• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 10:59
CEST 16:59
KST 23:59
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
[ASL21] Ro24 Preview Pt2: News Flash6[ASL21] Ro24 Preview Pt1: New Chaos0Team Liquid Map Contest #22 - Presented by Monster Energy11ByuL: The Forgotten Master of ZvT30Behind the Blue - Team Liquid History Book20
Community News
Weekly Cups (March 16-22): herO doubles, Cure surprises3Blizzard Classic Cup @ BlizzCon 2026 - $100k prize pool49Weekly Cups (March 9-15): herO, Clem, ByuN win42026 KungFu Cup Announcement6BGE Stara Zagora 2026 cancelled12
StarCraft 2
General
What mix of new & old maps do you want in the next ladder pool? (SC2) Team Liquid Map Contest #22 - Presented by Monster Energy herO wins SC2 All-Star Invitational Blizzard Classic Cup @ BlizzCon 2026 - $100k prize pool Potential Updates Coming to the SC2 CN Server
Tourneys
RSL Season 4 announced for March-April Sparkling Tuna Cup - Weekly Open Tournament StarCraft Evolution League (SC Evo Biweekly) WardiTV Mondays World University TeamLeague (500$+) | Signups Open
Strategy
Custom Maps
[M] (2) Frigid Storage Publishing has been re-enabled! [Feb 24th 2026]
External Content
Mutation # 519 Inner Power The PondCast: SC2 News & Results Mutation # 518 Radiation Zone Mutation # 517 Distant Threat
Brood War
General
[ASL21] Ro24 Preview Pt2: News Flash Pros React To: SoulKey vs Ample ASL21 General Discussion RepMastered™: replay sharing and analyzer site KK Platform will provide 1 million CNY
Tourneys
[ASL21] Ro24 Group D [Megathread] Daily Proleagues [ASL21] Ro24 Group C [ASL21] Ro24 Group B
Strategy
What's the deal with APM & what's its true value Fighting Spirit mining rates Simple Questions, Simple Answers
Other Games
General Games
Starcraft Tabletop Miniature Game General RTS Discussion Thread Nintendo Switch Thread Stormgate/Frost Giant Megathread Darkest Dungeon
Dota 2
The Story of Wings Gaming Official 'what is Dota anymore' discussion
League of Legends
G2 just beat GenG in First stand
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread Five o'clock TL Mafia Mafia Game Mode Feedback/Ideas Vanilla Mini Mafia
Community
General
US Politics Mega-thread The Games Industry And ATVI European Politico-economics QA Mega-thread Canadian Politics Mega-thread Russo-Ukrainian War Thread
Fan Clubs
The IdrA Fan Club
Media & Entertainment
[Manga] One Piece [Req][Books] Good Fantasy/SciFi books Movie Discussion!
Sports
2024 - 2026 Football Thread Formula 1 Discussion Cricket [SPORT] Tokyo Olympics 2021 Thread General nutrition recommendations
World Cup 2022
Tech Support
[G] How to Block Livestream Ads
TL Community
The Automated Ban List
Blogs
Funny Nicknames
LUCKY_NOOB
Money Laundering In Video Ga…
TrAiDoS
Iranian anarchists: organize…
XenOsky
FS++
Kraekkling
Shocked by a laser…
Spydermine0240
ASL S21 English Commentary…
namkraft
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1972 users

Solution to DDoS issues for streamers and players - Page 2

Forum Index > SC2 General
Post a Reply
Prev 1 2 3 4 5 6 Next All
Moderator note: The instructions in this thread will do nothing to protect you from a DDoS attack. The only way to prevent an attack is to avoid your IP address becoming public.
pmp10
Profile Joined April 2012
3390 Posts
September 03 2012 20:47 GMT
#21
On September 04 2012 05:41 LunaSea wrote:
Show nested quote +
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 20:51 GMT
#22
On September 04 2012 05:46 Pumplekin wrote:
Sadly, while you are using technical words, I don't think you really know exactly what they mean.

