How to Create a sa-mp server + getting it online. (Updated 2020)
This tutorial includes: » Getting DDoS Protected Hosting for your SA-MP server » Downloading, installing + playing sa-mp » Creating your own server » Getting your server online » Advertising your server Getting DDoS Protected Hosting for your SA-MP server For your sa-mp server you will need a hosting provider capable to withstand strong DDoS attacks, we on system freaks recommend Sovahost.net, they are using OVH network and have more affordable prices. Downloading, installing + playing SA-MP: First make sure that you have version 1.0 of GTA: San Andreas. If you don’t have version 1.0, download this first: To download SA-MP, go to http://sa-mp.com/download.php and download the newest version (0.2X) of SA-MP (make sure that you download the Client, and not the Server.)
When the download is completed, open the file that you’ve just downloaded. (duh..)
If everything went right, you should see this: Than click I Agree and than you must search the folder where GTA: San Andreas is installed. (standard C:\Program Files\Rockstar Games\GTA San Andreas)
When the folder is selected, click Install.
And than Finish.
You can easely find SA-MP in the start menu.
Start » All programs » San Andreas Multiplayer » San Andreas Multiplayer.
When opening SA-MP, you will see a window like this:
To add a server to your favorites, use the button and enter the IP:Port of the server.
To see a list of all the SA-MP servers, klick the Internet button. (it may need some time to load all the servers)
Press the button to connect to the selected server. Creating your own server Before you can modify your server, you first have to download some files here.
(in this tutorial I’m showing you how to create a server on a Windows server only)
When it’s downloaded you’ll need to unpack the .zip file to where ever you want. After extracting the .zip, you will see these files/folders: » server.cfg (file) » server-readme.txt (file) » samp-server.exe (file) » samp-licence.txt (file) » announce.exe (file) » scriptfiles (folder) » spawno (folder) » gamemodes (folder) » filterscripts (folder) For example, we will use the lvdm.pwn gamemode (you can also create your own mode but i don’t want to type that much) you can find lvdm.pwn in the gamemodes folder. Configuring your server.cfg: When you open it you will see this: » rcon_password change the line rcon_password changeme to an other password that you like.
this password will be needed to log in to the server with /rcon login <mypassword>
» announde 1 means if the server will be announced in the SA-MP server list (1) or not (0).
» filterscripts here you will enter the filterscripts that your server must load.
» weburl will be displayed in the server browser of SA-MP (right left corner).
» anticheat must be set to 0 becouse (if set to 1) it may crash your server.
The rest explain themselves..Adding vehicles:
If you want to add vehicles, you will first need to find the positions of where the vehicle will be spawned.
You can find them by going on a SA-MP server, taking a vehicle and than typing /save <nameyouchoose>
or by starting debug mode: press “Launch Debug” Use /v <modelid> to spawn your vehicle, and /save <nameyouchoose> to save the position.
Than go to your GTA: San Andreas folder and find the savedpositions.txt file.
There you will see a line like this: Code: AddStaticVehicle(429, -2704.3149, 224.6218, 3.8592, 191.0172, 1, 1); // nameyouchoose ( AddStaticVehicle(modelid, x, y, z, angle, color1, color2); ) Copy that line (select it and CTRL + C)
and than paste (CTRL + V) it in the lvdm.pwn file under the OnGameModeInit callback.
(you will see some other vehicles placed there from the lvdm mode, so just place your line under, above or between them).
You can change the type of car by changing the modelid parameter: Code: AddStaticVehicle(»»modelid««, x, y, z, angle, color1, color2); Modelid’s can be found here.Adding player classes: (= the player you choose when connecting to a server)
You first need to save the position again like in “adding vehicles” (see above) Code: AddPlayerClass(skin-id, x, y, z, rotation, weapon 1, ammo 1, weapon12, ammo 2, weapon13, ammo 3); And place the code from savedpositions.txt under the OnGameModeInit callback.
(you will see some other player classes placed there from the lvdm mode, so just place your line under, above or between them).
It may look like this: Code: AddPlayerClass(265, 1958.3783, 1343.1572, 15.3746, 270.1425, 0, 0, 24, 300, 0, 0); Skin id’s can be found here.Adding pickups:
Adding pickups works the same as adding vehicles and adding player classes (see above).
