• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 18:05
CEST 00:05
KST 07:05
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
[ASL21] Ro24 Preview Pt2: News Flash2[ASL21] Ro24 Preview Pt1: New Chaos0Team Liquid Map Contest #22 - Presented by Monster Energy9ByuL: The Forgotten Master of ZvT30Behind the Blue - Team Liquid History Book20
Community News
Weekly Cups (March 16-22): herO doubles, Cure surprises3Blizzard Classic Cup @ BlizzCon 2026 - $100k prize pool48Weekly Cups (March 9-15): herO, Clem, ByuN win42026 KungFu Cup Announcement6BGE Stara Zagora 2026 cancelled12
StarCraft 2
General
What mix of new & old maps do you want in the next ladder pool? (SC2) Team Liquid Map Contest #22 - Presented by Monster Energy Potential Updates Coming to the SC2 CN Server Behind the Blue - Team Liquid History Book herO wins SC2 All-Star Invitational
Tourneys
RSL Season 4 announced for March-April Sparkling Tuna Cup - Weekly Open Tournament StarCraft Evolution League (SC Evo Biweekly) WardiTV Mondays World University TeamLeague (500$+) | Signups Open
Strategy
Custom Maps
[M] (2) Frigid Storage Publishing has been re-enabled! [Feb 24th 2026]
External Content
Mutation # 519 Inner Power The PondCast: SC2 News & Results Mutation # 518 Radiation Zone Mutation # 517 Distant Threat
Brood War
General
Pros React To: SoulKey vs Ample ASL21 General Discussion [ASL21] Ro24 Preview Pt2: News Flash RepMastered™: replay sharing and analyzer site KK Platform will provide 1 million CNY
Tourneys
[ASL21] Ro24 Group C [Megathread] Daily Proleagues [ASL21] Ro24 Group D [ASL21] Ro24 Group B
Strategy
What's the deal with APM & what's its true value Fighting Spirit mining rates Simple Questions, Simple Answers
Other Games
General Games
General RTS Discussion Thread Nintendo Switch Thread Stormgate/Frost Giant Megathread Darkest Dungeon Path of Exile
Dota 2
The Story of Wings Gaming Official 'what is Dota anymore' discussion
League of Legends
G2 just beat GenG in First stand
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread Five o'clock TL Mafia Mafia Game Mode Feedback/Ideas Vanilla Mini Mafia
Community
General
US Politics Mega-thread The Games Industry And ATVI European Politico-economics QA Mega-thread Canadian Politics Mega-thread Russo-Ukrainian War Thread
Fan Clubs
The IdrA Fan Club
Media & Entertainment
[Manga] One Piece [Req][Books] Good Fantasy/SciFi books Movie Discussion!
Sports
Formula 1 Discussion 2024 - 2026 Football Thread Cricket [SPORT] Tokyo Olympics 2021 Thread General nutrition recommendations
World Cup 2022
Tech Support
[G] How to Block Livestream Ads
TL Community
The Automated Ban List
Blogs
Funny Nicknames
LUCKY_NOOB
Money Laundering In Video Ga…
TrAiDoS
Iranian anarchists: organize…
XenOsky
FS++
Kraekkling
Shocked by a laser…
Spydermine0240
ASL S21 English Commentary…
namkraft
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1088 users

Solution to DDoS issues for streamers and players - Page 2

Forum Index > SC2 General
Post a Reply
Prev 1 2 3 4 5 6 Next All
Moderator note: The instructions in this thread will do nothing to protect you from a DDoS attack. The only way to prevent an attack is to avoid your IP address becoming public.
pmp10
Profile Joined April 2012
3390 Posts
September 03 2012 20:47 GMT
#21
On September 04 2012 05:41 LunaSea wrote:
Show nested quote +
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 20:51 GMT
#22
On September 04 2012 05:46 Pumplekin wrote:
Sadly, while you are using technical words, I don't think you really know exactly what they mean.

I'd suggest stopping digging a bigger hole for yourself and be thankful TL is a relatively nice and friendly place


1) - Look at the code.
2) - Come back latter

When your best advice is : "be nice to your ISP", I don't think you can consider yourself qualified.
Nice contribution btw.
"Your f*cking wrong, but I respect your opinion" --Day[9]
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
Last Edited: 2012-09-03 20:52:39
September 03 2012 20:51 GMT
#23
On September 04 2012 05:47 pmp10 wrote:
Show nested quote +
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.

And your router definetly gets A LOT of packets in a DDoS situation.
"Your f*cking wrong, but I respect your opinion" --Day[9]
karpo
Profile Joined October 2010
Sweden1998 Posts
Last Edited: 2012-09-03 20:57:50
September 03 2012 20:54 GMT
#24
On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:46 Pumplekin wrote:
Sadly, while you are using technical words, I don't think you really know exactly what they mean.

