diff options
author | shennetsind <ind@henn.et> | 2013-01-25 14:02:43 -0200 |
---|---|---|
committer | shennetsind <ind@henn.et> | 2013-01-25 14:03:15 -0200 |
commit | cf0e8e7563e4273137c8a582d66fe4fcc6c283fa (patch) | |
tree | b8110178da066837e6776dee756191ed51254b5f /conf/packet.conf | |
parent | 6864c961e1cfad9650d2343bf94a9e6b197360e3 (diff) | |
download | hercules-cf0e8e7563e4273137c8a582d66fe4fcc6c283fa.tar.gz hercules-cf0e8e7563e4273137c8a582d66fe4fcc6c283fa.tar.bz2 hercules-cf0e8e7563e4273137c8a582d66fe4fcc6c283fa.tar.xz hercules-cf0e8e7563e4273137c8a582d66fe4fcc6c283fa.zip |
Dropping _athena file suffixes
Signed-off-by: shennetsind <ind@henn.et>
Diffstat (limited to 'conf/packet.conf')
-rw-r--r-- | conf/packet.conf | 64 |
1 files changed, 64 insertions, 0 deletions
diff --git a/conf/packet.conf b/conf/packet.conf new file mode 100644 index 000000000..0741ac013 --- /dev/null +++ b/conf/packet.conf @@ -0,0 +1,64 @@ +// Athena sockets Configuration file +// translated (davidsiaw) + + +// Display debug reports (When something goes wrong during the report, the report is saved.) +debug: no + +// How long can a socket stall before closing the connection (in seconds) +stall_time: 60 + +// Maximum allowed size for clients packets in bytes (default: 24576). +// NOTE: To reduce the size of reported packets, lower the values of defines, which +// have been customized, such as MAX_STORAGE, MAX_GUILD_STORAGE or MAX_CART. +// NOTE: Do not modify this setting, unless the client has been modified to support +// larger packets. The client will crash, when it receives larger packets. +socket_max_client_packet: 24576 + +//----- IP Rules Settings ----- + +// If IP's are checked when connecting. +// This also enables DDoS protection. +enable_ip_rules: yes + +// Order of the checks +// deny,allow : Checks deny rules, then allow rules. Allows if no rules match. +// allow,deny : Checks allow rules, then deny rules. Allows if no rules match. +// mutual-failure : Allows only if an allow rule matches and no deny rules match. +// (default is deny,allow) + +order: deny,allow +// order: allow,deny +// order: mutual-failture + +// IP rules +// allow : Accepts connections from the ip range (even if flagged as DDoS) +// deny : Rejects connections from the ip range +// The rules are processed in order, the first matching rule of each list (allow and deny) is used + +// allow: 127.0.0.1 +// allow: 192.168.0.0/16 +// allow: 10.0.0.0/255.0.0.0 +// allow: all + +// deny: 127.0.0.1 + + +//---- DDoS Protection Settings ---- +// If ddos_count connection request are made within ddos_interval msec, it assumes it's a DDoS attack + +// Consecutive attempts interval (msec) +// (default is 3000 msecs, 3 seconds) +ddos_interval: 3000 + +// Consecutive attempts trigger +// (default is 5 attemps) +ddos_count: 5 + +// The time interval after which the threat of DDoS is assumed to be gone. (msec) +// After this amount of time, the DDoS restrictions are lifted. +// (default is 600000 msecs, 10 minutes) +ddos_autoreset: 600000 + + +import: conf/import/packet_conf.txt |