The Community Forums

Interact with an entire community of cPanel & WHM users!
  1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

CSF Installation and cphulk protection

Discussion in 'General Discussion' started by Zumsel, Apr 5, 2009.

  1. Zumsel

    Zumsel Member

    Joined:
    Feb 6, 2009
    Messages:
    8
    Likes Received:
    0
    Trophy Points:
    1
    I want to install the CSF Firewall. Before I install CSF, cphulk protection in WHM must be disabled or not?

    Peter
     
  2. ravindradhainwa

    ravindradhainwa Well-Known Member

    Joined:
    Jan 24, 2008
    Messages:
    45
    Likes Received:
    0
    Trophy Points:
    6
    Hi,

    You can leave cPHulk enabled.
     
  3. Zumsel

    Zumsel Member

    Joined:
    Feb 6, 2009
    Messages:
    8
    Likes Received:
    0
    Trophy Points:
    1
    thanks, i hope it works well
     
  4. Infopro

    Infopro cPanel Sr. Product Evangelist
    Staff Member

    Joined:
    May 20, 2003
    Messages:
    14,476
    Likes Received:
    202
    Trophy Points:
    63
    Location:
    Pennsylvania
    cPanel Access Level:
    Root Administrator
    Twitter:
    You can, but IMHO, not needed.
     
  5. Zumsel

    Zumsel Member

    Joined:
    Feb 6, 2009
    Messages:
    8
    Likes Received:
    0
    Trophy Points:
    1
    Can you tell me, where i can disable following emails:
    There are too many mails from the server.

    email 1:
    Time: Mon Apr 6 09:13:12 2009 +0200
    Account: rxxx
    Resource: Process Time
    Exceeded: 6837 > 1800 (seconds)
    Executable: /usr/bin/perl
    Command Line: spamd child
    PID: 16338
    Killed: No


    email2:
    Time: Mon Apr 6 09:13:12 2009 +0200
    PID: 16338
    Account: xxx
    Uptime: 6837 seconds


    Executable:

    /usr/bin/perl


    Command Line (often faked in exploits):

    spamd child


    Network connections by the process (if any):

    tcp: 127.0.0.1:783 -> 0.0.0.0:0
    tcp: 127.0.0.1:783 -> 127.0.0.1:48844
    udp: 127.0.0.1:44056 -> 127.0.0.1:53


    Files open by the process (if any):

    /dev/null
    /dev/null
    /dev/null
    /usr/bin/spamd
    /usr/lib/perl5/site_perl/5.8.8/Mail/SpamAssassin/Plugin/VBounce.pm
    /tmp/.spamassassin16338RiIdxptmp

    email3:
    Time: Mon Apr 6 09:47:15 2009 +0200
    PID: 4284
    Account: nobody
    Uptime: 121588 seconds


    Executable:

    /usr/bin/perl.#prelink# (deleted)

    The file system shows this process is running an executable file that has been deleted. This typically happens when the original file has been replaced by a new file when the application is updated. To prevent this being reported again, restart the process that runs this excecutable file. See csf.conf and the PT_DELETED text for more information about the security implications of processes running deleted executable files.


    Command Line (often faked in exploits):
     
    #5 Zumsel, Apr 6, 2009
    Last edited: Apr 6, 2009
  6. Infopro

    Infopro cPanel Sr. Product Evangelist
    Staff Member

    Joined:
    May 20, 2003
    Messages:
    14,476
    Likes Received:
    202
    Trophy Points:
    63
    Location:
    Pennsylvania
    cPanel Access Level:
    Root Administrator
    Twitter:
Loading...

Share This Page