The defference is that you use this function: Code: AddStaticPickup(pickupid ,pickuptype, x, y, z); Example: Code: AddStaticPickup(1273,2,-2146.688964,98.546432,35.320312); Pickup id’s can be found here and here.
Pickup types: Code: 0 Item does not display
2 Pickupable and respawns after a few minutes
3 Pickupable, no respawn
4 Disappears shortly after creation (used for drops?)
5 Disappears shortly after creation (used for drops?)
8 pickupable (no effect) – disappears shortly after creation (used for ?)
11 Blows Up few seconds after creation*
12 Blows Up few seconds after creation (car explosion? timer is the burning flame?)
13 X – Slowly descends in Z and eventually goes through the floor (parachute?)
15 Pickupable, no respawn
19 Pickupable with no effect (Information icon?)
22 Pickupable, no respawn Making simple commands:
(= teleport command)
This uses function SetPlayerPos: Code: SetPlayerPos(playerid, X, Y, Z); Example: Code: if(!strcmp(cmdtext,”/myteleport”,true)) { SetPlayerPos(playerid, -2099.7470, 245.2656, 35.8833); SendClientMessage(playerid,0xFF3399AA,”You have been teleported to -myteleport-“); return 1; } This Must be placed under callback: OnPlayerCommandTextWhen you’re done with scripting:
You must compile your script before you close the window. Getting your server online: If you want to connect to your server, click the button from samp.exe and enter this ip: 127.0.0.1:7777 The 7777 from 127.0.0.1:7777 is the port of your server. this must be the same as the port in your server.cfg If other people want to connect to your server, you must first forward your port (the 7777 from in the server.cfg) for this, i direct you to this topic. (can’t be explained better) And to check if your server is online, use this. Advertising your server: If you made your server, you can advertise your server here but please Read the rules before you post! When you’ve done all the steps, you have.. a server 😛 So that’s it, i hope this tutorial helps a lot of people If you have any questions or did i forget something, feel free to make a post at forum.systemfreaks.com
How to Setup Mu Online Season 1 / 2 /3 / 4 /5 / 6 / 7 / 9(Updated 2020)
Hello guys This guide its about how to make your own MuOnline Server Season 1 / 2 /3 / 4 /5 / 6 / 7 / 9 In this post we will discuss on how to setup muonline servers , setup muonline websites ,fix bugs , configure muonline files , configure the client files how to add monsters,shop items , change few things like level requirements on movereq, how to setup castle siege and everything its required to have a succesfull muonline server , even how to secure it ! i dont want people to be so negative on how to make your own MuOnline server , i want people to grow MuOnline community by making more servers and having the knowledge to fix bugs etc so we all can have a stable and secure server to launch. First you will need Mu Online Hosting Finally you Gonna need a good DDoS Protected Hosting provider for this i do recommend SovaHost that specializes in mu online hosting. You will need Microsoft SQL Server 2000 or 2008 You can download MSSQL server directly from Microsoft’s website . Click here to Download Mssql 2000 Click here to download Mssql 2008(Recommended) You need to install the MSSQL server VERSION: SQL Server 2000
1.Open SQLEVAL.exe the file you download (run to unpack it)
2.Go to C:\SQLEVAL, run setup.bat
3.Select SQL 2000 Server Components
4. Click Install Database Server
5. Click 8 Times Next Next 6.Choose Use Local System Account and click Next
7.Choose Mixed Mod Choose a password for the SQL SERVER [Dont Forget It]
Press Next 2 Times and wait until its finished
8.Go to Start>Program Files> Microsoft SQL Server > Open Service Manager > Put your PC Name ex: MY-PC or (local), Then just start the Service Manager VERSION: SQL Server 2008
