ConfigServer Services Blog

New csf v3.19

Changes:

  • New feature – LF_PERMBLOCK. Permanently blocks IP addresses that have had X temporary blocks in the last Y seconds. Uses email template permblock.txt
  • New feature – LF_NETBLOCK. Permanently blocks network classes (A, B or C) if more than X IP addresses in a specified class have been blocked in the last Y seconds. This may help within some DDOS attacks launched from within a specific network class. Uses email template netblock.txt
  • Modified MD5SUM comparision code to better reset md5sum checks after a hit
  • Only issue Random JS Tookit warning if all the MD5SUM checks fail for the relevant files
  • Removed POP flood Protection setting check from Server Report as it’s no longer relevant to courier-imap
  • Rewritten the Apache Check code for the Server Report to better detect the current running settings on all Apache and PHP versions
  • Don’t check Apache RLimitCPU/RLimitCPU limits on VPS servers as they aren’t relevant (as they apply to the host VPS configuration) for the Server Report

New csf v3.18

Changes:

  • Fixed bug in the generic csf release where the default csf.conf was missing the DROP, CT_STATES and GLOBAL_IGNORE settings – Thanks to Jim for the help in tracking the issue down

New csf v3.17

Changes:

  • Rewritten the update code so that a new csf.conf is creating when upgrading. It now uses the latest csf.conf and transfers the existing settings to the new configuration file. This way all installations are sure to have all new settings and the latest comments. It also makes the release process for new builds much simpler
  • Other installation/update improvements
  • Updated APF/BFD removal procedure

New cmm v1.09

Changes:

  • Reduced max lines shown of email to 500 lines. Added option to view the full email
  • Speedup in directory listing of email

New cmm v1.08

Changes:

  • Dramatically reduced memory overhead of listing mail directories by only reading the first 200 lines of any email. Also speeds up directory listing greatly
  • Display only the first 1000 lines of any email to reduce memory overhead and speed up display
  • Added new upgrade mechanism
  • Removed use of the cat binary
  • Added “Select by Search” JS code, thanks to rafaelfpviana on the forum for the code

Upgrade through WHM or by following the installation instructions again.

New csf v3.15

Changes:

  • Auto-whitelist all DNS traffic to/from IPs in /etc/resolv.conf
  • Modified csf.conf text for new installations to account for auto-configuration of ETH_DEV which has been the case for some time:# By default, csf will auto-configure iptables to filter all traffic except on# the local (lo: ) device. If you only want iptables rules applied to a specific# NIC, then list it here (e.g. eth1, or eth+ )ETH_DEVICE = “”# If you don’t want iptables rules applied to specific NICs, then list them in# a comma separated list (e.g “eth1,eth2” )ETH_DEVICE_SKIP = “”

New csf v3.14

Changes:

  • Added new format for cPanel (v11.18.3) login failures to regex.pm
  • Added exe:/usr/libexec/gam_server to the default list of ignored binaries
  • Fixed problem with SCRIPT_ALERT not picking up alternative /home directories from wwwacct.conf

New csf v3.13

Changes:

  • Added new option DENY_TEMP_IP_LIMIT which limits the number of IP bans held in the temporary IP ban list to prevent iptables flooding. If the limit is reached, the oldest bans will be removed/allowed by lfd on the next unblock cycle regardless of remaining TTL for the entry
  • Added LF_FLUSH for the flush interval of reported usernames, files and pids so that persistent problems continue to be reported. Default is set to the previously hard-coded value of 3600 seconds
  • Fixed uw-imap ipop3d regex
  • Added check for TESTING mode when using csf -a or csf -d to only add to the respective csf.allow or csf.deny files and not insert into iptables to prevent errors if iptables has been flushed after reaching TESTING_INTERVAL

New csf v3.12

Changes:

  • Added SMTP AUTH failure regex for Kerio MailServers
  • Fixed an issue where a permanent Port Scanning alert would report as a temporary block, eventhough a permanent block was performed
  • Added regex for failed SSH key authentication logins (thanks to Paul)