ConfigServer Services Blog

MailScanner Front-End v3.1

Recent changes in MSFE: v3.1:

  • Added upgrade buttons for MailScanner and ClamAV if available to WHM
  • Fixed language issue with “Not Set” string translation
  • Modified advice text
  • Setting low/high scoring default now actually changes the default setting in the configuration files – previously it only changed the default option for end-users

v3.0:

  • Added Advanced Settings to toggle setting for FromOrTo:/From: for both black and white listed entries
  • Modified treatment of black and whitelisted IP entries so that they’re always configured as From: in the rulesets (MailScanner requirement)

If you wish to upgrade MSFE and have purchased an installation service package from us in the past, email sales@waytotheweb.com and we’ll provide you with a download account for http://download.webumake.com

New csf v1.81

Latest version supports iptables in the latest 2.6+ kernel that use xt_iptables:

  • 1.81

New csf v1.79

New in this release:

  • Added new feature to send an alert email if su is used to login from one account to another. Alerts are sent whether the

New csf v1.73

Some new features and fixes:

  • Added new option LF_CSF to restart csf if iptables appears to have been flushed (i.e. stopped)
  • Added new option LF_SCRIPT_PERM to disable directories identified by LF_SCRIPT_ALERT – see csf.conf for more information
  • Workaround to child reaper when 2 children die at the same time
  • Added workaround for PT spamd false-positives

New csf v1.68

Updates and additions:

  • Additions to csf.pignore
  • Added new option PT_SKIP_HTTP – see csf.conf/readme.txt
  • Updated readme.txt regarding unavoidable false-positives and possible mitigation

New csf v1.64

Major new feature in this release:

  • Updated CLI help and readme.txt for new csf -u command from v1.63
  • Changed the format of the email templates for new installations – if you want to use the new format remove /etc/csf/*.txt and then install csf
  • Added mechanism to prevent multiple email/block attempts from login attacks in lfd
  • Added new feature – Process Tracking. This option enables tracking of user and nobody processes and examines them for suspicious executables or open network ports. Its purpose is to identify potential exploit processes that are running on the server, even if they are obfuscated to appear as system services. If a suspicious process is found an alert email is sent with relevant information – readme.txt for details