diff options
author | Andrei Karas <akaras@inbox.ru> | 2014-10-05 11:34:32 +0300 |
---|---|---|
committer | Andrei Karas <akaras@inbox.ru> | 2015-08-05 17:46:56 +0300 |
commit | 1e7eeab97430d630b419ee8f46b3fbcc57e92532 (patch) | |
tree | 361f93b48fd3f1fc94f9246b6dfb9f510cbfea49 /conf/packet.conf | |
parent | 89f27cddaa582c86501be7ba78f9ae5c80142c62 (diff) | |
download | hercules-1e7eeab97430d630b419ee8f46b3fbcc57e92532.tar.gz hercules-1e7eeab97430d630b419ee8f46b3fbcc57e92532.tar.bz2 hercules-1e7eeab97430d630b419ee8f46b3fbcc57e92532.tar.xz hercules-1e7eeab97430d630b419ee8f46b3fbcc57e92532.zip |
Remove conf dir.
Diffstat (limited to 'conf/packet.conf')
-rw-r--r-- | conf/packet.conf | 66 |
1 files changed, 0 insertions, 66 deletions
diff --git a/conf/packet.conf b/conf/packet.conf deleted file mode 100644 index 85996f4e3..000000000 --- a/conf/packet.conf +++ /dev/null @@ -1,66 +0,0 @@ -//===== Hercules Sockets Configuration ======================= -//= Hercules Sockets Configuration File -//===== Translated by: ======================================= -// Davidsiaw -//============================================================ - -// Display debug reports (When something goes wrong during the report, the report is saved.) -debug: no - -// How long can a socket stall before closing the connection (in seconds)? -stall_time: 60 - -// Maximum allowed size for clients packets in bytes (default: 24576). -// NOTE: To reduce the size of reported packets, lower the values of defines, which -// have been customized, such as MAX_STORAGE, MAX_GUILD_STORAGE or MAX_CART. -// NOTE: Do not modify this setting, unless the client has been modified to support -// larger packets. The client will crash, when it receives larger packets. -socket_max_client_packet: 24576 - -//----- IP Rules Settings ----- - -// If IP's are checked when connecting. -// This also enables DDoS protection. -enable_ip_rules: yes - -// Order of the checks -// deny,allow : Checks deny rules, then allow rules. Allows if no rules match. -// allow,deny : Checks allow rules, then deny rules. Allows if no rules match. -// mutual-failure : Allows only if an allow rule matches and no deny rules match. -// (default is deny,allow) - -order: deny,allow -// order: allow,deny -// order: mutual-failture - -// IP rules -// allow : Accepts connections from the ip range (even if flagged as DDoS) -// deny : Rejects connections from the ip range -// The rules are processed in order, the first matching rule of each list (allow and deny) is used - -// allow: 127.0.0.1 -// allow: 192.168.0.0/16 -// allow: 10.0.0.0/255.0.0.0 -// allow: all - -// deny: 127.0.0.1 - - -//---- DDoS Protection Settings ---- -// If ddos_count connection request are made within ddos_interval msec, it assumes it's a DDoS attack - -// Consecutive attempts interval (msec) -// (default is 3000 msecs, 3 seconds) -ddos_interval: 3000 - -// Consecutive attempts trigger -// (default is 5 attemps) -ddos_count: 5 - -// The time interval after which the threat of DDoS is assumed to be gone. (msec) -// After this amount of time, the DDoS restrictions are lifted. -// (default is 600000 msecs, 10 minutes) -ddos_autoreset: 600000 - - -import: conf/import/packet_conf.txt |