• Steam Auth Failure Code 6 Exploit?
    5 replies, posted
So my server has been getting this error every 2 or so hours, Apparently it's a ddos, I and co-owners have been talking to other server owners in Australia have been experiencing it too, contacting my server provider and which they (streamline) is doing what they can but they can't keep making rules to prevent it or else it will drop legitimate players, No new addons have been added I've even removed some I think might've been causing it. I'm very unsure on what to do, this is causing a-lot of inconvenience for me and the players. This has been happening for almost a week now, host has been working very hard on trying to prevent it, I will quote some of the replied from my provider: Dec 3rd Hi ***** I apologise if some users can't see it. I have been adjusting mitigation rules in the attempt to block this attack further. A quick note on the attack, it is extremely sophisticated, utilising four different protocol vectors (IPV6, ICMP, UDP & TCP). I am in the process of writing new rules to block the vectors more effectively. 4th dec Hi *****, As **** has mentioned, there isn't anything further we can do on our end. Any additional adjustments will result in players not being able to see your server on the server list or not being able to join your server. The issue you are facing is due to a very specific exploit impacting the game engine itself. This is something the developers should be addressing. I'm wondering if this is a new exploit or not, the server spikes to 200+ ping then crashes, timer goes down at-least about 30-40 seconds then comes back with some users getting disconnected for steam auth failure code 6 and with half staying on.
Is it a Sandbox server? Also ask your server provider what they know or what they think the exploit is and send it to robotboy655@facepunchstudios.com
It's a DarkRP Server and I will do it asap
Disable duplicator on your server and see if it solves the problem, by adding hook.Add( "InitPostEntity", "disable_dupe", function() net.Receive( "ArmDupe", function( len, client ) end ) end ) somewhere on your SERVER files
I've already removed it since day 1 due to the crash exploit
I  recommend our formatting, which is a little more complete than simply "disabling the net globally"(snte_dupefix 1 convars for enable again ) https://steamcommunity.com/sharedfiles/filedetails/?id=1308262997
Sorry, you need to Log In to post a reply to this thread.