Search found 11 matches
- 11 Nov 2015, 15:29
- Forum: General Discussion (csf)
- Topic: Login Failure Daemon or Login Tracking?
- Replies: 7
- Views: 8166
Re: Login Failure Daemon or Login Tracking?
the mistress that is regex. . . I use this tool to work out my rules. http://www.regexr.com/ Paste in a few different lines of the error log you are looking for, than start playing with the regex and get it to match. Start off by escaping "\" the reserved characters "[]." and the...
- 03 Mar 2015, 23:31
- Forum: General Discussion (csf)
- Topic: LDF - Excessive resource usage spamd
- Replies: 1
- Views: 3058
Re: LDF - Excessive resource usage spamd
I came across this post searching for the same exe.
Other posts said to just whitelist it. It is my understanding that this has something to do with email. What if I do get hacked and some other file starts sending email, will it not use this same process?
Other posts said to just whitelist it. It is my understanding that this has something to do with email. What if I do get hacked and some other file starts sending email, will it not use this same process?
- 03 Feb 2014, 15:13
- Forum: General Discussion (csf)
- Topic: DirectAdmin virtual domain error logs not included.
- Replies: 12
- Views: 14486
Re: DirectAdmin virtual domain error logs not included.
I see I can set this in the Virtualmin Templates, so all new sites would use a common log. I need to look into this further. Thanks for the help.
- 03 Feb 2014, 14:15
- Forum: General Discussion (csf)
- Topic: Login Failure Daemon or Login Tracking?
- Replies: 7
- Views: 8166
Re: Login Failure Daemon or Login Tracking?
so I just added the log file to /var/csf/csf.syslogs and it is monitoring it, but how do I get it to pickup on the log lines
Code: Select all
[Mon Feb 03 10:04:49 2014] [warn] [client 99.192.110.216] mod_fcgid: stderr: user authentication failure, referer: http://www.****.ca/administrator/index.php
- 03 Feb 2014, 00:43
- Forum: General Discussion (csf)
- Topic: Login Failure Daemon or Login Tracking?
- Replies: 7
- Views: 8166
Re: Login Failure Daemon or Login Tracking?
I think CSF should be reading the error logs of all the sites. How do I get CSF to read/monitor extra logs? And better yet, with a wild card?
- 03 Feb 2014, 00:40
- Forum: General Discussion (csf)
- Topic: Excessive resource usage: munin
- Replies: 1
- Views: 4553
Re: Excessive resource usage: munin
add user: munin
or exe:/usr/local/cpanel/3rdparty/perl/514/bin/perl
or exe:/usr/local/cpanel/3rdparty/perl/514/bin/perl
- 03 Feb 2014, 00:38
- Forum: General Discussion (csf)
- Topic: DirectAdmin virtual domain error logs not included.
- Replies: 12
- Views: 14486
Re: DirectAdmin virtual domain error logs not included.
I have a similar situation using virtualmin. I too would like to know how to add logs to be monitored
- 28 Jan 2014, 15:59
- Forum: General Discussion (csf)
- Topic: Login Failure Daemon or Login Tracking?
- Replies: 7
- Views: 8166
Login Failure Daemon or Login Tracking?
Server Details; OS: Ubuntu 12.04 LTS Virtualmin/Webmin I have a joomla site getting brute force attacks. Joomla brute force attack extensions can limit the login attempts, but the server is still loaded with calls to the blocked login. I'd rather block the IP via CSF. I have an extension using the f...
- 03 Jan 2014, 14:29
- Forum: General Discussion (csf)
- Topic: how to ignore
- Replies: 1
- Views: 3183
Re: how to ignore
For anyone else who may find this, I figured it out; For the "Suspicious process running under user postgrey" I had ignored the postgrey UID under csf.uidignor - That DOES NOT WORK. I had to go under the csf.pignor and enter user:postgrey That took care of the hourly emails. As for the &qu...
- 31 Dec 2013, 17:07
- Forum: General Discussion (csf)
- Topic: how to ignore
- Replies: 1
- Views: 3183
how to ignore
I am already ignoring the user via it's ID, but keep getting this email Subject: ...Suspicious process running under user postgrey Time: Tue Dec 31 12:24:39 2013 -0400 PID: 14373 (Parent PID:14373) Account: postgrey Uptime: 18584 seconds Executable: /usr/bin/perl Command Line (often faked in exploit...