| 1 | ############################################################################### |
|---|
| 2 | # SECTION:Initial Settings |
|---|
| 3 | ############################################################################### |
|---|
| 4 | # ConfigServer Firewall & Security Configuration File |
|---|
| 5 | # |
|---|
| 6 | # Copyright 2006-2013, Way to the Web Limited |
|---|
| 7 | # URL: http://www.configserver.com |
|---|
| 8 | # Email: sales@waytotheweb.com |
|---|
| 9 | ############################################################################### |
|---|
| 10 | |
|---|
| 11 | # Testing flag - enables a CRON job that clears iptables incase of |
|---|
| 12 | # configuration problems when you start csf. This should be enabled until you |
|---|
| 13 | # are sure that the firewall works - i.e. incase you get locked out of your |
|---|
| 14 | # server! Then do remember to set it to 0 and restart csf when you're sure |
|---|
| 15 | # everything is OK. Stopping csf will remove the line from /etc/crontab |
|---|
| 16 | # |
|---|
| 17 | # lfd will not start while this is enabled |
|---|
| 18 | TESTING = "0" |
|---|
| 19 | |
|---|
| 20 | # The interval for the crontab in minutes. Since this uses the system clock the |
|---|
| 21 | # CRON job will run at the interval past the hour and not from when you issue |
|---|
| 22 | # the start command. Therefore an interval of 5 minutes means the firewall |
|---|
| 23 | # will be cleared in 0-5 minutes from the firewall start |
|---|
| 24 | TESTING_INTERVAL = "5" |
|---|
| 25 | |
|---|
| 26 | # Enabling auto updates creates a cron job called /etc/cron.d/csf_update which |
|---|
| 27 | # runs once per day to see if there is an update to csf+lfd and upgrades if |
|---|
| 28 | # available and restarts csf and lfd |
|---|
| 29 | # |
|---|
| 30 | # You should check for new version announcements at http://blog.configserver.com |
|---|
| 31 | AUTO_UPDATES = "0" |
|---|
| 32 | |
|---|
| 33 | ############################################################################### |
|---|
| 34 | # SECTION:IPv4 Port Settings |
|---|
| 35 | ############################################################################### |
|---|
| 36 | # Lists of ports in the following comma separated lists can be added using a |
|---|
| 37 | # colon (e.g. 30000:35000). |
|---|
| 38 | |
|---|
| 39 | # Allow incoming TCP ports |
|---|
| 40 | TCP_IN = "20,21,22,37,53,80,443,2401,5280,9418,30000:50000" |
|---|
| 41 | |
|---|
| 42 | # Allow outgoing TCP ports |
|---|
| 43 | TCP_OUT = "20,21,22,25,37,53,80,110,143,443,465,587,873,993,995,1129,2401,3306,5280,9418,11371,27017,30000:50000" |
|---|
| 44 | |
|---|
| 45 | # Allow incoming UDP ports |
|---|
| 46 | UDP_IN = "20,21,53,123,161,33434:33523,60000:60040" |
|---|
| 47 | |
|---|
| 48 | # Allow outgoing UDP ports |
|---|
| 49 | # To allow outgoing traceroute add 33434:33523 to this list |
|---|
| 50 | UDP_OUT = "20,21,53,113,123,161,33434:33523,60000:60040" |
|---|
| 51 | |
|---|
| 52 | # Allow incoming PING |
|---|
| 53 | ICMP_IN = "0" |
|---|
| 54 | |
|---|
| 55 | # Set the per IP address incoming ICMP packet rate |
|---|
| 56 | # To disable rate limiting set to "0" |
|---|
| 57 | ICMP_IN_RATE = "1/s" |
|---|
| 58 | |
|---|
| 59 | # Allow outgoing PING |
|---|
| 60 | ICMP_OUT = "1" |
|---|
| 61 | |
|---|
| 62 | # Set the per IP address outgoing ICMP packet rate (hits per second allowed), |
|---|
| 63 | # e.g. "1/s" |
|---|
| 64 | # To disable rate limiting set to "0" |
|---|
| 65 | ICMP_OUT_RATE = "1/s" |
|---|
| 66 | |
|---|
| 67 | ############################################################################### |
|---|
| 68 | # SECTION:IPv6 Port Settings |
|---|
| 69 | ############################################################################### |
|---|
| 70 | # IPv6: (Requires ip6tables) |
|---|
| 71 | # |
|---|
| 72 | # Pre v2.6.20 kernels do not perform stateful connection tracking, so a static |
|---|
| 73 | # firewall is configured as a fallback instead if IPV6_SPI is set to 0 below |
|---|
| 74 | # |
|---|
| 75 | # Supported: |
|---|
| 76 | # Temporary ACCEPT/DENY, GLOBAL_DENY, GLOBAL_ALLOW, SMTP_BLOCK, LF_PERMBLOCK, |
|---|
| 77 | # PACKET_FILTER, WATCH_MODE, Advanced Allow/Deny Filters, RELAY_*, CLUSTER_* |
|---|
| 78 | # |
|---|
| 79 | # Not supported: |
|---|
| 80 | # DYNDNS, CC_DENY, CC_ALLOW, CC_ALLOW_FILTER, SYNFLOOD, PORTFLOOD, DYNDNS, |
|---|
| 81 | # ICMP_IN, ICMP_OUT, LF_NETBLOCK, MESSENGER, CC_IGNORE, CONNLIMIT, |
|---|
| 82 | # CC_ALLOW_PORTS, CC_DENY_PORTS |
|---|
| 83 | # |
|---|
| 84 | # Partially supported: |
|---|
| 85 | # CC_LOOKUPS - reverse DNS only and requires the perl module Socket6 from cpan |
|---|
| 86 | # |
|---|
| 87 | # MESSENGER service - not supported: no REDIRECT support in ip6tables as yet |
|---|
| 88 | # |
|---|
| 89 | IPV6 = "0" |
|---|
| 90 | |
|---|
| 91 | # IPv6 uses icmpv6 packets very heavily. By default, csf will allow all icmpv6 |
|---|
| 92 | # traffic in the INPUT and OUTPUT chains. However, this could increase the risk |
|---|
| 93 | # of icmpv6 attacks. To restrict incoming icmpv6, set to "1" but may break some |
|---|
| 94 | # connection types |
|---|
| 95 | IPV6_ICMP_STRICT = "0" |
|---|
| 96 | |
|---|
| 97 | # Pre v2.6.20 kernel must set this option to "0" as no working state module is |
|---|
| 98 | # present, so a static firewall is configured as a fallback |
|---|
| 99 | # |
|---|
| 100 | # A workaround has been added for CentOS/RedHat v5 and custom kernels that do |
|---|
| 101 | # not support IPv6 connection tracking by opening ephemeral port range |
|---|
| 102 | # 32768:61000. This is only applied if IPV6_SPI is not enabled. This is the |
|---|
| 103 | # same workaround implemented by RedHat in the sample default IPv6 rules |
|---|
| 104 | # |
|---|
| 105 | # Because connection tracking does not work on such kernels, applications that |
|---|
| 106 | # rely on it (e.g. apache, passive ftp, etc) will not function unless you open |
|---|
| 107 | # all outgoing ports. To do this set the following: |
|---|
| 108 | # |
|---|
| 109 | # TCP6_OUT = "0:65535" |
|---|
| 110 | # UDP6_OUT = "0:65535" |
|---|
| 111 | # |
|---|
| 112 | # If you allow incoming ipv6 DNS lookups you will need to use the following |
|---|
| 113 | # directive in the options{} section of your named.conf: |
|---|
| 114 | # |
|---|
| 115 | # query-source-v6 port 53; |
|---|
| 116 | # |
|---|
| 117 | # This will force ipv6 incoming DNS traffic only through port 53 |
|---|
| 118 | # |
|---|
| 119 | # These changes are not necessary if the SPI firewall is used |
|---|
| 120 | IPV6_SPI = "1" |
|---|
| 121 | |
|---|
| 122 | # Allow incoming IPv6 TCP ports |
|---|
| 123 | TCP6_IN = "53" |
|---|
| 124 | |
|---|
| 125 | # Allow outgoing TCP ports |
|---|
| 126 | TCP6_OUT = "53" |
|---|
| 127 | |
|---|
| 128 | # Allow incoming UDP ports |
|---|
| 129 | UDP6_IN = "53" |
|---|
| 130 | |
|---|
| 131 | # Allow outgoing UDP ports |
|---|
| 132 | # To allow outgoing traceroute add 33434:33523 to this list |
|---|
| 133 | UDP6_OUT = "53" |
|---|
| 134 | |
|---|
| 135 | ############################################################################### |
|---|
| 136 | # SECTION:General Settings |
|---|
| 137 | ############################################################################### |
|---|
| 138 | # By default, csf will auto-configure iptables to filter all traffic except on |
|---|
| 139 | # the loopback device. If you only want iptables rules applied to a specific |
|---|
| 140 | # NIC, then list it here (e.g. eth1, or eth+) |
|---|
| 141 | ETH_DEVICE = "" |
|---|
| 142 | |
|---|
| 143 | # By adding a device to this option, ip6tables can be configured only on the |
|---|
| 144 | # specified device. Otherwise, ETH_DEVICE and then the default setting will be |
|---|
| 145 | # used |
|---|
| 146 | ETH6_DEVICE = "" |
|---|
| 147 | |
|---|
| 148 | # If you don't want iptables rules applied to specific NICs, then list them in |
|---|
| 149 | # a comma separated list (e.g "eth1,eth2") |
|---|
| 150 | ETH_DEVICE_SKIP = "" |
|---|
| 151 | |
|---|
| 152 | # To switch from the deprecated iptables "state" module to the "conntrack" |
|---|
| 153 | # module, change this to 1 |
|---|
| 154 | USE_CONNTRACK = "1" |
|---|
| 155 | |
|---|
| 156 | # Check whether syslog is running. Many of the lfd checks require syslog to be |
|---|
| 157 | # running correctly. This test will send a coded message to syslog every |
|---|
| 158 | # SYSLOG_CHECK seconds. lfd will check SYSLOG_LOG log lines for the coded |
|---|
| 159 | # message. If it fails to do so within SYSLOG_CHECK seconds an alert using |
|---|
| 160 | # syslogalert.txt is sent |
|---|
| 161 | # |
|---|
| 162 | # A value of betwen 300 and 3600 seconds is suggested. Set to 0 to disable |
|---|
| 163 | SYSLOG_CHECK = "0" |
|---|
| 164 | |
|---|
| 165 | # Enable this option if you want lfd to ignore (i.e. don't block) IP addresses |
|---|
| 166 | # listed in csf.allow in addition to csf.ignore (the default). This option |
|---|
| 167 | # should be used with caution as it would mean that IP's allowed through the |
|---|
| 168 | # firewall from infected PC's could launch attacks on the server that lfd |
|---|
| 169 | # would ignore |
|---|
| 170 | IGNORE_ALLOW = "0" |
|---|
| 171 | |
|---|
| 172 | # Enable the following option if you want to apply strict iptables rules to DNS |
|---|
| 173 | # traffic (i.e. relying on iptables connection tracking). Enabling this option |
|---|
| 174 | # could cause DNS resolution issues both to and from the server but could help |
|---|
| 175 | # prevent abuse of the local DNS server |
|---|
| 176 | DNS_STRICT = "0" |
|---|
| 177 | |
|---|
| 178 | # Enable the following option if you want to apply strict iptables rules to DNS |
|---|
| 179 | # traffic between the server and the nameservers listed in /etc/resolv.conf |
|---|
| 180 | # Enabling this option could cause DNS resolution issues both to and from the |
|---|
| 181 | # server but could help prevent abuse of the local DNS server |
|---|
| 182 | DNS_STRICT_NS = "0" |
|---|
| 183 | |
|---|
| 184 | # Limit the number of IP's kept in the /etc/csf/csf.deny file. This can be |
|---|
| 185 | # important as a large number of IP addresses create a large number of iptables |
|---|
| 186 | # rules (4 times the number of IP's) which can cause problems on some systems |
|---|
| 187 | # where either the the number of iptables entries has been limited (esp VPS's) |
|---|
| 188 | # or where resources are limited. This can result in slow network performance, |
|---|
| 189 | # or, in the case of iptables entry limits, can prevent your server from |
|---|
| 190 | # booting as not all the required iptables chain settings will be correctly |
|---|
| 191 | # configured. The value set here is the maximum number of IPs/CIDRs allowed |
|---|
| 192 | # if the limit is reached, the entries will be rotated so that the oldest |
|---|
| 193 | # entries (i.e. the ones at the top) will be removed and the latest is added. |
|---|
| 194 | # The limit is only checked when using csf -d (which is what lfd also uses) |
|---|
| 195 | # Set to 0 to disable limiting |
|---|
| 196 | DENY_IP_LIMIT = "100" |
|---|
| 197 | |
|---|
| 198 | # Limit the number of IP's kept in the temprary IP ban list. If the limit is |
|---|
| 199 | # reached the oldest IP's in the ban list will be removed and allowed |
|---|
| 200 | # regardless of the amount of time remaining for the block |
|---|
| 201 | # Set to 0 to disable limiting |
|---|
| 202 | DENY_TEMP_IP_LIMIT = "100" |
|---|
| 203 | |
|---|
| 204 | # Enable login failure detection daemon (lfd). If set to 0 none of the |
|---|
| 205 | # following settings will have any effect as the daemon won't start. |
|---|
| 206 | LF_DAEMON = "1" |
|---|
| 207 | |
|---|
| 208 | # Check whether csf appears to have been stopped and restart if necessary, |
|---|
| 209 | # unless TESTING is enabled above. The check is done every 300 seconds |
|---|
| 210 | LF_CSF = "1" |
|---|
| 211 | |
|---|
| 212 | # This option uses IPTABLES_SAVE, IPTABLES_RESTORE and IP6TABLES_SAVE, |
|---|
| 213 | # IP6TABLES_RESTORE in two ways: |
|---|
| 214 | # |
|---|
| 215 | # 1. On a clean server reboot the entire csf iptables configuration is saved |
|---|
| 216 | # and then restored where possible to provide a near instant firewall |
|---|
| 217 | # startup[*] |
|---|
| 218 | # |
|---|
| 219 | # 2. On csf restart or lfd reloading tables, CC_* as well as SPAMHAUS, DSHIELD, |
|---|
| 220 | # BOGON, TOR are loaded using this method in a fraction of the time than if |
|---|
| 221 | # this setting is disabled |
|---|
| 222 | # |
|---|
| 223 | # [*]Not supported on all OS platforms |
