There's a lot out there about various methods to secure SSH access better.
But on a Cpanel server, in my opinion, access to WHM gives the user a degree of privileges near that of logging into SSH via root. So I have a few questions for discussion.
First, let me setup the context for the application of these methods. It's a server that does not have to be HIIPA or FICA compliant. It just has one...
I am trying to configure the HTTPS messenger service to give an HTML error message when an IP address is blocked. It's working, but very slow. When I usee httpie, I get the following error:
http: error: SSLError: certificate verify failed (_ssl.c:579) while doing GET request to URL:
With Firefox, it works, but takes well over a minute before the page loads. I have no idea where the holdup...
Hi,
CSF stops almost every night. I receive the following error message:
/var/log/lfd.log
Jun 19 03:20:16 server lfd : iptables appears to have been flushed - running *csf startup*...
Jun 19 03:20:18 server lfd : csf startup completed
Jun 19 03:20:18 server lfd : *Error* csf reported an error (see /etc/csf/csf.error). *lfd stopped*, at line 7146
Jun 19 03:20:18 server lfd : daemon stopped
Jun...
I use scanmyserver.com to do an audit of my server. I was looking through the ModSec logs and saw an IP address that was there more than five times, performing a scan. I was curious as to why csf hadn't blocked them. So I went into the GUI and searched for the IP and then realized the IP belonged to scanmyserver, however, the IP address is also listed in the GreenSnow blocklist.
If I wanted to whitelist my server's IPv6 local loopback address, do I need to whitelist:
::1/128
fe80::/10
Or would
::1/128
be enough? Essentially, is it a good idea to whitelist the link-local address (fe80)? Also, should it be fe80::/10 or fe80::/64? I'm still struggling a little with the IPv6 stuff.
So it didn't take me long to realize that IP's are not actually being banned when using Cloudflare because iptables isn't looking for X-Forwarded-For in the header (is this even possible?) So the attack comes from Cloudflare IP, which of course is whitelisted, so the server is completely unprotected.
So after reading the documentation, I found BLOCK_REPORT which I can use to fire off an API call...
Hello
I have a mail user witch IP is continuously TCP_IN blocked for portscan.
When I look at the log it uses an MAC-destination:MAC-source:Mac-type combination that is always the same but with different IP all over the world.
But my mailuser says he has a fixed IP !
Does anyone know what is happening ?
Thanks for your help.
Marc
Hi, i'm getting tens of thousands emails per month from cxs and the subject for most of them is in the form of :
cxs on server.server.com (Hits:1)(Viruses:0)(Fingerprints:0)
Is there a way to get this reports only when a virus is detected ?
The command that is shown in the email body is :
(/usr/sbin/cxs --allusers --nobayes --clamdsock /var/clamd --defapache nobody --doptions Mv --exploitscan...
I originally posted on to but realised it was marked as
We have the reCaptcha working on all servers except one. The one server shows Failed to pass human test. Please try again.
I can see that on all the other servers there is an unblock.txt file in eacg /home/csf/ directories. This non-working server does not have this file. I've checked that the csf user has permission to write to...
We have a CentOS 7 server where we are running CSF v10.04.
On this server we have Qmail as the MTA (part of Plesk 12.5) and it logs to rsyslog via the 'root' user.
I checked /etc/csf/csf.syslogusers and root is already included in the file by default. However, root does not get added to the mysyslog group as confirmed by the following command:
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum