csf

New csf v3.16

Changes:

  • Fixed bug introduced in v3.14 for generic installation only

New csf v3.15

Changes:

  • Auto-whitelist all DNS traffic to/from IPs in /etc/resolv.conf
  • Modified csf.conf text for new installations to account for auto-configuration of ETH_DEV which has been the case for some time:# By default, csf will auto-configure iptables to filter all traffic except on# the local (lo: ) device. If you only want iptables rules applied to a specific# NIC, then list it here (e.g. eth1, or eth+ )ETH_DEVICE = “”# If you don’t want iptables rules applied to specific NICs, then list them in# a comma separated list (e.g “eth1,eth2” )ETH_DEVICE_SKIP = “”

New csf v3.14

Changes:

  • Added new format for cPanel (v11.18.3) login failures to regex.pm
  • Added exe:/usr/libexec/gam_server to the default list of ignored binaries
  • Fixed problem with SCRIPT_ALERT not picking up alternative /home directories from wwwacct.conf

New csf v3.13

Changes:

  • Added new option DENY_TEMP_IP_LIMIT which limits the number of IP bans held in the temporary IP ban list to prevent iptables flooding. If the limit is reached, the oldest bans will be removed/allowed by lfd on the next unblock cycle regardless of remaining TTL for the entry
  • Added LF_FLUSH for the flush interval of reported usernames, files and pids so that persistent problems continue to be reported. Default is set to the previously hard-coded value of 3600 seconds
  • Fixed uw-imap ipop3d regex
  • Added check for TESTING mode when using csf -a or csf -d to only add to the respective csf.allow or csf.deny files and not insert into iptables to prevent errors if iptables has been flushed after reaching TESTING_INTERVAL

New csf v3.12

Changes:

  • Added SMTP AUTH failure regex for Kerio MailServers
  • Fixed an issue where a permanent Port Scanning alert would report as a temporary block, eventhough a permanent block was performed
  • Added regex for failed SSH key authentication logins (thanks to Paul)

New csf v3.11

Changes:

  • Use /proc for Process Tracking instead of ps output incase of exploited system binaries and to better determine resource usage of each process

New csf v3.10

Changes:

  • Modified INPUT and OUTPUT chain rules to always specify the ethernet device
  • csf now re-applies temporary IP blocks on restart
  • Added new CLI command to add temporary IP bans. See csf -h for the new csf -td command
  • Added new options to WHM csf UI to unblock temporary IP bans
  • Added new option to WHM csf UI to block IP temporarily for a specified TTL

New csf v3.09

Changes:

  • Fixed missing copy for the portscan.txt report for generic installations
  • Added new option PS_EMAIL_ALERT to enable/disable Port Scan Tracking email alerts
  • Added a sample of the port blocks that trigger the Port Scan to the report. This new report will be copied to /etc/csf/portscan.txt.new on existing installations, rename it to portscan.txt to use it
  • Added Port Scan Tracking to WHM UI Firewall Security Level
  • Added cPAddon update email setting check to Server Security Report
  • Modified the SuEXEC link location to the cPanel v11 location in Server Security Report
  • Added portscan.txt template to editable list in WHM UI
  • Updated readme.txt

New csf v3.08

Changes:

  • Modified Port Scan Tracking to ignore blocked IP addresses incase DROP_IP_LOGGING is enabled

New csf v3.07

Changes:

  • Added Apache Server Status report to PT_LOAD for load average report monitoring. To benefit from this feature you will need to rename the new report file /etc/csf/loadalert.txt.new to loadalert.txt. The reports (ps, vmstat and apache) are now included as MIME attachments in the email report instead of inline text
  • New feature: Port Scan Tracking. This feature tracks port blocks logged by iptables to syslog. It can help block hackers attempting to scan the server for open ports, or to block them while trying to access blocked standard ports, e.g. SSH. See csf.conf for more information
  • Upgraded the urlget module