|---|
| 224 | # |
|---|
| 225 | # Set to "0" to disable this functionality |
|---|
| 226 | FASTSTART = "0" |
|---|
| 227 | |
|---|
| 228 | # If you enable this option then whenever a CLI request to restart csf is used |
|---|
| 229 | # lfd will restart csf instead within LF_PARSE seconds |
|---|
| 230 | # |
|---|
| 231 | # This feature can be helpful for restarting configurations that cannot use |
|---|
| 232 | # FASTSTART |
|---|
| 233 | LFDSTART = "1" |
|---|
| 234 | |
|---|
| 235 | # Enable verbose output of iptables commands |
|---|
| 236 | VERBOSE = "1" |
|---|
| 237 | |
|---|
| 238 | # Enable packet filtering for unwanted or illegal packets. This will drop |
|---|
| 239 | # packets that iptables has deemed INVALID (i.e. there is no established TCP |
|---|
| 240 | # connection in the state table), or if the TCP flags in the packet are out of |
|---|
| 241 | # sequence or illegal in the protocol exchange. |
|---|
| 242 | # |
|---|
| 243 | # If you see packets being dropped that you would rather allow then disable |
|---|
| 244 | # this option by setting it to "0" |
|---|
| 245 | PACKET_FILTER = "1" |
|---|
| 246 | |
|---|
| 247 | # Perform reverse DNS lookups on IP addresses. (See also CC_LOOKUPS) |
|---|
| 248 | LF_LOOKUPS = "1" |
|---|
| 249 | |
|---|
| 250 | ############################################################################### |
|---|
| 251 | # SECTION:SMTP Settings |
|---|
| 252 | ############################################################################### |
|---|
| 253 | # Block outgoing SMTP except for root, exim and mailman (forces scripts/users |
|---|
| 254 | # to use the exim/sendmail binary instead of sockets access). This replaces the |
|---|
| 255 | # protection as WHM > Tweak Settings > SMTP Tweaks |
|---|
| 256 | # |
|---|
| 257 | # This option uses the iptables ipt_owner/xt_owner module and must be loaded |
|---|
| 258 | # for it to work. It may not be available on some VPS platforms |
|---|
| 259 | # |
|---|
| 260 | # Note: Run /etc/csf/csftest.pl to check whether this option will function on |
|---|
| 261 | # this server |
|---|
| 262 | SMTP_BLOCK = "0" |
|---|
| 263 | |
|---|
| 264 | # If SMTP_BLOCK is enabled but you want to allow local connections to port 25 |
|---|
| 265 | # on the server (e.g. for webmail or web scripts) then enable this option to |
|---|
| 266 | # allow outgoing SMTP connections to the loopback device |
|---|
| 267 | SMTP_ALLOWLOCAL = "1" |
|---|
| 268 | |
|---|
| 269 | # This is a comma separated list of the ports to block. You should list all |
|---|
| 270 | # ports that exim is configured to listen on |
|---|
| 271 | SMTP_PORTS = "25" |
|---|
| 272 | |
|---|
| 273 | # Always allow the following comma separated users and groups to bypass |
|---|
| 274 | # SMTP_BLOCK |
|---|
| 275 | # |
|---|
| 276 | # Note: root (UID:0) is always allowed |
|---|
| 277 | SMTP_ALLOWUSER = "" |
|---|
| 278 | SMTP_ALLOWGROUP = "mail,mailman" |
|---|
| 279 | |
|---|
| 280 | ############################################################################### |
|---|
| 281 | # SECTION:Port Flood Settings |
|---|
| 282 | ############################################################################### |
|---|
| 283 | # Enable SYN Flood Protection. This option configures iptables to offer some |
|---|
| 284 | # protection from tcp SYN packet DOS attempts. You should set the RATE so that |
|---|
| 285 | # false-positives are kept to a minimum otherwise visitors may see connection |
|---|
| 286 | # issues (check /var/log/messages for *SYNFLOOD Blocked*). See the iptables |
|---|
| 287 | # man page for the correct --limit rate syntax |
|---|
| 288 | # |
|---|
| 289 | # Note: This option should ONLY be enabled if you know you are under a SYN |
|---|
| 290 | # flood attack as it will slow down all new connections from any IP address to |
|---|
| 291 | # the server if triggered |
|---|
| 292 | SYNFLOOD = "1" |
|---|
| 293 | SYNFLOOD_RATE = "100/s" |
|---|
| 294 | SYNFLOOD_BURST = "150" |
|---|
| 295 | |
|---|
| 296 | # Connection Limit Protection. This option configures iptables to offer more |
|---|
| 297 | # protection from DOS attacks against specific ports. It can also be used as a |
|---|
| 298 | # way to simply limit resource usage by IP address to specific server services. |
|---|
| 299 | # This option limits the number of concurrent new connections per IP address |
|---|
| 300 | # that can be made to specific ports |
|---|
| 301 | # |
|---|
| 302 | # This feature does not work on servers that do not have the iptables module |
|---|
| 303 | # xt_connlimit loaded. Typically, this will be with MONOLITHIC kernels. VPS |
|---|
| 304 | # server admins should check with their VPS host provider that the iptables |
|---|
| 305 | # module is included |
|---|
| 306 | # |
|---|
| 307 | # For further information and syntax refer to the Connection Limit Protection |
|---|
| 308 | # section of the csf readme.txt |
|---|
| 309 | # |
|---|
| 310 | # Note: Run /etc/csf/csftest.pl to check whether this option will function on |
|---|
| 311 | # this server |
|---|
| 312 | CONNLIMIT = "22;19,80;19,443;19,53;5" |
|---|
| 313 | |
|---|
| 314 | # Port Flood Protection. This option configures iptables to offer protection |
|---|
| 315 | # from DOS attacks against specific ports. This option limits the number of |
|---|
| 316 | # new connections per time interval that can be made to specific ports |
|---|
| 317 | # |
|---|
| 318 | # This feature does not work on servers that do not have the iptables module |
|---|
| 319 | # ipt_recent loaded. Typically, this will be with MONOLITHIC kernels. VPS |
|---|
| 320 | # server admins should check with their VPS host provider that the iptables |
|---|
| 321 | # module is included |
|---|
| 322 | # |
|---|
| 323 | # For further information and syntax refer to the Port Flood Protection |
|---|
| 324 | # section of the csf readme.txt |
|---|
| 325 | # |
|---|
| 326 | # Note: Run /etc/csf/csftest.pl to check whether this option will function on |
|---|
| 327 | # this server |
|---|
| 328 | PORTFLOOD = "22;tcp;9;29,1433;tcp;1;900" |
|---|
| 329 | |
|---|
| 330 | ############################################################################### |
|---|
| 331 | # SECTION:Logging Settings |
|---|
| 332 | ############################################################################### |
|---|
| 333 | # Log lfd messages to SYSLOG in addition to /var/log/lfd.log. You must have the |
|---|
| 334 | # perl module Sys::Syslog installed to use this feature |
|---|
| 335 | SYSLOG = "0" |
|---|
| 336 | |
|---|
| 337 | # Drop target for iptables rules. This can be set to either DROP ot REJECT. |
|---|
| 338 | # REJECT will send back an error packet, DROP will not respond at all. REJECT |
|---|
| 339 | # is more polite, however it does provide extra information to a hacker and |
|---|
| 340 | # lets them know that a firewall is blocking their attempts. DROP hangs their |
|---|
| 341 | # connection, thereby frustrating attempts to port scan the server. |
|---|
| 342 | DROP = "DROP" |
|---|
| 343 | |
|---|
| 344 | # Enable logging of dropped connections to blocked ports to syslog, usually |
|---|
| 345 | # /var/log/messages. This option needs to be enabled to use Port Scan Tracking |
|---|
| 346 | DROP_LOGGING = "1" |
|---|
| 347 | |
|---|
| 348 | # Enable logging of dropped incoming connections from blocked IP addresses |
|---|
| 349 | # |
|---|
| 350 | # This option will be disabled if you enable Port Scan Tracking (PS_INTERVAL) |
|---|
| 351 | DROP_IP_LOGGING = "0" |
|---|
| 352 | |
|---|
| 353 | # Enable logging of dropped outgoing connections. Where available, these logs |
|---|
| 354 | # will also include the UID connecting out which can help track abuse |
|---|
| 355 | # |
|---|
| 356 | # Note: Only outgoing SYN packets for TCP connections are logged, other |
|---|
| 357 | # protocols log all packets |
|---|
| 358 | # |
|---|
| 359 | # We recommend that you enable this option |
|---|
| 360 | DROP_OUT_LOGGING = "1" |
|---|
| 361 | |
|---|
| 362 | # Only log incoming reserved port dropped connections (0:1023). This can reduce |
|---|
| 363 | # the amount of log noise from dropped connections, but will affect options |
|---|
| 364 | # such as Port Scan Tracking (PS_INTERVAL) |
|---|
| 365 | DROP_ONLYRES = "0" |
|---|
| 366 | |
|---|
| 367 | # Commonly blocked ports that you do not want logging as they tend to just fill |
|---|
| 368 | # up the log file. These ports are specifically blocked (applied to TCP and UDP |
|---|
| 369 | # protocols) for incoming connections |
|---|
| 370 | DROP_NOLOG = "67,68,111,113,135:139,445,500,513,520" |
|---|
| 371 | |
|---|
| 372 | # Log packets dropped by the packet filtering option PACKET_FILTER |
|---|
| 373 | DROP_PF_LOGGING = "0" |
|---|
| 374 | |
|---|
| 375 | # Log packets dropped by the Connection Limit Protection option CONNLIMIT. If |
|---|
| 376 | # this is enabled and Port Scan Tracking (PS_INTERVAL) is also enabled, IP |
|---|
| 377 | # addresses breaking the Connection Limit Protection will be blocked |
|---|
| 378 | CONNLIMIT_LOGGING = "0" |
|---|
| 379 | |
|---|
| 380 | # Send an alert if log file flooding is detected which causes lfd to skip log |
|---|
| 381 | # lines to prevent lfd from looping. If this alert is sent you should check the |
|---|
| 382 | # reported log file for the reason for the flooding |
|---|
| 383 | LOGFLOOD_ALERT = "1" |
|---|
| 384 | |
|---|
| 385 | # Configure csf to watch IP addresses (with csf -w [ip]). This option will add |
|---|
| 386 | # overhead to packet traversal through iptables and syslog logging, so should |
|---|
| 387 | # only be enabled while actively watching IP addresses. See readme.txt for more |
|---|
| 388 | # information on the use of this option |
|---|
| 389 | WATCH_MODE = "0" |
|---|
| 390 | |
|---|
| 391 | ############################################################################### |
|---|
| 392 | # SECTION:Reporting Settings |
|---|
| 393 | ############################################################################### |
|---|
| 394 | # By default, lfd will send alert emails using the relevant alert template to |
|---|
| 395 | # the To: address configured within that template. Setting the following |
|---|
| 396 | # option will override the configured To: field in all lfd alert emails |
|---|
| 397 | # |
|---|
| 398 | # Leave this option empty to use the To: field setting in each alert template |
|---|
| 399 | LF_ALERT_TO = "chris@webarchitects.co.uk" |
|---|
| 400 | |
|---|
| 401 | # By default, lfd will send alert emails using the relevant alert template from |
|---|
| 402 | # the From: address configured within that template. Setting the following |
|---|
| 403 | # option will override the configured From: field in all lfd alert emails |
|---|
| 404 | # |
|---|
| 405 | # Leave this option empty to use the From: field setting in each alert template |
|---|
| 406 | LF_ALERT_FROM = "" |
|---|
| 407 | |
|---|
| 408 | # By default, lfd will send all alerts using the SENDMAIL binary. To send using |
|---|
| 409 | # SMTP directly, you can set the following to a relaying SMTP server, e.g. |
|---|
| 410 | # "127.0.0.1". Leave this setting blank to use SENDMAIL |
|---|
| 411 | LF_ALERT_SMTP = "" |
|---|
| 412 | |
|---|
| 413 | # Block Reporting. lfd can run an external script when it performs and IP |
|---|
| 414 | # address block following for example a login failure. The following setting |
|---|
| 415 | # is to the full path of the external script which must be executable. See |
|---|
| 416 | # readme.txt for format details |
|---|
| 417 | # |
|---|
| 418 | # Leave this setting blank to disable |
|---|
| 419 | BLOCK_REPORT = "" |
|---|
| 420 | |
|---|
| 421 | # To also run an external script when a temporary block is unblocked. The |
|---|
| 422 | # following setting can be the full path of the external script which must be |
|---|
| 423 | # executable. See readme.txt for format details |
|---|
| 424 | # |
|---|
| 425 | # Leave this setting blank to disable |
|---|
| 426 | UNBLOCK_REPORT = "" |
|---|
| 427 | |
|---|
| 428 | # In addition to the standard lfd email alerts, you can additionally enable the |
|---|
| 429 | # sending of X-ARF reports (see http://www.x-arf.org/specification.html). Only |
|---|
| 430 | # block alert messages will be sent. |
|---|
| 431 | # |
|---|
| 432 | # These reports are in a format accepted by many Netblock owners and should |
|---|
| 433 | # help them investigate abuse. This option is not designed to automatically |
|---|
| 434 | # forward these reports to the Netblock owners and should be checked for |
|---|
| 435 | # false-positive blocks before reporting |
|---|
| 436 | # |
|---|
| 437 | # Note: The following block types are not reported through this feature: |
|---|
| 438 | # LF_PERMBLOCK, LF_NETBLOCK, LF_DISTATTACK, LF_DISTFTP, RT_*_ALERT |
|---|
| 439 | X_ARF = "0" |
|---|
| 440 | |
|---|
| 441 | # By default, lfd will send emails from the root forwarder. Setting the |
|---|
| 442 | # following option will override this |
|---|
| 443 | X_ARF_FROM = "" |
|---|
| 444 | |
|---|
| 445 | # By default, lfd will send emails to the root forwarder. Setting the following |
|---|
| 446 | # option will override this |
|---|
| 447 | X_ARF_TO = "chris@webarchitects.co.uk" |
|---|
| 448 | |
|---|
| 449 | ############################################################################### |
|---|
| 450 | # SECTION:Temp to Perm/Netblock Settings |
|---|
| 451 | ############################################################################### |
|---|
| 452 | # Temporary to Permanent IP blocking. The following enables this feature to |
|---|
| 453 | # permanently block IP addresses that have been temporarily blocked more than |
|---|
| 454 | # LF_PERMBLOCK_COUNT times in the last LF_PERMBLOCK_INTERVAL seconds. Set |
|---|
| 455 | # LF_PERMBLOCK to "1" to enable this feature |
|---|
| 456 | # |
|---|
| 457 | # Care needs to be taken when setting LF_PERMBLOCK_INTERVAL as it needs to be |
|---|
| 458 | # at least LF_PERMBLOCK_COUNT multiplied by the longest temporary time setting |
|---|
| 459 | # (TTL) for blocked IPs, to be effective |
|---|
| 460 | # |
|---|
| 461 | # Set LF_PERMBLOCK to "0" to disable this feature |
|---|
| 462 | LF_PERMBLOCK = "1" |
|---|
| 463 | LF_PERMBLOCK_INTERVAL = "86400" |
|---|
| 464 | LF_PERMBLOCK_COUNT = "4" |
|---|
| 465 | LF_PERMBLOCK_ALERT = "1" |
|---|
| 466 | |
|---|
| 467 | # Permanently block IPs by network class. The following enables this feature |
|---|
| 468 | # to permanently block classes of IP address where individual IP addresses |
|---|
| 469 | # within the same class LF_NETBLOCK_CLASS have already been blocked more than |
|---|
| 470 | # LF_NETBLOCK_COUNT times in the last LF_NETBLOCK_INTERVAL seconds. Set |
|---|
| 471 | # LF_NETBLOCK to "1" to enable this feature |
|---|
| 472 | # |
|---|
| 473 | # This can be an affective way of blocking DDOS attacks launched from within |
|---|
| 474 | # the same networ class |
|---|
| 475 | # |
|---|
| 476 | # Valid settings for LF_NETBLOCK_CLASS are "A", "B" and "C", care and |
|---|
| 477 | # consideration is required when blocking network classes A or B |
|---|
| 478 | # |
|---|
| 479 | # Set LF_NETBLOCK to "0" to disable this feature |
|---|
| 480 | LF_NETBLOCK = "0" |
|---|
| 481 | LF_NETBLOCK_INTERVAL = "86400" |
|---|
| 482 | LF_NETBLOCK_COUNT = "4" |
|---|
| 483 | LF_NETBLOCK_CLASS = "C" |
|---|
| 484 | LF_NETBLOCK_ALERT = "1" |
|---|
| 485 | |
|---|
| 486 | ############################################################################### |
|---|
| 487 | # SECTION:Global Lists/DYNDNS/Blocklists |
|---|
| 488 | ############################################################################### |
|---|
| 489 | # Safe Chain Update. If enabled, all dynamic update chains (GALLOW*, GDENY*, |
|---|
| 490 | # SPAMHAUS, DSHIELD, BOGON, CC_ALLOW, CC_DENY, ALLOWDYN*) will create a new |
|---|
| 491 | # chain when updating, and insert it into the relevant LOCALINPUT/LOCALOUTPUT |
|---|
| 492 | # chain, then flush and delete the old dynamic chain and rename the new chain. |
|---|
| 493 | # |
|---|
| 494 | # This prevents a small window of opportunity opening when an update occurs and |
|---|
| 495 | # the dynamic chain is flushed for the new rules. |
|---|
| 496 | # |
|---|
| 497 | # This option should not be enabled on servers with long dynamic chains (e.g. |
|---|
| 498 | # CC_DENY/CC_ALLOW lists) and low memory. It should also not be enabled on |
|---|
| 499 | # Virtuozzo VPS servers with a restricted numiptent value. This is because each |
|---|
| 500 | # chain will effectively be duplicated while the update occurs, doubling the |
|---|
| 501 | # number of iptables rules |
|---|
| 502 | SAFECHAINUPDATE = "0" |
|---|
| 503 | |
|---|
| 504 | # If you wish to allow access from dynamic DNS records (for example if your IP |
|---|
| 505 | # address changes whenever you connect to the internet but you have a dedicated |
|---|
| 506 | # dynamic DNS record from the likes of dyndns.org) then you can list the FQDN |
|---|
| 507 | # records in csf.dyndns and then set the following to the number of seconds to |
|---|
| 508 | # poll for a change in the IP address. If the IP address has changed iptables |
|---|
| 509 | # will be updated. |
|---|
| 510 | # |
|---|
| 511 | # A setting of 600 would check for IP updates every 10 minutes. Set the value |
|---|
| 512 | # to 0 to disable the feature |
|---|
| 513 | DYNDNS = "0" |
|---|
| 514 | |
|---|
| 515 | # To always ignore DYNDNS IP addresses in lfd blocking, set the following |
|---|
| 516 | # option to 1 |
|---|
| 517 | DYNDNS_IGNORE = "0" |
|---|
| 518 | |
|---|
| 519 | # The follow Global options allow you to specify a URL where csf can grab a |
|---|
| 520 | # centralised copy of an IP allow or deny block list of your own. You need to |
|---|
| 521 | # specify the full URL in the following options, i.e.: |
|---|
| 522 | # http://www.somelocation.com/allow.txt |
|---|
| 523 | # |
|---|
| 524 | # The actual retrieval of these IP's is controlled by lfd, so you need to set |
|---|
| 525 | # LF_GLOBAL to the interval (in seconds) when you want lfd to retrieve. lfd |
|---|
| 526 | # will perform the retrieval when it runs and then again at the specified |
|---|
| 527 | # interval. A sensible interval would probably be every 3600 seconds (1 hour). |
|---|
| 528 | # A minimum value of 300 is enforced for LF_GLOBAL if enabled |
|---|
| 529 | # |
|---|
| 530 | # You do not have to specify both an allow and a deny file |
|---|
| 531 | # |
|---|
| 532 | # You can also configure a global ignore file for IP's that lfd should ignore |
|---|
| 533 | LF_GLOBAL = "0" |
|---|
| 534 | |
|---|
| 535 | GLOBAL_ALLOW = "" |
|---|
| 536 | GLOBAL_DENY = "" |
|---|
| 537 | GLOBAL_IGNORE = "" |
|---|
| 538 | |
|---|
| 539 | # Provides the same functionality as DYNDNS but with a GLOBAL URL file. Set |
|---|
| 540 | # this to the URL of the file containing DYNDNS entries |
|---|
| 541 | GLOBAL_DYNDNS = "" |
|---|
| 542 | |
|---|
| 543 | # Set the following to the number of seconds to poll for a change in the IP |
|---|
| 544 | # address resoved from GLOBAL_DYNDNS |
|---|
| 545 | GLOBAL_DYNDNS_INTERVAL = "600" |
|---|
| 546 | |
|---|
| 547 | # To always ignore GLOBAL_DYNDNS IP addresses in lfd blocking, set the following |
|---|
| 548 | # option to 1 |
|---|
| 549 | GLOBAL_DYNDNS_IGNORE = "0" |
|---|
| 550 | |
|---|
| 551 | # Blocklists are controlled by modifying /etc/csf/csf.blocklists |
|---|
| 552 | # |
|---|
| 553 | # If you don't want BOGON rules applied to specific NICs, then list them in |
|---|
| 554 | # a comma separated list (e.g "eth1,eth2") |
|---|
| 555 | LF_BOGON_SKIP = "" |
|---|
| 556 | |
|---|
| 557 | ############################################################################### |
|---|
| 558 | # SECTION:Country Code Lists and Settings |
|---|
| 559 | ############################################################################### |
|---|
| 560 | # Country Code to CIDR allow/deny. In the following two options you can allow |
|---|
| 561 | # or deny whole country CIDR ranges. The CIDR blocks are generated from the |
|---|
| 562 | # Maxmind GeoLite Country database http://www.maxmind.com/app/geolitecountry |
|---|
| 563 | # and entirely relies on that service being available |
|---|
| 564 | # |
|---|
| 565 | # Specify the the two-letter ISO Country Code(s). The iptables rules are for |
|---|
| 566 | # incoming connections only |
|---|
| 567 | # |
|---|
| 568 | # WARNING: These lists are never 100% accurate and some ISP's (e.g. AOL) use |
|---|
| 569 | # non-geographic IP address designations for their clients |
|---|
| 570 | # |
|---|
| 571 | # WARNING: Some of the CIDR lists are huge and each one requires a rule within |
|---|
| 572 | # the incoming iptables chain. This can result in significant performance |
|---|
| 573 | # overheads and could render the server inaccessible in some circumstances. For |
|---|
| 574 | # this reason (amongst others) we do not recommend using these options |
|---|
| 575 | # |
|---|
| 576 | # WARNING: Due to the resource constraints on VPS servers this feature should |
|---|
| 577 | # not be used on such systems unless you choose very small CC zones |
|---|
| 578 | # |
|---|
| 579 | # WARNING: CC_ALLOW allows access through all ports in the firewall. For this |
|---|
| 580 | # reason CC_ALLOW probably has very limited use and CC_ALLOW_FILTER is |
|---|
| 581 | # preferred |
|---|
| 582 | # |
|---|
| 583 | # Each option is a comma separated list of CC's, e.g. "US,GB,DE" |
|---|
| 584 | CC_DENY = "" |
|---|
| 585 | CC_ALLOW = "" |
|---|
| 586 | |
|---|
| 587 | # An alternative to CC_ALLOW is to only allow access from the following |
|---|
| 588 | # countries but still filter based on the port and packets rules. All other |
|---|
| 589 | # connections are dropped |
|---|
| 590 | CC_ALLOW_FILTER = "" |
|---|
| 591 | |
|---|
| 592 | # This option allows access from the following countries to specific ports |
|---|
| 593 | # listed in CC_ALLOW_PORTS_TCP and CC_ALLOW_PORTS_UDP |
|---|
| 594 | # |
|---|
| 595 | # Note: The rules for this feature are inserted after the allow and deny |
|---|
| 596 | # rules to still allow blocking of IP addresses |
|---|
| 597 | # |
|---|
| 598 | # Each option is a comma separated list of CC's, e.g. "US,GB,DE" |
|---|
| 599 | CC_ALLOW_PORTS = "" |
|---|
| 600 | |
|---|
| 601 | # All listed ports should be removed from TCP_IN/UDP_IN to block access from |
|---|
| 602 | # elsewhere. This option uses the same format as TCP_IN/UDP_IN |
|---|
| 603 | # |
|---|
| 604 | # An example would be to list port 21 here and remove it from TCP_IN/UDP_IN |
|---|
| 605 | # then only counties listed in CC_ALLOW_PORTS can access FTP |
|---|
| 606 | CC_ALLOW_PORTS_TCP = "" |
|---|
| 607 | CC_ALLOW_PORTS_UDP = "" |
|---|
| 608 | |
|---|
| 609 | # This option denies access from the following countries to specific ports |
|---|
| 610 | # listed in CC_DENY_PORTS_TCP and CC_DENY_PORTS_UDP |
|---|
| 611 | # |
|---|
| 612 | # Note: The rules for this feature are inserted after the allow and deny |
|---|
| 613 | # rules to still allow allowing of IP addresses |
|---|
| 614 | # |
|---|
| 615 | # Each option is a comma separated list of CC's, e.g. "US,GB,DE" |
|---|
| 616 | CC_DENY_PORTS = "" |
|---|
| 617 | |
|---|
| 618 | # This option uses the same format as TCP_IN/UDP_IN. The ports listed should |
|---|
| 619 | # NOT be removed from TCP_IN/UDP_IN |
|---|
| 620 | # |
|---|
| 621 | # An example would be to list port 21 here then counties listed in |
|---|
| 622 | # CC_DENY_PORTS cannot access FTP |
|---|
| 623 | CC_DENY_PORTS_TCP = "" |
|---|
| 624 | CC_DENY_PORTS_UDP = "" |
|---|
| 625 | |
|---|
| 626 | # This Country Code list will prevent lfd from blocking IP address hits for the |
|---|
| 627 | # listed CC's. This option could cause performance issues and is generally not |
|---|
| 628 | # recommended |
|---|
| 629 | CC_IGNORE = "" |
|---|
| 630 | |
|---|
| 631 | # Set this option to a valid CIDR (i.e. 1 to 32) to ignore CIDR blocks smaller |
|---|
| 632 | # than this value when implementing CC_DENY/CC_ALLOW/CC_ALLOW_FILTER. This can |
|---|
| 633 | # help reduce the number of CC entries and may improve iptables throughput. |
|---|
| 634 | # Obviously, this will deny/allow fewer IP addresses depending on how small you |
|---|
| 635 | # configure the option |
|---|
| 636 | # |
|---|
| 637 | # For example, to ignore all CIDR (and single IP) entries small than a /16, set |
|---|
| 638 | # this option to "16". Set to "" to block all CC IP addresses |
|---|
| 639 | CC_DROP_CIDR = "" |
|---|
| 640 | |
|---|
| 641 | # Display Country Code and Country for reported IP addresses. This option can |
|---|
| 642 | # be configured to use the MaxMind Country Database or the more detailed (and |
|---|
| 643 | # much larger and therefore slower) MaxMind City Database |
|---|
| 644 | # |
|---|
| 645 | # "0" - disable |
|---|
| 646 | # "1" - Reports: Country Code and Country |
|---|
| 647 | # "2" - Reports: Country Code and Country and Region and City |
|---|
| 648 | CC_LOOKUPS = "1" |
|---|
| 649 | |
|---|
| 650 | # This option tells lfd how often to retrieve the Maxmind GeoLite Country |
|---|
| 651 | # database for CC_ALLOW, CC_ALLOW_FILTER, CC_DENY, CC_IGNORE and CC_LOOKUPS (in |