1. Open the SQLEXPRWT_x86_ENU.exe or SQLEXPRWT_x64_ENU.exe to start Installation
2. Click on the Left side Installation and on the Right click New Installation.
3. Choose New Installation and Click Next.
4. Accept terms and go to next step.
5. Untick (Remove tick from SQL Connectivity SDK) and next.
6. Choose Default Instance and click Next.
7. Be sure it says Startup type: Automatic then click next.
8. Choose Mixed Password and put a SQL Password and click next twice.9. Wait for it. When its done close the window to finalize. You have Succesfully installed Your SQL Server! You Need The Server Files. Season 1 Server Files Link (Changelog) Season 2 Server Files Link(Changelog)Season 3 Server Files Link (Changelog) – not yet Season 4 Server Files Link (Changelog) – not yetSeason 5 Server Files Link (Changelog) – not yetSeason 6 Server Files Link (Changelog) – not yetSeason 7 Server Files Link (Changelog) – not yetSeason 9 Server Files Link (Changelog) – not yet You Need The MuOnline Client Files. Season 1 Client LinkSeason 2 Client LinkSeason 3 Client Link Season 4 Client Link Season 5 Client Link Season 6 Client Link Season 7 Client Link Season 9 Client Link https://www.youtube.com/watch?v=66c65C5zgqk Now You Have to Restore the Databases. [RESTORING DATABASES WITH SQL 2000 ENTERPRISE MANAGER]
1. First be sure you extracted your server files for ex at C:\ to be able to browse the Database files
2. Go to Start> search for Service Manager, open it put on Server: YOUR-PC name and click Play
3. Go to Start> Search for Enterprise Manager and Open it
4. Click Microsoft SQL Servers> SQL Server Group> open the (local) one
5. Open Databases > Right Click on Databases > Click New Database and create MuOnline
6. Now after you downloaded the server files and put them in C:\ for example
7. In Enterprise Manager Right Click on your Database you made example: MuOnline
8. Click All Tasks> Restore Database> From Device > Select Device > Add > 9. Then find on C:\ Or D:\ You Server Files and Open the Database files (.bak)
10. Choose MuOnline or Other Database > Click OK 2 Times > Go to Options > Here below on the 2 lines you need to edit the directory where the datbases should be restored.
For example your MuServer folder has DB folder in C:\MuOnline\DB\
basicly you need to copy the directory of where you want to restore the databases.
Example of how the directory would look if you restore the database in the same folder: Code: C:\MuServer\DB\MuOnline_Data.MDF
and for Logs database
C:\MuServer\DB\MuOnline_Log.LDF Tick the Force Restore over existing databaseand press OK to Restore!
Do the same with the rest databases. Event/Ranking/SCFMuTeam/MuLog etc [RESTORING DATABASES WITH SQL 2008 MANAGEMENT STUDIO]
1. First be sure you extracted your server files for ex at C:\ to be able to browse the Database files
2. Go to Start> search for Microsoft SQL Server 2008 R2 and open it
Inside the Server: write YOUR-PC\SQLEXPRESS and connect with Windows Authentication
3. Click Databases two times to Expand
4. Open Databases > Right Click on Databases > Click New Database and create MuOnline
5. Now after you download the server files and put them in C:\ for example
6. In SQL Management Studio/Databases/ Right Click on your Database you made
for example: MuOnline Tasks>Restore>Database
7. Click From Device and the browse button > Add >Find .bak > Add it.
8. Tick the Restore box for the database to be chosen. Here below on the 2 lines you need to edit the directory where the datbases should be restored.
For example your MuServer folder has DB folder in C:\MuOnline\DB\
basicly you need to copy the directory of where you want to restore the databases.
Example of how the directory would look if you restore the database in the same folder: Code: C:\MuServer\DB\MuOnline_Data.MDF
and for Logs database
C:\MuServer\DB\MuOnline_Log.LDF Tick the Overwrite existing database and press OK to Restore! Do the same with the rest databases. Event/Ranking/SCFMuTeam/MuLog etc You’re done with restoring now its recommended to setup ODBC Manually! ————————————————————————————————— ODBC Manually 32/64Bit Tutorial HERE ODBC Manually for 64Bit video Tutorial HERE You can alternatively run the ODBC.req files from your Database folder. SERVER SETUP VIDEO TUTORIALS We have tried to keep the Video guides up to date so go ahead and watch the videos carefully if you follow the steps correctly you will manage to successfully install MuOnline Server How to setup MuOnline Season 1 Server https://www.youtube.com/watch?v=w7mbyMsZKCk Season 1 Server How to setup MuOnline Season 2 Server https://www.youtube.com/watch?v=eql_aBYYwc8 