I'd suggest stopping digging a bigger hole for yourself and be thankful TL is a relatively nice and friendly place


1) - Look at the code.
2) - Come back latter

When your best advice is : "be nice to your ISP", I don't think you can consider yourself qualified.
Nice contribution btw.
"Your f*cking wrong, but I respect your opinion" --Day[9]
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
Last Edited: 2012-09-03 20:52:39
September 03 2012 20:51 GMT
#23
On September 04 2012 05:47 pmp10 wrote:
Show nested quote +
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.

And your router definetly gets A LOT of packets in a DDoS situation.
"Your f*cking wrong, but I respect your opinion" --Day[9]
karpo
Profile Joined October 2010
Sweden1998 Posts
Last Edited: 2012-09-03 20:57:50
September 03 2012 20:54 GMT
#24
On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:46 Pumplekin wrote:
Sadly, while you are using technical words, I don't think you really know exactly what they mean.

I'd suggest stopping digging a bigger hole for yourself and be thankful TL is a relatively nice and friendly place


1) - Look at the code.
2) - Come back latter

When your best advice is : "be nice to your ISP", I don't think you can consider yourself qualified.
Nice contribution btw.


I've seen this before in so many threads. People post long OP's about an issue and how to solve it yet when they're shot down by people with more knowledge they get very defensive.


I'm sorry but this isn't a solution to the problem, dude.


On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:47 pmp10 wrote:
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.

And your router definetly gets A LOT of packets in a DDoS situation.


He's talking about the transmit buffers on network equipment, not TCP bufffers. Your TCP window won't even get much of anything as equipment ISP side will drop packets before they even reach the router.
Nightwatch
Profile Joined March 2011
13 Posts
Last Edited: 2012-09-03 21:00:26
September 03 2012 20:56 GMT
#25
I don't really get the point of this solution, any normal "home" router will block wan requests by default. All you do is setup a whitelist so all other requests are discarded. ...correct?

You say normally the router will inspect the complete packet and test against any protocol but there is no point in that. (and no router does that <.<) Unless you started the session the firewall should just bock the packet, so you won't need to do more than to check the session table.
tl;dr spi?
KrazyTrumpet
Profile Joined April 2010
United States2520 Posts
Last Edited: 2012-09-03 20:59:43
September 03 2012 20:59 GMT
#26
Not really sure how this helps the actual problem...
www.twitch.tv/krazy Best Stream Quality NA @KClarkSC2
Pumplekin
Profile Blog Joined April 2011
United Kingdom50 Posts
Last Edited: 2012-09-03 21:02:08
September 03 2012 21:00 GMT
#27
On September 04 2012 05:56 Nightwatch wrote:
I don't really get the point of this solution, any normal "home" router will block wan requests by default. All you do is setup a whitelist so all other requests are discarded. ...correct?

You say normally the router will inspect the complete packet and test against any protocol but there is no point in that. (and no router does that <.<) Unless you started the session the firewall should just bock the packet, so you won't need to do more than to check the session table.
tl;dr; spi?


Yup, it won't be in the NAT table, so it will go in the bin by default. ACL'ing it MAY save a tiny bit of CPU (it might not, it depends on how the CPE is designed).

If you are talking IPv6, or a non-NAT'ing connection, things would be different, but I think we can safely assume almost everyone is using IPv4 and NAT on the CPE (and mostly I have been in this thread).

I'm also starting to suspect this may be a massive troll thread. At least I'm hoping it is
Loves Cows
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 21:01 GMT
#28
On September 04 2012 05:56 Nightwatch wrote:
I don't really get the point of this solution, any normal "home" router will block wan requests by default. All you do is setup a whitelist so all other requests are discarded. ...correct?

You say normally the router will inspect the complete packet and test against any protocol but there is no point in that. (and no router does that <.<) Unless you started the session the firewall should just bock the packet, so you won't need to do more than to check the session table.
tl;dr; spi?