|---|
| 652 | # days) |
|---|
| 653 | CC_INTERVAL = "7" |
|---|
| 654 | |
|---|
| 655 | ############################################################################### |
|---|
| 656 | # SECTION:Login Failure Blocking and Alerts |
|---|
| 657 | ############################################################################### |
|---|
| 658 | # The following[*] triggers are application specific. If you set LF_TRIGGER to |
|---|
| 659 | # "0" the value of each trigger is the number of failures against that |
|---|
| 660 | # application that will trigger lfd to block the IP address |
|---|
| 661 | # |
|---|
| 662 | # If you set LF_TRIGGER to a value greater than "0" then the following[*] |
|---|
| 663 | # application triggers are simply on or off ("0" or "1") and the value of |
|---|
| 664 | # LF_TRIGGER is the total cumulative number of failures that will trigger lfd |
|---|
| 665 | # to block the IP address |
|---|
| 666 | # |
|---|
| 667 | # Setting the application trigger to "0" disables it |
|---|
| 668 | LF_TRIGGER = "0" |
|---|
| 669 | |
|---|
| 670 | # If LF_TRIGGER is > "0" then LF_TRIGGER_PERM can be set to "1" to permanently |
|---|
| 671 | # block the IP address, or LF_TRIGGER_PERM can be set to a value greater than |
|---|
| 672 | # "1" and the IP address will be blocked temporarily for that value in seconds. |
|---|
| 673 | # For example: |
|---|
| 674 | # LF_TRIGGER_PERM = "1" => the IP is blocked permanently |
|---|
| 675 | # LF_TRIGGER_PERM = "3600" => the IP is blocked temporarily for 1 hour |
|---|
| 676 | # |
|---|
| 677 | # If LF_TRIGGER is "0", then the application LF_[application]_PERM value works |
|---|
| 678 | # in the same way as above and LF_TRIGGER_PERM serves no function |
|---|
| 679 | LF_TRIGGER_PERM = "1" |
|---|
| 680 | |
|---|
| 681 | # To only block access to the failed application instead of a complete block |
|---|
| 682 | # for an ip address, you can set the following to "1", but LF_TRIGGER must be |
|---|
| 683 | # set to "0" with specific application[*] trigger levels also set appropriately |
|---|
| 684 | LF_SELECT = "0" |
|---|
| 685 | |
|---|
| 686 | # Send an email alert if an IP address is blocked by one of the [*] triggers |
|---|
| 687 | LF_EMAIL_ALERT = "1" |
|---|
| 688 | |
|---|
| 689 | # [*]Enable login failure detection of sshd connections |
|---|
| 690 | LF_SSHD = "5" |
|---|
| 691 | LF_SSHD_PERM = "1" |
|---|
| 692 | |
|---|
| 693 | # [*]Enable login failure detection of ftp connections |
|---|
| 694 | LF_FTPD = "10" |
|---|
| 695 | LF_FTPD_PERM = "1" |
|---|
| 696 | |
|---|
| 697 | # [*]Enable login failure detection of SMTP AUTH connections |
|---|
| 698 | LF_SMTPAUTH = "5" |
|---|
| 699 | LF_SMTPAUTH_PERM = "1" |
|---|
| 700 | |
|---|
| 701 | # [*]Enable login failure detection of pop3 connections |
|---|
| 702 | LF_POP3D = "0" |
|---|
| 703 | LF_POP3D_PERM = "1" |
|---|
| 704 | |
|---|
| 705 | # [*]Enable login failure detection of imap connections |
|---|
| 706 | LF_IMAPD = "0" |
|---|
| 707 | LF_IMAPD_PERM = "1" |
|---|
| 708 | |
|---|
| 709 | # [*]Enable login failure detection of Apache .htpasswd connections |
|---|
| 710 | # Due to the often high logging rate in the Apache error log, you might want to |
|---|
| 711 | # enable this option only if you know you are suffering from attacks against |
|---|
| 712 | # password protected directories |
|---|
| 713 | LF_HTACCESS = "0" |
|---|
| 714 | LF_HTACCESS_PERM = "1" |
|---|
| 715 | |
|---|
| 716 | # [*]Enable failure detection of repeated Apache mod_security rule triggers |
|---|
| 717 | LF_MODSEC = "0" |
|---|
| 718 | LF_MODSEC_PERM = "1" |
|---|
| 719 | |
|---|
| 720 | # [*]Enable detection of repeated BIND denied requests |
|---|
| 721 | # This option should be enabled with care as it will prevent blocked IPs from |
|---|
| 722 | # resolving any domains on the server. You might want to set the trigger value |
|---|
| 723 | # reasonably high to avoid this |
|---|
| 724 | # Example: LF_BIND = "100" |
|---|
| 725 | LF_BIND = "0" |
|---|
| 726 | LF_BIND_PERM = "1" |
|---|
| 727 | |
|---|
| 728 | # [*]Enable detection of repeated suhosin ALERTs |
|---|
| 729 | # Example: LF_SUHOSIN = "5" |
|---|
| 730 | LF_SUHOSIN = "0" |
|---|
| 731 | LF_SUHOSIN_PERM = "1" |
|---|
| 732 | |
|---|
| 733 | # [*]Enable detection of repeated cxs ModSecurity mod_security rule triggers |
|---|
| 734 | # This option will block IP addresses if cxs detects a hits from the |
|---|
| 735 | # ModSecurity rule associated with it |
|---|
| 736 | # |
|---|
| 737 | # Note: This option takes precedence over LF_MODSEC and removes any hits |
|---|
| 738 | # counted towards LF_MODSEC for the cxs rule |
|---|
| 739 | # |
|---|
| 740 | # This setting should probably set very low, perhaps to 1, if you want to |
|---|
| 741 | # effectively block IP addresses for this trigger option |
|---|
| 742 | LF_CXS = "0" |
|---|
| 743 | LF_CXS_PERM = "1" |
|---|
| 744 | |
|---|
| 745 | # [*]Enable detection of repeated Apache mod_qos rule triggers |
|---|
| 746 | LF_QOS = "0" |
|---|
| 747 | LF_QOS_PERM = "1" |
|---|
| 748 | |
|---|
| 749 | # [*]Enable detection of repeated Apache symlink race condition triggers from |
|---|
| 750 | # the Apache patch provided by: |
|---|
| 751 | # http://www.mail-archive.com/dev@httpd.apache.org/msg55666.html |
|---|
| 752 | # This patch has also been included by cPanel via the easyapache option: |
|---|
| 753 | # "Symlink Race Condition Protection" |
|---|
| 754 | LF_SYMLINK = "0" |
|---|
| 755 | LF_SYMLINK_PERM = "1" |
|---|
| 756 | |
|---|
| 757 | # [*]Enable login failure detection of webmin connections |
|---|
| 758 | LF_WEBMIN = "0" |
|---|
| 759 | LF_WEBMIN_PERM = "1" |
|---|
| 760 | |
|---|
| 761 | # Send an email alert if anyone logs in successfully using SSH |
|---|
| 762 | LF_SSH_EMAIL_ALERT = "1" |
|---|
| 763 | |
|---|
| 764 | # Send an email alert if anyone uses su to access another account. This will |
|---|
| 765 | # send an email alert whether the attempt to use su was successful or not |
|---|
| 766 | LF_SU_EMAIL_ALERT = "1" |
|---|
| 767 | |
|---|
| 768 | # Send an email alert if anyone accesses webmin |
|---|
| 769 | LF_WEBMIN_EMAIL_ALERT = "0" |
|---|
| 770 | |
|---|
| 771 | # Send an email alert if anyone logs in successfully to root on the console |
|---|
| 772 | LF_CONSOLE_EMAIL_ALERT = "1" |
|---|
| 773 | |
|---|
| 774 | # This option will keep track of the number of "File does not exist" errors in |
|---|
| 775 | # HTACCESS_LOG. If the number of hits is more than LF_APACHE_404 in LF_INTERVAL |
|---|
| 776 | # seconds then the IP address will be blocked |
|---|
| 777 | # |
|---|
| 778 | # Care should be used with this option as it could generate many |
|---|
| 779 | # false-positives, especially Search Bots (use csf.rignore to ignore such bots) |
|---|
| 780 | # so only use this option if you know you are under this type of attack |
|---|
| 781 | # |
|---|
| 782 | # A sensible setting for this would be quite high, perhaps 200 |
|---|
| 783 | # |
|---|
| 784 | # To disable set to "0" |
|---|
| 785 | LF_APACHE_404 = "0" |
|---|
| 786 | |
|---|
| 787 | # If this option is set to 1 the blocks will be permanent |
|---|
| 788 | # If this option is > 1, the blocks will be temporary for the specified number |
|---|
| 789 | # of seconds |
|---|
| 790 | LF_APACHE_404_PERM = "3600" |
|---|
| 791 | |
|---|
| 792 | # This option will keep track of the number of "client denied by server |
|---|
| 793 | # configuration" errors in HTACCESS_LOG. If the number of hits is more than |
|---|
| 794 | # LF_APACHE_403 in LF_INTERVAL seconds then the IP address will be blocked |
|---|
| 795 | # |
|---|
| 796 | # Care should be used with this option as it could generate many |
|---|
| 797 | # false-positives, especially Search Bots (use csf.rignore to ignore such bots) |
|---|
| 798 | # so only use this option if you know you are under this type of attack |
|---|
| 799 | # |
|---|
| 800 | # A sensible setting for this would be quite high, perhaps 200 |
|---|
| 801 | # |
|---|
| 802 | # To disable set to "0" |
|---|
| 803 | LF_APACHE_403 = "0" |
|---|
| 804 | |
|---|
| 805 | # If this option is set to 1 the blocks will be permanent |
|---|
| 806 | # If this option is > 1, the blocks will be temporary for the specified number |
|---|
| 807 | # of seconds |
|---|
| 808 | LF_APACHE_403_PERM = "3600" |
|---|
| 809 | |
|---|
| 810 | # System Exploit Checking. This option is designed to perform a series of tests |
|---|
| 811 | # to send an alert in case a possible server compromise is detected |
|---|
| 812 | # |
|---|
| 813 | # To enable this feature set the following to the checking interval in seconds |
|---|
| 814 | # (a value of 300 would seem sensible). |
|---|
| 815 | # |
|---|
| 816 | # To disable set to "0" |
|---|
| 817 | LF_EXPLOIT = "300" |
|---|
| 818 | |
|---|
| 819 | # This comma separated list allows you to ignore tests LF_EXPLOIT performs |
|---|
| 820 | # |
|---|
| 821 | # For the SUPERUSER check, you can list usernames in csf.suignore to have them |
|---|
| 822 | # ignored for that test |
|---|
| 823 | # |
|---|
| 824 | # Valid tests are: |
|---|
| 825 | # SUPERUSER,SSHDSPAM |
|---|
| 826 | # |
|---|
| 827 | # If you want to ignore a test add it to this as a comma separated list, e.g. |
|---|
| 828 | # "SUPERUSER,SSHDSPAM" |
|---|
| 829 | LF_EXPLOIT_IGNORE = "" |
|---|
| 830 | |
|---|
| 831 | # Set the time interval to track login and other LF_ failures within (seconds), |
|---|
| 832 | # i.e. LF_TRIGGER failures within the last LF_INTERVAL seconds |
|---|
| 833 | LF_INTERVAL = "300" |
|---|
| 834 | |
|---|
| 835 | # This is how long the lfd process sleeps (in seconds) before processing the |
|---|
| 836 | # log file entries and checking whether other events need to be triggered |
|---|
| 837 | LF_PARSE = "5" |
|---|
| 838 | |
|---|
| 839 | # This is the interval that is used to flush reports of usernames, files and |
|---|
| 840 | # pids so that persistent problems continue to be reported, in seconds. |
|---|
| 841 | # A value of 3600 seems sensible |
|---|
| 842 | LF_FLUSH = "3600" |
|---|
| 843 | |
|---|
| 844 | # Under some circumstances iptables can fail to include a rule instruction, |
|---|
| 845 | # especially if more than one request is made concurrently. In this event, a |
|---|
| 846 | # permanent block entry may exist in csf.deny, but not in iptables. |
|---|
| 847 | # |
|---|
| 848 | # This option instructs csf to deny an already blocked IP address the number |
|---|
| 849 | # of times set. The downside, is that there will be multiple entries for an IP |
|---|
| 850 | # address in csf.deny and possibly multiple rules for the same IP address in |
|---|
| 851 | # iptables. This needs to be taken into consideration when unblocking such IP |
|---|
| 852 | # addresses. |
|---|
| 853 | # |
|---|
| 854 | # Set to "0" to disable this feature. Do not set this too high for the reasons |
|---|
| 855 | # detailed above (e.g. "5" should be more than enough) |
|---|
| 856 | LF_REPEATBLOCK = "0" |
|---|
| 857 | |
|---|
| 858 | # By default csf will create both an inbound and outbound blocks from/to an IP |
|---|
| 859 | # unless otherwise specified in csf.deny and GLOBAL_DENY. This is the most |
|---|
| 860 | # effective way to block IP traffic. This option instructs csf to only block |
|---|
| 861 | # inbound traffic from those IP's and so reduces the number of iptables rules, |
|---|
| 862 | # but at the expense of less effectiveness. For this reason we recommend |
|---|
| 863 | # leaving this option disabled |
|---|
| 864 | # |
|---|
| 865 | # Set to "0" to disable this feature - the default |
|---|
| 866 | LF_BLOCKINONLY = "0" |
|---|
| 867 | |
|---|
| 868 | ############################################################################### |
|---|
| 869 | # SECTION:Directory Watching & Integrity |
|---|
| 870 | ############################################################################### |
|---|
| 871 | # Enable Directory Watching. This enables lfd to check /tmp and /dev/shm |
|---|
| 872 | # directories for suspicious files, i.e. script exploits. If a suspicious |
|---|
| 873 | # file is found an email alert is sent. One alert per file per LF_FLUSH |
|---|
| 874 | # interval is sent |
|---|
| 875 | # |
|---|
| 876 | # To enable this feature set the following to the checking interval in seconds. |
|---|
| 877 | # To disable set to "0" |
|---|
| 878 | LF_DIRWATCH = "300" |
|---|
| 879 | |
|---|
| 880 | # To remove any suspicious files found during directory watching, enable the |
|---|
| 881 | # following. These files will be appended to a tarball in |
|---|
