Our server has been plagued with spam sent from malware on a handful of accounts. We bought CXS several days ago, but it hasn't been installed yet and we don't know why. In the meantime, I would like to execute a script to delete outgoing email from these accounts when there's a LOCALRELAY Alert for one of those accounts. So, I want to create a script to use with the RT_ACTION setting in...
I want to be able to allow access to my main hosting website for all traffic when someone is perm banned in the firewall.
It will be easier to manage clients when they are banned via support ticket on my site.
I have installed CSF on an Ubuntu VPS. It installed ok however, when i run perl /etc/csf/csftest.pl it returns the following output below.
Any help on this would be much appreciated! :)
Thanks
Andrew
Testing ip_tables/iptable_filter...FAILED - Required for csf to function
Testing ipt_LOG...FAILED - Required for csf to function
Testing ipt_multiport/xt_multiport...FAILED - Required for csf...
Im using ConfigServer Security & Firewall - csf v8.08
csf deny some IPs randomly, and i get no email from CSF for blocking that IP
It even blocks my own using IP also and it force me to go to WHM and do Firewall Restart.
and then problem resolve.
I even check those blocked IPs in Firewall Deny IPs , but i see those IPs not listed.
I dont know why this happens, please help me
I just spun up a new VPS, running Centos 7.1 and I have installed csf 8.08.
The first installation only gave me a score something like 45/69 (My other VPS has a max score of 140!)
So I uninstalled msg using the uninstall script and re-installed...
It is worth noting that after each install attempt, CSF is listed as not running and I need to run it manually.
Good evening, I disabled my php.ini on the line enable_dl = on = off to enable_dl.
But in the config server firewall still get a warning message asking to disable dl.
Obs. In my php.ini this off
I am getting alerts for memory usage and a user. Errors such as these are spamming my inbox:
• lfd on server: Excessive resource usage: username (13319 (Parent PID:10223))
And so forth. I changed the memory for PT_USERMEM in /etc/csf/csf.conf to 500 from 200 and issued `csf -r`. Sadly I am still getting erros about exceeding the amount of memory. Similarly I have tried to use csf.pignore with...
Is it possible to distinguish between real hacking attempts where a series of passwords is tried and a user who has input a wrong password in their mail program?
I have business clients that travel all the time and work together out of different venues each time.
Outlook for mac has the annoying habit of suggesting that the password might be wrong each time there is any issue with the...
Was wondering if someone could shed some light on this log message and tell me whether it is a normal spam assassin call that is being blocked by csf and if that is normal or is something misconfigured in csf? The dst port is 24441 which Pyzor uses to communicate with the server. I am seeing these every hour and it is quite annoying to say the least. Is there something amiss or can I somehow stop...
Recently did a new install of Config Server Firewall and performed most of the suggestions from the Check Server Security. Unfortunately in my haste, I changed something I should not have.
Now temporary/shared URL's ( are no longer accessible. Thsi means that the shared SSL certificate cannot be used and peeps are emailing me about page not found errors.
One IP is being blocked in iptables even when I already added to the csf.allow and csf.ignore I don't know what CSF rule is doing that, because I don't find anything related to the IP in system logs. If I check the iptables I found a DROP line when the IP is already blocked. Yesterday I enabled the WATCH_MODE but I don't know how to identify the cause of the block for the IP.
We have installed an email application (Sendy) to our virtual server.
*Added the dns names for the region for amazon
*Added user/cmd ignore list
However it is still getting banned by CT_LIMIT. We have increased this to 1000 to prevent the issue however I was wondering if there is a way we can exclude this process/user from the CT_LIMIT.
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum