One step at a time, have the server itself DOS resistant is another discussion, please put it on it's own thread. Le Dimanche 29 Mai 2005 11:51, Anton Oussik a écrit : > It's great that so much attention is being drawn towards making the > server list accessible. However, will it then not be easier to just > DoS attack the actual CF server? How resiliant is CF server to DoS > attacks? There already exist several methods that make the server > crawl even on fast hardware, such as loading huge maps and casting > several meteor storms. After providing a reliable way of clients to > connect to the server, the next step would be to make the server > itself be more reliable. > > _______________________________________________ > crossfire mailing list > crossfire at metalforge.org > http://mailman.metalforge.org/mailman/listinfo/crossfire -- -- Tchize (David Delbecq) tchize at myrealbox.com Public PGP KEY FINGERPRINT: F4BC EF69 54CC F2B5 4621 8DAF 1C71 8E6B 5436 C17C Public PGP KEY location: http://wwwkeys.pgp.net/pgpnet/wwwkeys.html -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available Url : http://shadowknight.real-time.com/pipermail/crossfire/attachments/20050529/884a1ce2/attachment.pgp