I'd suggest stopping digging a bigger hole for yourself and be thankful TL is a relatively nice and friendly place


1) - Look at the code.
2) - Come back latter

When your best advice is : "be nice to your ISP", I don't think you can consider yourself qualified.
Nice contribution btw.


I've seen this before in so many threads. People post long OP's about an issue and how to solve it yet when they're shot down by people with more knowledge they get very defensive.


I'm sorry but this isn't a solution to the problem, dude.


On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:47 pmp10 wrote:
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.

And your router definetly gets A LOT of packets in a DDoS situation.


He's talking about the transmit buffers on network equipment, not TCP bufffers. Your TCP window won't even get much of anything as equipment ISP side will drop packets before they even reach the router.
Nightwatch
Profile Joined March 2011
13 Posts
Last Edited: 2012-09-03 21:00:26
September 03 2012 20:56 GMT
#25
I don't really get the point of this solution, any normal "home" router will block wan requests by default. All you do is setup a whitelist so all other requests are discarded. ...correct?

You say normally the router will inspect the complete packet and test against any protocol but there is no point in that. (and no router does that <.<) Unless you started the session the firewall should just bock the packet, so you won't need to do more than to check the session table.
tl;dr spi?
KrazyTrumpet
Profile Joined April 2010
United States2520 Posts
Last Edited: 2012-09-03 20:59:43
September 03 2012 20:59 GMT
#26
Not really sure how this helps the actual problem...
www.twitch.tv/krazy Best Stream Quality NA @KClarkSC2
Pumplekin
Profile Blog Joined April 2011
United Kingdom50 Posts
Last Edited: 2012-09-03 21:02:08
September 03 2012 21:00 GMT
#27
On September 04 2012 05:56 Nightwatch wrote:
I don't really get the point of this solution, any normal "home" router will block wan requests by default. All you do is setup a whitelist so all other requests are discarded. ...correct?

You say normally the router will inspect the complete packet and test against any protocol but there is no point in that. (and no router does that <.<) Unless you started the session the firewall should just bock the packet, so you won't need to do more than to check the session table.
tl;dr; spi?


Yup, it won't be in the NAT table, so it will go in the bin by default. ACL'ing it MAY save a tiny bit of CPU (it might not, it depends on how the CPE is designed).

If you are talking IPv6, or a non-NAT'ing connection, things would be different, but I think we can safely assume almost everyone is using IPv4 and NAT on the CPE (and mostly I have been in this thread).

I'm also starting to suspect this may be a massive troll thread. At least I'm hoping it is
Loves Cows
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 21:01 GMT
#28
On September 04 2012 05:56 Nightwatch wrote:
I don't really get the point of this solution, any normal "home" router will block wan requests by default. All you do is setup a whitelist so all other requests are discarded. ...correct?

You say normally the router will inspect the complete packet and test against any protocol but there is no point in that. (and no router does that <.<) Unless you started the session the firewall should just bock the packet, so you won't need to do more than to check the session table.
tl;dr; spi?


Yes, but how does the firewall know if this packet isn't starting a session ?
The router has to look at the packet and see if this is a valid packet that is actually starting a session in one of the supported protocols.
"Your f*cking wrong, but I respect your opinion" --Day[9]
pmp10
Profile Joined April 2012
3390 Posts
September 03 2012 21:06 GMT
#29
On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:47 pmp10 wrote:
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.

Pretty sure it isn't.
Last I recall buffer was a kind of a memory while a window a part of TCP packet but maybe things have changed.
Nightwatch
Profile Joined March 2011
13 Posts
September 03 2012 21:08 GMT
#30
On September 04 2012 06:01 LunaSea wrote:
Show nested quote +
On September 04 2012 05:56 Nightwatch wrote:
I don't really get the point of this solution, any normal "home" router will block wan requests by default. All you do is setup a whitelist so all other requests are discarded. ...correct?

You say normally the router will inspect the complete packet and test against any protocol but there is no point in that. (and no router does that <.<) Unless you started the session the firewall should just bock the packet, so you won't need to do more than to check the session table.
tl;dr; spi?


Yes, but how does the firewall know if this packet isn't starting a session ?
The router has to look at the packet and see if this is a valid packet that is actually starting a session in one of the supported protocols.