MuOnline Season 2 Server How to setup MuOnline Season 3 Server: https://www.youtube.com/watch?v=822L3NhGMQo MuOnline Season 3 Server: How to setup MuOnline Season 4 Server: https://www.youtube.com/watch?v=TrCuMPBUT3Q MuOnline Season 4 Server: How to setup MuOnline Season 5 Server https://www.youtube.com/watch?v=yPzVWquUtys Season 5 Server How to setup MuOnline Season 6 Server: https://www.youtube.com/watch?v=FD4CDLVhMG4 Season 6 Server: How to setup MuOnline Season ex700 Server: https://www.youtube.com/watch?v=7pYYw8Vi3gs Season ex700 Server How to setup MuOnline Season ex901 Server: https://www.youtube.com/watch?v=66c65C5zgqk Season ex901 Server: MISC TUTORIALS PREMIUM or FREE Files for MU Private Server?:https://youtu.be/4IooHlPP5i0IMPORTANCE OF SERVER PLANNING : https://www.youtube.com/watch?v=_QieKTeXu4k How to open ports for MuOnline: https://www.youtube.com/watch?v=dA1INCjfXcg How to setup MSSQL 2000 For MuOnline: http://www.youtube.com/watch?v=AgPG0wt6evkHow to setup MSSQL 2005 For MuOnline: http://www.youtube.com/watch?v=FueuuNur5YgHow to setup MSSQL 2008 For MuOnline: https://www.youtube.com/watch?v=_5V2wsiMyiQHow to Edit/Change [.OZT / .OZJ] MuOnline Images: https://www.youtube.com/watch?v=yrhkKorjGRQHow to Setup MuCore 1.0.8 with XAMPP 1.7.1: https://www.youtube.com/watch?v=VnuESyrKKv0How to Configure ODBC on x64 bit (OS)Systems: https://www.youtube.com/watch?v=fs-7CuXzj08How to edit Map move List for MuOnline: https://www.youtube.com/watch?v=KrPsDJqDoGg&tHow to Configure/Edit Shops in your MuOnline Server: https://www.youtube.com/watch?v=VRXWjDJJmYsHow to Setup Castle Siege Dates Configuration: https://www.youtube.com/watch?v=tPRsfnNSEi0How does skinning Maps works and Map Designing: https://www.youtube.com/watch?v=C-Ch_hqurGoHow to add custom Monster Spots: https://www.youtube.com/watch?v=sA6UdfgQf1QChange Default DL/MG Character Level Creation: https://www.youtube.com/watch?v=jraHIWDLntkSERVER FILES REVIEWS Review for MUEMU aka X-Team Server fileshttps://www.youtube.com/watch?v=PzEjxA73HGkReview for SCFMT/TitansTech fileshttps://www.youtube.com/watch?v=yonDUkH8tMw Do you have Questions or need help? if you have questions or need help feel free to join our forum at www.systemfreaks.com/forum and i will be happy to assist you .
How to Protect your SA:MP from DDoS Attacks(Updated 2020)
SA:MP DDoS Protection DDoS attacks targeting SA-MP servers are posing a major threat to the online gaming community. Once the game server draws attention and attracts more players than other servers, it becomes the target of cyber attacks, such as DoS and DDoS attacks. If the game server operators find themselves in the situation that their server is being attacked by competitors, they need a permanent solution to keep their server online and the players happy and not become a victim of these cyber criminals. In this article we’ll show you what you can do to protect your SAMP from DDoS and run (or keep running) a successful GTA SA:MP server. It will teach you about: What SAMP isHow to set up a SAMP serverSAMP DDoS toolsSA-MP anti DDoS strategies What Is GTA SA:MP? SA-MP stands for “San Andreas: Multiplayer” and is an unofficial multiplayer (MMO) mod for Rockstar’s Grand Theft Auto: San Andreas (GTA: SA). It’s free to operate a SAMP server, but it requires the GTA: SA DVD for players to join. The first public version 0.1 of the mod was published in May 2006 on SA-MP.com and got heavily improved, extended and popular over time. The current version is 0.3.7 and was published almost exactly 9 years after the first release. At the time of writing there are almost 4,000 SA-MP servers online and about ten times as many players, and it’s just morning! That’s quite a lot of attention considering that it’s not even an official part of GTA: SA. Want a VPS with unmetered bandwidth & DDoS protection? View Unmetered VPS Plans How to Create a SA:MP Server on Linux If you want to run your own San Andreas Multiplayer server, we strongly recommend to use Linux for it, although there is a Windows server version too. At first you have to select an operating system. While Ubuntu will work nicely, we would recommend that you use CentOS 7 instead. CentOS 7 is a Linux distribution based on Red Hat Enterprise Linux, which offers great performance improvements over CentOS 6 and will be just perfect to run your San Andreas Multiplayer server. Let’s not beat around the bush and proceed with the commands you need to run to quickly set up a SAMP 0.3.7 R2 server on CentOS 7. You should be logged in as “root” and first run the following command to open port 7777 UDP, which is the