| 882 | # /var/lib/csf/suspicious.tar |
|---|
| 883 | LF_DIRWATCH_DISABLE = "0" |
|---|
| 884 | |
|---|
| 885 | # This option allows you to have lfd watch a particular file or directory for |
|---|
| 886 | # changes and should they change and email alert using watchalert.txt is sent |
|---|
| 887 | # |
|---|
| 888 | # To enable this feature set the following to the checking interval in seconds |
|---|
| 889 | # (a value of 60 would seem sensible) and add your entries to csf.dirwatch |
|---|
| 890 | # |
|---|
| 891 | # Set to disable set to "0" |
|---|
| 892 | LF_DIRWATCH_FILE = "0" |
|---|
| 893 | |
|---|
| 894 | # System Integrity Checking. This enables lfd to compare md5sums of the |
|---|
| 895 | # servers OS binary application files from the time when lfd starts. If the |
|---|
| 896 | # md5sum of a monitored file changes an alert is sent. This option is intended |
|---|
| 897 | # as an IDS (Intrusion Detection System) and is the last line of detection for |
|---|
| 898 | # a possible root compromise. |
|---|
| 899 | # |
|---|
| 900 | # There will be constant false-positives as the servers OS is updated or |
|---|
| 901 | # monitored application binaries are updated. However, unexpected changes |
|---|
| 902 | # should be carefully inspected. |
|---|
| 903 | # |
|---|
| 904 | # Modified files will only be reported via email once. |
|---|
| 905 | # |
|---|
| 906 | # To enable this feature set the following to the checking interval in seconds |
|---|
| 907 | # (a value of 3600 would seem sensible). This option may increase server I/O |
|---|
| 908 | # load onto the server as it checks system binaries. |
|---|
| 909 | # |
|---|
| 910 | # To disable set to "0" |
|---|
| 911 | LF_INTEGRITY = "3600" |
|---|
| 912 | |
|---|
| 913 | ############################################################################### |
|---|
| 914 | # SECTION:Distributed Attacks |
|---|
| 915 | ############################################################################### |
|---|
| 916 | # Distributed Account Attack. This option will keep track of login failures |
|---|
| 917 | # from distributed IP addresses to a specific application account. If the |
|---|
| 918 | # number of failures matches the trigger value above, ALL of the IP addresses |
|---|
| 919 | # involved in the attack will be blocked according to the temp/perm rules above |
|---|
| 920 | # |
|---|
| 921 | # Tracking applies to LF_SSHD, LF_FTPD, LF_SMTPAUTH, LF_POP3D, LF_IMAPD, |
|---|
| 922 | # LF_HTACCESS |
|---|
| 923 | LF_DISTATTACK = "1" |
|---|
| 924 | |
|---|
| 925 | # Set the following to the minimum number of unique IP addresses that trigger |
|---|
| 926 | # LF_DISTATTACK |
|---|
| 927 | LF_DISTATTACK_UNIQ = "3" |
|---|
| 928 | |
|---|
| 929 | # Distributed FTP Logins. This option will keep track of successful FTP logins. |
|---|
| 930 | # If the number of successful logins to an individual account is at least |
|---|
| 931 | # LF_DISTFTP in LF_DIST_INTERVAL from at least LF_DISTFTP_UNIQ IP addresses, |
|---|
| 932 | # then all of the IP addresses will be blocked |
|---|
| 933 | # |
|---|
| 934 | # This option can help mitigate the common FTP account compromise attacks that |
|---|
| 935 | # use a distributed network of zombies to deface websites |
|---|
| 936 | # |
|---|
| 937 | # A sensible setting for this might be 5, depending on how many different |
|---|
| 938 | # IP addresses you expect to an individual FTP account within LF_DIST_INTERVAL |
|---|
| 939 | # |
|---|
| 940 | # To disable set to "0" |
|---|
| 941 | LF_DISTFTP = "5" |
|---|
| 942 | |
|---|
| 943 | # Set the following to the minimum number of unique IP addresses that trigger |
|---|
| 944 | # LF_DISTFTP. LF_DISTFTP_UNIQ must be <= LF_DISTFTP for this to work |
|---|
| 945 | LF_DISTFTP_UNIQ = "5" |
|---|
| 946 | |
|---|
| 947 | # If this option is set to 1 the blocks will be permanent |
|---|
| 948 | # If this option is > 1, the blocks will be temporary for the specified number |
|---|
| 949 | # of seconds |
|---|
| 950 | LF_DISTFTP_PERM = "900" |
|---|
| 951 | |
|---|
| 952 | # Distributed SMTP Logins. This option will keep track of successful SMTP |
|---|
| 953 | # logins. If the number of successful logins to an individual account is at |
|---|
| 954 | # least LF_DISTSMTP in LF_DIST_INTERVAL from at least LF_DISTSMTP_UNIQ IP |
|---|
| 955 | # addresses, then all of the IP addresses will be blocked. These options only |
|---|
| 956 | # apply to the exim MTA |
|---|
| 957 | # |
|---|
| 958 | # This option can help mitigate the common SMTP account compromise attacks that |
|---|
| 959 | # use a distributed network of zombies to send spam |
|---|
| 960 | # |
|---|
| 961 | # A sensible setting for this might be 5, depending on how many different |
|---|
| 962 | # IP addresses you expect to an individual SMTP account within LF_DIST_INTERVAL |
|---|
| 963 | # |
|---|
| 964 | # To disable set to "0" |
|---|
| 965 | LF_DISTSMTP = "0" |
|---|
| 966 | |
|---|
| 967 | # Set the following to the minimum number of unique IP addresses that trigger |
|---|
| 968 | # LF_DISTSMTP. LF_DISTSMTP_UNIQ must be <= LF_DISTSMTP for this to work |
|---|
| 969 | LF_DISTSMTP_UNIQ = "3" |
|---|
| 970 | |
|---|
| 971 | # If this option is set to 1 the blocks will be permanent |
|---|
| 972 | # If this option is > 1, the blocks will be temporary for the specified number |
|---|
| 973 | # of seconds |
|---|
| 974 | LF_DISTSMTP_PERM = "1" |
|---|
| 975 | |
|---|
| 976 | # This is the interval during which a distributed FTP or SMTP attack is |
|---|
| 977 | # measured |
|---|
| 978 | LF_DIST_INTERVAL = "300" |
|---|
| 979 | |
|---|
| 980 | ############################################################################### |
|---|
| 981 | # SECTION:Login Tracking |
|---|
| 982 | ############################################################################### |
|---|
| 983 | # Block POP3 logins if greater than LT_POP3D times per hour per account per IP |
|---|
| 984 | # address (0=disabled) |
|---|
| 985 | # |
|---|
| 986 | # This is a temporary block for the rest of the hour, afterwhich the IP is |
|---|
| 987 | # unblocked |
|---|
| 988 | LT_POP3D = "0" |
|---|
| 989 | |
|---|
| 990 | # Block IMAP logins if greater than LT_IMAPD times per hour per account per IP |
|---|
| 991 | # address (0=disabled) - not recommended for IMAP logins due to the ethos |
|---|
| 992 | # within which IMAP works. If you want to use this, setting it quite high is |
|---|
| 993 | # probably a good idea |
|---|
| 994 | # |
|---|
| 995 | # This is a temporary block for the rest of the hour, afterwhich the IP is |
|---|
| 996 | # unblocked |
|---|
| 997 | LT_IMAPD = "0" |
|---|
| 998 | |
|---|
| 999 | # Send an email alert if an account exceeds LT_POP3D/LT_IMAPD logins per hour |
|---|
| 1000 | # per IP |
|---|
| 1001 | LT_EMAIL_ALERT = "0" |
|---|
| 1002 | |
|---|
| 1003 | # If LF_PERMBLOCK is enabled but you do not want this to apply to |
|---|
| 1004 | # LT_POP3D/LT_IMAPD, then enable this option |
|---|
| 1005 | LT_SKIPPERMBLOCK = "0" |
|---|
| 1006 | |
|---|
| 1007 | ############################################################################### |
|---|
| 1008 | # SECTION:Connection Tracking |
|---|
| 1009 | ############################################################################### |
|---|
| 1010 | # Connection Tracking. This option enables tracking of all connections from IP |
|---|
| 1011 | # addresses to the server. If the total number of connections is greater than |
|---|
| 1012 | # this value then the offending IP address is blocked. This can be used to help |
|---|
| 1013 | # prevent some types of DOS attack. |
|---|
| 1014 | # |
|---|
| 1015 | # Care should be taken with this option. It's entirely possible that you will |
|---|
| 1016 | # see false-positives. Some protocols can be connection hungry, e.g. FTP, IMAPD |
|---|
| 1017 | # and HTTP so it could be quite easy to trigger, especially with a lot of |
|---|
| 1018 | # closed connections in TIME_WAIT. However, for a server that is prone to DOS |
|---|
| 1019 | # attacks this may be very useful. A reasonable setting for this option might |
|---|
| 1020 | # be around 300. |
|---|
| 1021 | # |
|---|
| 1022 | # To disable this feature, set this to 0 |
|---|
| 1023 | CT_LIMIT = "0" |
|---|
| 1024 | |
|---|
| 1025 | # Connection Tracking interval. Set this to the the number of seconds between |
|---|
| 1026 | # connection tracking scans |
|---|
| 1027 | CT_INTERVAL = "30" |
|---|
| 1028 | |
|---|
| 1029 | # Send an email alert if an IP address is blocked due to connection tracking |
|---|
| 1030 | CT_EMAIL_ALERT = "1" |
|---|
| 1031 | |
|---|
| 1032 | # If you want to make IP blocks permanent then set this to 1, otherwise blocks |
|---|
| 1033 | # will be temporary and will be cleared after CT_BLOCK_TIME seconds |
|---|
| 1034 | CT_PERMANENT = "0" |
|---|
| 1035 | |
|---|
| 1036 | # If you opt for temporary IP blocks for CT, then the following is the interval |
|---|
| 1037 | # in seconds that the IP will remained blocked for (e.g. 1800 = 30 mins) |
|---|
| 1038 | CT_BLOCK_TIME = "1800" |
|---|
| 1039 | |
|---|
| 1040 | # If you don't want to count the TIME_WAIT state against the connection count |
|---|
| 1041 | # then set the following to "1" |
|---|
| 1042 | CT_SKIP_TIME_WAIT = "0" |
|---|
| 1043 | |
|---|
| 1044 | # If you only want to count specific states (e.g. SYN_RECV) then add the states |
|---|
| 1045 | # to the following as a comma separated list. E.g. "SYN_RECV,TIME_WAIT" |
|---|
| 1046 | # |
|---|
| 1047 | # Leave this option empty to count all states against CT_LIMIT |
|---|
| 1048 | CT_STATES = "" |
|---|
| 1049 | |
|---|
| 1050 | # If you only want to count specific ports (e.g. 80,443) then add the ports |
|---|
| 1051 | # to the following as a comma separated list. E.g. "80,443" |
|---|
| 1052 | # |
|---|
| 1053 | # Leave this option empty to count all ports against CT_LIMIT |
|---|
| 1054 | CT_PORTS = "" |
|---|
| 1055 | |
|---|
| 1056 | ############################################################################### |
|---|
| 1057 | # SECTION:Process Tracking |
|---|
| 1058 | ############################################################################### |
|---|
| 1059 | # Process Tracking. This option enables tracking of user and nobody processes |
|---|
| 1060 | # and examines them for suspicious executables or open network ports. Its |
|---|
| 1061 | # purpose is to identify potential exploit processes that are running on the |
|---|
| 1062 | # server, even if they are obfuscated to appear as system services. If a |
|---|
| 1063 | # suspicious process is found an alert email is sent with relevant information. |
|---|
| 1064 | # It is then the responsibility of the recipient to investigate the process |
|---|
| 1065 | # further as the script takes no further action |
|---|
| 1066 | # |
|---|
| 1067 | # The following is the number of seconds a process has to be active before it |
|---|
| 1068 | # is inspected. If you set this time too low, then you will likely trigger |
|---|
| 1069 | # false-positives with CGI or PHP scripts. |
|---|
| 1070 | # Set the value to 0 to disable this feature |
|---|
| 1071 | PT_LIMIT = "0" |
|---|
| 1072 | |
|---|
| 1073 | # How frequently processes are checked in seconds |
|---|
| 1074 | PT_INTERVAL = "60" |
|---|
| 1075 | |
|---|
| 1076 | # If you want process tracking to highlight php or perl scripts that are run |
|---|
| 1077 | # through apache then disable the following, |
|---|
| 1078 | # i.e. set it to 0 |
|---|
| 1079 | # |
|---|
| 1080 | # While enabling this setting will reduce false-positives, having it set to 0 |
|---|
| 1081 | # does provide better checking for exploits running on the server |
|---|
| 1082 | PT_SKIP_HTTP = "0" |
|---|
| 1083 | |
|---|
| 1084 | # lfd will report processes, even if they're listed in csf.pignore, if they're |
|---|
| 1085 | # tagged as (deleted) by Linux. This information is provided in Linux under |
|---|
| 1086 | # /proc/PID/exe. A (deleted) process is one that is running a binary that has |
|---|
| 1087 | # the inode for the file removed from the file system directory. This usually |
|---|
| 1088 | # happens when the binary has been replaced due to an upgrade for it by the OS |
|---|
| 1089 | # vendor or another third party (e.g. cPanel). You need to investigate whether |
|---|
| 1090 | # this is indeed the case to be sure that the original binary has not been |
|---|
| 1091 | # replaced by a rootkit or is running an exploit. |
|---|
| 1092 | # |
|---|
| 1093 | # Note: If a deleted executable process is detected and reported then lfd will |
|---|
