Tour Season 2
CSL Season 19: Qualifier 1
WardiTV 2025
META Madness #9
eXTREMESLAND 2025
SL Budapest Major 2025
ESL Impact League Season 8
BLAST Rivals Fall 2025
IEM Chengdu 2025
PGL Masters Bucharest 2025
Thunderpick World Champ.
CS Asia Championships 2025
ESL Pro League S22

Upcoming

CSL Season 19: Qualifier 2
CSL 2025 WINTER (S19)
BSL 21 Non-Korean Championship
Acropolis #4
IPSL Spring 2026
Bellum Gens Elite Stara Zagora 2026
HSC XXVIII
Big Gabe Cup #3
OSC Championship Season 13
ESL Pro League Season 23
PGL Cluj-Napoca 2026
IEM Kraków 2026
BLAST Bounty Winter 2026
BLAST Bounty Winter Qual
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.