1

I have just installed csf+lfd on my rackspace cloud server (a vanilla LAMP stack running centos 6.7). I only tweaked a couple of settings in the default csf.conf file: the ports allowed in TCP_IN and TCP6_IN, and then set RESTRICT_SYSLOG to 3. I also set TESTING to 0. I then installed csf+lfd as a service:

chkconfig --level 235 csf on
service csf restart

The impetus for setting up csf+lfd in the first place was to counter attacks on a Wordpress site on this server. The bot was trying to brute force via the xmlrpc.php file. First of all I denied access to this file globally in Apache via:

<FilesMatch "^(xmlrpc\.php|wp-trackback\.php)">
    Order Deny,Allow
    Deny from all
</FilesMatch>

This seems to work well. I can see lines in the Apache error log like:

[Mon Aug 24 13:19:48 2015] [error] [client 1.2.3.4] client denied by server configuration: /path/to/virtualhost/xmlrpc.php

But there is one bot coming from a particular IP address who hits the xmlrpc.php URL every second for an hour or so at a time. I was hoping that csf+lfd would notice and add the IP address to the deny list, but it hasn't done this. I have the Apache error log in the log file locations section of the csf.conf file:

HTACCESS_LOG = "/var/log/httpd/error_log"

And in the Apache error log, I had about 3600 entries for that IP trying to hit xmlrpc.php over the course of an hour. Yet csf+lfd didn't pick that up.

Being a newbie I'm sure it's something simple I'm missing here. Any help greatly appreciated.

  • i found another option in `csf.conf` i had to set: `LF_APACHE_403 = "200"`. now i am waiting for another breach to occur.... – bhu Boue vidya Aug 24 '15 at 16:25

0 Answers0