F.Y.I. - I can access the website - https://configserver.com/Domain is unreachable![]()
F.Y.I. - I can access the website - https://configserver.com/Domain is unreachable![]()
There are at least some changes in the upcoming version![]()
Does DirectAdmin have any (tentative) planning for CSF?
imunify360-agent config update '{"PAM": {"enable": true, "exim_dovecot_native": true, "exim_dovecot_protection": true}}'
“I can see that PAM detected an RBL event here, though Imunify360 still hasn't officially supported Dovecot on DirectAdmin. This means that while some functions like RBL lookups may appear to work, the integration itself is not yet fully supported. You may still notice the following from Imunify360 error logs:
`WARNING [2025-08-27 09:35:10,874] im360.subsys.pam: imunify360-pam warnings: ['Dovecot is not supported for Directadmin.']”
Just read your changelog and it's pretty comprehensive, thank you. Would just like to know, before I test this, is it safe to update all my copies of CSF on production servers without (much) anything breaking? Did you test this to get the comparisons?Yup free scripts were released under open source licensing ~2hrs ago https://github.com/waytotheweb/scripts. I compared the CSF Firewall GPLv3 open source code (v15.00) to the last configserver.com released code (v14.24) and wrote a summary at https://github.com/centminmod/configserver-scripts/blob/main/README-gpl-csf.md.
Should be fine. Just so you know, updating to CSF Firewall v15.00 GPLv3 release will disable the auto-updating routine, so you will need to manually check for any future updates yourself and update all copies on all your servers when any future open source updates are made.Just read your changelog and it's pretty comprehensive, thank you. Would just like to know, before I test this, is it safe to update all my copies of CSF on production servers without (much) anything breaking? Did you test this to get the comparisons?
Thanks!
Alan
Thanks @eva2000 , that's brilliant.Should be fine. Just so you know, updating to CSF Firewall v15.00 GPLv3 release will disable the auto-updating routine, so you will need to manually check for any future updates yourself and update all copies on all your servers when any future open source updates are made.
For my own use and that of my users, I have modified the CSF Firewall auto-update routines to utilise my own self-hosted CSF Firewall mirror URLs. This allows me to continue leveraging the CSF Firewall auto-update routine to populate future open-source/contributed GPLv3 release versions on any server that has my mirrored version. So I only have to update once to switch over on servers. I actually switched over for testing on my own servers ~4 weeks ago and no problems. And users started switching 4 days ago and ~100K requests in 4 days to the mirror so far. And CSF Firewall v15.00 GPLv3 code is no different, so don't expect any issues for now.
For my mirror, I modified the code to point to my own self-hosted mirrors. Best way to figure out what changed is put v14.24 into Git private repo and commit changes. Then, put in the repo a separate branch for the committed version with v15.00. Then you can diff compare code and see where v15.00 GPLv3 version disabled the auto update routineThanks @eva2000 , that's brilliant.
Just out of curiosity, you mention your own mirrors. Have you just self hosted the files from GitHub and point your CSF installs to your mirror url in the downloadservers file? or is it a bit more complex than that? You mention they have turned off auto updating, so what files are affected and what would need replacing to get them all to auto search an url on one of my maintenance servers?
Cheers!
Alan