Search results

  1. P

    How to make webmail.domain.com secure (SSL) for every user/account?

    Can you elaborate on this setup? I mean, mod_ruin2 directives seem to be missing.
  2. P

    Protection against the 'Browser Exploit Against SSL/TLS' (BEAST)

    Ummmm i wouldnt put too much emphasis on this problem. Even the author states his security site hasnt been updated since 2009?
  3. P

    Configserver CSF 2.73 issues

    Hmm strange, my 0 is like 0 without quotes. Ill try that next time.
  4. P

    Configserver CSF 2.73 issues

    Fixed. Turn Auto UPDATES off IN csf CONFIG. For DA always run; csf -u othewise it will really mess things up. I ran csf -u from shell and it updated and resolved whatever that was.
  5. P

    Configserver CSF 2.73 issues

    lfd refuses to start. Keeps telling me that the firewall is in TEST mode and to turn on the firewall line 81. Option is already on; # Testing flag - enables a CRON job that clears iptables incase of # configuration problems when you start csf. This should be enabled until you # are sure that...
  6. P

    HOWTO: ProFTPD Antivirus using CLAMAV

    Nope, doesnt do a thing under x64 Centos 6 complied with proftpd 1.3.4b. So far nothing.
  7. P

    [tools] update.script

    Is this script still being maintained? Im asking because there has been no recent replies to the issues above? MD5 Checksum error on Imagemagick and now and error with Proftpd + Mod_Clam Hunk #1 succeeded at 46 with fuzz 1 (offset 4 lines). Hunk #2 succeeded at 1819 (offset 235 lines)...
  8. P

    administrator FTP access denied

    Here you go, http://help.directadmin.com/item.php?id=205 this is what i used to fix that issue.
  9. P

    administrator FTP access denied

    Thats not exactly correct. You dont need a domain under the admin account to get FTP working for admin. This is a bug, still not fixed? I recently installed a new Centos 6 installation and i had the same exact issue. The admins password is not added to the proftpd.passwd file upon DA install...
  10. P

    Cron <root@server> test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cro

    Im getting; Anacron job 'cron.daily' on la1009.xxxxxx /etc/cron.daily/custombuild: /etc/cron.daily/custombuild: line 6: mail: command not found On a new CentOS 6.x installation
  11. P

    [tools] update.script

    Turn off your firewall while you do updates. Im not sure what port these outbound requests are happening on, should be port 80, but when i have CSF running i cant update anything. I have to turn off CSF during updates. Strange. I have port 80 in my outbound rules. What other port should be open...
  12. P

    [tools] update.script

    --2013-02-09 11:28:21-- http://els.web4host.net/imagemagick/ImageMagick-6.8.0-4.tar.gz Resolving els.web4host.net... 217.79.189.187 Connecting to els.web4host.net|217.79.189.187|:80... connected. HTTP request sent, awaiting response... 200 OK Length: 13777353 (13M) [application/x-gzip] Saving...
  13. P

    Login Key + WHMCS

    Maybe im missing something but how does the ADMIN create login keys? Do i have to create a dummy site under ADMIN LEVEL or what? Also, after some hacker got into my DA admin panel though WHMCS last year im wondering how this API thing works? I only want WHMCS to allow creating accounts. Has...
  14. P

    File::Scan::ClamAV with Perl 5.10

    Does anyone know what you have to do to get File::Scan::ClamAV installed under perl 5.10? cpan[1]> install File::Scan::ClamAV CPAN: Storable loaded ok (v2.20) Going to read '/root/.cpan/Metadata' Database was generated on Fri, 01 Feb 2013 00:17:03 GMT Running install for module...
  15. P

    [HOWTO] FreeBSD 7.x 8.x + IPFW + Brute Force Monitor + block_ip.sh

    Right but thats not very practical. I mean, if you have 20 ips banned and then one day you have to stop the fw or take the box down those ips are lost? I mean i realize those rules are dynamically created when you click the BLOCK button but that is only for now. What about later? Seems it would...
  16. P

    Brute Force Attack coming from IP: 127.0.0.1

    Im getting blasted by attacks on 127.0.0.1 right now. Thousands. Iv had to limit connection to 20 to combat it. Im also seeing things like; 13281438000031 127.0.0.1 ggbgfdghfd 1 exim1 2012-02-01 16:49:10 login authenticator failed for localhost (8DL17N1LUIP1D93) [127.0.0.1]: 535 Incorrect...
  17. P

    [HOWTO] FreeBSD 7.x 8.x + IPFW + Brute Force Monitor + block_ip.sh

    Followed this thread and had brute force working. About a week later all my blocked ips are gone. I had about 4 or 5 ips banned but in directadmin there is no evidance of it. Grated, i have turned the firewall on and off a few times but should this be a reason why those banned ips no longer show up?
  18. P

    Upgrade Exim 4.69 -> 4.77 Fails Freebsd cyrus-sasl2 stop error.

    Acutally the dependancy is OpenSSL-0.9.8d which i dont have upgraded. I know this was a big deal for many people in the past. Im going to have to upgrade OpenSSL then try reinstalling Cyrus when i have time.
  19. P

    Upgrade Exim 4.69 -> 4.77 Fails Freebsd cyrus-sasl2 stop error.

    That was a typo, i tried without the version number and got the same error.
  20. P

    Upgrade Exim 4.69 -> 4.77 Fails Freebsd cyrus-sasl2 stop error.

    Tried it already, says it cant retrieve the file and URL. # /etc > pkg_add -r cyrus-sasl-2.1.25_1 Error: FTP Unable to get ftp://ftp.freebsd.org/pub/FreeBSD/ports/i386/packages-6.2-release/Latest/cyrus-sasl-2.1.25_1.tbz: File unavailable (e.g., file not found, no access) pkg_add: unable to...
Back
Top