Skip to content
This repository has been archived by the owner on Jul 21, 2024. It is now read-only.

Add advisory regarding OVH Game DDoS incompatibility #273

Merged
merged 5 commits into from
May 14, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
11 changes: 10 additions & 1 deletion _docs/geyser/port-forwarding.md
Original file line number Diff line number Diff line change
Expand Up @@ -123,7 +123,7 @@ Alternatively, try connecting to the server first on Java edition, then on Bedro

OVH:
1. Navigate to `Network interfaces`
2. Click on the `...` button on the table for your IP -> then `...` and `Configure the GAME firewall` -> `Add rule` -> `Other protocol` (or `minecraftPocketEdition` if available)
2. Click on the `...` button on the table for your IP -> then `...` and `Configure the GAME firewall` -> `Add rule` -> `Other protocol` ~~(or `minecraftPocketEdition` if available)~~
3. Add your Geyser port into `outgoing port`.

SoYouStart (subsidiary of OVH):
Expand All @@ -133,6 +133,15 @@ SoYouStart (subsidiary of OVH):
4. Select "minecraftPocketEdition" in the dropdown list and enter the target UDP ports.
5. Save and wait a few seconds for the changes to come into effect.

#### OVH/SoYouStart Game Firewall Incompatibility Issue
The OVH GAME filter type `minecraftPocketEdition` currently does not work and you must use the `Other` type.

If you would like to continue using the filter type `minecraftPocketEdition`, you may disable the incompatible security feature by adding `-DGeyser.RakSendCookie=false` to your Java server's (or Geyser Standalone proxy's) startup flags.

For more information see:
- [This issue on OVH's infrastructure roadmap](https://github.com/ovh/infrastructure-roadmap/issues/186)
- [The pull request which implemented the security feature that caused the incompatibility](https://github.com/GeyserMC/Geyser/pull/4554)

### Oracle Cloud/OCI
By default, Oracle Cloud will block all incoming traffic except for SSH and RDP. This must be resolved within Oracle Cloud itself and the Compute Instance running Geyser.

Expand Down