diff --git a/src/engine/server/sv_rcon.cpp b/src/engine/server/sv_rcon.cpp index 4c8cb635..0c759b88 100644 --- a/src/engine/server/sv_rcon.cpp +++ b/src/engine/server/sv_rcon.cpp @@ -44,7 +44,7 @@ static ConVar sv_rcon_maxsockets("sv_rcon_maxsockets", "32", FCVAR_RELEASE, "Max static ConVar sv_rcon_maxconnections("sv_rcon_maxconnections", "1", FCVAR_RELEASE, "Max number of authenticated connections before the server closes the listen socket", true, 1.f, true, MAX_PLAYERS, &RCON_ConnectionCountChanged_f); static ConVar sv_rcon_maxframesize("sv_rcon_maxframesize", "1024", FCVAR_RELEASE, "Max number of bytes allowed in a message frame from a non-authenticated netconsole", true, 0.f, false, 0.f); -static ConVar sv_rcon_whitelist_address("sv_rcon_whitelist_address", "", FCVAR_RELEASE, "This address is not considered a 'redundant' socket and will never be banned for failed authentication attempts", &RCON_WhiteListAddresChanged_f, "Format: '::ffff:127.0.0.1'"); +static ConVar sv_rcon_whitelistaddress("sv_rcon_whitelistaddress", "", FCVAR_RELEASE, "This address is not considered a 'redundant' socket and will never be banned for failed authentication attempts", &RCON_WhiteListAddresChanged_f, "Format: '::ffff:127.0.0.1'"); static ConVar sv_rcon_useloopbacksocket("sv_rcon_useloopbacksocket", "0", FCVAR_RELEASE, "Whether to bind rcon server to the loopback socket", &RCON_UseLoopbackSocketChanged_f); @@ -583,7 +583,7 @@ bool CRConServer::CheckForBan(CConnectedNetConsoleData& data) if (m_BannedList.size() >= RCON_MAX_BANNEDLIST_SIZE) { - const char* pszWhiteListAddress = sv_rcon_whitelist_address.GetString(); + const char* pszWhiteListAddress = sv_rcon_whitelistaddress.GetString(); if (!pszWhiteListAddress[0]) { Warning(eDLL_T::SERVER, "Banned list overflowed, please use a whitelist address; remote server access shutting down...\n"); diff --git a/src/resource/cfg/tools/rcon_server.cfg b/src/resource/cfg/tools/rcon_server.cfg index 3f902e5f..1c62f561 100644 --- a/src/resource/cfg/tools/rcon_server.cfg +++ b/src/resource/cfg/tools/rcon_server.cfg @@ -3,6 +3,6 @@ // See https://developer.valvesoftware.com/wiki/Source_RCON_Protocol for more information regarding RCON. // NOTE: This implementation is custom and differs slightly from Valve's implementation. -sv_rcon_password "" // !! WARNING !! Keep empty to disable RCON. Only enable this if you plan on using RCON. -sv_rcon_whitelist_address "" // This IP will never get disconnected or banned. Example [::FFFF:127.0.0.1]:37005 (counts for IPv4 and IPv6). -rcon_key "" // Base64 encoded AES-128 key that will be used to encrypt rcon traffic, leave this empty for a random key that gets printed to the console. +sv_rcon_password "" // !! WARNING !! Keep empty to disable RCON. Only enable this if you plan on using RCON. +sv_rcon_whitelistaddress "" // This IP will never get disconnected or banned. Example [::FFFF:127.0.0.1]:37005 (counts for IPv4 and IPv6). +rcon_key "" // Base64 encoded AES-128 key that will be used to encrypt rcon traffic, leave this empty for a random key that gets printed to the console. diff --git a/src/resource/cfg/tools/rcon_server_dev.cfg b/src/resource/cfg/tools/rcon_server_dev.cfg index b93cea0a..eecc34db 100644 --- a/src/resource/cfg/tools/rcon_server_dev.cfg +++ b/src/resource/cfg/tools/rcon_server_dev.cfg @@ -3,12 +3,12 @@ // See https://developer.valvesoftware.com/wiki/Source_RCON_Protocol for more information regarding RCON. // NOTE: This implementation is custom and differs slightly from Valve's implementation. -sv_rcon_password "" // !! WARNING !! Keep empty to disable RCON. Only enable this if you plan on using RCON. -sv_rcon_banpenalty "1" // Number of minutes to ban IP before removing from ban vector. -sv_rcon_maxfailures "5" // Max number of tomes a user can ignore RCON authentication before being banned. -sv_rcon_maxignores "5" // Max number of times a user can ignore the no-auth message before being banned. -sv_rcon_maxsockets "2" // Max number of accepted sockets before the server starts closing redundant sockets. -sv_rcon_whitelist_address "" // This IP will never get disconnected or banned. Example [::FFFF:127.0.0.1]:37005 (counts for IPv4 and IPv6). +sv_rcon_password "" // !! WARNING !! Keep empty to disable RCON. Only enable this if you plan on using RCON. +sv_rcon_banpenalty "1" // Number of minutes to ban IP before removing from ban vector. +sv_rcon_maxfailures "5" // Max number of tomes a user can ignore RCON authentication before being banned. +sv_rcon_maxignores "5" // Max number of times a user can ignore the no-auth message before being banned. +sv_rcon_maxsockets "2" // Max number of accepted sockets before the server starts closing redundant sockets. +sv_rcon_whitelistaddress "" // This IP will never get disconnected or banned. Example [::FFFF:127.0.0.1]:37005 (counts for IPv4 and IPv6). -rcon_debug "1" // Show RCON debug information ( ! slower! ). -rcon_key "WDNWLmJYQ2ZlM0VoTid3Yg==" // Base64 encoded AES-128 key that will be used to encrypt rcon traffic, leave this empty for a random key that gets printed to the console. +rcon_debug "1" // Show RCON debug information ( ! slower! ). +rcon_key "WDNWLmJYQ2ZlM0VoTid3Yg==" // Base64 encoded AES-128 key that will be used to encrypt rcon traffic, leave this empty for a random key that gets printed to the console.