Development discussion. Logged to https://ddnet.tw/irclogs/ Connected with DDNet's IRC channel, Matrix room and GitHub repositories — IRC: #ddnet on Quakenet | Matrix: #ddnet-developer:matrix.org GitHub: https://github.com/ddnet
Between 2018-11-12 00:00:00Z and 2018-11-13 00:00:00Z
At nfoservers we have a very sophisticated firewall at a low layer. So I can go in and filter attacks on a case by case basis. But not all attacks actually have a pattern, nor can you employ proper protocol parsing at the router level (not at this price anyways) to check if packets are actually valid.
17:06
Even if all the attacks had a pattern someone would need to sit in front of a computer 7/24 to write up the filters
Now there is hardware that can actually do the parsing and even employ machine learning to filter stuff but they are like 500 euros a month at a more expensive host like leaseweb
When/if the attacks get more serious I might get GER2 again. I couldn't test it the last time around because I wasn't here. Want to see how a quad core with a gigabit link handles the load. But people really don't seem to want to play on anything except GER
Also a quick note, even if the included protection "handles" it it's bad for us. We need legit packets to get through. Automated filters usually see a pattern and block it. The pattern doesn't have to be invalid
I was thinking of a fake teeworlds server that just emulates the connection, put it behind a load balancer and run it on a couple virtual machines on digitalocean or sth. But then you'd first have to connect to that before being able to connect normal ddnet servers
17:16
which might be weird
17:16
and it wouldn't work on any host except GER, as only nfoservers has a proper firewall
they employ hacks such as a front facing proxy, you don't actually connect to a new server, you only get packets from a different backend server, very unreliable solution under ddos
17:18
or they just run multiple maps on one server, I've seen them aswell
The recent attacks are mostly small scale, around 10-20M, a serious attack gets pretty ridiculous. Like
Sum 65.506.000 packets/300s (218.353 packets/s), 3.530 flows/300s (11 flows/s), 27,752 GByte/300s (757 MBit/s)
The problem a friend was occuring was, that on a fresh Windows install settings like cl_refresh_rate are set to 480.
Since the render calls take longer time than no render calls, it happened that c...
@deen but that does only affect cl_refresh_rate and gfx_refresh_rate anyway
21:42
the guy in general chat said it happens regardless of the settings
21:47
@deen gdb -> info functions clearly shows that the binary exports symbols. to be precise it doesn't strip the fvisbility= effect from gcc. when i add fvisbility=hidden and strip the client it's insanly much smaller.(i also added -s and -g0 to be safe)
but i don't know if that can affect runtime, since it's just some symbols
the possibilities are:
something doesnt compile like with bam, which was still the case in 10.8.6
the new text renderer, however unluckely to affect a GTX 1060, like from the guy in gen chat
some changes from heinrcih bcs of the async tasks that were removed
other code i don't know, that was added to the loop, i'd need your memory and insight to know