summaryrefslogtreecommitdiff
path: root/conf/packet_athena.conf
diff options
context:
space:
mode:
authorshennetsind <ind@henn.et>2013-01-25 14:02:43 -0200
committershennetsind <ind@henn.et>2013-01-25 14:03:15 -0200
commitcf0e8e7563e4273137c8a582d66fe4fcc6c283fa (patch)
treeb8110178da066837e6776dee756191ed51254b5f /conf/packet_athena.conf
parent6864c961e1cfad9650d2343bf94a9e6b197360e3 (diff)
downloadhercules-cf0e8e7563e4273137c8a582d66fe4fcc6c283fa.tar.gz
hercules-cf0e8e7563e4273137c8a582d66fe4fcc6c283fa.tar.bz2
hercules-cf0e8e7563e4273137c8a582d66fe4fcc6c283fa.tar.xz
hercules-cf0e8e7563e4273137c8a582d66fe4fcc6c283fa.zip
Dropping _athena file suffixes
Signed-off-by: shennetsind <ind@henn.et>
Diffstat (limited to 'conf/packet_athena.conf')
-rw-r--r--conf/packet_athena.conf64
1 files changed, 0 insertions, 64 deletions
diff --git a/conf/packet_athena.conf b/conf/packet_athena.conf
deleted file mode 100644
index 0741ac013..000000000
--- a/conf/packet_athena.conf
+++ /dev/null
@@ -1,64 +0,0 @@
-// Athena sockets Configuration file
-// translated (davidsiaw)
-
-
-// Display debug reports (When something goes wrong during the report, the report is saved.)
-debug: no
-
-// How long can a socket stall before closing the connection (in seconds)
-stall_time: 60
-
-// Maximum allowed size for clients packets in bytes (default: 24576).
-// NOTE: To reduce the size of reported packets, lower the values of defines, which
-// have been customized, such as MAX_STORAGE, MAX_GUILD_STORAGE or MAX_CART.
-// NOTE: Do not modify this setting, unless the client has been modified to support
-// larger packets. The client will crash, when it receives larger packets.
-socket_max_client_packet: 24576
-
-//----- IP Rules Settings -----
-
-// If IP's are checked when connecting.
-// This also enables DDoS protection.
-enable_ip_rules: yes
-
-// Order of the checks
-// deny,allow : Checks deny rules, then allow rules. Allows if no rules match.
-// allow,deny : Checks allow rules, then deny rules. Allows if no rules match.
-// mutual-failure : Allows only if an allow rule matches and no deny rules match.
-// (default is deny,allow)
-
-order: deny,allow
-// order: allow,deny
-// order: mutual-failture
-
-// IP rules
-// allow : Accepts connections from the ip range (even if flagged as DDoS)
-// deny : Rejects connections from the ip range
-// The rules are processed in order, the first matching rule of each list (allow and deny) is used
-
-// allow: 127.0.0.1
-// allow: 192.168.0.0/16
-// allow: 10.0.0.0/255.0.0.0
-// allow: all
-
-// deny: 127.0.0.1
-
-
-//---- DDoS Protection Settings ----
-// If ddos_count connection request are made within ddos_interval msec, it assumes it's a DDoS attack
-
-// Consecutive attempts interval (msec)
-// (default is 3000 msecs, 3 seconds)
-ddos_interval: 3000
-
-// Consecutive attempts trigger
-// (default is 5 attemps)
-ddos_count: 5
-
-// The time interval after which the threat of DDoS is assumed to be gone. (msec)
-// After this amount of time, the DDoS restrictions are lifted.
-// (default is 600000 msecs, 10 minutes)
-ddos_autoreset: 600000
-
-
-import: conf/import/packet_conf.txt