From e17d1bfa00dcde02180df01edf7b028bf1c46432 Mon Sep 17 00:00:00 2001 From: FlavioJS Date: Mon, 24 Sep 2007 09:13:50 +0000 Subject: * Limited manual detection of data truncation to string/enum/blob columns. * Renamed conf-tmpl to conf. git-svn-id: https://rathena.svn.sourceforge.net/svnroot/rathena/trunk@11284 54d463be-8e91-2dee-dedb-b68131a5f0ec --- conf/packet_athena.conf | 57 +++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 57 insertions(+) create mode 100644 conf/packet_athena.conf (limited to 'conf/packet_athena.conf') diff --git a/conf/packet_athena.conf b/conf/packet_athena.conf new file mode 100644 index 000000000..76203bedb --- /dev/null +++ b/conf/packet_athena.conf @@ -0,0 +1,57 @@ +// Athena sockets Configuration file +// translated (davidsiaw) + + +// Display debug reports (When something goes wrong during the report, the report is saved.) +debug: no + +// How long can a socket stall before closing the connection (in seconds) +stall_time: 60 + +//----- IP Rules Settings ----- + +// If IP's are checked when connecting. +// This also enables DDoS protection. +enable_ip_rules: yes + +// Order of the checks +// deny,allow : Checks deny rules, then allow rules. Allows if no rules match. +// allow,deny : Checks allow rules, then deny rules. Allows if no rules match. +// mutual-failure : Allows only if an allow rule matches and no deny rules match. +// (default is deny,allow) + +order: deny,allow +// order: allow,deny +// order: mutual-failture + +// IP rules +// allow : Accepts connections from the ip range (even if flagged as DDoS) +// deny : Rejects connections from the ip range +// The rules are processed in order, the first matching rule of each list (allow and deny) is used + +// allow: 127.0.0.1 +// allow: 192.168.0.0/16 +// allow: 10.0.0.0/255.0.0.0 +// allow: all + +// deny: 127.0.0.1 + + +//---- DDoS Protection Settings ---- +// If ddos_count connection request are made within ddos_interval msec, it assumes it's a DDoS attack + +// Consecutive attempts interval (msec) +// (default is 3000 msecs, 3 seconds) +ddos_interval: 3000 + +// Consecutive attempts trigger +// (default is 5 attemps) +ddos_count: 5 + +// The time interval after which the threat of DDoS is assumed to be gone. (msec) +// After this amount of time, the DDoS restrictions are lifted. +// (default is 600000 msecs, 10 minutes) +ddos_autoreset: 600000 + + +import: conf/import/packet_conf.txt -- cgit v1.2.3-70-g09d2