| 1094 | # not report children of the parent (or the parent itself if a child triggered |
|---|
| 1095 | # the report) if the parent is also a deleted executable process |
|---|
| 1096 | # |
|---|
| 1097 | # To stop lfd reporting such process you need to restart the daemon to which it |
|---|
| 1098 | # belongs and therefore run the process using the replacement binary (presuming |
|---|
| 1099 | # one exists). This will normally mean running the associated startup script in |
|---|
| 1100 | # /etc/init.d/ |
|---|
| 1101 | # |
|---|
| 1102 | # If you do want lfd to report deleted binary processes, set to 1 |
|---|
| 1103 | PT_DELETED = "0" |
|---|
| 1104 | |
|---|
| 1105 | # If a PT_DELETED event is triggered, then if the following contains the path to |
|---|
| 1106 | # a script, it will be run in a child process and passed the executable, pid, |
|---|
| 1107 | # account for the process, and parent pid |
|---|
| 1108 | # |
|---|
| 1109 | # The action script must have the execute bit and interpreter (shebang) set. An |
|---|
| 1110 | # example is provided in /usr/local/csf/bin/pt_deleted_action.pl |
|---|
| 1111 | # |
|---|
| 1112 | # WARNING: Make sure you read and understand the potential security |
|---|
| 1113 | # implications of such processes in PT_DELETED above before simply restarting |
|---|
| 1114 | # such processes with a script |
|---|
| 1115 | PT_DELETED_ACTION = "" |
|---|
| 1116 | |
|---|
| 1117 | # User Process Tracking. This option enables the tracking of the number of |
|---|
| 1118 | # process any given account is running at one time. If the number of processes |
|---|
| 1119 | # exceeds the value of the following setting an email alert is sent with |
|---|
| 1120 | # details of those processes. If you specify a user in csf.pignore it will be |
|---|
| 1121 | # ignored |
|---|
| 1122 | # |
|---|
| 1123 | # Set to 0 to disable this feature |
|---|
| 1124 | PT_USERPROC = "0" |
|---|
| 1125 | |
|---|
| 1126 | # This User Process Tracking option sends an alert if any linux user process |
|---|
| 1127 | # exceeds the memory usage set (MB). To ignore specific processes or users use |
|---|
| 1128 | # csf.pignore |
|---|
| 1129 | # |
|---|
| 1130 | # Set to 0 to disable this feature |
|---|
| 1131 | PT_USERMEM = "0" |
|---|
| 1132 | |
|---|
| 1133 | # This User Process Tracking option sends an alert if any linux user process |
|---|
| 1134 | # exceeds the time usage set (seconds). To ignore specific processes or users |
|---|
| 1135 | # use csf.pignore |
|---|
| 1136 | # |
|---|
| 1137 | # Set to 0 to disable this feature |
|---|
| 1138 | PT_USERTIME = "0" |
|---|
| 1139 | |
|---|
| 1140 | # If this option is set then processes detected by PT_USERMEM, PT_USERTIME or |
|---|
| 1141 | # PT_USERPROC are killed |
|---|
| 1142 | # |
|---|
| 1143 | # Warning: We don't recommend enabling this option unless absolutely necessary |
|---|
| 1144 | # as it can cause unexpected problems when processes are suddenly terminated. |
|---|
| 1145 | # It can also lead to system processes being terminated which could cause |
|---|
| 1146 | # stability issues. It is much better to leave this option disabled and to |
|---|
| 1147 | # investigate each case as it is reported when the triggers above are breached |
|---|
| 1148 | # |
|---|
| 1149 | # Note: Processes that are running deleted excecutables (see PT_DELETED) will |
|---|
| 1150 | # not be killed by lfd |
|---|
| 1151 | PT_USERKILL = "0" |
|---|
| 1152 | |
|---|
| 1153 | # If you want to disable email alerts if PT_USERKILL is triggered, then set |
|---|
| 1154 | # this option to 0 |
|---|
| 1155 | PT_USERKILL_ALERT = "0" |
|---|
| 1156 | |
|---|
| 1157 | # If a PT_* event is triggered, then if the following contains the path to |
|---|
| 1158 | # a script, it will be run in a child process and passed the PID(s) of the |
|---|
| 1159 | # process(es) in a comma separated list. |
|---|
| 1160 | # |
|---|
| 1161 | # The action script must have the execute bit and interpreter (shebang) set |
|---|
| 1162 | PT_USER_ACTION = "" |
|---|
| 1163 | |
|---|
| 1164 | # Check the PT_LOAD_AVG minute Load Average (can be set to 1 5 or 15 and |
|---|
| 1165 | # defaults to 5 if set otherwise) on the server every PT_LOAD seconds. If the |
|---|
| 1166 | # load average is greater than or equal to PT_LOAD_LEVEL then an email alert is |
|---|
| 1167 | # sent. lfd then does not report subsequent high load until PT_LOAD_SKIP |
|---|
| 1168 | # seconds has passed to prevent email floods. |
|---|
| 1169 | # |
|---|
| 1170 | # Set PT_LOAD to "0" to disable this feature |
|---|
| 1171 | PT_LOAD = "30" |
|---|
| 1172 | PT_LOAD_AVG = "5" |
|---|
| 1173 | PT_LOAD_LEVEL = "6" |
|---|
| 1174 | PT_LOAD_SKIP = "3600" |
|---|
| 1175 | |
|---|
| 1176 | # This is the Apache Server Status URL used in the email alert. Requires the |
|---|
| 1177 | # Apache mod_status module to be installed and configured correctly |
|---|
| 1178 | PT_APACHESTATUS = "http://127.0.0.1/server-status" |
|---|
| 1179 | |
|---|
| 1180 | # If a PT_LOAD event is triggered, then if the following contains the path to |
|---|
| 1181 | # a script, it will be run in a child process. For example, the script could |
|---|
| 1182 | # contain commands to terminate and restart httpd, php, exim, etc incase of |
|---|
| 1183 | # looping processes. The action script must have the execute bit an |
|---|
| 1184 | # interpreter (shebang) set |
|---|
| 1185 | PT_LOAD_ACTION = "" |
|---|
| 1186 | |
|---|
| 1187 | # Fork Bomb Protection. This option checks the number of processes with the |
|---|
| 1188 | # same session id and if greater than the value set, the whole session tree is |
|---|
| 1189 | # terminated and an alert sent |
|---|
| 1190 | # |
|---|
| 1191 | # You can see an example of common session id processes on most Linux systems |
|---|
| 1192 | # using: "ps axf -O sid" |
|---|
| 1193 | # |
|---|
| 1194 | # On cPanel servers, PT_ALL_USERS should be enabled to use this option |
|---|
| 1195 | # effectively |
|---|
| 1196 | # |
|---|
| 1197 | # This option will check root owned processes. Session id 0 and 1 will always |
|---|
| 1198 | # be ignored as they represent kernel and init processes. csf.pignore will be |
|---|
| 1199 | # honoured, but bear in mind that a session tree can contain a variety of users |
|---|
| 1200 | # and executables |
|---|
| 1201 | # |
|---|
| 1202 | # Care needs to be taken to ensure that this option only detects runaway fork |
|---|
| 1203 | # bombs, so should be set higher than any session tree is likely to get (e.g. |
|---|
| 1204 | # httpd could have 100s of legitimate children on very busy systems). A |
|---|
| 1205 | # sensible starting point on most servers might be 250 |
|---|
| 1206 | PT_FORKBOMB = "250" |
|---|
| 1207 | |
|---|
| 1208 | ############################################################################### |
|---|
| 1209 | # SECTION:Port Scan Tracking |
|---|
| 1210 | ############################################################################### |
|---|
| 1211 | # Port Scan Tracking. This feature tracks port blocks logged by iptables to |
|---|
| 1212 | # syslog. If an IP address generates a port block that is logged more than |
|---|
| 1213 | # PS_LIMIT within PS_INTERVAL seconds, the IP address will be blocked. |
|---|
| 1214 | # |
|---|
| 1215 | # This feature could, for example, be useful for blocking hackers attempting |
|---|
| 1216 | # to access the standard SSH port if you have moved it to a port other than 22 |
|---|
| 1217 | # and have removed 22 from the TCP_IN list so that connection attempts to the |
|---|
| 1218 | # old port are being logged |
|---|
| 1219 | # |
|---|
| 1220 | # This feature blocks all iptables blocks from the iptables logs, including |
|---|
| 1221 | # repeated attempts to one port or SYN flood blocks, etc |
|---|
| 1222 | # |
|---|
| 1223 | # Note: This feature will only track iptables blocks from the log file set in |
|---|
| 1224 | # IPTABLES_LOG below and if you have DROP_LOGGING enabled. However, it will |
|---|
| 1225 | # cause redundant blocking with DROP_IP_LOGGING enabled |
|---|
| 1226 | # |
|---|
| 1227 | # Warning: It's possible that an elaborate DDOS (i.e. from multiple IP's) |
|---|
| 1228 | # could very quickly fill the iptables rule chains and cause a DOS in itself. |
|---|
| 1229 | # The DENY_IP_LIMIT should help to mitigate such problems with permanent blocks |
|---|
| 1230 | # and the DENY_TEMP_IP_LIMIT with temporary blocks |
|---|
| 1231 | # |
|---|
| 1232 | # Set PS_INTERVAL to "0" to disable this feature. A value of between 60 and 300 |
|---|
| 1233 | # would be sensible to enable this feature |
|---|
| 1234 | PS_INTERVAL = "120" |
|---|
| 1235 | PS_LIMIT = "19" |
|---|
| 1236 | |
|---|
| 1237 | # You can specify the ports and/or port ranges that should be tracked by the |
|---|
| 1238 | # Port Scan Tracking feature. The following setting is a comma separated list |
|---|
| 1239 | # of those ports and uses the same format as TCP_IN. The default setting of |
|---|
| 1240 | # 0:65535,ICMP covers all ports |
|---|
| 1241 | PS_PORTS = "0:65535,ICMP" |
|---|
| 1242 | |
|---|
| 1243 | # You can select whether IP blocks for Port Scan Tracking should be temporary |
|---|
| 1244 | # or permanent. Set PS_PERMANENT to "0" for temporary and "1" for permanent |
|---|
| 1245 | # blocking. If set to "0" PS_BLOCK_TIME is the amount of time in seconds to |
|---|
| 1246 | # temporarily block the IP address for |
|---|
| 1247 | PS_PERMANENT = "0" |
|---|
| 1248 | PS_BLOCK_TIME = "3600" |
|---|
| 1249 | |
|---|
| 1250 | # Set the following to "1" to enable Port Scan Tracking email alerts, set to |
|---|
| 1251 | # "0" to disable them |
|---|
| 1252 | PS_EMAIL_ALERT = "1" |
|---|
| 1253 | |
|---|
| 1254 | ############################################################################### |
|---|
| 1255 | # SECTION:User ID Tracking |
|---|
| 1256 | ############################################################################### |
|---|
| 1257 | # User ID Tracking. This feature tracks UID blocks logged by iptables to |
|---|
| 1258 | # syslog. If a UID generates a port block that is logged more than UID_LIMIT |
|---|
| 1259 | # times within UID_INTERVAL seconds, an alert will be sent |
|---|
| 1260 | # |
|---|
| 1261 | # Note: This feature will only track iptables blocks from the log file set in |
|---|
| 1262 | # IPTABLES_LOG and if DROP_OUT_LOGGING is enabled. |
|---|
| 1263 | # |
|---|
| 1264 | # To ignore specific UIDs list them in csf.uidignore and then restart lfd |
|---|
| 1265 | # |
|---|
| 1266 | # Set UID_INTERVAL to "0" to disable this feature. A value of between 60 and 300 |
|---|
| 1267 | # would be sensible to enable this feature |
|---|
| 1268 | UID_INTERVAL = "0" |
|---|
| 1269 | UID_LIMIT = "10" |
|---|
| 1270 | |
|---|
| 1271 | # You can specify the ports and/or port ranges that should be tracked by the |
|---|
| 1272 | # User ID Tracking feature. The following setting is a comma separated list |
|---|
| 1273 | # of those ports and uses the same format as TCP_OUT. The default setting of |
|---|
| 1274 | # 0:65535,ICMP covers all ports |
|---|
| 1275 | UID_PORTS = "0:65535,ICMP" |
|---|
| 1276 | |
|---|
| 1277 | ############################################################################### |
|---|
| 1278 | # SECTION:Account Tracking |
|---|
| 1279 | ############################################################################### |
|---|
| 1280 | # Account Tracking. The following options enable the tracking of modifications |
|---|
| 1281 | # to the accounts on a server. If any of the enabled options are triggered by |
|---|
| 1282 | # a modifications to an account, an alert email is sent. Only the modification |
|---|
| 1283 | # is reported. The cause of the modification will have to be investigated |
|---|
| 1284 | # manually |
|---|
| 1285 | # |
|---|
| 1286 | # You can set AT_ALERT to the following: |
|---|
| 1287 | # 0 = disable this feature |
|---|
| 1288 | # 1 = enable this feature for all accounts |
|---|
| 1289 | # 2 = enable this feature only for superuser accounts (UID = 0, e.g. root, etc) |
|---|
| 1290 | # 3 = enable this feature only for the root account |
|---|
| 1291 | AT_ALERT = "2" |
|---|
| 1292 | |
|---|
| 1293 | # This options is the interval between checks in seconds |
|---|
| 1294 | AT_INTERVAL = "60" |
|---|
| 1295 | |
|---|
| 1296 | # Send alert if a new account is created |
|---|
| 1297 | AT_NEW = "1" |
|---|
| 1298 | |
|---|
| 1299 | # Send alert if an existing account is deleted |
|---|
| 1300 | AT_OLD = "1" |
|---|
| 1301 | |
|---|
| 1302 | # Send alert if an account password has changed |
|---|
| 1303 | AT_PASSWD = "1" |
|---|
| 1304 | |
|---|