default game port that players will connect to: firewall-cmd –permanent –zone=public–add-port=7777/udp systemctl firewalld reload Note: Each line is a separate command Next we make sure our system is up to date and the packages that we need are installed: yum -y update yum -y install libstdc++.i686 glibc.i686 wget tar Now it’s always a good idea to run applications under any system user that’s not root. So let’s create a new user that we can run the SAMP server under. Let’s call that user “sampy” and switch to it right after creating it: adduser sampy su sampy – That’s it already – the default shell is already Bash, which is fine. Now let’s get to installing the actual SA-MP server using our new user which we just switched to from root with the last command above (hint: you can check which user you’re using with the command “whoami”): cd ~ wget -O ~/samp.tar.gz http://files.sa-mp.com/samp037svr_R2-1.tar.gz tar xfvz samp.tar.gz cd samp03 sed -i ‘s/rcon_password changeme/rcon_password s3cr3t/’ server.cfg ./samp03svr & This will change your RCON password to “s3cr3t” and start the San Andreas Multiplayer server in the background. If you want to use a different RCON password or change any other setting of your server, simply open the file named “server.cfg” with a text editor such as “vim” or “nano” and edit it accordingly. If you want to stop your SA-MP server, just run the command: killall -9 samp03svr These are just a few limited instructions on how to get a basic SAMP server running on CentOS 7. If you need more information, you should check the official installation instructions. What Is SA:MP DDoS? Mostly due to competition between server operators, SAMP is a popular target of so-called DDoS attacks, which stands for Distributed Denial of Service attack. A DDoS attack is a flood of network packets designed to make the target unresponsive, ie. bring down the game server. There are even specific attack tools that simulate legitimate game traffic of SAMP. Now for a small demonstration let’s look at a DoS tool called DOSaMp03z, which is designed to bring down a SAMP server. DOSaMp03z generates UDP protocol network packets similar to the ones used by the legitimate game client. The tool allows you to select a target host and target port and then it starts flooding the server with bogus packets like the ones below. In this example 192.168.2.20 is the source of the attack and 192.168.2.30 is the game server: 15:23:14.971862 IP (tos 0x0, ttl 128, id 15287, offset 0, flags [none], proto UDP (17), length 604)192.168.2.20.58602>192.168.2.30.7777:[udp sum ok] UDP, length 57615:23:14.972096 IP (tos 0x0, ttl 128, id 15288, offset 0, flags [none], proto UDP (17), length 604)192.168.2.20.58602>192.168.2.30.7777:[udp sum ok] UDP, length 57615:23:14.972540 IP (tos 0x0, ttl 128, id 15289, offset 0, flags [none], proto UDP (17), length 604)192.168.2.20.58602>192.168.2.30.7777:[udp sum ok] UDP, length 57615:23:14.972984 IP (tos 0x0, ttl 128, id 15290, offset 0, flags [none], proto UDP (17), length 604)192.168.2.20.58602>192.168.2.30.7777:[udp sum ok] UDP, length 57615:23:14.973308 IP (tos 0x0, ttl 128, id 15291, offset 0, flags [none], proto UDP (17), length 604)192.168.2.20.58602>192.168.2.30.7777:[udp sum ok] UDP, length 57615:23:14.973634 IP (tos 0x0, ttl 128, id 15292, offset 0, flags [none], proto UDP (17), length 604)192.168.2.20.58602>192.168.2.30.7777:[udp sum ok] UDP, length 57615:23:14.974045 IP (tos 0x0, ttl 128, id 15293, offset 0, flags [none], proto UDP (17), length 604)192.168.2.20.58602>192.168.2.30.7777:[udp sum ok] UDP, length 576 The full packet in ASCII looks like this: 15:30:27.755385 IP (tos 0x0, ttl 128, id 13223, offset 0, flags [none], proto UDP (17), length 604)192.168.2.20.56776>192.168.2.30.7777:[udp sum ok] UDP, length 576 E..\3……z…5…2…a.H6..RI.7…..X..y..Y/..L.y.L…L.Y.L.LSL.L.Ls;.L&.ZL..>L.M.L.-&;.]……7…..X..y..Y/..L.y.L…L.Y.L.LSL.L.Ls;.L&.ZL..>L.M.L.-&;.]……7…..X..y..Y/..L.y.L…L.Y.L.LSL.L.Ls;.L&.ZL..>L.M.L.-&;.]……7…..X..y..Y/..L.y.L…L.Y.L.LSL.L.Ls;.L&.ZL..>L.M.L.-&;.]……7…..X..y..Y/..L.y.L…L.Y.L.LSL.L.Ls;.L&.ZL..>L.M.L.-&;.]……7…..X..y..Y/..L.y.L…L.Y.L.LSL.L.Ls;.L&.ZL..>L.M.L.-&;.]……7…..X..y..Y/..L.y.L…L.Y.L.LSL.L.Ls;.L&.ZL..>L.M.L.-&;.]……7…..X..y..Y/..L.y.L…L.Y.L.LSL.L.Ls;.L&.ZL..>L.M.L.-&;.]