Yes, but how does the firewall know if this packet isn't starting a session ?
The router has to look at the packet and see if this is a valid packet that is actually starting a session in one of the supported protocols.
"Your f*cking wrong, but I respect your opinion" --Day[9]
pmp10
Profile Joined April 2012
3390 Posts
September 03 2012 21:06 GMT
#29
On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:47 pmp10 wrote:
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.

Pretty sure it isn't.
Last I recall buffer was a kind of a memory while a window a part of TCP packet but maybe things have changed.
Nightwatch
Profile Joined March 2011
13 Posts
September 03 2012 21:08 GMT
#30
On September 04 2012 06:01 LunaSea wrote:
Show nested quote +
On September 04 2012 05:56 Nightwatch wrote:
I don't really get the point of this solution, any normal "home" router will block wan requests by default. All you do is setup a whitelist so all other requests are discarded. ...correct?

You say normally the router will inspect the complete packet and test against any protocol but there is no point in that. (and no router does that <.<) Unless you started the session the firewall should just bock the packet, so you won't need to do more than to check the session table.
tl;dr; spi?


Yes, but how does the firewall know if this packet isn't starting a session ?
The router has to look at the packet and see if this is a valid packet that is actually starting a session in one of the supported protocols.


Simple, you don't start a new session from outside of the network.
Pumplekin
Profile Blog Joined April 2011
United Kingdom50 Posts
September 03 2012 21:09 GMT
#31
By default (without any port forwarding, DMZ setup, or UPNP or anything like that), a typical home CPE will not allow anything to setup an inbound connection. It will simply look at the NAT table, check if an entry matches, if it does it will NAT and forward it, if it doesn't, it will discard it. Port Forwarding, DMZ's + UPNP basically are just other methods of setting up NAT rules.

Still, your ISP's access kit has a full TX buffer, and you still haven't fixed that.
Loves Cows
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 21:10 GMT
#32
On September 04 2012 06:06 pmp10 wrote:
+ Show Spoiler +
On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:47 pmp10 wrote:
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.


Pretty sure it isn't.
Last I recall buffer was a kind of a memory while a window a part of TCP packet but maybe things have changed.



The simplest way of considering the window size is that it indicates the size of the device's receive buffer for the particular connection.


-- http://www.tcpipguide.com/free/t_TCPWindowSizeAdjustmentandFlowControl.htm

plz ...
"Your f*cking wrong, but I respect your opinion" --Day[9]
Hryul
Profile Blog Joined March 2011
Austria2609 Posts
September 03 2012 21:11 GMT
#33
I think the arguments may be easily settled if somebody would run a test.
Countdown to victory: 1 200!
trGKakarot
Profile Joined October 2011
United States129 Posts
September 03 2012 21:13 GMT
#34
I will admit I only skimmed this thread (since it seems like if somebody solved DDoS attacks they would be getting a lot more traction than a random thread on TL), but from what I gather the OP is assuming that an ISP will send an infinite amount of data to your router and filtering out bad IP addresses at your router level will solve the problem since then you only accept "x" amount of data?
hihi glgl
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 21:15 GMT
#35
On September 04 2012 06:13 trGKakarot wrote:
I will admit I only skimmed this thread (since it seems like if somebody solved DDoS attacks they would be getting a lot more traction than a random thread on TL), but from what I gather the OP is assuming that an ISP will send an infinite amount of data to your router and filtering out bad IP addresses at your router level will solve the problem since then you only accept "x" amount of data?


