Flooding?

[ script:mysql-async] [MariaDB:10.5.12-MariaDB-0+deb11u1] [WARNING] [gang] [3830ms] SELECT * FROM gangs_member WHERE playerIdentifiers = ?

Dont know if this is the right topic but we have constant problem with people wich are flooding the server db is ther any way to block this?

Help would be much appriciated :frowning:

PS: The error above get litteraly spammed thousands of times in the shortest amount of time

1 Like

That looks like bad scripts, not flooding.

wow thats a realy helpful answer …

I really can’t tell you more than what the error already tells you:

[ script:mysql-async] [MariaDB:10.5.12-MariaDB-0+deb11u1] [WARNING] [gang] [3830ms] SELECT * FROM gangs_member WHERE playerIdentifiers = ?

Mysql-Async is taking a loooonnngggg time to load the query (3830ms = almost 4 seconds!).

Do you see players connecting thousands of times in the shortest amount of time?

Because if not, there shouldn’t be any other good reason to query the db that many times, unless of course, you accidentally query the db inside a loop, hence bad scripts.

its only when modder connect to the server. Evertime a modder connects it goes crazy

Then, again, fix your scripts to not be exploitable.

Wow not helpful at all the people here. cya -.-"

besides of that the security breach IS NOT on our end to be clear

1 Like

On whose end would it be, then?

So far, it seems like whatever this ‘modder’ does is ask your server to run code, which your server scripts allow them to run, and that code is apparently making slow database calls leading to the hangs you’re experiencing.

Without access to your server files, we can’t really ‘be helpful’ as we have no idea what resources you are running.

Unfortunately, you don’t seem to know exactly what resources are running on your server…
Stop or rewrite the gang resource.

It sounds like you have some sort of server event that queries the database anytime it’s called without checking, in which case a modder would just trigger it on a Wait(0) loop to attack your server. All you have to do is to implement some sort of timeout per player when it comes to that server event, or have the event work using a runtime table instead of querying the database everytime. Or both ideally. Hell i’d even check if the player is on the right marker position serverside before even running anything.

so you are saying that ALL ressources we are using are exploitable? xD

they even trigger the default esx ressources too wich are the dafaulted ones if we are disabling the gang ressources

… huh? ‘ESX’ isn’t even a ‘default’ resource, and it’s known for being badly written and exploitable, with the maintainers having expressed no intent to fix it.

Are you sure you aren’t in the wrong place here?

well by the answers you give and how you write your answers i guess im not right here with such unfriendly guys like you

And on that extremely hypocritical note, that’s the end for this topic.

User doesn’t seem to want to be helped.