diff options
author | FlavioJS <FlavioJS@54d463be-8e91-2dee-dedb-b68131a5f0ec> | 2007-09-24 09:13:50 +0000 |
---|---|---|
committer | FlavioJS <FlavioJS@54d463be-8e91-2dee-dedb-b68131a5f0ec> | 2007-09-24 09:13:50 +0000 |
commit | e17d1bfa00dcde02180df01edf7b028bf1c46432 (patch) | |
tree | c1a6d46f3ad2c9ae7b164803b5210ecdc2c5f6e8 /conf/packet_athena.conf | |
parent | d080398382d6ce1f4a4635e6a9de460994323823 (diff) | |
download | hercules-e17d1bfa00dcde02180df01edf7b028bf1c46432.tar.gz hercules-e17d1bfa00dcde02180df01edf7b028bf1c46432.tar.bz2 hercules-e17d1bfa00dcde02180df01edf7b028bf1c46432.tar.xz hercules-e17d1bfa00dcde02180df01edf7b028bf1c46432.zip |
* Limited manual detection of data truncation to string/enum/blob columns.
* Renamed conf-tmpl to conf.
git-svn-id: https://rathena.svn.sourceforge.net/svnroot/rathena/trunk@11284 54d463be-8e91-2dee-dedb-b68131a5f0ec
Diffstat (limited to 'conf/packet_athena.conf')
-rw-r--r-- | conf/packet_athena.conf | 57 |
1 files changed, 57 insertions, 0 deletions
diff --git a/conf/packet_athena.conf b/conf/packet_athena.conf new file mode 100644 index 000000000..76203bedb --- /dev/null +++ b/conf/packet_athena.conf @@ -0,0 +1,57 @@ +// Athena sockets Configuration file +// translated (davidsiaw) + + +// Display debug reports (When something goes wrong during the report, the report is saved.) +debug: no + +// How long can a socket stall before closing the connection (in seconds) +stall_time: 60 + +//----- IP Rules Settings ----- + +// If IP's are checked when connecting. +// This also enables DDoS protection. +enable_ip_rules: yes + +// Order of the checks +// deny,allow : Checks deny rules, then allow rules. Allows if no rules match. +// allow,deny : Checks allow rules, then deny rules. Allows if no rules match. +// mutual-failure : Allows only if an allow rule matches and no deny rules match. +// (default is deny,allow) + +order: deny,allow +// order: allow,deny +// order: mutual-failture + +// IP rules +// allow : Accepts connections from the ip range (even if flagged as DDoS) +// deny : Rejects connections from the ip range +// The rules are processed in order, the first matching rule of each list (allow and deny) is used + +// allow: 127.0.0.1 +// allow: 192.168.0.0/16 +// allow: 10.0.0.0/255.0.0.0 +// allow: all + +// deny: 127.0.0.1 + + +//---- DDoS Protection Settings ---- +// If ddos_count connection request are made within ddos_interval msec, it assumes it's a DDoS attack + +// Consecutive attempts interval (msec) +// (default is 3000 msecs, 3 seconds) +ddos_interval: 3000 + +// Consecutive attempts trigger +// (default is 5 attemps) +ddos_count: 5 + +// The time interval after which the threat of DDoS is assumed to be gone. (msec) +// After this amount of time, the DDoS restrictions are lifted. +// (default is 600000 msecs, 10 minutes) +ddos_autoreset: 600000 + + +import: conf/import/packet_conf.txt |