Yes, except it's not your ISP sending the data originally, but a bunch of hacked computers rented by a random kid.
"Your f*cking wrong, but I respect your opinion" --Day[9]
nemonic
Profile Joined November 2011
132 Posts
September 03 2012 21:15 GMT
#36
Sorry to say it this staight, but what the OP says is definitely wrong to a large degree. There's no way you can defend against DDoS by filtering packets on your router. The network bandwidth will still be blocked no matter if you filter or not, it makes almost no difference. The only thing that saves you is hiding your IP address.
Pumplekin
Profile Blog Joined April 2011
United Kingdom50 Posts
Last Edited: 2012-09-03 21:17:38
September 03 2012 21:16 GMT
#37
TCP windowing is part of how TCP does flow control. You can find plenty of good guides to it on the internet, and this is reasonable starting point (http://packetlife.net/blog/2010/aug/4/tcp-windows-and-window-scaling/).

There is quite a lot to know about TCP really, I'm far from an expert in the real ins and outs of it, it is a surprisingly deep topic for something that mostly "just works" (although I'm more than happy to answer any questions up to my knowledge level).
Loves Cows
trGKakarot
Profile Joined October 2011
United States129 Posts
September 03 2012 21:17 GMT
#38
On September 04 2012 06:15 LunaSea wrote:
Show nested quote +
On September 04 2012 06:13 trGKakarot wrote:
I will admit I only skimmed this thread (since it seems like if somebody solved DDoS attacks they would be getting a lot more traction than a random thread on TL), but from what I gather the OP is assuming that an ISP will send an infinite amount of data to your router and filtering out bad IP addresses at your router level will solve the problem since then you only accept "x" amount of data?


Yes, except it's not your ISP sending the data originally, but a bunch of hacked computers rented by a random kid.


Right, but you are only connected to the outside world through your ISP (unless they are somehow on your intranet, which means you have a bigger problem).

Maybe I am missing something...
hihi glgl
LunaSea
Profile Joined October 2011
Luxembourg369 Posts
September 03 2012 21:25 GMT
#39
On September 04 2012 06:17 trGKakarot wrote:
Show nested quote +
On September 04 2012 06:15 LunaSea wrote:
On September 04 2012 06:13 trGKakarot wrote:
I will admit I only skimmed this thread (since it seems like if somebody solved DDoS attacks they would be getting a lot more traction than a random thread on TL), but from what I gather the OP is assuming that an ISP will send an infinite amount of data to your router and filtering out bad IP addresses at your router level will solve the problem since then you only accept "x" amount of data?


Yes, except it's not your ISP sending the data originally, but a bunch of hacked computers rented by a random kid.


Right, but you are only connected to the outside world through your ISP (unless they are somehow on your intranet, which means you have a bigger problem).

Maybe I am missing something...


Yes but what I meant is this :

A --> sends a packet to B --> who forwards it to C

Where :

A is the attacker,
B your ISP,
and C is you.

A is the one the packets originate from and B only forwards it to the destination indicated in the packet.
"Your f*cking wrong, but I respect your opinion" --Day[9]
pmp10
Profile Joined April 2012
3390 Posts
Last Edited: 2012-09-03 21:29:19
September 03 2012 21:28 GMT
#40
On September 04 2012 06:10 LunaSea wrote:
Show nested quote +
On September 04 2012 06:06 pmp10 wrote:
+ Show Spoiler +
On September 04 2012 05:51 LunaSea wrote:
Show nested quote +
On September 04 2012 05:47 pmp10 wrote:
On September 04 2012 05:41 LunaSea wrote:
On September 04 2012 05:38 pmp10 wrote:
Wait - so all you did was make a switch to a white-list ACL to save CPU cycles of a router?
That's essentially worthless - router CPUs are not overburdened during an DDoS attack.
The network resources are.


Yes that's why you have a white-list, so that your tcp window won't be full of corrupted packets.

Your tcp connection (window?) will receive only what gets through the ISP/buffers ect.
So essentially not much - certainly very little of what you are hoping for.


The TCP window is a buffer.
Nice try mister professional.


Pretty sure it isn't.
Last I recall buffer was a kind of a memory while a window a part of TCP packet but maybe things have changed.



Show nested quote +
The simplest way of considering the window size is that it indicates the size of the device's receive buffer for the particular connection.


