Fixed bug in the generic csf release where the default csf.conf was missing the DROP, CT_STATES and GLOBAL_IGNORE settings – Thanks to Jim for the help in tracking the issue down
Rewritten the update code so that a new csf.conf is creating when upgrading. It now uses the latest csf.conf and transfers the existing settings to the new configuration file. This way all installations are sure to have all new settings and the latest comments. It also makes the release process for new builds much simpler
Auto-whitelist all DNS traffic to/from IPs in /etc/resolv.conf
Modified csf.conf text for new installations to account for auto-configuration of ETH_DEV which has been the case for some time:# By default, csf will auto-configure iptables to filter all traffic except on# the local (lo: ) device. If you only want iptables rules applied to a specific# NIC, then list it here (e.g. eth1, or eth+ )ETH_DEVICE = “”# If you don’t want iptables rules applied to specific NICs, then list them in# a comma separated list (e.g “eth1,eth2” )ETH_DEVICE_SKIP = “”
Added new option DENY_TEMP_IP_LIMIT which limits the number of IP bans held in the temporary IP ban list to prevent iptables flooding. If the limit is reached, the oldest bans will be removed/allowed by lfd on the next unblock cycle regardless of remaining TTL for the entry
Added LF_FLUSH for the flush interval of reported usernames, files and pids so that persistent problems continue to be reported. Default is set to the previously hard-coded value of 3600 seconds
Fixed uw-imap ipop3d regex
Added check for TESTING mode when using csf -a or csf -d to only add to the respective csf.allow or csf.deny files and not insert into iptables to prevent errors if iptables has been flushed after reaching TESTING_INTERVAL
Fixed missing copy for the portscan.txt report for generic installations
Added new option PS_EMAIL_ALERT to enable/disable Port Scan Tracking email alerts
Added a sample of the port blocks that trigger the Port Scan to the report. This new report will be copied to /etc/csf/portscan.txt.new on existing installations, rename it to portscan.txt to use it
Added Port Scan Tracking to WHM UI Firewall Security Level
Added cPAddon update email setting check to Server Security Report
Modified the SuEXEC link location to the cPanel v11 location in Server Security Report
Added portscan.txt template to editable list in WHM UI