[QUOTE=Willox;44914190]:x
what server? i didn't do anything naughty[/QUOTE]
CyberGmod.net DayZ, I was playing when you connected, said hi then you disconnected. :v:
[QUOTE=Willox;44914222]All files uploaded go inside the download directory.[/QUOTE]
Yea i just looked into that and was wrong :) Although confused how people used to use sv_allowupload exploits to create fake ban.cfg files in the cfg directory a couple years ago?
Read some other odd stuff as well, showing the exploits still work if it's set to 0 as srcds still accepts the upload to a point. Hard to know without testing it, idiots bickering on srcds.com seem to state contradicting statements.
[QUOTE=Phoenixf129;44914229]CyberGmod.net DayZ, I was playing when you connected, said hi then you disconnected. :v:[/QUOTE]
That will have non-suspiciously dated back to the 18th of April.
[QUOTE=Willox;44914247]That will have non-suspiciously dated back to the 18th of April.[/QUOTE]
Haha, anyways, I imagined afterwards it was you trying to plant the coughing virus. Didn't happen because probably sv_allowupload 0
But, I agree about FastDL > Workshop.
@Willox I dunno, our srcds doesn't have permission to write to the addon folder, gamemodes, downloads, or cfg so probably not open to the exploit anyway. But I've turned sv_allowupload off for now just in case.
And ... I was looking into sv_allowupload exploit history, bit of how it works etc. And I somehow ended up reading a thread that mentioned this coderhire addon:
[URL]http://coderhire.com/browse/script/534/hitmanx-complete-hitman-system-for-darkrp[/URL]
So I took a peak at the code, standing right at the top of the server files...
[CODE]
local function RemoveMoney( firstent, secondent, target, bountyprice )
firstent = net.ReadEntity()
secondent = net.ReadEntity()
target = net.ReadEntity()
bountyprice = net.ReadString()
umsg.Start( "MHitAccept", firstent )
umsg.Entity( secondent )
umsg.End()
secondent:SetNWString( "targ", target:Name() )
secondent:SetNWEntity( "req", firstent)
secondent:SetNWString( "bounty", bountyprice )
firstent:SetNWEntity( "Hitman", secondent )
firstent:addMoney( -tonumber( bountyprice ) )
end
net.Receive( "SendMoney", RemoveMoney )
[/CODE]
It's like when you wiki origin of cake and end up reading about the origin of German porn.
[QUOTE=Phoenixf129;44914315]Haha, anyways, I imagined afterwards it was you trying to plant the coughing virus. Didn't happen because probably sv_allowupload 0
But, I agree about FastDL > Workshop.[/QUOTE]
I believe FastDL is better if you use decent software for the webserver and have it located near your clients. Workshop downloads have the advantage of not needing to make more than a few HTTP connections, but it doesn't appear to be the fastest service ever.
[QUOTE=Pantho;44914319]You know ... nothing to do with this topic but meh, it's solved anyway.
I was looking into sv_allowupload exploit history, bit of how it works etc. And I somehow ended up reading a thread that mentioned this coderhire addon:
[url]http://coderhire.com/browse/script/534/hitmanx-complete-hitman-system-for-darkrp[/url]
So I took a peak at the code, standing right at the top of the server files...
[CODE]
local function RemoveMoney( firstent, secondent, target, bountyprice )
firstent = net.ReadEntity()
secondent = net.ReadEntity()
target = net.ReadEntity()
bountyprice = net.ReadString()
umsg.Start( "MHitAccept", firstent )
umsg.Entity( secondent )
umsg.End()
secondent:SetNWString( "targ", target:Name() )
secondent:SetNWEntity( "req", firstent)
secondent:SetNWString( "bounty", bountyprice )
firstent:SetNWEntity( "Hitman", secondent )
firstent:addMoney( -tonumber( bountyprice ) )
end
net.Receive( "SendMoney", RemoveMoney )
[/CODE]
It's like when you wiki origin of cake and end up reading about the origin of German porn.[/QUOTE]
[lua]
net.Start("SendMoney")
net.WriteEntity(LocalPlayer())
net.WriteEntity(LocalPlayer())
net.WriteEntity(LocalPlayer())
net.WriteString("-10000000")
net.SendToServer()
[/lua]
Free money!
[QUOTE=Pantho;44912941]Eh, you shouldn't put such silly things in server.cfg anyway.
with sv_allowupload, I've only ever seen some idiots making a blank folder and that's about it. Can they actually do anything serious with this anymore?[/QUOTE]
They both default to 1, or at least they used to, so explicitly defining it to 0 is best. The problem is that Valve never really "patch" the issue, hell the recent patch issued in GMod to fix a certain issue only really patched a small portion of it.
It is better on Linux due to explicit file permissions, but it's still not ideal that the engine still gives potential security holes.
[QUOTE=Svenskunganka;44907345]http://puu.sh/8Oi5M[/QUOTE]
I just thought I'd mention this, but 75MB is 48.3% of 155MB
edit never mind dumb math
[QUOTE=Shinycow;44919532]I just thought I'd mention this, but 75MB is 48.3% of 155MB[/QUOTE]
Typo, was meant to be 78MB.
Compressed: [IMG]http://puu.sh/93a0i.png[/IMG]
Decompressed: [IMG]http://puu.sh/93a1E.png[/IMG]
So...
((163428862-81826767) / 163428862) x 100 = 49,931263059275294959833961274233%
And this is the output from bzip itself: [IMG]http://puu.sh/93a9U.png[/IMG]
Currently using workshop while I set up fastdl on a shiny new vps. Its good in the fact that I save space on my VPS but it increases load times by about 5-10 seconds.
Sorry, you need to Log In to post a reply to this thread.