|
Dictionary Attack overview:
A method used to break security systems, specifically password-based security systems, in which the attacker systematically tests all possible passwords beginning with words that have a higher possibility of being used, such as names and places. The word “dictionary” refers to the attacker exhausting all of the words in a dictionary in an attempt to discover the password. Dictionary attacks are typically done with software instead of an individual manually trying each password.
Below code is to be placed in your server.cfg (Edit to your own preferances)
sv_rcon_minfailures 3
// # of failures needed before ban
sv_rcon_minfailuretime 600
// amount of time (seconds) failed rcon attempts must occur within for the ban to be applied
sv_rcon_banpenalty 0
// minutes to ban. 300 = 5 hours.
sv_rcon_maxfailures 3
// similar to sv_rcon_minfailures, except this setting doesn't rely on sv_rcon_minfailuretime. Any IP address that fails 3 rcon authentications (during a server uptime session) will be banned for the banpenalty.
Not so common these days (An easier way of getting the password is possible via an exploit) and a strong password would work just as well.
本来上面的英文里说的很清楚,不过偶看不懂 |
|