-- http://www.tcpipguide.com/free/t_TCPWindowSizeAdjustmentandFlowControl.htm

plz ...

Please look up those terms somewhere more reputable,
Gross oversimplification and completely mismatched definitions won't help your education.
Buffer is about as much a TCP window as operating system is a RAM.
TCP window can set buffer size but they are completely different things.
Prev 1 2 3 4 5 6 Next All
Please log in or register to reply.
Live Events Refresh
Wardi Open
11:00
#80
WardiTV1013
OGKoka 354
Rex120
IntoTheiNu 18
Liquipedia
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
OGKoka 354
Hui .303
ProTech126
Rex 120
Trikslyr22
StarCraft: Brood War
Horang2 3817
actioN 1888
Bisu 1710
EffOrt 1191
Mini 790
ggaemo 618
firebathero 590
Hyuk 409
Sharp 215
Soulkey 146
[ Show more ]
Snow 137
Zeus 124
Sea.KH 99
ToSsGirL 89
[sc1f]eonzerg 77
Backho 67
Hyun 62
Hm[arnc] 45
Shine 24
Bale 20
soO 16
yabsab 15
GoRush 13
Noble 9
Terrorterran 8
SilentControl 6
eros_byul 1
Dota 2
qojqva4098
syndereN695
Counter-Strike
oskar64
Other Games
singsing2487
B2W.Neo1530
hiko781
Lowko369
Livibee330
crisheroes329
Fuzer 186
Happy177
ArmadaUGS112
Sick90
ceh932
Mew2King25
Organizations
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 14 non-featured ]
StarCraft 2
• intothetv
• AfreecaTV YouTube
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
League of Legends
• Nemesis4540
• Jankos2728
• TFBlade988
Other Games
• WagamamaTV324
Upcoming Events
Monday Night Weeklies
1h 2m
Replay Cast
9h 2m
Sparkling Tuna Cup
19h 2m
Afreeca Starleague
19h 2m
Rush vs PianO
Flash vs Speed
PiGosaur Cup
1d 9h
Replay Cast
1d 18h
Afreeca Starleague
1d 19h
BeSt vs Leta
Queen vs Jaedong
Replay Cast
2 days
The PondCast
2 days
OSC
3 days
[ Show More ]
RSL Revival
3 days
TriGGeR vs Cure
ByuN vs Rogue
Replay Cast
4 days
RSL Revival
4 days
Maru vs MaxPax
BSL
5 days
RSL Revival
5 days
uThermal 2v2 Circuit
5 days
BSL
6 days
Liquipedia Results

Completed

2026 Changsha Offline CUP
WardiTV Winter 2026
NationLESS Cup

Ongoing

BSL Season 22
CSL Elite League 2026
CSL Season 20: Qualifier 1
ASL Season 21
Acropolis #4 - TS6
StarCraft2 Community Team League 2026 Spring
RSL Revival: Season 4
Nations Cup 2026
BLAST Open Spring 2026
ESL Pro League S23 Finals
ESL Pro League S23 Stage 1&2
PGL Cluj-Napoca 2026
IEM Kraków 2026
BLAST Bounty Winter 2026
BLAST Bounty Winter Qual

Upcoming

CSL Season 20: Qualifier 2
Escore Tournament S2: W1
CSL 2026 SPRING (S20)
Acropolis #4
IPSL Spring 2026
BSL 22 Non-Korean Championship
CSLAN 4
Kung Fu Cup 2026 Grand Finals
HSC XXIX
uThermal 2v2 2026 Main Event
IEM Cologne Major 2026
Stake Ranked Episode 2
CS Asia Championships 2026
IEM Atlanta 2026
Asian Champions League 2026
PGL Astana 2026
BLAST Rivals Spring 2026
CCT Season 3 Global Finals
IEM Rio 2026
PGL Bucharest 2026
Stake Ranked Episode 1
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2026 TLnet. All Rights Reserved.