From what I've known, CSF use a special installation config file for directadmin called csf.directadmin.conf and it contains a generic variable DIRECTADMIN=1
If we can use this check, maybe we can ignore the warning message.
LF_SSHD option check
This option helps prevent brute force attacks on your server services
LF_FTPD option check
This option helps prevent brute force attacks on your server services
LF_SMTPAUTH option check
This option helps prevent brute force attacks on your server services
LF_POP3D option check
This option helps prevent brute force attacks on your server services
LF_IMAPD option check
This option helps prevent brute force attacks on your server services
LF_HTACCESS option check
This option helps prevent brute force attacks on your server services
LF_MODSEC option check
This option helps prevent brute force attacks on your server services
SYSLOG_CHECK option check
or we can have an option to exclude / ignore permanently the warning message to get the green color satisfaction.
My idea is to replace this code from the file ServerCheck.pm at the line 274 (im not sure if this will work because im not a perl programmer):
Code: Select all
open(my $IN, "<", "/etc/csf/csf.conf");
flock($IN, LOCK_SH);
my@ conf = < $IN > ;
close($IN);
chomp@ conf;
if (my@ ls = grep {
$_ = ~/^\s*(DIRECTADMIN)\s*=\s*1/I}@
conf) {#
If csf.conf contains the value DIRECTADMIN = 1, which always true
if using directadmin installation method Don 't do anything
$status = 1 }
else
{
#Else print status
$status = 0 &addline($status,"$option option check","This option helps prevent brute force attacks on your server services"); }
Regards,
MaXi32 @ Arafat Ali (https://earth.sofibox.com)