Simple, you don't start a new session from outside of the network.
Pumplekin
Profile Blog Joined April 2011
United Kingdom50 Posts
September 03 2012 21:09 GMT
#31
By default (without any port forwarding, DMZ setup, or UPNP or anything like that), a typical home CPE will not allow anything to setup an inbound connection. It will simply look at the NAT table, check if an entry matches, if it does it will NAT and forward it, if it doesn't, it will discard it. Port Forwarding, DMZ's + UPNP basically are just other methods of setting up NAT rules.

Still, your ISP's access kit has a full TX buffer, and you still haven't fixed that.
Loves Cows
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 21:10 GMT
#32
On September 04 2012 06:06 pmp10 wrote:
+ Show Spoiler +
On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:47 pmp10 wrote:
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.


Pretty sure it isn't.
Last I recall buffer was a kind of a memory while a window a part of TCP packet but maybe things have changed.



The simplest way of considering the window size is that it indicates the size of the device's receive buffer for the particular connection.


-- http://www.tcpipguide.com/free/t_TCPWindowSizeAdjustmentandFlowControl.htm

plz ...
"Your f*cking wrong, but I respect your opinion" --Day[9]
Hryul
Profile Blog Joined March 2011
Austria2609 Posts
September 03 2012 21:11 GMT
#33
I think the arguments may be easily settled if somebody would run a test.
Countdown to victory: 1 200!
trGKakarot
Profile Joined October 2011
United States129 Posts
September 03 2012 21:13 GMT
#34
I will admit I only skimmed this thread (since it seems like if somebody solved DDoS attacks they would be getting a lot more traction than a random thread on TL), but from what I gather the OP is assuming that an ISP will send an infinite amount of data to your router and filtering out bad IP addresses at your router level will solve the problem since then you only accept "x" amount of data?
hihi glgl
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 21:15 GMT
#35
On September 04 2012 06:13 trGKakarot wrote:
I will admit I only skimmed this thread (since it seems like if somebody solved DDoS attacks they would be getting a lot more traction than a random thread on TL), but from what I gather the OP is assuming that an ISP will send an infinite amount of data to your router and filtering out bad IP addresses at your router level will solve the problem since then you only accept "x" amount of data?


Yes, except it's not your ISP sending the data originally, but a bunch of hacked computers rented by a random kid.
"Your f*cking wrong, but I respect your opinion" --Day[9]
nemonic
Profile Joined November 2011
132 Posts
September 03 2012 21:15 GMT
#36
Sorry to say it this staight, but what the OP says is definitely wrong to a large degree. There's no way you can defend against DDoS by filtering packets on your router. The network bandwidth will still be blocked no matter if you filter or not, it makes almost no difference. The only thing that saves you is hiding your IP address.
Pumplekin
Profile Blog Joined April 2011
United Kingdom50 Posts
Last Edited: 2012-09-03 21:17:38
September 03 2012 21:16 GMT
#37
TCP windowing is part of how TCP does flow control. You can find plenty of good guides to it on the internet, and this is reasonable starting point (http://packetlife.net/blog/2010/aug/4/tcp-windows-and-window-scaling/).

There is quite a lot to know about TCP really, I'm far from an expert in the real ins and outs of it, it is a surprisingly deep topic for something that mostly "just works" (although I'm more than happy to answer any questions up to my knowledge level).
Loves Cows
trGKakarot
Profile Joined October 2011
United States129 Posts
September 03 2012 21:17 GMT
#38
On September 04 2012 06:15 LunaSea wrote:
Show nested quote +
On September 04 2012 06:13 trGKakarot wrote:
I will admit I only skimmed this thread (since it seems like if somebody solved DDoS attacks they would be getting a lot more traction than a random thread on TL), but from what I gather the OP is assuming that an ISP will send an infinite amount of data to your router and filtering out bad IP addresses at your router level will solve the problem since then you only accept "x" amount of data?


Yes, except it's not your ISP sending the data originally, but a bunch of hacked computers rented by a random kid.


Right, but you are only connected to the outside world through your ISP (unless they are somehow on your intranet, which means you have a bigger problem).

Maybe I am missing something...
hihi glgl
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 21:25 GMT
#39
On September 04 2012 06:17 trGKakarot wrote:
Show nested quote +
On September 04 2012 06:15 LunaSea wrote:
On September 04 2012 06:13 trGKakarot wrote:
I will admit I only skimmed this thread (since it seems like if somebody solved DDoS attacks they would be getting a lot more traction than a random thread on TL), but from what I gather the OP is assuming that an ISP will send an infinite amount of data to your router and filtering out bad IP addresses at your router level will solve the problem since then you only accept "x" amount of data?


Yes, except it's not your ISP sending the data originally, but a bunch of hacked computers rented by a random kid.


Right, but you are only connected to the outside world through your ISP (unless they are somehow on your intranet, which means you have a bigger problem).

Maybe I am missing something...


Yes but what I meant is this :

A --> sends a packet to B --> who forwards it to C

Where :

A is the attacker,
B your ISP,
and C is you.

A is the one the packets originate from and B only forwards it to the destination indicated in the packet.
"Your f*cking wrong, but I respect your opinion" --Day[9]
pmp10
Profile Joined April 2012
3390 Posts
Last Edited: 2012-09-03 21:29:19
September 03 2012 21:28 GMT
#40
On September 04 2012 06:10 LunaSea wrote:
Show nested quote +
On September 04 2012 06:06 pmp10 wrote:
+ Show Spoiler +
On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:47 pmp10 wrote:
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.


Pretty sure it isn't.
Last I recall buffer was a kind of a memory while a window a part of TCP packet but maybe things have changed.



Show nested quote +
The simplest way of considering the window size is that it indicates the size of the device's receive buffer for the particular connection.


-- http://www.tcpipguide.com/free/t_TCPWindowSizeAdjustmentandFlowControl.htm

plz ...

Please look up those terms somewhere more reputable,
Gross oversimplification and completely mismatched definitions won't help your education.
Buffer is about as much a TCP window as operating system is a RAM.
TCP window can set buffer size but they are completely different things.
Prev 1 2 3 4 5 6 Next All
Please log in or register to reply.
Live Events Refresh
BSL
19:00
S22 - Open Qualifier #4
ZZZero.O124
LiquipediaDiscussion
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
mouzHeroMarine 495
elazer 181
Ketroc 54
StarCraft: Brood War
Britney 13127
Artosis 199
ZZZero.O 124
NaDa 12
Bale 9
Other Games
summit1g8705
Liquid`RaSZi1647
B2W.Neo1610
fl0m741
C9.Mang0283
Mew2King71
Organizations
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 18 non-featured ]
StarCraft 2
• Berry_CruncH170
• davetesta34
• musti20045 25
• Kozan
• Migwel
• sooper7s
• AfreecaTV YouTube
• intothetv
• IndyKCrew
• LaughNgamezSOOP
StarCraft: Brood War
• RayReign 75
• STPLYoutube
• ZZZeroYoutube
• BSLYoutube
Dota 2
• masondota2959
Counter-Strike
• Scarra712
Other Games
• imaqtpie1565
• Shiphtur136
Upcoming Events
Replay Cast
1h 55m
Replay Cast
10h 55m
Afreeca Starleague
11h 55m
Light vs Calm
Royal vs Mind
Wardi Open
12h 55m
Monday Night Weeklies
17h 55m
OSC
1d 1h
Sparkling Tuna Cup
1d 11h
Afreeca Starleague
1d 11h
Rush vs PianO
Flash vs Speed
Replay Cast
2 days
Afreeca Starleague
2 days
BeSt vs Leta
Queen vs Jaedong
[ Show More ]
Replay Cast
3 days
The PondCast
3 days
Replay Cast
4 days
RSL Revival
4 days
Replay Cast
5 days
RSL Revival
5 days
BSL
5 days
RSL Revival
6 days
uThermal 2v2 Circuit
6 days
BSL
6 days
Liquipedia Results

Completed

Proleague 2026-03-27
WardiTV Winter 2026
Underdog Cup #3

Ongoing

BSL Season 22
CSL Elite League 2026
CSL Season 20: Qualifier 1
ASL Season 21
Acropolis #4 - TS6
2026 Changsha Offline CUP
Proleague 2026-03-29
StarCraft2 Community Team League 2026 Spring
RSL Revival: Season 4
Nations Cup 2026
NationLESS Cup
BLAST Open Spring 2026
ESL Pro League S23 Finals
ESL Pro League S23 Stage 1&2
PGL Cluj-Napoca 2026
IEM Kraków 2026
BLAST Bounty Winter 2026
BLAST Bounty Winter Qual

Upcoming

CSL Season 20: Qualifier 2
Escore Tournament S2: W1
CSL 2026 SPRING (S20)
Acropolis #4
IPSL Spring 2026
BSL 22 Non-Korean Championship
CSLAN 4
Kung Fu Cup 2026 Grand Finals
HSC XXIX
uThermal 2v2 2026 Main Event
IEM Cologne Major 2026
Stake Ranked Episode 2
CS Asia Championships 2026
IEM Atlanta 2026
Asian Champions League 2026
PGL Astana 2026
BLAST Rivals Spring 2026
CCT Season 3 Global Finals
IEM Rio 2026
PGL Bucharest 2026
Stake Ranked Episode 1
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2026 TLnet. All Rights Reserved.