| 1305 | # Send alert if an account uid has changed |
|---|
| 1306 | AT_UID = "1" |
|---|
| 1307 | |
|---|
| 1308 | # Send alert if an account gid has changed |
|---|
| 1309 | AT_GID = "1" |
|---|
| 1310 | |
|---|
| 1311 | # Send alert if an account login directory has changed |
|---|
| 1312 | AT_DIR = "1" |
|---|
| 1313 | |
|---|
| 1314 | # Send alert if an account login shell has changed |
|---|
| 1315 | AT_SHELL = "1" |
|---|
| 1316 | |
|---|
| 1317 | ############################################################################### |
|---|
| 1318 | # SECTION:Integrated User Interface |
|---|
| 1319 | ############################################################################### |
|---|
| 1320 | # Integrated User Interface. This feature provides a HTML UI to csf and lfd, |
|---|
| 1321 | # without requiring a control panel or web server. The UI runs as a sub process |
|---|
| 1322 | # to the lfd daemon |
|---|
| 1323 | # |
|---|
| 1324 | # As it runs under the root account and successful login provides root access |
|---|
| 1325 | # to the server, great care should be taken when configuring and using this |
|---|
| 1326 | # feature. There are additional restrictions to enhance secure access to the UI |
|---|
| 1327 | # |
|---|
| 1328 | # See readme.txt for more information about using this feature BEFORE enabling |
|---|
| 1329 | # it for security and access reasons |
|---|
| 1330 | # |
|---|
| 1331 | # 1 to enable, 0 to disable |
|---|
| 1332 | UI = "0" |
|---|
| 1333 | |
|---|
| 1334 | # Set this to the port that want to bind this service to. You should configure |
|---|
| 1335 | # this port to be >1023 and different from any other port already being used |
|---|
| 1336 | # |
|---|
| 1337 | # Do NOT enable access to this port in TCP_IN, instead only allow trusted IP's |
|---|
| 1338 | # to the port using Advanced Allow Filters (see readme.txt) |
|---|
| 1339 | UI_PORT = "6666" |
|---|
| 1340 | |
|---|
| 1341 | # This should be a secure, hard to guess username |
|---|
| 1342 | # |
|---|
| 1343 | # This must be changed from the default |
|---|
| 1344 | UI_USER = "username" |
|---|
| 1345 | |
|---|
| 1346 | # This should be a secure, hard to guess password. That is, at least 8 |
|---|
| 1347 | # characters long with a mixture of upper and lowercase characters plus |
|---|
| 1348 | # numbers and non-alphanumeric characters |
|---|
| 1349 | # |
|---|
| 1350 | # This must be changed from the default |
|---|
| 1351 | UI_PASS = "password" |
|---|
| 1352 | |
|---|
| 1353 | # This is the login session timeout. If there is no activity for a logged in |
|---|
| 1354 | # session within this number of seconds, the session will timeout and a new |
|---|
| 1355 | # login will be required |
|---|
| 1356 | # |
|---|
| 1357 | # For security reasons, you should always keep this option low (i.e 60-300) |
|---|
| 1358 | UI_TIMEOUT = "300" |
|---|
| 1359 | |
|---|
| 1360 | # This is the maximum concurrent connections allowed to the server. The default |
|---|
| 1361 | # value should be sufficient |
|---|
| 1362 | UI_CHILDREN = "5" |
|---|
| 1363 | |
|---|
| 1364 | # The number of login retries allowed within a 24 hour period. A successful |
|---|
| 1365 | # login from the IP address will clear the failures |
|---|
| 1366 | # |
|---|
| 1367 | # For security reasons, you should always keep this option low (i.e 0-10) |
|---|
| 1368 | UI_RETRY = "5" |
|---|
| 1369 | |
|---|
| 1370 | # If enabled, this option will add the connecting IP address to the file |
|---|
| 1371 | # /etc/csf/ui/ui.ban after UI_RETRY login failures. The IP address will not be |
|---|
| 1372 | # able to login to the UI while it is listed in this file. The UI_BAN setting |
|---|
| 1373 | # does not refer to any of the csf/lfd allow or ignore files, e.g. csf.allow, |
|---|
| 1374 | # csf.ignore, etc. |
|---|
| 1375 | # |
|---|
| 1376 | # For security reasons, you should always enable this option |
|---|
| 1377 | UI_BAN = "1" |
|---|
| 1378 | |
|---|
| 1379 | # If enabled, only IPs (or CIDR's) listed in the file /etc/csf/ui/ui.allow will |
|---|
| 1380 | # be allowed to login to the UI. The UI_ALLOW setting does not refer to any of |
|---|
| 1381 | # the csf/lfd allow or ignore files, e.g. csf.allow, csf.ignore, etc. |
|---|
| 1382 | # |
|---|
| 1383 | # For security reasons, you should always enable this option and use ui.allow |
|---|
| 1384 | UI_ALLOW = "1" |
|---|
| 1385 | |
|---|
| 1386 | # If enabled, this option will trigger an iptables block through csf after |
|---|
| 1387 | # UI_RETRY login failures |
|---|
| 1388 | # |
|---|
| 1389 | # 0 = no block;1 = perm block;nn=temp block for nn secs |
|---|
| 1390 | UI_BLOCK = "1" |
|---|
| 1391 | |
|---|
| 1392 | # This controls what email alerts are sent with regards to logins to the UI. It |
|---|
| 1393 | # uses the uialert.txt template |
|---|
| 1394 | # |
|---|
| 1395 | # 4 = login success + login failure/ban/block + login attempts |
|---|
| 1396 | # 3 = login success + login failure/ban/block |
|---|
| 1397 | # 2 = login failure/ban/block |
|---|
| 1398 | # 1 = login ban/block |
|---|
| 1399 | # 0 = disabled |
|---|
| 1400 | UI_ALERT = "4" |
|---|
| 1401 | |
|---|
| 1402 | # This is the SSL cipher list that the Integrated UI will negotiate from |
|---|
| 1403 | UI_CIPHER = "ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:-LOW:-SSLv2:-EXP:!kEDH" |
|---|
| 1404 | |
|---|
| 1405 | # If cxs is installed then enabling this option will provide a dropdown box to |
|---|
| 1406 | # switch between applications |
|---|
| 1407 | UI_CXS = "0" |
|---|
| 1408 | |
|---|
| 1409 | # There is a modified installation of ConfigServer Explorer (cse) provided with |
|---|
| 1410 | # the csf distribution. If this option is enabled it will provide a dropdown |
|---|
| 1411 | # box to switch between applications |
|---|
| 1412 | UI_CSE = "0" |
|---|
| 1413 | |
|---|
| 1414 | ############################################################################### |
|---|
| 1415 | # SECTION:Messenger service |
|---|
| 1416 | ############################################################################### |
|---|
| 1417 | # Messenger service. This feature allows the display of a message to a blocked |
|---|
| 1418 | # connecting IP address to inform the user that they are blocked in the |
|---|
| 1419 | # firewall. This can help when users get themselves blocked, e.g. due to |
|---|
| 1420 | # multiple login failures. The service is provided by two daemons running on |
|---|
| 1421 | # ports providing either an HTML or TEXT message. |
|---|
| 1422 | # |
|---|
| 1423 | # This feature does not work on servers that do not have the iptables module |
|---|
| 1424 | # ipt_REDIRECT loaded. Typically, this will be with MONOLITHIC kernels. VPS |
|---|
| 1425 | # server admins should check with their VPS host provider that the iptables |
|---|
| 1426 | # module is included. |
|---|
| 1427 | # |
|---|
| 1428 | # For further information on features and limitations refer to the csf |
|---|
| 1429 | # readme.txt |
|---|
| 1430 | # |
|---|
| 1431 | # Note: Run /etc/csf/csftest.pl to check whether this option will function on |
|---|
| 1432 | # this server |
|---|
| 1433 | # |
|---|
| 1434 | # 1 to enable, 0 to disable |
|---|
| 1435 | MESSENGER = "0" |
|---|
| 1436 | |
|---|
| 1437 | # Provide this service to temporary IP address blocks |
|---|
| 1438 | MESSENGER_TEMP = "1" |
|---|
| 1439 | |
|---|
| 1440 | # Provide this service to permanent IP address blocks |
|---|
| 1441 | MESSENGER_PERM = "1" |
|---|
| 1442 | |
|---|
| 1443 | # User account to run the service servers under. We recommend creating a |
|---|
| 1444 | # specific non-priv, non-shell account for this purpose |
|---|
| 1445 | MESSENGER_USER = "csf" |
|---|
| 1446 | |
|---|
| 1447 | # This is the maximum concurrent connections allowed to each service server |
|---|
| 1448 | MESSENGER_CHILDREN = "10" |
|---|
| 1449 | |
|---|
| 1450 | # Set this to the port that will receive the HTML message. You should configure |
|---|
| 1451 | # this port to be >1023 and different from the TEXT port. Do NOT enable access |
|---|
| 1452 | # to this port in TCP_IN |
|---|
| 1453 | MESSENGER_HTML = "8888" |
|---|
| 1454 | |
|---|
| 1455 | # This comma separated list are the HTML ports that will be redirected for the |
|---|
| 1456 | # blocked IP address. If you are using per application blocking (LF_TRIGGER) |
|---|
| 1457 | # then only the relevant block port will be redirected to the messenger port |
|---|
| 1458 | MESSENGER_HTML_IN = "80,2082,2095" |
|---|
| 1459 | |
|---|
| 1460 | # Set this to the port that will receive the TEXT message. You should configure |
|---|
| 1461 | # this port to be >1023 and different from the HTML port. Do NOT enable access |
|---|
| 1462 | # to this port in TCP_IN |
|---|
| 1463 | MESSENGER_TEXT = "8889" |
|---|
| 1464 | |
|---|
| 1465 | # This comma separated list are the TEXT ports that will be redirected for the |
|---|
| 1466 | # blocked IP address. If you are using per application blocking (LF_TRIGGER) |
|---|
| 1467 | # then only the relevant block port will be redirected to the messenger port |
|---|
| 1468 | MESSENGER_TEXT_IN = "21" |
|---|
| 1469 | |
|---|
| 1470 | # These settings limit the rate at which connections can be made to the |
|---|
| 1471 | # messenger service servers. Its intention is to provide protection from |
|---|
| 1472 | # attacks or excessive connections to the servers. If the rate is exceeded then |
|---|
| 1473 | # iptables will revert for the duration to the normal blocking actiity |
|---|
| 1474 | # |
|---|
| 1475 | # See the iptables man page for the correct --limit rate syntax |
|---|
| 1476 | MESSENGER_RATE = "30/m" |
|---|
| 1477 | MESSENGER_BURST = "5" |
|---|
| 1478 | |
|---|
| 1479 | ############################################################################### |
|---|
| 1480 | # SECTION:lfd Clustering |
|---|
| 1481 | ############################################################################### |
|---|
| 1482 | # lfd Clustering. This allows the configuration of an lfd cluster environment |
|---|
| 1483 | # where a group of servers can share blocks and configuration option changes. |
|---|
| 1484 | # Included are CLI and UI options to send requests to the cluster. |
|---|
| 1485 | # |
|---|
| 1486 | # See the readme.txt file for more information and details on setup and |
|---|
| 1487 | # security risks. |
|---|
| 1488 | # |
|---|
| 1489 | # Comma separated list of cluster member IP addresses to send requests to |
|---|
| 1490 | CLUSTER_SENDTO = "" |
|---|
| 1491 | |
|---|
| 1492 | # Comma separated list of cluster member IP addresses to receive requests from |
|---|
| 1493 | CLUSTER_RECVFROM = "" |
|---|
| 1494 | |
|---|
| 1495 | # IP address of the master node in the cluster allowed to send CLUSTER_CONFIG |
|---|
| 1496 | # changes |
|---|
| 1497 | CLUSTER_MASTER = "" |
|---|
| 1498 | |
|---|
| 1499 | # If this is a NAT server, set this to the public IP address of this server |
|---|
| 1500 | CLUSTER_NAT = "" |
|---|
| 1501 | |
|---|
| 1502 | # If a cluster member should send requests on an IP other than the default IP, |
|---|
| 1503 | # set it here |
|---|
| 1504 | CLUSTER_LOCALADDR = "" |
|---|
| 1505 | |
|---|
| 1506 | # Cluster communication port (must be the same on all member servers). There |
|---|
| 1507 | # is no need to open this port in the firewall as csf will automatically add |
|---|
| 1508 | # in and out bound rules to allow communication between cluster members |
|---|
| 1509 | CLUSTER_PORT = "7777" |
|---|
| 1510 | |
|---|
| 1511 | # This is a secret key used to encrypt cluster communications using the |
|---|
| 1512 | # Blowfish algorithm. It should be between 8 and 56 characters long, |
|---|
| 1513 | # preferably > 20 random characters |
|---|
| 1514 | # 56 chars: 012345678901234567890123456789012345678901234567890123456 |
|---|
| 1515 | CLUSTER_KEY = "" |
|---|
| 1516 | |
|---|
| 1517 | # Automatically send lfd blocks to all members of CLUSTER_SENDTO. Those |
|---|
| 1518 | # servers must have this servers IP address listed in their CLUSTER_RECVFROM |
|---|
| 1519 | # |
|---|
| 1520 | # Set to 0 to disable this feature |
|---|
| 1521 | CLUSTER_BLOCK = "0" |
|---|
| 1522 | |
|---|
| 1523 | # This option allows the enabling and disabling of the Cluster configuration |
|---|
| 1524 | # changing options --cconfig, --cconfigr, --cfile, --ccfile sent from the |
|---|
| 1525 | # CLUSTER_MASTER server |
|---|
| 1526 | # |
|---|
| 1527 | # Set this option to 1 to allow Cluster configurations to be received |
|---|
| 1528 | CLUSTER_CONFIG = "0" |
|---|
| 1529 | |
|---|
