This forum is only for reproducible bugs with csf and lfd (i.e. not iptables problems, lack of understanding how to use a feature, etc). Posts must be accompanied with full technical details of the problem and how it can be recreated. Any posts not adhering to this, or not considered bugs, will be moved to the General Discussion (csf) forum.
We have found that IP addresses that you place in the csf.allow file are being overriden by SpamHaus and DShield banned IP addresses. We thought that the csf.allow would override anything in the csf.deny, SpamHaus, and DShield lists.
What is happening... is that with all the off-shore support stuff going on, that DShield/SpamHaus has some .PK IPs banned, yet one of our vendors use Pakistan for...
On two cPanel11 boxes with CSF we have identified a problem while receiving mail using POP3/IMAP.
During the send/receive process the client (Outlook, Thunderbird) shows the time remaining as 30+ mins for 50K e-mails, it happens randomly (not every send/receive) to random clients (but during some time all of them have experienced the problem at least once). We've tried and tested all possible...
Hi chirpy, upgraded to CSF 2.95 today on my webmin/home server and it appeared to upgrade fine. I wanted to remove some ports from the configuration and on restart it wouldn't come back up.
Restarting csf...
Flushing chain `INPUT'
Flushing chain `FORWARD'
Flushing chain `OUTPUT'
Error: Setting POP3D_LOG is repeated in /etc/csf/csf.conf - you must remove the duplicates and then restart csf and...
Does csf look at csf.tempban before it blocks an IP? I sometimes get a dozes emails about an IP that is blocked with too many connections. And it is then also listed a dozen times in csf.tempban.
I have configured for some time now to only block the specific service, but has been many clients that contacted me saying they are blocked in the entire server, no matter if they only attempted to login many times through ftp looks like they are being blocked in the entire server. Any idea?
The challange is to block all scanalert.com scans as they are apparently used by hackers to probe our servers.
Okay, so for the past two months we have collected all the scanalert IPs that we can and we have inserted these in an world accessible (via URL) list, and then inserted the URL in the GLOBAL_DENY = slot with an LF_GLOBAL = value of 1800
It seems in csf 2.90 check cpanel version for x86_64 does not work correct.
Your current version of cPanel is 11.11.0-RELEASE_17033. According to the cPanel site, the latest available is 11.11.0-RELEASE_16983, you should consider upgrading to ensure bugs and security patches are up to date
I installed CSF and LFD on a hardware node server on which VPSes are running through the OpenVZ virtualization. I had a problem with the initial CSF setup because it was blocking traffic comming through the virtual venet0 device.
So I created a csfpre.sh file with a few iptables rules that forward the venet0 traffic. It's working great but after the (automatic) CSF upgrade, I could not access...
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum