Search found 18 matches
- 16 Mar 2021, 18:37
- Forum: Suggestions (csf)
- Topic: Stop exposing servers to hackers and change [csf.error] -----> csf -x ; csf -e ; instead!
- Replies: 1
- Views: 6672
Re: Stop exposing servers to hackers and change [csf.error] -----> csf -x ; csf -e ; instead!
The reported error was reproduced again and the file has following contents: Error: FASTSTART: (SMTP Block IPv4) [ -I SMTPOUTPUT -p tcp -m multiport --dports 25,465,587 -m owner --uid-owner 0 -j ACCEPT] [iptables-restore v1.8.4 (nf_tables): Chain 'LOGDROPOUT' does not exist]. Try restarting csf with...
- 16 Mar 2021, 18:15
- Forum: Suggestions (csf)
- Topic: Stop exposing servers to hackers and change [csf.error] -----> csf -x ; csf -e ; instead!
- Replies: 1
- Views: 6672
Stop exposing servers to hackers and change [csf.error] -----> csf -x ; csf -e ; instead!
Hello, Suddenly csf stopped working because one table in iptables was missing. Then, it created a file "csf.error" and poured in some smart detection text to tell the admin, why and how he could be smarter. My server remained exposed for more than six hours. I could only notice when I trie...
- 23 Jul 2020, 17:47
- Forum: General Discussion (csf)
- Topic: [Centos 8 | Csf v14.04] Ping works but cluster ping -cp does not
- Replies: 1
- Views: 1898
Re: [Centos 8 | Csf v14.04] Ping works but cluster ping -cp does not
Forgot to mention:
As csf -cp does not work, the local csf -d will not block any remote csf -cd. This was the reason why I needed to trace the problem with above mentioned method.
As csf -cp does not work, the local csf -d will not block any remote csf -cd. This was the reason why I needed to trace the problem with above mentioned method.
- 23 Jul 2020, 16:37
- Forum: General Discussion (csf)
- Topic: [Centos 8 | Csf v14.04] Ping works but cluster ping -cp does not
- Replies: 1
- Views: 1898
[Centos 8 | Csf v14.04] Ping works but cluster ping -cp does not
Hello, ENV: Centos 8, Csf 14.04, iptables enabled and started as well as ICMP_IN = 0. I have added manually in iptables ICMP INPUT and OUTPUT for ping to work. I also have 192.168.0.0/24 in allow. With this, ping from 192.168.0.2 ---> to 192.168.0.3 and vise versa works. But csf -cp from 192.168.0.2...
- 23 Jul 2020, 08:10
- Forum: General Discussion (csf)
- Topic: [Centos 8 | Csf v14.04] No blocking and no logging
- Replies: 0
- Views: 2266
[Centos 8 | Csf v14.04] No blocking and no logging
Hello, ENV: Centos 8, Csf 14.04, iptables enable. I have tried to block a spammer, who installed a cron script to populate every ten and every eleven minutes in logfiles of my server with following: FQDN/login?dst=http%3A%2F%2Fbucket-img.y5en.com%2Fmessage%5Ficon%5Ffriends.png FQDN/login?dst=http%3A...
- 23 Jul 2020, 07:59
- Forum: General Discussion (csf)
- Topic: [Centos 8 | Csf v14.04] *Error* IPSET: [ipset v7.1: Sets cannot be swapped: the second set does not exist]
- Replies: 0
- Views: 2297
[Centos 8 | Csf v14.04] *Error* IPSET: [ipset v7.1: Sets cannot be swapped: the second set does not exist]
Hello,
In following message there is a bug:
In following message there is a bug:
Code: Select all
*Error* IPSET: [ipset v7.1: Sets cannot be swapped: the second set does not exist]
CC: Repopulating ipset cc_6_ua with IP addresses from [UA]
IPSET: loading set new_6_ua with 0 entries
IPSET: switching set new_6_ua to cc_6_ua
- 23 Jul 2020, 07:24
- Forum: Suggestions (csf)
- Topic: nftables
- Replies: 4
- Views: 11023
Re: nftables
In addition to that, nftables is much more efficient. What surprises me is that CSF has still not yet changed it to nftables. It was too late at the time of posting this thread.
- 12 Apr 2019, 18:37
- Forum: General Discussion (csf)
- Topic: Missing binary locations
- Replies: 1
- Views: 2658
Re: Missing binary locations
Why not reinstall it. Will be faster than any further discussions here. You will not loose anything in your conf as well.
- 12 Apr 2019, 18:36
- Forum: General Discussion (csf)
- Topic: Whitelisted IP being blocked
- Replies: 3
- Views: 4023
Re: Whitelisted IP being blocked
csf.ignore is a different area, different sequent of chains. You would still need the IP in csf.allow.
- 12 Apr 2019, 18:32
- Forum: General Discussion (csf)
- Topic: Filtering SMTP abuse?
- Replies: 1
- Views: 2578
Re: Filtering SMTP abuse?
Did you activate / configure connection tracking? If yes, this will be blocked.