From 620e60eebce2c1f35c5c9a82f6ca365b316587f5 Mon Sep 17 00:00:00 2001 From: Valaris Date: Sun, 29 Jan 2006 16:10:48 +0000 Subject: AS OF SVN REV. 5901, WE ARE NOW USING TRUNK. ALL UNTESTED BUGFIXES/FEATURES GO INTO TRUNK. IF YOU HAVE A WORKING AND TESTED BUGFIX PUT IT INTO STABLE AS WELL AS TRUNK. EVERYTHING ELSE GOES INTO TRUNK AND WILL BE MERGED INTO STABLE BY VALARIS AND WIZPUTER. -- VALARIS git-svn-id: https://rathena.svn.sourceforge.net/svnroot/rathena/trunk@5094 54d463be-8e91-2dee-dedb-b68131a5f0ec --- conf-tmpl/packet_athena.conf | 51 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 51 insertions(+) create mode 100644 conf-tmpl/packet_athena.conf (limited to 'conf-tmpl/packet_athena.conf') diff --git a/conf-tmpl/packet_athena.conf b/conf-tmpl/packet_athena.conf new file mode 100644 index 000000000..1c29c84bf --- /dev/null +++ b/conf-tmpl/packet_athena.conf @@ -0,0 +1,51 @@ +// Athena sockets Configuration file +// translated (davidsiaw) + + +// Display debug reports (iWhen something goes wrong during the report, the report is saved.) +debug: no + +// How long can a socket stall before closing the connection (in seconds) +stall_time: 60 + + +//----- IP Rules Settings ----- + +// Do we check IP's before allowing incoming connections? +enable_ip_rules: yes + +// Decide the order of access restriction (Same as apache?) +// deny,allow Is the standard + +order: deny,allow +// order: allow,deny +// order: mutual-failture + +// The IP list which it uses to access controls +// allow : Allows access regardless of permissions +// deny : Completely disallow +// Žw’è–³‚µ : If the permission check encounters mutual-failure(whatever that means) it will disallow access + +// allow: 127.0.0.1 +// allow: 192.168.0.0/16 +// allow: 10.0.0.0/255.0.0.0 +allow: all + +// deny: 127.0.0.1 + + +//---- Ddos Protection Settings ---- +// If there is a connection request within ddos_interval msec for ddos_count number of times, it will assume it is a ddos attack + +// Consecutive intervals(msec) +ddos_interval: 3000 + +// Connection frequency +ddos_count: 5 + +// The time interval after which the threat of ddos is assumed to be gone +// After this amount of time, the ddos restrictions are lifted. +ddos_autoreset: 600000 + + +//import: conf/import/packet_conf.txt -- cgit v1.2.3-60-g2f50