summaryrefslogtreecommitdiff
path: root/conf/packet.conf
blob: 1780d1b4cfd120f3fc7c64cf6f29f0a9ce8c555f (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
//===== Hercules Sockets Configuration =======================
//= Hercules Sockets Configuration File
//===== Translated by: =======================================
// Davidsiaw
//============================================================

// Display debug reports (When something goes wrong during the report, the report is saved.)
debug: no

// How long can a socket stall before closing the connection (in seconds)?
stall_time: 60

// Linux/Epoll: Maxmimum Events per cycle
// Default Value: 
//	(Maxmimum Supported Connections)/2 
// NOTE: this controls the maximum collected socket-events per-cycle (call to epoll_wait())
//       for example settings this to 32 will allow up to 32 events (incomming data/new connections
//       per server-cycle.
// NOTE: Recommended Settings is at least half the maxmimum supported connections
//       Settings this to a lower value, may cause lags/delays
//       Depending on available CPU Time
// NOTE: This Setting is only available on Linux when build using EPoll as event dispatcher!
//
//epoll_maxevents: 1024

// Maximum allowed size for clients packets in bytes (default: 65535).
// Default Values:
// 24576 (Clients < 20131223)
// 65535 (Clients >= 20131223)
// NOTE: To reduce the size of reported packets, lower the values of defines, which
//       have been customized, such as MAX_STORAGE, MAX_GUILD_STORAGE or MAX_CART.
// NOTE: Do not modify this setting, unless the client has been modified to support
//       larger packets. The client will crash, when it receives larger packets.
//socket_max_client_packet: 65535

//----- IP Rules Settings -----

// If IP's are checked when connecting.
// This also enables DDoS protection.
enable_ip_rules: yes

// Order of the checks
//   deny,allow     : Checks deny rules, then allow rules. Allows if no rules match.
//   allow,deny     : Checks allow rules, then deny rules. Allows if no rules match.
//   mutual-failure : Allows only if an allow rule matches and no deny rules match.
// (default is deny,allow)

order: deny,allow
// order: allow,deny
// order: mutual-failture

// IP rules
//   allow : Accepts connections from the ip range (even if flagged as DDoS)
//   deny  : Rejects connections from the ip range
// The rules are processed in order, the first matching rule of each list (allow and deny) is used

// allow: 127.0.0.1
// allow: 192.168.0.0/16
// allow: 10.0.0.0/255.0.0.0
// allow: all

// deny: 127.0.0.1

//---- DDoS Protection Settings ----
// If ddos_count connection request are made within ddos_interval msec, it assumes it's a DDoS attack

// Consecutive attempts interval (msec)
// (default is 3000 msecs, 3 seconds)
ddos_interval: 3000

// Consecutive attempts trigger
// (default is 5 attemps)
ddos_count: 5

// The time interval after which the threat of DDoS is assumed to be gone. (msec)
// After this amount of time, the DDoS restrictions are lifted.
// (default is 600000 msecs, 10 minutes)
ddos_autoreset: 600000

import: conf/import/packet_conf.txt