……7…..X..y..Y/..L.y.L…L.Y.L.LSL.L.Ls;.L&.Z The effect this has on the SA-MP server is that it gets confused by these packets and starts utilizing 100% of the CPU resources until it crashes or drops players. The tool we selected to showcase this attack is a quite dumb one – continue reading to find out why and how to block this – but there are more sophisticated DDoS tools out there that can’t be blocked as easily. Do I Need DDoS Protection for SA:MP? We already learned that SAMP is a popular target of DDoS attacks. So if you run a SAMP server, it is very likely that someone will attack it sooner or later. If you find yourself in this situation, you need DDoS protection for your SAMP server. SAMP DDoS protection is nothing that every hosting provider can offer, due to the very specific attack tools that servers are being hit with. Most provider who offer DDoS protection with their hosting services only protect against very generic network layer attacks, such as SYN floods and DNS amplification attacks to name only a few of the many attack methods that hackers have at their disposal. While this generic sort of protection might be sufficient for online services that just want some sort of insurance or are only under attack from time to time, they will quickly reach their limits when it comes to sophisticated application layer attacks that mimic the legitimate protocol traffic of an application, like the DoS attack tools for SAMP. This means that a SAMP game server operator will likely face major issues with off the shelf solution by larger hosting and DDoS protection providers sooner or later. That’s why instead of using an unprotected network or a mainstream DDoS protection provider, it makes sense to select a provider that can actually offer application specific anti DDoS filtering for SAMP. This makes sure that you don’t wake up to any bad surprises later on once your game server is popular enough. For that i recommend SovaHost , a very good antiDDOs provider partnered with OVH How to Protect SA:MP From DDoS While you can use iptables rules like the ones we’ll be discussing now to mitigate some of the DoS packets that SAMP DDoS tools generate, they won’t help a lot against larger attacks. There are many larger scale attacks, such as NTP amplification and SYN flood attacks, that you can’t deal with directly on your server, because they’re simply too large for it. However you can block a few of these attacks with iptables, so let’s see how. SA:MP Anti DDoS IPTables Rules Earlier we looked into how the attack traffic of a SAMP DoS tool called DOSaMp03z looks like, remember? 15:23:14.973634 IP (tos 0x0, ttl 128, id 15292, offset 0, flags [none], proto UDP (17), length 604)192.168.2.20.58602>192.168.2.30.7777:[udp sum ok] UDP, length 576 Luckily this attack is easy to block, because it has very distinct patterns that the legitimate game traffic doesn’t have. Are you able to spot them? Here’s a little help: every bad packet has a TTL value of 128 and a length of 604. Neither of these patterns occur with legitimate game packets, which means they can be used to distinguish and block the DoS attack traffic, while letting through the good packets. While it’s probably safe to use either pattern to block this attack, we want to be completely sure it doesn’t affect any legitimate players and therefore we’re only going to block packets that match both patterns. Anti DDoS SAMP rules for IPTables: iptables -N SAMP-DDOS iptables -A INPUT -p udp –dport 7777-m ttl –ttl-eq=128-j SAMP-DDOS iptables -A SAMP-DDOS -p udp –dport 7777-m length –length 17:604-j DROP What these rules do is they first create a new iptables chain called “SAMP-DDOS”. Then there is a rules that matches all UDP packets with destination port 7777 (which is our game port) and a TTL (Time To Live) of 128 and forwards them to the “SAMP-DDOS” iptables chain. In that chain there is a second rule that matches all packets with protocol number 17 and a length of 604 and drops them. Effectively this means that these iptables anti DDoS rules will drop all UDP packets towards port 7777 that have a TTL of 128 and a length of 604, which all packets generated by that particular DoS tool have. If you want to also block another well known DDoS tool called UDP Unicorn, which is a bit more advanced, you can just block all UDP packets with a TTL of 128, because that’s the pattern that every attack initiated with UDP Unicorn has. This means that you would want to use a more generic version of the anti DDoS rule above to block this DoS tool too, i.e. just: iptables -A INPUT -p udp -m ttl –ttl-eq=128-j DROP In addition to the above rules you can also try to limit UDP packets per source IP address with your game port as destination. This is a type of iptables rule that people very often suggest to mitigate the effects of a DoS, but actually chances are that it doesn’t help much against attacks and could also affect legit game traffic. So if you must you can try the below