Dokujisan wrote:divVerent wrote:Personally, I have absolutely no interest in this feature, as it's really not a good idea to do this in an open source game.
I'll give you a real-world example of why this would be useful.
I run some private servers that are quite popular. I have had one particular individual connect to my server and act like an ass to everybody. I've banned him by IP address multiple times. He just gets a new one from his ISP. I've ended up banning mutliple IP ranges with iptables. This is not ideal to me, because I also run a public server on the same box and I don't know how many people might be affected by that banning.
So divverent, what would you have me do to keep this guy off my private servers? I could change the ports, but then I would not be able to have a webpage about the servers that shows the list of players because someone could discover the port # through that page.
It seems that the best option is to password protect the server. Sure, they could discover the password by someone accidentally leaking it to them, and then I would have to change the password and notify everyone again, but this is the only thing I can imagine that would work.
You know that you can block IP's per port and per protocol with IP tables right? You can just ban the internet from the port that you run your private server on and not the port that you run your public server on. You can make these bans UDP exclusive, you can also configure them to silently drop packets from whoever you hate. (I _ALWAYS_ use the silent drop option when I " 'table " some IP range rather than the friendly disconnect (the normal ban type) option: this is because I want their connection to hang rather than just immedatily know it's not wanted: I want to waste their time as they try again and again to connect to whatever service they are banned from and get NO response WHATSOEVER (:D

) from the server: as if it dropped off the internet.
You can also, by default, drop all traffic to that port, and then selectiively allow traffic from the people you would theoretically give the password to. You set the drop iptable first, then after that line set ones that allow traffic through per ip. See, no need for password! (Ettercap connection hijacking, if one knows who any of the people are who are allowed into your server, and gains access to any computer on their LAN or Cable Lan segment (or router), still works, so no matter what without encryption your sunk against anyone who has any knowlege that tools to do such exist.)
Remeber: ALWAYS use the DROP option so you waste the time of whatever huge section of the internet you are banning. You WANT to waste their time as they wonder WHY there is NO response from your computer to theirs

! Deny == polite == NO!