ConfigServer IPv6 Implementation

We are in the process of adding IPv6 connectivity to all of our domains. This has been enabled on, and so far.

Due to the way implementation of IPv6 often works over protocols and applications, connections and requests will usually prefer IPv6 over IPv4 connections and DNS resolution.

If you see IPv6 connectivity issues, ensure that you have enabled outgoing connections to port 80 and 443 in TCP6_OUT in your csf.conf.

If you still see problems, you will have to investigate your IPv6 server configuration to resolve the issue, or disable IPv6 on the server if it does not work.

New csf v7.73


  • Fix for temporary denies allowing duplicate IP/Port blocks/allows
  • Speedup csf –grep [ip] when searching IPSET sets. Note: This does mean that partial IP queries will no longer match IPSET entries
  • Added new options LF_IPSET_HASHSIZE and LF_IPSET_MAXELEM to allow for larger ipset sets
  • Added option HOST as the location of the “host” binary for DNS TXT record lookups
  • Modified X_ARF report to include the abuse contact for a reported IP address where found in the Abusix Contact DB
  • Added new option X_ARF_ABUSE. This option allows for automatic sending of X_ARF reports to the IP addresses abuse contact. See csf.conf for warnings about using this option
  • Added binary location checking in csf and issue warnings if incorrect, not installed or not executable

New csf v7.72


  • Added new option PT_SSHDHUNG. Terminate hung SSHD sessions. When under an SSHD login attack, SSHD processes are often left hung after their connecting IP addresses have¬† been blocked. This option will terminate such processes. See csf.conf for more info
  • Added new binaries to csf.pignore on existing cPanel installations to cater for v11.50 and CentOS v7
  • LF_CONSOLE_EMAIL_ALERT and LF_WEBMIN_EMAIL_ALERT now default to 1 for new installations
  • Updated Server Check ipv6 detection
  • Updated sanity checks

New cxs v5.30


  • Modify cPanel install.txt to add the ConfigServer ModSecurity Vendor option
  • Added new advanced PHP decoders
  • Exploit fingerprint definitions database additions

New csf v7.71


  • Added warning on cPanel servers for GreyListing
  • Fixed issue with RedHat/CentOS/CloudLinux v7 where local IPs were not being successfully detected from IFCONFIG

cPanel ModSecurity Vendor for cxs

We have created a ModSecurity Vendor that you can now use to import the cxs ModSecurity rules. To use this new feature you need to:

1. Remove the cxs ModSecurity rule block from /usr/local/apache/conf/modsec2.user.conf

2. Use the inbuilt cPanel ModSecurity Vendor Rules mechanism by either:

a) WHM > ModSecurity Vendors > Add Vendor > Vendor Configuration URL:

Save and then restart httpd


b) Issue the following commands:

/scripts/modsec_vendor add
/scripts/modsec_vendor enable configserver

Then restart httpd

You can have the ConfigServer Vendor enabled along with any other Vendor that you may already be using.

cxs and ModSecurity v2.9

If you are using ModSecurity v2.9 with Apache you will need to add an extra ModSecurity directive to the cxs upload scanning rule for it to function as ModSecurity have changed the way that the @inspectFile function works:

SecUploadKeepFiles RelevantOnly

On a cPanel server this means that you need to edit:


and add the line above after the cxs ModSecurity rule and then restart httpd.

New cxs v5.29


  • Modified documentation to address changes in ModSecurity v2.9 that requires the following is set as part of the ModSecurity config:
    SecUploadKeepFiles RelevantOnly
  • Exploit fingerprint definitions database additions

New cmm v1.33


  • Added options to bulk show/enable/disable GreyListing, if WHM option enabled
  • Added options to show/enable/disable GreyListing per domain, if WHM option enabled