rule and maybe it helps against one or two attacks: iptables -A INPUT -p udp –dport 7777-m limit –limit 6/s –limit-burst 12-j DROP Using iptables is not a permanent solution to this issue however, especially not the rules that just limit packets, as they are usually not efficient at blocking bad packets or play nice with legitimate connections. Also there are just too many attacks that have complex patterns or overwhelm every server. DDoS Protected Hosting The best solution is to move your whole SAMP server to a provider who not only offers generic protection, but also anti DDoS rules particularly designed to protect SAMP servers from DDoS attacks. SovaHost is that kind of provider. Generally it’s a good idea to start with a small VPS with DDoS protection or a protected VPS with unlimited traffic, which will be able to smoothly run your SAMP server due to its ultra-fast SSD storage and high-frequency DDR4 RAM (of course CentOS 7 is available as an operating system). If you run a larger server, you can also select a dedicated server which offers more powerful resources.
How to Setup Your Own Free VPN |The easy Way (Updated 2020)
Introduction VPN, or virtual private network, is a secure method of connecting remote internet resources as if they were under the same LAN. OpenVPN is a popular implementation that works on Linux, Windows, and Mac operating systems and can create complex, encrypted networks between physically dispersed servers. The OpenVPN Access Server is a solution built on top of traditional OpenVPN used as a complete portal for managing connections, users, and interfaces. It provides the underlying VPN instance, a web interface for managing the suite, and a client that can be used within a web browser. In this guide, we’ll install and configure the OpenVPN Access Server on a CentOS 6.9 VPS instance. Why you need a VPN ? A VPN server can be used to hide your real ip on your PC or Android Device, a VPN server can be used to create a secure network link when you connect to free or open wifi Hot Spots! So OpenVPN is very important for your private data safety First you need a VPS You will need to buy a VPS to host your VPN, Sovahost.net offers fast VPS for only € 5.99/mo you can see the offer following this link but you can use this guide on any other provider. Download and Install Packages We can obtain the OpenVPN Access Server package for CentOS from the project’s website . Right-click on the package that matches your version of CentOS and your machine’s architecture. Select the “copy link address” item or whatever option is closest. On your CentOS VPS, download the package with curl -O (that’s the letter “o”, not a zero) followed by the URL you copied from the page. In my case, this turned out to be: For Centos 7 yum -y install https://as-repository.openvpn.net/as-repo-centos7.rpm
yum -y install openvpn-as For Centos 8 yum -y install https://as-repository.openvpn.net/as-repo-centos8.rpm
yum -y install openvpn-as For Ubuntu 18 apt update && apt -y install ca-certificates wget net-tools gnupg
wget -qO – https://as-repository.openvpn.net/as-repo-public.gpg | apt-key add –
echo “deb http://as-repository.openvpn.net/as/debian bionic main”>/etc/apt/sources.list.d/openvpn-as-repo.list
apt update && apt -y install openvpn-as For Ubuntu 16 apt update && apt -y install ca-certificates wget net-tools gnupg
wget -qO – https://as-repository.openvpn.net/as-repo-public.gpg | apt-key add –
echo “deb [arch=amd64] http://as-repository.openvpn.net/as/debian xenial main”>/etc/apt/sources.list.d/openvpn-as-repo.list
apt update && apt -y install openvpn-as For Debian 10 apt update && apt -y install ca-certificates wget net-tools gnupg
wget -qO – https://as-repository.openvpn.net/as-repo-public.gpg | apt-key add –
echo “deb http://as-repository.openvpn.net/as/debian buster main”>/etc/apt/sources.list.d/openvpn-as-repo.list
apt update && apt -y install openvpn-as For Debian 9 apt update && apt -y install ca-certificates wget net-tools gnupg
wget -qO – https://as-repository.openvpn.net/as-repo-public.gpg | apt-key add –
echo “deb http://as-repository.openvpn.net/as/debian stretch main”>/etc/apt/sources.list.d/openvpn-as-repo.list
