csf

New csf v2.74

Changes:

  • Modified PHP Server Checks to use the php binary output instead of trying to find the active php.ini file
  • Added PHP Server Check for register_globals
  • Improvements to the Server Check code
  • Fixed bug in TCP port 23 check in Server Check
  • Added new option –check (-c) to check whether the installed version of csf is the latest, no update is performed
  • Added multiple csf configuration checks to the Server Check report
  • Added throttling to LF_INTEGRITY and increased the timeout proportionally

New csf v2.73

Changes:

  • Modified SMTP_BLOCK warning on VPS servers to only display if the option is enabled
  • Modifed the Server Services Check text to omit using -del with chkconfig and better explain that a process is enabled even if it is not currently running and needs to be disabled to prevent startup on boot
  • Removed reliance on wget for updates and version checks
  • Coding improvements in csf.pl and addon_csf.cgi
  • Added /var/log/lfd.log tail automatic refresh to WHM UI

New csf v2.72

Changes:

  • Fixed problem with DENY_IP_LIMIT not counting all IP entries in csf.deny correctly
  • Ignore and issue a warning if SMTP_BLOCK is enabled on a Vituozzo VPS since the Virtuozzo VPS kernel does not support ipt_owner
  • Remove Shell/Fork Bomb Protection check (if a VPS) in Server Check as the option breaks a Virtuozzo VPS if enabled
  • Added more processes to check in Server Services Check
  • Removed restriction on outbound source port rule construction

New csf v2.71

Changes:

  • Added CSS settings to support pre-v11 cPanel installations

New csf v2.70

Changes:

  • Modified to adopt cPanel v11 WHM theme
  • Added ports 2077 and 2078 (cPanel WebDAV server) to csf.conf for new installations for v11 cPanel
  • Added FC5 to the list of (or soon to be) unsupported OS’s
  • Fixed LF_SMTPAUTH not correctly being set to LF_FTPD when upgrading

New csf v2.69

Changes:

  • Added back LF_DIRWATCH_DISABLE functionality securely
  • Fixed bug where a suspicious directory would not be removed with LF_DIRWATCH_DISABLE
  • Added perl module check for File : : Path
  • Added path configuration to tar and chattr in csf.conf
  • Added new option LF_SMTPAUTH which checks for SMTP AUTH exim login failures. When upgrading the new setting will be set to whatever you have LF_FTPD set to

New csf v2.68 – Major Security Fix

Changes:

  • Security Fix – If you have LF_DIRWATCH_DISABLE on then this can lead to arbitray code being executed in the context of the user running lfd, i.e. root. This option has been disabled in the code until further notice. You will have to manually remove any reported files.
  • Tightened csf file ownerships on installation

*ALL INSTALLATIONS SHOULD BE UPGRADED ASAP TO AVOID POTENTIAL EXPLOITATION*You can upgrade csf either through WHM or from the root shell using:

csf -u

New csf v2.67 – Major Security Fix

Changes:Security fix – A major security issue has been found (thanks to Jeff for informing us) in the LF_DIRWATCH code that can lead to arbitrary code being executed in the context of the user running lfd, i.e. root, if that option is enabled and a hacker has access to create a crafted filename in one of the watched directories. This update closes this hole.*ALL INSTALLATIONS SHOULD BE UPGRADED ASAP TO AVOID POTENTIAL EXPLOITATION*You can upgrade csf either through WHM or from the root shell using:

csf -u

New csf v2.66

Changes:

  • Modified LF_CPANEL text in csf.conf for new installations to reflect the change in the SSL login handling by cPanel (i.e. it does now log SSL login IP’s)
  • Modified the log line monitoring in lfd to cope with log line flooding to prevent looping/excessive resource usage. Also recoded without the use of the POSIX routines
  • lfd process name now shows which log file it is scanning

New csf v2.65

Changes:

  • New Feature: System Integrity Checking. This enables lfd to compare md5sums of the servers OS binary application files from the time when lfd starts. If the md5sum of a monitored file changes an alert is sent. This option is intended as an IDS (Intrusion Detection System) and is the last line of detection for a