summaryrefslogtreecommitdiff
path: root/conf/packet_athena.conf
diff options
context:
space:
mode:
authorFlavioJS <FlavioJS@54d463be-8e91-2dee-dedb-b68131a5f0ec>2007-09-24 09:13:50 +0000
committerFlavioJS <FlavioJS@54d463be-8e91-2dee-dedb-b68131a5f0ec>2007-09-24 09:13:50 +0000
commite17d1bfa00dcde02180df01edf7b028bf1c46432 (patch)
treec1a6d46f3ad2c9ae7b164803b5210ecdc2c5f6e8 /conf/packet_athena.conf
parentd080398382d6ce1f4a4635e6a9de460994323823 (diff)
downloadhercules-e17d1bfa00dcde02180df01edf7b028bf1c46432.tar.gz
hercules-e17d1bfa00dcde02180df01edf7b028bf1c46432.tar.bz2
hercules-e17d1bfa00dcde02180df01edf7b028bf1c46432.tar.xz
hercules-e17d1bfa00dcde02180df01edf7b028bf1c46432.zip
* Limited manual detection of data truncation to string/enum/blob columns.
* Renamed conf-tmpl to conf. git-svn-id: https://rathena.svn.sourceforge.net/svnroot/rathena/trunk@11284 54d463be-8e91-2dee-dedb-b68131a5f0ec
Diffstat (limited to 'conf/packet_athena.conf')
-rw-r--r--conf/packet_athena.conf57
1 files changed, 57 insertions, 0 deletions
diff --git a/conf/packet_athena.conf b/conf/packet_athena.conf
new file mode 100644
index 000000000..76203bedb
--- /dev/null
+++ b/conf/packet_athena.conf
@@ -0,0 +1,57 @@
+// Athena sockets Configuration file
+// translated (davidsiaw)
+
+
+// Display debug reports (When something goes wrong during the report, the report is saved.)
+debug: no
+
+// How long can a socket stall before closing the connection (in seconds)
+stall_time: 60
+
+//----- IP Rules Settings -----
+
+// If IP's are checked when connecting.
+// This also enables DDoS protection.
+enable_ip_rules: yes
+
+// Order of the checks
+// deny,allow : Checks deny rules, then allow rules. Allows if no rules match.
+// allow,deny : Checks allow rules, then deny rules. Allows if no rules match.
+// mutual-failure : Allows only if an allow rule matches and no deny rules match.
+// (default is deny,allow)
+
+order: deny,allow
+// order: allow,deny
+// order: mutual-failture
+
+// IP rules
+// allow : Accepts connections from the ip range (even if flagged as DDoS)
+// deny : Rejects connections from the ip range
+// The rules are processed in order, the first matching rule of each list (allow and deny) is used
+
+// allow: 127.0.0.1
+// allow: 192.168.0.0/16
+// allow: 10.0.0.0/255.0.0.0
+// allow: all
+
+// deny: 127.0.0.1
+
+
+//---- DDoS Protection Settings ----
+// If ddos_count connection request are made within ddos_interval msec, it assumes it's a DDoS attack
+
+// Consecutive attempts interval (msec)
+// (default is 3000 msecs, 3 seconds)
+ddos_interval: 3000
+
+// Consecutive attempts trigger
+// (default is 5 attemps)
+ddos_count: 5
+
+// The time interval after which the threat of DDoS is assumed to be gone. (msec)
+// After this amount of time, the DDoS restrictions are lifted.
+// (default is 600000 msecs, 10 minutes)
+ddos_autoreset: 600000
+
+
+import: conf/import/packet_conf.txt