apt update && apt -y install openvpn-as After installing the package, an administration account is created called OpenVPN. However, no password has been set. Set a password for the administrator’s account by typing: sudo passwd openvpn Now, the command line configuration steps are complete. The rest of the guide will focus on configuring options through the web interface. Accessing the Web Interface We can access our VPN portal by going to our server’s IP address or domain name, at port 943. The server operates using TLS, so we will need to specify the HTTPS protocol. For our initial interaction, we actually want to go to the administrative interface, which is the same, except ending with /admin: https://server_ip_or_domain:943/admin We can access our VPN portal by going to our server’s IP address or domain name, at port 943. The server operates using TLS, so we will need to specify the HTTPS protocol. For our initial interaction, we actually want to go to the administrative interface, which is the same, except ending with /admin: https://server_ip_or_domain:943/admin You will get a warning that the site’s SSL certificates are not trusted: This is expected and perfectly fine. All that this is telling us is that OpenVPN is using a self-signed SSL certificate, which is not trusted by default by our browser. We can click on the “Proceed anyway” button or whatever similar option you have. Note: If you are unable to connect to the web interface, there’s a chance that OpenVPN is bound to the wrong network interface. You can verify this by typing: sudo netstat -plunt | grep openvpn If the response does not show your server’s public IP address, you will need to manually reconfigure it by typing: sudo /usr/local/openvpn_as/bin/ovpn-init Delete the current configuration by typing DELETE at the prompt. Next, accept the license agreement and press ENTER to mark this as the primary server. In the next prompt, select (1) all interfaces: 0.0.0.0 to bind to all interfaces. This will ensure that the access server is available in spite of a bind error in the OpenVPN installer. Press ENTER to accept the default values of the remaining prompts.
After reconfiguring, you should be able to access the web interface after accepting the SSL certificate in your browser.
You will be presented with the admin login page. Use the username openvpn and the password you set for this user: You will be taken to the OpenVPN Access Server’s EULA, which you will have to agree to if you wish to continue: Once you log in, you can see the administrative interface, complete with some useful at-a-glance stats on the landing page: Here, you can configure your VPN server. The access server separates the web interface and the actual VPN access and each can be configured independently.
For instance, if you go to the Server Network Settings in the left-hand menu, you will see a page where you can configure the port and interface that each component operates on. You can also specify the address pool that will be available to the clients.
Another thing you might want to do is add users and configure the authentication methods. You can add VPN users that match your system users, or add users that you might be controlling through an LDAP server.
Logging in as a Client
When you are finished configuring things as an admin, you can visit the client portion by going to your IP address or domain name followed by port 943:
https://server_ip_or_domain:943
You will have to type in a username of a user that you have configured VPN access for: If you the user that you logged in as has been designated as an OpenVPN admin account, you will see an “Admin” button that can be used to take you back to the admin control panel. Either way, you will be taken to a page that will allow you to download software for your client to connect to the VPN server: If your desktop is Windows or OS X, or if you have an android or iOS device, you can download an OpenVPN Connect client that will operate within your browser. If your desktop is a Linux machine, you will be asked to download the normal VPN client.
You should follow the directions of the client of your choice. If you are using the Linux client, you’ll need to download the connection settings profile by clicking on the “Yourself” link: Using the regular Linux openvpn client, you can connect using something like this: sudo openvpn –config client.ovpnConclusion Now, you should have a portal that can be used to configure your VPN access. This is an easy to manage interface that can be set up once and configured on-the-fly. It automatically generates valid configuration files for your users to connect to the server, which can save a lot of headaches with explaining how to configure access. Connect Using your Android Device You can download the openVPN application from google store : https://play.google.com/store/apps/details?id=net.openvpn.openvpn&hl=en Connect Using your PC To connect from your PC you will need https://openvpn.net/client-connect-vpn-for-windows/ the installation is easy and straight forward.