ConfigServer Services Blog

New cxs v1.03

Changes:

  • Added quotes around the $1 parameter in cxscgi.sh and cxsftp.sh to cope with files with spaces in their names. Existing scripts will be fixed on upgrade

New cxs v1.02

Changes:

  • Added initial FreeBSD (v7.2) support – currently no UI cron job support has been implemented, jobs will have to be added to /etc/crontab manually on FreeBSD
  • Fixed UI quarantine restore to always use correct uid and gid
  • Updated exploit definitions database
  • Added some more examples to the POD and reference the examples in cxsftp.sh and cxscgi.sh

New cxs v1.01

Changes:

  • Added new exploit scanning option M to be used with –option (enabled by default) and –voption. The M option scans a fingerprint lookup table of over 4500 known exploit scripts. If you cron jobs or have modified cxsftp.sh or cxscgi.sh that use an –options list, you might want to add M to the list to use this new feature
  • Digest::MD5 added to required perl modules
  • Added extra check in UI where alternative clamdsock is ticked but none entered in the textbox
  • Updated exploit definitions database
  • Don’t show user in quarantine UI if empty

New csf v4.81

Changes:

  • Fixed case sensitivity issue introduced in v4.80 with port specific lfd deny lines being ignored

New csf v4.80

Changes:

  • Modified WHM login regex to only trap successful root page displays for LF_CPANEL_ALERT
  • Apache status for PT_LOAD now checks http://127.0.0.1/server-status on GENERIC/DA servers. You need to ensure that the server-status page has access from 127.0.0.1 in the apache server-status Location container
  • Extended SU log file regex for Debian servers
  • Sanitise UI file edit HTML output
  • Improvements to the removal of alternative firewalls script
  • Added new options GLOBAL_DYNDNS, GLOBAL_DYNDNS_INTERVAL and GLOBAL_DYNDNS_IGNORE which provide for retrieval of a global DYNDNS list via URL
  • Improved firewall log lines detection for PS_INTERVAL and ST_ENABLE, especially on Debian
  • Improved detection of already blocked IP addresses

cPanel Service Package includes cxs for free

We’re currently offering cxs for free as part of our cPanel Service Package.Our new product is proving popular amongst web hosting providers concerned about exploits being uploaded to client sites affecting not only their account, but all accounts on the server.By including cxs with our cPanel Service Package we’re bolstering what is already a great package that helps in securing and managing your cPanel server, whether it is large or small, new or old.

New MailScanner Front-End (MSFE) v4.29

Changes:

  • Moved mailwatch from:/usr/local/cpanel/whostmgr/docroot/3rdparty/mailwatchto:/usr/local/cpanel/whostmgr/docroot/cgi/mailwatch
  • Made mailwatch cPanel 11.25 Security Token aware
  • Added new option “MailScanner Update Rules” to front-end which will force an update of the MailScanner rules with end-user settings
  • “Access Mailwatch” will now launch into the _blank target rather than a specified name to allow for multiple windows

New MailScanner Script v2.76

Changes:

  • New Mailscanner v4.78.17:http://www.mailscanner.info/ChangeLog
  • Preserve during update new files:/usr/mailscanner/etc/rules/README/usr/mailscanner/etc/rules/EXAMPLES