Skip to content
This repository has been archived by the owner on Jul 21, 2024. It is now read-only.

Add advisory regarding OVH Game DDoS incompatibility #273

Merged
merged 5 commits into from
May 14, 2024
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 11 additions & 1 deletion _docs/geyser/port-forwarding.md
Original file line number Diff line number Diff line change
Expand Up @@ -123,16 +123,26 @@ Alternatively, try connecting to the server first on Java edition, then on Bedro

OVH:
1. Navigate to `Network interfaces`
2. Click on the `...` button on the table for your IP -> then `...` and `Configure the GAME firewall` -> `Add rule` -> `Other protocol` (or `minecraftPocketEdition` if available)
2. Click on the `...` button on the table for your IP -> then `...` and `Configure the GAME firewall` -> `Add rule` -> `Other protocol` ~~(or `minecraftPocketEdition` if available)~~
3. Add your Geyser port into `outgoing port`.


ssh-sysadmin marked this conversation as resolved.
Show resolved Hide resolved
SoYouStart (subsidiary of OVH):
1. Click the IP tab.
2. Click the gear at the right of the public IP address; select "Game mitigation".
3. Pick "Add a rule".
4. Select "minecraftPocketEdition" in the dropdown list and enter the target UDP ports.
5. Save and wait a few seconds for the changes to come into effect.

#### OVH/SoYouStart Filter Incompatibility Issue
The `minecraftPocketEdition` rule/filter/game type currently does not work and you must use the `Other` type.
ssh-sysadmin marked this conversation as resolved.
Show resolved Hide resolved

If you would like to continue using `minecraftPocketEdition`, you may disable the incompatible security feature by adding `-DGeyser.RakSendCookie=false` to your startup flags for Geyser (works regardless of whether you use plugin or standalone Geyser).
ssh-sysadmin marked this conversation as resolved.
Show resolved Hide resolved

For more information see:
[This issue on OVH's infrastructure roadmap](https://github.com/ovh/infrastructure-roadmap/issues/186)
[The pull request which implemented the security feature that caused the incompatibility](https://github.com/GeyserMC/Geyser/pull/4554)
ssh-sysadmin marked this conversation as resolved.
Show resolved Hide resolved

### Oracle Cloud/OCI
By default, Oracle Cloud will block all incoming traffic except for SSH and RDP. This must be resolved within Oracle Cloud itself and the Compute Instance running Geyser.

Expand Down