| 1530 | # Maximum number of child processes to listen on. High blocking rates or large |
|---|
| 1531 | # clusters may need to increase this |
|---|
| 1532 | CLUSTER_CHILDREN = "10" |
|---|
| 1533 | |
|---|
| 1534 | ############################################################################### |
|---|
| 1535 | # SECTION:Port Knocking |
|---|
| 1536 | ############################################################################### |
|---|
| 1537 | # Port Knocking. This feature allows port knocking to be enabled on multiple |
|---|
| 1538 | # ports with a variable number of knocked ports and a timeout. There must be a |
|---|
| 1539 | # minimum of 3 ports to knock for an entry to be valid |
|---|
| 1540 | # |
|---|
| 1541 | # See the following for information regarding Port Knocking: |
|---|
| 1542 | # http://www.portknocking.org/ |
|---|
| 1543 | # |
|---|
| 1544 | # This feature does not work on servers that do not have the iptables module |
|---|
| 1545 | # ipt_recent loaded. Typically, this will be with MONOLITHIC kernels. VPS |
|---|
| 1546 | # server admins should check with their VPS host provider that the iptables |
|---|
| 1547 | # module is included |
|---|
| 1548 | # |
|---|
| 1549 | # For further information and syntax refer to the Port Knocking section of the |
|---|
| 1550 | # csf readme.txt |
|---|
| 1551 | # |
|---|
| 1552 | # Note: Run /etc/csf/csftest.pl to check whether this option will function on |
|---|
| 1553 | # this server |
|---|
| 1554 | # |
|---|
| 1555 | # openport;protocol;timeout;kport1;kport2;kport3[...;kportN],... |
|---|
| 1556 | # e.g.: 22;TCP;20;100;200;300;400 |
|---|
| 1557 | PORTKNOCKING = "" |
|---|
| 1558 | |
|---|
| 1559 | # Enable PORTKNOCKING logging by iptables |
|---|
| 1560 | PORTKNOCKING_LOG = "1" |
|---|
| 1561 | |
|---|
| 1562 | # Send an email alert if the PORTKNOCKING port is opened. PORTKNOCKING_LOG must |
|---|
| 1563 | # also be enabled to use this option |
|---|
| 1564 | PORTKNOCKING_ALERT = "1" |
|---|
| 1565 | |
|---|
| 1566 | ############################################################################### |
|---|
| 1567 | # SECTION:Log Scanner |
|---|
| 1568 | ############################################################################### |
|---|
| 1569 | # Log Scanner. This feature will send out an email summary of the log lines of |
|---|
| 1570 | # each log listed in /etc/csf/csf.logfiles. All lines will be reported unless |
|---|
| 1571 | # they match a regular expression in /etc/csf/csf.logignore |
|---|
| 1572 | # |
|---|
| 1573 | # Note: lfd builds the report continuously from lines logged after lfd has |
|---|
| 1574 | # started, so any lines logged when lfd is not running will not be reported |
|---|
| 1575 | # (e.g. during reboot). If lfd is restarted, then the report will include any |
|---|
| 1576 | # lines logged during the previous lfd logging period that weren't reported |
|---|
| 1577 | # |
|---|
| 1578 | # 1 to enable, 0 to disable |
|---|
| 1579 | LOGSCANNER = "0" |
|---|
| 1580 | |
|---|
| 1581 | # This is the interval each report will be sent based on the logalert.txt |
|---|
| 1582 | # template |
|---|
| 1583 | # |
|---|
| 1584 | # The interval can be set to: |
|---|
| 1585 | # "hourly" - sent on the hour |
|---|
| 1586 | # "daily" - sent at midnight (00:00) |
|---|
| 1587 | # "manual" - sent whenever "csf --logrun" is run. This allows for scheduling |
|---|
| 1588 | # via cron job |
|---|
| 1589 | LOGSCANNER_INTERVAL = "hourly" |
|---|
| 1590 | |
|---|
| 1591 | # Report Style |
|---|
| 1592 | # 1 = Separate chronological log lines per log file |
|---|
| 1593 | # 2 = Simply chronological log of all lines |
|---|
| 1594 | LOGSCANNER_STYLE = "1" |
|---|
| 1595 | |
|---|
| 1596 | # Send the report email even if no log lines reported |
|---|
| 1597 | # 1 to enable, 0 to disable |
|---|
| 1598 | LOGSCANNER_EMPTY = "1" |
|---|
| 1599 | |
|---|
| 1600 | # Maximum number of lines in the report before it is truncated. This is to |
|---|
| 1601 | # prevent log lines flooding resulting in an excessively large report. This |
|---|
| 1602 | # might need to be increased if you choose a daily report |
|---|
| 1603 | LOGSCANNER_LINES = "5000" |
|---|
| 1604 | |
|---|
| 1605 | ############################################################################### |
|---|
| 1606 | # SECTION:Statistics Settings |
|---|
| 1607 | ############################################################################### |
|---|
| 1608 | # Statistics |
|---|
| 1609 | # |
|---|
| 1610 | # Some of the Statistics output requires the gd graphics library and the |
|---|
| 1611 | # GD::Graph perl module with all dependent modules to be installed for the UI |
|---|
| 1612 | # for them to be displayed |
|---|
| 1613 | # |
|---|
| 1614 | # This option enabled statistical data gathering |
|---|
| 1615 | ST_ENABLE = "1" |
|---|
| 1616 | |
|---|
| 1617 | # This option determines how many iptables log lines to store for reports |
|---|
| 1618 | ST_IPTABLES = "100" |
|---|
| 1619 | |
|---|
| 1620 | # This option indicates whether rDNS and CC lookups are performed at the time |
|---|
| 1621 | # the log line is recorded (this is not performed when viewing the reports) |
|---|
| 1622 | # |
|---|
| 1623 | # Warning: If DROP_IP_LOGGING is enabled and there are frequent iptables hits, |
|---|
| 1624 | # then enabling this setting could cause serious performance problems |
|---|
| 1625 | ST_LOOKUP = "0" |
|---|
| 1626 | |
|---|
| 1627 | # This option will gather basic system statstics. Through the UI it displays |
|---|
| 1628 | # various graphs for disk, cpu, memory, network, etc usage over 4 intervals: |
|---|
| 1629 | # . Hourly (per minute) |
|---|
| 1630 | # . 24 hours (per minute) |
|---|
| 1631 | # . 7 days (per minute averaged over an hour) |
|---|
| 1632 | # . 30 days (per minute averaged over an hour) - user definable |
|---|
| 1633 | # The data is stored in /var/lib/csf/stats/system and the option requires the |
|---|
| 1634 | # perl GD::Graph module |
|---|
| 1635 | # |
|---|
| 1636 | # Note: Disk graphs do not show on Virtuozzo/OpenVZ servers as the kernel on |
|---|
| 1637 | # those systems do not store the required information in /proc/diskstats |
|---|
| 1638 | # On new installations or when enabling this option it will take time for these |
|---|
| 1639 | # graphs to be populated |
|---|
| 1640 | ST_SYSTEM = "0" |
|---|
| 1641 | |
|---|
| 1642 | # Set the maximum days to collect statistics for. The default is 30 days, the |
|---|
| 1643 | # more data that is collected the longer it will take for each of the graphs to |
|---|
| 1644 | # be generated |
|---|
| 1645 | ST_SYSTEM_MAXDAYS = "30" |
|---|
| 1646 | |
|---|
| 1647 | # If ST_SYSTEM is enabled, then these options can collect MySQL statistical |
|---|
| 1648 | # data. To use this option the server must have the perl modules DBI and |
|---|
| 1649 | # DBD::mysql installed. |
|---|
| 1650 | # |
|---|
| 1651 | # Set this option to "0" to disable MySQL data collection |
|---|
| 1652 | ST_MYSQL = "0" |
|---|
| 1653 | |
|---|
| 1654 | # The following options are for authentication for MySQL data collection. If |
|---|
| 1655 | # the password is left blank and the user set to "root" then the procedure will |
|---|
| 1656 | # look for authentication data in /root/.my.cnf. Otherwise, you will need to |
|---|
| 1657 | # provide a MySQL username and password to collect the data. Any MySQL user |
|---|
| 1658 | # account can be used |
|---|
| 1659 | ST_MYSQL_USER = "root" |
|---|
| 1660 | ST_MYSQL_PASS = "" |
|---|
| 1661 | ST_MYSQL_HOST = "localhost" |
|---|
| 1662 | |
|---|
| 1663 | # If ST_SYSTEM is enabled, then this option can collect Apache statistical data |
|---|
| 1664 | # The value for PT_APACHESTATUS must be correctly set |
|---|
| 1665 | ST_APACHE = "0" |
|---|
| 1666 | |
|---|
| 1667 | # The following options measure disk write performance using dd (location set |
|---|
| 1668 | # via the DD setting). It creates a 64MB file called /var/lib/dd_write_test and |
|---|
| 1669 | # the statistics will plot the MB/s response time of the disk. As this is an IO |
|---|
| 1670 | # intensive operation, it may not be prudent to run this test too often, so by |
|---|
| 1671 | # default it is only run every 5 minutes and the result duplicated for each |
|---|
| 1672 | # intervening minute for the statistics |
|---|
| 1673 | # |
|---|
| 1674 | # This is not necessrily a good measure of disk performance, primarily because |
|---|
| 1675 | # the measurements are for relatively small amounts of data over a small amount |
|---|
| 1676 | # of time. To properly test disk performance there are a variety of tools |
|---|
| 1677 | # available that should be run for extended periods of time to obtain an |
|---|
| 1678 | # accurate measurement. This metric is provided to give an idea of how the disk |
|---|
| 1679 | # is performing over time |
|---|
| 1680 | # |
|---|
| 1681 | # Note: There is a 15 second timeout performing the check |
|---|
| 1682 | # |
|---|
| 1683 | # Set to 0 to disable, 1 to enable |
|---|
| 1684 | ST_DISKW = "0" |
|---|
| 1685 | |
|---|
| 1686 | # The number of minutes that elapse between tests. Default is 5, minimum is 1. |
|---|
| 1687 | ST_DISKW_FREQ = "5" |
|---|
| 1688 | |
|---|
| 1689 | # This is the command line passed to dd. If you are familiar with dd, or wish |
|---|
| 1690 | # to move the output file (of) to a different disk, then you can alter this |
|---|
| 1691 | # command. Take great care when making any changes to this command as it is |
|---|
| 1692 | # very easy to overwrite a disk using dd if you make a mistake |
|---|
| 1693 | ST_DISKW_DD = "if=/dev/zero of=/etc/csf/dd_test bs=1MB count=64 conv=fdatasync" |
|---|
| 1694 | |
|---|
| 1695 | ############################################################################### |
|---|
| 1696 | # SECTION:OS Specific Settings |
|---|
| 1697 | ############################################################################### |
|---|
| 1698 | # Binary locations |
|---|
| 1699 | IPTABLES = "/sbin/iptables" |
|---|
| 1700 | IPTABLES_SAVE = "/sbin/iptables-save" |
|---|
| 1701 | IPTABLES_RESTORE = "/sbin/iptables-restore" |
|---|
| 1702 | IP6TABLES = "/sbin/ip6tables" |
|---|
| 1703 | IP6TABLES_SAVE = "/sbin/ip6tables-save" |
|---|
| 1704 | IP6TABLES_RESTORE = "/sbin/ip6tables-restore" |
|---|
| 1705 | MODPROBE = "/sbin/modprobe" |
|---|
| 1706 | IFCONFIG = "/sbin/ifconfig" |
|---|
| 1707 | SENDMAIL = "/usr/sbin/sendmail" |
|---|
| 1708 | PS = "/bin/ps" |
|---|
| 1709 | VMSTAT = "/usr/bin/vmstat" |
|---|
| 1710 | LS = "/bin/ls" |
|---|
| 1711 | MD5SUM = "/usr/bin/md5sum" |
|---|
| 1712 | TAR = "/bin/tar" |
|---|
| 1713 | CHATTR = "/usr/bin/chattr" |
|---|
| 1714 | UNZIP = "/usr/bin/unzip" |
|---|
| 1715 | GUNZIP = "/bin/gunzip" |
|---|
| 1716 | DD = "/bin/dd" |
|---|
| 1717 | |
|---|
| 1718 | # Log file locations |
|---|
| 1719 | HTACCESS_LOG = "/var/log/apache2/error.log" |
|---|
| 1720 | MODSEC_LOG = "/var/log/apache2/error.log" |
|---|
| 1721 | SSHD_LOG = "/var/log/auth.log" |
|---|
| 1722 | SU_LOG = "/var/log/messages" |
|---|
| 1723 | FTPD_LOG = "/var/log/messages" |
|---|
| 1724 | SMTPAUTH_LOG = "/var/log/secure" |
|---|
| 1725 | POP3D_LOG = "/var/log/mail.log" |
|---|
| 1726 | IMAPD_LOG = "/var/log/mail.log" |
|---|
| 1727 | IPTABLES_LOG = "/var/log/messages" |
|---|
| 1728 | SUHOSIN_LOG = "/var/log/messages" |
|---|
| 1729 | BIND_LOG = "/var/log/messages" |
|---|
| 1730 | SYSLOG_LOG = "/var/log/messages" |
|---|
| 1731 | WEBMIN_LOG = "/var/log/auth.log" |
|---|
| 1732 | |
|---|
| 1733 | CUSTOM1_LOG = "/var/log/messages" |
|---|
| 1734 | CUSTOM2_LOG = "/var/log/messages" |
|---|
| 1735 | CUSTOM3_LOG = "/var/log/messages" |
|---|
| 1736 | CUSTOM4_LOG = "/var/log/messages" |
|---|
| 1737 | CUSTOM5_LOG = "/var/log/messages" |
|---|
| 1738 | CUSTOM6_LOG = "/var/log/messages" |
|---|
| 1739 | CUSTOM7_LOG = "/var/log/messages" |
|---|
| 1740 | CUSTOM8_LOG = "/var/log/messages" |
|---|
| 1741 | CUSTOM9_LOG = "/var/log/messages" |
|---|
| 1742 | |
|---|
| 1743 | # This configuration is for use with generic Linux servers, do not change the |
|---|
| 1744 | # following setting: |
|---|
| 1745 | GENERIC = "1" |
|---|
| 1746 | |
|---|
| 1747 | # If you find ever increasing numbers of zombie lfd processes you may need to |
|---|
| 1748 | # revert to the old child reaper code by enabling this option |
|---|
| 1749 | OLD_REAPER = "0" |
|---|
| 1750 | |
|---|
| 1751 | # For internal use only. You should not enable this option as it could cause |
|---|
| 1752 | # instability in csf and lfd |
|---|
| 1753 | DEBUG = "0" |
|---|
| 1754 | ############################################################################### |
|---|