Skip to content

Conversation

@KyleSanderson
Copy link
Member

As a christmas gift to a peer I've finally looked at this problem. During the connection phase immunity rules are ignored and as a result a "lower level admin" can kick a "higher level admin" or queue a bunch of timers on them while they're still downloading the level. By adding these additional checks to InternalFilterCommandTarget I think we can fix this everywhere while not introducing any additional issues.

This is untested against master as my production gear is running an older version of core.

@Headline Headline added Bug general bugs; can be anything Needs Testing untested by author labels Dec 28, 2018
@Headline Headline self-requested a review December 28, 2018 06:56
@asherkin
Copy link
Member

The existing behaviour here is intentional, with this change you can't kick or ban someone spoofing a privileged user's SteamID.

@KyleSanderson
Copy link
Member Author

sm_rcon is the sudo of sourcemod. No matter what the user sets as their AuthID the user can always be removed by the console.

@Headline Headline removed their request for review May 24, 2019 13:41
@KyleSanderson
Copy link
Member Author

@asherkin do you still feel the same way about this?

@KyleSanderson KyleSanderson marked this pull request as draft March 30, 2023 04:16
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Bug general bugs; can be anything Needs Testing untested by author

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants